Merge Chromium + Blink git repositories
[chromium-blink-merge.git] / third_party / tcmalloc / chromium / src / gperftools / malloc_hook.h
blobb99c047cd5d662c33dd121aac6157d6c5177582c
1 // Copyright (c) 2005, Google Inc.
2 // All rights reserved.
3 //
4 // Redistribution and use in source and binary forms, with or without
5 // modification, are permitted provided that the following conditions are
6 // met:
7 //
8 // * Redistributions of source code must retain the above copyright
9 // notice, this list of conditions and the following disclaimer.
10 // * Redistributions in binary form must reproduce the above
11 // copyright notice, this list of conditions and the following disclaimer
12 // in the documentation and/or other materials provided with the
13 // distribution.
14 // * Neither the name of Google Inc. nor the names of its
15 // contributors may be used to endorse or promote products derived from
16 // this software without specific prior written permission.
17 //
18 // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
19 // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
20 // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
21 // A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
22 // OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
23 // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
24 // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25 // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26 // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27 // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
28 // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30 // ---
31 // Author: Sanjay Ghemawat
33 // Some of our malloc implementations can invoke the following hooks whenever
34 // memory is allocated or deallocated. MallocHook is thread-safe, and things
35 // you do before calling AddFooHook(MyHook) are visible to any resulting calls
36 // to MyHook. Hooks must be thread-safe. If you write:
38 // CHECK(MallocHook::AddNewHook(&MyNewHook));
40 // MyNewHook will be invoked in subsequent calls in the current thread, but
41 // there are no guarantees on when it might be invoked in other threads.
43 // There are a limited number of slots available for each hook type. Add*Hook
44 // will return false if there are no slots available. Remove*Hook will return
45 // false if the given hook was not already installed.
47 // The order in which individual hooks are called in Invoke*Hook is undefined.
49 // It is safe for a hook to remove itself within Invoke*Hook and add other
50 // hooks. Any hooks added inside a hook invocation (for the same hook type)
51 // will not be invoked for the current invocation.
53 // One important user of these hooks is the heap profiler.
55 // CAVEAT: If you add new MallocHook::Invoke* calls then those calls must be
56 // directly in the code of the (de)allocation function that is provided to the
57 // user and that function must have an ATTRIBUTE_SECTION(malloc_hook) attribute.
59 // Note: the Invoke*Hook() functions are defined in malloc_hook-inl.h. If you
60 // need to invoke a hook (which you shouldn't unless you're part of tcmalloc),
61 // be sure to #include malloc_hook-inl.h in addition to malloc_hook.h.
63 // NOTE FOR C USERS: If you want to use malloc_hook functionality from
64 // a C program, #include malloc_hook_c.h instead of this file.
66 #ifndef _MALLOC_HOOK_H_
67 #define _MALLOC_HOOK_H_
69 #include <stddef.h>
70 #include <sys/types.h>
71 extern "C" {
72 #include <gperftools/malloc_hook_c.h> // a C version of the malloc_hook interface
75 // Annoying stuff for windows -- makes sure clients can import these functions
76 #ifndef PERFTOOLS_DLL_DECL
77 # ifdef _WIN32
78 # define PERFTOOLS_DLL_DECL __declspec(dllimport)
79 # else
80 # define PERFTOOLS_DLL_DECL
81 # endif
82 #endif
84 // The C++ methods below call the C version (MallocHook_*), and thus
85 // convert between an int and a bool. Windows complains about this
86 // (a "performance warning") which we don't care about, so we suppress.
87 #ifdef _MSC_VER
88 #pragma warning(push)
89 #pragma warning(disable:4800)
90 #endif
92 // Note: malloc_hook_c.h defines MallocHook_*Hook and
93 // MallocHook_{Add,Remove}*Hook. The version of these inside the MallocHook
94 // class are defined in terms of the malloc_hook_c version. See malloc_hook_c.h
95 // for details of these types/functions.
97 class PERFTOOLS_DLL_DECL MallocHook {
98 public:
99 // The NewHook is invoked whenever an object is allocated.
100 // It may be passed NULL if the allocator returned NULL.
101 typedef MallocHook_NewHook NewHook;
102 inline static bool AddNewHook(NewHook hook) {
103 return MallocHook_AddNewHook(hook);
105 inline static bool RemoveNewHook(NewHook hook) {
106 return MallocHook_RemoveNewHook(hook);
108 inline static void InvokeNewHook(const void* p, size_t s);
110 // The DeleteHook is invoked whenever an object is deallocated.
111 // It may be passed NULL if the caller is trying to delete NULL.
