86289a4ff4
Merged revision: 82bc6a094e85014f1891ef9407496f44af8fe442 with the fix for PR sanitizer/102911
216 lines
7.9 KiB
C++
216 lines
7.9 KiB
C++
//===-- hwasan_fuchsia.cpp --------------------------------------*- C++ -*-===//
|
|
//
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
///
|
|
/// \file
|
|
/// This file is a part of HWAddressSanitizer and contains Fuchsia-specific
|
|
/// code.
|
|
///
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "sanitizer_common/sanitizer_fuchsia.h"
|
|
#if SANITIZER_FUCHSIA
|
|
|
|
#include "hwasan.h"
|
|
#include "hwasan_interface_internal.h"
|
|
#include "hwasan_report.h"
|
|
#include "hwasan_thread.h"
|
|
#include "hwasan_thread_list.h"
|
|
|
|
// This TLS variable contains the location of the stack ring buffer and can be
|
|
// used to always find the hwasan thread object associated with the current
|
|
// running thread.
|
|
[[gnu::tls_model("initial-exec")]]
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
THREADLOCAL uptr __hwasan_tls;
|
|
|
|
namespace __hwasan {
|
|
|
|
bool InitShadow() {
|
|
__sanitizer::InitShadowBounds();
|
|
CHECK_NE(__sanitizer::ShadowBounds.shadow_limit, 0);
|
|
|
|
// These variables are used by MemIsShadow for asserting we have a correct
|
|
// shadow address. On Fuchsia, we only have one region of shadow, so the
|
|
// bounds of Low shadow can be zero while High shadow represents the true
|
|
// bounds. Note that these are inclusive ranges.
|
|
kLowShadowStart = 0;
|
|
kLowShadowEnd = 0;
|
|
kHighShadowStart = __sanitizer::ShadowBounds.shadow_base;
|
|
kHighShadowEnd = __sanitizer::ShadowBounds.shadow_limit - 1;
|
|
|
|
return true;
|
|
}
|
|
|
|
bool MemIsApp(uptr p) {
|
|
CHECK(GetTagFromPointer(p) == 0);
|
|
return __sanitizer::ShadowBounds.shadow_limit <= p &&
|
|
p <= (__sanitizer::ShadowBounds.memory_limit - 1);
|
|
}
|
|
|
|
// These are known parameters passed to the hwasan runtime on thread creation.
|
|
struct Thread::InitState {
|
|
uptr stack_bottom, stack_top;
|
|
};
|
|
|
|
static void FinishThreadInitialization(Thread *thread);
|
|
|
|
void InitThreads() {
|
|
// This is the minimal alignment needed for the storage where hwasan threads
|
|
// and their stack ring buffers are placed. This alignment is necessary so the
|
|
// stack ring buffer can perform a simple calculation to get the next element
|
|
// in the RB. The instructions for this calculation are emitted by the
|
|
// compiler. (Full explanation in hwasan_thread_list.h.)
|
|
uptr alloc_size = UINT64_C(1) << kShadowBaseAlignment;
|
|
uptr thread_start = reinterpret_cast<uptr>(
|
|
MmapAlignedOrDieOnFatalError(alloc_size, alloc_size, __func__));
|
|
|
|
InitThreadList(thread_start, alloc_size);
|
|
|
|
// Create the hwasan thread object for the current (main) thread. Stack info
|
|
// for this thread is known from information passed via
|
|
// __sanitizer_startup_hook.
|
|
const Thread::InitState state = {
|
|
.stack_bottom = __sanitizer::MainThreadStackBase,
|
|
.stack_top =
|
|
__sanitizer::MainThreadStackBase + __sanitizer::MainThreadStackSize,
|
|
};
|
|
FinishThreadInitialization(hwasanThreadList().CreateCurrentThread(&state));
|
|
}
|
|
|
|
uptr *GetCurrentThreadLongPtr() { return &__hwasan_tls; }
|
|
|
|
// This is called from the parent thread before the new thread is created. Here
|
|
// we can propagate known info like the stack bounds to Thread::Init before
|
|
// jumping into the thread. We cannot initialize the stack ring buffer yet since
|
|
// we have not entered the new thread.
|
|
static void *BeforeThreadCreateHook(uptr user_id, bool detached,
|
|
const char *name, uptr stack_bottom,
|
|
uptr stack_size) {
|
|
const Thread::InitState state = {
|
|
.stack_bottom = stack_bottom,
|
|
.stack_top = stack_bottom + stack_size,
|
|
};
|
|
return hwasanThreadList().CreateCurrentThread(&state);
|
|
}
|
|
|
|
// This sets the stack top and bottom according to the InitState passed to
|
|
// CreateCurrentThread above.
|
|
void Thread::InitStackAndTls(const InitState *state) {
|
|
CHECK_NE(state->stack_bottom, 0);
|
|
CHECK_NE(state->stack_top, 0);
|
|
stack_bottom_ = state->stack_bottom;
|
|
stack_top_ = state->stack_top;
|
|
tls_end_ = tls_begin_ = 0;
|
|
}
|
|
|
|
// This is called after creating a new thread with the pointer returned by
|
|
// BeforeThreadCreateHook. We are still in the creating thread and should check
|
|
// if it was actually created correctly.
