mirror of
https://github.com/klzgrad/naiveproxy.git
synced 2024-11-28 00:06:09 +03:00
Compare commits
No commits in common. "545c85631134e23e79bfad22721dc310d0592191" and "97915a596d1e05b691a7d535ee0d36215ef2b064" have entirely different histories.
545c856311
...
97915a596d
@ -1 +1 @@
|
|||||||
105.0.5195.52
|
104.0.5112.79
|
||||||
|
14
src/AUTHORS
14
src/AUTHORS
@ -22,7 +22,6 @@ Abhinav Vij <abhinav.vij@samsung.com>
|
|||||||
Abhishek Agarwal <abhishek.a21@samsung.com>
|
Abhishek Agarwal <abhishek.a21@samsung.com>
|
||||||
Abhishek Kanike <abhishek.ka@samsung.com>
|
Abhishek Kanike <abhishek.ka@samsung.com>
|
||||||
Abhishek Singh <abhi.rathore@samsung.com>
|
Abhishek Singh <abhi.rathore@samsung.com>
|
||||||
Abin K Paul <abin.paul1@gmail.com>
|
|
||||||
Abul Hasan Md Osama <ahm.osama@samsung.com>
|
Abul Hasan Md Osama <ahm.osama@samsung.com>
|
||||||
Adam Bonner <abonner-chromium@solscope.com>
|
Adam Bonner <abonner-chromium@solscope.com>
|
||||||
Adam Bujalski <abujalski@gmail.com>
|
Adam Bujalski <abujalski@gmail.com>
|
||||||
@ -58,7 +57,6 @@ Alex Gaynor <alex.gaynor@gmail.com>
|
|||||||
Alex Henrie <alexhenrie24@gmail.com>
|
Alex Henrie <alexhenrie24@gmail.com>
|
||||||
Alex Scheele <alexscheele@gmail.com>
|
Alex Scheele <alexscheele@gmail.com>
|
||||||
Alexander Douglas <agdoug@amazon.com>
|
Alexander Douglas <agdoug@amazon.com>
|
||||||
Alexander Forrence <alex.forrence@gmail.com>
|
|
||||||
Alexander Guettler <alexander@guettler.io>
|
Alexander Guettler <alexander@guettler.io>
|
||||||
Alexander Rezepkin <etu@vivaldi.net>
|
Alexander Rezepkin <etu@vivaldi.net>
|
||||||
Alexander Shalamov <alexander.shalamov@intel.com>
|
Alexander Shalamov <alexander.shalamov@intel.com>
|
||||||
@ -183,7 +181,6 @@ Brian Yip <itsbriany@gmail.com>
|
|||||||
Brook Hong <hzgmaxwell@gmail.com>
|
Brook Hong <hzgmaxwell@gmail.com>
|
||||||
Bruno Calvignac <bruno@flock.com>
|
Bruno Calvignac <bruno@flock.com>
|
||||||
Bruno de Oliveira Abinader <brunoabinader@gmail.com>
|
Bruno de Oliveira Abinader <brunoabinader@gmail.com>
|
||||||
Bruno Pitrus <brunopitrus@hotmail.com>
|
|
||||||
Bruno Roy <brusi_roy@hotmail.com>
|
Bruno Roy <brusi_roy@hotmail.com>
|
||||||
Bryan Donlan <bdonlan@gmail.com>
|
Bryan Donlan <bdonlan@gmail.com>
|
||||||
Bryce Thomas <bryct@amazon.com>
|
Bryce Thomas <bryct@amazon.com>
|
||||||
@ -385,7 +382,6 @@ Gajendra Singh <wxjg68@motorola.com>
|
|||||||
Ganesh Borle <ganesh.borle@samsung.com>
|
Ganesh Borle <ganesh.borle@samsung.com>
|
||||||
Gao Chun <chun.gao@intel.com>
|
Gao Chun <chun.gao@intel.com>
|
||||||
Gao Chun <gaochun.dev@gmail.com>
|
Gao Chun <gaochun.dev@gmail.com>
|
||||||
Gao Yu <wanggao@tencent.com>
|
|
||||||
Gaurav Dhol <gaurav.dhol@einfochips.com>
|
Gaurav Dhol <gaurav.dhol@einfochips.com>
|
||||||
Gautham Banasandra <gautham.bangalore@gmail.com>
|
Gautham Banasandra <gautham.bangalore@gmail.com>
|
||||||
George Adams <geoada@amazon.com>
|
George Adams <geoada@amazon.com>
|
||||||
@ -475,7 +471,6 @@ Irmak Kavasoglu <irmakkavasoglu@gmail.com>
|
|||||||
Isaac Murchie <murchieisaac@gmail.com>
|
Isaac Murchie <murchieisaac@gmail.com>
|
||||||
Isaac Reilly <reillyi@amazon.com>
|
Isaac Reilly <reillyi@amazon.com>
|
||||||
Ivan Naydonov <samogot@gmail.com>
|
Ivan Naydonov <samogot@gmail.com>
|
||||||
Ivan Pavlotskiy <ivan.pavlotskiy@lgepartner.com>
|
|
||||||
Ivan Sham <ivansham@amazon.com>
|
Ivan Sham <ivansham@amazon.com>
|
||||||
Jack Bates <jack@nottheoilrig.com>
|
Jack Bates <jack@nottheoilrig.com>
|
||||||
Jacky Hu <flameddd@gmail.com>
|
Jacky Hu <flameddd@gmail.com>
|
||||||
@ -517,7 +512,6 @@ Jay Soffian <jaysoffian@gmail.com>
|
|||||||
Jeado Ko <haibane84@gmail.com>
|
Jeado Ko <haibane84@gmail.com>
|
||||||
Jeffrey C <jeffreyca16@gmail.com>
|
Jeffrey C <jeffreyca16@gmail.com>
|
||||||
Jeffrey Yeung <jeffrey.yeung@poly.com>
|
Jeffrey Yeung <jeffrey.yeung@poly.com>
|
||||||
Jelle Bleyaert <jellebley@gmail.com>
|
|
||||||
Jeong A Shin <jeonga@khu.ac.kr>
|
Jeong A Shin <jeonga@khu.ac.kr>
|
||||||
Jeongeun Kim <je_julie.kim@samsung.com>
|
Jeongeun Kim <je_julie.kim@samsung.com>
|
||||||
Jeongmin Kim <kimwjdalsl@gmail.com>
|
Jeongmin Kim <kimwjdalsl@gmail.com>
|
||||||
@ -706,7 +700,6 @@ Lenny Khazan <lenny.khazan@gmail.com>
|
|||||||
Leo Wolf <jclw@ymail.com>
|
Leo Wolf <jclw@ymail.com>
|
||||||
Leon Han <leon.han@intel.com>
|
Leon Han <leon.han@intel.com>
|
||||||
Leung Wing Chung <lwchkg@gmail.com>
|
Leung Wing Chung <lwchkg@gmail.com>
|
||||||
Li Yanbo <liyanbo.monster@bytedance.com>
|
|
||||||
Li Yin <li.yin@intel.com>
|
Li Yin <li.yin@intel.com>
|
||||||
Lidwine Genevet <lgenevet@cisco.com>
|
Lidwine Genevet <lgenevet@cisco.com>
|
||||||
Lin Sun <lin.sun@intel.com>
|
Lin Sun <lin.sun@intel.com>
|
||||||
@ -914,7 +907,6 @@ Pedro Tôrres <t0rr3s.p3dr0@gmail.com>
|
|||||||
Peng Hu <penghu@tencent.com>
|
Peng Hu <penghu@tencent.com>
|
||||||
Peng Jiang <leiyi.jp@gmail.com>
|
Peng Jiang <leiyi.jp@gmail.com>
|
||||||
Peng Xinchao <pxinchao@gmail.com>
|
Peng Xinchao <pxinchao@gmail.com>
|
||||||
Peng Zhou <zhoupeng.1996@bytedance.com>
|
|
||||||
Peng-Yu Chen <pengyu@libstarrify.so>
|
Peng-Yu Chen <pengyu@libstarrify.so>
|
||||||
Pei Wang <wangpei@uniontech.com>
|
Pei Wang <wangpei@uniontech.com>
|
||||||
Peter Bright <drpizza@quiscalusmexicanus.org>
|
Peter Bright <drpizza@quiscalusmexicanus.org>
|
||||||
@ -946,7 +938,6 @@ Praveen Akkiraju <praveen.anp@samsung.com>
|
|||||||
Preeti Nayak <preeti.nayak@samsung.com>
|
Preeti Nayak <preeti.nayak@samsung.com>
|
||||||
Pritam Nikam <pritam.nikam@samsung.com>
|
Pritam Nikam <pritam.nikam@samsung.com>
|
||||||
Puttaraju R <puttaraju.r@samsung.com>
|
Puttaraju R <puttaraju.r@samsung.com>
|
||||||
Qi Tiezheng <qitiezheng@360.cn>
|
|
||||||
Qi Yang <qi1988.yang@samsung.com>
|
Qi Yang <qi1988.yang@samsung.com>
|
||||||
Qiang Zeng <zengqiang1@huawei.com>
|
Qiang Zeng <zengqiang1@huawei.com>
|
||||||
Qiankun Miao <qiankun.miao@intel.com>
|
Qiankun Miao <qiankun.miao@intel.com>
|
||||||
@ -1149,12 +1140,10 @@ Sungmann Cho <sungmann.cho@navercorp.com>
|
|||||||
Sunil Ratnu <sunil.ratnu@samsung.com>
|
Sunil Ratnu <sunil.ratnu@samsung.com>
|
||||||
Sunitha Srivatsa <srivats@amazon.com>
|
Sunitha Srivatsa <srivats@amazon.com>
|
||||||
Sunwoo Nam <jegalzz88@gmail.com>
|
Sunwoo Nam <jegalzz88@gmail.com>
|
||||||
Suresh Guttula <suresh.guttula@amd.corp-partner.google.com>
|
|
||||||
Surya K M <suryagowda590@gmail.com>
|
Surya K M <suryagowda590@gmail.com>
|
||||||
Sushma Venkatesh Reddy <sushma.venkatesh.reddy@intel.com>
|
Sushma Venkatesh Reddy <sushma.venkatesh.reddy@intel.com>
|
||||||
Suvanjan Mukherjee <suvanjanmukherjee@gmail.com>
|
Suvanjan Mukherjee <suvanjanmukherjee@gmail.com>
|
||||||
Suyambulingam R M <suyambu.rm@samsung.com>
|
Suyambulingam R M <suyambu.rm@samsung.com>
|
||||||
Suyash Nayan <suyashnyn1@gmail.com>
|
|
||||||
Suyash Sengar <suyash.s@samsung.com>
|
Suyash Sengar <suyash.s@samsung.com>
|
||||||
Swarali Raut <swarali.sr@samsung.com>
|
Swarali Raut <swarali.sr@samsung.com>
|
||||||
Swati Jaiswal <swa.jaiswal@samsung.com>
|
Swati Jaiswal <swa.jaiswal@samsung.com>
|
||||||
@ -1170,7 +1159,6 @@ Taehoon Lee <taylor.hoon@gmail.com>
|
|||||||
Taeseong Yu <yugeeklab@gmail.com>
|
Taeseong Yu <yugeeklab@gmail.com>
|
||||||
Taeyeon Kim <ssg9732@gmail.com>
|
Taeyeon Kim <ssg9732@gmail.com>
|
||||||
Tae Shin <taeshindev@gmail.com>
|
Tae Shin <taeshindev@gmail.com>
|
||||||
Taher Ali <taher.dasten@gmail.com>
|
|
||||||
Takaaki Suzuki <takaakisuzuki.14@gmail.com>
|
Takaaki Suzuki <takaakisuzuki.14@gmail.com>
|
||||||
Takahiro Aoyagi <hogehoge@gachapin.jp>
|
Takahiro Aoyagi <hogehoge@gachapin.jp>
|
||||||
Takashi Fujita <tgfjt.mail@gmail.com>
|
Takashi Fujita <tgfjt.mail@gmail.com>
|
||||||
@ -1341,7 +1329,6 @@ Zheng Xu <zxu@kobo.com>
|
|||||||
Zhengkun Li <zhengkli@amazon.com>
|
Zhengkun Li <zhengkli@amazon.com>
|
||||||
Zhenyu Liang <zhenyu.liang@intel.com>
|
Zhenyu Liang <zhenyu.liang@intel.com>
|
||||||
Zhenyu Shan <zhenyu.shan@intel.com>
|
Zhenyu Shan <zhenyu.shan@intel.com>
|
||||||
Zhibo Wang <zhibo1.wang@intel.com>
|
|
||||||
Zhifei Fang <facetothefate@gmail.com>
|
Zhifei Fang <facetothefate@gmail.com>
|
||||||
Zhiyuan Ye <zhiyuanye@tencent.com>
|
Zhiyuan Ye <zhiyuanye@tencent.com>
|
||||||
Zhuoyu Qian <zhuoyu.qian@samsung.com>
|
Zhuoyu Qian <zhuoyu.qian@samsung.com>
|
||||||
@ -1396,7 +1383,6 @@ Loongson Technology Corporation Limited. <*@loongson.cn>
|
|||||||
Macadamian <*@macadamian.com>
|
Macadamian <*@macadamian.com>
|
||||||
Mail.ru Group <*@corp.mail.ru>
|
Mail.ru Group <*@corp.mail.ru>
|
||||||
Make Positive Provar Limited <*@provartesting.com>
|
Make Positive Provar Limited <*@provartesting.com>
|
||||||
Mc Zeng <zengmcong@gmail.com>
|
|
||||||
Mediatek <*@mediatek.com>
|
Mediatek <*@mediatek.com>
|
||||||
Microsoft <*@microsoft.com>
|
Microsoft <*@microsoft.com>
|
||||||
MIPS Technologies, Inc. <*@mips.com>
|
MIPS Technologies, Inc. <*@mips.com>
|
||||||
|
336
src/DEPS
336
src/DEPS
@ -144,19 +144,6 @@ vars = {
|
|||||||
# tools/clang/OWNERS before depending on it.
|
# tools/clang/OWNERS before depending on it.
|
||||||
'checkout_clang_libs': 'use_rust',
|
'checkout_clang_libs': 'use_rust',
|
||||||
|
|
||||||
# Fetch prebuilt and prepackaged Bazel binary/executable. Bazel is currently
|
|
||||||
# only needed by `chromium/src/tools/rust/build_crubit.py` and therefore
|
|
||||||
# shouldn't be used outside of Chromium Rust Experiments project.
|
|
||||||
# Furthermore note that Bazel is only needed when building Crubit during Rust
|
|
||||||
# toolchain build (and is *not* needed during regular Chromium builds).
|
|
||||||
'checkout_bazel': False,
|
|
||||||
|
|
||||||
# Fetch Crubit support libraries in order to build ..._rs_api.rs and
|
|
||||||
# ..._rs_api_impl.cc that are generated by prebuilt (see
|
|
||||||
# tools/rust/build_crubit.py) Crubit tools during Chromium build (see
|
|
||||||
# also //build/rust/rs_bindings_from_cc.gni).
|
|
||||||
'checkout_crubit': 'use_rust',
|
|
||||||
|
|
||||||
# By default checkout the OpenXR loader library only on Windows. The OpenXR
|
# By default checkout the OpenXR loader library only on Windows. The OpenXR
|
||||||
# backend for VR in Chromium is currently only supported for Windows, but
|
# backend for VR in Chromium is currently only supported for Windows, but
|
||||||
# support for other platforms may be added in the future.
|
# support for other platforms may be added in the future.
|
||||||
@ -197,12 +184,6 @@ vars = {
|
|||||||
# qemu on linux-arm64 machines.
|
# qemu on linux-arm64 machines.
|
||||||
'checkout_fuchsia_for_arm64_host': False,
|
'checkout_fuchsia_for_arm64_host': False,
|
||||||
|
|
||||||
# Revision of Crubit (trunk on 2022-07-14). This should typically be the
|
|
||||||
# same as the revision specified in CRUBIT_REVISION in
|
|
||||||
# tools/rust/update_rust.py. More details and roll instructions can be
|
|
||||||
# found in tools/rust/README.md.
|
|
||||||
'crubit_revision': 'd9b0ad4c09b46328dcc7a5ec28ce86cca56e0389',
|
|
||||||
|
|
||||||
# Run 'vpython_common' hook if this is set.
|
# Run 'vpython_common' hook if this is set.
|
||||||
# TODO(crbug.com/1329052): remove this when we remove .vpython.
|
# TODO(crbug.com/1329052): remove this when we remove .vpython.
|
||||||
'enable_vpython_common_crbug_1329052': True,
|
'enable_vpython_common_crbug_1329052': True,
|
||||||
@ -233,7 +214,7 @@ vars = {
|
|||||||
#
|
#
|
||||||
# CQ_INCLUDE_TRYBOTS=luci.chrome.try:lacros-amd64-generic-chrome-skylab
|
# CQ_INCLUDE_TRYBOTS=luci.chrome.try:lacros-amd64-generic-chrome-skylab
|
||||||
# CQ_INCLUDE_TRYBOTS=luci.chrome.try:lacros-arm-generic-chrome-skylab
|
# CQ_INCLUDE_TRYBOTS=luci.chrome.try:lacros-arm-generic-chrome-skylab
|
||||||
'lacros_sdk_version': '14977.0.0',
|
'lacros_sdk_version': '14844.0.0',
|
||||||
|
|
||||||
# Generate location tag metadata to include in tests result data uploaded
|
# Generate location tag metadata to include in tests result data uploaded
|
||||||
# to ResultDB. This isn't needed on some configs and the tool that generates
|
# to ResultDB. This isn't needed on some configs and the tool that generates
|
||||||
@ -245,7 +226,7 @@ vars = {
|
|||||||
# luci-go CIPD package version.
|
# luci-go CIPD package version.
|
||||||
# Make sure the revision is uploaded by infra-packagers builder.
|
# Make sure the revision is uploaded by infra-packagers builder.
|
||||||
# https://ci.chromium.org/p/infra-internal/g/infra-packagers/console
|
# https://ci.chromium.org/p/infra-internal/g/infra-packagers/console
|
||||||
'luci_go': 'git_revision:a0ba80649473055bae3d789eec28c9967adb5e45',
|
'luci_go': 'git_revision:de014227dd270df7c61bfab740eb4ae4b52ac2a7',
|
||||||
|
|
||||||
# This can be overridden, e.g. with custom_vars, to build clang from HEAD
|
# This can be overridden, e.g. with custom_vars, to build clang from HEAD
|
||||||
# instead of downloading the prebuilt pinned revision.
|
# instead of downloading the prebuilt pinned revision.
|
||||||
@ -269,9 +250,6 @@ vars = {
|
|||||||
# for info on RTS
|
# for info on RTS
|
||||||
'checkout_rts_model': False,
|
'checkout_rts_model': False,
|
||||||
|
|
||||||
# Use the experimental version of the RTS model
|
|
||||||
'checkout_rts_experimental_model': False,
|
|
||||||
|
|
||||||
# By default, do not check out the re-client binaries.
|
# By default, do not check out the re-client binaries.
|
||||||
'checkout_reclient': False,
|
'checkout_reclient': False,
|
||||||
|
|
||||||
@ -279,7 +257,7 @@ vars = {
|
|||||||
'dawn_standalone': False,
|
'dawn_standalone': False,
|
||||||
|
|
||||||
# reclient CIPD package version
|
# reclient CIPD package version
|
||||||
'reclient_version': 're_client_version:0.72.0.b874055-gomaip',
|
'reclient_version': 're_client_version:0.68.0.2c94334-gomaip',
|
||||||
|
|
||||||
# Enable fetching Rust-related packages.
|
# Enable fetching Rust-related packages.
|
||||||
'use_rust': False,
|
'use_rust': False,
|
||||||
@ -297,34 +275,34 @@ vars = {
|
|||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling Skia
|
# the commit queue can handle CLs rolling Skia
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'skia_revision': 'f204b137b97b44b7397de173fc54181c37ac6501',
|
'skia_revision': '5a4dbb2e97302f7e574f0ba962ac4d8b3a62a36e',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling V8
|
# the commit queue can handle CLs rolling V8
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'v8_revision': 'b1f56b4a8a7cf9f707f7966104278777f9994b13',
|
'v8_revision': '3d67ad243ce92b9fb162cc85da1dc1a0ebe4c78b',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling ANGLE
|
# the commit queue can handle CLs rolling ANGLE
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'angle_revision': '2f0d8ab049b10ee41f9b90cea8da8e80db076e38',
|
'angle_revision': '2693b03eba82a424a19febaacaab4115a45b7682',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling SwiftShader
|
# the commit queue can handle CLs rolling SwiftShader
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'swiftshader_revision': '16e026a959f1bc80ff237aa81b4a63b52517dec1',
|
'swiftshader_revision': 'd68d367047f562e0e0716fd72b9a2bc3e2c8f4c0',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling PDFium
|
# the commit queue can handle CLs rolling PDFium
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'pdfium_revision': 'd14da8e682e244127db32490365d1c094243e5f3',
|
'pdfium_revision': 'c7c276ce1192f043affb2098ac7ce44f7fd7f084',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling BoringSSL
|
# the commit queue can handle CLs rolling BoringSSL
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
#
|
#
|
||||||
# Note this revision should be updated with
|
# Note this revision should be updated with
|
||||||
# third_party/boringssl/roll_boringssl.py, not roll-dep.
|
# third_party/boringssl/roll_boringssl.py, not roll-dep.
|
||||||
'boringssl_revision': 'b95124305ab15c7523d3e21437309fa5dd717ee8',
|
'boringssl_revision': '1e469e45a46ff580899cbef939babe02ad916c85',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling Fuchsia sdk
|
# the commit queue can handle CLs rolling Fuchsia sdk
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'fuchsia_version': 'version:9.20220720.2.1',
|
'fuchsia_version': 'version:8.20220609.0.1',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling google-toolbox-for-mac
|
# the commit queue can handle CLs rolling google-toolbox-for-mac
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
@ -340,23 +318,23 @@ vars = {
|
|||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling lss
|
# the commit queue can handle CLs rolling lss
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'lss_revision': '0d6435b731ef91d5182eaecff82ae96764222c48',
|
'lss_revision': '1d387f43f3702818f7fc04d334539a2f05cafccd',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling NaCl
|
# the commit queue can handle CLs rolling NaCl
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'nacl_revision': '18d9964d47fc44f49a4c19b7ba91197ddca00c6a',
|
'nacl_revision': '77f46a8ec552f316f64aaa82b7f06da9fceb036b',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling freetype
|
# the commit queue can handle CLs rolling freetype
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'freetype_revision': '275b116b40c9d183d42242099ea9ff276985855b',
|
'freetype_revision': 'b11074cf6dce78d0bc79ff7996dec70ca3abe4a9',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling freetype
|
# the commit queue can handle CLs rolling freetype
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'freetype_testing_revision': '1ca0c99d25ae3b1e4c70513c1bf74643fc3dee09',
|
'freetype_testing_revision': 'fe2eddae6176f75e2101289eeda22a5ff3d808ca',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling HarfBuzz
|
# the commit queue can handle CLs rolling HarfBuzz
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'harfbuzz_revision': 'fa471043fccb94444510e3300ac2573297c82137',
|
'harfbuzz_revision': 'c88a6a9ec3c38793ec8b662362282e076e948943',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling Emoji Segmenter
|
# the commit queue can handle CLs rolling Emoji Segmenter
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
@ -364,11 +342,11 @@ vars = {
|
|||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling OTS
|
# the commit queue can handle CLs rolling OTS
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'ots_revision': '46bea9879127d0ff1c6601b078e2ce98e83fcd33',
|
'ots_revision': 'ee537ac096667eed6559124164c3e8482646fd77',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling catapult
|
# the commit queue can handle CLs rolling catapult
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'catapult_revision': 'b6e934ef32e6591ad60636e3fe167d0e3e9aa5d4',
|
'catapult_revision': '8a8c0b9c3967e17da1d9f64b3d57e4a969b465a7',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling libFuzzer
|
# the commit queue can handle CLs rolling libFuzzer
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
@ -376,11 +354,11 @@ vars = {
|
|||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling devtools-frontend
|
# the commit queue can handle CLs rolling devtools-frontend
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'devtools_frontend_revision': 'b1ac4239dc5fffa56170e7367a03f35d2eaa223c',
|
'devtools_frontend_revision': 'ed8fe6a3c528058bcc8e95b9071be6d6cb1b45f2',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling libprotobuf-mutator
|
# the commit queue can handle CLs rolling libprotobuf-mutator
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'libprotobuf-mutator': 'a304ec48dcf15d942607032151f7e9ee504b5dcf',
|
'libprotobuf-mutator': '8942a9ba43d8bb196230c321d46d6a137957a719',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling android_sdk_build-tools_version
|
# the commit queue can handle CLs rolling android_sdk_build-tools_version
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
@ -412,11 +390,11 @@ vars = {
|
|||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling feed
|
# the commit queue can handle CLs rolling feed
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'dawn_revision': '1e98a9ba4a64301e0ab932e22ce989688f6cdf6c',
|
'dawn_revision': '2d334ed4f01b00211acd0360a5f9dc91d83354cb',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling feed
|
# the commit queue can handle CLs rolling feed
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'quiche_revision': '53c94d968dd6a0cf748caf42462a0b676f95530c',
|
'quiche_revision': '26920de2d369289246585fa1b236ef2ef516d317',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling ios_webkit
|
# the commit queue can handle CLs rolling ios_webkit
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
@ -428,7 +406,7 @@ vars = {
|
|||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling wuffs
|
# the commit queue can handle CLs rolling wuffs
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'wuffs_revision': 'a8205c2fe7564b12fea81ee028ba670112cc7719',
|
'wuffs_revision': 'ebbecaa2fb439eff0aeedafadb4c2a984446dee8',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling libgifcodec
|
# the commit queue can handle CLs rolling libgifcodec
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
@ -436,11 +414,11 @@ vars = {
|
|||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling libavif
|
# the commit queue can handle CLs rolling libavif
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'libavif_revision': 'dd2d67c5f976038354c0406a253e26dd2abc4632',
|
'libavif_revision': '1dedea43710c55a1bf1c675126cb6cb546c7b2a7',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling nearby
|
# the commit queue can handle CLs rolling nearby
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'nearby_revision': 'd2c401112cc577fe3c5f9a11329bb557048af31a',
|
'nearby_revision': 'd8453565db739ebbfbbeade9ec8f8239057b1e13',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling securemessage
|
# the commit queue can handle CLs rolling securemessage
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
@ -456,15 +434,15 @@ vars = {
|
|||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling feed
|
# the commit queue can handle CLs rolling feed
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'libcxxabi_revision': 'b954e3e65634a9e2f7b595598a30c455f5f2eb26',
|
'libcxxabi_revision': '013bcd820a353ec1d3ff472f2971553fea7232cf',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling feed
|
# the commit queue can handle CLs rolling feed
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'libunwind_revision': '955e2ff5fbb15791fea263c1c80e1ec6b3c5ee61',
|
'libunwind_revision': '1644d070bf374182739543c3a12df88dfec0b88a',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling feed
|
# the commit queue can handle CLs rolling feed
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'clang_format_revision': '8b525d2747f2584fc35d8c7e612e66f377858df7',
|
'clang_format_revision': 'e435ad79c17b1888b34df88d6a30a094936e3836',
|
||||||
# Three lines of non-changing comments so that
|
# Three lines of non-changing comments so that
|
||||||
# the commit queue can handle CLs rolling feed
|
# the commit queue can handle CLs rolling feed
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
@ -473,17 +451,13 @@ vars = {
|
|||||||
# the commit queue can handle CLs rolling feed
|
# the commit queue can handle CLs rolling feed
|
||||||
# and whatever else without interference from each other.
|
# and whatever else without interference from each other.
|
||||||
'highway_revision': '424360251cdcfc314cfc528f53c872ecd63af0f0',
|
'highway_revision': '424360251cdcfc314cfc528f53c872ecd63af0f0',
|
||||||
# Three lines of non-changing comments so that
|
|
||||||
# the commit queue can handle CLs rolling ffmpeg
|
|
||||||
# and whatever else without interference from each other.
|
|
||||||
'ffmpeg_revision': '880df5ede50a8534c8116d0d50e4bc4f3ef08a06',
|
|
||||||
|
|
||||||
# If you change this, also update the libc++ revision in
|
# If you change this, also update the libc++ revision in
|
||||||
# //buildtools/deps_revisions.gni.
|
# //buildtools/deps_revisions.gni.
|
||||||
'libcxx_revision': '88bf4070487fbe9020697a2281743b91e5e29bef',
|
'libcxx_revision': 'b1269813eaf5b8ac78e35e45a0f7cc320bd3e7d6',
|
||||||
|
|
||||||
# GN CIPD package version.
|
# GN CIPD package version.
|
||||||
'gn_version': 'git_revision:9ef321772ecc161937db69acb346397e0ccc484d',
|
'gn_version': 'git_revision:2ecd43a10266bd091c98e6dcde507c64f6a0dad3',
|
||||||
}
|
}
|
||||||
|
|
||||||
# Only these hosts are allowed for dependencies in this DEPS file.
|
# Only these hosts are allowed for dependencies in this DEPS file.
|
||||||
@ -564,7 +538,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromium/third_party/android_rust_toolchain/linux-amd64',
|
'package': 'chromium/third_party/android_rust_toolchain/linux-amd64',
|
||||||
'version': 'rMU9JFlwRfB-5VEWgDPRFYme5sXSnsHPSE3uQXf1xBQC',
|
'version': 'BKAbvHjGv4-os-v8MS3I54bPsY-397xgaJ3yBeIVS20C',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'dep_type': 'cipd',
|
'dep_type': 'cipd',
|
||||||
@ -634,7 +608,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromium/third_party/updater/chrome_mac_universal',
|
'package': 'chromium/third_party/updater/chrome_mac_universal',
|
||||||
'version': 'RBRqNIwSXHjdZf4BVjWk8enaKIHw58aQGFDVNozlbWIC',
|
'version': '3UoNd4X57YAONz6mhQPapIUoO1Ds6K5AIHTAZxNmLUUC',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
},
|
},
|
||||||
@ -645,7 +619,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromium/third_party/updater/chrome_win_x86',
|
'package': 'chromium/third_party/updater/chrome_win_x86',
|
||||||
'version': 'tqlS-vFYsn2LVSJMwipq84EKLmwKa1XJb760NnpQL2gC',
|
'version': 'vTjr7sgsZvG680Qx0nhiR3H4-EAJDdh5m1BkVbbuER0C',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
},
|
},
|
||||||
@ -656,7 +630,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromium/third_party/updater/chrome_win_x86_64',
|
'package': 'chromium/third_party/updater/chrome_win_x86_64',
|
||||||
'version': 'RthX5RzppvSV7uq2P6pm2bnv6-dvoHpUIOsZFk57ZMEC',
|
'version': 'dQu9E9-wPljBkp6aaMxzCt9WJdBI_u_w2N1VRS2Mdf4C',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
},
|
},
|
||||||
@ -668,7 +642,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromium/third_party/updater/chromium_mac_amd64',
|
'package': 'chromium/third_party/updater/chromium_mac_amd64',
|
||||||
'version': '7MvxvS-pmZP1iAXQoCiLI7nv4UkDiyw8PC1ycwpYWbYC',
|
'version': '1RmnK4JbmordT5NJbib3mfagpHvrO-oJaTW4HKsYgmAC',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
},
|
},
|
||||||
@ -680,7 +654,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromium/third_party/updater/chromium_mac_arm64',
|
'package': 'chromium/third_party/updater/chromium_mac_arm64',
|
||||||
'version': 'd5lN7fzV07O4-Mu_T8TshrGQtlR9F508p9cdhchcLpYC',
|
'version': '-o_WPHLr3JzvHdsTl_E0AgEV2D2--sBNqVT_F74hvOIC',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
},
|
},
|
||||||
@ -691,7 +665,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromium/third_party/updater/chromium_win_x86',
|
'package': 'chromium/third_party/updater/chromium_win_x86',
|
||||||
'version': '8zehx-DVmaf_FplPe23acLAStf3Z7anQ3CY9LXBfvD0C',
|
'version': 'zdcQMuiuIXnQQ4eBsYyk0uNTr4N0LaphcQYs0RUByZQC',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
},
|
},
|
||||||
@ -702,7 +676,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromium/third_party/updater/chromium_win_x86_64',
|
'package': 'chromium/third_party/updater/chromium_win_x86_64',
|
||||||
'version': 'KE8JnjZFOyHxUhVdRkm0IMVqlZIaYPnAOI-zxtUD4zUC',
|
'version': '77COFCYoGCHrnvDJZFC8GoYea4B8GeTVWNKpUZBCwe4C',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
},
|
},
|
||||||
@ -773,16 +747,16 @@ deps = {
|
|||||||
Var('chromium_git') + '/external/github.com/toji/webvr.info.git' + '@' + 'c58ae99b9ff9e2aa4c524633519570bf33536248',
|
Var('chromium_git') + '/external/github.com/toji/webvr.info.git' + '@' + 'c58ae99b9ff9e2aa4c524633519570bf33536248',
|
||||||
|
|
||||||
'src/docs/website': {
|
'src/docs/website': {
|
||||||
'url': Var('chromium_git') + '/website.git' + '@' + '3965ba67f8d283378e6c0b64d634b91fb830a378',
|
'url': Var('chromium_git') + '/website.git' + '@' + 'ffb0b23dc2833849a0b1e57f25caba219e717963',
|
||||||
},
|
},
|
||||||
|
|
||||||
'src/ios/third_party/earl_grey2/src': {
|
'src/ios/third_party/earl_grey2/src': {
|
||||||
'url': Var('chromium_git') + '/external/github.com/google/EarlGrey.git' + '@' + '53a2982c85ac6cf802719603d037ad3be7091ebb',
|
'url': Var('chromium_git') + '/external/github.com/google/EarlGrey.git' + '@' + '16126e61e3b831b005a91d83cecefd54628530bb',
|
||||||
'condition': 'checkout_ios',
|
'condition': 'checkout_ios',
|
||||||
},
|
},
|
||||||
|
|
||||||
'src/ios/third_party/edo/src': {
|
'src/ios/third_party/edo/src': {
|
||||||
'url': Var('chromium_git') + '/external/github.com/google/eDistantObject.git' + '@' + '3d3dcee71993376f3abcf3457b046c1df6c13182',
|
'url': Var('chromium_git') + '/external/github.com/google/eDistantObject.git' + '@' + '07ef2f35406e9f04cf86d11da5cc62d58f36cb15',
|
||||||
'condition': 'checkout_ios',
|
'condition': 'checkout_ios',
|
||||||
},
|
},
|
||||||
|
|
||||||
@ -791,8 +765,13 @@ deps = {
|
|||||||
'condition': 'checkout_ios',
|
'condition': 'checkout_ios',
|
||||||
},
|
},
|
||||||
|
|
||||||
|
'src/ios/third_party/gcdwebserver/src': {
|
||||||
|
'url': Var('chromium_git') + '/external/github.com/swisspol/GCDWebServer.git' + '@' + '43555c66627f6ed44817855a0f6d465f559d30e0',
|
||||||
|
'condition': 'checkout_ios',
|
||||||
|
},
|
||||||
|
|
||||||
'src/ios/third_party/material_components_ios/src': {
|
'src/ios/third_party/material_components_ios/src': {
|
||||||
'url': Var('chromium_git') + '/external/github.com/material-components/material-components-ios.git' + '@' + '425d641798c86ab809fcb067bbb265958756af98',
|
'url': Var('chromium_git') + '/external/github.com/material-components/material-components-ios.git' + '@' + '8225446a8df15e53e96304852f134259e0e5e2df',
|
||||||
'condition': 'checkout_ios',
|
'condition': 'checkout_ios',
|
||||||
},
|
},
|
||||||
|
|
||||||
@ -817,7 +796,7 @@ deps = {
|
|||||||
},
|
},
|
||||||
|
|
||||||
'src/ios/third_party/material_text_accessibility_ios/src': {
|
'src/ios/third_party/material_text_accessibility_ios/src': {
|
||||||
'url': Var('chromium_git') + '/external/github.com/material-foundation/material-text-accessibility-ios.git' + '@' + '8cd910c1c8bbae261ae0d7e873ed96c69a386448',
|
'url': Var('chromium_git') + '/external/github.com/material-foundation/material-text-accessibility-ios.git' + '@' + '197375261e25ee5d473219d0f353a1f635f5393d',
|
||||||
'condition': 'checkout_ios',
|
'condition': 'checkout_ios',
|
||||||
},
|
},
|
||||||
|
|
||||||
@ -862,7 +841,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromium/rts/model/linux-amd64',
|
'package': 'chromium/rts/model/linux-amd64',
|
||||||
'version': 'XlzIsX8AH06QHVAMzpKt5aT3nfupjnBr78ztG18pXdsC',
|
'version': 'gpPYMz2bs2vn_NVI9vEIw6a1w2oQ7ck6CsoRISA8fgoC',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'dep_type': 'cipd',
|
'dep_type': 'cipd',
|
||||||
@ -873,7 +852,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromium/rts/model/mac-amd64',
|
'package': 'chromium/rts/model/mac-amd64',
|
||||||
'version': 'CPhzNoasDtJ45F8bwTLs7lIQDiy-PhdReFmXrlL5FDoC',
|
'version': 'swy7IasO6Zn8zMTIWXP3ixCvml7S_2vUby60ZuPlFdEC',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'dep_type': 'cipd',
|
'dep_type': 'cipd',
|
||||||
@ -884,24 +863,13 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromium/rts/model/windows-amd64',
|
'package': 'chromium/rts/model/windows-amd64',
|
||||||
'version': 'XmZtpYZGxTqwBMgEXpdyfrdCxx79QfYeVlhpviF2OUcC',
|
'version': 'eIvALKHzZkCX0uLI5LLb8fpo2ckXFiu_dh4_8SdQyE8C',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'dep_type': 'cipd',
|
'dep_type': 'cipd',
|
||||||
'condition': 'checkout_rts_model and checkout_win',
|
'condition': 'checkout_rts_model and checkout_win',
|
||||||
},
|
},
|
||||||
|
|
||||||
'src/testing/rts/rts-ml-chromium/linux-amd64': {
|
|
||||||
'packages': [
|
|
||||||
{
|
|
||||||
'package': 'experimental/google.com/sshrimp/chromium/rts/model/linux-amd64',
|
|
||||||
'version': '3K1dz8hGV_xBeEcPKmXfrPYWCwXdRf6KVVLrg7AuJ0sC',
|
|
||||||
},
|
|
||||||
],
|
|
||||||
'dep_type': 'cipd',
|
|
||||||
'condition': 'checkout_rts_experimental_model and checkout_linux',
|
|
||||||
},
|
|
||||||
|
|
||||||
'src/tools/luci-go': {
|
'src/tools/luci-go': {
|
||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
@ -952,7 +920,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromium/third_party/androidx',
|
'package': 'chromium/third_party/androidx',
|
||||||
'version': 'gAsD4l8EoP_W0IH5vzedZ1tyN3-wAP8-fqkaS_mX6rcC',
|
'version': 'rMO5RMLXC5cyz-Lk9zE9bV66Gc8ggeO7EPkCxYXNO2oC',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'condition': 'checkout_android',
|
'condition': 'checkout_android',
|
||||||
@ -985,7 +953,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromium/third_party/android_build_tools/aapt2',
|
'package': 'chromium/third_party/android_build_tools/aapt2',
|
||||||
'version': 'hf9C5IyJUUGaBnzqu60xiFJSyfAmjqjc_PiNXNVc9l0C',
|
'version': 'jziPmg_EUjoj-eSkO24eMaf5ylm449Q7BKO1-ga2tbgC',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'condition': 'checkout_android',
|
'condition': 'checkout_android',
|
||||||
@ -996,29 +964,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromium/third_party/android_build_tools/bundletool',
|
'package': 'chromium/third_party/android_build_tools/bundletool',
|
||||||
'version': 'qLkNwA6wjoqznVqaa151GelgGBP4X495n0z-jluACPcC',
|
'version': 'AqsPZpWJh-ZyGraHKlbH8XgjRnmyDmolX4HhwPEo9XUC',
|
||||||
},
|
|
||||||
],
|
|
||||||
'condition': 'checkout_android',
|
|
||||||
'dep_type': 'cipd',
|
|
||||||
},
|
|
||||||
|
|
||||||
'src/third_party/android_build_tools/lint': {
|
|
||||||
'packages': [
|
|
||||||
{
|
|
||||||
'package': 'chromium/third_party/android_build_tools/lint',
|
|
||||||
'version': 'INnGGTfg5gGJutJiBtWI6-QwusHDDnKvZzI53Q3UiecC',
|
|
||||||
},
|
|
||||||
],
|
|
||||||
'condition': 'checkout_android',
|
|
||||||
'dep_type': 'cipd',
|
|
||||||
},
|
|
||||||
|
|
||||||
'src/third_party/android_build_tools/manifest_merger': {
|
|
||||||
'packages': [
|
|
||||||
{
|
|
||||||
'package': 'chromium/third_party/android_build_tools/manifest_merger',
|
|
||||||
'version': '0WkAedh1tJB8lzisWJRT80UjpacKLltuV7NqP-0tx9gC',
|
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'condition': 'checkout_android',
|
'condition': 'checkout_android',
|
||||||
@ -1058,7 +1004,7 @@ deps = {
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
'package': 'chromium/third_party/android_sdk/public/cmdline-tools',
|
'package': 'chromium/third_party/android_sdk/public/cmdline-tools',
|
||||||
'version': 'IPzAG-uU5zVMxohpg9-7-N0tQC1TCSW1VbrBFw7Ld04C',
|
'version': 'PGPmqJtSIQ84If155ba7iTU846h5WJ-bL5d_OoUWEWYC',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'condition': 'checkout_android_native_support',
|
'condition': 'checkout_android_native_support',
|
||||||
@ -1069,7 +1015,7 @@ deps = {
|
|||||||
Var('chromium_git') + '/angle/angle.git' + '@' + Var('angle_revision'),
|
Var('chromium_git') + '/angle/angle.git' + '@' + Var('angle_revision'),
|
||||||
|
|
||||||
'src/third_party/content_analysis_sdk/src':
|
'src/third_party/content_analysis_sdk/src':
|
||||||
Var('chromium_git') + '/external/github.com/chromium/content_analysis_sdk.git' + '@' + '1d7dd0490808a8a972949521cc314e42d085c69f',
|
Var('chromium_git') + '/external/github.com/chromium/content_analysis_sdk.git' + '@' + 'd2a0b6188bcbae674f8ef2c42c7cffc908ac632e',
|
||||||
|
|
||||||
'src/third_party/dav1d/libdav1d':
|
'src/third_party/dav1d/libdav1d':
|
||||||
Var('chromium_git') + '/external/github.com/videolan/dav1d.git' + '@' + '87f9a81cd770e49394a45deca7a3df41243de00b',
|
Var('chromium_git') + '/external/github.com/videolan/dav1d.git' + '@' + '87f9a81cd770e49394a45deca7a3df41243de00b',
|
||||||
@ -1101,6 +1047,17 @@ deps = {
|
|||||||
'src/third_party/boringssl/src':
|
'src/third_party/boringssl/src':
|
||||||
Var('boringssl_git') + '/boringssl.git' + '@' + Var('boringssl_revision'),
|
Var('boringssl_git') + '/boringssl.git' + '@' + Var('boringssl_revision'),
|
||||||
|
|
||||||
|
'src/third_party/bouncycastle': {
|
||||||
|
'packages': [
|
||||||
|
{
|
||||||
|
'package': 'chromium/third_party/bouncycastle',
|
||||||
|
'version': 'c078e87552ba26e776566fdaf0f22cd8712743d0',
|
||||||
|
},
|
||||||
|
],
|
||||||
|
'condition': 'checkout_android',
|
||||||
|
'dep_type': 'cipd',
|
||||||
|
},
|
||||||
|
|
||||||
'src/third_party/breakpad/breakpad':
|
'src/third_party/breakpad/breakpad':
|
||||||
Var('chromium_git') + '/breakpad/breakpad.git' + '@' + 'c4c43b80ea8854c57a4374ac32579b577172dc23',
|
Var('chromium_git') + '/breakpad/breakpad.git' + '@' + 'c4c43b80ea8854c57a4374ac32579b577172dc23',
|
||||||
|
|
||||||
@ -1127,7 +1084,7 @@ deps = {
|
|||||||
},
|
},
|
||||||
|
|
||||||
'src/third_party/cast_core/public/src':
|
'src/third_party/cast_core/public/src':
|
||||||
Var('chromium_git') + '/cast_core/public' + '@' + '8ba5ff47563d0ca8233e8fa009377ed14a560cf4',
|
Var('chromium_git') + '/cast_core/public' + '@' + '6c053df4fe5aea168ca651e2d95dc5dc40ebe059',
|
||||||
|
|
||||||
'src/third_party/catapult':
|
'src/third_party/catapult':
|
||||||
Var('chromium_git') + '/catapult.git' + '@' + Var('catapult_revision'),
|
Var('chromium_git') + '/catapult.git' + '@' + Var('catapult_revision'),
|
||||||
@ -1156,7 +1113,7 @@ deps = {
|
|||||||
# Tools used when building Chrome for Chrome OS. This affects both the Simple
|
# Tools used when building Chrome for Chrome OS. This affects both the Simple
|
||||||
# Chrome workflow, as well as the chromeos-chrome ebuild.
|
# Chrome workflow, as well as the chromeos-chrome ebuild.
|
||||||
'src/third_party/chromite': {
|
'src/third_party/chromite': {
|
||||||
'url': Var('chromium_git') + '/chromiumos/chromite.git' + '@' + '60350fcfeb0bca00eba2794f53661a1b996a79a5',
|
'url': Var('chromium_git') + '/chromiumos/chromite.git' + '@' + '41d2e02e8d1438445eee7463ae4536fe6280e0fc',
|
||||||
'condition': 'checkout_chromeos',
|
'condition': 'checkout_chromeos',
|
||||||
},
|
},
|
||||||
|
|
||||||
@ -1174,17 +1131,12 @@ deps = {
|
|||||||
|
|
||||||
# For Linux and Chromium OS.
|
# For Linux and Chromium OS.
|
||||||
'src/third_party/cros_system_api': {
|
'src/third_party/cros_system_api': {
|
||||||
'url': Var('chromium_git') + '/chromiumos/platform2/system_api.git' + '@' + 'f3b1373caf7bd717be4f0d21ab8c738c6bfcf418',
|
'url': Var('chromium_git') + '/chromiumos/platform2/system_api.git' + '@' + '315a946dfdf2b0d850e35ec2dbca7ad45525c6ff',
|
||||||
'condition': 'checkout_linux',
|
'condition': 'checkout_linux',
|
||||||
},
|
},
|
||||||
|
|
||||||
'src/third_party/crubit/src': {
|
|
||||||
'url': Var('chromium_git') + '/external/github.com/google/crubit.git' + '@' + Var('crubit_revision'),
|
|
||||||
'condition': 'checkout_crubit',
|
|
||||||
},
|
|
||||||
|
|
||||||
'src/third_party/depot_tools':
|
'src/third_party/depot_tools':
|
||||||
Var('chromium_git') + '/chromium/tools/depot_tools.git' + '@' + '0ba2fd429dd6db431fcbee6995c1278d2a3657a0',
|
Var('chromium_git') + '/chromium/tools/depot_tools.git' + '@' + 'a4b3602457c422f8ed054ff3673baaecedc2972a',
|
||||||
|
|
||||||
'src/third_party/devtools-frontend/src':
|
'src/third_party/devtools-frontend/src':
|
||||||
Var('chromium_git') + '/devtools/devtools-frontend' + '@' + Var('devtools_frontend_revision'),
|
Var('chromium_git') + '/devtools/devtools-frontend' + '@' + Var('devtools_frontend_revision'),
|
||||||
@ -1193,7 +1145,7 @@ deps = {
|
|||||||
Var('chromium_git') + '/chromium/dom-distiller/dist.git' + '@' + '199de96b345ada7c6e7e6ba3d2fa7a6911b8767d',
|
Var('chromium_git') + '/chromium/dom-distiller/dist.git' + '@' + '199de96b345ada7c6e7e6ba3d2fa7a6911b8767d',
|
||||||
|
|
||||||
'src/third_party/eigen3/src':
|
'src/third_party/eigen3/src':
|
||||||
Var('chromium_git') + '/external/gitlab.com/libeigen/eigen.git' + '@' + '0e187141679fdb91da33249d18cb79a011c0e2ea',
|
Var('chromium_git') + '/external/gitlab.com/libeigen/eigen.git' + '@' + 'b02c384ef4e8eba7b8bdef16f9dc6f8f4d6a6b2b',
|
||||||
|
|
||||||
'src/third_party/emoji-metadata/src': {
|
'src/third_party/emoji-metadata/src': {
|
||||||
'url': Var('chromium_git') + '/external/github.com/googlefonts/emoji-metadata' + '@' + '8de89a7a36cd024dcd30ac9f67f3f02c37a7c8fb',
|
'url': Var('chromium_git') + '/external/github.com/googlefonts/emoji-metadata' + '@' + '8de89a7a36cd024dcd30ac9f67f3f02c37a7c8fb',
|
||||||
@ -1215,13 +1167,13 @@ deps = {
|
|||||||
Var('chromium_git') + '/external/github.com/google/farmhash.git' + '@' + '816a4ae622e964763ca0862d9dbd19324a1eaf45',
|
Var('chromium_git') + '/external/github.com/google/farmhash.git' + '@' + '816a4ae622e964763ca0862d9dbd19324a1eaf45',
|
||||||
|
|
||||||
'src/third_party/ffmpeg':
|
'src/third_party/ffmpeg':
|
||||||
Var('chromium_git') + '/chromium/third_party/ffmpeg.git' + '@' + Var('ffmpeg_revision'),
|
Var('chromium_git') + '/chromium/third_party/ffmpeg.git' + '@' + 'abfc2628f25d283c27ffc960a8ff820ae8110467',
|
||||||
|
|
||||||
'src/third_party/flac':
|
'src/third_party/flac':
|
||||||
Var('chromium_git') + '/chromium/deps/flac.git' + '@' + 'af862024c8c8fa0ae07ced05e89013d881b00596',
|
Var('chromium_git') + '/chromium/deps/flac.git' + '@' + 'af862024c8c8fa0ae07ced05e89013d881b00596',
|
||||||
|
|
||||||
'src/third_party/flatbuffers/src':
|
'src/third_party/flatbuffers/src':
|
||||||
Var('chromium_git') + '/external/github.com/google/flatbuffers.git' + '@' + '0fe13cb28ce5a3fb81f654b21cb37c9821194962',
|
Var('chromium_git') + '/external/github.com/google/flatbuffers.git' + '@' + 'b8aaccee8248059b2af032cca0eb1d2ddbdb6cdc',
