blob: 7ba690eb6b370161e7df23ae51890e1226b8269c [file] [log] [blame]
Alexey Samsonovae4d9ca2012-06-04 14:27:50 +00001//===-- sanitizer_linux.cc ------------------------------------------------===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is shared between AddressSanitizer and ThreadSanitizer
11// run-time libraries and implements linux-specific functions from
12// sanitizer_libc.h.
13//===----------------------------------------------------------------------===//
Evgeniy Stepanov24e13722013-03-19 14:33:38 +000014
15#include "sanitizer_platform.h"
Stephen Hines2d1fdb22014-05-28 23:58:16 -070016#if SANITIZER_FREEBSD || SANITIZER_LINUX
Alexey Samsonovae4d9ca2012-06-04 14:27:50 +000017
Stephen Hines86277eb2015-03-23 12:06:32 -070018#include "sanitizer_allocator_internal.h"
Alexey Samsonov6895adc2012-06-07 06:15:12 +000019#include "sanitizer_common.h"
Stephen Hines2d1fdb22014-05-28 23:58:16 -070020#include "sanitizer_flags.h"
Alexey Samsonov94b50362012-06-05 14:25:27 +000021#include "sanitizer_internal_defs.h"
Alexey Samsonovae4d9ca2012-06-04 14:27:50 +000022#include "sanitizer_libc.h"
Kostya Serebryany6fb47af2013-02-27 11:22:40 +000023#include "sanitizer_linux.h"
Alexander Potapenko93da8b62012-12-01 02:39:45 +000024#include "sanitizer_mutex.h"
Alexey Samsonova68633f2012-07-03 08:24:14 +000025#include "sanitizer_placement_new.h"
Alexey Samsonov6895adc2012-06-07 06:15:12 +000026#include "sanitizer_procmaps.h"
Kostya Serebryanya30c8f92012-12-13 09:34:23 +000027#include "sanitizer_stacktrace.h"
Alexander Potapenko5ce93fc2013-05-23 11:53:36 +000028#include "sanitizer_symbolizer.h"
Alexey Samsonovae4d9ca2012-06-04 14:27:50 +000029
Stephen Hines2d1fdb22014-05-28 23:58:16 -070030#if !SANITIZER_FREEBSD
Peter Collingbourne088ea2b2013-05-20 15:57:44 +000031#include <asm/param.h>
Stephen Hines2d1fdb22014-05-28 23:58:16 -070032#endif
33
Stephen Hines86277eb2015-03-23 12:06:32 -070034// For mips64, syscall(__NR_stat) fills the buffer in the 'struct kernel_stat'
35// format. Struct kernel_stat is defined as 'struct stat' in asm/stat.h. To
36// access stat from asm/stat.h, without conflicting with definition in
37// sys/stat.h, we use this trick.
38#if defined(__mips64)
Pirama Arumuga Nainarcdce50b2015-07-01 12:26:56 -070039#include <asm/unistd.h>
Stephen Hines86277eb2015-03-23 12:06:32 -070040#include <sys/types.h>
41#define stat kernel_stat
42#include <asm/stat.h>
43#undef stat
44#endif
45
Evgeniy Stepanovb114ed82013-03-13 08:19:53 +000046#include <dlfcn.h>
Alexey Samsonov35a7faf2013-02-27 13:03:35 +000047#include <errno.h>
Alexey Samsonovc5d46512012-06-05 07:05:10 +000048#include <fcntl.h>
Peter Collingbourne2e75ac92013-07-29 19:09:49 +000049#include <link.h>
Alexey Samsonove5931fd2012-06-07 07:13:46 +000050#include <pthread.h>
Alexey Samsonov0969bcf2012-06-18 08:44:30 +000051#include <sched.h>
Alexey Samsonovae4d9ca2012-06-04 14:27:50 +000052#include <sys/mman.h>
Kostya Serebryany6fb47af2013-02-27 11:22:40 +000053#include <sys/ptrace.h>
Alexey Samsonove5931fd2012-06-07 07:13:46 +000054#include <sys/resource.h>
Alexey Samsonovc5d46512012-06-05 07:05:10 +000055#include <sys/stat.h>
Alexey Samsonovae4d9ca2012-06-04 14:27:50 +000056#include <sys/syscall.h>
Alexey Samsonove5931fd2012-06-07 07:13:46 +000057#include <sys/time.h>
Alexey Samsonovae4d9ca2012-06-04 14:27:50 +000058#include <sys/types.h>
Pirama Arumuga Nainar7c915052015-04-08 08:58:29 -070059#include <ucontext.h>
Alexey Samsonovae4d9ca2012-06-04 14:27:50 +000060#include <unistd.h>
Alexey Samsonov35a7faf2013-02-27 13:03:35 +000061
Stephen Hines2d1fdb22014-05-28 23:58:16 -070062#if SANITIZER_FREEBSD
Stephen Hines6a211c52014-07-21 00:49:56 -070063#include <sys/sysctl.h>
Stephen Hines2d1fdb22014-05-28 23:58:16 -070064#include <machine/atomic.h>
65extern "C" {
66// <sys/umtx.h> must be included after <errno.h> and <sys/types.h> on
67// FreeBSD 9.2 and 10.0.
68#include <sys/umtx.h>
69}
Stephen Hines6a211c52014-07-21 00:49:56 -070070extern char **environ; // provided by crt1
Stephen Hines2d1fdb22014-05-28 23:58:16 -070071#endif // SANITIZER_FREEBSD
72
Evgeniy Stepanov24e13722013-03-19 14:33:38 +000073#if !SANITIZER_ANDROID
Alexey Samsonov35a7faf2013-02-27 13:03:35 +000074#include <sys/signal.h>
75#endif
Dmitry Vyukovfa5c41e2013-01-30 14:39:27 +000076
Stephen Hines2d1fdb22014-05-28 23:58:16 -070077#if SANITIZER_ANDROID
78#include <android/log.h>
79#include <sys/system_properties.h>
80#endif
81
82#if SANITIZER_LINUX
Dmitry Vyukov4bebe7b2013-03-21 06:24:31 +000083// <linux/time.h>
84struct kernel_timeval {
85 long tv_sec;
86 long tv_usec;
87};
88
Dmitry Vyukovfa5c41e2013-01-30 14:39:27 +000089// <linux/futex.h> is broken on some linux distributions.
90const int FUTEX_WAIT = 0;
91const int FUTEX_WAKE = 1;
Stephen Hines2d1fdb22014-05-28 23:58:16 -070092#endif // SANITIZER_LINUX
Alexey Samsonovae4d9ca2012-06-04 14:27:50 +000093
Stephen Hines2d1fdb22014-05-28 23:58:16 -070094// Are we using 32-bit or 64-bit Linux syscalls?
Kostya Serebryany5af39e52012-11-21 12:38:58 +000095// x32 (which defines __x86_64__) has SANITIZER_WORDSIZE == 32
Kostya Serebryany08bfe492012-11-20 08:57:26 +000096// but it still needs to use 64-bit syscalls.
Stephen Hines2d1fdb22014-05-28 23:58:16 -070097#if SANITIZER_LINUX && (defined(__x86_64__) || SANITIZER_WORDSIZE == 64)
Kostya Serebryany9d0dbba2012-11-19 07:53:36 +000098# define SANITIZER_LINUX_USES_64BIT_SYSCALLS 1
99#else
100# define SANITIZER_LINUX_USES_64BIT_SYSCALLS 0
101#endif
102
Alexey Samsonovae4d9ca2012-06-04 14:27:50 +0000103namespace __sanitizer {
104
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700105#if SANITIZER_LINUX && defined(__x86_64__)
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000106#include "sanitizer_syscall_linux_x86_64.inc"
107#else
108#include "sanitizer_syscall_generic.inc"
109#endif
110
Alexey Samsonove5931fd2012-06-07 07:13:46 +0000111// --------------- sanitizer_libc.h
Stephen Hines86277eb2015-03-23 12:06:32 -0700112uptr internal_mmap(void *addr, uptr length, int prot, int flags, int fd,
113 u64 offset) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700114#if SANITIZER_FREEBSD || SANITIZER_LINUX_USES_64BIT_SYSCALLS
115 return internal_syscall(SYSCALL(mmap), (uptr)addr, length, prot, flags, fd,
Kostya Serebryanye041c602013-11-06 17:47:39 +0000116 offset);
Alexey Samsonovae4d9ca2012-06-04 14:27:50 +0000117#else
Stephen Hines86277eb2015-03-23 12:06:32 -0700118 // mmap2 specifies file offset in 4096-byte units.
