blob: 3efb87a2ee1ee3feaa0fc40ecd3f859ae7c01ac7 [file] [log] [blame]
Alexey Samsonov2c5fc3b2012-06-04 14:27:50 +00001//===-- sanitizer_mac.cc --------------------------------------------------===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is shared between AddressSanitizer and ThreadSanitizer
11// run-time libraries and implements mac-specific functions from
12// sanitizer_libc.h.
13//===----------------------------------------------------------------------===//
14
15#ifdef __APPLE__
Alexander Potapenkod895ae92013-02-06 14:41:15 +000016// Use 64-bit inodes in file operations. ASan does not support OS X 10.5, so
17// the clients will most certainly use 64-bit ones as well.
18#ifndef _DARWIN_USE_64_BIT_INODE
19#define _DARWIN_USE_64_BIT_INODE 1
20#endif
21#include <stdio.h>
Alexey Samsonov2c5fc3b2012-06-04 14:27:50 +000022
Alexey Samsonov4b1f1032012-06-07 07:13:46 +000023#include "sanitizer_common.h"
Alexey Samsonov5bbf8292012-06-05 14:25:27 +000024#include "sanitizer_internal_defs.h"
Alexey Samsonov2c5fc3b2012-06-04 14:27:50 +000025#include "sanitizer_libc.h"
Alexey Samsonov28a98952012-06-07 06:15:12 +000026#include "sanitizer_procmaps.h"
Alexey Samsonov2c5fc3b2012-06-04 14:27:50 +000027
Alexey Samsonov0c53a382012-06-14 14:07:21 +000028#include <crt_externs.h> // for _NSGetEnviron
Alexey Samsonov4b1f1032012-06-07 07:13:46 +000029#include <fcntl.h>
Alexey Samsonov28a98952012-06-07 06:15:12 +000030#include <mach-o/dyld.h>
31#include <mach-o/loader.h>
Alexey Samsonov4b1f1032012-06-07 07:13:46 +000032#include <pthread.h>
Alexey Samsonov58a3c582012-06-18 08:44:30 +000033#include <sched.h>
Alexey Samsonov2c5fc3b2012-06-04 14:27:50 +000034#include <sys/mman.h>
Alexey Samsonov4b1f1032012-06-07 07:13:46 +000035#include <sys/resource.h>
Alexey Samsonovdde1f112012-06-05 07:05:10 +000036#include <sys/stat.h>
37#include <sys/types.h>
Alexey Samsonov03c8b842012-06-05 08:32:53 +000038#include <unistd.h>
Dmitry Vyukovaf4b0b02013-01-14 08:01:58 +000039#include <libkern/OSAtomic.h>
Alexey Samsonov2c5fc3b2012-06-04 14:27:50 +000040
41namespace __sanitizer {
42
Alexey Samsonov4b1f1032012-06-07 07:13:46 +000043// ---------------------- sanitizer_libc.h
Alexey Samsonov2c5fc3b2012-06-04 14:27:50 +000044void *internal_mmap(void *addr, size_t length, int prot, int flags,
45 int fd, u64 offset) {
46 return mmap(addr, length, prot, flags, fd, offset);
47}
48
Alexey Samsonov7ac77d62012-06-05 09:49:25 +000049int internal_munmap(void *addr, uptr length) {
50 return munmap(addr, length);
51}
52
Alexey Samsonov03c8b842012-06-05 08:32:53 +000053int internal_close(fd_t fd) {
54 return close(fd);
55}
56
Alexey Samsonov39313b72013-02-01 15:58:46 +000057fd_t internal_open(const char *filename, int flags) {
58 return open(filename, flags);
59}
60
Alexey Samsonov4985b872013-02-01 16:32:18 +000061fd_t internal_open(const char *filename, int flags, u32 mode) {
Alexey Samsonov39313b72013-02-01 15:58:46 +000062 return open(filename, flags, mode);
63}
64
65fd_t OpenFile(const char *filename, bool write) {
66 return internal_open(filename,
67 write ? O_WRONLY | O_CREAT : O_RDONLY, 0660);
Alexey Samsonovdde1f112012-06-05 07:05:10 +000068}
69
Alexey Samsonov03c8b842012-06-05 08:32:53 +000070uptr internal_read(fd_t fd, void *buf, uptr count) {
71 return read(fd, buf, count);
72}
73
74uptr internal_write(fd_t fd, const void *buf, uptr count) {
