xref: /optee_os/lib/libutils/isoc/bget_malloc.c (revision 6b1c18580069a7c71e32deb57f609031fffb6e68)
1 // SPDX-License-Identifier: BSD-2-Clause
2 /*
3  * Copyright (c) 2014, STMicroelectronics International N.V.
4  * Copyright (c) 2015-2025, Linaro Limited.
5  */
6 
7 #define PROTOTYPES
8 
9 /*
10  *  BGET CONFIGURATION
11  *  ==================
12  */
13 /* #define BGET_ENABLE_ALL_OPTIONS */
14 #ifdef BGET_ENABLE_OPTION
15 #define TestProg    20000	/* Generate built-in test program
16 				   if defined.  The value specifies
17 				   how many buffer allocation attempts
18 				   the test program should make. */
19 #endif
20 
21 
22 #ifdef __LP64__
23 #define SizeQuant   16
24 #endif
25 #ifdef __ILP32__
26 #define SizeQuant   8
27 #endif
28 				/* Buffer allocation size quantum:
29 				   all buffers allocated are a
30 				   multiple of this size.  This
31 				   MUST be a power of two. */
32 
33 #ifdef BGET_ENABLE_OPTION
34 #define BufDump     1		/* Define this symbol to enable the
35 				   bpoold() function which dumps the
36 				   buffers in a buffer pool. */
37 
38 #define BufValid    1		/* Define this symbol to enable the
39 				   bpoolv() function for validating
40 				   a buffer pool. */
41 
42 #define DumpData    1		/* Define this symbol to enable the
43 				   bufdump() function which allows
44 				   dumping the contents of an allocated
45 				   or free buffer. */
46 
47 #define BufStats    1		/* Define this symbol to enable the
48 				   bstats() function which calculates
49 				   the total free space in the buffer
50 				   pool, the largest available
51 				   buffer, and the total space
52 				   currently allocated. */
53 
54 #define FreeWipe    1		/* Wipe free buffers to a guaranteed
55 				   pattern of garbage to trip up
56 				   miscreants who attempt to use
57 				   pointers into released buffers. */
58 
59 #define BestFit     1		/* Use a best fit algorithm when
60 				   searching for space for an
61 				   allocation request.  This uses
62 				   memory more efficiently, but
63 				   allocation will be much slower. */
64 
65 #define BECtl       1		/* Define this symbol to enable the
66 				   bectl() function for automatic
67 				   pool space control.  */
68 #endif
69 
70 #ifdef MEM_DEBUG
71 #undef NDEBUG
72 #define DumpData    1
73 #define BufValid    1
74 #define FreeWipe    1
75 #endif
76 
77 #ifdef CFG_WITH_STATS
78 #define BufStats    1
79 #endif
80 
81 #include <compiler.h>
82 #include <config.h>
83 #include <malloc.h>
84 #include <memtag.h>
85 #include <pta_stats.h>
86 #include <stdbool.h>
87 #include <stdint.h>
88 #include <stdlib_ext.h>
89 #include <stdlib.h>
90 #include <string.h>
91 #include <trace.h>
92 #include <util.h>
93 
94 #if defined(__KERNEL__)
95 /* Compiling for TEE Core */
96 #include <kernel/asan.h>
97 #include <kernel/spinlock.h>
98 #include <kernel/unwind.h>
99 
100 static void *memset_unchecked(void *s, int c, size_t n)
101 {
102 	return asan_memset_unchecked(s, c, n);
103 }
104 
105 static __maybe_unused void *memcpy_unchecked(void *dst, const void *src,
106 					     size_t n)