119 CHECK(IsAligned(offset, 4096));
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700120 return internal_syscall(SYSCALL(mmap2), addr, length, prot, flags, fd,
Stephen Hines86277eb2015-03-23 12:06:32 -0700121 offset / 4096);
Alexey Samsonovae4d9ca2012-06-04 14:27:50 +0000122#endif
123}
124
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000125uptr internal_munmap(void *addr, uptr length) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700126 return internal_syscall(SYSCALL(munmap), (uptr)addr, length);
Alexey Samsonov1f11d312012-06-05 09:49:25 +0000127}
128
Pirama Arumuga Nainar259f7062015-05-06 11:49:53 -0700129int internal_mprotect(void *addr, uptr length, int prot) {
130 return internal_syscall(SYSCALL(mprotect), (uptr)addr, length, prot);
131}
132
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000133uptr internal_close(fd_t fd) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700134 return internal_syscall(SYSCALL(close), fd);
Alexey Samsonova56aefd2012-06-05 08:32:53 +0000135}
136
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000137uptr internal_open(const char *filename, int flags) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700138#if SANITIZER_USES_CANONICAL_LINUX_SYSCALLS
139 return internal_syscall(SYSCALL(openat), AT_FDCWD, (uptr)filename, flags);
140#else
141 return internal_syscall(SYSCALL(open), (uptr)filename, flags);
142#endif
Alexey Samsonovee7cc442013-02-01 15:58:46 +0000143}
144
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000145uptr internal_open(const char *filename, int flags, u32 mode) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700146#if SANITIZER_USES_CANONICAL_LINUX_SYSCALLS
147 return internal_syscall(SYSCALL(openat), AT_FDCWD, (uptr)filename, flags,
148 mode);
149#else
150 return internal_syscall(SYSCALL(open), (uptr)filename, flags, mode);
151#endif
Alexey Samsonovee7cc442013-02-01 15:58:46 +0000152}
153
Alexey Samsonova56aefd2012-06-05 08:32:53 +0000154uptr internal_read(fd_t fd, void *buf, uptr count) {
Evgeniy Stepanov3334e122012-10-02 13:41:40 +0000155 sptr res;
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700156 HANDLE_EINTR(res, (sptr)internal_syscall(SYSCALL(read), fd, (uptr)buf,
157 count));
Evgeniy Stepanov3334e122012-10-02 13:41:40 +0000158 return res;
Alexey Samsonova56aefd2012-06-05 08:32:53 +0000159}
160
161uptr internal_write(fd_t fd, const void *buf, uptr count) {
Evgeniy Stepanov3334e122012-10-02 13:41:40 +0000162 sptr res;
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700163 HANDLE_EINTR(res, (sptr)internal_syscall(SYSCALL(write), fd, (uptr)buf,
164 count));
Evgeniy Stepanov3334e122012-10-02 13:41:40 +0000165 return res;
Alexey Samsonova56aefd2012-06-05 08:32:53 +0000166}
167
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700168uptr internal_ftruncate(fd_t fd, uptr size) {
169 sptr res;
Pirama Arumuga Nainar7c915052015-04-08 08:58:29 -0700170 HANDLE_EINTR(res, (sptr)internal_syscall(SYSCALL(ftruncate), fd,
171 (OFF_T)size));
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700172 return res;
173}
174
175#if !SANITIZER_LINUX_USES_64BIT_SYSCALLS && !SANITIZER_FREEBSD
Evgeniy Stepanov2be3a282013-05-07 12:47:04 +0000176static void stat64_to_stat(struct stat64 *in, struct stat *out) {
177 internal_memset(out, 0, sizeof(*out));
178 out->st_dev = in->st_dev;
179 out->st_ino = in->st_ino;
180 out->st_mode = in->st_mode;
181 out->st_nlink = in->st_nlink;
182 out->st_uid = in->st_uid;
183 out->st_gid = in->st_gid;
184 out->st_rdev = in->st_rdev;
185 out->st_size = in->st_size;
186 out->st_blksize = in->st_blksize;
187 out->st_blocks = in->st_blocks;
188 out->st_atime = in->st_atime;
189 out->st_mtime = in->st_mtime;
190 out->st_ctime = in->st_ctime;
191 out->st_ino = in->st_ino;
192}
193#endif
194
Stephen Hines86277eb2015-03-23 12:06:32 -0700195#if defined(__mips64)
196static void kernel_stat_to_stat(struct kernel_stat *in, struct stat *out) {
197 internal_memset(out, 0, sizeof(*out));
198 out->st_dev = in->st_dev;
199 out->st_ino = in->st_ino;
200 out->st_mode = in->st_mode;
201 out->st_nlink = in->st_nlink;
202 out->st_uid = in->st_uid;
203 out->st_gid = in->st_gid;
204 out->st_rdev = in->st_rdev;
205 out->st_size = in->st_size;
206 out->st_blksize = in->st_blksize;
207 out->st_blocks = in->st_blocks;
208 out->st_atime = in->st_atime_nsec;
209 out->st_mtime = in->st_mtime_nsec;
210 out->st_ctime = in->st_ctime_nsec;
211 out->st_ino = in->st_ino;
212}
213#endif
214
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000215uptr internal_stat(const char *path, void *buf) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700216#if SANITIZER_FREEBSD
217 return internal_syscall(SYSCALL(stat), path, buf);
218#elif SANITIZER_USES_CANONICAL_LINUX_SYSCALLS
219 return internal_syscall(SYSCALL(newfstatat), AT_FDCWD, (uptr)path,
220 (uptr)buf, 0);
221#elif SANITIZER_LINUX_USES_64BIT_SYSCALLS
Stephen Hines86277eb2015-03-23 12:06:32 -0700222# if defined(__mips64)
223 // For mips64, stat syscall fills buffer in the format of kernel_stat
224 struct kernel_stat kbuf;
225 int res = internal_syscall(SYSCALL(stat), path, &kbuf);
226 kernel_stat_to_stat(&kbuf, (struct stat *)buf);
227 return res;
228# else
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700229 return internal_syscall(SYSCALL(stat), (uptr)path, (uptr)buf);
Stephen Hines86277eb2015-03-23 12:06:32 -0700230# endif
Alexey Samsonov4c9317a2013-02-04 10:16:50 +0000231#else
Evgeniy Stepanov2be3a282013-05-07 12:47:04 +0000232 struct stat64 buf64;
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700233 int res = internal_syscall(SYSCALL(stat64), path, &buf64);
Evgeniy Stepanov2be3a282013-05-07 12:47:04 +0000234 stat64_to_stat(&buf64, (struct stat *)buf);
235 return res;
Alexey Samsonov4c9317a2013-02-04 10:16:50 +0000236#endif
237}
238
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000239uptr internal_lstat(const char *path, void *buf) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700240#if SANITIZER_FREEBSD
241 return internal_syscall(SYSCALL(lstat), path, buf);
242#elif SANITIZER_USES_CANONICAL_LINUX_SYSCALLS
243 return internal_syscall(SYSCALL(newfstatat), AT_FDCWD, (uptr)path,
244 (uptr)buf, AT_SYMLINK_NOFOLLOW);
245#elif SANITIZER_LINUX_USES_64BIT_SYSCALLS
246 return internal_syscall(SYSCALL(lstat), (uptr)path, (uptr)buf);
Alexey Samsonov4c9317a2013-02-04 10:16:50 +0000247#else
Evgeniy Stepanov2be3a282013-05-07 12:47:04 +0000248 struct stat64 buf64;
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700249 int res = internal_syscall(SYSCALL(lstat64), path, &buf64);
Evgeniy Stepanov2be3a282013-05-07 12:47:04 +0000250 stat64_to_stat(&buf64, (struct stat *)buf);
251 return res;
