xref: /freebsd-src/contrib/llvm-project/compiler-rt/lib/scudo/standalone/linux.cpp (revision bdd1243df58e60e85101c09001d9812a789b6bc4)
168d75effSDimitry Andric //===-- linux.cpp -----------------------------------------------*- C++ -*-===//
268d75effSDimitry Andric //
368d75effSDimitry Andric // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
468d75effSDimitry Andric // See https://llvm.org/LICENSE.txt for license information.
568d75effSDimitry Andric // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
668d75effSDimitry Andric //
768d75effSDimitry Andric //===----------------------------------------------------------------------===//
868d75effSDimitry Andric 
968d75effSDimitry Andric #include "platform.h"
1068d75effSDimitry Andric 
1168d75effSDimitry Andric #if SCUDO_LINUX
1268d75effSDimitry Andric 
1368d75effSDimitry Andric #include "common.h"
1468d75effSDimitry Andric #include "linux.h"
1568d75effSDimitry Andric #include "mutex.h"
1668d75effSDimitry Andric #include "string_utils.h"
1768d75effSDimitry Andric 
1868d75effSDimitry Andric #include <errno.h>
1968d75effSDimitry Andric #include <fcntl.h>
2068d75effSDimitry Andric #include <linux/futex.h>
2168d75effSDimitry Andric #include <sched.h>
22*bdd1243dSDimitry Andric #include <stdio.h>
2368d75effSDimitry Andric #include <stdlib.h>
2468d75effSDimitry Andric #include <string.h>
2568d75effSDimitry Andric #include <sys/mman.h>
2668d75effSDimitry Andric #include <sys/stat.h>
2768d75effSDimitry Andric #include <sys/syscall.h>
2868d75effSDimitry Andric #include <sys/time.h>
2968d75effSDimitry Andric #include <time.h>
3068d75effSDimitry Andric #include <unistd.h>
3168d75effSDimitry Andric 
3268d75effSDimitry Andric #if SCUDO_ANDROID
3368d75effSDimitry Andric #include <sys/prctl.h>
3468d75effSDimitry Andric // Definitions of prctl arguments to set a vma name in Android kernels.
3568d75effSDimitry Andric #define ANDROID_PR_SET_VMA 0x53564d41
3668d75effSDimitry Andric #define ANDROID_PR_SET_VMA_ANON_NAME 0
3768d75effSDimitry Andric #endif
3868d75effSDimitry Andric 
3968d75effSDimitry Andric namespace scudo {
4068d75effSDimitry Andric 
4168d75effSDimitry Andric uptr getPageSize() { return static_cast<uptr>(sysconf(_SC_PAGESIZE)); }
4268d75effSDimitry Andric 
4368d75effSDimitry Andric void NORETURN die() { abort(); }
4468d75effSDimitry Andric 
4568d75effSDimitry Andric void *map(void *Addr, uptr Size, UNUSED const char *Name, uptr Flags,
4668d75effSDimitry Andric           UNUSED MapPlatformData *Data) {
4768d75effSDimitry Andric   int MmapFlags = MAP_PRIVATE | MAP_ANONYMOUS;
4868d75effSDimitry Andric   int MmapProt;
4968d75effSDimitry Andric   if (Flags & MAP_NOACCESS) {
5068d75effSDimitry Andric     MmapFlags |= MAP_NORESERVE;
5168d75effSDimitry Andric     MmapProt = PROT_NONE;
5268d75effSDimitry Andric   } else {
5368d75effSDimitry Andric     MmapProt = PROT_READ | PROT_WRITE;
54fe6060f1SDimitry Andric   }
55e8d8bef9SDimitry Andric #if defined(__aarch64__)
56e8d8bef9SDimitry Andric #ifndef PROT_MTE
57e8d8bef9SDimitry Andric #define PROT_MTE 0x20
58e8d8bef9SDimitry Andric #endif
595ffd83dbSDimitry Andric   if (Flags & MAP_MEMTAG)
605ffd83dbSDimitry Andric     MmapProt |= PROT_MTE;
615ffd83dbSDimitry Andric #endif
62fe6060f1SDimitry Andric   if (Addr)
6368d75effSDimitry Andric     MmapFlags |= MAP_FIXED;
6468d75effSDimitry Andric   void *P = mmap(Addr, Size, MmapProt, MmapFlags, -1, 0);
6568d75effSDimitry Andric   if (P == MAP_FAILED) {
6668d75effSDimitry Andric     if (!(Flags & MAP_ALLOWNOMEM) || errno != ENOMEM)
67fe6060f1SDimitry Andric       dieOnMapUnmapError(errno == ENOMEM ? Size : 0);
6868d75effSDimitry Andric     return nullptr;
6968d75effSDimitry Andric   }
7068d75effSDimitry Andric #if SCUDO_ANDROID
71fe6060f1SDimitry Andric   if (Name)
7268d75effSDimitry Andric     prctl(ANDROID_PR_SET_VMA, ANDROID_PR_SET_VMA_ANON_NAME, P, Size, Name);
7368d75effSDimitry Andric #endif
7468d75effSDimitry Andric   return P;
