asan_linux.cc revision aa33a50c9d0f3e3f22c8b21fa7309ec91f9d939a
1//===-- asan_linux.cc -----------------------------------------------------===//
2//
3//                     The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of AddressSanitizer, an address sanity checker.
11//
12// Linux-specific details.
13//===----------------------------------------------------------------------===//
14#ifdef __linux__
15
16#include "asan_interceptors.h"
17#include "asan_internal.h"
18#include "asan_lock.h"
19#include "asan_procmaps.h"
20#include "asan_thread.h"
21
22#include <sys/time.h>
23#include <sys/resource.h>
24#include <sys/mman.h>
25#include <sys/syscall.h>
26#include <sys/types.h>
27#include <fcntl.h>
28#include <pthread.h>
29#include <stdio.h>
30#include <unistd.h>
31#include <unwind.h>
32
33#ifndef ANDROID
34// FIXME: where to get ucontext on Android?
35#include <sys/ucontext.h>
36#endif
37
38extern "C" void* _DYNAMIC;
39
40namespace __asan {
41
42void *AsanDoesNotSupportStaticLinkage() {
43  // This will fail to link with -static.
44  return &_DYNAMIC;  // defined in link.h
45}
46
47bool AsanShadowRangeIsAvailable() {
48  // FIXME: shall we need anything here on Linux?
49  return true;
50}
51
52void GetPcSpBp(void *context, uintptr_t *pc, uintptr_t *sp, uintptr_t *bp) {
53#ifdef ANDROID
54  *pc = *sp = *bp = 0;
55#elif defined(__arm__)
56  ucontext_t *ucontext = (ucontext_t*)context;
57  *pc = ucontext->uc_mcontext.arm_pc;
58  *bp = ucontext->uc_mcontext.arm_fp;
59  *sp = ucontext->uc_mcontext.arm_sp;
60# elif defined(__x86_64__)
61  ucontext_t *ucontext = (ucontext_t*)context;
62  *pc = ucontext->uc_mcontext.gregs[REG_RIP];
63  *bp = ucontext->uc_mcontext.gregs[REG_RBP];
64  *sp = ucontext->uc_mcontext.gregs[REG_RSP];
65# elif defined(__i386__)
66  ucontext_t *ucontext = (ucontext_t*)context;
67  *pc = ucontext->uc_mcontext.gregs[REG_EIP];
68  *bp = ucontext->uc_mcontext.gregs[REG_EBP];
69  *sp = ucontext->uc_mcontext.gregs[REG_ESP];
70#else
71# error "Unsupported arch"
72#endif
73}
74
75bool AsanInterceptsSignal(int signum) {
76  return signum == SIGSEGV && FLAG_handle_segv;
77}
78
79static void *asan_mmap(void *addr, size_t length, int prot, int flags,
80                int fd, uint64_t offset) {
81# if __WORDSIZE == 64
82  return (void *)syscall(__NR_mmap, addr, length, prot, flags, fd, offset);
83# else
84  return (void *)syscall(__NR_mmap2, addr, length, prot, flags, fd, offset);
85# endif
86}
87
88void *AsanMmapSomewhereOrDie(size_t size, const char *mem_type) {
89  size = RoundUpTo(size, kPageSize);
90  void *res = asan_mmap(0, size,
91                        PROT_READ | PROT_WRITE,
92                        MAP_PRIVATE | MAP_ANON, -1, 0);
93  if (res == (void*)-1) {
94    OutOfMemoryMessageAndDie(mem_type, size);
95  }
96  return res;
97}
98
99void *AsanMmapFixedNoReserve(uintptr_t fixed_addr, size_t size) {
100  return asan_mmap((void*)fixed_addr, size,
101                   PROT_READ | PROT_WRITE,
102                   MAP_PRIVATE | MAP_ANON | MAP_FIXED | MAP_NORESERVE,
103                   0, 0);
104}
105
106void *AsanMprotect(uintptr_t fixed_addr, size_t size) {
107  return asan_mmap((void*)fixed_addr, size,
108                   PROT_NONE,
109                   MAP_PRIVATE | MAP_ANON | MAP_FIXED | MAP_NORESERVE,
110                   0, 0);
111}
112
113void AsanUnmapOrDie(void *addr, size_t size) {
114  if (!addr || !size) return;
115  int res = syscall(__NR_munmap, addr, size);
116  if (res != 0) {
117    Report("Failed to unmap\n");
118    AsanDie();
119  }
120}
121
122size_t AsanWrite(int fd, const void *buf, size_t count) {
123  return (size_t)syscall(__NR_write, fd, buf, count);
124}
125
126int AsanOpenReadonly(const char* filename) {
127  return syscall(__NR_open, filename, O_RDONLY);
128}
129
130// Like getenv, but reads env directly from /proc and does not use libc.
131// This function should be called first inside __asan_init.