Alexey Samsonov4c9317a2013-02-04 10:16:50 +0000252#endif
253}
254
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000255uptr internal_fstat(fd_t fd, void *buf) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700256#if SANITIZER_FREEBSD || SANITIZER_LINUX_USES_64BIT_SYSCALLS
257 return internal_syscall(SYSCALL(fstat), fd, (uptr)buf);
Alexey Samsonov4c9317a2013-02-04 10:16:50 +0000258#else
Evgeniy Stepanov2be3a282013-05-07 12:47:04 +0000259 struct stat64 buf64;
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700260 int res = internal_syscall(SYSCALL(fstat64), fd, &buf64);
Evgeniy Stepanov2be3a282013-05-07 12:47:04 +0000261 stat64_to_stat(&buf64, (struct stat *)buf);
262 return res;
Alexey Samsonov4c9317a2013-02-04 10:16:50 +0000263#endif
264}
265
Alexey Samsonov8e820fc2012-06-06 07:30:33 +0000266uptr internal_filesize(fd_t fd) {
Alexey Samsonova68633f2012-07-03 08:24:14 +0000267 struct stat st;
Alexey Samsonov4c9317a2013-02-04 10:16:50 +0000268 if (internal_fstat(fd, &st))
269 return -1;
Alexey Samsonov8e820fc2012-06-06 07:30:33 +0000270 return (uptr)st.st_size;
271}
272
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000273uptr internal_dup2(int oldfd, int newfd) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700274#if SANITIZER_USES_CANONICAL_LINUX_SYSCALLS
275 return internal_syscall(SYSCALL(dup3), oldfd, newfd, 0);
276#else
277 return internal_syscall(SYSCALL(dup2), oldfd, newfd);
278#endif
Alexey Samsonov8e820fc2012-06-06 07:30:33 +0000279}
280
Alexey Samsonovd1b8f582012-09-05 14:48:24 +0000281uptr internal_readlink(const char *path, char *buf, uptr bufsize) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700282#if SANITIZER_USES_CANONICAL_LINUX_SYSCALLS
283 return internal_syscall(SYSCALL(readlinkat), AT_FDCWD,
284 (uptr)path, (uptr)buf, bufsize);
285#else
286 return internal_syscall(SYSCALL(readlink), (uptr)path, (uptr)buf, bufsize);
287#endif
Alexey Samsonovd1b8f582012-09-05 14:48:24 +0000288}
289
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000290uptr internal_unlink(const char *path) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700291#if SANITIZER_USES_CANONICAL_LINUX_SYSCALLS
292 return internal_syscall(SYSCALL(unlinkat), AT_FDCWD, (uptr)path, 0);
293#else
294 return internal_syscall(SYSCALL(unlink), (uptr)path);
295#endif
296}
297
298uptr internal_rename(const char *oldpath, const char *newpath) {
299#if SANITIZER_USES_CANONICAL_LINUX_SYSCALLS
300 return internal_syscall(SYSCALL(renameat), AT_FDCWD, (uptr)oldpath, AT_FDCWD,
301 (uptr)newpath);
302#else
303 return internal_syscall(SYSCALL(rename), (uptr)oldpath, (uptr)newpath);
304#endif
Dmitry Vyukov6d6ab9e2013-03-20 10:28:36 +0000305}
306
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000307uptr internal_sched_yield() {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700308 return internal_syscall(SYSCALL(sched_yield));
Alexey Samsonov0969bcf2012-06-18 08:44:30 +0000309}
310
Alexey Samsonovf8822472013-02-20 13:54:32 +0000311void internal__exit(int exitcode) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700312#if SANITIZER_FREEBSD
313 internal_syscall(SYSCALL(exit), exitcode);
314#else
315 internal_syscall(SYSCALL(exit_group), exitcode);
316#endif
Alexey Samsonovf8822472013-02-20 13:54:32 +0000317 Die(); // Unreachable.
318}
319
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000320uptr internal_execve(const char *filename, char *const argv[],
321 char *const envp[]) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700322 return internal_syscall(SYSCALL(execve), (uptr)filename, (uptr)argv,
323 (uptr)envp);
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000324}
325
Alexey Samsonove5931fd2012-06-07 07:13:46 +0000326// ----------------- sanitizer_common.h
Alexey Samsonov93b4caf2012-11-09 14:45:30 +0000327bool FileExists(const char *filename) {
Stephen Hines86277eb2015-03-23 12:06:32 -0700328 struct stat st;
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700329#if SANITIZER_USES_CANONICAL_LINUX_SYSCALLS
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700330 if (internal_syscall(SYSCALL(newfstatat), AT_FDCWD, filename, &st, 0))
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700331#else
Evgeniy Stepanov2be3a282013-05-07 12:47:04 +0000332 if (internal_stat(filename, &st))
Stephen Hines86277eb2015-03-23 12:06:32 -0700333#endif
Alexey Samsonov93b4caf2012-11-09 14:45:30 +0000334 return false;
Alexey Samsonov93b4caf2012-11-09 14:45:30 +0000335 // Sanity check: filename is a regular file.
336 return S_ISREG(st.st_mode);
337}
338
Dmitry Vyukove0023f72012-10-02 12:58:14 +0000339uptr GetTid() {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700340#if SANITIZER_FREEBSD
341 return (uptr)pthread_self();
342#else
343 return internal_syscall(SYSCALL(gettid));
344#endif
Dmitry Vyukove0023f72012-10-02 12:58:14 +0000345}
346
Dmitry Vyukov4bebe7b2013-03-21 06:24:31 +0000347u64 NanoTime() {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700348#if SANITIZER_FREEBSD
349 timeval tv;
350#else
Peter Collingbourne5e7ba222013-10-21 18:11:57 +0000351 kernel_timeval tv;
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700352#endif
Peter Collingbourne5e7ba222013-10-21 18:11:57 +0000353 internal_memset(&tv, 0, sizeof(tv));
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700354 internal_syscall(SYSCALL(gettimeofday), (uptr)&tv, 0);
Dmitry Vyukov4bebe7b2013-03-21 06:24:31 +0000355 return (u64)tv.tv_sec * 1000*1000*1000 + tv.tv_usec * 1000;
356}
357
Stephen Hines6a211c52014-07-21 00:49:56 -0700358// Like getenv, but reads env directly from /proc (on Linux) or parses the
359// 'environ' array (on FreeBSD) and does not use libc. This function should be
360// called first inside __asan_init.
Alexey Samsonov3dbeabb2012-06-14 14:07:21 +0000361const char *GetEnv(const char *name) {
Stephen Hines6a211c52014-07-21 00:49:56 -0700362#if SANITIZER_FREEBSD
363 if (::environ != 0) {
364 uptr NameLen = internal_strlen(name);
365 for (char **Env = ::environ; *Env != 0; Env++) {
366 if (internal_strncmp(*Env, name, NameLen) == 0 && (*Env)[NameLen] == '=')
367 return (*Env) + NameLen + 1;
368 }
369 }
370 return 0; // Not found.
371#elif SANITIZER_LINUX
Alexey Samsonov3dbeabb2012-06-14 14:07:21 +0000372 static char *environ;
373 static uptr len;
374 static bool inited;
375 if (!inited) {
376 inited = true;
377 uptr environ_size;
378 len = ReadFileToBuffer("/proc/self/environ",
379 &environ, &environ_size, 1 << 26);
380 }
381 if (!environ || len == 0) return 0;
382 uptr namelen = internal_strlen(name);
383 const char *p = environ;
384 while (*p != '\0') { // will happen at the \0\0 that terminates the buffer
385 // proc file has the format NAME=value\0NAME=value\0NAME=value\0...
