blob: bd92617cba246375572e0716fa78d1b0d15b8972 [file] [log] [blame]
Kostya Serebryany019b76f2011-11-30 01:07:02 +00001//===-- asan_linux.cc -----------------------------------------------------===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of AddressSanitizer, an address sanity checker.
11//
12// Linux-specific details.
13//===----------------------------------------------------------------------===//
Kostya Serebryany5dfa4da2011-12-01 21:40:52 +000014#ifdef __linux__
Kostya Serebryany019b76f2011-11-30 01:07:02 +000015
Kostya Serebryanycd271f52012-01-05 00:44:33 +000016#include "asan_interceptors.h"
Kostya Serebryany019b76f2011-11-30 01:07:02 +000017#include "asan_internal.h"
Kostya Serebryanycd271f52012-01-05 00:44:33 +000018#include "asan_procmaps.h"
Kostya Serebryany78d87d32012-01-05 01:07:27 +000019#include "asan_thread.h"
Kostya Serebryany019b76f2011-11-30 01:07:02 +000020
Kostya Serebryany78d87d32012-01-05 01:07:27 +000021#include <sys/time.h>
22#include <sys/resource.h>
Kostya Serebryany019b76f2011-11-30 01:07:02 +000023#include <sys/mman.h>
24#include <sys/syscall.h>
Kostya Serebryany6c4bd802011-12-28 22:58:01 +000025#include <sys/types.h>
26#include <fcntl.h>
Kostya Serebryany3b7fb102012-01-05 23:50:34 +000027#include <link.h>
Kostya Serebryany78d87d32012-01-05 01:07:27 +000028#include <pthread.h>
Kostya Serebryanycd271f52012-01-05 00:44:33 +000029#include <stdio.h>
Kostya Serebryany019b76f2011-11-30 01:07:02 +000030#include <unistd.h>
31
Kostya Serebryany019b76f2011-11-30 01:07:02 +000032namespace __asan {
33
34void *AsanDoesNotSupportStaticLinkage() {
35 // This will fail to link with -static.
Kostya Serebryany3b7fb102012-01-05 23:50:34 +000036 return &_DYNAMIC; // defined in link.h
Kostya Serebryany019b76f2011-11-30 01:07:02 +000037}
38
Kostya Serebryanya7720962011-12-28 23:28:54 +000039static void *asan_mmap(void *addr, size_t length, int prot, int flags,
Kostya Serebryany019b76f2011-11-30 01:07:02 +000040 int fd, uint64_t offset) {
41# if __WORDSIZE == 64
Kostya Serebryany6c4bd802011-12-28 22:58:01 +000042 return (void *)syscall(__NR_mmap, addr, length, prot, flags, fd, offset);
Kostya Serebryany019b76f2011-11-30 01:07:02 +000043# else
Kostya Serebryany6c4bd802011-12-28 22:58:01 +000044 return (void *)syscall(__NR_mmap2, addr, length, prot, flags, fd, offset);
Kostya Serebryany019b76f2011-11-30 01:07:02 +000045# endif
46}
47
Kostya Serebryany6c4bd802011-12-28 22:58:01 +000048void *AsanMmapSomewhereOrDie(size_t size, const char *mem_type) {
49 size = RoundUpTo(size, kPageSize);
50 void *res = asan_mmap(0, size,
51 PROT_READ | PROT_WRITE,
52 MAP_PRIVATE | MAP_ANON, -1, 0);
53 if (res == (void*)-1) {
54 OutOfMemoryMessageAndDie(mem_type, size);
55 }
56 return res;
57}
58
Kostya Serebryanya7720962011-12-28 23:28:54 +000059void *AsanMmapFixedNoReserve(uintptr_t fixed_addr, size_t size) {
60 return asan_mmap((void*)fixed_addr, size,
61 PROT_READ | PROT_WRITE,
62 MAP_PRIVATE | MAP_ANON | MAP_FIXED | MAP_NORESERVE,
63 0, 0);
64}
65
66void *AsanMmapFixedReserve(uintptr_t fixed_addr, size_t size) {
67 return asan_mmap((void*)fixed_addr, size,
68 PROT_READ | PROT_WRITE,
69 MAP_PRIVATE | MAP_ANON | MAP_FIXED,
70 0, 0);
71}
72
73void *AsanMprotect(uintptr_t fixed_addr, size_t size) {
