1 /*
2  * Copyright (C) 2012 The Android Open Source Project
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  *  * Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  *  * Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in
12  *    the documentation and/or other materials provided with the
13  *    distribution.
14  *
15  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
16  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
17  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
18  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
19  * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
20  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
21  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
22  * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
23  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
24  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
25  * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26  * SUCH DAMAGE.
27  */
28 
29 #include <errno.h>
30 #include <inttypes.h>
31 #include <malloc.h>
32 #include <pthread.h>
33 #include <signal.h>
34 #include <stdio.h>
35 #include <stdlib.h>
36 #include <string.h>
37 #include <sys/cdefs.h>
38 #include <sys/param.h>
39 #include <sys/syscall.h>
40 #include <unistd.h>
41 
42 #include <mutex>
43 #include <vector>
44 
45 #include <android-base/file.h>
46 #include <android-base/properties.h>
47 #include <android-base/stringprintf.h>
48 #include <bionic/malloc_tagged_pointers.h>
49 #include <platform/bionic/reserved_signals.h>
50 #include <private/MallocXmlElem.h>
51 #include <private/bionic_malloc_dispatch.h>
52 
53 #include "Config.h"
54 #include "DebugData.h"
55 #include "backtrace.h"
56 #include "debug_disable.h"
57 #include "debug_log.h"
58 #include "malloc_debug.h"
59 #include "UnwindBacktrace.h"
60 
61 // ------------------------------------------------------------------------
62 // Global Data
63 // ------------------------------------------------------------------------
64 DebugData* g_debug;
65 
66 bool* g_zygote_child;
67 
68 const MallocDispatch* g_dispatch;
69 // ------------------------------------------------------------------------
70 
71 // ------------------------------------------------------------------------
72 // Use C style prototypes for all exported functions. This makes it easy
73 // to do dlsym lookups during libc initialization when malloc debug
74 // is enabled.
75 // ------------------------------------------------------------------------
76 __BEGIN_DECLS
77 
78 bool debug_initialize(const MallocDispatch* malloc_dispatch, bool* malloc_zygote_child,
79                       const char* options);
80 void debug_finalize();
81 void debug_dump_heap(const char* file_name);
82 void debug_get_malloc_leak_info(uint8_t** info, size_t* overall_size, size_t* info_size,
83                                 size_t* total_memory, size_t* backtrace_size);
84 bool debug_write_malloc_leak_info(FILE* fp);
85 ssize_t debug_malloc_backtrace(void* pointer, uintptr_t* frames, size_t frame_count);
86 void debug_free_malloc_leak_info(uint8_t* info);
87 size_t debug_malloc_usable_size(void* pointer);
88 void* debug_malloc(size_t size);
89 void debug_free(void* pointer);
90 void* debug_aligned_alloc(size_t alignment, size_t size);
91 void* debug_memalign(size_t alignment, size_t bytes);
92 void* debug_realloc(void* pointer, size_t bytes);
93 void* debug_calloc(size_t nmemb, size_t bytes);
94 struct mallinfo debug_mallinfo();
95 int debug_mallopt(int param, int value);
96 int debug_malloc_info(int options, FILE* fp);
97 int debug_posix_memalign(void** memptr, size_t alignment, size_t size);
98 int debug_malloc_iterate(uintptr_t base, size_t size,
99                          void (*callback)(uintptr_t base, size_t size, void* arg), void* arg);
100 void debug_malloc_disable();
101 void debug_malloc_enable();
102 
103 #if defined(HAVE_DEPRECATED_MALLOC_FUNCS)
104 void* debug_pvalloc(size_t bytes);
105 void* debug_valloc(size_t size);
106 #endif
107 
108 __END_DECLS
109 // ------------------------------------------------------------------------
110 
111 class ScopedConcurrentLock {
112  public:
ScopedConcurrentLock()113   ScopedConcurrentLock() {
114     pthread_rwlock_rdlock(&lock_);
115   }
~ScopedConcurrentLock()116   ~ScopedConcurrentLock() {
117     pthread_rwlock_unlock(&lock_);
118   }
119 
Init()120   static void Init() {
121     pthread_rwlockattr_t attr;
122     // Set the attribute so that when a write lock is pending, read locks are no
123     // longer granted.
124     pthread_rwlockattr_setkind_np(&attr, PTHREAD_RWLOCK_PREFER_WRITER_NONRECURSIVE_NP);
125     pthread_rwlock_init(&lock_, &attr);
126   }
127 
BlockAllOperations()128   static void BlockAllOperations() {
129     pthread_rwlock_wrlock(&lock_);
130   }
131 
132  private:
133   static pthread_rwlock_t lock_;
134 };
135 pthread_rwlock_t ScopedConcurrentLock::lock_;
136 
137 // Use this because the sigprocmask* functions filter out the reserved bionic
138 // signals including the signal this code blocks.
