blob: 48aa9caf55514d09f59a0ec483cdc6dc99e5f6d0 [file] [log] [blame]
Kostya Serebryany712fc982016-06-07 01:20:26 +00001//===-- scudo_allocator.cpp -------------------------------------*- C++ -*-===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9///
10/// Scudo Hardened Allocator implementation.
11/// It uses the sanitizer_common allocator as a base and aims at mitigating
12/// heap corruption vulnerabilities. It provides a checksum-guarded chunk
13/// header, a delayed free list, and additional sanity checks.
14///
15//===----------------------------------------------------------------------===//
16
17#include "scudo_allocator.h"
Kostya Kortchinskyb0e96eb2017-05-09 15:12:38 +000018#include "scudo_crc32.h"
Kostya Kortchinsky43917722017-08-16 16:40:48 +000019#include "scudo_flags.h"
Kostya Kortchinskyb59abb22017-09-26 17:20:02 +000020#include "scudo_tsd.h"
Kostya Serebryany712fc982016-06-07 01:20:26 +000021#include "scudo_utils.h"
22
Alex Shlyapnikov42bea012017-07-18 19:11:04 +000023#include "sanitizer_common/sanitizer_allocator_checks.h"
Kostya Serebryany712fc982016-06-07 01:20:26 +000024#include "sanitizer_common/sanitizer_allocator_interface.h"
25#include "sanitizer_common/sanitizer_quarantine.h"
26
Kostya Kortchinsky8d4ba5f2017-10-12 15:01:09 +000027#include <errno.h>
Kostya Kortchinsky006805d2017-04-20 15:11:00 +000028#include <string.h>
Kostya Serebryany712fc982016-06-07 01:20:26 +000029
30namespace __scudo {
31
Kostya Serebryany712fc982016-06-07 01:20:26 +000032// Global static cookie, initialized at start-up.
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +000033static uptr Cookie;
34
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +000035// We default to software CRC32 if the alternatives are not supported, either
36// at compilation or at runtime.
37static atomic_uint8_t HashAlgorithm = { CRC32Software };
38
Kostya Kortchinsky43917722017-08-16 16:40:48 +000039INLINE u32 computeCRC32(u32 Crc, uptr Value, uptr *Array, uptr ArraySize) {
Kostya Kortchinskyb0e96eb2017-05-09 15:12:38 +000040 // If the hardware CRC32 feature is defined here, it was enabled everywhere,
41 // as opposed to only for scudo_crc32.cpp. This means that other hardware
42 // specific instructions were likely emitted at other places, and as a
43 // result there is no reason to not use it here.
Kostya Kortchinskyb39dff42017-01-18 17:11:17 +000044#if defined(__SSE4_2__) || defined(__ARM_FEATURE_CRC32)
Kostya Kortchinskyb0e96eb2017-05-09 15:12:38 +000045 Crc = CRC32_INTRINSIC(Crc, Value);
46 for (uptr i = 0; i < ArraySize; i++)
47 Crc = CRC32_INTRINSIC(Crc, Array[i]);
48 return Crc;
Kostya Kortchinskyb39dff42017-01-18 17:11:17 +000049#else
Kostya Kortchinskyb0e96eb2017-05-09 15:12:38 +000050 if (atomic_load_relaxed(&HashAlgorithm) == CRC32Hardware) {
51 Crc = computeHardwareCRC32(Crc, Value);
52 for (uptr i = 0; i < ArraySize; i++)
53 Crc = computeHardwareCRC32(Crc, Array[i]);
54 return Crc;
55 }
56 Crc = computeSoftwareCRC32(Crc, Value);
57 for (uptr i = 0; i < ArraySize; i++)
58 Crc = computeSoftwareCRC32(Crc, Array[i]);
59 return Crc;
60#endif // defined(__SSE4_2__) || defined(__ARM_FEATURE_CRC32)
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +000061}
Kostya Serebryany712fc982016-06-07 01:20:26 +000062
Kostya Kortchinsky36b34342017-04-27 20:21:16 +000063static ScudoBackendAllocator &getBackendAllocator();
64
Kostya Serebryany712fc982016-06-07 01:20:26 +000065struct ScudoChunk : UnpackedHeader {
66 // We can't use the offset member of the chunk itself, as we would double
67 // fetch it without any warranty that it wouldn't have been tampered. To
68 // prevent this, we work with a local copy of the header.
Kostya Kortchinsky71dcc332016-10-26 16:16:58 +000069 void *getAllocBeg(UnpackedHeader *Header) {
Kostya Serebryany712fc982016-06-07 01:20:26 +000070 return reinterpret_cast<void *>(
71 reinterpret_cast<uptr>(this) - (Header->Offset << MinAlignmentLog));
72 }
73
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +000074 // Returns the usable size for a chunk, meaning the amount of bytes from the
75 // beginning of the user data to the end of the backend allocated chunk.
76 uptr getUsableSize(UnpackedHeader *Header) {
Kostya Kortchinsky01a66fc2017-05-11 21:40:45 +000077 uptr Size =
Kostya Kortchinskyb44364d2017-07-13 21:01:19 +000078 getBackendAllocator().getActuallyAllocatedSize(getAllocBeg(Header),
Kostya Kortchinsky01a66fc2017-05-11 21:40:45 +000079 Header->FromPrimary);
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +000080 if (Size == 0)
Kostya Kortchinsky006805d2017-04-20 15:11:00 +000081 return 0;
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +000082 return Size - AlignedChunkHeaderSize - (Header->Offset << MinAlignmentLog);
83 }
84
85 // Compute the checksum of the Chunk pointer and its ChunkHeader.
