742a003db6
Unnecessary include, and the file was deleted with upstream changes. Bug: N/A Test: cd external/gwp_asan && atest Change-Id: Id8facff0c5e382aa639ce158b7b5862ce157aa25
279 lines
9.5 KiB
C++
279 lines
9.5 KiB
C++
/*
|
|
* Copyright (C) 2020 The Android Open Source Project
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* * Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* * Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in
|
|
* the documentation and/or other materials provided with the
|
|
* distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
* COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
|
|
* OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
|
|
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
|
|
* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
#include <platform/bionic/android_unsafe_frame_pointer_chase.h>
|
|
#include <platform/bionic/malloc.h>
|
|
#include <private/bionic_arc4random.h>
|
|
#include <private/bionic_globals.h>
|
|
#include <private/bionic_malloc_dispatch.h>
|
|
#include <stddef.h>
|
|
#include <stdint.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <sys/types.h>
|
|
|
|
#include "bionic/gwp_asan_wrappers.h"
|
|
#include "gwp_asan/guarded_pool_allocator.h"
|
|
#include "gwp_asan/options.h"
|
|
#include "malloc_common.h"
|
|
|
|
#ifndef LIBC_STATIC
|
|
#include "bionic/malloc_common_dynamic.h"
|
|
#endif // LIBC_STATIC
|
|
|
|
static gwp_asan::GuardedPoolAllocator GuardedAlloc;
|
|
static const MallocDispatch* prev_dispatch;
|
|
|
|
using Options = gwp_asan::options::Options;
|
|
|
|
// ============================================================================
|
|
// Implementation of gFunctions.
|
|
// ============================================================================
|
|
|
|
// This function handles initialisation as asked for by MallocInitImpl. This
|
|
// should always be called in a single-threaded context.
|
|
bool gwp_asan_initialize(const MallocDispatch* dispatch, bool*, const char*) {
|
|
prev_dispatch = dispatch;
|
|
|
|
Options Opts;
|
|
Opts.Enabled = true;
|
|
Opts.MaxSimultaneousAllocations = 32;
|
|
Opts.SampleRate = 2500;
|
|
Opts.InstallSignalHandlers = false;
|
|
Opts.InstallForkHandlers = true;
|
|
Opts.Backtrace = android_unsafe_frame_pointer_chase;
|
|
|
|
GuardedAlloc.init(Opts);
|
|
// TODO(b/149790891): The log line below causes ART tests to fail as they're
|
|
// not expecting any output. Disable the output for now.
|
|
// info_log("GWP-ASan has been enabled.");
|
|
|
|
__libc_shared_globals()->gwp_asan_state = GuardedAlloc.getAllocatorState();
|
|
__libc_shared_globals()->gwp_asan_metadata = GuardedAlloc.getMetadataRegion();
|
|
return true;
|
|
}
|
|
|
|
void gwp_asan_finalize() {
|
|
}
|
|
|
|
void gwp_asan_get_malloc_leak_info(uint8_t**, size_t*, size_t*, size_t*, size_t*) {
|
|
}
|
|
|
|
void gwp_asan_free_malloc_leak_info(uint8_t*) {
|
|
}
|
|
|
|
ssize_t gwp_asan_malloc_backtrace(void*, uintptr_t*, size_t) {
|
|
// TODO(mitchp): GWP-ASan might be able to return the backtrace for the
|
|
// provided address.
|
|
return -1;
|
|
}
|
|
|
|
bool gwp_asan_write_malloc_leak_info(FILE*) {
|
|
return false;
|
|
}
|
|
|
|
void* gwp_asan_gfunctions[] = {
|
|
(void*)gwp_asan_initialize, (void*)gwp_asan_finalize,
|
|
(void*)gwp_asan_get_malloc_leak_info, (void*)gwp_asan_free_malloc_leak_info,
|
|
(void*)gwp_asan_malloc_backtrace, (void*)gwp_asan_write_malloc_leak_info,
|
|
};
|
|
|
|
// ============================================================================
|
|
// Implementation of GWP-ASan malloc wrappers.
