[73abe95] | 1 | //
|
---|
[c4f68dc] | 2 | // Cforall Version 1.0.0 Copyright (C) 2017 University of Waterloo
|
---|
| 3 | //
|
---|
| 4 | // The contents of this file are covered under the licence agreement in the
|
---|
| 5 | // file "LICENCE" distributed with Cforall.
|
---|
[73abe95] | 6 | //
|
---|
[92aca37] | 7 | // heap.cfa --
|
---|
[73abe95] | 8 | //
|
---|
[c4f68dc] | 9 | // Author : Peter A. Buhr
|
---|
| 10 | // Created On : Tue Dec 19 21:58:35 2017
|
---|
| 11 | // Last Modified By : Peter A. Buhr
|
---|
[92aca37] | 12 | // Last Modified On : Sun Aug 9 12:23:20 2020
|
---|
| 13 | // Update Count : 894
|
---|
[73abe95] | 14 | //
|
---|
[c4f68dc] | 15 |
|
---|
| 16 | #include <unistd.h> // sbrk, sysconf
|
---|
| 17 | #include <stdbool.h> // true, false
|
---|
| 18 | #include <stdio.h> // snprintf, fileno
|
---|
| 19 | #include <errno.h> // errno
|
---|
[1e034d9] | 20 | #include <string.h> // memset, memcpy
|
---|
[1076d05] | 21 | #include <limits.h> // ULONG_MAX
|
---|
[ada0246d] | 22 | #include <malloc.h> // memalign, malloc_usable_size
|
---|
[c4f68dc] | 23 | #include <sys/mman.h> // mmap, munmap
|
---|
| 24 |
|
---|
[92aca37] | 25 | #include "bits/align.hfa" // libAlign
|
---|
[bcb14b5] | 26 | #include "bits/defs.hfa" // likely, unlikely
|
---|
| 27 | #include "bits/locks.hfa" // __spinlock_t
|
---|
[73abe95] | 28 | #include "startup.hfa" // STARTUP_PRIORITY_MEMORY
|
---|
[1e034d9] | 29 | //#include "stdlib.hfa" // bsearchl
|
---|
[1076d05] | 30 | #include "bitmanip.hfa" // ceiling
|
---|
[c4f68dc] | 31 |
|
---|
[95eb7cf] | 32 | #define MIN(x, y) (y > x ? x : y)
|
---|
[c4f68dc] | 33 |
|
---|
[93c2e0a] | 34 | static bool traceHeap = false;
|
---|
[d46ed6e] | 35 |
|
---|
[baf608a] | 36 | inline bool traceHeap() { return traceHeap; }
|
---|
[d46ed6e] | 37 |
|
---|
[93c2e0a] | 38 | bool traceHeapOn() {
|
---|
| 39 | bool temp = traceHeap;
|
---|
[d46ed6e] | 40 | traceHeap = true;
|
---|
| 41 | return temp;
|
---|
| 42 | } // traceHeapOn
|
---|
| 43 |
|
---|
[93c2e0a] | 44 | bool traceHeapOff() {
|
---|
| 45 | bool temp = traceHeap;
|
---|
[d46ed6e] | 46 | traceHeap = false;
|
---|
| 47 | return temp;
|
---|
| 48 | } // traceHeapOff
|
---|
| 49 |
|
---|
[baf608a] | 50 | bool traceHeapTerm() { return false; }
|
---|
| 51 |
|
---|
[d46ed6e] | 52 |
|
---|
[95eb7cf] | 53 | static bool prtFree = false;
|
---|
[d46ed6e] | 54 |
|
---|
[95eb7cf] | 55 | inline bool prtFree() {
|
---|
| 56 | return prtFree;
|
---|
| 57 | } // prtFree
|
---|
[5d4fa18] | 58 |
|
---|
[95eb7cf] | 59 | bool prtFreeOn() {
|
---|
| 60 | bool temp = prtFree;
|
---|
| 61 | prtFree = true;
|
---|
[5d4fa18] | 62 | return temp;
|
---|
[95eb7cf] | 63 | } // prtFreeOn
|
---|
[5d4fa18] | 64 |
|
---|
[95eb7cf] | 65 | bool prtFreeOff() {
|
---|
| 66 | bool temp = prtFree;
|
---|
| 67 | prtFree = false;
|
---|
[5d4fa18] | 68 | return temp;
|
---|
[95eb7cf] | 69 | } // prtFreeOff
|
---|
[5d4fa18] | 70 |
|
---|
| 71 |
|
---|
[e723100] | 72 | enum {
|
---|
[1e034d9] | 73 | // Define the default extension heap amount in units of bytes. When the uC++ supplied heap reaches the brk address,
|
---|
| 74 | // the brk address is extended by the extension amount.
|
---|
[e723100] | 75 | __CFA_DEFAULT_HEAP_EXPANSION__ = (1 * 1024 * 1024),
|
---|
[1e034d9] | 76 |
|
---|
| 77 | // Define the mmap crossover point during allocation. Allocations less than this amount are allocated from buckets;
|
---|
| 78 | // values greater than or equal to this value are mmap from the operating system.
