1 /*
2 * Copyright (C) 2012 The Android Open Source Project
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * * Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * * Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in
12 * the documentation and/or other materials provided with the
13 * distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
16 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
17 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
18 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
19 * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
20 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
21 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
22 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
23 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
24 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
25 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * SUCH DAMAGE.
27 */
28
29 #include <errno.h>
30 #include <inttypes.h>
31 #include <malloc.h>
32 #include <pthread.h>
33 #include <signal.h>
34 #include <stdio.h>
35 #include <stdlib.h>
36 #include <string.h>
37 #include <sys/cdefs.h>
38 #include <sys/param.h>
39 #include <sys/syscall.h>
40 #include <unistd.h>
41
42 #include <mutex>
43 #include <vector>
44
45 #include <android-base/file.h>
46 #include <android-base/properties.h>
47 #include <android-base/stringprintf.h>
48 #include <bionic/malloc_tagged_pointers.h>
49 #include <platform/bionic/reserved_signals.h>
50 #include <private/MallocXmlElem.h>
51 #include <private/bionic_malloc_dispatch.h>
52
53 #include "Config.h"
54 #include "DebugData.h"
55 #include "backtrace.h"
56 #include "debug_disable.h"
57 #include "debug_log.h"
58 #include "malloc_debug.h"
59 #include "UnwindBacktrace.h"
60
61 // ------------------------------------------------------------------------
62 // Global Data
63 // ------------------------------------------------------------------------
64 DebugData* g_debug;
65
66 bool* g_zygote_child;
67
68 const MallocDispatch* g_dispatch;
69 // ------------------------------------------------------------------------
70
71 // ------------------------------------------------------------------------
72 // Use C style prototypes for all exported functions. This makes it easy
73 // to do dlsym lookups during libc initialization when malloc debug
74 // is enabled.
75 // ------------------------------------------------------------------------
76 __BEGIN_DECLS
77
78 bool debug_initialize(const MallocDispatch* malloc_dispatch, bool* malloc_zygote_child,
79 const char* options);
80 void debug_finalize();
81 void debug_dump_heap(const char* file_name);
82 void debug_get_malloc_leak_info(uint8_t** info, size_t* overall_size, size_t* info_size,
83 size_t* total_memory, size_t* backtrace_size);
84 bool debug_write_malloc_leak_info(FILE* fp);
85 ssize_t debug_malloc_backtrace(void* pointer, uintptr_t* frames, size_t frame_count);
86 void debug_free_malloc_leak_info(uint8_t* info);
87 size_t debug_malloc_usable_size(void* pointer);
88 void* debug_malloc(size_t size);
89 void debug_free(void* pointer);
90 void* debug_aligned_alloc(size_t alignment, size_t size);
91 void* debug_memalign(size_t alignment, size_t bytes);
92 void* debug_realloc(void* pointer, size_t bytes);
93 void* debug_calloc(size_t nmemb, size_t bytes);
94 struct mallinfo debug_mallinfo();
95 int debug_mallopt(int param, int value);
96 int debug_malloc_info(int options, FILE* fp);
97 int debug_posix_memalign(void** memptr, size_t alignment, size_t size);
98 int debug_malloc_iterate(uintptr_t base, size_t size,
99 void (*callback)(uintptr_t base, size_t size, void* arg), void* arg);
100 void debug_malloc_disable();
101 void debug_malloc_enable();
102
103 #if defined(HAVE_DEPRECATED_MALLOC_FUNCS)
104 void* debug_pvalloc(size_t bytes);
105 void* debug_valloc(size_t size);
106 #endif
107
108 __END_DECLS
109 // ------------------------------------------------------------------------
110
111 class ScopedConcurrentLock {
112 public:
ScopedConcurrentLock()113 ScopedConcurrentLock() {
114 pthread_rwlock_rdlock(&lock_);
115 }
~ScopedConcurrentLock()116 ~ScopedConcurrentLock() {
117 pthread_rwlock_unlock(&lock_);
118 }
119
Init()120 static void Init() {
121 pthread_rwlockattr_t attr;
122 // Set the attribute so that when a write lock is pending, read locks are no
123 // longer granted.
124 pthread_rwlockattr_setkind_np(&attr, PTHREAD_RWLOCK_PREFER_WRITER_NONRECURSIVE_NP);
125 pthread_rwlock_init(&lock_, &attr);
126 }
127
BlockAllOperations()128 static void BlockAllOperations() {
129 pthread_rwlock_wrlock(&lock_);
130 }
131
132 private:
133 static pthread_rwlock_t lock_;
134 };
135 pthread_rwlock_t ScopedConcurrentLock::lock_;
136
137 // Use this because the sigprocmask* functions filter out the reserved bionic
138 // signals including the signal this code blocks.