7568d75effSDimitry Andric }
7668d75effSDimitry Andric 
7768d75effSDimitry Andric void unmap(void *Addr, uptr Size, UNUSED uptr Flags,
7868d75effSDimitry Andric            UNUSED MapPlatformData *Data) {
7968d75effSDimitry Andric   if (munmap(Addr, Size) != 0)
8068d75effSDimitry Andric     dieOnMapUnmapError();
8168d75effSDimitry Andric }
8268d75effSDimitry Andric 
83fe6060f1SDimitry Andric void setMemoryPermission(uptr Addr, uptr Size, uptr Flags,
84fe6060f1SDimitry Andric                          UNUSED MapPlatformData *Data) {
85fe6060f1SDimitry Andric   int Prot = (Flags & MAP_NOACCESS) ? PROT_NONE : (PROT_READ | PROT_WRITE);
86fe6060f1SDimitry Andric   if (mprotect(reinterpret_cast<void *>(Addr), Size, Prot) != 0)
87fe6060f1SDimitry Andric     dieOnMapUnmapError();
88fe6060f1SDimitry Andric }
89fe6060f1SDimitry Andric 
9068d75effSDimitry Andric void releasePagesToOS(uptr BaseAddress, uptr Offset, uptr Size,
9168d75effSDimitry Andric                       UNUSED MapPlatformData *Data) {
9268d75effSDimitry Andric   void *Addr = reinterpret_cast<void *>(BaseAddress + Offset);
93fe6060f1SDimitry Andric 
9468d75effSDimitry Andric   while (madvise(Addr, Size, MADV_DONTNEED) == -1 && errno == EAGAIN) {
9568d75effSDimitry Andric   }
9668d75effSDimitry Andric }
9768d75effSDimitry Andric 
9868d75effSDimitry Andric // Calling getenv should be fine (c)(tm) at any time.
9968d75effSDimitry Andric const char *getEnv(const char *Name) { return getenv(Name); }
10068d75effSDimitry Andric 
10168d75effSDimitry Andric namespace {
10268d75effSDimitry Andric enum State : u32 { Unlocked = 0, Locked = 1, Sleeping = 2 };
10368d75effSDimitry Andric }
10468d75effSDimitry Andric 
10568d75effSDimitry Andric bool HybridMutex::tryLock() {
10668d75effSDimitry Andric   return atomic_compare_exchange(&M, Unlocked, Locked) == Unlocked;
10768d75effSDimitry Andric }
10868d75effSDimitry Andric 
10968d75effSDimitry Andric // The following is based on https://akkadia.org/drepper/futex.pdf.
11068d75effSDimitry Andric void HybridMutex::lockSlow() {
11168d75effSDimitry Andric   u32 V = atomic_compare_exchange(&M, Unlocked, Locked);
11268d75effSDimitry Andric   if (V == Unlocked)
11368d75effSDimitry Andric     return;
11468d75effSDimitry Andric   if (V != Sleeping)
11568d75effSDimitry Andric     V = atomic_exchange(&M, Sleeping, memory_order_acquire);
11668d75effSDimitry Andric   while (V != Unlocked) {
11768d75effSDimitry Andric     syscall(SYS_futex, reinterpret_cast<uptr>(&M), FUTEX_WAIT_PRIVATE, Sleeping,
11868d75effSDimitry Andric             nullptr, nullptr, 0);
11968d75effSDimitry Andric     V = atomic_exchange(&M, Sleeping, memory_order_acquire);
12068d75effSDimitry Andric   }
12168d75effSDimitry Andric }
12268d75effSDimitry Andric 
12368d75effSDimitry Andric void HybridMutex::unlock() {
12468d75effSDimitry Andric   if (atomic_fetch_sub(&M, 1U, memory_order_release) != Locked) {
12568d75effSDimitry Andric     atomic_store(&M, Unlocked, memory_order_release);
12668d75effSDimitry Andric     syscall(SYS_futex, reinterpret_cast<uptr>(&M), FUTEX_WAKE_PRIVATE, 1,
12768d75effSDimitry Andric             nullptr, nullptr, 0);
12868d75effSDimitry Andric   }
12968d75effSDimitry Andric }
13068d75effSDimitry Andric 
13168d75effSDimitry Andric u64 getMonotonicTime() {
13268d75effSDimitry Andric   timespec TS;
13368d75effSDimitry Andric   clock_gettime(CLOCK_MONOTONIC, &TS);
13468d75effSDimitry Andric   return static_cast<u64>(TS.tv_sec) * (1000ULL * 1000 * 1000) +
13568d75effSDimitry Andric          static_cast<u64>(TS.tv_nsec);
13668d75effSDimitry Andric }
13768d75effSDimitry Andric 
13868d75effSDimitry Andric u32 getNumberOfCPUs() {
13968d75effSDimitry Andric   cpu_set_t CPUs;
1405ffd83dbSDimitry Andric   // sched_getaffinity can fail for a variety of legitimate reasons (lack of
1415ffd83dbSDimitry Andric   // CAP_SYS_NICE, syscall filtering, etc), in which case we shall return 0.