|
---|
| 79 | __CFA_DEFAULT_MMAP_START__ = (512 * 1024 + 1),
|
---|
[e723100] | 80 | };
|
---|
| 81 |
|
---|
[dd23e66] | 82 | size_t default_mmap_start() __attribute__(( weak )) {
|
---|
| 83 | return __CFA_DEFAULT_MMAP_START__;
|
---|
| 84 | } // default_mmap_start
|
---|
| 85 |
|
---|
[e723100] | 86 | size_t default_heap_expansion() __attribute__(( weak )) {
|
---|
| 87 | return __CFA_DEFAULT_HEAP_EXPANSION__;
|
---|
| 88 | } // default_heap_expansion
|
---|
| 89 |
|
---|
| 90 |
|
---|
[f0b3f51] | 91 | #ifdef __CFA_DEBUG__
|
---|
[92aca37] | 92 | static size_t allocUnfreed; // running total of allocations minus frees
|
---|
[d46ed6e] | 93 |
|
---|
[95eb7cf] | 94 | static void prtUnfreed() {
|
---|
[c1f38e6c] | 95 | if ( allocUnfreed != 0 ) {
|
---|
[d46ed6e] | 96 | // DO NOT USE STREAMS AS THEY MAY BE UNAVAILABLE AT THIS POINT.
|
---|
[4ea1c6d] | 97 | char helpText[512];
|
---|
[92aca37] | 98 | int len = snprintf( helpText, sizeof(helpText), "CFA warning (UNIX pid:%ld) : program terminating with %zu(0x%zx) bytes of storage allocated but not freed.\n"
|
---|
[4ea1c6d] | 99 | "Possible cause is unfreed storage allocated by the program or system/library routines called from the program.\n",
|
---|
[c1f38e6c] | 100 | (long int)getpid(), allocUnfreed, allocUnfreed ); // always print the UNIX pid
|
---|
[4ea1c6d] | 101 | __cfaabi_bits_write( STDERR_FILENO, helpText, len ); // print debug/nodebug
|
---|
[b6830d74] | 102 | } // if
|
---|
[95eb7cf] | 103 | } // prtUnfreed
|
---|
[d46ed6e] | 104 |
|
---|
| 105 | extern "C" {
|
---|
[bcb14b5] | 106 | void heapAppStart() { // called by __cfaabi_appready_startup
|
---|
[c1f38e6c] | 107 | allocUnfreed = 0;
|
---|
[bcb14b5] | 108 | } // heapAppStart
|
---|
| 109 |
|
---|
| 110 | void heapAppStop() { // called by __cfaabi_appready_startdown
|
---|
| 111 | fclose( stdin ); fclose( stdout );
|
---|
[95eb7cf] | 112 | prtUnfreed();
|
---|
[bcb14b5] | 113 | } // heapAppStop
|
---|
[d46ed6e] | 114 | } // extern "C"
|
---|
| 115 | #endif // __CFA_DEBUG__
|
---|
| 116 |
|
---|
[1e034d9] | 117 |
|
---|
[e723100] | 118 | // statically allocated variables => zero filled.
|
---|
| 119 | static size_t pageSize; // architecture pagesize
|
---|
| 120 | static size_t heapExpand; // sbrk advance
|
---|
| 121 | static size_t mmapStart; // cross over point for mmap
|
---|
| 122 | static unsigned int maxBucketsUsed; // maximum number of buckets in use
|
---|
| 123 |
|
---|
| 124 |
|
---|
| 125 | #define SPINLOCK 0
|
---|
| 126 | #define LOCKFREE 1
|
---|
| 127 | #define BUCKETLOCK SPINLOCK
|
---|
[9c438546] | 128 | #if BUCKETLOCK == SPINLOCK
|
---|
| 129 | #elif BUCKETLOCK == LOCKFREE
|
---|
| 130 | #include <stackLockFree.hfa>
|
---|
| 131 | #else
|
---|
| 132 | #error undefined lock type for bucket lock
|
---|
[e723100] | 133 | #endif // LOCKFREE
|
---|
| 134 |
|
---|
| 135 | // Recursive definitions: HeapManager needs size of bucket array and bucket area needs sizeof HeapManager storage.
|
---|
| 136 | // Break recusion by hardcoding number of buckets and statically checking number is correct after bucket array defined.
