Loading...
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 | /* * Copyright (c) 1999-2016 Apple Inc. All rights reserved. * * @APPLE_LICENSE_HEADER_START@ * * This file contains Original Code and/or Modifications of Original Code * as defined in and that are subject to the Apple Public Source License * Version 2.0 (the 'License'). You may not use this file except in * compliance with the License. Please obtain a copy of the License at * http://www.opensource.apple.com/apsl/ and read it before using this * file. * * The Original Code and all software distributed under the License are * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. * Please see the License for the specific language governing rights and * limitations under the License. * * @APPLE_LICENSE_HEADER_END@ */ #ifndef _MALLOC_PRIVATE_H_ #define _MALLOC_PRIVATE_H_ /* Here be dragons (SPIs) */ #include <mach/boolean.h> #include <mach/kern_return.h> #include <mach/mach_types.h> #include <sys/cdefs.h> #include <stdbool.h> #include <stddef.h> #include <stdint.h> #include <Availability.h> #include <os/availability.h> #include <malloc/malloc.h> __BEGIN_DECLS /* Memorypressure notification mask to use by default */ extern const unsigned long malloc_memorypressure_mask_default_4libdispatch; /* Memorypressure notification mask to use if MSL has been enabled */ extern const unsigned long malloc_memorypressure_mask_msl_4libdispatch; /********* Callbacks ************/ API_AVAILABLE(macos(10.12), ios(10.0), tvos(10.0), watchos(3.0)) void malloc_enter_process_memory_limit_warn_mode(void); /* A callback invoked once the process receives a warning for approaching * memory limit. */ __OSX_AVAILABLE(10.12) __IOS_AVAILABLE(10.0) __TVOS_AVAILABLE(10.0) __WATCHOS_AVAILABLE(3.0) void malloc_memory_event_handler(unsigned long); /* A function invoked when malloc needs to handle any flavor of * memory pressure notification or process memory limit notification. */ API_AVAILABLE(macos(10.12), ios(10.0), tvos(10.0), watchos(3.0)) void * reallocarray(void * in_ptr, size_t nmemb, size_t size) __DARWIN_EXTSN(reallocarray) __result_use_check; API_AVAILABLE(macos(10.12), ios(10.0), tvos(10.0), watchos(3.0)) void * reallocarrayf(void * in_ptr, size_t nmemb, size_t size) __DARWIN_EXTSN(reallocarrayf) __result_use_check; /* * Checks whether an address might belong to any registered zone. False positives * are allowed (e.g. the memory was freed, or it's in a part of the address * space used by malloc that has not yet been allocated.) False negatives are * not allowed. */ API_AVAILABLE(macos(10.14), ios(12.0), tvos(12.0), watchos(5.0)) boolean_t malloc_claimed_address(void *ptr) __result_use_check; /* * Checks whether an address might belong to a given zone. False positives are * allowed (e.g. the memory was freed, or it's in a part of the address space * used by malloc that has not yet been allocated.) False negatives are not * allowed. */ API_AVAILABLE(macos(10.14), ios(12.0), tvos(12.0), watchos(5.0)) boolean_t malloc_zone_claimed_address(malloc_zone_t *zone, void *ptr) __result_use_check; /** * Returns whether the nano allocator is engaged. The return value is 0 if Nano * is not engaged and the allocator version otherwise. */ API_AVAILABLE(macos(10.14), ios(12.0), tvos(12.0), watchos(5.0)) int malloc_engaged_nano(void) __result_use_check; /* * Disables zero-on-free in a process. This has security implications and is * intended to be used only as part of binary compatibility workarounds for * external code. It should be called as early as possible in the process * lifetime, ideally before the process has gone multithreaded. It is not * guaranteed to have any effect. */ SPI_AVAILABLE(macos(13.0), ios(16.1), tvos(16.1), watchos(9.1)) void malloc_zero_on_free_disable(void); /****** Thread-specific libmalloc options ******/ /** * Options struct: zero means "default options". */ typedef struct { uintptr_t DisableExpensiveDebuggingOptions : 1; uintptr_t DisableProbabilisticGuardMalloc : 1; uintptr_t DisableMallocStackLogging : 1; } malloc_thread_options_t; API_AVAILABLE(macos(13.0), ios(16.0), tvos(16.0), watchos(9.0)) malloc_thread_options_t malloc_get_thread_options(void) __result_use_check; API_AVAILABLE(macos(13.0), ios(16.0), tvos(16.0), watchos(9.0)) void malloc_set_thread_options(malloc_thread_options_t opts); /****** Crash Reporter integration ******/ typedef struct { uint64_t thread_id; uint64_t time; uint32_t num_frames; vm_address_t frames[64]; } stack_trace_t; /** * Like memory_reader_t, but caller must free returned memory if not NULL. */ typedef void *(*crash_reporter_memory_reader_t)(task_t task, vm_address_t address, size_t size); /****** Probabilistic Guard Malloc ******/ typedef struct { // diagnose_page_fault const char *error_type; const char *confidence; vm_address_t fault_address; // fill_in_report vm_address_t nearest_allocation; size_t allocation_size; const char *allocation_state; uint32_t num_traces; // fill_in_trace stack_trace_t alloc_trace; stack_trace_t dealloc_trace; } pgm_report_t; kern_return_t pgm_extract_report_from_corpse(vm_address_t fault_address, pgm_report_t *report, task_t task, vm_address_t *zone_addresses, uint32_t zone_count, crash_reporter_memory_reader_t crm_reader) __result_use_check; kern_return_t pgm_diagnose_fault_from_crash_reporter(vm_address_t fault_address, pgm_report_t *report, task_t task, vm_address_t zone_address, crash_reporter_memory_reader_t crm_reader) __result_use_check; /****** Sanitizer Zone ******/ struct malloc_sanitizer_poison { // ASAN_HEAP_LEFTRZ: [ptr, ptr + leftrz_sz) // ASAN_VALID: [ptr + leftrz_sz, ptr + alloc_sz) // ASAN_HEAP_RIGHTRZ: [ptr + leftrz_sz + alloc_sz, ptr + leftrz_sz + alloc_sz + rightrz_sz) void (*heap_allocate_poison)(uintptr_t ptr, size_t leftrz_sz, size_t alloc_sz, size_t rightrz_sz); // ASAN_HEAP_FREED: [ptr, ptr + sz) void (*heap_deallocate_poison)(uintptr_t ptr, size_t sz); // ASAN_HEAP_INTERNAL: [ptr, ptr + sz) void (*heap_internal_poison)(uintptr_t ptr, size_t sz); }; /* Returns whether sanitizers are enabled */ bool malloc_sanitizer_is_enabled(void); /* Returns function pointers for interacting with sanitizer */ extern const struct malloc_sanitizer_poison *malloc_sanitizer_get_functions(void); /* Sets function pointers for interacting with sanitizer */ void malloc_sanitizer_set_functions(struct malloc_sanitizer_poison *); typedef struct { vm_address_t fault_address; vm_address_t nearest_allocation; size_t allocation_size; stack_trace_t alloc_trace; stack_trace_t dealloc_trace; } sanitizer_report_t; kern_return_t sanitizer_diagnose_fault_from_crash_reporter(vm_address_t fault_address, sanitizer_report_t *report, task_t task, vm_address_t zone_address, crash_reporter_memory_reader_t crm_reader) __result_use_check; __END_DECLS #endif /* _MALLOC_PRIVATE_H_ */ |