107 {
108 	return asan_memcpy_unchecked(dst, src, n);
109 }
110 
111 #else /*__KERNEL__*/
112 /* Compiling for TA */
113 
114 static void *memset_unchecked(void *s, int c, size_t n)
115 {
116 	return memset(s, c, n);
117 }
118 
119 static __maybe_unused void *memcpy_unchecked(void *dst, const void *src,
120 					     size_t n)
121 {
122 	return memcpy(dst, src, n);
123 }
124 
125 #endif /*__KERNEL__*/
126 
127 #include "bget.c"		/* this is ugly, but this is bget */
128 
129 struct malloc_pool {
130 	void *buf;
131 	size_t len;
132 };
133 
134 struct malloc_ctx {
135 	struct bpoolset poolset;
136 	struct malloc_pool *pool;
137 	size_t pool_len;
138 #ifdef BufStats
139 	struct pta_stats_alloc mstats;
140 #endif
141 #ifdef __KERNEL__
142 	unsigned int spinlock;
143 #endif
144 };
145 
146 #ifdef __KERNEL__
147 
148 static uint32_t malloc_lock(struct malloc_ctx *ctx)
149 {
150 	return cpu_spin_lock_xsave(&ctx->spinlock);
151 }
152 
153 static void malloc_unlock(struct malloc_ctx *ctx, uint32_t exceptions)
154 {
155 	cpu_spin_unlock_xrestore(&ctx->spinlock, exceptions);
156 }
157 
158 #else  /* __KERNEL__ */
159 
160 static uint32_t malloc_lock(struct malloc_ctx *ctx __unused)
161 {
162 	return 0;
163 }
164 
165 static void malloc_unlock(struct malloc_ctx *ctx __unused,
166 			  uint32_t exceptions __unused)
167 {
168 }
169 
170 #endif	/* __KERNEL__ */
171 
172 #define DEFINE_CTX(name) struct malloc_ctx name =		\
173 	{ .poolset = { .freelist = { {0, 0},			\
174 			{&name.poolset.freelist,		\
175 			 &name.poolset.freelist}}}}
176 
177 static DEFINE_CTX(malloc_ctx);
178 
179 #ifdef CFG_NS_VIRTUALIZATION
180 static __nex_data DEFINE_CTX(nex_malloc_ctx);
181 #endif
182 
183 static void print_oom(size_t req_size __maybe_unused, void *ctx __maybe_unused)
184 {
185 #if defined(__KERNEL__) && defined(CFG_CORE_DUMP_OOM)
186 	EMSG("Memory allocation failed: size %zu context %p", req_size, ctx);
187 	print_kernel_stack();
188 #endif
189 }
190 
191 /* Most of the stuff in this function is copied from bgetr() in bget.c */
192 static __maybe_unused bufsize bget_buf_size(void *buf)
193 {
194 	bufsize osize;          /* Old size of buffer */
195 	struct bhead *b;
196 
197 	b = BH(((char *)buf) - sizeof(struct bhead));
198 	osize = -b->bsize;
199 #ifdef BECtl
200 	if (osize == 0) {
201 		/*  Buffer acquired directly through acqfcn. */
202 		struct bdhead *bd;
203 
204 		bd = BDH(((char *)buf) - sizeof(struct bdhead));
205 		osize = bd->tsize - sizeof(struct bdhead) - bd->offs;
206 	} else
207 #endif
208 		osize -= sizeof(struct bhead);
209 	assert(osize > 0);
210 	return osize;
211 }
212 
213 static void *maybe_tag_buf(uint8_t *buf, size_t hdr_size, size_t requested_size)
214 {
215 	if (!buf)
216 		return NULL;
217 
218 	COMPILE_TIME_ASSERT(MEMTAG_GRANULE_SIZE <= SizeQuant);
219 
220 	if (MEMTAG_IS_ENABLED) {
221 		size_t sz = ROUNDUP(requested_size, MEMTAG_GRANULE_SIZE);
222 
223 		/*
224 		 * Allocated buffer can be larger than requested when
225 		 * allocating with memalign(), but we should never tag more
226 		 * than allocated.
