1 //===-- hwasan_fuchsia.cpp --------------------------------------*- C++ -*-===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 ///
9 /// \file
10 /// This file is a part of HWAddressSanitizer and contains Fuchsia-specific
11 /// code.
12 ///
13 //===----------------------------------------------------------------------===//
14
15 #include "sanitizer_common/sanitizer_fuchsia.h"
16 #if SANITIZER_FUCHSIA
17
18 #include "hwasan.h"
19 #include "hwasan_interface_internal.h"
20 #include "hwasan_report.h"
21 #include "hwasan_thread.h"
22 #include "hwasan_thread_list.h"
23
24 // This TLS variable contains the location of the stack ring buffer and can be
25 // used to always find the hwasan thread object associated with the current
26 // running thread.
27 [[gnu::tls_model("initial-exec")]]
28 SANITIZER_INTERFACE_ATTRIBUTE
29 THREADLOCAL uptr __hwasan_tls;
30
31 namespace __hwasan {
32
InitShadow()33 bool InitShadow() {
34 __sanitizer::InitShadowBounds();
35 CHECK_NE(__sanitizer::ShadowBounds.shadow_limit, 0);
36
37 // These variables are used by MemIsShadow for asserting we have a correct
38 // shadow address. On Fuchsia, we only have one region of shadow, so the
39 // bounds of Low shadow can be zero while High shadow represents the true
40 // bounds. Note that these are inclusive ranges.
41 kLowShadowStart = 0;
42 kLowShadowEnd = 0;
43 kHighShadowStart = __sanitizer::ShadowBounds.shadow_base;
44 kHighShadowEnd = __sanitizer::ShadowBounds.shadow_limit - 1;
45
46 return true;
47 }
48
MemIsApp(uptr p)49 bool MemIsApp(uptr p) {
50 CHECK(GetTagFromPointer(p) == 0);
51 return __sanitizer::ShadowBounds.shadow_limit <= p &&
52 p <= (__sanitizer::ShadowBounds.memory_limit - 1);
53 }
54
55 // These are known parameters passed to the hwasan runtime on thread creation.
56 struct Thread::InitState {
57 uptr stack_bottom, stack_top;
58 };
59
60 static void FinishThreadInitialization(Thread *thread);
61
InitThreads()62 void InitThreads() {
63 // This is the minimal alignment needed for the storage where hwasan threads
64 // and their stack ring buffers are placed. This alignment is necessary so the
65 // stack ring buffer can perform a simple calculation to get the next element
66 // in the RB. The instructions for this calculation are emitted by the
67 // compiler. (Full explanation in hwasan_thread_list.h.)
68 uptr alloc_size = UINT64_C(1) << kShadowBaseAlignment;
69 uptr thread_start = reinterpret_cast<uptr>(
70 MmapAlignedOrDieOnFatalError(alloc_size, alloc_size, __func__));
71
72 InitThreadList(thread_start, alloc_size);
73
74 // Create the hwasan thread object for the current (main) thread. Stack info
75 // for this thread is known from information passed via
76 // __sanitizer_startup_hook.
77 const Thread::InitState state = {
78 .stack_bottom = __sanitizer::MainThreadStackBase,
79 .stack_top =
80 __sanitizer::MainThreadStackBase + __sanitizer::MainThreadStackSize,
81 };
82 FinishThreadInitialization(hwasanThreadList().CreateCurrentThread(&state));
83 }
84
GetCurrentThreadLongPtr()85 uptr *GetCurrentThreadLongPtr() { return &__hwasan_tls; }
86
87 // This is called from the parent thread before the new thread is created. Here
88 // we can propagate known info like the stack bounds to Thread::Init before
89 // jumping into the thread. We cannot initialize the stack ring buffer yet since
90 // we have not entered the new thread.
BeforeThreadCreateHook(uptr user_id,bool detached,const char * name,uptr stack_bottom,uptr stack_size)91 static void *BeforeThreadCreateHook(uptr user_id, bool detached,
92 const char *name, uptr stack_bottom,
93 uptr stack_size) {
94 const Thread::InitState state = {
95 .stack_bottom = stack_bottom,
96 .stack_top = stack_bottom + stack_size,
97 };
98 return hwasanThreadList().CreateCurrentThread(&state);
99 }
100
101 // This sets the stack top and bottom according to the InitState passed to
102 // CreateCurrentThread above.
InitStackAndTls(const InitState * state)103 void Thread::InitStackAndTls(const InitState *state) {
104 CHECK_NE(state->stack_bottom, 0);
105 CHECK_NE(state->stack_top, 0);
106 stack_bottom_ = state->stack_bottom;
107 stack_top_ = state->stack_top;
108 tls_end_ = tls_begin_ = 0;
109 }
110
111 // This is called after creating a new thread with the pointer returned by
112 // BeforeThreadCreateHook. We are still in the creating thread and should check
113 // if it was actually created correctly.
ThreadCreateHook(void * hook,bool aborted)114 static void ThreadCreateHook(void *hook, bool aborted) {
115 Thread *thread = static_cast<Thread *>(hook);
116 if (!aborted) {
117 // The thread was created successfully.