75 return write(fd, buf, count);
76}
77
Alexey Samsonov2c5cbd22013-02-04 10:16:50 +000078int internal_stat(const char *path, void *buf) {
Alexey Samsonov576e2702013-02-04 10:31:39 +000079 return stat(path, (struct stat *)buf);
Alexey Samsonov2c5cbd22013-02-04 10:16:50 +000080}
81
82int internal_lstat(const char *path, void *buf) {
Alexey Samsonov576e2702013-02-04 10:31:39 +000083 return lstat(path, (struct stat *)buf);
Alexey Samsonov2c5cbd22013-02-04 10:16:50 +000084}
85
86int internal_fstat(fd_t fd, void *buf) {
Alexey Samsonov576e2702013-02-04 10:31:39 +000087 return fstat(fd, (struct stat *)buf);
Alexey Samsonov2c5cbd22013-02-04 10:16:50 +000088}
89
Alexey Samsonovca2b5d72012-06-06 07:30:33 +000090uptr internal_filesize(fd_t fd) {
Alexey Samsonovce8d4972012-08-02 10:09:31 +000091 struct stat st;
Alexey Samsonov2c5cbd22013-02-04 10:16:50 +000092 if (internal_fstat(fd, &st))
Alexey Samsonovca2b5d72012-06-06 07:30:33 +000093 return -1;
94 return (uptr)st.st_size;
95}
96
97int internal_dup2(int oldfd, int newfd) {
98 return dup2(oldfd, newfd);
99}
100
Alexey Samsonovf6d21252012-09-05 14:48:24 +0000101uptr internal_readlink(const char *path, char *buf, uptr bufsize) {
102 return readlink(path, buf, bufsize);
103}
104
Alexey Samsonov58a3c582012-06-18 08:44:30 +0000105int internal_sched_yield() {
106 return sched_yield();
107}
108
Alexey Samsonovaadd1f22013-02-20 13:54:32 +0000109void internal__exit(int exitcode) {
110 _exit(exitcode);
111}
112
Alexey Samsonov4b1f1032012-06-07 07:13:46 +0000113// ----------------- sanitizer_common.h
Alexey Samsonovae9b18b2012-11-09 14:45:30 +0000114bool FileExists(const char *filename) {
115 struct stat st;
116 if (stat(filename, &st))
117 return false;
118 // Sanity check: filename is a regular file.
119 return S_ISREG(st.st_mode);
120}
121
Dmitry Vyukov56faa552012-10-02 12:58:14 +0000122uptr GetTid() {
123 return reinterpret_cast<uptr>(pthread_self());
124}
125
Alexey Samsonovcf4d3a02012-06-07 07:32:00 +0000126void GetThreadStackTopAndBottom(bool at_initialization, uptr *stack_top,
Alexey Samsonov4b1f1032012-06-07 07:13:46 +0000127 uptr *stack_bottom) {
128 CHECK(stack_top);
129 CHECK(stack_bottom);
130 uptr stacksize = pthread_get_stacksize_np(pthread_self());
131 void *stackaddr = pthread_get_stackaddr_np(pthread_self());
132 *stack_top = (uptr)stackaddr;
Alexey Samsonovcf4d3a02012-06-07 07:32:00 +0000133 *stack_bottom = *stack_top - stacksize;
Alexey Samsonov4b1f1032012-06-07 07:13:46 +0000134}
135
Alexey Samsonov0c53a382012-06-14 14:07:21 +0000136const char *GetEnv(const char *name) {
137 char ***env_ptr = _NSGetEnviron();
138 CHECK(env_ptr);
139 char **environ = *env_ptr;
140 CHECK(environ);
141 uptr name_len = internal_strlen(name);
142 while (*environ != 0) {
143 uptr len = internal_strlen(*environ);
144 if (len > name_len) {
145 const char *p = *environ;
146 if (!internal_memcmp(p, name, name_len) &&
147 p[name_len] == '=') { // Match.
148 return *environ + name_len + 1; // String starting after =.
149 }
150 }
151 environ++;
152 }
153 return 0;
154}
Alexey Samsonov4b1f1032012-06-07 07:13:46 +0000155
Alexey Samsonov97ca3062012-09-17 09:12:39 +0000156void ReExec() {
157 UNIMPLEMENTED();
158}
159
Alexander Potapenko1746f552012-12-10 13:10:40 +0000160void PrepareForSandboxing() {
161 // Nothing here for now.
