1 // Copyright (c) 2005, Google Inc.
2 // All rights reserved.
4 // Redistribution and use in source and binary forms, with or without
5 // modification, are permitted provided that the following conditions are
8 // * Redistributions of source code must retain the above copyright
9 // notice, this list of conditions and the following disclaimer.
10 // * Redistributions in binary form must reproduce the above
11 // copyright notice, this list of conditions and the following disclaimer
12 // in the documentation and/or other materials provided with the
14 // * Neither the name of Google Inc. nor the names of its
15 // contributors may be used to endorse or promote products derived from
16 // this software without specific prior written permission.
18 // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
19 // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
20 // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
21 // A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
22 // OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
23 // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
24 // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25 // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26 // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27 // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
28 // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
31 // Author: Sanjay Ghemawat <opensource@google.com>
33 // We define mmap() and mmap64(), which somewhat reimplements libc's mmap
34 // syscall stubs. Unfortunately libc only exports the stubs via weak symbols
35 // (which we're overriding with our mmap64() and mmap() wrappers) so we can't
36 // just call through to them.
39 # error Should only be including malloc_hook_mmap_linux.h on linux systems.
46 #include "base/linux_syscall_support.h"
48 // The x86-32 case and the x86-64 case differ:
49 // 32b has a mmap2() syscall, 64b does not.
50 // 64b and 32b have different calling conventions for mmap().
52 // I test for 64-bit first so I don't have to do things like
53 // '#if (defined(__mips__) && !defined(__MIPS64__))' as a mips32 check.
54 #if defined(__x86_64__) || defined(__PPC64__) || (defined(_MIPS_SIM) && _MIPS_SIM == _ABI64)
56 static inline void* do_mmap64(void *start
, size_t length
,
58 int fd
, __off64_t offset
) __THROW
{
59 // The original gperftools uses sys_mmap() here. But, it is not allowed by
60 // Chromium's sandbox.
61 return (void *)syscall(SYS_mmap
, start
, length
, prot
, flags
, fd
, offset
);
64 #define MALLOC_HOOK_HAVE_DO_MMAP64 1
66 #elif defined(__i386__) || defined(__PPC__) || defined(__mips__) || \
69 static inline void* do_mmap64(void *start
, size_t length
,
71 int fd
, __off64_t offset
) __THROW
{
74 // Try mmap2() unless it's not supported
75 static bool have_mmap2
= true;
77 static int pagesize
= 0;
78 if (!pagesize
) pagesize
= getpagesize();
80 // Check that the offset is page aligned
81 if (offset
& (pagesize
- 1)) {
87 result
= (void *)syscall(SYS_mmap2
,
88 start
, length
, prot
, flags
, fd
,
89 (off_t
) (offset
/ pagesize
));
90 if (result
!= MAP_FAILED
|| errno
!= ENOSYS
) goto out
;
92 // We don't have mmap2() after all - don't bother trying it in future
96 if (((off_t
)offset
) != offset
) {
97 // If we're trying to map a 64-bit offset, fail now since we don't
98 // have 64-bit mmap() support.
106 // Fall back to old 32-bit offset mmap() call
107 // Old syscall interface cannot handle six args, so pass in an array
108 int32 args
[6] = { (int32
) start
, (int32
) length
, prot
, flags
, fd
,
110 result
= (void *)syscall(SYS_mmap
, args
);
113 // Some Linux ports like ARM EABI Linux has no mmap, just mmap2.