__rt_sigprocmask(int how,const sigset64_t * new_set,sigset64_t * old_set,size_t sigset_size)139 static inline int __rt_sigprocmask(int how, const sigset64_t* new_set, sigset64_t* old_set,
140 size_t sigset_size) {
141 return syscall(SYS_rt_sigprocmask, how, new_set, old_set, sigset_size);
142 }
143
144 // Need to block the backtrace signal while in malloc debug routines
145 // otherwise there is a chance of a deadlock and timeout when unwinding.
146 // This can occur if a thread is paused while owning a malloc debug
147 // internal lock.
148 class ScopedBacktraceSignalBlocker {
149 public:
ScopedBacktraceSignalBlocker()150 ScopedBacktraceSignalBlocker() {
151 sigemptyset64(&backtrace_set_);
152 sigaddset64(&backtrace_set_, BIONIC_SIGNAL_BACKTRACE);
153 sigset64_t old_set;
154 __rt_sigprocmask(SIG_BLOCK, &backtrace_set_, &old_set, sizeof(backtrace_set_));
155 if (sigismember64(&old_set, BIONIC_SIGNAL_BACKTRACE)) {
156 unblock_ = false;
157 }
158 }
159
~ScopedBacktraceSignalBlocker()160 ~ScopedBacktraceSignalBlocker() {
161 if (unblock_) {
162 __rt_sigprocmask(SIG_UNBLOCK, &backtrace_set_, nullptr, sizeof(backtrace_set_));
163 }
164 }
165
166 private:
167 bool unblock_ = true;
168 sigset64_t backtrace_set_;
169 };
170
InitAtfork()171 static void InitAtfork() {
172 static pthread_once_t atfork_init = PTHREAD_ONCE_INIT;
173 pthread_once(&atfork_init, []() {
174 pthread_atfork(
175 []() {
176 if (g_debug != nullptr) {
177 g_debug->PrepareFork();
178 }
179 },
180 []() {
181 if (g_debug != nullptr) {
182 g_debug->PostForkParent();
183 }
184 },
185 []() {
186 if (g_debug != nullptr) {
187 g_debug->PostForkChild();
188 }
189 });
190 });
191 }
192
BacktraceAndLog()193 void BacktraceAndLog() {
194 if (g_debug->config().options() & BACKTRACE_FULL) {
195 std::vector<uintptr_t> frames;
196 std::vector<unwindstack::LocalFrameData> frames_info;
197 if (!Unwind(&frames, &frames_info, 256)) {
198 error_log(" Backtrace failed to get any frames.");
199 } else {
200 UnwindLog(frames_info);
201 }
202 } else {
203 std::vector<uintptr_t> frames(256);
204 size_t num_frames = backtrace_get(frames.data(), frames.size());
205 if (num_frames == 0) {
206 error_log(" Backtrace failed to get any frames.");
207 } else {
208 backtrace_log(frames.data(), num_frames);
209 }
210 }
211 }
212
LogError(const void * pointer,const char * error_str)213 static void LogError(const void* pointer, const char* error_str) {
214 error_log(LOG_DIVIDER);
215 error_log("+++ ALLOCATION %p %s", pointer, error_str);
216
217 // If we are tracking already freed pointers, check to see if this is
218 // one so we can print extra information.
