xref: /aosp_15_r20/external/scudo/standalone/linux.cpp (revision 76559068c068bd27e82aff38fac3bfc865233bca)
1 //===-- linux.cpp -----------------------------------------------*- C++ -*-===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 
9 #include "platform.h"
10 
11 #if SCUDO_LINUX
12 
13 #include "common.h"
14 #include "internal_defs.h"
15 #include "linux.h"
16 #include "mutex.h"
17 #include "report_linux.h"
18 #include "string_utils.h"
19 
20 #include <errno.h>
21 #include <fcntl.h>
22 #include <linux/futex.h>
23 #include <sched.h>
24 #include <stdio.h>
25 #include <stdlib.h>
26 #include <string.h>
27 #include <sys/mman.h>
28 #include <sys/stat.h>
29 #include <sys/syscall.h>
30 #include <sys/time.h>
31 #include <time.h>
32 #include <unistd.h>
33 
34 #if SCUDO_ANDROID
35 #include <sys/prctl.h>
36 // Definitions of prctl arguments to set a vma name in Android kernels.
37 #define ANDROID_PR_SET_VMA 0x53564d41
38 #define ANDROID_PR_SET_VMA_ANON_NAME 0
39 #endif
40 
41 namespace scudo {
42 
43 #if !defined(SCUDO_PAGE_SIZE)
44 // This function is only used when page size is not hard-coded.
getPageSize()45 uptr getPageSize() { return static_cast<uptr>(sysconf(_SC_PAGESIZE)); }
46 #endif
47 
die()48 void NORETURN die() { abort(); }
49 
50 // TODO: Will be deprecated. Use the interfaces in MemMapLinux instead.
map(void * Addr,uptr Size,UNUSED const char * Name,uptr Flags,UNUSED MapPlatformData * Data)51 void *map(void *Addr, uptr Size, UNUSED const char *Name, uptr Flags,
52           UNUSED MapPlatformData *Data) {
53   int MmapFlags = MAP_PRIVATE | MAP_ANONYMOUS;
54   int MmapProt;
55   if (Flags & MAP_NOACCESS) {
56     MmapFlags |= MAP_NORESERVE;
57     MmapProt = PROT_NONE;
58   } else {
59     MmapProt = PROT_READ | PROT_WRITE;
60   }
61 #if defined(__aarch64__)
62 #ifndef PROT_MTE
63 #define PROT_MTE 0x20
64 #endif
65   if (Flags & MAP_MEMTAG)
66     MmapProt |= PROT_MTE;
67 #endif
68   if (Addr)
69     MmapFlags |= MAP_FIXED;
70   void *P = mmap(Addr, Size, MmapProt, MmapFlags, -1, 0);
71   if (P == MAP_FAILED) {
72     if (!(Flags & MAP_ALLOWNOMEM) || errno != ENOMEM)
73       reportMapError(errno == ENOMEM ? Size : 0);
74     return nullptr;
75   }
76 #if SCUDO_ANDROID
77   if (Name)
78     prctl(ANDROID_PR_SET_VMA, ANDROID_PR_SET_VMA_ANON_NAME, P, Size, Name);
79 #endif
80   return P;
81 }
82 
83 // TODO: Will be deprecated. Use the interfaces in MemMapLinux instead.
unmap(void * Addr,uptr Size,UNUSED uptr Flags,UNUSED MapPlatformData * Data)84 void unmap(void *Addr, uptr Size, UNUSED uptr Flags,
85            UNUSED MapPlatformData *Data) {
86   if (munmap(Addr, Size) != 0)
87     reportUnmapError(reinterpret_cast<uptr>(Addr), Size);
88 }
89 
90 // TODO: Will be deprecated. Use the interfaces in MemMapLinux instead.
setMemoryPermission(uptr Addr,uptr Size,uptr Flags,UNUSED MapPlatformData * Data)91 void setMemoryPermission(uptr Addr, uptr Size, uptr Flags,
92                          UNUSED MapPlatformData *Data) {
93   int Prot = (Flags & MAP_NOACCESS) ? PROT_NONE : (PROT_READ | PROT_WRITE);
94   if (mprotect(reinterpret_cast<void *>(Addr), Size, Prot) != 0)
95     reportProtectError(Addr, Size, Prot);
96 }
97 
98 // TODO: Will be deprecated. Use the interfaces in MemMapLinux instead.
releasePagesToOS(uptr BaseAddress,uptr Offset,uptr Size,UNUSED MapPlatformData * Data)99 void releasePagesToOS(uptr BaseAddress, uptr Offset, uptr Size,
100                       UNUSED MapPlatformData *Data) {
101   void *Addr = reinterpret_cast<void *>(BaseAddress + Offset);
102 
103   while (madvise(Addr, Size, MADV_DONTNEED) == -1 && errno == EAGAIN) {
104   }
105 }
106 
107 // Calling getenv should be fine (c)(tm) at any time.
getEnv(const char * Name)108 const char *getEnv(const char *Name) { return getenv(Name); }
109 
110 namespace {
111 enum State : u32 { Unlocked = 0, Locked = 1, Sleeping = 2 };
112 }
113 
tryLock()114 bool HybridMutex::tryLock() {
115   return atomic_compare_exchange_strong(&M, Unlocked, Locked,
116                                         memory_order_acquire) == Unlocked;
117 }
118 
119 // The following is based on https://akkadia.org/drepper/futex.pdf.
