blob: 0b0678babe1f22a6b44284d2294d87661b1edd93 [file] [log] [blame]
Josh Gaof6e5b582018-06-01 15:30:54 -07001/*
2 * Copyright (C) 2018 The Android Open Source Project
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * * Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * * Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in
12 * the documentation and/or other materials provided with the
13 * distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
16 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
17 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
18 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
19 * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
20 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
21 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
22 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
23 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
24 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
25 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * SUCH DAMAGE.
27 */
28
29#include <android/fdsan.h>
30
31#include <errno.h>
32#include <inttypes.h>
Josh Gaofe380882018-07-23 18:36:16 -070033#include <signal.h>
Josh Gaof6e5b582018-06-01 15:30:54 -070034#include <stdarg.h>
35#include <stdatomic.h>
36#include <string.h>
37#include <sys/cdefs.h>
38#include <sys/mman.h>
39#include <sys/syscall.h>
40#include <unistd.h>
41
42#include <async_safe/log.h>
Peter Collingbournebb11ee62022-05-02 12:26:16 -070043#include <platform/bionic/page.h>
Josh Gao5074e7d2019-12-13 13:55:53 -080044#include <platform/bionic/reserved_signals.h>
Josh Gaof6e5b582018-06-01 15:30:54 -070045#include <sys/system_properties.h>
46
Josh Gao97271922019-11-06 13:15:00 -080047#include "private/bionic_fdtrack.h"
Josh Gaof6e5b582018-06-01 15:30:54 -070048#include "private/bionic_globals.h"
Josh Gaof5693c62018-08-31 14:07:40 -070049#include "private/bionic_inline_raise.h"
Josh Gaof6e5b582018-06-01 15:30:54 -070050#include "pthread_internal.h"
51
Elliott Hughes50080a22019-06-19 12:47:53 -070052extern "C" int __close(int fd);
Josh Gaof6e5b582018-06-01 15:30:54 -070053pid_t __get_cached_pid();
54
55static constexpr const char* kFdsanPropertyName = "debug.fdsan";
56
Josh Gaoe6dab7b2018-08-06 18:47:29 -070057template<size_t inline_fds>
58FdEntry* FdTableImpl<inline_fds>::at(size_t idx) {
59 if (idx < inline_fds) {
60 return &entries[idx];
61 }
62
63 // Try to create the overflow table ourselves.
64 FdTableOverflow* local_overflow = atomic_load(&overflow);
65 if (__predict_false(!local_overflow)) {
66 struct rlimit rlim = { .rlim_max = 32768 };
67 getrlimit(RLIMIT_NOFILE, &rlim);
68 rlim_t max = rlim.rlim_max;
69
70 if (max == RLIM_INFINITY) {
71 // This isn't actually possible (the kernel has a hard limit), but just
72 // in case...
73 max = 32768;
74 }
75
76 if (idx > max) {
77 // This can happen if an fd is created and then the rlimit is lowered.
78 // In this case, just return nullptr and ignore the fd.
79 return nullptr;
80 }
81
82 size_t required_count = max - inline_fds;
83 size_t required_size = sizeof(FdTableOverflow) + required_count * sizeof(FdEntry);
Peter Collingbournebb11ee62022-05-02 12:26:16 -070084 size_t aligned_size = __BIONIC_ALIGN(required_size, page_size());
Josh Gaoe6dab7b2018-08-06 18:47:29 -070085 size_t aligned_count = (aligned_size - sizeof(FdTableOverflow)) / sizeof(FdEntry);
86
87 void* allocation =
88 mmap(nullptr, aligned_size, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
89 if (allocation == MAP_FAILED) {
Elliott Hughes2557f732023-07-12 21:15:23 +000090 async_safe_fatal("fdsan: mmap failed: %m");
Josh Gaoe6dab7b2018-08-06 18:47:29 -070091 }
92
93 FdTableOverflow* new_overflow = reinterpret_cast<FdTableOverflow*>(allocation);
94 new_overflow->len = aligned_count;
95
96 if (atomic_compare_exchange_strong(&overflow, &local_overflow, new_overflow)) {
97 local_overflow = new_overflow;
98 } else {
99 // Someone beat us to it. Deallocate and use theirs.