74 return asan_mmap((void*)fixed_addr, size,
75 PROT_NONE,
76 MAP_PRIVATE | MAP_ANON | MAP_FIXED | MAP_NORESERVE,
77 0, 0);
78}
79
Kostya Serebryany6c4bd802011-12-28 22:58:01 +000080void AsanUnmapOrDie(void *addr, size_t size) {
81 if (!addr || !size) return;
82 int res = syscall(__NR_munmap, addr, size);
83 if (res != 0) {
84 Report("Failed to unmap\n");
85 ASAN_DIE;
86 }
87}
88
89ssize_t AsanWrite(int fd, const void *buf, size_t count) {
90 return (ssize_t)syscall(__NR_write, fd, buf, count);
91}
92
93int AsanOpenReadonly(const char* filename) {
94 return open(filename, O_RDONLY);
95}
96
97ssize_t AsanRead(int fd, void *buf, size_t count) {
98 return (ssize_t)syscall(__NR_read, fd, buf, count);
99}
100
101int AsanClose(int fd) {
102 return close(fd);
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000103}
104
Kostya Serebryanycd271f52012-01-05 00:44:33 +0000105AsanProcMaps::AsanProcMaps() {
106 proc_self_maps_buff_len_ =
107 ReadFileToBuffer("/proc/self/maps", &proc_self_maps_buff_,
108 &proc_self_maps_buff_mmaped_size_, 1 << 20);
109 CHECK(proc_self_maps_buff_len_ > 0);
110 // AsanWrite(2, proc_self_maps_buff_, proc_self_maps_buff_len_);
111 Reset();
112}
113
114AsanProcMaps::~AsanProcMaps() {
115 AsanUnmapOrDie(proc_self_maps_buff_, proc_self_maps_buff_mmaped_size_);
116}
117
118void AsanProcMaps::Reset() {
119 current_ = proc_self_maps_buff_;
120}
121
Kostya Serebryany3b7fb102012-01-05 23:50:34 +0000122bool AsanProcMaps::Next(uintptr_t *start, uintptr_t *end,
123 uintptr_t *offset, char filename[],
Kostya Serebryanycd271f52012-01-05 00:44:33 +0000124 size_t filename_size) {
125 char *last = proc_self_maps_buff_ + proc_self_maps_buff_len_;
126 if (current_ >= last) return false;
127 int consumed = 0;
128 char flags[10];
129 int major, minor;
Kostya Serebryany3b7fb102012-01-05 23:50:34 +0000130 uintptr_t inode;
Kostya Serebryanycd271f52012-01-05 00:44:33 +0000131 char *next_line = (char*)internal_memchr(current_, '\n', last - current_);
132 if (next_line == NULL)
133 next_line = last;
134 if (SScanf(current_,
Kostya Serebryany3b7fb102012-01-05 23:50:34 +0000135 "%lx-%lx %4s %lx %x:%x %ld %n",
Kostya Serebryanycd271f52012-01-05 00:44:33 +0000136 start, end, flags, offset, &major, &minor,
137 &inode, &consumed) != 7)
138 return false;
139 current_ += consumed;
140 // Skip spaces.
141 while (current_ < next_line && *current_ == ' ')
142 current_++;
143 // Fill in the filename.
144 size_t i = 0;
145 while (current_ < next_line) {
146 if (filename && i < filename_size - 1)
147 filename[i++] = *current_;
148 current_++;
149 }
150 if (filename && i < filename_size)
151 filename[i] = 0;
152 current_ = next_line + 1;
153 return true;
154}
155
Kostya Serebryany3b7fb102012-01-05 23:50:34 +0000156struct DlIterateData {
157 int count;
158 uintptr_t addr;
159 uintptr_t offset;
160 char *filename;
161 size_t filename_size;
162};
163
164static int dl_iterate_phdr_callback(struct dl_phdr_info *info,
165 size_t size, void *raw_data) {
166 DlIterateData *data = (DlIterateData*)raw_data;
167 int count = data->count++;
168 if (info->dlpi_addr > data->addr)
169 return 0;
170 if (count == 0) {
171 // The first item (the main executable) does not have a so name,
172 // but we can just read it from /proc/self/exe.
