168d75effSDimitry Andric //===-- linux.cpp -----------------------------------------------*- C++ -*-===// 268d75effSDimitry Andric // 368d75effSDimitry Andric // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 468d75effSDimitry Andric // See https://llvm.org/LICENSE.txt for license information. 568d75effSDimitry Andric // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 668d75effSDimitry Andric // 768d75effSDimitry Andric //===----------------------------------------------------------------------===// 868d75effSDimitry Andric 968d75effSDimitry Andric #include "platform.h" 1068d75effSDimitry Andric 1168d75effSDimitry Andric #if SCUDO_LINUX 1268d75effSDimitry Andric 1368d75effSDimitry Andric #include "common.h" 1468d75effSDimitry Andric #include "linux.h" 1568d75effSDimitry Andric #include "mutex.h" 1668d75effSDimitry Andric #include "string_utils.h" 1768d75effSDimitry Andric 1868d75effSDimitry Andric #include <errno.h> 1968d75effSDimitry Andric #include <fcntl.h> 2068d75effSDimitry Andric #include <linux/futex.h> 2168d75effSDimitry Andric #include <sched.h> 2268d75effSDimitry Andric #include <stdlib.h> 2368d75effSDimitry Andric #include <string.h> 2468d75effSDimitry Andric #include <sys/mman.h> 2568d75effSDimitry Andric #include <sys/stat.h> 2668d75effSDimitry Andric #include <sys/syscall.h> 2768d75effSDimitry Andric #include <sys/time.h> 2868d75effSDimitry Andric #include <time.h> 2968d75effSDimitry Andric #include <unistd.h> 3068d75effSDimitry Andric 3168d75effSDimitry Andric #if SCUDO_ANDROID 3268d75effSDimitry Andric #include <sys/prctl.h> 3368d75effSDimitry Andric // Definitions of prctl arguments to set a vma name in Android kernels. 3468d75effSDimitry Andric #define ANDROID_PR_SET_VMA 0x53564d41 3568d75effSDimitry Andric #define ANDROID_PR_SET_VMA_ANON_NAME 0 3668d75effSDimitry Andric #endif 3768d75effSDimitry Andric 3868d75effSDimitry Andric namespace scudo { 3968d75effSDimitry Andric 4068d75effSDimitry Andric uptr getPageSize() { return static_cast<uptr>(sysconf(_SC_PAGESIZE)); } 4168d75effSDimitry Andric 4268d75effSDimitry Andric void NORETURN die() { abort(); } 4368d75effSDimitry Andric 4468d75effSDimitry Andric void *map(void *Addr, uptr Size, UNUSED const char *Name, uptr Flags, 4568d75effSDimitry Andric UNUSED MapPlatformData *Data) { 4668d75effSDimitry Andric int MmapFlags = MAP_PRIVATE | MAP_ANONYMOUS; 4768d75effSDimitry Andric int MmapProt; 4868d75effSDimitry Andric if (Flags & MAP_NOACCESS) { 4968d75effSDimitry Andric MmapFlags |= MAP_NORESERVE; 5068d75effSDimitry Andric MmapProt = PROT_NONE; 5168d75effSDimitry Andric } else { 5268d75effSDimitry Andric MmapProt = PROT_READ | PROT_WRITE; 53*e8d8bef9SDimitry Andric #if defined(__aarch64__) 54*e8d8bef9SDimitry Andric #ifndef PROT_MTE 55*e8d8bef9SDimitry Andric #define PROT_MTE 0x20 56*e8d8bef9SDimitry Andric #endif 575ffd83dbSDimitry Andric if (Flags & MAP_MEMTAG) 585ffd83dbSDimitry Andric MmapProt |= PROT_MTE; 595ffd83dbSDimitry Andric #endif 6068d75effSDimitry Andric } 6168d75effSDimitry Andric if (Addr) { 6268d75effSDimitry Andric // Currently no scenario for a noaccess mapping with a fixed address. 6368d75effSDimitry Andric DCHECK_EQ(Flags & MAP_NOACCESS, 0); 6468d75effSDimitry Andric MmapFlags |= MAP_FIXED; 6568d75effSDimitry Andric } 6668d75effSDimitry Andric void *P = mmap(Addr, Size, MmapProt, MmapFlags, -1, 0); 6768d75effSDimitry Andric if (P == MAP_FAILED) { 6868d75effSDimitry Andric if (!(Flags & MAP_ALLOWNOMEM) || errno != ENOMEM) 6968d75effSDimitry Andric dieOnMapUnmapError(errno == ENOMEM); 7068d75effSDimitry Andric return nullptr; 7168d75effSDimitry Andric } 7268d75effSDimitry Andric #if SCUDO_ANDROID 7368d75effSDimitry Andric if (!