2013-02-27 19:22:40 +08:00
|
|
|
//===-- sanitizer_linux.h ---------------------------------------*- C++ -*-===//
|
|
|
|
//
|
2019-01-19 16:50:56 +08:00
|
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
2013-02-27 19:22:40 +08:00
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
//
|
|
|
|
// Linux-specific syscall wrappers and classes.
|
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#ifndef SANITIZER_LINUX_H
|
|
|
|
#define SANITIZER_LINUX_H
|
|
|
|
|
2013-09-10 22:36:16 +08:00
|
|
|
#include "sanitizer_platform.h"
|
2018-03-17 06:29:29 +08:00
|
|
|
#if SANITIZER_FREEBSD || SANITIZER_LINUX || SANITIZER_NETBSD || \
|
2020-10-20 18:14:26 +08:00
|
|
|
SANITIZER_SOLARIS
|
2013-04-05 15:41:21 +08:00
|
|
|
#include "sanitizer_common.h"
|
2013-02-27 19:22:40 +08:00
|
|
|
#include "sanitizer_internal_defs.h"
|
2018-12-08 04:05:55 +08:00
|
|
|
#include "sanitizer_platform_limits_freebsd.h"
|
2017-08-29 05:03:23 +08:00
|
|
|
#include "sanitizer_platform_limits_netbsd.h"
|
2013-10-15 20:57:59 +08:00
|
|
|
#include "sanitizer_platform_limits_posix.h"
|
[Sanitizers] Basic sanitizer Solaris support (PR 33274)
Summary:
This is the first mostly working version of the Sanitizer port to 32-bit Solaris/x86.
It is currently based on Solaris 11.4 Beta.
This part was initially developed inside libsanitizer in the GCC tree and should apply to
both. Subsequent parts will address changes to clang, the compiler-rt build system
and testsuite.
I'm not yet sure what the right patch granularity is: if it's profitable to split the patch
up, I'd like to get guidance on how to do so.
Most of the changes are probably straightforward with a few exceptions:
* The Solaris syscall interface isn't stable, undocumented and can change within an
OS release. The stable interface is the libc interface, which I'm using here, if possible
using the internal _-prefixed names.
* While the patch primarily target 32-bit x86, I've left a few sparc changes in. They
cannot currently be used with clang due to a backend limitation, but have worked
fine inside the gcc tree.
* Some functions (e.g. largefile versions of functions like open64) only exist in 32-bit
Solaris, so I've introduced a separate SANITIZER_SOLARIS32 to check for that.
The patch (with the subsequent ones to be submitted shortly) was tested
on i386-pc-solaris2.11. Only a few failures remain, some of them analyzed, some
still TBD:
AddressSanitizer-i386-sunos :: TestCases/Posix/concurrent_overflow.cc
AddressSanitizer-i386-sunos :: TestCases/init-order-atexit.cc
AddressSanitizer-i386-sunos :: TestCases/log-path_test.cc
AddressSanitizer-i386-sunos :: TestCases/malloc-no-intercept.c
AddressSanitizer-i386-sunos-dynamic :: TestCases/Posix/concurrent_overflow.cc
AddressSanitizer-i386-sunos-dynamic :: TestCases/Posix/start-deactivated.cc
AddressSanitizer-i386-sunos-dynamic :: TestCases/default_options.cc
AddressSanitizer-i386-sunos-dynamic :: TestCases/init-order-atexit.cc
AddressSanitizer-i386-sunos-dynamic :: TestCases/log-path_test.cc
AddressSanitizer-i386-sunos-dynamic :: TestCases/malloc-no-intercept.c
SanitizerCommon-Unit :: ./Sanitizer-i386-Test/MemoryMappingLayout.DumpListOfModules
SanitizerCommon-Unit :: ./Sanitizer-i386-Test/SanitizerCommon.PthreadDestructorIterations
Maybe this is good enough the get the ball rolling.