__rt_sigprocmask(int how,const sigset64_t * new_set,sigset64_t * old_set,size_t sigset_size)139 static inline int __rt_sigprocmask(int how, const sigset64_t* new_set, sigset64_t* old_set,
140                                    size_t sigset_size) {
141   return syscall(SYS_rt_sigprocmask, how, new_set, old_set, sigset_size);
142 }
143 
144 // Need to block the backtrace signal while in malloc debug routines
145 // otherwise there is a chance of a deadlock and timeout when unwinding.
146 // This can occur if a thread is paused while owning a malloc debug
147 // internal lock.
148 class ScopedBacktraceSignalBlocker {
149  public:
ScopedBacktraceSignalBlocker()150   ScopedBacktraceSignalBlocker() {
151     sigemptyset64(&backtrace_set_);
152     sigaddset64(&backtrace_set_, BIONIC_SIGNAL_BACKTRACE);
153     sigset64_t old_set;
154     __rt_sigprocmask(SIG_BLOCK, &backtrace_set_, &old_set, sizeof(backtrace_set_));
155     if (sigismember64(&old_set, BIONIC_SIGNAL_BACKTRACE)) {
156       unblock_ = false;
157     }
158   }
159 
~ScopedBacktraceSignalBlocker()160   ~ScopedBacktraceSignalBlocker() {
161     if (unblock_) {
162       __rt_sigprocmask(SIG_UNBLOCK, &backtrace_set_, nullptr, sizeof(backtrace_set_));
163     }
164   }
165 
166  private:
167   bool unblock_ = true;
168   sigset64_t backtrace_set_;
169 };
170 
InitAtfork()171 static void InitAtfork() {
172   static pthread_once_t atfork_init = PTHREAD_ONCE_INIT;
173   pthread_once(&atfork_init, []() {
174     pthread_atfork(
175         []() {
176           if (g_debug != nullptr) {
177             g_debug->PrepareFork();
178           }
179         },
180         []() {
181           if (g_debug != nullptr) {
182             g_debug->PostForkParent();
183           }
184         },
185         []() {
186           if (g_debug != nullptr) {
187             g_debug->PostForkChild();
188           }
189         });
190   });
191 }
192 
BacktraceAndLog()193 void BacktraceAndLog() {
194   if (g_debug->config().options() & BACKTRACE_FULL) {
195     std::vector<uintptr_t> frames;
196     std::vector<unwindstack::LocalFrameData> frames_info;
197     if (!Unwind(&frames, &frames_info, 256)) {
198       error_log("  Backtrace failed to get any frames.");
199     } else {
200       UnwindLog(frames_info);
201     }
202   } else {
203     std::vector<uintptr_t> frames(256);
204     size_t num_frames = backtrace_get(frames.data(), frames.size());
205     if (num_frames == 0) {
206       error_log("  Backtrace failed to get any frames.");
207     } else {
208       backtrace_log(frames.data(), num_frames);
209     }
210   }
211 }
212 
LogError(const void * pointer,const char * error_str)213 static void LogError(const void* pointer, const char* error_str) {
214   error_log(LOG_DIVIDER);
215   error_log("+++ ALLOCATION %p %s", pointer, error_str);
216 
217   // If we are tracking already freed pointers, check to see if this is
218   // one so we can print extra information.
