1
1
forked from 0ad/0ad
0ad/source/lib/mmgr.cpp
janwas bc519cc671 prevent crash if lib_error association code is called before _cinit (happens if there's a problem with whrt init).
instead of std::map, use a linked list of static LibErrorAssociation
instances. (also simplifies the process of registering error
codes/descriptions)

module_init: remove warning (happens in normal operation)
win: add fixed InterlockedExchangePointer definition
mahaf: no longer warn if stopping the service failed because it wasn't
started

This was SVN commit r5104.
2007-05-28 09:20:55 +00:00

1421 lines
35 KiB
C++

/**
* =========================================================================
* File : mmgr.cpp
* Project : 0 A.D.
* Description : memory manager and tracker.
* =========================================================================
*/
// license: GPL; see lib/license.txt
#include "precompiled.h"
ERROR_ASSOCIATE(ERR::MEM_ALLOC_NOT_FOUND, "Not a valid allocated address", -1);
ERROR_ASSOCIATE(ERR::MEM_OVERWRITTEN, "Wrote to memory outside valid allocation", -1);
// for easy removal in release builds, so that we don't cause any overhead.
// note that any application calls to our functions must be removed also,
// but this is preferable to stubbing them out here ("least surprise").
#if CONFIG_USE_MMGR
#include "mmgr.h"
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <time.h>
#include <stdarg.h>
#include <new>
#include "posix/posix.h"
#include "debug.h"
// remove macro hooks (we need to use the actual malloc/new etc. routines)
#include "nommgr.h"
//////////////////////////////////////////////////////////////////////////////
// locking for thread safety
//////////////////////////////////////////////////////////////////////////////
static pthread_mutex_t mutex;
// prevents using uninitialized lock before init (due to undefined
// NLSO ctor call order) or after shutdown
static bool lock_initialized;
static void lock_init() throw()
{
if(pthread_mutex_init(&mutex, 0) == 0)
lock_initialized = true;
}
static void lock_shutdown() throw()
{
WARN_ERR(pthread_mutex_destroy(&mutex));
lock_initialized = false;
}
static void lock() throw()
{
if(lock_initialized)
WARN_ERR(pthread_mutex_lock(&mutex));
}
static void unlock() throw()
{
if(lock_initialized)
WARN_ERR(pthread_mutex_unlock(&mutex));
}
//////////////////////////////////////////////////////////////////////////////
// options (enable/disable additional checks)
//////////////////////////////////////////////////////////////////////////////
// we can induce allocations to fail, for testing the application's
// error handling. uncomment and set to percentage that should fail.
// note: we use #define to make absolutely sure no
// failures are induced unless desired.
//#define RANDOM_FAILURE 10.0
// note: padding size is in bytes, and is added before and after the
// user's buffer. pattern_set assumes it's an integral number of ulongs.
// enable all checks (slow!)
#if CONFIG_PARANOIA
static uint options = MMGR_ALL;
static const size_t padding_size = 256 * sizeof(ulong);
// normal settings
#else
static uint options = 0;
static const size_t padding_size = 1 * sizeof(ulong);
#endif
uint mmgr_set_options(uint new_options)
{
lock();
if(new_options != MMGR_QUERY)
{
debug_assert(!(new_options & ~MMGR_ALL) && "unrecognized options set");
options = new_options;
}
uint ret = options;
unlock();
return ret;
}
//////////////////////////////////////////////////////////////////////////////
// string formatting routines for log and reports
//////////////////////////////////////////////////////////////////////////////
const size_t NUM_SIZE = 32;
// enough to cover even 64 bit numbers
static const char* insert_commas(char* out, size_t value)
{
char num[NUM_SIZE];
sprintf(num, "%u", value);
const size_t num_len = strlen(num);
debug_assert(num_len != 0); // messes up #comma calc below
const size_t out_len = num_len + (num_len-1)/3;
char* pos = out+out_len;
*pos-- = '\0';
uint digits = 0;
for(int i = (int)num_len-1; i >= 0; i--)
{
*pos-- = num[i];
if(++digits == 3 && i != 0)
{
*pos-- = ',';
digits = 0;
}
}
return out;
}
static const char* format_size_string(char* str, size_t value)
{
char num[NUM_SIZE];
(void)insert_commas(num, value);
if(value > GiB)
sprintf(str, "%10s (%7.2fGi)", num, value / (float)GiB);
else if(value > MiB)
sprintf(str, "%10s (%7.2fMi)", num, value / (float)MiB);
else if(value > KiB)
sprintf(str, "%10s (%7.2fKi)", num, value / (float)KiB);
else
sprintf(str, "%10s bytes ", num);
return str;
}
//////////////////////////////////////////////////////////////////////////////
// allocator for Alloc objects
//////////////////////////////////////////////////////////////////////////////
enum AllocType
{
AT_UNKNOWN = 0,
AT_MALLOC = 1,
AT_CALLOC = 2,
AT_REALLOC = 3,
AT_FREE = 4,
AT_NEW = 5,
AT_NEW_ARRAY = 6,
AT_DELETE = 7,
AT_DELETE_ARRAY = 8,
AT_INVALID = 9
};
// must match enum AllocType!