Kostya Kortchinsky71dcc332016-10-26 16:16:58 +000086 u16 computeChecksum(UnpackedHeader *Header) const {
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +000087 UnpackedHeader ZeroChecksumHeader = *Header;
88 ZeroChecksumHeader.Checksum = 0;
89 uptr HeaderHolder[sizeof(UnpackedHeader) / sizeof(uptr)];
90 memcpy(&HeaderHolder, &ZeroChecksumHeader, sizeof(HeaderHolder));
Kostya Kortchinsky43917722017-08-16 16:40:48 +000091 u32 Crc = computeCRC32(static_cast<u32>(Cookie),
92 reinterpret_cast<uptr>(this), HeaderHolder,
Kostya Kortchinskyb0e96eb2017-05-09 15:12:38 +000093 ARRAY_SIZE(HeaderHolder));
Kostya Kortchinskyb39dff42017-01-18 17:11:17 +000094 return static_cast<u16>(Crc);
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +000095 }
96
Kostya Kortchinsky006805d2017-04-20 15:11:00 +000097 // Checks the validity of a chunk by verifying its checksum. It doesn't
98 // incur termination in the event of an invalid chunk.
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +000099 bool isValid() {
100 UnpackedHeader NewUnpackedHeader;
101 const AtomicPackedHeader *AtomicHeader =
102 reinterpret_cast<const AtomicPackedHeader *>(this);
Kostya Kortchinskya00b9222017-01-20 18:32:18 +0000103 PackedHeader NewPackedHeader = atomic_load_relaxed(AtomicHeader);
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +0000104 NewUnpackedHeader = bit_cast<UnpackedHeader>(NewPackedHeader);
105 return (NewUnpackedHeader.Checksum == computeChecksum(&NewUnpackedHeader));
Kostya Serebryany712fc982016-06-07 01:20:26 +0000106 }
107
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000108 // Nulls out a chunk header. When returning the chunk to the backend, there
109 // is no need to store a valid ChunkAvailable header, as this would be
110 // computationally expensive. Zeroing out serves the same purpose by making
111 // the header invalid. In the extremely rare event where 0 would be a valid
112 // checksum for the chunk, the state of the chunk is ChunkAvailable anyway.
113 COMPILER_CHECK(ChunkAvailable == 0);
114 void eraseHeader() {
115 PackedHeader NullPackedHeader = 0;
116 AtomicPackedHeader *AtomicHeader =
117 reinterpret_cast<AtomicPackedHeader *>(this);
118 atomic_store_relaxed(AtomicHeader, NullPackedHeader);
119 }
120
Kostya Serebryany712fc982016-06-07 01:20:26 +0000121 // Loads and unpacks the header, verifying the checksum in the process.
122 void loadHeader(UnpackedHeader *NewUnpackedHeader) const {
123 const AtomicPackedHeader *AtomicHeader =
124 reinterpret_cast<const AtomicPackedHeader *>(this);
Kostya Kortchinskya00b9222017-01-20 18:32:18 +0000125 PackedHeader NewPackedHeader = atomic_load_relaxed(AtomicHeader);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000126 *NewUnpackedHeader = bit_cast<UnpackedHeader>(NewPackedHeader);
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000127 if (UNLIKELY(NewUnpackedHeader->Checksum !=
128 computeChecksum(NewUnpackedHeader))) {
Kostya Serebryany712fc982016-06-07 01:20:26 +0000129 dieWithMessage("ERROR: corrupted chunk header at address %p\n", this);
130 }
131 }
132
133 // Packs and stores the header, computing the checksum in the process.
134 void storeHeader(UnpackedHeader *NewUnpackedHeader) {
Kostya Kortchinsky71dcc332016-10-26 16:16:58 +0000135 NewUnpackedHeader->Checksum = computeChecksum(NewUnpackedHeader);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000136 PackedHeader NewPackedHeader = bit_cast<PackedHeader>(*NewUnpackedHeader);
137 AtomicPackedHeader *AtomicHeader =
138 reinterpret_cast<AtomicPackedHeader *>(this);
Kostya Kortchinskya00b9222017-01-20 18:32:18 +0000139 atomic_store_relaxed(AtomicHeader, NewPackedHeader);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000140 }
141
142 // Packs and stores the header, computing the checksum in the process. We
143 // compare the current header with the expected provided one to ensure that
144 // we are not being raced by a corruption occurring in another thread.
145 void compareExchangeHeader(UnpackedHeader *NewUnpackedHeader,
146 UnpackedHeader *OldUnpackedHeader) {
Kostya Kortchinsky71dcc332016-10-26 16:16:58 +0000147 NewUnpackedHeader->Checksum = computeChecksum(NewUnpackedHeader);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000148 PackedHeader NewPackedHeader = bit_cast<PackedHeader>(*NewUnpackedHeader);
149 PackedHeader OldPackedHeader = bit_cast<PackedHeader>(*OldUnpackedHeader);
150 AtomicPackedHeader *AtomicHeader =
151 reinterpret_cast<AtomicPackedHeader *>(this);
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000152 if (UNLIKELY(!atomic_compare_exchange_strong(AtomicHeader,
153 &OldPackedHeader,
154 NewPackedHeader,
155 memory_order_relaxed))) {
Kostya Serebryany712fc982016-06-07 01:20:26 +0000156 dieWithMessage("ERROR: race on chunk header at address %p\n", this);
157 }
158 }
159};
160
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000161ScudoChunk *getScudoChunk(uptr UserBeg) {
162 return reinterpret_cast<ScudoChunk *>(UserBeg - AlignedChunkHeaderSize);
163}
164
Kostya Serebryany712fc982016-06-07 01:20:26 +0000165struct QuarantineCallback {
166 explicit QuarantineCallback(AllocatorCache *Cache)
167 : Cache_(Cache) {}
168
Kostya Kortchinsky01a66fc2017-05-11 21:40:45 +0000169 // Chunk recycling function, returns a quarantined chunk to the backend,
170 // first making sure it hasn't been tampered with.
