| Index: base/process_util_linux.cc
|
| diff --git a/base/process_util_linux.cc b/base/process_util_linux.cc
|
| index e080999af80ae81ae5a472b52f9f7d1096e762f3..e4a5a3437ba30d047605c70fd1a0d24c58cde482 100644
|
| --- a/base/process_util_linux.cc
|
| +++ b/base/process_util_linux.cc
|
| @@ -50,170 +50,4 @@ int GetNumberOfThreads(ProcessHandle process) {
|
| internal::VM_NUMTHREADS);
|
| }
|
|
|
| -namespace {
|
| -
|
| -void OnNoMemorySize(size_t size) {
|
| -#if defined(USE_LINUX_BREAKPAD)
|
| - g_oom_size = size;
|
| -#endif
|
| -
|
| - if (size != 0)
|
| - LOG(FATAL) << "Out of memory, size = " << size;
|
| - LOG(FATAL) << "Out of memory.";
|
| -}
|
| -
|
| -void OnNoMemory() {
|
| - OnNoMemorySize(0);
|
| -}
|
| -
|
| -} // namespace
|
| -
|
| -#if !defined(ADDRESS_SANITIZER) && !defined(MEMORY_SANITIZER) && \
|
| - !defined(THREAD_SANITIZER) && !defined(LEAK_SANITIZER)
|
| -
|
| -#if defined(LIBC_GLIBC) && !defined(USE_TCMALLOC)
|
| -
|
| -extern "C" {
|
| -void* __libc_malloc(size_t size);
|
| -void* __libc_realloc(void* ptr, size_t size);
|
| -void* __libc_calloc(size_t nmemb, size_t size);
|
| -void* __libc_valloc(size_t size);
|
| -void* __libc_pvalloc(size_t size);
|
| -void* __libc_memalign(size_t alignment, size_t size);
|
| -
|
| -// Overriding the system memory allocation functions:
|
| -//
|
| -// For security reasons, we want malloc failures to be fatal. Too much code
|
| -// doesn't check for a NULL return value from malloc and unconditionally uses
|
| -// the resulting pointer. If the first offset that they try to access is
|
| -// attacker controlled, then the attacker can direct the code to access any
|
| -// part of memory.
|
| -//
|
| -// Thus, we define all the standard malloc functions here and mark them as
|
| -// visibility 'default'. This means that they replace the malloc functions for
|
| -// all Chromium code and also for all code in shared libraries. There are tests
|
| -// for this in process_util_unittest.cc.
|
| -//
|
| -// If we are using tcmalloc, then the problem is moot since tcmalloc handles
|
| -// this for us. Thus this code is in a !defined(USE_TCMALLOC) block.
|
| -//
|
| -// If we are testing the binary with AddressSanitizer, we should not
|
| -// redefine malloc and let AddressSanitizer do it instead.
|
| -//
|
| -// We call the real libc functions in this code by using __libc_malloc etc.
|
| -// Previously we tried using dlsym(RTLD_NEXT, ...) but that failed depending on
|
| -// the link order. Since ld.so needs calloc during symbol resolution, it
|
| -// defines its own versions of several of these functions in dl-minimal.c.
|
| -// Depending on the runtime library order, dlsym ended up giving us those
|
| -// functions and bad things happened. See crbug.com/31809
|
| -//
|
| -// This means that any code which calls __libc_* gets the raw libc versions of
|
| -// these functions.