219 if (g_debug->config().options() & FREE_TRACK) {
220 PointerData::LogFreeBacktrace(pointer);
221 }
222
223 error_log("Backtrace at time of failure:");
224 BacktraceAndLog();
225 error_log(LOG_DIVIDER);
226 if (g_debug->config().options() & ABORT_ON_ERROR) {
227 abort();
228 }
229 }
230
VerifyPointer(const void * pointer,const char * function_name)231 static bool VerifyPointer(const void* pointer, const char* function_name) {
232 if (g_debug->HeaderEnabled()) {
233 Header* header = g_debug->GetHeader(pointer);
234 if (header->tag != DEBUG_TAG) {
235 std::string error_str;
236 if (header->tag == DEBUG_FREE_TAG) {
237 error_str = std::string("USED AFTER FREE (") + function_name + ")";
238 } else {
239 error_str = android::base::StringPrintf("HAS INVALID TAG %" PRIx32 " (%s)", header->tag,
240 function_name);
241 }
242 LogError(pointer, error_str.c_str());
243 return false;
244 }
245 }
246
247 if (g_debug->TrackPointers()) {
248 if (!PointerData::Exists(pointer)) {
249 std::string error_str(std::string("UNKNOWN POINTER (") + function_name + ")");
250 LogError(pointer, error_str.c_str());
251 return false;
252 }
253 }
254 return true;
255 }
256
InternalMallocUsableSize(void * pointer)257 static size_t InternalMallocUsableSize(void* pointer) {
258 if (g_debug->HeaderEnabled()) {
259 return g_debug->GetHeader(pointer)->usable_size;
260 } else {
261 return g_dispatch->malloc_usable_size(pointer);
262 }
263 }
264
InitHeader(Header * header,void * orig_pointer,size_t size)265 static void* InitHeader(Header* header, void* orig_pointer, size_t size) {
266 header->tag = DEBUG_TAG;
267 header->orig_pointer = orig_pointer;
268 header->size = size;
269 header->usable_size = g_dispatch->malloc_usable_size(orig_pointer);
270 if (header->usable_size == 0) {
271 g_dispatch->free(orig_pointer);
272 return nullptr;
273 }
274 header->usable_size -= g_debug->pointer_offset() + reinterpret_cast<uintptr_t>(header) -
275 reinterpret_cast<uintptr_t>(orig_pointer);
276
277 if (g_debug->config().options() & FRONT_GUARD) {
278 uint8_t* guard = g_debug->GetFrontGuard(header);
279 memset(guard, g_debug->config().front_guard_value(), g_debug->config().front_guard_bytes());
280 }
281
282 if (g_debug->config().options() & REAR_GUARD) {
283 uint8_t* guard = g_debug->GetRearGuard(header);
284 memset(guard, g_debug->config().rear_guard_value(), g_debug->config().rear_guard_bytes());
285 // If the rear guard is enabled, set the usable size to the exact size
286 // of the allocation.
287 header->usable_size = header->size;
288 }
289
290 return g_debug->GetPointer(header);
291 }
292
293 extern "C" void __asan_init() __attribute__((weak));
294
debug_initialize(const MallocDispatch * malloc_dispatch,bool * zygote_child,const char * options)295 bool debug_initialize(const MallocDispatch* malloc_dispatch, bool* zygote_child,
296 const char* options) {
297 if (zygote_child == nullptr || options == nullptr) {
298 return false;
299 }
300
301 if (__asan_init != 0) {
302 error_log("malloc debug cannot be enabled alongside ASAN");
303 return false;
304 }
305
306 InitAtfork();
307
308 g_zygote_child = zygote_child;
309
310 g_dispatch = malloc_dispatch;
311
312 if (!DebugDisableInitialize()) {
313 return false;
314 }
315
316 DebugData* debug = new DebugData();
317 if (!debug->Initialize(options)) {
318 delete debug;
319 DebugDisableFinalize();
320 return false;
321 }
322 g_debug = debug;
323
324 // Always enable the backtrace code since we will use it in a number
325 // of different error cases.
326 backtrace_startup();
327
328 if (g_debug->config().options() & VERBOSE) {
329 info_log("%s: malloc debug enabled", getprogname());
330 }
331
332 ScopedConcurrentLock::Init();
333
334 return true;
335 }
336
debug_finalize()337 void debug_finalize() {
338 if (g_debug == nullptr) {
339 return;
340 }
341
342 // Make sure that there are no other threads doing debug allocations
343 // before we kill everything.
344 ScopedConcurrentLock::BlockAllOperations();
345
346 // Turn off capturing allocations calls.
347 DebugDisableSet(true);
348
349 if (g_debug->config().options() & FREE_TRACK) {
350 PointerData::VerifyAllFreed();
351 }
352
353 if (g_debug->config().options() & LEAK_TRACK) {
354 PointerData::LogLeaks();
355 }
356
357 if ((g_debug->config().options() & BACKTRACE) && g_debug->config().backtrace_dump_on_exit()) {
358 debug_dump_heap(android::base::StringPrintf("%s.%d.exit.txt",
359 g_debug->config().backtrace_dump_prefix().c_str(),
360 getpid()).c_str());
361 }
362
363 backtrace_shutdown();
364
365 // In order to prevent any issues of threads freeing previous pointers
366 // after the main thread calls this code, simply leak the g_debug pointer
367 // and do not destroy the debug disable pthread key.
368 }
369
debug_get_malloc_leak_info(uint8_t ** info,size_t * overall_size,size_t * info_size,size_t * total_memory,size_t * backtrace_size)370 void debug_get_malloc_leak_info(uint8_t** info, size_t* overall_size, size_t* info_size,
371 size_t* total_memory, size_t* backtrace_size) {
372 ScopedConcurrentLock lock;
373 ScopedDisableDebugCalls disable;
374 ScopedBacktraceSignalBlocker blocked;
375
376 // Verify the arguments.
