1 1.1 kamil //===-- asan_rtems.cc -----------------------------------------------------===// 2 1.1 kamil // 3 1.1 kamil // The LLVM Compiler Infrastructure 4 1.1 kamil // 5 1.1 kamil // This file is distributed under the University of Illinois Open Source 6 1.1 kamil // License. See LICENSE.TXT for details. 7 1.1 kamil // 8 1.1 kamil //===----------------------------------------------------------------------===// 9 1.1 kamil // 10 1.1 kamil // This file is a part of AddressSanitizer, an address sanity checker. 11 1.1 kamil // 12 1.1 kamil // RTEMS-specific details. 13 1.1 kamil //===----------------------------------------------------------------------===// 14 1.1 kamil 15 1.1 kamil #include "sanitizer_common/sanitizer_rtems.h" 16 1.1 kamil #if SANITIZER_RTEMS 17 1.1 kamil 18 1.1 kamil #include "asan_internal.h" 19 1.1 kamil #include "asan_interceptors.h" 20 1.1 kamil #include "asan_mapping.h" 21 1.1 kamil #include "asan_poisoning.h" 22 1.1 kamil #include "asan_report.h" 23 1.1 kamil #include "asan_stack.h" 24 1.1 kamil #include "sanitizer_common/sanitizer_common.h" 25 1.1 kamil #include "sanitizer_common/sanitizer_libc.h" 26 1.1 kamil 27 1.1 kamil #include <pthread.h> 28 1.1 kamil #include <stdlib.h> 29 1.1 kamil 30 1.1 kamil namespace __asan { 31 1.1 kamil 32 1.1 kamil static void ResetShadowMemory() { 33 1.1 kamil uptr shadow_start = SHADOW_OFFSET; 34 1.1 kamil uptr shadow_end = MEM_TO_SHADOW(kMyriadMemoryEnd32); 35 1.1 kamil uptr gap_start = MEM_TO_SHADOW(shadow_start); 36 1.1 kamil uptr gap_end = MEM_TO_SHADOW(shadow_end); 37 1.1 kamil 38 1.1 kamil REAL(memset)((void *)shadow_start, 0, shadow_end - shadow_start); 39 1.1 kamil REAL(memset)((void *)gap_start, kAsanShadowGap, gap_end - gap_start); 40 1.1 kamil } 41 1.1 kamil 42 1.1 kamil void InitializeShadowMemory() { 43 1.1 kamil kHighMemEnd = 0; 44 1.1 kamil kMidMemBeg = 0; 45 1.1 kamil kMidMemEnd = 0; 46 1.1 kamil 47 1.1 kamil ResetShadowMemory(); 48 1.1 kamil } 49 1.1 kamil 50 1.1 kamil void AsanApplyToGlobals(globals_op_fptr op, const void *needle) { 51 1.1 kamil UNIMPLEMENTED(); 52 1.1 kamil } 53 1.1 kamil 54 1.1 kamil void AsanCheckDynamicRTPrereqs() {} 55 1.1 kamil void AsanCheckIncompatibleRT() {} 56 1.1 kamil void InitializeAsanInterceptors() {} 57 1.1 kamil void InitializePlatformInterceptors() {} 58 1.1 kamil void InitializePlatformExceptionHandlers() {} 59 1.1 kamil 60 1.1 kamil // RTEMS only support static linking; it sufficies to return with no 61 1.1 kamil // error. 62 1.1 kamil void *AsanDoesNotSupportStaticLinkage() { return nullptr; } 63 1.1 kamil 64 1.1 kamil void AsanOnDeadlySignal(int signo, void *siginfo, void *context) { 65 1.1 kamil UNIMPLEMENTED(); 66 1.1 kamil } 67 1.1 kamil 68 1.1 kamil void EarlyInit() { 69 1.1 kamil // Provide early initialization of shadow memory so that 70 1.1 kamil // instrumented code running before full initialzation will not 71 1.1 kamil // report spurious errors. 72 1.1 kamil ResetShadowMemory(); 73 1.1 kamil } 74 1.1 kamil 75 1.1 kamil // We can use a plain thread_local variable for TSD. 76 1.1 kamil static thread_local void *per_thread; 77 1.1 kamil 78 1.1 kamil void *AsanTSDGet() { return per_thread; } 79 1.1 kamil 80 1.1 kamil void AsanTSDSet(void *tsd) { per_thread = tsd; } 81 1.1 kamil 82 1.1 kamil // There's no initialization needed, and the passed-in destructor 83 1.1 kamil // will never be called. Instead, our own thread destruction hook 84 1.1 kamil // (below) will call AsanThread::TSDDtor directly. 85 1.1 kamil void AsanTSDInit(void (*destructor)(void *tsd)) { 86 1.1 kamil DCHECK(destructor == &PlatformTSDDtor); 87 1.1 kamil } 88 1.1 kamil 89 1.1 kamil void PlatformTSDDtor(void *tsd) { UNREACHABLE(__func__); } 90 1.1 kamil 91 1.1 kamil // 92 1.1 kamil // Thread registration. We provide an API similar to the Fushia port. 93 1.1 kamil // 94 1.1 kamil 95 1.1 kamil struct AsanThread::InitOptions { 96 1.1 kamil uptr stack_bottom, stack_size, tls_bottom, tls_size; 97 1.1 kamil }; 98 1.1 kamil 99 1.1 kamil // Shared setup between thread creation and startup for the initial thread. 