blob: 918fd37f6fadde00451f8d61935683d320b54a8b [file] [log] [blame]
Josh Gaof6e5b582018-06-01 15:30:54 -07001/*
2 * Copyright (C) 2018 The Android Open Source Project
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * * Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * * Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in
12 * the documentation and/or other materials provided with the
13 * distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
16 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
17 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
18 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
19 * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
20 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
21 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
22 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
23 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
24 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
25 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * SUCH DAMAGE.
27 */
28
29#include <android/fdsan.h>
30
31#include <errno.h>
32#include <inttypes.h>
Josh Gaofe380882018-07-23 18:36:16 -070033#include <signal.h>
Josh Gaof6e5b582018-06-01 15:30:54 -070034#include <stdarg.h>
35#include <stdatomic.h>
36#include <string.h>
37#include <sys/cdefs.h>
38#include <sys/mman.h>
39#include <sys/syscall.h>
40#include <unistd.h>
41
42#include <async_safe/log.h>
43#include <sys/system_properties.h>
44
45#include "private/bionic_globals.h"
46#include "pthread_internal.h"
47
48extern "C" int ___close(int fd);
49pid_t __get_cached_pid();
50
51static constexpr const char* kFdsanPropertyName = "debug.fdsan";
52
Josh Gaoe6dab7b2018-08-06 18:47:29 -070053template<size_t inline_fds>
54FdEntry* FdTableImpl<inline_fds>::at(size_t idx) {
55 if (idx < inline_fds) {
56 return &entries[idx];
57 }
58
59 // Try to create the overflow table ourselves.
60 FdTableOverflow* local_overflow = atomic_load(&overflow);
61 if (__predict_false(!local_overflow)) {
62 struct rlimit rlim = { .rlim_max = 32768 };
63 getrlimit(RLIMIT_NOFILE, &rlim);
64 rlim_t max = rlim.rlim_max;
65
66 if (max == RLIM_INFINITY) {
67 // This isn't actually possible (the kernel has a hard limit), but just
68 // in case...
69 max = 32768;
70 }
71
72 if (idx > max) {
73 // This can happen if an fd is created and then the rlimit is lowered.
74 // In this case, just return nullptr and ignore the fd.
75 return nullptr;
76 }
77
78 size_t required_count = max - inline_fds;
79 size_t required_size = sizeof(FdTableOverflow) + required_count * sizeof(FdEntry);
80 size_t aligned_size = __BIONIC_ALIGN(required_size, PAGE_SIZE);
81 size_t aligned_count = (aligned_size - sizeof(FdTableOverflow)) / sizeof(FdEntry);
82
83 void* allocation =
84 mmap(nullptr, aligned_size, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
85 if (allocation == MAP_FAILED) {
86 async_safe_fatal("fdsan: mmap failed: %s", strerror(errno));
87 }
88
89 FdTableOverflow* new_overflow = reinterpret_cast<FdTableOverflow*>(allocation);
90 new_overflow->len = aligned_count;
91
92 if (atomic_compare_exchange_strong(&overflow, &local_overflow, new_overflow)) {
93 local_overflow = new_overflow;
94 } else {
95 // Someone beat us to it. Deallocate and use theirs.
