| //===-- asan_linux.cc -----------------------------------------------------===// |
| // |
| // The LLVM Compiler Infrastructure |
| // |
| // This file is distributed under the University of Illinois Open Source |
| // License. See LICENSE.TXT for details. |
| // |
| //===----------------------------------------------------------------------===// |
| // |
| // This file is a part of AddressSanitizer, an address sanity checker. |
| // |
| // Linux-specific details. |
| //===----------------------------------------------------------------------===// |
| #ifdef __linux__ |
| |
| #include "asan_interceptors.h" |
| #include "asan_internal.h" |
| #include "asan_lock.h" |
| #include "asan_procmaps.h" |
| #include "asan_thread.h" |
| |
| #include <sys/time.h> |
| #include <sys/resource.h> |
| #include <sys/mman.h> |
| #include <sys/syscall.h> |
| #include <sys/types.h> |
| #include <fcntl.h> |
| #include <link.h> |
| #include <pthread.h> |
| #include <stdio.h> |
| #include <unistd.h> |
| |
| #ifndef ANDROID |
| // FIXME: where to get ucontext on Android? |
| #include <sys/ucontext.h> |
| #endif |
| |
| namespace __asan { |
| |
| void *AsanDoesNotSupportStaticLinkage() { |
| // This will fail to link with -static. |
| return &_DYNAMIC; // defined in link.h |
| } |
| |
| void GetPcSpBp(void *context, uintptr_t *pc, uintptr_t *sp, uintptr_t *bp) { |
| #ifdef ANDROID |
| *pc = *sp = *bp = 0; |
| #elif defined(__arm__) |
| ucontext_t *ucontext = (ucontext_t*)context; |
| *pc = ucontext->uc_mcontext.arm_pc; |
| *bp = ucontext->uc_mcontext.arm_fp; |
| *sp = ucontext->uc_mcontext.arm_sp; |
| # elif defined(__x86_64__) |
| ucontext_t *ucontext = (ucontext_t*)context; |
| *pc = ucontext->uc_mcontext.gregs[REG_RIP]; |
| *bp = ucontext->uc_mcontext.gregs[REG_RBP]; |
| *sp = ucontext->uc_mcontext.gregs[REG_RSP]; |
| # elif defined(__i386__) |
| ucontext_t *ucontext = (ucontext_t*)context; |
| *pc = ucontext->uc_mcontext.gregs[REG_EIP]; |
| *bp = ucontext->uc_mcontext.gregs[REG_EBP]; |
| *sp = ucontext->uc_mcontext.gregs[REG_ESP]; |
| #else |
| # error "Unsupported arch" |
| #endif |
| } |
| |
| bool AsanInterceptsSignal(int signum) { |
| return signum == SIGSEGV && FLAG_handle_segv; |
| } |
| |
| static void *asan_mmap(void *addr, size_t length, int prot, int flags, |
| int fd, uint64_t offset) { |
| # if __WORDSIZE == 64 |
| return (void *)syscall(__NR_mmap, addr, length, prot, flags, fd, offset); |
| # else |
| return (void *)syscall(__NR_mmap2, addr, length, prot, flags, fd, offset); |
| # endif |
| } |
| |
| void *AsanMmapSomewhereOrDie(size_t size, const char *mem_type) { |
| size = RoundUpTo(size, kPageSize); |
| void *res = asan_mmap(0, size, |
| PROT_READ | PROT_WRITE, |
| MAP_PRIVATE | MAP_ANON, -1, 0); |
| if (res == (void*)-1) { |
| OutOfMemoryMessageAndDie(mem_type, size); |
| } |
| return res; |
| } |
| |
| void *AsanMmapFixedNoReserve(uintptr_t fixed_addr, size_t size) { |
| return asan_mmap((void*)fixed_addr, size, |
| PROT_READ | PROT_WRITE, |
| MAP_PRIVATE | MAP_ANON | MAP_FIXED | MAP_NORESERVE, |
| 0, 0); |
| } |
| |
| void *AsanMmapFixedReserve(uintptr_t fixed_addr, size_t size) { |
| return asan_mmap((void*)fixed_addr, size, |
| PROT_READ | PROT_WRITE, |
| MAP_PRIVATE | MAP_ANON | MAP_FIXED, |
| 0, 0); |
| } |
| |
| void *AsanMprotect(uintptr_t fixed_addr, size_t size) { |
| return asan_mmap((void*)fixed_addr, size, |
| PROT_NONE, |
| MAP_PRIVATE | MAP_ANON | MAP_FIXED | MAP_NORESERVE, |
| 0, 0); |
| } |
| |
| void AsanUnmapOrDie(void *addr, size_t size) { |
| if (!addr || !size) return; |
| int res = syscall(__NR_munmap, addr, size); |
| if (res != 0) { |
| Report("Failed to unmap\n"); |