static const char* types[] =
{
"unknown",
"malloc",
"calloc",
"realloc",
"free",
"new",
"new[]",
"delete",
"delete[]",
};
struct Alloc
{
void* p;
size_t size;
uint num;
Alloc* next;
Alloc* prev;
const char* owner;
uint type : 4;
uint break_on_free : 1;
uint break_on_realloc : 1;
void* user_p() const
{
return (char*)p + padding_size;
}
size_t user_size() const
{
return size - padding_size*2;
}
};
static Alloc* freelist;
static Alloc** reservoirs = 0; // array of pointers to runs of 256 Allocs
static size_t num_reservoirs = 0; // # entries
static Alloc* alloc_new()
{
// If necessary, grow the freelist of unused Allocs
if(!freelist)
{
freelist = (Alloc*)calloc(256, sizeof(Alloc));
if(!freelist)
{
DEBUG_WARN_ERR(ERR::NO_MEM);
return 0;
}
for(uint i = 0; i < 256 - 1; i++)
freelist[i].next = &freelist[i+1];
const size_t bytes = (num_reservoirs + 1) * sizeof(Alloc*);
Alloc* *temp = (Alloc* *) realloc(reservoirs, bytes);
debug_assert(temp);
if(temp)
{
reservoirs = temp;
reservoirs[num_reservoirs++] = freelist;
}
}
// Grab a new Alloc from the front of the freelist
Alloc* a = freelist;
freelist = a->next;
return a;
}
static void alloc_delete(Alloc* a)
{
memset(a, 0, sizeof(Alloc));
// add to the front of our freelist of unused Allocs
a->next = freelist;
freelist = a;
}
static void alloc_shutdown()
{
if(reservoirs)
{
for(uint i = 0; i < num_reservoirs; i++)
free(reservoirs[i]);
free(reservoirs);
reservoirs = 0;
num_reservoirs = 0;
freelist = 0;
}
}
//////////////////////////////////////////////////////////////////////////////
// user allocation pointer -> Alloc lookup data structure
//////////////////////////////////////////////////////////////////////////////
// rationale:
// - split into separate routines (as opposed to exposing details to
// user code) for easier modification.
// - may as well have used STL hash_map, but it's non-standard
// thus far, and we have a hand-rolled container already.
static const size_t hash_entries = (1u << 11)+1;
// ~8kb memory used; prime for better distribution
static Alloc* hash_table[hash_entries];
// return pointer to list of all Allocs with the same pointer hash.
static Alloc*& hash_chain(const void* pointer)
{
uintptr_t address = reinterpret_cast<uintptr_t>(pointer);
size_t index = ((size_t)address >> 4) % hash_entries;
// many allocations are 16-byte aligned, so shift off lower 4 bits
// (=> better hash distribution)
return hash_table[index];
}
static void allocs_remove(const Alloc* a)
{
Alloc*& chain = hash_chain(a->user_p());
// it was at head of chain
if(chain == a)
chain = a->next;
// in middle of chain
else
{
if(a->prev)
a->prev->next = a->next;
if(a->next)
a->next->prev = a->prev;
}
}
static void allocs_add(Alloc* a)
{
Alloc*& chain = hash_chain(a->user_p());
if(chain)
chain->prev = a;
a->next = chain;
a->prev = 0;
chain = a;
}
static Alloc* allocs_find(const void* user_p)
{
if(!user_p)
debug_assert(user_p);
Alloc* a = hash_chain(user_p);
while(a)
{
if(a->user_p() == user_p)
break;
a = a->next;
}
return a;
}
static void allocs_foreach(void (*cb)(const Alloc*, void*), void* arg)
{
for(uint i = 0; i < hash_entries; i++)
{
const Alloc* a = hash_table[i];
while(a)
{
cb(a, arg);
a = a->next;
}
}
}
//////////////////////////////////////////////////////////////////////////////
// padding: make sure the user hasn't over/underrun their buffer.
