1 1.1 kamil //===-- asan_fuchsia.cc --------------------------------------------------===// 2 1.1 kamil // 3 1.1 kamil // The LLVM Compiler Infrastructure 4 1.1 kamil // 5 1.1 kamil // This file is distributed under the University of Illinois Open Source 6 1.1 kamil // License. See LICENSE.TXT for details. 7 1.1 kamil // 8 1.1 kamil //===---------------------------------------------------------------------===// 9 1.1 kamil // 10 1.1 kamil // This file is a part of AddressSanitizer, an address sanity checker. 11 1.1 kamil // 12 1.1 kamil // Fuchsia-specific details. 13 1.1 kamil //===---------------------------------------------------------------------===// 14 1.1 kamil 15 1.1 kamil #include "sanitizer_common/sanitizer_fuchsia.h" 16 1.1 kamil #if SANITIZER_FUCHSIA 17 1.1 kamil 18 1.1 kamil #include "asan_interceptors.h" 19 1.1 kamil #include "asan_internal.h" 20 1.1 kamil #include "asan_stack.h" 21 1.1 kamil #include "asan_thread.h" 22 1.1 kamil 23 1.1 kamil #include <limits.h> 24 1.1 kamil #include <zircon/sanitizer.h> 25 1.1 kamil #include <zircon/syscalls.h> 26 1.1 kamil #include <zircon/threads.h> 27 1.1 kamil 28 1.1 kamil namespace __asan { 29 1.1 kamil 30 1.1 kamil // The system already set up the shadow memory for us. 31 1.1 kamil // __sanitizer::GetMaxUserVirtualAddress has already been called by 32 1.1 kamil // AsanInitInternal->InitializeHighMemEnd (asan_rtl.cc). 33 1.1 kamil // Just do some additional sanity checks here. 34 1.1 kamil void InitializeShadowMemory() { 35 1.1 kamil if (Verbosity()) PrintAddressSpaceLayout(); 36 1.1 kamil 37 1.1 kamil // Make sure SHADOW_OFFSET doesn't use __asan_shadow_memory_dynamic_address. 38 1.1 kamil __asan_shadow_memory_dynamic_address = kDefaultShadowSentinel; 39 1.1 kamil DCHECK(kLowShadowBeg != kDefaultShadowSentinel); 40 1.1 kamil __asan_shadow_memory_dynamic_address = kLowShadowBeg; 41 1.1 kamil 42 1.1 kamil CHECK_EQ(kShadowGapEnd, kHighShadowBeg - 1); 43 1.1 kamil CHECK_EQ(kHighMemEnd, __sanitizer::ShadowBounds.memory_limit - 1); 44 1.1 kamil CHECK_EQ(kHighMemBeg, __sanitizer::ShadowBounds.shadow_limit); 45 1.1 kamil CHECK_EQ(kHighShadowBeg, __sanitizer::ShadowBounds.shadow_base); 46 1.1 kamil CHECK_EQ(kShadowGapEnd, __sanitizer::ShadowBounds.shadow_base - 1); 47 1.1 kamil CHECK_EQ(kLowShadowEnd, 0); 48 1.1 kamil CHECK_EQ(kLowShadowBeg, 0); 49 1.1 kamil } 50 1.1 kamil 51 1.1 kamil void AsanApplyToGlobals(globals_op_fptr op, const void *needle) { 52 1.1 kamil UNIMPLEMENTED(); 53 1.1 kamil } 54 1.1 kamil 55 1.1 kamil void AsanCheckDynamicRTPrereqs() {} 56 1.1 kamil void AsanCheckIncompatibleRT() {} 57 1.1 kamil void InitializeAsanInterceptors() {} 58 1.1 kamil 59 1.1 kamil void *AsanDoesNotSupportStaticLinkage() { return nullptr; } 60 1.1 kamil 61 1.1 kamil void InitializePlatformExceptionHandlers() {} 62 1.1 kamil void AsanOnDeadlySignal(int signo, void *siginfo, void *context) { 63 1.1 kamil UNIMPLEMENTED(); 64 1.1 kamil } 65 1.1 kamil 66 1.1 kamil // We can use a plain thread_local variable for TSD. 67 1.1 kamil static thread_local void *per_thread; 68 1.1 kamil 69 1.1 kamil void *AsanTSDGet() { return per_thread; } 70 1.1 kamil 71 1.1 kamil void AsanTSDSet(void *tsd) { per_thread = tsd; } 72 1.1 kamil 73 1.1 kamil // There's no initialization needed, and the passed-in destructor 74 1.1 kamil // will never be called. Instead, our own thread destruction hook 75 1.1 kamil // (below) will call AsanThread::TSDDtor directly. 