1 /*
2  * Copyright (C) 2018 The Android Open Source Project
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  *  * Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  *  * Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in
12  *    the documentation and/or other materials provided with the
13  *    distribution.
14  *
15  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
16  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
17  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
18  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
19  * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
20  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
21  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
22  * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
23  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
24  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
25  * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26  * SUCH DAMAGE.
27  */
28 
29 #include <android/fdsan.h>
30 
31 #include <errno.h>
32 #include <inttypes.h>
33 #include <signal.h>
34 #include <stdarg.h>
35 #include <stdatomic.h>
36 #include <string.h>
37 #include <sys/cdefs.h>
38 #include <sys/mman.h>
39 #include <sys/syscall.h>
40 #include <unistd.h>
41 
42 #include <async_safe/log.h>
43 #include <platform/bionic/reserved_signals.h>
44 #include <sys/system_properties.h>
45 
46 #include "private/bionic_fdtrack.h"
47 #include "private/bionic_globals.h"
48 #include "private/bionic_inline_raise.h"
49 #include "pthread_internal.h"
50 
51 extern "C" int __close(int fd);
52 pid_t __get_cached_pid();
53 
54 static constexpr const char* kFdsanPropertyName = "debug.fdsan";
55 
56 template<size_t inline_fds>
at(size_t idx)57 FdEntry* FdTableImpl<inline_fds>::at(size_t idx) {
58   if (idx < inline_fds) {
59     return &entries[idx];
60   }
61 
62   // Try to create the overflow table ourselves.
63   FdTableOverflow* local_overflow = atomic_load(&overflow);
64   if (__predict_false(!local_overflow)) {
65     struct rlimit rlim = { .rlim_max = 32768 };
66     getrlimit(RLIMIT_NOFILE, &rlim);
67     rlim_t max = rlim.rlim_max;
68 
69     if (max == RLIM_INFINITY) {
70       // This isn't actually possible (the kernel has a hard limit), but just
71       // in case...
72       max = 32768;
73     }
74 
75     if (idx > max) {
76       // This can happen if an fd is created and then the rlimit is lowered.
77       // In this case, just return nullptr and ignore the fd.
78       return nullptr;
79     }
80 
81     size_t required_count = max - inline_fds;
82     size_t required_size = sizeof(FdTableOverflow) + required_count * sizeof(FdEntry);
83     size_t aligned_size = __BIONIC_ALIGN(required_size, PAGE_SIZE);
84     size_t aligned_count = (aligned_size - sizeof(FdTableOverflow)) / sizeof(FdEntry);
85 
86     void* allocation =
87         mmap(nullptr, aligned_size, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
88     if (allocation == MAP_FAILED) {
89       async_safe_fatal("fdsan: mmap failed: %s", strerror(errno));
90     }
91 
92     FdTableOverflow* new_overflow = reinterpret_cast<FdTableOverflow*>(allocation);
93     new_overflow->len = aligned_count;
94 
95     if (atomic_compare_exchange_strong(&overflow, &local_overflow, new_overflow)) {
96       local_overflow = new_overflow;
97     } else {
98       // Someone beat us to it. Deallocate and use theirs.
99       munmap(allocation, aligned_size);
100     }
101   }
102 
103   size_t offset = idx - inline_fds;
104   if (local_overflow->len < offset) {
105     return nullptr;
106   }
107   return &local_overflow->entries[offset];
108 }
109 
__libc_init_fdsan()110 void __libc_init_fdsan() {
111   constexpr auto default_level = ANDROID_FDSAN_ERROR_LEVEL_FATAL;
112   android_fdsan_set_error_level_from_property(default_level);
113 }
114 
GetFdTable()115 static FdTable& GetFdTable() {
116   return __libc_shared_globals()->fd_table;
117 }
118 
119 // Exposed to the platform to allow crash_dump to print out the fd table.