1425ffd83dbSDimitry Andric   if (sched_getaffinity(0, sizeof(cpu_set_t), &CPUs) != 0)
1435ffd83dbSDimitry Andric     return 0;
14468d75effSDimitry Andric   return static_cast<u32>(CPU_COUNT(&CPUs));
14568d75effSDimitry Andric }
14668d75effSDimitry Andric 
1475ffd83dbSDimitry Andric u32 getThreadID() {
1485ffd83dbSDimitry Andric #if SCUDO_ANDROID
1495ffd83dbSDimitry Andric   return static_cast<u32>(gettid());
1505ffd83dbSDimitry Andric #else
1515ffd83dbSDimitry Andric   return static_cast<u32>(syscall(SYS_gettid));
1525ffd83dbSDimitry Andric #endif
1535ffd83dbSDimitry Andric }
1545ffd83dbSDimitry Andric 
15568d75effSDimitry Andric // Blocking is possibly unused if the getrandom block is not compiled in.
15668d75effSDimitry Andric bool getRandom(void *Buffer, uptr Length, UNUSED bool Blocking) {
15768d75effSDimitry Andric   if (!Buffer || !Length || Length > MaxRandomLength)
15868d75effSDimitry Andric     return false;
15968d75effSDimitry Andric   ssize_t ReadBytes;
16068d75effSDimitry Andric #if defined(SYS_getrandom)
16168d75effSDimitry Andric #if !defined(GRND_NONBLOCK)
16268d75effSDimitry Andric #define GRND_NONBLOCK 1
16368d75effSDimitry Andric #endif
16468d75effSDimitry Andric   // Up to 256 bytes, getrandom will not be interrupted.
16568d75effSDimitry Andric   ReadBytes =
16668d75effSDimitry Andric       syscall(SYS_getrandom, Buffer, Length, Blocking ? 0 : GRND_NONBLOCK);
16768d75effSDimitry Andric   if (ReadBytes == static_cast<ssize_t>(Length))
16868d75effSDimitry Andric     return true;
16968d75effSDimitry Andric #endif // defined(SYS_getrandom)
17068d75effSDimitry Andric   // Up to 256 bytes, a read off /dev/urandom will not be interrupted.
17168d75effSDimitry Andric   // Blocking is moot here, O_NONBLOCK has no effect when opening /dev/urandom.
17268d75effSDimitry Andric   const int FileDesc = open("/dev/urandom", O_RDONLY);
17368d75effSDimitry Andric   if (FileDesc == -1)
17468d75effSDimitry Andric     return false;
17568d75effSDimitry Andric   ReadBytes = read(FileDesc, Buffer, Length);
17668d75effSDimitry Andric   close(FileDesc);
17768d75effSDimitry Andric   return (ReadBytes == static_cast<ssize_t>(Length));
17868d75effSDimitry Andric }
17968d75effSDimitry Andric 
1805ffd83dbSDimitry Andric // Allocation free syslog-like API.
1815ffd83dbSDimitry Andric extern "C" WEAK int async_safe_write_log(int pri, const char *tag,
1825ffd83dbSDimitry Andric                                          const char *msg);
1835ffd83dbSDimitry Andric 
184*bdd1243dSDimitry Andric static uptr GetRSSFromBuffer(const char *Buf) {
185*bdd1243dSDimitry Andric   // The format of the file is:
186*bdd1243dSDimitry Andric   // 1084 89 69 11 0 79 0
187*bdd1243dSDimitry Andric   // We need the second number which is RSS in pages.
188*bdd1243dSDimitry Andric   const char *Pos = Buf;
189*bdd1243dSDimitry Andric   // Skip the first number.