|
| -
|
| -#define DIE_ON_OOM_1(function_name) \
|
| - void* function_name(size_t) __attribute__ ((visibility("default"))); \
|
| - \
|
| - void* function_name(size_t size) { \
|
| - void* ret = __libc_##function_name(size); \
|
| - if (ret == NULL && size != 0) \
|
| - OnNoMemorySize(size); \
|
| - return ret; \
|
| - }
|
| -
|
| -#define DIE_ON_OOM_2(function_name, arg1_type) \
|
| - void* function_name(arg1_type, size_t) \
|
| - __attribute__ ((visibility("default"))); \
|
| - \
|
| - void* function_name(arg1_type arg1, size_t size) { \
|
| - void* ret = __libc_##function_name(arg1, size); \
|
| - if (ret == NULL && size != 0) \
|
| - OnNoMemorySize(size); \
|
| - return ret; \
|
| - }
|
| -
|
| -DIE_ON_OOM_1(malloc)
|
| -DIE_ON_OOM_1(valloc)
|
| -DIE_ON_OOM_1(pvalloc)
|
| -
|
| -DIE_ON_OOM_2(calloc, size_t)
|
| -DIE_ON_OOM_2(realloc, void*)
|
| -DIE_ON_OOM_2(memalign, size_t)
|
| -
|
| -// posix_memalign has a unique signature and doesn't have a __libc_ variant.
|
| -int posix_memalign(void** ptr, size_t alignment, size_t size)
|
| - __attribute__ ((visibility("default")));
|
| -
|
| -int posix_memalign(void** ptr, size_t alignment, size_t size) {
|
| - // This will use the safe version of memalign, above.
|
| - *ptr = memalign(alignment, size);
|
| - return 0;
|
| -}
|
| -
|
| -} // extern C
|
| -
|
| -#else
|
| -
|
| -// TODO(mostynb@opera.com): dlsym dance
|
| -
|
| -#endif // LIBC_GLIBC && !USE_TCMALLOC
|
| -
|
| -#endif // !*_SANITIZER
|
| -
|
| -void EnableTerminationOnHeapCorruption() {
|
| - // On Linux, there nothing to do AFAIK.
|
| -}
|
| -
|
| -void EnableTerminationOnOutOfMemory() {
|
| -#if defined(OS_ANDROID)
|
| - // Android doesn't support setting a new handler.
|
| - DLOG(WARNING) << "Not feasible.";
|
| -#else
|
| - // Set the new-out of memory handler.
|
| - std::set_new_handler(&OnNoMemory);
|
| - // If we're using glibc's allocator, the above functions will override
|
| - // malloc and friends and make them die on out of memory.
|
| -#endif
|
| -}
|
| -
|
| -// NOTE: This is not the only version of this function in the source:
|
| -// the setuid sandbox (in process_util_linux.c, in the sandbox source)
|
| -// also has its own C version.
|
| -bool AdjustOOMScore(ProcessId process, int score) {
|
| - if (score < 0 || score > kMaxOomScore)
|
| - return false;
|
| -
|
| - FilePath oom_path(internal::GetProcPidDir(process));
|
| -
|
| - // Attempt to write the newer oom_score_adj file first.
|
| - FilePath oom_file = oom_path.AppendASCII("oom_score_adj");
|
| - if (file_util::PathExists(oom_file)) {
|
| - std::string score_str = IntToString(score);
|
| - DVLOG(1) << "Adjusting oom_score_adj of " << process << " to "
|
| - << score_str;
|
| - int score_len = static_cast<int>(score_str.length());
|
| - return (score_len == file_util::WriteFile(oom_file,
|
| - score_str.c_str(),
|
| - score_len));
|
| - }
|
| -
|
| - // If the oom_score_adj file doesn't exist, then we write the old
|
| - // style file and translate the oom_adj score to the range 0-15.
|
| - oom_file = oom_path.AppendASCII("oom_adj");
|
| - if (file_util::PathExists(oom_file)) {
|
| - // Max score for the old oom_adj range. Used for conversion of new
|
| - // values to old values.
|
| - const int kMaxOldOomScore = 15;
|
| -
|
| - int converted_score = score * kMaxOldOomScore / kMaxOomScore;
|
| - std::string score_str = IntToString(converted_score);
|
| - DVLOG(1) << "Adjusting oom_adj of " << process << " to " << score_str;
|
| - int score_len = static_cast<int>(score_str.length());
|
| - return (score_len == file_util::WriteFile(oom_file,
|
| - score_str.c_str(),
|
| - score_len));
|
| - }
|
| -
|
| - return false;
|
| -}
|
| -
|
| } // namespace base
|
|
|