//////////////////////////////////////////////////////////////////////////////
static const ulong pattern_before = 0xbaadf00d;
static const ulong pattern_after = 0xdeadc0de;
static const ulong pattern_unused = 0xfeedface;
static const ulong pattern_freed = 0xdeadbeef;
static void pattern_set(const Alloc* a, ulong pattern)
{
// fill user's data (optional)
// note: don't use memset, because we want multi-byte patterns
if(options & MMGR_FILL && a->user_size() > 0)
{
u8* p = (u8*)a->user_p();
const size_t size = a->user_size();
// write whole ulongs
for(size_t i = 0; i < size / sizeof(ulong); i++)
{
*(ulong*)p = pattern;
p += sizeof(ulong);
}
// remainder
for(size_t shift = 0; shift < (size % sizeof(ulong)) * 8; shift += 8)
*p++ = (u8)((pattern >> shift) & 0xff);
}
// fill prefix/postfix bytes (note: integral number of ulongs)
ulong* pre = (ulong*)a->p;
ulong* post = (ulong*)( (char*)a->p + a->size - padding_size );
for(uint i = 0; i < padding_size / sizeof(ulong); i++)
{
*pre++ = pattern_before;
*post++ = pattern_after;
// note: doesn't need to be split into 2 loops; cache is A2
}
}
static bool padding_is_intact(const Alloc* a, ulong **corrupt_address)
{
*corrupt_address=NULL;
ulong* pre = (ulong*)a->p;
ulong* post = (ulong*)( (char*)a->p + a->size - padding_size );
for(uint i = 0; i < padding_size / sizeof(ulong); i++)
{
if(pre[i] != pattern_before)
{
*corrupt_address=&pre[i];
return false;
}
else if (post[i] != pattern_after)
{
*corrupt_address=&post[i];
return false;
}
}
return true;
}
static inline size_t calc_actual_size(const size_t user_size)
{
return user_size + padding_size*2u;
}
static inline void* calc_user_p(const void* actual_p)
{
if(!actual_p)
return 0;
return (char*)actual_p + padding_size;
}
//////////////////////////////////////////////////////////////////////////////
// unused memory reporting
//////////////////////////////////////////////////////////////////////////////
// return byte size of all the ulongs in the allocation whose contents
// haven't changed from the "unused" pattern since allocation.
// called from calc_all_unused_cb and log_this_alloc.
static size_t calc_unused(const Alloc* a)
{
size_t total = 0;
const ulong* p = (const ulong*)a->user_p();
for(uint i = 0; i < a->user_size(); i += sizeof(ulong))
if(*p++ == pattern_unused)
total += sizeof(long);
return total;
}
static void calc_all_unused_cb(const Alloc* a, void* arg)
{
size_t* ptotal = (size_t*)arg;
*ptotal += calc_unused(a);
}
// return total unused size in all allocations.
static size_t calc_all_unused()
{
size_t total = 0;
allocs_foreach(calc_all_unused_cb, &total);
return total;
}
//////////////////////////////////////////////////////////////////////////////
// statistics: track current, cumulative, and peak allocations
//////////////////////////////////////////////////////////////////////////////
static struct Stats
{
size_t cur_user_mem;
size_t peak_user_mem;
size_t total_user_mem;
size_t cur_mem;
size_t peak_mem;
size_t total_mem;
size_t cur_allocs;
size_t peak_allocs;
size_t total_allocs;
} stats;
// note: also called when reallocating. cumulative # allocations
// will increase, but that makes sense.
static void stats_add(const Alloc* a)
{
const size_t size = a->size;
const size_t user_size = a->user_size();
stats.cur_user_mem += user_size;
stats.cur_mem += size;
stats.cur_allocs++;
stats.total_user_mem += user_size;
stats.total_mem += size;
stats.total_allocs++;
stats.peak_user_mem = std::max(stats.peak_user_mem, stats.cur_user_mem);
stats.peak_mem = std::max(stats.peak_mem, stats.cur_mem);
stats.peak_allocs = std::max(stats.peak_allocs, stats.cur_allocs);
}
static void stats_remove(const Alloc* a)
{
const size_t size = a->size;
const size_t user_size = a->user_size();
stats.cur_user_mem -= user_size;
stats.cur_mem -= size;
stats.cur_allocs--;
}
//////////////////////////////////////////////////////////////////////////////
// logging to file
//////////////////////////////////////////////////////////////////////////////
static void log_init();
static const char* const log_filename = "mem_log.txt";
static FILE* log_fp;
// open/append/close every call to make sure nothing gets lost when crashing.
// split out of log() to allow locked_log without code duplication.
static void vlog(const char* fmt, va_list args)
{
log_init();
(void)vfprintf(log_fp, fmt, args);
// user requested each log line go directly to disk.
if(options & MMGR_FLUSH_LOG)
fflush(log_fp);
}
static void log(const char* fmt, ...)
{
va_list args;
va_start(args, fmt);
vlog(fmt, args);
va_end(args);
}
// convenience function for overloaded new/delete that generate warnings
static void locked_log(const char* fmt, ...)
{
lock();
va_list args;
va_start(args, fmt);
vlog(fmt, args);
va_end(args);
unlock();
}
static void log_init()
{
// open => we're already initialized.
if(log_fp)
return;
log_fp = fopen(log_filename, "w");
if(!log_fp)
{
debug_assert(0 && "log file open failed");
return;
}
//
// write header
//
// get current time as string.