219   if (g_debug->config().options() & FREE_TRACK) {
220     PointerData::LogFreeBacktrace(pointer);
221   }
222 
223   error_log("Backtrace at time of failure:");
224   BacktraceAndLog();
225   error_log(LOG_DIVIDER);
226   if (g_debug->config().options() & ABORT_ON_ERROR) {
227     abort();
228   }
229 }
230 
VerifyPointer(const void * pointer,const char * function_name)231 static bool VerifyPointer(const void* pointer, const char* function_name) {
232   if (g_debug->HeaderEnabled()) {
233     Header* header = g_debug->GetHeader(pointer);
234     if (header->tag != DEBUG_TAG) {
235       std::string error_str;
236       if (header->tag == DEBUG_FREE_TAG) {
237         error_str = std::string("USED AFTER FREE (") + function_name + ")";
238       } else {
239         error_str = android::base::StringPrintf("HAS INVALID TAG %" PRIx32 " (%s)", header->tag,
240                                                 function_name);
241       }
242       LogError(pointer, error_str.c_str());
243       return false;
244     }
245   }
246 
247   if (g_debug->TrackPointers()) {
248     if (!PointerData::Exists(pointer)) {
249       std::string error_str(std::string("UNKNOWN POINTER (") + function_name + ")");
250       LogError(pointer, error_str.c_str());
251       return false;
252     }
253   }
254   return true;
255 }
256 
InternalMallocUsableSize(void * pointer)257 static size_t InternalMallocUsableSize(void* pointer) {
258   if (g_debug->HeaderEnabled()) {
259     return g_debug->GetHeader(pointer)->usable_size;
260   } else {
261     return g_dispatch->malloc_usable_size(pointer);
262   }
263 }
264 
InitHeader(Header * header,void * orig_pointer,size_t size)265 static void* InitHeader(Header* header, void* orig_pointer, size_t size) {
266   header->tag = DEBUG_TAG;
267   header->orig_pointer = orig_pointer;
268   header->size = size;
269   header->usable_size = g_dispatch->malloc_usable_size(orig_pointer);
270   if (header->usable_size == 0) {
271     g_dispatch->free(orig_pointer);
272     return nullptr;
273   }
274   header->usable_size -= g_debug->pointer_offset() + reinterpret_cast<uintptr_t>(header) -
275                          reinterpret_cast<uintptr_t>(orig_pointer);
276 
277   if (g_debug->config().options() & FRONT_GUARD) {
278     uint8_t* guard = g_debug->GetFrontGuard(header);
279     memset(guard, g_debug->config().front_guard_value(), g_debug->config().front_guard_bytes());
280   }
281 
282   if (g_debug->config().options() & REAR_GUARD) {
283     uint8_t* guard = g_debug->GetRearGuard(header);
284     memset(guard, g_debug->config().rear_guard_value(), g_debug->config().rear_guard_bytes());
285     // If the rear guard is enabled, set the usable size to the exact size
286     // of the allocation.
287     header->usable_size = header->size;
288   }
289 
290   return g_debug->GetPointer(header);
291 }
292 
293 extern "C" void __asan_init() __attribute__((weak));
294 
debug_initialize(const MallocDispatch * malloc_dispatch,bool * zygote_child,const char * options)295 bool debug_initialize(const MallocDispatch* malloc_dispatch, bool* zygote_child,
296                       const char* options) {
297   if (zygote_child == nullptr || options == nullptr) {
298     return false;
299   }
300 
301   if (__asan_init != 0) {
302     error_log("malloc debug cannot be enabled alongside ASAN");
303     return false;
304   }
305 
306   InitAtfork();
307 
308   g_zygote_child = zygote_child;
309 
310   g_dispatch = malloc_dispatch;
311 
312   if (!DebugDisableInitialize()) {
313     return false;
314   }
315 
316   DebugData* debug = new DebugData();
317   if (!debug->Initialize(options)) {
318     delete debug;
319     DebugDisableFinalize();
320     return false;
321   }
322   g_debug = debug;
323 
324   // Always enable the backtrace code since we will use it in a number
325   // of different error cases.
326   backtrace_startup();
327 
328   if (g_debug->config().options() & VERBOSE) {
329     info_log("%s: malloc debug enabled", getprogname());
330   }
331 
332   ScopedConcurrentLock::Init();
333 
334   return true;
335 }
336 
debug_finalize()337 void debug_finalize() {
338   if (g_debug == nullptr) {
339     return;
340   }
341 
342   // Make sure that there are no other threads doing debug allocations
343   // before we kill everything.
344   ScopedConcurrentLock::BlockAllOperations();
345 
346   // Turn off capturing allocations calls.
347   DebugDisableSet(true);
348 
349   if (g_debug->config().options() & FREE_TRACK) {
350     PointerData::VerifyAllFreed();
351   }
352 
353   if (g_debug->config().options() & LEAK_TRACK) {
354     PointerData::LogLeaks();
355   }
356 
357   if ((g_debug->config().options() & BACKTRACE) && g_debug->config().backtrace_dump_on_exit()) {
358     debug_dump_heap(android::base::StringPrintf("%s.%d.exit.txt",
359                                                 g_debug->config().backtrace_dump_prefix().c_str(),
360                                                 getpid()).c_str());
361   }
362 
363   backtrace_shutdown();
364 
365   // In order to prevent any issues of threads freeing previous pointers
366   // after the main thread calls this code, simply leak the g_debug pointer
367   // and do not destroy the debug disable pthread key.
368 }
369 
debug_get_malloc_leak_info(uint8_t ** info,size_t * overall_size,size_t * info_size,size_t * total_memory,size_t * backtrace_size)370 void debug_get_malloc_leak_info(uint8_t** info, size_t* overall_size, size_t* info_size,
371                                 size_t* total_memory, size_t* backtrace_size) {
372   ScopedConcurrentLock lock;
373   ScopedDisableDebugCalls disable;
374   ScopedBacktraceSignalBlocker blocked;
375 
376   // Verify the arguments.