96 munmap(allocation, aligned_size);
97 }
98 }
99
100 size_t offset = idx - inline_fds;
101 if (local_overflow->len < offset) {
102 return nullptr;
103 }
104 return &local_overflow->entries[offset];
105}
106
Josh Gaof6e5b582018-06-01 15:30:54 -0700107void __libc_init_fdsan() {
Josh Gao4b7c1cc2018-08-06 14:57:30 -0700108 constexpr auto default_level = ANDROID_FDSAN_ERROR_LEVEL_WARN_ONCE;
Josh Gaof6e5b582018-06-01 15:30:54 -0700109 const prop_info* pi = __system_property_find(kFdsanPropertyName);
110 if (!pi) {
Josh Gao4b7c1cc2018-08-06 14:57:30 -0700111 android_fdsan_set_error_level(default_level);
Josh Gaof6e5b582018-06-01 15:30:54 -0700112 return;
113 }
114 __system_property_read_callback(
115 pi,
116 [](void*, const char*, const char* value, uint32_t) {
117 if (strcasecmp(value, "1") == 0 || strcasecmp(value, "fatal") == 0) {
118 android_fdsan_set_error_level(ANDROID_FDSAN_ERROR_LEVEL_FATAL);
119 } else if (strcasecmp(value, "warn") == 0) {
120 android_fdsan_set_error_level(ANDROID_FDSAN_ERROR_LEVEL_WARN_ALWAYS);
121 } else if (strcasecmp(value, "warn_once") == 0) {
122 android_fdsan_set_error_level(ANDROID_FDSAN_ERROR_LEVEL_WARN_ONCE);
123 } else {
124 if (strlen(value) != 0 && strcasecmp(value, "0") != 0) {
125 async_safe_format_log(ANDROID_LOG_ERROR, "libc",
126 "debug.fdsan set to unknown value '%s', disabling", value);
127 }
Josh Gao4b7c1cc2018-08-06 14:57:30 -0700128 android_fdsan_set_error_level(default_level);
Josh Gaof6e5b582018-06-01 15:30:54 -0700129 }
130 },
131 nullptr);
132}
133
Josh Gaoe6dab7b2018-08-06 18:47:29 -0700134static FdTable* GetFdTable() {
Josh Gaof6e5b582018-06-01 15:30:54 -0700135 if (!__libc_shared_globals) {
136 return nullptr;
137 }
138
139 return &__libc_shared_globals->fd_table;
140}
141
142static FdEntry* GetFdEntry(int fd) {
143 if (fd < 0) {
144 return nullptr;
145 }
146
147 auto* fd_table = GetFdTable();
148 if (!fd_table) {
149 return nullptr;
150 }
151
152 return fd_table->at(fd);
153}
154
155__printflike(1, 0) static void fdsan_error(const char* fmt, ...) {
156 auto* fd_table = GetFdTable();
157 if (!fd_table) {
158 return;
159 }
160
161 auto error_level = atomic_load(&fd_table->error_level);
162 if (error_level == ANDROID_FDSAN_ERROR_LEVEL_DISABLED) {
163 return;
164 }
165
166 // Lots of code will (sensibly) fork, blindly call close on all of their fds,
167 // and then exec. Compare our cached pid value against the real one to detect
168 // this scenario and permit it.
169 pid_t cached_pid = __get_cached_pid();
170 if (cached_pid == 0 || cached_pid != syscall(__NR_getpid)) {
171 return;
172 }
173
174 va_list va;
175 va_start(va, fmt);
Josh Gaofe380882018-07-23 18:36:16 -0700176 if (error_level == ANDROID_FDSAN_ERROR_LEVEL_FATAL) {
177 async_safe_fatal_va_list("fdsan", fmt, va);
178 } else {
179 async_safe_format_log_va_list(ANDROID_LOG_ERROR, "fdsan", fmt, va);
180 }
Josh Gaof6e5b582018-06-01 15:30:54 -0700181 va_end(va);
182
183 switch (error_level) {
184 case ANDROID_FDSAN_ERROR_LEVEL_WARN_ONCE:
185 atomic_compare_exchange_strong(&fd_table->error_level, &error_level,
186 ANDROID_FDSAN_ERROR_LEVEL_DISABLED);
Josh Gaofe380882018-07-23 18:36:16 -0700187 case ANDROID_FDSAN_ERROR_LEVEL_WARN_ALWAYS:
188 // DEBUGGER_SIGNAL
189 raise(__SIGRTMIN + 3);
Josh Gaof6e5b582018-06-01 15:30:54 -0700190 break;
191
192 case ANDROID_FDSAN_ERROR_LEVEL_FATAL:
193 abort();
