Loading...
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 | /* * Copyright (c) 1999-2016 Apple Inc. All rights reserved. * * @APPLE_LICENSE_HEADER_START@ * * This file contains Original Code and/or Modifications of Original Code * as defined in and that are subject to the Apple Public Source License * Version 2.0 (the 'License'). You may not use this file except in * compliance with the License. Please obtain a copy of the License at * http://www.opensource.apple.com/apsl/ and read it before using this * file. * * The Original Code and all software distributed under the License are * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. * Please see the License for the specific language governing rights and * limitations under the License. * * @APPLE_LICENSE_HEADER_END@ */ #ifndef _MALLOC_PRIVATE_H_ #define _MALLOC_PRIVATE_H_ /* Here be dragons (SPIs) */ #include <TargetConditionals.h> #include <malloc/_platform.h> #include <Availability.h> #include <os/availability.h> #include <os/base.h> #include <malloc/malloc.h> #include <malloc/_ptrcheck.h> __ptrcheck_abi_assume_single() __BEGIN_DECLS #if !TARGET_OS_EXCLAVECORE && !TARGET_OS_EXCLAVEKIT /* Memorypressure notification mask to use by default */ extern const unsigned long malloc_memorypressure_mask_default_4libdispatch; /* Memorypressure notification mask to use if MSL has been enabled */ extern const unsigned long malloc_memorypressure_mask_msl_4libdispatch; #endif // !TARGET_OS_EXCLAVECORE && !TARGET_OS_EXCLAVEKIT /********* Callbacks ************/ #if !TARGET_OS_EXCLAVECORE && !TARGET_OS_EXCLAVEKIT API_AVAILABLE(macos(10.12), ios(10.0), tvos(10.0), watchos(3.0)) void malloc_enter_process_memory_limit_warn_mode(void); /* A callback invoked once the process receives a warning for approaching * memory limit. */ __OSX_AVAILABLE(10.12) __IOS_AVAILABLE(10.0) __TVOS_AVAILABLE(10.0) __WATCHOS_AVAILABLE(3.0) void malloc_memory_event_handler(unsigned long); /* A function invoked when malloc needs to handle any flavor of * memory pressure notification or process memory limit notification. */ #endif // !TARGET_OS_EXCLAVECORE && !TARGET_OS_EXCLAVEKIT API_AVAILABLE(macos(10.12), ios(10.0), tvos(10.0), watchos(3.0)) void * reallocarray(void * in_ptr, size_t nmemb, size_t size) __DARWIN_EXTSN(reallocarray) __result_use_check; API_AVAILABLE(macos(10.12), ios(10.0), tvos(10.0), watchos(3.0)) void * reallocarrayf(void * in_ptr, size_t nmemb, size_t size) __DARWIN_EXTSN(reallocarrayf) __result_use_check; /* * Checks whether an address might belong to any registered zone. False positives * are allowed (e.g. the memory was freed, or it's in a part of the address * space used by malloc that has not yet been allocated.) False negatives are * not allowed. */ API_AVAILABLE(macos(10.14), ios(12.0), tvos(12.0), watchos(5.0)) boolean_t malloc_claimed_address(void *ptr) __result_use_check; /* * Checks whether an address might belong to a given zone. False positives are * allowed (e.g. the memory was freed, or it's in a part of the address space * used by malloc that has not yet been allocated.) False negatives are not * allowed. */ API_AVAILABLE(macos(10.14), ios(12.0), tvos(12.0), watchos(5.0)) boolean_t malloc_zone_claimed_address(malloc_zone_t *zone, void *ptr) __result_use_check; /** * Returns whether the nano allocator (or a roughly equivalent configuration of * another system allocator implementation) is engaged. The return value is 0 if * Nano is not engaged and the allocator version otherwise. */ #if !TARGET_OS_EXCLAVECORE && !TARGET_OS_EXCLAVEKIT API_AVAILABLE(macos(10.14), ios(12.0), tvos(12.0), watchos(5.0)) int malloc_engaged_nano(void) __result_use_check; #endif // !TARGET_OS_EXCLAVECORE && !TARGET_OS_EXCLAVEKIT /** * Returns whether the secure allocator is engaged. The return value is 0 if it * is not engaged and the allocator version otherwise. */ #if !TARGET_OS_EXCLAVECORE && !TARGET_OS_EXCLAVEKIT SPI_AVAILABLE(macos(14.3), ios(17.4), tvos(17.4), watchos(10.4), driverkit(23.4), xros(1.1)) int malloc_engaged_secure_allocator(void) __result_use_check; #endif /* * Disables zero-on-free in a process. This has security implications and is * intended to be used only as part of binary compatibility workarounds for * external code. It should be called as early as possible in the process * lifetime, ideally before the process has gone multithreaded. It is not * guaranteed to have any effect. */ SPI_AVAILABLE(macos(13.0), ios(16.1), tvos(16.1), watchos(9.1)) void malloc_zero_on_free_disable(void); /* * Certain zone types (e.g., PGM, sanitizer) wrap other zones to add extra * behavior and delegate most of the actual work to the wrapped zone. Retrieves * the address of the wrapped zone or NULL for zone types that don't wrap * another zone. */ #if !TARGET_OS_EXCLAVECORE && !TARGET_OS_EXCLAVEKIT SPI_AVAILABLE(macos(14.3), ios(17.4), tvos(17.4), watchos(10.4)) kern_return_t malloc_get_wrapped_zone(task_t task, memory_reader_t reader, vm_address_t zone_address, vm_address_t *wrapped_zone_address) __result_use_check; #endif // !TARGET_OS_EXCLAVECORE && !TARGET_OS_EXCLAVEKIT /****** Thread-specific libmalloc options ******/ /** * Options struct: zero means "default options". */ typedef struct { uintptr_t DisableExpensiveDebuggingOptions : 1; uintptr_t DisableProbabilisticGuardMalloc : 1; uintptr_t DisableMallocStackLogging : 1; } malloc_thread_options_t; #if !TARGET_OS_EXCLAVECORE && !TARGET_OS_EXCLAVEKIT API_AVAILABLE(macos(13.0), ios(16.0), tvos(16.0), watchos(9.0)) malloc_thread_options_t malloc_get_thread_options(void) __result_use_check; API_AVAILABLE(macos(13.0), ios(16.0), tvos(16.0), watchos(9.0)) void malloc_set_thread_options(malloc_thread_options_t opts); #endif // !TARGET_OS_EXCLAVECORE && !TARGET_OS_EXCLAVEKIT /****** Crash Reporter integration ******/ typedef struct { uint64_t thread_id; uint64_t time; uint32_t num_frames; vm_address_t frames[64]; } stack_trace_t; /** * Like memory_reader_t, but caller must free returned memory if not NULL. */ typedef void * __sized_by(size) (*crash_reporter_memory_reader_t)(task_t task, vm_address_t address, size_t size); /****** Probabilistic Guard Malloc ******/ typedef struct { // diagnose_page_fault const char *error_type; const char *confidence; vm_address_t fault_address; // fill_in_report vm_address_t nearest_allocation; size_t allocation_size; const char *allocation_state; uint32_t num_traces; // fill_in_trace stack_trace_t alloc_trace; stack_trace_t dealloc_trace; } pgm_report_t; #if !TARGET_OS_EXCLAVECORE && !TARGET_OS_EXCLAVEKIT kern_return_t pgm_extract_report_from_corpse(vm_address_t fault_address, pgm_report_t *report, task_t task, vm_address_t *zone_addresses, uint32_t zone_count, crash_reporter_memory_reader_t crm_reader) __result_use_check; #endif // !TARGET_OS_EXCLAVECORE && !TARGET_OS_EXCLAVEKIT /****** Sanitizer Zone ******/ struct malloc_sanitizer_poison { // ASAN_HEAP_LEFTRZ: [ptr, ptr + leftrz_sz) // ASAN_VALID: [ptr + leftrz_sz, ptr + alloc_sz) // ASAN_HEAP_RIGHTRZ: [ptr + leftrz_sz + alloc_sz, ptr + leftrz_sz + alloc_sz + rightrz_sz) void (*heap_allocate_poison)(uintptr_t ptr, size_t leftrz_sz, size_t alloc_sz, size_t rightrz_sz); // ASAN_HEAP_FREED: [ptr, ptr + sz) void (*heap_deallocate_poison)(uintptr_t ptr, size_t sz); // ASAN_HEAP_INTERNAL: [ptr, ptr + sz) void (*heap_internal_poison)(uintptr_t ptr, size_t