|
|
// ============================================================================
|
|
|
|
void* gwp_asan_calloc(size_t n_elements, size_t elem_size) {
|
|
if (__predict_false(GuardedAlloc.shouldSample())) {
|
|
size_t bytes;
|
|
if (!__builtin_mul_overflow(n_elements, elem_size, &bytes)) {
|
|
if (void* result = GuardedAlloc.allocate(bytes)) {
|
|
return result;
|
|
}
|
|
}
|
|
}
|
|
return prev_dispatch->calloc(n_elements, elem_size);
|
|
}
|
|
|
|
void gwp_asan_free(void* mem) {
|
|
if (__predict_false(GuardedAlloc.pointerIsMine(mem))) {
|
|
GuardedAlloc.deallocate(mem);
|
|
return;
|
|
}
|
|
prev_dispatch->free(mem);
|
|
}
|
|
|
|
void* gwp_asan_malloc(size_t bytes) {
|
|
if (__predict_false(GuardedAlloc.shouldSample())) {
|
|
if (void* result = GuardedAlloc.allocate(bytes)) {
|
|
return result;
|
|
}
|
|
}
|
|
return prev_dispatch->malloc(bytes);
|
|
}
|
|
|
|
size_t gwp_asan_malloc_usable_size(const void* mem) {
|
|
if (__predict_false(GuardedAlloc.pointerIsMine(mem))) {
|
|
return GuardedAlloc.getSize(mem);
|
|
}
|
|
return prev_dispatch->malloc_usable_size(mem);
|
|
}
|
|
|
|
void* gwp_asan_realloc(void* old_mem, size_t bytes) {
|
|
if (__predict_false(GuardedAlloc.pointerIsMine(old_mem))) {
|
|
size_t old_size = GuardedAlloc.getSize(old_mem);
|
|
void* new_ptr = gwp_asan_malloc(bytes);
|
|
if (new_ptr) memcpy(new_ptr, old_mem, (bytes < old_size) ? bytes : old_size);
|
|
GuardedAlloc.deallocate(old_mem);
|
|
return new_ptr;
|
|
}
|
|
return prev_dispatch->realloc(old_mem, bytes);
|
|
}
|
|
|
|
int gwp_asan_malloc_iterate(uintptr_t base, size_t size,
|
|
void (*callback)(uintptr_t base, size_t size, void* arg), void* arg) {
|
|
if (__predict_false(GuardedAlloc.pointerIsMine(reinterpret_cast<void*>(base)))) {
|
|
// TODO(mitchp): GPA::iterate() returns void, but should return int.
|
|
// TODO(mitchp): GPA::iterate() should take uintptr_t, not void*.
|
|
GuardedAlloc.iterate(reinterpret_cast<void*>(base), size, callback, arg);
|
|
return 0;
|
|
}
|
|
return prev_dispatch->malloc_iterate(base, size, callback, arg);
|
|
}
|
|
|
|
void gwp_asan_malloc_disable() {
|
|
GuardedAlloc.disable();
|
|
prev_dispatch->malloc_disable();
|
|
}
|
|
|
|
void gwp_asan_malloc_enable() {
|
|
GuardedAlloc.enable();
|
|
prev_dispatch->malloc_enable();
|
|
}
|
|
|
|
static const MallocDispatch gwp_asan_dispatch __attribute__((unused)) = {
|
|
gwp_asan_calloc,
|
|
gwp_asan_free,
|
|
Malloc(mallinfo),
|
|
gwp_asan_malloc,
|
|
gwp_asan_malloc_usable_size,
|
|
Malloc(memalign),
|
|
Malloc(posix_memalign),
|
|
#if defined(HAVE_DEPRECATED_MALLOC_FUNCS)
|
|
Malloc(pvalloc),
|
|
#endif
|
|
gwp_asan_realloc,
|
|
#if defined(HAVE_DEPRECATED_MALLOC_FUNCS)
|
|
Malloc(valloc),
|
|
#endif
|
|
gwp_asan_malloc_iterate,
|
|
gwp_asan_malloc_disable,
|
|
gwp_asan_malloc_enable,
|
|
Malloc(mallopt),
|
|
Malloc(aligned_alloc),
|
|
Malloc(malloc_info),
|
|
};
|
|
|
|
// The probability (1 / kProcessSampleRate) that a process will be ranodmly
|
|
// selected for sampling. kProcessSampleRate should always be a power of two to
|
|
// avoid modulo bias.