112 typedef MallocHook_DeleteHook DeleteHook;
113 inline static bool AddDeleteHook(DeleteHook hook) {
114 return MallocHook_AddDeleteHook(hook);
116 inline static bool RemoveDeleteHook(DeleteHook hook) {
117 return MallocHook_RemoveDeleteHook(hook);
119 inline static void InvokeDeleteHook(const void* p);
121 // The PreMmapHook is invoked with mmap or mmap64 arguments just
122 // before the call is actually made. Such a hook may be useful
123 // in memory limited contexts, to catch allocations that will exceed
124 // a memory limit, and take outside actions to increase that limit.
125 typedef MallocHook_PreMmapHook PreMmapHook;
126 inline static bool AddPreMmapHook(PreMmapHook hook) {
127 return MallocHook_AddPreMmapHook(hook);
129 inline static bool RemovePreMmapHook(PreMmapHook hook) {
130 return MallocHook_RemovePreMmapHook(hook);
132 inline static void InvokePreMmapHook(const void* start,
133 size_t size,
134 int protection,
135 int flags,
136 int fd,
137 off_t offset);
139 // The MmapReplacement is invoked after the PreMmapHook but before
140 // the call is actually made. The MmapReplacement should return true
141 // if it handled the call, or false if it is still necessary to
142 // call mmap/mmap64.
143 // This should be used only by experts, and users must be be
144 // extremely careful to avoid recursive calls to mmap. The replacement
145 // should be async signal safe.
146 // Only one MmapReplacement is supported. After setting an MmapReplacement
147 // you must call RemoveMmapReplacement before calling SetMmapReplacement
148 // again.
149 typedef MallocHook_MmapReplacement MmapReplacement;
150 inline static bool SetMmapReplacement(MmapReplacement hook) {
151 return MallocHook_SetMmapReplacement(hook);
153 inline static bool RemoveMmapReplacement(MmapReplacement hook) {
154 return MallocHook_RemoveMmapReplacement(hook);
156 inline static bool InvokeMmapReplacement(const void* start,
157 size_t size,
158 int protection,
159 int flags,
160 int fd,
161 off_t offset,
162 void** result);
165 // The MmapHook is invoked whenever a region of memory is mapped.
166 // It may be passed MAP_FAILED if the mmap failed.
167 typedef MallocHook_MmapHook MmapHook;
168 inline static bool AddMmapHook(MmapHook hook) {
169 return MallocHook_AddMmapHook(hook);
171 inline static bool RemoveMmapHook(MmapHook hook) {
172 return MallocHook_RemoveMmapHook(hook);
174 inline static void InvokeMmapHook(const void* result,
175 const void* start,
176 size_t size,
177 int protection,
178 int flags,
179 int fd,
180 off_t offset);
182 // The MunmapReplacement is invoked with munmap arguments just before
183 // the call is actually made. The MunmapReplacement should return true
184 // if it handled the call, or false if it is still necessary to
185 // call munmap.
186 // This should be used only by experts. The replacement should be
187 // async signal safe.
188 // Only one MunmapReplacement is supported. After setting an
189 // MunmapReplacement you must call RemoveMunmapReplacement before
190 // calling SetMunmapReplacement again.
191 typedef MallocHook_MunmapReplacement MunmapReplacement;
192 inline static bool SetMunmapReplacement(MunmapReplacement hook) {
193 return MallocHook_SetMunmapReplacement(hook);
195 inline static bool RemoveMunmapReplacement(MunmapReplacement hook) {
196 return MallocHook_RemoveMunmapReplacement(hook);
198 inline static bool InvokeMunmapReplacement(const void* p,
199 size_t size,
200 int* result);
202 // The MunmapHook is invoked whenever a region of memory is unmapped.
203 typedef MallocHook_MunmapHook MunmapHook;
204 inline static bool AddMunmapHook(MunmapHook hook) {
205 return MallocHook_AddMunmapHook(hook);
207 inline static bool RemoveMunmapHook(MunmapHook hook) {
208 return MallocHook_RemoveMunmapHook(hook);
210 inline static void InvokeMunmapHook(const void* p, size_t size);
212 // The MremapHook is invoked whenever a region of memory is remapped.
213 typedef MallocHook_MremapHook MremapHook;
214 inline static bool AddMremapHook(MremapHook hook) {
215 return MallocHook_AddMremapHook(hook);
217 inline static bool RemoveMremapHook(MremapHook hook) {
218 return MallocHook_RemoveMremapHook(hook);
220 inline static void InvokeMremapHook(const void* result,
221 const void* old_addr,
222 size_t old_size,
223 size_t new_size,
224 int flags,
225 const void* new_addr);
227 // The PreSbrkHook is invoked just before sbrk is called -- except when
228 // the increment is 0. This is because sbrk(0) is often called
229 // to get the top of the memory stack, and is not actually a
230 // memory-allocation call. It may be useful in memory-limited contexts,
231 // to catch allocations that will exceed the limit and take outside
232 // actions to increase such a limit.
