• Home
  • History
  • Annotate
  • only in /external/libchrome/base/allocator/
NameDateSize

..10-Aug-201812 KiB

allocator_extension.cc10-Aug-20181.5 KiB

allocator_extension.h10-Aug-20181.8 KiB

allocator_shim.cc10-Aug-201812.5 KiB

allocator_shim.h10-Aug-20185.9 KiB

allocator_shim_default_dispatch_to_glibc.cc10-Aug-20182.4 KiB

allocator_shim_default_dispatch_to_linker_wrapped_symbols.cc10-Aug-20183.5 KiB

allocator_shim_internals.h10-Aug-20181.8 KiB

allocator_shim_override_cpp_symbols.h10-Aug-20181.5 KiB

allocator_shim_override_libc_symbols.h10-Aug-20181.7 KiB

allocator_shim_override_linker_wrapped_symbols.h10-Aug-20181.7 KiB

features.h10-Aug-2018404

README.md10-Aug-20189.9 KiB

README.md

1This document describes how malloc / new calls are routed in the various Chrome
2platforms.
3
4Bare in mind that the chromium codebase does not always just use `malloc()`.
5Some examples:
6 - Large parts of the renderer (Blink) use two home-brewed allocators,
7   PartitionAlloc and BlinkGC (Oilpan).
8 - Some subsystems, such as the V8 JavaScript engine, handle memory management
9   autonomously.
10 - Various parts of the codebase use abstractions such as `SharedMemory` or
11   `DiscardableMemory` which, similarly to the above, have their own page-level
12   memory management.
13
14Background
15----------
16The `allocator` target defines at compile-time the platform-specific choice of
17the allocator and extra-hooks which services calls to malloc/new. The relevant
18build-time flags involved are `use_allocator` and `win_use_allocator_shim`.
19
20The default choices are as follows:
21
22**Windows**  
23`use_allocator: winheap`, the default Windows heap.
24Additionally, `static_library` (i.e. non-component) builds have a shim
25layer wrapping malloc/new, which is controlled by `win_use_allocator_shim`.  
26The shim layer provides extra security features, such as preventing large
27allocations that can hit signed vs. unsigned bugs in third_party code.
28
29**Linux Desktop / CrOS**  
30`use_allocator: tcmalloc`, a forked copy of tcmalloc which resides in
31`third_party/tcmalloc/chromium`. Setting `use_allocator: none` causes the build
32to fall back to the system (Glibc) symbols.
33
34**Android**  
35`use_allocator: none`, always use the allocator symbols coming from Android's
36libc (Bionic). As it is developed as part of the OS, it is considered to be
37optimized for small devices and more memory-efficient than other choices.  
38The actual implementation backing malloc symbols in Bionic is up to the board
39config and can vary (typically *dlmalloc* or *jemalloc* on most Nexus devices).
40
41**Mac/iOS**  
42`use_allocator: none`, we always use the system's allocator implementation.
43
44In addition, when building for `asan` / `msan` / `syzyasan` `valgrind`, the
45both the allocator and the shim layer are disabled.
46
47Layering and build deps
48-----------------------
49The `allocator` target provides both the source files for tcmalloc (where
50applicable) and the linker flags required for the Windows shim layer.
51The `base` target is (almost) the only one depending on `allocator`. No other
52targets should depend on it, with the exception of the very few executables /
53dynamic libraries that don't depend, either directly or indirectly, on `base`
54within the scope of a linker unit.
55
56More importantly, **no other place outside of `/base` should depend on the
57specific allocator** (e.g., directly include `third_party/tcmalloc`).
58If such a functional dependency is required that should be achieved using
59abstractions in `base` (see `/base/allocator/allocator_extension.h` and
60`/base/memory/`)
61
62**Why `base` depends on `allocator`?**  
63Because it needs to provide services that depend on the actual allocator
64implementation. In the past `base` used to pretend to be allocator-agnostic
65and get the dependencies injected by other layers. This ended up being an
66inconsistent mess.
67See the [allocator cleanup doc][url-allocator-cleanup] for more context.
68
69Linker unit targets (executables and shared libraries) that depend in some way
70on `base` (most of the targets in the codebase) get automatically the correct
71set of linker flags to pull in tcmalloc or the Windows shim-layer.
72
73
74Source code
75-----------
76This directory contains just the allocator (i.e. shim) layer that switches
77between the different underlying memory allocation implementations.
78
79The tcmalloc library originates outside of Chromium and exists in
80`../../third_party/tcmalloc` (currently, the actual location is defined in the
81allocator.gyp file). The third party sources use a vendor-branch SCM pattern to
82track Chromium-specific changes independently from upstream changes.
83
84The general intent is to push local changes upstream so that over
85time we no longer need any forked files.
86
87
88Unified allocator shim
89----------------------
90On most platform, Chrome overrides the malloc / operator new symbols (and
91corresponding free / delete and other variants). This is to enforce security
92checks and lately to enable the
93[memory-infra heap profiler][url-memory-infra-heap-profiler].  
94Historically each platform had its special logic for defining the allocator
95symbols in different places of the codebase. The unified allocator shim is
96a project aimed to unify the symbol definition and allocator routing logic in
97a central place.
98
99 - Full documentation: [Allocator shim design doc][url-allocator-shim].
100 - Current state: Available and enabled by default on Linux, CrOS and Android.
101 - Tracking bug: [https://crbug.com/550886][crbug.com/550886].