// doesn't need to be reentrant, but we need to use strftime
// elsewhere, so stick with it for consistency.
char time_str[100];
time_t t = time(0);
const struct tm* tm_ = localtime(&t);
(void)strftime(time_str, sizeof(time_str), "%#c", tm_);
log("Memory manager log, started on %s.\n", time_str);
log("\n");
log("Logs errors, operations, and mmgr calls, depending on settings.\n");
log("Entry types:\n");
log("\n");
log(" [!] - Error\n");
log(" [?] - Warning\n");
log(" [+] - Allocation\n");
log(" [~] - Reallocation\n");
log(" [-] - Deallocation\n");
log(" [I] - Information\n");
log(" [F] - Induced random failure to test the app's error handling\n");
log(" [D] - Debug information for debugging mmgr\n");
log("\n");
log("Problematic allocations can be tracked by address+owner or number.\n");
log("\n");
}
static void log_shutdown()
{
if(log_fp)
{
fclose(log_fp);
log_fp = 0;
}
}
static void log_this_alloc(const Alloc* a)
{
// duplicated in write_alloc_cb(); factoring out isn't worth it
log("%06d 0x%08p 0x%08X 0x%08p 0x%08X 0x%08X %-8s %c %c %s\n",
a->num,
a->user_p(), a->user_size(),
a->p, a->size,
calc_unused(a),
types[a->type],
a->break_on_free ? 'Y':'N',
a->break_on_realloc ? 'Y':'N',
a->owner
);
}
//////////////////////////////////////////////////////////////////////////////
// write report text files (leaks, statistics)
//////////////////////////////////////////////////////////////////////////////
static void write_alloc_cb(const Alloc* a, void* arg)
{
FILE* f = (FILE*)arg;
// duplicated in log_this_alloc(Alloc*); factoring out isn't worth it
fprintf(f, "%06d 0x%08p 0x%08X 0x%08p 0x%08X 0x%08X %-8s %c %c %s\n",
a->num,
a->user_p(), a->user_size(),
a->p, a->size,
calc_unused(a),
types[a->type],
a->break_on_free ? 'Y':'N',
a->break_on_realloc ? 'Y':'N',
a->owner
);
}
static void write_all_allocs(FILE* f)
{
fprintf(f, "Alloc. Addr Size Addr Size BreakOn BreakOn \n");
fprintf(f, "Number Reported Reported Actual Actual Unused Method Dealloc Realloc Allocated by \n");
fprintf(f, "------ ---------- ---------- ---------- ---------- ---------- -------- ------- ------- --------------------------------------------------- \n");
allocs_foreach(write_alloc_cb, f);
}
void mmgr_write_report(void)
{
FILE* f = fopen("mem_report.txt", "w");
if(!f)
{
debug_assert(0 && "open of memory report file failed");
return;
}
// get current time as string
// (needs to be reentrant, so don't use asctime et al)
char time_str[100];
time_t t = time(0);
const struct tm* tm_ = localtime(&t);
(void)strftime(time_str, sizeof(time_str), "%#c", tm_);
fprintf(f, "Detailed memory report:\n");
fprintf(f, "Built %s %s; test run ended on %s\n", __DATE__, __TIME__, time_str);
fprintf(f, "\n");
char num[NUM_SIZE];
char size[99]; // more than enough
fprintf(f, "Unused:\n");
fprintf(f, "-------\n");
fprintf(f, "Memory allocated but not in use: %s\n", format_size_string(size, calc_all_unused()));
fprintf(f, "\n");
fprintf(f, "Peaks:\n");
fprintf(f, "------\n");
fprintf(f, " Allocation unit count: %10s\n", insert_commas(num, stats.peak_allocs));
fprintf(f, " Reported to application: %s\n", format_size_string(size, stats.peak_user_mem));
fprintf(f, " Actual: %s\n", format_size_string(size, stats.peak_mem));
fprintf(f, " Memory tracking overhead: %s\n", format_size_string(size, stats.peak_mem - stats.peak_user_mem));
fprintf(f, "\n");
fprintf(f, "Totals:\n");
fprintf(f, "-------\n");
fprintf(f, " Allocation unit count: %10s\n", insert_commas(num, stats.total_allocs));
fprintf(f, " Reported to application: %s\n", format_size_string(size, stats.total_user_mem));
fprintf(f, " Actual: %s\n", format_size_string(size, stats.total_mem));
fprintf(f, " Memory tracking overhead: %s\n", format_size_string(size, stats.total_mem - stats.total_user_mem));
fprintf(f, "\n");
fprintf(f, "Current:\n");
fprintf(f, "--------\n");
fprintf(f, " Allocation count: %10s\n", insert_commas(num, stats.cur_allocs));
fprintf(f, " Reported to application: %s\n", format_size_string(size, stats.cur_user_mem));
fprintf(f, " Actual: %s\n", format_size_string(size, stats.cur_mem));
fprintf(f, " Memory tracking overhead: %s\n", format_size_string(size, stats.cur_mem - stats.cur_user_mem));
fprintf(f, "\n");
write_all_allocs(f);
fclose(f);
}
// only generate leak report at exit if the app has called
// mmgr_write_leak_report, since it's slow.
