123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241 |
- //===-- hwasan_fuchsia.cpp --------------------------------------*- C++ -*-===//
- //
- // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
- // See https://llvm.org/LICENSE.txt for license information.
- // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
- //
- //===----------------------------------------------------------------------===//
- ///
- /// \file
- /// This file is a part of HWAddressSanitizer and contains Fuchsia-specific
- /// code.
- ///
- //===----------------------------------------------------------------------===//
- #include "sanitizer_common/sanitizer_fuchsia.h"
- #if SANITIZER_FUCHSIA
- #error #include <zircon/features.h>
- #error #include <zircon/syscalls.h>
- #include "hwasan.h"
- #include "hwasan_interface_internal.h"
- #include "hwasan_report.h"
- #include "hwasan_thread.h"
- #include "hwasan_thread_list.h"
- // This TLS variable contains the location of the stack ring buffer and can be
- // used to always find the hwasan thread object associated with the current
- // running thread.
- [[gnu::tls_model("initial-exec")]]
- SANITIZER_INTERFACE_ATTRIBUTE
- THREADLOCAL uptr __hwasan_tls;
- namespace __hwasan {
- bool InitShadow() {
- __sanitizer::InitShadowBounds();
- CHECK_NE(__sanitizer::ShadowBounds.shadow_limit, 0);
- // These variables are used by MemIsShadow for asserting we have a correct
- // shadow address. On Fuchsia, we only have one region of shadow, so the
- // bounds of Low shadow can be zero while High shadow represents the true
- // bounds. Note that these are inclusive ranges.
- kLowShadowStart = 0;
- kLowShadowEnd = 0;
- kHighShadowStart = __sanitizer::ShadowBounds.shadow_base;
- kHighShadowEnd = __sanitizer::ShadowBounds.shadow_limit - 1;
- return true;
- }
- bool MemIsApp(uptr p) {
- CHECK(GetTagFromPointer(p) == 0);
- return __sanitizer::ShadowBounds.shadow_limit <= p &&
- p <= (__sanitizer::ShadowBounds.memory_limit - 1);
- }
- // These are known parameters passed to the hwasan runtime on thread creation.
- struct Thread::InitState {
- uptr stack_bottom, stack_top;
- };
- static void FinishThreadInitialization(Thread *thread);
- void InitThreads() {
- // This is the minimal alignment needed for the storage where hwasan threads
- // and their stack ring buffers are placed. This alignment is necessary so the
- // stack ring buffer can perform a simple calculation to get the next element
- // in the RB. The instructions for this calculation are emitted by the
- // compiler. (Full explanation in hwasan_thread_list.h.)
- uptr alloc_size = UINT64_C(1) << kShadowBaseAlignment;
- uptr thread_start = reinterpret_cast<uptr>(
- MmapAlignedOrDieOnFatalError(alloc_size, alloc_size, __func__));
- InitThreadList(thread_start, alloc_size);
- // Create the hwasan thread object for the current (main) thread. Stack info
- // for this thread is known from information passed via
- // __sanitizer_startup_hook.
- const Thread::InitState state = {
- .stack_bottom = __sanitizer::MainThreadStackBase,
- .stack_top =
- __sanitizer::MainThreadStackBase + __sanitizer::MainThreadStackSize,
- };
- FinishThreadInitialization(hwasanThreadList().CreateCurrentThread(&state));
- }
- uptr *GetCurrentThreadLongPtr() { return &__hwasan_tls; }
- // This is called from the parent thread before the new thread is created. Here
- // we can propagate known info like the stack bounds to Thread::Init before
- // jumping into the thread. We cannot initialize the stack ring buffer yet since
- // we have not entered the new thread.
- static void *BeforeThreadCreateHook(uptr user_id, bool detached,
- const char *name, uptr stack_bottom,
- uptr stack_size) {
- const Thread::InitState state = {
- .stack_bottom = stack_bottom,
- .stack_top = stack_bottom + stack_size,
- };
- return hwasanThreadList().CreateCurrentThread(&state);
- }
- // This sets the stack top and bottom according to the InitState passed to
- // CreateCurrentThread above.
- void Thread::InitStackAndTls(const InitState *state) {
- CHECK_NE(state->stack_bottom, 0);
- CHECK_NE(state->stack_top, 0);
- stack_bottom_ = state->stack_bottom;
- stack_top_ = state->stack_top;
- tls_end_ = tls_begin_ = 0;
- }
- // This is called after creating a new thread with the pointer returned by
- // BeforeThreadCreateHook. We are still in the creating thread and should check
- // if it was actually created correctly.
- static void ThreadCreateHook(void *hook, bool aborted) {
- Thread *thread = static_cast<Thread *>(hook);
- if (!aborted) {
- // The thread was created successfully.