|
||||||
|
|
||||||
# Used for embedded builds. CrOS & Linux use the system version.
|
# Used for embedded builds. CrOS & Linux use the system version.
|
||||||
'src/third_party/fontconfig/src': {
|
'src/third_party/fontconfig/src': {
|
||||||
@ -1236,7 +1188,7 @@ deps = {
|
|||||||
Var('chromium_git') + '/external/github.com/google/gemmlowp.git' + '@' + '13d57703abca3005d97b19df1f2db731607a7dc2',
|
Var('chromium_git') + '/external/github.com/google/gemmlowp.git' + '@' + '13d57703abca3005d97b19df1f2db731607a7dc2',
|
||||||
|
|
||||||
'src/third_party/grpc/src': {
|
'src/third_party/grpc/src': {
|
||||||
'url': Var('chromium_git') + '/external/github.com/grpc/grpc.git' + '@' + '89f7534e43cf73f56c492a9cf7eb85ca6bfbd87a',
|
'url': Var('chromium_git') + '/external/github.com/grpc/grpc.git' + '@' + 'd1338d8751231bdc0d87e732d25420e87d24cffd',
|
||||||
},
|
},
|
||||||
|
|
||||||
'src/third_party/freetype/src':
|
'src/third_party/freetype/src':
|
||||||
@ -1258,7 +1210,7 @@ deps = {
|
|||||||
Var('chromium_git') + '/external/github.com/khaledhosny/ots.git' + '@' + Var('ots_revision'),
|
Var('chromium_git') + '/external/github.com/khaledhosny/ots.git' + '@' + Var('ots_revision'),
|
||||||
|
|
||||||
'src/third_party/libgav1/src':
|
'src/third_party/libgav1/src':
|
||||||
Var('chromium_git') + '/codecs/libgav1.git' + '@' + 'cd53f7c0d6a1c005e38874d143c8876d375bae70',
|
Var('chromium_git') + '/codecs/libgav1.git' + '@' + '38ca0c62d9079820bbb872d81738770c0a28ae6d',
|
||||||
|
|
||||||
'src/third_party/google_toolbox_for_mac/src': {
|
'src/third_party/google_toolbox_for_mac/src': {
|
||||||
'url': Var('chromium_git') + '/external/github.com/google/google-toolbox-for-mac.git' + '@' + Var('google_toolbox_for_mac_revision'),
|
'url': Var('chromium_git') + '/external/github.com/google/google-toolbox-for-mac.git' + '@' + Var('google_toolbox_for_mac_revision'),
|
||||||
@ -1296,7 +1248,7 @@ deps = {
|
|||||||
},
|
},
|
||||||
|
|
||||||
'src/third_party/arcore-android-sdk/src': {
|
'src/third_party/arcore-android-sdk/src': {
|
||||||
'url': Var('chromium_git') + '/external/github.com/google-ar/arcore-android-sdk.git' + '@' + 'd197af6b38f98d2344bc7f76326c4aa0c4f2fb90',
|
'url': Var('chromium_git') + '/external/github.com/google-ar/arcore-android-sdk.git' + '@' + 'eaa85941f2d724c60671bf94f46de7178baba7e6',
|
||||||
'condition': 'checkout_android',
|
'condition': 'checkout_android',
|
||||||
},
|
},
|
||||||
|
|
||||||
@ -1304,7 +1256,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromium/third_party/arcore-android-sdk-client',
|
'package': 'chromium/third_party/arcore-android-sdk-client',
|
||||||
'version': 'NYf1qvBS9hNVK-6exAl-MaVbQsRKCDYl5Br936GtcU0C',
|
'version': 'fUSZ4jxIhIx34TxRIcrmOu76-khcka_Gpn0_t9lKCWQC',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
|
|
||||||
@ -1338,7 +1290,7 @@ deps = {
|
|||||||
Var('chromium_git') + '/chromium/deps/hunspell_dictionaries.git' + '@' + '41cdffd71c9948f63c7ad36e1fb0ff519aa7a37e',
|
Var('chromium_git') + '/chromium/deps/hunspell_dictionaries.git' + '@' + '41cdffd71c9948f63c7ad36e1fb0ff519aa7a37e',
|
||||||
|
|
||||||
'src/third_party/icu':
|
'src/third_party/icu':
|
||||||
Var('chromium_git') + '/chromium/deps/icu.git' + '@' + '6e558942cc8b83e525bdabaf987e06af8a377314',
|
Var('chromium_git') + '/chromium/deps/icu.git' + '@' + '12de966fcbe1d1a48dba310aee63807856ffeee8',
|
||||||
|
|
||||||
'src/third_party/icu4j': {
|
'src/third_party/icu4j': {
|
||||||
'packages': [
|
'packages': [
|
||||||
@ -1406,10 +1358,10 @@ deps = {
|
|||||||
Var('chromium_git') + '/chromium/llvm-project/compiler-rt/lib/fuzzer.git' + '@' + Var('libfuzzer_revision'),
|
Var('chromium_git') + '/chromium/llvm-project/compiler-rt/lib/fuzzer.git' + '@' + Var('libfuzzer_revision'),
|
||||||
|
|
||||||
'src/third_party/libaddressinput/src':
|
'src/third_party/libaddressinput/src':
|
||||||
Var('chromium_git') + '/external/libaddressinput.git' + '@' + 'df35d6c42da4fa2759e4cfb592afe33817993b89',
|
Var('chromium_git') + '/external/libaddressinput.git' + '@' + 'a56be6f77ea76a9e77561ca306acede244631610',
|
||||||
|
|
||||||
'src/third_party/libaom/source/libaom':
|
'src/third_party/libaom/source/libaom':
|
||||||
Var('aomedia_git') + '/aom.git' + '@' + '8dcdafc6d4a2f9f8ea8104f26eca5d123eefcb7f',
|
Var('aomedia_git') + '/aom.git' + '@' + '32d6783c4c9f6e78f43bd4ceffaa0eb2143aed57',
|
||||||
|
|
||||||
'src/third_party/libavif/src':
|
'src/third_party/libavif/src':
|
||||||
Var('chromium_git') + '/external/github.com/AOMediaCodec/libavif.git' + '@' + Var('libavif_revision'),
|
Var('chromium_git') + '/external/github.com/AOMediaCodec/libavif.git' + '@' + Var('libavif_revision'),
|
||||||
@ -1442,7 +1394,7 @@ deps = {
|
|||||||
Var('chromium_git') + '/chromium/deps/libjpeg_turbo.git' + '@' + '22f1a22c99e9dde8cd3c72ead333f425c5a7aa77',
|
Var('chromium_git') + '/chromium/deps/libjpeg_turbo.git' + '@' + '22f1a22c99e9dde8cd3c72ead333f425c5a7aa77',
|
||||||
|
|
||||||
'src/third_party/liblouis/src': {
|
'src/third_party/liblouis/src': {
|
||||||
'url': Var('chromium_git') + '/external/liblouis-github.git' + '@' + '9700847afb92cb35969bdfcbbfbbb74b9c7b3376',
|
'url': Var('chromium_git') + '/external/liblouis-github.git' + '@' + 'c05f3bfb0990434bd12bf6697d16ed943f2203c2',
|
||||||
'condition': 'checkout_linux',
|
'condition': 'checkout_linux',
|
||||||
},
|
},
|
||||||
|
|
||||||
@ -1467,16 +1419,13 @@ deps = {
|
|||||||
},
|
},
|
||||||
|
|
||||||
'src/third_party/libvpx/source/libvpx':
|
'src/third_party/libvpx/source/libvpx':
|
||||||
Var('chromium_git') + '/webm/libvpx.git' + '@' + '711bef67400f096416cb1ba7f6560e533871490f',
|
Var('chromium_git') + '/webm/libvpx.git' + '@' + 'ca89bed50dbc5fe2abef50c5f36924bb1da6d1f6',
|
||||||
|
|
||||||
'src/third_party/libwebm/source':
|
'src/third_party/libwebm/source':
|
||||||
Var('chromium_git') + '/webm/libwebm.git' + '@' + 'e4fbea0c9751ae8aa86629b197a28d8276a2b0da',
|
Var('chromium_git') + '/webm/libwebm.git' + '@' + 'e4fbea0c9751ae8aa86629b197a28d8276a2b0da',
|
||||||
|
|
||||||
'src/third_party/libwebp/src':
|
|
||||||
Var('chromium_git') + '/webm/libwebp.git' + '@' + '7366f7f394af26de814296152c50e673ed0a832f',
|
|
||||||
|
|
||||||
'src/third_party/libyuv':
|
'src/third_party/libyuv':
|
||||||
Var('chromium_git') + '/libyuv/libyuv.git' + '@' + 'd248929c059ff7629a85333699717d7a677d8d96',
|
Var('chromium_git') + '/libyuv/libyuv.git' + '@' + '30f9b280487be412da346aecce7834275020976e',
|
||||||
|
|
||||||
'src/third_party/lighttpd': {
|
'src/third_party/lighttpd': {
|
||||||
'url': Var('chromium_git') + '/chromium/deps/lighttpd.git' + '@' + Var('lighttpd_revision'),
|
'url': Var('chromium_git') + '/chromium/deps/lighttpd.git' + '@' + Var('lighttpd_revision'),
|
||||||
@ -1567,7 +1516,7 @@ deps = {
|
|||||||
Var('chromium_git') + '/external/github.com/cisco/openh264' + '@' + 'fac04ceb3e966f613ed17e98178e9d690280bba6',
|
Var('chromium_git') + '/external/github.com/cisco/openh264' + '@' + 'fac04ceb3e966f613ed17e98178e9d690280bba6',
|
||||||
|
|
||||||
'src/third_party/openscreen/src':
|
'src/third_party/openscreen/src':
|
||||||
Var('chromium_git') + '/openscreen' + '@' + '6be6b78224a276e908b8272542d125e133c40f3f',
|
Var('chromium_git') + '/openscreen' + '@' + '1ea464c1b10821e39dd487b6f9e4813c5c8546b0',
|
||||||
|
|
||||||
'src/third_party/openxr/src': {
|
'src/third_party/openxr/src': {
|
||||||
'url': Var('chromium_git') + '/external/github.com/KhronosGroup/OpenXR-SDK' + '@' + 'bf21ccb1007bb531b45d9978919a56ea5059c245',
|
'url': Var('chromium_git') + '/external/github.com/KhronosGroup/OpenXR-SDK' + '@' + 'bf21ccb1007bb531b45d9978919a56ea5059c245',
|
||||||
@ -1584,7 +1533,7 @@ deps = {
|
|||||||
},
|
},
|
||||||
|
|
||||||
'src/third_party/perfetto':
|
'src/third_party/perfetto':
|
||||||
Var('android_git') + '/platform/external/perfetto.git' + '@' + '361efbf9aab595e4dfa79ec48f242d9e722393c9',
|
Var('android_git') + '/platform/external/perfetto.git' + '@' + 'a6b4d9563ec37e531ebcc21912c3078ba4c2b367',
|
||||||
|
|
||||||
'src/third_party/perl': {
|
'src/third_party/perl': {
|
||||||
'url': Var('chromium_git') + '/chromium/deps/perl.git' + '@' + '6f3e5028eb65d0b4c5fdd792106ac4c84eee1eb3',
|
'url': Var('chromium_git') + '/chromium/deps/perl.git' + '@' + '6f3e5028eb65d0b4c5fdd792106ac4c84eee1eb3',
|
||||||
@ -1620,8 +1569,8 @@ deps = {
|
|||||||
'src/third_party/qemu-linux-arm64': {
|
'src/third_party/qemu-linux-arm64': {
|
||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'fuchsia/third_party/qemu/linux-arm64',
|
'package': 'fuchsia/qemu/linux-arm64',
|
||||||
'version': 'BpnoBb2d44_SOm9toN6Lju5a2RLGAc1TPUO6xyijoP8C'
|
'version': 'b1b61a39e3ab0935cd030f27e01740578b04b967'
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'condition': 'host_os == "linux" and checkout_fuchsia and checkout_fuchsia_for_arm64_host',
|
'condition': 'host_os == "linux" and checkout_fuchsia and checkout_fuchsia_for_arm64_host',
|
||||||
@ -1635,7 +1584,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromium/third_party/r8',
|
'package': 'chromium/third_party/r8',
|
||||||
'version': 'auReXfxxD74XGdPdi-rYsKrp4sRwYwgNjh_W0PT7vNcC',
|
'version': 'iMLEt10uXASDfG2AlATR1fO8xYhBoF24nQvDDXLY6Q8C',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'condition': 'checkout_android',
|
'condition': 'checkout_android',
|
||||||
@ -1659,7 +1608,7 @@ deps = {
|
|||||||
},
|
},
|
||||||
|
|
||||||
'src/third_party/ruy/src':
|
'src/third_party/ruy/src':
|
||||||
Var('chromium_git') + '/external/github.com/google/ruy.git' + '@' + '72155b3185246e9143f4c6a3a7f283d2ebba8524',
|
Var('chromium_git') + '/external/github.com/google/ruy.git' + '@' + '7ef39c5745a61f43071e699c6a96da41701ae59f',
|
||||||
|
|
||||||
'src/third_party/skia':
|
'src/third_party/skia':
|
||||||
Var('skia_git') + '/skia.git' + '@' + Var('skia_revision'),
|
Var('skia_git') + '/skia.git' + '@' + Var('skia_revision'),
|
||||||
@ -1671,7 +1620,7 @@ deps = {
|
|||||||
Var('chromium_git') + '/external/github.com/google/snappy.git' + '@' + '65dc7b383985eb4f63cd3e752136db8d9b4be8c0',
|
Var('chromium_git') + '/external/github.com/google/snappy.git' + '@' + '65dc7b383985eb4f63cd3e752136db8d9b4be8c0',
|
||||||
|
|
||||||
'src/third_party/sqlite/src':
|
'src/third_party/sqlite/src':
|
||||||
Var('chromium_git') + '/chromium/deps/sqlite.git' + '@' + 'e6b63421941617bf5ccac6b4a62d7a7b4a2c3fef',
|
Var('chromium_git') + '/chromium/deps/sqlite.git' + '@' + 'cb47d7089f714e4514f126dfa8ac630cab78ea32',
|
||||||
|
|
||||||
'src/third_party/sqlite4java': {
|
'src/third_party/sqlite4java': {
|
||||||
'packages': [
|
'packages': [
|
||||||
@ -1702,20 +1651,25 @@ deps = {
|
|||||||
Var('chromium_git') + '/external/github.com/GoogleChromeLabs/text-fragments-polyfill.git' + '@' + 'c036420683f672d685e27415de0a5f5e85bdc23f',
|
Var('chromium_git') + '/external/github.com/GoogleChromeLabs/text-fragments-polyfill.git' + '@' + 'c036420683f672d685e27415de0a5f5e85bdc23f',
|
||||||
|
|
||||||
'src/third_party/tflite/src':
|
'src/third_party/tflite/src':
|
||||||
Var('chromium_git') + '/external/github.com/tensorflow/tensorflow.git' + '@' + 'ac31ffa987c14665062c00f98ec025a3fdc185ab',
|
Var('chromium_git') + '/external/github.com/tensorflow/tensorflow.git' + '@' + '5ddefa9f8d1455c8ca694ba1a511ba82e3a88960',
|
||||||
|
|
||||||
'src/third_party/turbine': {
|
'src/third_party/turbine': {
|
||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromium/third_party/turbine',
|
'package': 'chromium/third_party/turbine',
|
||||||
'version': 'RxaW8ZVJZ7rF3dbAGbL1OV6f9ZELjVeiiQbpkDsuxA4C',
|
'version': 'A5bkaoLBc1JYa6Xv31jYUCK5TnXYCbxRrA4FBPXXcWgC',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'condition': 'checkout_android',
|
'condition': 'checkout_android',
|
||||||
'dep_type': 'cipd',
|
'dep_type': 'cipd',
|
||||||
},
|
},
|
||||||
|
|
||||||
'src/third_party/vulkan-deps': '{chromium_git}/vulkan-deps@c42337d9ef75170244486b580bad7dfe78447bfd',
|
'src/third_party/ub-uiautomator/lib': {
|
||||||
|
'url': Var('chromium_git') + '/chromium/third_party/ub-uiautomator.git' + '@' + '00270549ce3161ae72ceb24712618ea28b4f9434',
|
||||||
|
'condition': 'checkout_android',
|
||||||
|
},
|
||||||
|
|
||||||
|
'src/third_party/vulkan-deps': '{chromium_git}/vulkan-deps@12989fc8d7d273b5b95ef988d37469738eb9c39b',
|
||||||
|
|
||||||
'src/third_party/vulkan_memory_allocator':
|
'src/third_party/vulkan_memory_allocator':
|
||||||
Var('chromium_git') + '/external/github.com/GPUOpen-LibrariesAndSDKs/VulkanMemoryAllocator.git' + '@' + 'ebe84bec02c041d28f902da0214bf442743fc907',
|
Var('chromium_git') + '/external/github.com/GPUOpen-LibrariesAndSDKs/VulkanMemoryAllocator.git' + '@' + 'ebe84bec02c041d28f902da0214bf442743fc907',
|
||||||
@ -1748,13 +1702,13 @@ deps = {
|
|||||||
Var('chromium_git') + '/external/github.com/SeleniumHQ/selenium/py.git' + '@' + 'd0045ec570c1a77612db35d1e92f05e1d27b4d53',
|
Var('chromium_git') + '/external/github.com/SeleniumHQ/selenium/py.git' + '@' + 'd0045ec570c1a77612db35d1e92f05e1d27b4d53',
|
||||||
|
|
||||||
'src/third_party/webgl/src':
|
'src/third_party/webgl/src':
|
||||||
Var('chromium_git') + '/external/khronosgroup/webgl.git' + '@' + '44e4c8770158c505b03ee7feafa4859d083b0912',
|
Var('chromium_git') + '/external/khronosgroup/webgl.git' + '@' + 'bb289ce3cb15bbabd42fdcb01439367846d9069d',
|
||||||
|
|
||||||
'src/third_party/webgpu-cts/src':
|
'src/third_party/webgpu-cts/src':
|
||||||
Var('chromium_git') + '/external/github.com/gpuweb/cts.git' + '@' + 'c4eb1df3f306c0ee3e43ba2446eb3616e42d6855',
|
Var('chromium_git') + '/external/github.com/gpuweb/cts.git' + '@' + '84183b561b7f44b2eae6a5f268d5085accb0ad7a',
|
||||||
|
|
||||||
'src/third_party/webrtc':
|
'src/third_party/webrtc':
|
||||||
Var('webrtc_git') + '/src.git' + '@' + 'dc5cf31cad576376abd3aa6306169453cfd85ba5',
|
Var('webrtc_git') + '/src.git' + '@' + '06aea31d10f860ae4236e3422252557762d39188',
|
||||||
|
|
||||||
'src/third_party/libgifcodec':
|
'src/third_party/libgifcodec':
|
||||||
Var('skia_git') + '/libgifcodec' + '@'+ Var('libgifcodec_revision'),
|
Var('skia_git') + '/libgifcodec' + '@'+ Var('libgifcodec_revision'),
|
||||||
@ -1775,7 +1729,7 @@ deps = {
|
|||||||
},
|
},
|
||||||
|
|
||||||
'src/third_party/xnnpack/src':
|
'src/third_party/xnnpack/src':
|
||||||
Var('chromium_git') + '/external/github.com/google/XNNPACK.git' + '@' + 'a33b227047def29b79853ef688b6dda6c6fc5386',
|
Var('chromium_git') + '/external/github.com/google/XNNPACK.git' + '@' + 'da533e0114f2bf730f17853ae10556d84a3d1e89',
|
||||||
|
|
||||||
'src/tools/page_cycler/acid3':
|
'src/tools/page_cycler/acid3':
|
||||||
Var('chromium_git') + '/chromium/deps/acid3.git' + '@' + '6be0a66a1ebd7ebc5abc1b2f405a945f6d871521',
|
Var('chromium_git') + '/chromium/deps/acid3.git' + '@' + '6be0a66a1ebd7ebc5abc1b2f405a945f6d871521',
|
||||||
@ -1784,7 +1738,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'skia/tools/goldctl/linux-amd64',
|
'package': 'skia/tools/goldctl/linux-amd64',
|
||||||
'version': 'BquSeorcTU84O2_A8IoWetGrcfLWxLfZCo9sve1Wt2IC',
|
'version': 'l0eo0uR9oMGZFKDucYLGk3vdNGAunP4tGrDhIfzljdcC',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'dep_type': 'cipd',
|
'dep_type': 'cipd',
|
||||||
@ -1794,7 +1748,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'skia/tools/goldctl/windows-amd64',
|
'package': 'skia/tools/goldctl/windows-amd64',
|
||||||
'version': 'AOoQr1u4-cOIEYJDAgVxGWoTiPaRcjrSsjjAaB-u_ggC',
|
'version': '7YFnDYPdgUOTWkaZe19LzWhmwWBuVMM9Q02sTDQtlkgC',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'dep_type': 'cipd',
|
'dep_type': 'cipd',
|
||||||
@ -1805,7 +1759,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'skia/tools/goldctl/mac-amd64',
|
'package': 'skia/tools/goldctl/mac-amd64',
|
||||||
'version': '-t3YY_sZ-jtMAYZ2PlhjudFnEUgk4m-HjlIwSip4tOAC',
|
'version': '4shFavk40_bOJI9zUzvH2PaMW7tHKuxeEN0zik75F7sC',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'dep_type': 'cipd',
|
'dep_type': 'cipd',
|
||||||
@ -1816,7 +1770,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'skia/tools/goldctl/mac-arm64',
|
'package': 'skia/tools/goldctl/mac-arm64',
|
||||||
'version': 'x_xKUnqrgizoTO8mxX4RkyhpQ-nUp_x_go9YH-tc--QC',
|
'version': 'Ynx3axT8ZDN7Nl5pNwI5w8PCCt7jax5FGf8jcyjUzt4C',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'dep_type': 'cipd',
|
'dep_type': 'cipd',
|
||||||
@ -1827,7 +1781,7 @@ deps = {
|
|||||||
Var('chromium_git') + '/v8/v8.git' + '@' + Var('v8_revision'),
|
Var('chromium_git') + '/v8/v8.git' + '@' + Var('v8_revision'),
|
||||||
|
|
||||||
'src-internal': {
|
'src-internal': {
|
||||||
'url': 'https://chrome-internal.googlesource.com/chrome/src-internal.git@c29563eac12bc062b66805a4766673729ce7d4ef',
|
'url': 'https://chrome-internal.googlesource.com/chrome/src-internal.git@4ff96f70fd1b507f17579577080637625e6e2ef8',
|
||||||
'condition': 'checkout_src_internal',
|
'condition': 'checkout_src_internal',
|
||||||
},
|
},
|
||||||
|
|
||||||
@ -1846,7 +1800,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromeos_internal/apps/eche_app/app',
|
'package': 'chromeos_internal/apps/eche_app/app',
|
||||||
'version': 'PEjYa5GVISxpuqCZfq9pZ3QeSWhNtWSdQ6gmJ8bizQ0C',
|
'version': '3AnrwGQwN1GPv9gbT4wn-9ScZNzXc5x6e68tt5yFI30C',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'condition': 'checkout_chromeos and checkout_src_internal',
|
'condition': 'checkout_chromeos and checkout_src_internal',
|
||||||
@ -1857,7 +1811,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromeos_internal/apps/help_app/app',
|
'package': 'chromeos_internal/apps/help_app/app',
|
||||||
'version': 'MqUROEBmHZCBRsEY3abQ7JOvoDr5wZ_MTK3vAN-901wC',
|
'version': 'Vmw_AXRtISh_bHtp8evOfKkTHoF7PksGw7-UBEamlI0C',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'condition': 'checkout_chromeos and checkout_src_internal',
|
'condition': 'checkout_chromeos and checkout_src_internal',
|
||||||
@ -1868,7 +1822,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromeos_internal/apps/media_app/app',
|
'package': 'chromeos_internal/apps/media_app/app',
|
||||||
'version': 'tV1aN61vvzGiDSJgQxN_namEG8pvO6RTuO-qbQMC51IC',
|
'version': 'XXOw6zqfIbq0PGDfk6FNetf4Bsym6nYVy42v7R5n2AoC',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'condition': 'checkout_chromeos and checkout_src_internal',
|
'condition': 'checkout_chromeos and checkout_src_internal',
|
||||||
@ -1879,7 +1833,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromeos_internal/apps/projector_app/app',
|
'package': 'chromeos_internal/apps/projector_app/app',
|
||||||
'version': 'Eeqz2JXdGXA3-P7iu9xSzSc3iyUuAruoN1W3-FplxR4C',
|
'version': 'C5cTyNZYNM9JtGlk_csAXrSxTsH8Mk2vTIU2dEfjRskC',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'condition': 'checkout_chromeos and checkout_src_internal',
|
'condition': 'checkout_chromeos and checkout_src_internal',
|
||||||
@ -3206,17 +3160,6 @@ deps = {
|
|||||||
'dep_type': 'cipd',
|
'dep_type': 'cipd',
|
||||||
},
|
},
|
||||||
|
|
||||||
'src/third_party/android_deps/libs/org_bouncycastle_bcprov_jdk15on': {
|
|
||||||
'packages': [
|
|
||||||
{
|
|
||||||
'package': 'chromium/third_party/android_deps/libs/org_bouncycastle_bcprov_jdk15on',
|
|
||||||
'version': 'version:2@1.68.cr1',
|
|
||||||
},
|
|
||||||
],
|
|
||||||
'condition': 'checkout_android',
|
|
||||||
'dep_type': 'cipd',
|
|
||||||
},
|
|
||||||
|
|
||||||
'src/third_party/android_deps/libs/org_ccil_cowan_tagsoup_tagsoup': {
|
'src/third_party/android_deps/libs/org_ccil_cowan_tagsoup_tagsoup': {
|
||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
@ -3309,7 +3252,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromium/third_party/android_deps/libs/org_jetbrains_kotlin_kotlin_stdlib',
|
'package': 'chromium/third_party/android_deps/libs/org_jetbrains_kotlin_kotlin_stdlib',
|
||||||
'version': 'version:2@1.7.0.cr1',
|
'version': 'version:2@1.6.21.cr1',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'condition': 'checkout_android',
|
'condition': 'checkout_android',
|
||||||
@ -3320,7 +3263,7 @@ deps = {
|
|||||||
'packages': [
|
'packages': [
|
||||||
{
|
{
|
||||||
'package': 'chromium/third_party/android_deps/libs/org_jetbrains_kotlin_kotlin_stdlib_common',
|
'package': 'chromium/third_party/android_deps/libs/org_jetbrains_kotlin_kotlin_stdlib_common',
|
||||||
'version': 'version:2@1.7.0.cr1',
|
'version': 'version:2@1.6.21.cr1',
|
||||||
},
|
},
|
||||||
],
|
],
|
||||||
'condition': 'checkout_android',
|
'condition': 'checkout_android',
|
||||||
@ -3624,15 +3567,6 @@ deps = {
|
|||||||
],
|
],
|
||||||
'dep_type': 'cipd',
|
'dep_type': 'cipd',
|
||||||
},
|
},
|
||||||
|
|
||||||
'src/tools/bazel': {
|
|
||||||
'packages': [{
|
|
||||||
'package': 'infra/3pp/tools/bazel_bootstrap/${{platform}}',
|
|
||||||
'version': 'version:2@5.2.0.1',
|
|
||||||
}],
|
|
||||||
'dep_type': 'cipd',
|
|
||||||
'condition': 'checkout_bazel',
|
|
||||||
},
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
@ -3666,7 +3600,6 @@ include_rules = [
|
|||||||
'-absl',
|
'-absl',
|
||||||
'-third_party/abseil-cpp',
|
'-third_party/abseil-cpp',
|
||||||
'+third_party/abseil-cpp/absl/base/attributes.h',
|
'+third_party/abseil-cpp/absl/base/attributes.h',
|
||||||
"+third_party/abseil-cpp/absl/functional/function_ref.h",
|
|
||||||
"+third_party/abseil-cpp/absl/numeric/int128.h",
|
"+third_party/abseil-cpp/absl/numeric/int128.h",
|
||||||
'+third_party/abseil-cpp/absl/types/optional.h',
|
'+third_party/abseil-cpp/absl/types/optional.h',
|
||||||
'+third_party/abseil-cpp/absl/types/variant.h',
|
'+third_party/abseil-cpp/absl/types/variant.h',
|
||||||
@ -3686,6 +3619,20 @@ skip_child_includes = [
|
|||||||
|
|
||||||
|
|
||||||
hooks = [
|
hooks = [
|
||||||
|
# Download and initialize "vpython" VirtualEnv environment packages for
|
||||||
|
# Python2. We do this before running any other hooks so that any other
|
||||||
|
# hooks that might use vpython don't trip over unexpected issues and
|
||||||
|
# don't run slower than they might otherwise need to.
|
||||||
|
{
|
||||||
|
'name': 'vpython_common',
|
||||||
|
'pattern': '.',
|
||||||
|
# TODO(https://crbug.com/1205263): Run this on mac/arm too once it works.
|
||||||
|
'condition': 'not (host_os == "mac" and host_cpu == "arm64") and enable_vpython_common_crbug_1329052',
|
||||||
|
'action': [ 'vpython',
|
||||||
|
'-vpython-spec', 'src/.vpython',
|
||||||
|
'-vpython-tool', 'install',
|
||||||
|
],
|
||||||
|
},
|
||||||
# Download and initialize "vpython" VirtualEnv environment packages for
|
# Download and initialize "vpython" VirtualEnv environment packages for
|
||||||
# Python3. We do this before running any other hooks so that any other
|
# Python3. We do this before running any other hooks so that any other
|
||||||
# hooks that might use vpython don't trip over unexpected issues and
|
# hooks that might use vpython don't trip over unexpected issues and
|
||||||
@ -3942,14 +3889,6 @@ hooks = [
|
|||||||
'-s', 'src/third_party/skia',
|
'-s', 'src/third_party/skia',
|
||||||
'--header', 'src/skia/ext/skia_commit_hash.h'],
|
'--header', 'src/skia/ext/skia_commit_hash.h'],
|
||||||
},
|
},
|
||||||
{
|
|
||||||
# Update dawn_version.h.
|
|
||||||
'name': 'lastchange_dawn',
|
|
||||||
'pattern': '.',
|
|
||||||
'action': ['python3', 'src/build/util/lastchange.py',
|
|
||||||
'-s', 'src/third_party/dawn',
|
|
||||||
'--revision', 'src/gpu/webgpu/DAWN_VERSION'],
|
|
||||||
},
|
|
||||||
# Pull dsymutil binaries using checked-in hashes.
|
# Pull dsymutil binaries using checked-in hashes.
|
||||||
{
|
{
|
||||||
'name': 'dsymutil_mac_arm64',
|
'name': 'dsymutil_mac_arm64',
|
||||||
@ -4508,16 +4447,6 @@ hooks = [
|
|||||||
],
|
],
|
||||||
},
|
},
|
||||||
|
|
||||||
{
|
|
||||||
'name': 'Download Fuchsia SDK from GCS',
|
|
||||||
'pattern': '.',
|
|
||||||
'condition': 'checkout_fuchsia',
|
|
||||||
'action': [
|
|
||||||
'python3',
|
|
||||||
'src/build/fuchsia/override_sdk.py',
|
|
||||||
],
|
|
||||||
},
|
|
||||||
|
|
||||||
{
|
{
|
||||||
'name': 'Download Fuchsia system images',
|
'name': 'Download Fuchsia system images',
|
||||||
'pattern': '.',
|
'pattern': '.',
|
||||||
@ -4754,17 +4683,6 @@ hooks = [
|
|||||||
],
|
],
|
||||||
'condition': 'generate_location_tags',
|
'condition': 'generate_location_tags',
|
||||||
},
|
},
|
||||||
|
|
||||||
{
|
|
||||||
# Clean up build dirs for crbug.com/1337238.
|
|
||||||
# After a libc++ roll and revert, .ninja_deps would get into a state
|
|
||||||
# that breaks Ninja on Windows.
|
|
||||||
# TODO(crbug.com/1337238): Remove in a month or so.
|
|
||||||
'name': 'del_ninja_deps_cache',
|
|
||||||
'pattern': '.',
|
|
||||||
'condition': 'host_os == "win"',
|
|
||||||
'action': ['python3', 'src/build/del_ninja_deps_cache.py'],
|
|
||||||
},
|
|
||||||
]
|
]
|
||||||
|
|
||||||
# Add any corresponding DEPS files from this list to chromium.exclusions in
|
# Add any corresponding DEPS files from this list to chromium.exclusions in
|
||||||
|
@ -159,13 +159,6 @@ buildflag_header("ios_cronet_buildflags") {
|
|||||||
flags = [ "CRONET_BUILD=$is_cronet_build" ]
|
flags = [ "CRONET_BUILD=$is_cronet_build" ]
|
||||||
}
|
}
|
||||||
|
|
||||||
enable_message_pump_epoll = is_linux || is_chromeos || is_android
|
|
||||||
buildflag_header("message_pump_buildflags") {
|
|
||||||
header = "message_pump_buildflags.h"
|
|
||||||
header_dir = "base/message_loop"
|
|
||||||
flags = [ "ENABLE_MESSAGE_PUMP_EPOLL=$enable_message_pump_epoll" ]
|
|
||||||
}
|
|
||||||
|
|
||||||
# Base and everything it depends on should be a static library rather than
|
# Base and everything it depends on should be a static library rather than
|
||||||
# a source set. Base is more of a "library" in the classic sense in that many
|
# a source set. Base is more of a "library" in the classic sense in that many
|
||||||
# small parts of it are used in many different contexts. This combined with a
|
# small parts of it are used in many different contexts. This combined with a
|
||||||
@ -187,10 +180,6 @@ mixed_component("base") {
|
|||||||
"allocator/allocator_check.h",
|
"allocator/allocator_check.h",
|
||||||
"allocator/allocator_extension.cc",
|
"allocator/allocator_extension.cc",
|
||||||
"allocator/allocator_extension.h",
|
"allocator/allocator_extension.h",
|
||||||
"allocator/dispatcher/dispatcher.cc",
|
|
||||||
"allocator/dispatcher/dispatcher.h",
|
|
||||||
"allocator/dispatcher/reentry_guard.cc",
|
|
||||||
"allocator/dispatcher/reentry_guard.h",
|
|
||||||
"as_const.h",
|
"as_const.h",
|
||||||
"at_exit.cc",
|
"at_exit.cc",
|
||||||
"at_exit.h",
|
"at_exit.h",
|
||||||
@ -228,8 +217,6 @@ mixed_component("base") {
|
|||||||
"cancelable_callback.h",
|
"cancelable_callback.h",
|
||||||
"check.cc",
|
"check.cc",
|
||||||
"check.h",
|
"check.h",
|
||||||
"check_is_test.cc",
|
|
||||||
"check_is_test.h",
|
|
||||||
"check_op.cc",
|
"check_op.cc",
|
||||||
"check_op.h",
|
"check_op.h",
|
||||||
"command_line.cc",
|
"command_line.cc",
|
||||||
@ -413,7 +400,6 @@ mixed_component("base") {
|
|||||||
"memory/raw_ptr_asan_service.cc",
|
"memory/raw_ptr_asan_service.cc",
|
||||||
"memory/raw_ptr_asan_service.h",
|
"memory/raw_ptr_asan_service.h",
|
||||||
"memory/raw_ptr_exclusion.h",
|
"memory/raw_ptr_exclusion.h",
|
||||||
"memory/raw_ref.h",
|
|
||||||
"memory/raw_scoped_refptr_mismatch_checker.h",
|
"memory/raw_scoped_refptr_mismatch_checker.h",
|
||||||
"memory/read_only_shared_memory_region.cc",
|
"memory/read_only_shared_memory_region.cc",
|
||||||
"memory/read_only_shared_memory_region.h",
|
"memory/read_only_shared_memory_region.h",
|
||||||
@ -512,6 +498,7 @@ mixed_component("base") {
|
|||||||
"native_library.cc",
|
"native_library.cc",
|
||||||
"native_library.h",
|
"native_library.h",
|
||||||
"no_destructor.h",
|
"no_destructor.h",
|
||||||
|
"notreached.cc",
|
||||||
"notreached.h",
|
"notreached.h",
|
||||||
"observer_list.h",
|
"observer_list.h",
|
||||||
"observer_list_internal.cc",
|
"observer_list_internal.cc",
|
||||||
@ -565,6 +552,7 @@ mixed_component("base") {
|
|||||||
"profiler/metadata_recorder.h",
|
"profiler/metadata_recorder.h",
|
||||||
"profiler/module_cache.cc",
|
"profiler/module_cache.cc",
|
||||||
"profiler/module_cache.h",
|
"profiler/module_cache.h",
|
||||||
|
"profiler/native_unwinder.h",
|
||||||
"profiler/profile_builder.h",
|
"profiler/profile_builder.h",
|
||||||
"profiler/register_context.h",
|
"profiler/register_context.h",
|
||||||
"profiler/sample_metadata.cc",
|
"profiler/sample_metadata.cc",
|
||||||
@ -926,7 +914,6 @@ mixed_component("base") {
|
|||||||
"trace_event/trace_id_helper.h",
|
"trace_event/trace_id_helper.h",
|
||||||
"traits_bag.h",
|
"traits_bag.h",
|
||||||
"tuple.h",
|
"tuple.h",
|
||||||
"types/always_false.h",
|
|
||||||
"types/expected.h",
|
"types/expected.h",
|
||||||
"types/expected_internal.h",
|
"types/expected_internal.h",
|
||||||
"types/id_type.h",
|
"types/id_type.h",
|
||||||
@ -1279,9 +1266,9 @@ mixed_component("base") {
|
|||||||
"process/process_iterator_mac.cc",
|
"process/process_iterator_mac.cc",
|
||||||
"process/process_mac.cc",
|
"process/process_mac.cc",
|
||||||
"process/process_metrics_mac.cc",
|
"process/process_metrics_mac.cc",
|
||||||
"profiler/frame_pointer_unwinder.cc",
|
|
||||||
"profiler/frame_pointer_unwinder.h",
|
|
||||||
"profiler/module_cache_mac.cc",
|
"profiler/module_cache_mac.cc",
|
||||||
|
"profiler/native_unwinder_apple.cc",
|
||||||
|
"profiler/native_unwinder_apple.h",
|
||||||
"profiler/stack_sampler_mac.cc",
|
"profiler/stack_sampler_mac.cc",
|
||||||
"profiler/suspendable_thread_delegate_mac.cc",
|
"profiler/suspendable_thread_delegate_mac.cc",
|
||||||
"profiler/suspendable_thread_delegate_mac.h",
|
"profiler/suspendable_thread_delegate_mac.h",
|
||||||
@ -1327,8 +1314,8 @@ mixed_component("base") {
|
|||||||
|
|
||||||
if (ios_stack_profiler_enabled) {
|
if (ios_stack_profiler_enabled) {
|
||||||
sources += [
|
sources += [
|
||||||
"profiler/frame_pointer_unwinder.cc",
|
"profiler/native_unwinder_apple.cc",
|
||||||
"profiler/frame_pointer_unwinder.h",
|
"profiler/native_unwinder_apple.h",
|
||||||
"profiler/suspendable_thread_delegate_mac.cc",
|
"profiler/suspendable_thread_delegate_mac.cc",
|
||||||
"profiler/suspendable_thread_delegate_mac.h",
|
"profiler/suspendable_thread_delegate_mac.h",
|
||||||
]
|
]
|
||||||
@ -1428,13 +1415,15 @@ mixed_component("base") {
|
|||||||
|
|
||||||
configs += [
|
configs += [
|
||||||
"//build/config:precompiled_headers",
|
"//build/config:precompiled_headers",
|
||||||
"//build/config/compiler:prevent_unsafe_narrowing",
|
|
||||||
|
# TODO(crbug.com/1292951): Enable.
|
||||||
|
# "//build/config/compiler:prevent_unsafe_narrowing",
|
||||||
|
|
||||||
"//build/config/compiler:wexit_time_destructors",
|
"//build/config/compiler:wexit_time_destructors",
|
||||||
"//build/config/compiler:wglobal_constructors",
|
"//build/config/compiler:wglobal_constructors",
|
||||||
]
|
]
|
||||||
|
|
||||||
deps = [
|
deps = [
|
||||||
":message_pump_buildflags",
|
|
||||||
"//base/allocator:buildflags",
|
"//base/allocator:buildflags",
|
||||||
"//base/third_party/double_conversion",
|
"//base/third_party/double_conversion",
|
||||||
"//base/third_party/dynamic_annotations",
|
"//base/third_party/dynamic_annotations",
|
||||||
@ -1687,14 +1676,8 @@ mixed_component("base") {
|
|||||||
"logging_chromeos.cc",
|
"logging_chromeos.cc",
|
||||||
"system/sys_info_chromeos.cc",
|
"system/sys_info_chromeos.cc",
|
||||||
]
|
]
|
||||||
|
if (is_chromeos_ash) {
|
||||||
sources += [ "power_monitor/power_monitor_device_source_chromeos.cc" ]
|
sources += [ "power_monitor/power_monitor_device_source_chromeos.cc" ]
|
||||||
|
|
||||||
if (current_cpu == "x64") {
|
|
||||||
sources += [
|
|
||||||
"profiler/frame_pointer_unwinder.cc",
|
|
||||||
"profiler/frame_pointer_unwinder.h",
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1809,7 +1792,6 @@ mixed_component("base") {
|
|||||||
|
|
||||||
deps += [
|
deps += [
|
||||||
"//third_party/fuchsia-sdk/sdk/fidl/fuchsia.buildinfo",
|
"//third_party/fuchsia-sdk/sdk/fidl/fuchsia.buildinfo",
|
||||||
"//third_party/fuchsia-sdk/sdk/fidl/fuchsia.hwinfo",
|
|
||||||
"//third_party/fuchsia-sdk/sdk/fidl/fuchsia.media",
|
"//third_party/fuchsia-sdk/sdk/fidl/fuchsia.media",
|
||||||
"//third_party/fuchsia-sdk/sdk/fidl/fuchsia.sys",
|
"//third_party/fuchsia-sdk/sdk/fidl/fuchsia.sys",
|
||||||
"//third_party/fuchsia-sdk/sdk/pkg/async-default",
|
"//third_party/fuchsia-sdk/sdk/pkg/async-default",
|
||||||
@ -2196,7 +2178,7 @@ mixed_component("base") {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (dep_libevent) {
|
if (dep_libevent) {
|
||||||
deps += [ "//third_party/libevent" ]
|
deps += [ "//base/third_party/libevent" ]
|
||||||
}
|
}
|
||||||
|
|
||||||
if (use_libevent) {
|
if (use_libevent) {
|
||||||
@ -2206,13 +2188,6 @@ mixed_component("base") {
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
|
||||||
if (enable_message_pump_epoll) {
|
|
||||||
sources += [
|
|
||||||
"message_loop/message_pump_epoll.cc",
|
|
||||||
"message_loop/message_pump_epoll.h",
|
|
||||||
]
|
|
||||||
}
|
|
||||||
|
|
||||||
# Android and MacOS have their own custom shared memory handle
|
# Android and MacOS have their own custom shared memory handle
|
||||||
# implementations. e.g. due to supporting both POSIX and native handles.
|
# implementations. e.g. due to supporting both POSIX and native handles.
|
||||||
if (is_posix && !is_android && !is_apple) {
|
if (is_posix && !is_android && !is_apple) {
|
||||||
@ -2254,7 +2229,8 @@ mixed_component("base") {
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
|
||||||
if ((is_posix && !is_apple && !is_android && !is_chromeos) || is_fuchsia) {
|
if ((is_posix && !is_apple && !is_android && !is_chromeos_ash) ||
|
||||||
|
is_fuchsia) {
|
||||||
sources += [ "power_monitor/power_monitor_device_source_stub.cc" ]
|
sources += [ "power_monitor/power_monitor_device_source_stub.cc" ]
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2311,6 +2287,8 @@ mixed_component("base") {
|
|||||||
"trace_event/process_memory_dump.cc",
|
"trace_event/process_memory_dump.cc",
|
||||||
"trace_event/process_memory_dump.h",
|
"trace_event/process_memory_dump.h",
|
||||||
"trace_event/task_execution_macros.h",
|
"trace_event/task_execution_macros.h",
|
||||||
|
"trace_event/thread_instruction_count.cc",
|
||||||
|
"trace_event/thread_instruction_count.h",
|
||||||
"trace_event/trace_arguments.cc",
|
"trace_event/trace_arguments.cc",
|
||||||
"trace_event/trace_arguments.h",
|
"trace_event/trace_arguments.h",
|
||||||
"trace_event/trace_buffer.cc",
|
"trace_event/trace_buffer.cc",
|
||||||
|
@ -3,7 +3,6 @@ include_rules = [
|
|||||||
"+third_party/apple_apsl",
|
"+third_party/apple_apsl",
|
||||||
"+third_party/boringssl/src/include",
|
"+third_party/boringssl/src/include",
|
||||||
"+third_party/ced",
|
"+third_party/ced",
|
||||||
"+third_party/libevent",
|
|
||||||
"+third_party/libunwindstack/src/libunwindstack/include",
|
"+third_party/libunwindstack/src/libunwindstack/include",
|
||||||
"+third_party/lss",
|
"+third_party/lss",
|
||||||
"+third_party/modp_b64",
|
"+third_party/modp_b64",
|
||||||
|
@ -2,7 +2,7 @@ lizeb@chromium.org
|
|||||||
primiano@chromium.org
|
primiano@chromium.org
|
||||||
wfh@chromium.org
|
wfh@chromium.org
|
||||||
|
|
||||||
per-file allocator.gni=file://base/allocator/partition_allocator/OWNERS
|
per-file allocator.gni=bartekn@chromium.org
|
||||||
per-file allocator_shim_default_dispatch_to_partition_alloc*=file://base/allocator/partition_allocator/OWNERS
|
per-file allocator_shim_default_dispatch_to_partition_alloc*=bartekn@chromium.org
|
||||||
per-file partition_alloc*=file://base/allocator/partition_allocator/OWNERS
|
per-file partition_alloc*=bartekn@chromium.org
|
||||||
per-file BUILD.gn=file://base/allocator/partition_allocator/OWNERS
|
per-file BUILD.gn=bartekn@chromium.org
|
||||||
|
@ -81,8 +81,7 @@ if (is_win && use_allocator_shim) {
|
|||||||
"The allocator shim doesn't work for the component build on Windows.")
|
"The allocator shim doesn't work for the component build on Windows.")
|
||||||
}
|
}
|
||||||
|
|
||||||
_is_brp_supported = (is_win || is_android || is_linux || is_mac ||
|
_is_brp_supported = (is_win || is_android) && use_allocator == "partition"
|
||||||
is_chromeos) && use_allocator == "partition"
|
|
||||||
|
|
||||||
declare_args() {
|
declare_args() {
|
||||||
# Set use_backup_ref_ptr true to use BackupRefPtr (BRP) as the implementation
|
# Set use_backup_ref_ptr true to use BackupRefPtr (BRP) as the implementation
|
||||||
@ -113,10 +112,7 @@ declare_args() {
|
|||||||
# Finch.
|
# Finch.
|
||||||
use_fake_binary_experiment = false
|
use_fake_binary_experiment = false
|
||||||
|
|
||||||
# The supported platforms are supposed to match `_is_brp_supported`, but we
|
use_asan_backup_ref_ptr = false
|
||||||
# enable the feature on Linux early because it's most widely used for security
|
|
||||||
# research
|
|
||||||
use_asan_backup_ref_ptr = is_asan && (is_win || is_android || is_linux)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
# Prevent using BackupRefPtr when PartitionAlloc-Everywhere isn't used.
|
# Prevent using BackupRefPtr when PartitionAlloc-Everywhere isn't used.
|
||||||
|
@ -44,7 +44,8 @@
|
|||||||
#include "base/mac/mac_util.h"
|
#include "base/mac/mac_util.h"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
namespace base::allocator {
|
namespace base {
|
||||||
|
namespace allocator {
|
||||||
|
|
||||||
bool g_replaced_default_zone = false;
|
bool g_replaced_default_zone = false;
|
||||||
|
|
||||||
@ -236,9 +237,9 @@ void* oom_killer_memalign_purgeable(struct _malloc_zone_t* zone,
|
|||||||
|
|
||||||
bool CanGetContextForCFAllocator() {
|
bool CanGetContextForCFAllocator() {
|
||||||
#if BUILDFLAG(IS_IOS)
|
#if BUILDFLAG(IS_IOS)
|
||||||
return !base::ios::IsRunningOnOrLater(17, 0, 0);
|
return !base::ios::IsRunningOnOrLater(16, 0, 0);
|
||||||
#else
|
#else
|
||||||
return !base::mac::IsOSLaterThan13_DontCallThis();
|
return !base::mac::IsOSLaterThan12_DontCallThis();
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -257,7 +258,7 @@ void* oom_killer_cfallocator_system_default(CFIndex alloc_size,
|
|||||||
void* info) {
|
void* info) {
|
||||||
void* result = g_old_cfallocator_system_default(alloc_size, hint, info);
|
void* result = g_old_cfallocator_system_default(alloc_size, hint, info);
|
||||||
if (!result)
|
if (!result)
|
||||||
TerminateBecauseOutOfMemory(static_cast<size_t>(alloc_size));
|
TerminateBecauseOutOfMemory(alloc_size);
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -266,7 +267,7 @@ void* oom_killer_cfallocator_malloc(CFIndex alloc_size,
|
|||||||
void* info) {
|
void* info) {
|
||||||
void* result = g_old_cfallocator_malloc(alloc_size, hint, info);
|
void* result = g_old_cfallocator_malloc(alloc_size, hint, info);
|
||||||
if (!result)
|
if (!result)
|
||||||
TerminateBecauseOutOfMemory(static_cast<size_t>(alloc_size));
|
TerminateBecauseOutOfMemory(alloc_size);
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -275,7 +276,7 @@ void* oom_killer_cfallocator_malloc_zone(CFIndex alloc_size,
|
|||||||
void* info) {
|
void* info) {
|
||||||
void* result = g_old_cfallocator_malloc_zone(alloc_size, hint, info);
|
void* result = g_old_cfallocator_malloc_zone(alloc_size, hint, info);
|
||||||
if (!result)
|
if (!result)
|
||||||
TerminateBecauseOutOfMemory(static_cast<size_t>(alloc_size));
|
TerminateBecauseOutOfMemory(alloc_size);
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -608,4 +609,5 @@ void ReplaceZoneFunctions(ChromeMallocZone* zone,
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
} // namespace base::allocator
|
} // namespace allocator
|
||||||
|
} // namespace base
|
||||||
|
@ -174,7 +174,6 @@ BASE_EXPORT void InitializeAllocatorShim();
|
|||||||
BASE_EXPORT void EnablePartitionAllocMemoryReclaimer();
|
BASE_EXPORT void EnablePartitionAllocMemoryReclaimer();
|
||||||
|
|
||||||
using EnableBrp = base::StrongAlias<class EnableBrpTag, bool>;
|
using EnableBrp = base::StrongAlias<class EnableBrpTag, bool>;
|
||||||
using EnableBrpZapping = base::StrongAlias<class EnableBrpZappingTag, bool>;
|
|
||||||
using SplitMainPartition = base::StrongAlias<class SplitMainPartitionTag, bool>;
|
using SplitMainPartition = base::StrongAlias<class SplitMainPartitionTag, bool>;
|
||||||
using UseDedicatedAlignedPartition =
|
using UseDedicatedAlignedPartition =
|
||||||
base::StrongAlias<class UseDedicatedAlignedPartitionTag, bool>;
|
base::StrongAlias<class UseDedicatedAlignedPartitionTag, bool>;
|
||||||
@ -186,13 +185,12 @@ using AlternateBucketDistribution =
|
|||||||
// thread-cache on the main (malloc) partition will be disabled.
|
// thread-cache on the main (malloc) partition will be disabled.
|
||||||
BASE_EXPORT void ConfigurePartitions(
|
BASE_EXPORT void ConfigurePartitions(
|
||||||
EnableBrp enable_brp,
|
EnableBrp enable_brp,
|
||||||
EnableBrpZapping enable_brp_zapping,
|
|
||||||
SplitMainPartition split_main_partition,
|
SplitMainPartition split_main_partition,
|
||||||
UseDedicatedAlignedPartition use_dedicated_aligned_partition,
|
UseDedicatedAlignedPartition use_dedicated_aligned_partition,
|
||||||
AlternateBucketDistribution use_alternate_bucket_distribution);
|
AlternateBucketDistribution use_alternate_bucket_distribution);
|
||||||
|
|
||||||
#if defined(PA_ALLOW_PCSCAN)
|
#if defined(PA_ALLOW_PCSCAN)
|
||||||
BASE_EXPORT void EnablePCScan(partition_alloc::internal::PCScan::InitConfig);
|
BASE_EXPORT void EnablePCScan(base::internal::PCScan::InitConfig);
|
||||||
#endif
|
#endif
|
||||||
#endif // BUILDFLAG(USE_PARTITION_ALLOC_AS_MALLOC)
|
#endif // BUILDFLAG(USE_PARTITION_ALLOC_AS_MALLOC)
|
||||||
|
|
||||||
|
@ -27,7 +27,6 @@
|
|||||||
#include "base/feature_list.h"
|
#include "base/feature_list.h"
|
||||||
#include "base/memory/nonscannable_memory.h"
|
#include "base/memory/nonscannable_memory.h"
|
||||||
#include "base/numerics/checked_math.h"
|
#include "base/numerics/checked_math.h"
|
||||||
#include "base/numerics/safe_conversions.h"
|
|
||||||
#include "base/threading/platform_thread.h"
|
#include "base/threading/platform_thread.h"
|
||||||
#include "build/build_config.h"
|
#include "build/build_config.h"
|
||||||
#include "build/chromecast_buildflags.h"
|
#include "build/chromecast_buildflags.h"
|
||||||
@ -147,27 +146,26 @@ T* LeakySingleton<T, Constructor>::GetSlowPath() {
|
|||||||
class MainPartitionConstructor {
|
class MainPartitionConstructor {
|
||||||
public:
|
public:
|
||||||
static partition_alloc::ThreadSafePartitionRoot* New(void* buffer) {
|
static partition_alloc::ThreadSafePartitionRoot* New(void* buffer) {
|
||||||
constexpr partition_alloc::PartitionOptions::ThreadCache thread_cache =
|
constexpr base::PartitionOptions::ThreadCache thread_cache =
|
||||||
#if BUILDFLAG(USE_PARTITION_ALLOC_AS_MALLOC)
|
#if BUILDFLAG(USE_PARTITION_ALLOC_AS_MALLOC)
|
||||||
// Additional partitions may be created in ConfigurePartitions(). Since
|
// Additional partitions may be created in ConfigurePartitions(). Since
|
||||||
// only one partition can have thread cache enabled, postpone the
|
// only one partition can have thread cache enabled, postpone the
|
||||||
// decision to turn the thread cache on until after that call.
|
// decision to turn the thread cache on until after that call.
|
||||||
// TODO(bartekn): Enable it here by default, once the "split-only" mode
|
// TODO(bartekn): Enable it here by default, once the "split-only" mode
|
||||||
// is no longer needed.
|
// is no longer needed.
|
||||||
partition_alloc::PartitionOptions::ThreadCache::kDisabled;
|
base::PartitionOptions::ThreadCache::kDisabled;
|
||||||
#else // BUILDFLAG(USE_PARTITION_ALLOC_AS_MALLOC)
|
#else // BUILDFLAG(USE_PARTITION_ALLOC_AS_MALLOC)
|
||||||
// Other tests, such as the ThreadCache tests create a thread cache,
|
// Other tests, such as the ThreadCache tests create a thread cache,
|
||||||
// and only one is supported at a time.
|
// and only one is supported at a time.