Reviewers: kcc, alekseyshl
Reviewed By: alekseyshl
Subscribers: srhines, jyknight, kubamracek, krytarowski, fedor.sergeev, llvm-commits, #sanitizers
Tags: #sanitizers
Differential Revision: https://reviews.llvm.org/D40898
llvm-svn: 320740
2017-12-15 04:14:29 +08:00
|
|
|
#include "sanitizer_platform_limits_solaris.h"
|
2017-08-29 05:03:23 +08:00
|
|
|
#include "sanitizer_posix.h"
|
2013-02-27 19:22:40 +08:00
|
|
|
|
2013-07-30 03:09:49 +08:00
|
|
|
struct link_map; // Opaque type returned by dlopen().
|
2020-03-26 20:35:09 +08:00
|
|
|
struct utsname;
|
2013-02-27 19:22:40 +08:00
|
|
|
|
|
|
|
namespace __sanitizer {
|
|
|
|
// Dirent structure for getdents(). Note that this structure is different from
|
|
|
|
// the one in <dirent.h>, which is used by readdir().
|
|
|
|
struct linux_dirent;
|
|
|
|
|
Removed platform-specific ifdefs from sanitizer_procmaps.h
Summary: Removed platform-specific ifdefs for linux, mac, freebsd and netbsd from sanitizer_procmaps.h
Patch by Yicheng Wang <yichengfb@fb.com>
Reviewers: kcc, kubamracek, alekseyshl, fjricci, vitalybuka
Reviewed By: fjricci, vitalybuka
Subscribers: vitalybuka, emaste, krytarowski, llvm-commits
Differential Revision: https://reviews.llvm.org/D38098
llvm-svn: 313999
2017-09-23 01:48:24 +08:00
|
|
|
struct ProcSelfMapsBuff {
|
|
|
|
char *data;
|
|
|
|
uptr mmaped_size;
|
|
|
|
uptr len;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct MemoryMappingLayoutData {
|
|
|
|
ProcSelfMapsBuff proc_self_maps;
|
|
|
|
const char *current;
|
|
|
|
};
|
|
|
|
|
|
|
|
void ReadProcMaps(ProcSelfMapsBuff *proc_maps);
|
|
|
|
|
2013-02-27 19:22:40 +08:00
|
|
|
// Syscall wrappers.
|
2013-05-08 22:43:49 +08:00
|
|
|
uptr internal_getdents(fd_t fd, struct linux_dirent *dirp, unsigned int count);
|
2017-07-14 05:59:01 +08:00
|
|
|
uptr internal_sigaltstack(const void* ss, void* oss);
|
2014-01-31 19:29:51 +08:00
|
|
|
uptr internal_sigprocmask(int how, __sanitizer_sigset_t *set,
|
|
|
|
__sanitizer_sigset_t *oldset);
|
2021-11-09 10:45:22 +08:00
|
|
|
|
|
|
|
void SetSigProcMask(__sanitizer_sigset_t *set, __sanitizer_sigset_t *oldset);
|
|
|
|
struct ScopedBlockSignals {
|
|
|
|
explicit ScopedBlockSignals(__sanitizer_sigset_t *copy);
|
|
|
|
~ScopedBlockSignals();
|
|
|
|
|
2021-12-07 14:35:55 +08:00
|
|
|
ScopedBlockSignals &operator=(const ScopedBlockSignals &) = delete;
|
|
|
|
ScopedBlockSignals(const ScopedBlockSignals &) = delete;
|
|
|
|
|
2021-11-09 10:45:22 +08:00
|
|
|
private:
|
|
|
|
__sanitizer_sigset_t saved_;
|
|
|
|
};
|
|
|
|
|
|
|
|
# if SANITIZER_GLIBC
|
2017-12-14 00:23:54 +08:00
|
|
|
uptr internal_clock_gettime(__sanitizer_clockid_t clk_id, void *tp);
|
2021-03-07 02:32:27 +08:00
|
|
|
#endif
|
2014-03-07 18:03:54 +08:00
|
|
|
|
|
|
|
// Linux-only syscalls.
|
|
|
|
#if SANITIZER_LINUX
|
|
|
|
uptr internal_prctl(int option, uptr arg2, uptr arg3, uptr arg4, uptr arg5);
|
2014-01-31 19:29:51 +08:00
|
|
|
// Used only by sanitizer_stoptheworld. Signal handlers that are actually used
|
|
|
|
// (like the process-wide error reporting SEGV handler) must use
|
|
|
|
// internal_sigaction instead.