100 munmap(allocation, aligned_size);
101 }
102 }
103
104 size_t offset = idx - inline_fds;
Benjamin Lerman27a37e72022-09-27 11:35:52 +0200105 if (local_overflow->len <= offset) {
Josh Gaoe6dab7b2018-08-06 18:47:29 -0700106 return nullptr;
107 }
108 return &local_overflow->entries[offset];
109}
110
Josh Gaof6e5b582018-06-01 15:30:54 -0700111void __libc_init_fdsan() {
Josh Gao6a510132019-08-20 17:59:14 -0700112 constexpr auto default_level = ANDROID_FDSAN_ERROR_LEVEL_FATAL;
113 android_fdsan_set_error_level_from_property(default_level);
Josh Gaof6e5b582018-06-01 15:30:54 -0700114}
115
Ryan Prichardabf736a2018-11-22 02:40:17 -0800116static FdTable& GetFdTable() {
117 return __libc_shared_globals()->fd_table;
Josh Gaof6e5b582018-06-01 15:30:54 -0700118}
119
Josh Gaoe16082f2018-08-06 18:48:52 -0700120// Exposed to the platform to allow crash_dump to print out the fd table.
121extern "C" void* android_fdsan_get_fd_table() {
Ryan Prichardabf736a2018-11-22 02:40:17 -0800122 return &GetFdTable();
Josh Gaoe16082f2018-08-06 18:48:52 -0700123}
124
Josh Gaof6e5b582018-06-01 15:30:54 -0700125static FdEntry* GetFdEntry(int fd) {
126 if (fd < 0) {
127 return nullptr;
128 }
129
Ryan Prichardabf736a2018-11-22 02:40:17 -0800130 return GetFdTable().at(fd);
Josh Gaof6e5b582018-06-01 15:30:54 -0700131}
132
133__printflike(1, 0) static void fdsan_error(const char* fmt, ...) {
Ryan Prichardabf736a2018-11-22 02:40:17 -0800134 auto& fd_table = GetFdTable();
Josh Gaof6e5b582018-06-01 15:30:54 -0700135
Ryan Prichardabf736a2018-11-22 02:40:17 -0800136 auto error_level = atomic_load(&fd_table.error_level);
Josh Gaof6e5b582018-06-01 15:30:54 -0700137 if (error_level == ANDROID_FDSAN_ERROR_LEVEL_DISABLED) {
138 return;
139 }
140
Josh Gaobe66a062018-08-27 16:19:11 -0700141 struct {
142 size_t size;
143 char buf[512];
144 } abort_message;
145
Josh Gaof6e5b582018-06-01 15:30:54 -0700146 va_list va;
147 va_start(va, fmt);
Josh Gaofe380882018-07-23 18:36:16 -0700148 if (error_level == ANDROID_FDSAN_ERROR_LEVEL_FATAL) {
149 async_safe_fatal_va_list("fdsan", fmt, va);
150 } else {
151 async_safe_format_log_va_list(ANDROID_LOG_ERROR, "fdsan", fmt, va);
Greg Hackmanncc953e02018-10-12 15:04:26 -0700152 va_end(va);
153 va_start(va, fmt);
Josh Gaobe66a062018-08-27 16:19:11 -0700154 size_t len =
155 async_safe_format_buffer_va_list(abort_message.buf, sizeof(abort_message.buf), fmt, va);
156 abort_message.size = len + sizeof(size_t);
Josh Gaofe380882018-07-23 18:36:16 -0700157 }
Josh Gaof6e5b582018-06-01 15:30:54 -0700158 va_end(va);
159
160 switch (error_level) {
161 case ANDROID_FDSAN_ERROR_LEVEL_WARN_ONCE:
Ryan Prichardabf736a2018-11-22 02:40:17 -0800162 atomic_compare_exchange_strong(&fd_table.error_level, &error_level,
Josh Gaof6e5b582018-06-01 15:30:54 -0700163 ANDROID_FDSAN_ERROR_LEVEL_DISABLED);
George Burgess IVfa5410f2018-08-13 17:44:06 -0700164 __BIONIC_FALLTHROUGH;
Josh Gaofe380882018-07-23 18:36:16 -0700165 case ANDROID_FDSAN_ERROR_LEVEL_WARN_ALWAYS:
Josh Gao5074e7d2019-12-13 13:55:53 -0800166 inline_raise(BIONIC_SIGNAL_DEBUGGER, &abort_message);
Josh Gaof6e5b582018-06-01 15:30:54 -0700167 break;
168
169 case ANDROID_FDSAN_ERROR_LEVEL_FATAL:
Josh Gaof5693c62018-08-31 14:07:40 -0700170 inline_raise(SIGABRT);
Josh Gaof6e5b582018-06-01 15:30:54 -0700171 abort();
172
173 case ANDROID_FDSAN_ERROR_LEVEL_DISABLED:
Josh Gaof6e5b582018-06-01 15:30:54 -0700174 break;
175 }
176}
177
178uint64_t android_fdsan_create_owner_tag(android_fdsan_owner_type type, uint64_t tag) {
179 if (tag == 0) {
180 return 0;
181 }
182
183 if (__predict_false((type & 0xff) != type)) {
184 async_safe_fatal("invalid android_fdsan_owner_type value: %x", type);
185 }
186
187 uint64_t result = static_cast<uint64_t>(type) << 56;
188 uint64_t mask = (static_cast<uint64_t>(1) << 56) - 1;
189 result |= tag & mask;
190 return result;
191}
192
Josh Gaob6b3a1d2018-08-23 14:04:11 -0700193const char* android_fdsan_get_tag_type(uint64_t tag) {
Josh Gaof6e5b582018-06-01 15:30:54 -0700194 uint64_t type = tag >> 56;
195 switch (type) {
196 case ANDROID_FDSAN_OWNER_TYPE_FILE:
197 return "FILE*";
198 case ANDROID_FDSAN_OWNER_TYPE_DIR:
199 return "DIR*";
200 case ANDROID_FDSAN_OWNER_TYPE_UNIQUE_FD:
201 return "unique_fd";
202 case ANDROID_FDSAN_OWNER_TYPE_FILEINPUTSTREAM:
203 return "FileInputStream";
204 case ANDROID_FDSAN_OWNER_TYPE_FILEOUTPUTSTREAM:
205 return "FileOutputStream";
206 case ANDROID_FDSAN_OWNER_TYPE_RANDOMACCESSFILE:
207 return "RandomAccessFile";
208 case ANDROID_FDSAN_OWNER_TYPE_PARCELFILEDESCRIPTOR:
209 return "ParcelFileDescriptor";
Josh Gao27cc4bc2018-08-22 12:40:08 -0700210 case ANDROID_FDSAN_OWNER_TYPE_SQLITE:
211 return "sqlite";
Josh Gaoab6a0802018-08-30 17:37:52 -0700212 case ANDROID_FDSAN_OWNER_TYPE_ART_FDFILE:
213 return "ART FdFile";
Josh Gaod527cf12018-09-07 12:46:02 -0700214 case ANDROID_FDSAN_OWNER_TYPE_DATAGRAMSOCKETIMPL:
215 return "DatagramSocketImpl";
216 case ANDROID_FDSAN_OWNER_TYPE_SOCKETIMPL:
217 return "SocketImpl";
Josh Gao5fa9df82018-09-07 12:47:00 -0700218 case ANDROID_FDSAN_OWNER_TYPE_ZIPARCHIVE:
219 return "ZipArchive";
Brian Duddie5cfca6b2022-08-24 19:51:20 +0000220 case ANDROID_FDSAN_OWNER_TYPE_NATIVE_HANDLE:
221 return "native_handle_t";
Steven Moreland1d413fc2023-06-22 23:03:57 +0000222 case ANDROID_FDSAN_OWNER_TYPE_PARCEL:
223 return "Parcel";
Josh Gaof6e5b582018-06-01 15:30:54 -0700224
225 case ANDROID_FDSAN_OWNER_TYPE_GENERIC_00:
226 default:
227 return "native object of unknown type";
228
229 case ANDROID_FDSAN_OWNER_TYPE_GENERIC_FF:
230 // If bits 48 to 56 are set, this is a sign-extended generic native pointer
231 uint64_t high_bits = tag >> 48;
232 if (high_bits == (1 << 16) - 1) {
233 return "native object of unknown type";
234 }
235
236 return "Java object of unknown type";
237 }
238}
239
Josh Gaob6b3a1d2018-08-23 14:04:11 -0700240uint64_t android_fdsan_get_tag_value(uint64_t tag) {
Josh Gao08b7a402018-08-03 14:31:37 -0700241 // Lop off the most significant byte and sign extend.