132const char* AsanGetEnv(const char* name) {
133  static char *environ;
134  static size_t len;
135  static bool inited;
136  if (!inited) {
137    inited = true;
138    size_t environ_size;
139    len = ReadFileToBuffer("/proc/self/environ",
140                           &environ, &environ_size, 1 << 26);
141  }
142  if (!environ || len == 0) return NULL;
143  size_t namelen = internal_strlen(name);
144  const char *p = environ;
145  while (*p != '\0') {  // will happen at the \0\0 that terminates the buffer
146    // proc file has the format NAME=value\0NAME=value\0NAME=value\0...
147    const char* endp =
148        (char*)internal_memchr(p, '\0', len - (p - environ));
149    if (endp == NULL)  // this entry isn't NUL terminated
150      return NULL;
151    else if (!internal_memcmp(p, name, namelen) && p[namelen] == '=')  // Match.
152      return p + namelen + 1;  // point after =
153    p = endp + 1;
154  }
155  return NULL;  // Not found.
156}
157
158size_t AsanRead(int fd, void *buf, size_t count) {
159  return (size_t)syscall(__NR_read, fd, buf, count);
160}
161
162int AsanClose(int fd) {
163  return syscall(__NR_close, fd);
164}
165
166AsanProcMaps::AsanProcMaps() {
167  proc_self_maps_buff_len_ =
168      ReadFileToBuffer("/proc/self/maps", &proc_self_maps_buff_,
169                       &proc_self_maps_buff_mmaped_size_, 1 << 26);
170  CHECK(proc_self_maps_buff_len_ > 0);
171  // AsanWrite(2, proc_self_maps_buff_, proc_self_maps_buff_len_);
172  Reset();
173}
174
175AsanProcMaps::~AsanProcMaps() {
176  AsanUnmapOrDie(proc_self_maps_buff_, proc_self_maps_buff_mmaped_size_);
177}
178
179void AsanProcMaps::Reset() {
180  current_ = proc_self_maps_buff_;
181}
182
183bool AsanProcMaps::Next(uintptr_t *start, uintptr_t *end,
184                        uintptr_t *offset, char filename[],
185                        size_t filename_size) {
186  char *last = proc_self_maps_buff_ + proc_self_maps_buff_len_;
187  if (current_ >= last) return false;
188  int consumed = 0;
189  char flags[10];
190  int major, minor;
191  uintptr_t inode;
192  char *next_line = (char*)internal_memchr(current_, '\n', last - current_);
193  if (next_line == NULL)
194    next_line = last;
195  if (SScanf(current_,
196             "%lx-%lx %4s %lx %x:%x %ld %n",
197             start, end, flags, offset, &major, &minor,
198             &inode, &consumed) != 7)
199    return false;
200  current_ += consumed;
201  // Skip spaces.
202  while (current_ < next_line && *current_ == ' ')
203    current_++;
204  // Fill in the filename.
205  size_t i = 0;
206  while (current_ < next_line) {
207    if (filename && i < filename_size - 1)
208      filename[i++] = *current_;
209    current_++;
210  }
211  if (filename && i < filename_size)
212    filename[i] = 0;
213  current_ = next_line + 1;
214  return true;
215}
216
217#if 1
218
219// Gets the object name and the offset by walking AsanProcMaps.
220bool AsanProcMaps::GetObjectNameAndOffset(uintptr_t addr, uintptr_t *offset,
221                                          char filename[],
222                                          size_t filename_size) {
223  return IterateForObjectNameAndOffset(addr, offset, filename, filename_size);
224}
225
226#else
227// dl_iterate_phdr machinery is not working well for us.
228// We either need to fix it or get rid of it.
229struct DlIterateData {
230  int count;
231  uintptr_t addr;
232  uintptr_t offset;
233  char *filename;
234  size_t filename_size;
235};
236
237static int dl_iterate_phdr_callback(struct dl_phdr_info *info,
238                                    size_t size, void *raw_data) {
239  DlIterateData *data = (DlIterateData*)raw_data;
240  int count = data->count++;
241  if (info->dlpi_addr > data->addr)
242    return 0;
243  if (count == 0) {
244    // The first item (the main executable) does not have a so name,
245    // but we can just read it from /proc/self/exe.
246    size_t path_len = readlink("/proc/self/exe",
247                               data->filename, data->filename_size - 1);
248    data->filename[path_len] = 0;
249  } else {
250    CHECK(info->dlpi_name);
251    REAL(strncpy)(data->filename, info->dlpi_name, data->filename_size);
252  }
253  data->offset = data->addr - info->dlpi_addr;
254  return 1;
255}
256
257// Gets the object name and the offset using dl_iterate_phdr.
258bool AsanProcMaps::GetObjectNameAndOffset(uintptr_t addr, uintptr_t *offset,
259                                          char filename[],
260                                          size_t filename_size) {
261  DlIterateData data;
262  data.count = 0;
263  data.addr = addr;
264  data.filename = filename;
265  data.filename_size = filename_size;
266  if (dl_iterate_phdr(dl_iterate_phdr_callback, &data)) {
267    *offset = data.offset;
268    return true;
269  }
270  return false;
271}
272
273#endif  // __arm__
274
275void AsanThread::SetThreadStackTopAndBottom() {
276  if (tid() == 0) {
277    // This is the main thread. Libpthread may not be initialized yet.
