Fix debug malloc.
...which has been broken since the linker data structures went read-only. Bug: 7941716 Change-Id: If28f6bac0fcb13e371e4d85b064544f561c8d692
This commit is contained in:
parent
b1b5317799
commit
db492b3ca7
@ -242,7 +242,7 @@ extern "C" void* memalign(size_t alignment, size_t bytes) {
|
||||
return __libc_malloc_dispatch->memalign(alignment, bytes);
|
||||
}
|
||||
|
||||
/* We implement malloc debugging only in libc.so, so code bellow
|
||||
/* We implement malloc debugging only in libc.so, so code below
|
||||
* must be excluded if we compile this file for static libc.a
|
||||
*/
|
||||
#ifndef LIBC_STATIC
|
||||
@ -280,13 +280,10 @@ extern char* __progname;
|
||||
*/
|
||||
static void* libc_malloc_impl_handle = NULL;
|
||||
|
||||
/* Make sure we have MALLOC_ALIGNMENT that matches the one that is
|
||||
* used in dlmalloc. Emulator's memchecker needs this value to properly
|
||||
* align its guarding zones.
|
||||
*/
|
||||
// This must match the alignment used by dlmalloc.
|
||||
#ifndef MALLOC_ALIGNMENT
|
||||
#define MALLOC_ALIGNMENT ((size_t)8U)
|
||||
#endif /* MALLOC_ALIGNMENT */
|
||||
#define MALLOC_ALIGNMENT ((size_t)(2 * sizeof(void *)))
|
||||
#endif
|
||||
|
||||
/* This variable is set to the value of property libc.debug.malloc.backlog,
|
||||
* when the value of libc.debug.malloc = 10. It determines the size of the
|
||||
@ -449,6 +446,7 @@ static void malloc_init_impl() {
|
||||
dlclose(libc_malloc_impl_handle);
|
||||
return;
|
||||
}
|
||||
|
||||
if (memcheck_initialize(MALLOC_ALIGNMENT, memcheck_tracing)) {
|
||||
dlclose(libc_malloc_impl_handle);
|
||||
return;
|
||||
|
@ -1366,24 +1366,24 @@ void soinfo::CallArray(const char* array_name UNUSED, unsigned* array, int count
|
||||
TRACE("[ Looking at %s[%d] *%p == 0x%08x ]\n", array_name, n, array, *array);
|
||||
void (*func)() = (void (*)()) *array;
|
||||
array += step;
|
||||
if (((int) func == 0) || ((int) func == -1)) {
|
||||
continue;
|
||||
}
|
||||
TRACE("[ Calling func @ %p ]\n", func);
|
||||
func();
|
||||
CallFunction("function", func);
|
||||
}
|
||||
|
||||
TRACE("[ Done calling %s for '%s' ]\n", array_name, name);
|
||||
}
|
||||
|
||||
void soinfo::CallFunction(const char* function_name UNUSED, void (*function)()) {
|
||||
if (function == NULL) {
|
||||
if (function == NULL || reinterpret_cast<uintptr_t>(function) == static_cast<uintptr_t>(-1)) {
|
||||
return;
|
||||
}
|
||||
|
||||
TRACE("[ Calling %s @ %p for '%s' ]\n", function_name, function, name);
|
||||
function();
|
||||
TRACE("[ Done calling %s for '%s' ]\n", function_name, name);
|
||||
|
||||
// The function may have called dlopen(3) or dlclose(3), so we need to ensure our data structures
|
||||
// are still writable. This happens with our debug malloc (see http://b/7941716).
|
||||
set_soinfo_pool_protection(PROT_READ | PROT_WRITE);
|
||||
}
|
||||
|
||||
void soinfo::CallPreInitConstructors() {
|
||||
|
Loading…
x
Reference in New Issue
Block a user