168d75effSDimitry Andric //===-- linux.cpp -----------------------------------------------*- C++ -*-===// 268d75effSDimitry Andric // 368d75effSDimitry Andric // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 468d75effSDimitry Andric // See https://llvm.org/LICENSE.txt for license information. 568d75effSDimitry Andric // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 668d75effSDimitry Andric // 768d75effSDimitry Andric //===----------------------------------------------------------------------===// 868d75effSDimitry Andric 968d75effSDimitry Andric #include "platform.h" 1068d75effSDimitry Andric 1168d75effSDimitry Andric #if SCUDO_LINUX 1268d75effSDimitry Andric 1368d75effSDimitry Andric #include "common.h" 1468d75effSDimitry Andric #include "linux.h" 1568d75effSDimitry Andric #include "mutex.h" 1668d75effSDimitry Andric #include "string_utils.h" 1768d75effSDimitry Andric 1868d75effSDimitry Andric #include <errno.h> 1968d75effSDimitry Andric #include <fcntl.h> 2068d75effSDimitry Andric #include <linux/futex.h> 2168d75effSDimitry Andric #include <sched.h> 2268d75effSDimitry Andric #include <stdlib.h> 2368d75effSDimitry Andric #include <string.h> 2468d75effSDimitry Andric #include <sys/mman.h> 2568d75effSDimitry Andric #include <sys/stat.h> 2668d75effSDimitry Andric #include <sys/syscall.h> 2768d75effSDimitry Andric #include <sys/time.h> 2868d75effSDimitry Andric #include <time.h> 2968d75effSDimitry Andric #include <unistd.h> 3068d75effSDimitry Andric 3168d75effSDimitry Andric #if SCUDO_ANDROID 3268d75effSDimitry Andric #include <sys/prctl.h> 3368d75effSDimitry Andric // Definitions of prctl arguments to set a vma name in Android kernels. 3468d75effSDimitry Andric #define ANDROID_PR_SET_VMA 0x53564d41 3568d75effSDimitry Andric #define ANDROID_PR_SET_VMA_ANON_NAME 0 3668d75effSDimitry Andric #endif 3768d75effSDimitry Andric 38*5ffd83dbSDimitry Andric #ifdef ANDROID_EXPERIMENTAL_MTE 39*5ffd83dbSDimitry Andric #include <bionic/mte_kernel.h> 40*5ffd83dbSDimitry Andric #endif 41*5ffd83dbSDimitry Andric 4268d75effSDimitry Andric namespace scudo { 4368d75effSDimitry Andric 4468d75effSDimitry Andric uptr getPageSize() { return static_cast<uptr>(sysconf(_SC_PAGESIZE)); } 4568d75effSDimitry Andric 4668d75effSDimitry Andric void NORETURN die() { abort(); } 4768d75effSDimitry Andric 4868d75effSDimitry Andric void *map(void *Addr, uptr Size, UNUSED const char *Name, uptr Flags, 4968d75effSDimitry Andric UNUSED MapPlatformData *Data) { 5068d75effSDimitry Andric int MmapFlags = MAP_PRIVATE | MAP_ANONYMOUS; 5168d75effSDimitry Andric int MmapProt; 5268d75effSDimitry Andric if (Flags & MAP_NOACCESS) { 5368d75effSDimitry Andric MmapFlags |= MAP_NORESERVE; 5468d75effSDimitry Andric MmapProt = PROT_NONE; 5568d75effSDimitry Andric } else { 5668d75effSDimitry Andric MmapProt = PROT_READ | PROT_WRITE; 57*5ffd83dbSDimitry Andric #if defined(__aarch64__) && defined(ANDROID_EXPERIMENTAL_MTE) 58*5ffd83dbSDimitry Andric if (Flags & MAP_MEMTAG) 59*5ffd83dbSDimitry Andric MmapProt |= PROT_MTE; 60*5ffd83dbSDimitry Andric #endif 6168d75effSDimitry Andric } 6268d75effSDimitry Andric if (Addr) { 6368d75effSDimitry Andric // Currently no scenario for a noaccess mapping with a fixed address. 6468d75effSDimitry Andric DCHECK_EQ(Flags & MAP_NOACCESS, 0); 6568d75effSDimitry Andric MmapFlags |= MAP_FIXED; 6668d75effSDimitry Andric } 6768d75effSDimitry Andric void *P = mmap(Addr, Size, MmapProt, MmapFlags, -1, 0); 6868d75effSDimitry Andric if (P == MAP_FAILED) { 6968d75effSDimitry Andric if (!(Flags & MAP_ALLOWNOMEM) || errno != ENOMEM) 7068d75effSDimitry Andric dieOnMapUnmapError(errno == ENOMEM); 7168d75effSDimitry Andric return nullptr; 7268d75effSDimitry Andric } 7368d75effSDimitry Andric #if SCUDO_ANDROID 7468d75effSDimitry Andric if (!