386 const char* endp =
387 (char*)internal_memchr(p, '\0', len - (p - environ));
388 if (endp == 0) // this entry isn't NUL terminated
389 return 0;
390 else if (!internal_memcmp(p, name, namelen) && p[namelen] == '=') // Match.
391 return p + namelen + 1; // point after =
392 p = endp + 1;
393 }
394 return 0; // Not found.
Stephen Hines6a211c52014-07-21 00:49:56 -0700395#else
396#error "Unsupported platform"
397#endif
Alexey Samsonov3dbeabb2012-06-14 14:07:21 +0000398}
399
Evgeniy Stepanoveab06112013-02-14 14:40:03 +0000400extern "C" {
Timur Iskhodzhanov3c80c6c2013-08-13 11:42:45 +0000401 SANITIZER_WEAK_ATTRIBUTE extern void *__libc_stack_end;
Evgeniy Stepanoveab06112013-02-14 14:40:03 +0000402}
403
Peter Collingbourne26337b62013-05-20 14:25:32 +0000404#if !SANITIZER_GO
Peter Collingbourne23709c92013-01-17 19:50:42 +0000405static void ReadNullSepFileToArray(const char *path, char ***arr,
406 int arr_size) {
407 char *buff;
Alexey Samsonovd7e5bb42012-09-17 09:12:39 +0000408 uptr buff_size = 0;
Peter Collingbourne23709c92013-01-17 19:50:42 +0000409 *arr = (char **)MmapOrDie(arr_size * sizeof(char *), "NullSepFileArray");
410 ReadFileToBuffer(path, &buff, &buff_size, 1024 * 1024);
411 (*arr)[0] = buff;
412 int count, i;
413 for (count = 1, i = 1; ; i++) {
Alexey Samsonovd7e5bb42012-09-17 09:12:39 +0000414 if (buff[i] == 0) {
415 if (buff[i+1] == 0) break;
Peter Collingbourne23709c92013-01-17 19:50:42 +0000416 (*arr)[count] = &buff[i+1];
417 CHECK_LE(count, arr_size - 1); // FIXME: make this more flexible.
418 count++;
Alexey Samsonovd7e5bb42012-09-17 09:12:39 +0000419 }
420 }
Peter Collingbourne23709c92013-01-17 19:50:42 +0000421 (*arr)[count] = 0;
422}
Peter Collingbourne26337b62013-05-20 14:25:32 +0000423#endif
Peter Collingbourne23709c92013-01-17 19:50:42 +0000424
Peter Collingbourne26337b62013-05-20 14:25:32 +0000425static void GetArgsAndEnv(char*** argv, char*** envp) {
426#if !SANITIZER_GO
427 if (&__libc_stack_end) {
428#endif
429 uptr* stack_end = (uptr*)__libc_stack_end;
430 int argc = *stack_end;
431 *argv = (char**)(stack_end + 1);
432 *envp = (char**)(stack_end + argc + 2);
433#if !SANITIZER_GO
434 } else {
435 static const int kMaxArgv = 2000, kMaxEnvp = 2000;
436 ReadNullSepFileToArray("/proc/self/cmdline", argv, kMaxArgv);
437 ReadNullSepFileToArray("/proc/self/environ", envp, kMaxEnvp);
438 }
439#endif
Evgeniy Stepanoveab06112013-02-14 14:40:03 +0000440}
441
Evgeniy Stepanoveab06112013-02-14 14:40:03 +0000442void ReExec() {
Peter Collingbourne23709c92013-01-17 19:50:42 +0000443 char **argv, **envp;
Evgeniy Stepanoveab06112013-02-14 14:40:03 +0000444 GetArgsAndEnv(&argv, &envp);
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000445 uptr rv = internal_execve("/proc/self/exe", argv, envp);
446 int rverrno;
447 CHECK_EQ(internal_iserror(rv, &rverrno), true);
448 Printf("execve failed, errno %d\n", rverrno);
Evgeniy Stepanovf35eae82013-02-19 11:09:29 +0000449 Die();
Alexey Samsonovd7e5bb42012-09-17 09:12:39 +0000450}
451
Dmitry Vyukovf4f51f22013-01-14 07:51:39 +0000452enum MutexState {
453 MtxUnlocked = 0,
454 MtxLocked = 1,
455 MtxSleeping = 2
456};
457
Alexey Samsonov93af5942013-03-14 13:30:56 +0000458BlockingMutex::BlockingMutex() {
459 internal_memset(this, 0, sizeof(*this));
460}
461
Dmitry Vyukovf4f51f22013-01-14 07:51:39 +0000462void BlockingMutex::Lock() {
Stephen Hines86277eb2015-03-23 12:06:32 -0700463 CHECK_EQ(owner_, 0);
Dmitry Vyukovf4f51f22013-01-14 07:51:39 +0000464 atomic_uint32_t *m = reinterpret_cast<atomic_uint32_t *>(&opaque_storage_);
465 if (atomic_exchange(m, MtxLocked, memory_order_acquire) == MtxUnlocked)
466 return;
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700467 while (atomic_exchange(m, MtxSleeping, memory_order_acquire) != MtxUnlocked) {
468#if SANITIZER_FREEBSD
469 _umtx_op(m, UMTX_OP_WAIT_UINT, MtxSleeping, 0, 0);
470#else
471 internal_syscall(SYSCALL(futex), (uptr)m, FUTEX_WAIT, MtxSleeping, 0, 0, 0);
472#endif
473 }
Dmitry Vyukovf4f51f22013-01-14 07:51:39 +0000474}
475
476void BlockingMutex::Unlock() {
477 atomic_uint32_t *m = reinterpret_cast<atomic_uint32_t *>(&opaque_storage_);
478 u32 v = atomic_exchange(m, MtxUnlocked, memory_order_relaxed);
Dmitry Vyukov48526012013-01-14 08:01:58 +0000479 CHECK_NE(v, MtxUnlocked);
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700480 if (v == MtxSleeping) {
481#if SANITIZER_FREEBSD
482 _umtx_op(m, UMTX_OP_WAKE, 1, 0, 0);
483#else
484 internal_syscall(SYSCALL(futex), (uptr)m, FUTEX_WAKE, 1, 0, 0, 0);
485#endif
486 }
Dmitry Vyukovf4f51f22013-01-14 07:51:39 +0000487}
488
Alexey Samsonovce700972013-03-11 15:45:20 +0000489void BlockingMutex::CheckLocked() {
490 atomic_uint32_t *m = reinterpret_cast<atomic_uint32_t *>(&opaque_storage_);
491 CHECK_NE(MtxUnlocked, atomic_load(m, memory_order_relaxed));
492}
493
Kostya Serebryany6fb47af2013-02-27 11:22:40 +0000494// ----------------- sanitizer_linux.h
495// The actual size of this structure is specified by d_reclen.
496// Note that getdents64 uses a different structure format. We only provide the
497// 32-bit syscall here.
498struct linux_dirent {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700499#if SANITIZER_X32
500 u64 d_ino;
501 u64 d_off;
502#else
Kostya Serebryany6fb47af2013-02-27 11:22:40 +0000503 unsigned long d_ino;
504 unsigned long d_off;
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700505#endif
Kostya Serebryany6fb47af2013-02-27 11:22:40 +0000506 unsigned short d_reclen;
507 char d_name[256];
508};
509
510// Syscall wrappers.