|
|
static void ThreadCreateHook(void *hook, bool aborted) {
|
|
Thread *thread = static_cast<Thread *>(hook);
|
|
if (!aborted) {
|
|
// The thread was created successfully.
|
|
// ThreadStartHook can already be running in the new thread.
|
|
} else {
|
|
// The thread wasn't created after all.
|
|
// Clean up everything we set up in BeforeThreadCreateHook.
|
|
atomic_signal_fence(memory_order_seq_cst);
|
|
hwasanThreadList().ReleaseThread(thread);
|
|
}
|
|
}
|
|
|
|
// This is called in the newly-created thread before it runs anything else,
|
|
// with the pointer returned by BeforeThreadCreateHook (above). Here we can
|
|
// setup the stack ring buffer.
|
|
static void ThreadStartHook(void *hook, thrd_t self) {
|
|
Thread *thread = static_cast<Thread *>(hook);
|
|
FinishThreadInitialization(thread);
|
|
thread->EnsureRandomStateInited();
|
|
}
|
|
|
|
// This is the function that sets up the stack ring buffer and enables us to use
|
|
// GetCurrentThread. This function should only be called while IN the thread
|
|
// that we want to create the hwasan thread object for so __hwasan_tls can be
|
|
// properly referenced.
|
|
static void FinishThreadInitialization(Thread *thread) {
|
|
CHECK_NE(thread, nullptr);
|
|
|
|
// The ring buffer is located immediately before the thread object.
|
|
uptr stack_buffer_size = hwasanThreadList().GetRingBufferSize();
|
|
uptr stack_buffer_start = reinterpret_cast<uptr>(thread) - stack_buffer_size;
|
|
thread->InitStackRingBuffer(stack_buffer_start, stack_buffer_size);
|
|
}
|
|
|
|
static void ThreadExitHook(void *hook, thrd_t self) {
|
|
Thread *thread = static_cast<Thread *>(hook);
|
|
atomic_signal_fence(memory_order_seq_cst);
|
|
hwasanThreadList().ReleaseThread(thread);
|
|
}
|
|
|
|
uptr TagMemoryAligned(uptr p, uptr size, tag_t tag) {
|
|
CHECK(IsAligned(p, kShadowAlignment));
|
|
CHECK(IsAligned(size, kShadowAlignment));
|
|
__sanitizer_fill_shadow(p, size, tag,
|
|
common_flags()->clear_shadow_mmap_threshold);
|
|
return AddTagToPointer(p, tag);
|
|
}
|
|
|
|
// Not implemented because Fuchsia does not use signal handlers.
|
|
void HwasanOnDeadlySignal(int signo, void *info, void *context) {}
|
|
|
|
// Not implemented because Fuchsia does not use interceptors.
|
|
void InitializeInterceptors() {}
|
|
|
|
// Not implemented because this is only relevant for Android.
|
|
void AndroidTestTlsSlot() {}
|
|
|
|
// TSD was normally used on linux as a means of calling the hwasan thread exit
|
|
// handler passed to pthread_key_create. This is not needed on Fuchsia because
|
|
// we will be using __sanitizer_thread_exit_hook.
|
|
void HwasanTSDInit() {}
|
|
void HwasanTSDThreadInit() {}
|
|
|
|
// On linux, this just would call `atexit(HwasanAtExit)`. The functions in
|
|
// HwasanAtExit are unimplemented for Fuchsia and effectively no-ops, so this
|
|
// function is unneeded.
|
|
void InstallAtExitHandler() {}
|
|
|
|
void HwasanInstallAtForkHandler() {}
|
|
|
|
// TODO(fxbug.dev/81499): Once we finalize the tagged pointer ABI in zircon, we should come back
|
|
// here and implement the appropriate check that TBI is enabled.
|
|
void InitializeOsSupport() {}
|
|
|
|
} // namespace __hwasan
|
|
|
|
extern "C" {
|
|
|
|
void *__sanitizer_before_thread_create_hook(thrd_t thread, bool detached,
|
|
const char *name, void *stack_base,
|
|
size_t stack_size) {
|
|
return __hwasan::BeforeThreadCreateHook(
|
|
reinterpret_cast<uptr>(thread), detached, name,
|
|
reinterpret_cast<uptr>(stack_base), stack_size);
|
|
}
|
|
|
|
void __sanitizer_thread_create_hook(void *hook, thrd_t thread, int error) {
|
|
__hwasan::ThreadCreateHook(hook, error != thrd_success);
|
|
}
|
|
|
|
void __sanitizer_thread_start_hook(void *hook, thrd_t self) {
|
|
__hwasan::ThreadStartHook(hook, reinterpret_cast<uptr>(self));
|
|
}
|
|
|
|
void __sanitizer_thread_exit_hook(void *hook, thrd_t self) {
|
|
__hwasan::ThreadExitHook(hook, self);
|
|
}
|
|
|
|
} // extern "C"
|
|
|
|
#endif // SANITIZER_FUCHSIA
|