162}
163
Alexey Samsonov4b1f1032012-06-07 07:13:46 +0000164// ----------------- sanitizer_procmaps.h
Alexey Samsonov28a98952012-06-07 06:15:12 +0000165
Alexey Samsonovcc622112012-08-27 13:48:48 +0000166MemoryMappingLayout::MemoryMappingLayout() {
Alexey Samsonov28a98952012-06-07 06:15:12 +0000167 Reset();
168}
169
Alexey Samsonovcc622112012-08-27 13:48:48 +0000170MemoryMappingLayout::~MemoryMappingLayout() {
Alexey Samsonov28a98952012-06-07 06:15:12 +0000171}
172
173// More information about Mach-O headers can be found in mach-o/loader.h
174// Each Mach-O image has a header (mach_header or mach_header_64) starting with
175// a magic number, and a list of linker load commands directly following the
176// header.
177// A load command is at least two 32-bit words: the command type and the
178// command size in bytes. We're interested only in segment load commands
179// (LC_SEGMENT and LC_SEGMENT_64), which tell that a part of the file is mapped
180// into the task's address space.
181// The |vmaddr|, |vmsize| and |fileoff| fields of segment_command or
182// segment_command_64 correspond to the memory address, memory size and the
183// file offset of the current memory segment.
184// Because these fields are taken from the images as is, one needs to add
185// _dyld_get_image_vmaddr_slide() to get the actual addresses at runtime.
186
Alexey Samsonovcc622112012-08-27 13:48:48 +0000187void MemoryMappingLayout::Reset() {
Alexey Samsonov28a98952012-06-07 06:15:12 +0000188 // Count down from the top.
189 // TODO(glider): as per man 3 dyld, iterating over the headers with
190 // _dyld_image_count is thread-unsafe. We need to register callbacks for
Alexey Samsonovcc622112012-08-27 13:48:48 +0000191 // adding and removing images which will invalidate the MemoryMappingLayout
192 // state.
Alexey Samsonov28a98952012-06-07 06:15:12 +0000193 current_image_ = _dyld_image_count();
194 current_load_cmd_count_ = -1;
195 current_load_cmd_addr_ = 0;
196 current_magic_ = 0;
Alexander Potapenko77c0ac22012-10-02 15:42:24 +0000197 current_filetype_ = 0;
Alexey Samsonov28a98952012-06-07 06:15:12 +0000198}
199
Alexander Potapenko78114252012-12-01 02:39:45 +0000200// static
201void MemoryMappingLayout::CacheMemoryMappings() {
202 // No-op on Mac for now.
203}
204
205void MemoryMappingLayout::LoadFromCache() {
206 // No-op on Mac for now.
207}
208
Alexey Samsonov28a98952012-06-07 06:15:12 +0000209// Next and NextSegmentLoad were inspired by base/sysinfo.cc in
210// Google Perftools, http://code.google.com/p/google-perftools.
211
212// NextSegmentLoad scans the current image for the next segment load command
213// and returns the start and end addresses and file offset of the corresponding
214// segment.
215// Note that the segment addresses are not necessarily sorted.
216template<u32 kLCSegment, typename SegmentCommand>
Alexey Samsonovcc622112012-08-27 13:48:48 +0000217bool MemoryMappingLayout::NextSegmentLoad(
Alexey Samsonov28a98952012-06-07 06:15:12 +0000218 uptr *start, uptr *end, uptr *offset,
Alexey Samsonov06d3aa42013-03-13 06:51:02 +0000219 char filename[], uptr filename_size, uptr *protection) {
220 if (protection)
221 UNIMPLEMENTED();
Alexey Samsonov28a98952012-06-07 06:15:12 +0000222 const char* lc = current_load_cmd_addr_;
223 current_load_cmd_addr_ += ((const load_command *)lc)->cmdsize;
224 if (((const load_command *)lc)->cmd == kLCSegment) {
225 const sptr dlloff = _dyld_get_image_vmaddr_slide(current_image_);
226 const SegmentCommand* sc = (const SegmentCommand *)lc;
227 if (start) *start = sc->vmaddr + dlloff;
228 if (end) *end = sc->vmaddr + sc->vmsize + dlloff;
Alexander Potapenko77c0ac22012-10-02 15:42:24 +0000229 if (offset) {