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000511uptr internal_ptrace(int request, int pid, void *addr, void *data) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700512 return internal_syscall(SYSCALL(ptrace), request, pid, (uptr)addr,
513 (uptr)data);
Kostya Serebryany6fb47af2013-02-27 11:22:40 +0000514}
515
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000516uptr internal_waitpid(int pid, int *status, int options) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700517 return internal_syscall(SYSCALL(wait4), pid, (uptr)status, options,
Kostya Serebryanye041c602013-11-06 17:47:39 +0000518 0 /* rusage */);
Kostya Serebryany6fb47af2013-02-27 11:22:40 +0000519}
520
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000521uptr internal_getpid() {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700522 return internal_syscall(SYSCALL(getpid));
Kostya Serebryany6fb47af2013-02-27 11:22:40 +0000523}
524
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000525uptr internal_getppid() {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700526 return internal_syscall(SYSCALL(getppid));
Kostya Serebryany6fb47af2013-02-27 11:22:40 +0000527}
528
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000529uptr internal_getdents(fd_t fd, struct linux_dirent *dirp, unsigned int count) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700530#if SANITIZER_USES_CANONICAL_LINUX_SYSCALLS
531 return internal_syscall(SYSCALL(getdents64), fd, (uptr)dirp, count);
532#else
533 return internal_syscall(SYSCALL(getdents), fd, (uptr)dirp, count);
534#endif
Kostya Serebryany6fb47af2013-02-27 11:22:40 +0000535}
536
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000537uptr internal_lseek(fd_t fd, OFF_T offset, int whence) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700538 return internal_syscall(SYSCALL(lseek), fd, offset, whence);
Kostya Serebryany6fb47af2013-02-27 11:22:40 +0000539}
540
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700541#if SANITIZER_LINUX
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000542uptr internal_prctl(int option, uptr arg2, uptr arg3, uptr arg4, uptr arg5) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700543 return internal_syscall(SYSCALL(prctl), option, arg2, arg3, arg4, arg5);
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000544}
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700545#endif
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000546
547uptr internal_sigaltstack(const struct sigaltstack *ss,
Kostya Serebryany6fb47af2013-02-27 11:22:40 +0000548 struct sigaltstack *oss) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700549 return internal_syscall(SYSCALL(sigaltstack), (uptr)ss, (uptr)oss);
Kostya Serebryany6fb47af2013-02-27 11:22:40 +0000550}
551
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700552int internal_fork() {
553#if SANITIZER_USES_CANONICAL_LINUX_SYSCALLS
554 return internal_syscall(SYSCALL(clone), SIGCHLD, 0);
555#else
556 return internal_syscall(SYSCALL(fork));
557#endif
Dmitry Vyukov0f7a2ac2013-10-15 11:31:51 +0000558}
559
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700560#if SANITIZER_LINUX
Pirama Arumuga Nainar7c915052015-04-08 08:58:29 -0700561#define SA_RESTORER 0x04000000
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700562// Doesn't set sa_restorer, use with caution (see below).
563int internal_sigaction_norestorer(int signum, const void *act, void *oldact) {
564 __sanitizer_kernel_sigaction_t k_act, k_oldact;
565 internal_memset(&k_act, 0, sizeof(__sanitizer_kernel_sigaction_t));
566 internal_memset(&k_oldact, 0, sizeof(__sanitizer_kernel_sigaction_t));
Stephen Hines6d186232014-11-26 17:56:19 -0800567 const __sanitizer_sigaction *u_act = (const __sanitizer_sigaction *)act;
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700568 __sanitizer_sigaction *u_oldact = (__sanitizer_sigaction *)oldact;
569 if (u_act) {
570 k_act.handler = u_act->handler;
571 k_act.sigaction = u_act->sigaction;
572 internal_memcpy(&k_act.sa_mask, &u_act->sa_mask,
573 sizeof(__sanitizer_kernel_sigset_t));
Pirama Arumuga Nainar7c915052015-04-08 08:58:29 -0700574 // Without SA_RESTORER kernel ignores the calls (probably returns EINVAL).
575 k_act.sa_flags = u_act->sa_flags | SA_RESTORER;
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700576 // FIXME: most often sa_restorer is unset, however the kernel requires it
577 // to point to a valid signal restorer that calls the rt_sigreturn syscall.
578 // If sa_restorer passed to the kernel is NULL, the program may crash upon
579 // signal delivery or fail to unwind the stack in the signal handler.
580 // libc implementation of sigaction() passes its own restorer to
581 // rt_sigaction, so we need to do the same (we'll need to reimplement the
582 // restorers; for x86_64 the restorer address can be obtained from
583 // oldact->sa_restorer upon a call to sigaction(xxx, NULL, oldact).
584 k_act.sa_restorer = u_act->sa_restorer;
585 }
586
587 uptr result = internal_syscall(SYSCALL(rt_sigaction), (uptr)signum,
588 (uptr)(u_act ? &k_act : NULL),
589 (uptr)(u_oldact ? &k_oldact : NULL),
590 (uptr)sizeof(__sanitizer_kernel_sigset_t));
591
592 if ((result == 0) && u_oldact) {
593 u_oldact->handler = k_oldact.handler;
594 u_oldact->sigaction = k_oldact.sigaction;
595 internal_memcpy(&u_oldact->sa_mask, &k_oldact.sa_mask,
596 sizeof(__sanitizer_kernel_sigset_t));
597 u_oldact->sa_flags = k_oldact.sa_flags;
598 u_oldact->sa_restorer = k_oldact.sa_restorer;
599 }
600 return result;
601}
602#endif // SANITIZER_LINUX
603
604uptr internal_sigprocmask(int how, __sanitizer_sigset_t *set,
605 __sanitizer_sigset_t *oldset) {
606#if SANITIZER_FREEBSD
607 return internal_syscall(SYSCALL(sigprocmask), how, set, oldset);
608#else
609 __sanitizer_kernel_sigset_t *k_set = (__sanitizer_kernel_sigset_t *)set;
610 __sanitizer_kernel_sigset_t *k_oldset = (__sanitizer_kernel_sigset_t *)oldset;
611 return internal_syscall(SYSCALL(rt_sigprocmask), (uptr)how,
612 (uptr)&k_set->sig[0], (uptr)&k_oldset->sig[0],
613 sizeof(__sanitizer_kernel_sigset_t));
614#endif
Dmitry Vyukov0f7a2ac2013-10-15 11:31:51 +0000615}
616
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700617void internal_sigfillset(__sanitizer_sigset_t *set) {
Dmitry Vyukov0f7a2ac2013-10-15 11:31:51 +0000618 internal_memset(set, 0xff, sizeof(*set));
619}
620
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700621#if SANITIZER_LINUX
622void internal_sigdelset(__sanitizer_sigset_t *set, int signum) {
Dmitry Vyukov0f7a2ac2013-10-15 11:31:51 +0000623 signum -= 1;
624 CHECK_GE(signum, 0);
625 CHECK_LT(signum, sizeof(*set) * 8);
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700626 __sanitizer_kernel_sigset_t *k_set = (__sanitizer_kernel_sigset_t *)set;
627 const uptr idx = signum / (sizeof(k_set->sig[0]) * 8);
628 const uptr bit = signum % (sizeof(k_set->sig[0]) * 8);
629 k_set->sig[idx] &= ~(1 << bit);
Dmitry Vyukov0f7a2ac2013-10-15 11:31:51 +0000630}
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700631#endif // SANITIZER_LINUX
Dmitry Vyukov0f7a2ac2013-10-15 11:31:51 +0000632
Kostya Serebryany6fb47af2013-02-27 11:22:40 +0000633// ThreadLister implementation.
634ThreadLister::ThreadLister(int pid)
635 : pid_(pid),
636 descriptor_(-1),
Alexey Samsonov10f3ab72013-04-05 07:41:21 +0000637 buffer_(4096),
Kostya Serebryany6fb47af2013-02-27 11:22:40 +0000638 error_(true),
Alexey Samsonov10f3ab72013-04-05 07:41:21 +0000639 entry_((struct linux_dirent *)buffer_.data()),
Kostya Serebryany6fb47af2013-02-27 11:22:40 +0000640 bytes_read_(0) {
641 char task_directory_path[80];
642 internal_snprintf(task_directory_path, sizeof(task_directory_path),
643 "/proc/%d/task/", pid);
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000644 uptr openrv = internal_open(task_directory_path, O_RDONLY | O_DIRECTORY);
645 if (internal_iserror(openrv)) {
Kostya Serebryany6fb47af2013-02-27 11:22:40 +0000646 error_ = true;
647 Report("Can't open /proc/%d/task for reading.\n", pid);
648 } else {
649 error_ = false;
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000650 descriptor_ = openrv;
Kostya Serebryany6fb47af2013-02-27 11:22:40 +0000651 }
652}
653
654int ThreadLister::GetNextTID() {
655 int tid = -1;
656 do {
657 if (error_)
658 return -1;
659 if ((char *)entry_ >= &buffer_[bytes_read_] && !GetDirectoryEntries())
660 return -1;
661 if (entry_->d_ino != 0 && entry_->d_name[0] >= '0' &&
662 entry_->d_name[0] <= '9') {
663 // Found a valid tid.