|
||||||
partition_alloc::PartitionOptions::ThreadCache::kDisabled;
|
base::PartitionOptions::ThreadCache::kDisabled;
|
||||||
#endif // BUILDFLAG(USE_PARTITION_ALLOC_AS_MALLOC)
|
#endif // BUILDFLAG(USE_PARTITION_ALLOC_AS_MALLOC)
|
||||||
auto* new_root = new (buffer) partition_alloc::ThreadSafePartitionRoot({
|
auto* new_root = new (buffer) partition_alloc::ThreadSafePartitionRoot({
|
||||||
partition_alloc::PartitionOptions::AlignedAlloc::kAllowed,
|
base::PartitionOptions::AlignedAlloc::kAllowed,
|
||||||
thread_cache,
|
thread_cache,
|
||||||
partition_alloc::PartitionOptions::Quarantine::kAllowed,
|
base::PartitionOptions::Quarantine::kAllowed,
|
||||||
partition_alloc::PartitionOptions::Cookie::kAllowed,
|
base::PartitionOptions::Cookie::kAllowed,
|
||||||
partition_alloc::PartitionOptions::BackupRefPtr::kDisabled,
|
base::PartitionOptions::BackupRefPtr::kDisabled,
|
||||||
partition_alloc::PartitionOptions::BackupRefPtrZapping::kDisabled,
|
base::PartitionOptions::UseConfigurablePool::kNo,
|
||||||
partition_alloc::PartitionOptions::UseConfigurablePool::kNo,
|
|
||||||
});
|
});
|
||||||
|
|
||||||
return new_root;
|
return new_root;
|
||||||
@ -277,9 +275,9 @@ namespace internal {
|
|||||||
|
|
||||||
namespace {
|
namespace {
|
||||||
#if BUILDFLAG(IS_APPLE)
|
#if BUILDFLAG(IS_APPLE)
|
||||||
unsigned int g_alloc_flags = 0;
|
int g_alloc_flags = 0;
|
||||||
#else
|
#else
|
||||||
constexpr unsigned int g_alloc_flags = 0;
|
constexpr int g_alloc_flags = 0;
|
||||||
#endif
|
#endif
|
||||||
} // namespace
|
} // namespace
|
||||||
|
|
||||||
@ -302,7 +300,7 @@ void PartitionAllocSetCallNewHandlerOnMallocFailure(bool value) {
|
|||||||
void* PartitionMalloc(const AllocatorDispatch*, size_t size, void* context) {
|
void* PartitionMalloc(const AllocatorDispatch*, size_t size, void* context) {
|
||||||
ScopedDisallowAllocations guard{};
|
ScopedDisallowAllocations guard{};
|
||||||
return Allocator()->AllocWithFlagsNoHooks(
|
return Allocator()->AllocWithFlagsNoHooks(
|
||||||
g_alloc_flags, MaybeAdjustSize(size),
|
0 | g_alloc_flags, MaybeAdjustSize(size),
|
||||||
partition_alloc::PartitionPageSize());
|
partition_alloc::PartitionPageSize());
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -515,19 +513,17 @@ void PartitionBatchFree(const AllocatorDispatch*,
|
|||||||
}
|
}
|
||||||
|
|
||||||
// static
|
// static
|
||||||
partition_alloc::ThreadSafePartitionRoot* PartitionAllocMalloc::Allocator() {
|
ThreadSafePartitionRoot* PartitionAllocMalloc::Allocator() {
|
||||||
return ::Allocator();
|
return ::Allocator();
|
||||||
}
|
}
|
||||||
|
|
||||||
// static
|
// static
|
||||||
partition_alloc::ThreadSafePartitionRoot*
|
ThreadSafePartitionRoot* PartitionAllocMalloc::OriginalAllocator() {
|
||||||
PartitionAllocMalloc::OriginalAllocator() {
|
|
||||||
return ::OriginalAllocator();
|
return ::OriginalAllocator();
|
||||||
}
|
}
|
||||||
|
|
||||||
// static
|
// static
|
||||||
partition_alloc::ThreadSafePartitionRoot*
|
ThreadSafePartitionRoot* PartitionAllocMalloc::AlignedAllocator() {
|
||||||
PartitionAllocMalloc::AlignedAllocator() {
|
|
||||||
return ::AlignedAllocator();
|
return ::AlignedAllocator();
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -567,7 +563,6 @@ alignas(partition_alloc::ThreadSafePartitionRoot) uint8_t
|
|||||||
|
|
||||||
void ConfigurePartitions(
|
void ConfigurePartitions(
|
||||||
EnableBrp enable_brp,
|
EnableBrp enable_brp,
|
||||||
EnableBrpZapping enable_brp_zapping,
|
|
||||||
SplitMainPartition split_main_partition,
|
SplitMainPartition split_main_partition,
|
||||||
UseDedicatedAlignedPartition use_dedicated_aligned_partition,
|
UseDedicatedAlignedPartition use_dedicated_aligned_partition,
|
||||||
AlternateBucketDistribution use_alternate_bucket_distribution) {
|
AlternateBucketDistribution use_alternate_bucket_distribution) {
|
||||||
@ -601,22 +596,18 @@ void ConfigurePartitions(
|
|||||||
PA_DCHECK(!current_root->flags.with_thread_cache);
|
PA_DCHECK(!current_root->flags.with_thread_cache);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
auto* new_root = new (g_allocator_buffer_for_new_main_partition)
|
|
||||||
partition_alloc::ThreadSafePartitionRoot({
|
auto* new_root =
|
||||||
|
new (g_allocator_buffer_for_new_main_partition) ThreadSafePartitionRoot({
|
||||||
!use_dedicated_aligned_partition
|
!use_dedicated_aligned_partition
|
||||||
? partition_alloc::PartitionOptions::AlignedAlloc::kAllowed
|
? base::PartitionOptions::AlignedAlloc::kAllowed
|
||||||
: partition_alloc::PartitionOptions::AlignedAlloc::kDisallowed,
|
: base::PartitionOptions::AlignedAlloc::kDisallowed,
|
||||||
partition_alloc::PartitionOptions::ThreadCache::kDisabled,
|
base::PartitionOptions::ThreadCache::kDisabled,
|
||||||
partition_alloc::PartitionOptions::Quarantine::kAllowed,
|
base::PartitionOptions::Quarantine::kAllowed,
|
||||||
partition_alloc::PartitionOptions::Cookie::kAllowed,
|
base::PartitionOptions::Cookie::kAllowed,
|
||||||
enable_brp
|
enable_brp ? base::PartitionOptions::BackupRefPtr::kEnabled
|
||||||
? partition_alloc::PartitionOptions::BackupRefPtr::kEnabled
|
: base::PartitionOptions::BackupRefPtr::kDisabled,
|
||||||
: partition_alloc::PartitionOptions::BackupRefPtr::kDisabled,
|
base::PartitionOptions::UseConfigurablePool::kNo,
|
||||||
enable_brp_zapping
|
|
||||||
? partition_alloc::PartitionOptions::BackupRefPtrZapping::kEnabled
|
|
||||||
: partition_alloc::PartitionOptions::BackupRefPtrZapping::
|
|
||||||
kDisabled,
|
|
||||||
partition_alloc::PartitionOptions::UseConfigurablePool::kNo,
|
|
||||||
});
|
});
|
||||||
|
|
||||||
partition_alloc::ThreadSafePartitionRoot* new_aligned_root;
|
partition_alloc::ThreadSafePartitionRoot* new_aligned_root;
|
||||||
@ -624,14 +615,13 @@ void ConfigurePartitions(
|
|||||||
// TODO(bartekn): Use the original root instead of creating a new one. It'd
|
// TODO(bartekn): Use the original root instead of creating a new one. It'd
|
||||||
// result in one less partition, but come at a cost of commingling types.
|
// result in one less partition, but come at a cost of commingling types.
|
||||||
new_aligned_root = new (g_allocator_buffer_for_aligned_alloc_partition)
|
new_aligned_root = new (g_allocator_buffer_for_aligned_alloc_partition)
|
||||||
partition_alloc::ThreadSafePartitionRoot({
|
ThreadSafePartitionRoot({
|
||||||
partition_alloc::PartitionOptions::AlignedAlloc::kAllowed,
|
base::PartitionOptions::AlignedAlloc::kAllowed,
|
||||||
partition_alloc::PartitionOptions::ThreadCache::kDisabled,
|
base::PartitionOptions::ThreadCache::kDisabled,
|
||||||
partition_alloc::PartitionOptions::Quarantine::kAllowed,
|
base::PartitionOptions::Quarantine::kAllowed,
|
||||||
partition_alloc::PartitionOptions::Cookie::kAllowed,
|
base::PartitionOptions::Cookie::kAllowed,
|
||||||
partition_alloc::PartitionOptions::BackupRefPtr::kDisabled,
|
base::PartitionOptions::BackupRefPtr::kDisabled,
|
||||||
partition_alloc::PartitionOptions::BackupRefPtrZapping::kDisabled,
|
base::PartitionOptions::UseConfigurablePool::kNo,
|
||||||
partition_alloc::PartitionOptions::UseConfigurablePool::kNo,
|
|
||||||
});
|
});
|
||||||
} else {
|
} else {
|
||||||
// The new main root can also support AlignedAlloc.
|
// The new main root can also support AlignedAlloc.
|
||||||
@ -653,9 +643,8 @@ void ConfigurePartitions(
|
|||||||
PA_CHECK(current_aligned_root == g_original_root);
|
PA_CHECK(current_aligned_root == g_original_root);
|
||||||
|
|
||||||
// Purge memory, now that the traffic to the original partition is cut off.
|
// Purge memory, now that the traffic to the original partition is cut off.
|
||||||
current_root->PurgeMemory(
|
current_root->PurgeMemory(PurgeFlags::kDecommitEmptySlotSpans |
|
||||||
partition_alloc::PurgeFlags::kDecommitEmptySlotSpans |
|
PurgeFlags::kDiscardUnusedSystemPages);
|
||||||
partition_alloc::PurgeFlags::kDiscardUnusedSystemPages);
|
|
||||||
|
|
||||||
if (!use_alternate_bucket_distribution) {
|
if (!use_alternate_bucket_distribution) {
|
||||||
g_root.Get()->SwitchToDenserBucketDistribution();
|
g_root.Get()->SwitchToDenserBucketDistribution();
|
||||||
@ -664,18 +653,16 @@ void ConfigurePartitions(
|
|||||||
}
|
}
|
||||||
|
|
||||||
#if defined(PA_ALLOW_PCSCAN)
|
#if defined(PA_ALLOW_PCSCAN)
|
||||||
void EnablePCScan(partition_alloc::internal::PCScan::InitConfig config) {
|
void EnablePCScan(base::internal::PCScan::InitConfig config) {
|
||||||
partition_alloc::internal::base::PlatformThread::SetThreadNameHook(
|
partition_alloc::internal::base::PlatformThread::SetThreadNameHook(
|
||||||
&::base::PlatformThread::SetName);
|
&::base::PlatformThread::SetName);
|
||||||
partition_alloc::internal::PCScan::Initialize(config);
|
internal::PCScan::Initialize(config);
|
||||||
|
|
||||||
partition_alloc::internal::PCScan::RegisterScannableRoot(Allocator());
|
internal::PCScan::RegisterScannableRoot(Allocator());
|
||||||
if (OriginalAllocator() != nullptr)
|
if (OriginalAllocator() != nullptr)
|
||||||
partition_alloc::internal::PCScan::RegisterScannableRoot(
|
internal::PCScan::RegisterScannableRoot(OriginalAllocator());
|
||||||
OriginalAllocator());
|
|
||||||
if (Allocator() != AlignedAllocator())
|
if (Allocator() != AlignedAllocator())
|
||||||
partition_alloc::internal::PCScan::RegisterScannableRoot(
|
internal::PCScan::RegisterScannableRoot(AlignedAllocator());
|
||||||
AlignedAllocator());
|
|
||||||
|
|
||||||
internal::NonScannableAllocator::Instance().NotifyPCScanEnabled();
|
internal::NonScannableAllocator::Instance().NotifyPCScanEnabled();
|
||||||
internal::NonQuarantinableAllocator::Instance().NotifyPCScanEnabled();
|
internal::NonQuarantinableAllocator::Instance().NotifyPCScanEnabled();
|
||||||
@ -737,11 +724,11 @@ SHIM_ALWAYS_EXPORT int mallopt(int cmd, int value) __THROW {
|
|||||||
|
|
||||||
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS)
|
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS)
|
||||||
SHIM_ALWAYS_EXPORT struct mallinfo mallinfo(void) __THROW {
|
SHIM_ALWAYS_EXPORT struct mallinfo mallinfo(void) __THROW {
|
||||||
partition_alloc::SimplePartitionStatsDumper allocator_dumper;
|
base::SimplePartitionStatsDumper allocator_dumper;
|
||||||
Allocator()->DumpStats("malloc", true, &allocator_dumper);
|
Allocator()->DumpStats("malloc", true, &allocator_dumper);
|
||||||
// TODO(bartekn): Dump OriginalAllocator() into "malloc" as well.
|
// TODO(bartekn): Dump OriginalAllocator() into "malloc" as well.
|
||||||
|
|
||||||
partition_alloc::SimplePartitionStatsDumper aligned_allocator_dumper;
|
base::SimplePartitionStatsDumper aligned_allocator_dumper;
|
||||||
if (AlignedAllocator() != Allocator()) {
|
if (AlignedAllocator() != Allocator()) {
|
||||||
AlignedAllocator()->DumpStats("posix_memalign", true,
|
AlignedAllocator()->DumpStats("posix_memalign", true,
|
||||||
&aligned_allocator_dumper);
|
&aligned_allocator_dumper);
|
||||||
@ -750,13 +737,13 @@ SHIM_ALWAYS_EXPORT struct mallinfo mallinfo(void) __THROW {
|
|||||||
// Dump stats for nonscannable and nonquarantinable allocators.
|
// Dump stats for nonscannable and nonquarantinable allocators.
|
||||||
auto& nonscannable_allocator =
|
auto& nonscannable_allocator =
|
||||||
base::internal::NonScannableAllocator::Instance();
|
base::internal::NonScannableAllocator::Instance();
|
||||||
partition_alloc::SimplePartitionStatsDumper nonscannable_allocator_dumper;
|
base::SimplePartitionStatsDumper nonscannable_allocator_dumper;
|
||||||
if (auto* nonscannable_root = nonscannable_allocator.root())
|
if (auto* nonscannable_root = nonscannable_allocator.root())
|
||||||
nonscannable_root->DumpStats("malloc", true,
|
nonscannable_root->DumpStats("malloc", true,
|
||||||
&nonscannable_allocator_dumper);
|
&nonscannable_allocator_dumper);
|
||||||
auto& nonquarantinable_allocator =
|
auto& nonquarantinable_allocator =
|
||||||
base::internal::NonQuarantinableAllocator::Instance();
|
base::internal::NonQuarantinableAllocator::Instance();
|
||||||
partition_alloc::SimplePartitionStatsDumper nonquarantinable_allocator_dumper;
|
base::SimplePartitionStatsDumper nonquarantinable_allocator_dumper;
|
||||||
if (auto* nonquarantinable_root = nonquarantinable_allocator.root())
|
if (auto* nonquarantinable_root = nonquarantinable_allocator.root())
|
||||||
nonquarantinable_root->DumpStats("malloc", true,
|
nonquarantinable_root->DumpStats("malloc", true,
|
||||||
&nonquarantinable_allocator_dumper);
|
&nonquarantinable_allocator_dumper);
|
||||||
@ -765,23 +752,20 @@ SHIM_ALWAYS_EXPORT struct mallinfo mallinfo(void) __THROW {
|
|||||||
info.arena = 0; // Memory *not* allocated with mmap().
|
info.arena = 0; // Memory *not* allocated with mmap().
|
||||||
|
|
||||||
// Memory allocated with mmap(), aka virtual size.
|
// Memory allocated with mmap(), aka virtual size.
|
||||||
info.hblks = base::checked_cast<decltype(info.hblks)>(
|
info.hblks = allocator_dumper.stats().total_mmapped_bytes +
|
||||||
allocator_dumper.stats().total_mmapped_bytes +
|
|
||||||
aligned_allocator_dumper.stats().total_mmapped_bytes +
|
aligned_allocator_dumper.stats().total_mmapped_bytes +
|
||||||
nonscannable_allocator_dumper.stats().total_mmapped_bytes +
|
nonscannable_allocator_dumper.stats().total_mmapped_bytes +
|
||||||
nonquarantinable_allocator_dumper.stats().total_mmapped_bytes);
|
nonquarantinable_allocator_dumper.stats().total_mmapped_bytes;
|
||||||
// Resident bytes.
|
// Resident bytes.
|
||||||
info.hblkhd = base::checked_cast<decltype(info.hblkhd)>(
|
info.hblkhd = allocator_dumper.stats().total_resident_bytes +
|
||||||
allocator_dumper.stats().total_resident_bytes +
|
|
||||||
aligned_allocator_dumper.stats().total_resident_bytes +
|
aligned_allocator_dumper.stats().total_resident_bytes +
|
||||||
nonscannable_allocator_dumper.stats().total_resident_bytes +
|
nonscannable_allocator_dumper.stats().total_resident_bytes +
|
||||||
nonquarantinable_allocator_dumper.stats().total_resident_bytes);
|
nonquarantinable_allocator_dumper.stats().total_resident_bytes;
|
||||||
// Allocated bytes.
|
// Allocated bytes.
|
||||||
info.uordblks = base::checked_cast<decltype(info.uordblks)>(
|
info.uordblks = allocator_dumper.stats().total_active_bytes +
|
||||||
allocator_dumper.stats().total_active_bytes +
|
|
||||||
aligned_allocator_dumper.stats().total_active_bytes +
|
aligned_allocator_dumper.stats().total_active_bytes +
|
||||||
nonscannable_allocator_dumper.stats().total_active_bytes +
|
nonscannable_allocator_dumper.stats().total_active_bytes +
|
||||||
nonquarantinable_allocator_dumper.stats().total_active_bytes);
|
nonquarantinable_allocator_dumper.stats().total_active_bytes;
|
||||||
|
|
||||||
return info;
|
return info;
|
||||||
}
|
}
|
||||||
|
@ -16,11 +16,11 @@ void PartitionAllocSetCallNewHandlerOnMallocFailure(bool value);
|
|||||||
|
|
||||||
class BASE_EXPORT PartitionAllocMalloc {
|
class BASE_EXPORT PartitionAllocMalloc {
|
||||||
public:
|
public:
|
||||||
static partition_alloc::ThreadSafePartitionRoot* Allocator();
|
static ThreadSafePartitionRoot* Allocator();
|
||||||
// May return |nullptr|, will never return the same pointer as |Allocator()|.
|
// May return |nullptr|, will never return the same pointer as |Allocator()|.
|
||||||
static partition_alloc::ThreadSafePartitionRoot* OriginalAllocator();
|
static ThreadSafePartitionRoot* OriginalAllocator();
|
||||||
// May return the same pointer as |Allocator()|.
|
// May return the same pointer as |Allocator()|.
|
||||||
static partition_alloc::ThreadSafePartitionRoot* AlignedAllocator();
|
static ThreadSafePartitionRoot* AlignedAllocator();
|
||||||
};
|
};
|
||||||
|
|
||||||
BASE_EXPORT void* PartitionMalloc(const base::allocator::AllocatorDispatch*,
|
BASE_EXPORT void* PartitionMalloc(const base::allocator::AllocatorDispatch*,
|
||||||
|
@ -17,6 +17,43 @@
|
|||||||
#include "base/compiler_specific.h"
|
#include "base/compiler_specific.h"
|
||||||
#include "build/build_config.h"
|
#include "build/build_config.h"
|
||||||
|
|
||||||
|
// std::align_val_t isn't available until C++17, but we want to override aligned
|
||||||
|
// new/delete anyway to prevent a possible situation where a library gets loaded
|
||||||
|
// in that uses the aligned operators. We want to avoid a situation where
|
||||||
|
// separate heaps are used.
|
||||||
|
// TODO(thomasanderson): Remove this once building with C++17 or later.
|
||||||
|
#if defined(__cpp_aligned_new) && __cpp_aligned_new >= 201606
|
||||||
|
#define ALIGN_VAL_T std::align_val_t
|
||||||
|
#define ALIGN_LINKAGE
|
||||||
|
#define ALIGN_NEW operator new
|
||||||
|
#define ALIGN_NEW_NOTHROW operator new
|
||||||
|
#define ALIGN_DEL operator delete
|
||||||
|
#define ALIGN_DEL_SIZED operator delete
|
||||||
|
#define ALIGN_DEL_NOTHROW operator delete
|
||||||
|
#define ALIGN_NEW_ARR operator new[]
|
||||||
|
#define ALIGN_NEW_ARR_NOTHROW operator new[]
|
||||||
|
#define ALIGN_DEL_ARR operator delete[]
|
||||||
|
#define ALIGN_DEL_ARR_SIZED operator delete[]
|
||||||
|
#define ALIGN_DEL_ARR_NOTHROW operator delete[]
|
||||||
|
#else
|
||||||
|
#define ALIGN_VAL_T size_t
|
||||||
|
#define ALIGN_LINKAGE extern "C"
|
||||||
|
#if BUILDFLAG(IS_WIN)
|
||||||
|
#error "Mangling is different on these platforms."
|
||||||
|
#else
|
||||||
|
#define ALIGN_NEW _ZnwmSt11align_val_t
|
||||||
|
#define ALIGN_NEW_NOTHROW _ZnwmSt11align_val_tRKSt9nothrow_t
|
||||||
|
#define ALIGN_DEL _ZdlPvSt11align_val_t
|
||||||
|
#define ALIGN_DEL_SIZED _ZdlPvmSt11align_val_t
|
||||||
|
#define ALIGN_DEL_NOTHROW _ZdlPvSt11align_val_tRKSt9nothrow_t
|
||||||
|
#define ALIGN_NEW_ARR _ZnamSt11align_val_t
|
||||||
|
#define ALIGN_NEW_ARR_NOTHROW _ZnamSt11align_val_tRKSt9nothrow_t
|
||||||
|
#define ALIGN_DEL_ARR _ZdaPvSt11align_val_t
|
||||||
|
#define ALIGN_DEL_ARR_SIZED _ZdaPvmSt11align_val_t
|
||||||
|
#define ALIGN_DEL_ARR_NOTHROW _ZdaPvSt11align_val_tRKSt9nothrow_t
|
||||||
|
#endif
|
||||||
|
#endif
|
||||||
|
|
||||||
#if !BUILDFLAG(IS_APPLE)
|
#if !BUILDFLAG(IS_APPLE)
|
||||||
#define SHIM_CPP_SYMBOLS_EXPORT SHIM_ALWAYS_EXPORT
|
#define SHIM_CPP_SYMBOLS_EXPORT SHIM_ALWAYS_EXPORT
|
||||||
#else
|
#else
|
||||||
@ -73,58 +110,57 @@ SHIM_CPP_SYMBOLS_EXPORT void operator delete[](void* p, size_t) __THROW {
|
|||||||
ShimCppDelete(p);
|
ShimCppDelete(p);
|
||||||
}
|
}
|
||||||
|
|
||||||
SHIM_CPP_SYMBOLS_EXPORT void* operator new(std::size_t size,
|
ALIGN_LINKAGE SHIM_CPP_SYMBOLS_EXPORT void* ALIGN_NEW(std::size_t size,
|
||||||
std::align_val_t alignment) {
|
ALIGN_VAL_T alignment) {
|
||||||
return ShimCppAlignedNew(size, static_cast<size_t>(alignment));
|
return ShimCppAlignedNew(size, static_cast<size_t>(alignment));
|
||||||
}
|
}
|
||||||
|
|
||||||
SHIM_CPP_SYMBOLS_EXPORT void* operator new(std::size_t size,
|
ALIGN_LINKAGE SHIM_CPP_SYMBOLS_EXPORT void* ALIGN_NEW_NOTHROW(
|
||||||
std::align_val_t alignment,
|
|
||||||
const std::nothrow_t&) __THROW {
|
|
||||||
return ShimCppAlignedNew(size, static_cast<size_t>(alignment));
|
|
||||||
}
|
|
||||||
|
|
||||||
SHIM_CPP_SYMBOLS_EXPORT void operator delete(void* p,
|
|
||||||
std::align_val_t) __THROW {
|
|
||||||
ShimCppDelete(p);
|
|
||||||
}
|
|
||||||
|
|
||||||
SHIM_CPP_SYMBOLS_EXPORT void operator delete(void* p,
|
|
||||||
std::size_t size,
|
std::size_t size,
|
||||||
std::align_val_t) __THROW {
|
ALIGN_VAL_T alignment,
|
||||||
ShimCppDelete(p);
|
|
||||||
}
|
|
||||||
|
|
||||||
SHIM_CPP_SYMBOLS_EXPORT void operator delete(void* p,
|
|
||||||
std::align_val_t,
|
|
||||||
const std::nothrow_t&) __THROW {
|
|
||||||
ShimCppDelete(p);
|
|
||||||
}
|
|
||||||
|
|
||||||
SHIM_CPP_SYMBOLS_EXPORT void* operator new[](std::size_t size,
|
|
||||||
std::align_val_t alignment) {
|
|
||||||
return ShimCppAlignedNew(size, static_cast<size_t>(alignment));
|
|
||||||
}
|
|
||||||
|
|
||||||
SHIM_CPP_SYMBOLS_EXPORT void* operator new[](std::size_t size,
|
|
||||||
std::align_val_t alignment,
|
|
||||||
const std::nothrow_t&) __THROW {
|
const std::nothrow_t&) __THROW {
|
||||||
return ShimCppAlignedNew(size, static_cast<size_t>(alignment));
|
return ShimCppAlignedNew(size, static_cast<size_t>(alignment));
|
||||||
}
|
}
|
||||||
|
|
||||||
SHIM_CPP_SYMBOLS_EXPORT void operator delete[](void* p,
|
ALIGN_LINKAGE SHIM_CPP_SYMBOLS_EXPORT void ALIGN_DEL(void* p,
|
||||||
std::align_val_t) __THROW {
|
ALIGN_VAL_T) __THROW {
|
||||||
ShimCppDelete(p);
|
ShimCppDelete(p);
|
||||||
}
|
}
|
||||||
|
|
||||||
SHIM_CPP_SYMBOLS_EXPORT void operator delete[](void* p,
|
ALIGN_LINKAGE SHIM_CPP_SYMBOLS_EXPORT void
|
||||||
|
ALIGN_DEL_SIZED(void* p, std::size_t size, ALIGN_VAL_T) __THROW {
|
||||||
|
ShimCppDelete(p);
|
||||||
|
}
|
||||||
|
|
||||||
|
ALIGN_LINKAGE SHIM_CPP_SYMBOLS_EXPORT void
|
||||||
|
ALIGN_DEL_NOTHROW(void* p, ALIGN_VAL_T, const std::nothrow_t&) __THROW {
|
||||||
|
ShimCppDelete(p);
|
||||||
|
}
|
||||||
|
|
||||||
|
ALIGN_LINKAGE SHIM_CPP_SYMBOLS_EXPORT void* ALIGN_NEW_ARR(
|
||||||
std::size_t size,
|
std::size_t size,
|
||||||
std::align_val_t) __THROW {
|
ALIGN_VAL_T alignment) {
|
||||||
|
return ShimCppAlignedNew(size, static_cast<size_t>(alignment));
|
||||||
|
}
|
||||||
|
|
||||||
|
ALIGN_LINKAGE SHIM_CPP_SYMBOLS_EXPORT void* ALIGN_NEW_ARR_NOTHROW(
|
||||||
|
std::size_t size,
|
||||||
|
ALIGN_VAL_T alignment,
|
||||||
|
const std::nothrow_t&) __THROW {
|
||||||
|
return ShimCppAlignedNew(size, static_cast<size_t>(alignment));
|
||||||
|
}
|
||||||
|
|
||||||
|
ALIGN_LINKAGE SHIM_CPP_SYMBOLS_EXPORT void ALIGN_DEL_ARR(void* p,
|
||||||
|
ALIGN_VAL_T) __THROW {
|
||||||
ShimCppDelete(p);
|
ShimCppDelete(p);
|
||||||
}
|
}
|
||||||
|
|
||||||
SHIM_CPP_SYMBOLS_EXPORT void operator delete[](void* p,
|
ALIGN_LINKAGE SHIM_CPP_SYMBOLS_EXPORT void
|
||||||
std::align_val_t,
|
ALIGN_DEL_ARR_SIZED(void* p, std::size_t size, ALIGN_VAL_T) __THROW {
|
||||||
const std::nothrow_t&) __THROW {
|
ShimCppDelete(p);
|
||||||
|
}
|
||||||
|
|
||||||
|
ALIGN_LINKAGE SHIM_CPP_SYMBOLS_EXPORT void
|
||||||
|
ALIGN_DEL_ARR_NOTHROW(void* p, ALIGN_VAL_T, const std::nothrow_t&) __THROW {
|
||||||
ShimCppDelete(p);
|
ShimCppDelete(p);
|
||||||
}
|
}
|
||||||
|
@ -122,10 +122,7 @@ SHIM_ALWAYS_EXPORT int __wrap_vasprintf(char** strp,
|
|||||||
malloc(kInitialSize)); // Our malloc() doesn't return nullptr.
|
malloc(kInitialSize)); // Our malloc() doesn't return nullptr.
|
||||||
|
|
||||||
int actual_size = vsnprintf(*strp, kInitialSize, fmt, va_args);
|
int actual_size = vsnprintf(*strp, kInitialSize, fmt, va_args);
|
||||||
if (actual_size < 0)
|
*strp = static_cast<char*>(realloc(*strp, actual_size + 1));
|
||||||
return actual_size;
|
|
||||||
*strp =
|
|
||||||
static_cast<char*>(realloc(*strp, static_cast<size_t>(actual_size + 1)));
|
|
||||||
|
|
||||||
// Now we know the size. This is not very efficient, but we cannot really do
|
// Now we know the size. This is not very efficient, but we cannot really do
|
||||||
// better without accessing internal libc functions, or reimplementing
|
// better without accessing internal libc functions, or reimplementing
|
||||||
@ -134,7 +131,7 @@ SHIM_ALWAYS_EXPORT int __wrap_vasprintf(char** strp,
|
|||||||
// This is very lightly used in Chromium in practice, see crbug.com/116558 for
|
// This is very lightly used in Chromium in practice, see crbug.com/116558 for
|
||||||
// details.
|
// details.
|
||||||
if (actual_size >= kInitialSize)
|
if (actual_size >= kInitialSize)
|
||||||
return vsnprintf(*strp, static_cast<size_t>(actual_size + 1), fmt, va_args);
|
return vsnprintf(*strp, actual_size + 1, fmt, va_args);
|
||||||
|
|
||||||
return actual_size;
|
return actual_size;
|
||||||
}
|
}
|
||||||
|
@ -1,239 +0,0 @@
|
|||||||
// Copyright (c) 2022 The Chromium Authors. All rights reserved.
|
|
||||||
// Use of this source code is governed by a BSD-style license that can be
|
|
||||||
// found in the LICENSE file.
|
|
||||||
|
|
||||||
#include "base/allocator/dispatcher/dispatcher.h"
|
|
||||||
|
|
||||||
#include "base/allocator/allocator_shim.h"
|
|
||||||
#include "base/allocator/buildflags.h"
|
|
||||||
#include "base/allocator/dispatcher/reentry_guard.h"
|
|
||||||
#include "base/allocator/partition_allocator/partition_alloc.h"
|
|
||||||
#include "base/sampling_heap_profiler/poisson_allocation_sampler.h"
|
|
||||||
|
|
||||||
#if BUILDFLAG(USE_ALLOCATOR_SHIM)
|
|
||||||
namespace base::allocator::dispatcher::allocator_shim_details {
|
|
||||||
namespace {
|
|
||||||
|
|
||||||
using allocator::AllocatorDispatch;
|
|
||||||
|
|
||||||
void* AllocFn(const AllocatorDispatch* self, size_t size, void* context) {
|
|
||||||
ReentryGuard guard;
|
|
||||||
void* address = self->next->alloc_function(self->next, size, context);
|
|
||||||
if (LIKELY(guard)) {
|
|
||||||
PoissonAllocationSampler::RecordAlloc(
|
|
||||||
address, size, PoissonAllocationSampler::kMalloc, nullptr);
|
|
||||||
}
|
|
||||||
return address;
|
|
||||||
}
|
|
||||||
|
|
||||||
void* AllocUncheckedFn(const AllocatorDispatch* self,
|
|
||||||
size_t size,
|
|
||||||
void* context) {
|
|
||||||
ReentryGuard guard;
|
|
||||||
void* address =
|
|
||||||
self->next->alloc_unchecked_function(self->next, size, context);
|
|
||||||
if (LIKELY(guard)) {
|
|
||||||
PoissonAllocationSampler::RecordAlloc(
|
|
||||||
address, size, PoissonAllocationSampler::kMalloc, nullptr);
|
|
||||||
}
|
|
||||||
return address;
|
|
||||||
}
|
|
||||||
|
|
||||||
void* AllocZeroInitializedFn(const AllocatorDispatch* self,
|
|
||||||
size_t n,
|
|
||||||
size_t size,
|
|
||||||
void* context) {
|
|
||||||
ReentryGuard guard;
|
|
||||||
void* address =
|
|
||||||
self->next->alloc_zero_initialized_function(self->next, n, size, context);
|
|
||||||
if (LIKELY(guard)) {
|
|
||||||
PoissonAllocationSampler::RecordAlloc(
|
|
||||||
address, n * size, PoissonAllocationSampler::kMalloc, nullptr);
|
|
||||||
}
|
|
||||||
return address;
|
|
||||||
}
|
|
||||||
|
|
||||||
void* AllocAlignedFn(const AllocatorDispatch* self,
|
|
||||||
size_t alignment,
|
|
||||||
size_t size,
|
|
||||||
void* context) {
|
|
||||||
ReentryGuard guard;
|
|
||||||
void* address =
|
|
||||||
self->next->alloc_aligned_function(self->next, alignment, size, context);
|
|
||||||
if (LIKELY(guard)) {
|
|
||||||
PoissonAllocationSampler::RecordAlloc(
|
|
||||||
address, size, PoissonAllocationSampler::kMalloc, nullptr);
|
|
||||||
}
|
|
||||||
return address;
|
|
||||||
}
|
|
||||||
|
|
||||||
void* ReallocFn(const AllocatorDispatch* self,
|
|
||||||
void* address,
|
|
||||||
size_t size,
|
|
||||||
void* context) {
|
|
||||||
ReentryGuard guard;
|
|
||||||
// Note: size == 0 actually performs free.
|
|
||||||
PoissonAllocationSampler::RecordFree(address);
|
|
||||||
address = self->next->realloc_function(self->next, address, size, context);
|
|
||||||
if (LIKELY(guard)) {
|
|
||||||
PoissonAllocationSampler::RecordAlloc(
|
|
||||||
address, size, PoissonAllocationSampler::kMalloc, nullptr);
|
|
||||||
}
|
|
||||||
return address;
|
|
||||||
}
|
|
||||||
|
|
||||||
void FreeFn(const AllocatorDispatch* self, void* address, void* context) {
|
|
||||||
// Note: The RecordFree should be called before free_function
|
|
||||||
// (here and in other places).
|
|
||||||
// That is because we need to remove the recorded allocation sample before
|
|
||||||
// free_function, as once the latter is executed the address becomes available
|
|
||||||
// and can be allocated by another thread. That would be racy otherwise.
|
|
||||||
PoissonAllocationSampler::RecordFree(address);
|
|
||||||
self->next->free_function(self->next, address, context);
|
|
||||||
}
|
|
||||||
|
|
||||||
size_t GetSizeEstimateFn(const AllocatorDispatch* self,
|
|
||||||
void* address,
|
|
||||||
void* context) {
|
|
||||||
return self->next->get_size_estimate_function(self->next, address, context);
|
|
||||||
}
|
|
||||||
|
|
||||||
unsigned BatchMallocFn(const AllocatorDispatch* self,
|
|
||||||
size_t size,
|
|
||||||
void** results,
|
|
||||||
unsigned num_requested,
|
|
||||||
void* context) {
|
|
||||||
ReentryGuard guard;
|
|
||||||
unsigned num_allocated = self->next->batch_malloc_function(
|
|
||||||
self->next, size, results, num_requested, context);
|
|
||||||
if (LIKELY(guard)) {
|
|
||||||
for (unsigned i = 0; i < num_allocated; ++i) {
|
|
||||||
PoissonAllocationSampler::RecordAlloc(
|
|
||||||
results[i], size, PoissonAllocationSampler::kMalloc, nullptr);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
return num_allocated;
|
|
||||||
}
|
|
||||||
|
|
||||||
void BatchFreeFn(const AllocatorDispatch* self,
|
|
||||||
void** to_be_freed,
|
|
||||||
unsigned num_to_be_freed,
|
|
||||||
void* context) {
|
|
||||||
for (unsigned i = 0; i < num_to_be_freed; ++i)
|
|
||||||
PoissonAllocationSampler::RecordFree(to_be_freed[i]);
|
|
||||||
self->next->batch_free_function(self->next, to_be_freed, num_to_be_freed,
|
|
||||||
context);
|
|
||||||
}
|
|
||||||
|
|
||||||
void FreeDefiniteSizeFn(const AllocatorDispatch* self,
|
|
||||||
void* address,
|
|
||||||
size_t size,
|
|
||||||
void* context) {
|
|
||||||
PoissonAllocationSampler::RecordFree(address);
|
|
||||||
self->next->free_definite_size_function(self->next, address, size, context);
|
|
||||||
}
|
|
||||||
|
|
||||||
static void* AlignedMallocFn(const AllocatorDispatch* self,
|
|
||||||
size_t size,
|
|
||||||
size_t alignment,
|
|
||||||
void* context) {
|
|
||||||
ReentryGuard guard;
|
|
||||||
void* address =
|
|
||||||
self->next->aligned_malloc_function(self->next, size, alignment, context);
|
|
||||||
if (LIKELY(guard)) {
|
|
||||||
PoissonAllocationSampler::RecordAlloc(
|
|
||||||
address, size, PoissonAllocationSampler::kMalloc, nullptr);
|
|
||||||
}
|
|
||||||
return address;
|
|
||||||
}
|
|
||||||
|
|
||||||
static void* AlignedReallocFn(const AllocatorDispatch* self,
|
|
||||||
void* address,
|
|
||||||
size_t size,
|
|
||||||
size_t alignment,
|
|
||||||
void* context) {
|
|
||||||
ReentryGuard guard;
|
|
||||||
// Note: size == 0 actually performs free.
|
|
||||||
PoissonAllocationSampler::RecordFree(address);
|
|
||||||
address = self->next->aligned_realloc_function(self->next, address, size,
|
|
||||||
alignment, context);
|
|
||||||
if (LIKELY(guard)) {
|
|
||||||
PoissonAllocationSampler::RecordAlloc(
|
|
||||||
address, size, PoissonAllocationSampler::kMalloc, nullptr);
|
|
||||||
}
|
|
||||||
return address;
|
|
||||||
}
|
|
||||||
|
|
||||||
static void AlignedFreeFn(const AllocatorDispatch* self,
|
|
||||||
void* address,
|
|
||||||
void* context) {
|
|
||||||
PoissonAllocationSampler::RecordFree(address);
|
|
||||||
self->next->aligned_free_function(self->next, address, context);
|
|
||||||
}
|
|
||||||
|
|
||||||
AllocatorDispatch g_allocator_dispatch = {&AllocFn,
|
|
||||||
&AllocUncheckedFn,
|
|
||||||
&AllocZeroInitializedFn,
|
|
||||||
&AllocAlignedFn,
|
|
||||||
&ReallocFn,
|
|
||||||
&FreeFn,
|
|
||||||
&GetSizeEstimateFn,
|
|
||||||
&BatchMallocFn,
|
|
||||||
&BatchFreeFn,
|
|
||||||
&FreeDefiniteSizeFn,
|
|
||||||
&AlignedMallocFn,
|
|
||||||
&AlignedReallocFn,
|
|
||||||
&AlignedFreeFn,
|
|
||||||
nullptr};
|
|
||||||
|
|
||||||
} // namespace
|
|
||||||
} // namespace base::allocator::dispatcher::allocator_shim_details
|
|
||||||
#endif // BUILDFLAG(USE_ALLOCATOR_SHIM)
|
|
||||||
|
|
||||||
#if BUILDFLAG(USE_PARTITION_ALLOC) && !BUILDFLAG(IS_NACL)
|
|
||||||
namespace base::allocator::dispatcher::partition_allocator_details {
|
|
||||||
namespace {
|
|
||||||
|
|
||||||
void PartitionAllocHook(void* address, size_t size, const char* type) {
|
|
||||||
PoissonAllocationSampler::RecordAlloc(
|
|
||||||
address, size, PoissonAllocationSampler::kPartitionAlloc, type);
|
|
||||||
}
|
|
||||||
|
|
||||||
void PartitionFreeHook(void* address) {
|
|
||||||
PoissonAllocationSampler::RecordFree(address);
|
|
||||||
}
|
|
||||||
|
|
||||||
} // namespace
|
|
||||||
} // namespace base::allocator::dispatcher::partition_allocator_details
|
|
||||||
#endif // BUILDFLAG(USE_PARTITION_ALLOC) && !BUILDFLAG(IS_NACL)
|
|
||||||
|
|
||||||
namespace base::allocator::dispatcher {
|
|
||||||
|
|
||||||
void InstallStandardAllocatorHooks() {
|
|
||||||
#if BUILDFLAG(USE_ALLOCATOR_SHIM)
|
|
||||||
allocator::InsertAllocatorDispatch(
|
|
||||||
&allocator_shim_details::g_allocator_dispatch);
|
|
||||||
#else
|
|
||||||
// If the allocator shim isn't available, then we don't install any hooks.
|
|
||||||
// There's no point in printing an error message, since this can regularly
|
|
||||||
// happen for tests.
|
|
||||||
#endif // BUILDFLAG(USE_ALLOCATOR_SHIM)
|
|
||||||
|
|
||||||
#if BUILDFLAG(USE_PARTITION_ALLOC) && !BUILDFLAG(IS_NACL)
|
|
||||||
partition_alloc::PartitionAllocHooks::SetObserverHooks(
|
|
||||||
&partition_allocator_details::PartitionAllocHook,
|
|
||||||
&partition_allocator_details::PartitionFreeHook);
|
|
||||||
#endif // BUILDFLAG(USE_PARTITION_ALLOC) && !BUILDFLAG(IS_NACL)
|
|
||||||
}
|
|
||||||
|
|
||||||
void RemoveStandardAllocatorHooksForTesting() {
|
|
||||||
#if BUILDFLAG(USE_ALLOCATOR_SHIM)
|
|
||||||
allocator::RemoveAllocatorDispatchForTesting(
|
|
||||||
&allocator_shim_details::g_allocator_dispatch); // IN-TEST
|
|
||||||
#endif
|
|
||||||
#if BUILDFLAG(USE_PARTITION_ALLOC) && !BUILDFLAG(IS_NACL)
|
|
||||||
partition_alloc::PartitionAllocHooks::SetObserverHooks(nullptr, nullptr);
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
|
|
||||||
} // namespace base::allocator::dispatcher
|
|
@ -1,17 +0,0 @@
|
|||||||
// Copyright (c) 2022 The Chromium Authors. All rights reserved.
|
|
||||||
// Use of this source code is governed by a BSD-style license that can be
|
|
||||||
// found in the LICENSE file.
|
|
||||||
|
|
||||||
#ifndef BASE_ALLOCATOR_DISPATCHER_DISPATCHER_H_
|
|
||||||
#define BASE_ALLOCATOR_DISPATCHER_DISPATCHER_H_
|
|
||||||
|
|
||||||
#include "base/base_export.h"
|
|
||||||
|
|
||||||
namespace base::allocator::dispatcher {
|
|
||||||
|
|
||||||
void BASE_EXPORT InstallStandardAllocatorHooks();
|
|
||||||
void BASE_EXPORT RemoveStandardAllocatorHooksForTesting();
|
|
||||||
|
|
||||||
} // namespace base::allocator::dispatcher
|
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_DISPATCHER_DISPATCHER_H_
|
|
@ -1,20 +0,0 @@
|
|||||||
// Copyright (c) 2022 The Chromium Authors. All rights reserved.
|
|
||||||
// Use of this source code is governed by a BSD-style license that can be
|
|
||||||
// found in the LICENSE file.
|
|
||||||
|
|
||||||
#include "base/allocator/dispatcher/reentry_guard.h"
|
|
||||||
|
|
||||||
#include "base/check.h"
|
|
||||||
#include "base/compiler_specific.h"
|
|
||||||
#include "build/build_config.h"
|
|
||||||
|
|
||||||
#if BUILDFLAG(IS_APPLE) || BUILDFLAG(IS_ANDROID)
|
|
||||||
|
|
||||||
#include <pthread.h>
|
|
||||||
|
|
||||||
namespace base::allocator::dispatcher {
|
|
||||||
|
|
||||||
pthread_key_t ReentryGuard::entered_key_ = 0;
|
|
||||||
|
|
||||||
} // namespace base::allocator::dispatcher
|
|
||||||
#endif
|
|
@ -1,68 +0,0 @@
|
|||||||
// Copyright (c) 2022 The Chromium Authors. All rights reserved.
|
|
||||||
// Use of this source code is governed by a BSD-style license that can be
|
|
||||||
// found in the LICENSE file.
|
|
||||||
|
|
||||||
#ifndef BASE_ALLOCATOR_DISPATCHER_REENTRY_GUARD_H_
|
|
||||||
#define BASE_ALLOCATOR_DISPATCHER_REENTRY_GUARD_H_
|
|
||||||
|
|
||||||
#include "base/base_export.h"
|
|
||||||
#include "base/check.h"
|
|
||||||
#include "base/compiler_specific.h"
|
|
||||||
#include "build/build_config.h"
|
|
||||||
|
|
||||||
#if BUILDFLAG(IS_APPLE) || BUILDFLAG(IS_ANDROID)
|
|
||||||
#include <pthread.h>
|
|
||||||
#endif
|
|
||||||
|
|
||||||
namespace base::allocator::dispatcher {
|
|
||||||
|
|
||||||
#if BUILDFLAG(IS_APPLE) || BUILDFLAG(IS_ANDROID)
|
|
||||||
|
|
||||||
// The macOS implementation of libmalloc sometimes calls malloc recursively,
|
|
||||||
// delegating allocations between zones. That causes our hooks being called
|
|
||||||
// twice. The scoped guard allows us to detect that.
|
|
||||||
//
|
|
||||||
// Besides that the implementations of thread_local on macOS and Android
|
|
||||||
// seem to allocate memory lazily on the first access to thread_local variables.
|
|
||||||
// Make use of pthread TLS instead of C++ thread_local there.
|
|
||||||
struct ReentryGuard {
|
|
||||||
ReentryGuard() : allowed_(!pthread_getspecific(entered_key_)) {
|
|
||||||
pthread_setspecific(entered_key_, reinterpret_cast<void*>(true));
|
|
||||||
}
|
|
||||||
|
|
||||||
~ReentryGuard() {
|
|
||||||
if (LIKELY(allowed_))
|
|
||||||
pthread_setspecific(entered_key_, nullptr);
|
|
||||||
}
|
|
||||||
|
|
||||||
explicit operator bool() const noexcept { return allowed_; }
|
|
||||||
|
|
||||||
// This function must be called in very early of the process start-up in
|
|
||||||
// order to acquire a low TLS slot number because glibc TLS implementation
|
|
||||||
// will require a malloc call to allocate storage for a higher slot number
|
|
||||||
// (>= PTHREAD_KEY_2NDLEVEL_SIZE == 32). c.f. heap_profiling::InitTLSSlot.
|
|
||||||
static void Init() {
|
|
||||||
int error = pthread_key_create(&entered_key_, nullptr);
|
|
||||||
CHECK(!error);
|
|
||||||
}
|
|
||||||
|
|
||||||
private:
|
|
||||||
static pthread_key_t entered_key_;
|
|
||||||
const bool allowed_;
|
|
||||||
};
|
|
||||||
|
|
||||||
#else
|
|
||||||
|
|
||||||
// Use [[maybe_unused]] as this lightweight stand-in for the more heavyweight
|
|
||||||
// ReentryGuard above will otherwise trigger the "unused code" warnings.
|
|
||||||
struct [[maybe_unused]] BASE_EXPORT ReentryGuard {
|
|
||||||
constexpr explicit operator bool() const noexcept { return true; }
|
|
||||||
|
|
||||||
static void Init() {}
|
|
||||||
};
|
|
||||||
|
|
||||||
#endif
|
|
||||||
|
|
||||||
} // namespace base::allocator::dispatcher
|
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_DISPATCHER_REENTRY_GUARD_H_
|
|
@ -11,19 +11,11 @@
|
|||||||
namespace base {
|
namespace base {
|
||||||
namespace features {
|
namespace features {
|
||||||
|
|
||||||
const BASE_EXPORT Feature kPartitionAllocDanglingPtr{
|
// When set, instead of crashing when encountering a dangling raw_ptr, the
|
||||||
"PartitionAllocDanglingPtr", FEATURE_DISABLED_BY_DEFAULT};
|
// signatures of the two stacktraces are logged. This is meant to be used only
|
||||||
constexpr FeatureParam<DanglingPtrMode>::Option kDanglingPtrModeOption[] = {
|
// by Chromium developers. See /docs/dangling_ptr.md
|
||||||
{DanglingPtrMode::kCrash, "crash"},
|
const BASE_EXPORT Feature kPartitionAllocDanglingPtrRecord{
|
||||||
{DanglingPtrMode::kLogSignature, "log_signature"},
|
"PartitionAllocDanglingPtrRecord", FEATURE_DISABLED_BY_DEFAULT};
|
||||||
};
|
|
||||||
const base::FeatureParam<DanglingPtrMode> kDanglingPtrModeParam{
|
|
||||||
&kPartitionAllocDanglingPtr,
|
|
||||||
"mode",
|
|
||||||
DanglingPtrMode::kCrash,
|
|
||||||
&kDanglingPtrModeOption,
|
|
||||||
};
|
|
||||||
|
|
||||||
#if defined(PA_ALLOW_PCSCAN)
|
#if defined(PA_ALLOW_PCSCAN)
|
||||||
// If enabled, PCScan is turned on by default for all partitions that don't
|
// If enabled, PCScan is turned on by default for all partitions that don't
|
||||||
// disable it explicitly.
|
// disable it explicitly.
|
||||||
@ -63,8 +55,7 @@ const BASE_EXPORT Feature kPartitionAllocLargeEmptySlotSpanRing{
|
|||||||
|
|
||||||
const Feature kPartitionAllocBackupRefPtr {
|
const Feature kPartitionAllocBackupRefPtr {
|
||||||
"PartitionAllocBackupRefPtr",
|
"PartitionAllocBackupRefPtr",
|
||||||
#if BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_WIN) || \
|
#if BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_WIN)
|
||||||
(BUILDFLAG(USE_ASAN_BACKUP_REF_PTR) && BUILDFLAG(IS_LINUX))
|
|
||||||
FEATURE_ENABLED_BY_DEFAULT
|
FEATURE_ENABLED_BY_DEFAULT
|
||||||
#else
|
#else
|
||||||
FEATURE_DISABLED_BY_DEFAULT
|
FEATURE_DISABLED_BY_DEFAULT
|
||||||
@ -88,7 +79,6 @@ const base::FeatureParam<BackupRefPtrEnabledProcesses>
|
|||||||
constexpr FeatureParam<BackupRefPtrMode>::Option kBackupRefPtrModeOptions[] = {
|
constexpr FeatureParam<BackupRefPtrMode>::Option kBackupRefPtrModeOptions[] = {
|
||||||
{BackupRefPtrMode::kDisabled, "disabled"},
|
{BackupRefPtrMode::kDisabled, "disabled"},
|
||||||
{BackupRefPtrMode::kEnabled, "enabled"},
|
{BackupRefPtrMode::kEnabled, "enabled"},
|
||||||
{BackupRefPtrMode::kEnabledWithoutZapping, "enabled-without-zapping"},
|
|
||||||
{BackupRefPtrMode::kDisabledButSplitPartitions2Way,
|
{BackupRefPtrMode::kDisabledButSplitPartitions2Way,
|
||||||
"disabled-but-2-way-split"},
|
"disabled-but-2-way-split"},
|
||||||
{BackupRefPtrMode::kDisabledButSplitPartitions3Way,
|
{BackupRefPtrMode::kDisabledButSplitPartitions3Way,
|
||||||
|
@ -17,28 +17,7 @@ struct Feature;
|
|||||||
|
|
||||||
namespace features {
|
namespace features {
|
||||||
|
|
||||||
// See /docs/dangling_ptr.md
|
extern const BASE_EXPORT Feature kPartitionAllocDanglingPtrRecord;
|
||||||
//
|
|
||||||
// Usage:
|
|
||||||
// --enable-features=PartitionAllocDanglingPtr:mode/crash
|
|
||||||
// --enable-features=PartitionAllocDanglingPtr:mode/log_signature
|
|
||||||
extern const BASE_EXPORT Feature kPartitionAllocDanglingPtr;
|
|
||||||
enum class DanglingPtrMode {
|
|
||||||
// Crash immediately after detecting a dangling raw_ptr.
|
|
||||||
kCrash, // (default)
|
|
||||||
|
|
||||||
// Log the signature of every occurrences without crashing. It is used by
|
|
||||||
// bots.
|
|
||||||
// Format "[DanglingSignature]\t<1>\t<2>"
|
|
||||||
// 1. The function who freed the memory while it was still referenced.
|
|
||||||
// 2. The function who released the raw_ptr reference.
|
|
||||||
kLogSignature,
|
|
||||||
|
|
||||||
// Note: This will be extended with a single shot DumpWithoutCrashing.
|
|
||||||
};
|
|
||||||
extern const BASE_EXPORT base::FeatureParam<DanglingPtrMode>
|
|
||||||
kDanglingPtrModeParam;
|
|
||||||
|
|
||||||
#if defined(PA_ALLOW_PCSCAN)
|
#if defined(PA_ALLOW_PCSCAN)
|
||||||
extern const BASE_EXPORT Feature kPartitionAllocPCScan;
|
extern const BASE_EXPORT Feature kPartitionAllocPCScan;
|
||||||
#endif // defined(PA_ALLOW_PCSCAN)
|
#endif // defined(PA_ALLOW_PCSCAN)
|
||||||
@ -71,9 +50,6 @@ enum class BackupRefPtrMode {
|
|||||||
// This entails splitting the main partition.
|
// This entails splitting the main partition.
|
||||||
kEnabled,
|
kEnabled,
|
||||||
|
|
||||||
// Same as kEnabled but without zapping quarantined objects.
|
|
||||||
kEnabledWithoutZapping,
|
|
||||||
|
|
||||||
// BRP is disabled, but the main partition is split out, as if BRP was enabled
|
// BRP is disabled, but the main partition is split out, as if BRP was enabled
|
||||||
// in the "previous slot" mode.
|
// in the "previous slot" mode.