377   if (info == nullptr || overall_size == nullptr || info_size == nullptr || total_memory == nullptr ||
378       backtrace_size == nullptr) {
379     error_log("get_malloc_leak_info: At least one invalid parameter.");
380     return;
381   }
382 
383   *info = nullptr;
384   *overall_size = 0;
385   *info_size = 0;
386   *total_memory = 0;
387   *backtrace_size = 0;
388 
389   if (!(g_debug->config().options() & BACKTRACE)) {
390     error_log(
391         "get_malloc_leak_info: Allocations not being tracked, to enable "
392         "set the option 'backtrace'.");
393     return;
394   }
395 
396   PointerData::GetInfo(info, overall_size, info_size, total_memory, backtrace_size);
397 }
398 
debug_free_malloc_leak_info(uint8_t * info)399 void debug_free_malloc_leak_info(uint8_t* info) {
400   g_dispatch->free(info);
401 }
402 
debug_malloc_usable_size(void * pointer)403 size_t debug_malloc_usable_size(void* pointer) {
404   if (DebugCallsDisabled() || pointer == nullptr) {
405     return g_dispatch->malloc_usable_size(pointer);
406   }
407   ScopedConcurrentLock lock;
408   ScopedDisableDebugCalls disable;
409   ScopedBacktraceSignalBlocker blocked;
410 
411   if (!VerifyPointer(pointer, "malloc_usable_size")) {
412     return 0;
413   }
414 
415   return InternalMallocUsableSize(pointer);
416 }
417 
InternalMalloc(size_t size)418 static void* InternalMalloc(size_t size) {
419   if ((g_debug->config().options() & BACKTRACE) && g_debug->pointer->ShouldDumpAndReset()) {
420     debug_dump_heap(android::base::StringPrintf(
421                         "%s.%d.txt", g_debug->config().backtrace_dump_prefix().c_str(), getpid())
422                         .c_str());
423   }
424 
425   if (size == 0) {
426     size = 1;
427   }
428 
429   size_t real_size = size + g_debug->extra_bytes();
430   if (real_size < size) {
431     // Overflow.
432     errno = ENOMEM;
433     return nullptr;
434   }
435 
436   if (size > PointerInfoType::MaxSize()) {
437     errno = ENOMEM;
438     return nullptr;
439   }
440 
441   void* pointer;
442   if (g_debug->HeaderEnabled()) {
443     Header* header =
444         reinterpret_cast<Header*>(g_dispatch->memalign(MINIMUM_ALIGNMENT_BYTES, real_size));
445     if (header == nullptr) {
446       return nullptr;
447     }
448     pointer = InitHeader(header, header, size);
449   } else {
450     pointer = g_dispatch->malloc(real_size);
451   }
452 
453   if (pointer != nullptr) {
454     if (g_debug->TrackPointers()) {
455       PointerData::Add(pointer, size);
456     }
457 
458     if (g_debug->config().options() & FILL_ON_ALLOC) {
459       size_t bytes = InternalMallocUsableSize(pointer);
460       size_t fill_bytes = g_debug->config().fill_on_alloc_bytes();
461       bytes = (bytes < fill_bytes) ? bytes : fill_bytes;
462       memset(pointer, g_debug->config().fill_alloc_value(), bytes);
463     }
464   }
465   return pointer;
466 }
467 
debug_malloc(size_t size)468 void* debug_malloc(size_t size) {
469   if (DebugCallsDisabled()) {
470     return g_dispatch->malloc(size);
471   }
472   ScopedConcurrentLock lock;
473   ScopedDisableDebugCalls disable;
474   ScopedBacktraceSignalBlocker blocked;
475 
476   void* pointer = InternalMalloc(size);
477 
478   if (g_debug->config().options() & RECORD_ALLOCS) {
479     g_debug->record->AddEntry(new MallocEntry(pointer, size));
480   }
481 
482   return pointer;
483 }
484 
InternalFree(void * pointer)485 static void InternalFree(void* pointer) {
486   if ((g_debug->config().options() & BACKTRACE) && g_debug->pointer->ShouldDumpAndReset()) {
487     debug_dump_heap(android::base::StringPrintf(
488                         "%s.%d.txt", g_debug->config().backtrace_dump_prefix().c_str(), getpid())
489                         .c_str());
490   }
491 
492   void* free_pointer = pointer;
493   size_t bytes;
494   Header* header;
495   if (g_debug->HeaderEnabled()) {
496     header = g_debug->GetHeader(pointer);
497     free_pointer = header->orig_pointer;
498 
499     if (g_debug->config().options() & FRONT_GUARD) {
500       if (!g_debug->front_guard->Valid(header)) {
501         g_debug->front_guard->LogFailure(header);
502       }
503     }
504     if (g_debug->config().options() & REAR_GUARD) {
505       if (!g_debug->rear_guard->Valid(header)) {
506         g_debug->rear_guard->LogFailure(header);
507       }
508     }
509 
510     header->tag = DEBUG_FREE_TAG;
511 
512     bytes = header->usable_size;
513   } else {
514     bytes = g_dispatch->malloc_usable_size(pointer);
515   }
516 
517   if (g_debug->config().options() & FILL_ON_FREE) {
518     size_t fill_bytes = g_debug->config().fill_on_free_bytes();
519     bytes = (bytes < fill_bytes) ? bytes : fill_bytes;
520     memset(pointer, g_debug->config().fill_free_value(), bytes);
521   }
522 
523   if (g_debug->TrackPointers()) {
524     PointerData::Remove(pointer);
525   }
526 
527   if (g_debug->config().options() & FREE_TRACK) {
528     // Do not add the allocation until we are done modifying the pointer
529     // itself. This avoids a race if a lot of threads are all doing
530     // frees at the same time and we wind up trying to really free this
531     // pointer from another thread, while still trying to free it in
532     // this function.