377 if (info == nullptr || overall_size == nullptr || info_size == nullptr || total_memory == nullptr ||
378 backtrace_size == nullptr) {
379 error_log("get_malloc_leak_info: At least one invalid parameter.");
380 return;
381 }
382
383 *info = nullptr;
384 *overall_size = 0;
385 *info_size = 0;
386 *total_memory = 0;
387 *backtrace_size = 0;
388
389 if (!(g_debug->config().options() & BACKTRACE)) {
390 error_log(
391 "get_malloc_leak_info: Allocations not being tracked, to enable "
392 "set the option 'backtrace'.");
393 return;
394 }
395
396 PointerData::GetInfo(info, overall_size, info_size, total_memory, backtrace_size);
397 }
398
debug_free_malloc_leak_info(uint8_t * info)399 void debug_free_malloc_leak_info(uint8_t* info) {
400 g_dispatch->free(info);
401 }
402
debug_malloc_usable_size(void * pointer)403 size_t debug_malloc_usable_size(void* pointer) {
404 if (DebugCallsDisabled() || pointer == nullptr) {
405 return g_dispatch->malloc_usable_size(pointer);
406 }
407 ScopedConcurrentLock lock;
408 ScopedDisableDebugCalls disable;
409 ScopedBacktraceSignalBlocker blocked;
410
411 if (!VerifyPointer(pointer, "malloc_usable_size")) {
412 return 0;
413 }
414
415 return InternalMallocUsableSize(pointer);
416 }
417
InternalMalloc(size_t size)418 static void* InternalMalloc(size_t size) {
419 if ((g_debug->config().options() & BACKTRACE) && g_debug->pointer->ShouldDumpAndReset()) {
420 debug_dump_heap(android::base::StringPrintf(
421 "%s.%d.txt", g_debug->config().backtrace_dump_prefix().c_str(), getpid())
422 .c_str());
423 }
424
425 if (size == 0) {
426 size = 1;
427 }
428
429 size_t real_size = size + g_debug->extra_bytes();
430 if (real_size < size) {
431 // Overflow.
432 errno = ENOMEM;
433 return nullptr;
434 }
435
436 if (size > PointerInfoType::MaxSize()) {
437 errno = ENOMEM;
438 return nullptr;
439 }
440
441 void* pointer;
442 if (g_debug->HeaderEnabled()) {
443 Header* header =
444 reinterpret_cast<Header*>(g_dispatch->memalign(MINIMUM_ALIGNMENT_BYTES, real_size));
445 if (header == nullptr) {
446 return nullptr;
447 }
448 pointer = InitHeader(header, header, size);
449 } else {
450 pointer = g_dispatch->malloc(real_size);
451 }
452
453 if (pointer != nullptr) {
454 if (g_debug->TrackPointers()) {
455 PointerData::Add(pointer, size);
456 }
457
458 if (g_debug->config().options() & FILL_ON_ALLOC) {
459 size_t bytes = InternalMallocUsableSize(pointer);
460 size_t fill_bytes = g_debug->config().fill_on_alloc_bytes();
461 bytes = (bytes < fill_bytes) ? bytes : fill_bytes;
462 memset(pointer, g_debug->config().fill_alloc_value(), bytes);
463 }
464 }
465 return pointer;
466 }
467
debug_malloc(size_t size)468 void* debug_malloc(size_t size) {
469 if (DebugCallsDisabled()) {
470 return g_dispatch->malloc(size);
471 }
472 ScopedConcurrentLock lock;
473 ScopedDisableDebugCalls disable;
474 ScopedBacktraceSignalBlocker blocked;
475
476 void* pointer = InternalMalloc(size);
477
478 if (g_debug->config().options() & RECORD_ALLOCS) {
479 g_debug->record->AddEntry(new MallocEntry(pointer, size));
480 }
481
482 return pointer;
483 }
484
InternalFree(void * pointer)485 static void InternalFree(void* pointer) {
486 if ((g_debug->config().options() & BACKTRACE) && g_debug->pointer->ShouldDumpAndReset()) {
487 debug_dump_heap(android::base::StringPrintf(
488 "%s.%d.txt", g_debug->config().backtrace_dump_prefix().c_str(), getpid())
489 .c_str());
490 }
491
492 void* free_pointer = pointer;
493 size_t bytes;
494 Header* header;
495 if (g_debug->HeaderEnabled()) {
496 header = g_debug->GetHeader(pointer);
497 free_pointer = header->orig_pointer;
498
499 if (g_debug->config().options() & FRONT_GUARD) {
500 if (!g_debug->front_guard->Valid(header)) {
501 g_debug->front_guard->LogFailure(header);
502 }
503 }
504 if (g_debug->config().options() & REAR_GUARD) {
505 if (!g_debug->rear_guard->Valid(header)) {
506 g_debug->rear_guard->LogFailure(header);
507 }
508 }
509
510 header->tag = DEBUG_FREE_TAG;
511
512 bytes = header->usable_size;
513 } else {
514 bytes = g_dispatch->malloc_usable_size(pointer);
515 }
516
517 if (g_debug->config().options() & FILL_ON_FREE) {
518 size_t fill_bytes = g_debug->config().fill_on_free_bytes();
519 bytes = (bytes < fill_bytes) ? bytes : fill_bytes;
520 memset(pointer, g_debug->config().fill_free_value(), bytes);
521 }
522
523 if (g_debug->TrackPointers()) {
524 PointerData::Remove(pointer);
525 }
526
527 if (g_debug->config().options() & FREE_TRACK) {
528 // Do not add the allocation until we are done modifying the pointer
529 // itself. This avoids a race if a lot of threads are all doing
530 // frees at the same time and we wind up trying to really free this
531 // pointer from another thread, while still trying to free it in
532 // this function.