190*bdd1243dSDimitry Andric   while (*Pos >= '0' && *Pos <= '9')
191*bdd1243dSDimitry Andric     Pos++;
192*bdd1243dSDimitry Andric   // Skip whitespaces.
193*bdd1243dSDimitry Andric   while (!(*Pos >= '0' && *Pos <= '9') && *Pos != 0)
194*bdd1243dSDimitry Andric     Pos++;
195*bdd1243dSDimitry Andric   // Read the number.
196*bdd1243dSDimitry Andric   u64 Rss = 0;
197*bdd1243dSDimitry Andric   for (; *Pos >= '0' && *Pos <= '9'; Pos++)
198*bdd1243dSDimitry Andric     Rss = Rss * 10 + static_cast<u64>(*Pos) - '0';
199*bdd1243dSDimitry Andric   return static_cast<uptr>(Rss * getPageSizeCached());
200*bdd1243dSDimitry Andric }
201*bdd1243dSDimitry Andric 
202*bdd1243dSDimitry Andric uptr GetRSS() {
203*bdd1243dSDimitry Andric   // TODO: We currently use sanitizer_common's GetRSS which reads the
204*bdd1243dSDimitry Andric   // RSS from /proc/self/statm by default. We might want to
205*bdd1243dSDimitry Andric   // call getrusage directly, even if it's less accurate.
206*bdd1243dSDimitry Andric   auto Fd = open("/proc/self/statm", O_RDONLY);
207*bdd1243dSDimitry Andric   char Buf[64];
208*bdd1243dSDimitry Andric   s64 Len = read(Fd, Buf, sizeof(Buf) - 1);
209*bdd1243dSDimitry Andric   close(Fd);
210*bdd1243dSDimitry Andric   if (Len <= 0)
211*bdd1243dSDimitry Andric     return 0;
212*bdd1243dSDimitry Andric   Buf[Len] = 0;
213*bdd1243dSDimitry Andric 
214*bdd1243dSDimitry Andric   return GetRSSFromBuffer(Buf);
215*bdd1243dSDimitry Andric }
216*bdd1243dSDimitry Andric 
21768d75effSDimitry Andric void outputRaw(const char *Buffer) {
2185ffd83dbSDimitry Andric   if (&async_safe_write_log) {
2195ffd83dbSDimitry Andric     constexpr s32 AndroidLogInfo = 4;
2205ffd83dbSDimitry Andric     constexpr uptr MaxLength = 1024U;
2215ffd83dbSDimitry Andric     char LocalBuffer[MaxLength];
2225ffd83dbSDimitry Andric     while (strlen(Buffer) > MaxLength) {
2235ffd83dbSDimitry Andric       uptr P;
2245ffd83dbSDimitry Andric       for (P = MaxLength - 1; P > 0; P--) {
2255ffd83dbSDimitry Andric         if (Buffer[P] == '\n') {
2265ffd83dbSDimitry Andric           memcpy(LocalBuffer, Buffer, P);
2275ffd83dbSDimitry Andric           LocalBuffer[P] = '\0';
2285ffd83dbSDimitry Andric           async_safe_write_log(AndroidLogInfo, "scudo", LocalBuffer);
2295ffd83dbSDimitry Andric           Buffer = &Buffer[P + 1];
2305ffd83dbSDimitry Andric           break;
2315ffd83dbSDimitry Andric         }
2325ffd83dbSDimitry Andric       }
2335ffd83dbSDimitry Andric       // If no newline was found, just log the buffer.
2345ffd83dbSDimitry Andric       if (P == 0)
2355ffd83dbSDimitry Andric         break;
2365ffd83dbSDimitry Andric     }
2375ffd83dbSDimitry Andric     async_safe_write_log(AndroidLogInfo, "scudo", Buffer);
2385ffd83dbSDimitry Andric   } else {
239e8d8bef9SDimitry Andric     (void)write(2, Buffer, strlen(Buffer));
24068d75effSDimitry Andric   }
2415ffd83dbSDimitry Andric }
24268d75effSDimitry Andric 
24368d75effSDimitry Andric extern "C" WEAK void android_set_abort_message(const char *);
24468d75effSDimitry Andric 
24568d75effSDimitry Andric void setAbortMessage(const char *Message) {
24668d75effSDimitry Andric   if (&android_set_abort_message)
24768d75effSDimitry Andric     android_set_abort_message(Message);
24868d75effSDimitry Andric }
24968d75effSDimitry Andric 
25068d75effSDimitry Andric } // namespace scudo
25168d75effSDimitry Andric 
25268d75effSDimitry Andric #endif // SCUDO_LINUX
253