533     pointer = PointerData::AddFreed(pointer);
534     if (pointer != nullptr) {
535       if (g_debug->HeaderEnabled()) {
536         pointer = g_debug->GetHeader(pointer)->orig_pointer;
537       }
538       g_dispatch->free(pointer);
539     }
540   } else {
541     g_dispatch->free(free_pointer);
542   }
543 }
544 
debug_free(void * pointer)545 void debug_free(void* pointer) {
546   if (DebugCallsDisabled() || pointer == nullptr) {
547     return g_dispatch->free(pointer);
548   }
549   ScopedConcurrentLock lock;
550   ScopedDisableDebugCalls disable;
551   ScopedBacktraceSignalBlocker blocked;
552 
553   if (g_debug->config().options() & RECORD_ALLOCS) {
554     g_debug->record->AddEntry(new FreeEntry(pointer));
555   }
556 
557   if (!VerifyPointer(pointer, "free")) {
558     return;
559   }
560 
561   InternalFree(pointer);
562 }
563 
debug_memalign(size_t alignment,size_t bytes)564 void* debug_memalign(size_t alignment, size_t bytes) {
565   if (DebugCallsDisabled()) {
566     return g_dispatch->memalign(alignment, bytes);
567   }
568   ScopedConcurrentLock lock;
569   ScopedDisableDebugCalls disable;
570   ScopedBacktraceSignalBlocker blocked;
571 
572   if (bytes == 0) {
573     bytes = 1;
574   }
575 
576   if (bytes > PointerInfoType::MaxSize()) {
577     errno = ENOMEM;
578     return nullptr;
579   }
580 
581   void* pointer;
582   if (g_debug->HeaderEnabled()) {
583     // Make the alignment a power of two.
584     if (!powerof2(alignment)) {
585       alignment = BIONIC_ROUND_UP_POWER_OF_2(alignment);
586     }
587     // Force the alignment to at least MINIMUM_ALIGNMENT_BYTES to guarantee
588     // that the header is aligned properly.
589     if (alignment < MINIMUM_ALIGNMENT_BYTES) {
590       alignment = MINIMUM_ALIGNMENT_BYTES;
591     }
592 
593     // We don't have any idea what the natural alignment of
594     // the underlying native allocator is, so we always need to
595     // over allocate.
596     size_t real_size = alignment + bytes + g_debug->extra_bytes();
597     if (real_size < bytes) {
598       // Overflow.
599       errno = ENOMEM;
600       return nullptr;
601     }
602 
603     pointer = g_dispatch->malloc(real_size);
604     if (pointer == nullptr) {
605       return nullptr;
606     }
607 
608     uintptr_t value = reinterpret_cast<uintptr_t>(pointer) + g_debug->pointer_offset();
609     // Now align the pointer.
610     value += (-value % alignment);
611 
612     Header* header = g_debug->GetHeader(reinterpret_cast<void*>(value));
613     pointer = InitHeader(header, pointer, bytes);
614   } else {
615     size_t real_size = bytes + g_debug->extra_bytes();
616     if (real_size < bytes) {
617       // Overflow.