static bool app_wants_leak_report = false;
// separate from the main report - this is updated on every deallocate
// call when exiting, because each call may be the last
// (we can't say "everything after app shutdown is a leak", because
// it's common, albeit bad practice, for NLSOs to allocate memory).
void mmgr_write_leak_report(void)
{
app_wants_leak_report = true;
FILE* f = fopen("mem_leaks.txt", "w");
if(!f)
{
debug_assert(0 && "open of memory leak report file failed");
return;
}
// get current time as string
// (needs to be reentrant, so don't use asctime et al)
char time_str[100];
time_t t = time(0);
const struct tm* tm_ = localtime(&t);
(void)strftime(time_str, sizeof(time_str), "%#c", tm_);
fprintf(f, "Memory leak report:\n");
fprintf(f, "Built %s %s; test run ended on %s\n", __DATE__, __TIME__, time_str);
fprintf(f, "\n");
const size_t num_leaks = stats.cur_allocs;
if(num_leaks)
{
fprintf(f, "%d memory leak%s found:\n", num_leaks, num_leaks == 1 ? "":"s");
fprintf(f, "\n");
write_all_allocs(f);
}
else
fprintf(f, "No leaks found! Congratulations!\n");
fclose(f);
}
//////////////////////////////////////////////////////////////////////////////
// user-callable integrity checks
//////////////////////////////////////////////////////////////////////////////
static bool alloc_is_valid(const Alloc *a);
bool mmgr_is_valid_ptr(const void* p)
{
// null pointer - won't even try ;-)
if (p == NULL)
return false;
lock();
Alloc *a=allocs_find(p);
bool found = a != NULL && alloc_is_valid(a);
unlock();
return found;
}
static bool alloc_is_valid(const Alloc* a)
{
// catch(...) is really evil in that it stops serious and unexpected
// exceptions (e.g. "hardware is on fire") from getting through, but
// there's really no alternative, since padding_is_intact is very
// likely to crash if the Alloc is corrupted.
// TODO Linux doesn't treat e.g. SIGSEGV as an exception (crashes instead)
// Research linux/unix/gcc alternative for catching those (signal handler
// and set/longjmp?)
bool intact;
ulong *p=NULL; // The corrupted address
try
{
intact = padding_is_intact(a, &p);
}
catch(...)
{
intact = false;
}
// this allocation has been over/underrun (i.e. modified outside the
// allocation's memory range) or is otherwise corrupt.
if(!intact)
{
// if p is between a->p and a->p+padding_size, accuse a and the alloc
// before a, if p is between a->p+a->size-padding_size and a->p+a->size,
// accuse a and the alloc after a
// TODO This doesn't really find out the next/previous alloc area, just
// prints the address, which end was currupted, and the data found
if (p)
{
u8 *user_p = (u8 *)a->user_p();
u8 *user_p_end = ((u8*)a->user_p()) + a->user_size();
ulong expected=0;
if ((u8*)p < user_p)
{
log("[!] Memory underrun: padding currupt at offset %d (bytes)\n",
((u8 *)p)-user_p);
expected=pattern_before;
}
else
{
log("[!] Memory overrun: padding currupt at %d bytes past end of buffer\n",
((u8 *)p)-user_p_end);
expected=pattern_after;
}
log("[!] Memory over/underrun: expected padding %08x, found garbage %08x\n", expected, *p);
}
else
log("[!] alloc_is_valid encountered an exception - something may be very wrong!\n");
log_this_alloc(a);
DEBUG_WARN_ERR(ERR::MEM_OVERWRITTEN);
}
return intact;
}
struct ValidateAllParams
{
uint num_invalid;
uint num_allocs;
};
static void validate_all_cb(const Alloc* a, void* arg)
{
ValidateAllParams* p = (ValidateAllParams*)arg;
p->num_allocs++;
if(!alloc_is_valid(a))
p->num_invalid++;
}
// provide separate lock-is-held version to prevent recursive locks.
// called from mmgr_alloc/realloc/free; return true if all are valid.
static bool validate_all()
{
ValidateAllParams params = { 0, 0 };
allocs_foreach(validate_all_cb, &params);
// Test for hash-table correctness
if(params.num_allocs != stats.cur_allocs)
{
// our internal pointer->Alloc lookup data structure is inconsistent!
// enable MMGR_VALIDATE_ALL, trigger this condition again,
// and check the log for the last successful operation. the problem
// will have occurred between then and now.