|
|
|
|
int internal_sigaction_norestorer(int signum, const void *act, void *oldact);
|
2014-03-07 18:03:54 +08:00
|
|
|
void internal_sigdelset(__sanitizer_sigset_t *set, int signum);
|
2020-09-23 13:10:13 +08:00
|
|
|
#if defined(__x86_64__) || defined(__mips__) || defined(__aarch64__) || \
|
|
|
|
defined(__powerpc64__) || defined(__s390__) || defined(__i386__) || \
|
|
|
|
defined(__arm__) || SANITIZER_RISCV64
|
2013-09-02 19:36:19 +08:00
|
|
|
uptr internal_clone(int (*fn)(void *), void *child_stack, int flags, void *arg,
|
|
|
|
int *parent_tidptr, void *newtls, int *child_tidptr);
|
|
|
|
#endif
|
2020-05-30 16:13:07 +08:00
|
|
|
int internal_uname(struct utsname *buf);
|
2018-10-05 04:58:18 +08:00
|
|
|
#elif SANITIZER_FREEBSD
|
|
|
|
void internal_sigdelset(__sanitizer_sigset_t *set, int signum);
|
Add NetBSD LSan support
Summary:
Combine few relatively small changes into one:
- implement internal_ptrace() and internal_clone() for NetBSD
- add support for stoptheworld based on the ptrace(2) API
- define COMPILER_RT_HAS_LSAN for NetBSD
- enable tests for NetBSD/amd64
Inspired by the original implementation by Christos Zoulas in netbsd/src for GCC.
The implementation is in theory CPU independent through well defined macros
across all NetBSD ports, however only the x86_64 version was tested.
Reviewers: mgorny, dvyukov, vitalybuka, joerg, jfb
Reviewed By: vitalybuka
Subscribers: dexonsmith, jfb, srhines, kubamracek, llvm-commits, christos
Tags: #llvm
Differential Revision: https://reviews.llvm.org/D64057
llvm-svn: 365735
2019-07-11 14:22:35 +08:00
|
|
|
#elif SANITIZER_NETBSD
|
|
|
|
void internal_sigdelset(__sanitizer_sigset_t *set, int signum);
|
|
|
|
uptr internal_clone(int (*fn)(void *), void *child_stack, int flags, void *arg);
|
2014-03-07 18:03:54 +08:00
|
|
|
#endif // SANITIZER_LINUX
|
2013-02-27 19:22:40 +08:00
|
|
|
|
|
|
|
// This class reads thread IDs from /proc/<pid>/task using only syscalls.
|
|
|
|
class ThreadLister {
|
|
|
|
public:
|
2018-05-10 05:21:26 +08:00
|
|
|
explicit ThreadLister(pid_t pid);
|
2013-02-27 19:22:40 +08:00
|
|
|
~ThreadLister();
|
2018-05-10 12:02:59 +08:00
|
|
|
enum Result {
|
|
|
|
Error,
|
|
|
|
Incomplete,
|
|
|
|
Ok,
|
|
|
|
};
|
|
|
|
Result ListThreads(InternalMmapVector<tid_t> *threads);
|
2013-02-27 19:22:40 +08:00
|
|
|
|
|
|
|
private:
|
2018-05-10 12:02:59 +08:00
|
|
|
bool IsAlive(int tid);
|
|
|
|
|
2018-05-10 05:21:26 +08:00
|
|
|
pid_t pid_;
|
2018-05-08 07:29:48 +08:00
|
|
|
int descriptor_ = -1;
|
2018-05-07 13:56:36 +08:00
|
|
|
InternalMmapVector<char> buffer_;
|
2013-02-27 19:22:40 +08:00
|
|
|
};
|
2013-03-19 17:30:52 +08:00
|
|
|
|
2013-05-07 22:41:43 +08:00
|
|
|
// Exposed for testing.
|
|
|
|
uptr ThreadDescriptorSize();
|
2013-05-29 21:07:42 +08:00
|
|
|
uptr ThreadSelf();
|
2013-05-07 22:41:43 +08:00
|
|
|
|
2013-05-14 21:24:46 +08:00
|
|
|
// Matches a library's file name against a base name (stripping path and version
|
|
|
|
// information).