|
||||||
kDisabledButSplitPartitions2Way,
|
kDisabledButSplitPartitions2Way,
|
||||||
|
@ -50,33 +50,33 @@ namespace {
|
|||||||
|
|
||||||
#if BUILDFLAG(ENABLE_BASE_TRACING)
|
#if BUILDFLAG(ENABLE_BASE_TRACING)
|
||||||
constexpr const char* ScannerIdToTracingString(
|
constexpr const char* ScannerIdToTracingString(
|
||||||
partition_alloc::internal::StatsCollector::ScannerId id) {
|
internal::StatsCollector::ScannerId id) {
|
||||||
switch (id) {
|
switch (id) {
|
||||||
case partition_alloc::internal::StatsCollector::ScannerId::kClear:
|
case internal::StatsCollector::ScannerId::kClear:
|
||||||
return "PCScan.Scanner.Clear";
|
return "PCScan.Scanner.Clear";
|
||||||
case partition_alloc::internal::StatsCollector::ScannerId::kScan:
|
case internal::StatsCollector::ScannerId::kScan:
|
||||||
return "PCScan.Scanner.Scan";
|
return "PCScan.Scanner.Scan";
|
||||||
case partition_alloc::internal::StatsCollector::ScannerId::kSweep:
|
case internal::StatsCollector::ScannerId::kSweep:
|
||||||
return "PCScan.Scanner.Sweep";
|
return "PCScan.Scanner.Sweep";
|
||||||
case partition_alloc::internal::StatsCollector::ScannerId::kOverall:
|
case internal::StatsCollector::ScannerId::kOverall:
|
||||||
return "PCScan.Scanner";
|
return "PCScan.Scanner";
|
||||||
case partition_alloc::internal::StatsCollector::ScannerId::kNumIds:
|
case internal::StatsCollector::ScannerId::kNumIds:
|
||||||
__builtin_unreachable();
|
__builtin_unreachable();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
constexpr const char* MutatorIdToTracingString(
|
constexpr const char* MutatorIdToTracingString(
|
||||||
partition_alloc::internal::StatsCollector::MutatorId id) {
|
internal::StatsCollector::MutatorId id) {
|
||||||
switch (id) {
|
switch (id) {
|
||||||
case partition_alloc::internal::StatsCollector::MutatorId::kClear:
|
case internal::StatsCollector::MutatorId::kClear:
|
||||||
return "PCScan.Mutator.Clear";
|
return "PCScan.Mutator.Clear";
|
||||||
case partition_alloc::internal::StatsCollector::MutatorId::kScanStack:
|
case internal::StatsCollector::MutatorId::kScanStack:
|
||||||
return "PCScan.Mutator.ScanStack";
|
return "PCScan.Mutator.ScanStack";
|
||||||
case partition_alloc::internal::StatsCollector::MutatorId::kScan:
|
case internal::StatsCollector::MutatorId::kScan:
|
||||||
return "PCScan.Mutator.Scan";
|
return "PCScan.Mutator.Scan";
|
||||||
case partition_alloc::internal::StatsCollector::MutatorId::kOverall:
|
case internal::StatsCollector::MutatorId::kOverall:
|
||||||
return "PCScan.Mutator";
|
return "PCScan.Mutator";
|
||||||
case partition_alloc::internal::StatsCollector::MutatorId::kNumIds:
|
case internal::StatsCollector::MutatorId::kNumIds:
|
||||||
__builtin_unreachable();
|
__builtin_unreachable();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -85,9 +85,8 @@ constexpr const char* MutatorIdToTracingString(
|
|||||||
// Inject TRACE_EVENT_BEGIN/END, TRACE_COUNTER1, and UmaHistogramTimes.
|
// Inject TRACE_EVENT_BEGIN/END, TRACE_COUNTER1, and UmaHistogramTimes.
|
||||||
class StatsReporterImpl final : public partition_alloc::StatsReporter {
|
class StatsReporterImpl final : public partition_alloc::StatsReporter {
|
||||||
public:
|
public:
|
||||||
void ReportTraceEvent(
|
void ReportTraceEvent(internal::StatsCollector::ScannerId id,
|
||||||
partition_alloc::internal::StatsCollector::ScannerId id,
|
[[maybe_unused]] uint32_t tid,
|
||||||
[[maybe_unused]] partition_alloc::internal::base::PlatformThreadId tid,
|
|
||||||
int64_t start_time_ticks_internal_value,
|
int64_t start_time_ticks_internal_value,
|
||||||
int64_t end_time_ticks_internal_value) override {
|
int64_t end_time_ticks_internal_value) override {
|
||||||
#if BUILDFLAG(ENABLE_BASE_TRACING)
|
#if BUILDFLAG(ENABLE_BASE_TRACING)
|
||||||
@ -105,9 +104,8 @@ class StatsReporterImpl final : public partition_alloc::StatsReporter {
|
|||||||
#endif // BUILDFLAG(ENABLE_BASE_TRACING)
|
#endif // BUILDFLAG(ENABLE_BASE_TRACING)
|
||||||
}
|
}
|
||||||
|
|
||||||
void ReportTraceEvent(
|
void ReportTraceEvent(internal::StatsCollector::MutatorId id,
|
||||||
partition_alloc::internal::StatsCollector::MutatorId id,
|
[[maybe_unused]] uint32_t tid,
|
||||||
[[maybe_unused]] partition_alloc::internal::base::PlatformThreadId tid,
|
|
||||||
int64_t start_time_ticks_internal_value,
|
int64_t start_time_ticks_internal_value,
|
||||||
int64_t end_time_ticks_internal_value) override {
|
int64_t end_time_ticks_internal_value) override {
|
||||||
#if BUILDFLAG(ENABLE_BASE_TRACING)
|
#if BUILDFLAG(ENABLE_BASE_TRACING)
|
||||||
@ -158,7 +156,7 @@ void RegisterPCScanStatsReporter() {
|
|||||||
|
|
||||||
DCHECK(!registered);
|
DCHECK(!registered);
|
||||||
|
|
||||||
partition_alloc::internal::PCScan::RegisterStatsReporter(&s_reporter);
|
internal::PCScan::RegisterStatsReporter(&s_reporter);
|
||||||
registered = true;
|
registered = true;
|
||||||
}
|
}
|
||||||
#endif // defined(PA_ALLOW_PCSCAN)
|
#endif // defined(PA_ALLOW_PCSCAN)
|
||||||
@ -291,13 +289,6 @@ std::map<std::string, std::string> ProposeSyntheticFinchTrials() {
|
|||||||
brp_group_name = "EnabledPrevSlot";
|
brp_group_name = "EnabledPrevSlot";
|
||||||
#else
|
#else
|
||||||
brp_group_name = "EnabledBeforeAlloc";
|
brp_group_name = "EnabledBeforeAlloc";
|
||||||
#endif
|
|
||||||
break;
|
|
||||||
case features::BackupRefPtrMode::kEnabledWithoutZapping:
|
|
||||||
#if BUILDFLAG(PUT_REF_COUNT_IN_PREVIOUS_SLOT)
|
|
||||||
brp_group_name = "EnabledPrevSlotWithoutZapping";
|
|
||||||
#else
|
|
||||||
brp_group_name = "EnabledBeforeAllocWithoutZapping";
|
|
||||||
#endif
|
#endif
|
||||||
break;
|
break;
|
||||||
case features::BackupRefPtrMode::kDisabledButSplitPartitions2Way:
|
case features::BackupRefPtrMode::kDisabledButSplitPartitions2Way:
|
||||||
@ -422,6 +413,7 @@ absl::optional<debug::StackTrace> TakeStackTrace(uintptr_t id) {
|
|||||||
// This function is meant to be used only by Chromium developers, to list what
|
// This function is meant to be used only by Chromium developers, to list what
|
||||||
// are all the dangling raw_ptr occurrences in a table.
|
// are all the dangling raw_ptr occurrences in a table.
|
||||||
std::string ExtractDanglingPtrSignature(std::string stacktrace) {
|
std::string ExtractDanglingPtrSignature(std::string stacktrace) {
|
||||||
|
LOG(ERROR) << stacktrace;
|
||||||
std::vector<StringPiece> lines = SplitStringPiece(
|
std::vector<StringPiece> lines = SplitStringPiece(
|
||||||
stacktrace, "\r\n", TRIM_WHITESPACE, SPLIT_WANT_NONEMPTY);
|
stacktrace, "\r\n", TRIM_WHITESPACE, SPLIT_WANT_NONEMPTY);
|
||||||
|
|
||||||
@ -461,7 +453,7 @@ std::string ExtractDanglingPtrSignature(std::string stacktrace) {
|
|||||||
return std::string(caller.substr(function_start + 1));
|
return std::string(caller.substr(function_start + 1));
|
||||||
}
|
}
|
||||||
|
|
||||||
void DanglingRawPtrReleasedLogSignature(uintptr_t id) {
|
void DanglingRawPtrReleased(uintptr_t id) {
|
||||||
// This is called from raw_ptr<>'s release operation. Making allocations is
|
// This is called from raw_ptr<>'s release operation. Making allocations is
|
||||||
// allowed. In particular, symbolizing and printing the StackTraces may
|
// allowed. In particular, symbolizing and printing the StackTraces may
|
||||||
// allocate memory.
|
// allocate memory.
|
||||||
@ -469,6 +461,7 @@ void DanglingRawPtrReleasedLogSignature(uintptr_t id) {
|
|||||||
debug::StackTrace stack_trace_release;
|
debug::StackTrace stack_trace_release;
|
||||||
absl::optional<debug::StackTrace> stack_trace_free = TakeStackTrace(id);
|
absl::optional<debug::StackTrace> stack_trace_free = TakeStackTrace(id);
|
||||||
|
|
||||||
|
if (FeatureList::IsEnabled(features::kPartitionAllocDanglingPtrRecord)) {
|
||||||
if (stack_trace_free) {
|
if (stack_trace_free) {
|
||||||
LOG(ERROR) << StringPrintf(
|
LOG(ERROR) << StringPrintf(
|
||||||
"[DanglingSignature]\t%s\t%s",
|
"[DanglingSignature]\t%s\t%s",
|
||||||
@ -479,15 +472,9 @@ void DanglingRawPtrReleasedLogSignature(uintptr_t id) {
|
|||||||
"[DanglingSignature]\t%s\tmissing-stacktrace",
|
"[DanglingSignature]\t%s\tmissing-stacktrace",
|
||||||
ExtractDanglingPtrSignature(stack_trace_release.ToString()).c_str());
|
ExtractDanglingPtrSignature(stack_trace_release.ToString()).c_str());
|
||||||
}
|
}
|
||||||
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
void DanglingRawPtrReleasedCrash(uintptr_t id) {
|
|
||||||
// This is called from raw_ptr<>'s release operation. Making allocations is
|
|
||||||
// allowed. In particular, symbolizing and printing the StackTraces may
|
|
||||||
// allocate memory.
|
|
||||||
debug::StackTrace stack_trace_release;
|
|
||||||
absl::optional<debug::StackTrace> stack_trace_free = TakeStackTrace(id);
|
|
||||||
|
|
||||||
if (stack_trace_free) {
|
if (stack_trace_free) {
|
||||||
LOG(ERROR) << StringPrintf(
|
LOG(ERROR) << StringPrintf(
|
||||||
"Detected dangling raw_ptr with id=0x%016" PRIxPTR
|
"Detected dangling raw_ptr with id=0x%016" PRIxPTR
|
||||||
@ -519,24 +506,8 @@ void InstallDanglingRawPtrChecks() {
|
|||||||
// restarting the test executable.
|
// restarting the test executable.
|
||||||
ClearDanglingRawPtrBuffer();
|
ClearDanglingRawPtrBuffer();
|
||||||
|
|
||||||
if (!FeatureList::IsEnabled(features::kPartitionAllocDanglingPtr)) {
|
|
||||||
partition_alloc::SetDanglingRawPtrDetectedFn([](uintptr_t) {});
|
|
||||||
partition_alloc::SetDanglingRawPtrReleasedFn([](uintptr_t) {});
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
switch (features::kDanglingPtrModeParam.Get()) {
|
|
||||||
case features::DanglingPtrMode::kCrash:
|
|
||||||
partition_alloc::SetDanglingRawPtrDetectedFn(DanglingRawPtrDetected);
|
partition_alloc::SetDanglingRawPtrDetectedFn(DanglingRawPtrDetected);
|
||||||
partition_alloc::SetDanglingRawPtrReleasedFn(DanglingRawPtrReleasedCrash);
|
partition_alloc::SetDanglingRawPtrReleasedFn(DanglingRawPtrReleased);
|
||||||
break;
|
|
||||||
|
|
||||||
case features::DanglingPtrMode::kLogSignature:
|
|
||||||
partition_alloc::SetDanglingRawPtrDetectedFn(DanglingRawPtrDetected);
|
|
||||||
partition_alloc::SetDanglingRawPtrReleasedFn(
|
|
||||||
DanglingRawPtrReleasedLogSignature);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO(arthursonzogni): There might exist long lived dangling raw_ptr. If there
|
// TODO(arthursonzogni): There might exist long lived dangling raw_ptr. If there
|
||||||
|
@ -277,6 +277,8 @@ target(partition_alloc_target_type, "partition_alloc") {
|
|||||||
":debugging_buildflags",
|
":debugging_buildflags",
|
||||||
":logging_buildflags",
|
":logging_buildflags",
|
||||||
":partition_alloc_buildflags",
|
":partition_alloc_buildflags",
|
||||||
|
"//base:synchronization_buildflags",
|
||||||
|
"//base:tracing_buildflags",
|
||||||
"//build:branding_buildflags",
|
"//build:branding_buildflags",
|
||||||
"//build/config/compiler:compiler_buildflags",
|
"//build/config/compiler:compiler_buildflags",
|
||||||
]
|
]
|
||||||
@ -322,6 +324,73 @@ target(partition_alloc_target_type, "partition_alloc") {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
source_set("test_support") {
|
||||||
|
sources = [
|
||||||
|
"extended_api.cc",
|
||||||
|
"extended_api.h",
|
||||||
|
"partition_alloc_base/threading/platform_thread_for_testing.h",
|
||||||
|
]
|
||||||
|
if (is_posix) {
|
||||||
|
sources += [
|
||||||
|
"partition_alloc_base/threading/platform_thread_posix_for_testing.cc",
|
||||||
|
]
|
||||||
|
}
|
||||||
|
if (is_fuchsia) {
|
||||||
|
sources += [
|
||||||
|
"partition_alloc_base/threading/platform_thread_fuchsia_for_testing.cc",
|
||||||
|
"partition_alloc_base/threading/platform_thread_posix_for_testing.cc",
|
||||||
|
]
|
||||||
|
}
|
||||||
|
if (is_win) {
|
||||||
|
sources +=
|
||||||
|
[ "partition_alloc_base/threading/platform_thread_win_for_testing.cc" ]
|
||||||
|
}
|
||||||
|
if (is_mac || is_ios) {
|
||||||
|
sources +=
|
||||||
|
[ "partition_alloc_base/threading/platform_thread_mac_for_testing.mm" ]
|
||||||
|
}
|
||||||
|
if (is_linux || is_chromeos) {
|
||||||
|
sources += [
|
||||||
|
"partition_alloc_base/threading/platform_thread_linux_for_testing.cc",
|
||||||
|
]
|
||||||
|
}
|
||||||
|
if (is_android) {
|
||||||
|
sources += [
|
||||||
|
"partition_alloc_base/threading/platform_thread_android_for_testing.cc",
|
||||||
|
]
|
||||||
|
}
|
||||||
|
public_deps = [
|
||||||
|
":chromecast_buildflags",
|
||||||
|
":chromeos_buildflags",
|
||||||
|
":debugging_buildflags",
|
||||||
|
":logging_buildflags",
|
||||||
|
":partition_alloc_buildflags",
|
||||||
|
"//base:synchronization_buildflags",
|
||||||
|
"//base:tracing_buildflags",
|
||||||
|
"//build:branding_buildflags",
|
||||||
|
"//build/config/compiler:compiler_buildflags",
|
||||||
|
]
|
||||||
|
public_configs = []
|
||||||
|
if (is_fuchsia) {
|
||||||
|
public_deps += [
|
||||||
|
"//third_party/fuchsia-sdk/sdk/pkg/fit",
|
||||||
|
"//third_party/fuchsia-sdk/sdk/pkg/sync",
|
||||||
|
"//third_party/fuchsia-sdk/sdk/pkg/zx",
|
||||||
|
]
|
||||||
|
|
||||||
|
# Needed for users of spinning_mutex.h, which for performance reasons,
|
||||||
|
# contains inlined calls to `libsync` inside the header file.
|
||||||
|
# It appends an entry to the "libs" section of the dependent target.
|
||||||
|
public_configs += [ ":fuchsia_sync_lib" ]
|
||||||
|
}
|
||||||
|
deps = [ "//base:base" ]
|
||||||
|
|
||||||
|
if (!is_debug) {
|
||||||
|
configs -= [ "//build/config/compiler:default_optimization" ]
|
||||||
|
configs += [ "//build/config/compiler:optimize_speed" ]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
buildflag_header("partition_alloc_buildflags") {
|
buildflag_header("partition_alloc_buildflags") {
|
||||||
header = "partition_alloc_buildflags.h"
|
header = "partition_alloc_buildflags.h"
|
||||||
|
|
||||||
|
@ -1,4 +1,3 @@
|
|||||||
bartekn@chromium.org
|
bartekn@chromium.org
|
||||||
haraken@chromium.org
|
haraken@chromium.org
|
||||||
lizeb@chromium.org
|
lizeb@chromium.org
|
||||||
tasak@google.com
|
|
||||||
|
@ -21,8 +21,6 @@ paths of allocation and deallocation require very few (reasonably predictable)
|
|||||||
branches. The number of operations in the fast paths is minimal, leading to the
|
branches. The number of operations in the fast paths is minimal, leading to the
|
||||||
possibility of inlining.
|
possibility of inlining.
|
||||||
|
|
||||||
![general architecture](./dot/layers.png)
|
|
||||||
|
|
||||||
However, even the fast path isn't the fastest, because it requires taking
|
However, even the fast path isn't the fastest, because it requires taking
|
||||||
a per-partition lock. Although we optimized the lock, there was still room for
|
a per-partition lock. Although we optimized the lock, there was still room for
|
||||||
improvement; to this end, we introduced the thread cache.
|
improvement; to this end, we introduced the thread cache.
|
||||||
@ -104,13 +102,6 @@ partition page that holds metadata (32B struct per partition page).
|
|||||||
diagram).
|
diagram).
|
||||||
* Gray fill denotes guard pages (one partition page each at the head and tail
|
* Gray fill denotes guard pages (one partition page each at the head and tail
|
||||||
of each super page).
|
of each super page).
|
||||||
* In some configurations, PartitionAlloc stores more metadata than can
|
|
||||||
fit in the one system page at the front. These are the bitmaps for
|
|
||||||
StarScan and `MTECheckedPtr<T>`, and they are relegated to the head of
|
|
||||||
what would otherwise be usable space for slot spans. One, both, or
|
|
||||||
none of these bitmaps may be present, depending on build
|
|
||||||
configuration, runtime configuration, and type of allocation.
|
|
||||||
See [`SuperPagePayloadBegin()`][payload-start] for details.
|
|
||||||
|
|
||||||
As allocation requests arrive, there is eventually a need to allocate a new slot
|
As allocation requests arrive, there is eventually a need to allocate a new slot
|
||||||
span.
|
span.
|
||||||
@ -187,4 +178,3 @@ list.
|
|||||||
[PartitionPage]: https://source.chromium.org/chromium/chromium/src/+/main:base/allocator/partition_allocator/partition_page.h;l=314;drc=e5b03e85ea180d1d1ab0dec471c7fd5d1706a9e4
|
[PartitionPage]: https://source.chromium.org/chromium/chromium/src/+/main:base/allocator/partition_allocator/partition_page.h;l=314;drc=e5b03e85ea180d1d1ab0dec471c7fd5d1706a9e4
|
||||||
[SlotSpanMetadata]: https://source.chromium.org/chromium/chromium/src/+/main:base/allocator/partition_allocator/partition_page.h;l=120;drc=e5b03e85ea180d1d1ab0dec471c7fd5d1706a9e4
|
[SlotSpanMetadata]: https://source.chromium.org/chromium/chromium/src/+/main:base/allocator/partition_allocator/partition_page.h;l=120;drc=e5b03e85ea180d1d1ab0dec471c7fd5d1706a9e4
|
||||||
[SubsequentPageMetadata]: https://source.chromium.org/chromium/chromium/src/+/main:base/allocator/partition_allocator/partition_page.h;l=295;drc=e5b03e85ea180d1d1ab0dec471c7fd5d1706a9e4
|
[SubsequentPageMetadata]: https://source.chromium.org/chromium/chromium/src/+/main:base/allocator/partition_allocator/partition_page.h;l=295;drc=e5b03e85ea180d1d1ab0dec471c7fd5d1706a9e4
|
||||||
[payload-start]: https://source.chromium.org/chromium/chromium/src/+/35b2deed603dedd4abb37f204d516ed62aa2b85c:base/allocator/partition_allocator/partition_page.h;l=454
|
|
||||||
|
@ -21,6 +21,13 @@
|
|||||||
#include "base/allocator/partition_allocator/partition_lock.h"
|
#include "base/allocator/partition_allocator/partition_lock.h"
|
||||||
#include "build/build_config.h"
|
#include "build/build_config.h"
|
||||||
|
|
||||||
|
namespace base {
|
||||||
|
|
||||||
|
template <typename Type>
|
||||||
|
struct LazyInstanceTraitsBase;
|
||||||
|
|
||||||
|
} // namespace base
|
||||||
|
|
||||||
namespace partition_alloc {
|
namespace partition_alloc {
|
||||||
|
|
||||||
class AddressSpaceStatsDumper;
|
class AddressSpaceStatsDumper;
|
||||||
@ -159,6 +166,8 @@ class PA_COMPONENT_EXPORT(PARTITION_ALLOC) AddressPoolManager {
|
|||||||
#endif // defined(PA_HAS_64_BITS_POINTERS)
|
#endif // defined(PA_HAS_64_BITS_POINTERS)
|
||||||
|
|
||||||
static AddressPoolManager singleton_;
|
static AddressPoolManager singleton_;
|
||||||
|
|
||||||
|
friend struct base::LazyInstanceTraitsBase<AddressPoolManager>;
|
||||||
};
|
};
|
||||||
|
|
||||||
PA_ALWAYS_INLINE pool_handle GetRegularPool() {
|
PA_ALWAYS_INLINE pool_handle GetRegularPool() {
|
||||||
@ -176,4 +185,13 @@ PA_ALWAYS_INLINE pool_handle GetConfigurablePool() {
|
|||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
using ::partition_alloc::internal::AddressPoolManager;
|
||||||
|
using ::partition_alloc::internal::GetBRPPool;
|
||||||
|
using ::partition_alloc::internal::GetConfigurablePool;
|
||||||
|
using ::partition_alloc::internal::GetRegularPool;
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_ADDRESS_POOL_MANAGER_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_ADDRESS_POOL_MANAGER_H_
|
||||||
|
@ -11,4 +11,12 @@ using pool_handle = unsigned;
|
|||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
using ::partition_alloc::internal::pool_handle;
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_ADDRESS_POOL_MANAGER_TYPES_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_ADDRESS_POOL_MANAGER_TYPES_H_
|
||||||
|
@ -1,23 +0,0 @@
|
|||||||
digraph G {
|
|
||||||
graph[bgcolor=transparent]
|
|
||||||
node[shape=box,style="filled,rounded",color=deepskyblue]
|
|
||||||
|
|
||||||
subgraph cluster_tc {
|
|
||||||
label = "Thread Cache"
|
|
||||||
rankdir = LR
|
|
||||||
{rank=same;TLS1,TLS2,TLSn}
|
|
||||||
TLS1->TLS2[style=invisible,dir=none]
|
|
||||||
TLS2->TLSn[style=dotted,dir=none]
|
|
||||||
}
|
|
||||||
|
|
||||||
subgraph cluster_central {
|
|
||||||
label = "Central Allocator (per-partition lock)"
|
|
||||||
fast[label="slot span freelists (fast path)"]
|
|
||||||
slow[label="slot span management (slow path)"]
|
|
||||||
# Forces slow path node beneath fast path node.
|
|
||||||
fast->slow[style=invisible,dir=none]
|
|
||||||
}
|
|
||||||
|
|
||||||
# Forces thread-external subgraph beneath thread cache subgraph.
|
|
||||||
TLS2->fast[style=invisible,dir=none]
|
|
||||||
}
|
|
Binary file not shown.
Before Width: | Height: | Size: 11 KiB |
@ -21,8 +21,6 @@ digraph G {
|
|||||||
<TD BGCOLOR="darkgrey" HEIGHT="52"></TD>
|
<TD BGCOLOR="darkgrey" HEIGHT="52"></TD>
|
||||||
<TD PORT="metadata"></TD>
|
<TD PORT="metadata"></TD>
|
||||||
<TD BGCOLOR="darkgrey" WIDTH="18"></TD>
|
<TD BGCOLOR="darkgrey" WIDTH="18"></TD>
|
||||||
<!-- Bitmaps -->
|
|
||||||
<TD WIDTH="100">Bitmaps(?)</TD>
|
|
||||||
<!-- Several Slot Spans -->
|
<!-- Several Slot Spans -->
|
||||||
<TD PORT="red" BGCOLOR="crimson" WIDTH="119">3</TD>
|
<TD PORT="red" BGCOLOR="crimson" WIDTH="119">3</TD>
|
||||||
<TD PORT="green" BGCOLOR="palegreen" WIDTH="39">1</TD>
|
<TD PORT="green" BGCOLOR="palegreen" WIDTH="39">1</TD>
|
||||||
@ -52,8 +50,6 @@ digraph G {
|
|||||||
<TR>
|
<TR>
|
||||||
<!-- Guard Page Metadata -->
|
<!-- Guard Page Metadata -->
|
||||||
<TD BGCOLOR="darkgrey"> </TD>
|
<TD BGCOLOR="darkgrey"> </TD>
|
||||||
<!-- Bitmaps Offset -->
|
|
||||||
<TD> B? </TD>
|
|
||||||
<!-- Red Slot Span Metadata -->
|
<!-- Red Slot Span Metadata -->
|
||||||
<TD BGCOLOR="crimson">v</TD>
|
<TD BGCOLOR="crimson">v</TD>
|
||||||
<TD BGCOLOR="crimson">+</TD>
|
<TD BGCOLOR="crimson">+</TD>
|
||||||
|
Binary file not shown.
Before Width: | Height: | Size: 20 KiB After Width: | Height: | Size: 18 KiB |
@ -71,4 +71,12 @@ class PA_COMPONENT_EXPORT(PARTITION_ALLOC) MemoryReclaimer {
|
|||||||
|
|
||||||
} // namespace partition_alloc
|
} // namespace partition_alloc
|
||||||
|
|
||||||
|
namespace base {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
using ::partition_alloc::MemoryReclaimer;
|
||||||
|
|
||||||
|
} // namespace base
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_MEMORY_RECLAIMER_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_MEMORY_RECLAIMER_H_
|
||||||
|
@ -329,4 +329,35 @@ PA_COMPONENT_EXPORT(PARTITION_ALLOC) size_t GetTotalMappedSize();
|
|||||||
|
|
||||||
} // namespace partition_alloc
|
} // namespace partition_alloc
|
||||||
|
|
||||||
|
namespace base {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
using ::partition_alloc::AllocPages;
|
||||||
|
using ::partition_alloc::AllocPagesWithAlignOffset;
|
||||||
|
using ::partition_alloc::DecommitAndZeroSystemPages;
|
||||||
|
using ::partition_alloc::DecommitSystemPages;
|
||||||
|
using ::partition_alloc::DecommittedMemoryIsAlwaysZeroed;
|
||||||
|
using ::partition_alloc::DiscardSystemPages;
|
||||||
|
using ::partition_alloc::FreePages;
|
||||||
|
using ::partition_alloc::GetAllocPageErrorCode;
|
||||||
|
using ::partition_alloc::GetTotalMappedSize;
|
||||||
|
using ::partition_alloc::HasReservationForTesting;
|
||||||
|
using ::partition_alloc::NextAlignedWithOffset;
|
||||||
|
using ::partition_alloc::PageAccessibilityConfiguration;
|
||||||
|
using ::partition_alloc::PageAccessibilityDisposition;
|
||||||
|
using ::partition_alloc::PageTag;
|
||||||
|
using ::partition_alloc::RecommitSystemPages;
|
||||||
|
using ::partition_alloc::ReleaseReservation;
|
||||||
|
using ::partition_alloc::ReserveAddressSpace;
|
||||||
|
using ::partition_alloc::RoundDownToPageAllocationGranularity;
|
||||||
|
using ::partition_alloc::RoundDownToSystemPage;
|
||||||
|
using ::partition_alloc::RoundUpToPageAllocationGranularity;
|
||||||
|
using ::partition_alloc::RoundUpToSystemPage;
|
||||||
|
using ::partition_alloc::SetSystemPagesAccess;
|
||||||
|
using ::partition_alloc::TryRecommitSystemPages;
|
||||||
|
using ::partition_alloc::TrySetSystemPagesAccess;
|
||||||
|
|
||||||
|
} // namespace base
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PAGE_ALLOCATOR_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PAGE_ALLOCATOR_H_
|
||||||
|
@ -42,8 +42,8 @@ namespace partition_alloc::internal {
|
|||||||
// Use PageAllocationGranularity(), PageAllocationGranularityShift()
|
// Use PageAllocationGranularity(), PageAllocationGranularityShift()
|
||||||
// to initialize and retrieve these values safely.
|
// to initialize and retrieve these values safely.
|
||||||
struct PageCharacteristics {
|
struct PageCharacteristics {
|
||||||
std::atomic<size_t> size;
|
std::atomic<int> size;
|
||||||
std::atomic<size_t> shift;
|
std::atomic<int> shift;
|
||||||
};
|
};
|
||||||
extern PageCharacteristics page_characteristics;
|
extern PageCharacteristics page_characteristics;
|
||||||
|
|
||||||
@ -78,14 +78,13 @@ PageAllocationGranularityShift() {
|
|||||||
#elif defined(_MIPS_ARCH_LOONGSON)
|
#elif defined(_MIPS_ARCH_LOONGSON)
|
||||||
return 14; // 16kB
|
return 14; // 16kB
|
||||||
#elif BUILDFLAG(IS_APPLE) && defined(ARCH_CPU_64_BITS)
|
#elif BUILDFLAG(IS_APPLE) && defined(ARCH_CPU_64_BITS)
|
||||||
return static_cast<size_t>(vm_page_shift);
|
return vm_page_shift;
|
||||||
#elif BUILDFLAG(IS_LINUX) && defined(ARCH_CPU_ARM64)
|
#elif BUILDFLAG(IS_LINUX) && defined(ARCH_CPU_ARM64)
|
||||||
// arm64 supports 4kb (shift = 12), 16kb (shift = 14), and 64kb (shift = 16)
|
// arm64 supports 4kb (shift = 12), 16kb (shift = 14), and 64kb (shift = 16)
|
||||||
// page sizes. Retrieve from or initialize cache.
|
// page sizes. Retrieve from or initialize cache.
|
||||||
size_t shift = page_characteristics.shift.load(std::memory_order_relaxed);
|
int shift = page_characteristics.shift.load(std::memory_order_relaxed);
|
||||||
if (PA_UNLIKELY(shift == 0)) {
|
if (PA_UNLIKELY(shift == 0)) {
|
||||||
shift = static_cast<size_t>(
|
shift = __builtin_ctz((int)PageAllocationGranularity());
|
||||||
__builtin_ctz((unsigned int)PageAllocationGranularity()));
|
|
||||||
page_characteristics.shift.store(shift, std::memory_order_relaxed);
|
page_characteristics.shift.store(shift, std::memory_order_relaxed);
|
||||||
}
|
}
|
||||||
return shift;
|
return shift;
|
||||||
@ -103,9 +102,9 @@ PageAllocationGranularity() {
|
|||||||
#elif BUILDFLAG(IS_LINUX) && defined(ARCH_CPU_ARM64)
|
#elif BUILDFLAG(IS_LINUX) && defined(ARCH_CPU_ARM64)
|
||||||
// arm64 supports 4kb, 16kb, and 64kb page sizes. Retrieve from or
|
// arm64 supports 4kb, 16kb, and 64kb page sizes. Retrieve from or
|
||||||
// initialize cache.
|
// initialize cache.
|
||||||
size_t size = page_characteristics.size.load(std::memory_order_relaxed);
|
int size = page_characteristics.size.load(std::memory_order_relaxed);
|
||||||
if (PA_UNLIKELY(size == 0)) {
|
if (PA_UNLIKELY(size == 0)) {
|
||||||
size = static_cast<size_t>(getpagesize());
|
size = getpagesize();
|
||||||
page_characteristics.size.store(size, std::memory_order_relaxed);
|
page_characteristics.size.store(size, std::memory_order_relaxed);
|
||||||
}
|
}
|
||||||
return size;
|
return size;
|
||||||
|
@ -17,6 +17,7 @@
|
|||||||
#include "base/allocator/partition_allocator/partition_alloc_check.h"
|
#include "base/allocator/partition_allocator/partition_alloc_check.h"
|
||||||
#include "base/allocator/partition_allocator/partition_alloc_config.h"
|
#include "base/allocator/partition_allocator/partition_alloc_config.h"
|
||||||
#include "base/allocator/partition_allocator/partition_alloc_constants.h"
|
#include "base/allocator/partition_allocator/partition_alloc_constants.h"
|
||||||
|
#include "base/allocator/partition_allocator/tagging.h"
|
||||||
#include "build/build_config.h"
|
#include "build/build_config.h"
|
||||||
|
|
||||||
#if BUILDFLAG(IS_IOS)
|
#if BUILDFLAG(IS_IOS)
|
||||||
@ -136,7 +137,7 @@ void PartitionAddressSpace::Init() {
|
|||||||
if (!setup_.regular_pool_base_address_)
|
if (!setup_.regular_pool_base_address_)
|
||||||
HandleGigaCageAllocFailure();
|
HandleGigaCageAllocFailure();
|
||||||
#if defined(PA_USE_DYNAMICALLY_SIZED_GIGA_CAGE)
|
#if defined(PA_USE_DYNAMICALLY_SIZED_GIGA_CAGE)
|
||||||
setup_.regular_pool_base_mask_ = ~(regular_pool_size - 1);
|
setup_.regular_pool_base_mask_ = ~(regular_pool_size - 1) & kMemTagUnmask;
|
||||||
#endif
|
#endif
|
||||||
PA_DCHECK(!(setup_.regular_pool_base_address_ & (regular_pool_size - 1)));
|
PA_DCHECK(!(setup_.regular_pool_base_address_ & (regular_pool_size - 1)));
|
||||||
setup_.regular_pool_ = AddressPoolManager::GetInstance().Add(
|
setup_.regular_pool_ = AddressPoolManager::GetInstance().Add(
|
||||||
@ -163,7 +164,7 @@ void PartitionAddressSpace::Init() {
|
|||||||
HandleGigaCageAllocFailure();
|
HandleGigaCageAllocFailure();
|
||||||
setup_.brp_pool_base_address_ = base_address + kForbiddenZoneSize;
|
setup_.brp_pool_base_address_ = base_address + kForbiddenZoneSize;
|
||||||
#if defined(PA_USE_DYNAMICALLY_SIZED_GIGA_CAGE)
|
#if defined(PA_USE_DYNAMICALLY_SIZED_GIGA_CAGE)
|
||||||
setup_.brp_pool_base_mask_ = ~(brp_pool_size - 1);
|
setup_.brp_pool_base_mask_ = ~(brp_pool_size - 1) & kMemTagUnmask;
|
||||||
#endif
|
#endif
|
||||||
PA_DCHECK(!(setup_.brp_pool_base_address_ & (brp_pool_size - 1)));
|
PA_DCHECK(!(setup_.brp_pool_base_address_ & (brp_pool_size - 1)));
|
||||||
setup_.brp_pool_ = AddressPoolManager::GetInstance().Add(
|
setup_.brp_pool_ = AddressPoolManager::GetInstance().Add(
|
||||||
|
@ -61,6 +61,7 @@ class PA_COMPONENT_EXPORT(PARTITION_ALLOC) PartitionAddressSpace {
|
|||||||
|
|
||||||
static PA_ALWAYS_INLINE std::pair<pool_handle, uintptr_t> GetPoolAndOffset(
|
static PA_ALWAYS_INLINE std::pair<pool_handle, uintptr_t> GetPoolAndOffset(
|
||||||
uintptr_t address) {
|
uintptr_t address) {
|
||||||
|
address = ::partition_alloc::internal::UnmaskPtr(address);
|
||||||
// When USE_BACKUP_REF_PTR is off, BRP pool isn't used.
|
// When USE_BACKUP_REF_PTR is off, BRP pool isn't used.
|
||||||
#if !BUILDFLAG(USE_BACKUP_REF_PTR)
|
#if !BUILDFLAG(USE_BACKUP_REF_PTR)
|
||||||
PA_DCHECK(!IsInBRPPool(address));
|
PA_DCHECK(!IsInBRPPool(address));
|
||||||
@ -154,7 +155,8 @@ class PA_COMPONENT_EXPORT(PARTITION_ALLOC) PartitionAddressSpace {
|
|||||||
|
|
||||||
static PA_ALWAYS_INLINE uintptr_t OffsetInBRPPool(uintptr_t address) {
|
static PA_ALWAYS_INLINE uintptr_t OffsetInBRPPool(uintptr_t address) {
|
||||||
PA_DCHECK(IsInBRPPool(address));
|
PA_DCHECK(IsInBRPPool(address));
|
||||||
return address - setup_.brp_pool_base_address_;
|
return ::partition_alloc::internal::UnmaskPtr(address) -
|
||||||
|
setup_.brp_pool_base_address_;
|
||||||
}
|
}
|
||||||
|
|
||||||
// PartitionAddressSpace is static_only class.
|
// PartitionAddressSpace is static_only class.
|
||||||
@ -225,12 +227,19 @@ class PA_COMPONENT_EXPORT(PARTITION_ALLOC) PartitionAddressSpace {
|
|||||||
|
|
||||||
#if !defined(PA_USE_DYNAMICALLY_SIZED_GIGA_CAGE)
|
#if !defined(PA_USE_DYNAMICALLY_SIZED_GIGA_CAGE)
|
||||||
// Masks used to easy determine belonging to a pool.
|
// Masks used to easy determine belonging to a pool.
|
||||||
|
// On Arm, the top byte of each pointer is ignored (meaning there are
|
||||||
|
// effectively 256 versions of each valid pointer). 4 bits are used to store
|
||||||
|
// tags for Arm's Memory Tagging Extension (MTE). To ensure that tagged
|
||||||
|
// pointers are recognized as being in the pool, mask off the top byte with
|
||||||
|
// kMemTagUnmask.
|
||||||
static constexpr uintptr_t kRegularPoolOffsetMask =
|
static constexpr uintptr_t kRegularPoolOffsetMask =
|
||||||
static_cast<uintptr_t>(kRegularPoolSize) - 1;
|
static_cast<uintptr_t>(kRegularPoolSize) - 1;
|
||||||
static constexpr uintptr_t kRegularPoolBaseMask = ~kRegularPoolOffsetMask;
|
static constexpr uintptr_t kRegularPoolBaseMask =
|
||||||
|
~kRegularPoolOffsetMask & kMemTagUnmask;
|
||||||
static constexpr uintptr_t kBRPPoolOffsetMask =
|
static constexpr uintptr_t kBRPPoolOffsetMask =
|
||||||
static_cast<uintptr_t>(kBRPPoolSize) - 1;
|
static_cast<uintptr_t>(kBRPPoolSize) - 1;
|
||||||
static constexpr uintptr_t kBRPPoolBaseMask = ~kBRPPoolOffsetMask;
|
static constexpr uintptr_t kBRPPoolBaseMask =
|
||||||
|
~kBRPPoolOffsetMask & kMemTagUnmask;
|
||||||
#endif // !defined(PA_USE_DYNAMICALLY_SIZED_GIGA_CAGE)
|
#endif // !defined(PA_USE_DYNAMICALLY_SIZED_GIGA_CAGE)
|
||||||
|
|
||||||
// This must be set to such a value that IsIn*Pool() always returns false when
|
// This must be set to such a value that IsIn*Pool() always returns false when
|
||||||
|
@ -12,7 +12,6 @@
|
|||||||
#include "base/allocator/partition_allocator/partition_alloc_base/debug/debugging_buildflags.h"
|
#include "base/allocator/partition_allocator/partition_alloc_base/debug/debugging_buildflags.h"
|
||||||
#include "base/allocator/partition_allocator/partition_ref_count.h"
|
#include "base/allocator/partition_allocator/partition_ref_count.h"
|
||||||
#include "base/allocator/partition_allocator/random.h"
|
#include "base/allocator/partition_allocator/random.h"
|
||||||
#include "base/allocator/partition_allocator/tagging.h"
|
|
||||||
#include "build/build_config.h"
|
#include "build/build_config.h"
|
||||||
|
|
||||||
// Prefetch *x into memory.
|
// Prefetch *x into memory.
|
||||||
@ -54,7 +53,7 @@ PA_ALWAYS_INLINE bool RandomPeriod() {
|
|||||||
static thread_local uint8_t counter = 0;
|
static thread_local uint8_t counter = 0;
|
||||||
if (PA_UNLIKELY(counter == 0)) {
|
if (PA_UNLIKELY(counter == 0)) {
|
||||||
// It's OK to truncate this value.
|
// It's OK to truncate this value.
|
||||||
counter = static_cast<uint8_t>(RandomValue());
|
counter = static_cast<uint8_t>(::partition_alloc::internal::RandomValue());
|
||||||
}
|
}
|
||||||
// If `counter` is 0, this will wrap. That is intentional and OK.
|
// If `counter` is 0, this will wrap. That is intentional and OK.
|
||||||
counter--;
|
counter--;
|
||||||
@ -62,22 +61,17 @@ PA_ALWAYS_INLINE bool RandomPeriod() {
|
|||||||
}
|
}
|
||||||
#endif // !BUILDFLAG(PA_DCHECK_IS_ON)
|
#endif // !BUILDFLAG(PA_DCHECK_IS_ON)
|
||||||
|
|
||||||
PA_ALWAYS_INLINE uintptr_t ObjectInnerPtr2Addr(const void* ptr) {
|
|
||||||
return UntagPtr(ptr);
|
|
||||||
}
|
|
||||||
PA_ALWAYS_INLINE uintptr_t ObjectPtr2Addr(const void* object) {
|
|
||||||
// TODO(bartekn): Check that |object| is indeed an object start.
|
|
||||||
return ObjectInnerPtr2Addr(object);
|
|
||||||
}
|
|
||||||
PA_ALWAYS_INLINE void* SlotStartAddr2Ptr(uintptr_t slot_start) {
|
|
||||||
// TODO(bartekn): Check that |slot_start| is indeed a slot start.
|
|
||||||
return TagAddr(slot_start);
|
|
||||||
}
|
|
||||||
PA_ALWAYS_INLINE uintptr_t SlotStartPtr2Addr(const void* slot_start) {
|
|
||||||
// TODO(bartekn): Check that |slot_start| is indeed a slot start.
|
|
||||||
return UntagPtr(slot_start);
|
|
||||||
}
|
|
||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
using ::partition_alloc::internal::SecureMemset;
|
||||||
|
#if !BUILDFLAG(PA_DCHECK_IS_ON)
|
||||||
|
using ::partition_alloc::internal::RandomPeriod;
|
||||||
|
#endif // !BUILDFLAG(PA_DCHECK_IS_ON)
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_ALLOC_INL_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_ALLOC_INL_H_
|
||||||
|
@ -70,29 +70,6 @@ void PartitionAllocGlobalInit(OomFunction on_out_of_memory) {
|
|||||||
internal::MaxSystemPagesPerRegularSlotSpan() <= 16,
|
internal::MaxSystemPagesPerRegularSlotSpan() <= 16,
|
||||||
"System pages per slot span must be no greater than 16.");
|
"System pages per slot span must be no greater than 16.");
|
||||||
|
|
||||||
#if BUILDFLAG(PUT_REF_COUNT_IN_PREVIOUS_SLOT)
|
|
||||||
STATIC_ASSERT_OR_PA_CHECK(
|
|
||||||
internal::GetPartitionRefCountIndexMultiplierShift() <
|
|
||||||
std::numeric_limits<size_t>::max() / 2,
|
|
||||||
"Calculation in GetPartitionRefCountIndexMultiplierShift() must not "
|
|
||||||
"underflow.");
|
|
||||||
// Check that the GetPartitionRefCountIndexMultiplierShift() calculation is
|
|
||||||
// correct.
|
|
||||||
STATIC_ASSERT_OR_PA_CHECK(
|
|
||||||
(1 << internal::GetPartitionRefCountIndexMultiplierShift()) ==
|
|
||||||
(internal::SystemPageSize() /
|
|
||||||
(sizeof(internal::PartitionRefCount) *
|
|
||||||
(internal::kSuperPageSize / internal::SystemPageSize()))),
|
|
||||||
"Bitshift must match the intended multiplication.");
|
|
||||||
STATIC_ASSERT_OR_PA_CHECK(
|
|
||||||
((sizeof(internal::PartitionRefCount) *
|
|
||||||
(internal::kSuperPageSize / internal::SystemPageSize()))
|
|
||||||
<< internal::GetPartitionRefCountIndexMultiplierShift()) <=
|
|
||||||
internal::SystemPageSize(),
|
|
||||||
"PartitionRefCount Bitmap size must be smaller than or equal to "
|
|
||||||
"<= SystemPageSize().");
|
|
||||||
#endif // BUILDFLAG(PUT_REF_COUNT_IN_PREVIOUS_SLOT)
|
|
||||||
|
|
||||||
PA_DCHECK(on_out_of_memory);
|
PA_DCHECK(on_out_of_memory);
|
||||||
internal::g_oom_handling_function = on_out_of_memory;
|
internal::g_oom_handling_function = on_out_of_memory;
|
||||||
}
|
}
|
||||||
|
@ -11,36 +11,6 @@
|
|||||||
#include "base/allocator/partition_allocator/partition_oom.h"
|
#include "base/allocator/partition_allocator/partition_oom.h"
|
||||||
#include "base/allocator/partition_allocator/partition_root.h"
|
#include "base/allocator/partition_allocator/partition_root.h"
|
||||||
|
|
||||||
// *** HOUSEKEEPING RULES ***
|
|
||||||
//
|
|
||||||
// Throughout PartitionAlloc code, we avoid using generic variable names like
|
|
||||||
// |ptr| or |address|, and prefer names like |object|, |slot_start|, instead.
|
|
||||||
// This helps emphasize that terms like "object" and "slot" represent two
|
|
||||||
// different worlds. "Slot" is an indivisible allocation unit, internal to
|
|
||||||
// PartitionAlloc. It is generally represented as an address (uintptr_t), since
|
|
||||||
// arithmetic operations on it aren't uncommon, and for that reason it isn't
|
|
||||||
// MTE-tagged either. "Object" is the allocated memory that the app is given via
|
|
||||||
// interfaces like Alloc(), Free(), etc. An object is fully contained within a
|
|
||||||
// slot, and may be surrounded by internal PartitionAlloc structures or empty
|
|
||||||
// space. Is is generally represented as a pointer to its beginning (most
|
|
||||||
// commonly void*), and is MTE-tagged so it's safe to access.
|
|
||||||
//
|
|
||||||
// The best way to transition between these to worlds is via
|
|
||||||
// PartitionRoot::ObjectToSlotStart() and ::SlotStartToObject(). These take care
|
|
||||||
// of shifting between slot/object start, MTE-tagging/untagging and the cast for
|
|
||||||
// you. There are cases where these functions are insufficient. Internal
|
|
||||||
// PartitionAlloc structures, like free-list pointers, BRP ref-count, cookie,
|
|
||||||
// etc. are located in-slot thus accessing them requires an MTE tag.
|
|
||||||
// SlotStartPtr2Addr() and SlotStartAddr2Ptr() take care of this.
|
|
||||||
// There are cases where we have to do pointer arithmetic on an object pointer
|
|
||||||
// (like check belonging to a pool, etc.), in which case we want to strip MTE
|
|
||||||
// tag. ObjectInnerPtr2Addr() and ObjectPtr2Addr() take care of that.
|
|
||||||
//
|
|
||||||
// Avoid using UntagPtr/Addr() and TagPtr/Addr() directly, if possible. And
|
|
||||||
// definitely avoid using reinterpret_cast between uintptr_t and pointer worlds.
|
|
||||||
// When you do, add a comment explaining why it's safe from the point of MTE
|
|
||||||
// tagging.
|
|
||||||
|
|
||||||
namespace partition_alloc {
|
namespace partition_alloc {
|
||||||
|
|
||||||
PA_COMPONENT_EXPORT(PARTITION_ALLOC)
|
PA_COMPONENT_EXPORT(PARTITION_ALLOC)
|
||||||
@ -73,4 +43,14 @@ using PartitionAllocator = internal::PartitionAllocator<internal::ThreadSafe>;
|
|||||||
|
|
||||||
} // namespace partition_alloc
|
} // namespace partition_alloc
|
||||||
|
|
||||||
|
namespace base {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
using ::partition_alloc::PartitionAllocator;
|
||||||
|
using ::partition_alloc::PartitionAllocGlobalInit;
|
||||||
|
using ::partition_alloc::PartitionAllocGlobalUninitForTesting;
|
||||||
|
|
||||||
|
} // namespace base
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_ALLOC_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_ALLOC_H_
|
||||||
|
@ -17,6 +17,10 @@
|
|||||||
#include "base/allocator/partition_allocator/partition_alloc_check.h"
|
#include "base/allocator/partition_allocator/partition_alloc_check.h"
|
||||||
#include "build/build_config.h"
|
#include "build/build_config.h"
|
||||||
|
|
||||||
|
#if defined(COMPILER_MSVC)
|
||||||
|
#include <intrin.h>
|
||||||
|
#endif
|
||||||
|
|
||||||
namespace partition_alloc::internal::base::bits {
|
namespace partition_alloc::internal::base::bits {
|
||||||
|
|
||||||
// Returns true iff |value| is a power of 2.
|
// Returns true iff |value| is a power of 2.
|
||||||
@ -71,6 +75,85 @@ inline T* AlignUp(T* ptr, size_t alignment) {
|
|||||||
//
|
//
|
||||||
// C does not have an operator to do this, but fortunately the various
|
// C does not have an operator to do this, but fortunately the various
|
||||||
// compilers have built-ins that map to fast underlying processor instructions.
|
// compilers have built-ins that map to fast underlying processor instructions.
|
||||||
|
//
|
||||||
|
// Prefer the clang path on Windows, as _BitScanReverse() and friends are not
|
||||||
|
// constexpr.
|
||||||
|
#if defined(COMPILER_MSVC) && !defined(__clang__)
|
||||||
|
|
||||||
|
template <typename T, int bits = sizeof(T) * 8>
|
||||||
|
PA_ALWAYS_INLINE
|
||||||
|
typename std::enable_if<std::is_unsigned<T>::value && sizeof(T) <= 4,
|
||||||
|
int>::type
|
||||||
|
CountLeadingZeroBits(T x) {
|
||||||
|
static_assert(bits > 0, "invalid instantiation");
|
||||||
|
unsigned long index;
|
||||||
|
return PA_LIKELY(_BitScanReverse(&index, static_cast<uint32_t>(x)))
|
||||||
|
? (31 - index - (32 - bits))
|
||||||
|
: bits;
|
||||||
|
}
|
||||||
|
|
||||||
|
template <typename T, int bits = sizeof(T) * 8>
|
||||||
|
PA_ALWAYS_INLINE
|
||||||
|
typename std::enable_if<std::is_unsigned<T>::value && sizeof(T) == 8,
|
||||||
|
int>::type
|
||||||
|
CountLeadingZeroBits(T x) {
|
||||||
|
static_assert(bits > 0, "invalid instantiation");
|
||||||
|
unsigned long index;
|
||||||
|
// MSVC only supplies _BitScanReverse64 when building for a 64-bit target.
|
||||||
|
#if defined(ARCH_CPU_64_BITS)
|
||||||
|
return PA_LIKELY(_BitScanReverse64(&index, static_cast<uint64_t>(x)))
|
||||||
|
? (63 - index)
|
||||||
|
: 64;
|
||||||
|
#else
|
||||||
|
uint32_t left = static_cast<uint32_t>(x >> 32);
|
||||||
|
if (PA_LIKELY(_BitScanReverse(&index, left)))
|
||||||
|
return 31 - index;
|
||||||
|
|
||||||
|
uint32_t right = static_cast<uint32_t>(x);
|
||||||
|
if (PA_LIKELY(_BitScanReverse(&index, right)))
|
||||||
|
return 63 - index;
|
||||||
|
|
||||||
|
return 64;
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
template <typename T, int bits = sizeof(T) * 8>
|
||||||
|
PA_ALWAYS_INLINE
|
||||||
|
typename std::enable_if<std::is_unsigned<T>::value && sizeof(T) <= 4,
|
||||||
|
int>::type
|
||||||
|
CountTrailingZeroBits(T x) {
|
||||||
|
static_assert(bits > 0, "invalid instantiation");
|
||||||
|
unsigned long index;
|
||||||
|
return PA_LIKELY(_BitScanForward(&index, static_cast<uint32_t>(x))) ? index
|
||||||
|
: bits;
|
||||||
|
}
|
||||||
|
|
||||||
|
template <typename T, int bits = sizeof(T) * 8>
|
||||||
|
PA_ALWAYS_INLINE
|
||||||
|
typename std::enable_if<std::is_unsigned<T>::value && sizeof(T) == 8,
|
||||||
|
int>::type
|
||||||
|
CountTrailingZeroBits(T x) {
|
||||||
|
static_assert(bits > 0, "invalid instantiation");
|
||||||
|
unsigned long index;
|
||||||
|
// MSVC only supplies _BitScanForward64 when building for a 64-bit target.
|
||||||
|
#if defined(ARCH_CPU_64_BITS)
|
||||||
|
return PA_LIKELY(_BitScanForward64(&index, static_cast<uint64_t>(x))) ? index
|
||||||
|
: 64;
|
||||||
|
#else
|
||||||
|
uint32_t right = static_cast<uint32_t>(x);
|
||||||
|
if (PA_LIKELY(_BitScanForward(&index, right)))
|
||||||
|
return index;
|
||||||
|
|
||||||
|
uint32_t left = static_cast<uint32_t>(x >> 32);
|
||||||
|
if (PA_LIKELY(_BitScanForward(&index, left)))
|
||||||
|
return 32 + index;
|
||||||
|
|
||||||
|
return 64;
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
#elif defined(COMPILER_GCC) || defined(__clang__)
|
||||||
|
|
||||||
// __builtin_clz has undefined behaviour for an input of 0, even though there's
|
// __builtin_clz has undefined behaviour for an input of 0, even though there's
|
||||||
// clearly a return value that makes sense, and even though some processor clz
|
// clearly a return value that makes sense, and even though some processor clz
|
||||||
// instructions have defined behaviour for 0. We could drop to raw __asm__ to
|
// instructions have defined behaviour for 0. We could drop to raw __asm__ to
|
||||||
@ -99,6 +182,8 @@ PA_ALWAYS_INLINE constexpr
|
|||||||
: bits;
|
: bits;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#endif
|
||||||
|
|
||||||
// Returns the integer i such as 2^i <= n < 2^(i+1).