|
|
static constexpr uint8_t kProcessSampleRate = 128;
|
|
|
|
bool ShouldGwpAsanSampleProcess() {
|
|
uint8_t random_number;
|
|
__libc_safe_arc4random_buf(&random_number, sizeof(random_number));
|
|
return random_number % kProcessSampleRate == 0;
|
|
}
|
|
|
|
bool MaybeInitGwpAsanFromLibc(libc_globals* globals) {
|
|
// Never initialize the Zygote here. A Zygote chosen for sampling would also
|
|
// have all of its children sampled. Instead, the Zygote child will choose
|
|
// whether it samples or not just after the Zygote forks. For
|
|
// libc_scudo-preloaded executables (like mediaswcodec), the program name
|
|
// might not be available yet. The zygote never uses dynamic libc_scudo.
|
|
const char* progname = getprogname();
|
|
if (progname && strncmp(progname, "app_process", 11) == 0) {
|
|
return false;
|
|
}
|
|
return MaybeInitGwpAsan(globals);
|
|
}
|
|
|
|
static bool GwpAsanInitialized = false;
|
|
|
|
// Maybe initializes GWP-ASan. Called by android_mallopt() and libc's
|
|
// initialisation. This should always be called in a single-threaded context.
|
|
bool MaybeInitGwpAsan(libc_globals* globals, bool force_init) {
|
|
if (GwpAsanInitialized) {
|
|
error_log("GWP-ASan was already initialized for this process.");
|
|
return false;
|
|
}
|
|
|
|
// If the caller hasn't forced GWP-ASan on, check whether we should sample
|
|
// this process.
|
|
if (!force_init && !ShouldGwpAsanSampleProcess()) {
|
|
return false;
|
|
}
|
|
|
|
// GWP-ASan is compatible with heapprofd/malloc_debug/malloc_hooks iff
|
|
// GWP-ASan was installed first. If one of these other libraries was already
|
|
// installed, we don't enable GWP-ASan. These libraries are normally enabled
|
|
// in libc_init after GWP-ASan, but if the new process is a zygote child and
|
|
// trying to initialize GWP-ASan through mallopt(), one of these libraries may
|
|
// be installed. It may be possible to change this in future by modifying the
|
|
// internal dispatch pointers of these libraries at this point in time, but
|
|
// given that they're all debug-only, we don't really mind for now.
|
|
if (GetDefaultDispatchTable() != nullptr) {
|
|
// Something else is installed.
|
|
return false;
|
|
}
|
|
|
|
// GWP-ASan's initialization is always called in a single-threaded context, so
|
|
// we can initialize lock-free.
|
|
// Set GWP-ASan as the malloc dispatch table.
|
|
globals->malloc_dispatch_table = gwp_asan_dispatch;
|
|
atomic_store(&globals->default_dispatch_table, &gwp_asan_dispatch);
|
|
|
|
// If malloc_limit isn't installed, we can skip the default_dispatch_table
|
|
// lookup.
|
|
if (GetDispatchTable() == nullptr) {
|
|
atomic_store(&globals->current_dispatch_table, &gwp_asan_dispatch);
|
|
}
|
|
|
|
#ifndef LIBC_STATIC
|
|
SetGlobalFunctions(gwp_asan_gfunctions);
|
|
#endif // LIBC_STATIC
|
|
|
|
GwpAsanInitialized = true;
|
|
|
|
gwp_asan_initialize(NativeAllocatorDispatch(), nullptr, nullptr);
|
|
|
|
return true;
|
|
}
|
|
|
|
bool DispatchIsGwpAsan(const MallocDispatch* dispatch) {
|
|
return dispatch == &gwp_asan_dispatch;
|
|
}
|