lockSlow()120 void HybridMutex::lockSlow() {
121   u32 V = atomic_compare_exchange_strong(&M, Unlocked, Locked,
122                                          memory_order_acquire);
123   if (V == Unlocked)
124     return;
125   if (V != Sleeping)
126     V = atomic_exchange(&M, Sleeping, memory_order_acquire);
127   while (V != Unlocked) {
128     syscall(SYS_futex, reinterpret_cast<uptr>(&M), FUTEX_WAIT_PRIVATE, Sleeping,
129             nullptr, nullptr, 0);
130     V = atomic_exchange(&M, Sleeping, memory_order_acquire);
131   }
132 }
133 
unlock()134 void HybridMutex::unlock() {
135   if (atomic_fetch_sub(&M, 1U, memory_order_release) != Locked) {
136     atomic_store(&M, Unlocked, memory_order_release);
137     syscall(SYS_futex, reinterpret_cast<uptr>(&M), FUTEX_WAKE_PRIVATE, 1,
138             nullptr, nullptr, 0);
139   }
140 }
141 
assertHeldImpl()142 void HybridMutex::assertHeldImpl() {
143   CHECK(atomic_load(&M, memory_order_acquire) != Unlocked);
144 }
145 
getMonotonicTime()146 u64 getMonotonicTime() {
147   timespec TS;
148   clock_gettime(CLOCK_MONOTONIC, &TS);
149   return static_cast<u64>(TS.tv_sec) * (1000ULL * 1000 * 1000) +
150          static_cast<u64>(TS.tv_nsec);
151 }
152 
getMonotonicTimeFast()153 u64 getMonotonicTimeFast() {
154 #if defined(CLOCK_MONOTONIC_COARSE)
155   timespec TS;
156   clock_gettime(CLOCK_MONOTONIC_COARSE, &TS);
157   return static_cast<u64>(TS.tv_sec) * (1000ULL * 1000 * 1000) +
158          static_cast<u64>(TS.tv_nsec);
159 #else
160   return getMonotonicTime();
161 #endif
162 }
163 
getNumberOfCPUs()164 u32 getNumberOfCPUs() {
165   cpu_set_t CPUs;
166   // sched_getaffinity can fail for a variety of legitimate reasons (lack of
167   // CAP_SYS_NICE, syscall filtering, etc), in which case we shall return 0.
168   if (sched_getaffinity(0, sizeof(cpu_set_t), &CPUs) != 0)
169     return 0;
170   return static_cast<u32>(CPU_COUNT(&CPUs));
171 }
172 
getThreadID()173 u32 getThreadID() {
174 #if SCUDO_ANDROID
175   return static_cast<u32>(gettid());
176 #else
177   return static_cast<u32>(syscall(SYS_gettid));
178 #endif
179 }
180 
181 // Blocking is possibly unused if the getrandom block is not compiled in.
getRandom(void * Buffer,uptr Length,UNUSED bool Blocking)182 bool getRandom(void *Buffer, uptr Length, UNUSED bool Blocking) {
183   if (!Buffer || !Length || Length > MaxRandomLength)
184     return false;
185   ssize_t ReadBytes;
186 #if defined(SYS_getrandom)
187 #if !defined(GRND_NONBLOCK)
188 #define GRND_NONBLOCK 1
189 #endif
190   // Up to 256 bytes, getrandom will not be interrupted.
191   ReadBytes =
192       syscall(SYS_getrandom, Buffer, Length, Blocking ? 0 : GRND_NONBLOCK);
193   if (ReadBytes == static_cast<ssize_t>(Length))
194     return true;
195 #endif // defined(SYS_getrandom)
196   // Up to 256 bytes, a read off /dev/urandom will not be interrupted.
197   // Blocking is moot here, O_NONBLOCK has no effect when opening /dev/urandom.
198   const int FileDesc = open("/dev/urandom", O_RDONLY);
199   if (FileDesc == -1)
200     return false;
201   ReadBytes = read(FileDesc, Buffer, Length);
202   close(FileDesc);
203   return (ReadBytes == static_cast<ssize_t>(Length));
204 }
205 
206 // Allocation free syslog-like API.
207 extern "C" WEAK int async_safe_write_log(int pri, const char *tag,
208                                          const char *msg);
209 
outputRaw(const char * Buffer)210 void outputRaw(const char *Buffer) {
211   if (&async_safe_write_log) {
212     constexpr s32 AndroidLogInfo = 4;
213     constexpr uptr MaxLength = 1024U;
214     char LocalBuffer[MaxLength];
215     while (strlen(Buffer) > MaxLength) {
216       uptr P;
217       for (P = MaxLength - 1; P > 0; P--) {
218         if (Buffer[P] == '\n') {
219           memcpy(LocalBuffer, Buffer, P);
220           LocalBuffer[P] = '\0';
221           async_safe_write_log(AndroidLogInfo, "scudo", LocalBuffer);
222           Buffer = &Buffer[P + 1];
223           break;
224         }
225       }
226       // If no newline was found, just log the buffer.
227       if (P == 0)
228         break;
229     }
230     async_safe_write_log(AndroidLogInfo, "scudo", Buffer);
231   } else {
232     (void)write(2, Buffer, strlen(Buffer));
233   }
234 }
235 
236 extern "C" WEAK void android_set_abort_message(const char *);
237 
setAbortMessage(const char * Message)238 void setAbortMessage(const char *Message) {
239   if (&android_set_abort_message)
240     android_set_abort_message(Message);
241 }
242 
243 } // namespace scudo
244 
245 #endif // SCUDO_LINUX
246