Kostya Serebryany712fc982016-06-07 01:20:26 +0000171 void Recycle(ScudoChunk *Chunk) {
172 UnpackedHeader Header;
173 Chunk->loadHeader(&Header);
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000174 if (UNLIKELY(Header.State != ChunkQuarantine)) {
Kostya Serebryany712fc982016-06-07 01:20:26 +0000175 dieWithMessage("ERROR: invalid chunk state when recycling address %p\n",
176 Chunk);
177 }
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000178 Chunk->eraseHeader();
Kostya Kortchinsky71dcc332016-10-26 16:16:58 +0000179 void *Ptr = Chunk->getAllocBeg(&Header);
Kostya Kortchinskyb44364d2017-07-13 21:01:19 +0000180 if (Header.FromPrimary)
181 getBackendAllocator().deallocatePrimary(Cache_, Ptr);
182 else
183 getBackendAllocator().deallocateSecondary(Ptr);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000184 }
185
Kostya Kortchinsky01a66fc2017-05-11 21:40:45 +0000186 // Internal quarantine allocation and deallocation functions. We first check
187 // that the batches are indeed serviced by the Primary.
188 // TODO(kostyak): figure out the best way to protect the batches.
189 COMPILER_CHECK(sizeof(QuarantineBatch) < SizeClassMap::kMaxSize);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000190 void *Allocate(uptr Size) {
Kostya Kortchinskyb44364d2017-07-13 21:01:19 +0000191 return getBackendAllocator().allocatePrimary(Cache_, Size);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000192 }
193
194 void Deallocate(void *Ptr) {
Kostya Kortchinskyb44364d2017-07-13 21:01:19 +0000195 getBackendAllocator().deallocatePrimary(Cache_, Ptr);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000196 }
197
198 AllocatorCache *Cache_;
199};
200
201typedef Quarantine<QuarantineCallback, ScudoChunk> ScudoQuarantine;
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000202typedef ScudoQuarantine::Cache ScudoQuarantineCache;
Kostya Kortchinsky36b34342017-04-27 20:21:16 +0000203COMPILER_CHECK(sizeof(ScudoQuarantineCache) <=
Kostya Kortchinsky39248092017-09-22 15:35:37 +0000204 sizeof(ScudoTSD::QuarantineCachePlaceHolder));
Kostya Serebryany712fc982016-06-07 01:20:26 +0000205
Kostya Kortchinsky39248092017-09-22 15:35:37 +0000206ScudoQuarantineCache *getQuarantineCache(ScudoTSD *TSD) {
207 return reinterpret_cast<ScudoQuarantineCache *>(
208 TSD->QuarantineCachePlaceHolder);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000209}
210
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000211struct ScudoAllocator {
Kostya Kortchinsky71dcc332016-10-26 16:16:58 +0000212 static const uptr MaxAllowedMallocSize =
213 FIRST_32_SECOND_64(2UL << 30, 1ULL << 40);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000214
Alex Shlyapnikovccab11b2017-06-20 21:23:02 +0000215 typedef ReturnNullOrDieOnFailure FailureHandler;
216
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000217 ScudoBackendAllocator BackendAllocator;
Kostya Serebryany712fc982016-06-07 01:20:26 +0000218 ScudoQuarantine AllocatorQuarantine;
219
Kostya Kortchinskyb44364d2017-07-13 21:01:19 +0000220 StaticSpinMutex GlobalPrngMutex;
221 ScudoPrng GlobalPrng;
222
Kostya Kortchinsky2d944052017-07-24 15:29:38 +0000223 u32 QuarantineChunksUpToSize;
224
Kostya Serebryany712fc982016-06-07 01:20:26 +0000225 bool DeallocationTypeMismatch;
226 bool ZeroContents;
227 bool DeleteSizeMismatch;
228
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000229 explicit ScudoAllocator(LinkerInitialized)
Kostya Kortchinsky22396c22017-09-25 15:12:08 +0000230 : AllocatorQuarantine(LINKER_INITIALIZED) {}
Kostya Serebryany712fc982016-06-07 01:20:26 +0000231
Kostya Kortchinskya2b715f2017-11-14 16:14:53 +0000232 void init() {
233 SanitizerToolName = "Scudo";
234 initFlags();
235
Kostya Serebryany712fc982016-06-07 01:20:26 +0000236 // Verify that the header offset field can hold the maximum offset. In the
Kostya Kortchinsky71dcc332016-10-26 16:16:58 +0000237 // case of the Secondary allocator, it takes care of alignment and the
238 // offset will always be 0. In the case of the Primary, the worst case
239 // scenario happens in the last size class, when the backend allocation
240 // would already be aligned on the requested alignment, which would happen
241 // to be the maximum alignment that would fit in that size class. As a
242 // result, the maximum offset will be at most the maximum alignment for the
243 // last size class minus the header size, in multiples of MinAlignment.
Kostya Serebryany712fc982016-06-07 01:20:26 +0000244 UnpackedHeader Header = {};
Kostya Kortchinskyb44364d2017-07-13 21:01:19 +0000245 uptr MaxPrimaryAlignment =
246 1 << MostSignificantSetBitIndex(SizeClassMap::kMaxSize - MinAlignment);
247 uptr MaxOffset =
248 (MaxPrimaryAlignment - AlignedChunkHeaderSize) >> MinAlignmentLog;
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +0000249 Header.Offset = MaxOffset;
250 if (Header.Offset != MaxOffset) {
Kostya Serebryany712fc982016-06-07 01:20:26 +0000251 dieWithMessage("ERROR: the maximum possible offset doesn't fit in the "
252 "header\n");
253 }
Kostya Kortchinskyfff8e062017-04-20 18:07:17 +0000254 // Verify that we can fit the maximum size or amount of unused bytes in the
255 // header. Given that the Secondary fits the allocation to a page, the worst
256 // case scenario happens in the Primary. It will depend on the second to
257 // last and last class sizes, as well as the dynamic base for the Primary.
258 // The following is an over-approximation that works for our needs.
259 uptr MaxSizeOrUnusedBytes = SizeClassMap::kMaxSize - 1;
260 Header.SizeOrUnusedBytes = MaxSizeOrUnusedBytes;
261 if (Header.SizeOrUnusedBytes != MaxSizeOrUnusedBytes) {
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +0000262 dieWithMessage("ERROR: the maximum possible unused bytes doesn't fit in "
263 "the header\n");
264 }
Kostya Serebryany712fc982016-06-07 01:20:26 +0000265
Kostya Kortchinskya2b715f2017-11-14 16:14:53 +0000266 // Check if hardware CRC32 is supported in the binary and by the platform,
267 // if so, opt for the CRC32 hardware version of the checksum.