|
---|
[95eb7cf] | 137 | enum { NoBucketSizes = 91 }; // number of buckets sizes
|
---|
[d46ed6e] | 138 |
|
---|
[c4f68dc] | 139 | struct HeapManager {
|
---|
| 140 | struct Storage {
|
---|
[bcb14b5] | 141 | struct Header { // header
|
---|
[c4f68dc] | 142 | union Kind {
|
---|
| 143 | struct RealHeader {
|
---|
| 144 | union {
|
---|
[bcb14b5] | 145 | struct { // 4-byte word => 8-byte header, 8-byte word => 16-byte header
|
---|
[f0b3f51] | 146 | #if __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__ && __SIZEOF_POINTER__ == 4
|
---|
[9c438546] | 147 | uint64_t padding; // unused, force home/blocksize to overlay alignment in fake header
|
---|
[bcb14b5] | 148 | #endif // __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__ && __SIZEOF_POINTER__ == 4
|
---|
[c4f68dc] | 149 |
|
---|
| 150 | union {
|
---|
[9c438546] | 151 | // FreeHeader * home; // allocated block points back to home locations (must overlay alignment)
|
---|
[cfbc703d] | 152 | // 2nd low-order bit => zero filled
|
---|
[c4f68dc] | 153 | void * home; // allocated block points back to home locations (must overlay alignment)
|
---|
| 154 | size_t blockSize; // size for munmap (must overlay alignment)
|
---|
[9c438546] | 155 | #if BUCKETLOCK == SPINLOCK
|
---|
[c4f68dc] | 156 | Storage * next; // freed block points next freed block of same size
|
---|
| 157 | #endif // SPINLOCK
|
---|
| 158 | };
|
---|
[9c438546] | 159 | size_t size; // allocation size in bytes
|
---|
[c4f68dc] | 160 |
|
---|
[f0b3f51] | 161 | #if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__ && __SIZEOF_POINTER__ == 4
|
---|
[9c438546] | 162 | uint64_t padding; // unused, force home/blocksize to overlay alignment in fake header
|
---|
[bcb14b5] | 163 | #endif // __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__ && __SIZEOF_POINTER__ == 4
|
---|
[c4f68dc] | 164 | };
|
---|
[9c438546] | 165 | #if BUCKETLOCK == LOCKFREE
|
---|
| 166 | Link(Storage) next; // freed block points next freed block of same size (double-wide)
|
---|
[c4f68dc] | 167 | #endif // LOCKFREE
|
---|
| 168 | };
|
---|
[93c2e0a] | 169 | } real; // RealHeader
|
---|
[9c438546] | 170 |
|
---|
[c4f68dc] | 171 | struct FakeHeader {
|
---|
| 172 | #if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
|
---|
[9c438546] | 173 | uint32_t alignment; // 1st low-order bit => fake header & alignment
|
---|
[f0b3f51] | 174 | #endif // __ORDER_LITTLE_ENDIAN__
|
---|
[c4f68dc] | 175 |
|
---|
| 176 | uint32_t offset;
|
---|
| 177 |
|
---|
| 178 | #if __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__
|
---|
| 179 | uint32_t alignment; // low-order bits of home/blockSize used for tricks
|
---|
[f0b3f51] | 180 | #endif // __ORDER_BIG_ENDIAN__
|
---|
[93c2e0a] | 181 | } fake; // FakeHeader
|
---|
| 182 | } kind; // Kind
|
---|
[bcb14b5] | 183 | } header; // Header
|
---|
[95eb7cf] | 184 | char pad[libAlign() - sizeof( Header )];
|
---|
[bcb14b5] | 185 | char data[0]; // storage
|
---|
[c4f68dc] | 186 | }; // Storage
|
---|
| 187 |
|
---|
[95eb7cf] | 188 | static_assert( libAlign() >= sizeof( Storage ), "libAlign() < sizeof( Storage )" );
|
---|
[c4f68dc] | 189 |
|
---|
| 190 | struct FreeHeader {
|
---|
[9c438546] | 191 | #if BUCKETLOCK == SPINLOCK
|
---|
[bcb14b5] | 192 | __spinlock_t lock; // must be first field for alignment
|
---|
| 193 | Storage * freeList;
|
---|
[c4f68dc] | 194 | #else
|
---|
[9c438546] | 195 | StackLF(Storage) freeList;
|
---|
| 196 | #endif // BUCKETLOCK
|
---|
[bcb14b5] | 197 | size_t blockSize; // size of allocations on this list
|
---|
[c4f68dc] | 198 | }; // FreeHeader
|
---|
| 199 |
|
---|
| 200 | // must be first fields for alignment
|
---|
| 201 | __spinlock_t extlock; // protects allocation-buffer extension
|
---|
| 202 | FreeHeader freeLists[NoBucketSizes]; // buckets for different allocation sizes
|
---|
| 203 |
|
---|
| 204 | void * heapBegin; // start of heap
|
---|
| 205 | void * heapEnd; // logical end of heap
|
---|
| 206 | size_t heapRemaining; // amount of storage not allocated in the current chunk
|
---|
| 207 | }; // HeapManager
|
---|
| 208 |
|
---|
[9c438546] | 209 | #if BUCKETLOCK == LOCKFREE
|
---|
[c45d2fa] | 210 | static inline {
|
---|
[8b58bae] | 211 | Link(HeapManager.Storage) * ?`next( HeapManager.Storage * this ) { return &this->header.kind.real.next; }
|
---|
[c45d2fa] | 212 | void ?{}( HeapManager.FreeHeader & ) {}
|
---|
| 213 | void ^?{}( HeapManager.FreeHeader & ) {}
|
---|
| 214 | } // distribution
|
---|
[9c438546] | 215 | #endif // LOCKFREE
|
---|
| 216 |
|
---|
[7b149bc] | 217 | static inline size_t getKey( const HeapManager.FreeHeader & freeheader ) { return freeheader.blockSize; }
|
---|
[5d4fa18] | 218 |
|
---|
[e723100] | 219 |
|
---|
| 220 | #define FASTLOOKUP
|
---|
| 221 | #define __STATISTICS__
|
---|
[5d4fa18] | 222 |
|
---|
[c1f38e6c] | 223 | // Size of array must harmonize with NoBucketSizes and individual bucket sizes must be multiple of 16.
|
---|
[d5d3a90] | 224 | // Smaller multiples of 16 and powers of 2 are common allocation sizes, so make them generate the minimum required bucket size.
|
---|
| 225 | // malloc(0) returns 0p, so no bucket is necessary for 0 bytes returning an address that can be freed.