DEBUG_WARN_ERR(ERR::CORRUPTED);
log("[!] Memory tracking hash table corrupt!\n");
}
if(params.num_invalid)
{
DEBUG_WARN_ERR(ERR::MEM_OVERWRITTEN);
log("[!] %d allocations are corrupt\n", params.num_invalid);
return false;
}
return true;
}
bool mmgr_are_all_valid()
{
lock();
// do our check first, because it fails more cleanly
// (=> better chance to see where it happened in the debugger)
bool all_valid = validate_all();
debug_heap_check();
unlock();
return all_valid;
}
//////////////////////////////////////////////////////////////////////////////
// init/shutdown hook - notifies us when ctor/dtor are called
//////////////////////////////////////////////////////////////////////////////
static bool static_dtor_called = false;
static struct NonLocalStaticObject
{
NonLocalStaticObject()
{
// by calling now instead of on first lock() call,
// we ensure no threads have been spawned yet.
lock_init();
// note: don't init log here - current directory hasn't yet been set.
// the log file may otherwise be split between 2 files.
}
~NonLocalStaticObject()
{
// if the app requested a leak report before now, the deallocator
// will update its leak report on every call (since dtors are now
// being called, each may be the last). note that there is no
// portable way to make sure a mmgr_shutdown() would be called
// as the very last thing before exit.
static_dtor_called = true;
// don't shutdown the lock - some threads may still be active.
// do so in shutdown() - see call site.
}
} nlso;
static void shutdown(void)
{
alloc_shutdown();
log_shutdown();
lock_shutdown();
}
//////////////////////////////////////////////////////////////////////////////
// trigger breakpoint when accessing specified allocations
//////////////////////////////////////////////////////////////////////////////
static uint cur_alloc_count = 0;
static uint break_on_count = 0;
void mmgr_break_on_alloc(uint count)
{
lock();
break_on_count = count;
unlock();
}
void mmgr_break_on_realloc(const void* p)
{
lock();
Alloc* a = allocs_find(p);
if(!a)
{
debug_assert(0 && "setting realloc breakpoint on invalid pointer");
return;
}
// setting realloc breakpoint on an allocation that
// doesn't support realloc.
debug_assert(a->type == AT_MALLOC || a->type == AT_CALLOC ||
a->type == AT_REALLOC);
a->break_on_realloc = true;
unlock();
}
void mmgr_break_on_free(const void* p)
{
lock();
Alloc* a = allocs_find(p);
if(!a)
{
debug_assert(0 && "setting free breakpoint on invalid pointer");
return;
}
a->break_on_free = true;
unlock();
}
//////////////////////////////////////////////////////////////////////////////
// actual allocator, making use of all of the above :)
//////////////////////////////////////////////////////////////////////////////
void* alloc_dbg(size_t user_size, AllocType type, const char* file, int line, const char* func, uint stack_frames)
{
void* ret = 0;
lock();
if(options & MMGR_TRACE)
log("[D] ENTER: alloc_dbg\n");
void* caller = debug_get_nth_caller(1+stack_frames, 0);
const char* caller_string = debug_get_symbol_string(caller, func, file, line);
if(options & MMGR_LOG_ALL)
log("[+] %05d %8s of size 0x%08X(%08d) by %s\n", cur_alloc_count, types[type], user_size, user_size, caller_string);
// caller's source file didn't include "mmgr.h"
debug_assert(type != AT_UNKNOWN);
// you requested a breakpoint on this allocation number
++cur_alloc_count;
debug_assert(cur_alloc_count != break_on_count);
// simulate random failures
#ifdef RANDOM_FAILURE
{
double a = rand();
double b = RAND_MAX / 100.0 * RANDOM_FAILURE;
if(a < b)
{
log("[F] Random induced failure\n");
goto fail;
}
}
#endif
const size_t size = calc_actual_size(user_size);
void* p = malloc(size);
if(!p)
{
DEBUG_WARN_ERR(ERR::NO_MEM);
log("[!] Allocation failed (out of memory)\n");
goto fail;
}
{
Alloc* a = alloc_new();
if(!a)
goto fail;
a->p = p;
a->size = size;
a->num = cur_alloc_count;
a->owner = caller_string;
a->type = type;
a->break_on_free = a->break_on_realloc = 0;
allocs_add(a);
stats_add(a);
pattern_set(a, pattern_unused);
// calloc() must zero the memory
if(type == AT_CALLOC)
memset(a->user_p(), 0, a->user_size());
if(options & MMGR_LOG_ALL)
log("[+] ----> addr 0x%08p\n", a->user_p());
ret = a->user_p();
}
fail:
if(options & MMGR_VALIDATE_ALL)
(void)validate_all();
if(options & MMGR_TRACE)
log("[D] EXIT : alloc_dbg\n");
unlock();
return ret;
}
void free_dbg(const void* user_p, AllocType type, const char* file, int line, const char* func, uint stack_frames)
{
lock();
if(options & MMGR_TRACE)
log("[D] ENTER: free_dbg\n");
void* caller = debug_get_nth_caller(1+stack_frames, 0);
const char* caller_string = debug_get_symbol_string(caller, func, file, line);
if(options & MMGR_LOG_ALL)
log("[-] ----- %8s of addr 0x%08p by %s\n", types[type], user_p, caller_string);
// freeing a zero pointer is allowed by C and C++, and a no-op.