173 ssize_t path_len = readlink("/proc/self/exe",
174 data->filename, data->filename_size - 1);
175 data->filename[path_len] = 0;
176 } else {
177 CHECK(info->dlpi_name);
178 real_strncpy(data->filename, info->dlpi_name, data->filename_size);
179 }
180 data->offset = data->addr - info->dlpi_addr;
181 return 1;
182}
183
184// Gets the object name and the offset using dl_iterate_phdr.
185bool AsanProcMaps::GetObjectNameAndOffset(uintptr_t addr, uintptr_t *offset,
186 char filename[],
187 size_t filename_size) {
188 DlIterateData data;
189 data.count = 0;
190 data.addr = addr;
191 data.filename = filename;
192 data.filename_size = filename_size;
193 if (dl_iterate_phdr(dl_iterate_phdr_callback, &data)) {
194 *offset = data.offset;
195 return true;
196 }
197 return false;
198}
199
Kostya Serebryany78d87d32012-01-05 01:07:27 +0000200void AsanThread::SetThreadStackTopAndBottom() {
201 if (tid() == 0) {
202 // This is the main thread. Libpthread may not be initialized yet.
203 struct rlimit rl;
204 CHECK(getrlimit(RLIMIT_STACK, &rl) == 0);
205
206 // Find the mapping that contains a stack variable.
207 AsanProcMaps proc_maps;
Kostya Serebryany3b7fb102012-01-05 23:50:34 +0000208 uintptr_t start, end, offset;
209 uintptr_t prev_end = 0;
Kostya Serebryany78d87d32012-01-05 01:07:27 +0000210 while (proc_maps.Next(&start, &end, &offset, NULL, 0)) {
211 if ((uintptr_t)&rl < end)
212 break;
213 prev_end = end;
214 }
215 CHECK((uintptr_t)&rl >= start && (uintptr_t)&rl < end);
216
217 // Get stacksize from rlimit, but clip it so that it does not overlap
218 // with other mappings.
219 size_t stacksize = rl.rlim_cur;
220 if (stacksize > end - prev_end)
221 stacksize = end - prev_end;
222 if (stacksize > kMaxThreadStackSize)
223 stacksize = kMaxThreadStackSize;
224 stack_top_ = end;
225 stack_bottom_ = end - stacksize;
226 CHECK(AddrIsInStack((uintptr_t)&rl));
227 return;
228 }
229 pthread_attr_t attr;
230 CHECK(pthread_getattr_np(pthread_self(), &attr) == 0);
231 size_t stacksize = 0;
232 void *stackaddr = NULL;
233 pthread_attr_getstack(&attr, &stackaddr, &stacksize);
234 pthread_attr_destroy(&attr);
235
236 stack_top_ = (uintptr_t)stackaddr + stacksize;
237 stack_bottom_ = (uintptr_t)stackaddr;
238 // When running with unlimited stack size, we still want to set some limit.
239 // The unlimited stack size is caused by 'ulimit -s unlimited'.
240 // Also, for some reason, GNU make spawns subrocesses with unlimited stack.
241 if (stacksize > kMaxThreadStackSize) {
242 stack_bottom_ = stack_top_ - kMaxThreadStackSize;
243 }
244 CHECK(AddrIsInStack((uintptr_t)&attr));
245}
246
Kostya Serebryany2b087182012-01-06 02:12:25 +0000247void AsanDisableCoreDumper() {
248 struct rlimit nocore;
249 nocore.rlim_cur = 0;
250 nocore.rlim_max = 0;
251 setrlimit(RLIMIT_CORE, &nocore);
252}
Kostya Serebryany78d87d32012-01-05 01:07:27 +0000253
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000254} // namespace __asan
Kostya Serebryany5dfa4da2011-12-01 21:40:52 +0000255
256#endif // __linux__