|
---|
[e723100] | 226 | static const unsigned int bucketSizes[] @= { // different bucket sizes
|
---|
[d5d3a90] | 227 | 16 + sizeof(HeapManager.Storage), 32 + sizeof(HeapManager.Storage), 48 + sizeof(HeapManager.Storage), 64 + sizeof(HeapManager.Storage), // 4
|
---|
| 228 | 96 + sizeof(HeapManager.Storage), 112 + sizeof(HeapManager.Storage), 128 + sizeof(HeapManager.Storage), // 3
|
---|
[95eb7cf] | 229 | 160, 192, 224, 256 + sizeof(HeapManager.Storage), // 4
|
---|
| 230 | 320, 384, 448, 512 + sizeof(HeapManager.Storage), // 4
|
---|
| 231 | 640, 768, 896, 1_024 + sizeof(HeapManager.Storage), // 4
|
---|
| 232 | 1_536, 2_048 + sizeof(HeapManager.Storage), // 2
|
---|
| 233 | 2_560, 3_072, 3_584, 4_096 + sizeof(HeapManager.Storage), // 4
|
---|
| 234 | 6_144, 8_192 + sizeof(HeapManager.Storage), // 2
|
---|
| 235 | 9_216, 10_240, 11_264, 12_288, 13_312, 14_336, 15_360, 16_384 + sizeof(HeapManager.Storage), // 8
|
---|
| 236 | 18_432, 20_480, 22_528, 24_576, 26_624, 28_672, 30_720, 32_768 + sizeof(HeapManager.Storage), // 8
|
---|
| 237 | 36_864, 40_960, 45_056, 49_152, 53_248, 57_344, 61_440, 65_536 + sizeof(HeapManager.Storage), // 8
|
---|
| 238 | 73_728, 81_920, 90_112, 98_304, 106_496, 114_688, 122_880, 131_072 + sizeof(HeapManager.Storage), // 8
|
---|
| 239 | 147_456, 163_840, 180_224, 196_608, 212_992, 229_376, 245_760, 262_144 + sizeof(HeapManager.Storage), // 8
|
---|
| 240 | 294_912, 327_680, 360_448, 393_216, 425_984, 458_752, 491_520, 524_288 + sizeof(HeapManager.Storage), // 8
|
---|
| 241 | 655_360, 786_432, 917_504, 1_048_576 + sizeof(HeapManager.Storage), // 4
|
---|
| 242 | 1_179_648, 1_310_720, 1_441_792, 1_572_864, 1_703_936, 1_835_008, 1_966_080, 2_097_152 + sizeof(HeapManager.Storage), // 8
|
---|
| 243 | 2_621_440, 3_145_728, 3_670_016, 4_194_304 + sizeof(HeapManager.Storage), // 4
|
---|
[5d4fa18] | 244 | };
|
---|
[e723100] | 245 |
|
---|
[c1f38e6c] | 246 | static_assert( NoBucketSizes == sizeof(bucketSizes) / sizeof(bucketSizes[0] ), "size of bucket array wrong" );
|
---|
[e723100] | 247 |
|
---|
[5d4fa18] | 248 | #ifdef FASTLOOKUP
|
---|
[a92a4fe] | 249 | enum { LookupSizes = 65_536 + sizeof(HeapManager.Storage) }; // number of fast lookup sizes
|
---|
[5d4fa18] | 250 | static unsigned char lookup[LookupSizes]; // O(1) lookup for small sizes
|
---|
| 251 | #endif // FASTLOOKUP
|
---|
| 252 |
|
---|
[95eb7cf] | 253 | static int mmapFd = -1; // fake or actual fd for anonymous file
|
---|
[5d4fa18] | 254 | #ifdef __CFA_DEBUG__
|
---|
[93c2e0a] | 255 | static bool heapBoot = 0; // detect recursion during boot
|
---|
[5d4fa18] | 256 | #endif // __CFA_DEBUG__
|
---|
[9c438546] | 257 |
|
---|
| 258 | // The constructor for heapManager is called explicitly in memory_startup.
|
---|
[5d4fa18] | 259 | static HeapManager heapManager __attribute__(( aligned (128) )) @= {}; // size of cache line to prevent false sharing
|
---|
| 260 |
|
---|
[c4f68dc] | 261 |
|
---|
| 262 | #ifdef __STATISTICS__
|
---|
[95eb7cf] | 263 | // Heap statistics counters.
|
---|
[c4f68dc] | 264 | static unsigned int malloc_calls;
|
---|
[c1f38e6c] | 265 | static unsigned long long int malloc_storage;
|
---|
[76e2113] | 266 | static unsigned int aalloc_calls;
|
---|
[c1f38e6c] | 267 | static unsigned long long int aalloc_storage;
|
---|
[c4f68dc] | 268 | static unsigned int calloc_calls;
|
---|
[c1f38e6c] | 269 | static unsigned long long int calloc_storage;
|
---|
[c4f68dc] | 270 | static unsigned int memalign_calls;
|
---|
[c1f38e6c] | 271 | static unsigned long long int memalign_storage;
|
---|
[76e2113] | 272 | static unsigned int amemalign_calls;
|
---|
[c1f38e6c] | 273 | static unsigned long long int amemalign_storage;
|
---|
[c4f68dc] | 274 | static unsigned int cmemalign_calls;
|
---|
[c1f38e6c] | 275 | static unsigned long long int cmemalign_storage;
|
---|
[cfbc703d] | 276 | static unsigned int resize_calls;
|
---|
[c1f38e6c] | 277 | static unsigned long long int resize_storage;
|
---|
[c4f68dc] | 278 | static unsigned int realloc_calls;
|
---|
[c1f38e6c] | 279 | static unsigned long long int realloc_storage;
|
---|
| 280 | static unsigned int free_calls;
|
---|
| 281 | static unsigned long long int free_storage;
|
---|
| 282 | static unsigned int mmap_calls;
|
---|
| 283 | static unsigned long long int mmap_storage;
|
---|
| 284 | static unsigned int munmap_calls;
|
---|
| 285 | static unsigned long long int munmap_storage;
|
---|
| 286 | static unsigned int sbrk_calls;
|
---|
| 287 | static unsigned long long int sbrk_storage;
|
---|
[95eb7cf] | 288 | // Statistics file descriptor (changed by malloc_stats_fd).