|
// Returns the integer i such as 2^i <= n < 2^(i+1).
|
||||||
//
|
//
|
||||||
// There is a common `BitLength` function, which returns the number of bits
|
// There is a common `BitLength` function, which returns the number of bits
|
||||||
|
@ -10,7 +10,7 @@
|
|||||||
// on build time. Try not to raise this limit unless necessary. See
|
// on build time. Try not to raise this limit unless necessary. See
|
||||||
// https://chromium.googlesource.com/chromium/src/+/HEAD/docs/wmax_tokens.md
|
// https://chromium.googlesource.com/chromium/src/+/HEAD/docs/wmax_tokens.md
|
||||||
#ifndef NACL_TC_REV
|
#ifndef NACL_TC_REV
|
||||||
#pragma clang max_tokens_here 370000
|
#pragma clang max_tokens_here 340000
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
|
@ -9,6 +9,12 @@ namespace base {
|
|||||||
|
|
||||||
class LapTimer;
|
class LapTimer;
|
||||||
|
|
||||||
|
template <typename Type, typename Traits>
|
||||||
|
class LazyInstance;
|
||||||
|
|
||||||
|
template <typename Type>
|
||||||
|
struct LazyInstanceTraitsBase;
|
||||||
|
|
||||||
} // namespace base
|
} // namespace base
|
||||||
|
|
||||||
namespace partition_alloc::internal::base {
|
namespace partition_alloc::internal::base {
|
||||||
@ -16,6 +22,8 @@ namespace partition_alloc::internal::base {
|
|||||||
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
// the migration to the new namespaces gets done.
|
// the migration to the new namespaces gets done.
|
||||||
using ::base::LapTimer;
|
using ::base::LapTimer;
|
||||||
|
using ::base::LazyInstance;
|
||||||
|
using ::base::LazyInstanceTraitsBase;
|
||||||
|
|
||||||
} // namespace partition_alloc::internal::base
|
} // namespace partition_alloc::internal::base
|
||||||
|
|
||||||
|
@ -23,7 +23,7 @@
|
|||||||
namespace partition_alloc::internal::base {
|
namespace partition_alloc::internal::base {
|
||||||
|
|
||||||
// Returns a value with all bytes in |x| swapped, i.e. reverses the endianness.
|
// Returns a value with all bytes in |x| swapped, i.e. reverses the endianness.
|
||||||
inline constexpr uint16_t ByteSwap(uint16_t x) {
|
inline uint16_t ByteSwap(uint16_t x) {
|
||||||
#if defined(COMPILER_MSVC) && !defined(__clang__)
|
#if defined(COMPILER_MSVC) && !defined(__clang__)
|
||||||
return _byteswap_ushort(x);
|
return _byteswap_ushort(x);
|
||||||
#else
|
#else
|
||||||
@ -31,7 +31,7 @@ inline constexpr uint16_t ByteSwap(uint16_t x) {
|
|||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
inline constexpr uint32_t ByteSwap(uint32_t x) {
|
inline uint32_t ByteSwap(uint32_t x) {
|
||||||
#if defined(COMPILER_MSVC) && !defined(__clang__)
|
#if defined(COMPILER_MSVC) && !defined(__clang__)
|
||||||
return _byteswap_ulong(x);
|
return _byteswap_ulong(x);
|
||||||
#else
|
#else
|
||||||
@ -69,21 +69,21 @@ inline constexpr uintptr_t ByteSwapUintPtrT(uintptr_t x) {
|
|||||||
|
|
||||||
// Converts the bytes in |x| from host order (endianness) to little endian, and
|
// Converts the bytes in |x| from host order (endianness) to little endian, and
|
||||||
// returns the result.
|
// returns the result.
|
||||||
inline constexpr uint16_t ByteSwapToLE16(uint16_t x) {
|
inline uint16_t ByteSwapToLE16(uint16_t x) {
|
||||||
#if defined(ARCH_CPU_LITTLE_ENDIAN)
|
#if defined(ARCH_CPU_LITTLE_ENDIAN)
|
||||||
return x;
|
return x;
|
||||||
#else
|
#else
|
||||||
return ByteSwap(x);
|
return ByteSwap(x);
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
inline constexpr uint32_t ByteSwapToLE32(uint32_t x) {
|
inline uint32_t ByteSwapToLE32(uint32_t x) {
|
||||||
#if defined(ARCH_CPU_LITTLE_ENDIAN)
|
#if defined(ARCH_CPU_LITTLE_ENDIAN)
|
||||||
return x;
|
return x;
|
||||||
#else
|
#else
|
||||||
return ByteSwap(x);
|
return ByteSwap(x);
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
inline constexpr uint64_t ByteSwapToLE64(uint64_t x) {
|
inline uint64_t ByteSwapToLE64(uint64_t x) {
|
||||||
#if defined(ARCH_CPU_LITTLE_ENDIAN)
|
#if defined(ARCH_CPU_LITTLE_ENDIAN)
|
||||||
return x;
|
return x;
|
||||||
#else
|
#else
|
||||||
@ -93,21 +93,21 @@ inline constexpr uint64_t ByteSwapToLE64(uint64_t x) {
|
|||||||
|
|
||||||
// Converts the bytes in |x| from network to host order (endianness), and
|
// Converts the bytes in |x| from network to host order (endianness), and
|
||||||
// returns the result.
|
// returns the result.
|
||||||
inline constexpr uint16_t NetToHost16(uint16_t x) {
|
inline uint16_t NetToHost16(uint16_t x) {
|
||||||
#if defined(ARCH_CPU_LITTLE_ENDIAN)
|
#if defined(ARCH_CPU_LITTLE_ENDIAN)
|
||||||
return ByteSwap(x);
|
return ByteSwap(x);
|
||||||
#else
|
#else
|
||||||
return x;
|
return x;
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
inline constexpr uint32_t NetToHost32(uint32_t x) {
|
inline uint32_t NetToHost32(uint32_t x) {
|
||||||
#if defined(ARCH_CPU_LITTLE_ENDIAN)
|
#if defined(ARCH_CPU_LITTLE_ENDIAN)
|
||||||
return ByteSwap(x);
|
return ByteSwap(x);
|
||||||
#else
|
#else
|
||||||
return x;
|
return x;
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
inline constexpr uint64_t NetToHost64(uint64_t x) {
|
inline uint64_t NetToHost64(uint64_t x) {
|
||||||
#if defined(ARCH_CPU_LITTLE_ENDIAN)
|
#if defined(ARCH_CPU_LITTLE_ENDIAN)
|
||||||
return ByteSwap(x);
|
return ByteSwap(x);
|
||||||
#else
|
#else
|
||||||
@ -117,21 +117,21 @@ inline constexpr uint64_t NetToHost64(uint64_t x) {
|
|||||||
|
|
||||||
// Converts the bytes in |x| from host to network order (endianness), and
|
// Converts the bytes in |x| from host to network order (endianness), and
|
||||||
// returns the result.
|
// returns the result.
|
||||||
inline constexpr uint16_t HostToNet16(uint16_t x) {
|
inline uint16_t HostToNet16(uint16_t x) {
|
||||||
#if defined(ARCH_CPU_LITTLE_ENDIAN)
|
#if defined(ARCH_CPU_LITTLE_ENDIAN)
|
||||||
return ByteSwap(x);
|
return ByteSwap(x);
|
||||||
#else
|
#else
|
||||||
return x;
|
return x;
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
inline constexpr uint32_t HostToNet32(uint32_t x) {
|
inline uint32_t HostToNet32(uint32_t x) {
|
||||||
#if defined(ARCH_CPU_LITTLE_ENDIAN)
|
#if defined(ARCH_CPU_LITTLE_ENDIAN)
|
||||||
return ByteSwap(x);
|
return ByteSwap(x);
|
||||||
#else
|
#else
|
||||||
return x;
|
return x;
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
inline constexpr uint64_t HostToNet64(uint64_t x) {
|
inline uint64_t HostToNet64(uint64_t x) {
|
||||||
#if defined(ARCH_CPU_LITTLE_ENDIAN)
|
#if defined(ARCH_CPU_LITTLE_ENDIAN)
|
||||||
return ByteSwap(x);
|
return ByteSwap(x);
|
||||||
#else
|
#else
|
||||||
|
@ -12,7 +12,6 @@
|
|||||||
#include <sys/time.h>
|
#include <sys/time.h>
|
||||||
#include <sys/types.h>
|
#include <sys/types.h>
|
||||||
#include <unistd.h>
|
#include <unistd.h>
|
||||||
#include <memory>
|
|
||||||
|
|
||||||
#include "base/allocator/partition_allocator/partition_alloc_base/logging.h"
|
#include "base/allocator/partition_allocator/partition_alloc_base/logging.h"
|
||||||
#include "base/allocator/partition_allocator/partition_alloc_base/threading/platform_thread_internal_posix.h"
|
#include "base/allocator/partition_allocator/partition_alloc_base/threading/platform_thread_internal_posix.h"
|
||||||
|
@ -10,7 +10,7 @@
|
|||||||
// time.h is a widely included header and its size impacts build time.
|
// time.h is a widely included header and its size impacts build time.
|
||||||
// Try not to raise this limit unless necessary. See
|
// Try not to raise this limit unless necessary. See
|
||||||
// https://chromium.googlesource.com/chromium/src/+/HEAD/docs/wmax_tokens.md
|
// https://chromium.googlesource.com/chromium/src/+/HEAD/docs/wmax_tokens.md
|
||||||
#pragma clang max_tokens_here 490000
|
#pragma clang max_tokens_here 390000
|
||||||
#endif // BUILDFLAG(IS_LINUX)
|
#endif // BUILDFLAG(IS_LINUX)
|
||||||
|
|
||||||
#include <atomic>
|
#include <atomic>
|
||||||
|
@ -327,7 +327,7 @@ DWORD (*g_tick_function)(void) = &timeGetTimeWrapper;
|
|||||||
// "rollover" counter.
|
// "rollover" counter.
|
||||||
union LastTimeAndRolloversState {
|
union LastTimeAndRolloversState {
|
||||||
// The state as a single 32-bit opaque value.
|
// The state as a single 32-bit opaque value.
|
||||||
std::atomic<int32_t> as_opaque_32{0};
|
std::atomic<int32_t> as_opaque_32;
|
||||||
|
|
||||||
// The state as usable values.
|
// The state as usable values.
|
||||||
struct {
|
struct {
|
||||||
|
@ -27,30 +27,35 @@ namespace partition_alloc {
|
|||||||
// Bit flag constants used as `flag` argument of PartitionRoot::AllocWithFlags,
|
// Bit flag constants used as `flag` argument of PartitionRoot::AllocWithFlags,
|
||||||
// AlignedAllocWithFlags, etc.
|
// AlignedAllocWithFlags, etc.
|
||||||
struct AllocFlags {
|
struct AllocFlags {
|
||||||
static constexpr unsigned int kReturnNull = 1 << 0;
|
// In order to support bit operations like `flag_a | flag_b`, the old-
|
||||||
static constexpr unsigned int kZeroFill = 1 << 1;
|
// fashioned enum (+ surrounding named struct) is used instead of enum class.
|
||||||
|
enum : unsigned int {
|
||||||
|
kReturnNull = 1 << 0,
|
||||||
|
kZeroFill = 1 << 1,
|
||||||
// Don't allow allocation override hooks. Override hooks are expected to
|
// Don't allow allocation override hooks. Override hooks are expected to
|
||||||
// check for the presence of this flag and return false if it is active.
|
// check for the presence of this flag and return false if it is active.
|
||||||
static constexpr unsigned int kNoOverrideHooks = 1 << 2;
|
kNoOverrideHooks = 1 << 2,
|
||||||
// Never let a memory tool like ASan (if active) perform the allocation.
|
// Never let a memory tool like ASan (if active) perform the allocation.
|
||||||
static constexpr unsigned int kNoMemoryToolOverride = 1 << 3;
|
kNoMemoryToolOverride = 1 << 3,
|
||||||
// Don't allow any hooks (override or observers).
|
// Don't allow any hooks (override or observers).
|
||||||
static constexpr unsigned int kNoHooks = 1 << 4; // Internal.
|
kNoHooks = 1 << 4, // Internal only.
|
||||||
// If the allocation requires a "slow path" (such as allocating/committing a
|
// If the allocation requires a "slow path" (such as allocating/committing a
|
||||||
// new slot span), return nullptr instead. Note this makes all large
|
// new slot span), return nullptr instead. Note this makes all large
|
||||||
// allocations return nullptr, such as direct-mapped ones, and even for
|
// allocations return nullptr, such as direct-mapped ones, and even for
|
||||||
// smaller ones, a nullptr value is common.
|
// smaller ones, a nullptr value is common.
|
||||||
static constexpr unsigned int kFastPathOrReturnNull = 1 << 5; // Internal.
|
kFastPathOrReturnNull = 1 << 5, // Internal only.
|
||||||
|
|
||||||
static constexpr unsigned int kLastFlag = kFastPathOrReturnNull;
|
kLastFlag = kFastPathOrReturnNull
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
// Bit flag constants used as `flag` argument of PartitionRoot::FreeWithFlags.
|
// Bit flag constants used as `flag` argument of PartitionRoot::FreeWithFlags.
|
||||||
struct FreeFlags {
|
struct FreeFlags {
|
||||||
// See AllocFlags::kNoMemoryToolOverride.
|
enum : unsigned int {
|
||||||
static constexpr unsigned int kNoMemoryToolOverride = 1 << 0;
|
kNoMemoryToolOverride = 1 << 0, // See AllocFlags::kNoMemoryToolOverride.
|
||||||
|
|
||||||
static constexpr unsigned int kLastFlag = kNoMemoryToolOverride;
|
kLastFlag = kNoMemoryToolOverride
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
namespace internal {
|
namespace internal {
|
||||||
@ -240,7 +245,7 @@ constexpr size_t kSuperPageShift = 21; // 2 MiB
|
|||||||
constexpr size_t kSuperPageSize = 1 << kSuperPageShift;
|
constexpr size_t kSuperPageSize = 1 << kSuperPageShift;
|
||||||
constexpr size_t kSuperPageAlignment = kSuperPageSize;
|
constexpr size_t kSuperPageAlignment = kSuperPageSize;
|
||||||
constexpr size_t kSuperPageOffsetMask = kSuperPageAlignment - 1;
|
constexpr size_t kSuperPageOffsetMask = kSuperPageAlignment - 1;
|
||||||
constexpr size_t kSuperPageBaseMask = ~kSuperPageOffsetMask;
|
constexpr size_t kSuperPageBaseMask = ~kSuperPageOffsetMask & kMemTagUnmask;
|
||||||
|
|
||||||
// GigaCage is split into two pools, one which supports BackupRefPtr (BRP) and
|
// GigaCage is split into two pools, one which supports BackupRefPtr (BRP) and
|
||||||
// one that doesn't.
|
// one that doesn't.
|
||||||
@ -278,14 +283,14 @@ static constexpr pool_handle kConfigurablePoolHandle = 3;
|
|||||||
constexpr size_t kMaxMemoryTaggingSize = 1024;
|
constexpr size_t kMaxMemoryTaggingSize = 1024;
|
||||||
|
|
||||||
#if defined(PA_HAS_MEMORY_TAGGING)
|
#if defined(PA_HAS_MEMORY_TAGGING)
|
||||||
// Returns whether the tag of |object| overflowed, meaning the containing slot
|
// Returns whether the tag of |object| overflowed and the containing slot needs
|
||||||
// needs to be moved to quarantine.
|
// to be moved to quarantine.
|
||||||
PA_ALWAYS_INLINE bool HasOverflowTag(void* object) {
|
PA_ALWAYS_INLINE bool HasOverflowTag(void* object) {
|
||||||
// The tag with which the slot is put to quarantine.
|
// The tag with which the slot is put to quarantine.
|
||||||
constexpr uintptr_t kOverflowTag = 0x0f00000000000000uLL;
|
constexpr uintptr_t kOverflowTag = 0x0f00000000000000uLL;
|
||||||
static_assert((kOverflowTag & kPtrTagMask) != 0,
|
static_assert((kOverflowTag & ~kMemTagUnmask) != 0,
|
||||||
"Overflow tag must be in tag bits");
|
"Overflow tag must be in tag bits");
|
||||||
return (reinterpret_cast<uintptr_t>(object) & kPtrTagMask) == kOverflowTag;
|
return (reinterpret_cast<uintptr_t>(object) & ~kMemTagUnmask) == kOverflowTag;
|
||||||
}
|
}
|
||||||
#endif // defined(PA_HAS_MEMORY_TAGGING)
|
#endif // defined(PA_HAS_MEMORY_TAGGING)
|
||||||
|
|
||||||
|
@ -25,9 +25,16 @@ namespace internal {
|
|||||||
// the second one 16. We could technically return something different for
|
// the second one 16. We could technically return something different for
|
||||||
// malloc() and operator new(), but this would complicate things, and most of
|
// malloc() and operator new(), but this would complicate things, and most of
|
||||||
// our allocations are presumably coming from operator new() anyway.
|
// our allocations are presumably coming from operator new() anyway.
|
||||||
|
//
|
||||||
|
// __STDCPP_DEFAULT_NEW_ALIGNMENT__ is C++17. As such, it is not defined on all
|
||||||
|
// platforms, as Chrome's requirement is C++14 as of 2020.
|
||||||
|
#if defined(__STDCPP_DEFAULT_NEW_ALIGNMENT__)
|
||||||
constexpr size_t kAlignment =
|
constexpr size_t kAlignment =
|
||||||
std::max(alignof(max_align_t),
|
std::max(alignof(max_align_t),
|
||||||
static_cast<size_t>(__STDCPP_DEFAULT_NEW_ALIGNMENT__));
|
static_cast<size_t>(__STDCPP_DEFAULT_NEW_ALIGNMENT__));
|
||||||
|
#else
|
||||||
|
constexpr size_t kAlignment = alignof(max_align_t);
|
||||||
|
#endif
|
||||||
static_assert(kAlignment <= 16,
|
static_assert(kAlignment <= 16,
|
||||||
"PartitionAlloc doesn't support a fundamental alignment larger "
|
"PartitionAlloc doesn't support a fundamental alignment larger "
|
||||||
"than 16 bytes.");
|
"than 16 bytes.");
|
||||||
@ -55,6 +62,14 @@ using ThreadSafePartitionRoot = PartitionRoot<internal::ThreadSafe>;
|
|||||||
|
|
||||||
} // namespace partition_alloc
|
} // namespace partition_alloc
|
||||||
|
|
||||||
|
namespace base {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
using ::partition_alloc::PartitionRoot;
|
||||||
|
|
||||||
|
} // namespace base
|
||||||
|
|
||||||
// From https://clang.llvm.org/docs/AttributeReference.html#malloc:
|
// From https://clang.llvm.org/docs/AttributeReference.html#malloc:
|
||||||
//
|
//
|
||||||
// The malloc attribute indicates that the function acts like a system memory
|
// The malloc attribute indicates that the function acts like a system memory
|
||||||
|
@ -82,4 +82,12 @@ class PA_COMPONENT_EXPORT(PARTITION_ALLOC) PartitionAllocHooks {
|
|||||||
|
|
||||||
} // namespace partition_alloc
|
} // namespace partition_alloc
|
||||||
|
|
||||||
|
namespace base {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
using ::partition_alloc::PartitionAllocHooks;
|
||||||
|
|
||||||
|
} // namespace base
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_ALLOC_HOOKS_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_ALLOC_HOOKS_H_
|
||||||
|
@ -803,7 +803,7 @@ PA_ALWAYS_INLINE uintptr_t PartitionBucket<thread_safe>::AllocNewSuperPage(
|
|||||||
PageAccessibilityConfiguration::kReadWrite,
|
PageAccessibilityConfiguration::kReadWrite,
|
||||||
PageAccessibilityDisposition::kRequireUpdate);
|
PageAccessibilityDisposition::kRequireUpdate);
|
||||||
}
|
}
|
||||||
PCScan::RegisterNewSuperPage(root, super_page);
|
::base::internal::PCScan::RegisterNewSuperPage(root, super_page);
|
||||||
}
|
}
|
||||||
|
|
||||||
return payload;
|
return payload;
|
||||||
@ -883,8 +883,9 @@ PartitionBucket<thread_safe>::ProvisionMoreSlotsAndAllocOne(
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (PA_LIKELY(size <= kMaxMemoryTaggingSize)) {
|
if (PA_LIKELY(size <= kMaxMemoryTaggingSize)) {
|
||||||
// Ensure the MTE-tag of the memory pointed by |return_slot| is unguessable.
|
// Ensure the memory tag of the return_slot is unguessable.
|
||||||
TagMemoryRangeRandomly(return_slot, size);
|
return_slot =
|
||||||
|
::partition_alloc::internal::TagMemoryRangeRandomly(return_slot, size);
|
||||||
}
|
}
|
||||||
#if defined(PA_USE_MTE_CHECKED_PTR_WITH_64_BITS_POINTERS)
|
#if defined(PA_USE_MTE_CHECKED_PTR_WITH_64_BITS_POINTERS)
|
||||||
PartitionTagSetValue(return_slot, size, root->GetNewPartitionTag());
|
PartitionTagSetValue(return_slot, size, root->GetNewPartitionTag());
|
||||||
@ -895,20 +896,14 @@ PartitionBucket<thread_safe>::ProvisionMoreSlotsAndAllocOne(
|
|||||||
uintptr_t next_slot_end = next_slot + size;
|
uintptr_t next_slot_end = next_slot + size;
|
||||||
size_t free_list_entries_added = 0;
|
size_t free_list_entries_added = 0;
|
||||||
while (next_slot_end <= commit_end) {
|
while (next_slot_end <= commit_end) {
|
||||||
void* next_slot_ptr;
|
|
||||||
if (PA_LIKELY(size <= kMaxMemoryTaggingSize)) {
|
if (PA_LIKELY(size <= kMaxMemoryTaggingSize)) {
|
||||||
// Ensure the MTE-tag of the memory pointed by other provisioned slot is
|
next_slot =
|
||||||
// unguessable. They will be returned to the app as is, and the MTE-tag
|
::partition_alloc::internal::TagMemoryRangeRandomly(next_slot, size);
|
||||||
// will only change upon calling Free().
|
|
||||||
next_slot_ptr = TagMemoryRangeRandomly(next_slot, size);
|
|
||||||
} else {
|
|
||||||
// No MTE-tagging for larger slots, just cast.
|
|
||||||
next_slot_ptr = reinterpret_cast<void*>(next_slot);
|
|
||||||
}
|
}
|
||||||
#if defined(PA_USE_MTE_CHECKED_PTR_WITH_64_BITS_POINTERS)
|
#if defined(PA_USE_MTE_CHECKED_PTR_WITH_64_BITS_POINTERS)
|
||||||
PartitionTagSetValue(next_slot, size, root->GetNewPartitionTag());
|
PartitionTagSetValue(next_slot, size, root->GetNewPartitionTag());
|
||||||
#endif // defined(PA_USE_MTE_CHECKED_PTR_WITH_64_BITS_POINTERS)
|
#endif // defined(PA_USE_MTE_CHECKED_PTR_WITH_64_BITS_POINTERS)
|
||||||
auto* entry = PartitionFreelistEntry::EmplaceAndInitNull(next_slot_ptr);
|
auto* entry = PartitionFreelistEntry::EmplaceAndInitNull(next_slot);
|
||||||
if (!slot_span->get_freelist_head()) {
|
if (!slot_span->get_freelist_head()) {
|
||||||
PA_DCHECK(!prev_entry);
|
PA_DCHECK(!prev_entry);
|
||||||
PA_DCHECK(!free_list_entries_added);
|
PA_DCHECK(!free_list_entries_added);
|
||||||
|
@ -202,4 +202,12 @@ struct PartitionBucket {
|
|||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
using ::partition_alloc::internal::PartitionBucket;
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_BUCKET_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_BUCKET_H_
|
||||||
|
@ -270,4 +270,12 @@ PA_ALWAYS_INLINE constexpr uint16_t BucketIndexLookup::GetIndexForDenserBuckets(
|
|||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
using ::partition_alloc::internal::BucketIndexLookup;
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_BUCKET_LOOKUP_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_BUCKET_LOOKUP_H_
|
||||||
|
@ -44,4 +44,18 @@ PA_ALWAYS_INLINE void PartitionCookieWriteValue(unsigned char* cookie_ptr) {}
|
|||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
using ::partition_alloc::internal::kCookieSize;
|
||||||
|
using ::partition_alloc::internal::kPartitionCookieSizeAdjustment;
|
||||||
|
using ::partition_alloc::internal::PartitionCookieCheckValue;
|
||||||
|
using ::partition_alloc::internal::PartitionCookieWriteValue;
|
||||||
|
#if BUILDFLAG(PA_DCHECK_IS_ON)
|
||||||
|
using ::partition_alloc::internal::kCookieValue;
|
||||||
|
#endif // BUILDFLAG(PA_DCHECK_IS_ON)
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_COOKIE_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_COOKIE_H_
|
||||||
|
@ -72,4 +72,13 @@ PartitionDirectMapExtent<thread_safe>::FromSlotSpan(
|
|||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
using ::partition_alloc::internal::PartitionDirectMapExtent;
|
||||||
|
using ::partition_alloc::internal::PartitionDirectMapMetadata;
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_DIRECT_MAP_EXTENT_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_DIRECT_MAP_EXTENT_H_
|
||||||
|
@ -41,7 +41,6 @@ class EncodedPartitionFreelistEntryPtr {
|
|||||||
std::nullptr_t)
|
std::nullptr_t)
|
||||||
: encoded_(Transform(0)) {}
|
: encoded_(Transform(0)) {}
|
||||||
explicit PA_ALWAYS_INLINE EncodedPartitionFreelistEntryPtr(void* ptr)
|
explicit PA_ALWAYS_INLINE EncodedPartitionFreelistEntryPtr(void* ptr)
|
||||||
// The encoded pointer stays MTE-tagged.
|
|
||||||
: encoded_(Transform(reinterpret_cast<uintptr_t>(ptr))) {}
|
: encoded_(Transform(reinterpret_cast<uintptr_t>(ptr))) {}
|
||||||
|
|
||||||
PA_ALWAYS_INLINE PartitionFreelistEntry* Decode() const {
|
PA_ALWAYS_INLINE PartitionFreelistEntry* Decode() const {
|
||||||
@ -117,15 +116,11 @@ class PartitionFreelistEntry {
|
|||||||
|
|
||||||
// Emplaces the freelist entry at the beginning of the given slot span, and
|
// Emplaces the freelist entry at the beginning of the given slot span, and
|
||||||
// initializes it as null-terminated.
|
// initializes it as null-terminated.
|
||||||
static PA_ALWAYS_INLINE PartitionFreelistEntry* EmplaceAndInitNull(
|
|
||||||
void* slot_start_tagged) {
|
|
||||||
// |slot_start_tagged| is MTE-tagged.
|
|
||||||
auto* entry = new (slot_start_tagged) PartitionFreelistEntry(nullptr);
|
|
||||||
return entry;
|
|
||||||
}
|
|
||||||
static PA_ALWAYS_INLINE PartitionFreelistEntry* EmplaceAndInitNull(
|
static PA_ALWAYS_INLINE PartitionFreelistEntry* EmplaceAndInitNull(
|
||||||
uintptr_t slot_start) {
|
uintptr_t slot_start) {
|
||||||
return EmplaceAndInitNull(SlotStartAddr2Ptr(slot_start));
|
auto* entry = new (reinterpret_cast<void*>(slot_start))
|
||||||
|
PartitionFreelistEntry(nullptr);
|
||||||
|
return entry;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Emplaces the freelist entry at the beginning of the given slot span, and
|
// Emplaces the freelist entry at the beginning of the given slot span, and
|
||||||
@ -138,7 +133,7 @@ class PartitionFreelistEntry {
|
|||||||
uintptr_t slot_start,
|
uintptr_t slot_start,
|
||||||
PartitionFreelistEntry* next) {
|
PartitionFreelistEntry* next) {
|
||||||
auto* entry =
|
auto* entry =
|
||||||
new (SlotStartAddr2Ptr(slot_start)) PartitionFreelistEntry(next);
|
new (reinterpret_cast<void*>(slot_start)) PartitionFreelistEntry(next);
|
||||||
return entry;
|
return entry;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -150,7 +145,7 @@ class PartitionFreelistEntry {
|
|||||||
static PA_ALWAYS_INLINE void EmplaceAndInitForTest(uintptr_t slot_start,
|
static PA_ALWAYS_INLINE void EmplaceAndInitForTest(uintptr_t slot_start,
|
||||||
void* next,
|
void* next,
|
||||||
bool make_shadow_match) {
|
bool make_shadow_match) {
|
||||||
new (SlotStartAddr2Ptr(slot_start))
|
new (reinterpret_cast<void*>(slot_start))
|
||||||
PartitionFreelistEntry(next, make_shadow_match);
|
PartitionFreelistEntry(next, make_shadow_match);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -179,7 +174,7 @@ class PartitionFreelistEntry {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
PA_ALWAYS_INLINE void SetNext(PartitionFreelistEntry* entry) {
|
PA_ALWAYS_INLINE void SetNext(PartitionFreelistEntry* ptr) {
|
||||||
// SetNext() is either called on the freelist head, when provisioning new
|
// SetNext() is either called on the freelist head, when provisioning new
|
||||||
// slots, or when GetNext() has been called before, no need to pass the
|
// slots, or when GetNext() has been called before, no need to pass the
|
||||||
// size.
|
// size.
|
||||||
@ -187,14 +182,15 @@ class PartitionFreelistEntry {
|
|||||||
// Regular freelists always point to an entry within the same super page.
|
// Regular freelists always point to an entry within the same super page.
|
||||||
//
|
//
|
||||||
// This is most likely a PartitionAlloc bug if this triggers.
|
// This is most likely a PartitionAlloc bug if this triggers.
|
||||||
if (PA_UNLIKELY(entry &&
|
if (PA_UNLIKELY(
|
||||||
(SlotStartPtr2Addr(this) & kSuperPageBaseMask) !=
|
ptr &&
|
||||||
(SlotStartPtr2Addr(entry) & kSuperPageBaseMask))) {
|
(reinterpret_cast<uintptr_t>(this) & kSuperPageBaseMask) !=
|
||||||
|
(reinterpret_cast<uintptr_t>(ptr) & kSuperPageBaseMask))) {
|
||||||
FreelistCorruptionDetected(0);
|
FreelistCorruptionDetected(0);
|
||||||
}
|
}
|
||||||
#endif // BUILDFLAG(PA_DCHECK_IS_ON)
|
#endif // BUILDFLAG(PA_DCHECK_IS_ON)
|
||||||
|
|
||||||
encoded_next_ = EncodedPartitionFreelistEntryPtr(entry);
|
encoded_next_ = EncodedPartitionFreelistEntryPtr(ptr);
|
||||||
#if defined(PA_HAS_FREELIST_SHADOW_ENTRY)
|
#if defined(PA_HAS_FREELIST_SHADOW_ENTRY)
|
||||||
shadow_ = encoded_next_.Inverted();
|
shadow_ = encoded_next_.Inverted();
|
||||||
#endif
|
#endif
|
||||||
@ -208,7 +204,8 @@ class PartitionFreelistEntry {
|
|||||||
#if defined(PA_HAS_FREELIST_SHADOW_ENTRY)
|
#if defined(PA_HAS_FREELIST_SHADOW_ENTRY)
|
||||||
shadow_ = 0;
|
shadow_ = 0;
|
||||||
#endif
|
#endif
|
||||||
return SlotStartPtr2Addr(this);
|
uintptr_t slot_start = reinterpret_cast<uintptr_t>(this);
|
||||||
|
return slot_start;
|
||||||
}
|
}
|
||||||
|
|
||||||
PA_ALWAYS_INLINE constexpr bool IsEncodedNextPtrZero() const {
|
PA_ALWAYS_INLINE constexpr bool IsEncodedNextPtrZero() const {
|
||||||
@ -232,8 +229,8 @@ class PartitionFreelistEntry {
|
|||||||
//
|
//
|
||||||
// Also, the lightweight UaF detection (pointer shadow) is checked.
|
// Also, the lightweight UaF detection (pointer shadow) is checked.
|
||||||
|
|
||||||
uintptr_t here_address = SlotStartPtr2Addr(here);
|
uintptr_t here_address = reinterpret_cast<uintptr_t>(here);
|
||||||
uintptr_t next_address = SlotStartPtr2Addr(next);
|
uintptr_t next_address = reinterpret_cast<uintptr_t>(next);
|
||||||
|
|
||||||
#if defined(PA_HAS_FREELIST_SHADOW_ENTRY)
|
#if defined(PA_HAS_FREELIST_SHADOW_ENTRY)
|
||||||
bool shadow_ptr_ok = here->encoded_next_.Inverted() == here->shadow_;
|
bool shadow_ptr_ok = here->encoded_next_.Inverted() == here->shadow_;
|
||||||
@ -330,4 +327,12 @@ PA_ALWAYS_INLINE PartitionFreelistEntry* PartitionFreelistEntry::GetNext(
|
|||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
using ::partition_alloc::internal::PartitionFreelistEntry;
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_FREELIST_ENTRY_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_FREELIST_ENTRY_H_
|
||||||
|
@ -37,4 +37,24 @@ extern OomFunction g_oom_handling_function;
|
|||||||
|
|
||||||
} // namespace partition_alloc
|
} // namespace partition_alloc
|
||||||
|
|
||||||
|
namespace base {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
using ::partition_alloc::OomFunction;
|
||||||
|
|
||||||
|
namespace internal {
|
||||||
|
|
||||||
|
using ::partition_alloc::internal::g_oom_handling_function;
|
||||||
|
using ::partition_alloc::internal::PartitionExcessiveAllocationSize;
|
||||||
|
#if !defined(ARCH_CPU_64_BITS)
|
||||||
|
using ::partition_alloc::internal::PartitionOutOfMemoryWithLargeVirtualSize;
|
||||||
|
using ::partition_alloc::internal::
|
||||||
|
PartitionOutOfMemoryWithLotsOfUncommitedPages;
|
||||||
|
#endif
|
||||||
|
|
||||||
|
} // namespace internal
|
||||||
|
|
||||||
|
} // namespace base
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_OOM_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_OOM_H_
|
||||||
|
@ -263,7 +263,9 @@ void SlotSpanMetadata<thread_safe>::SortFreelist() {
|
|||||||
for (PartitionFreelistEntry* head = freelist_head; head;
|
for (PartitionFreelistEntry* head = freelist_head; head;
|
||||||
head = head->GetNext(slot_size)) {
|
head = head->GetNext(slot_size)) {
|
||||||
++num_free_slots;
|
++num_free_slots;
|
||||||
size_t offset_in_slot_span = SlotStartPtr2Addr(head) - slot_span_start;
|
size_t offset_in_slot_span = ::partition_alloc::internal::UnmaskPtr(
|
||||||
|
reinterpret_cast<uintptr_t>(head)) -
|
||||||
|
slot_span_start;
|
||||||
size_t slot_number = bucket->GetSlotNumber(offset_in_slot_span);
|
size_t slot_number = bucket->GetSlotNumber(offset_in_slot_span);
|
||||||
PA_DCHECK(slot_number < num_provisioned_slots);
|
PA_DCHECK(slot_number < num_provisioned_slots);
|
||||||
free_slots[slot_number] = true;
|
free_slots[slot_number] = true;
|
||||||
@ -278,8 +280,9 @@ void SlotSpanMetadata<thread_safe>::SortFreelist() {
|
|||||||
for (size_t slot_number = 0; slot_number < num_provisioned_slots;
|
for (size_t slot_number = 0; slot_number < num_provisioned_slots;
|
||||||
slot_number++) {
|
slot_number++) {
|
||||||
if (free_slots[slot_number]) {
|
if (free_slots[slot_number]) {
|
||||||
uintptr_t slot_start = slot_span_start + (slot_size * slot_number);
|
uintptr_t slot_address = ::partition_alloc::internal::RemaskPtr(
|
||||||
auto* entry = PartitionFreelistEntry::EmplaceAndInitNull(slot_start);
|
slot_span_start + (slot_size * slot_number));
|
||||||
|
auto* entry = PartitionFreelistEntry::EmplaceAndInitNull(slot_address);
|
||||||
|
|
||||||
if (!head)
|
if (!head)
|
||||||
head = entry;
|
head = entry;
|
||||||
|
@ -502,6 +502,7 @@ SlotSpanMetadata<thread_safe>::ToSuperPageExtent() const {
|
|||||||
// surely never contain user data.
|
// surely never contain user data.
|
||||||
PA_ALWAYS_INLINE bool IsWithinSuperPagePayload(uintptr_t address,
|
PA_ALWAYS_INLINE bool IsWithinSuperPagePayload(uintptr_t address,
|
||||||
bool with_quarantine) {
|
bool with_quarantine) {
|
||||||
|
address = ::partition_alloc::internal::UnmaskPtr(address);
|
||||||
// Quarantine can only be enabled for normal buckets in the current code.
|
// Quarantine can only be enabled for normal buckets in the current code.
|
||||||
PA_DCHECK(!with_quarantine || IsManagedByNormalBuckets(address));
|
PA_DCHECK(!with_quarantine || IsManagedByNormalBuckets(address));
|
||||||
uintptr_t super_page = address & kSuperPageBaseMask;
|
uintptr_t super_page = address & kSuperPageBaseMask;
|
||||||
@ -580,6 +581,7 @@ PA_ALWAYS_INLINE uintptr_t SlotSpanMetadata<thread_safe>::ToSlotSpanStart(
|
|||||||
template <bool thread_safe>
|
template <bool thread_safe>
|
||||||
PA_ALWAYS_INLINE SlotSpanMetadata<thread_safe>*
|
PA_ALWAYS_INLINE SlotSpanMetadata<thread_safe>*
|
||||||
SlotSpanMetadata<thread_safe>::FromAddr(uintptr_t address) {
|
SlotSpanMetadata<thread_safe>::FromAddr(uintptr_t address) {
|
||||||
|
address = ::partition_alloc::internal::UnmaskPtr(address);
|
||||||
auto* page = PartitionPage<thread_safe>::FromAddr(address);
|
auto* page = PartitionPage<thread_safe>::FromAddr(address);
|
||||||
PA_DCHECK(page->is_valid);
|
PA_DCHECK(page->is_valid);
|
||||||
// Partition pages in the same slot span share the same SlotSpanMetadata
|
// Partition pages in the same slot span share the same SlotSpanMetadata
|
||||||
@ -609,7 +611,9 @@ SlotSpanMetadata<thread_safe>::FromSlotStart(uintptr_t slot_start) {
|
|||||||
#if BUILDFLAG(PA_DCHECK_IS_ON)
|
#if BUILDFLAG(PA_DCHECK_IS_ON)
|
||||||
// Checks that the pointer is a multiple of slot size.
|
// Checks that the pointer is a multiple of slot size.
|
||||||
uintptr_t slot_span_start = ToSlotSpanStart(slot_span);
|
uintptr_t slot_span_start = ToSlotSpanStart(slot_span);
|
||||||
PA_DCHECK(!((slot_start - slot_span_start) % slot_span->bucket->slot_size));
|
PA_DCHECK(!((::partition_alloc::internal::UnmaskPtr(slot_start) -
|
||||||
|
::partition_alloc::internal::UnmaskPtr(slot_span_start)) %
|
||||||
|
slot_span->bucket->slot_size));
|
||||||
#endif // BUILDFLAG(PA_DCHECK_IS_ON)
|
#endif // BUILDFLAG(PA_DCHECK_IS_ON)
|
||||||
return slot_span;
|
return slot_span;
|
||||||
}
|
}
|
||||||
@ -621,14 +625,16 @@ SlotSpanMetadata<thread_safe>::FromSlotStart(uintptr_t slot_start) {
|
|||||||
template <bool thread_safe>
|
template <bool thread_safe>
|
||||||
PA_ALWAYS_INLINE SlotSpanMetadata<thread_safe>*
|
PA_ALWAYS_INLINE SlotSpanMetadata<thread_safe>*
|
||||||
SlotSpanMetadata<thread_safe>::FromObject(void* object) {
|
SlotSpanMetadata<thread_safe>::FromObject(void* object) {
|
||||||
uintptr_t object_addr = ObjectPtr2Addr(object);
|
uintptr_t object_addr = PartitionRoot<thread_safe>::ObjectPtr2Addr(object);
|
||||||
auto* slot_span = FromAddr(object_addr);
|
auto* slot_span = FromAddr(object_addr);
|
||||||
#if BUILDFLAG(PA_DCHECK_IS_ON)
|
#if BUILDFLAG(PA_DCHECK_IS_ON)
|
||||||
// Checks that the object is exactly |extras_offset| away from a multiple of
|
// Checks that the object is exactly |extras_offset| away from a multiple of
|
||||||
// slot size (i.e. from a slot start).
|
// slot size (i.e. from a slot start).
|
||||||
uintptr_t slot_span_start = ToSlotSpanStart(slot_span);
|
uintptr_t slot_span_start = ToSlotSpanStart(slot_span);
|
||||||
auto* root = PartitionRoot<thread_safe>::FromSlotSpan(slot_span);
|
auto* root = PartitionRoot<thread_safe>::FromSlotSpan(slot_span);
|
||||||
PA_DCHECK((object_addr - slot_span_start) % slot_span->bucket->slot_size ==
|
PA_DCHECK((::partition_alloc::internal::UnmaskPtr(object_addr) -
|
||||||
|
::partition_alloc::internal::UnmaskPtr(slot_span_start)) %
|
||||||
|
slot_span->bucket->slot_size ==
|
||||||
root->flags.extras_offset);
|
root->flags.extras_offset);
|
||||||
#endif // BUILDFLAG(PA_DCHECK_IS_ON)
|
#endif // BUILDFLAG(PA_DCHECK_IS_ON)
|
||||||
return slot_span;
|
return slot_span;
|
||||||
@ -659,7 +665,8 @@ SlotSpanMetadata<thread_safe>::FromObjectInnerAddr(uintptr_t address) {
|
|||||||
template <bool thread_safe>
|
template <bool thread_safe>
|
||||||
PA_ALWAYS_INLINE SlotSpanMetadata<thread_safe>*
|
PA_ALWAYS_INLINE SlotSpanMetadata<thread_safe>*
|
||||||
SlotSpanMetadata<thread_safe>::FromObjectInnerPtr(void* ptr) {
|
SlotSpanMetadata<thread_safe>::FromObjectInnerPtr(void* ptr) {
|
||||||
return FromObjectInnerAddr(ObjectInnerPtr2Addr(ptr));
|
return FromObjectInnerAddr(
|
||||||
|
PartitionRoot<thread_safe>::ObjectInnerPtr2Addr(ptr));
|
||||||
}
|
}
|
||||||
|
|
||||||
template <bool thread_safe>
|
template <bool thread_safe>
|
||||||
@ -681,14 +688,9 @@ PA_ALWAYS_INLINE size_t SlotSpanMetadata<thread_safe>::GetRawSize() const {
|
|||||||
template <bool thread_safe>
|
template <bool thread_safe>
|
||||||
PA_ALWAYS_INLINE void SlotSpanMetadata<thread_safe>::SetFreelistHead(
|
PA_ALWAYS_INLINE void SlotSpanMetadata<thread_safe>::SetFreelistHead(
|
||||||
PartitionFreelistEntry* new_head) {
|
PartitionFreelistEntry* new_head) {
|
||||||
#if BUILDFLAG(PA_DCHECK_IS_ON)
|
|
||||||
// |this| is in the metadata region, hence isn't MTE-tagged. Untag |new_head|
|
|
||||||
// as well.
|
|
||||||
uintptr_t new_head_untagged = UntagPtr(new_head);
|
|
||||||
PA_DCHECK(!new_head ||
|
PA_DCHECK(!new_head ||
|
||||||
(reinterpret_cast<uintptr_t>(this) & kSuperPageBaseMask) ==
|
(reinterpret_cast<uintptr_t>(this) & kSuperPageBaseMask) ==
|
||||||
(new_head_untagged & kSuperPageBaseMask));
|
(reinterpret_cast<uintptr_t>(new_head) & kSuperPageBaseMask));
|
||||||
#endif
|
|
||||||
freelist_head = new_head;
|
freelist_head = new_head;
|
||||||
// Inserted something new in the freelist, assume that it is not sorted
|
// Inserted something new in the freelist, assume that it is not sorted
|
||||||
// anymore.
|
// anymore.
|
||||||
@ -718,8 +720,7 @@ PA_ALWAYS_INLINE void SlotSpanMetadata<thread_safe>::Free(uintptr_t slot_start)
|
|||||||
root->lock_.AssertAcquired();
|
root->lock_.AssertAcquired();
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
auto* entry = static_cast<internal::PartitionFreelistEntry*>(
|
auto* entry = reinterpret_cast<internal::PartitionFreelistEntry*>(slot_start);
|
||||||
SlotStartAddr2Ptr(slot_start));
|
|
||||||
// Catches an immediate double free.
|
// Catches an immediate double free.
|
||||||
PA_CHECK(entry != freelist_head);
|
PA_CHECK(entry != freelist_head);
|
||||||
// Look for double free one level deeper in debug.
|
// Look for double free one level deeper in debug.
|
||||||
@ -761,10 +762,11 @@ PA_ALWAYS_INLINE void SlotSpanMetadata<thread_safe>::AppendFreeList(
|
|||||||
size_t number_of_entries = 0;
|
size_t number_of_entries = 0;
|
||||||
for (auto* entry = head; entry;
|
for (auto* entry = head; entry;
|
||||||
entry = entry->GetNext(bucket->slot_size), ++number_of_entries) {
|
entry = entry->GetNext(bucket->slot_size), ++number_of_entries) {
|
||||||
uintptr_t untagged_entry = UntagPtr(entry);
|
uintptr_t unmasked_entry = ::partition_alloc::internal::UnmaskPtr(
|
||||||
|
reinterpret_cast<uintptr_t>(entry));
|
||||||
// Check that all entries belong to this slot span.
|
// Check that all entries belong to this slot span.
|
||||||
PA_DCHECK(ToSlotSpanStart(this) <= untagged_entry);
|
PA_DCHECK(ToSlotSpanStart(this) <= unmasked_entry);
|
||||||
PA_DCHECK(untagged_entry <
|
PA_DCHECK(unmasked_entry <
|
||||||
ToSlotSpanStart(this) + bucket->get_bytes_per_span());
|
ToSlotSpanStart(this) + bucket->get_bytes_per_span());
|
||||||
}
|
}
|
||||||
PA_DCHECK(number_of_entries == number_of_freed);
|
PA_DCHECK(number_of_entries == number_of_freed);
|
||||||
@ -900,4 +902,23 @@ void IterateSlotSpans(uintptr_t super_page,
|
|||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
using ::partition_alloc::internal::AllocationStateMap;
|
||||||
|
using ::partition_alloc::internal::CommittedStateBitmapSize;
|
||||||
|
using ::partition_alloc::internal::IterateSlotSpans;
|
||||||
|
using ::partition_alloc::internal::PartitionPage;
|
||||||
|
using ::partition_alloc::internal::PartitionSuperPageExtentEntry;
|
||||||
|
using ::partition_alloc::internal::PartitionSuperPageToExtent;
|
||||||
|
using ::partition_alloc::internal::PartitionSuperPageToMetadataArea;
|
||||||
|
using ::partition_alloc::internal::ReservedStateBitmapSize;
|
||||||
|
using ::partition_alloc::internal::SlotSpanMetadata;
|
||||||
|
using ::partition_alloc::internal::StateBitmapFromAddr;
|
||||||
|
using ::partition_alloc::internal::SuperPageStateBitmap;
|
||||||
|
using ::partition_alloc::internal::SuperPageStateBitmapAddr;
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_PAGE_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_PAGE_H_
|
||||||
|
@ -319,49 +319,19 @@ static constexpr size_t kInSlotRefCountBufferSize = sizeof(PartitionRefCount);
|
|||||||
constexpr size_t kPartitionRefCountOffsetAdjustment = 0;
|
constexpr size_t kPartitionRefCountOffsetAdjustment = 0;
|
||||||
constexpr size_t kPartitionPastAllocationAdjustment = 0;
|
constexpr size_t kPartitionPastAllocationAdjustment = 0;
|
||||||
|
|
||||||
#if BUILDFLAG(ENABLE_DANGLING_RAW_PTR_CHECKS)
|
constexpr size_t kPartitionRefCountIndexMultiplier =
|
||||||
|
SystemPageSize() /
|
||||||
|
(sizeof(PartitionRefCount) * (kSuperPageSize / SystemPageSize()));
|
||||||
|
|
||||||
#if defined(PA_REF_COUNT_CHECK_COOKIE) || \
|
static_assert((sizeof(PartitionRefCount) * (kSuperPageSize / SystemPageSize()) *
|
||||||
defined(PA_REF_COUNT_STORE_REQUESTED_SIZE)
|
kPartitionRefCountIndexMultiplier <=
|
||||||
static constexpr size_t kPartitionRefCountSizeShift = 4;
|
SystemPageSize()),
|
||||||
#else // defined(PA_REF_COUNT_CHECK_COOKIE) ||
|
"PartitionRefCount Bitmap size must be smaller than or equal to "
|
||||||
// defined(PA_REF_COUNT_STORE_REQUESTED_SIZE)
|
"<= SystemPageSize().");
|
||||||
static constexpr size_t kPartitionRefCountSizeShift = 3;
|
|
||||||
#endif // defined(PA_REF_COUNT_CHECK_COOKIE) ||
|
|
||||||
// defined(PA_REF_COUNT_STORE_REQUESTED_SIZE)
|
|
||||||
|
|
||||||
#else // BUILDFLAG(ENABLE_DANGLING_RAW_PTR_CHECKS)
|
|
||||||
|
|
||||||
#if defined(PA_REF_COUNT_CHECK_COOKIE) && \
|
|
||||||
defined(PA_REF_COUNT_STORE_REQUESTED_SIZE)
|
|
||||||
static constexpr size_t kPartitionRefCountSizeShift = 4;
|
|
||||||
#elif defined(PA_REF_COUNT_CHECK_COOKIE) || \
|
|
||||||
defined(PA_REF_COUNT_STORE_REQUESTED_SIZE)
|
|
||||||
static constexpr size_t kPartitionRefCountSizeShift = 3;
|
|
||||||
#else
|
|
||||||
static constexpr size_t kPartitionRefCountSizeShift = 2;
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#endif // defined(PA_REF_COUNT_CHECK_COOKIE)
|
|
||||||
static_assert((1 << kPartitionRefCountSizeShift) == sizeof(PartitionRefCount));
|
|
||||||
|
|
||||||
// We need one PartitionRefCount for each system page in a super page. They take
|
|
||||||
// `x = sizeof(PartitionRefCount) * (kSuperPageSize / SystemPageSize())` space.
|
|
||||||
// They need to fit into a system page of metadata as sparsely as possible to
|
|
||||||
// minimize cache line sharing, hence we calculate a multiplier as
|
|
||||||
// `SystemPageSize() / x`.
|
|
||||||
//
|
|
||||||
// The multiplier is expressed as a bitshift to optimize the code generation.
|
|
||||||
// SystemPageSize() isn't always a constrexpr, in which case the compiler
|
|
||||||
// wouldn't know it's a power of two. The equivalence of these calculations is
|
|
||||||
// checked in PartitionAllocGlobalInit().
|
|
||||||
static PAGE_ALLOCATOR_CONSTANTS_DECLARE_CONSTEXPR PA_ALWAYS_INLINE size_t
|
|
||||||
GetPartitionRefCountIndexMultiplierShift() {
|
|
||||||
return SystemPageShift() * 2 - kSuperPageShift - kPartitionRefCountSizeShift;
|
|
||||||
}
|
|
||||||
|
|
||||||
PA_ALWAYS_INLINE PartitionRefCount* PartitionRefCountPointer(
|
PA_ALWAYS_INLINE PartitionRefCount* PartitionRefCountPointer(
|
||||||
uintptr_t slot_start) {
|
uintptr_t slot_start) {
|
||||||
|
PA_DCHECK(slot_start == ::partition_alloc::internal::RemaskPtr(slot_start));
|
||||||
#if BUILDFLAG(PA_DCHECK_IS_ON) || BUILDFLAG(ENABLE_BACKUP_REF_PTR_SLOW_CHECKS)
|
#if BUILDFLAG(PA_DCHECK_IS_ON) || BUILDFLAG(ENABLE_BACKUP_REF_PTR_SLOW_CHECKS)
|
||||||
CheckThatSlotOffsetIsZero(slot_start);
|
CheckThatSlotOffsetIsZero(slot_start);
|
||||||
#endif
|
#endif
|
||||||
@ -370,20 +340,17 @@ PA_ALWAYS_INLINE PartitionRefCount* PartitionRefCountPointer(
|
|||||||
#if BUILDFLAG(PA_DCHECK_IS_ON) || BUILDFLAG(ENABLE_BACKUP_REF_PTR_SLOW_CHECKS)
|
#if BUILDFLAG(PA_DCHECK_IS_ON) || BUILDFLAG(ENABLE_BACKUP_REF_PTR_SLOW_CHECKS)
|
||||||
PA_CHECK(refcount_address % alignof(PartitionRefCount) == 0);
|
PA_CHECK(refcount_address % alignof(PartitionRefCount) == 0);
|
||||||
#endif
|
#endif
|
||||||
// Have to MTE-tag, because the address is untagged, but lies within a slot
|
// Have to remask because the previous pointer's tag is unpredictable. There
|
||||||
// area, which is protected by MTE.
|
// could be a race condition though if the previous slot is freed/retagged
|
||||||
//
|
// concurrently, so ideally the ref count should occupy its own MTE granule.