618       errno = ENOMEM;
619       return nullptr;
620     }
621     pointer = g_dispatch->memalign(alignment, real_size);
622   }
623 
624   if (pointer != nullptr) {
625     if (g_debug->TrackPointers()) {
626       PointerData::Add(pointer, bytes);
627     }
628 
629     if (g_debug->config().options() & FILL_ON_ALLOC) {
630       size_t bytes = InternalMallocUsableSize(pointer);
631       size_t fill_bytes = g_debug->config().fill_on_alloc_bytes();
632       bytes = (bytes < fill_bytes) ? bytes : fill_bytes;
633       memset(pointer, g_debug->config().fill_alloc_value(), bytes);
634     }
635 
636     if (g_debug->config().options() & RECORD_ALLOCS) {
637       g_debug->record->AddEntry(new MemalignEntry(pointer, bytes, alignment));
638     }
639   }
640 
641   return pointer;
642 }
643 
debug_realloc(void * pointer,size_t bytes)644 void* debug_realloc(void* pointer, size_t bytes) {
645   if (DebugCallsDisabled()) {
646     return g_dispatch->realloc(pointer, bytes);
647   }
648   ScopedConcurrentLock lock;
649   ScopedDisableDebugCalls disable;
650   ScopedBacktraceSignalBlocker blocked;
651 
652   if (pointer == nullptr) {
653     pointer = InternalMalloc(bytes);
654     if (g_debug->config().options() & RECORD_ALLOCS) {
655       g_debug->record->AddEntry(new ReallocEntry(pointer, bytes, nullptr));
656     }
657     return pointer;
658   }
659 
660   if (!VerifyPointer(pointer, "realloc")) {
661     return nullptr;
662   }
663 
664   if (bytes == 0) {
665     if (g_debug->config().options() & RECORD_ALLOCS) {
666       g_debug->record->AddEntry(new ReallocEntry(nullptr, bytes, pointer));
667     }
668 
669     InternalFree(pointer);
670     return nullptr;
671   }
672 
673   size_t real_size = bytes;
674   if (g_debug->config().options() & EXPAND_ALLOC) {
675     real_size += g_debug->config().expand_alloc_bytes();
676     if (real_size < bytes) {
677       // Overflow.
678       errno = ENOMEM;
679       return nullptr;
680     }
681   }
682 
683   if (bytes > PointerInfoType::MaxSize()) {
684     errno = ENOMEM;
685     return nullptr;
686   }
687 
688   void* new_pointer;
689   size_t prev_size;
690   if (g_debug->HeaderEnabled()) {
691     // Same size, do nothing.
692     Header* header = g_debug->GetHeader(pointer);
693     if (real_size == header->size) {
694       if (g_debug->TrackPointers()) {
695         // Remove and re-add so that the backtrace is updated.
696         PointerData::Remove(pointer);
697         PointerData::Add(pointer, real_size);
698       }
699       return pointer;
700     }
701 
702     // Allocation is shrinking.
703     if (real_size < header->usable_size) {
704       header->size = real_size;
705       if (g_debug->config().options() & REAR_GUARD) {
706         // Don't bother allocating a smaller pointer in this case, simply
707         // change the header usable_size and reset the rear guard.
708         header->usable_size = header->size;
709         memset(g_debug->GetRearGuard(header), g_debug->config().rear_guard_value(),
710                g_debug->config().rear_guard_bytes());
711       }
712       if (g_debug->TrackPointers()) {
713         // Remove and re-add so that the backtrace is updated.
714         PointerData::Remove(pointer);
715         PointerData::Add(pointer, real_size);
716       }
717       return pointer;
718     }
719 
720     // Allocate the new size.
721     new_pointer = InternalMalloc(bytes);
722     if (new_pointer == nullptr) {
723       errno = ENOMEM;
724       return nullptr;
725     }
726 
727     prev_size = header->usable_size;
728     memcpy(new_pointer, pointer, prev_size);
729     InternalFree(pointer);
730   } else {
731     if (g_debug->TrackPointers()) {
732       PointerData::Remove(pointer);
733     }
734 
735     prev_size = g_dispatch->malloc_usable_size(pointer);
736     new_pointer = g_dispatch->realloc(pointer, real_size);
737     if (new_pointer == nullptr) {
738       return nullptr;
739     }
740 
741     if (g_debug->TrackPointers()) {
742       PointerData::Add(new_pointer, real_size);
743     }
744   }
745 
746   if (g_debug->config().options() & FILL_ON_ALLOC) {
747     size_t bytes = InternalMallocUsableSize(new_pointer);
748     if (bytes > g_debug->config().fill_on_alloc_bytes()) {
749       bytes = g_debug->config().fill_on_alloc_bytes();
750     }
751     if (bytes > prev_size) {
752       memset(reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(new_pointer) + prev_size),
753              g_debug->config().fill_alloc_value(), bytes - prev_size);
754     }
755   }
756 
757   if (g_debug->config().options() & RECORD_ALLOCS) {
758     g_debug->record->AddEntry(new ReallocEntry(new_pointer, bytes, pointer));
759   }
760 
761   return new_pointer;
762 }
763 
debug_calloc(size_t nmemb,size_t bytes)764 void* debug_calloc(size_t nmemb, size_t bytes) {
765   if (DebugCallsDisabled()) {
766     return g_dispatch->calloc(nmemb, bytes);
767   }
768   ScopedConcurrentLock lock;
769   ScopedDisableDebugCalls disable;
770   ScopedBacktraceSignalBlocker blocked;
771 
772   size_t size;
773   if (__builtin_mul_overflow(nmemb, bytes, &size)) {
774     // Overflow
775     errno = ENOMEM;
776     return nullptr;
777   }
778 
779   if (size == 0) {
780     size = 1;
781   }
782 
783   size_t real_size;
784   if (__builtin_add_overflow(size, g_debug->extra_bytes(), &real_size)) {
785     // Overflow.