android_fdsan_get_fd_table()120 extern "C" void* android_fdsan_get_fd_table() {
121   return &GetFdTable();
122 }
123 
GetFdEntry(int fd)124 static FdEntry* GetFdEntry(int fd) {
125   if (fd < 0) {
126     return nullptr;
127   }
128 
129   return GetFdTable().at(fd);
130 }
131 
fdsan_error(const char * fmt,...)132 __printflike(1, 0) static void fdsan_error(const char* fmt, ...) {
133   auto& fd_table = GetFdTable();
134 
135   auto error_level = atomic_load(&fd_table.error_level);
136   if (error_level == ANDROID_FDSAN_ERROR_LEVEL_DISABLED) {
137     return;
138   }
139 
140   // Lots of code will (sensibly) fork, call close on all of their fds,
141   // and then exec. Compare our cached pid value against the real one to detect
142   // this scenario and permit it.
143   pid_t cached_pid = __get_cached_pid();
144   if (cached_pid == 0 || cached_pid != syscall(__NR_getpid)) {
145     return;
146   }
147 
148   struct {
149     size_t size;
150     char buf[512];
151   } abort_message;
152 
153   va_list va;
154   va_start(va, fmt);
155   if (error_level == ANDROID_FDSAN_ERROR_LEVEL_FATAL) {
156     async_safe_fatal_va_list("fdsan", fmt, va);
157   } else {
158     async_safe_format_log_va_list(ANDROID_LOG_ERROR, "fdsan", fmt, va);
159     va_end(va);
160     va_start(va, fmt);
161     size_t len =
162         async_safe_format_buffer_va_list(abort_message.buf, sizeof(abort_message.buf), fmt, va);
163     abort_message.size = len + sizeof(size_t);
164   }
165   va_end(va);
166 
167   switch (error_level) {
168     case ANDROID_FDSAN_ERROR_LEVEL_WARN_ONCE:
169       atomic_compare_exchange_strong(&fd_table.error_level, &error_level,
170                                      ANDROID_FDSAN_ERROR_LEVEL_DISABLED);
171       __BIONIC_FALLTHROUGH;
172     case ANDROID_FDSAN_ERROR_LEVEL_WARN_ALWAYS:
173       inline_raise(BIONIC_SIGNAL_DEBUGGER, &abort_message);
174       break;
175 
176     case ANDROID_FDSAN_ERROR_LEVEL_FATAL:
177       inline_raise(SIGABRT);
178       abort();
179 
180     case ANDROID_FDSAN_ERROR_LEVEL_DISABLED:
181       break;
182   }
183 }
184 
android_fdsan_create_owner_tag(android_fdsan_owner_type type,uint64_t tag)185 uint64_t android_fdsan_create_owner_tag(android_fdsan_owner_type type, uint64_t tag) {
186   if (tag == 0) {
187     return 0;
188   }
189 
190   if (__predict_false((type & 0xff) != type)) {
191     async_safe_fatal("invalid android_fdsan_owner_type value: %x", type);
192   }
193 
194   uint64_t result = static_cast<uint64_t>(type) << 56;
195   uint64_t mask = (static_cast<uint64_t>(1) << 56) - 1;
196   result |= tag & mask;
197   return result;
198 }
199 
android_fdsan_get_tag_type(uint64_t tag)200 const char* android_fdsan_get_tag_type(uint64_t tag) {
201   uint64_t type = tag >> 56;
202   switch (type) {
203     case ANDROID_FDSAN_OWNER_TYPE_FILE:
204       return "FILE*";
205     case ANDROID_FDSAN_OWNER_TYPE_DIR:
206       return "DIR*";
207     case ANDROID_FDSAN_OWNER_TYPE_UNIQUE_FD:
208       return "unique_fd";
209     case ANDROID_FDSAN_OWNER_TYPE_FILEINPUTSTREAM:
210       return "FileInputStream";
211     case ANDROID_FDSAN_OWNER_TYPE_FILEOUTPUTSTREAM:
212       return "FileOutputStream";
