blob: 79b4b69c78e7815352b4c7abb81c5339823ef996 [file] [log] [blame]
Mitch Phillipsf3968e82020-01-31 19:57:04 -08001/*
2 * Copyright (C) 2020 The Android Open Source Project
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * * Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * * Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in
12 * the documentation and/or other materials provided with the
13 * distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
16 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
17 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
18 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
19 * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
20 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
21 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
22 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
23 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
24 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
25 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * SUCH DAMAGE.
27 */
28
Mitch Phillips4c9293f2020-02-14 14:50:35 -080029#include <platform/bionic/android_unsafe_frame_pointer_chase.h>
Mitch Phillipsf3968e82020-01-31 19:57:04 -080030#include <platform/bionic/malloc.h>
Mitch Phillips0083b0f2020-02-13 17:37:11 -080031#include <private/bionic_arc4random.h>
Mitch Phillips4c9293f2020-02-14 14:50:35 -080032#include <private/bionic_globals.h>
Mitch Phillipsf3968e82020-01-31 19:57:04 -080033#include <private/bionic_malloc_dispatch.h>
34#include <stddef.h>
35#include <stdint.h>
36#include <stdio.h>
37#include <string.h>
38#include <sys/types.h>
39
40#include "bionic/gwp_asan_wrappers.h"
41#include "gwp_asan/guarded_pool_allocator.h"
42#include "gwp_asan/options.h"
Mitch Phillipsf3968e82020-01-31 19:57:04 -080043#include "malloc_common.h"
44
45#ifndef LIBC_STATIC
46#include "bionic/malloc_common_dynamic.h"
47#endif // LIBC_STATIC
48
49static gwp_asan::GuardedPoolAllocator GuardedAlloc;
50static const MallocDispatch* prev_dispatch;
51
52using Options = gwp_asan::options::Options;
53
54// ============================================================================
55// Implementation of gFunctions.
56// ============================================================================
57
58// This function handles initialisation as asked for by MallocInitImpl. This
59// should always be called in a single-threaded context.
60bool gwp_asan_initialize(const MallocDispatch* dispatch, bool*, const char*) {
61 prev_dispatch = dispatch;
62
63 Options Opts;
64 Opts.Enabled = true;
65 Opts.MaxSimultaneousAllocations = 32;
66 Opts.SampleRate = 2500;
67 Opts.InstallSignalHandlers = false;
68 Opts.InstallForkHandlers = true;
Mitch Phillips4c9293f2020-02-14 14:50:35 -080069 Opts.Backtrace = android_unsafe_frame_pointer_chase;
Mitch Phillipsf3968e82020-01-31 19:57:04 -080070
71 GuardedAlloc.init(Opts);
Mitch Phillips4d62ffc2020-02-18 17:13:52 -080072 // TODO(b/149790891): The log line below causes ART tests to fail as they're
73 // not expecting any output. Disable the output for now.
74 // info_log("GWP-ASan has been enabled.");
Mitch Phillips4c9293f2020-02-14 14:50:35 -080075
76 __libc_shared_globals()->gwp_asan_state = GuardedAlloc.getAllocatorState();
77 __libc_shared_globals()->gwp_asan_metadata = GuardedAlloc.getMetadataRegion();
Mitch Phillipsf3968e82020-01-31 19:57:04 -080078 return true;
79}
80
81void gwp_asan_finalize() {
82}
83
84void gwp_asan_get_malloc_leak_info(uint8_t**, size_t*, size_t*, size_t*, size_t*) {
85}
86
87void gwp_asan_free_malloc_leak_info(uint8_t*) {
88}
89
90ssize_t gwp_asan_malloc_backtrace(void*, uintptr_t*, size_t) {
91 // TODO(mitchp): GWP-ASan might be able to return the backtrace for the
92 // provided address.
93 return -1;
94}
95
96bool gwp_asan_write_malloc_leak_info(FILE*) {
97 return false;
98}
99
100void* gwp_asan_gfunctions[] = {
101 (void*)gwp_asan_initialize, (void*)gwp_asan_finalize,
102 (void*)gwp_asan_get_malloc_leak_info, (void*)gwp_asan_free_malloc_leak_info,
103 (void*)gwp_asan_malloc_backtrace, (void*)gwp_asan_write_malloc_leak_info,
104};
105
106// ============================================================================
107// Implementation of GWP-ASan malloc wrappers.