(Flags & MAP_NOACCESS)) 7568d75effSDimitry Andric prctl(ANDROID_PR_SET_VMA, ANDROID_PR_SET_VMA_ANON_NAME, P, Size, Name); 7668d75effSDimitry Andric #endif 7768d75effSDimitry Andric return P; 7868d75effSDimitry Andric } 7968d75effSDimitry Andric 8068d75effSDimitry Andric void unmap(void *Addr, uptr Size, UNUSED uptr Flags, 8168d75effSDimitry Andric UNUSED MapPlatformData *Data) { 8268d75effSDimitry Andric if (munmap(Addr, Size) != 0) 8368d75effSDimitry Andric dieOnMapUnmapError(); 8468d75effSDimitry Andric } 8568d75effSDimitry Andric 8668d75effSDimitry Andric void releasePagesToOS(uptr BaseAddress, uptr Offset, uptr Size, 8768d75effSDimitry Andric UNUSED MapPlatformData *Data) { 8868d75effSDimitry Andric void *Addr = reinterpret_cast<void *>(BaseAddress + Offset); 8968d75effSDimitry Andric while (madvise(Addr, Size, MADV_DONTNEED) == -1 && errno == EAGAIN) { 9068d75effSDimitry Andric } 9168d75effSDimitry Andric } 9268d75effSDimitry Andric 9368d75effSDimitry Andric // Calling getenv should be fine (c)(tm) at any time. 9468d75effSDimitry Andric const char *getEnv(const char *Name) { return getenv(Name); } 9568d75effSDimitry Andric 9668d75effSDimitry Andric namespace { 9768d75effSDimitry Andric enum State : u32 { Unlocked = 0, Locked = 1, Sleeping = 2 }; 9868d75effSDimitry Andric } 9968d75effSDimitry Andric 10068d75effSDimitry Andric bool HybridMutex::tryLock() { 10168d75effSDimitry Andric return atomic_compare_exchange(&M, Unlocked, Locked) == Unlocked; 10268d75effSDimitry Andric } 10368d75effSDimitry Andric 10468d75effSDimitry Andric // The following is based on https://akkadia.org/drepper/futex.pdf. 10568d75effSDimitry Andric void HybridMutex::lockSlow() { 10668d75effSDimitry Andric u32 V = atomic_compare_exchange(&M, Unlocked, Locked); 10768d75effSDimitry Andric if (V == Unlocked) 10868d75effSDimitry Andric return; 10968d75effSDimitry Andric if (V != Sleeping) 11068d75effSDimitry Andric V = atomic_exchange(&M, Sleeping, memory_order_acquire); 11168d75effSDimitry Andric while (V != Unlocked) { 11268d75effSDimitry Andric syscall(SYS_futex, reinterpret_cast<uptr>(&M), FUTEX_WAIT_PRIVATE, Sleeping, 11368d75effSDimitry Andric nullptr, nullptr, 0); 11468d75effSDimitry Andric V = atomic_exchange(&M, Sleeping, memory_order_acquire); 11568d75effSDimitry Andric } 11668d75effSDimitry Andric } 11768d75effSDimitry Andric 11868d75effSDimitry Andric void HybridMutex::unlock() { 11968d75effSDimitry Andric if (atomic_fetch_sub(&M, 1U, memory_order_release) != Locked) { 12068d75effSDimitry Andric atomic_store(&M, Unlocked, memory_order_release); 12168d75effSDimitry Andric syscall(SYS_futex, reinterpret_cast<uptr>(&M), FUTEX_WAKE_PRIVATE, 1, 12268d75effSDimitry Andric nullptr, nullptr, 0); 12368d75effSDimitry Andric } 12468d75effSDimitry Andric } 12568d75effSDimitry Andric 12668d75effSDimitry Andric u64 getMonotonicTime() { 12768d75effSDimitry Andric timespec TS; 12868d75effSDimitry Andric clock_gettime(CLOCK_MONOTONIC, &TS); 12968d75effSDimitry Andric return static_cast<u64>(TS.tv_sec) * (1000ULL * 1000 * 1000) + 13068d75effSDimitry Andric static_cast<u64>(TS.tv_nsec); 13168d75effSDimitry Andric } 13268d75effSDimitry Andric 13368d75effSDimitry Andric u32 getNumberOfCPUs() { 13468d75effSDimitry Andric cpu_set_t CPUs; 135*5ffd83dbSDimitry Andric // sched_getaffinity can fail for a variety of legitimate reasons (lack of 136*5ffd83dbSDimitry Andric // CAP_SYS_NICE, syscall filtering, etc), in which case we shall return 0. 