268 if (computeHardwareCRC32 && testCPUFeature(CRC32CPUFeature))
269 atomic_store_relaxed(&HashAlgorithm, CRC32Hardware);
270
271 SetAllocatorMayReturnNull(common_flags()->allocator_may_return_null);
272 BackendAllocator.init(common_flags()->allocator_release_to_os_interval_ms);
Kostya Kortchinsky71dcc332016-10-26 16:16:58 +0000273 AllocatorQuarantine.Init(
Kostya Kortchinskya2b715f2017-11-14 16:14:53 +0000274 static_cast<uptr>(getFlags()->QuarantineSizeKb) << 10,
275 static_cast<uptr>(getFlags()->ThreadLocalQuarantineSizeKb) << 10);
276 QuarantineChunksUpToSize = getFlags()->QuarantineChunksUpToSize;
277 DeallocationTypeMismatch = getFlags()->DeallocationTypeMismatch;
278 DeleteSizeMismatch = getFlags()->DeleteSizeMismatch;
279 ZeroContents = getFlags()->ZeroContents;
280
Kostya Kortchinskyb44364d2017-07-13 21:01:19 +0000281 GlobalPrng.init();
282 Cookie = GlobalPrng.getU64();
Kostya Serebryany712fc982016-06-07 01:20:26 +0000283 }
284
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000285 // Helper function that checks for a valid Scudo chunk. nullptr isn't.
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +0000286 bool isValidPointer(const void *UserPtr) {
Kostya Kortchinsky36b34342017-04-27 20:21:16 +0000287 initThreadMaybe();
Kostya Kortchinsky0ce49992017-06-29 16:45:20 +0000288 if (UNLIKELY(!UserPtr))
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +0000289 return false;
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000290 uptr UserBeg = reinterpret_cast<uptr>(UserPtr);
291 if (!IsAligned(UserBeg, MinAlignment))
292 return false;
293 return getScudoChunk(UserBeg)->isValid();
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +0000294 }
295
Kostya Serebryany712fc982016-06-07 01:20:26 +0000296 // Allocates a chunk.
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000297 void *allocate(uptr Size, uptr Alignment, AllocType Type,
298 bool ForceZeroContents = false) {
Kostya Kortchinsky36b34342017-04-27 20:21:16 +0000299 initThreadMaybe();
Kostya Kortchinsky0ce49992017-06-29 16:45:20 +0000300 if (UNLIKELY(Alignment > MaxAlignment))
Alex Shlyapnikovccab11b2017-06-20 21:23:02 +0000301 return FailureHandler::OnBadRequest();
Kostya Kortchinsky0ce49992017-06-29 16:45:20 +0000302 if (UNLIKELY(Alignment < MinAlignment))
Kostya Serebryany712fc982016-06-07 01:20:26 +0000303 Alignment = MinAlignment;
Kostya Kortchinsky0ce49992017-06-29 16:45:20 +0000304 if (UNLIKELY(Size >= MaxAllowedMallocSize))
Alex Shlyapnikovccab11b2017-06-20 21:23:02 +0000305 return FailureHandler::OnBadRequest();
Kostya Kortchinsky0ce49992017-06-29 16:45:20 +0000306 if (UNLIKELY(Size == 0))
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000307 Size = 1;
Kostya Kortchinskyc74da7c2016-12-13 19:31:54 +0000308
309 uptr NeededSize = RoundUpTo(Size, MinAlignment) + AlignedChunkHeaderSize;
Kostya Kortchinsky01a66fc2017-05-11 21:40:45 +0000310 uptr AlignedSize = (Alignment > MinAlignment) ?
311 NeededSize + (Alignment - AlignedChunkHeaderSize) : NeededSize;
Kostya Kortchinsky0ce49992017-06-29 16:45:20 +0000312 if (UNLIKELY(AlignedSize >= MaxAllowedMallocSize))
Alex Shlyapnikovccab11b2017-06-20 21:23:02 +0000313 return FailureHandler::OnBadRequest();
Kostya Kortchinskyc74da7c2016-12-13 19:31:54 +0000314
Kostya Kortchinsky01a66fc2017-05-11 21:40:45 +0000315 // Primary and Secondary backed allocations have a different treatment. We
316 // deal with alignment requirements of Primary serviced allocations here,
317 // but the Secondary will take care of its own alignment needs.
318 bool FromPrimary = PrimaryAllocator::CanAllocate(AlignedSize, MinAlignment);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000319
320 void *Ptr;
Kostya Kortchinsky00582562017-07-12 15:29:08 +0000321 u8 Salt;
Kostya Kortchinskyb44364d2017-07-13 21:01:19 +0000322 uptr AllocSize;
323 if (FromPrimary) {
324 AllocSize = AlignedSize;
Kostya Kortchinsky39248092017-09-22 15:35:37 +0000325 ScudoTSD *TSD = getTSDAndLock();
Kostya Kortchinsky22396c22017-09-25 15:12:08 +0000326 Salt = TSD->Prng.getU8();
327 Ptr = BackendAllocator.allocatePrimary(&TSD->Cache, AllocSize);
328 TSD->unlock();
Kostya Serebryany712fc982016-06-07 01:20:26 +0000329 } else {
Kostya Kortchinskyb44364d2017-07-13 21:01:19 +0000330 {
331 SpinMutexLock l(&GlobalPrngMutex);
332 Salt = GlobalPrng.getU8();
333 }
334 AllocSize = NeededSize;
335 Ptr = BackendAllocator.allocateSecondary(AllocSize, Alignment);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000336 }
Kostya Kortchinsky0ce49992017-06-29 16:45:20 +0000337 if (UNLIKELY(!Ptr))
Alex Shlyapnikovccab11b2017-06-20 21:23:02 +0000338 return FailureHandler::OnOOM();
Kostya Serebryany712fc982016-06-07 01:20:26 +0000339
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +0000340 // If requested, we will zero out the entire contents of the returned chunk.