227 		 */
228 		assert(bget_buf_size(buf) >= sz + hdr_size);
229 		return memtag_set_random_tags(buf, sz + hdr_size);
230 	}
231 
232 #if defined(__KERNEL__)
233 	if (IS_ENABLED(CFG_CORE_SANITIZE_KADDRESS))
234 		asan_tag_access(buf, buf + hdr_size + requested_size);
235 #endif
236 	return buf;
237 }
238 
239 static void *maybe_untag_buf(void *buf)
240 {
241 	if (!buf)
242 		return NULL;
243 
244 	if (MEMTAG_IS_ENABLED) {
245 		size_t sz = 0;
246 
247 		memtag_assert_tag(buf); /* Trying to catch double free early */
248 		sz = bget_buf_size(memtag_strip_tag(buf));
249 		return memtag_set_tags(buf, sz, 0);
250 	}
251 
252 #if defined(__KERNEL__)
253 	if (IS_ENABLED(CFG_CORE_SANITIZE_KADDRESS))
254 		asan_tag_heap_free(buf, (uint8_t *)buf + bget_buf_size(buf));
255 #endif
256 	return buf;
257 }
258 
259 static void *strip_tag(void *buf)
260 {
261 	if (MEMTAG_IS_ENABLED)
262 		return memtag_strip_tag(buf);
263 	return buf;
264 }
265 
266 static void tag_asan_free(void *buf __maybe_unused, size_t len __maybe_unused)
267 {
268 #if defined(__KERNEL__)
269 	asan_tag_heap_free(buf, (uint8_t *)buf + len);
270 #endif
271 }
272 
273 #ifdef BufStats
274 
275 static void *raw_malloc_return_hook(void *p, size_t hdr_size,
276 				    size_t requested_size,
277 				    struct malloc_ctx *ctx)
278 {
279 	if (ctx->poolset.totalloc > ctx->mstats.max_allocated)
280 		ctx->mstats.max_allocated = ctx->poolset.totalloc;
281 
282 	if (!p) {
283 		ctx->mstats.num_alloc_fail++;
284 		print_oom(requested_size, ctx);
285 		if (requested_size > ctx->mstats.biggest_alloc_fail) {
286 			ctx->mstats.biggest_alloc_fail = requested_size;
287 			ctx->mstats.biggest_alloc_fail_used =
288 				ctx->poolset.totalloc;
289 		}
290 	}
291 
292 	return maybe_tag_buf(p, hdr_size, MAX(SizeQuant, requested_size));
293 }
294 
295 static void gen_malloc_reset_stats(struct malloc_ctx *ctx)
296 {
297 	uint32_t exceptions = malloc_lock(ctx);
298 
299 	ctx->mstats.max_allocated = 0;
300 	ctx->mstats.num_alloc_fail = 0;
301 	ctx->mstats.biggest_alloc_fail = 0;
302 	ctx->mstats.biggest_alloc_fail_used = 0;
303 	malloc_unlock(ctx, exceptions);
304 }
305 
306 void malloc_reset_stats(void)
307 {
308 	gen_malloc_reset_stats(&malloc_ctx);
309 }
310 
311 static void gen_malloc_get_stats(struct malloc_ctx *ctx,
312 				 struct pta_stats_alloc *stats)
313 {
314 	uint32_t exceptions = malloc_lock(ctx);
315 
316 	raw_malloc_get_stats(ctx, stats);
317 	malloc_unlock(ctx, exceptions);
318 }
319 
320 void malloc_get_stats(struct pta_stats_alloc *stats)
321 {
322 	gen_malloc_get_stats(&malloc_ctx, stats);
323 }
324 
325 #else /* BufStats */
326 
327 static void *raw_malloc_return_hook(void *p, size_t hdr_size,
328 				    size_t requested_size,
329 				    struct malloc_ctx *ctx )
330 {
331 	if (!p)
332 		print_oom(requested_size, ctx);
333 
334 	return maybe_tag_buf(p, hdr_size, MAX(SizeQuant, requested_size));
335 }
336 
337 #endif /* BufStats */
338 
339 #ifdef BufValid
340 static void raw_malloc_validate_pools(struct malloc_ctx *ctx)
341 {
342 	size_t n;
343 
344 	for (n = 0; n < ctx->pool_len; n++)
345 		bpoolv(ctx->pool[n].buf);
346 }
347 #else