|
---|
[92aca37] | 289 | static int stat_fd = STDERR_FILENO; // default stderr
|
---|
[c4f68dc] | 290 |
|
---|
| 291 | // Use "write" because streams may be shutdown when calls are made.
|
---|
[d46ed6e] | 292 | static void printStats() {
|
---|
[76e2113] | 293 | char helpText[1024];
|
---|
[95eb7cf] | 294 | __cfaabi_bits_print_buffer( STDERR_FILENO, helpText, sizeof(helpText),
|
---|
[bcb14b5] | 295 | "\nHeap statistics:\n"
|
---|
| 296 | " malloc: calls %u / storage %llu\n"
|
---|
[76e2113] | 297 | " aalloc: calls %u / storage %llu\n"
|
---|
[bcb14b5] | 298 | " calloc: calls %u / storage %llu\n"
|
---|
| 299 | " memalign: calls %u / storage %llu\n"
|
---|
[76e2113] | 300 | " amemalign: calls %u / storage %llu\n"
|
---|
[bcb14b5] | 301 | " cmemalign: calls %u / storage %llu\n"
|
---|
[cfbc703d] | 302 | " resize: calls %u / storage %llu\n"
|
---|
[bcb14b5] | 303 | " realloc: calls %u / storage %llu\n"
|
---|
| 304 | " free: calls %u / storage %llu\n"
|
---|
| 305 | " mmap: calls %u / storage %llu\n"
|
---|
| 306 | " munmap: calls %u / storage %llu\n"
|
---|
| 307 | " sbrk: calls %u / storage %llu\n",
|
---|
| 308 | malloc_calls, malloc_storage,
|
---|
[92aca37] | 309 | aalloc_calls, aalloc_storage,
|
---|
[bcb14b5] | 310 | calloc_calls, calloc_storage,
|
---|
| 311 | memalign_calls, memalign_storage,
|
---|
[76e2113] | 312 | amemalign_calls, amemalign_storage,
|
---|
[bcb14b5] | 313 | cmemalign_calls, cmemalign_storage,
|
---|
[cfbc703d] | 314 | resize_calls, resize_storage,
|
---|
[bcb14b5] | 315 | realloc_calls, realloc_storage,
|
---|
| 316 | free_calls, free_storage,
|
---|
| 317 | mmap_calls, mmap_storage,
|
---|
| 318 | munmap_calls, munmap_storage,
|
---|
| 319 | sbrk_calls, sbrk_storage
|
---|
[c4f68dc] | 320 | );
|
---|
[d46ed6e] | 321 | } // printStats
|
---|
[c4f68dc] | 322 |
|
---|
[bcb14b5] | 323 | static int printStatsXML( FILE * stream ) { // see malloc_info
|
---|
[76e2113] | 324 | char helpText[1024];
|
---|
[b6830d74] | 325 | int len = snprintf( helpText, sizeof(helpText),
|
---|
[c4f68dc] | 326 | "<malloc version=\"1\">\n"
|
---|
| 327 | "<heap nr=\"0\">\n"
|
---|
| 328 | "<sizes>\n"
|
---|
| 329 | "</sizes>\n"
|
---|
| 330 | "<total type=\"malloc\" count=\"%u\" size=\"%llu\"/>\n"
|
---|
[76e2113] | 331 | "<total type=\"aalloc\" count=\"%u\" size=\"%llu\"/>\n"
|
---|
[c4f68dc] | 332 | "<total type=\"calloc\" count=\"%u\" size=\"%llu\"/>\n"
|
---|
| 333 | "<total type=\"memalign\" count=\"%u\" size=\"%llu\"/>\n"
|
---|
[76e2113] | 334 | "<total type=\"amemalign\" count=\"%u\" size=\"%llu\"/>\n"
|
---|
[c4f68dc] | 335 | "<total type=\"cmemalign\" count=\"%u\" size=\"%llu\"/>\n"
|
---|
[cfbc703d] | 336 | "<total type=\"resize\" count=\"%u\" size=\"%llu\"/>\n"
|
---|
[c4f68dc] | 337 | "<total type=\"realloc\" count=\"%u\" size=\"%llu\"/>\n"
|
---|
| 338 | "<total type=\"free\" count=\"%u\" size=\"%llu\"/>\n"
|
---|
| 339 | "<total type=\"mmap\" count=\"%u\" size=\"%llu\"/>\n"
|
---|
| 340 | "<total type=\"munmap\" count=\"%u\" size=\"%llu\"/>\n"
|
---|
| 341 | "<total type=\"sbrk\" count=\"%u\" size=\"%llu\"/>\n"
|
---|
| 342 | "</malloc>",
|
---|
| 343 | malloc_calls, malloc_storage,
|
---|
[76e2113] | 344 | aalloc_calls, aalloc_storage,
|
---|
[c4f68dc] | 345 | calloc_calls, calloc_storage,
|
---|
| 346 | memalign_calls, memalign_storage,
|
---|
[76e2113] | 347 | amemalign_calls, amemalign_storage,
|
---|
[c4f68dc] | 348 | cmemalign_calls, cmemalign_storage,
|
---|
[cfbc703d] | 349 | resize_calls, resize_storage,
|
---|
[c4f68dc] | 350 | realloc_calls, realloc_storage,
|
---|
| 351 | free_calls, free_storage,
|
---|
| 352 | mmap_calls, mmap_storage,
|
---|
| 353 | munmap_calls, munmap_storage,
|
---|
| 354 | sbrk_calls, sbrk_storage
|
---|
| 355 | );
|
---|
[95eb7cf] | 356 | __cfaabi_bits_write( fileno( stream ), helpText, len ); // ensures all bytes written or exit
