1 | //===-- hwasan_fuchsia.cpp --------------------------------------*- C++ -*-===// |
2 | // |
3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
4 | // See https://llvm.org/LICENSE.txt for license information. |
5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
6 | // |
7 | //===----------------------------------------------------------------------===// |
8 | /// |
9 | /// \file |
10 | /// This file is a part of HWAddressSanitizer and contains Fuchsia-specific |
11 | /// code. |
12 | /// |
13 | //===----------------------------------------------------------------------===// |
14 | |
15 | #include "sanitizer_common/sanitizer_fuchsia.h" |
16 | #if SANITIZER_FUCHSIA |
17 | |
18 | #include <zircon/features.h> |
19 | #include <zircon/syscalls.h> |
20 | |
21 | #include "hwasan.h" |
22 | #include "hwasan_interface_internal.h" |
23 | #include "hwasan_report.h" |
24 | #include "hwasan_thread.h" |
25 | #include "hwasan_thread_list.h" |
26 | |
27 | // This TLS variable contains the location of the stack ring buffer and can be |
28 | // used to always find the hwasan thread object associated with the current |
29 | // running thread. |
30 | [[gnu::tls_model("initial-exec" )]] |
31 | SANITIZER_INTERFACE_ATTRIBUTE |
32 | THREADLOCAL uptr __hwasan_tls; |
33 | |
34 | namespace __hwasan { |
35 | |
36 | bool InitShadow() { |
37 | __sanitizer::InitShadowBounds(); |
38 | CHECK_NE(__sanitizer::ShadowBounds.shadow_limit, 0); |
39 | |
40 | // These variables are used by MemIsShadow for asserting we have a correct |
41 | // shadow address. On Fuchsia, we only have one region of shadow, so the |
42 | // bounds of Low shadow can be zero while High shadow represents the true |
43 | // bounds. Note that these are inclusive ranges. |
44 | kLowShadowStart = 0; |
45 | kLowShadowEnd = 0; |
46 | kHighShadowStart = __sanitizer::ShadowBounds.shadow_base; |
47 | kHighShadowEnd = __sanitizer::ShadowBounds.shadow_limit - 1; |
48 | |
49 | return true; |
50 | } |
51 | |
52 | bool MemIsApp(uptr p) { |
53 | CHECK(GetTagFromPointer(p) == 0); |
54 | return __sanitizer::ShadowBounds.shadow_limit <= p && |
55 | p <= (__sanitizer::ShadowBounds.memory_limit - 1); |
56 | } |
57 | |
58 | // These are known parameters passed to the hwasan runtime on thread creation. |
59 | struct Thread::InitState { |
60 | uptr stack_bottom, stack_top; |
61 | }; |
62 | |
63 | static void FinishThreadInitialization(Thread *thread); |
64 | |
65 | void InitThreads() { |
66 | // This is the minimal alignment needed for the storage where hwasan threads |
67 | // and their stack ring buffers are placed. This alignment is necessary so the |
68 | // stack ring buffer can perform a simple calculation to get the next element |
69 | // in the RB. The instructions for this calculation are emitted by the |
70 | // compiler. (Full explanation in hwasan_thread_list.h.) |
71 | uptr alloc_size = UINT64_C(1) << kShadowBaseAlignment; |
72 | uptr thread_start = reinterpret_cast<uptr>( |
73 | MmapAlignedOrDieOnFatalError(alloc_size, alloc_size, __func__)); |
74 | |
75 | InitThreadList(thread_start, alloc_size); |
76 | |
77 | // Create the hwasan thread object for the current (main) thread. Stack info |
78 | // for this thread is known from information passed via |
79 | // __sanitizer_startup_hook. |
80 | const Thread::InitState state = { |
81 | .stack_bottom = __sanitizer::MainThreadStackBase, |
82 | .stack_top = |
83 | __sanitizer::MainThreadStackBase + __sanitizer::MainThreadStackSize, |
84 | }; |
85 | FinishThreadInitialization(hwasanThreadList().CreateCurrentThread(&state)); |
86 | } |
87 | |
88 | uptr *GetCurrentThreadLongPtr() { return &__hwasan_tls; } |
89 | |
90 | // This is called from the parent thread before the new thread is created. Here |
91 | // we can propagate known info like the stack bounds to Thread::Init before |
92 | // jumping into the thread. We cannot initialize the stack ring buffer yet since |
93 | // we have not entered the new thread. |
94 | static void *BeforeThreadCreateHook(uptr user_id, bool detached, |
95 | const char *name, uptr stack_bottom, |
96 | uptr stack_size) { |
97 | const Thread::InitState state = { |
98 | .stack_bottom = stack_bottom, |
99 | .stack_top = stack_bottom + stack_size, |
100 | }; |
101 | return hwasanThreadList().CreateCurrentThread(&state); |
102 | } |
103 | |
104 | // This sets the stack top and bottom according to the InitState passed to |
105 | // CreateCurrentThread above. |
106 | void Thread::InitStackAndTls(const InitState *state) { |
107 | CHECK_NE(state->stack_bottom, 0); |
108 | CHECK_NE(state->stack_top, 0); |
109 | stack_bottom_ = state->stack_bottom; |
110 | stack_top_ = state->stack_top; |
111 | tls_end_ = tls_begin_ = 0; |
112 | } |
113 | |
114 | // This is called after creating a new thread with the pointer returned by |
115 | // BeforeThreadCreateHook. We are still in the creating thread and should check |
116 | // if it was actually created correctly. |
117 | static void ThreadCreateHook(void *hook, bool aborted) { |