137*5ffd83dbSDimitry Andric if (sched_getaffinity(0, sizeof(cpu_set_t), &CPUs) != 0) 138*5ffd83dbSDimitry Andric return 0; 13968d75effSDimitry Andric return static_cast<u32>(CPU_COUNT(&CPUs)); 14068d75effSDimitry Andric } 14168d75effSDimitry Andric 142*5ffd83dbSDimitry Andric u32 getThreadID() { 143*5ffd83dbSDimitry Andric #if SCUDO_ANDROID 144*5ffd83dbSDimitry Andric return static_cast<u32>(gettid()); 145*5ffd83dbSDimitry Andric #else 146*5ffd83dbSDimitry Andric return static_cast<u32>(syscall(SYS_gettid)); 147*5ffd83dbSDimitry Andric #endif 148*5ffd83dbSDimitry Andric } 149*5ffd83dbSDimitry Andric 15068d75effSDimitry Andric // Blocking is possibly unused if the getrandom block is not compiled in. 15168d75effSDimitry Andric bool getRandom(void *Buffer, uptr Length, UNUSED bool Blocking) { 15268d75effSDimitry Andric if (!Buffer || !Length || Length > MaxRandomLength) 15368d75effSDimitry Andric return false; 15468d75effSDimitry Andric ssize_t ReadBytes; 15568d75effSDimitry Andric #if defined(SYS_getrandom) 15668d75effSDimitry Andric #if !defined(GRND_NONBLOCK) 15768d75effSDimitry Andric #define GRND_NONBLOCK 1 15868d75effSDimitry Andric #endif 15968d75effSDimitry Andric // Up to 256 bytes, getrandom will not be interrupted. 16068d75effSDimitry Andric ReadBytes = 16168d75effSDimitry Andric syscall(SYS_getrandom, Buffer, Length, Blocking ? 0 : GRND_NONBLOCK); 16268d75effSDimitry Andric if (ReadBytes == static_cast<ssize_t>(Length)) 16368d75effSDimitry Andric return true; 16468d75effSDimitry Andric #endif // defined(SYS_getrandom) 16568d75effSDimitry Andric // Up to 256 bytes, a read off /dev/urandom will not be interrupted. 16668d75effSDimitry Andric // Blocking is moot here, O_NONBLOCK has no effect when opening /dev/urandom. 16768d75effSDimitry Andric const int FileDesc = open("/dev/urandom", O_RDONLY); 16868d75effSDimitry Andric if (FileDesc == -1) 16968d75effSDimitry Andric return false; 17068d75effSDimitry Andric ReadBytes = read(FileDesc, Buffer, Length); 17168d75effSDimitry Andric close(FileDesc); 17268d75effSDimitry Andric return (ReadBytes == static_cast<ssize_t>(Length)); 17368d75effSDimitry Andric } 17468d75effSDimitry Andric 175*5ffd83dbSDimitry Andric // Allocation free syslog-like API. 176*5ffd83dbSDimitry Andric extern "C" WEAK int async_safe_write_log(int pri, const char *tag, 177*5ffd83dbSDimitry Andric const char *msg); 178*5ffd83dbSDimitry Andric 17968d75effSDimitry Andric void outputRaw(const char *Buffer) { 180*5ffd83dbSDimitry Andric if (&async_safe_write_log) { 181*5ffd83dbSDimitry Andric constexpr s32 AndroidLogInfo = 4; 182*5ffd83dbSDimitry Andric constexpr uptr MaxLength = 1024U; 183*5ffd83dbSDimitry Andric char LocalBuffer[MaxLength]; 184*5ffd83dbSDimitry Andric while (strlen(Buffer) > MaxLength) { 185*5ffd83dbSDimitry Andric uptr P; 186*5ffd83dbSDimitry Andric for (P = MaxLength - 1; P > 0; P--) { 187*5ffd83dbSDimitry Andric if (Buffer[P] == '\n') { 188*5ffd83dbSDimitry Andric memcpy(LocalBuffer, Buffer, P); 189*5ffd83dbSDimitry Andric LocalBuffer[P] = '\0'; 190*5ffd83dbSDimitry Andric async_safe_write_log(AndroidLogInfo, "scudo", LocalBuffer); 191*5ffd83dbSDimitry Andric Buffer = &Buffer[P + 1]; 192*5ffd83dbSDimitry Andric break; 193*5ffd83dbSDimitry Andric } 194*5ffd83dbSDimitry Andric } 195*5ffd83dbSDimitry Andric // If no newline was found, just log the buffer. 196*5ffd83dbSDimitry Andric if (P == 0) 197*5ffd83dbSDimitry Andric break; 198*5ffd83dbSDimitry Andric } 199*5ffd83dbSDimitry Andric async_safe_write_log(AndroidLogInfo, "scudo", Buffer); 200*5ffd83dbSDimitry Andric } else { 20168d75effSDimitry Andric write(2, Buffer, strlen(Buffer)); 20268d75effSDimitry Andric } 203*5ffd83dbSDimitry Andric } 20468d75effSDimitry Andric 20568d75effSDimitry Andric extern "C" WEAK void android_set_abort_message(const char *); 20668d75effSDimitry Andric 20768d75effSDimitry Andric void setAbortMessage(const char *Message) { 20868d75effSDimitry Andric if (&android_set_abort_message) 20968d75effSDimitry Andric android_set_abort_message(Message); 21068d75effSDimitry Andric } 21168d75effSDimitry Andric 21268d75effSDimitry Andric } // namespace scudo 21368d75effSDimitry Andric 21468d75effSDimitry Andric #endif // SCUDO_LINUX 215