|
---|
| 357 | return len;
|
---|
[d46ed6e] | 358 | } // printStatsXML
|
---|
[c4f68dc] | 359 | #endif // __STATISTICS__
|
---|
| 360 |
|
---|
[95eb7cf] | 361 |
|
---|
[1e034d9] | 362 | // thunk problem
|
---|
| 363 | size_t Bsearchl( unsigned int key, const unsigned int * vals, size_t dim ) {
|
---|
| 364 | size_t l = 0, m, h = dim;
|
---|
| 365 | while ( l < h ) {
|
---|
| 366 | m = (l + h) / 2;
|
---|
| 367 | if ( (unsigned int &)(vals[m]) < key ) { // cast away const
|
---|
| 368 | l = m + 1;
|
---|
| 369 | } else {
|
---|
| 370 | h = m;
|
---|
| 371 | } // if
|
---|
| 372 | } // while
|
---|
| 373 | return l;
|
---|
| 374 | } // Bsearchl
|
---|
| 375 |
|
---|
| 376 |
|
---|
[95eb7cf] | 377 | static inline bool setMmapStart( size_t value ) { // true => mmapped, false => sbrk
|
---|
[1076d05] | 378 | if ( value < pageSize || bucketSizes[NoBucketSizes - 1] < value ) return false;
|
---|
[95eb7cf] | 379 | mmapStart = value; // set global
|
---|
| 380 |
|
---|
| 381 | // find the closest bucket size less than or equal to the mmapStart size
|
---|
[1e034d9] | 382 | maxBucketsUsed = Bsearchl( (unsigned int)mmapStart, bucketSizes, NoBucketSizes ); // binary search
|
---|
[95eb7cf] | 383 | assert( maxBucketsUsed < NoBucketSizes ); // subscript failure ?
|
---|
| 384 | assert( mmapStart <= bucketSizes[maxBucketsUsed] ); // search failure ?
|
---|
[1076d05] | 385 | return true;
|
---|
[95eb7cf] | 386 | } // setMmapStart
|
---|
| 387 |
|
---|
| 388 |
|
---|
[cfbc703d] | 389 | // <-------+----------------------------------------------------> bsize (bucket size)
|
---|
| 390 | // |header |addr
|
---|
| 391 | //==================================================================================
|
---|
| 392 | // align/offset |
|
---|
| 393 | // <-----------------<------------+-----------------------------> bsize (bucket size)
|
---|
| 394 | // |fake-header | addr
|
---|
| 395 | #define headerAddr( addr ) ((HeapManager.Storage.Header *)( (char *)addr - sizeof(HeapManager.Storage) ))
|
---|
| 396 | #define realHeader( header ) ((HeapManager.Storage.Header *)((char *)header - header->kind.fake.offset))
|
---|
| 397 |
|
---|
| 398 | // <-------<<--------------------- dsize ---------------------->> bsize (bucket size)
|
---|
| 399 | // |header |addr
|
---|
| 400 | //==================================================================================
|
---|
| 401 | // align/offset |
|
---|
| 402 | // <------------------------------<<---------- dsize --------->>> bsize (bucket size)
|
---|
| 403 | // |fake-header |addr
|
---|
| 404 | #define dataStorage( bsize, addr, header ) (bsize - ( (char *)addr - (char *)header ))
|
---|
| 405 |
|
---|
| 406 |
|
---|
| 407 | static inline void checkAlign( size_t alignment ) {
|
---|
[92aca37] | 408 | if ( alignment < libAlign() || ! is_pow2( alignment ) ) {
|
---|
[cfbc703d] | 409 | abort( "Alignment %zu for memory allocation is less than %d and/or not a power of 2.", alignment, libAlign() );
|
---|
| 410 | } // if
|
---|
| 411 | } // checkAlign
|
---|
| 412 |
|
---|
| 413 |
|
---|
[e3fea42] | 414 | static inline void checkHeader( bool check, const char name[], void * addr ) {
|
---|
[b6830d74] | 415 | if ( unlikely( check ) ) { // bad address ?
|
---|
[c4f68dc] | 416 | abort( "Attempt to %s storage %p with address outside the heap.\n"
|
---|
[bcb14b5] | 417 | "Possible cause is duplicate free on same block or overwriting of memory.",
|
---|
| 418 | name, addr );
|
---|
[b6830d74] | 419 | } // if
|
---|
[c4f68dc] | 420 | } // checkHeader
|
---|
| 421 |
|
---|
[95eb7cf] | 422 |
|
---|
| 423 | static inline void fakeHeader( HeapManager.Storage.Header *& header, size_t & alignment ) {
|
---|
[b6830d74] | 424 | if ( unlikely( (header->kind.fake.alignment & 1) == 1 ) ) { // fake header ?