sz); }; /* Returns whether sanitizers are enabled */ bool malloc_sanitizer_is_enabled(void); /* Returns function pointers for interacting with sanitizer */ extern const struct malloc_sanitizer_poison *malloc_sanitizer_get_functions(void); /* Sets function pointers for interacting with sanitizer */ void malloc_sanitizer_set_functions(struct malloc_sanitizer_poison *); typedef struct { vm_address_t fault_address; vm_address_t nearest_allocation; size_t allocation_size; stack_trace_t alloc_trace; stack_trace_t dealloc_trace; } sanitizer_report_t; #if !TARGET_OS_EXCLAVECORE && !TARGET_OS_EXCLAVEKIT kern_return_t sanitizer_diagnose_fault_from_crash_reporter(vm_address_t fault_address, sanitizer_report_t *report, task_t task, vm_address_t zone_address, crash_reporter_memory_reader_t crm_reader) __result_use_check; #endif // !TARGET_OS_EXCLAVECORE && !TARGET_OS_EXCLAVEKIT /****** Malloc with flags ******/ OS_OPTIONS(malloc_options_np, uint64_t, MALLOC_NP_OPTION_CLEAR = 0x1, ); #if defined(__LP64__) // MALLOC_TARGET_64BIT /*! * @function malloc_type_zone_malloc_with_options_np * * @discussion * This function shouldn't be called directly, the declaration is an * implementation detail for malloc_zone_malloc_with_options_np */ SPI_AVAILABLE(macos(14.3), ios(17.4), tvos(17.4), watchos(10.4), driverkit(23.4), xros(1.1)) void *malloc_type_zone_malloc_with_options_np(malloc_zone_t *zone, size_t align, size_t size, malloc_options_np_t options, malloc_type_id_t desc) __result_use_check #if defined(__has_attribute) && __has_attribute(diagnose_if) __attribute__((__diagnose_if__(align & (align-1), "alignment should be 0 or a power of 2", "error"))) __attribute__((__diagnose_if__(align && (size % align), "size should be an integral multiple of align", "error"))) #endif __alloc_size(3) __alloc_align(2); #endif // MALLOC_TARGET_64BIT /*! * @function malloc_zone_malloc_with_options_np * * @param zone * The malloc zone that should be used to used to serve the allocation. This * parameter may be NULL, in which case the default zone will be used. * * @param align * The minimum alignment of the requested allocation. This parameter must be a * power of 2 and an integral multiple of size, or, if no particular alignment * is required, this parameter can be set to 0. * * @param size * The size, in bytes, of the requested allocation. * * @param options * A bitmask of options defining how the memory should be allocated. See the * available bit values in the malloc_options_np_t enum definition. * * @result * A pointer to the newly allocated block of memory, or NULL if the allocation * failed. * * @discussion * This SPI does not set errno on all codepaths when the allocation fails. */ SPI_AVAILABLE(macos(14.3), ios(17.4), tvos(17.4), watchos(10.4), driverkit(23.4), xros(1.1)) void *malloc_zone_malloc_with_options_np(malloc_zone_t *zone, size_t align, size_t size, malloc_options_np_t options) __result_use_check __alloc_size(3) __alloc_align(2) #if defined(__has_attribute) && __has_attribute(diagnose_if) __attribute__((__diagnose_if__(align & (align-1), "alignment should be 0 or a power of 2", "error"))) __attribute__((__diagnose_if__(align && (size % align), "size should be an integral multiple of align", "error"))) #endif _MALLOC_TYPED(malloc_type_zone_malloc_with_options_np, 4); #if !TARGET_OS_EXCLAVECORE && !TARGET_OS_EXCLAVEKIT // Indicates whether the libmalloc debug dylib is in use in the current process SPI_AVAILABLE(macos(14.3), ios(17.4), tvos(17.4), watchos(10.4), driverkit(23.4), xros(1.1)) bool malloc_variant_is_debug_4test(void); #endif /* !TARGET_OS_EXCLAVECORE && !TARGET_OS_EXCLAVEKIT */ __END_DECLS #endif /* _MALLOC_PRIVATE_H_ */ |