76 1.1 kamil void AsanTSDInit(void (*destructor)(void *tsd)) { 77 1.1 kamil DCHECK(destructor == &PlatformTSDDtor); 78 1.1 kamil } 79 1.1 kamil 80 1.1 kamil void PlatformTSDDtor(void *tsd) { UNREACHABLE(__func__); } 81 1.1 kamil 82 1.1 kamil static inline size_t AsanThreadMmapSize() { 83 1.1 kamil return RoundUpTo(sizeof(AsanThread), PAGE_SIZE); 84 1.1 kamil } 85 1.1 kamil 86 1.1 kamil struct AsanThread::InitOptions { 87 1.1 kamil uptr stack_bottom, stack_size; 88 1.1 kamil }; 89 1.1 kamil 90 1.1 kamil // Shared setup between thread creation and startup for the initial thread. 91 1.1 kamil static AsanThread *CreateAsanThread(StackTrace *stack, u32 parent_tid, 92 1.1 kamil uptr user_id, bool detached, 93 1.1 kamil const char *name, uptr stack_bottom, 94 1.1 kamil uptr stack_size) { 95 1.1 kamil // In lieu of AsanThread::Create. 96 1.1 kamil AsanThread *thread = (AsanThread *)MmapOrDie(AsanThreadMmapSize(), __func__); 97 1.1 kamil 98 1.1 kamil AsanThreadContext::CreateThreadContextArgs args = {thread, stack}; 99 1.1 kamil u32 tid = 100 1.1 kamil asanThreadRegistry().CreateThread(user_id, detached, parent_tid, &args); 101 1.1 kamil asanThreadRegistry().SetThreadName(tid, name); 102 1.1 kamil 103 1.1 kamil // On other systems, AsanThread::Init() is called from the new 104 1.1 kamil // thread itself. But on Fuchsia we already know the stack address 105 1.1 kamil // range beforehand, so we can do most of the setup right now. 106 1.1 kamil const AsanThread::InitOptions options = {stack_bottom, stack_size}; 107 1.1 kamil thread->Init(&options); 108 1.1 kamil 109 1.1 kamil return thread; 110 1.1 kamil } 111 1.1 kamil 112 1.1 kamil // This gets the same arguments passed to Init by CreateAsanThread, above. 113 1.1 kamil // We're in the creator thread before the new thread is actually started, 114 1.1 kamil // but its stack address range is already known. We don't bother tracking 115 1.1 kamil // the static TLS address range because the system itself already uses an 116 1.1 kamil // ASan-aware allocator for that. 117 1.1 kamil void AsanThread::SetThreadStackAndTls(const AsanThread::InitOptions *options) { 118 1.1 kamil DCHECK_NE(GetCurrentThread(), this); 119 1.1 kamil DCHECK_NE(GetCurrentThread(), nullptr); 120 1.1 kamil CHECK_NE(options->stack_bottom, 0); 121 1.1 kamil CHECK_NE(options->stack_size, 0); 122 1.1 kamil stack_bottom_ = options->stack_bottom; 123 1.1 kamil stack_top_ = options->stack_bottom + options->stack_size; 124 1.1 kamil } 125 1.1 kamil 126 1.1 kamil // Called by __asan::AsanInitInternal (asan_rtl.c). 127 1.1 kamil AsanThread *CreateMainThread() { 128 1.1 kamil thrd_t self = thrd_current(); 129 1.1 kamil char name[ZX_MAX_NAME_LEN]; 130 1.1 kamil CHECK_NE(__sanitizer::MainThreadStackBase, 0); 131 1.1 kamil CHECK_GT(__sanitizer::MainThreadStackSize, 0); 132 1.1 kamil AsanThread *t = CreateAsanThread( 133 1.1 kamil nullptr, 0, reinterpret_cast<uptr>(self), true, 134 1.1 kamil _zx_object_get_property(thrd_get_zx_handle(self), ZX_PROP_NAME, name, 135 1.1 kamil sizeof(name)) == ZX_OK 136 1.1 kamil ? name 137 1.1 kamil : nullptr, 138 1.1 kamil __sanitizer::MainThreadStackBase, __sanitizer::MainThreadStackSize); 139 1.1 kamil SetCurrentThread(t); 140 1.1 kamil return t; 141 1.1 kamil } 142 1.1 kamil 143 1.1 kamil // This is called before each thread creation is attempted. So, in 144 1.1 kamil // its first call, the calling thread is the initial and sole thread. 145 1.1 kamil static void *BeforeThreadCreateHook(uptr user_id, bool detached, 146 1.1 kamil const char *name, uptr stack_bottom, 147 1.1 kamil uptr stack_size) { 148 1.1 kamil EnsureMainThreadIDIsCorrect(); 149 1.1 kamil // Strict init-order checking is thread-hostile. 