348 static void raw_malloc_validate_pools(struct malloc_ctx *ctx __unused)
349 {
350 }
351 #endif
352 
353 struct bpool_iterator {
354 	struct bfhead *next_buf;
355 	size_t pool_idx;
356 };
357 
358 static void bpool_foreach_iterator_init(struct malloc_ctx *ctx,
359 					struct bpool_iterator *iterator)
360 {
361 	iterator->pool_idx = 0;
362 	iterator->next_buf = BFH(ctx->pool[0].buf);
363 }
364 
365 static bool bpool_foreach_pool(struct bpool_iterator *iterator, void **buf,
366 		size_t *len, bool *isfree)
367 {
368 	struct bfhead *b = iterator->next_buf;
369 	bufsize bs = b->bh.bsize;
370 
371 	if (bs == ESent)
372 		return false;
373 
374 	if (bs < 0) {
375 		/* Allocated buffer */
376 		bs = -bs;
377 
378 		*isfree = false;
379 	} else {
380 		/* Free Buffer */
381 		*isfree = true;
382 
383 		/* Assert that the free list links are intact */
384 		assert(b->ql.blink->ql.flink == b);
385 		assert(b->ql.flink->ql.blink == b);
386 	}
387 
388 	*buf = (uint8_t *)b + sizeof(struct bhead);
389 	*len = bs - sizeof(struct bhead);
390 
391 	iterator->next_buf = BFH((uint8_t *)b + bs);
392 	return true;
393 }
394 
395 static bool bpool_foreach(struct malloc_ctx *ctx,
396 			  struct bpool_iterator *iterator, void **buf)
397 {
398 	while (true) {
399 		size_t len;
400 		bool isfree;
401 
402 		if (bpool_foreach_pool(iterator, buf, &len, &isfree)) {
403 			if (isfree)
404 				continue;
405 			return true;
406 		}
407 
408 		if ((iterator->pool_idx + 1) >= ctx->pool_len)
409 			return false;
410 
411 		iterator->pool_idx++;
412 		iterator->next_buf = BFH(ctx->pool[iterator->pool_idx].buf);
413 	}
414 }
415 
416 /* Convenience macro for looping over all allocated buffers */
417 #define BPOOL_FOREACH(ctx, iterator, bp)		      \
418 	for (bpool_foreach_iterator_init((ctx),(iterator));   \
419 	     bpool_foreach((ctx),(iterator), (bp));)
420 
421 static void *raw_mem_alloc(uint32_t flags, void *ptr, size_t hdr_size,
422 			   size_t ftr_size, size_t alignment, size_t pl_nmemb,
423 			   size_t pl_size, struct malloc_ctx *ctx)
424 {
425 	void *p = NULL;
426 	bufsize s = 0;
427 
428 	raw_malloc_validate_pools(ctx);
429 
430 	if (!alignment || !IS_POWER_OF_TWO(alignment))
431 		return NULL;
432 
433 	/* Compute total size, excluding hdr_size */
434 	if (MUL_OVERFLOW(pl_nmemb, pl_size, &s))
435 		goto out;
436 	if (ADD_OVERFLOW(s, ftr_size, &s))
437 		goto out;
438 
439 	/* BGET doesn't like 0 sized allocations */
440 	if (!s)
441 		s++;
442 
443 	if ((flags & MAF_ZERO_INIT) && !ptr)
444 		p = bgetz(alignment, hdr_size, s, &ctx->poolset);
445 	else
446 		p = bget(alignment, hdr_size, s, &ctx->poolset);
447 
448 	if (p && ptr) {
449 		void *old_ptr = maybe_untag_buf(ptr);
450 		bufsize old_sz = bget_buf_size(old_ptr);
451 		bufsize new_sz = s + hdr_size;
452 
453 		if (old_sz < new_sz) {
454 			memcpy_unchecked(p, old_ptr, old_sz);
455 			/* User space reallocations are always zeroed */
456 			if (!IS_ENABLED2(__KERNEL__) || (flags & MAF_ZERO_INIT))
457 				memset_unchecked((uint8_t *)p + old_sz, 0,
458 						 new_sz - old_sz);
459 		} else {
460 			memcpy_unchecked(p, old_ptr, new_sz);
461 		}
462 
463 		brel(old_ptr, &ctx->poolset, false /*!wipe*/);
464 	}