(Flags & MAP_NOACCESS)) 7468d75effSDimitry Andric prctl(ANDROID_PR_SET_VMA, ANDROID_PR_SET_VMA_ANON_NAME, P, Size, Name); 7568d75effSDimitry Andric #endif 7668d75effSDimitry Andric return P; 7768d75effSDimitry Andric } 7868d75effSDimitry Andric 7968d75effSDimitry Andric void unmap(void *Addr, uptr Size, UNUSED uptr Flags, 8068d75effSDimitry Andric UNUSED MapPlatformData *Data) { 8168d75effSDimitry Andric if (munmap(Addr, Size) != 0) 8268d75effSDimitry Andric dieOnMapUnmapError(); 8368d75effSDimitry Andric } 8468d75effSDimitry Andric 8568d75effSDimitry Andric void releasePagesToOS(uptr BaseAddress, uptr Offset, uptr Size, 8668d75effSDimitry Andric UNUSED MapPlatformData *Data) { 8768d75effSDimitry Andric void *Addr = reinterpret_cast<void *>(BaseAddress + Offset); 8868d75effSDimitry Andric while (madvise(Addr, Size, MADV_DONTNEED) == -1 && errno == EAGAIN) { 8968d75effSDimitry Andric } 9068d75effSDimitry Andric } 9168d75effSDimitry Andric 9268d75effSDimitry Andric // Calling getenv should be fine (c)(tm) at any time. 9368d75effSDimitry Andric const char *getEnv(const char *Name) { return getenv(Name); } 9468d75effSDimitry Andric 9568d75effSDimitry Andric namespace { 9668d75effSDimitry Andric enum State : u32 { Unlocked = 0, Locked = 1, Sleeping = 2 }; 9768d75effSDimitry Andric } 9868d75effSDimitry Andric 9968d75effSDimitry Andric bool HybridMutex::tryLock() { 10068d75effSDimitry Andric return atomic_compare_exchange(&M, Unlocked, Locked) == Unlocked; 10168d75effSDimitry Andric } 10268d75effSDimitry Andric 10368d75effSDimitry Andric // The following is based on https://akkadia.org/drepper/futex.pdf. 10468d75effSDimitry Andric void HybridMutex::lockSlow() { 10568d75effSDimitry Andric u32 V = atomic_compare_exchange(&M, Unlocked, Locked); 10668d75effSDimitry Andric if (V == Unlocked) 10768d75effSDimitry Andric return; 10868d75effSDimitry Andric if (V != Sleeping) 10968d75effSDimitry Andric V = atomic_exchange(&M, Sleeping, memory_order_acquire); 11068d75effSDimitry Andric while (V != Unlocked) { 11168d75effSDimitry Andric syscall(SYS_futex, reinterpret_cast<uptr>(&M), FUTEX_WAIT_PRIVATE, Sleeping, 11268d75effSDimitry Andric nullptr, nullptr, 0); 11368d75effSDimitry Andric V = atomic_exchange(&M, Sleeping, memory_order_acquire); 11468d75effSDimitry Andric } 11568d75effSDimitry Andric } 11668d75effSDimitry Andric 11768d75effSDimitry Andric void HybridMutex::unlock() { 11868d75effSDimitry Andric if (atomic_fetch_sub(&M, 1U, memory_order_release) != Locked) { 11968d75effSDimitry Andric atomic_store(&M, Unlocked, memory_order_release); 12068d75effSDimitry Andric syscall(SYS_futex, reinterpret_cast<uptr>(&M), FUTEX_WAKE_PRIVATE, 1, 12168d75effSDimitry Andric nullptr, nullptr, 0); 12268d75effSDimitry Andric } 12368d75effSDimitry Andric } 12468d75effSDimitry Andric 12568d75effSDimitry Andric u64 getMonotonicTime() { 12668d75effSDimitry Andric timespec TS; 12768d75effSDimitry Andric clock_gettime(CLOCK_MONOTONIC, &TS); 12868d75effSDimitry Andric return static_cast<u64>(TS.tv_sec) * (1000ULL * 1000 * 1000) + 12968d75effSDimitry Andric static_cast<u64>(TS.tv_nsec); 13068d75effSDimitry Andric } 13168d75effSDimitry Andric 13268d75effSDimitry Andric u32 getNumberOfCPUs() { 13368d75effSDimitry Andric cpu_set_t CPUs; 1345ffd83dbSDimitry Andric // sched_getaffinity can fail for a variety of legitimate reasons (lack of 1355ffd83dbSDimitry Andric // CAP_SYS_NICE, syscall filtering, etc), in which case we shall return 0. 