194
195 case ANDROID_FDSAN_ERROR_LEVEL_DISABLED:
Josh Gaof6e5b582018-06-01 15:30:54 -0700196 break;
197 }
198}
199
200uint64_t android_fdsan_create_owner_tag(android_fdsan_owner_type type, uint64_t tag) {
201 if (tag == 0) {
202 return 0;
203 }
204
205 if (__predict_false((type & 0xff) != type)) {
206 async_safe_fatal("invalid android_fdsan_owner_type value: %x", type);
207 }
208
209 uint64_t result = static_cast<uint64_t>(type) << 56;
210 uint64_t mask = (static_cast<uint64_t>(1) << 56) - 1;
211 result |= tag & mask;
212 return result;
213}
214
215static const char* __tag_to_type(uint64_t tag) {
216 uint64_t type = tag >> 56;
217 switch (type) {
218 case ANDROID_FDSAN_OWNER_TYPE_FILE:
219 return "FILE*";
220 case ANDROID_FDSAN_OWNER_TYPE_DIR:
221 return "DIR*";
222 case ANDROID_FDSAN_OWNER_TYPE_UNIQUE_FD:
223 return "unique_fd";
224 case ANDROID_FDSAN_OWNER_TYPE_FILEINPUTSTREAM:
225 return "FileInputStream";
226 case ANDROID_FDSAN_OWNER_TYPE_FILEOUTPUTSTREAM:
227 return "FileOutputStream";
228 case ANDROID_FDSAN_OWNER_TYPE_RANDOMACCESSFILE:
229 return "RandomAccessFile";
230 case ANDROID_FDSAN_OWNER_TYPE_PARCELFILEDESCRIPTOR:
231 return "ParcelFileDescriptor";
232
233 case ANDROID_FDSAN_OWNER_TYPE_GENERIC_00:
234 default:
235 return "native object of unknown type";
236
237 case ANDROID_FDSAN_OWNER_TYPE_GENERIC_FF:
238 // If bits 48 to 56 are set, this is a sign-extended generic native pointer
239 uint64_t high_bits = tag >> 48;
240 if (high_bits == (1 << 16) - 1) {
241 return "native object of unknown type";
242 }
243
244 return "Java object of unknown type";
245 }
246}
247
248static uint64_t __tag_to_owner(uint64_t tag) {
Josh Gao08b7a402018-08-03 14:31:37 -0700249 // Lop off the most significant byte and sign extend.
250 return static_cast<uint64_t>(static_cast<int64_t>(tag << 8) >> 8);
Josh Gaof6e5b582018-06-01 15:30:54 -0700251}
252
253int android_fdsan_close_with_tag(int fd, uint64_t expected_tag) {
254 FdEntry* fde = GetFdEntry(fd);
255 if (!fde) {
256 return ___close(fd);
257 }
258
259 uint64_t tag = expected_tag;
260 if (!atomic_compare_exchange_strong(&fde->close_tag, &tag, 0)) {
261 const char* expected_type = __tag_to_type(expected_tag);
262 uint64_t expected_owner = __tag_to_owner(expected_tag);
263 const char* actual_type = __tag_to_type(tag);
264 uint64_t actual_owner = __tag_to_owner(tag);
265 if (expected_tag && tag) {
Josh Gao08b7a402018-08-03 14:31:37 -0700266 fdsan_error(
267 "attempted to close file descriptor %d, "
268 "expected to be owned by %s 0x%" PRIx64 ", actually owned by %s 0x%" PRIx64,
269 fd, expected_type, expected_owner, actual_type, actual_owner);
Josh Gaof6e5b582018-06-01 15:30:54 -0700270 } else if (expected_tag && !tag) {
Josh Gao08b7a402018-08-03 14:31:37 -0700271 fdsan_error(
272 "attempted to close file descriptor %d, "
273 "expected to be owned by %s 0x%" PRIx64 ", actually unowned",
274 fd, expected_type, expected_owner);
Josh Gaof6e5b582018-06-01 15:30:54 -0700275 } else if (!expected_tag && tag) {
276 fdsan_error(
Josh Gao08b7a402018-08-03 14:31:37 -0700277 "attempted to close file descriptor %d, "
278 "expected to be unowned, actually owned by %s 0x%" PRIx64,
Josh Gaof6e5b582018-06-01 15:30:54 -0700279 fd, actual_type, actual_owner);
280 } else if (!expected_tag && !tag) {
281 // This should never happen: our CAS failed, but expected == actual?