465 out:
466 	return raw_malloc_return_hook(p, hdr_size, pl_nmemb * pl_size, ctx);
467 }
468 
469 void *raw_memalign(size_t hdr_size, size_t ftr_size, size_t alignment,
470 		   size_t pl_size, struct malloc_ctx *ctx)
471 {
472 	return raw_mem_alloc(MAF_NULL, NULL, hdr_size, ftr_size, alignment, 1,
473 			     pl_size, ctx);
474 }
475 
476 void *raw_malloc(size_t hdr_size, size_t ftr_size, size_t pl_size,
477 		 struct malloc_ctx *ctx)
478 {
479 	return raw_mem_alloc(MAF_NULL, NULL, hdr_size, ftr_size, 1, 1,
480 			     pl_size, ctx);
481 }
482 
483 void raw_free(void *ptr, struct malloc_ctx *ctx, bool wipe)
484 {
485 	raw_malloc_validate_pools(ctx);
486 
487 	if (ptr)
488 		brel(maybe_untag_buf(ptr), &ctx->poolset, wipe);
489 }
490 
491 void *raw_calloc(size_t hdr_size, size_t ftr_size, size_t pl_nmemb,
492 		 size_t pl_size, struct malloc_ctx *ctx)
493 {
494 	return raw_mem_alloc(MAF_ZERO_INIT, NULL, hdr_size, ftr_size, 1,
495 			     pl_nmemb, pl_size, ctx);
496 }
497 
498 void *raw_realloc(void *ptr, size_t hdr_size, size_t ftr_size,
499 		  size_t pl_size, struct malloc_ctx *ctx)
500 {
501 	return raw_mem_alloc(MAF_NULL, ptr, hdr_size, ftr_size, 1, 1,
502 			     pl_size, ctx);
503 }
504 
505 struct mdbg_hdr {
506 	const char *fname;
507 	uint16_t line;
508 #ifdef __LP64__
509 	uint64_t pad;
510 #endif
511 	uint32_t pl_size;
512 	uint32_t magic;
513 };
514 
515 #define MDBG_HEADER_MAGIC	0xadadadad
516 #define MDBG_FOOTER_MAGIC	0xecececec
517 
518 static size_t mdbg_get_ftr_size(size_t pl_size)
519 {
520 	size_t ftr_pad = ROUNDUP(pl_size, sizeof(uint32_t)) - pl_size;
521 
522 	return ftr_pad + sizeof(uint32_t);
523 }
524 
525 static uint32_t *mdbg_get_footer(struct mdbg_hdr *hdr)
526 {
527 	uint32_t *footer;
528 
529 	footer = (uint32_t *)((uint8_t *)(hdr + 1) + hdr->pl_size +
530 			      mdbg_get_ftr_size(hdr->pl_size));
531 	footer--;
532 	return strip_tag(footer);
533 }
534 
535 static void mdbg_update_hdr(struct mdbg_hdr *hdr, const char *fname,
536 		int lineno, size_t pl_size)
537 {
538 	uint32_t *footer;
539 
540 	hdr->fname = fname;
541 	hdr->line = lineno;
542 	hdr->pl_size = pl_size;
543 	hdr->magic = MDBG_HEADER_MAGIC;
544 
545 	footer = mdbg_get_footer(hdr);
546 	*footer = MDBG_FOOTER_MAGIC;
547 }
548 
549 static void assert_header(struct mdbg_hdr *hdr __maybe_unused)
550 {
551 	assert(hdr->magic == MDBG_HEADER_MAGIC);
552 	assert(*mdbg_get_footer(hdr) == MDBG_FOOTER_MAGIC);
553 }
554 
555 static void *mem_alloc_unlocked(uint32_t flags, void *ptr, size_t alignment,
556 				size_t nmemb, size_t size, const char *fname,
557 				int lineno, struct malloc_ctx *ctx)
558 {
559 	struct mdbg_hdr *hdr = NULL;
560 	size_t ftr_size = 0;
561 	size_t hdr_size = 0;
562 
563 	/*
564 	 * Check struct mdbg_hdr works with BGET_HDR_QUANTUM.
565 	 */
566 	static_assert((sizeof(struct mdbg_hdr) % BGET_HDR_QUANTUM) == 0);
567 
568 	if (IS_ENABLED2(ENABLE_MDBG)) {
569 		if (ptr) {
570 			hdr = ptr;
571 			hdr--;
572 			assert_header(hdr);
573 		}
574 		ftr_size = mdbg_get_ftr_size(nmemb * size);
575 		hdr_size = sizeof(struct mdbg_hdr);
576 		ptr = hdr;
577 	}
578 
579 	ptr = raw_mem_alloc(flags, ptr, hdr_size, ftr_size, alignment, nmemb,