242 return static_cast<uint64_t>(static_cast<int64_t>(tag << 8) >> 8);
Josh Gaof6e5b582018-06-01 15:30:54 -0700243}
244
245int android_fdsan_close_with_tag(int fd, uint64_t expected_tag) {
Josh Gao65fb2a72020-05-07 19:40:14 -0700246 if (__get_thread()->is_vforked()) {
247 return __close(fd);
248 }
249
Josh Gao97271922019-11-06 13:15:00 -0800250 FDTRACK_CLOSE(fd);
Josh Gaof6e5b582018-06-01 15:30:54 -0700251 FdEntry* fde = GetFdEntry(fd);
252 if (!fde) {
Elliott Hughes50080a22019-06-19 12:47:53 -0700253 return __close(fd);
Josh Gaof6e5b582018-06-01 15:30:54 -0700254 }
255
256 uint64_t tag = expected_tag;
257 if (!atomic_compare_exchange_strong(&fde->close_tag, &tag, 0)) {
Josh Gaob6b3a1d2018-08-23 14:04:11 -0700258 const char* expected_type = android_fdsan_get_tag_type(expected_tag);
259 uint64_t expected_owner = android_fdsan_get_tag_value(expected_tag);
260 const char* actual_type = android_fdsan_get_tag_type(tag);
261 uint64_t actual_owner = android_fdsan_get_tag_value(tag);
Josh Gaof6e5b582018-06-01 15:30:54 -0700262 if (expected_tag && tag) {
Josh Gao08b7a402018-08-03 14:31:37 -0700263 fdsan_error(
264 "attempted to close file descriptor %d, "
265 "expected to be owned by %s 0x%" PRIx64 ", actually owned by %s 0x%" PRIx64,
266 fd, expected_type, expected_owner, actual_type, actual_owner);
Josh Gaof6e5b582018-06-01 15:30:54 -0700267 } else if (expected_tag && !tag) {
Josh Gao08b7a402018-08-03 14:31:37 -0700268 fdsan_error(
269 "attempted to close file descriptor %d, "
270 "expected to be owned by %s 0x%" PRIx64 ", actually unowned",
271 fd, expected_type, expected_owner);
Josh Gaof6e5b582018-06-01 15:30:54 -0700272 } else if (!expected_tag && tag) {
273 fdsan_error(
Josh Gao08b7a402018-08-03 14:31:37 -0700274 "attempted to close file descriptor %d, "
275 "expected to be unowned, actually owned by %s 0x%" PRIx64,
Josh Gaof6e5b582018-06-01 15:30:54 -0700276 fd, actual_type, actual_owner);
277 } else if (!expected_tag && !tag) {
278 // This should never happen: our CAS failed, but expected == actual?
Josh Gao08b7a402018-08-03 14:31:37 -0700279 async_safe_fatal("fdsan atomic_compare_exchange_strong failed unexpectedly while closing");
Josh Gaof6e5b582018-06-01 15:30:54 -0700280 }
281 }
282
Elliott Hughes50080a22019-06-19 12:47:53 -0700283 int rc = __close(fd);
Josh Gaof6e5b582018-06-01 15:30:54 -0700284 // If we were expecting to close with a tag, abort on EBADF.
285 if (expected_tag && rc == -1 && errno == EBADF) {
286 fdsan_error("double-close of file descriptor %d detected", fd);
287 }
288 return rc;
289}
290
Josh Gaob6b3a1d2018-08-23 14:04:11 -0700291uint64_t android_fdsan_get_owner_tag(int fd) {
292 FdEntry* fde = GetFdEntry(fd);
293 if (!fde) {
294 return 0;
295 }
296 return fde->close_tag;
297}
298
Josh Gaof6e5b582018-06-01 15:30:54 -0700299void android_fdsan_exchange_owner_tag(int fd, uint64_t expected_tag, uint64_t new_tag) {
Josh Gao65fb2a72020-05-07 19:40:14 -0700300 if (__get_thread()->is_vforked()) {
301 return;
302 }
303
Josh Gaof6e5b582018-06-01 15:30:54 -0700304 FdEntry* fde = GetFdEntry(fd);
305 if (!fde) {
306 return;
307 }
308
309 uint64_t tag = expected_tag;
310 if (!atomic_compare_exchange_strong(&fde->close_tag, &tag, new_tag)) {
Josh Gao08b7a402018-08-03 14:31:37 -0700311 if (expected_tag && tag) {
Josh Gaof6e5b582018-06-01 15:30:54 -0700312 fdsan_error(
Josh Gao08b7a402018-08-03 14:31:37 -0700313 "failed to exchange ownership of file descriptor: fd %d is "
314 "owned by %s 0x%" PRIx64 ", was expected to be owned by %s 0x%" PRIx64,