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000341 if ((ForceZeroContents || ZeroContents) && FromPrimary)
Kostya Kortchinskyb44364d2017-07-13 21:01:19 +0000342 memset(Ptr, 0, BackendAllocator.getActuallyAllocatedSize(
343 Ptr, /*FromPrimary=*/true));
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +0000344
Kostya Serebryany712fc982016-06-07 01:20:26 +0000345 UnpackedHeader Header = {};
Kostya Kortchinsky01a66fc2017-05-11 21:40:45 +0000346 uptr AllocBeg = reinterpret_cast<uptr>(Ptr);
347 uptr UserBeg = AllocBeg + AlignedChunkHeaderSize;
Kostya Kortchinsky0ce49992017-06-29 16:45:20 +0000348 if (UNLIKELY(!IsAligned(UserBeg, Alignment))) {
Kostya Kortchinsky01a66fc2017-05-11 21:40:45 +0000349 // Since the Secondary takes care of alignment, a non-aligned pointer
350 // means it is from the Primary. It is also the only case where the offset
351 // field of the header would be non-zero.
352 CHECK(FromPrimary);
353 UserBeg = RoundUpTo(UserBeg, Alignment);
354 uptr Offset = UserBeg - AlignedChunkHeaderSize - AllocBeg;
355 Header.Offset = Offset >> MinAlignmentLog;
356 }
Kostya Kortchinskyb44364d2017-07-13 21:01:19 +0000357 CHECK_LE(UserBeg + Size, AllocBeg + AllocSize);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000358 Header.State = ChunkAllocated;
Kostya Serebryany712fc982016-06-07 01:20:26 +0000359 Header.AllocType = Type;
Kostya Kortchinskyfff8e062017-04-20 18:07:17 +0000360 if (FromPrimary) {
Kostya Kortchinskyb44364d2017-07-13 21:01:19 +0000361 Header.FromPrimary = 1;
Kostya Kortchinskyfff8e062017-04-20 18:07:17 +0000362 Header.SizeOrUnusedBytes = Size;
363 } else {
364 // The secondary fits the allocations to a page, so the amount of unused
365 // bytes is the difference between the end of the user allocation and the
366 // next page boundary.
367 uptr PageSize = GetPageSizeCached();
368 uptr TrailingBytes = (UserBeg + Size) & (PageSize - 1);
369 if (TrailingBytes)
370 Header.SizeOrUnusedBytes = PageSize - TrailingBytes;
371 }
Kostya Kortchinskyb44364d2017-07-13 21:01:19 +0000372 Header.Salt = Salt;
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000373 getScudoChunk(UserBeg)->storeHeader(&Header);
374 void *UserPtr = reinterpret_cast<void *>(UserBeg);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000375 // if (&__sanitizer_malloc_hook) __sanitizer_malloc_hook(UserPtr, Size);
376 return UserPtr;
377 }
378
Kostya Kortchinsky2d944052017-07-24 15:29:38 +0000379 // Place a chunk in the quarantine or directly deallocate it in the event of
380 // a zero-sized quarantine, or if the size of the chunk is greater than the
381 // quarantine chunk size threshold.
Kostya Kortchinskyf1a54fd2017-04-21 18:10:53 +0000382 void quarantineOrDeallocateChunk(ScudoChunk *Chunk, UnpackedHeader *Header,
383 uptr Size) {
Kostya Kortchinsky2d944052017-07-24 15:29:38 +0000384 const bool BypassQuarantine = (AllocatorQuarantine.GetCacheSize() == 0) ||
385 (Size > QuarantineChunksUpToSize);
Kostya Kortchinskyf1a54fd2017-04-21 18:10:53 +0000386 if (BypassQuarantine) {
387 Chunk->eraseHeader();
388 void *Ptr = Chunk->getAllocBeg(Header);
Kostya Kortchinsky2d944052017-07-24 15:29:38 +0000389 if (Header->FromPrimary) {
Kostya Kortchinsky39248092017-09-22 15:35:37 +0000390 ScudoTSD *TSD = getTSDAndLock();
Kostya Kortchinsky22396c22017-09-25 15:12:08 +0000391 getBackendAllocator().deallocatePrimary(&TSD->Cache, Ptr);
392 TSD->unlock();
Kostya Kortchinskyf1a54fd2017-04-21 18:10:53 +0000393 } else {
Kostya Kortchinskyb44364d2017-07-13 21:01:19 +0000394 getBackendAllocator().deallocateSecondary(Ptr);
Kostya Kortchinskyf1a54fd2017-04-21 18:10:53 +0000395 }
396 } else {
Kostya Kortchinsky2d944052017-07-24 15:29:38 +0000397 // If a small memory amount was allocated with a larger alignment, we want
398 // to take that into account. Otherwise the Quarantine would be filled
399 // with tiny chunks, taking a lot of VA memory. This is an approximation
400 // of the usable size, that allows us to not call
401 // GetActuallyAllocatedSize.
402 uptr EstimatedSize = Size + (Header->Offset << MinAlignmentLog);
Kostya Kortchinskyf1a54fd2017-04-21 18:10:53 +0000403 UnpackedHeader NewHeader = *Header;
404 NewHeader.State = ChunkQuarantine;
405 Chunk->compareExchangeHeader(&NewHeader, Header);
Kostya Kortchinsky39248092017-09-22 15:35:37 +0000406 ScudoTSD *TSD = getTSDAndLock();
Kostya Kortchinsky22396c22017-09-25 15:12:08 +0000407 AllocatorQuarantine.Put(getQuarantineCache(TSD),
408 QuarantineCallback(&TSD->Cache),
409 Chunk, EstimatedSize);
410 TSD->unlock();
Kostya Kortchinskyf1a54fd2017-04-21 18:10:53 +0000411 }
412 }
413
Kostya Serebryany712fc982016-06-07 01:20:26 +0000414 // Deallocates a Chunk, which means adding it to the delayed free list (or
415 // Quarantine).