108// ============================================================================
109
110void* gwp_asan_calloc(size_t n_elements, size_t elem_size) {
111 if (__predict_false(GuardedAlloc.shouldSample())) {
112 size_t bytes;
113 if (!__builtin_mul_overflow(n_elements, elem_size, &bytes)) {
114 if (void* result = GuardedAlloc.allocate(bytes)) {
115 return result;
116 }
117 }
118 }
119 return prev_dispatch->calloc(n_elements, elem_size);
120}
121
122void gwp_asan_free(void* mem) {
123 if (__predict_false(GuardedAlloc.pointerIsMine(mem))) {
124 GuardedAlloc.deallocate(mem);
125 return;
126 }
127 prev_dispatch->free(mem);
128}
129
130void* gwp_asan_malloc(size_t bytes) {
131 if (__predict_false(GuardedAlloc.shouldSample())) {
132 if (void* result = GuardedAlloc.allocate(bytes)) {
133 return result;
134 }
135 }
136 return prev_dispatch->malloc(bytes);
137}
138
139size_t gwp_asan_malloc_usable_size(const void* mem) {
140 if (__predict_false(GuardedAlloc.pointerIsMine(mem))) {
141 return GuardedAlloc.getSize(mem);
142 }
143 return prev_dispatch->malloc_usable_size(mem);
144}
145
146void* gwp_asan_realloc(void* old_mem, size_t bytes) {
Mitch Phillipsc70311c2022-04-11 13:22:01 -0700147 // GPA::pointerIsMine(p) always returns false where `p == nullptr` (and thus
148 // malloc(bytes) is requested). We always fall back to the backing allocator,
149 // technically missing some coverage, but reducing an extra conditional
150 // branch.
Mitch Phillipsf3968e82020-01-31 19:57:04 -0800151 if (__predict_false(GuardedAlloc.pointerIsMine(old_mem))) {
Mitch Phillipsc70311c2022-04-11 13:22:01 -0700152 if (__predict_false(bytes == 0)) {
153 GuardedAlloc.deallocate(old_mem);
154 return nullptr;
155 }
Mitch Phillipsf3968e82020-01-31 19:57:04 -0800156 void* new_ptr = gwp_asan_malloc(bytes);
Mitch Phillipsc70311c2022-04-11 13:22:01 -0700157 // If malloc() fails, then don't destroy the old memory.
158 if (__predict_false(new_ptr == nullptr)) return nullptr;
159
160 size_t old_size = GuardedAlloc.getSize(old_mem);
161 memcpy(new_ptr, old_mem, (bytes < old_size) ? bytes : old_size);
Mitch Phillipsf3968e82020-01-31 19:57:04 -0800162 GuardedAlloc.deallocate(old_mem);
163 return new_ptr;
164 }
165 return prev_dispatch->realloc(old_mem, bytes);
166}
167
168int gwp_asan_malloc_iterate(uintptr_t base, size_t size,
169 void (*callback)(uintptr_t base, size_t size, void* arg), void* arg) {
170 if (__predict_false(GuardedAlloc.pointerIsMine(reinterpret_cast<void*>(base)))) {
171 // TODO(mitchp): GPA::iterate() returns void, but should return int.
172 // TODO(mitchp): GPA::iterate() should take uintptr_t, not void*.
173 GuardedAlloc.iterate(reinterpret_cast<void*>(base), size, callback, arg);
174 return 0;
175 }
176 return prev_dispatch->malloc_iterate(base, size, callback, arg);
177}
178
179void gwp_asan_malloc_disable() {
180 GuardedAlloc.disable();
181 prev_dispatch->malloc_disable();
182}
183
184void gwp_asan_malloc_enable() {
185 GuardedAlloc.enable();
186 prev_dispatch->malloc_enable();
187}
188
189static const MallocDispatch gwp_asan_dispatch __attribute__((unused)) = {
Mitch Phillips32abb0b2020-03-16 09:52:45 -0700190 gwp_asan_calloc,
Mitch Phillipsf3968e82020-01-31 19:57:04 -0800191 gwp_asan_free,
192 Malloc(mallinfo),
193 gwp_asan_malloc,
194 gwp_asan_malloc_usable_size,
195 Malloc(memalign),
196 Malloc(posix_memalign),
197#if defined(HAVE_DEPRECATED_MALLOC_FUNCS)
198 Malloc(pvalloc),
199#endif
200 gwp_asan_realloc,
201#if defined(HAVE_DEPRECATED_MALLOC_FUNCS)
202 Malloc(valloc),
203#endif
204 gwp_asan_malloc_iterate,
205 gwp_asan_malloc_disable,
206 gwp_asan_malloc_enable,
207 Malloc(mallopt),
208 Malloc(aligned_alloc),
209 Malloc(malloc_info),
210};
211
Mitch Phillips0083b0f2020-02-13 17:37:11 -0800212// The probability (1 / kProcessSampleRate) that a process will be ranodmly
213// selected for sampling. kProcessSampleRate should always be a power of two to
214// avoid modulo bias.