786     errno = ENOMEM;
787     return nullptr;
788   }
789 
790   if (real_size > PointerInfoType::MaxSize()) {
791     errno = ENOMEM;
792     return nullptr;
793   }
794 
795   void* pointer;
796   if (g_debug->HeaderEnabled()) {
797     // Need to guarantee the alignment of the header.
798     Header* header =
799         reinterpret_cast<Header*>(g_dispatch->memalign(MINIMUM_ALIGNMENT_BYTES, real_size));
800     if (header == nullptr) {
801       return nullptr;
802     }
803     memset(header, 0, g_dispatch->malloc_usable_size(header));
804     pointer = InitHeader(header, header, size);
805   } else {
806     pointer = g_dispatch->calloc(1, real_size);
807   }
808 
809   if (g_debug->config().options() & RECORD_ALLOCS) {
810     g_debug->record->AddEntry(new CallocEntry(pointer, bytes, nmemb));
811   }
812 
813   if (pointer != nullptr && g_debug->TrackPointers()) {
814     PointerData::Add(pointer, size);
815   }
816   return pointer;
817 }
818 
debug_mallinfo()819 struct mallinfo debug_mallinfo() {
820   return g_dispatch->mallinfo();
821 }
822 
debug_mallopt(int param,int value)823 int debug_mallopt(int param, int value) {
824   return g_dispatch->mallopt(param, value);
825 }
826 
debug_malloc_info(int options,FILE * fp)827 int debug_malloc_info(int options, FILE* fp) {
828   if (DebugCallsDisabled() || !g_debug->TrackPointers()) {
829     return g_dispatch->malloc_info(options, fp);
830   }
831 
832   // Make sure any pending output is written to the file.
833   fflush(fp);
834 
835   ScopedConcurrentLock lock;
836   ScopedDisableDebugCalls disable;
837   ScopedBacktraceSignalBlocker blocked;
838 
839   // Avoid any issues where allocations are made that will be freed
840   // in the fclose.
841   int fd = fileno(fp);
842   MallocXmlElem root(fd, "malloc", "version=\"debug-malloc-1\"");
843   std::vector<ListInfoType> list;
844   PointerData::GetAllocList(&list);
845 
846   size_t alloc_num = 0;
847   for (size_t i = 0; i < list.size(); i++) {
848     MallocXmlElem alloc(fd, "allocation", "nr=\"%zu\"", alloc_num);
849 
850     size_t total = 1;
851     size_t size = list[i].size;
852     while (i < list.size() - 1 && list[i + 1].size == size) {
853       i++;
854       total++;
855     }
856     MallocXmlElem(fd, "size").Contents("%zu", list[i].size);
857     MallocXmlElem(fd, "total").Contents("%zu", total);
858     alloc_num++;
859   }
860   return 0;
861 }
862 
debug_aligned_alloc(size_t alignment,size_t size)863 void* debug_aligned_alloc(size_t alignment, size_t size) {
864   if (DebugCallsDisabled()) {
865     return g_dispatch->aligned_alloc(alignment, size);
866   }
867   if (!powerof2(alignment) || (size % alignment) != 0) {
868     errno = EINVAL;
869     return nullptr;
870   }
871   return debug_memalign(alignment, size);
872 }
873 
debug_posix_memalign(void ** memptr,size_t alignment,size_t size)874 int debug_posix_memalign(void** memptr, size_t alignment, size_t size) {
875   if (DebugCallsDisabled()) {
876     return g_dispatch->posix_memalign(memptr, alignment, size);
877   }
878 
879   if (alignment < sizeof(void*) || !powerof2(alignment)) {
880     return EINVAL;
881   }
882   int saved_errno = errno;
883   *memptr = debug_memalign(alignment, size);
884   errno = saved_errno;
885   return (*memptr != nullptr) ? 0 : ENOMEM;
886 }
887 
debug_malloc_iterate(uintptr_t base,size_t size,void (* callback)(uintptr_t,size_t,void *),void * arg)888 int debug_malloc_iterate(uintptr_t base, size_t size, void (*callback)(uintptr_t, size_t, void*),
889                   void* arg) {
890   ScopedConcurrentLock lock;
891   if (g_debug->TrackPointers()) {
892     // Since malloc is disabled, don't bother acquiring any locks.
