168d75effSDimitry Andric //===-- linux.cpp -----------------------------------------------*- C++ -*-===// 268d75effSDimitry Andric // 368d75effSDimitry Andric // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 468d75effSDimitry Andric // See https://llvm.org/LICENSE.txt for license information. 568d75effSDimitry Andric // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 668d75effSDimitry Andric // 768d75effSDimitry Andric //===----------------------------------------------------------------------===// 868d75effSDimitry Andric 968d75effSDimitry Andric #include "platform.h" 1068d75effSDimitry Andric 1168d75effSDimitry Andric #if SCUDO_LINUX 1268d75effSDimitry Andric 1368d75effSDimitry Andric #include "common.h" 1468d75effSDimitry Andric #include "linux.h" 1568d75effSDimitry Andric #include "mutex.h" 1668d75effSDimitry Andric #include "string_utils.h" 1768d75effSDimitry Andric 1868d75effSDimitry Andric #include <errno.h> 1968d75effSDimitry Andric #include <fcntl.h> 2068d75effSDimitry Andric #include <linux/futex.h> 2168d75effSDimitry Andric #include <sched.h> 22*bdd1243dSDimitry Andric #include <stdio.h> 2368d75effSDimitry Andric #include <stdlib.h> 2468d75effSDimitry Andric #include <string.h> 2568d75effSDimitry Andric #include <sys/mman.h> 2668d75effSDimitry Andric #include <sys/stat.h> 2768d75effSDimitry Andric #include <sys/syscall.h> 2868d75effSDimitry Andric #include <sys/time.h> 2968d75effSDimitry Andric #include <time.h> 3068d75effSDimitry Andric #include <unistd.h> 3168d75effSDimitry Andric 3268d75effSDimitry Andric #if SCUDO_ANDROID 3368d75effSDimitry Andric #include <sys/prctl.h> 3468d75effSDimitry Andric // Definitions of prctl arguments to set a vma name in Android kernels. 3568d75effSDimitry Andric #define ANDROID_PR_SET_VMA 0x53564d41 3668d75effSDimitry Andric #define ANDROID_PR_SET_VMA_ANON_NAME 0 3768d75effSDimitry Andric #endif 3868d75effSDimitry Andric 3968d75effSDimitry Andric namespace scudo { 4068d75effSDimitry Andric 4168d75effSDimitry Andric uptr getPageSize() { return static_cast<uptr>(sysconf(_SC_PAGESIZE)); } 4268d75effSDimitry Andric 4368d75effSDimitry Andric void NORETURN die() { abort(); } 4468d75effSDimitry Andric 4568d75effSDimitry Andric void *map(void *Addr, uptr Size, UNUSED const char *Name, uptr Flags, 4668d75effSDimitry Andric UNUSED MapPlatformData *Data) { 4768d75effSDimitry Andric int MmapFlags = MAP_PRIVATE | MAP_ANONYMOUS; 4868d75effSDimitry Andric int MmapProt; 4968d75effSDimitry Andric if (Flags & MAP_NOACCESS) { 5068d75effSDimitry Andric MmapFlags |= MAP_NORESERVE; 5168d75effSDimitry Andric MmapProt = PROT_NONE; 5268d75effSDimitry Andric } else { 5368d75effSDimitry Andric MmapProt = PROT_READ | PROT_WRITE; 54fe6060f1SDimitry Andric } 55e8d8bef9SDimitry Andric #if defined(__aarch64__) 56e8d8bef9SDimitry Andric #ifndef PROT_MTE 57e8d8bef9SDimitry Andric #define PROT_MTE 0x20 58e8d8bef9SDimitry Andric #endif 595ffd83dbSDimitry Andric if (Flags & MAP_MEMTAG) 605ffd83dbSDimitry Andric MmapProt |= PROT_MTE; 615ffd83dbSDimitry Andric #endif 62fe6060f1SDimitry Andric if (Addr) 6368d75effSDimitry Andric MmapFlags |= MAP_FIXED; 6468d75effSDimitry Andric void *P = mmap(Addr, Size, MmapProt, MmapFlags, -1, 0); 6568d75effSDimitry Andric if (P == MAP_FAILED) { 6668d75effSDimitry Andric if (!