118 | Thread *thread = static_cast<Thread *>(hook); |
119 | if (!aborted) { |
120 | // The thread was created successfully. |
121 | // ThreadStartHook can already be running in the new thread. |
122 | } else { |
123 | // The thread wasn't created after all. |
124 | // Clean up everything we set up in BeforeThreadCreateHook. |
125 | atomic_signal_fence(memory_order_seq_cst); |
126 | hwasanThreadList().ReleaseThread(thread); |
127 | } |
128 | } |
129 | |
130 | // This is called in the newly-created thread before it runs anything else, |
131 | // with the pointer returned by BeforeThreadCreateHook (above). Here we can |
132 | // setup the stack ring buffer. |
133 | static void ThreadStartHook(void *hook, thrd_t self) { |
134 | Thread *thread = static_cast<Thread *>(hook); |
135 | FinishThreadInitialization(thread); |
136 | thread->EnsureRandomStateInited(); |
137 | } |
138 | |
139 | // This is the function that sets up the stack ring buffer and enables us to use |
140 | // GetCurrentThread. This function should only be called while IN the thread |
141 | // that we want to create the hwasan thread object for so __hwasan_tls can be |
142 | // properly referenced. |
143 | static void FinishThreadInitialization(Thread *thread) { |
144 | CHECK_NE(thread, nullptr); |
145 | |
146 | // The ring buffer is located immediately before the thread object. |
147 | uptr stack_buffer_size = hwasanThreadList().GetRingBufferSize(); |
148 | uptr stack_buffer_start = reinterpret_cast<uptr>(thread) - stack_buffer_size; |
149 | thread->InitStackRingBuffer(stack_buffer_start, stack_buffer_size); |
150 | } |
151 | |
152 | static void ThreadExitHook(void *hook, thrd_t self) { |
153 | Thread *thread = static_cast<Thread *>(hook); |
154 | atomic_signal_fence(memory_order_seq_cst); |
155 | hwasanThreadList().ReleaseThread(thread); |
156 | } |
157 | |
158 | uptr TagMemoryAligned(uptr p, uptr size, tag_t tag) { |
159 | CHECK(IsAligned(p, kShadowAlignment)); |
160 | CHECK(IsAligned(size, kShadowAlignment)); |
161 | __sanitizer_fill_shadow(p, size, tag, |
162 | common_flags()->clear_shadow_mmap_threshold); |
163 | return AddTagToPointer(p, tag); |
164 | } |
165 | |
166 | // Not implemented because Fuchsia does not use signal handlers. |
167 | void HwasanOnDeadlySignal(int signo, void *info, void *context) {} |
168 | |
169 | // Not implemented because Fuchsia does not use interceptors. |
170 | void InitializeInterceptors() {} |
171 | |
172 | // Not implemented because this is only relevant for Android. |
173 | void AndroidTestTlsSlot() {} |
174 | |
175 | // TSD was normally used on linux as a means of calling the hwasan thread exit |
176 | // handler passed to pthread_key_create. This is not needed on Fuchsia because |
177 | // we will be using __sanitizer_thread_exit_hook. |
178 | void HwasanTSDInit() {} |
179 | void HwasanTSDThreadInit() {} |
180 | |
181 | // On linux, this just would call `atexit(HwasanAtExit)`. The functions in |
182 | // HwasanAtExit are unimplemented for Fuchsia and effectively no-ops, so this |
183 | // function is unneeded. |
184 | void InstallAtExitHandler() {} |
185 | |
186 | void HwasanInstallAtForkHandler() {} |
187 | |
188 | void InstallAtExitCheckLeaks() {} |
189 | |
190 | void InitializeOsSupport() { |
191 | #ifdef __aarch64__ |
192 | uint32_t features = 0; |
193 | CHECK_EQ(zx_system_get_features(ZX_FEATURE_KIND_ADDRESS_TAGGING, &features), |
194 | ZX_OK); |
195 | if (!(features & ZX_ARM64_FEATURE_ADDRESS_TAGGING_TBI) && |
196 | flags()->fail_without_syscall_abi) { |
197 | Printf( |
198 | "FATAL: HWAddressSanitizer requires " |
199 | "ZX_ARM64_FEATURE_ADDRESS_TAGGING_TBI.\n" ); |
200 | Die(); |
201 | } |
202 | #endif |
203 | } |
204 | |
205 | } // namespace __hwasan |
206 | |
207 | namespace __lsan { |
208 | |
209 | bool UseExitcodeOnLeak() { return __hwasan::flags()->halt_on_error; } |
210 | |
211 | } // namespace __lsan |
212 | |
213 | extern "C" { |
214 | |
215 | void *__sanitizer_before_thread_create_hook(thrd_t thread, bool detached, |
216 | const char *name, void *stack_base, |
217 | size_t stack_size) { |
218 | return __hwasan::BeforeThreadCreateHook( |
219 | reinterpret_cast<uptr>(thread), detached, name, |
220 | reinterpret_cast<uptr>(stack_base), stack_size); |
221 | } |
222 | |
223 | void __sanitizer_thread_create_hook(void *hook, thrd_t thread, int error) { |
224 | __hwasan::ThreadCreateHook(hook, error != thrd_success); |
225 | } |
226 | |
227 | void __sanitizer_thread_start_hook(void *hook, thrd_t self) { |
228 | __hwasan::ThreadStartHook(hook, reinterpret_cast<uptr>(self)); |
229 | } |
230 | |
231 | void __sanitizer_thread_exit_hook(void *hook, thrd_t self) { |
232 | __hwasan::ThreadExitHook(hook, self); |
233 | } |
234 | |
235 | void __sanitizer_module_loaded(const struct dl_phdr_info *info, size_t) { |
236 | __hwasan_library_loaded(info->dlpi_addr, info->dlpi_phdr, info->dlpi_phnum); |
237 | } |
238 | |
239 | } // extern "C" |
240 | |
241 | #endif // SANITIZER_FUCHSIA |
242 | |