580 			    size, ctx);
581 
582 	if (IS_ENABLED2(ENABLE_MDBG) && ptr) {
583 		hdr = ptr;
584 		mdbg_update_hdr(hdr, fname, lineno, nmemb * size);
585 		hdr++;
586 		ptr = hdr;
587 	}
588 
589 	return ptr;
590 }
591 
592 static struct malloc_ctx *get_ctx(uint32_t flags __maybe_unused)
593 {
594 #ifdef CFG_NS_VIRTUALIZATION
595 	if (flags & MAF_NEX)
596 		return &nex_malloc_ctx;
597 #endif
598 	return &malloc_ctx;
599 }
600 
601 static void *mem_alloc(uint32_t flags, void *ptr, size_t alignment,
602 		       size_t nmemb, size_t size, const char *fname, int lineno)
603 {
604 	struct malloc_ctx *ctx = get_ctx(flags);
605 	uint32_t exceptions = 0;
606 	void *p = NULL;
607 
608 	exceptions = malloc_lock(ctx);
609 	p = mem_alloc_unlocked(flags, ptr, alignment, nmemb, size, fname,
610 			       lineno, ctx);
611 	malloc_unlock(ctx, exceptions);
612 
613 	return p;
614 }
615 
616 void free_flags(uint32_t flags, void *ptr)
617 {
618 	struct malloc_ctx *ctx = get_ctx(flags);
619 	uint32_t exceptions = 0;
620 
621 	exceptions = malloc_lock(ctx);
622 
623 	if (IS_ENABLED2(ENABLE_MDBG) && ptr) {
624 		struct mdbg_hdr *hdr = ptr;
625 
626 		hdr--;
627 		assert_header(hdr);
628 		hdr->magic = 0;
629 		*mdbg_get_footer(hdr) = 0;
630 		ptr = hdr;
631 	}
632 
633 	raw_free(ptr, ctx, flags & MAF_FREE_WIPE);
634 
635 	malloc_unlock(ctx, exceptions);
636 }
637 
638 static void *get_payload_start_size(void *raw_buf, size_t *size)
639 {
640 	if (IS_ENABLED2(ENABLE_MDBG)) {
641 		struct mdbg_hdr *hdr = raw_buf;
642 
643 		assert(bget_buf_size(hdr) >= hdr->pl_size);
644 		*size = hdr->pl_size;
645 		return hdr + 1;
646 	}
647 
648 	*size = bget_buf_size(raw_buf);
649 	return raw_buf;
650 }
651 
652 /* For use in raw_malloc_add_pool() below */
653 #define realloc_unlocked(ctx, ptr, size)                                      \
654 	mem_alloc_unlocked(MAF_NULL, (ptr), 1, 1, (size), __FILE__, __LINE__, \
655 			   (ctx))
656 
657 #ifdef ENABLE_MDBG
658 void *__mdbg_alloc(uint32_t flags, void *ptr, size_t alignment, size_t nmemb,
659 		   size_t size, const char *fname, int lineno)
660 {
661 	return mem_alloc(flags, ptr, alignment, nmemb, size, fname, lineno);
662 }
663 
664 static void gen_mdbg_check(struct malloc_ctx *ctx, int bufdump)
665 {
666 	struct bpool_iterator itr;
667 	void *b;
668 	uint32_t exceptions = malloc_lock(ctx);
669 
670 	raw_malloc_validate_pools(ctx);
671 
672 	BPOOL_FOREACH(ctx, &itr, &b) {
673 		struct mdbg_hdr *hdr = (struct mdbg_hdr *)b;
674 
675 		assert_header(hdr);
676 
677 		if (bufdump > 0) {
678 			const char *fname = hdr->fname;
679 
680 			if (!fname)
681 				fname = "unknown";
682 
683 			IMSG("buffer: %d bytes %s:%d",
684 				hdr->pl_size, fname, hdr->line);
685 		}
686 	}
687 
688 	malloc_unlock(ctx, exceptions);
689 }
690 
691 void mdbg_check(int bufdump)
692 {
693 	gen_mdbg_check(&malloc_ctx, bufdump);
694 }
695 #endif
696 
697 /*
698  * If malloc debug is enabled, malloc() and friends are redirected by macros
699  * to __mdbg_alloc() etc.
700  * We still want to export the standard entry points in case they are referenced
701  * by the application, either directly or via external libraries.
