Home | History | Annotate | Download | only in src
      1 // Copyright (c) 2005, Google Inc.
      2 // All rights reserved.
      3 //
      4 // Redistribution and use in source and binary forms, with or without
      5 // modification, are permitted provided that the following conditions are
      6 // met:
      7 //
      8 //     * Redistributions of source code must retain the above copyright
      9 // notice, this list of conditions and the following disclaimer.
     10 //     * Redistributions in binary form must reproduce the above
     11 // copyright notice, this list of conditions and the following disclaimer
     12 // in the documentation and/or other materials provided with the
     13 // distribution.
     14 //     * Neither the name of Google Inc. nor the names of its
     15 // contributors may be used to endorse or promote products derived from
     16 // this software without specific prior written permission.
     17 //
     18 // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
     19 // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
     20 // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
     21 // A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
     22 // OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
     23 // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
     24 // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
     25 // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
     26 // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
     27 // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
     28 // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
     29 
     30 // ---
     31 // Author: Sanjay Ghemawat <opensource (at) google.com>
     32 
     33 // We define mmap() and mmap64(), which somewhat reimplements libc's mmap
     34 // syscall stubs.  Unfortunately libc only exports the stubs via weak symbols
     35 // (which we're overriding with our mmap64() and mmap() wrappers) so we can't
     36 // just call through to them.
     37 
     38 #ifndef __linux
     39 # error Should only be including malloc_hook_mmap_linux.h on linux systems.
     40 #endif
     41 
     42 #include <unistd.h>
     43 #if defined(__ANDROID__)
     44 #include <sys/syscall.h>
     45 #include <sys/linux-syscalls.h>
     46 #else
     47 #include <syscall.h>
     48 #endif
     49 #include <sys/mman.h>
     50 #include <errno.h>
     51 #include "base/linux_syscall_support.h"
     52 
     53 // SYS_mmap2, SYS_munmap, SYS_mremap and __off64_t are not defined in Android.
     54 #if defined(__ANDROID__)
     55 #if defined(__NR_mmap) && !defined(SYS_mmap)
     56 #define SYS_mmap __NR_mmap
     57 #endif
     58 #ifndef SYS_mmap2
     59 #define SYS_mmap2 __NR_mmap2
     60 #endif
     61 #ifndef SYS_munmap
     62 #define SYS_munmap __NR_munmap
     63 #endif
     64 #ifndef SYS_mremap
     65 #define SYS_mremap __NR_mremap
     66 #endif
     67 typedef off64_t __off64_t;
     68 #endif  // defined(__ANDROID__)
     69 
     70 // The x86-32 case and the x86-64 case differ:
     71 // 32b has a mmap2() syscall, 64b does not.
     72 // 64b and 32b have different calling conventions for mmap().
     73 
     74 // I test for 64-bit first so I don't have to do things like
     75 // '#if (defined(__mips__) && !defined(__MIPS64__))' as a mips32 check.
     76 #if defined(__x86_64__) || defined(__PPC64__) || (defined(_MIPS_SIM) && _MIPS_SIM == _ABI64)
     77 
     78 static inline void* do_mmap64(void *start, size_t length,
     79                               int prot, int flags,
     80                               int fd, __off64_t offset) __THROW {
     81   // The original gperftools uses sys_mmap() here.  But, it is not allowed by
     82   // Chromium's sandbox.
     83   return (void *)syscall(SYS_mmap, start, length, prot, flags, fd, offset);
     84 }
     85 
     86 #define MALLOC_HOOK_HAVE_DO_MMAP64 1
     87 
     88 #elif defined(__i386__) || defined(__PPC__) || defined(__mips__) || \
     89       defined(__arm__)
     90 
     91 static inline void* do_mmap64(void *start, size_t length,
     92                               int prot, int flags,
     93                               int fd, __off64_t offset) __THROW {
     94   void *result;
     95 
     96   // Try mmap2() unless it's not supported
     97   static bool have_mmap2 = true;
     98   if (have_mmap2) {
     99     static int pagesize = 0;
    100     if (!pagesize) pagesize = getpagesize();
    101 
    102     // Check that the offset is page aligned
    103     if (offset & (pagesize - 1)) {
    104       result = MAP_FAILED;
    105       errno = EINVAL;
    106       goto out;
    107     }
    108 
    109     result = (void *)syscall(SYS_mmap2,
    110                              start, length, prot, flags, fd,
    111                              (off_t) (offset / pagesize));
    112     if (result != MAP_FAILED || errno != ENOSYS)  goto out;
    113 
    114     // We don't have mmap2() after all - don't bother trying it in future
    115     have_mmap2 = false;
    116   }
    117 
    118   if (((off_t)offset) != offset) {
    119     // If we're trying to map a 64-bit offset, fail now since we don't
    120     // have 64-bit mmap() support.
    121     result = MAP_FAILED;
    122     errno = EINVAL;
    123     goto out;
    124   }
    125 
    126 #ifdef __NR_mmap
    127   {
    128     // Fall back to old 32-bit offset mmap() call
    129     // Old syscall interface cannot handle six args, so pass in an array
    130     int32 args[6] = { (int32) start, (int32) length, prot, flags, fd,
    131                       (off_t) offset };
    132     result = (void *)syscall(SYS_mmap, args);
    133   }
    134 #else
    135   // Some Linux ports like ARM EABI Linux has no mmap, just mmap2.