150 1.1 kamil if (flags()->strict_init_order) StopInitOrderChecking(); 151 1.1 kamil 152 1.1 kamil GET_STACK_TRACE_THREAD; 153 1.1 kamil u32 parent_tid = GetCurrentTidOrInvalid(); 154 1.1 kamil 155 1.1 kamil return CreateAsanThread(&stack, parent_tid, user_id, detached, name, 156 1.1 kamil stack_bottom, stack_size); 157 1.1 kamil } 158 1.1 kamil 159 1.1 kamil // This is called after creating a new thread (in the creating thread), 160 1.1 kamil // with the pointer returned by BeforeThreadCreateHook (above). 161 1.1 kamil static void ThreadCreateHook(void *hook, bool aborted) { 162 1.1 kamil AsanThread *thread = static_cast<AsanThread *>(hook); 163 1.1 kamil if (!aborted) { 164 1.1 kamil // The thread was created successfully. 165 1.1 kamil // ThreadStartHook is already running in the new thread. 166 1.1 kamil } else { 167 1.1 kamil // The thread wasn't created after all. 168 1.1 kamil // Clean up everything we set up in BeforeThreadCreateHook. 169 1.1 kamil asanThreadRegistry().FinishThread(thread->tid()); 170 1.1 kamil UnmapOrDie(thread, AsanThreadMmapSize()); 171 1.1 kamil } 172 1.1 kamil } 173 1.1 kamil 174 1.1 kamil // This is called in the newly-created thread before it runs anything else, 175 1.1 kamil // with the pointer returned by BeforeThreadCreateHook (above). 176 1.1 kamil // cf. asan_interceptors.cc:asan_thread_start 177 1.1 kamil static void ThreadStartHook(void *hook, uptr os_id) { 178 1.1 kamil AsanThread *thread = static_cast<AsanThread *>(hook); 179 1.1 kamil SetCurrentThread(thread); 180 1.1 kamil 181 1.1 kamil // In lieu of AsanThread::ThreadStart. 182 1.1 kamil asanThreadRegistry().StartThread(thread->tid(), os_id, /*workerthread*/ false, 183 1.1 kamil nullptr); 184 1.1 kamil } 185 1.1 kamil 186 1.1 kamil // Each thread runs this just before it exits, 187 1.1 kamil // with the pointer returned by BeforeThreadCreateHook (above). 188 1.1 kamil // All per-thread destructors have already been called. 189 1.1 kamil static void ThreadExitHook(void *hook, uptr os_id) { 190 1.1 kamil AsanThread::TSDDtor(per_thread); 191 1.1 kamil } 192 1.1 kamil 193 1.1 kamil bool HandleDlopenInit() { 194 1.1 kamil // Not supported on this platform. 195 1.1 kamil static_assert(!SANITIZER_SUPPORTS_INIT_FOR_DLOPEN, 196 1.1 kamil "Expected SANITIZER_SUPPORTS_INIT_FOR_DLOPEN to be false"); 197 1.1 kamil return false; 198 1.1 kamil } 199 1.1 kamil 200 1.1 kamil } // namespace __asan 201 1.1 kamil 202 1.1 kamil // These are declared (in extern "C") by <zircon/sanitizer.h>. 203 1.1 kamil // The system runtime will call our definitions directly. 204 1.1 kamil 205 1.1 kamil void *__sanitizer_before_thread_create_hook(thrd_t thread, bool detached, 206 1.1 kamil const char *name, void *stack_base, 207 1.1 kamil size_t stack_size) { 208 1.1 kamil return __asan::BeforeThreadCreateHook( 209 1.1 kamil reinterpret_cast<uptr>(thread), detached, name, 210 1.1 kamil reinterpret_cast<uptr>(stack_base), stack_size); 211 1.1 kamil } 212 1.1 kamil 213 1.1 kamil void __sanitizer_thread_create_hook(void *hook, thrd_t thread, int error) { 214 1.1 kamil __asan::ThreadCreateHook(hook, error != thrd_success); 215 1.1 kamil } 216 1.1 kamil 217 1.1 kamil void __sanitizer_thread_start_hook(void *hook, thrd_t self) { 218 1.1 kamil __asan::ThreadStartHook(hook, reinterpret_cast<uptr>(self)); 219 1.1 kamil } 220 1.1 kamil 221 1.1 kamil void __sanitizer_thread_exit_hook(void *hook, thrd_t self) { 222 1.1 kamil __asan::ThreadExitHook(hook, reinterpret_cast<uptr>(self)); 223 1.1 kamil } 224 1.1 kamil 225 1.1 kamil #endif // SANITIZER_FUCHSIA 226