121 #define MALLOC_HOOK_HAVE_DO_MMAP64 1
123 #endif // #if defined(__x86_64__)
126 #ifdef MALLOC_HOOK_HAVE_DO_MMAP64
128 // We use do_mmap64 abstraction to put MallocHook::InvokeMmapHook
129 // calls right into mmap and mmap64, so that the stack frames in the caller's
130 // stack are at the same offsets for all the calls of memory allocating
133 // Put all callers of MallocHook::Invoke* in this module into
134 // malloc_hook section,
135 // so that MallocHook::GetCallerStackTrace can function accurately:
137 // Make sure mmap doesn't get #define'd away by <sys/mman.h>
141 void* mmap64(void *start
, size_t length
, int prot
, int flags
,
142 int fd
, __off64_t offset
) __THROW
143 ATTRIBUTE_SECTION(malloc_hook
);
144 void* mmap(void *start
, size_t length
,int prot
, int flags
,
145 int fd
, off_t offset
) __THROW
146 ATTRIBUTE_SECTION(malloc_hook
);
147 int munmap(void* start
, size_t length
) __THROW
148 ATTRIBUTE_SECTION(malloc_hook
);
149 void* mremap(void* old_addr
, size_t old_size
, size_t new_size
,
150 int flags
, ...) __THROW
151 ATTRIBUTE_SECTION(malloc_hook
);
152 void* sbrk(ptrdiff_t increment
) __THROW
153 ATTRIBUTE_SECTION(malloc_hook
);
156 extern "C" void* mmap64(void *start
, size_t length
, int prot
, int flags
,
157 int fd
, __off64_t offset
) __THROW
{
158 MallocHook::InvokePreMmapHook(start
, length
, prot
, flags
, fd
, offset
);
160 if (!MallocHook::InvokeMmapReplacement(
161 start
, length
, prot
, flags
, fd
, offset
, &result
)) {
162 result
= do_mmap64(start
, length
, prot
, flags
, fd
, offset
);
164 MallocHook::InvokeMmapHook(result
, start
, length
, prot
, flags
, fd
, offset
);
168 # if !defined(__USE_FILE_OFFSET64) || !defined(__REDIRECT_NTH)
170 extern "C" void* mmap(void *start
, size_t length
, int prot
, int flags
,
171 int fd
, off_t offset
) __THROW
{
172 MallocHook::InvokePreMmapHook(start
, length
, prot
, flags
, fd
, offset
);
174 if (!MallocHook::InvokeMmapReplacement(
175 start
, length
, prot
, flags
, fd
, offset
, &result
)) {
176 result
= do_mmap64(start
, length
, prot
, flags
, fd
,
177 static_cast<size_t>(offset
)); // avoid sign extension
179 MallocHook::InvokeMmapHook(result
, start
, length
, prot
, flags
, fd
, offset
);
183 # endif // !defined(__USE_FILE_OFFSET64) || !defined(__REDIRECT_NTH)
185 extern "C" int munmap(void* start
, size_t length
) __THROW
{
186 MallocHook::InvokeMunmapHook(start
, length
);
188 if (!MallocHook::InvokeMunmapReplacement(start
, length
, &result
)) {
189 // The original gperftools uses sys_munmap() here. But, it is not allowed
190 // by Chromium's sandbox.
191 result
= syscall(SYS_munmap
, start
, length
);
196 extern "C" void* mremap(void* old_addr
, size_t old_size
, size_t new_size
,
197 int flags
, ...) __THROW
{
200 void *new_address
= va_arg(ap
, void *);
202 // The original gperftools uses sys_mremap() here. But, it is not allowed by
203 // Chromium's sandbox.
204 void* result
= (void *)syscall(
205 SYS_mremap
, old_addr
, old_size
, new_size
, flags
, new_address
);
206 MallocHook::InvokeMremapHook(result
, old_addr
, old_size
, new_size
, flags
,
212 extern "C" void* __sbrk(ptrdiff_t increment
);
214 extern "C" void* sbrk(ptrdiff_t increment
) __THROW
{
215 MallocHook::InvokePreSbrkHook(increment
);
216 void *result
= __sbrk(increment
);
217 MallocHook::InvokeSbrkHook(result
, increment
);
221 /*static*/void* MallocHook::UnhookedMMap(void *start
, size_t length
, int prot
,
222 int flags
, int fd
, off_t offset
) {
224 if (!MallocHook::InvokeMmapReplacement(
225 start
, length
, prot
, flags
, fd
, offset
, &result
)) {
226 result
= do_mmap64(start
, length
, prot
, flags
, fd
, offset
);
231 /*static*/int MallocHook::UnhookedMUnmap(void *start
, size_t length
) {
233 if (!MallocHook::InvokeMunmapReplacement(start
, length
, &result
)) {
234 result
= syscall(SYS_munmap
, start
, length
);
239 #undef MALLOC_HOOK_HAVE_DO_MMAP64
241 #endif // #ifdef MALLOC_HOOK_HAVE_DO_MMAP64