213     case ANDROID_FDSAN_OWNER_TYPE_RANDOMACCESSFILE:
214       return "RandomAccessFile";
215     case ANDROID_FDSAN_OWNER_TYPE_PARCELFILEDESCRIPTOR:
216       return "ParcelFileDescriptor";
217     case ANDROID_FDSAN_OWNER_TYPE_SQLITE:
218       return "sqlite";
219     case ANDROID_FDSAN_OWNER_TYPE_ART_FDFILE:
220       return "ART FdFile";
221     case ANDROID_FDSAN_OWNER_TYPE_DATAGRAMSOCKETIMPL:
222       return "DatagramSocketImpl";
223     case ANDROID_FDSAN_OWNER_TYPE_SOCKETIMPL:
224       return "SocketImpl";
225     case ANDROID_FDSAN_OWNER_TYPE_ZIPARCHIVE:
226       return "ZipArchive";
227 
228     case ANDROID_FDSAN_OWNER_TYPE_GENERIC_00:
229     default:
230       return "native object of unknown type";
231 
232     case ANDROID_FDSAN_OWNER_TYPE_GENERIC_FF:
233       // If bits 48 to 56 are set, this is a sign-extended generic native pointer
234       uint64_t high_bits = tag >> 48;
235       if (high_bits == (1 << 16) - 1) {
236         return "native object of unknown type";
237       }
238 
239       return "Java object of unknown type";
240   }
241 }
242 
android_fdsan_get_tag_value(uint64_t tag)243 uint64_t android_fdsan_get_tag_value(uint64_t tag) {
244   // Lop off the most significant byte and sign extend.
245   return static_cast<uint64_t>(static_cast<int64_t>(tag << 8) >> 8);
246 }
247 
android_fdsan_close_with_tag(int fd,uint64_t expected_tag)248 int android_fdsan_close_with_tag(int fd, uint64_t expected_tag) {
249   if (__get_thread()->is_vforked()) {
250     return __close(fd);
251   }
252 
253   FDTRACK_CLOSE(fd);
254   FdEntry* fde = GetFdEntry(fd);
255   if (!fde) {
256     return __close(fd);
257   }
258 
259   uint64_t tag = expected_tag;
260   if (!atomic_compare_exchange_strong(&fde->close_tag, &tag, 0)) {
261     const char* expected_type = android_fdsan_get_tag_type(expected_tag);
262     uint64_t expected_owner = android_fdsan_get_tag_value(expected_tag);
263     const char* actual_type = android_fdsan_get_tag_type(tag);
264     uint64_t actual_owner = android_fdsan_get_tag_value(tag);
265     if (expected_tag && tag) {
266       fdsan_error(
267           "attempted to close file descriptor %d, "
268           "expected to be owned by %s 0x%" PRIx64 ", actually owned by %s 0x%" PRIx64,
269           fd, expected_type, expected_owner, actual_type, actual_owner);
270     } else if (expected_tag && !tag) {
271       fdsan_error(
272           "attempted to close file descriptor %d, "
273           "expected to be owned by %s 0x%" PRIx64 ", actually unowned",
274           fd, expected_type, expected_owner);
275     } else if (!expected_tag && tag) {
276       fdsan_error(
277           "attempted to close file descriptor %d, "
278           "expected to be unowned, actually owned by %s 0x%" PRIx64,
279           fd, actual_type, actual_owner);
280     } else if (!expected_tag && !tag) {
281       // This should never happen: our CAS failed, but expected == actual?
282       async_safe_fatal("fdsan atomic_compare_exchange_strong failed unexpectedly while closing");
283     }
284   }
285 
286   int rc = __close(fd);
287   // If we were expecting to close with a tag, abort on EBADF.