(Flags & MAP_ALLOWNOMEM) || errno != ENOMEM) 67fe6060f1SDimitry Andric dieOnMapUnmapError(errno == ENOMEM ? Size : 0); 6868d75effSDimitry Andric return nullptr; 6968d75effSDimitry Andric } 7068d75effSDimitry Andric #if SCUDO_ANDROID 71fe6060f1SDimitry Andric if (Name) 7268d75effSDimitry Andric prctl(ANDROID_PR_SET_VMA, ANDROID_PR_SET_VMA_ANON_NAME, P, Size, Name); 7368d75effSDimitry Andric #endif 7468d75effSDimitry Andric return P; 7568d75effSDimitry Andric } 7668d75effSDimitry Andric 7768d75effSDimitry Andric void unmap(void *Addr, uptr Size, UNUSED uptr Flags, 7868d75effSDimitry Andric UNUSED MapPlatformData *Data) { 7968d75effSDimitry Andric if (munmap(Addr, Size) != 0) 8068d75effSDimitry Andric dieOnMapUnmapError(); 8168d75effSDimitry Andric } 8268d75effSDimitry Andric 83fe6060f1SDimitry Andric void setMemoryPermission(uptr Addr, uptr Size, uptr Flags, 84fe6060f1SDimitry Andric UNUSED MapPlatformData *Data) { 85fe6060f1SDimitry Andric int Prot = (Flags & MAP_NOACCESS) ? PROT_NONE : (PROT_READ | PROT_WRITE); 86fe6060f1SDimitry Andric if (mprotect(reinterpret_cast<void *>(Addr), Size, Prot) != 0) 87fe6060f1SDimitry Andric dieOnMapUnmapError(); 88fe6060f1SDimitry Andric } 89fe6060f1SDimitry Andric 9068d75effSDimitry Andric void releasePagesToOS(uptr BaseAddress, uptr Offset, uptr Size, 9168d75effSDimitry Andric UNUSED MapPlatformData *Data) { 9268d75effSDimitry Andric void *Addr = reinterpret_cast<void *>(BaseAddress + Offset); 93fe6060f1SDimitry Andric 9468d75effSDimitry Andric while (madvise(Addr, Size, MADV_DONTNEED) == -1 && errno == EAGAIN) { 9568d75effSDimitry Andric } 9668d75effSDimitry Andric } 9768d75effSDimitry Andric 9868d75effSDimitry Andric // Calling getenv should be fine (c)(tm) at any time. 9968d75effSDimitry Andric const char *getEnv(const char *Name) { return getenv(Name); } 10068d75effSDimitry Andric 10168d75effSDimitry Andric namespace { 10268d75effSDimitry Andric enum State : u32 { Unlocked = 0, Locked = 1, Sleeping = 2 }; 10368d75effSDimitry Andric } 10468d75effSDimitry Andric 10568d75effSDimitry Andric bool HybridMutex::tryLock() { 10668d75effSDimitry Andric return atomic_compare_exchange(&M, Unlocked, Locked) == Unlocked; 10768d75effSDimitry Andric } 10868d75effSDimitry Andric 10968d75effSDimitry Andric // The following is based on https://akkadia.org/drepper/futex.pdf. 11068d75effSDimitry Andric void HybridMutex::lockSlow() { 11168d75effSDimitry Andric u32 V = atomic_compare_exchange(&M, Unlocked, Locked); 11268d75effSDimitry Andric if (V == Unlocked) 11368d75effSDimitry Andric return; 11468d75effSDimitry Andric if (V != Sleeping) 11568d75effSDimitry Andric V = atomic_exchange(&M, Sleeping, memory_order_acquire); 11668d75effSDimitry Andric while (V != Unlocked) { 11768d75effSDimitry Andric syscall(SYS_futex, reinterpret_cast<uptr>(&M), FUTEX_WAIT_PRIVATE, Sleeping, 11868d75effSDimitry Andric nullptr, nullptr, 0); 11968d75effSDimitry Andric V = atomic_exchange(&M, Sleeping, memory_order_acquire); 12068d75effSDimitry Andric } 12168d75effSDimitry Andric } 12268d75effSDimitry Andric 12368d75effSDimitry Andric void HybridMutex::unlock() { 12468d75effSDimitry Andric if (atomic_fetch_sub(&M, 1U, memory_order_release) != Locked) { 12568d75effSDimitry Andric atomic_store(&M, Unlocked, memory_order_release); 12668d75effSDimitry Andric syscall(SYS_futex, reinterpret_cast<uptr>(&M), FUTEX_WAKE_PRIVATE, 1, 12768d75effSDimitry Andric nullptr, nullptr, 0); 