702  */
703 
704 #undef malloc
705 void *malloc(size_t size)
706 {
707 	return mem_alloc(MAF_NULL, NULL, 1, 1, size, __FILE__, __LINE__);
708 }
709 
710 #undef malloc_flags
711 void *malloc_flags(uint32_t flags, void *ptr, size_t alignment, size_t size)
712 {
713 	return mem_alloc(flags, ptr, alignment, 1, size, __FILE__, __LINE__);
714 }
715 
716 #undef calloc
717 void *calloc(size_t nmemb, size_t size)
718 {
719 	return mem_alloc(MAF_ZERO_INIT, NULL, 1, nmemb, size, __FILE__,
720 			 __LINE__);
721 }
722 
723 #undef realloc
724 void *realloc(void *ptr, size_t size)
725 {
726 	return mem_alloc(MAF_NULL, ptr, 1, 1, size, __FILE__, __LINE__);
727 }
728 
729 #undef memalign
730 void *memalign(size_t alignment, size_t size)
731 {
732 	return mem_alloc(MAF_NULL, NULL, alignment, 1, size, __FILE__,
733 			 __LINE__);
734 }
735 
736 #if __STDC_VERSION__ >= 201112L
737 #undef aligned_alloc
738 void *aligned_alloc(size_t alignment, size_t size)
739 {
740 	if (size % alignment)
741 		return NULL;
742 
743 	return mem_alloc(MAF_NULL, NULL, alignment, 1, size, __FILE__,
744 			 __LINE__);
745 }
746 #endif /* __STDC_VERSION__ */
747 
748 void free(void *ptr)
749 {
750 	free_flags(MAF_NULL, ptr);
751 }
752 
753 void free_wipe(void *ptr)
754 {
755 	free_flags(MAF_FREE_WIPE, ptr);
756 }
757 
758 static void gen_malloc_add_pool(struct malloc_ctx *ctx, void *buf, size_t len)
759 {
760 	uint32_t exceptions = malloc_lock(ctx);
761 
762 	raw_malloc_add_pool(ctx, buf, len);
763 	malloc_unlock(ctx, exceptions);
764 }
765 
766 static bool gen_malloc_buffer_is_within_alloced(struct malloc_ctx *ctx,
767 						void *buf, size_t len)
768 {
769 	uint32_t exceptions = malloc_lock(ctx);
770 	bool ret = false;
771 
772 	ret = raw_malloc_buffer_is_within_alloced(ctx, buf, len);
773 	malloc_unlock(ctx, exceptions);
774 
775 	return ret;
776 }
777 
778 static bool gen_malloc_buffer_overlaps_heap(struct malloc_ctx *ctx,
779 					    void *buf, size_t len)
780 {
781 	bool ret = false;
782 	uint32_t exceptions = malloc_lock(ctx);
783 
784 	ret = raw_malloc_buffer_overlaps_heap(ctx, buf, len);
785 	malloc_unlock(ctx, exceptions);
786 	return ret;
787 }
788 
789 size_t raw_malloc_get_ctx_size(void)
790 {
791 	return sizeof(struct malloc_ctx);
792 }
793 
794 void raw_malloc_init_ctx(struct malloc_ctx *ctx)
795 {
796 	memset(ctx, 0, sizeof(*ctx));
797 	ctx->poolset.freelist.ql.flink = &ctx->poolset.freelist;
798 	ctx->poolset.freelist.ql.blink = &ctx->poolset.freelist;
799 }
800 
801 void raw_malloc_add_pool(struct malloc_ctx *ctx, void *buf, size_t len)
802 {
803 	const size_t min_len = sizeof(struct bhead) + sizeof(struct bfhead);
804 	uintptr_t start = (uintptr_t)buf;
805 	uintptr_t end = start + len;
806 	void *p = NULL;
807 	size_t l = 0;
808 
809 	start = ROUNDUP(start, SizeQuant);
810 	end = ROUNDDOWN(end, SizeQuant);
811 
812 	if (start > end || (end - start) < min_len) {
813 		DMSG("Skipping too small pool");
814 		return;
815 	}
816 
817 	/* First pool requires a bigger size */
818 	if (!ctx->pool_len && (end - start) < MALLOC_INITIAL_POOL_MIN_SIZE) {
819 		DMSG("Skipping too small initial pool");
820 		return;
821 	}
822 
823 	tag_asan_free((void *)start, end - start);
824 	bpool((void *)start, end - start, &ctx->poolset);
825 	l = ctx->pool_len + 1;
826 	p = realloc_unlocked(ctx, ctx->pool, sizeof(struct malloc_pool) * l);
827 	assert(p);
828 	ctx->pool = p;
829 	ctx->pool[ctx->pool_len].buf = (void *)start;
830 	ctx->pool[ctx->pool_len].len = end - start;
831 #ifdef BufStats
832 	ctx->mstats.size += ctx->pool[ctx->pool_len].len;
833 #endif
834 	ctx->pool_len = l;
835 }
836 
837 bool raw_malloc_buffer_overlaps_heap(struct malloc_ctx *ctx,