278    struct rlimit rl;
279    CHECK(getrlimit(RLIMIT_STACK, &rl) == 0);
280
281    // Find the mapping that contains a stack variable.
282    AsanProcMaps proc_maps;
283    uintptr_t start, end, offset;
284    uintptr_t prev_end = 0;
285    while (proc_maps.Next(&start, &end, &offset, NULL, 0)) {
286      if ((uintptr_t)&rl < end)
287        break;
288      prev_end = end;
289    }
290    CHECK((uintptr_t)&rl >= start && (uintptr_t)&rl < end);
291
292    // Get stacksize from rlimit, but clip it so that it does not overlap
293    // with other mappings.
294    size_t stacksize = rl.rlim_cur;
295    if (stacksize > end - prev_end)
296      stacksize = end - prev_end;
297    if (stacksize > kMaxThreadStackSize)
298      stacksize = kMaxThreadStackSize;
299    stack_top_ = end;
300    stack_bottom_ = end - stacksize;
301    CHECK(AddrIsInStack((uintptr_t)&rl));
302    return;
303  }
304  pthread_attr_t attr;
305  CHECK(pthread_getattr_np(pthread_self(), &attr) == 0);
306  size_t stacksize = 0;
307  void *stackaddr = NULL;
308  pthread_attr_getstack(&attr, &stackaddr, &stacksize);
309  pthread_attr_destroy(&attr);
310
311  stack_top_ = (uintptr_t)stackaddr + stacksize;
312  stack_bottom_ = (uintptr_t)stackaddr;
313  // When running with unlimited stack size, we still want to set some limit.
314  // The unlimited stack size is caused by 'ulimit -s unlimited'.
315  // Also, for some reason, GNU make spawns subrocesses with unlimited stack.
316  if (stacksize > kMaxThreadStackSize) {
317    stack_bottom_ = stack_top_ - kMaxThreadStackSize;
318  }
319  CHECK(AddrIsInStack((uintptr_t)&attr));
320}
321
322AsanLock::AsanLock(LinkerInitialized) {
323  // We assume that pthread_mutex_t initialized to all zeroes is a valid
324  // unlocked mutex. We can not use PTHREAD_MUTEX_INITIALIZER as it triggers
325  // a gcc warning:
326  // extended initializer lists only available with -std=c++0x or -std=gnu++0x
327}
328
329void AsanLock::Lock() {
330  CHECK(sizeof(pthread_mutex_t) <= sizeof(opaque_storage_));
331  pthread_mutex_lock((pthread_mutex_t*)&opaque_storage_);
332  CHECK(!owner_);
333  owner_ = (uintptr_t)pthread_self();
334}
335
336void AsanLock::Unlock() {
337  CHECK(owner_ == (uintptr_t)pthread_self());
338  owner_ = 0;
339  pthread_mutex_unlock((pthread_mutex_t*)&opaque_storage_);
340}
341
342#ifdef __arm__
343#define UNWIND_STOP _URC_END_OF_STACK
344#define UNWIND_CONTINUE _URC_NO_REASON
345#else
346#define UNWIND_STOP _URC_NORMAL_STOP
347#define UNWIND_CONTINUE _URC_NO_REASON
348#endif
349
350uintptr_t Unwind_GetIP(struct _Unwind_Context *ctx) {
351#ifdef __arm__
352  uintptr_t val;
353  _Unwind_VRS_Result res = _Unwind_VRS_Get(ctx, _UVRSC_CORE,
354      15 /* r15 = PC */, _UVRSD_UINT32, &val);
355  CHECK(res == _UVRSR_OK && "_Unwind_VRS_Get failed");
356  // Clear the Thumb bit.
357  return val & ~(uintptr_t)1;
358#else
359  return _Unwind_GetIP(ctx);
360#endif
361}
362
363_Unwind_Reason_Code Unwind_Trace(struct _Unwind_Context *ctx,
364    void *param) {
365  AsanStackTrace *b = (AsanStackTrace*)param;
366  CHECK(b->size < b->max_size);
367  uintptr_t pc = Unwind_GetIP(ctx);
368  b->trace[b->size++] = pc;
369  if (b->size == b->max_size) return UNWIND_STOP;
370  return UNWIND_CONTINUE;
371}
372
373void AsanStackTrace::GetStackTrace(size_t max_s, uintptr_t pc, uintptr_t bp) {
374  size = 0;
375  trace[0] = pc;
376  if ((max_s) > 1) {
377    max_size = max_s;
378#ifdef __arm__
379    _Unwind_Backtrace(Unwind_Trace, this);
380#else
381     FastUnwindStack(pc, bp);
382#endif
383  }
384}
385
386}  // namespace __asan
387
388#endif  // __linux__
389