102 - Build-time flag: `use_experimental_allocator_shim`.
103
104**Overview of the unified allocator shim**  
105The allocator shim consists of three stages:
106```
107+-------------------------+    +-----------------------+    +----------------+
108|     malloc & friends    | -> |       shim layer      | -> |   Routing to   |
109|    symbols definition   |    |     implementation    |    |    allocator   |
110+-------------------------+    +-----------------------+    +----------------+
111| - libc symbols (malloc, |    | - Security checks     |    | - tcmalloc     |
112|   calloc, free, ...)    |    | - Chain of dispatchers|    | - glibc        |
113| - C++ symbols (operator |    |   that can intercept  |    | - Android      |
114|   new, delete, ...)     |    |   and override        |    |   bionic       |
115| - glibc weak symbols    |    |   allocations         |    | - WinHeap      |
116|   (__libc_malloc, ...)  |    +-----------------------+    +----------------+
117+-------------------------+
118```
119
120**1. malloc symbols definition**  
121This stage takes care of overriding the symbols `malloc`, `free`,
122`operator new`, `operator delete` and friends and routing those calls inside the
123allocator shim (next point).
124This is taken care of by the headers in `allocator_shim_override_*`.
125
126*On Linux/CrOS*: the allocator symbols are defined as exported global symbols
127in `allocator_shim_override_libc_symbols.h` (for `malloc`, `free` and friends)
128and in `allocator_shim_override_cpp_symbols.h` (for `operator new`,
129`operator delete` and friends).
130This enables proper interposition of malloc symbols referenced by the main
131executable and any third party libraries. Symbol resolution on Linux is a breadth first search that starts from the root link unit, that is the executable
132(see EXECUTABLE AND LINKABLE FORMAT (ELF) - Portable Formats Specification).
133Additionally, when tcmalloc is the default allocator, some extra glibc symbols
134are also defined in `allocator_shim_override_glibc_weak_symbols.h`, for subtle
135reasons explained in that file.
136The Linux/CrOS shim was introduced by
137[crrev.com/1675143004](https://crrev.com/1675143004).
138
139*On Android*: load-time symbol interposition (unlike the Linux/CrOS case) is not
140possible. This is because Android processes are `fork()`-ed from the Android
141zygote, which pre-loads libc.so and only later native code gets loaded via
142`dlopen()` (symbols from `dlopen()`-ed libraries get a different resolution
143scope).
144In this case, the approach instead of wrapping symbol resolution at link time
145(i.e. during the build), via the `--Wl,-wrap,malloc` linker flag.
146The use of this wrapping flag causes:
147 - All references to allocator symbols in the Chrome codebase to be rewritten as
148   references to `__wrap_malloc` and friends. The `__wrap_malloc` symbols are
149   defined in the `allocator_shim_override_linker_wrapped_symbols.h` and
150   route allocator calls inside the shim layer.
151 - The reference to the original `malloc` symbols (which typically is defined by
152   the system's libc.so) are accessible via the special `__real_malloc` and
153   friends symbols (which will be relocated, at load time, against `malloc`).
154
155In summary, this approach is transparent to the dynamic loader, which still sees
156undefined symbol references to malloc symbols.
157These symbols will be resolved against libc.so as usual.
158More details in [crrev.com/1719433002](https://crrev.com/1719433002).
159
160**2. Shim layer implementation**  
161This stage contains the actual shim implementation. This consists of:
162- A singly linked list of dispatchers (structs with function pointers to `malloc`-like functions). Dispatchers can be dynamically inserted at runtime
163(using the `InsertAllocatorDispatch` API). They can intercept and override
164allocator calls.
165- The security checks (suicide on malloc-failure via `std::new_handler`, etc).
166This happens inside `allocator_shim.cc`
167
168**3. Final allocator routing**  
169The final element of the aforementioned dispatcher chain is statically defined
170at build time and ultimately routes the allocator calls to the actual allocator
171(as described in the *Background* section above). This is taken care of by the
172headers in `allocator_shim_default_dispatch_to_*` files.
173
174
175Appendixes
176----------
177**How does the Windows shim layer replace the malloc symbols?**  
178The mechanism for hooking LIBCMT in Windows is rather tricky.  The core
179problem is that by default, the Windows library does not declare malloc and
180free as weak symbols.  Because of this, they cannot be overridden.  To work
181around this, we start with the LIBCMT.LIB, and manually remove all allocator
182related functions from it using the visual studio library tool.  Once removed,
183we can now link against the library and provide custom versions of the
184allocator related functionality.
185See the script `preb_libc.py` in this folder.
186
187Related links
188-------------
189- [Unified allocator shim doc - Feb 2016][url-allocator-shim]
190- [Allocator cleanup doc - Jan 2016][url-allocator-cleanup]
191- [Proposal to use PartitionAlloc as default allocator](https://crbug.com/339604)
192- [Memory-Infra: Tools to profile memory usage in Chrome](/docs/memory-infra/README.md)
193
194[url-allocator-cleanup]: https://docs.google.com/document/d/1V77Kgp_4tfaaWPEZVxNevoD02wXiatnAv7Ssgr0hmjg/edit?usp=sharing
195[url-memory-infra-heap-profiler]: /docs/memory-infra/heap_profiler.md
196[url-allocator-shim]: https://docs.google.com/document/d/1yKlO1AO4XjpDad9rjcBOI15EKdAGsuGO_IeZy0g0kxo/edit?usp=sharing
197