100 1.1 kamil static AsanThread *CreateAsanThread(StackTrace *stack, u32 parent_tid, 101 1.1 kamil uptr user_id, bool detached, 102 1.1 kamil uptr stack_bottom, uptr stack_size, 103 1.1 kamil uptr tls_bottom, uptr tls_size) { 104 1.1 kamil // In lieu of AsanThread::Create. 105 1.1 kamil AsanThread *thread = (AsanThread *)MmapOrDie(sizeof(AsanThread), __func__); 106 1.1 kamil AsanThreadContext::CreateThreadContextArgs args = {thread, stack}; 107 1.1 kamil asanThreadRegistry().CreateThread(user_id, detached, parent_tid, &args); 108 1.1 kamil 109 1.1 kamil // On other systems, AsanThread::Init() is called from the new 110 1.1 kamil // thread itself. But on RTEMS we already know the stack address 111 1.1 kamil // range beforehand, so we can do most of the setup right now. 112 1.1 kamil const AsanThread::InitOptions options = {stack_bottom, stack_size, 113 1.1 kamil tls_bottom, tls_size}; 114 1.1 kamil thread->Init(&options); 115 1.1 kamil return thread; 116 1.1 kamil } 117 1.1 kamil 118 1.1 kamil // This gets the same arguments passed to Init by CreateAsanThread, above. 119 1.1 kamil // We're in the creator thread before the new thread is actually started, but 120 1.1 kamil // its stack and tls address range are already known. 121 1.1 kamil void AsanThread::SetThreadStackAndTls(const AsanThread::InitOptions *options) { 122 1.1 kamil DCHECK_NE(GetCurrentThread(), this); 123 1.1 kamil DCHECK_NE(GetCurrentThread(), nullptr); 124 1.1 kamil CHECK_NE(options->stack_bottom, 0); 125 1.1 kamil CHECK_NE(options->stack_size, 0); 126 1.1 kamil stack_bottom_ = options->stack_bottom; 127 1.1 kamil stack_top_ = options->stack_bottom + options->stack_size; 128 1.1 kamil tls_begin_ = options->tls_bottom; 129 1.1 kamil tls_end_ = options->tls_bottom + options->tls_size; 130 1.1 kamil } 131 1.1 kamil 132 1.1 kamil // Called by __asan::AsanInitInternal (asan_rtl.c). Unlike other ports, the 133 1.1 kamil // main thread on RTEMS does not require special treatment; its AsanThread is 134 1.1 kamil // already created by the provided hooks. This function simply looks up and 135 1.1 kamil // returns the created thread. 136 1.1 kamil AsanThread *CreateMainThread() { 137 1.1 kamil return GetThreadContextByTidLocked(0)->thread; 138 1.1 kamil } 139 1.1 kamil 140 1.1 kamil // This is called before each thread creation is attempted. So, in 141 1.1 kamil // its first call, the calling thread is the initial and sole thread. 142 1.1 kamil static void *BeforeThreadCreateHook(uptr user_id, bool detached, 143 1.1 kamil uptr stack_bottom, uptr stack_size, 144 1.1 kamil uptr tls_bottom, uptr tls_size) { 145 1.1 kamil EnsureMainThreadIDIsCorrect(); 146 1.1 kamil // Strict init-order checking is thread-hostile. 147 1.1 kamil if (flags()->strict_init_order) StopInitOrderChecking(); 148 1.1 kamil 149 1.1 kamil GET_STACK_TRACE_THREAD; 150 1.1 kamil u32 parent_tid = GetCurrentTidOrInvalid(); 151 1.1 kamil 152 1.1 kamil return CreateAsanThread(&stack, parent_tid, user_id, detached, 153 1.1 kamil stack_bottom, stack_size, tls_bottom, tls_size); 154 1.1 kamil } 155 1.1 kamil 156 1.1 kamil // This is called after creating a new thread (in the creating thread), 157 1.1 kamil // with the pointer returned by BeforeThreadCreateHook (above). 158 1.1 kamil static void ThreadCreateHook(void *hook, bool aborted) { 159 1.1 kamil AsanThread *thread = static_cast<AsanThread *>(hook); 160 1.1 kamil if (!aborted) { 161 1.1 kamil // The thread was created successfully. 162 1.1 kamil // ThreadStartHook is already running in the new thread. 163 1.1 kamil } else { 164 1.1 kamil // The thread wasn't created after all. 165 1.1 kamil // Clean up everything we set up in BeforeThreadCreateHook. 