|
---|
[c4f68dc] | 425 | alignment = header->kind.fake.alignment & -2; // remove flag from value
|
---|
| 426 | #ifdef __CFA_DEBUG__
|
---|
| 427 | checkAlign( alignment ); // check alignment
|
---|
| 428 | #endif // __CFA_DEBUG__
|
---|
[cfbc703d] | 429 | header = realHeader( header ); // backup from fake to real header
|
---|
[d5d3a90] | 430 | } else {
|
---|
[c1f38e6c] | 431 | alignment = libAlign(); // => no fake header
|
---|
[b6830d74] | 432 | } // if
|
---|
[c4f68dc] | 433 | } // fakeHeader
|
---|
| 434 |
|
---|
[95eb7cf] | 435 |
|
---|
[9c438546] | 436 | static inline bool headers( const char name[] __attribute__(( unused )), void * addr, HeapManager.Storage.Header *& header, HeapManager.FreeHeader *& freeElem,
|
---|
| 437 | size_t & size, size_t & alignment ) with( heapManager ) {
|
---|
[b6830d74] | 438 | header = headerAddr( addr );
|
---|
[c4f68dc] | 439 |
|
---|
[92aca37] | 440 | if ( unlikely( heapEnd < addr ) ) { // mmapped ?
|
---|
[95eb7cf] | 441 | fakeHeader( header, alignment );
|
---|
[c4f68dc] | 442 | size = header->kind.real.blockSize & -3; // mmap size
|
---|
| 443 | return true;
|
---|
[b6830d74] | 444 | } // if
|
---|
[c4f68dc] | 445 |
|
---|
| 446 | #ifdef __CFA_DEBUG__
|
---|
[1076d05] | 447 | checkHeader( addr < heapBegin, name, addr ); // bad low address ?
|
---|
[c4f68dc] | 448 | #endif // __CFA_DEBUG__
|
---|
[b6830d74] | 449 |
|
---|
[bcb14b5] | 450 | // header may be safe to dereference
|
---|
[95eb7cf] | 451 | fakeHeader( header, alignment );
|
---|
[c4f68dc] | 452 | #ifdef __CFA_DEBUG__
|
---|
[bcb14b5] | 453 | checkHeader( header < (HeapManager.Storage.Header *)heapBegin || (HeapManager.Storage.Header *)heapEnd < header, name, addr ); // bad address ? (offset could be + or -)
|
---|
[c4f68dc] | 454 | #endif // __CFA_DEBUG__
|
---|
| 455 |
|
---|
[bcb14b5] | 456 | freeElem = (HeapManager.FreeHeader *)((size_t)header->kind.real.home & -3);
|
---|
[c4f68dc] | 457 | #ifdef __CFA_DEBUG__
|
---|
[bcb14b5] | 458 | if ( freeElem < &freeLists[0] || &freeLists[NoBucketSizes] <= freeElem ) {
|
---|
| 459 | abort( "Attempt to %s storage %p with corrupted header.\n"
|
---|
| 460 | "Possible cause is duplicate free on same block or overwriting of header information.",
|
---|
| 461 | name, addr );
|
---|
| 462 | } // if
|
---|
[c4f68dc] | 463 | #endif // __CFA_DEBUG__
|
---|
[bcb14b5] | 464 | size = freeElem->blockSize;
|
---|
| 465 | return false;
|
---|
[c4f68dc] | 466 | } // headers
|
---|
| 467 |
|
---|
[92aca37] | 468 | #define NO_MEMORY_MSG "insufficient heap memory available for allocating %zd new bytes."
|
---|
[c4f68dc] | 469 |
|
---|
[9c438546] | 470 | static inline void * extend( size_t size ) with( heapManager ) {
|
---|
[b6830d74] | 471 | lock( extlock __cfaabi_dbg_ctx2 );
|
---|
| 472 | ptrdiff_t rem = heapRemaining - size;
|
---|
| 473 | if ( rem < 0 ) {
|
---|
[c4f68dc] | 474 | // If the size requested is bigger than the current remaining storage, increase the size of the heap.
|
---|
| 475 |
|
---|
[92aca37] | 476 | size_t increase = ceiling2( size > heapExpand ? size : heapExpand, libAlign() );
|
---|
| 477 | if ( sbrk( increase ) == (void *)-1 ) { // failed, no memory ?
|
---|
[c4f68dc] | 478 | unlock( extlock );
|
---|
[dd23e66] | 479 | abort( NO_MEMORY_MSG, size ); // give up
|
---|
[92aca37] | 480 | } // if
|
---|
[bcb14b5] | 481 | #ifdef __STATISTICS__
|
---|
[c4f68dc] | 482 | sbrk_calls += 1;
|
---|
| 483 | sbrk_storage += increase;
|
---|
[bcb14b5] | 484 | #endif // __STATISTICS__
|
---|
| 485 | #ifdef __CFA_DEBUG__
|
---|
[c4f68dc] | 486 | // Set new memory to garbage so subsequent uninitialized usages might fail.
|
---|
| 487 | memset( (char *)heapEnd + heapRemaining, '\377', increase );
|
---|
[bcb14b5] | 488 | #endif // __CFA_DEBUG__
|
---|
[c4f68dc] | 489 | rem = heapRemaining + increase - size;
|
---|
[b6830d74] | 490 | } // if
|
---|
[c4f68dc] | 491 |
|
---|
[b6830d74] | 492 | HeapManager.Storage * block = (HeapManager.Storage *)heapEnd;
|
---|
| 493 | heapRemaining = rem;
|
---|
| 494 | heapEnd = (char *)heapEnd + size;
|
---|
| 495 | unlock( extlock );
|
---|
| 496 | return block;
|
---|
[c4f68dc] | 497 | } // extend
|
---|
| 498 |
|
---|
| 499 |
|
---|
[9c438546] | 500 | static inline void * doMalloc( size_t size ) with( heapManager ) {
|
---|
[7b149bc] | 501 | HeapManager.Storage * block; // pointer to new block of storage
|
---|
[c4f68dc] | 502 |
|
---|
[b6830d74] | 503 | // Look up size in the size list. Make sure the user request includes space for the header that must be allocated
|
---|
| 504 | // along with the block and is a multiple of the alignment size.