533 pointer = PointerData::AddFreed(pointer);
534 if (pointer != nullptr) {
535 if (g_debug->HeaderEnabled()) {
536 pointer = g_debug->GetHeader(pointer)->orig_pointer;
537 }
538 g_dispatch->free(pointer);
539 }
540 } else {
541 g_dispatch->free(free_pointer);
542 }
543 }
544
debug_free(void * pointer)545 void debug_free(void* pointer) {
546 if (DebugCallsDisabled() || pointer == nullptr) {
547 return g_dispatch->free(pointer);
548 }
549 ScopedConcurrentLock lock;
550 ScopedDisableDebugCalls disable;
551 ScopedBacktraceSignalBlocker blocked;
552
553 if (g_debug->config().options() & RECORD_ALLOCS) {
554 g_debug->record->AddEntry(new FreeEntry(pointer));
555 }
556
557 if (!VerifyPointer(pointer, "free")) {
558 return;
559 }
560
561 InternalFree(pointer);
562 }
563
debug_memalign(size_t alignment,size_t bytes)564 void* debug_memalign(size_t alignment, size_t bytes) {
565 if (DebugCallsDisabled()) {
566 return g_dispatch->memalign(alignment, bytes);
567 }
568 ScopedConcurrentLock lock;
569 ScopedDisableDebugCalls disable;
570 ScopedBacktraceSignalBlocker blocked;
571
572 if (bytes == 0) {
573 bytes = 1;
574 }
575
576 if (bytes > PointerInfoType::MaxSize()) {
577 errno = ENOMEM;
578 return nullptr;
579 }
580
581 void* pointer;
582 if (g_debug->HeaderEnabled()) {
583 // Make the alignment a power of two.
584 if (!powerof2(alignment)) {
585 alignment = BIONIC_ROUND_UP_POWER_OF_2(alignment);
586 }
587 // Force the alignment to at least MINIMUM_ALIGNMENT_BYTES to guarantee
588 // that the header is aligned properly.
589 if (alignment < MINIMUM_ALIGNMENT_BYTES) {
590 alignment = MINIMUM_ALIGNMENT_BYTES;
591 }
592
593 // We don't have any idea what the natural alignment of
594 // the underlying native allocator is, so we always need to
595 // over allocate.
596 size_t real_size = alignment + bytes + g_debug->extra_bytes();
597 if (real_size < bytes) {
598 // Overflow.
599 errno = ENOMEM;
600 return nullptr;
601 }
602
603 pointer = g_dispatch->malloc(real_size);
604 if (pointer == nullptr) {
605 return nullptr;
606 }
607
608 uintptr_t value = reinterpret_cast<uintptr_t>(pointer) + g_debug->pointer_offset();
609 // Now align the pointer.
610 value += (-value % alignment);
611
612 Header* header = g_debug->GetHeader(reinterpret_cast<void*>(value));
613 pointer = InitHeader(header, pointer, bytes);
614 } else {
615 size_t real_size = bytes + g_debug->extra_bytes();
616 if (real_size < bytes) {
617 // Overflow.