Josh Gao08b7a402018-08-03 14:31:37 -0700282 async_safe_fatal("fdsan atomic_compare_exchange_strong failed unexpectedly while closing");
Josh Gaof6e5b582018-06-01 15:30:54 -0700283 }
284 }
285
286 int rc = ___close(fd);
287 // If we were expecting to close with a tag, abort on EBADF.
288 if (expected_tag && rc == -1 && errno == EBADF) {
289 fdsan_error("double-close of file descriptor %d detected", fd);
290 }
291 return rc;
292}
293
294void android_fdsan_exchange_owner_tag(int fd, uint64_t expected_tag, uint64_t new_tag) {
295 FdEntry* fde = GetFdEntry(fd);
296 if (!fde) {
297 return;
298 }
299
300 uint64_t tag = expected_tag;
301 if (!atomic_compare_exchange_strong(&fde->close_tag, &tag, new_tag)) {
Josh Gao08b7a402018-08-03 14:31:37 -0700302 if (expected_tag && tag) {
Josh Gaof6e5b582018-06-01 15:30:54 -0700303 fdsan_error(
Josh Gao08b7a402018-08-03 14:31:37 -0700304 "failed to exchange ownership of file descriptor: fd %d is "
305 "owned by %s 0x%" PRIx64 ", was expected to be owned by %s 0x%" PRIx64,
306 fd, __tag_to_type(tag), __tag_to_owner(tag), __tag_to_type(expected_tag),
307 __tag_to_owner(expected_tag));
308 } else if (expected_tag && !tag) {
Josh Gaof6e5b582018-06-01 15:30:54 -0700309 fdsan_error(
Josh Gao08b7a402018-08-03 14:31:37 -0700310 "failed to exchange ownership of file descriptor: fd %d is "
311 "unowned, was expected to be owned by %s 0x%" PRIx64,
Josh Gaof6e5b582018-06-01 15:30:54 -0700312 fd, __tag_to_type(expected_tag), __tag_to_owner(expected_tag));
Josh Gao08b7a402018-08-03 14:31:37 -0700313 } else if (!expected_tag && tag) {
314 fdsan_error(
315 "failed to exchange ownership of file descriptor: fd %d is "
316 "owned by %s 0x%" PRIx64 ", was expected to be unowned",
317 fd, __tag_to_type(tag), __tag_to_owner(tag));
318 } else if (!expected_tag && !tag) {
319 // This should never happen: our CAS failed, but expected == actual?
320 async_safe_fatal(
321 "fdsan atomic_compare_exchange_strong failed unexpectedly while exchanging owner tag");
Josh Gaof6e5b582018-06-01 15:30:54 -0700322 }
323 }
324}
325
326android_fdsan_error_level android_fdsan_get_error_level() {
327 auto* fd_table = GetFdTable();
328 if (!fd_table) {
329 async_safe_fatal("attempted to get fdsan error level before libc initialization?");
330 }
331
332 return fd_table->error_level;
333}
334
335android_fdsan_error_level android_fdsan_set_error_level(android_fdsan_error_level new_level) {
336 auto* fd_table = GetFdTable();
337 if (!fd_table) {
338 async_safe_fatal("attempted to get fdsan error level before libc initialization?");
339 }
340
341 return atomic_exchange(&fd_table->error_level, new_level);
342}
343
344int close(int fd) {
345 int rc = android_fdsan_close_with_tag(fd, 0);
346 if (rc == -1 && errno == EINTR) {
347 return 0;
348 }
349 return rc;
350}