12868d75effSDimitry Andric } 12968d75effSDimitry Andric } 13068d75effSDimitry Andric 13168d75effSDimitry Andric u64 getMonotonicTime() { 13268d75effSDimitry Andric timespec TS; 13368d75effSDimitry Andric clock_gettime(CLOCK_MONOTONIC, &TS); 13468d75effSDimitry Andric return static_cast<u64>(TS.tv_sec) * (1000ULL * 1000 * 1000) + 13568d75effSDimitry Andric static_cast<u64>(TS.tv_nsec); 13668d75effSDimitry Andric } 13768d75effSDimitry Andric 13868d75effSDimitry Andric u32 getNumberOfCPUs() { 13968d75effSDimitry Andric cpu_set_t CPUs; 1405ffd83dbSDimitry Andric // sched_getaffinity can fail for a variety of legitimate reasons (lack of 1415ffd83dbSDimitry Andric // CAP_SYS_NICE, syscall filtering, etc), in which case we shall return 0. 1425ffd83dbSDimitry Andric if (sched_getaffinity(0, sizeof(cpu_set_t), &CPUs) != 0) 1435ffd83dbSDimitry Andric return 0; 14468d75effSDimitry Andric return static_cast<u32>(CPU_COUNT(&CPUs)); 14568d75effSDimitry Andric } 14668d75effSDimitry Andric 1475ffd83dbSDimitry Andric u32 getThreadID() { 1485ffd83dbSDimitry Andric #if SCUDO_ANDROID 1495ffd83dbSDimitry Andric return static_cast<u32>(gettid()); 1505ffd83dbSDimitry Andric #else 1515ffd83dbSDimitry Andric return static_cast<u32>(syscall(SYS_gettid)); 1525ffd83dbSDimitry Andric #endif 1535ffd83dbSDimitry Andric } 1545ffd83dbSDimitry Andric 15568d75effSDimitry Andric // Blocking is possibly unused if the getrandom block is not compiled in. 15668d75effSDimitry Andric bool getRandom(void *Buffer, uptr Length, UNUSED bool Blocking) { 15768d75effSDimitry Andric if (!Buffer || !Length || Length > MaxRandomLength) 15868d75effSDimitry Andric return false; 15968d75effSDimitry Andric ssize_t ReadBytes; 16068d75effSDimitry Andric #if defined(SYS_getrandom) 16168d75effSDimitry Andric #if !defined(GRND_NONBLOCK) 16268d75effSDimitry Andric #define GRND_NONBLOCK 1 16368d75effSDimitry Andric #endif 16468d75effSDimitry Andric // Up to 256 bytes, getrandom will not be interrupted. 16568d75effSDimitry Andric ReadBytes = 16668d75effSDimitry Andric syscall(SYS_getrandom, Buffer, Length, Blocking ? 0 : GRND_NONBLOCK); 16768d75effSDimitry Andric if (ReadBytes == static_cast<ssize_t>(Length)) 16868d75effSDimitry Andric return true; 16968d75effSDimitry Andric #endif // defined(SYS_getrandom) 17068d75effSDimitry Andric // Up to 256 bytes, a read off /dev/urandom will not be interrupted. 17168d75effSDimitry Andric // Blocking is moot here, O_NONBLOCK has no effect when opening /dev/urandom. 17268d75effSDimitry Andric const int FileDesc = open("/dev/urandom", O_RDONLY); 17368d75effSDimitry Andric if (FileDesc == -1) 17468d75effSDimitry Andric return false; 17568d75effSDimitry Andric ReadBytes = read(FileDesc, Buffer, Length); 17668d75effSDimitry Andric close(FileDesc); 17768d75effSDimitry Andric return (ReadBytes == static_cast<ssize_t>(Length)); 17868d75effSDimitry Andric } 17968d75effSDimitry Andric 1805ffd83dbSDimitry Andric // Allocation free syslog-like API. 1815ffd83dbSDimitry Andric extern "C" WEAK int async_safe_write_log(int pri, const char *tag, 1825ffd83dbSDimitry Andric const char *msg); 1835ffd83dbSDimitry Andric 184*bdd1243dSDimitry Andric static uptr GetRSSFromBuffer(const char *Buf) { 185*bdd1243dSDimitry Andric // The format of the file is: 186*bdd1243dSDimitry Andric // 1084 89 69 11 0 79 0 187*bdd1243dSDimitry Andric // We need the second number which is RSS in pages. 