893     for (auto it = PointerData::begin(); it != PointerData::end(); ++it) {
894       callback(it->first, InternalMallocUsableSize(reinterpret_cast<void*>(it->first)), arg);
895     }
896     return 0;
897   }
898 
899   // An option that adds a header will add pointer tracking, so no need to
900   // check if headers are enabled.
901   return g_dispatch->malloc_iterate(base, size, callback, arg);
902 }
903 
debug_malloc_disable()904 void debug_malloc_disable() {
905   ScopedConcurrentLock lock;
906   g_dispatch->malloc_disable();
907   if (g_debug->pointer) {
908     g_debug->pointer->PrepareFork();
909   }
910 }
911 
debug_malloc_enable()912 void debug_malloc_enable() {
913   ScopedConcurrentLock lock;
914   if (g_debug->pointer) {
915     g_debug->pointer->PostForkParent();
916   }
917   g_dispatch->malloc_enable();
918 }
919 
debug_malloc_backtrace(void * pointer,uintptr_t * frames,size_t max_frames)920 ssize_t debug_malloc_backtrace(void* pointer, uintptr_t* frames, size_t max_frames) {
921   if (DebugCallsDisabled() || pointer == nullptr) {
922     return 0;
923   }
924   ScopedConcurrentLock lock;
925   ScopedDisableDebugCalls disable;
926   ScopedBacktraceSignalBlocker blocked;
927 
928   if (!(g_debug->config().options() & BACKTRACE)) {
929     return 0;
930   }
931   pointer = UntagPointer(pointer);
932   return PointerData::GetFrames(pointer, frames, max_frames);
933 }
934 
935 #if defined(HAVE_DEPRECATED_MALLOC_FUNCS)
debug_pvalloc(size_t bytes)936 void* debug_pvalloc(size_t bytes) {
937   if (DebugCallsDisabled()) {
938     return g_dispatch->pvalloc(bytes);
939   }
940 
941   size_t pagesize = getpagesize();
942   size_t size = __BIONIC_ALIGN(bytes, pagesize);
943   if (size < bytes) {
944     // Overflow
945     errno = ENOMEM;
946     return nullptr;
947   }
948   return debug_memalign(pagesize, size);
949 }
950 
debug_valloc(size_t size)951 void* debug_valloc(size_t size) {
952   if (DebugCallsDisabled()) {
953     return g_dispatch->valloc(size);
954   }
955   return debug_memalign(getpagesize(), size);
956 }
957 #endif
958 
959 static std::mutex g_dump_lock;
960 
write_dump(int fd)961 static void write_dump(int fd) {
962   dprintf(fd, "Android Native Heap Dump v1.2\n\n");
963 
964   std::string fingerprint = android::base::GetProperty("ro.build.fingerprint", "unknown");
965   dprintf(fd, "Build fingerprint: '%s'\n\n", fingerprint.c_str());
966 
967   PointerData::DumpLiveToFile(fd);
968 
969   dprintf(fd, "MAPS\n");
970   std::string content;
971   if (!android::base::ReadFileToString("/proc/self/maps", &content)) {
972     dprintf(fd, "Could not open /proc/self/maps\n");
973   } else {
974     dprintf(fd, "%s", content.c_str());
975   }
976   dprintf(fd, "END\n");
977 }
978 
debug_write_malloc_leak_info(FILE * fp)979 bool debug_write_malloc_leak_info(FILE* fp) {
980   // Make sure any pending output is written to the file.
981   fflush(fp);
982 
983   ScopedConcurrentLock lock;
984   ScopedDisableDebugCalls disable;
985   ScopedBacktraceSignalBlocker blocked;
986 
987   std::lock_guard<std::mutex> guard(g_dump_lock);
988 
989   if (!(g_debug->config().options() & BACKTRACE)) {
990     return false;
991   }
992 
993   write_dump(fileno(fp));
994 
995   return true;
996 }
997 
debug_dump_heap(const char * file_name)998 void debug_dump_heap(const char* file_name) {
999   ScopedConcurrentLock lock;
1000   ScopedDisableDebugCalls disable;
1001   ScopedBacktraceSignalBlocker blocked;
1002 
1003   std::lock_guard<std::mutex> guard(g_dump_lock);
1004 
1005   int fd = open(file_name, O_RDWR | O_CREAT | O_NOFOLLOW | O_TRUNC | O_CLOEXEC, 0644);
1006   if (fd == -1) {
1007     error_log("Unable to create file: %s", file_name);
1008     return;
1009   }
1010 
1011   error_log("Dumping to file: %s\n", file_name);
1012   write_dump(fd);
1013   close(fd);
1014 }
1015