You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
254 lines
7.4 KiB
254 lines
7.4 KiB
//===-- linux.cpp -----------------------------------------------*- C++ -*-===//
|
|
//
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "platform.h"
|
|
|
|
#if SCUDO_LINUX
|
|
|
|
#include "atomic_helpers.h"
|
|
#include "common.h"
|
|
#include "linux.h"
|
|
#include "mutex.h"
|
|
#include "string_utils.h"
|
|
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
#include <linux/futex.h>
|
|
#include <sched.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <sys/mman.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/syscall.h>
|
|
#include <sys/time.h>
|
|
#include <time.h>
|
|
#include <unistd.h>
|
|
|
|
#if SCUDO_ANDROID
|
|
#include <sys/prctl.h>
|
|
// Definitions of prctl arguments to set a vma name in Android kernels.
|
|
#define ANDROID_PR_SET_VMA 0x53564d41
|
|
#define ANDROID_PR_SET_VMA_ANON_NAME 0
|
|
#endif
|
|
|
|
namespace scudo {
|
|
|
|
uptr getPageSize() { return static_cast<uptr>(sysconf(_SC_PAGESIZE)); }
|
|
|
|
void NORETURN die() { abort(); }
|
|
|
|
void *map(void *Addr, uptr Size, UNUSED const char *Name, uptr Flags,
|
|
UNUSED MapPlatformData *Data) {
|
|
int MmapFlags = MAP_PRIVATE | MAP_ANONYMOUS;
|
|
int MmapProt;
|
|
if (Flags & MAP_NOACCESS) {
|
|
MmapFlags |= MAP_NORESERVE;
|
|
MmapProt = PROT_NONE;
|
|
} else {
|
|
MmapProt = PROT_READ | PROT_WRITE;
|
|
}
|
|
#if defined(__aarch64__)
|
|
#ifndef PROT_MTE
|
|
#define PROT_MTE 0x20
|
|
#endif
|
|
if (Flags & MAP_MEMTAG)
|
|
MmapProt |= PROT_MTE;
|
|
#endif
|
|
if (Addr) {
|
|
// Currently no scenario for a noaccess mapping with a fixed address.
|
|
DCHECK_EQ(Flags & MAP_NOACCESS, 0);
|
|
MmapFlags |= MAP_FIXED;
|
|
}
|
|
void *P = mmap(Addr, Size, MmapProt, MmapFlags, -1, 0);
|
|
if (P == MAP_FAILED) {
|
|
if (!(Flags & MAP_ALLOWNOMEM) || errno != ENOMEM)
|
|
dieOnMapUnmapError(errno == ENOMEM ? Size : 0);
|
|
return nullptr;
|
|
}
|
|
#if SCUDO_ANDROID
|
|
if (Name)
|
|
prctl(ANDROID_PR_SET_VMA, ANDROID_PR_SET_VMA_ANON_NAME, P, Size, Name);
|
|
#endif
|
|
return P;
|
|
}
|
|
|
|
void unmap(void *Addr, uptr Size, UNUSED uptr Flags,
|
|
UNUSED MapPlatformData *Data) {
|
|
if (munmap(Addr, Size) != 0)
|
|
dieOnMapUnmapError();
|
|
}
|
|
|
|
void setMemoryPermission(uptr Addr, uptr Size, uptr Flags,
|
|
UNUSED MapPlatformData *Data) {
|
|
int Prot = (Flags & MAP_NOACCESS) ? PROT_NONE : (PROT_READ | PROT_WRITE);
|
|
if (mprotect(reinterpret_cast<void *>(Addr), Size, Prot) != 0)
|
|
dieOnMapUnmapError();
|
|
}
|
|
|
|
static bool madviseNeedsMemset() {
|
|
const uptr Size = getPageSizeCached();
|
|
char *P = reinterpret_cast<char *>(mmap(0, Size, PROT_READ | PROT_WRITE,
|
|
MAP_PRIVATE | MAP_ANONYMOUS, -1, 0));
|
|
if (!P)
|
|
dieOnMapUnmapError(errno == ENOMEM ? Size : 0);
|
|
*P = 1;
|
|
while (madvise(P, Size, MADV_DONTNEED) == -1 && errno == EAGAIN) {
|
|
}
|
|
const bool R = (*P != 0);
|
|
if (munmap(P, Size) != 0)
|
|
dieOnMapUnmapError();
|
|
return R;
|
|
}
|
|
|
|
static bool madviseNeedsMemsetCached() {
|
|
static atomic_u8 Cache;
|
|
enum State : u8 { Unknown = 0, Yes = 1, No = 2 };
|
|
State NeedsMemset = static_cast<State>(atomic_load_relaxed(&Cache));
|
|
if (NeedsMemset == Unknown) {
|
|
NeedsMemset = madviseNeedsMemset() ? Yes : No;
|
|
atomic_store_relaxed(&Cache, NeedsMemset);
|
|
}
|
|
return NeedsMemset == Yes;
|
|
}
|
|
|
|
void releasePagesToOS(uptr BaseAddress, uptr Offset, uptr Size,
|
|
UNUSED MapPlatformData *Data) {
|
|
void *Addr = reinterpret_cast<void *>(BaseAddress + Offset);
|
|
if (madviseNeedsMemsetCached()) {
|
|
// Workaround for QEMU-user ignoring MADV_DONTNEED.
|
|
// https://github.com/qemu/qemu/blob/b1cffefa1b163bce9aebc3416f562c1d3886eeaa/linux-user/syscall.c#L11941
|
|
// https://bugs.launchpad.net/qemu/+bug/1926521
|
|
memset(Addr, 0, Size);
|
|
}
|
|
while (madvise(Addr, Size, MADV_DONTNEED) == -1 && errno == EAGAIN) {
|
|
}
|
|
}
|
|
|
|
// Calling getenv should be fine (c)(tm) at any time.