|
||||||
// There could be a race condition though if the previous slot is
|
|
||||||
// freed/retagged concurrently, so ideally the ref count should occupy its
|
|
||||||
// own MTE granule.
|
|
||||||
// TODO(richard.townsend@arm.com): improve this.
|
// TODO(richard.townsend@arm.com): improve this.
|
||||||
return static_cast<PartitionRefCount*>(TagAddr(refcount_address));
|
return ::partition_alloc::internal::RemaskPtr(
|
||||||
|
reinterpret_cast<PartitionRefCount*>(refcount_address));
|
||||||
} else {
|
} else {
|
||||||
// No need to tag, as the metadata region isn't protected by MTE.
|
|
||||||
PartitionRefCount* bitmap_base = reinterpret_cast<PartitionRefCount*>(
|
PartitionRefCount* bitmap_base = reinterpret_cast<PartitionRefCount*>(
|
||||||
(slot_start & kSuperPageBaseMask) + SystemPageSize() * 2);
|
(slot_start & kSuperPageBaseMask) + SystemPageSize() * 2);
|
||||||
size_t index = ((slot_start & kSuperPageOffsetMask) >> SystemPageShift())
|
size_t index = ((slot_start & kSuperPageOffsetMask) >> SystemPageShift()) *
|
||||||
<< GetPartitionRefCountIndexMultiplierShift();
|
kPartitionRefCountIndexMultiplier;
|
||||||
#if BUILDFLAG(PA_DCHECK_IS_ON) || BUILDFLAG(ENABLE_BACKUP_REF_PTR_SLOW_CHECKS)
|
#if BUILDFLAG(PA_DCHECK_IS_ON) || BUILDFLAG(ENABLE_BACKUP_REF_PTR_SLOW_CHECKS)
|
||||||
PA_CHECK(sizeof(PartitionRefCount) * index <= SystemPageSize());
|
PA_CHECK(sizeof(PartitionRefCount) * index <= SystemPageSize());
|
||||||
#endif
|
#endif
|
||||||
@ -408,9 +375,7 @@ PA_ALWAYS_INLINE PartitionRefCount* PartitionRefCountPointer(
|
|||||||
#if BUILDFLAG(PA_DCHECK_IS_ON) || BUILDFLAG(ENABLE_BACKUP_REF_PTR_SLOW_CHECKS)
|
#if BUILDFLAG(PA_DCHECK_IS_ON) || BUILDFLAG(ENABLE_BACKUP_REF_PTR_SLOW_CHECKS)
|
||||||
CheckThatSlotOffsetIsZero(slot_start);
|
CheckThatSlotOffsetIsZero(slot_start);
|
||||||
#endif
|
#endif
|
||||||
// Have to MTE-tag, because the address is untagged, but lies within a slot
|
return reinterpret_cast<PartitionRefCount*>(slot_start);
|
||||||
// area, which is protected by MTE.
|
|
||||||
return static_cast<PartitionRefCount*>(TagAddr(slot_start));
|
|
||||||
}
|
}
|
||||||
|
|
||||||
#endif // BUILDFLAG(PUT_REF_COUNT_IN_PREVIOUS_SLOT)
|
#endif // BUILDFLAG(PUT_REF_COUNT_IN_PREVIOUS_SLOT)
|
||||||
@ -429,4 +394,19 @@ constexpr size_t kPartitionRefCountSizeAdjustment = kInSlotRefCountBufferSize;
|
|||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
#if BUILDFLAG(USE_BACKUP_REF_PTR)
|
||||||
|
using ::partition_alloc::internal::kPartitionPastAllocationAdjustment;
|
||||||
|
using ::partition_alloc::internal::PartitionRefCount;
|
||||||
|
using ::partition_alloc::internal::PartitionRefCountPointer;
|
||||||
|
#endif // BUILDFLAG(USE_BACKUP_REF_PTR)
|
||||||
|
using ::partition_alloc::internal::kInSlotRefCountBufferSize;
|
||||||
|
using ::partition_alloc::internal::kPartitionRefCountOffsetAdjustment;
|
||||||
|
using ::partition_alloc::internal::kPartitionRefCountSizeAdjustment;
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_REF_COUNT_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_REF_COUNT_H_
|
||||||
|
@ -337,8 +337,10 @@ static size_t PartitionPurgeSlotSpan(
|
|||||||
// slots are not in use.
|
// slots are not in use.
|
||||||
for (PartitionFreelistEntry* entry = slot_span->get_freelist_head(); entry;
|
for (PartitionFreelistEntry* entry = slot_span->get_freelist_head(); entry;
|
||||||
/**/) {
|
/**/) {
|
||||||
size_t slot_index =
|
size_t slot_index = (::partition_alloc::internal::UnmaskPtr(
|
||||||
(SlotStartPtr2Addr(entry) - slot_span_start) / slot_size;
|
reinterpret_cast<uintptr_t>(entry)) -
|
||||||
|
slot_span_start) /
|
||||||
|
slot_size;
|
||||||
PA_DCHECK(slot_index < num_slots);
|
PA_DCHECK(slot_index < num_slots);
|
||||||
slot_usage[slot_index] = 0;
|
slot_usage[slot_index] = 0;
|
||||||
#if !BUILDFLAG(IS_WIN)
|
#if !BUILDFLAG(IS_WIN)
|
||||||
@ -477,11 +479,12 @@ static void PartitionDumpSlotSpanStats(
|
|||||||
|
|
||||||
if (slot_span->CanStoreRawSize()) {
|
if (slot_span->CanStoreRawSize()) {
|
||||||
stats_out->active_bytes += static_cast<uint32_t>(slot_span->GetRawSize());
|
stats_out->active_bytes += static_cast<uint32_t>(slot_span->GetRawSize());
|
||||||
|
stats_out->active_count += 1;
|
||||||
} else {
|
} else {
|
||||||
stats_out->active_bytes +=
|
stats_out->active_bytes +=
|
||||||
(slot_span->num_allocated_slots * stats_out->bucket_slot_size);
|
(slot_span->num_allocated_slots * stats_out->bucket_slot_size);
|
||||||
}
|
|
||||||
stats_out->active_count += slot_span->num_allocated_slots;
|
stats_out->active_count += slot_span->num_allocated_slots;
|
||||||
|
}
|
||||||
|
|
||||||
size_t slot_span_bytes_resident = RoundUpToSystemPage(
|
size_t slot_span_bytes_resident = RoundUpToSystemPage(
|
||||||
(bucket_num_slots - slot_span->num_unprovisioned_slots) *
|
(bucket_num_slots - slot_span->num_unprovisioned_slots) *
|
||||||
@ -681,10 +684,6 @@ void PartitionRoot<thread_safe>::Init(PartitionOptions opts) {
|
|||||||
#if BUILDFLAG(USE_BACKUP_REF_PTR)
|
#if BUILDFLAG(USE_BACKUP_REF_PTR)
|
||||||
flags.brp_enabled_ =
|
flags.brp_enabled_ =
|
||||||
opts.backup_ref_ptr == PartitionOptions::BackupRefPtr::kEnabled;
|
opts.backup_ref_ptr == PartitionOptions::BackupRefPtr::kEnabled;
|
||||||
flags.brp_zapping_enabled_ =
|
|
||||||
opts.backup_ref_ptr_zapping ==
|
|
||||||
PartitionOptions::BackupRefPtrZapping::kEnabled;
|
|
||||||
PA_CHECK(!flags.brp_zapping_enabled_ || flags.brp_enabled_);
|
|
||||||
#else
|
#else
|
||||||
PA_CHECK(opts.backup_ref_ptr == PartitionOptions::BackupRefPtr::kDisabled);
|
PA_CHECK(opts.backup_ref_ptr == PartitionOptions::BackupRefPtr::kDisabled);
|
||||||
#endif
|
#endif
|
||||||
@ -829,7 +828,6 @@ bool PartitionRoot<thread_safe>::TryReallocInPlaceForDirectMap(
|
|||||||
internal::SlotSpanMetadata<thread_safe>* slot_span,
|
internal::SlotSpanMetadata<thread_safe>* slot_span,
|
||||||
size_t requested_size) {
|
size_t requested_size) {
|
||||||
PA_DCHECK(slot_span->bucket->is_direct_mapped());
|
PA_DCHECK(slot_span->bucket->is_direct_mapped());
|
||||||
// Slot-span metadata isn't MTE-tagged.
|
|
||||||
PA_DCHECK(
|
PA_DCHECK(
|
||||||
internal::IsManagedByDirectMap(reinterpret_cast<uintptr_t>(slot_span)));
|
internal::IsManagedByDirectMap(reinterpret_cast<uintptr_t>(slot_span)));
|
||||||
|
|
||||||
@ -923,7 +921,8 @@ bool PartitionRoot<thread_safe>::TryReallocInPlaceForDirectMap(
|
|||||||
#if BUILDFLAG(PA_DCHECK_IS_ON)
|
#if BUILDFLAG(PA_DCHECK_IS_ON)
|
||||||
// Write a new trailing cookie.
|
// Write a new trailing cookie.
|
||||||
if (flags.allow_cookie) {
|
if (flags.allow_cookie) {
|
||||||
auto* object = static_cast<unsigned char*>(SlotStartToObject(slot_start));
|
auto* object =
|
||||||
|
reinterpret_cast<unsigned char*>(SlotStartToObject(slot_start));
|
||||||
internal::PartitionCookieWriteValue(object +
|
internal::PartitionCookieWriteValue(object +
|
||||||
slot_span->GetUsableSize(this));
|
slot_span->GetUsableSize(this));
|
||||||
}
|
}
|
||||||
@ -934,17 +933,17 @@ bool PartitionRoot<thread_safe>::TryReallocInPlaceForDirectMap(
|
|||||||
|
|
||||||
template <bool thread_safe>
|
template <bool thread_safe>
|
||||||
bool PartitionRoot<thread_safe>::TryReallocInPlaceForNormalBuckets(
|
bool PartitionRoot<thread_safe>::TryReallocInPlaceForNormalBuckets(
|
||||||
void* object,
|
void* ptr,
|
||||||
SlotSpan* slot_span,
|
SlotSpan* slot_span,
|
||||||
size_t new_size) {
|
size_t new_size) {
|
||||||
uintptr_t slot_start = ObjectToSlotStart(object);
|
uintptr_t address = reinterpret_cast<uintptr_t>(ptr);
|
||||||
PA_DCHECK(internal::IsManagedByNormalBuckets(slot_start));
|
PA_DCHECK(internal::IsManagedByNormalBuckets(address));
|
||||||
|
|
||||||
// TODO: note that tcmalloc will "ignore" a downsizing realloc() unless the
|
// TODO: note that tcmalloc will "ignore" a downsizing realloc() unless the
|
||||||
// new size is a significant percentage smaller. We could do the same if we
|
// new size is a significant percentage smaller. We could do the same if we
|
||||||
// determine it is a win.
|
// determine it is a win.
|
||||||
if (AllocationCapacityFromRequestedSize(new_size) !=
|
if (AllocationCapacityFromRequestedSize(new_size) !=
|
||||||
AllocationCapacityFromPtr(object))
|
AllocationCapacityFromPtr(ptr))
|
||||||
return false;
|
return false;
|
||||||
|
|
||||||
// Trying to allocate |new_size| would use the same amount of underlying
|
// Trying to allocate |new_size| would use the same amount of underlying
|
||||||
@ -952,6 +951,7 @@ bool PartitionRoot<thread_safe>::TryReallocInPlaceForNormalBuckets(
|
|||||||
// statistics (and cookie, if present).
|
// statistics (and cookie, if present).
|
||||||
if (slot_span->CanStoreRawSize()) {
|
if (slot_span->CanStoreRawSize()) {
|
||||||
#if BUILDFLAG(PUT_REF_COUNT_IN_PREVIOUS_SLOT) && BUILDFLAG(PA_DCHECK_IS_ON)
|
#if BUILDFLAG(PUT_REF_COUNT_IN_PREVIOUS_SLOT) && BUILDFLAG(PA_DCHECK_IS_ON)
|
||||||
|
uintptr_t slot_start = ObjectToSlotStart(ptr);
|
||||||
internal::PartitionRefCount* old_ref_count;
|
internal::PartitionRefCount* old_ref_count;
|
||||||
if (brp_enabled()) {
|
if (brp_enabled()) {
|
||||||
old_ref_count = internal::PartitionRefCountPointer(slot_start);
|
old_ref_count = internal::PartitionRefCountPointer(slot_start);
|
||||||
@ -972,12 +972,13 @@ bool PartitionRoot<thread_safe>::TryReallocInPlaceForNormalBuckets(
|
|||||||
// Write a new trailing cookie only when it is possible to keep track
|
// Write a new trailing cookie only when it is possible to keep track
|
||||||
// raw size (otherwise we wouldn't know where to look for it later).
|
// raw size (otherwise we wouldn't know where to look for it later).
|
||||||
if (flags.allow_cookie) {
|
if (flags.allow_cookie) {
|
||||||
internal::PartitionCookieWriteValue(static_cast<unsigned char*>(object) +
|
internal::PartitionCookieWriteValue(
|
||||||
|
reinterpret_cast<unsigned char*>(address) +
|
||||||
slot_span->GetUsableSize(this));
|
slot_span->GetUsableSize(this));
|
||||||
}
|
}
|
||||||
#endif // BUILDFLAG(PA_DCHECK_IS_ON)
|
#endif // BUILDFLAG(PA_DCHECK_IS_ON)
|
||||||
}
|
}
|
||||||
return object;
|
return ptr;
|
||||||
}
|
}
|
||||||
|
|
||||||
template <bool thread_safe>
|
template <bool thread_safe>
|
||||||
@ -1175,12 +1176,6 @@ void PartitionRoot<thread_safe>::DumpStats(const char* partition_name,
|
|||||||
total_size_of_brp_quarantined_bytes.load(std::memory_order_relaxed);
|
total_size_of_brp_quarantined_bytes.load(std::memory_order_relaxed);
|
||||||
stats.total_brp_quarantined_count =
|
stats.total_brp_quarantined_count =
|
||||||
total_count_of_brp_quarantined_slots.load(std::memory_order_relaxed);
|
total_count_of_brp_quarantined_slots.load(std::memory_order_relaxed);
|
||||||
stats.cumulative_brp_quarantined_bytes =
|
|
||||||
cumulative_size_of_brp_quarantined_bytes.load(
|
|
||||||
std::memory_order_relaxed);
|
|
||||||
stats.cumulative_brp_quarantined_count =
|
|
||||||
cumulative_count_of_brp_quarantined_slots.load(
|
|
||||||
std::memory_order_relaxed);
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
size_t direct_mapped_allocations_total_size = 0;
|
size_t direct_mapped_allocations_total_size = 0;
|
||||||
|
@ -83,14 +83,6 @@
|
|||||||
|
|
||||||
namespace partition_alloc::internal {
|
namespace partition_alloc::internal {
|
||||||
|
|
||||||
// This type trait verifies a type can be used as a pointer offset.
|
|
||||||
//
|
|
||||||
// We support pointer offsets in signed (ptrdiff_t) or unsigned (size_t) values.
|
|
||||||
// Smaller types are also allowed.
|
|
||||||
template <typename Z>
|
|
||||||
static constexpr bool offset_type =
|
|
||||||
std::is_integral_v<Z> && sizeof(Z) <= sizeof(ptrdiff_t);
|
|
||||||
|
|
||||||
static constexpr size_t kAllocInfoSize = 1 << 20;
|
static constexpr size_t kAllocInfoSize = 1 << 20;
|
||||||
|
|
||||||
struct AllocInfo {
|
struct AllocInfo {
|
||||||
@ -179,11 +171,6 @@ struct PartitionOptions {
|
|||||||
kEnabled,
|
kEnabled,
|
||||||
};
|
};
|
||||||
|
|
||||||
enum class BackupRefPtrZapping : uint8_t {
|
|
||||||
kDisabled,
|
|
||||||
kEnabled,
|
|
||||||
};
|
|
||||||
|
|
||||||
enum class UseConfigurablePool : uint8_t {
|
enum class UseConfigurablePool : uint8_t {
|
||||||
kNo,
|
kNo,
|
||||||
kIfAvailable,
|
kIfAvailable,
|
||||||
@ -195,14 +182,12 @@ struct PartitionOptions {
|
|||||||
Quarantine quarantine,
|
Quarantine quarantine,
|
||||||
Cookie cookie,
|
Cookie cookie,
|
||||||
BackupRefPtr backup_ref_ptr,
|
BackupRefPtr backup_ref_ptr,
|
||||||
BackupRefPtrZapping backup_ref_ptr_zapping,
|
|
||||||
UseConfigurablePool use_configurable_pool)
|
UseConfigurablePool use_configurable_pool)
|
||||||
: aligned_alloc(aligned_alloc),
|
: aligned_alloc(aligned_alloc),
|
||||||
thread_cache(thread_cache),
|
thread_cache(thread_cache),
|
||||||
quarantine(quarantine),
|
quarantine(quarantine),
|
||||||
cookie(cookie),
|
cookie(cookie),
|
||||||
backup_ref_ptr(backup_ref_ptr),
|
backup_ref_ptr(backup_ref_ptr),
|
||||||
backup_ref_ptr_zapping(backup_ref_ptr_zapping),
|
|
||||||
use_configurable_pool(use_configurable_pool) {}
|
use_configurable_pool(use_configurable_pool) {}
|
||||||
|
|
||||||
AlignedAlloc aligned_alloc;
|
AlignedAlloc aligned_alloc;
|
||||||
@ -210,7 +195,6 @@ struct PartitionOptions {
|
|||||||
Quarantine quarantine;
|
Quarantine quarantine;
|
||||||
Cookie cookie;
|
Cookie cookie;
|
||||||
BackupRefPtr backup_ref_ptr;
|
BackupRefPtr backup_ref_ptr;
|
||||||
BackupRefPtrZapping backup_ref_ptr_zapping;
|
|
||||||
UseConfigurablePool use_configurable_pool;
|
UseConfigurablePool use_configurable_pool;
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -257,7 +241,6 @@ struct PA_ALIGNAS(64) PA_COMPONENT_EXPORT(PARTITION_ALLOC) PartitionRoot {
|
|||||||
bool allow_cookie;
|
bool allow_cookie;
|
||||||
#if BUILDFLAG(USE_BACKUP_REF_PTR)
|
#if BUILDFLAG(USE_BACKUP_REF_PTR)
|
||||||
bool brp_enabled_;
|
bool brp_enabled_;
|
||||||
bool brp_zapping_enabled_;
|
|
||||||
#endif
|
#endif
|
||||||
bool use_configurable_pool;
|
bool use_configurable_pool;
|
||||||
|
|
||||||
@ -322,8 +305,6 @@ struct PA_ALIGNAS(64) PA_COMPONENT_EXPORT(PARTITION_ALLOC) PartitionRoot {
|
|||||||
#if BUILDFLAG(USE_BACKUP_REF_PTR)
|
#if BUILDFLAG(USE_BACKUP_REF_PTR)
|
||||||
std::atomic<size_t> total_size_of_brp_quarantined_bytes{0};
|
std::atomic<size_t> total_size_of_brp_quarantined_bytes{0};
|
||||||
std::atomic<size_t> total_count_of_brp_quarantined_slots{0};
|
std::atomic<size_t> total_count_of_brp_quarantined_slots{0};
|
||||||
std::atomic<size_t> cumulative_size_of_brp_quarantined_bytes{0};
|
|
||||||
std::atomic<size_t> cumulative_count_of_brp_quarantined_slots{0};
|
|
||||||
#endif
|
#endif
|
||||||
// Slot span memory which has been provisioned, and is currently unused as
|
// Slot span memory which has been provisioned, and is currently unused as
|
||||||
// it's part of an empty SlotSpan. This is not clean memory, since it has
|
// it's part of an empty SlotSpan. This is not clean memory, since it has
|
||||||
@ -714,21 +695,32 @@ struct PA_ALIGNAS(64) PA_COMPONENT_EXPORT(PARTITION_ALLOC) PartitionRoot {
|
|||||||
return size - flags.extras_size;
|
return size - flags.extras_size;
|
||||||
}
|
}
|
||||||
|
|
||||||
PA_ALWAYS_INLINE uintptr_t SlotStartToObjectAddr(uintptr_t slot_start) const {
|
|
||||||
// TODO(bartekn): Check that |slot_start| is indeed a slot start.
|
|
||||||
return slot_start + flags.extras_offset;
|
|
||||||
}
|
|
||||||
|
|
||||||
PA_ALWAYS_INLINE void* SlotStartToObject(uintptr_t slot_start) const {
|
PA_ALWAYS_INLINE void* SlotStartToObject(uintptr_t slot_start) const {
|
||||||
|
// TODO(bartekn): Move MTE tagging here.
|
||||||
// TODO(bartekn): Check that |slot_start| is indeed a slot start.
|
// TODO(bartekn): Check that |slot_start| is indeed a slot start.
|
||||||
return internal::TagAddr(SlotStartToObjectAddr(slot_start));
|
return reinterpret_cast<void*>(slot_start + flags.extras_offset);
|
||||||
}
|
}
|
||||||
|
|
||||||
PA_ALWAYS_INLINE uintptr_t ObjectToSlotStart(void* object) const {
|
PA_ALWAYS_INLINE uintptr_t ObjectToSlotStart(void* object) const {
|
||||||
return UntagPtr(object) - flags.extras_offset;
|
// TODO(bartekn): Move MTE untagging here.
|
||||||
|
return reinterpret_cast<uintptr_t>(object) - flags.extras_offset;
|
||||||
// TODO(bartekn): Check that the result is indeed a slot start.
|
// TODO(bartekn): Check that the result is indeed a slot start.
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static PA_ALWAYS_INLINE uintptr_t ObjectInnerPtr2Addr(void* object) {
|
||||||
|
// TODO(bartekn): Add MTE untagging here.
|
||||||
|
return reinterpret_cast<uintptr_t>(object);
|
||||||
|
}
|
||||||
|
static PA_ALWAYS_INLINE uintptr_t ObjectPtr2Addr(void* object) {
|
||||||
|
// TODO(bartekn): Check that |object| is indeed an object start.
|
||||||
|
return ObjectInnerPtr2Addr(object);
|
||||||
|
}
|
||||||
|
static PA_ALWAYS_INLINE void* SlotStartAddr2Ptr(uintptr_t slot_start) {
|
||||||
|
// TODO(bartekn): Move MTE tagging here.
|
||||||
|
// TODO(bartekn): Check that |slot_start| is indeed a slot start.
|
||||||
|
return reinterpret_cast<void*>(slot_start);
|
||||||
|
}
|
||||||
|
|
||||||
bool brp_enabled() const {
|
bool brp_enabled() const {
|
||||||
#if BUILDFLAG(USE_BACKUP_REF_PTR)
|
#if BUILDFLAG(USE_BACKUP_REF_PTR)
|
||||||
return flags.brp_enabled_;
|
return flags.brp_enabled_;
|
||||||
@ -737,14 +729,6 @@ struct PA_ALIGNAS(64) PA_COMPONENT_EXPORT(PARTITION_ALLOC) PartitionRoot {
|
|||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
bool brp_zapping_enabled() const {
|
|
||||||
#if BUILDFLAG(USE_BACKUP_REF_PTR)
|
|
||||||
return flags.brp_zapping_enabled_;
|
|
||||||
#else
|
|
||||||
return false;
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
|
|
||||||
PA_ALWAYS_INLINE bool uses_configurable_pool() const {
|
PA_ALWAYS_INLINE bool uses_configurable_pool() const {
|
||||||
return flags.use_configurable_pool;
|
return flags.use_configurable_pool;
|
||||||
}
|
}
|
||||||
@ -810,7 +794,7 @@ struct PA_ALIGNAS(64) PA_COMPONENT_EXPORT(PARTITION_ALLOC) PartitionRoot {
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Allocates a memory slot, without initializing extras.
|
// Allocates memory, without initializing extras.
|
||||||
//
|
//
|
||||||
// - |flags| are as in AllocWithFlags().
|
// - |flags| are as in AllocWithFlags().
|
||||||
// - |raw_size| accommodates for extras on top of AllocWithFlags()'s
|
// - |raw_size| accommodates for extras on top of AllocWithFlags()'s
|
||||||
@ -831,7 +815,7 @@ struct PA_ALIGNAS(64) PA_COMPONENT_EXPORT(PARTITION_ALLOC) PartitionRoot {
|
|||||||
bool* is_already_zeroed)
|
bool* is_already_zeroed)
|
||||||
PA_EXCLUSIVE_LOCKS_REQUIRED(lock_);
|
PA_EXCLUSIVE_LOCKS_REQUIRED(lock_);
|
||||||
|
|
||||||
bool TryReallocInPlaceForNormalBuckets(void* object,
|
bool TryReallocInPlaceForNormalBuckets(void* ptr,
|
||||||
SlotSpan* slot_span,
|
SlotSpan* slot_span,
|
||||||
size_t new_size);
|
size_t new_size);
|
||||||
bool TryReallocInPlaceForDirectMap(
|
bool TryReallocInPlaceForDirectMap(
|
||||||
@ -914,8 +898,7 @@ PartitionAllocGetDirectMapSlotStartInBRPPool(uintptr_t address) {
|
|||||||
PartitionDirectMapMetadata<ThreadSafe>::FromSlotSpan(slot_span);
|
PartitionDirectMapMetadata<ThreadSafe>::FromSlotSpan(slot_span);
|
||||||
size_t padding_for_alignment =
|
size_t padding_for_alignment =
|
||||||
metadata->direct_map_extent.padding_for_alignment;
|
metadata->direct_map_extent.padding_for_alignment;
|
||||||
PA_DCHECK(padding_for_alignment ==
|
PA_DCHECK(padding_for_alignment == (page - first_page) * PartitionPageSize());
|
||||||
static_cast<size_t>(page - first_page) * PartitionPageSize());
|
|
||||||
PA_DCHECK(slot_start ==
|
PA_DCHECK(slot_start ==
|
||||||
reservation_start + PartitionPageSize() + padding_for_alignment);
|
reservation_start + PartitionPageSize() + padding_for_alignment);
|
||||||
#endif // BUILDFLAG(PA_DCHECK_IS_ON)
|
#endif // BUILDFLAG(PA_DCHECK_IS_ON)
|
||||||
@ -931,6 +914,8 @@ PartitionAllocGetDirectMapSlotStartInBRPPool(uintptr_t address) {
|
|||||||
// ref-count is in place for this allocation.
|
// ref-count is in place for this allocation.
|
||||||
PA_ALWAYS_INLINE uintptr_t
|
PA_ALWAYS_INLINE uintptr_t
|
||||||
PartitionAllocGetSlotStartInBRPPool(uintptr_t address) {
|
PartitionAllocGetSlotStartInBRPPool(uintptr_t address) {
|
||||||
|
address = ::partition_alloc::internal::UnmaskPtr(address);
|
||||||
|
|
||||||
// Adjust to support pointers right past the end of an allocation, which in
|
// Adjust to support pointers right past the end of an allocation, which in
|
||||||
// some cases appear to point outside the designated allocation slot.
|
// some cases appear to point outside the designated allocation slot.
|
||||||
//
|
//
|
||||||
@ -955,11 +940,14 @@ PartitionAllocGetSlotStartInBRPPool(uintptr_t address) {
|
|||||||
// Get the offset from the beginning of the slot span.
|
// Get the offset from the beginning of the slot span.
|
||||||
uintptr_t slot_span_start =
|
uintptr_t slot_span_start =
|
||||||
SlotSpanMetadata<ThreadSafe>::ToSlotSpanStart(slot_span);
|
SlotSpanMetadata<ThreadSafe>::ToSlotSpanStart(slot_span);
|
||||||
|
PA_DCHECK(slot_span_start ==
|
||||||
|
::partition_alloc::internal::UnmaskPtr(slot_span_start));
|
||||||
size_t offset_in_slot_span = address - slot_span_start;
|
size_t offset_in_slot_span = address - slot_span_start;
|
||||||
|
|
||||||
auto* bucket = slot_span->bucket;
|
auto* bucket = slot_span->bucket;
|
||||||
return slot_span_start +
|
return ::partition_alloc::internal::RemaskPtr(
|
||||||
bucket->slot_size * bucket->GetSlotNumber(offset_in_slot_span);
|
slot_span_start +
|
||||||
|
bucket->slot_size * bucket->GetSlotNumber(offset_in_slot_span));
|
||||||
}
|
}
|
||||||
|
|
||||||
// Checks whether a given address stays within the same allocation slot after
|
// Checks whether a given address stays within the same allocation slot after
|
||||||
@ -967,9 +955,8 @@ PartitionAllocGetSlotStartInBRPPool(uintptr_t address) {
|
|||||||
//
|
//
|
||||||
// This isn't a general purpose function. The caller is responsible for ensuring
|
// This isn't a general purpose function. The caller is responsible for ensuring
|
||||||
// that the ref-count is in place for this allocation.
|
// that the ref-count is in place for this allocation.
|
||||||
template <typename Z, typename = std::enable_if_t<offset_type<Z>, void>>
|
|
||||||
PA_ALWAYS_INLINE bool PartitionAllocIsValidPtrDelta(uintptr_t address,
|
PA_ALWAYS_INLINE bool PartitionAllocIsValidPtrDelta(uintptr_t address,
|
||||||
Z delta_in_bytes) {
|
ptrdiff_t delta_in_bytes) {
|
||||||
// Required for pointers right past an allocation. See
|
// Required for pointers right past an allocation. See
|
||||||
// |PartitionAllocGetSlotStartInBRPPool()|.
|
// |PartitionAllocGetSlotStartInBRPPool()|.
|
||||||
uintptr_t adjusted_address = address - kPartitionPastAllocationAdjustment;
|
uintptr_t adjusted_address = address - kPartitionPastAllocationAdjustment;
|
||||||
@ -987,10 +974,11 @@ PA_ALWAYS_INLINE bool PartitionAllocIsValidPtrDelta(uintptr_t address,
|
|||||||
// Double check that ref-count is indeed present.
|
// Double check that ref-count is indeed present.
|
||||||
PA_DCHECK(root->brp_enabled());
|
PA_DCHECK(root->brp_enabled());
|
||||||
|
|
||||||
uintptr_t object_addr = root->SlotStartToObjectAddr(slot_start);
|
void* object = root->SlotStartToObject(slot_start);
|
||||||
uintptr_t new_address = address + static_cast<uintptr_t>(delta_in_bytes);
|
uintptr_t object_addr = PartitionRoot<ThreadSafe>::ObjectPtr2Addr(object);
|
||||||
|
uintptr_t new_address = address + delta_in_bytes;
|
||||||
return object_addr <= new_address &&
|
return object_addr <= new_address &&
|
||||||
// We use "greater than or equal" below because we want to include
|
// We use "greater then or equal" below because we want to include
|
||||||
// pointers right past the end of an allocation.
|
// pointers right past the end of an allocation.
|
||||||
new_address <= object_addr + slot_span->GetUsableSize(root);
|
new_address <= object_addr + slot_span->GetUsableSize(root);
|
||||||
}
|
}
|
||||||
@ -1006,7 +994,7 @@ PA_ALWAYS_INLINE void PartitionAllocFreeForRefCounting(uintptr_t slot_start) {
|
|||||||
|
|
||||||
// memset() can be really expensive.
|
// memset() can be really expensive.
|
||||||
#if BUILDFLAG(PA_EXPENSIVE_DCHECKS_ARE_ON)
|
#if BUILDFLAG(PA_EXPENSIVE_DCHECKS_ARE_ON)
|
||||||
DebugMemset(SlotStartAddr2Ptr(slot_start), kFreedByte,
|
DebugMemset(reinterpret_cast<void*>(slot_start), kFreedByte,
|
||||||
slot_span->GetUtilizedSlotSize()
|
slot_span->GetUtilizedSlotSize()
|
||||||
#if BUILDFLAG(PUT_REF_COUNT_IN_PREVIOUS_SLOT)
|
#if BUILDFLAG(PUT_REF_COUNT_IN_PREVIOUS_SLOT)
|
||||||
- sizeof(PartitionRefCount)
|
- sizeof(PartitionRefCount)
|
||||||
@ -1033,8 +1021,9 @@ PartitionRoot<thread_safe>::AllocFromBucket(Bucket* bucket,
|
|||||||
size_t slot_span_alignment,
|
size_t slot_span_alignment,
|
||||||
size_t* usable_size,
|
size_t* usable_size,
|
||||||
bool* is_already_zeroed) {
|
bool* is_already_zeroed) {
|
||||||
PA_DCHECK((slot_span_alignment >= internal::PartitionPageSize()) &&
|
PA_DCHECK(
|
||||||
internal::base::bits::IsPowerOfTwo(slot_span_alignment));
|
(slot_span_alignment >= internal::PartitionPageSize()) &&
|
||||||
|
partition_alloc::internal::base::bits::IsPowerOfTwo(slot_span_alignment));
|
||||||
SlotSpan* slot_span = bucket->active_slot_spans_head;
|
SlotSpan* slot_span = bucket->active_slot_spans_head;
|
||||||
// There always must be a slot span on the active list (could be a sentinel).
|
// There always must be a slot span on the active list (could be a sentinel).
|
||||||
PA_DCHECK(slot_span);
|
PA_DCHECK(slot_span);
|
||||||
@ -1043,7 +1032,7 @@ PartitionRoot<thread_safe>::AllocFromBucket(Bucket* bucket,
|
|||||||
PA_DCHECK(!slot_span->marked_full);
|
PA_DCHECK(!slot_span->marked_full);
|
||||||
|
|
||||||
uintptr_t slot_start =
|
uintptr_t slot_start =
|
||||||
internal::SlotStartPtr2Addr(slot_span->get_freelist_head());
|
reinterpret_cast<uintptr_t>(slot_span->get_freelist_head());
|
||||||
// Use the fast path when a slot is readily available on the free list of the
|
// Use the fast path when a slot is readily available on the free list of the
|
||||||
// first active slot span. However, fall back to the slow path if a
|
// first active slot span. However, fall back to the slow path if a
|
||||||
// higher-order alignment is requested, because an inner slot of an existing
|
// higher-order alignment is requested, because an inner slot of an existing
|
||||||
@ -1065,7 +1054,7 @@ PartitionRoot<thread_safe>::AllocFromBucket(Bucket* bucket,
|
|||||||
PA_DCHECK(!slot_span->CanStoreRawSize());
|
PA_DCHECK(!slot_span->CanStoreRawSize());
|
||||||
PA_DCHECK(!slot_span->bucket->is_direct_mapped());
|
PA_DCHECK(!slot_span->bucket->is_direct_mapped());
|
||||||
void* entry = slot_span->PopForAlloc(bucket->slot_size);
|
void* entry = slot_span->PopForAlloc(bucket->slot_size);
|
||||||
PA_DCHECK(internal::SlotStartPtr2Addr(entry) == slot_start);
|
PA_DCHECK(reinterpret_cast<uintptr_t>(entry) == slot_start);
|
||||||
|
|
||||||
PA_DCHECK(slot_span->bucket == bucket);
|
PA_DCHECK(slot_span->bucket == bucket);
|
||||||
} else {
|
} else {
|
||||||
@ -1129,7 +1118,7 @@ PA_ALWAYS_INLINE void PartitionRoot<thread_safe>::FreeNoHooks(void* object) {
|
|||||||
// only cases where we don't would be delayed free() in PCScan, but |*object|
|
// only cases where we don't would be delayed free() in PCScan, but |*object|
|
||||||
// can be cold in cache.
|
// can be cold in cache.
|
||||||
PA_PREFETCH(object);
|
PA_PREFETCH(object);
|
||||||
uintptr_t object_addr = internal::ObjectPtr2Addr(object);
|
uintptr_t object_addr = ObjectPtr2Addr(object);
|
||||||
|
|
||||||
// On Android, malloc() interception is more fragile than on other
|
// On Android, malloc() interception is more fragile than on other
|
||||||
// platforms, as we use wrapped symbols. However, the GigaCage allows us to
|
// platforms, as we use wrapped symbols. However, the GigaCage allows us to
|
||||||
@ -1165,10 +1154,12 @@ PA_ALWAYS_INLINE void PartitionRoot<thread_safe>::FreeNoHooks(void* object) {
|
|||||||
#if defined(PA_HAS_MEMORY_TAGGING)
|
#if defined(PA_HAS_MEMORY_TAGGING)
|
||||||
const size_t slot_size = slot_span->bucket->slot_size;
|
const size_t slot_size = slot_span->bucket->slot_size;
|
||||||
if (PA_LIKELY(slot_size <= internal::kMaxMemoryTaggingSize)) {
|
if (PA_LIKELY(slot_size <= internal::kMaxMemoryTaggingSize)) {
|
||||||
internal::TagMemoryRangeIncrement(slot_start, slot_size);
|
// TODO(bartekn): |slot_start| shouldn't have MTE tag.
|
||||||
|
slot_start = ::partition_alloc::internal::TagMemoryRangeIncrement(
|
||||||
|
slot_start, slot_size);
|
||||||
// Incrementing the MTE-tag in the memory range invalidates the |object|'s
|
// Incrementing the MTE-tag in the memory range invalidates the |object|'s
|
||||||
// tag, so it must be retagged.
|
// tag, so it must be retagged.
|
||||||
object = internal::TagPtr(object);
|
object = ::partition_alloc::internal::RemaskPtr(object);
|
||||||
}
|
}
|
||||||
#else
|
#else
|
||||||
// We are going to read from |*slot_span| in all branches, but haven't done it
|
// We are going to read from |*slot_span| in all branches, but haven't done it
|
||||||
@ -1252,7 +1243,8 @@ PA_ALWAYS_INLINE void PartitionRoot<thread_safe>::FreeNoHooksImmediate(
|
|||||||
if (flags.allow_cookie) {
|
if (flags.allow_cookie) {
|
||||||
// Verify the cookie after the allocated region.
|
// Verify the cookie after the allocated region.
|
||||||
// If this assert fires, you probably corrupted memory.
|
// If this assert fires, you probably corrupted memory.
|
||||||
internal::PartitionCookieCheckValue(static_cast<unsigned char*>(object) +
|
internal::PartitionCookieCheckValue(
|
||||||
|
reinterpret_cast<unsigned char*>(object) +
|
||||||
slot_span->GetUsableSize(this));
|
slot_span->GetUsableSize(this));
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
@ -1261,8 +1253,11 @@ PA_ALWAYS_INLINE void PartitionRoot<thread_safe>::FreeNoHooksImmediate(
|
|||||||
// default.
|
// default.
|
||||||
if (PA_UNLIKELY(IsQuarantineEnabled())) {
|
if (PA_UNLIKELY(IsQuarantineEnabled())) {
|
||||||
if (PA_LIKELY(internal::IsManagedByNormalBuckets(slot_start))) {
|
if (PA_LIKELY(internal::IsManagedByNormalBuckets(slot_start))) {
|
||||||
|
uintptr_t unmasked_slot_start =
|
||||||
|
::partition_alloc::internal::UnmaskPtr(slot_start);
|
||||||
// Mark the state in the state bitmap as freed.
|
// Mark the state in the state bitmap as freed.
|
||||||
internal::StateBitmapFromAddr(slot_start)->Free(slot_start);
|
internal::StateBitmapFromAddr(unmasked_slot_start)
|
||||||
|
->Free(unmasked_slot_start);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1274,8 +1269,7 @@ PA_ALWAYS_INLINE void PartitionRoot<thread_safe>::FreeNoHooksImmediate(
|
|||||||
// If there are no more references to the allocation, it can be freed
|
// If there are no more references to the allocation, it can be freed
|
||||||
// immediately. Otherwise, defer the operation and zap the memory to turn
|
// immediately. Otherwise, defer the operation and zap the memory to turn
|
||||||
// potential use-after-free issues into unexploitable crashes.
|
// potential use-after-free issues into unexploitable crashes.
|
||||||
if (PA_UNLIKELY(!ref_count->IsAliveWithNoKnownRefs() &&
|
if (PA_UNLIKELY(!ref_count->IsAliveWithNoKnownRefs()))
|
||||||
brp_zapping_enabled()))
|
|
||||||
internal::SecureMemset(object, internal::kQuarantinedByte,
|
internal::SecureMemset(object, internal::kQuarantinedByte,
|
||||||
slot_span->GetUsableSize(this));
|
slot_span->GetUsableSize(this));
|
||||||
|
|
||||||
@ -1284,10 +1278,6 @@ PA_ALWAYS_INLINE void PartitionRoot<thread_safe>::FreeNoHooksImmediate(
|
|||||||
slot_span->GetSlotSizeForBookkeeping(), std::memory_order_relaxed);
|
slot_span->GetSlotSizeForBookkeeping(), std::memory_order_relaxed);
|
||||||
total_count_of_brp_quarantined_slots.fetch_add(1,
|
total_count_of_brp_quarantined_slots.fetch_add(1,
|
||||||
std::memory_order_relaxed);
|
std::memory_order_relaxed);
|
||||||
cumulative_size_of_brp_quarantined_bytes.fetch_add(
|
|
||||||
slot_span->GetSlotSizeForBookkeeping(), std::memory_order_relaxed);
|
|
||||||
cumulative_count_of_brp_quarantined_slots.fetch_add(
|
|
||||||
1, std::memory_order_relaxed);
|
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -1295,8 +1285,7 @@ PA_ALWAYS_INLINE void PartitionRoot<thread_safe>::FreeNoHooksImmediate(
|
|||||||
|
|
||||||
// memset() can be really expensive.
|
// memset() can be really expensive.
|
||||||
#if BUILDFLAG(PA_EXPENSIVE_DCHECKS_ARE_ON)
|
#if BUILDFLAG(PA_EXPENSIVE_DCHECKS_ARE_ON)
|
||||||
internal::DebugMemset(internal::SlotStartAddr2Ptr(slot_start),
|
internal::DebugMemset(SlotStartAddr2Ptr(slot_start), internal::kFreedByte,
|
||||||
internal::kFreedByte,
|
|
||||||
slot_span->GetUtilizedSlotSize()
|
slot_span->GetUtilizedSlotSize()
|
||||||
#if BUILDFLAG(PUT_REF_COUNT_IN_PREVIOUS_SLOT)
|
#if BUILDFLAG(PUT_REF_COUNT_IN_PREVIOUS_SLOT)
|
||||||
- sizeof(internal::PartitionRefCount)
|
- sizeof(internal::PartitionRefCount)
|
||||||
@ -1307,7 +1296,7 @@ PA_ALWAYS_INLINE void PartitionRoot<thread_safe>::FreeNoHooksImmediate(
|
|||||||
// efficiency.
|
// efficiency.
|
||||||
if (PA_UNLIKELY(internal::RandomPeriod()) &&
|
if (PA_UNLIKELY(internal::RandomPeriod()) &&
|
||||||
!IsDirectMappedBucket(slot_span->bucket)) {
|
!IsDirectMappedBucket(slot_span->bucket)) {
|
||||||
internal::SecureMemset(internal::SlotStartAddr2Ptr(slot_start), 0,
|
internal::SecureMemset(SlotStartAddr2Ptr(slot_start), 0,
|
||||||
slot_span->GetUtilizedSlotSize()
|
slot_span->GetUtilizedSlotSize()
|
||||||
#if BUILDFLAG(PUT_REF_COUNT_IN_PREVIOUS_SLOT)
|
#if BUILDFLAG(PUT_REF_COUNT_IN_PREVIOUS_SLOT)
|
||||||
- sizeof(internal::PartitionRefCount)
|
- sizeof(internal::PartitionRefCount)
|
||||||
@ -1361,8 +1350,7 @@ PA_ALWAYS_INLINE void PartitionRoot<thread_safe>::RawFree(uintptr_t slot_start,
|
|||||||
// RawFreeLocked()). This is intentional, as the thread cache is purged often,
|
// RawFreeLocked()). This is intentional, as the thread cache is purged often,
|
||||||
// and the memory has a consequence the memory has already been touched
|
// and the memory has a consequence the memory has already been touched
|
||||||
// recently (to link the thread cache freelist).
|
// recently (to link the thread cache freelist).
|
||||||
*static_cast<volatile uintptr_t*>(internal::SlotStartAddr2Ptr(slot_start)) =
|
*reinterpret_cast<volatile uintptr_t*>(slot_start) = 0;
|
||||||
0;
|
|
||||||
// Note: even though we write to slot_start + sizeof(void*) as well, due to
|
// Note: even though we write to slot_start + sizeof(void*) as well, due to
|
||||||
// alignment constraints, the two locations are always going to be in the same
|
// alignment constraints, the two locations are always going to be in the same
|
||||||
// OS page. No need to write to the second one as well.
|
// OS page. No need to write to the second one as well.
|
||||||
@ -1430,6 +1418,7 @@ PA_ALWAYS_INLINE void PartitionRoot<thread_safe>::RawFreeLocked(
|
|||||||
template <bool thread_safe>
|
template <bool thread_safe>
|
||||||
PA_ALWAYS_INLINE bool PartitionRoot<thread_safe>::IsValidSlotSpan(
|
PA_ALWAYS_INLINE bool PartitionRoot<thread_safe>::IsValidSlotSpan(
|
||||||
SlotSpan* slot_span) {
|
SlotSpan* slot_span) {
|
||||||
|
slot_span = ::partition_alloc::internal::UnmaskPtr(slot_span);
|
||||||
PartitionRoot* root = FromSlotSpan(slot_span);
|
PartitionRoot* root = FromSlotSpan(slot_span);
|
||||||
return root->inverted_self == ~reinterpret_cast<uintptr_t>(root);
|
return root->inverted_self == ~reinterpret_cast<uintptr_t>(root);
|
||||||
}
|
}
|
||||||
@ -1861,8 +1850,11 @@ PA_ALWAYS_INLINE void* PartitionRoot<thread_safe>::AllocWithFlagsNoHooks(
|
|||||||
// default.
|
// default.
|
||||||
if (PA_UNLIKELY(is_quarantine_enabled)) {
|
if (PA_UNLIKELY(is_quarantine_enabled)) {
|
||||||
if (PA_LIKELY(internal::IsManagedByNormalBuckets(slot_start))) {
|
if (PA_LIKELY(internal::IsManagedByNormalBuckets(slot_start))) {
|
||||||
|
uintptr_t unmasked_slot_start =
|
||||||
|
::partition_alloc::internal::UnmaskPtr(slot_start);
|
||||||
// Mark the corresponding bits in the state bitmap as allocated.
|
// Mark the corresponding bits in the state bitmap as allocated.
|
||||||
internal::StateBitmapFromAddr(slot_start)->Allocate(slot_start);
|
internal::StateBitmapFromAddr(unmasked_slot_start)
|
||||||
|
->Allocate(unmasked_slot_start);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1965,7 +1957,8 @@ PA_ALWAYS_INLINE void* PartitionRoot<thread_safe>::AlignedAllocWithFlags(
|
|||||||
// |alignment| is a power of two, but the compiler doesn't necessarily know
|
// |alignment| is a power of two, but the compiler doesn't necessarily know
|
||||||
// that. A regular % operation is very slow, make sure to use the equivalent,
|
// that. A regular % operation is very slow, make sure to use the equivalent,
|
||||||
// faster form.
|
// faster form.
|
||||||
// No need to MTE-untag, as it doesn't change alignment.
|
// No need to call ObjectPtr2Addr, because MTE untagging isn't necessary, as
|
||||||
|
// it doesn't change alignment.
|
||||||
PA_CHECK(!(reinterpret_cast<uintptr_t>(object) & (alignment - 1)));
|
PA_CHECK(!(reinterpret_cast<uintptr_t>(object) & (alignment - 1)));
|
||||||
|
|
||||||
return object;
|
return object;
|
||||||
@ -2028,12 +2021,30 @@ using ThreadSafePartitionRoot = PartitionRoot<internal::ThreadSafe>;
|
|||||||
static_assert(offsetof(ThreadSafePartitionRoot, lock_) ==
|
static_assert(offsetof(ThreadSafePartitionRoot, lock_) ==
|
||||||
internal::kPartitionCachelineSize,
|
internal::kPartitionCachelineSize,
|
||||||
"Padding is incorrect");
|
"Padding is incorrect");
|
||||||
|
|
||||||
#if BUILDFLAG(USE_BACKUP_REF_PTR)
|
|
||||||
// Usage in `raw_ptr.cc` is notable enough to merit a non-internal alias.
|
|
||||||
using ::partition_alloc::internal::PartitionAllocGetSlotStartInBRPPool;
|
|
||||||
#endif // BUILDFLAG(USE_BACKUP_REF_PTR)
|
|
||||||
|
|
||||||
} // namespace partition_alloc
|
} // namespace partition_alloc
|
||||||
|
|
||||||
|
namespace base {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
using ::partition_alloc::PartitionOptions;
|
||||||
|
using ::partition_alloc::PurgeFlags;
|
||||||
|
using ::partition_alloc::ThreadSafePartitionRoot;
|
||||||
|
|
||||||
|
namespace internal {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
using ::partition_alloc::internal::ScopedSyscallTimer;
|
||||||
|
|
||||||
|
#if BUILDFLAG(USE_BACKUP_REF_PTR)
|
||||||
|
using ::partition_alloc::internal::PartitionAllocFreeForRefCounting;
|
||||||
|
using ::partition_alloc::internal::PartitionAllocGetSlotStartInBRPPool;
|
||||||
|
using ::partition_alloc::internal::PartitionAllocIsValidPtrDelta;
|
||||||
|
#endif // BUILDFLAG(USE_BACKUP_REF_PTR)
|
||||||
|
|
||||||
|
} // namespace internal
|
||||||
|
|
||||||
|
} // namespace base
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_ROOT_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_ROOT_H_
|
||||||
|
@ -59,10 +59,6 @@ struct PartitionMemoryStats {
|
|||||||
total_brp_quarantined_bytes; // Total bytes that are quarantined by BRP.
|
total_brp_quarantined_bytes; // Total bytes that are quarantined by BRP.
|
||||||
size_t total_brp_quarantined_count; // Total number of slots that are
|
size_t total_brp_quarantined_count; // Total number of slots that are
|
||||||
// quarantined by BRP.
|
// quarantined by BRP.
|
||||||
size_t cumulative_brp_quarantined_bytes; // Cumulative bytes that are
|
|
||||||
// quarantined by BRP.
|
|
||||||
size_t cumulative_brp_quarantined_count; // Cumulative number of slots that
|
|
||||||
// are quarantined by BRP.