if(!user_p)
goto done;
//
// security checks
//
{
Alloc* a = allocs_find(user_p);
if(!a)
{
log("[!] mmgr_free: not allocated by this memory manager\n");
DEBUG_WARN_ERR(ERR::MEM_ALLOC_NOT_FOUND);
goto fail;
}
// .. overrun? (note: alloc_is_valid already asserts if invalid)
alloc_is_valid(a);
// .. the owner wasn't compiled with mmgr.h
debug_assert(type != AT_UNKNOWN);
// .. allocator / deallocator type mismatch
debug_assert(
(type == AT_DELETE && a->type == AT_NEW ) ||
(type == AT_DELETE_ARRAY && a->type == AT_NEW_ARRAY) ||
(type == AT_FREE && a->type == AT_MALLOC ) ||
(type == AT_FREE && a->type == AT_CALLOC ) ||
(type == AT_FREE && a->type == AT_REALLOC )
);
// .. you requested a breakpoint when freeing this allocation
debug_assert(!a->break_on_free);
// "poison" the allocation's memory, to catch use-after-free bugs.
// the VC7 debug heap does this also (in free), so we're wasting time
// in that case. oh well, better to be safe/consistent.
pattern_set(a, pattern_freed);
free(a->p);
allocs_remove(a);
alloc_delete(a);
stats_remove(a);
}
// we're being called from destructors. each call may be the last.
if(static_dtor_called)
{
// update leak report (write a new one)
if(app_wants_leak_report)
mmgr_write_leak_report();
// all allocations have been freed. there's no better time to shut
// down, so do so now. (there's no portable way to call this as
// the very last thing before exit)
if(stats.cur_allocs == 0)
shutdown();
}
done:
fail:
if(options & MMGR_VALIDATE_ALL)
(void)validate_all();
if(options & MMGR_TRACE)
log("[D] EXIT : free_dbg\n");
unlock();
}
void* realloc_dbg(const void* user_p, size_t user_size, AllocType type, const char* file, int line, const char* func, uint stack_frames)
{
void* ret = 0;
size_t old_size = 0;
debug_assert(type == AT_REALLOC);
lock();
if(options & MMGR_TRACE)
log("[D] ENTER: realloc_dbg\n");
//
// security checks
//
if(user_p)
{
Alloc* a = allocs_find(user_p);
if(!a)
{
// you called realloc for a pointer mmgr didn't allocate
log("[!] realloc: wasn't previously allocated\n");
DEBUG_WARN_ERR(ERR::MEM_ALLOC_NOT_FOUND);
goto fail;
}
// .. the owner wasn't compiled with mmgr.h
debug_assert(a->type != AT_UNKNOWN);
// .. realloc for an allocation type that doesn't support it.
debug_assert(a->type == AT_MALLOC || a->type == AT_CALLOC ||
a->type == AT_REALLOC);
// .. you requested a breakpoint when reallocating this allocation
// (it will continue to be triggered unless you clear a->break_on_realloc)
debug_assert(!a->break_on_realloc);
old_size = a->size;
}
// else: skip security checks; realloc(0, size) is equivalent to malloc
unlock(); // avoid recursive lock
if(user_size)
ret = alloc_dbg(user_size, type, file,line,func, stack_frames+1);
// old_size should only be non-zero if the Alloc security checks all passed
// If the old buffer was actually zero bytes large, do nothing :P
if (old_size && ret)
cpu_memcpy(ret, user_p, std::min(old_size, user_size));
if(user_p)
free_dbg(user_p, AT_FREE, file,line,func, stack_frames+1);
lock();
if(options & MMGR_LOG_ALL)
{
log("[~] ----> from 0x%08X(%08d)\n", user_size, user_size);
log("[~] ----> addr 0x%08p\n", ret);
}
fail:
if(options & MMGR_VALIDATE_ALL)
(void)validate_all();
if(options & MMGR_TRACE)
log("[D] EXIT : realloc_dbg\n");
unlock();
return ret;
}
//////////////////////////////////////////////////////////////////////////////
// wrappers
//////////////////////////////////////////////////////////////////////////////
void* mmgr_malloc_dbg(size_t size, const char* file, int line, const char* func)
{
return alloc_dbg(size, AT_MALLOC, file,line,func, 1);
}
void* mmgr_calloc_dbg(size_t num, size_t size, const char* file, int line, const char* func)
{
return alloc_dbg(num*size, AT_CALLOC, file,line,func, 1);
}
void* mmgr_realloc_dbg(void* p, size_t size, const char* file, int line, const char* func)
{
return realloc_dbg(p, size, AT_REALLOC, file,line,func, 1);
}
void mmgr_free_dbg(void* p, const char* file, int line, const char* func)
{
return free_dbg(p, AT_FREE, file,line,func, 1);
}
//
// note: we can call mmgr_malloc_dbg because the macro hook has set
// file+line+func, so the stack trace info won't be used and frames-to-skip
// is irrelevant.