118 // ThreadStartHook can already be running in the new thread.
119 } else {
120 // The thread wasn't created after all.
121 // Clean up everything we set up in BeforeThreadCreateHook.
122 atomic_signal_fence(memory_order_seq_cst);
123 hwasanThreadList().ReleaseThread(thread);
124 }
125 }
126
127 // This is called in the newly-created thread before it runs anything else,
128 // with the pointer returned by BeforeThreadCreateHook (above). Here we can
129 // setup the stack ring buffer.
ThreadStartHook(void * hook,thrd_t self)130 static void ThreadStartHook(void *hook, thrd_t self) {
131 Thread *thread = static_cast<Thread *>(hook);
132 FinishThreadInitialization(thread);
133 thread->InitRandomState();
134 }
135
136 // This is the function that sets up the stack ring buffer and enables us to use
137 // GetCurrentThread. This function should only be called while IN the thread
138 // that we want to create the hwasan thread object for so __hwasan_tls can be
139 // properly referenced.
FinishThreadInitialization(Thread * thread)140 static void FinishThreadInitialization(Thread *thread) {
141 CHECK_NE(thread, nullptr);
142
143 // The ring buffer is located immediately before the thread object.
144 uptr stack_buffer_size = hwasanThreadList().GetRingBufferSize();
145 uptr stack_buffer_start = reinterpret_cast<uptr>(thread) - stack_buffer_size;
146 thread->InitStackRingBuffer(stack_buffer_start, stack_buffer_size);
147 }
148
ThreadExitHook(void * hook,thrd_t self)149 static void ThreadExitHook(void *hook, thrd_t self) {
150 Thread *thread = static_cast<Thread *>(hook);
151 atomic_signal_fence(memory_order_seq_cst);
152 hwasanThreadList().ReleaseThread(thread);
153 }
154
TagMemoryAligned(uptr p,uptr size,tag_t tag)155 uptr TagMemoryAligned(uptr p, uptr size, tag_t tag) {
156 CHECK(IsAligned(p, kShadowAlignment));
157 CHECK(IsAligned(size, kShadowAlignment));
158 __sanitizer_fill_shadow(p, size, tag,
159 common_flags()->clear_shadow_mmap_threshold);
160 return AddTagToPointer(p, tag);
161 }
162
163 // Not implemented because Fuchsia does not use signal handlers.
HwasanOnDeadlySignal(int signo,void * info,void * context)164 void HwasanOnDeadlySignal(int signo, void *info, void *context) {}
165
166 // Not implemented because Fuchsia does not use interceptors.
InitializeInterceptors()167 void InitializeInterceptors() {}
168
169 // Not implemented because this is only relevant for Android.
AndroidTestTlsSlot()170 void AndroidTestTlsSlot() {}
171
172 // TSD was normally used on linux as a means of calling the hwasan thread exit
173 // handler passed to pthread_key_create. This is not needed on Fuchsia because
174 // we will be using __sanitizer_thread_exit_hook.
HwasanTSDInit()175 void HwasanTSDInit() {}
HwasanTSDThreadInit()176 void HwasanTSDThreadInit() {}
177
178 // On linux, this just would call `atexit(HwasanAtExit)`. The functions in
179 // HwasanAtExit are unimplemented for Fuchsia and effectively no-ops, so this
180 // function is unneeded.
InstallAtExitHandler()181 void InstallAtExitHandler() {}
182
183 // TODO(fxbug.dev/81499): Once we finalize the tagged pointer ABI in zircon, we should come back
184 // here and implement the appropriate check that TBI is enabled.
InitializeOsSupport()185 void InitializeOsSupport() {}
186
187 } // namespace __hwasan
188
189 extern "C" {
190
__sanitizer_before_thread_create_hook(thrd_t thread,bool detached,const char * name,void * stack_base,size_t stack_size)191 void *__sanitizer_before_thread_create_hook(thrd_t thread, bool detached,
192 const char *name, void *stack_base,
193 size_t stack_size) {
194 return __hwasan::BeforeThreadCreateHook(
195 reinterpret_cast<uptr>(thread), detached, name,
196 reinterpret_cast<uptr>(stack_base), stack_size);
197 }
198
__sanitizer_thread_create_hook(void * hook,thrd_t thread,int error)199 void __sanitizer_thread_create_hook(void *hook, thrd_t thread, int error) {
200 __hwasan::ThreadCreateHook(hook, error != thrd_success);
201 }
202
__sanitizer_thread_start_hook(void * hook,thrd_t self)203 void __sanitizer_thread_start_hook(void *hook, thrd_t self) {
204 __hwasan::ThreadStartHook(hook, reinterpret_cast<uptr>(self));
205 }
206
__sanitizer_thread_exit_hook(void * hook,thrd_t self)207 void __sanitizer_thread_exit_hook(void *hook, thrd_t self) {
208 __hwasan::ThreadExitHook(hook, self);
209 }
210
211 } // extern "C"
212
213 #endif // SANITIZER_FUCHSIA
214