| AsanDie(); |
| } |
| } |
| |
| size_t AsanWrite(int fd, const void *buf, size_t count) { |
| return (size_t)syscall(__NR_write, fd, buf, count); |
| } |
| |
| int AsanOpenReadonly(const char* filename) { |
| return open(filename, O_RDONLY); |
| } |
| |
| // Like getenv, but reads env directly from /proc and does not use libc. |
| // This function should be called first inside __asan_init. |
| const char* AsanGetEnv(const char* name) { |
| static char *environ; |
| static size_t len; |
| static bool inited; |
| if (!inited) { |
| inited = true; |
| size_t environ_size; |
| len = ReadFileToBuffer("/proc/self/environ", |
| &environ, &environ_size, 1 << 20); |
| } |
| if (!environ || len == 0) return NULL; |
| size_t namelen = internal_strlen(name); |
| const char *p = environ; |
| while (*p != '\0') { // will happen at the \0\0 that terminates the buffer |
| // proc file has the format NAME=value\0NAME=value\0NAME=value\0... |
| const char* endp = |
| (char*)internal_memchr(p, '\0', len - (p - environ)); |
| if (endp == NULL) // this entry isn't NUL terminated |
| return NULL; |
| else if (!internal_memcmp(p, name, namelen) && p[namelen] == '=') // Match. |
| return p + namelen + 1; // point after = |
| p = endp + 1; |
| } |
| return NULL; // Not found. |
| } |
| |
| size_t AsanRead(int fd, void *buf, size_t count) { |
| return (size_t)syscall(__NR_read, fd, buf, count); |
| } |
| |
| int AsanClose(int fd) { |
| return close(fd); |
| } |
| |
| AsanProcMaps::AsanProcMaps() { |
| proc_self_maps_buff_len_ = |
| ReadFileToBuffer("/proc/self/maps", &proc_self_maps_buff_, |
| &proc_self_maps_buff_mmaped_size_, 1 << 20); |
| CHECK(proc_self_maps_buff_len_ > 0); |
| // AsanWrite(2, proc_self_maps_buff_, proc_self_maps_buff_len_); |
| Reset(); |
| } |
| |
| AsanProcMaps::~AsanProcMaps() { |
| AsanUnmapOrDie(proc_self_maps_buff_, proc_self_maps_buff_mmaped_size_); |
| } |
| |
| void AsanProcMaps::Reset() { |
| current_ = proc_self_maps_buff_; |
| } |
| |
| bool AsanProcMaps::Next(uintptr_t *start, uintptr_t *end, |
| uintptr_t *offset, char filename[], |
| size_t filename_size) { |
| char *last = proc_self_maps_buff_ + proc_self_maps_buff_len_; |
| if (current_ >= last) return false; |
| int consumed = 0; |
| char flags[10]; |
| int major, minor; |
| uintptr_t inode; |
| char *next_line = (char*)internal_memchr(current_, '\n', last - current_); |
| if (next_line == NULL) |
| next_line = last; |
| if (SScanf(current_, |
| "%lx-%lx %4s %lx %x:%x %ld %n", |
| start, end, flags, offset, &major, &minor, |
| &inode, &consumed) != 7) |
| return false; |
| current_ += consumed; |
| // Skip spaces. |
| while (current_ < next_line && *current_ == ' ') |
| current_++; |
| // Fill in the filename. |
| size_t i = 0; |
| while (current_ < next_line) { |
| if (filename && i < filename_size - 1) |
| filename[i++] = *current_; |
| current_++; |
| } |
| if (filename && i < filename_size) |
| filename[i] = 0; |
| current_ = next_line + 1; |
| return true; |
| } |
| |
| #ifdef __arm__ |
| |
| // Gets the object name and the offset by walking AsanProcMaps. |
| bool AsanProcMaps::GetObjectNameAndOffset(uintptr_t addr, uintptr_t *offset, |
| char filename[], |
| size_t filename_size) { |
| AsanProcMaps proc_maps; |
| uintptr_t start, end, file_offset; |
| while (proc_maps.Next(&start, &end, &file_offset, filename, filename_size)) { |
| if (addr >= start && addr < end) { |
| *offset = (addr - start) + file_offset; |
| return true; |
| } |
| } |
| if (filename_size) |
| filename[0] = '\0'; |
| return false; |
| } |
| |
| #else // __arm__ |
| |
| struct DlIterateData { |
| int count; |
| uintptr_t addr; |
| uintptr_t offset; |
| char *filename; |