230 if (current_filetype_ == /*MH_EXECUTE*/ 0x2) {
231 *offset = sc->vmaddr;
232 } else {
233 *offset = sc->fileoff;
234 }
235 }
Alexey Samsonov28a98952012-06-07 06:15:12 +0000236 if (filename) {
237 internal_strncpy(filename, _dyld_get_image_name(current_image_),
238 filename_size);
239 }
240 return true;
241 }
242 return false;
243}
244
Alexey Samsonovcc622112012-08-27 13:48:48 +0000245bool MemoryMappingLayout::Next(uptr *start, uptr *end, uptr *offset,
Alexey Samsonov91f833a2013-03-13 07:39:25 +0000246 char filename[], uptr filename_size,
247 uptr *protection) {
Alexey Samsonov28a98952012-06-07 06:15:12 +0000248 for (; current_image_ >= 0; current_image_--) {
249 const mach_header* hdr = _dyld_get_image_header(current_image_);
250 if (!hdr) continue;
251 if (current_load_cmd_count_ < 0) {
252 // Set up for this image;
253 current_load_cmd_count_ = hdr->ncmds;
254 current_magic_ = hdr->magic;
Alexander Potapenko77c0ac22012-10-02 15:42:24 +0000255 current_filetype_ = hdr->filetype;
Alexey Samsonov28a98952012-06-07 06:15:12 +0000256 switch (current_magic_) {
257#ifdef MH_MAGIC_64
258 case MH_MAGIC_64: {
259 current_load_cmd_addr_ = (char*)hdr + sizeof(mach_header_64);
260 break;
261 }
262#endif
263 case MH_MAGIC: {
264 current_load_cmd_addr_ = (char*)hdr + sizeof(mach_header);
265 break;
266 }
267 default: {
268 continue;
269 }
270 }
271 }
272
273 for (; current_load_cmd_count_ >= 0; current_load_cmd_count_--) {
274 switch (current_magic_) {
275 // current_magic_ may be only one of MH_MAGIC, MH_MAGIC_64.
276#ifdef MH_MAGIC_64
277 case MH_MAGIC_64: {
278 if (NextSegmentLoad<LC_SEGMENT_64, struct segment_command_64>(
Alexey Samsonov91f833a2013-03-13 07:39:25 +0000279 start, end, offset, filename, filename_size, protection))
Alexey Samsonov28a98952012-06-07 06:15:12 +0000280 return true;
281 break;
282 }
283#endif
284 case MH_MAGIC: {
285 if (NextSegmentLoad<LC_SEGMENT, struct segment_command>(
Alexey Samsonov91f833a2013-03-13 07:39:25 +0000286 start, end, offset, filename, filename_size, protection))
Alexey Samsonov28a98952012-06-07 06:15:12 +0000287 return true;
288 break;
289 }
290 }
291 }
292 // If we get here, no more load_cmd's in this image talk about
293 // segments. Go on to the next image.
294 }
295 return false;
296}
297
Alexey Samsonovcc622112012-08-27 13:48:48 +0000298bool MemoryMappingLayout::GetObjectNameAndOffset(uptr addr, uptr *offset,
299 char filename[],
Alexey Samsonov91f833a2013-03-13 07:39:25 +0000300 uptr filename_size,
Alexey Samsonov06d3aa42013-03-13 06:51:02 +0000301 uptr *protection) {
302 return IterateForObjectNameAndOffset(addr, offset, filename, filename_size,
303 protection);
Alexey Samsonov28a98952012-06-07 06:15:12 +0000304}
305
Dmitry Vyukovf22982b2013-01-14 07:51:39 +0000306BlockingMutex::BlockingMutex(LinkerInitialized) {
307 // We assume that OS_SPINLOCK_INIT is zero
308}
309
310void BlockingMutex::Lock() {
311 CHECK(sizeof(OSSpinLock) <= sizeof(opaque_storage_));
Kostya Serebryany459df6f2013-02-26 12:59:06 +0000312 CHECK_EQ(OS_SPINLOCK_INIT, 0);
313 CHECK_NE(owner_, (uptr)pthread_self());
Dmitry Vyukovf22982b2013-01-14 07:51:39 +0000314 OSSpinLockLock((OSSpinLock*)&opaque_storage_);
315 CHECK(!owner_);
316 owner_ = (uptr)pthread_self();
317}
318
319void BlockingMutex::Unlock() {
320 CHECK(owner_ == (uptr)pthread_self());
321 owner_ = 0;
322 OSSpinLockUnlock((OSSpinLock*)&opaque_storage_);
323}
324
Alexey Samsonovdb7d9652013-03-11 15:45:20 +0000325void BlockingMutex::CheckLocked() {
326 CHECK_EQ((uptr)pthread_self(), owner_);
327}
328
Alexey Samsonov2c5fc3b2012-06-04 14:27:50 +0000329} // namespace __sanitizer
330
331#endif // __APPLE__