xref: /freebsd-src/contrib/llvm-project/compiler-rt/lib/scudo/standalone/linux.cpp (revision 68d75eff68281c1b445e3010bb975eae07aac225)
1*68d75effSDimitry Andric //===-- linux.cpp -----------------------------------------------*- C++ -*-===//
2*68d75effSDimitry Andric //
3*68d75effSDimitry Andric // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4*68d75effSDimitry Andric // See https://llvm.org/LICENSE.txt for license information.
5*68d75effSDimitry Andric // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6*68d75effSDimitry Andric //
7*68d75effSDimitry Andric //===----------------------------------------------------------------------===//
8*68d75effSDimitry Andric 
9*68d75effSDimitry Andric #include "platform.h"
10*68d75effSDimitry Andric 
11*68d75effSDimitry Andric #if SCUDO_LINUX
12*68d75effSDimitry Andric 
13*68d75effSDimitry Andric #include "common.h"
14*68d75effSDimitry Andric #include "linux.h"
15*68d75effSDimitry Andric #include "mutex.h"
16*68d75effSDimitry Andric #include "string_utils.h"
17*68d75effSDimitry Andric 
18*68d75effSDimitry Andric #include <errno.h>
19*68d75effSDimitry Andric #include <fcntl.h>
20*68d75effSDimitry Andric #include <linux/futex.h>
21*68d75effSDimitry Andric #include <sched.h>
22*68d75effSDimitry Andric #include <stdlib.h>
23*68d75effSDimitry Andric #include <string.h>
24*68d75effSDimitry Andric #include <sys/mman.h>
25*68d75effSDimitry Andric #include <sys/stat.h>
26*68d75effSDimitry Andric #include <sys/syscall.h>
27*68d75effSDimitry Andric #include <sys/time.h>
28*68d75effSDimitry Andric #include <time.h>
29*68d75effSDimitry Andric #include <unistd.h>
30*68d75effSDimitry Andric 
31*68d75effSDimitry Andric #if SCUDO_ANDROID
32*68d75effSDimitry Andric #include <sys/prctl.h>
33*68d75effSDimitry Andric // Definitions of prctl arguments to set a vma name in Android kernels.
34*68d75effSDimitry Andric #define ANDROID_PR_SET_VMA 0x53564d41
35*68d75effSDimitry Andric #define ANDROID_PR_SET_VMA_ANON_NAME 0
36*68d75effSDimitry Andric #endif
37*68d75effSDimitry Andric 
38*68d75effSDimitry Andric namespace scudo {
39*68d75effSDimitry Andric 
40*68d75effSDimitry Andric uptr getPageSize() { return static_cast<uptr>(sysconf(_SC_PAGESIZE)); }
41*68d75effSDimitry Andric 
42*68d75effSDimitry Andric void NORETURN die() { abort(); }
43*68d75effSDimitry Andric 
44*68d75effSDimitry Andric void *map(void *Addr, uptr Size, UNUSED const char *Name, uptr Flags,
45*68d75effSDimitry Andric           UNUSED MapPlatformData *Data) {
46*68d75effSDimitry Andric   int MmapFlags = MAP_PRIVATE | MAP_ANONYMOUS;
47*68d75effSDimitry Andric   int MmapProt;
48*68d75effSDimitry Andric   if (Flags & MAP_NOACCESS) {
49*68d75effSDimitry Andric     MmapFlags |= MAP_NORESERVE;
50*68d75effSDimitry Andric     MmapProt = PROT_NONE;
51*68d75effSDimitry Andric   } else {
52*68d75effSDimitry Andric     MmapProt = PROT_READ | PROT_WRITE;
53*68d75effSDimitry Andric   }
54*68d75effSDimitry Andric   if (Addr) {
55*68d75effSDimitry Andric     // Currently no scenario for a noaccess mapping with a fixed address.