838 				     void *buf, size_t len)
839 {
840 	uintptr_t buf_start = (uintptr_t)strip_tag(buf);
841 	uintptr_t buf_end = buf_start + len;
842 	size_t n = 0;
843 
844 	raw_malloc_validate_pools(ctx);
845 
846 	for (n = 0; n < ctx->pool_len; n++) {
847 		uintptr_t pool_start = (uintptr_t)strip_tag(ctx->pool[n].buf);
848 		uintptr_t pool_end = pool_start + ctx->pool[n].len;
849 
850 		if (buf_start > buf_end || pool_start > pool_end)
851 			return true;	/* Wrapping buffers, shouldn't happen */
852 
853 		if ((buf_start >= pool_start && buf_start < pool_end) ||
854 		    (buf_end > pool_start && buf_end < pool_end))
855 			return true;
856 	}
857 
858 	return false;
859 }
860 
861 bool raw_malloc_buffer_is_within_alloced(struct malloc_ctx *ctx,
862 					 void *buf, size_t len)
863 {
864 	struct bpool_iterator itr = { };
865 	void *b = NULL;
866 	uint8_t *start_buf = strip_tag(buf);
867 	uint8_t *end_buf = start_buf + len;
868 
869 	raw_malloc_validate_pools(ctx);
870 
871 	/* Check for wrapping */
872 	if (start_buf > end_buf)
873 		return false;
874 
875 	BPOOL_FOREACH(ctx, &itr, &b) {
876 		uint8_t *start_b = NULL;
877 		uint8_t *end_b = NULL;
878 		size_t s = 0;
879 
880 		start_b = strip_tag(get_payload_start_size(b, &s));
881 		end_b = start_b + s;
882 		if (start_buf >= start_b && end_buf <= end_b)
883 			return true;
884 	}
885 
886 	return false;
887 }
888 
889 #ifdef CFG_WITH_STATS
890 void raw_malloc_get_stats(struct malloc_ctx *ctx, struct pta_stats_alloc *stats)
891 {
892 	memcpy_unchecked(stats, &ctx->mstats, sizeof(*stats));
893 	stats->allocated = ctx->poolset.totalloc;
894 }
895 #endif
896 
897 void malloc_add_pool(void *buf, size_t len)
898 {
899 	gen_malloc_add_pool(&malloc_ctx, buf, len);
900 }
901 
902 bool malloc_buffer_is_within_alloced(void *buf, size_t len)
903 {
904 	return gen_malloc_buffer_is_within_alloced(&malloc_ctx, buf, len);
905 }
906 
907 bool malloc_buffer_overlaps_heap(void *buf, size_t len)
908 {
909 	return gen_malloc_buffer_overlaps_heap(&malloc_ctx, buf, len);
910 }
911 
912 #ifdef CFG_NS_VIRTUALIZATION
913 
914 #ifndef ENABLE_MDBG
915 
916 void *nex_malloc(size_t size)
917 {
918 	return mem_alloc(MAF_NEX, NULL, 1, 1, size, __FILE__, __LINE__);
919 }
920 
921 void *nex_calloc(size_t nmemb, size_t size)
922 {
923 	return mem_alloc(MAF_NEX | MAF_ZERO_INIT, NULL, 1, nmemb, size,
924 			 __FILE__, __LINE__);
925 }
926 
927 void *nex_realloc(void *ptr, size_t size)
928 {
929 	return mem_alloc(MAF_NEX, ptr, 1, 1, size, __FILE__, __LINE__);
930 }
931 
932 void *nex_memalign(size_t alignment, size_t size)
933 {
934 	return mem_alloc(MAF_NEX, NULL, alignment, 1, size, __FILE__, __LINE__);
935 }
936 
937 #else  /* ENABLE_MDBG */
938 
939 void nex_mdbg_check(int bufdump)
940 {
941 	gen_mdbg_check(&nex_malloc_ctx, bufdump);
942 }
943 
944 #endif	/* ENABLE_MDBG */
945 
946 void nex_free(void *ptr)
947 {
948 	free_flags(MAF_NEX, ptr);
949 }
950 
951 void nex_malloc_add_pool(void *buf, size_t len)
952 {
953 	gen_malloc_add_pool(&nex_malloc_ctx, buf, len);
954 }
955 
956 bool nex_malloc_buffer_is_within_alloced(void *buf, size_t len)
957 {
958 	return gen_malloc_buffer_is_within_alloced(&nex_malloc_ctx, buf, len);
959 }
960 
961 bool nex_malloc_buffer_overlaps_heap(void *buf, size_t len)
962 {
963 	return gen_malloc_buffer_overlaps_heap(&nex_malloc_ctx, buf, len);
964 }
965 
966 #ifdef BufStats
967 
968 void nex_malloc_reset_stats(void)
969 {
970 	gen_malloc_reset_stats(&nex_malloc_ctx);
971 }
972 
973 void nex_malloc_get_stats(struct pta_stats_alloc *stats)
974 {
975 	gen_malloc_get_stats(&nex_malloc_ctx, stats);
976 }
977 
978 #endif
979 
980 #endif
981