416 void deallocate(void *UserPtr, uptr DeleteSize, AllocType Type) {
Kostya Kortchinsky040c2112017-09-11 19:59:40 +0000417 // For a deallocation, we only ensure minimal initialization, meaning thread
418 // local data will be left uninitialized for now (when using ELF TLS). The
419 // fallback cache will be used instead. This is a workaround for a situation
420 // where the only heap operation performed in a thread would be a free past
421 // the TLS destructors, ending up in initialized thread specific data never
422 // being destroyed properly. Any other heap operation will do a full init.
423 initThreadMaybe(/*MinimalInit=*/true);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000424 // if (&__sanitizer_free_hook) __sanitizer_free_hook(UserPtr);
Kostya Kortchinsky0ce49992017-06-29 16:45:20 +0000425 if (UNLIKELY(!UserPtr))
Kostya Serebryany712fc982016-06-07 01:20:26 +0000426 return;
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000427 uptr UserBeg = reinterpret_cast<uptr>(UserPtr);
428 if (UNLIKELY(!IsAligned(UserBeg, MinAlignment))) {
Kostya Serebryany712fc982016-06-07 01:20:26 +0000429 dieWithMessage("ERROR: attempted to deallocate a chunk not properly "
430 "aligned at address %p\n", UserPtr);
431 }
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000432 ScudoChunk *Chunk = getScudoChunk(UserBeg);
Kostya Kortchinsky2d944052017-07-24 15:29:38 +0000433 UnpackedHeader Header;
434 Chunk->loadHeader(&Header);
435 if (UNLIKELY(Header.State != ChunkAllocated)) {
Kostya Serebryany712fc982016-06-07 01:20:26 +0000436 dieWithMessage("ERROR: invalid chunk state when deallocating address "
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +0000437 "%p\n", UserPtr);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000438 }
Kostya Serebryany712fc982016-06-07 01:20:26 +0000439 if (DeallocationTypeMismatch) {
440 // The deallocation type has to match the allocation one.
Kostya Kortchinsky2d944052017-07-24 15:29:38 +0000441 if (Header.AllocType != Type) {
Kostya Serebryany712fc982016-06-07 01:20:26 +0000442 // With the exception of memalign'd Chunks, that can be still be free'd.
Kostya Kortchinsky2d944052017-07-24 15:29:38 +0000443 if (Header.AllocType != FromMemalign || Type != FromMalloc) {
Kostya Kortchinsky43917722017-08-16 16:40:48 +0000444 dieWithMessage("ERROR: allocation type mismatch when deallocating "
445 "address %p\n", UserPtr);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000446 }
447 }
448 }
Kostya Kortchinsky2d944052017-07-24 15:29:38 +0000449 uptr Size = Header.FromPrimary ? Header.SizeOrUnusedBytes :
450 Chunk->getUsableSize(&Header) - Header.SizeOrUnusedBytes;
Kostya Serebryany712fc982016-06-07 01:20:26 +0000451 if (DeleteSizeMismatch) {
452 if (DeleteSize && DeleteSize != Size) {
453 dieWithMessage("ERROR: invalid sized delete on chunk at address %p\n",
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000454 UserPtr);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000455 }
456 }
Kostya Kortchinsky2d944052017-07-24 15:29:38 +0000457 quarantineOrDeallocateChunk(Chunk, &Header, Size);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000458 }
459
Kostya Serebryany712fc982016-06-07 01:20:26 +0000460 // Reallocates a chunk. We can save on a new allocation if the new requested
461 // size still fits in the chunk.
462 void *reallocate(void *OldPtr, uptr NewSize) {
Kostya Kortchinsky36b34342017-04-27 20:21:16 +0000463 initThreadMaybe();
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000464 uptr UserBeg = reinterpret_cast<uptr>(OldPtr);
465 if (UNLIKELY(!IsAligned(UserBeg, MinAlignment))) {
466 dieWithMessage("ERROR: attempted to reallocate a chunk not properly "
467 "aligned at address %p\n", OldPtr);
468 }
469 ScudoChunk *Chunk = getScudoChunk(UserBeg);
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +0000470 UnpackedHeader OldHeader;
471 Chunk->loadHeader(&OldHeader);
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000472 if (UNLIKELY(OldHeader.State != ChunkAllocated)) {
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +0000473 dieWithMessage("ERROR: invalid chunk state when reallocating address "
474 "%p\n", OldPtr);
475 }
Kostya Kortchinsky43917722017-08-16 16:40:48 +0000476 if (DeallocationTypeMismatch) {
477 if (UNLIKELY(OldHeader.AllocType != FromMalloc)) {
478 dieWithMessage("ERROR: allocation type mismatch when reallocating "
479 "address %p\n", OldPtr);
480 }
Kostya Serebryany712fc982016-06-07 01:20:26 +0000481 }
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000482 uptr UsableSize = Chunk->getUsableSize(&OldHeader);
Kostya Kortchinskyfff8e062017-04-20 18:07:17 +0000483 // The new size still fits in the current chunk, and the size difference
484 // is reasonable.
485 if (NewSize <= UsableSize &&
486 (UsableSize - NewSize) < (SizeClassMap::kMaxSize / 2)) {
Kostya Kortchinskyf1a54fd2017-04-21 18:10:53 +0000487 UnpackedHeader NewHeader = OldHeader;
Kostya Kortchinskyfff8e062017-04-20 18:07:17 +0000488 NewHeader.SizeOrUnusedBytes =
489 OldHeader.FromPrimary ? NewSize : UsableSize - NewSize;
Kostya Serebryany712fc982016-06-07 01:20:26 +0000490 Chunk->compareExchangeHeader(&NewHeader, &OldHeader);
491 return OldPtr;
492 }
493 // Otherwise, we have to allocate a new chunk and copy the contents of the
494 // old one.