56*68d75effSDimitry Andric     DCHECK_EQ(Flags & MAP_NOACCESS, 0);
57*68d75effSDimitry Andric     MmapFlags |= MAP_FIXED;
58*68d75effSDimitry Andric   }
59*68d75effSDimitry Andric   void *P = mmap(Addr, Size, MmapProt, MmapFlags, -1, 0);
60*68d75effSDimitry Andric   if (P == MAP_FAILED) {
61*68d75effSDimitry Andric     if (!(Flags & MAP_ALLOWNOMEM) || errno != ENOMEM)
62*68d75effSDimitry Andric       dieOnMapUnmapError(errno == ENOMEM);
63*68d75effSDimitry Andric     return nullptr;
64*68d75effSDimitry Andric   }
65*68d75effSDimitry Andric #if SCUDO_ANDROID
66*68d75effSDimitry Andric   if (!(Flags & MAP_NOACCESS))
67*68d75effSDimitry Andric     prctl(ANDROID_PR_SET_VMA, ANDROID_PR_SET_VMA_ANON_NAME, P, Size, Name);
68*68d75effSDimitry Andric #endif
69*68d75effSDimitry Andric   return P;
70*68d75effSDimitry Andric }
71*68d75effSDimitry Andric 
72*68d75effSDimitry Andric void unmap(void *Addr, uptr Size, UNUSED uptr Flags,
73*68d75effSDimitry Andric            UNUSED MapPlatformData *Data) {
74*68d75effSDimitry Andric   if (munmap(Addr, Size) != 0)
75*68d75effSDimitry Andric     dieOnMapUnmapError();
76*68d75effSDimitry Andric }
77*68d75effSDimitry Andric 
78*68d75effSDimitry Andric void releasePagesToOS(uptr BaseAddress, uptr Offset, uptr Size,
79*68d75effSDimitry Andric                       UNUSED MapPlatformData *Data) {
80*68d75effSDimitry Andric   void *Addr = reinterpret_cast<void *>(BaseAddress + Offset);
81*68d75effSDimitry Andric   while (madvise(Addr, Size, MADV_DONTNEED) == -1 && errno == EAGAIN) {
82*68d75effSDimitry Andric   }
83*68d75effSDimitry Andric }
84*68d75effSDimitry Andric 
85*68d75effSDimitry Andric // Calling getenv should be fine (c)(tm) at any time.
86*68d75effSDimitry Andric const char *getEnv(const char *Name) { return getenv(Name); }
87*68d75effSDimitry Andric 
88*68d75effSDimitry Andric namespace {
89*68d75effSDimitry Andric enum State : u32 { Unlocked = 0, Locked = 1, Sleeping = 2 };
90*68d75effSDimitry Andric }
91*68d75effSDimitry Andric 
92*68d75effSDimitry Andric bool HybridMutex::tryLock() {
93*68d75effSDimitry Andric   return atomic_compare_exchange(&M, Unlocked, Locked) == Unlocked;
94*68d75effSDimitry Andric }
95*68d75effSDimitry Andric 
96*68d75effSDimitry Andric // The following is based on https://akkadia.org/drepper/futex.pdf.
97*68d75effSDimitry Andric void HybridMutex::lockSlow() {
98*68d75effSDimitry Andric   u32 V = atomic_compare_exchange(&M, Unlocked, Locked);
99*68d75effSDimitry Andric   if (V == Unlocked)
100*68d75effSDimitry Andric     return;
101*68d75effSDimitry Andric   if (V != Sleeping)
102*68d75effSDimitry Andric     V = atomic_exchange(&M, Sleeping, memory_order_acquire);
103*68d75effSDimitry Andric   while (V != Unlocked) {
104*68d75effSDimitry Andric     syscall(SYS_futex, reinterpret_cast<uptr>(&M), FUTEX_WAIT_PRIVATE, Sleeping,
105*68d75effSDimitry Andric             nullptr, nullptr, 0);
106*68d75effSDimitry Andric     V = atomic_exchange(&M, Sleeping, memory_order_acquire);
107*68d75effSDimitry Andric   }
108*68d75effSDimitry Andric }
109*68d75effSDimitry Andric 
110*68d75effSDimitry Andric void HybridMutex::unlock() {
111*68d75effSDimitry Andric   if (atomic_fetch_sub(&M, 1U, memory_order_release) != Locked) {
112*68d75effSDimitry Andric     atomic_store(&M, Unlocked, memory_order_release);