|
|
|
|
bool LibraryNameIs(const char *full_name, const char *base_name);
|
|
|
|
|
2013-07-30 03:09:49 +08:00
|
|
|
// Call cb for each region mapped by map.
|
|
|
|
void ForEachMappedRegion(link_map *map, void (*cb)(const void *, uptr));
|
2017-05-02 23:13:36 +08:00
|
|
|
|
2019-01-19 09:54:09 +08:00
|
|
|
// Releases memory pages entirely within the [beg, end] address range.
|
|
|
|
// The pages no longer count toward RSS; reads are guaranteed to return 0.
|
|
|
|
// Requires (but does not verify!) that pages are MAP_PRIVATE.
|
2020-09-17 22:04:50 +08:00
|
|
|
inline void ReleaseMemoryPagesToOSAndZeroFill(uptr beg, uptr end) {
|
2019-01-19 09:54:09 +08:00
|
|
|
// man madvise on Linux promises zero-fill for anonymous private pages.
|
|
|
|
// Testing shows the same behaviour for private (but not anonymous) mappings
|
|
|
|
// of shm_open() files, as long as the underlying file is untouched.
|
|
|
|
CHECK(SANITIZER_LINUX);
|
|
|
|
ReleaseMemoryPagesToOS(beg, end);
|
|
|
|
}
|
|
|
|
|
2017-05-02 23:13:36 +08:00
|
|
|
#if SANITIZER_ANDROID
|
|
|
|
|
|
|
|
#if defined(__aarch64__)
|
|
|
|
# define __get_tls() \
|
|
|
|
({ void** __v; __asm__("mrs %0, tpidr_el0" : "=r"(__v)); __v; })
|
|
|
|
#elif defined(__arm__)
|
|
|
|
# define __get_tls() \
|
|
|
|
({ void** __v; __asm__("mrc p15, 0, %0, c13, c0, 3" : "=r"(__v)); __v; })
|
|
|
|
#elif defined(__mips__)
|
|
|
|
// On mips32r1, this goes via a kernel illegal instruction trap that's
|
|
|
|
// optimized for v1.
|
|
|
|
# define __get_tls() \
|
|
|
|
({ register void** __v asm("v1"); \
|
|
|
|
__asm__(".set push\n" \
|
|
|
|
".set mips32r2\n" \
|
|
|
|
"rdhwr %0,$29\n" \
|
|
|
|
".set pop\n" : "=r"(__v)); \
|
|
|
|
__v; })
|
|
|
|
#elif defined(__i386__)
|
|
|
|
# define __get_tls() \
|
|
|
|
({ void** __v; __asm__("movl %%gs:0, %0" : "=r"(__v)); __v; })
|
|
|
|
#elif defined(__x86_64__)
|
|
|
|
# define __get_tls() \
|
|
|
|
({ void** __v; __asm__("mov %%fs:0, %0" : "=r"(__v)); __v; })
|
|
|
|
#else
|
|
|
|
#error "Unsupported architecture."
|
|
|
|
#endif
|
|
|
|
|
2019-01-05 08:45:14 +08:00
|
|
|
// The Android Bionic team has allocated a TLS slot for sanitizers starting
|
|
|
|
// with Q, given that Android currently doesn't support ELF TLS. It is used to
|
|
|
|
// store sanitizer thread specific data.
|
|
|
|
static const int TLS_SLOT_SANITIZER = 6;
|
2017-05-02 23:13:36 +08:00
|
|
|
|
|
|
|
ALWAYS_INLINE uptr *get_android_tls_ptr() {
|
2019-01-05 08:45:14 +08:00
|
|
|
return reinterpret_cast<uptr *>(&__get_tls()[TLS_SLOT_SANITIZER]);
|
2017-05-02 23:13:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
#endif // SANITIZER_ANDROID
|
|
|
|
|
2013-02-27 19:22:40 +08:00
|
|
|
} // namespace __sanitizer
|
|
|
|
|
2018-03-17 06:29:29 +08:00
|
|
|
#endif
|
2013-02-27 19:22:40 +08:00
|
|
|
#endif // SANITIZER_LINUX_H
|