288   if (expected_tag && rc == -1 && errno == EBADF) {
289     fdsan_error("double-close of file descriptor %d detected", fd);
290   }
291   return rc;
292 }
293 
android_fdsan_get_owner_tag(int fd)294 uint64_t android_fdsan_get_owner_tag(int fd) {
295   FdEntry* fde = GetFdEntry(fd);
296   if (!fde) {
297     return 0;
298   }
299   return fde->close_tag;
300 }
301 
android_fdsan_exchange_owner_tag(int fd,uint64_t expected_tag,uint64_t new_tag)302 void android_fdsan_exchange_owner_tag(int fd, uint64_t expected_tag, uint64_t new_tag) {
303   if (__get_thread()->is_vforked()) {
304     return;
305   }
306 
307   FdEntry* fde = GetFdEntry(fd);
308   if (!fde) {
309     return;
310   }
311 
312   uint64_t tag = expected_tag;
313   if (!atomic_compare_exchange_strong(&fde->close_tag, &tag, new_tag)) {
314     if (expected_tag && tag) {
315       fdsan_error(
316           "failed to exchange ownership of file descriptor: fd %d is "
317           "owned by %s 0x%" PRIx64 ", was expected to be owned by %s 0x%" PRIx64,
318           fd, android_fdsan_get_tag_type(tag), android_fdsan_get_tag_value(tag),
319           android_fdsan_get_tag_type(expected_tag), android_fdsan_get_tag_value(expected_tag));
320     } else if (expected_tag && !tag) {
321       fdsan_error(
322           "failed to exchange ownership of file descriptor: fd %d is "
323           "unowned, was expected to be owned by %s 0x%" PRIx64,
324           fd, android_fdsan_get_tag_type(expected_tag), android_fdsan_get_tag_value(expected_tag));
325     } else if (!expected_tag && tag) {
326       fdsan_error(
327           "failed to exchange ownership of file descriptor: fd %d is "
328           "owned by %s 0x%" PRIx64 ", was expected to be unowned",
329           fd, android_fdsan_get_tag_type(tag), android_fdsan_get_tag_value(tag));
330     } else if (!expected_tag && !tag) {
331       // This should never happen: our CAS failed, but expected == actual?
332       async_safe_fatal(
333           "fdsan atomic_compare_exchange_strong failed unexpectedly while exchanging owner tag");
334     }
335   }
336 }
337 
android_fdsan_get_error_level()338 android_fdsan_error_level android_fdsan_get_error_level() {
339   return GetFdTable().error_level;
340 }
341 
android_fdsan_set_error_level(android_fdsan_error_level new_level)342 android_fdsan_error_level android_fdsan_set_error_level(android_fdsan_error_level new_level) {
343   if (__get_thread()->is_vforked()) {
344     return android_fdsan_get_error_level();
345   }
346 
347   return atomic_exchange(&GetFdTable().error_level, new_level);
348 }
349 
android_fdsan_set_error_level_from_property(android_fdsan_error_level default_level)350 android_fdsan_error_level android_fdsan_set_error_level_from_property(
351     android_fdsan_error_level default_level) {
352   const prop_info* pi = __system_property_find(kFdsanPropertyName);
353   if (!pi) {
354     return android_fdsan_set_error_level(default_level);
355   }
356 
357   struct callback_data {
358     android_fdsan_error_level default_value;
359     android_fdsan_error_level result;
360   };
361 
362   callback_data data;
363   data.default_value = default_level;
364 
365   __system_property_read_callback(
366       pi,
367       [](void* arg, const char*, const char* value, uint32_t) {
368         callback_data* data = static_cast<callback_data*>(arg);
369 
370         if (strcasecmp(value, "1") == 0 || strcasecmp(value, "fatal") == 0) {
371           data->result = android_fdsan_set_error_level(ANDROID_FDSAN_ERROR_LEVEL_FATAL);
372         } else if (strcasecmp(value, "warn") == 0) {
373           data->result = android_fdsan_set_error_level(ANDROID_FDSAN_ERROR_LEVEL_WARN_ALWAYS);
374         } else if (strcasecmp(value, "warn_once") == 0) {
375           data->result = android_fdsan_set_error_level(ANDROID_FDSAN_ERROR_LEVEL_WARN_ONCE);
376         } else {
377           if (strlen(value) != 0 && strcasecmp(value, "0") != 0) {
378             async_safe_format_log(ANDROID_LOG_ERROR, "libc",
379                                   "debug.fdsan set to unknown value '%s', disabling", value);
380           }
381           data->result = android_fdsan_set_error_level(data->default_value);
382         }
383       },
384       &data);
385 
386   return data.result;
387 }
388 
close(int fd)389 int close(int fd) {
390   int rc = android_fdsan_close_with_tag(fd, 0);
391   if (rc == -1 && errno == EINTR) {
392     return 0;
393   }
394   return rc;
395 }
396