166 1.1 kamil asanThreadRegistry().FinishThread(thread->tid()); 167 1.1 kamil UnmapOrDie(thread, sizeof(AsanThread)); 168 1.1 kamil } 169 1.1 kamil } 170 1.1 kamil 171 1.1 kamil // This is called (1) in the newly-created thread before it runs anything else, 172 1.1 kamil // with the pointer returned by BeforeThreadCreateHook (above). (2) before a 173 1.1 kamil // thread restart. 174 1.1 kamil static void ThreadStartHook(void *hook, uptr os_id) { 175 1.1 kamil if (!hook) 176 1.1 kamil return; 177 1.1 kamil 178 1.1 kamil AsanThread *thread = static_cast<AsanThread *>(hook); 179 1.1 kamil SetCurrentThread(thread); 180 1.1 kamil 181 1.1 kamil ThreadStatus status = 182 1.1 kamil asanThreadRegistry().GetThreadLocked(thread->tid())->status; 183 1.1 kamil DCHECK(status == ThreadStatusCreated || status == ThreadStatusRunning); 184 1.1 kamil // Determine whether we are starting or restarting the thread. 185 1.1 kamil if (status == ThreadStatusCreated) 186 1.1 kamil // In lieu of AsanThread::ThreadStart. 187 1.1 kamil asanThreadRegistry().StartThread(thread->tid(), os_id, 188 1.1 kamil /*workerthread*/ false, nullptr); 189 1.1 kamil else { 190 1.1 kamil // In a thread restart, a thread may resume execution at an 191 1.1 kamil // arbitrary function entry point, with its stack and TLS state 192 1.1 kamil // reset. We unpoison the stack in that case. 193 1.1 kamil PoisonShadow(thread->stack_bottom(), thread->stack_size(), 0); 194 1.1 kamil } 195 1.1 kamil } 196 1.1 kamil 197 1.1 kamil // Each thread runs this just before it exits, 198 1.1 kamil // with the pointer returned by BeforeThreadCreateHook (above). 199 1.1 kamil // All per-thread destructors have already been called. 200 1.1 kamil static void ThreadExitHook(void *hook, uptr os_id) { 201 1.1 kamil AsanThread *thread = static_cast<AsanThread *>(hook); 202 1.1 kamil if (thread) 203 1.1 kamil AsanThread::TSDDtor(thread->context()); 204 1.1 kamil } 205 1.1 kamil 206 1.1 kamil static void HandleExit() { 207 1.1 kamil // Disable ASan by setting it to uninitialized. Also reset the 208 1.1 kamil // shadow memory to avoid reporting errors after the run-time has 209 1.1 kamil // been desroyed. 210 1.1 kamil if (asan_inited) { 211 1.1 kamil asan_inited = false; 212 1.1 kamil ResetShadowMemory(); 213 1.1 kamil } 214 1.1 kamil } 215 1.1 kamil 216 1.1 kamil bool HandleDlopenInit() { 217 1.1 kamil // Not supported on this platform. 218 1.1 kamil static_assert(!SANITIZER_SUPPORTS_INIT_FOR_DLOPEN, 219 1.1 kamil "Expected SANITIZER_SUPPORTS_INIT_FOR_DLOPEN to be false"); 220 1.1 kamil return false; 221 1.1 kamil } 222 1.1 kamil } // namespace __asan 223 1.1 kamil 224 1.1 kamil // These are declared (in extern "C") by <some_path/sanitizer.h>. 225 1.1 kamil // The system runtime will call our definitions directly. 226 1.1 kamil 227 1.1 kamil extern "C" { 228 1.1 kamil void __sanitizer_early_init() { 229 1.1 kamil __asan::EarlyInit(); 230 1.1 kamil } 231 1.1 kamil 232 1.1 kamil void *__sanitizer_before_thread_create_hook(uptr thread, bool detached, 233 1.1 kamil const char *name, 234 1.1 kamil void *stack_base, size_t stack_size, 235 1.1 kamil void *tls_base, size_t tls_size) { 236 1.1 kamil return __asan::BeforeThreadCreateHook( 237 1.1 kamil thread, detached, 238 1.1 kamil reinterpret_cast<uptr>(stack_base), stack_size, 239 1.1 kamil reinterpret_cast<uptr>(tls_base), tls_size); 240 1.1 kamil } 241 1.1 kamil 242 1.1 kamil void __sanitizer_thread_create_hook(void *handle, uptr thread, int status) { 243 1.1 kamil __asan::ThreadCreateHook(handle, status != 0); 244 1.1 kamil } 245 1.1 kamil 246 1.1 kamil void __sanitizer_thread_start_hook(void *handle, uptr self) { 247 1.1 kamil __asan::ThreadStartHook(handle, self); 248 1.1 kamil } 249 1.1 kamil 250 1.1 kamil void __sanitizer_thread_exit_hook(void *handle, uptr self) { 251 1.1 kamil __asan::ThreadExitHook(handle, self); 252 1.1 kamil } 253 1.1 kamil 254 1.1 kamil void __sanitizer_exit() { 255 1.1 kamil __asan::HandleExit(); 256 1.1 kamil } 257 1.1 kamil } // "C" 258 1.1 kamil 259 1.1 kamil #endif // SANITIZER_RTEMS 260