188*bdd1243dSDimitry Andric const char *Pos = Buf; 189*bdd1243dSDimitry Andric // Skip the first number. 190*bdd1243dSDimitry Andric while (*Pos >= '0' && *Pos <= '9') 191*bdd1243dSDimitry Andric Pos++; 192*bdd1243dSDimitry Andric // Skip whitespaces. 193*bdd1243dSDimitry Andric while (!(*Pos >= '0' && *Pos <= '9') && *Pos != 0) 194*bdd1243dSDimitry Andric Pos++; 195*bdd1243dSDimitry Andric // Read the number. 196*bdd1243dSDimitry Andric u64 Rss = 0; 197*bdd1243dSDimitry Andric for (; *Pos >= '0' && *Pos <= '9'; Pos++) 198*bdd1243dSDimitry Andric Rss = Rss * 10 + static_cast<u64>(*Pos) - '0'; 199*bdd1243dSDimitry Andric return static_cast<uptr>(Rss * getPageSizeCached()); 200*bdd1243dSDimitry Andric } 201*bdd1243dSDimitry Andric 202*bdd1243dSDimitry Andric uptr GetRSS() { 203*bdd1243dSDimitry Andric // TODO: We currently use sanitizer_common's GetRSS which reads the 204*bdd1243dSDimitry Andric // RSS from /proc/self/statm by default. We might want to 205*bdd1243dSDimitry Andric // call getrusage directly, even if it's less accurate. 206*bdd1243dSDimitry Andric auto Fd = open("/proc/self/statm", O_RDONLY); 207*bdd1243dSDimitry Andric char Buf[64]; 208*bdd1243dSDimitry Andric s64 Len = read(Fd, Buf, sizeof(Buf) - 1); 209*bdd1243dSDimitry Andric close(Fd); 210*bdd1243dSDimitry Andric if (Len <= 0) 211*bdd1243dSDimitry Andric return 0; 212*bdd1243dSDimitry Andric Buf[Len] = 0; 213*bdd1243dSDimitry Andric 214*bdd1243dSDimitry Andric return GetRSSFromBuffer(Buf); 215*bdd1243dSDimitry Andric } 216*bdd1243dSDimitry Andric 21768d75effSDimitry Andric void outputRaw(const char *Buffer) { 2185ffd83dbSDimitry Andric if (&async_safe_write_log) { 2195ffd83dbSDimitry Andric constexpr s32 AndroidLogInfo = 4; 2205ffd83dbSDimitry Andric constexpr uptr MaxLength = 1024U; 2215ffd83dbSDimitry Andric char LocalBuffer[MaxLength]; 2225ffd83dbSDimitry Andric while (strlen(Buffer) > MaxLength) { 2235ffd83dbSDimitry Andric uptr P; 2245ffd83dbSDimitry Andric for (P = MaxLength - 1; P > 0; P--) { 2255ffd83dbSDimitry Andric if (Buffer[P] == '\n') { 2265ffd83dbSDimitry Andric memcpy(LocalBuffer, Buffer, P); 2275ffd83dbSDimitry Andric LocalBuffer[P] = '\0'; 2285ffd83dbSDimitry Andric async_safe_write_log(AndroidLogInfo, "scudo", LocalBuffer); 2295ffd83dbSDimitry Andric Buffer = &Buffer[P + 1]; 2305ffd83dbSDimitry Andric break; 2315ffd83dbSDimitry Andric } 2325ffd83dbSDimitry Andric } 2335ffd83dbSDimitry Andric // If no newline was found, just log the buffer. 2345ffd83dbSDimitry Andric if (P == 0) 2355ffd83dbSDimitry Andric break; 2365ffd83dbSDimitry Andric } 2375ffd83dbSDimitry Andric async_safe_write_log(AndroidLogInfo, "scudo", Buffer); 2385ffd83dbSDimitry Andric } else { 239e8d8bef9SDimitry Andric (void)write(2, Buffer, strlen(Buffer)); 24068d75effSDimitry Andric } 2415ffd83dbSDimitry Andric } 24268d75effSDimitry Andric 24368d75effSDimitry Andric extern "C" WEAK void android_set_abort_message(const char *); 24468d75effSDimitry Andric 24568d75effSDimitry Andric void setAbortMessage(const char *Message) { 24668d75effSDimitry Andric if (&android_set_abort_message) 24768d75effSDimitry Andric android_set_abort_message(Message); 24868d75effSDimitry Andric } 24968d75effSDimitry Andric 25068d75effSDimitry Andric } // namespace scudo 25168d75effSDimitry Andric 25268d75effSDimitry Andric #endif // SCUDO_LINUX 253