618 errno = ENOMEM;
619 return nullptr;
620 }
621 pointer = g_dispatch->memalign(alignment, real_size);
622 }
623
624 if (pointer != nullptr) {
625 if (g_debug->TrackPointers()) {
626 PointerData::Add(pointer, bytes);
627 }
628
629 if (g_debug->config().options() & FILL_ON_ALLOC) {
630 size_t bytes = InternalMallocUsableSize(pointer);
631 size_t fill_bytes = g_debug->config().fill_on_alloc_bytes();
632 bytes = (bytes < fill_bytes) ? bytes : fill_bytes;
633 memset(pointer, g_debug->config().fill_alloc_value(), bytes);
634 }
635
636 if (g_debug->config().options() & RECORD_ALLOCS) {
637 g_debug->record->AddEntry(new MemalignEntry(pointer, bytes, alignment));
638 }
639 }
640
641 return pointer;
642 }
643
debug_realloc(void * pointer,size_t bytes)644 void* debug_realloc(void* pointer, size_t bytes) {
645 if (DebugCallsDisabled()) {
646 return g_dispatch->realloc(pointer, bytes);
647 }
648 ScopedConcurrentLock lock;
649 ScopedDisableDebugCalls disable;
650 ScopedBacktraceSignalBlocker blocked;
651
652 if (pointer == nullptr) {
653 pointer = InternalMalloc(bytes);
654 if (g_debug->config().options() & RECORD_ALLOCS) {
655 g_debug->record->AddEntry(new ReallocEntry(pointer, bytes, nullptr));
656 }
657 return pointer;
658 }
659
660 if (!VerifyPointer(pointer, "realloc")) {
661 return nullptr;
662 }
663
664 if (bytes == 0) {
665 if (g_debug->config().options() & RECORD_ALLOCS) {
666 g_debug->record->AddEntry(new ReallocEntry(nullptr, bytes, pointer));
667 }
668
669 InternalFree(pointer);
670 return nullptr;
671 }
672
673 size_t real_size = bytes;
674 if (g_debug->config().options() & EXPAND_ALLOC) {
675 real_size += g_debug->config().expand_alloc_bytes();
676 if (real_size < bytes) {
677 // Overflow.
678 errno = ENOMEM;
679 return nullptr;
680 }
681 }
682
683 if (bytes > PointerInfoType::MaxSize()) {
684 errno = ENOMEM;
685 return nullptr;
686 }
687
688 void* new_pointer;
689 size_t prev_size;
690 if (g_debug->HeaderEnabled()) {
691 // Same size, do nothing.
692 Header* header = g_debug->GetHeader(pointer);
693 if (real_size == header->size) {
694 if (g_debug->TrackPointers()) {
695 // Remove and re-add so that the backtrace is updated.
696 PointerData::Remove(pointer);
697 PointerData::Add(pointer, real_size);
698 }
699 return pointer;
700 }
701
702 // Allocation is shrinking.
703 if (real_size < header->usable_size) {
704 header->size = real_size;
705 if (g_debug->config().options() & REAR_GUARD) {
706 // Don't bother allocating a smaller pointer in this case, simply
707 // change the header usable_size and reset the rear guard.
708 header->usable_size = header->size;
709 memset(g_debug->GetRearGuard(header), g_debug->config().rear_guard_value(),
710 g_debug->config().rear_guard_bytes());
711 }
712 if (g_debug->TrackPointers()) {
713 // Remove and re-add so that the backtrace is updated.
714 PointerData::Remove(pointer);
715 PointerData::Add(pointer, real_size);
716 }
717 return pointer;
718 }
719
720 // Allocate the new size.
721 new_pointer = InternalMalloc(bytes);
722 if (new_pointer == nullptr) {
723 errno = ENOMEM;
724 return nullptr;
725 }
726
727 prev_size = header->usable_size;
728 memcpy(new_pointer, pointer, prev_size);
729 InternalFree(pointer);
730 } else {
731 if (g_debug->TrackPointers()) {
732 PointerData::Remove(pointer);
733 }
734
735 prev_size = g_dispatch->malloc_usable_size(pointer);
736 new_pointer = g_dispatch->realloc(pointer, real_size);
737 if (new_pointer == nullptr) {
738 return nullptr;
739 }
740
741 if (g_debug->TrackPointers()) {
742 PointerData::Add(new_pointer, real_size);
743 }
744 }
745
746 if (g_debug->config().options() & FILL_ON_ALLOC) {
747 size_t bytes = InternalMallocUsableSize(new_pointer);
748 if (bytes > g_debug->config().fill_on_alloc_bytes()) {
749 bytes = g_debug->config().fill_on_alloc_bytes();
750 }
751 if (bytes > prev_size) {
752 memset(reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(new_pointer) + prev_size),
753 g_debug->config().fill_alloc_value(), bytes - prev_size);
754 }
755 }
756
757 if (g_debug->config().options() & RECORD_ALLOCS) {
758 g_debug->record->AddEntry(new ReallocEntry(new_pointer, bytes, pointer));
759 }
760
761 return new_pointer;
762 }
763
debug_calloc(size_t nmemb,size_t bytes)764 void* debug_calloc(size_t nmemb, size_t bytes) {
765 if (DebugCallsDisabled()) {
766 return g_dispatch->calloc(nmemb, bytes);
767 }
768 ScopedConcurrentLock lock;
769 ScopedDisableDebugCalls disable;
770 ScopedBacktraceSignalBlocker blocked;
771
772 size_t size;
773 if (__builtin_mul_overflow(nmemb, bytes, &size)) {
774 // Overflow
775 errno = ENOMEM;
776 return nullptr;
777 }
778
779 if (size == 0) {
780 size = 1;
781 }
782
783 size_t real_size;
784 if (__builtin_add_overflow(size, g_debug->extra_bytes(), &real_size)) {
785 // Overflow.