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
bool has_thread_cache;
|
bool has_thread_cache;
|
||||||
@ -133,4 +129,16 @@ class PA_COMPONENT_EXPORT(PARTITION_ALLOC) SimplePartitionStatsDumper
|
|||||||
|
|
||||||
} // namespace partition_alloc
|
} // namespace partition_alloc
|
||||||
|
|
||||||
|
namespace base {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
using ::partition_alloc::PartitionBucketMemoryStats;
|
||||||
|
using ::partition_alloc::PartitionMemoryStats;
|
||||||
|
using ::partition_alloc::PartitionStatsDumper;
|
||||||
|
using ::partition_alloc::SimplePartitionStatsDumper;
|
||||||
|
using ::partition_alloc::ThreadCacheStats;
|
||||||
|
|
||||||
|
} // namespace base
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_STATS_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_STATS_H_
|
||||||
|
@ -48,15 +48,12 @@ PA_ALWAYS_INLINE PartitionTag* PartitionTagPointer(uintptr_t addr) {
|
|||||||
size_t offset_in_bitmap = offset_in_super_page >>
|
size_t offset_in_bitmap = offset_in_super_page >>
|
||||||
internal::tag_bitmap::kBytesPerPartitionTagShift
|
internal::tag_bitmap::kBytesPerPartitionTagShift
|
||||||
<< internal::tag_bitmap::kPartitionTagSizeShift;
|
<< internal::tag_bitmap::kPartitionTagSizeShift;
|
||||||
// No need to tag, as the tag bitmap region isn't protected by MTE.
|
|
||||||
return reinterpret_cast<PartitionTag*>(bitmap_base + offset_in_bitmap);
|
return reinterpret_cast<PartitionTag*>(bitmap_base + offset_in_bitmap);
|
||||||
}
|
}
|
||||||
|
|
||||||
PA_ALWAYS_INLINE PartitionTag* PartitionTagPointer(const void* ptr) {
|
PA_ALWAYS_INLINE PartitionTag* PartitionTagPointer(const void* ptr) {
|
||||||
// Disambiguation: UntagPtr relates to hwardware MTE, and it strips the tag
|
return PartitionTagPointer(
|
||||||
// from the pointer. Whereas, PartitionTagPointer relates to software MTE
|
internal::UnmaskPtr(reinterpret_cast<uintptr_t>(ptr)));
|
||||||
// (i.e. MTECheckedPtr) and it returns a pointer to the tag in memory.
|
|
||||||
return PartitionTagPointer(UntagPtr(ptr));
|
|
||||||
}
|
}
|
||||||
|
|
||||||
namespace internal {
|
namespace internal {
|
||||||
@ -78,10 +75,7 @@ PA_ALWAYS_INLINE void PartitionTagSetValue(uintptr_t addr,
|
|||||||
PA_ALWAYS_INLINE void PartitionTagSetValue(void* ptr,
|
PA_ALWAYS_INLINE void PartitionTagSetValue(void* ptr,
|
||||||
size_t size,
|
size_t size,
|
||||||
PartitionTag value) {
|
PartitionTag value) {
|
||||||
// Disambiguation: UntagPtr relates to hwardware MTE, and it strips the tag
|
PartitionTagSetValue(reinterpret_cast<uintptr_t>(ptr), size, value);
|
||||||
// from the pointer. Whereas, PartitionTagSetValue relates to software MTE
|
|
||||||
// (i.e. MTECheckedPtr) and it sets the in-memory tag.
|
|
||||||
PartitionTagSetValue(UntagPtr(ptr), size, value);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
PA_ALWAYS_INLINE PartitionTag PartitionTagGetValue(void* ptr) {
|
PA_ALWAYS_INLINE PartitionTag PartitionTagGetValue(void* ptr) {
|
||||||
|
@ -34,7 +34,7 @@ using PartitionTlsKey = pthread_key_t;
|
|||||||
#if BUILDFLAG(IS_MAC) && defined(ARCH_CPU_X86_64)
|
#if BUILDFLAG(IS_MAC) && defined(ARCH_CPU_X86_64)
|
||||||
namespace {
|
namespace {
|
||||||
|
|
||||||
PA_ALWAYS_INLINE void* FastTlsGet(PartitionTlsKey index) {
|
PA_ALWAYS_INLINE void* FastTlsGet(intptr_t index) {
|
||||||
// On macOS, pthread_getspecific() is in libSystem, so a call to it has to go
|
// On macOS, pthread_getspecific() is in libSystem, so a call to it has to go
|
||||||
// through PLT. However, and contrary to some other platforms, *all* TLS keys
|
// through PLT. However, and contrary to some other platforms, *all* TLS keys
|
||||||
// are in a static array in the thread structure. So they are *always* at a
|
// are in a static array in the thread structure. So they are *always* at a
|
||||||
@ -53,10 +53,7 @@ PA_ALWAYS_INLINE void* FastTlsGet(PartitionTlsKey index) {
|
|||||||
// This function is essentially inlining the content of pthread_getspecific()
|
// This function is essentially inlining the content of pthread_getspecific()
|
||||||
// here.
|
// here.
|
||||||
intptr_t result;
|
intptr_t result;
|
||||||
static_assert(sizeof index <= sizeof(intptr_t));
|
asm("movq %%gs:(,%1,8), %0;" : "=r"(result) : "r"(index));
|
||||||
asm("movq %%gs:(,%1,8), %0;"
|
|
||||||
: "=r"(result)
|
|
||||||
: "r"(static_cast<intptr_t>(index)));
|
|
||||||
|
|
||||||
return reinterpret_cast<void*>(result);
|
return reinterpret_cast<void*>(result);
|
||||||
}
|
}
|
||||||
@ -143,4 +140,18 @@ PA_ALWAYS_INLINE void PartitionTlsSet(PartitionTlsKey key, void* value) {
|
|||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
using ::partition_alloc::internal::PartitionTlsCreate;
|
||||||
|
using ::partition_alloc::internal::PartitionTlsGet;
|
||||||
|
using ::partition_alloc::internal::PartitionTlsKey;
|
||||||
|
using ::partition_alloc::internal::PartitionTlsSet;
|
||||||
|
#if BUILDFLAG(IS_WIN)
|
||||||
|
using ::partition_alloc::internal::PartitionTlsSetOnDllProcessDetach;
|
||||||
|
#endif // BUILDFLAG(IS_WIN)
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_TLS_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_PARTITION_TLS_H_
|
||||||
|
@ -146,6 +146,7 @@ PA_ALWAYS_INLINE const uint16_t* GetReservationOffsetTableEnd(
|
|||||||
PA_ALWAYS_INLINE uint16_t* ReservationOffsetPointer(uintptr_t address) {
|
PA_ALWAYS_INLINE uint16_t* ReservationOffsetPointer(uintptr_t address) {
|
||||||
#if defined(PA_HAS_64_BITS_POINTERS)
|
#if defined(PA_HAS_64_BITS_POINTERS)
|
||||||
// In 64-bit mode, find the owning Pool and compute the offset from its base.
|
// In 64-bit mode, find the owning Pool and compute the offset from its base.
|
||||||
|
address = ::partition_alloc::internal::UnmaskPtr(address);
|
||||||
auto [pool, offset] = GetPoolAndOffset(address);
|
auto [pool, offset] = GetPoolAndOffset(address);
|
||||||
return ReservationOffsetPointer(pool, offset);
|
return ReservationOffsetPointer(pool, offset);
|
||||||
#else
|
#else
|
||||||
@ -253,4 +254,21 @@ PA_ALWAYS_INLINE bool IsManagedByNormalBucketsOrDirectMap(uintptr_t address) {
|
|||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
using ::partition_alloc::internal::GetDirectMapReservationStart;
|
||||||
|
using ::partition_alloc::internal::GetReservationOffsetTable;
|
||||||
|
using ::partition_alloc::internal::GetReservationOffsetTableEnd;
|
||||||
|
using ::partition_alloc::internal::IsManagedByDirectMap;
|
||||||
|
using ::partition_alloc::internal::IsManagedByNormalBuckets;
|
||||||
|
using ::partition_alloc::internal::IsManagedByNormalBucketsOrDirectMap;
|
||||||
|
using ::partition_alloc::internal::IsReservationStart;
|
||||||
|
using ::partition_alloc::internal::kOffsetTagNormalBuckets;
|
||||||
|
using ::partition_alloc::internal::kOffsetTagNotAllocated;
|
||||||
|
using ::partition_alloc::internal::ReservationOffsetPointer;
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_RESERVATION_OFFSET_TABLE_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_RESERVATION_OFFSET_TABLE_H_
|
||||||
|
@ -17,7 +17,6 @@ constexpr PartitionOptions kConfig{
|
|||||||
PartitionOptions::Quarantine::kDisallowed,
|
PartitionOptions::Quarantine::kDisallowed,
|
||||||
PartitionOptions::Cookie::kAllowed,
|
PartitionOptions::Cookie::kAllowed,
|
||||||
PartitionOptions::BackupRefPtr::kDisabled,
|
PartitionOptions::BackupRefPtr::kDisabled,
|
||||||
PartitionOptions::BackupRefPtrZapping::kDisabled,
|
|
||||||
PartitionOptions::UseConfigurablePool::kNo,
|
PartitionOptions::UseConfigurablePool::kNo,
|
||||||
};
|
};
|
||||||
} // namespace
|
} // namespace
|
||||||
|
@ -80,4 +80,16 @@ struct PCScanMetadataDeleter final {
|
|||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
// TODO(crbug.com/1288247): Remove these when migration is complete.
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
using ::partition_alloc::internal::AllocatedOnPCScanMetadataPartition;
|
||||||
|
using ::partition_alloc::internal::MakePCScanMetadata;
|
||||||
|
using ::partition_alloc::internal::MetadataAllocator;
|
||||||
|
using ::partition_alloc::internal::PCScanMetadataAllocator;
|
||||||
|
using ::partition_alloc::internal::PCScanMetadataDeleter;
|
||||||
|
using ::partition_alloc::internal::ReinitPCScanMetadataAllocatorForTesting;
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_METADATA_ALLOCATOR_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_METADATA_ALLOCATOR_H_
|
||||||
|
@ -247,12 +247,15 @@ PA_ALWAYS_INLINE void PCScan::MoveToQuarantine(void* object,
|
|||||||
SecureMemset(object, 0, usable_size);
|
SecureMemset(object, 0, usable_size);
|
||||||
}
|
}
|
||||||
|
|
||||||
auto* state_bitmap = StateBitmapFromAddr(slot_start);
|
// TODO(bartekn): Remove MTE untagging, once its done in the caller.
|
||||||
|
uintptr_t unmasked_slot_start =
|
||||||
|
::partition_alloc::internal::UnmaskPtr(slot_start);
|
||||||
|
auto* state_bitmap = StateBitmapFromAddr(unmasked_slot_start);
|
||||||
|
|
||||||
// Mark the state in the state bitmap as quarantined. Make sure to do it after
|
// Mark the state in the state bitmap as quarantined. Make sure to do it after
|
||||||
// the clearing to avoid racing with *Scan Sweeper.
|
// the clearing to avoid racing with *Scan Sweeper.
|
||||||
[[maybe_unused]] const bool succeeded =
|
[[maybe_unused]] const bool succeeded =
|
||||||
state_bitmap->Quarantine(slot_start, instance.epoch());
|
state_bitmap->Quarantine(unmasked_slot_start, instance.epoch());
|
||||||
#if PA_STARSCAN_EAGER_DOUBLE_FREE_DETECTION_ENABLED
|
#if PA_STARSCAN_EAGER_DOUBLE_FREE_DETECTION_ENABLED
|
||||||
if (PA_UNLIKELY(!succeeded))
|
if (PA_UNLIKELY(!succeeded))
|
||||||
DoubleFreeAttempt();
|
DoubleFreeAttempt();
|
||||||
@ -278,4 +281,10 @@ inline PCScanScheduler& PCScan::scheduler() {
|
|||||||
} // namespace internal
|
} // namespace internal
|
||||||
} // namespace partition_alloc
|
} // namespace partition_alloc
|
||||||
|
|
||||||
|
// TODO(crbug.com/1288247): Remove this when migration is complete.
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
using ::partition_alloc::internal::PCScan;
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_PCSCAN_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_PCSCAN_H_
|
||||||
|
@ -142,6 +142,7 @@ class QuarantineCardTable final {
|
|||||||
// slots. May return false positives for but should never return false
|
// slots. May return false positives for but should never return false
|
||||||
// negatives, as otherwise this breaks security.
|
// negatives, as otherwise this breaks security.
|
||||||
PA_ALWAYS_INLINE bool IsQuarantined(uintptr_t address) const {
|
PA_ALWAYS_INLINE bool IsQuarantined(uintptr_t address) const {
|
||||||
|
address = ::partition_alloc::internal::UnmaskPtr(address);
|
||||||
const size_t byte = Byte(address);
|
const size_t byte = Byte(address);
|
||||||
PA_SCAN_DCHECK(byte < bytes_.size());
|
PA_SCAN_DCHECK(byte < bytes_.size());
|
||||||
return bytes_[byte];
|
return bytes_[byte];
|
||||||
@ -652,7 +653,6 @@ PA_SCAN_INLINE AllocationStateMap* PCScanTask::TryFindScannerBitmapForPointer(
|
|||||||
PA_SCAN_INLINE size_t
|
PA_SCAN_INLINE size_t
|
||||||
PCScanTask::TryMarkSlotInNormalBuckets(uintptr_t maybe_ptr) const {
|
PCScanTask::TryMarkSlotInNormalBuckets(uintptr_t maybe_ptr) const {
|
||||||
// Check if |maybe_ptr| points somewhere to the heap.
|
// Check if |maybe_ptr| points somewhere to the heap.
|
||||||
// The caller has to make sure that |maybe_ptr| isn't MTE-tagged.
|
|
||||||
auto* state_map = TryFindScannerBitmapForPointer(maybe_ptr);
|
auto* state_map = TryFindScannerBitmapForPointer(maybe_ptr);
|
||||||
if (!state_map)
|
if (!state_map)
|
||||||
return 0;
|
return 0;
|
||||||
@ -722,7 +722,8 @@ void PCScanTask::ClearQuarantinedSlotsAndPrepareCardTable() {
|
|||||||
// ScanPartitions.
|
// ScanPartitions.
|
||||||
const size_t size = slot_span->GetUsableSize(root);
|
const size_t size = slot_span->GetUsableSize(root);
|
||||||
if (clear_type == PCScan::ClearType::kLazy) {
|
if (clear_type == PCScan::ClearType::kLazy) {
|
||||||
void* object = root->SlotStartToObject(slot_start);
|
void* object = ::partition_alloc::internal::RemaskPtr(
|
||||||
|
root->SlotStartToObject(slot_start));
|
||||||
memset(object, 0, size);
|
memset(object, 0, size);
|
||||||
}
|
}
|
||||||
#if PA_STARSCAN_USE_CARD_TABLE
|
#if PA_STARSCAN_USE_CARD_TABLE
|
||||||
@ -773,10 +774,9 @@ class PCScanScanLoop final : public ScanLoop<PCScanScanLoop> {
|
|||||||
}
|
}
|
||||||
#endif // defined(PA_HAS_64_BITS_POINTERS)
|
#endif // defined(PA_HAS_64_BITS_POINTERS)
|
||||||
|
|
||||||
PA_SCAN_INLINE void CheckPointer(uintptr_t maybe_ptr_maybe_tagged) {
|
PA_SCAN_INLINE void CheckPointer(uintptr_t maybe_ptr) {
|
||||||
// |maybe_ptr| may have an MTE tag, so remove it first.
|
quarantine_size_ += task_.TryMarkSlotInNormalBuckets(
|
||||||
quarantine_size_ +=
|
::partition_alloc::internal::UnmaskPtr(maybe_ptr));
|
||||||
task_.TryMarkSlotInNormalBuckets(UntagAddr(maybe_ptr_maybe_tagged));
|
|
||||||
}
|
}
|
||||||
|
|
||||||
const PCScanTask& task_;
|
const PCScanTask& task_;
|
||||||
@ -937,6 +937,8 @@ void UnmarkInCardTable(uintptr_t slot_start,
|
|||||||
SlotSpanMetadata<ThreadSafe>* slot_span,
|
SlotSpanMetadata<ThreadSafe>* slot_span,
|
||||||
uintptr_t slot_start) {
|
uintptr_t slot_start) {
|
||||||
void* object = root->SlotStartToObject(slot_start);
|
void* object = root->SlotStartToObject(slot_start);
|
||||||
|
// TODO(bartekn): Move MTE masking into SlotStartToObject.
|
||||||
|
object = ::partition_alloc::internal::RemaskPtr(object);
|
||||||
root->FreeNoHooksImmediate(object, slot_span, slot_start);
|
root->FreeNoHooksImmediate(object, slot_span, slot_start);
|
||||||
UnmarkInCardTable(slot_start, slot_span);
|
UnmarkInCardTable(slot_start, slot_span);
|
||||||
return slot_span->bucket->slot_size;
|
return slot_span->bucket->slot_size;
|
||||||
@ -1001,7 +1003,8 @@ void UnmarkInCardTable(uintptr_t slot_start,
|
|||||||
|
|
||||||
const auto bitmap_iterator = [&](uintptr_t slot_start) {
|
const auto bitmap_iterator = [&](uintptr_t slot_start) {
|
||||||
SlotSpan* current_slot_span = SlotSpan::FromSlotStart(slot_start);
|
SlotSpan* current_slot_span = SlotSpan::FromSlotStart(slot_start);
|
||||||
auto* entry = PartitionFreelistEntry::EmplaceAndInitNull(slot_start);
|
auto* entry = PartitionFreelistEntry::EmplaceAndInitNull(
|
||||||
|
::partition_alloc::internal::RemaskPtr(slot_start));
|
||||||
|
|
||||||
if (current_slot_span != previous_slot_span) {
|
if (current_slot_span != previous_slot_span) {
|
||||||
// We started scanning a new slot span. Flush the accumulated freelist to
|
// We started scanning a new slot span. Flush the accumulated freelist to
|
||||||
|
@ -20,8 +20,11 @@
|
|||||||
#include "base/allocator/partition_allocator/starscan/starscan_fwd.h"
|
#include "base/allocator/partition_allocator/starscan/starscan_fwd.h"
|
||||||
#include "base/allocator/partition_allocator/starscan/write_protector.h"
|
#include "base/allocator/partition_allocator/starscan/write_protector.h"
|
||||||
|
|
||||||
|
// TODO(crbug.com/1288247): Remove this when migration is complete.
|
||||||
namespace partition_alloc::internal {
|
namespace partition_alloc::internal {
|
||||||
|
|
||||||
|
class StarScanSnapshot;
|
||||||
|
|
||||||
class PCScanTask;
|
class PCScanTask;
|
||||||
|
|
||||||
// Internal PCScan singleton. The separation between frontend and backend is
|
// Internal PCScan singleton. The separation between frontend and backend is
|
||||||
@ -108,7 +111,7 @@ class PCScanInternal final {
|
|||||||
|
|
||||||
private:
|
private:
|
||||||
friend internal::base::NoDestructor<PCScanInternal>;
|
friend internal::base::NoDestructor<PCScanInternal>;
|
||||||
friend class StarScanSnapshot;
|
friend class partition_alloc::internal::StarScanSnapshot;
|
||||||
|
|
||||||
using StackTops = std::unordered_map<
|
using StackTops = std::unordered_map<
|
||||||
internal::base::PlatformThreadId,
|
internal::base::PlatformThreadId,
|
||||||
@ -146,4 +149,11 @@ class PCScanInternal final {
|
|||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
// TODO(crbug.com/1288247): Remove this when migration is complete.
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
using ::partition_alloc::internal::PCScanInternal;
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_PCSCAN_INTERNAL_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_PCSCAN_INTERNAL_H_
|
||||||
|
@ -33,7 +33,8 @@ void PCScanSchedulingBackend::EnableScheduling() {
|
|||||||
scheduling_enabled_.store(true, std::memory_order_relaxed);
|
scheduling_enabled_.store(true, std::memory_order_relaxed);
|
||||||
// Check if *Scan needs to be run immediately.
|
// Check if *Scan needs to be run immediately.
|
||||||
if (NeedsToImmediatelyScan())
|
if (NeedsToImmediatelyScan())
|
||||||
PCScan::PerformScan(PCScan::InvocationMode::kNonBlocking);
|
::base::internal::PCScan::PerformScan(
|
||||||
|
::base::internal::PCScan::InvocationMode::kNonBlocking);
|
||||||
}
|
}
|
||||||
|
|
||||||
size_t PCScanSchedulingBackend::ScanStarted() {
|
size_t PCScanSchedulingBackend::ScanStarted() {
|
||||||
|
@ -198,4 +198,14 @@ bool PCScanScheduler::AccountFreed(size_t size) {
|
|||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
// TODO(crbug.com/1288247): Remove these when migration is complete.
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
using ::partition_alloc::internal::LimitBackend;
|
||||||
|
using ::partition_alloc::internal::MUAwareTaskBasedBackend;
|
||||||
|
using ::partition_alloc::internal::PCScanScheduler;
|
||||||
|
using ::partition_alloc::internal::QuarantineData;
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_PCSCAN_SCHEDULING_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_PCSCAN_SCHEDULING_H_
|
||||||
|
@ -139,4 +139,9 @@ void RacefulWorklist<T>::RandomizedView::Visit(Function f) {
|
|||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
// TODO(crbug.com/1288247): Remove these when migration is complete.
|
||||||
|
namespace base::internal {
|
||||||
|
using ::partition_alloc::internal::RacefulWorklist;
|
||||||
|
}
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_RACEFUL_WORKLIST_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_RACEFUL_WORKLIST_H_
|
||||||
|
@ -12,7 +12,6 @@
|
|||||||
#include "base/allocator/partition_allocator/partition_alloc_check.h"
|
#include "base/allocator/partition_allocator/partition_alloc_check.h"
|
||||||
#include "base/allocator/partition_allocator/partition_alloc_config.h"
|
#include "base/allocator/partition_allocator/partition_alloc_config.h"
|
||||||
#include "base/allocator/partition_allocator/starscan/starscan_fwd.h"
|
#include "base/allocator/partition_allocator/starscan/starscan_fwd.h"
|
||||||
#include "base/allocator/partition_allocator/tagging.h"
|
|
||||||
#include "build/build_config.h"
|
#include "build/build_config.h"
|
||||||
|
|
||||||
#if defined(ARCH_CPU_X86_64)
|
#if defined(ARCH_CPU_X86_64)
|
||||||
@ -93,9 +92,7 @@ void ScanLoop<Derived>::RunUnvectorized(uintptr_t begin, uintptr_t end) {
|
|||||||
PA_SCAN_DCHECK(!(begin % sizeof(uintptr_t)));
|
PA_SCAN_DCHECK(!(begin % sizeof(uintptr_t)));
|
||||||
PA_SCAN_DCHECK(!(end % sizeof(uintptr_t)));
|
PA_SCAN_DCHECK(!(end % sizeof(uintptr_t)));
|
||||||
#if defined(PA_HAS_64_BITS_POINTERS)
|
#if defined(PA_HAS_64_BITS_POINTERS)
|
||||||
// If the read value is a pointer into the PA region, it's likely
|
const uintptr_t mask = Derived::CageMask();
|
||||||
// MTE-tagged. Piggyback on |mask| to untag, for efficiency.
|
|
||||||
const uintptr_t mask = Derived::CageMask() & kPtrUntagMask;
|
|
||||||
const uintptr_t base = Derived::CageBase();
|
const uintptr_t base = Derived::CageBase();
|
||||||
#endif
|
#endif
|
||||||
for (; begin < end; begin += sizeof(uintptr_t)) {
|
for (; begin < end; begin += sizeof(uintptr_t)) {
|
||||||
@ -129,10 +126,7 @@ __attribute__((target("avx2"))) void ScanLoop<Derived>::RunAVX2(uintptr_t begin,
|
|||||||
// vmovdqa (_mm256_load_si256) is twice smaller (0.25) than that of vmovapd
|
// vmovdqa (_mm256_load_si256) is twice smaller (0.25) than that of vmovapd
|
||||||
// (_mm256_load_pd).
|
// (_mm256_load_pd).
|
||||||
const __m256i vbase = _mm256_set1_epi64x(derived().CageBase());
|
const __m256i vbase = _mm256_set1_epi64x(derived().CageBase());
|
||||||
// If the read value is a pointer into the PA region, it's likely
|
const __m256i cage_mask = _mm256_set1_epi64x(derived().CageMask());
|
||||||
// MTE-tagged. Piggyback on |cage_mask| to untag, for efficiency.
|
|
||||||
const __m256i cage_mask =
|
|
||||||
_mm256_set1_epi64x(derived().CageMask() & kPtrUntagMask);
|
|
||||||
|
|
||||||
static_assert(sizeof(__m256i) == kBytesInVector);
|
static_assert(sizeof(__m256i) == kBytesInVector);
|
||||||
for (; begin <= (end - kBytesInVector); begin += kBytesInVector) {
|
for (; begin <= (end - kBytesInVector); begin += kBytesInVector) {
|
||||||
@ -168,10 +162,7 @@ __attribute__((target("sse4.1"))) void ScanLoop<Derived>::RunSSE4(
|
|||||||
static constexpr size_t kBytesInVector = kWordsInVector * sizeof(uintptr_t);
|
static constexpr size_t kBytesInVector = kWordsInVector * sizeof(uintptr_t);
|
||||||
PA_SCAN_DCHECK(!(begin % kAlignmentRequirement));
|
PA_SCAN_DCHECK(!(begin % kAlignmentRequirement));
|
||||||
const __m128i vbase = _mm_set1_epi64x(derived().CageBase());
|
const __m128i vbase = _mm_set1_epi64x(derived().CageBase());
|
||||||
// If the read value is a pointer into the PA region, it's likely
|
const __m128i cage_mask = _mm_set1_epi64x(derived().CageMask());
|
||||||
// MTE-tagged. Piggyback on |cage_mask| to untag, for efficiency.
|
|
||||||
const __m128i cage_mask =
|
|
||||||
_mm_set1_epi64x(derived().CageMask() & kPtrUntagMask);
|
|
||||||
|
|
||||||
static_assert(sizeof(__m128i) == kBytesInVector);
|
static_assert(sizeof(__m128i) == kBytesInVector);
|
||||||
for (; begin <= (end - kBytesInVector); begin += kBytesInVector) {
|
for (; begin <= (end - kBytesInVector); begin += kBytesInVector) {
|
||||||
@ -209,10 +200,7 @@ void ScanLoop<Derived>::RunNEON(uintptr_t begin, uintptr_t end) {
|
|||||||
static constexpr size_t kBytesInVector = kWordsInVector * sizeof(uintptr_t);
|
static constexpr size_t kBytesInVector = kWordsInVector * sizeof(uintptr_t);
|
||||||
PA_SCAN_DCHECK(!(begin % kAlignmentRequirement));
|
PA_SCAN_DCHECK(!(begin % kAlignmentRequirement));
|
||||||
const uint64x2_t vbase = vdupq_n_u64(derived().CageBase());
|
const uint64x2_t vbase = vdupq_n_u64(derived().CageBase());
|
||||||
// If the read value is a pointer into the PA region, it's likely
|
const uint64x2_t cage_mask = vdupq_n_u64(derived().CageMask());
|
||||||
// MTE-tagged. Piggyback on |cage_mask| to untag, for efficiency.
|
|
||||||
const uint64x2_t cage_mask =
|
|
||||||
vdupq_n_u64(derived().CageMask() & kPtrUntagMask);
|
|
||||||
|
|
||||||
for (; begin <= (end - kBytesInVector); begin += kBytesInVector) {
|
for (; begin <= (end - kBytesInVector); begin += kBytesInVector) {
|
||||||
// Keep it MTE-untagged. See DisableMTEScope for details.
|
// Keep it MTE-untagged. See DisableMTEScope for details.
|
||||||
@ -236,4 +224,11 @@ void ScanLoop<Derived>::RunNEON(uintptr_t begin, uintptr_t end) {
|
|||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
// TODO(crbug.com/1288247): Remove this when migration is complete.
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
using ::partition_alloc::internal::ScanLoop;
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_SCAN_LOOP_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_SCAN_LOOP_H_
|
||||||
|
@ -91,4 +91,11 @@ StarScanSnapshot::UnprotectingView::UnprotectingView(StarScanSnapshot& snapshot)
|
|||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
// TODO(crbug.com/1288247): Remove this when migration is complete.
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
using ::partition_alloc::internal::StarScanSnapshot;
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_SNAPSHOT_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_SNAPSHOT_H_
|
||||||
|
@ -45,4 +45,14 @@ class PA_COMPONENT_EXPORT(PARTITION_ALLOC) Stack final {
|
|||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
// TODO(crbug.com/1288247): Remove these when migration is complete.
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
using ::partition_alloc::internal::GetStackPointer;
|
||||||
|
using ::partition_alloc::internal::GetStackTop;
|
||||||
|
using ::partition_alloc::internal::Stack;
|
||||||
|
using ::partition_alloc::internal::StackVisitor;
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_STACK_STACK_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_STACK_STACK_H_
|
||||||
|
@ -27,4 +27,12 @@ enum class SimdSupport : uint8_t {
|
|||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
// TODO(crbug.com/1288247): Remove these when migration is complete.
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
using ::partition_alloc::internal::Context;
|
||||||
|
using ::partition_alloc::internal::SimdSupport;
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_STARSCAN_FWD_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_STARSCAN_FWD_H_
|
||||||
|
@ -245,4 +245,11 @@ inline StatsCollector::MetadataString StatsCollector::ToUMAString(
|
|||||||
} // namespace internal
|
} // namespace internal
|
||||||
} // namespace partition_alloc
|
} // namespace partition_alloc
|
||||||
|
|
||||||
|
// TODO(crbug.com/1151236): Remove this when migration is complete.
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
using ::partition_alloc::internal::StatsCollector;
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_STATS_COLLECTOR_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_STATS_COLLECTOR_H_
|
||||||
|
@ -5,22 +5,24 @@
|
|||||||
#ifndef BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_STATS_REPORTER_H_
|
#ifndef BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_STATS_REPORTER_H_
|
||||||
#define BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_STATS_REPORTER_H_
|
#define BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_STATS_REPORTER_H_
|
||||||
|
|
||||||
#include "base/allocator/partition_allocator/partition_alloc_base/threading/platform_thread.h"
|
|
||||||
#include "base/allocator/partition_allocator/starscan/stats_collector.h"
|
#include "base/allocator/partition_allocator/starscan/stats_collector.h"
|
||||||
|
|
||||||
namespace partition_alloc {
|
namespace partition_alloc {
|
||||||
|
|
||||||
|
static_assert(sizeof(uint32_t) >= sizeof(internal::base::PlatformThreadId),
|
||||||
|
"sizeof(tid) must be larger than sizeof(PlatformThreadId)");
|
||||||
|
|
||||||
// StatsReporter is a wrapper to invoke TRACE_EVENT_BEGIN/END, TRACE_COUNTER1,
|
// StatsReporter is a wrapper to invoke TRACE_EVENT_BEGIN/END, TRACE_COUNTER1,
|
||||||
// and UmaHistogramTimes. It is used to just remove trace_log and uma
|
// and UmaHistogramTimes. It is used to just remove trace_log and uma
|
||||||
// dependencies from partition allocator.
|
// dependencies from partition allocator.
|
||||||
class StatsReporter {
|
class StatsReporter {
|
||||||
public:
|
public:
|
||||||
virtual void ReportTraceEvent(internal::StatsCollector::ScannerId id,
|
virtual void ReportTraceEvent(internal::StatsCollector::ScannerId id,
|
||||||
internal::base::PlatformThreadId tid,
|
uint32_t tid,
|
||||||
int64_t start_time_ticks_internal_value,
|
int64_t start_time_ticks_internal_value,
|
||||||
int64_t end_time_ticks_internal_value) {}
|
int64_t end_time_ticks_internal_value) {}
|
||||||
virtual void ReportTraceEvent(internal::StatsCollector::MutatorId id,
|
virtual void ReportTraceEvent(internal::StatsCollector::MutatorId id,
|
||||||
internal::base::PlatformThreadId tid,
|
uint32_t tid,
|
||||||
int64_t start_time_ticks_internal_value,
|
int64_t start_time_ticks_internal_value,
|
||||||
int64_t end_time_ticks_internal_value) {}
|
int64_t end_time_ticks_internal_value) {}
|
||||||
|
|
||||||
|
@ -27,8 +27,9 @@
|
|||||||
|
|
||||||
namespace partition_alloc::internal {
|
namespace partition_alloc::internal {
|
||||||
|
|
||||||
PCScan::ClearType NoWriteProtector::SupportedClearType() const {
|
::base::internal::PCScan::ClearType NoWriteProtector::SupportedClearType()
|
||||||
return PCScan::ClearType::kLazy;
|
const {
|
||||||
|
return ::base::internal::PCScan::ClearType::kLazy;
|
||||||
}
|
}
|
||||||
|
|
||||||
#if defined(PA_STARSCAN_UFFD_WRITE_PROTECTOR_SUPPORTED)
|
#if defined(PA_STARSCAN_UFFD_WRITE_PROTECTOR_SUPPORTED)
|
||||||
@ -57,7 +58,7 @@ void UserFaultFDThread(int uffd) {
|
|||||||
|
|
||||||
// Enter the safepoint. Concurrent faulted writes will wait until safepoint
|
// Enter the safepoint. Concurrent faulted writes will wait until safepoint
|
||||||
// finishes.
|
// finishes.
|
||||||
PCScan::JoinScanIfNeeded();
|
::base::internal::PCScan::JoinScanIfNeeded();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
} // namespace
|
} // namespace
|
||||||
@ -120,8 +121,10 @@ void UserFaultFDWriteProtector::UnprotectPages(uintptr_t begin, size_t length) {
|
|||||||
UserFaultFDWPSet(uffd_, begin, length, UserFaultFDWPMode::kUnprotect);
|
UserFaultFDWPSet(uffd_, begin, length, UserFaultFDWPMode::kUnprotect);
|
||||||
}
|
}
|
||||||
|
|
||||||
PCScan::ClearType UserFaultFDWriteProtector::SupportedClearType() const {
|
::base::internal::PCScan::ClearType
|
||||||
return IsSupported() ? PCScan::ClearType::kEager : PCScan::ClearType::kLazy;
|
UserFaultFDWriteProtector::SupportedClearType() const {
|
||||||
|
return IsSupported() ? ::base::internal::PCScan::ClearType::kEager
|
||||||
|
: ::base::internal::PCScan::ClearType::kLazy;
|
||||||
}
|
}
|
||||||
|
|
||||||
bool UserFaultFDWriteProtector::IsSupported() const {
|
bool UserFaultFDWriteProtector::IsSupported() const {
|
||||||
|
@ -28,14 +28,14 @@ class WriteProtector : public AllocatedOnPCScanMetadataPartition {
|
|||||||
|
|
||||||
virtual bool IsEnabled() const = 0;
|
virtual bool IsEnabled() const = 0;
|
||||||
|
|
||||||
virtual PCScan::ClearType SupportedClearType() const = 0;
|
virtual ::base::internal::PCScan::ClearType SupportedClearType() const = 0;
|
||||||
};
|
};
|
||||||
|
|
||||||
class NoWriteProtector final : public WriteProtector {
|
class NoWriteProtector final : public WriteProtector {
|
||||||
public:
|
public:
|
||||||
void ProtectPages(uintptr_t, size_t) final {}
|
void ProtectPages(uintptr_t, size_t) final {}
|
||||||
void UnprotectPages(uintptr_t, size_t) final {}
|
void UnprotectPages(uintptr_t, size_t) final {}
|
||||||
PCScan::ClearType SupportedClearType() const final;
|
::base::internal::PCScan::ClearType SupportedClearType() const final;
|
||||||
inline bool IsEnabled() const override;
|
inline bool IsEnabled() const override;
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -55,7 +55,7 @@ class UserFaultFDWriteProtector final : public WriteProtector {
|
|||||||
void ProtectPages(uintptr_t, size_t) final;
|
void ProtectPages(uintptr_t, size_t) final;
|
||||||
void UnprotectPages(uintptr_t, size_t) final;
|
void UnprotectPages(uintptr_t, size_t) final;
|
||||||
|
|
||||||
PCScan::ClearType SupportedClearType() const final;
|
::base::internal::PCScan::ClearType SupportedClearType() const final;
|
||||||
|
|
||||||
inline bool IsEnabled() const override;
|
inline bool IsEnabled() const override;
|
||||||
|
|
||||||
@ -73,4 +73,15 @@ bool UserFaultFDWriteProtector::IsEnabled() const {
|
|||||||
|
|
||||||
} // namespace partition_alloc::internal
|
} // namespace partition_alloc::internal
|
||||||
|
|
||||||
|
// TODO(crbug.com/1288247): Remove these when migration is complete.
|
||||||
|
namespace base::internal {
|
||||||
|
using ::partition_alloc::internal::NoWriteProtector;
|
||||||
|
using ::partition_alloc::internal::WriteProtector;
|
||||||
|
|
||||||
|
#if defined(PA_STARSCAN_UFFD_WRITE_PROTECTOR_SUPPORTED)
|
||||||
|
using ::partition_alloc::internal::UserFaultFDWriteProtector;
|
||||||
|
#endif // defined(PA_STARSCAN_UFFD_WRITE_PROTECTOR_SUPPORTED)
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_WRITE_PROTECTOR_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_STARSCAN_WRITE_PROTECTOR_H_
|
||||||
|
@ -39,11 +39,10 @@ namespace internal {
|
|||||||
|
|
||||||
constexpr int kMemTagGranuleSize = 16u;
|
constexpr int kMemTagGranuleSize = 16u;
|
||||||
#if defined(PA_HAS_MEMORY_TAGGING)
|
#if defined(PA_HAS_MEMORY_TAGGING)
|
||||||
constexpr uint64_t kPtrTagMask = 0xff00000000000000uLL;
|
constexpr uint64_t kMemTagUnmask = 0x00ffffffffffffffuLL;
|
||||||
#else
|
#else
|
||||||
constexpr uint64_t kPtrTagMask = 0;
|
constexpr uint64_t kMemTagUnmask = 0xffffffffffffffffuLL;
|
||||||
#endif // defined(PA_HAS_MEMORY_TAGGING)
|
#endif // defined(PA_HAS_MEMORY_TAGGING)
|
||||||
constexpr uint64_t kPtrUntagMask = ~kPtrTagMask;
|
|
||||||
|
|
||||||
#if BUILDFLAG(IS_ANDROID)
|
#if BUILDFLAG(IS_ANDROID)
|
||||||
// Changes the memory tagging mode for all threads in the current process.
|
// Changes the memory tagging mode for all threads in the current process.
|
||||||
@ -87,7 +86,6 @@ extern PA_COMPONENT_EXPORT(PARTITION_ALLOC)
|
|||||||
// (e.g. free). Returns the pointer with the new tag. Ensures that the entire
|
// (e.g. free). Returns the pointer with the new tag. Ensures that the entire
|
||||||
// range is set to the same tag.
|
// range is set to the same tag.
|
||||||
// TODO(bartekn): Remove the T* variant.
|
// TODO(bartekn): Remove the T* variant.
|
||||||
// TODO(bartekn): Consider removing the return value.
|
|
||||||
template <typename T>
|
template <typename T>
|
||||||
PA_ALWAYS_INLINE T* TagMemoryRangeIncrement(T* ptr, size_t size) {
|
PA_ALWAYS_INLINE T* TagMemoryRangeIncrement(T* ptr, size_t size) {
|
||||||
#if defined(PA_HAS_MEMORY_TAGGING)
|
#if defined(PA_HAS_MEMORY_TAGGING)
|
||||||
@ -96,8 +94,9 @@ PA_ALWAYS_INLINE T* TagMemoryRangeIncrement(T* ptr, size_t size) {
|
|||||||
return ptr;
|
return ptr;
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
PA_ALWAYS_INLINE void* TagMemoryRangeIncrement(uintptr_t ptr, size_t size) {
|
PA_ALWAYS_INLINE uintptr_t TagMemoryRangeIncrement(uintptr_t ptr, size_t size) {
|
||||||
return TagMemoryRangeIncrement(reinterpret_cast<void*>(ptr), size);
|
return reinterpret_cast<uintptr_t>(
|
||||||
|
TagMemoryRangeIncrement(reinterpret_cast<void*>(ptr), size));
|
||||||
}
|
}
|
||||||
|
|
||||||
// Randomly changes the tag of the ptr memory range. Useful for initial random
|
// Randomly changes the tag of the ptr memory range. Useful for initial random
|
||||||
@ -115,45 +114,46 @@ PA_ALWAYS_INLINE T* TagMemoryRangeRandomly(T* ptr,
|
|||||||
return ptr;
|
return ptr;
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
PA_ALWAYS_INLINE void* TagMemoryRangeRandomly(uintptr_t ptr,
|
PA_ALWAYS_INLINE uintptr_t TagMemoryRangeRandomly(uintptr_t ptr,
|
||||||
size_t size,
|
size_t size,
|
||||||
uint64_t mask = 0u) {
|
uint64_t mask = 0u) {
|
||||||
return TagMemoryRangeRandomly(reinterpret_cast<void*>(ptr), size, mask);
|
return reinterpret_cast<uintptr_t>(
|
||||||
|
TagMemoryRangeRandomly(reinterpret_cast<void*>(ptr), size, mask));
|
||||||
}
|
}
|
||||||
|
|
||||||
// Gets a version of ptr that's safe to dereference.
|
// Gets a version of ptr that's safe to dereference.
|
||||||
|
// TODO(bartekn): Remove the T* variant.
|
||||||
template <typename T>
|
template <typename T>
|
||||||
PA_ALWAYS_INLINE T* TagPtr(T* ptr) {
|
PA_ALWAYS_INLINE T* RemaskPtr(T* ptr) {
|
||||||
#if defined(PA_HAS_MEMORY_TAGGING)
|
#if defined(PA_HAS_MEMORY_TAGGING)
|
||||||
return reinterpret_cast<T*>(global_remask_void_ptr_fn(ptr));
|
return reinterpret_cast<T*>(global_remask_void_ptr_fn(ptr));
|
||||||
#else
|
#else
|
||||||
return ptr;
|
return ptr;
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
// Gets a version of address that's safe to dereference, if cast to a pointer.
|
||||||
// Gets a version of |address| that's safe to dereference, and casts to a
|
PA_ALWAYS_INLINE uintptr_t RemaskPtr(uintptr_t address) {
|
||||||
// pointer.
|
return reinterpret_cast<uintptr_t>(
|
||||||
PA_ALWAYS_INLINE void* TagAddr(uintptr_t address) {
|
RemaskPtr(reinterpret_cast<void*>(address)));
|
||||||
return TagPtr(reinterpret_cast<void*>(address));
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Strips the tag bits off |address|.
|
// Strips the tag bits off address.
|
||||||
PA_ALWAYS_INLINE uintptr_t UntagAddr(uintptr_t address) {
|
PA_ALWAYS_INLINE uintptr_t UnmaskPtr(uintptr_t address) {
|
||||||
#if defined(PA_HAS_MEMORY_TAGGING)
|
#if defined(PA_HAS_MEMORY_TAGGING)
|
||||||
return address & internal::kPtrUntagMask;
|
return address & kMemTagUnmask;
|
||||||
#else
|
#else
|
||||||
return address;
|
return address;
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
// Strips the tag bits off ptr.
|
||||||
|
// TODO(bartekn): Remove the T* variant.
|
||||||
|
template <typename T>
|
||||||
|
PA_ALWAYS_INLINE T* UnmaskPtr(T* ptr) {
|
||||||
|
return reinterpret_cast<T*>(UnmaskPtr(reinterpret_cast<uintptr_t>(ptr)));
|
||||||
|
}
|
||||||
|
|
||||||
} // namespace internal
|
} // namespace internal
|
||||||
|
|
||||||
// Strips the tag bits off |ptr|.
|
|
||||||
template <typename T>
|
|
||||||
PA_ALWAYS_INLINE uintptr_t UntagPtr(T* ptr) {
|
|
||||||
return internal::UntagAddr(reinterpret_cast<uintptr_t>(ptr));
|
|
||||||
}
|
|
||||||
|
|
||||||
} // namespace partition_alloc
|
} // namespace partition_alloc
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_TAGGING_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_TAGGING_H_
|
||||||
|
@ -10,7 +10,6 @@
|
|||||||
#include <atomic>
|
#include <atomic>
|
||||||
#include <cstdint>
|
#include <cstdint>
|
||||||
|
|
||||||
#include "base/allocator/partition_allocator/partition_alloc-inl.h"
|
|
||||||
#include "base/allocator/partition_allocator/partition_alloc_base/component_export.h"
|
#include "base/allocator/partition_allocator/partition_alloc_base/component_export.h"
|
||||||
#include "base/allocator/partition_allocator/partition_alloc_base/cxx17_backports.h"
|
#include "base/allocator/partition_allocator/partition_alloc_base/cxx17_backports.h"
|
||||||
#include "base/allocator/partition_allocator/partition_alloc_base/debug/debugging_buildflags.h"
|
#include "base/allocator/partition_allocator/partition_alloc_base/debug/debugging_buildflags.h"
|
||||||
@ -453,8 +452,7 @@ ThreadCache* ThreadCache::Create(PartitionRoot<internal::ThreadSafe>* root) {
|
|||||||
uintptr_t buffer = root->RawAlloc(bucket, AllocFlags::kZeroFill, raw_size,
|
uintptr_t buffer = root->RawAlloc(bucket, AllocFlags::kZeroFill, raw_size,
|
||||||
internal::PartitionPageSize(), &usable_size,
|
internal::PartitionPageSize(), &usable_size,
|
||||||
&already_zeroed);
|
&already_zeroed);
|
||||||
ThreadCache* tcache =
|
ThreadCache* tcache = new (reinterpret_cast<void*>(buffer)) ThreadCache(root);
|
||||||
new (internal::SlotStartAddr2Ptr(buffer)) ThreadCache(root);
|
|
||||||
|
|
||||||
// This may allocate.
|
// This may allocate.
|
||||||
internal::PartitionTlsSet(internal::g_thread_cache_key, tcache);
|
internal::PartitionTlsSet(internal::g_thread_cache_key, tcache);
|
||||||
@ -521,16 +519,12 @@ void ThreadCache::Delete(void* tcache_ptr) {
|
|||||||
|
|
||||||
auto* root = tcache->root_;
|
auto* root = tcache->root_;
|
||||||
tcache->~ThreadCache();
|
tcache->~ThreadCache();
|
||||||
// TreadCache was allocated using RawAlloc() and SlotStartAddr2Ptr(), so it
|
root->RawFree(reinterpret_cast<uintptr_t>(tcache_ptr));
|
||||||
// shifted by extras, but is MTE-tagged.
|
|
||||||
root->RawFree(internal::SlotStartPtr2Addr(tcache_ptr));
|
|
||||||
|
|
||||||
#if BUILDFLAG(IS_WIN)
|
#if BUILDFLAG(IS_WIN)
|
||||||
// On Windows, allocations do occur during thread/process teardown, make sure
|
// On Windows, allocations do occur during thread/process teardown, make sure
|
||||||
// they don't resurrect the thread cache.
|
// they don't resurrect the thread cache.
|
||||||
//
|
//
|
||||||
// Don't MTE-tag, as it'd mess with the sentinel value.
|
|
||||||
//
|
|
||||||
// TODO(lizeb): Investigate whether this is needed on POSIX as well.
|
// TODO(lizeb): Investigate whether this is needed on POSIX as well.
|
||||||
internal::PartitionTlsSet(internal::g_thread_cache_key,
|
internal::PartitionTlsSet(internal::g_thread_cache_key,
|
||||||
reinterpret_cast<void*>(kTombstone));
|
reinterpret_cast<void*>(kTombstone));
|
||||||
@ -685,7 +679,7 @@ void ThreadCache::FreeAfter(internal::PartitionFreelistEntry* head,
|
|||||||
// acquisitions can be expensive.
|
// acquisitions can be expensive.
|
||||||
internal::ScopedGuard guard(root_->lock_);
|
internal::ScopedGuard guard(root_->lock_);
|
||||||
while (head) {
|
while (head) {
|
||||||
uintptr_t slot_start = internal::SlotStartPtr2Addr(head);
|
uintptr_t slot_start = reinterpret_cast<uintptr_t>(head);
|
||||||
head = head->GetNextForThreadCache<crash_on_corruption>(slot_size);
|
head = head->GetNextForThreadCache<crash_on_corruption>(slot_size);
|
||||||
root_->RawFreeLocked(slot_start);
|
root_->RawFreeLocked(slot_start);
|
||||||
}
|
}
|
||||||
|
@ -10,7 +10,6 @@
|
|||||||
#include <limits>
|
#include <limits>
|
||||||
#include <memory>
|
#include <memory>
|
||||||
|
|
||||||
#include "base/allocator/partition_allocator/partition_alloc-inl.h"
|
|
||||||
#include "base/allocator/partition_allocator/partition_alloc_base/compiler_specific.h"
|
#include "base/allocator/partition_allocator/partition_alloc_base/compiler_specific.h"
|
||||||
#include "base/allocator/partition_allocator/partition_alloc_base/component_export.h"
|
#include "base/allocator/partition_allocator/partition_alloc_base/component_export.h"
|
||||||
#include "base/allocator/partition_allocator/partition_alloc_base/debug/debugging_buildflags.h"
|
#include "base/allocator/partition_allocator/partition_alloc_base/debug/debugging_buildflags.h"
|
||||||
@ -248,19 +247,16 @@ class PA_COMPONENT_EXPORT(PARTITION_ALLOC) ThreadCache {
|
|||||||
#if defined(PA_THREAD_CACHE_FAST_TLS)
|
#if defined(PA_THREAD_CACHE_FAST_TLS)
|
||||||
return internal::g_thread_cache;
|
return internal::g_thread_cache;
|
||||||
#else
|
#else
|
||||||
// This region isn't MTE-tagged.
|
|
||||||
return reinterpret_cast<ThreadCache*>(
|
return reinterpret_cast<ThreadCache*>(
|
||||||
internal::PartitionTlsGet(internal::g_thread_cache_key));
|
internal::PartitionTlsGet(internal::g_thread_cache_key));
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
static bool IsValid(ThreadCache* tcache) {
|
static bool IsValid(ThreadCache* tcache) {
|
||||||
// Do not MTE-untag, as it'd mess up the sentinel value.
|
|
||||||
return reinterpret_cast<uintptr_t>(tcache) & kTombstoneMask;
|
return reinterpret_cast<uintptr_t>(tcache) & kTombstoneMask;
|
||||||
}
|
}
|
||||||
|
|
||||||
static bool IsTombstone(ThreadCache* tcache) {
|
static bool IsTombstone(ThreadCache* tcache) {
|
||||||
// Do not MTE-untag, as it'd mess up the sentinel value.
|
|
||||||
return reinterpret_cast<uintptr_t>(tcache) == kTombstone;
|
return reinterpret_cast<uintptr_t>(tcache) == kTombstone;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -531,14 +527,14 @@ PA_ALWAYS_INLINE uintptr_t ThreadCache::GetFromCache(size_t bucket_index,
|
|||||||
}
|
}
|
||||||
|
|
||||||
PA_DCHECK(bucket.count != 0);
|
PA_DCHECK(bucket.count != 0);
|
||||||
internal::PartitionFreelistEntry* entry = bucket.freelist_head;
|
internal::PartitionFreelistEntry* result = bucket.freelist_head;
|
||||||
// Passes the bucket size to |GetNext()|, so that in case of freelist
|
// Passes the bucket size to |GetNext()|, so that in case of freelist
|
||||||
// corruption, we know the bucket size that lead to the crash, helping to
|
// corruption, we know the bucket size that lead to the crash, helping to
|
||||||
// narrow down the search for culprit. |bucket| was touched just now, so this
|
// narrow down the search for culprit. |bucket| was touched just now, so this
|
||||||
// does not introduce another cache miss.
|
// does not introduce another cache miss.
|
||||||
internal::PartitionFreelistEntry* next =
|
internal::PartitionFreelistEntry* next =
|
||||||
entry->GetNextForThreadCache<true>(bucket.slot_size);
|
result->GetNextForThreadCache<true>(bucket.slot_size);
|
||||||
PA_DCHECK(entry != next);
|
PA_DCHECK(result != next);
|
||||||
bucket.count--;
|
bucket.count--;
|
||||||
PA_DCHECK(bucket.count != 0 || !next);
|
PA_DCHECK(bucket.count != 0 || !next);
|
||||||
bucket.freelist_head = next;
|
bucket.freelist_head = next;
|
||||||
@ -546,7 +542,7 @@ PA_ALWAYS_INLINE uintptr_t ThreadCache::GetFromCache(size_t bucket_index,
|
|||||||
|
|
||||||
PA_DCHECK(cached_memory_ >= bucket.slot_size);
|
PA_DCHECK(cached_memory_ >= bucket.slot_size);
|
||||||
cached_memory_ -= bucket.slot_size;
|
cached_memory_ -= bucket.slot_size;
|
||||||
return internal::SlotStartPtr2Addr(entry);
|
return reinterpret_cast<uintptr_t>(result);
|
||||||
}
|
}
|
||||||
|
|
||||||
PA_ALWAYS_INLINE void ThreadCache::PutInBucket(Bucket& bucket,
|
PA_ALWAYS_INLINE void ThreadCache::PutInBucket(Bucket& bucket,
|
||||||
@ -569,23 +565,19 @@ PA_ALWAYS_INLINE void ThreadCache::PutInBucket(Bucket& bucket,
|
|||||||
static_assert(internal::kAlignment == 16, "");
|
static_assert(internal::kAlignment == 16, "");
|
||||||
|
|
||||||
#if PA_HAS_BUILTIN(__builtin_assume_aligned)
|
#if PA_HAS_BUILTIN(__builtin_assume_aligned)
|
||||||
// Cast back to uintptr_t, because we need it for pointer arithmetic. Make
|
uintptr_t address = reinterpret_cast<uintptr_t>(__builtin_assume_aligned(
|
||||||
// sure it gets MTE-tagged, as we cast it later to a pointer and dereference.
|
reinterpret_cast<void*>(slot_start), internal::kAlignment));
|
||||||
uintptr_t address_tagged =
|
|
||||||
reinterpret_cast<uintptr_t>(__builtin_assume_aligned(
|
|
||||||
internal::SlotStartAddr2Ptr(slot_start), internal::kAlignment));
|
|
||||||
#else
|
#else
|
||||||
uintptr_t address_tagged =
|
uintptr_t address = slot_start;
|
||||||
reinterpret_cast<uintptr_t>(internal::SlotStartAddr2Ptr(slot_start));
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
// The pointer is always 16 bytes aligned, so its start address is always == 0
|
// The pointer is always 16 bytes aligned, so its start address is always == 0
|
||||||
// % 16. Its distance to the next cacheline is `64 - ((address_tagged & 63) /
|
// % 16. Its distance to the next cacheline is 64 - ((address & 63) / 16) *
|
||||||
// 16) * 16`.
|
// 16.
|
||||||
static_assert(
|
static_assert(
|
||||||
internal::kPartitionCachelineSize == 64,
|
internal::kPartitionCachelineSize == 64,
|
||||||
"The computation below assumes that cache lines are 64 bytes long.");
|
"The computation below assumes that cache lines are 64 bytes long.");
|
||||||
int distance_to_next_cacheline_in_16_bytes = 4 - ((address_tagged >> 4) & 3);
|
int distance_to_next_cacheline_in_16_bytes = 4 - ((address >> 4) & 3);
|
||||||
int slot_size_remaining_in_16_bytes =
|
int slot_size_remaining_in_16_bytes =
|
||||||
#if BUILDFLAG(PUT_REF_COUNT_IN_PREVIOUS_SLOT)
|
#if BUILDFLAG(PUT_REF_COUNT_IN_PREVIOUS_SLOT)
|
||||||
// When BRP is on in the "previous slot" mode, this slot may have a BRP
|
// When BRP is on in the "previous slot" mode, this slot may have a BRP
|
||||||
@ -599,10 +591,10 @@ PA_ALWAYS_INLINE void ThreadCache::PutInBucket(Bucket& bucket,
|
|||||||
slot_size_remaining_in_16_bytes = std::min(
|
slot_size_remaining_in_16_bytes = std::min(
|
||||||
slot_size_remaining_in_16_bytes, distance_to_next_cacheline_in_16_bytes);
|
slot_size_remaining_in_16_bytes, distance_to_next_cacheline_in_16_bytes);
|
||||||
|
|
||||||
static const uint32_t poison_16_bytes[4] = {0xbadbad00, 0xbadbad00,
|
static const uint32_t poison_16_bytes[4] = {0xdeadbeef, 0xdeadbeef,
|
||||||
0xbadbad00, 0xbadbad00};
|
0xdeadbeef, 0xdeadbeef};
|
||||||
// Already MTE-tagged above, so safe to dereference.
|
uint32_t* address_aligned = reinterpret_cast<uint32_t*>(address);
|
||||||
uint32_t* address_aligned = reinterpret_cast<uint32_t*>(address_tagged);
|
|
||||||
for (int i = 0; i < slot_size_remaining_in_16_bytes; i++) {
|
for (int i = 0; i < slot_size_remaining_in_16_bytes; i++) {
|
||||||
// Clang will expand the memcpy to a 16-byte write (movups on x86).
|
// Clang will expand the memcpy to a 16-byte write (movups on x86).
|
||||||
memcpy(address_aligned, poison_16_bytes, sizeof(poison_16_bytes));
|
memcpy(address_aligned, poison_16_bytes, sizeof(poison_16_bytes));
|
||||||
@ -619,4 +611,13 @@ PA_ALWAYS_INLINE void ThreadCache::PutInBucket(Bucket& bucket,
|
|||||||
|
|
||||||
} // namespace partition_alloc
|
} // namespace partition_alloc
|
||||||
|
|
||||||
|
namespace base::internal {
|
||||||
|
|
||||||
|
// TODO(https://crbug.com/1288247): Remove these 'using' declarations once
|
||||||
|
// the migration to the new namespaces gets done.