495 void *NewPtr = allocate(NewSize, MinAlignment, FromMalloc);
496 if (NewPtr) {
Kostya Kortchinskyfff8e062017-04-20 18:07:17 +0000497 uptr OldSize = OldHeader.FromPrimary ? OldHeader.SizeOrUnusedBytes :
498 UsableSize - OldHeader.SizeOrUnusedBytes;
Kostya Kortchinsky43917722017-08-16 16:40:48 +0000499 memcpy(NewPtr, OldPtr, Min(NewSize, UsableSize));
Kostya Kortchinsky2d944052017-07-24 15:29:38 +0000500 quarantineOrDeallocateChunk(Chunk, &OldHeader, OldSize);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000501 }
502 return NewPtr;
503 }
504
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +0000505 // Helper function that returns the actual usable size of a chunk.
506 uptr getUsableSize(const void *Ptr) {
Kostya Kortchinsky36b34342017-04-27 20:21:16 +0000507 initThreadMaybe();
Kostya Kortchinsky0ce49992017-06-29 16:45:20 +0000508 if (UNLIKELY(!Ptr))
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +0000509 return 0;
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000510 uptr UserBeg = reinterpret_cast<uptr>(Ptr);
511 ScudoChunk *Chunk = getScudoChunk(UserBeg);
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +0000512 UnpackedHeader Header;
513 Chunk->loadHeader(&Header);
514 // Getting the usable size of a chunk only makes sense if it's allocated.
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000515 if (UNLIKELY(Header.State != ChunkAllocated)) {
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +0000516 dieWithMessage("ERROR: invalid chunk state when sizing address %p\n",
517 Ptr);
518 }
519 return Chunk->getUsableSize(&Header);
520 }
521
Kostya Serebryany712fc982016-06-07 01:20:26 +0000522 void *calloc(uptr NMemB, uptr Size) {
Kostya Kortchinsky36b34342017-04-27 20:21:16 +0000523 initThreadMaybe();
Kostya Kortchinskyb44364d2017-07-13 21:01:19 +0000524 if (UNLIKELY(CheckForCallocOverflow(NMemB, Size)))
Alex Shlyapnikovccab11b2017-06-20 21:23:02 +0000525 return FailureHandler::OnBadRequest();
Kostya Kortchinsky0ce49992017-06-29 16:45:20 +0000526 return allocate(NMemB * Size, MinAlignment, FromMalloc, true);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000527 }
528
Kostya Kortchinsky39248092017-09-22 15:35:37 +0000529 void commitBack(ScudoTSD *TSD) {
530 AllocatorQuarantine.Drain(getQuarantineCache(TSD),
531 QuarantineCallback(&TSD->Cache));
532 BackendAllocator.destroyCache(&TSD->Cache);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000533 }
Kostya Kortchinsky8d6257b2017-02-03 20:49:42 +0000534
535 uptr getStats(AllocatorStat StatType) {
Kostya Kortchinsky36b34342017-04-27 20:21:16 +0000536 initThreadMaybe();
Kostya Kortchinsky8d6257b2017-02-03 20:49:42 +0000537 uptr stats[AllocatorStatCount];
Kostya Kortchinskyb44364d2017-07-13 21:01:19 +0000538 BackendAllocator.getStats(stats);
Kostya Kortchinsky8d6257b2017-02-03 20:49:42 +0000539 return stats[StatType];
540 }
Kostya Kortchinsky26e689f2017-09-14 20:34:32 +0000541
542 void *handleBadRequest() {
543 initThreadMaybe();
544 return FailureHandler::OnBadRequest();
545 }
Kostya Serebryany712fc982016-06-07 01:20:26 +0000546};
547
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000548static ScudoAllocator Instance(LINKER_INITIALIZED);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000549
Kostya Kortchinsky006805d2017-04-20 15:11:00 +0000550static ScudoBackendAllocator &getBackendAllocator() {
Kostya Serebryany712fc982016-06-07 01:20:26 +0000551 return Instance.BackendAllocator;
552}
553
Kostya Kortchinskya2b715f2017-11-14 16:14:53 +0000554void initScudo() {
555 Instance.init();
Kostya Serebryany712fc982016-06-07 01:20:26 +0000556}
557
Kostya Kortchinsky22396c22017-09-25 15:12:08 +0000558void ScudoTSD::init(bool Shared) {
559 UnlockRequired = Shared;
Kostya Kortchinskyb44364d2017-07-13 21:01:19 +0000560 getBackendAllocator().initCache(&Cache);
Kostya Kortchinsky00582562017-07-12 15:29:08 +0000561 Prng.init();
Kostya Kortchinsky36b34342017-04-27 20:21:16 +0000562 memset(QuarantineCachePlaceHolder, 0, sizeof(QuarantineCachePlaceHolder));
563}
564
Kostya Kortchinsky39248092017-09-22 15:35:37 +0000565void ScudoTSD::commitBack() {
Kostya Kortchinsky36b34342017-04-27 20:21:16 +0000566 Instance.commitBack(this);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000567}
568
569void *scudoMalloc(uptr Size, AllocType Type) {
Alex Shlyapnikov42bea012017-07-18 19:11:04 +0000570 return SetErrnoOnNull(Instance.allocate(Size, MinAlignment, Type));
Kostya Serebryany712fc982016-06-07 01:20:26 +0000571}
572
573void scudoFree(void *Ptr, AllocType Type) {
574 Instance.deallocate(Ptr, 0, Type);
575}
576
577void scudoSizedFree(void *Ptr, uptr Size, AllocType Type) {
578 Instance.deallocate(Ptr, Size, Type);
579}
580
581void *scudoRealloc(void *Ptr, uptr Size) {
582 if (!Ptr)
Alex Shlyapnikov42bea012017-07-18 19:11:04 +0000583 return SetErrnoOnNull(Instance.allocate(Size, MinAlignment, FromMalloc));
Kostya Serebryany712fc982016-06-07 01:20:26 +0000584 if (Size == 0) {
585 Instance.deallocate(Ptr, 0, FromMalloc);
586 return nullptr;
587 }
Alex Shlyapnikov42bea012017-07-18 19:11:04 +0000588 return SetErrnoOnNull(Instance.reallocate(Ptr, Size));
Kostya Serebryany712fc982016-06-07 01:20:26 +0000589}
590
591void *scudoCalloc(uptr NMemB, uptr Size) {
Alex Shlyapnikov42bea012017-07-18 19:11:04 +0000592 return SetErrnoOnNull(Instance.calloc(NMemB, Size));
Kostya Serebryany712fc982016-06-07 01:20:26 +0000593}
594
595void *scudoValloc(uptr Size) {
Alex Shlyapnikov42bea012017-07-18 19:11:04 +0000596 return SetErrnoOnNull(
597 Instance.allocate(Size, GetPageSizeCached(), FromMemalign));
Kostya Serebryany712fc982016-06-07 01:20:26 +0000598}
599
Kostya Serebryany712fc982016-06-07 01:20:26 +0000600void *scudoPvalloc(uptr Size) {
601 uptr PageSize = GetPageSizeCached();
Kostya Kortchinsky65fdf672017-07-25 21:18:02 +0000602 if (UNLIKELY(CheckForPvallocOverflow(Size, PageSize))) {
Kostya Kortchinsky8d4ba5f2017-10-12 15:01:09 +0000603 errno = ENOMEM;
Kostya Kortchinsky26e689f2017-09-14 20:34:32 +0000604 return Instance.handleBadRequest();
Kostya Kortchinsky65fdf672017-07-25 21:18:02 +0000605 }
Alex Shlyapnikovdf18cbb2017-07-14 21:17:16 +0000606 // pvalloc(0) should allocate one page.