786 errno = ENOMEM;
787 return nullptr;
788 }
789
790 if (real_size > PointerInfoType::MaxSize()) {
791 errno = ENOMEM;
792 return nullptr;
793 }
794
795 void* pointer;
796 if (g_debug->HeaderEnabled()) {
797 // Need to guarantee the alignment of the header.
798 Header* header =
799 reinterpret_cast<Header*>(g_dispatch->memalign(MINIMUM_ALIGNMENT_BYTES, real_size));
800 if (header == nullptr) {
801 return nullptr;
802 }
803 memset(header, 0, g_dispatch->malloc_usable_size(header));
804 pointer = InitHeader(header, header, size);
805 } else {
806 pointer = g_dispatch->calloc(1, real_size);
807 }
808
809 if (g_debug->config().options() & RECORD_ALLOCS) {
810 g_debug->record->AddEntry(new CallocEntry(pointer, bytes, nmemb));
811 }
812
813 if (pointer != nullptr && g_debug->TrackPointers()) {
814 PointerData::Add(pointer, size);
815 }
816 return pointer;
817 }
818
debug_mallinfo()819 struct mallinfo debug_mallinfo() {
820 return g_dispatch->mallinfo();
821 }
822
debug_mallopt(int param,int value)823 int debug_mallopt(int param, int value) {
824 return g_dispatch->mallopt(param, value);
825 }
826
debug_malloc_info(int options,FILE * fp)827 int debug_malloc_info(int options, FILE* fp) {
828 if (DebugCallsDisabled() || !g_debug->TrackPointers()) {
829 return g_dispatch->malloc_info(options, fp);
830 }
831
832 // Make sure any pending output is written to the file.
833 fflush(fp);
834
835 ScopedConcurrentLock lock;
836 ScopedDisableDebugCalls disable;
837 ScopedBacktraceSignalBlocker blocked;
838
839 // Avoid any issues where allocations are made that will be freed
840 // in the fclose.
841 int fd = fileno(fp);
842 MallocXmlElem root(fd, "malloc", "version=\"debug-malloc-1\"");
843 std::vector<ListInfoType> list;
844 PointerData::GetAllocList(&list);
845
846 size_t alloc_num = 0;
847 for (size_t i = 0; i < list.size(); i++) {
848 MallocXmlElem alloc(fd, "allocation", "nr=\"%zu\"", alloc_num);
849
850 size_t total = 1;
851 size_t size = list[i].size;
852 while (i < list.size() - 1 && list[i + 1].size == size) {
853 i++;
854 total++;
855 }
856 MallocXmlElem(fd, "size").Contents("%zu", list[i].size);
857 MallocXmlElem(fd, "total").Contents("%zu", total);
858 alloc_num++;
859 }
860 return 0;
861 }
862
debug_aligned_alloc(size_t alignment,size_t size)863 void* debug_aligned_alloc(size_t alignment, size_t size) {
864 if (DebugCallsDisabled()) {
865 return g_dispatch->aligned_alloc(alignment, size);
866 }
867 if (!powerof2(alignment) || (size % alignment) != 0) {
868 errno = EINVAL;
869 return nullptr;
870 }
871 return debug_memalign(alignment, size);
872 }
873
debug_posix_memalign(void ** memptr,size_t alignment,size_t size)874 int debug_posix_memalign(void** memptr, size_t alignment, size_t size) {
875 if (DebugCallsDisabled()) {
876 return g_dispatch->posix_memalign(memptr, alignment, size);
877 }
878
879 if (alignment < sizeof(void*) || !powerof2(alignment)) {
880 return EINVAL;
881 }
882 int saved_errno = errno;
883 *memptr = debug_memalign(alignment, size);
884 errno = saved_errno;
885 return (*memptr != nullptr) ? 0 : ENOMEM;
886 }
887
debug_malloc_iterate(uintptr_t base,size_t size,void (* callback)(uintptr_t,size_t,void *),void * arg)888 int debug_malloc_iterate(uintptr_t base, size_t size, void (*callback)(uintptr_t, size_t, void*),
889 void* arg) {
890 ScopedConcurrentLock lock;
891 if (g_debug->TrackPointers()) {
892 // Since malloc is disabled, don't bother acquiring any locks.