|
|
const char *getEnv(const char *Name) { return getenv(Name); }
|
|
|
|
namespace {
|
|
enum State : u32 { Unlocked = 0, Locked = 1, Sleeping = 2 };
|
|
}
|
|
|
|
bool HybridMutex::tryLock() {
|
|
return atomic_compare_exchange(&M, Unlocked, Locked) == Unlocked;
|
|
}
|
|
|
|
// The following is based on https://akkadia.org/drepper/futex.pdf.
|
|
void HybridMutex::lockSlow() {
|
|
u32 V = atomic_compare_exchange(&M, Unlocked, Locked);
|
|
if (V == Unlocked)
|
|
return;
|
|
if (V != Sleeping)
|
|
V = atomic_exchange(&M, Sleeping, memory_order_acquire);
|
|
while (V != Unlocked) {
|
|
syscall(SYS_futex, reinterpret_cast<uptr>(&M), FUTEX_WAIT_PRIVATE, Sleeping,
|
|
nullptr, nullptr, 0);
|
|
V = atomic_exchange(&M, Sleeping, memory_order_acquire);
|
|
}
|
|
}
|
|
|
|
void HybridMutex::unlock() {
|
|
if (atomic_fetch_sub(&M, 1U, memory_order_release) != Locked) {
|
|
atomic_store(&M, Unlocked, memory_order_release);
|
|
syscall(SYS_futex, reinterpret_cast<uptr>(&M), FUTEX_WAKE_PRIVATE, 1,
|
|
nullptr, nullptr, 0);
|
|
}
|
|
}
|
|
|
|
u64 getMonotonicTime() {
|
|
timespec TS;
|
|
clock_gettime(CLOCK_MONOTONIC, &TS);
|
|
return static_cast<u64>(TS.tv_sec) * (1000ULL * 1000 * 1000) +
|
|
static_cast<u64>(TS.tv_nsec);
|
|
}
|
|
|
|
u32 getNumberOfCPUs() {
|
|
cpu_set_t CPUs;
|
|
// sched_getaffinity can fail for a variety of legitimate reasons (lack of
|
|
// CAP_SYS_NICE, syscall filtering, etc), in which case we shall return 0.
|
|
if (sched_getaffinity(0, sizeof(cpu_set_t), &CPUs) != 0)
|
|
return 0;
|
|
return static_cast<u32>(CPU_COUNT(&CPUs));
|
|
}
|
|
|
|
u32 getThreadID() {
|
|
#if SCUDO_ANDROID
|
|
return static_cast<u32>(gettid());
|
|
#else
|
|
return static_cast<u32>(syscall(SYS_gettid));
|
|
#endif
|
|
}
|
|
|
|
// Blocking is possibly unused if the getrandom block is not compiled in.
|
|
bool getRandom(void *Buffer, uptr Length, UNUSED bool Blocking) {
|
|
if (!Buffer || !Length || Length > MaxRandomLength)
|
|
return false;
|
|
ssize_t ReadBytes;
|
|
#if defined(SYS_getrandom)
|
|
#if !defined(GRND_NONBLOCK)
|
|
#define GRND_NONBLOCK 1
|
|
#endif
|
|
// Up to 256 bytes, getrandom will not be interrupted.
|
|
ReadBytes =
|
|
syscall(SYS_getrandom, Buffer, Length, Blocking ? 0 : GRND_NONBLOCK);
|
|
if (ReadBytes == static_cast<ssize_t>(Length))
|
|
return true;
|
|
#endif // defined(SYS_getrandom)
|
|
// Up to 256 bytes, a read off /dev/urandom will not be interrupted.
|
|
// Blocking is moot here, O_NONBLOCK has no effect when opening /dev/urandom.
|
|
const int FileDesc = open("/dev/urandom", O_RDONLY);
|
|
if (FileDesc == -1)
|
|
return false;
|
|
ReadBytes = read(FileDesc, Buffer, Length);
|
|
close(FileDesc);
|
|
return (ReadBytes == static_cast<ssize_t>(Length));
|
|
}
|
|
|
|
// Allocation free syslog-like API.
|
|
extern "C" WEAK int async_safe_write_log(int pri, const char *tag,
|
|
const char *msg);
|
|
|
|
void outputRaw(const char *Buffer) {
|
|
if (&async_safe_write_log) {
|
|
constexpr s32 AndroidLogInfo = 4;
|
|
constexpr uptr MaxLength = 1024U;
|
|
char LocalBuffer[MaxLength];
|
|
while (strlen(Buffer) > MaxLength) {
|
|
uptr P;
|
|
for (P = MaxLength - 1; P > 0; P--) {
|
|
if (Buffer[P] == '\n') {
|
|
memcpy(LocalBuffer, Buffer, P);
|
|
LocalBuffer[P] = '\0';
|
|
async_safe_write_log(AndroidLogInfo, "scudo", LocalBuffer);
|
|
Buffer = &Buffer[P + 1];
|
|
break;
|
|
}
|
|
}
|
|
// If no newline was found, just log the buffer.
|
|
if (P == 0)
|
|
break;
|
|
}
|
|
async_safe_write_log(AndroidLogInfo, "scudo", Buffer);
|
|
} else {
|
|
(void)write(2, Buffer, strlen(Buffer));
|
|
}
|
|
}
|
|
|
|
extern "C" WEAK void android_set_abort_message(const char *);
|
|
|
|
void setAbortMessage(const char *Message) {
|
|
if (&android_set_abort_message)
|
|
android_set_abort_message(Message);
|
|
}
|
|
|
|
} // namespace scudo
|
|
|
|
#endif // SCUDO_LINUX
|