    136   result = MAP_FAILED;
    137 #endif
    138 
    139  out:
    140   return result;
    141 }
    142 
    143 #define MALLOC_HOOK_HAVE_DO_MMAP64 1
    144 
    145 #endif  // #if defined(__x86_64__)
    146 
    147 
    148 #ifdef MALLOC_HOOK_HAVE_DO_MMAP64
    149 
    150 // We use do_mmap64 abstraction to put MallocHook::InvokeMmapHook
    151 // calls right into mmap and mmap64, so that the stack frames in the caller's
    152 // stack are at the same offsets for all the calls of memory allocating
    153 // functions.
    154 
    155 // Put all callers of MallocHook::Invoke* in this module into
    156 // malloc_hook section,
    157 // so that MallocHook::GetCallerStackTrace can function accurately:
    158 
    159 // Make sure mmap doesn't get #define'd away by <sys/mman.h>
    160 # undef mmap
    161 
    162 extern "C" {
    163   void* mmap64(void *start, size_t length, int prot, int flags,
    164                int fd, __off64_t offset  ) __THROW
    165     ATTRIBUTE_SECTION(malloc_hook);
    166   void* mmap(void *start, size_t length,int prot, int flags,
    167              int fd, off_t offset) __THROW
    168     ATTRIBUTE_SECTION(malloc_hook);
    169   int munmap(void* start, size_t length) __THROW
    170     ATTRIBUTE_SECTION(malloc_hook);
    171   void* mremap(void* old_addr, size_t old_size, size_t new_size,
    172                int flags, ...) __THROW
    173     ATTRIBUTE_SECTION(malloc_hook);
    174 #if !defined(__ANDROID__)
    175   void* sbrk(ptrdiff_t increment) __THROW
    176     ATTRIBUTE_SECTION(malloc_hook);
    177 #endif
    178 }
    179 
    180 extern "C" void* mmap64(void *start, size_t length, int prot, int flags,
    181                         int fd, __off64_t offset) __THROW {
    182   MallocHook::InvokePreMmapHook(start, length, prot, flags, fd, offset);
    183   void *result;
    184   if (!MallocHook::InvokeMmapReplacement(
    185           start, length, prot, flags, fd, offset, &result)) {
    186     result = do_mmap64(start, length, prot, flags, fd, offset);
    187   }
    188   MallocHook::InvokeMmapHook(result, start, length, prot, flags, fd, offset);
    189   return result;
    190 }
    191 
    192 # if !defined(__USE_FILE_OFFSET64) || !defined(__REDIRECT_NTH)
    193 
    194 extern "C" void* mmap(void *start, size_t length, int prot, int flags,
    195                       int fd, off_t offset) __THROW {
    196   MallocHook::InvokePreMmapHook(start, length, prot, flags, fd, offset);
    197   void *result;
    198   if (!MallocHook::InvokeMmapReplacement(
    199           start, length, prot, flags, fd, offset, &result)) {
    200     result = do_mmap64(start, length, prot, flags, fd,
    201                        static_cast<size_t>(offset)); // avoid sign extension
    202   }
    203   MallocHook::InvokeMmapHook(result, start, length, prot, flags, fd, offset);
    204   return result;
    205 }
    206 
    207 # endif  // !defined(__USE_FILE_OFFSET64) || !defined(__REDIRECT_NTH)
    208 
    209 extern "C" int munmap(void* start, size_t length) __THROW {
    210   MallocHook::InvokeMunmapHook(start, length);
    211   int result;
    212   if (!MallocHook::InvokeMunmapReplacement(start, length, &result)) {
    213     // The original gperftools uses sys_munmap() here.  But, it is not allowed
    214     // by Chromium's sandbox.
    215     result = syscall(SYS_munmap, start, length);
    216   }
    217   return result;
    218 }
    219 
    220 extern "C" void* mremap(void* old_addr, size_t old_size, size_t new_size,
    221                         int flags, ...) __THROW {
    222   va_list ap;
    223   va_start(ap, flags);
    224   void *new_address = va_arg(ap, void *);
    225   va_end(ap);
    226   // The original gperftools uses sys_mremap() here.  But, it is not allowed by
    227   // Chromium's sandbox.
    228   void* result = (void *)syscall(
    229       SYS_mremap, old_addr, old_size, new_size, flags, new_address);
    230   MallocHook::InvokeMremapHook(result, old_addr, old_size, new_size, flags,
    231                                new_address);
    232   return result;
    233 }
    234 
    235 // Don't hook sbrk() in Android, since it doesn't expose __sbrk.
    236 #if !defined(__ANDROID__)
    237 // libc's version:
    238 extern "C" void* __sbrk(ptrdiff_t increment);
    239 
    240 extern "C" void* sbrk(ptrdiff_t increment) __THROW {
    241   MallocHook::InvokePreSbrkHook(increment);
    242   void *result = __sbrk(increment);
    243   MallocHook::InvokeSbrkHook(result, increment);
    244   return result;
    245 }
    246 #endif  // !defined(__ANDROID__)
    247 
    248 /*static*/void* MallocHook::UnhookedMMap(void *start, size_t length, int prot,
    249                                          int flags, int fd, off_t offset) {
    250   void* result;
    251   if (!MallocHook::InvokeMmapReplacement(
    252           start, length, prot, flags, fd, offset, &result)) {
    253     result = do_mmap64(start, length, prot, flags, fd, offset);
    254   }
    255   return result;
    256 }
    257 
    258 /*static*/int MallocHook::UnhookedMUnmap(void *start, size_t length) {
    259   int result;
    260   if (!MallocHook::InvokeMunmapReplacement(start, length, &result)) {
    261     result = syscall(SYS_munmap, start, length);
    262   }
    263   return result;
    264 }
    265 
    266 #undef MALLOC_HOOK_HAVE_DO_MMAP64
    267 
    268 #endif  // #ifdef MALLOC_HOOK_HAVE_DO_MMAP64
    269