113*68d75effSDimitry Andric     syscall(SYS_futex, reinterpret_cast<uptr>(&M), FUTEX_WAKE_PRIVATE, 1,
114*68d75effSDimitry Andric             nullptr, nullptr, 0);
115*68d75effSDimitry Andric   }
116*68d75effSDimitry Andric }
117*68d75effSDimitry Andric 
118*68d75effSDimitry Andric u64 getMonotonicTime() {
119*68d75effSDimitry Andric   timespec TS;
120*68d75effSDimitry Andric   clock_gettime(CLOCK_MONOTONIC, &TS);
121*68d75effSDimitry Andric   return static_cast<u64>(TS.tv_sec) * (1000ULL * 1000 * 1000) +
122*68d75effSDimitry Andric          static_cast<u64>(TS.tv_nsec);
123*68d75effSDimitry Andric }
124*68d75effSDimitry Andric 
125*68d75effSDimitry Andric u32 getNumberOfCPUs() {
126*68d75effSDimitry Andric   cpu_set_t CPUs;
127*68d75effSDimitry Andric   CHECK_EQ(sched_getaffinity(0, sizeof(cpu_set_t), &CPUs), 0);
128*68d75effSDimitry Andric   return static_cast<u32>(CPU_COUNT(&CPUs));
129*68d75effSDimitry Andric }
130*68d75effSDimitry Andric 
131*68d75effSDimitry Andric // Blocking is possibly unused if the getrandom block is not compiled in.
132*68d75effSDimitry Andric bool getRandom(void *Buffer, uptr Length, UNUSED bool Blocking) {
133*68d75effSDimitry Andric   if (!Buffer || !Length || Length > MaxRandomLength)
134*68d75effSDimitry Andric     return false;
135*68d75effSDimitry Andric   ssize_t ReadBytes;
136*68d75effSDimitry Andric #if defined(SYS_getrandom)
137*68d75effSDimitry Andric #if !defined(GRND_NONBLOCK)
138*68d75effSDimitry Andric #define GRND_NONBLOCK 1
139*68d75effSDimitry Andric #endif
140*68d75effSDimitry Andric   // Up to 256 bytes, getrandom will not be interrupted.
141*68d75effSDimitry Andric   ReadBytes =
142*68d75effSDimitry Andric       syscall(SYS_getrandom, Buffer, Length, Blocking ? 0 : GRND_NONBLOCK);
143*68d75effSDimitry Andric   if (ReadBytes == static_cast<ssize_t>(Length))
144*68d75effSDimitry Andric     return true;
145*68d75effSDimitry Andric #endif // defined(SYS_getrandom)
146*68d75effSDimitry Andric   // Up to 256 bytes, a read off /dev/urandom will not be interrupted.
147*68d75effSDimitry Andric   // Blocking is moot here, O_NONBLOCK has no effect when opening /dev/urandom.
148*68d75effSDimitry Andric   const int FileDesc = open("/dev/urandom", O_RDONLY);
149*68d75effSDimitry Andric   if (FileDesc == -1)
150*68d75effSDimitry Andric     return false;
151*68d75effSDimitry Andric   ReadBytes = read(FileDesc, Buffer, Length);
152*68d75effSDimitry Andric   close(FileDesc);
153*68d75effSDimitry Andric   return (ReadBytes == static_cast<ssize_t>(Length));
154*68d75effSDimitry Andric }
155*68d75effSDimitry Andric 
156*68d75effSDimitry Andric void outputRaw(const char *Buffer) {
157*68d75effSDimitry Andric   static HybridMutex Mutex;
158*68d75effSDimitry Andric   ScopedLock L(Mutex);
159*68d75effSDimitry Andric   write(2, Buffer, strlen(Buffer));
160*68d75effSDimitry Andric }
161*68d75effSDimitry Andric 
162*68d75effSDimitry Andric extern "C" WEAK void android_set_abort_message(const char *);
163*68d75effSDimitry Andric 
164*68d75effSDimitry Andric void setAbortMessage(const char *Message) {
165*68d75effSDimitry Andric   if (&android_set_abort_message)
166*68d75effSDimitry Andric     android_set_abort_message(Message);
167*68d75effSDimitry Andric }
168*68d75effSDimitry Andric 
169*68d75effSDimitry Andric } // namespace scudo
170*68d75effSDimitry Andric 
171*68d75effSDimitry Andric #endif // SCUDO_LINUX
172