664 tid = (int)internal_atoll(entry_->d_name);
665 }
666 entry_ = (struct linux_dirent *)(((char *)entry_) + entry_->d_reclen);
667 } while (tid < 0);
668 return tid;
669}
670
671void ThreadLister::Reset() {
672 if (error_ || descriptor_ < 0)
673 return;
674 internal_lseek(descriptor_, 0, SEEK_SET);
675}
676
677ThreadLister::~ThreadLister() {
678 if (descriptor_ >= 0)
679 internal_close(descriptor_);
680}
681
682bool ThreadLister::error() { return error_; }
683
684bool ThreadLister::GetDirectoryEntries() {
685 CHECK_GE(descriptor_, 0);
686 CHECK_NE(error_, true);
687 bytes_read_ = internal_getdents(descriptor_,
Alexey Samsonov10f3ab72013-04-05 07:41:21 +0000688 (struct linux_dirent *)buffer_.data(),
689 buffer_.size());
Peter Collingbourne9578a3e2013-05-08 14:43:49 +0000690 if (internal_iserror(bytes_read_)) {
Kostya Serebryany6fb47af2013-02-27 11:22:40 +0000691 Report("Can't read directory entries from /proc/%d/task.\n", pid_);
692 error_ = true;
693 return false;
694 } else if (bytes_read_ == 0) {
695 return false;
696 }
Alexey Samsonov10f3ab72013-04-05 07:41:21 +0000697 entry_ = (struct linux_dirent *)buffer_.data();
Kostya Serebryany6fb47af2013-02-27 11:22:40 +0000698 return true;
699}
700
Peter Collingbourne4df343a2013-05-20 17:05:29 +0000701uptr GetPageSize() {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700702#if SANITIZER_LINUX && (defined(__x86_64__) || defined(__i386__))
Peter Collingbourne4df343a2013-05-20 17:05:29 +0000703 return EXEC_PAGESIZE;
Kostya Serebryanya8bc34e2013-05-21 06:15:50 +0000704#else
705 return sysconf(_SC_PAGESIZE); // EXEC_PAGESIZE may not be trustworthy.
706#endif
Peter Collingbourne4df343a2013-05-20 17:05:29 +0000707}
708
Alexey Samsonov7847d772013-09-10 14:36:16 +0000709uptr ReadBinaryName(/*out*/char *buf, uptr buf_len) {
Stephen Hines6a211c52014-07-21 00:49:56 -0700710#if SANITIZER_FREEBSD
Pirama Arumuga Nainarcdce50b2015-07-01 12:26:56 -0700711 const int Mib[] = { CTL_KERN, KERN_PROC, KERN_PROC_PATHNAME, -1 };
712 const char *default_module_name = "kern.proc.pathname";
Stephen Hines6a211c52014-07-21 00:49:56 -0700713 size_t Size = buf_len;
Pirama Arumuga Nainarcdce50b2015-07-01 12:26:56 -0700714 bool IsErr = (sysctl(Mib, ARRAY_SIZE(Mib), buf, &Size, NULL, 0) != 0);
Stephen Hines6a211c52014-07-21 00:49:56 -0700715 int readlink_error = IsErr ? errno : 0;
716 uptr module_name_len = Size;
717#else
Pirama Arumuga Nainarcdce50b2015-07-01 12:26:56 -0700718 const char *default_module_name = "/proc/self/exe";
Alexey Samsonov7847d772013-09-10 14:36:16 +0000719 uptr module_name_len = internal_readlink(
Pirama Arumuga Nainarcdce50b2015-07-01 12:26:56 -0700720 default_module_name, buf, buf_len);
Alexey Samsonov7847d772013-09-10 14:36:16 +0000721 int readlink_error;
Stephen Hines6a211c52014-07-21 00:49:56 -0700722 bool IsErr = internal_iserror(module_name_len, &readlink_error);
723#endif
724 if (IsErr) {
Pirama Arumuga Nainarcdce50b2015-07-01 12:26:56 -0700725 // We can't read binary name for some reason, assume it's unknown.
726 Report("WARNING: reading executable name failed with errno %d, "
Stephen Hines6a211c52014-07-21 00:49:56 -0700727 "some stack frames may not be symbolized\n", readlink_error);
Pirama Arumuga Nainarcdce50b2015-07-01 12:26:56 -0700728 module_name_len = internal_snprintf(buf, buf_len, "%s",
729 default_module_name);
Alexey Samsonov7847d772013-09-10 14:36:16 +0000730 CHECK_LT(module_name_len, buf_len);
Alexey Samsonov7847d772013-09-10 14:36:16 +0000731 }
732 return module_name_len;
733}
734
Sergey Matveev3de00862013-05-14 13:24:46 +0000735// Match full names of the form /path/to/base_name{-,.}*
736bool LibraryNameIs(const char *full_name, const char *base_name) {
737 const char *name = full_name;
738 // Strip path.
739 while (*name != '\0') name++;
740 while (name > full_name && *name != '/') name--;
741 if (*name == '/') name++;
742 uptr base_name_length = internal_strlen(base_name);
743 if (internal_strncmp(name, base_name, base_name_length)) return false;
744 return (name[base_name_length] == '-' || name[base_name_length] == '.');
745}
746
Evgeniy Stepanovd054abe2013-07-30 08:39:16 +0000747#if !SANITIZER_ANDROID
Peter Collingbourne2e75ac92013-07-29 19:09:49 +0000748// Call cb for each region mapped by map.
749void ForEachMappedRegion(link_map *map, void (*cb)(const void *, uptr)) {
Stephen Hines86277eb2015-03-23 12:06:32 -0700750 CHECK_NE(map, nullptr);
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700751#if !SANITIZER_FREEBSD
Peter Collingbourne2e75ac92013-07-29 19:09:49 +0000752 typedef ElfW(Phdr) Elf_Phdr;
753 typedef ElfW(Ehdr) Elf_Ehdr;
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700754#endif // !SANITIZER_FREEBSD
Peter Collingbourne2e75ac92013-07-29 19:09:49 +0000755 char *base = (char *)map->l_addr;
756 Elf_Ehdr *ehdr = (Elf_Ehdr *)base;
757 char *phdrs = base + ehdr->e_phoff;
758 char *phdrs_end = phdrs + ehdr->e_phnum * ehdr->e_phentsize;
759
760 // Find the segment with the minimum base so we can "relocate" the p_vaddr
761 // fields. Typically ET_DYN objects (DSOs) have base of zero and ET_EXEC
762 // objects have a non-zero base.
Peter Collingbournef50b0fc2013-07-29 20:13:41 +0000763 uptr preferred_base = (uptr)-1;
Peter Collingbourne2e75ac92013-07-29 19:09:49 +0000764 for (char *iter = phdrs; iter != phdrs_end; iter += ehdr->e_phentsize) {
765 Elf_Phdr *phdr = (Elf_Phdr *)iter;
766 if (phdr->p_type == PT_LOAD && preferred_base > (uptr)phdr->p_vaddr)
767 preferred_base = (uptr)phdr->p_vaddr;
768 }
769
770 // Compute the delta from the real base to get a relocation delta.
771 sptr delta = (uptr)base - preferred_base;
772 // Now we can figure out what the loader really mapped.