215static constexpr uint8_t kProcessSampleRate = 128;
216
Mitch Phillipsf3968e82020-01-31 19:57:04 -0800217bool ShouldGwpAsanSampleProcess() {
Mitch Phillips0083b0f2020-02-13 17:37:11 -0800218 uint8_t random_number;
219 __libc_safe_arc4random_buf(&random_number, sizeof(random_number));
220 return random_number % kProcessSampleRate == 0;
Mitch Phillipsf3968e82020-01-31 19:57:04 -0800221}
222
Mitch Phillipsbba80dc2020-02-11 14:42:14 -0800223bool MaybeInitGwpAsanFromLibc(libc_globals* globals) {
Mitch Phillipsf3968e82020-01-31 19:57:04 -0800224 // Never initialize the Zygote here. A Zygote chosen for sampling would also
225 // have all of its children sampled. Instead, the Zygote child will choose
226 // whether it samples or not just after the Zygote forks. For
227 // libc_scudo-preloaded executables (like mediaswcodec), the program name
228 // might not be available yet. The zygote never uses dynamic libc_scudo.
229 const char* progname = getprogname();
230 if (progname && strncmp(progname, "app_process", 11) == 0) {
231 return false;
232 }
Mitch Phillipsbba80dc2020-02-11 14:42:14 -0800233 return MaybeInitGwpAsan(globals);
Mitch Phillipsf3968e82020-01-31 19:57:04 -0800234}
235
236static bool GwpAsanInitialized = false;
237
238// Maybe initializes GWP-ASan. Called by android_mallopt() and libc's
239// initialisation. This should always be called in a single-threaded context.
Mitch Phillipsbba80dc2020-02-11 14:42:14 -0800240bool MaybeInitGwpAsan(libc_globals* globals, bool force_init) {
Mitch Phillipsf3968e82020-01-31 19:57:04 -0800241 if (GwpAsanInitialized) {
242 error_log("GWP-ASan was already initialized for this process.");
243 return false;
244 }
245
246 // If the caller hasn't forced GWP-ASan on, check whether we should sample
247 // this process.
248 if (!force_init && !ShouldGwpAsanSampleProcess()) {
249 return false;
250 }
251
252 // GWP-ASan is compatible with heapprofd/malloc_debug/malloc_hooks iff
253 // GWP-ASan was installed first. If one of these other libraries was already
254 // installed, we don't enable GWP-ASan. These libraries are normally enabled
255 // in libc_init after GWP-ASan, but if the new process is a zygote child and
256 // trying to initialize GWP-ASan through mallopt(), one of these libraries may
257 // be installed. It may be possible to change this in future by modifying the
258 // internal dispatch pointers of these libraries at this point in time, but
259 // given that they're all debug-only, we don't really mind for now.
260 if (GetDefaultDispatchTable() != nullptr) {
261 // Something else is installed.
262 return false;
263 }
264
265 // GWP-ASan's initialization is always called in a single-threaded context, so
266 // we can initialize lock-free.
Mitch Phillipsbba80dc2020-02-11 14:42:14 -0800267 // Set GWP-ASan as the malloc dispatch table.
268 globals->malloc_dispatch_table = gwp_asan_dispatch;
269 atomic_store(&globals->default_dispatch_table, &gwp_asan_dispatch);
Mitch Phillipsf3968e82020-01-31 19:57:04 -0800270
Mitch Phillipsbba80dc2020-02-11 14:42:14 -0800271 // If malloc_limit isn't installed, we can skip the default_dispatch_table
272 // lookup.
273 if (GetDispatchTable() == nullptr) {
274 atomic_store(&globals->current_dispatch_table, &gwp_asan_dispatch);
275 }
Mitch Phillipsf3968e82020-01-31 19:57:04 -0800276
277#ifndef LIBC_STATIC
278 SetGlobalFunctions(gwp_asan_gfunctions);
279#endif // LIBC_STATIC
280
281 GwpAsanInitialized = true;
282
283 gwp_asan_initialize(NativeAllocatorDispatch(), nullptr, nullptr);
284
285 return true;
286}
Mitch Phillipsc03856c2020-02-13 16:41:14 -0800287
288bool DispatchIsGwpAsan(const MallocDispatch* dispatch) {
289 return dispatch == &gwp_asan_dispatch;
290}
Christopher Ferris8f9713e2021-09-20 17:25:46 -0700291
292bool EnableGwpAsan(bool force_init) {
293 if (GwpAsanInitialized) {
294 return true;
295 }
296
297 bool ret_value;
298 __libc_globals.mutate(
299 [&](libc_globals* globals) { ret_value = MaybeInitGwpAsan(globals, force_init); });
300 return ret_value;
301}