1365ffd83dbSDimitry Andric if (sched_getaffinity(0, sizeof(cpu_set_t), &CPUs) != 0) 1375ffd83dbSDimitry Andric return 0; 13868d75effSDimitry Andric return static_cast<u32>(CPU_COUNT(&CPUs)); 13968d75effSDimitry Andric } 14068d75effSDimitry Andric 1415ffd83dbSDimitry Andric u32 getThreadID() { 1425ffd83dbSDimitry Andric #if SCUDO_ANDROID 1435ffd83dbSDimitry Andric return static_cast<u32>(gettid()); 1445ffd83dbSDimitry Andric #else 1455ffd83dbSDimitry Andric return static_cast<u32>(syscall(SYS_gettid)); 1465ffd83dbSDimitry Andric #endif 1475ffd83dbSDimitry Andric } 1485ffd83dbSDimitry Andric 14968d75effSDimitry Andric // Blocking is possibly unused if the getrandom block is not compiled in. 15068d75effSDimitry Andric bool getRandom(void *Buffer, uptr Length, UNUSED bool Blocking) { 15168d75effSDimitry Andric if (!Buffer || !Length || Length > MaxRandomLength) 15268d75effSDimitry Andric return false; 15368d75effSDimitry Andric ssize_t ReadBytes; 15468d75effSDimitry Andric #if defined(SYS_getrandom) 15568d75effSDimitry Andric #if !defined(GRND_NONBLOCK) 15668d75effSDimitry Andric #define GRND_NONBLOCK 1 15768d75effSDimitry Andric #endif 15868d75effSDimitry Andric // Up to 256 bytes, getrandom will not be interrupted. 15968d75effSDimitry Andric ReadBytes = 16068d75effSDimitry Andric syscall(SYS_getrandom, Buffer, Length, Blocking ? 0 : GRND_NONBLOCK); 16168d75effSDimitry Andric if (ReadBytes == static_cast<ssize_t>(Length)) 16268d75effSDimitry Andric return true; 16368d75effSDimitry Andric #endif // defined(SYS_getrandom) 16468d75effSDimitry Andric // Up to 256 bytes, a read off /dev/urandom will not be interrupted. 16568d75effSDimitry Andric // Blocking is moot here, O_NONBLOCK has no effect when opening /dev/urandom. 16668d75effSDimitry Andric const int FileDesc = open("/dev/urandom", O_RDONLY); 16768d75effSDimitry Andric if (FileDesc == -1) 16868d75effSDimitry Andric return false; 16968d75effSDimitry Andric ReadBytes = read(FileDesc, Buffer, Length); 17068d75effSDimitry Andric close(FileDesc); 17168d75effSDimitry Andric return (ReadBytes == static_cast<ssize_t>(Length)); 17268d75effSDimitry Andric } 17368d75effSDimitry Andric 1745ffd83dbSDimitry Andric // Allocation free syslog-like API. 1755ffd83dbSDimitry Andric extern "C" WEAK int async_safe_write_log(int pri, const char *tag, 1765ffd83dbSDimitry Andric const char *msg); 1775ffd83dbSDimitry Andric 17868d75effSDimitry Andric void outputRaw(const char *Buffer) { 1795ffd83dbSDimitry Andric if (&async_safe_write_log) { 1805ffd83dbSDimitry Andric constexpr s32 AndroidLogInfo = 4; 1815ffd83dbSDimitry Andric constexpr uptr MaxLength = 1024U; 1825ffd83dbSDimitry Andric char LocalBuffer[MaxLength]; 1835ffd83dbSDimitry Andric while (strlen(Buffer) > MaxLength) { 1845ffd83dbSDimitry Andric uptr P; 1855ffd83dbSDimitry Andric for (P = MaxLength - 1; P > 0; P--) { 1865ffd83dbSDimitry Andric if (Buffer[P] == '\n') { 1875ffd83dbSDimitry Andric memcpy(LocalBuffer, Buffer, P); 1885ffd83dbSDimitry Andric LocalBuffer[P] = '\0'; 1895ffd83dbSDimitry Andric async_safe_write_log(AndroidLogInfo, "scudo", LocalBuffer); 1905ffd83dbSDimitry Andric Buffer = &Buffer[P + 1]; 1915ffd83dbSDimitry Andric break; 1925ffd83dbSDimitry Andric } 1935ffd83dbSDimitry Andric } 1945ffd83dbSDimitry Andric // If no newline was found, just log the buffer. 1955ffd83dbSDimitry Andric if (P == 0) 1965ffd83dbSDimitry Andric break; 1975ffd83dbSDimitry Andric } 1985ffd83dbSDimitry Andric async_safe_write_log(AndroidLogInfo, "scudo", Buffer); 1995ffd83dbSDimitry Andric } else { 200*e8d8bef9SDimitry Andric (void)write(2, Buffer, strlen(Buffer)); 20168d75effSDimitry Andric } 2025ffd83dbSDimitry Andric } 20368d75effSDimitry Andric 20468d75effSDimitry Andric extern "C" WEAK void android_set_abort_message(const char *); 20568d75effSDimitry Andric 20668d75effSDimitry Andric void setAbortMessage(const char *Message) { 20768d75effSDimitry Andric if (&android_set_abort_message) 20868d75effSDimitry Andric android_set_abort_message(Message); 20968d75effSDimitry Andric } 21068d75effSDimitry Andric 21168d75effSDimitry Andric } // namespace scudo 21268d75effSDimitry Andric 21368d75effSDimitry Andric #endif // SCUDO_LINUX 214