773 for (char *iter = phdrs; iter != phdrs_end; iter += ehdr->e_phentsize) {
774 Elf_Phdr *phdr = (Elf_Phdr *)iter;
775 if (phdr->p_type == PT_LOAD) {
776 uptr seg_start = phdr->p_vaddr + delta;
777 uptr seg_end = seg_start + phdr->p_memsz;
778 // None of these values are aligned. We consider the ragged edges of the
779 // load command as defined, since they are mapped from the file.
780 seg_start = RoundDownTo(seg_start, GetPageSizeCached());
781 seg_end = RoundUpTo(seg_end, GetPageSizeCached());
782 cb((void *)seg_start, seg_end - seg_start);
783 }
784 }
785}
Evgeniy Stepanovd054abe2013-07-30 08:39:16 +0000786#endif
Peter Collingbourne2e75ac92013-07-29 19:09:49 +0000787
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700788#if defined(__x86_64__) && SANITIZER_LINUX
Sergey Matveevcb339102013-09-02 11:36:19 +0000789// We cannot use glibc's clone wrapper, because it messes with the child
790// task's TLS. It writes the PID and TID of the child task to its thread
791// descriptor, but in our case the child task shares the thread descriptor with
792// the parent (because we don't know how to allocate a new thread
793// descriptor to keep glibc happy). So the stock version of clone(), when
794// used with CLONE_VM, would end up corrupting the parent's thread descriptor.
795uptr internal_clone(int (*fn)(void *), void *child_stack, int flags, void *arg,
796 int *parent_tidptr, void *newtls, int *child_tidptr) {
797 long long res;
798 if (!fn || !child_stack)
799 return -EINVAL;
800 CHECK_EQ(0, (uptr)child_stack % 16);
Kostya Serebryanye041c602013-11-06 17:47:39 +0000801 child_stack = (char *)child_stack - 2 * sizeof(unsigned long long);
802 ((unsigned long long *)child_stack)[0] = (uptr)fn;
803 ((unsigned long long *)child_stack)[1] = (uptr)arg;
804 register void *r8 __asm__("r8") = newtls;
805 register int *r10 __asm__("r10") = child_tidptr;
Sergey Matveevcb339102013-09-02 11:36:19 +0000806 __asm__ __volatile__(
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700807 /* %rax = syscall(%rax = SYSCALL(clone),
Sergey Matveevcb339102013-09-02 11:36:19 +0000808 * %rdi = flags,
809 * %rsi = child_stack,
810 * %rdx = parent_tidptr,
811 * %r8 = new_tls,
812 * %r10 = child_tidptr)
813 */
Sergey Matveevcb339102013-09-02 11:36:19 +0000814 "syscall\n"
815
816 /* if (%rax != 0)
817 * return;
818 */
819 "testq %%rax,%%rax\n"
820 "jnz 1f\n"
821
822 /* In the child. Terminate unwind chain. */
Sergey Matveev497ae562013-10-08 16:38:39 +0000823 // XXX: We should also terminate the CFI unwind chain
824 // here. Unfortunately clang 3.2 doesn't support the
825 // necessary CFI directives, so we skip that part.
Sergey Matveevcb339102013-09-02 11:36:19 +0000826 "xorq %%rbp,%%rbp\n"
827
828 /* Call "fn(arg)". */
829 "popq %%rax\n"
830 "popq %%rdi\n"
831 "call *%%rax\n"
832
833 /* Call _exit(%rax). */
834 "movq %%rax,%%rdi\n"
835 "movq %2,%%rax\n"
836 "syscall\n"
837
838 /* Return to parent. */
839 "1:\n"
840 : "=a" (res)
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700841 : "a"(SYSCALL(clone)), "i"(SYSCALL(exit)),
Sergey Matveevcb339102013-09-02 11:36:19 +0000842 "S"(child_stack),
843 "D"(flags),
844 "d"(parent_tidptr),
Kostya Serebryanye041c602013-11-06 17:47:39 +0000845 "r"(r8),
846 "r"(r10)
847 : "rsp", "memory", "r11", "rcx");
Sergey Matveevcb339102013-09-02 11:36:19 +0000848 return res;
849}
Stephen Hines86277eb2015-03-23 12:06:32 -0700850#elif defined(__mips__)
Stephen Hines86277eb2015-03-23 12:06:32 -0700851uptr internal_clone(int (*fn)(void *), void *child_stack, int flags, void *arg,
852 int *parent_tidptr, void *newtls, int *child_tidptr) {
Pirama Arumuga Nainarcdce50b2015-07-01 12:26:56 -0700853 long long res;
854 if (!fn || !child_stack)
855 return -EINVAL;
856 CHECK_EQ(0, (uptr)child_stack % 16);
857 child_stack = (char *)child_stack - 2 * sizeof(unsigned long long);
858 ((unsigned long long *)child_stack)[0] = (uptr)fn;
859 ((unsigned long long *)child_stack)[1] = (uptr)arg;
860 register void *a3 __asm__("$7") = newtls;
861 register int *a4 __asm__("$8") = child_tidptr;
862 // We don't have proper CFI directives here because it requires alot of code
863 // for very marginal benefits.
864 __asm__ __volatile__(
865 /* $v0 = syscall($v0 = __NR_clone,
866 * $a0 = flags,
867 * $a1 = child_stack,
868 * $a2 = parent_tidptr,
869 * $a3 = new_tls,
870 * $a4 = child_tidptr)
871 */
872 ".cprestore 16;\n"
873 "move $4,%1;\n"
874 "move $5,%2;\n"
875 "move $6,%3;\n"
876 "move $7,%4;\n"
877 /* Store the fifth argument on stack
878 * if we are using 32-bit abi.
879 */
880#if SANITIZER_WORDSIZE == 32
881 "lw %5,16($29);\n"
882#else
883 "move $8,%5;\n"
884#endif
885 "li $2,%6;\n"
886 "syscall;\n"
887
888 /* if ($v0 != 0)
889 * return;
890 */
891 "bnez $2,1f;\n"
892
893 /* Call "fn(arg)". */
894 "ld $25,0($29);\n"
895 "ld $4,8($29);\n"
896 "jal $25;\n"
897
898 /* Call _exit($v0). */
899 "move $4,$2;\n"
900 "li $2,%7;\n"
901 "syscall;\n"
902
903 /* Return to parent. */
904 "1:\n"
905 : "=r" (res)
906 : "r"(flags),
907 "r"(child_stack),
908 "r"(parent_tidptr),
909 "r"(a3),
910 "r"(a4),
911 "i"(__NR_clone),
912 "i"(__NR_exit)
913 : "memory", "$29" );
914 return res;
Stephen Hines86277eb2015-03-23 12:06:32 -0700915}
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700916#endif // defined(__x86_64__) && SANITIZER_LINUX
917
918#if SANITIZER_ANDROID
Evgeniy Stepanovaafc5c82014-09-15 11:37:40 +0000919static atomic_uint8_t android_log_initialized;
920
921void AndroidLogInit() {
922 atomic_store(&android_log_initialized, 1, memory_order_release);
923}
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700924// This thing is not, strictly speaking, async signal safe, but it does not seem
925// to cause any issues. Alternative is writing to log devices directly, but
926// their location and message format might change in the future, so we'd really
927// like to avoid that.
928void AndroidLogWrite(const char *buffer) {
Evgeniy Stepanovaafc5c82014-09-15 11:37:40 +0000929 if (!atomic_load(&android_log_initialized, memory_order_acquire))
930 return;
931
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700932 char *copy = internal_strdup(buffer);
933 char *p = copy;
934 char *q;
935 // __android_log_write has an implicit message length limit.
936 // Print one line at a time.