//
char* mmgr_strdup_dbg(const char* s, const char* file, int line, const char* func)
{
const size_t size = strlen(s)+1;
char* copy = (char*)mmgr_malloc_dbg(size, file,line,func);
if(!copy)
return 0;
strcpy(copy, s); // safe
return copy;
}
wchar_t* mmgr_wcsdup_dbg(const wchar_t* s, const char* file, int line, const char* func)
{
const size_t size = (wcslen(s) + 1) * sizeof(wchar_t);
wchar_t* copy = (wchar_t*)mmgr_malloc_dbg(size, file,line,func);
if(!copy)
return 0;
wcscpy(copy, s);
return copy;
}
//
// wrappers for more complicated functions that allocate memory.
// instead of reimplementing them entirely, we just make sure the memory
// returned here was allocated from our functions, so the user can call
// the hooked free().
//
char* mmgr_getcwd_dbg(char* buf, size_t buf_size, const char* file, int line, const char* func)
{
char* ret = getcwd(buf, buf_size);
// user already had a buffer or CRT version failed - pass on return value.
if(buf || !ret)
return ret;
char* copy = mmgr_strdup_dbg(ret, file,line,func);
free(ret);
return copy;
}
//
// note: separate versions for new/new[], and the VC debug new(file, line).
//
static void* new_common(size_t size, AllocType type,
const char* file, int line, const char* func)
{
const char* allocator = types[type];
if(options & MMGR_TRACE)
log("[D] ENTER: %s\n", allocator);
// C++ requires size==0 to return a unique address, so allocate 1 byte.
if(size == 0)
size = 1;
// loop because C++ says error handler may free up some memory.
for(;;)
{
void* p = alloc_dbg(size, type, file,line,func, 2);
if(p)
{
if(options & MMGR_TRACE)
log("[D] EXIT : %s\n", allocator);
return p;
}
// is a handler set?
std::new_handler nh = std::set_new_handler(0);
(void)std::set_new_handler(nh);
// .. yes: call, and loop again (hoping it freed up memory)
if(nh)
(*nh)();
// .. no: throw
else
{
if(options & MMGR_TRACE)
log("[D] EXIT : %s\n", allocator);
throw std::bad_alloc();
}
}
}
void* operator new(size_t size) throw(std::bad_alloc)
{
return new_common(size, AT_NEW, 0,0,0);
}
void* operator new[](size_t size) throw(std::bad_alloc)
{
return new_common(size, AT_NEW_ARRAY, 0,0,0);
}
void* operator new(size_t size, const char* file, int line)
{
locked_log("[?] Overloaded(file,line) global operator new called - check call site");
return new_common(size, AT_NEW, file,line,0);
}
void* operator new[](size_t size, const char* file, int line)
{
locked_log("[?] Overloaded(file,line) global operator new[] called - check call site");
return new_common(size, AT_NEW_ARRAY, file,line,0);
}
void* operator new(size_t size, const char* file, int line, const char* func)
{
return new_common(size, AT_NEW, file,line,func);
}
void* operator new[](size_t size, const char* file, int line, const char* func)
{
return new_common(size, AT_NEW_ARRAY, file,line,func);
}
void operator delete(void* p) throw()
{
free_dbg(p, AT_DELETE, 0,0,0, 1);
}
void operator delete[](void* p) throw()
{
free_dbg(p, AT_DELETE_ARRAY, 0,0,0, 1);
}
//
// called by compiler after a ctor (during the counterpart overloaded global
// operator new) raises an exception. not accessible from user code.
//
void operator delete(void* p, const char* file, int line) throw()
{
locked_log("[?] Overloaded(file,line) global operator delete called, i.e. exception raised in a ctor");
free_dbg(p, AT_DELETE, file,line,0, 1);
}
void operator delete[](void* p, const char* file, int line) throw()
{
locked_log("[?] Overloaded(file,line) global operator delete[] called, i.e. exception raised in a ctor");
free_dbg(p, AT_DELETE_ARRAY, file,line,0, 1);
}
void operator delete(void* p, const char* file, int line, const char* func) throw()
{
locked_log("[?] Overloaded(file,line,func) global operator delete called, i.e. exception raised in a ctor");
free_dbg(p, AT_DELETE, file,line,func, 1);
}
void operator delete[](void* p, const char* file, int line, const char* func) throw()
{
locked_log("[?] Overloaded(file,line,func) global operator delete[] called, i.e. exception raised in a ctor");
free_dbg(p, AT_DELETE_ARRAY, file,line,func, 1);
}
#endif // #if CONFIG_USE_MMGR