893 for (auto it = PointerData::begin(); it != PointerData::end(); ++it) {
894 callback(it->first, InternalMallocUsableSize(reinterpret_cast<void*>(it->first)), arg);
895 }
896 return 0;
897 }
898
899 // An option that adds a header will add pointer tracking, so no need to
900 // check if headers are enabled.
901 return g_dispatch->malloc_iterate(base, size, callback, arg);
902 }
903
debug_malloc_disable()904 void debug_malloc_disable() {
905 ScopedConcurrentLock lock;
906 g_dispatch->malloc_disable();
907 if (g_debug->pointer) {
908 g_debug->pointer->PrepareFork();
909 }
910 }
911
debug_malloc_enable()912 void debug_malloc_enable() {
913 ScopedConcurrentLock lock;
914 if (g_debug->pointer) {
915 g_debug->pointer->PostForkParent();
916 }
917 g_dispatch->malloc_enable();
918 }
919
debug_malloc_backtrace(void * pointer,uintptr_t * frames,size_t max_frames)920 ssize_t debug_malloc_backtrace(void* pointer, uintptr_t* frames, size_t max_frames) {
921 if (DebugCallsDisabled() || pointer == nullptr) {
922 return 0;
923 }
924 ScopedConcurrentLock lock;
925 ScopedDisableDebugCalls disable;
926 ScopedBacktraceSignalBlocker blocked;
927
928 if (!(g_debug->config().options() & BACKTRACE)) {
929 return 0;
930 }
931 pointer = UntagPointer(pointer);
932 return PointerData::GetFrames(pointer, frames, max_frames);
933 }
934
935 #if defined(HAVE_DEPRECATED_MALLOC_FUNCS)
debug_pvalloc(size_t bytes)936 void* debug_pvalloc(size_t bytes) {
937 if (DebugCallsDisabled()) {
938 return g_dispatch->pvalloc(bytes);
939 }
940
941 size_t pagesize = getpagesize();
942 size_t size = __BIONIC_ALIGN(bytes, pagesize);
943 if (size < bytes) {
944 // Overflow
945 errno = ENOMEM;
946 return nullptr;
947 }
948 return debug_memalign(pagesize, size);
949 }
950
debug_valloc(size_t size)951 void* debug_valloc(size_t size) {
952 if (DebugCallsDisabled()) {
953 return g_dispatch->valloc(size);
954 }
955 return debug_memalign(getpagesize(), size);
956 }
957 #endif
958
959 static std::mutex g_dump_lock;
960
write_dump(int fd)961 static void write_dump(int fd) {
962 dprintf(fd, "Android Native Heap Dump v1.2\n\n");
963
964 std::string fingerprint = android::base::GetProperty("ro.build.fingerprint", "unknown");
965 dprintf(fd, "Build fingerprint: '%s'\n\n", fingerprint.c_str());
966
967 PointerData::DumpLiveToFile(fd);
968
969 dprintf(fd, "MAPS\n");
970 std::string content;
971 if (!android::base::ReadFileToString("/proc/self/maps", &content)) {
972 dprintf(fd, "Could not open /proc/self/maps\n");
973 } else {
974 dprintf(fd, "%s", content.c_str());
975 }
976 dprintf(fd, "END\n");
977 }
978
debug_write_malloc_leak_info(FILE * fp)979 bool debug_write_malloc_leak_info(FILE* fp) {
980 // Make sure any pending output is written to the file.
981 fflush(fp);
982
983 ScopedConcurrentLock lock;
984 ScopedDisableDebugCalls disable;
985 ScopedBacktraceSignalBlocker blocked;
986
987 std::lock_guard<std::mutex> guard(g_dump_lock);
988
989 if (!(g_debug->config().options() & BACKTRACE)) {
990 return false;
991 }
992
993 write_dump(fileno(fp));
994
995 return true;
996 }
997
debug_dump_heap(const char * file_name)998 void debug_dump_heap(const char* file_name) {
999 ScopedConcurrentLock lock;
1000 ScopedDisableDebugCalls disable;
1001 ScopedBacktraceSignalBlocker blocked;
1002
1003 std::lock_guard<std::mutex> guard(g_dump_lock);
1004
1005 int fd = open(file_name, O_RDWR | O_CREAT | O_NOFOLLOW | O_TRUNC | O_CLOEXEC, 0644);
1006 if (fd == -1) {
1007 error_log("Unable to create file: %s", file_name);
1008 return;
1009 }
1010
1011 error_log("Dumping to file: %s\n", file_name);
1012 write_dump(fd);
1013 close(fd);
1014 }
1015