937 do {
938 q = internal_strchr(p, '\n');
939 if (q) *q = '\0';
940 __android_log_write(ANDROID_LOG_INFO, NULL, p);
941 if (q) p = q + 1;
942 } while (q);
943 InternalFree(copy);
944}
945
946void GetExtraActivationFlags(char *buf, uptr size) {
947 CHECK(size > PROP_VALUE_MAX);
948 __system_property_get("asan.options", buf);
949}
Pirama Arumuga Nainarcdce50b2015-07-01 12:26:56 -0700950
951#if __ANDROID_API__ < 21
952extern "C" __attribute__((weak)) int dl_iterate_phdr(
953 int (*)(struct dl_phdr_info *, size_t, void *), void *);
954#endif
955
956static int dl_iterate_phdr_test_cb(struct dl_phdr_info *info, size_t size,
957 void *data) {
958 // Any name starting with "lib" indicated a bug in L where library base names
959 // are returned instead of paths.
960 if (info->dlpi_name && info->dlpi_name[0] == 'l' &&
961 info->dlpi_name[1] == 'i' && info->dlpi_name[2] == 'b') {
962 *(bool *)data = true;
963 return 1;
964 }
965 return 0;
966}
967
968static atomic_uint32_t android_api_level;
969
970static u32 AndroidDetectApiLevel() {
971 if (!&dl_iterate_phdr)
972 return 19; // K or lower
973 bool base_name_seen = false;
974 dl_iterate_phdr(dl_iterate_phdr_test_cb, &base_name_seen);
975 if (base_name_seen)
976 return 22; // L MR1
977 return 23; // post-L
978 // Plain L (API level 21) is completely broken wrt ASan and not very
979 // interesting to detect.
980}
981
982u32 AndroidGetApiLevel() {
983 u32 level = atomic_load(&android_api_level, memory_order_relaxed);
984 if (level) return level;
985 level = AndroidDetectApiLevel();
986 atomic_store(&android_api_level, level, memory_order_relaxed);
987 return level;
988}
989
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700990#endif
991
992bool IsDeadlySignal(int signum) {
Pirama Arumuga Nainarcdce50b2015-07-01 12:26:56 -0700993 if (common_flags()->handle_abort && signum == SIGABRT)
994 return true;
Stephen Hines86277eb2015-03-23 12:06:32 -0700995 return (signum == SIGSEGV || signum == SIGBUS) && common_flags()->handle_segv;
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700996}
997
Stephen Hines86277eb2015-03-23 12:06:32 -0700998#ifndef SANITIZER_GO
999void *internal_start_thread(void(*func)(void *arg), void *arg) {
1000 // Start the thread with signals blocked, otherwise it can steal user signals.
1001 __sanitizer_sigset_t set, old;
1002 internal_sigfillset(&set);
Pirama Arumuga Nainarcdce50b2015-07-01 12:26:56 -07001003#if SANITIZER_LINUX
1004 // Glibc uses SIGSETXID signal during setuid call. If this signal is blocked
1005 // on any thread, setuid call hangs (see test/tsan/setuid.c).
1006 internal_sigdelset(&set, 33);
1007#endif
Stephen Hines86277eb2015-03-23 12:06:32 -07001008 internal_sigprocmask(SIG_SETMASK, &set, &old);
1009 void *th;
1010 real_pthread_create(&th, 0, (void*(*)(void *arg))func, arg);
1011 internal_sigprocmask(SIG_SETMASK, &old, 0);
1012 return th;
1013}
1014
1015void internal_join_thread(void *th) {
1016 real_pthread_join(th, 0);
1017}
1018#else
1019void *internal_start_thread(void (*func)(void *), void *arg) { return 0; }
1020
1021void internal_join_thread(void *th) {}
1022#endif
1023
Pirama Arumuga Nainar7c915052015-04-08 08:58:29 -07001024void GetPcSpBp(void *context, uptr *pc, uptr *sp, uptr *bp) {
1025#if defined(__arm__)
1026 ucontext_t *ucontext = (ucontext_t*)context;
1027 *pc = ucontext->uc_mcontext.arm_pc;
1028 *bp = ucontext->uc_mcontext.arm_fp;
1029 *sp = ucontext->uc_mcontext.arm_sp;
1030#elif defined(__aarch64__)
1031 ucontext_t *ucontext = (ucontext_t*)context;
1032 *pc = ucontext->uc_mcontext.pc;
1033 *bp = ucontext->uc_mcontext.regs[29];
1034 *sp = ucontext->uc_mcontext.sp;
1035#elif defined(__hppa__)
1036 ucontext_t *ucontext = (ucontext_t*)context;
1037 *pc = ucontext->uc_mcontext.sc_iaoq[0];
1038 /* GCC uses %r3 whenever a frame pointer is needed. */
1039 *bp = ucontext->uc_mcontext.sc_gr[3];
1040 *sp = ucontext->uc_mcontext.sc_gr[30];
1041#elif defined(__x86_64__)
1042# if SANITIZER_FREEBSD
1043 ucontext_t *ucontext = (ucontext_t*)context;
1044 *pc = ucontext->uc_mcontext.mc_rip;
1045 *bp = ucontext->uc_mcontext.mc_rbp;
1046 *sp = ucontext->uc_mcontext.mc_rsp;
1047# else
1048 ucontext_t *ucontext = (ucontext_t*)context;
1049 *pc = ucontext->uc_mcontext.gregs[REG_RIP];
1050 *bp = ucontext->uc_mcontext.gregs[REG_RBP];
1051 *sp = ucontext->uc_mcontext.gregs[REG_RSP];
1052# endif
1053#elif defined(__i386__)
1054# if SANITIZER_FREEBSD
1055 ucontext_t *ucontext = (ucontext_t*)context;
1056 *pc = ucontext->uc_mcontext.mc_eip;
1057 *bp = ucontext->uc_mcontext.mc_ebp;
1058 *sp = ucontext->uc_mcontext.mc_esp;
1059# else
1060 ucontext_t *ucontext = (ucontext_t*)context;
1061 *pc = ucontext->uc_mcontext.gregs[REG_EIP];
1062 *bp = ucontext->uc_mcontext.gregs[REG_EBP];
1063 *sp = ucontext->uc_mcontext.gregs[REG_ESP];
1064# endif
1065#elif defined(__powerpc__) || defined(__powerpc64__)
1066 ucontext_t *ucontext = (ucontext_t*)context;
1067 *pc = ucontext->uc_mcontext.regs->nip;
1068 *sp = ucontext->uc_mcontext.regs->gpr[PT_R1];
1069 // The powerpc{,64}-linux ABIs do not specify r31 as the frame
1070 // pointer, but GCC always uses r31 when we need a frame pointer.
1071 *bp = ucontext->uc_mcontext.regs->gpr[PT_R31];
1072#elif defined(__sparc__)
1073 ucontext_t *ucontext = (ucontext_t*)context;
1074 uptr *stk_ptr;
1075# if defined (__arch64__)
1076 *pc = ucontext->uc_mcontext.mc_gregs[MC_PC];
1077 *sp = ucontext->uc_mcontext.mc_gregs[MC_O6];
1078 stk_ptr = (uptr *) (*sp + 2047);
1079 *bp = stk_ptr[15];
1080# else
1081 *pc = ucontext->uc_mcontext.gregs[REG_PC];
1082 *sp = ucontext->uc_mcontext.gregs[REG_O6];
1083 stk_ptr = (uptr *) *sp;
1084 *bp = stk_ptr[15];
1085# endif
1086#elif defined(__mips__)
1087 ucontext_t *ucontext = (ucontext_t*)context;
Pirama Arumuga Nainarcdce50b2015-07-01 12:26:56 -07001088 *pc = ucontext->uc_mcontext.pc;
Pirama Arumuga Nainar7c915052015-04-08 08:58:29 -07001089 *bp = ucontext->uc_mcontext.gregs[30];
1090 *sp = ucontext->uc_mcontext.gregs[29];
1091#else
1092# error "Unsupported arch"
1093#endif
1094}
1095
Alexey Samsonovae4d9ca2012-06-04 14:27:50 +00001096} // namespace __sanitizer
1097
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001098#endif // SANITIZER_FREEBSD || SANITIZER_LINUX