607 Size = Size ? RoundUpTo(Size, PageSize) : PageSize;
Alex Shlyapnikov42bea012017-07-18 19:11:04 +0000608 return SetErrnoOnNull(Instance.allocate(Size, PageSize, FromMemalign));
Kostya Serebryany712fc982016-06-07 01:20:26 +0000609}
610
Kostya Kortchinsky0ce49992017-06-29 16:45:20 +0000611void *scudoMemalign(uptr Alignment, uptr Size) {
Alex Shlyapnikovdf18cbb2017-07-14 21:17:16 +0000612 if (UNLIKELY(!IsPowerOfTwo(Alignment))) {
Kostya Kortchinsky8d4ba5f2017-10-12 15:01:09 +0000613 errno = EINVAL;
Kostya Kortchinsky26e689f2017-09-14 20:34:32 +0000614 return Instance.handleBadRequest();
Alex Shlyapnikovdf18cbb2017-07-14 21:17:16 +0000615 }
Alex Shlyapnikov42bea012017-07-18 19:11:04 +0000616 return SetErrnoOnNull(Instance.allocate(Size, Alignment, FromMemalign));
Kostya Kortchinsky0ce49992017-06-29 16:45:20 +0000617}
618
Kostya Serebryany712fc982016-06-07 01:20:26 +0000619int scudoPosixMemalign(void **MemPtr, uptr Alignment, uptr Size) {
Alex Shlyapnikov42bea012017-07-18 19:11:04 +0000620 if (UNLIKELY(!CheckPosixMemalignAlignment(Alignment))) {
Kostya Kortchinsky26e689f2017-09-14 20:34:32 +0000621 Instance.handleBadRequest();
Kostya Kortchinsky8d4ba5f2017-10-12 15:01:09 +0000622 return EINVAL;
Kostya Kortchinsky0ce49992017-06-29 16:45:20 +0000623 }
Alex Shlyapnikovdf18cbb2017-07-14 21:17:16 +0000624 void *Ptr = Instance.allocate(Size, Alignment, FromMemalign);
Alex Shlyapnikov42bea012017-07-18 19:11:04 +0000625 if (UNLIKELY(!Ptr))
Kostya Kortchinsky8d4ba5f2017-10-12 15:01:09 +0000626 return ENOMEM;
Alex Shlyapnikovdf18cbb2017-07-14 21:17:16 +0000627 *MemPtr = Ptr;
Kostya Serebryany712fc982016-06-07 01:20:26 +0000628 return 0;
629}
630
631void *scudoAlignedAlloc(uptr Alignment, uptr Size) {
Alex Shlyapnikov42bea012017-07-18 19:11:04 +0000632 if (UNLIKELY(!CheckAlignedAllocAlignmentAndSize(Alignment, Size))) {
Kostya Kortchinsky8d4ba5f2017-10-12 15:01:09 +0000633 errno = EINVAL;
Kostya Kortchinsky26e689f2017-09-14 20:34:32 +0000634 return Instance.handleBadRequest();
Alex Shlyapnikovdf18cbb2017-07-14 21:17:16 +0000635 }
Alex Shlyapnikov42bea012017-07-18 19:11:04 +0000636 return SetErrnoOnNull(Instance.allocate(Size, Alignment, FromMalloc));
Kostya Serebryany712fc982016-06-07 01:20:26 +0000637}
638
639uptr scudoMallocUsableSize(void *Ptr) {
640 return Instance.getUsableSize(Ptr);
641}
642
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +0000643} // namespace __scudo
Kostya Serebryany712fc982016-06-07 01:20:26 +0000644
645using namespace __scudo;
646
647// MallocExtension helper functions
648
649uptr __sanitizer_get_current_allocated_bytes() {
Kostya Kortchinsky8d6257b2017-02-03 20:49:42 +0000650 return Instance.getStats(AllocatorStatAllocated);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000651}
652
653uptr __sanitizer_get_heap_size() {
Kostya Kortchinsky8d6257b2017-02-03 20:49:42 +0000654 return Instance.getStats(AllocatorStatMapped);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000655}
656
657uptr __sanitizer_get_free_bytes() {
658 return 1;
659}
660
661uptr __sanitizer_get_unmapped_bytes() {
662 return 1;
663}
664
665uptr __sanitizer_get_estimated_allocated_size(uptr size) {
666 return size;
667}
668
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +0000669int __sanitizer_get_ownership(const void *Ptr) {
670 return Instance.isValidPointer(Ptr);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000671}
672
Kostya Kortchinsky1148dc52016-11-30 17:32:20 +0000673uptr __sanitizer_get_allocated_size(const void *Ptr) {
674 return Instance.getUsableSize(Ptr);
Kostya Serebryany712fc982016-06-07 01:20:26 +0000675}