Josh Gaob6b3a1d2018-08-23 14:04:11 -0700315 fd, android_fdsan_get_tag_type(tag), android_fdsan_get_tag_value(tag),
316 android_fdsan_get_tag_type(expected_tag), android_fdsan_get_tag_value(expected_tag));
Josh Gao08b7a402018-08-03 14:31:37 -0700317 } else if (expected_tag && !tag) {
Josh Gaof6e5b582018-06-01 15:30:54 -0700318 fdsan_error(
Josh Gao08b7a402018-08-03 14:31:37 -0700319 "failed to exchange ownership of file descriptor: fd %d is "
320 "unowned, was expected to be owned by %s 0x%" PRIx64,
Josh Gaob6b3a1d2018-08-23 14:04:11 -0700321 fd, android_fdsan_get_tag_type(expected_tag), android_fdsan_get_tag_value(expected_tag));
Josh Gao08b7a402018-08-03 14:31:37 -0700322 } else if (!expected_tag && tag) {
323 fdsan_error(
324 "failed to exchange ownership of file descriptor: fd %d is "
325 "owned by %s 0x%" PRIx64 ", was expected to be unowned",
Josh Gaob6b3a1d2018-08-23 14:04:11 -0700326 fd, android_fdsan_get_tag_type(tag), android_fdsan_get_tag_value(tag));
Josh Gao08b7a402018-08-03 14:31:37 -0700327 } else if (!expected_tag && !tag) {
328 // This should never happen: our CAS failed, but expected == actual?
329 async_safe_fatal(
330 "fdsan atomic_compare_exchange_strong failed unexpectedly while exchanging owner tag");
Josh Gaof6e5b582018-06-01 15:30:54 -0700331 }
332 }
333}
334
335android_fdsan_error_level android_fdsan_get_error_level() {
Ryan Prichardabf736a2018-11-22 02:40:17 -0800336 return GetFdTable().error_level;
Josh Gaof6e5b582018-06-01 15:30:54 -0700337}
338
339android_fdsan_error_level android_fdsan_set_error_level(android_fdsan_error_level new_level) {
Josh Gao65fb2a72020-05-07 19:40:14 -0700340 if (__get_thread()->is_vforked()) {
341 return android_fdsan_get_error_level();
342 }
343
Ryan Prichardabf736a2018-11-22 02:40:17 -0800344 return atomic_exchange(&GetFdTable().error_level, new_level);
Josh Gaof6e5b582018-06-01 15:30:54 -0700345}
346
Josh Gao6a510132019-08-20 17:59:14 -0700347android_fdsan_error_level android_fdsan_set_error_level_from_property(
348 android_fdsan_error_level default_level) {
349 const prop_info* pi = __system_property_find(kFdsanPropertyName);
350 if (!pi) {
351 return android_fdsan_set_error_level(default_level);
352 }
353
354 struct callback_data {
355 android_fdsan_error_level default_value;
356 android_fdsan_error_level result;
357 };
358
359 callback_data data;
360 data.default_value = default_level;
361
362 __system_property_read_callback(
363 pi,
364 [](void* arg, const char*, const char* value, uint32_t) {
365 callback_data* data = static_cast<callback_data*>(arg);
366
367 if (strcasecmp(value, "1") == 0 || strcasecmp(value, "fatal") == 0) {
368 data->result = android_fdsan_set_error_level(ANDROID_FDSAN_ERROR_LEVEL_FATAL);
369 } else if (strcasecmp(value, "warn") == 0) {
370 data->result = android_fdsan_set_error_level(ANDROID_FDSAN_ERROR_LEVEL_WARN_ALWAYS);
371 } else if (strcasecmp(value, "warn_once") == 0) {
372 data->result = android_fdsan_set_error_level(ANDROID_FDSAN_ERROR_LEVEL_WARN_ONCE);
373 } else {
374 if (strlen(value) != 0 && strcasecmp(value, "0") != 0) {
375 async_safe_format_log(ANDROID_LOG_ERROR, "libc",
376 "debug.fdsan set to unknown value '%s', disabling", value);
377 }
378 data->result = android_fdsan_set_error_level(data->default_value);
379 }
380 },
381 &data);
382
383 return data.result;
384}
385
Josh Gaof6e5b582018-06-01 15:30:54 -0700386int close(int fd) {
387 int rc = android_fdsan_close_with_tag(fd, 0);
388 if (rc == -1 && errno == EINTR) {
389 return 0;
390 }
391 return rc;
392}