233 typedef MallocHook_PreSbrkHook PreSbrkHook;
234 inline static bool AddPreSbrkHook(PreSbrkHook hook) {
235 return MallocHook_AddPreSbrkHook(hook);
237 inline static bool RemovePreSbrkHook(PreSbrkHook hook) {
238 return MallocHook_RemovePreSbrkHook(hook);
240 inline static void InvokePreSbrkHook(ptrdiff_t increment);
242 // The SbrkHook is invoked whenever sbrk is called -- except when
243 // the increment is 0. This is because sbrk(0) is often called
244 // to get the top of the memory stack, and is not actually a
245 // memory-allocation call.
246 typedef MallocHook_SbrkHook SbrkHook;
247 inline static bool AddSbrkHook(SbrkHook hook) {
248 return MallocHook_AddSbrkHook(hook);
250 inline static bool RemoveSbrkHook(SbrkHook hook) {
251 return MallocHook_RemoveSbrkHook(hook);
253 inline static void InvokeSbrkHook(const void* result, ptrdiff_t increment);
255 // Get the current stack trace. Try to skip all routines up to and
256 // and including the caller of MallocHook::Invoke*.
257 // Use "skip_count" (similarly to GetStackTrace from stacktrace.h)
258 // as a hint about how many routines to skip if better information
259 // is not available.
260 inline static int GetCallerStackTrace(void** result, int max_depth,
261 int skip_count) {
262 return MallocHook_GetCallerStackTrace(result, max_depth, skip_count);
265 // Unhooked versions of mmap() and munmap(). These should be used
266 // only by experts, since they bypass heapchecking, etc.
267 // Note: These do not run hooks, but they still use the MmapReplacement
268 // and MunmapReplacement.
269 static void* UnhookedMMap(void *start, size_t length, int prot, int flags,
270 int fd, off_t offset);
271 static int UnhookedMUnmap(void *start, size_t length);
273 // The following are DEPRECATED.
274 inline static NewHook GetNewHook();
275 inline static NewHook SetNewHook(NewHook hook) {
276 return MallocHook_SetNewHook(hook);
279 inline static DeleteHook GetDeleteHook();
280 inline static DeleteHook SetDeleteHook(DeleteHook hook) {
281 return MallocHook_SetDeleteHook(hook);
284 inline static PreMmapHook GetPreMmapHook();
285 inline static PreMmapHook SetPreMmapHook(PreMmapHook hook) {
286 return MallocHook_SetPreMmapHook(hook);
289 inline static MmapHook GetMmapHook();
290 inline static MmapHook SetMmapHook(MmapHook hook) {
291 return MallocHook_SetMmapHook(hook);
294 inline static MunmapHook GetMunmapHook();
295 inline static MunmapHook SetMunmapHook(MunmapHook hook) {
296 return MallocHook_SetMunmapHook(hook);
299 inline static MremapHook GetMremapHook();
300 inline static MremapHook SetMremapHook(MremapHook hook) {
301 return MallocHook_SetMremapHook(hook);
304 inline static PreSbrkHook GetPreSbrkHook();
305 inline static PreSbrkHook SetPreSbrkHook(PreSbrkHook hook) {
306 return MallocHook_SetPreSbrkHook(hook);
309 inline static SbrkHook GetSbrkHook();
310 inline static SbrkHook SetSbrkHook(SbrkHook hook) {
311 return MallocHook_SetSbrkHook(hook);
313 // End of DEPRECATED methods.
315 private:
316 // Slow path versions of Invoke*Hook.
317 static void InvokeNewHookSlow(const void* p, size_t s);
318 static void InvokeDeleteHookSlow(const void* p);
319 static void InvokePreMmapHookSlow(const void* start,
320 size_t size,
321 int protection,
322 int flags,
323 int fd,
324 off_t offset);
325 static void InvokeMmapHookSlow(const void* result,
326 const void* start,
327 size_t size,
328 int protection,
329 int flags,
330 int fd,
331 off_t offset);
332 static bool InvokeMmapReplacementSlow(const void* start,
333 size_t size,
334 int protection,
335 int flags,
336 int fd,
337 off_t offset,
338 void** result);
339 static void InvokeMunmapHookSlow(const void* p, size_t size);
340 static bool InvokeMunmapReplacementSlow(const void* p,
341 size_t size,
342 int* result);
343 static void InvokeMremapHookSlow(const void* result,
344 const void* old_addr,
345 size_t old_size,
346 size_t new_size,
347 int flags,
348 const void* new_addr);
349 static void InvokePreSbrkHookSlow(ptrdiff_t increment);
350 static void InvokeSbrkHookSlow(const void* result, ptrdiff_t increment);
353 #ifdef _MSC_VER
354 #pragma warning(pop)
355 #endif
358 #endif /* _MALLOC_HOOK_H_ */