- // ThreadStartHook can already be running in the new thread.
- } else {
- // The thread wasn't created after all.
- // Clean up everything we set up in BeforeThreadCreateHook.
- atomic_signal_fence(memory_order_seq_cst);
- hwasanThreadList().ReleaseThread(thread);
- }
- }
- // This is called in the newly-created thread before it runs anything else,
- // with the pointer returned by BeforeThreadCreateHook (above). Here we can
- // setup the stack ring buffer.
- static void ThreadStartHook(void *hook, thrd_t self) {
- Thread *thread = static_cast<Thread *>(hook);
- FinishThreadInitialization(thread);
- thread->EnsureRandomStateInited();
- }
- // This is the function that sets up the stack ring buffer and enables us to use
- // GetCurrentThread. This function should only be called while IN the thread
- // that we want to create the hwasan thread object for so __hwasan_tls can be
- // properly referenced.
- static void FinishThreadInitialization(Thread *thread) {
- CHECK_NE(thread, nullptr);
- // The ring buffer is located immediately before the thread object.
- uptr stack_buffer_size = hwasanThreadList().GetRingBufferSize();
- uptr stack_buffer_start = reinterpret_cast<uptr>(thread) - stack_buffer_size;
- thread->InitStackRingBuffer(stack_buffer_start, stack_buffer_size);
- }
- static void ThreadExitHook(void *hook, thrd_t self) {
- Thread *thread = static_cast<Thread *>(hook);
- atomic_signal_fence(memory_order_seq_cst);
- hwasanThreadList().ReleaseThread(thread);
- }
- uptr TagMemoryAligned(uptr p, uptr size, tag_t tag) {
- CHECK(IsAligned(p, kShadowAlignment));
- CHECK(IsAligned(size, kShadowAlignment));
- __sanitizer_fill_shadow(p, size, tag,
- common_flags()->clear_shadow_mmap_threshold);
- return AddTagToPointer(p, tag);
- }
- // Not implemented because Fuchsia does not use signal handlers.
- void HwasanOnDeadlySignal(int signo, void *info, void *context) {}
- // Not implemented because Fuchsia does not use interceptors.
- void InitializeInterceptors() {}
- // Not implemented because this is only relevant for Android.
- void AndroidTestTlsSlot() {}
- // TSD was normally used on linux as a means of calling the hwasan thread exit
- // handler passed to pthread_key_create. This is not needed on Fuchsia because
- // we will be using __sanitizer_thread_exit_hook.
- void HwasanTSDInit() {}
- void HwasanTSDThreadInit() {}
- // On linux, this just would call `atexit(HwasanAtExit)`. The functions in
- // HwasanAtExit are unimplemented for Fuchsia and effectively no-ops, so this
- // function is unneeded.
- void InstallAtExitHandler() {}
- void HwasanInstallAtForkHandler() {}
- void InstallAtExitCheckLeaks() {}
- void InitializeOsSupport() {
- #ifdef __aarch64__
- uint32_t features = 0;
- CHECK_EQ(zx_system_get_features(ZX_FEATURE_KIND_ADDRESS_TAGGING, &features),
- ZX_OK);
- if (!(features & ZX_ARM64_FEATURE_ADDRESS_TAGGING_TBI) &&
- flags()->fail_without_syscall_abi) {
- Printf(
- "FATAL: HWAddressSanitizer requires "
- "ZX_ARM64_FEATURE_ADDRESS_TAGGING_TBI.\n");
- Die();
- }
- #endif
- }
- } // namespace __hwasan
- namespace __lsan {
- bool UseExitcodeOnLeak() { return __hwasan::flags()->halt_on_error; }
- } // namespace __lsan
- extern "C" {
- void *__sanitizer_before_thread_create_hook(thrd_t thread, bool detached,
- const char *name, void *stack_base,
- size_t stack_size) {
- return __hwasan::BeforeThreadCreateHook(
- reinterpret_cast<uptr>(thread), detached, name,
- reinterpret_cast<uptr>(stack_base), stack_size);
- }
- void __sanitizer_thread_create_hook(void *hook, thrd_t thread, int error) {
- __hwasan::ThreadCreateHook(hook, error != thrd_success);
- }
- void __sanitizer_thread_start_hook(void *hook, thrd_t self) {
- __hwasan::ThreadStartHook(hook, reinterpret_cast<uptr>(self));
- }
- void __sanitizer_thread_exit_hook(void *hook, thrd_t self) {
- __hwasan::ThreadExitHook(hook, self);
- }
- void __sanitizer_module_loaded(const struct dl_phdr_info *info, size_t) {
- __hwasan_library_loaded(info->dlpi_addr, info->dlpi_phdr, info->dlpi_phnum);
- }
- } // extern "C"
- #endif // SANITIZER_FUCHSIA
|