1 // Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "base/process/memory.h"
9 #include "base/file_util.h"
10 #include "base/files/file_path.h"
11 #include "base/logging.h"
12 #include "base/process/internal_linux.h"
13 #include "base/strings/string_number_conversions.h"
17 size_t g_oom_size
= 0U;
21 #if !defined(OS_ANDROID)
22 void OnNoMemorySize(size_t size
) {
26 LOG(FATAL
) << "Out of memory, size = " << size
;
27 LOG(FATAL
) << "Out of memory.";
33 #endif // !defined(OS_ANDROID)
37 #if !defined(ADDRESS_SANITIZER) && !defined(MEMORY_SANITIZER) && \
38 !defined(THREAD_SANITIZER) && !defined(LEAK_SANITIZER)
40 #if defined(LIBC_GLIBC) && !defined(USE_TCMALLOC)
43 void* __libc_malloc(size_t size
);
44 void* __libc_realloc(void* ptr
, size_t size
);
45 void* __libc_calloc(size_t nmemb
, size_t size
);
46 void* __libc_valloc(size_t size
);
47 #if PVALLOC_AVAILABLE == 1
48 void* __libc_pvalloc(size_t size
);
50 void* __libc_memalign(size_t alignment
, size_t size
);
52 // Overriding the system memory allocation functions:
54 // For security reasons, we want malloc failures to be fatal. Too much code
55 // doesn't check for a NULL return value from malloc and unconditionally uses
56 // the resulting pointer. If the first offset that they try to access is
57 // attacker controlled, then the attacker can direct the code to access any
60 // Thus, we define all the standard malloc functions here and mark them as
61 // visibility 'default'. This means that they replace the malloc functions for
62 // all Chromium code and also for all code in shared libraries. There are tests
63 // for this in process_util_unittest.cc.
65 // If we are using tcmalloc, then the problem is moot since tcmalloc handles
66 // this for us. Thus this code is in a !defined(USE_TCMALLOC) block.
68 // If we are testing the binary with AddressSanitizer, we should not
69 // redefine malloc and let AddressSanitizer do it instead.
71 // We call the real libc functions in this code by using __libc_malloc etc.
72 // Previously we tried using dlsym(RTLD_NEXT, ...) but that failed depending on
73 // the link order. Since ld.so needs calloc during symbol resolution, it
74 // defines its own versions of several of these functions in dl-minimal.c.
75 // Depending on the runtime library order, dlsym ended up giving us those
76 // functions and bad things happened. See crbug.com/31809
78 // This means that any code which calls __libc_* gets the raw libc versions of
81 #define DIE_ON_OOM_1(function_name) \
82 void* function_name(size_t) __attribute__ ((visibility("default"))); \
84 void* function_name(size_t size) { \
85 void* ret = __libc_##function_name(size); \
86 if (ret == NULL && size != 0) \
87 OnNoMemorySize(size); \
91 #define DIE_ON_OOM_2(function_name, arg1_type) \
92 void* function_name(arg1_type, size_t) \
93 __attribute__ ((visibility("default"))); \
95 void* function_name(arg1_type arg1, size_t size) { \
96 void* ret = __libc_##function_name(arg1, size); \
97 if (ret == NULL && size != 0) \
98 OnNoMemorySize(size); \
104 #if PVALLOC_AVAILABLE == 1
105 DIE_ON_OOM_1(pvalloc
)
108 DIE_ON_OOM_2(calloc
, size_t)
109 DIE_ON_OOM_2(realloc
, void*)
110 DIE_ON_OOM_2(memalign
, size_t)
112 // posix_memalign has a unique signature and doesn't have a __libc_ variant.
113 int posix_memalign(void** ptr
, size_t alignment
, size_t size
)
114 __attribute__ ((visibility("default")));
116 int posix_memalign(void** ptr
, size_t alignment
, size_t size
) {
117 // This will use the safe version of memalign, above.
118 *ptr
= memalign(alignment
, size
);
126 // TODO(mostynb@opera.com): dlsym dance
128 #endif // LIBC_GLIBC && !USE_TCMALLOC
130 #endif // !*_SANITIZER
132 void EnableTerminationOnHeapCorruption() {
133 // On Linux, there nothing to do AFAIK.
136 void EnableTerminationOnOutOfMemory() {
137 #if defined(OS_ANDROID)
138 // Android doesn't support setting a new handler.
139 DLOG(WARNING
) << "Not feasible.";
141 // Set the new-out of memory handler.
142 std::set_new_handler(&OnNoMemory
);
143 // If we're using glibc's allocator, the above functions will override
144 // malloc and friends and make them die on out of memory.
148 // NOTE: This is not the only version of this function in the source:
149 // the setuid sandbox (in process_util_linux.c, in the sandbox source)
150 // also has its own C version.
151 bool AdjustOOMScore(ProcessId process
, int score
) {
152 if (score
< 0 || score
> kMaxOomScore
)
155 FilePath
oom_path(internal::GetProcPidDir(process
));
157 // Attempt to write the newer oom_score_adj file first.
158 FilePath oom_file
= oom_path
.AppendASCII("oom_score_adj");
159 if (PathExists(oom_file
)) {
160 std::string score_str
= IntToString(score
);
161 DVLOG(1) << "Adjusting oom_score_adj of " << process
<< " to "
163 int score_len
= static_cast<int>(score_str
.length());
164 return (score_len
== file_util::WriteFile(oom_file
,
169 // If the oom_score_adj file doesn't exist, then we write the old
170 // style file and translate the oom_adj score to the range 0-15.
171 oom_file
= oom_path
.AppendASCII("oom_adj");
172 if (PathExists(oom_file
)) {
173 // Max score for the old oom_adj range. Used for conversion of new
174 // values to old values.
175 const int kMaxOldOomScore
= 15;
177 int converted_score
= score
* kMaxOldOomScore
/ kMaxOomScore
;
178 std::string score_str
= IntToString(converted_score
);
179 DVLOG(1) << "Adjusting oom_adj of " << process
<< " to " << score_str
;
180 int score_len
= static_cast<int>(score_str
.length());
181 return (score_len
== file_util::WriteFile(oom_file
,