|
||||||
|
using ::partition_alloc::ThreadCache;
|
||||||
|
using ::partition_alloc::ThreadCacheRegistry;
|
||||||
|
|
||||||
|
} // namespace base::internal
|
||||||
|
|
||||||
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_THREAD_CACHE_H_
|
#endif // BASE_ALLOCATOR_PARTITION_ALLOCATOR_THREAD_CACHE_H_
|
||||||
|
@ -17,7 +17,6 @@
|
|||||||
|
|
||||||
#include "base/bits.h"
|
#include "base/bits.h"
|
||||||
#include "base/check_op.h"
|
#include "base/check_op.h"
|
||||||
#include "base/numerics/safe_conversions.h"
|
|
||||||
|
|
||||||
namespace base {
|
namespace base {
|
||||||
namespace allocator {
|
namespace allocator {
|
||||||
@ -123,7 +122,7 @@ void* AlignAllocation(void* ptr, size_t alignment) {
|
|||||||
// Write the prefix.
|
// Write the prefix.
|
||||||
AlignedPrefix* prefix = reinterpret_cast<AlignedPrefix*>(address) - 1;
|
AlignedPrefix* prefix = reinterpret_cast<AlignedPrefix*>(address) - 1;
|
||||||
prefix->original_allocation_offset =
|
prefix->original_allocation_offset =
|
||||||
checked_cast<unsigned int>(address - reinterpret_cast<uintptr_t>(ptr));
|
address - reinterpret_cast<uintptr_t>(ptr);
|
||||||
#if DCHECK_IS_ON()
|
#if DCHECK_IS_ON()
|
||||||
prefix->magic = AlignedPrefix::kMagic;
|
prefix->magic = AlignedPrefix::kMagic;
|
||||||
#endif // DCHECK_IS_ON()
|
#endif // DCHECK_IS_ON()
|
||||||
|
@ -29,8 +29,7 @@ int OpenApkAsset(const std::string& file_path,
|
|||||||
CHECK_EQ(3U, results.size());
|
CHECK_EQ(3U, results.size());
|
||||||
int fd = static_cast<int>(results[0]);
|
int fd = static_cast<int>(results[0]);
|
||||||
region->offset = results[1];
|
region->offset = results[1];
|
||||||
// Not a checked_cast because open() may return -1.
|
region->size = results[2];
|
||||||
region->size = static_cast<size_t>(results[2]);
|
|
||||||
return fd;
|
return fd;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -21,11 +21,11 @@ namespace android {
|
|||||||
namespace {
|
namespace {
|
||||||
|
|
||||||
// We are leaking these strings.
|
// We are leaking these strings.
|
||||||
const char* StrDupParam(const std::vector<std::string>& params, size_t index) {
|
const char* StrDupParam(const std::vector<std::string>& params, int index) {
|
||||||
return strdup(params[index].c_str());
|
return strdup(params[index].c_str());
|
||||||
}
|
}
|
||||||
|
|
||||||
int GetIntParam(const std::vector<std::string>& params, size_t index) {
|
int GetIntParam(const std::vector<std::string>& params, int index) {
|
||||||
int ret = 0;
|
int ret = 0;
|
||||||
bool success = StringToInt(params[index], &ret);
|
bool success = StringToInt(params[index], &ret);
|
||||||
DCHECK(success);
|
DCHECK(success);
|
||||||
|
@ -27,7 +27,7 @@ void JNI_ChildProcessService_RegisterFileDescriptors(
|
|||||||
const JavaParamRef<jlongArray>& j_sizes) {
|
const JavaParamRef<jlongArray>& j_sizes) {
|
||||||
std::vector<absl::optional<std::string>> keys;
|
std::vector<absl::optional<std::string>> keys;
|
||||||
JavaObjectArrayReader<jstring> keys_array(j_keys);
|
JavaObjectArrayReader<jstring> keys_array(j_keys);
|
||||||
keys.reserve(checked_cast<size_t>(keys_array.size()));
|
keys.reserve(keys_array.size());
|
||||||
for (auto str : keys_array) {
|
for (auto str : keys_array) {
|
||||||
absl::optional<std::string> key;
|
absl::optional<std::string> key;
|
||||||
if (str) {
|
if (str) {
|
||||||
@ -54,7 +54,7 @@ void JNI_ChildProcessService_RegisterFileDescriptors(
|
|||||||
base::MemoryMappedFile::Region region = {offsets.at(i),
|
base::MemoryMappedFile::Region region = {offsets.at(i),
|
||||||
static_cast<size_t>(sizes.at(i))};
|
static_cast<size_t>(sizes.at(i))};
|
||||||
const absl::optional<std::string>& key = keys.at(i);
|
const absl::optional<std::string>& key = keys.at(i);
|
||||||
const auto id = static_cast<GlobalDescriptors::Key>(ids.at(i));
|
int id = ids.at(i);
|
||||||
int fd = fds.at(i);
|
int fd = fds.at(i);
|
||||||
if (key) {
|
if (key) {
|
||||||
base::FileDescriptorStore::GetInstance().Set(*key, base::ScopedFD(fd),
|
base::FileDescriptorStore::GetInstance().Set(*key, base::ScopedFD(fd),
|
||||||
|
@ -15,7 +15,7 @@ jint JNI_CpuFeatures_GetCoreCount(JNIEnv*) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
jlong JNI_CpuFeatures_GetCpuFeatures(JNIEnv*) {
|
jlong JNI_CpuFeatures_GetCpuFeatures(JNIEnv*) {
|
||||||
return static_cast<jlong>(android_getCpuFeatures());
|
return android_getCpuFeatures();
|
||||||
}
|
}
|
||||||
|
|
||||||
} // namespace android
|
} // namespace android
|
||||||
|
@ -106,8 +106,7 @@ static void JNI_EarlyTraceEvent_RecordEarlyAsyncBeginEvent(
|
|||||||
std::string name = ConvertJavaStringToUTF8(env, jname);
|
std::string name = ConvertJavaStringToUTF8(env, jname);
|
||||||
|
|
||||||
TRACE_EVENT_NESTABLE_ASYNC_BEGIN_WITH_TIMESTAMP_AND_FLAGS0(
|
TRACE_EVENT_NESTABLE_ASYNC_BEGIN_WITH_TIMESTAMP_AND_FLAGS0(
|
||||||
internal::kJavaTraceCategory, name.c_str(),
|
internal::kJavaTraceCategory, name.c_str(), TRACE_ID_LOCAL(id),
|
||||||
TRACE_ID_LOCAL(static_cast<uint64_t>(id)),
|
|
||||||
TimeTicks::FromJavaNanoTime(time_ns),
|
TimeTicks::FromJavaNanoTime(time_ns),
|
||||||
TRACE_EVENT_FLAG_JAVA_STRING_LITERALS | TRACE_EVENT_FLAG_COPY);
|
TRACE_EVENT_FLAG_JAVA_STRING_LITERALS | TRACE_EVENT_FLAG_COPY);
|
||||||
}
|
}
|
||||||
@ -120,8 +119,7 @@ static void JNI_EarlyTraceEvent_RecordEarlyAsyncEndEvent(
|
|||||||
std::string name = ConvertJavaStringToUTF8(env, jname);
|
std::string name = ConvertJavaStringToUTF8(env, jname);
|
||||||
|
|
||||||
TRACE_EVENT_NESTABLE_ASYNC_END_WITH_TIMESTAMP_AND_FLAGS0(
|
TRACE_EVENT_NESTABLE_ASYNC_END_WITH_TIMESTAMP_AND_FLAGS0(
|
||||||
internal::kJavaTraceCategory, name.c_str(),
|
internal::kJavaTraceCategory, name.c_str(), TRACE_ID_LOCAL(id),
|
||||||
TRACE_ID_LOCAL(static_cast<uint64_t>(id)),
|
|
||||||
TimeTicks::FromJavaNanoTime(time_ns),
|
TimeTicks::FromJavaNanoTime(time_ns),
|
||||||
TRACE_EVENT_FLAG_JAVA_STRING_LITERALS | TRACE_EVENT_FLAG_COPY);
|
TRACE_EVENT_FLAG_JAVA_STRING_LITERALS | TRACE_EVENT_FLAG_COPY);
|
||||||
}
|
}
|
||||||
|
@ -23,9 +23,7 @@ namespace {
|
|||||||
|
|
||||||
void AddFrameToTrace(int64_t timestamp_ns, int64_t durations_ns) {
|
void AddFrameToTrace(int64_t timestamp_ns, int64_t durations_ns) {
|
||||||
#if BUILDFLAG(ENABLE_BASE_TRACING)
|
#if BUILDFLAG(ENABLE_BASE_TRACING)
|
||||||
if (timestamp_ns < 0)
|
auto t = perfetto::Track(timestamp_ns);
|
||||||
return;
|
|
||||||
auto t = perfetto::Track(static_cast<uint64_t>(timestamp_ns));
|
|
||||||
TRACE_EVENT_BEGIN(
|
TRACE_EVENT_BEGIN(
|
||||||
"ui", "AndroidFrameVsync", t, [&](perfetto::EventContext ctx) {
|
"ui", "AndroidFrameVsync", t, [&](perfetto::EventContext ctx) {
|
||||||
ctx.event()->set_timestamp_absolute_us(timestamp_ns / 1000);
|
ctx.event()->set_timestamp_absolute_us(timestamp_ns / 1000);
|
||||||
@ -77,7 +75,7 @@ void RecordJankMetrics(
|
|||||||
std::string missed_frames_histogram_name =
|
std::string missed_frames_histogram_name =
|
||||||
base::StrCat({"Android.Jank.MissedFrames.", scenario_name});
|
base::StrCat({"Android.Jank.MissedFrames.", scenario_name});
|
||||||
|
|
||||||
for (size_t i = 0; i < timestamps_ns.size(); ++i) {
|
for (unsigned i = 0; i < timestamps_ns.size(); ++i) {
|
||||||
AddFrameToTrace(timestamps_ns[i], durations_ns[i]);
|
AddFrameToTrace(timestamps_ns[i], durations_ns[i]);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -26,8 +26,7 @@ void (*g_java_exception_callback)(const char*);
|
|||||||
using JavaExceptionFilter =
|
using JavaExceptionFilter =
|
||||||
base::RepeatingCallback<bool(const JavaRef<jthrowable>&)>;
|
base::RepeatingCallback<bool(const JavaRef<jthrowable>&)>;
|
||||||
|
|
||||||
LazyInstance<JavaExceptionFilter>::Leaky g_java_exception_filter =
|
LazyInstance<JavaExceptionFilter>::Leaky g_java_exception_filter;
|
||||||
LAZY_INSTANCE_INITIALIZER;
|
|
||||||
|
|
||||||
} // namespace
|
} // namespace
|
||||||
|
|
||||||
|
@ -26,13 +26,13 @@ namespace base {
|
|||||||
namespace android {
|
namespace android {
|
||||||
|
|
||||||
JavaHandlerThread::JavaHandlerThread(const char* name,
|
JavaHandlerThread::JavaHandlerThread(const char* name,
|
||||||
base::ThreadType thread_type)
|
base::ThreadPriority priority)
|
||||||
: JavaHandlerThread(
|
: JavaHandlerThread(
|
||||||
name,
|
name,
|
||||||
Java_JavaHandlerThread_create(
|
Java_JavaHandlerThread_create(
|
||||||
AttachCurrentThread(),
|
AttachCurrentThread(),
|
||||||
ConvertUTF8ToJavaString(AttachCurrentThread(), name),
|
ConvertUTF8ToJavaString(AttachCurrentThread(), name),
|
||||||
base::internal::ThreadTypeToNiceValue(thread_type))) {}
|
base::internal::ThreadPriorityToNiceValue(priority))) {}
|
||||||
|
|
||||||
JavaHandlerThread::JavaHandlerThread(
|
JavaHandlerThread::JavaHandlerThread(
|
||||||
const char* name,
|
const char* name,
|
||||||
|
@ -33,7 +33,7 @@ class BASE_EXPORT JavaHandlerThread {
|
|||||||
// Create new thread.
|
// Create new thread.
|
||||||
explicit JavaHandlerThread(
|
explicit JavaHandlerThread(
|
||||||
const char* name,
|
const char* name,
|
||||||
base::ThreadType thread_type = base::ThreadType::kDefault);
|
base::ThreadPriority priority = base::ThreadPriority::NORMAL);
|
||||||
// Wrap and connect to an existing JavaHandlerThread.
|
// Wrap and connect to an existing JavaHandlerThread.
|
||||||
// |obj| is an instance of JavaHandlerThread.
|
// |obj| is an instance of JavaHandlerThread.
|
||||||
explicit JavaHandlerThread(
|
explicit JavaHandlerThread(
|
||||||
|
@ -5,20 +5,16 @@
|
|||||||
#include "base/android/java_runtime.h"
|
#include "base/android/java_runtime.h"
|
||||||
|
|
||||||
#include "base/android_runtime_jni_headers/Runtime_jni.h"
|
#include "base/android_runtime_jni_headers/Runtime_jni.h"
|
||||||
#include "base/numerics/safe_conversions.h"
|
|
||||||
|
|
||||||
namespace base {
|
namespace base {
|
||||||
namespace android {
|
namespace android {
|
||||||
|
|
||||||
void JavaRuntime::GetMemoryUsage(uint64_t* total_memory,
|
void JavaRuntime::GetMemoryUsage(long* total_memory, long* free_memory) {
|
||||||
uint64_t* free_memory) {
|
|
||||||
JNIEnv* env = base::android::AttachCurrentThread();
|
JNIEnv* env = base::android::AttachCurrentThread();
|
||||||
base::android::ScopedJavaLocalRef<jobject> runtime =
|
base::android::ScopedJavaLocalRef<jobject> runtime =
|
||||||
JNI_Runtime::Java_Runtime_getRuntime(env);
|
JNI_Runtime::Java_Runtime_getRuntime(env);
|
||||||
*total_memory = checked_cast<uint64_t>(
|
*total_memory = JNI_Runtime::Java_Runtime_totalMemory(env, runtime);
|
||||||
JNI_Runtime::Java_Runtime_totalMemory(env, runtime));
|
*free_memory = JNI_Runtime::Java_Runtime_freeMemory(env, runtime);
|
||||||
*free_memory = checked_cast<uint64_t>(
|
|
||||||
JNI_Runtime::Java_Runtime_freeMemory(env, runtime));
|
|
||||||
}
|
}
|
||||||
|
|
||||||
} // namespace android
|
} // namespace android
|
||||||
|
@ -16,7 +16,7 @@ class BASE_EXPORT JavaRuntime {
|
|||||||
public:
|
public:
|
||||||
// Fills the total memory used and memory allocated for objects by the java
|
// Fills the total memory used and memory allocated for objects by the java
|
||||||
// heap in the current process. Returns true on success.
|
// heap in the current process. Returns true on success.
|
||||||
static void GetMemoryUsage(uint64_t* total_memory, uint64_t* free_memory);
|
static void GetMemoryUsage(long* total_memory, long* free_memory);
|
||||||
};
|
};
|
||||||
|
|
||||||
} // namespace android
|
} // namespace android
|
||||||
|
@ -9,7 +9,6 @@
|
|||||||
#include "base/android/jni_android.h"
|
#include "base/android/jni_android.h"
|
||||||
#include "base/android/jni_string.h"
|
#include "base/android/jni_string.h"
|
||||||
#include "base/check_op.h"
|
#include "base/check_op.h"
|
||||||
#include "base/numerics/safe_conversions.h"
|
|
||||||
|
|
||||||
namespace base {
|
namespace base {
|
||||||
namespace android {
|
namespace android {
|
||||||
@ -31,12 +30,11 @@ size_t SafeGetArrayLength(JNIEnv* env, const JavaRef<JavaArrayType>& jarray) {
|
|||||||
ScopedJavaLocalRef<jbyteArray> ToJavaByteArray(JNIEnv* env,
|
ScopedJavaLocalRef<jbyteArray> ToJavaByteArray(JNIEnv* env,
|
||||||
const uint8_t* bytes,
|
const uint8_t* bytes,
|
||||||
size_t len) {
|
size_t len) {
|
||||||
const jsize len_jsize = checked_cast<jsize>(len);
|
jbyteArray byte_array = env->NewByteArray(len);
|
||||||
jbyteArray byte_array = env->NewByteArray(len_jsize);
|
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
DCHECK(byte_array);
|
DCHECK(byte_array);
|
||||||
|
|
||||||
env->SetByteArrayRegion(byte_array, 0, len_jsize,
|
env->SetByteArrayRegion(byte_array, 0, len,
|
||||||
reinterpret_cast<const jbyte*>(bytes));
|
reinterpret_cast<const jbyte*>(bytes));
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
|
|
||||||
@ -58,12 +56,11 @@ ScopedJavaLocalRef<jbyteArray> ToJavaByteArray(JNIEnv* env,
|
|||||||
ScopedJavaLocalRef<jbooleanArray> ToJavaBooleanArray(JNIEnv* env,
|
ScopedJavaLocalRef<jbooleanArray> ToJavaBooleanArray(JNIEnv* env,
|
||||||
const bool* bools,
|
const bool* bools,
|
||||||
size_t len) {
|
size_t len) {
|
||||||
const jsize len_jsize = checked_cast<jsize>(len);
|
jbooleanArray boolean_array = env->NewBooleanArray(len);
|
||||||
jbooleanArray boolean_array = env->NewBooleanArray(len_jsize);
|
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
DCHECK(boolean_array);
|
DCHECK(boolean_array);
|
||||||
|
|
||||||
env->SetBooleanArrayRegion(boolean_array, 0, len_jsize,
|
env->SetBooleanArrayRegion(boolean_array, 0, len,
|
||||||
reinterpret_cast<const jboolean*>(bools));
|
reinterpret_cast<const jboolean*>(bools));
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
|
|
||||||
@ -73,12 +70,11 @@ ScopedJavaLocalRef<jbooleanArray> ToJavaBooleanArray(JNIEnv* env,
|
|||||||
ScopedJavaLocalRef<jintArray> ToJavaIntArray(JNIEnv* env,
|
ScopedJavaLocalRef<jintArray> ToJavaIntArray(JNIEnv* env,
|
||||||
const int* ints,
|
const int* ints,
|
||||||
size_t len) {
|
size_t len) {
|
||||||
const jsize len_jsize = checked_cast<jsize>(len);
|
jintArray int_array = env->NewIntArray(len);
|
||||||
jintArray int_array = env->NewIntArray(len_jsize);
|
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
DCHECK(int_array);
|
DCHECK(int_array);
|
||||||
|
|
||||||
env->SetIntArrayRegion(int_array, 0, len_jsize,
|
env->SetIntArrayRegion(int_array, 0, len,
|
||||||
reinterpret_cast<const jint*>(ints));
|
reinterpret_cast<const jint*>(ints));
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
|
|
||||||
@ -93,12 +89,11 @@ ScopedJavaLocalRef<jintArray> ToJavaIntArray(JNIEnv* env,
|
|||||||
ScopedJavaLocalRef<jlongArray> ToJavaLongArray(JNIEnv* env,
|
ScopedJavaLocalRef<jlongArray> ToJavaLongArray(JNIEnv* env,
|
||||||
const int64_t* longs,
|
const int64_t* longs,
|
||||||
size_t len) {
|
size_t len) {
|
||||||
const jsize len_jsize = checked_cast<jsize>(len);
|
jlongArray long_array = env->NewLongArray(len);
|
||||||
jlongArray long_array = env->NewLongArray(len_jsize);
|
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
DCHECK(long_array);
|
DCHECK(long_array);
|
||||||
|
|
||||||
env->SetLongArrayRegion(long_array, 0, len_jsize,
|
env->SetLongArrayRegion(long_array, 0, len,
|
||||||
reinterpret_cast<const jlong*>(longs));
|
reinterpret_cast<const jlong*>(longs));
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
|
|
||||||
@ -115,12 +110,11 @@ BASE_EXPORT ScopedJavaLocalRef<jlongArray> ToJavaLongArray(
|
|||||||
// Returns a new Java float array converted from the given C++ float array.
|
// Returns a new Java float array converted from the given C++ float array.
|
||||||
BASE_EXPORT ScopedJavaLocalRef<jfloatArray>
|
BASE_EXPORT ScopedJavaLocalRef<jfloatArray>
|
||||||
ToJavaFloatArray(JNIEnv* env, const float* floats, size_t len) {
|
ToJavaFloatArray(JNIEnv* env, const float* floats, size_t len) {
|
||||||
const jsize len_jsize = checked_cast<jsize>(len);
|
jfloatArray float_array = env->NewFloatArray(len);
|
||||||
jfloatArray float_array = env->NewFloatArray(len_jsize);
|
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
DCHECK(float_array);
|
DCHECK(float_array);
|
||||||
|
|
||||||
env->SetFloatArrayRegion(float_array, 0, len_jsize,
|
env->SetFloatArrayRegion(float_array, 0, len,
|
||||||
reinterpret_cast<const jfloat*>(floats));
|
reinterpret_cast<const jfloat*>(floats));
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
|
|
||||||
@ -135,12 +129,11 @@ BASE_EXPORT ScopedJavaLocalRef<jfloatArray> ToJavaFloatArray(
|
|||||||
|
|
||||||
BASE_EXPORT ScopedJavaLocalRef<jdoubleArray>
|
BASE_EXPORT ScopedJavaLocalRef<jdoubleArray>
|
||||||
ToJavaDoubleArray(JNIEnv* env, const double* doubles, size_t len) {
|
ToJavaDoubleArray(JNIEnv* env, const double* doubles, size_t len) {
|
||||||
const jsize len_jsize = checked_cast<jsize>(len);
|
jdoubleArray double_array = env->NewDoubleArray(len);
|
||||||
jdoubleArray double_array = env->NewDoubleArray(len_jsize);
|
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
DCHECK(double_array);
|
DCHECK(double_array);
|
||||||
|
|
||||||
env->SetDoubleArrayRegion(double_array, 0, len_jsize,
|
env->SetDoubleArrayRegion(double_array, 0, len,
|
||||||
reinterpret_cast<const jdouble*>(doubles));
|
reinterpret_cast<const jdouble*>(doubles));
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
|
|
||||||
@ -157,12 +150,11 @@ BASE_EXPORT ScopedJavaLocalRef<jobjectArray> ToJavaArrayOfObjects(
|
|||||||
JNIEnv* env,
|
JNIEnv* env,
|
||||||
ScopedJavaLocalRef<jclass> clazz,
|
ScopedJavaLocalRef<jclass> clazz,
|
||||||
base::span<const ScopedJavaLocalRef<jobject>> v) {
|
base::span<const ScopedJavaLocalRef<jobject>> v) {
|
||||||
jobjectArray joa =
|
jobjectArray joa = env->NewObjectArray(v.size(), clazz.obj(), nullptr);
|
||||||
env->NewObjectArray(checked_cast<jsize>(v.size()), clazz.obj(), nullptr);
|
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
|
|
||||||
for (size_t i = 0; i < v.size(); ++i) {
|
for (size_t i = 0; i < v.size(); ++i) {
|
||||||
env->SetObjectArrayElement(joa, static_cast<jsize>(i), v[i].obj());
|
env->SetObjectArrayElement(joa, i, v[i].obj());
|
||||||
}
|
}
|
||||||
return ScopedJavaLocalRef<jobjectArray>(env, joa);
|
return ScopedJavaLocalRef<jobjectArray>(env, joa);
|
||||||
}
|
}
|
||||||
@ -178,12 +170,12 @@ BASE_EXPORT ScopedJavaLocalRef<jobjectArray> ToJavaArrayOfObjects(
|
|||||||
base::span<const ScopedJavaGlobalRef<jobject>> v) {
|
base::span<const ScopedJavaGlobalRef<jobject>> v) {
|
||||||
ScopedJavaLocalRef<jclass> object_array_clazz =
|
ScopedJavaLocalRef<jclass> object_array_clazz =
|
||||||
GetClass(env, "java/lang/Object");
|
GetClass(env, "java/lang/Object");
|
||||||
jobjectArray joa = env->NewObjectArray(checked_cast<jsize>(v.size()),
|
jobjectArray joa =
|
||||||
object_array_clazz.obj(), nullptr);
|
env->NewObjectArray(v.size(), object_array_clazz.obj(), nullptr);
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
|
|
||||||
for (size_t i = 0; i < v.size(); ++i) {
|
for (size_t i = 0; i < v.size(); ++i) {
|
||||||
env->SetObjectArrayElement(joa, static_cast<jsize>(i), v[i].obj());
|
env->SetObjectArrayElement(joa, i, v[i].obj());
|
||||||
}
|
}
|
||||||
return ScopedJavaLocalRef<jobjectArray>(env, joa);
|
return ScopedJavaLocalRef<jobjectArray>(env, joa);
|
||||||
}
|
}
|
||||||
@ -192,12 +184,11 @@ BASE_EXPORT ScopedJavaLocalRef<jobjectArray> ToTypedJavaArrayOfObjects(
|
|||||||
JNIEnv* env,
|
JNIEnv* env,
|
||||||
base::span<const ScopedJavaLocalRef<jobject>> v,
|
base::span<const ScopedJavaLocalRef<jobject>> v,
|
||||||
ScopedJavaLocalRef<jclass> type) {
|
ScopedJavaLocalRef<jclass> type) {
|
||||||
jobjectArray joa =
|
jobjectArray joa = env->NewObjectArray(v.size(), type.obj(), nullptr);
|
||||||
env->NewObjectArray(checked_cast<jsize>(v.size()), type.obj(), nullptr);
|
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
|
|
||||||
for (size_t i = 0; i < v.size(); ++i) {
|
for (size_t i = 0; i < v.size(); ++i) {
|
||||||
env->SetObjectArrayElement(joa, static_cast<jsize>(i), v[i].obj());
|
env->SetObjectArrayElement(joa, i, v[i].obj());
|
||||||
}
|
}
|
||||||
return ScopedJavaLocalRef<jobjectArray>(env, joa);
|
return ScopedJavaLocalRef<jobjectArray>(env, joa);
|
||||||
}
|
}
|
||||||
@ -206,12 +197,11 @@ BASE_EXPORT ScopedJavaLocalRef<jobjectArray> ToTypedJavaArrayOfObjects(
|
|||||||
JNIEnv* env,
|
JNIEnv* env,
|
||||||
base::span<const ScopedJavaGlobalRef<jobject>> v,
|
base::span<const ScopedJavaGlobalRef<jobject>> v,
|
||||||
ScopedJavaLocalRef<jclass> type) {
|
ScopedJavaLocalRef<jclass> type) {
|
||||||
jobjectArray joa =
|
jobjectArray joa = env->NewObjectArray(v.size(), type.obj(), nullptr);
|
||||||
env->NewObjectArray(checked_cast<jsize>(v.size()), type.obj(), nullptr);
|
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
|
|
||||||
for (size_t i = 0; i < v.size(); ++i) {
|
for (size_t i = 0; i < v.size(); ++i) {
|
||||||
env->SetObjectArrayElement(joa, static_cast<jsize>(i), v[i].obj());
|
env->SetObjectArrayElement(joa, i, v[i].obj());
|
||||||
}
|
}
|
||||||
return ScopedJavaLocalRef<jobjectArray>(env, joa);
|
return ScopedJavaLocalRef<jobjectArray>(env, joa);
|
||||||
}
|
}
|
||||||
@ -220,14 +210,14 @@ ScopedJavaLocalRef<jobjectArray> ToJavaArrayOfByteArray(
|
|||||||
JNIEnv* env,
|
JNIEnv* env,
|
||||||
base::span<const std::string> v) {
|
base::span<const std::string> v) {
|
||||||
ScopedJavaLocalRef<jclass> byte_array_clazz = GetClass(env, "[B");
|
ScopedJavaLocalRef<jclass> byte_array_clazz = GetClass(env, "[B");
|
||||||
jobjectArray joa = env->NewObjectArray(checked_cast<jsize>(v.size()),
|
jobjectArray joa =
|
||||||
byte_array_clazz.obj(), nullptr);
|
env->NewObjectArray(v.size(), byte_array_clazz.obj(), nullptr);
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
|
|
||||||
for (size_t i = 0; i < v.size(); ++i) {
|
for (size_t i = 0; i < v.size(); ++i) {
|
||||||
ScopedJavaLocalRef<jbyteArray> byte_array = ToJavaByteArray(
|
ScopedJavaLocalRef<jbyteArray> byte_array = ToJavaByteArray(
|
||||||
env, reinterpret_cast<const uint8_t*>(v[i].data()), v[i].length());
|
env, reinterpret_cast<const uint8_t*>(v[i].data()), v[i].length());
|
||||||
env->SetObjectArrayElement(joa, static_cast<jsize>(i), byte_array.obj());
|
env->SetObjectArrayElement(joa, i, byte_array.obj());
|
||||||
}
|
}
|
||||||
return ScopedJavaLocalRef<jobjectArray>(env, joa);
|
return ScopedJavaLocalRef<jobjectArray>(env, joa);
|
||||||
}
|
}
|
||||||
@ -236,14 +226,14 @@ ScopedJavaLocalRef<jobjectArray> ToJavaArrayOfByteArray(
|
|||||||
JNIEnv* env,
|
JNIEnv* env,
|
||||||
base::span<const std::vector<uint8_t>> v) {
|
base::span<const std::vector<uint8_t>> v) {
|
||||||
ScopedJavaLocalRef<jclass> byte_array_clazz = GetClass(env, "[B");
|
ScopedJavaLocalRef<jclass> byte_array_clazz = GetClass(env, "[B");
|
||||||
jobjectArray joa = env->NewObjectArray(checked_cast<jsize>(v.size()),
|
jobjectArray joa =
|
||||||
byte_array_clazz.obj(), nullptr);
|
env->NewObjectArray(v.size(), byte_array_clazz.obj(), nullptr);
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
|
|
||||||
for (size_t i = 0; i < v.size(); ++i) {
|
for (size_t i = 0; i < v.size(); ++i) {
|
||||||
ScopedJavaLocalRef<jbyteArray> byte_array =
|
ScopedJavaLocalRef<jbyteArray> byte_array =
|
||||||
ToJavaByteArray(env, v[i].data(), v[i].size());
|
ToJavaByteArray(env, v[i].data(), v[i].size());
|
||||||
env->SetObjectArrayElement(joa, static_cast<jsize>(i), byte_array.obj());
|
env->SetObjectArrayElement(joa, i, byte_array.obj());
|
||||||
}
|
}
|
||||||
return ScopedJavaLocalRef<jobjectArray>(env, joa);
|
return ScopedJavaLocalRef<jobjectArray>(env, joa);
|
||||||
}
|
}
|
||||||
@ -252,13 +242,12 @@ ScopedJavaLocalRef<jobjectArray> ToJavaArrayOfStrings(
|
|||||||
JNIEnv* env,
|
JNIEnv* env,
|
||||||
base::span<const std::string> v) {
|
base::span<const std::string> v) {
|
||||||
ScopedJavaLocalRef<jclass> string_clazz = GetClass(env, "java/lang/String");
|
ScopedJavaLocalRef<jclass> string_clazz = GetClass(env, "java/lang/String");
|
||||||
jobjectArray joa = env->NewObjectArray(checked_cast<jsize>(v.size()),
|
jobjectArray joa = env->NewObjectArray(v.size(), string_clazz.obj(), nullptr);
|
||||||
string_clazz.obj(), nullptr);
|
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
|
|
||||||
for (size_t i = 0; i < v.size(); ++i) {
|
for (size_t i = 0; i < v.size(); ++i) {
|
||||||
ScopedJavaLocalRef<jstring> item = ConvertUTF8ToJavaString(env, v[i]);
|
ScopedJavaLocalRef<jstring> item = ConvertUTF8ToJavaString(env, v[i]);
|
||||||
env->SetObjectArrayElement(joa, static_cast<jsize>(i), item.obj());
|
env->SetObjectArrayElement(joa, i, item.obj());
|
||||||
}
|
}
|
||||||
return ScopedJavaLocalRef<jobjectArray>(env, joa);
|
return ScopedJavaLocalRef<jobjectArray>(env, joa);
|
||||||
}
|
}
|
||||||
@ -269,14 +258,14 @@ ScopedJavaLocalRef<jobjectArray> ToJavaArrayOfStringArray(
|
|||||||
ScopedJavaLocalRef<jclass> string_array_clazz =
|
ScopedJavaLocalRef<jclass> string_array_clazz =
|
||||||
GetClass(env, "[Ljava/lang/String;");
|
GetClass(env, "[Ljava/lang/String;");
|
||||||
|
|
||||||
jobjectArray joa = env->NewObjectArray(checked_cast<jsize>(vec_outer.size()),
|
jobjectArray joa =
|
||||||
string_array_clazz.obj(), nullptr);
|
env->NewObjectArray(vec_outer.size(), string_array_clazz.obj(), nullptr);
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
|
|
||||||
for (size_t i = 0; i < vec_outer.size(); ++i) {
|
for (size_t i = 0; i < vec_outer.size(); ++i) {
|
||||||
ScopedJavaLocalRef<jobjectArray> inner =
|
ScopedJavaLocalRef<jobjectArray> inner =
|
||||||
ToJavaArrayOfStrings(env, vec_outer[i]);
|
ToJavaArrayOfStrings(env, vec_outer[i]);
|
||||||
env->SetObjectArrayElement(joa, static_cast<jsize>(i), inner.obj());
|
env->SetObjectArrayElement(joa, i, inner.obj());
|
||||||
}
|
}
|
||||||
|
|
||||||
return ScopedJavaLocalRef<jobjectArray>(env, joa);
|
return ScopedJavaLocalRef<jobjectArray>(env, joa);
|
||||||
@ -288,14 +277,14 @@ ScopedJavaLocalRef<jobjectArray> ToJavaArrayOfStringArray(
|
|||||||
ScopedJavaLocalRef<jclass> string_array_clazz =
|
ScopedJavaLocalRef<jclass> string_array_clazz =
|
||||||
GetClass(env, "[Ljava/lang/String;");
|
GetClass(env, "[Ljava/lang/String;");
|
||||||
|
|
||||||
jobjectArray joa = env->NewObjectArray(checked_cast<jsize>(vec_outer.size()),
|
jobjectArray joa =
|
||||||
string_array_clazz.obj(), nullptr);
|
env->NewObjectArray(vec_outer.size(), string_array_clazz.obj(), nullptr);
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
|
|
||||||
for (size_t i = 0; i < vec_outer.size(); ++i) {
|
for (size_t i = 0; i < vec_outer.size(); ++i) {
|
||||||
ScopedJavaLocalRef<jobjectArray> inner =
|
ScopedJavaLocalRef<jobjectArray> inner =
|
||||||
ToJavaArrayOfStrings(env, vec_outer[i]);
|
ToJavaArrayOfStrings(env, vec_outer[i]);
|
||||||
env->SetObjectArrayElement(joa, static_cast<jsize>(i), inner.obj());
|
env->SetObjectArrayElement(joa, i, inner.obj());
|
||||||
}
|
}
|
||||||
|
|
||||||
return ScopedJavaLocalRef<jobjectArray>(env, joa);
|
return ScopedJavaLocalRef<jobjectArray>(env, joa);
|
||||||
@ -305,13 +294,12 @@ ScopedJavaLocalRef<jobjectArray> ToJavaArrayOfStrings(
|
|||||||
JNIEnv* env,
|
JNIEnv* env,
|
||||||
base::span<const std::u16string> v) {
|
base::span<const std::u16string> v) {
|
||||||
ScopedJavaLocalRef<jclass> string_clazz = GetClass(env, "java/lang/String");
|
ScopedJavaLocalRef<jclass> string_clazz = GetClass(env, "java/lang/String");
|
||||||
jobjectArray joa = env->NewObjectArray(checked_cast<jsize>(v.size()),
|
jobjectArray joa = env->NewObjectArray(v.size(), string_clazz.obj(), nullptr);
|
||||||
string_clazz.obj(), nullptr);
|
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
|
|
||||||
for (size_t i = 0; i < v.size(); ++i) {
|
for (size_t i = 0; i < v.size(); ++i) {
|
||||||
ScopedJavaLocalRef<jstring> item = ConvertUTF16ToJavaString(env, v[i]);
|
ScopedJavaLocalRef<jstring> item = ConvertUTF16ToJavaString(env, v[i]);
|
||||||
env->SetObjectArrayElement(joa, static_cast<jsize>(i), item.obj());
|
env->SetObjectArrayElement(joa, i, item.obj());
|
||||||
}
|
}
|
||||||
return ScopedJavaLocalRef<jobjectArray>(env, joa);
|
return ScopedJavaLocalRef<jobjectArray>(env, joa);
|
||||||
}
|
}
|
||||||
@ -327,8 +315,7 @@ void AppendJavaStringArrayToStringVector(JNIEnv* env,
|
|||||||
out->resize(back + len);
|
out->resize(back + len);
|
||||||
for (size_t i = 0; i < len; ++i) {
|
for (size_t i = 0; i < len; ++i) {
|
||||||
ScopedJavaLocalRef<jstring> str(
|
ScopedJavaLocalRef<jstring> str(
|
||||||
env, static_cast<jstring>(env->GetObjectArrayElement(
|
env, static_cast<jstring>(env->GetObjectArrayElement(array.obj(), i)));
|
||||||
array.obj(), static_cast<jsize>(i))));
|
|
||||||
ConvertJavaStringToUTF16(env, str.obj(), out->data() + back + i);
|
ConvertJavaStringToUTF16(env, str.obj(), out->data() + back + i);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -344,8 +331,7 @@ void AppendJavaStringArrayToStringVector(JNIEnv* env,
|
|||||||
out->resize(back + len);
|
out->resize(back + len);
|
||||||
for (size_t i = 0; i < len; ++i) {
|
for (size_t i = 0; i < len; ++i) {
|
||||||
ScopedJavaLocalRef<jstring> str(
|
ScopedJavaLocalRef<jstring> str(
|
||||||
env, static_cast<jstring>(env->GetObjectArrayElement(
|
env, static_cast<jstring>(env->GetObjectArrayElement(array.obj(), i)));
|
||||||
array.obj(), static_cast<jsize>(i))));
|
|
||||||
ConvertJavaStringToUTF8(env, str.obj(), out->data() + back + i);
|
ConvertJavaStringToUTF8(env, str.obj(), out->data() + back + i);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -361,7 +347,7 @@ void AppendJavaByteArrayToByteVector(JNIEnv* env,
|
|||||||
return;
|
return;
|
||||||
size_t back = out->size();
|
size_t back = out->size();
|
||||||
out->resize(back + len);
|
out->resize(back + len);
|
||||||
env->GetByteArrayRegion(byte_array.obj(), 0, static_cast<jsize>(len),
|
env->GetByteArrayRegion(byte_array.obj(), 0, len,
|
||||||
reinterpret_cast<int8_t*>(out->data() + back));
|
reinterpret_cast<int8_t*>(out->data() + back));
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -411,8 +397,7 @@ void JavaIntArrayToIntVector(JNIEnv* env,
|
|||||||
out->resize(len);
|
out->resize(len);
|
||||||
if (!len)
|
if (!len)
|
||||||
return;
|
return;
|
||||||
env->GetIntArrayRegion(int_array.obj(), 0, static_cast<jsize>(len),
|
env->GetIntArrayRegion(int_array.obj(), 0, len, out->data());
|
||||||
out->data());
|
|
||||||
}
|
}
|
||||||
|
|
||||||
void JavaLongArrayToInt64Vector(JNIEnv* env,
|
void JavaLongArrayToInt64Vector(JNIEnv* env,
|
||||||
@ -433,8 +418,7 @@ void JavaLongArrayToLongVector(JNIEnv* env,
|
|||||||
out->resize(len);
|
out->resize(len);
|
||||||
if (!len)
|
if (!len)
|
||||||
return;
|
return;
|
||||||
env->GetLongArrayRegion(long_array.obj(), 0, static_cast<jsize>(len),
|
env->GetLongArrayRegion(long_array.obj(), 0, len, out->data());
|
||||||
out->data());
|
|
||||||
}
|
}
|
||||||
|
|
||||||
void JavaFloatArrayToFloatVector(JNIEnv* env,
|
void JavaFloatArrayToFloatVector(JNIEnv* env,
|
||||||
@ -445,8 +429,7 @@ void JavaFloatArrayToFloatVector(JNIEnv* env,
|
|||||||
out->resize(len);
|
out->resize(len);
|
||||||
if (!len)
|
if (!len)
|
||||||
return;
|
return;
|
||||||
env->GetFloatArrayRegion(float_array.obj(), 0, static_cast<jsize>(len),
|
env->GetFloatArrayRegion(float_array.obj(), 0, len, out->data());
|
||||||
out->data());
|
|
||||||
}
|
}
|
||||||
|
|
||||||
void JavaDoubleArrayToDoubleVector(JNIEnv* env,
|
void JavaDoubleArrayToDoubleVector(JNIEnv* env,
|
||||||
@ -457,8 +440,7 @@ void JavaDoubleArrayToDoubleVector(JNIEnv* env,
|
|||||||
out->resize(len);
|
out->resize(len);
|
||||||
if (!len)
|
if (!len)
|
||||||
return;
|
return;
|
||||||
env->GetDoubleArrayRegion(double_array.obj(), 0, static_cast<jsize>(len),
|
env->GetDoubleArrayRegion(double_array.obj(), 0, len, out->data());
|
||||||
out->data());
|
|
||||||
}
|
}
|
||||||
|
|
||||||
void JavaArrayOfByteArrayToStringVector(JNIEnv* env,
|
void JavaArrayOfByteArrayToStringVector(JNIEnv* env,
|
||||||
@ -469,9 +451,9 @@ void JavaArrayOfByteArrayToStringVector(JNIEnv* env,
|
|||||||
out->resize(len);
|
out->resize(len);
|
||||||
for (size_t i = 0; i < len; ++i) {
|
for (size_t i = 0; i < len; ++i) {
|
||||||
ScopedJavaLocalRef<jbyteArray> bytes_array(
|
ScopedJavaLocalRef<jbyteArray> bytes_array(
|
||||||
env, static_cast<jbyteArray>(env->GetObjectArrayElement(
|
env,
|
||||||
array.obj(), static_cast<jsize>(i))));
|
static_cast<jbyteArray>(env->GetObjectArrayElement(array.obj(), i)));
|
||||||
size_t bytes_len = SafeGetArrayLength(env, bytes_array);
|
jsize bytes_len = env->GetArrayLength(bytes_array.obj());
|
||||||
jbyte* bytes = env->GetByteArrayElements(bytes_array.obj(), nullptr);
|
jbyte* bytes = env->GetByteArrayElements(bytes_array.obj(), nullptr);
|
||||||
(*out)[i].assign(reinterpret_cast<const char*>(bytes), bytes_len);
|
(*out)[i].assign(reinterpret_cast<const char*>(bytes), bytes_len);
|
||||||
env->ReleaseByteArrayElements(bytes_array.obj(), bytes, JNI_ABORT);
|
env->ReleaseByteArrayElements(bytes_array.obj(), bytes, JNI_ABORT);
|
||||||
@ -486,8 +468,8 @@ void JavaArrayOfByteArrayToBytesVector(JNIEnv* env,
|
|||||||
out->resize(len);
|
out->resize(len);
|
||||||
for (size_t i = 0; i < len; ++i) {
|
for (size_t i = 0; i < len; ++i) {
|
||||||
ScopedJavaLocalRef<jbyteArray> bytes_array(
|
ScopedJavaLocalRef<jbyteArray> bytes_array(
|
||||||
env, static_cast<jbyteArray>(env->GetObjectArrayElement(
|
env,
|
||||||
array.obj(), static_cast<jsize>(i))));
|
static_cast<jbyteArray>(env->GetObjectArrayElement(array.obj(), i)));
|
||||||
JavaByteArrayToByteVector(env, bytes_array, &(*out)[i]);
|
JavaByteArrayToByteVector(env, bytes_array, &(*out)[i]);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -501,8 +483,8 @@ void Java2dStringArrayTo2dStringVector(
|
|||||||
out->resize(len);
|
out->resize(len);
|
||||||
for (size_t i = 0; i < len; ++i) {
|
for (size_t i = 0; i < len; ++i) {
|
||||||
ScopedJavaLocalRef<jobjectArray> strings_array(
|
ScopedJavaLocalRef<jobjectArray> strings_array(
|
||||||
env, static_cast<jobjectArray>(env->GetObjectArrayElement(
|
env,
|
||||||
array.obj(), static_cast<jsize>(i))));
|
static_cast<jobjectArray>(env->GetObjectArrayElement(array.obj(), i)));
|
||||||
|
|
||||||
out->at(i).clear();
|
out->at(i).clear();
|
||||||
AppendJavaStringArrayToStringVector(env, strings_array, &out->at(i));
|
AppendJavaStringArrayToStringVector(env, strings_array, &out->at(i));
|
||||||
@ -518,8 +500,8 @@ void Java2dStringArrayTo2dStringVector(
|
|||||||
out->resize(len);
|
out->resize(len);
|
||||||
for (size_t i = 0; i < len; ++i) {
|
for (size_t i = 0; i < len; ++i) {
|
||||||
ScopedJavaLocalRef<jobjectArray> strings_array(
|
ScopedJavaLocalRef<jobjectArray> strings_array(
|
||||||
env, static_cast<jobjectArray>(env->GetObjectArrayElement(
|
env,
|
||||||
array.obj(), static_cast<jsize>(i))));
|
static_cast<jobjectArray>(env->GetObjectArrayElement(array.obj(), i)));
|
||||||
|
|
||||||
out->at(i).clear();
|
out->at(i).clear();
|
||||||
AppendJavaStringArrayToStringVector(env, strings_array, &out->at(i));
|
AppendJavaStringArrayToStringVector(env, strings_array, &out->at(i));
|
||||||
@ -534,8 +516,8 @@ void JavaArrayOfIntArrayToIntVector(JNIEnv* env,
|
|||||||
out->resize(len);
|
out->resize(len);
|
||||||
for (size_t i = 0; i < len; ++i) {
|
for (size_t i = 0; i < len; ++i) {
|
||||||
ScopedJavaLocalRef<jintArray> int_array(
|
ScopedJavaLocalRef<jintArray> int_array(
|
||||||
env, static_cast<jintArray>(env->GetObjectArrayElement(
|
env,
|
||||||
array.obj(), static_cast<jsize>(i))));
|
static_cast<jintArray>(env->GetObjectArrayElement(array.obj(), i)));
|
||||||
JavaIntArrayToIntVector(env, int_array, &out->at(i));
|
JavaIntArrayToIntVector(env, int_array, &out->at(i));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -99,5 +99,6 @@ java_annotation_processor("jni_processor") {
|
|||||||
"//third_party/android_deps:com_google_auto_service_auto_service_annotations_java",
|
"//third_party/android_deps:com_google_auto_service_auto_service_annotations_java",
|
||||||
"//third_party/android_deps:com_google_guava_guava_java",
|
"//third_party/android_deps:com_google_guava_guava_java",
|
||||||
"//third_party/android_deps:com_squareup_javapoet_java",
|
"//third_party/android_deps:com_squareup_javapoet_java",
|
||||||
|
"//third_party/android_deps:javax_annotation_jsr250_api_java",
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -20,17 +20,15 @@ def CommonChecks(input_api, output_api):
|
|||||||
'PYTHONDONTWRITEBYTECODE': '1',
|
'PYTHONDONTWRITEBYTECODE': '1',
|
||||||
})
|
})
|
||||||
|
|
||||||
return input_api.RunTests(
|
return input_api.canned_checks.RunUnitTests(
|
||||||
input_api.canned_checks.GetUnitTests(
|
|
||||||
input_api,
|
input_api,
|
||||||
output_api,
|
output_api,
|
||||||
run_on_python2=False,
|
|
||||||
unit_tests=[
|
unit_tests=[
|
||||||
input_api.os_path.join(base_android_jni_generator_dir,
|
input_api.os_path.join(base_android_jni_generator_dir,
|
||||||
'jni_generator_tests.py')
|
'jni_generator_tests.py')
|
||||||
],
|
],
|
||||||
env=env,
|
env=env,
|
||||||
))
|
)
|
||||||
|
|
||||||
|
|
||||||
def CheckChangeOnUpload(input_api, output_api):
|
def CheckChangeOnUpload(input_api, output_api):
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
#!/usr/bin/env python3
|
#!/usr/bin/env python
|
||||||
# Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
# Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
||||||
# Use of this source code is governed by a BSD-style license that can be
|
# Use of this source code is governed by a BSD-style license that can be
|
||||||
# found in the LICENSE file.
|
# found in the LICENSE file.
|
||||||
@ -11,6 +11,8 @@ code generator and ensures the output matches a golden
|
|||||||
file.
|
file.
|
||||||
"""
|
"""
|
||||||
|
|
||||||
|
from __future__ import print_function
|
||||||
|
|
||||||
import collections
|
import collections
|
||||||
import difflib
|
import difflib
|
||||||
import inspect
|
import inspect
|
||||||
|
@ -6,7 +6,6 @@
|
|||||||
|
|
||||||
#include "base/android/jni_android.h"
|
#include "base/android/jni_android.h"
|
||||||
#include "base/logging.h"
|
#include "base/logging.h"
|
||||||
#include "base/numerics/safe_conversions.h"
|
|
||||||
#include "base/strings/utf_string_conversions.h"
|
#include "base/strings/utf_string_conversions.h"
|
||||||
|
|
||||||
namespace {
|
namespace {
|
||||||
@ -14,8 +13,8 @@ namespace {
|
|||||||
// Internal version that does not use a scoped local pointer.
|
// Internal version that does not use a scoped local pointer.
|
||||||
jstring ConvertUTF16ToJavaStringImpl(JNIEnv* env,
|
jstring ConvertUTF16ToJavaStringImpl(JNIEnv* env,
|
||||||
const base::StringPiece16& str) {
|
const base::StringPiece16& str) {
|
||||||
jstring result = env->NewString(reinterpret_cast<const jchar*>(str.data()),
|
jstring result =
|
||||||
base::checked_cast<jsize>(str.length()));
|
env->NewString(reinterpret_cast<const jchar*>(str.data()), str.length());
|
||||||
base::android::CheckException(env);
|
base::android::CheckException(env);
|
||||||
return result;
|
return result;
|
||||||
}
|
}
|
||||||
@ -33,7 +32,7 @@ void ConvertJavaStringToUTF8(JNIEnv* env, jstring str, std::string* result) {
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
const jsize length = env->GetStringLength(str);
|
const jsize length = env->GetStringLength(str);
|
||||||
if (length <= 0) {
|
if (!length) {
|
||||||
result->clear();
|
result->clear();
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
return;
|
return;
|
||||||
@ -43,8 +42,7 @@ void ConvertJavaStringToUTF8(JNIEnv* env, jstring str, std::string* result) {
|
|||||||
// function that yields plain (non Java-modified) UTF8.
|
// function that yields plain (non Java-modified) UTF8.
|
||||||
const jchar* chars = env->GetStringChars(str, NULL);
|
const jchar* chars = env->GetStringChars(str, NULL);
|
||||||
DCHECK(chars);
|
DCHECK(chars);
|
||||||
UTF16ToUTF8(reinterpret_cast<const char16_t*>(chars),
|
UTF16ToUTF8(reinterpret_cast<const char16_t*>(chars), length, result);
|
||||||
static_cast<size_t>(length), result);
|
|
||||||
env->ReleaseStringChars(str, chars);
|
env->ReleaseStringChars(str, chars);
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
}
|
}
|
||||||
@ -86,7 +84,7 @@ void ConvertJavaStringToUTF16(JNIEnv* env,
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
const jsize length = env->GetStringLength(str);
|
const jsize length = env->GetStringLength(str);
|
||||||
if (length <= 0) {
|
if (!length) {
|
||||||
result->clear();
|
result->clear();
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
return;
|
return;
|
||||||
@ -95,8 +93,7 @@ void ConvertJavaStringToUTF16(JNIEnv* env,
|
|||||||
DCHECK(chars);
|
DCHECK(chars);
|
||||||
// GetStringChars isn't required to NULL-terminate the strings
|
// GetStringChars isn't required to NULL-terminate the strings
|
||||||
// it returns, so the length must be explicitly checked.
|
// it returns, so the length must be explicitly checked.
|
||||||
result->assign(reinterpret_cast<const char16_t*>(chars),
|
result->assign(reinterpret_cast<const char16_t*>(chars), length);
|
||||||
static_cast<size_t>(length));
|
|
||||||
env->ReleaseStringChars(str, chars);
|
env->ReleaseStringChars(str, chars);
|
||||||
CheckException(env);
|
CheckException(env);
|
||||||
}
|
}
|
||||||
|
30
src/base/android/junit/PRESUBMIT.py
Normal file
30
src/base/android/junit/PRESUBMIT.py
Normal file
@ -0,0 +1,30 @@
|
|||||||
|
# Copyright 2020 The Chromium Authors. All rights reserved.
|
||||||
|
# Use of this source code is governed by a BSD-style license that can be
|
||||||
|
# found in the LICENSE file.
|
||||||
|
|
||||||
|
USE_PYTHON3 = True
|
||||||
|
|
||||||
|
|
||||||
|
def CheckChangeOnUpload(input_api, output_api):
|
||||||
|
results = []
|
||||||
|
|
||||||
|
# Dictionary of base/android files with corresponding Robolectric shadows.
|
||||||
|
# If new functions are added to the original file, it is very likely that
|
||||||
|
# function with the same signature should be added to the shadow.
|
||||||
|
impl_to_shadow_paths = {
|
||||||
|
'base/android/java/src/org/'
|
||||||
|
'chromium/base/metrics/RecordHistogram.java':
|
||||||
|
'base/android/junit/src/org/'
|
||||||
|
'chromium/base/metrics/test/ShadowRecordHistogram.java'
|
||||||
|
}
|
||||||
|
|
||||||
|
for impl_path, shadow_path in impl_to_shadow_paths.items():
|
||||||
|
if impl_path in input_api.change.LocalPaths():
|
||||||
|
if shadow_path not in input_api.change.LocalPaths():
|
||||||
|
results.append(
|
||||||
|
output_api.PresubmitPromptWarning(
|
||||||
|
'You modified the runtime class:\n {}\n'
|
||||||
|
'without changing the corresponding shadow test class'
|
||||||
|
':\n {}\n').format(impl_path, shadow_path))
|
||||||
|
|
||||||
|
return results
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user