| size_t filename_size; |
| }; |
| |
| static int dl_iterate_phdr_callback(struct dl_phdr_info *info, |
| size_t size, void *raw_data) { |
| DlIterateData *data = (DlIterateData*)raw_data; |
| int count = data->count++; |
| if (info->dlpi_addr > data->addr) |
| return 0; |
| if (count == 0) { |
| // The first item (the main executable) does not have a so name, |
| // but we can just read it from /proc/self/exe. |
| size_t path_len = readlink("/proc/self/exe", |
| data->filename, data->filename_size - 1); |
| data->filename[path_len] = 0; |
| } else { |
| CHECK(info->dlpi_name); |
| real_strncpy(data->filename, info->dlpi_name, data->filename_size); |
| } |
| data->offset = data->addr - info->dlpi_addr; |
| return 1; |
| } |
| |
| // Gets the object name and the offset using dl_iterate_phdr. |
| bool AsanProcMaps::GetObjectNameAndOffset(uintptr_t addr, uintptr_t *offset, |
| char filename[], |
| size_t filename_size) { |
| DlIterateData data; |
| data.count = 0; |
| data.addr = addr; |
| data.filename = filename; |
| data.filename_size = filename_size; |
| if (dl_iterate_phdr(dl_iterate_phdr_callback, &data)) { |
| *offset = data.offset; |
| return true; |
| } |
| return false; |
| } |
| |
| #endif // __arm__ |
| |
| void AsanThread::SetThreadStackTopAndBottom() { |
| if (tid() == 0) { |
| // This is the main thread. Libpthread may not be initialized yet. |
| struct rlimit rl; |
| CHECK(getrlimit(RLIMIT_STACK, &rl) == 0); |
| |
| // Find the mapping that contains a stack variable. |
| AsanProcMaps proc_maps; |
| uintptr_t start, end, offset; |
| uintptr_t prev_end = 0; |
| while (proc_maps.Next(&start, &end, &offset, NULL, 0)) { |
| if ((uintptr_t)&rl < end) |
| break; |
| prev_end = end; |
| } |
| CHECK((uintptr_t)&rl >= start && (uintptr_t)&rl < end); |
| |
| // Get stacksize from rlimit, but clip it so that it does not overlap |
| // with other mappings. |
| size_t stacksize = rl.rlim_cur; |
| if (stacksize > end - prev_end) |
| stacksize = end - prev_end; |
| if (stacksize > kMaxThreadStackSize) |
| stacksize = kMaxThreadStackSize; |
| stack_top_ = end; |
| stack_bottom_ = end - stacksize; |
| CHECK(AddrIsInStack((uintptr_t)&rl)); |
| return; |
| } |
| pthread_attr_t attr; |
| CHECK(pthread_getattr_np(pthread_self(), &attr) == 0); |
| size_t stacksize = 0; |
| void *stackaddr = NULL; |
| pthread_attr_getstack(&attr, &stackaddr, &stacksize); |
| pthread_attr_destroy(&attr); |
| |
| stack_top_ = (uintptr_t)stackaddr + stacksize; |
| stack_bottom_ = (uintptr_t)stackaddr; |
| // When running with unlimited stack size, we still want to set some limit. |
| // The unlimited stack size is caused by 'ulimit -s unlimited'. |
| // Also, for some reason, GNU make spawns subrocesses with unlimited stack. |
| if (stacksize > kMaxThreadStackSize) { |
| stack_bottom_ = stack_top_ - kMaxThreadStackSize; |
| } |
| CHECK(AddrIsInStack((uintptr_t)&attr)); |
| } |
| |
| AsanLock::AsanLock(LinkerInitialized) { |
| // We assume that pthread_mutex_t initialized to all zeroes is a valid |
| // unlocked mutex. We can not use PTHREAD_MUTEX_INITIALIZER as it triggers |
| // a gcc warning: |
| // extended initializer lists only available with -std=c++0x or -std=gnu++0x |
| } |
| |
| void AsanLock::Lock() { |
| CHECK(sizeof(pthread_mutex_t) <= sizeof(opaque_storage_)); |
| pthread_mutex_lock((pthread_mutex_t*)&opaque_storage_); |
| CHECK(!owner_); |
| owner_ = (uintptr_t)pthread_self(); |
| } |
| |
| void AsanLock::Unlock() { |
| CHECK(owner_ == (uintptr_t)pthread_self()); |
| owner_ = 0; |
| pthread_mutex_unlock((pthread_mutex_t*)&opaque_storage_); |
| } |
| |
| } // namespace __asan |
| |
| #endif // __linux__ |