|
---|
[c4f68dc] | 505 |
|
---|
[1076d05] | 506 | if ( unlikely( size > ULONG_MAX - sizeof(HeapManager.Storage) ) ) return 0p;
|
---|
[b6830d74] | 507 | size_t tsize = size + sizeof(HeapManager.Storage);
|
---|
| 508 | if ( likely( tsize < mmapStart ) ) { // small size => sbrk
|
---|
[e723100] | 509 | size_t posn;
|
---|
| 510 | #ifdef FASTLOOKUP
|
---|
| 511 | if ( tsize < LookupSizes ) posn = lookup[tsize];
|
---|
| 512 | else
|
---|
| 513 | #endif // FASTLOOKUP
|
---|
| 514 | posn = Bsearchl( (unsigned int)tsize, bucketSizes, (size_t)maxBucketsUsed );
|
---|
| 515 | HeapManager.FreeHeader * freeElem = &freeLists[posn];
|
---|
[c1f38e6c] | 516 | verify( freeElem <= &freeLists[maxBucketsUsed] ); // subscripting error ?
|
---|
| 517 | verify( tsize <= freeElem->blockSize ); // search failure ?
|
---|
[c4f68dc] | 518 | tsize = freeElem->blockSize; // total space needed for request
|
---|
| 519 |
|
---|
| 520 | // Spin until the lock is acquired for this particular size of block.
|
---|
| 521 |
|
---|
[9c438546] | 522 | #if BUCKETLOCK == SPINLOCK
|
---|
[bcb14b5] | 523 | lock( freeElem->lock __cfaabi_dbg_ctx2 );
|
---|
| 524 | block = freeElem->freeList; // remove node from stack
|
---|
[c4f68dc] | 525 | #else
|
---|
[9c438546] | 526 | block = pop( freeElem->freeList );
|
---|
| 527 | #endif // BUCKETLOCK
|
---|
[95eb7cf] | 528 | if ( unlikely( block == 0p ) ) { // no free block ?
|
---|
[9c438546] | 529 | #if BUCKETLOCK == SPINLOCK
|
---|
[c4f68dc] | 530 | unlock( freeElem->lock );
|
---|
[9c438546] | 531 | #endif // BUCKETLOCK
|
---|
[bcb14b5] | 532 |
|
---|
[c4f68dc] | 533 | // Freelist for that size was empty, so carve it out of the heap if there's enough left, or get some more
|
---|
| 534 | // and then carve it off.
|
---|
| 535 |
|
---|
| 536 | block = (HeapManager.Storage *)extend( tsize ); // mutual exclusion on call
|
---|
[9c438546] | 537 | #if BUCKETLOCK == SPINLOCK
|
---|
[c4f68dc] | 538 | } else {
|
---|
| 539 | freeElem->freeList = block->header.kind.real.next;
|
---|
| 540 | unlock( freeElem->lock );
|
---|
[9c438546] | 541 | #endif // BUCKETLOCK
|
---|
[c4f68dc] | 542 | } // if
|
---|
| 543 |
|
---|
| 544 | block->header.kind.real.home = freeElem; // pointer back to free list of apropriate size
|
---|
[bcb14b5] | 545 | } else { // large size => mmap
|
---|
[1076d05] | 546 | if ( unlikely( size > ULONG_MAX - pageSize ) ) return 0p;
|
---|
[92aca37] | 547 | tsize = ceiling2( tsize, pageSize ); // must be multiple of page size
|
---|
[c4f68dc] | 548 | #ifdef __STATISTICS__
|
---|
[bcb14b5] | 549 | __atomic_add_fetch( &mmap_calls, 1, __ATOMIC_SEQ_CST );
|
---|
| 550 | __atomic_add_fetch( &mmap_storage, tsize, __ATOMIC_SEQ_CST );
|
---|
[c4f68dc] | 551 | #endif // __STATISTICS__
|
---|
[92aca37] | 552 |
|
---|
| 553 | block = (HeapManager.Storage *)mmap( 0, tsize, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, mmapFd, 0 );
|
---|
| 554 | if ( block == (HeapManager.Storage *)MAP_FAILED ) { // failed ?
|
---|
| 555 | if ( errno == ENOMEM ) abort( NO_MEMORY_MSG, tsize ); // no memory
|
---|
[c4f68dc] | 556 | // Do not call strerror( errno ) as it may call malloc.
|
---|
| 557 | abort( "(HeapManager &)0x%p.doMalloc() : internal error, mmap failure, size:%zu error:%d.", &heapManager, tsize, errno );
|
---|
[92aca37] | 558 | } //if
|
---|
[bcb14b5] | 559 | #ifdef __CFA_DEBUG__
|
---|
[c4f68dc] | 560 | // Set new memory to garbage so subsequent uninitialized usages might fail.
|
---|
| 561 | memset( block, '\377', tsize );
|
---|
[bcb14b5] | 562 | #endif // __CFA_DEBUG__
|
---|
[c4f68dc] | 563 | block->header.kind.real.blockSize = tsize; // storage size for munmap
|
---|
[bcb14b5] | 564 | } // if
|
---|
[c4f68dc] | 565 |
|
---|
[9c438546] | 566 | block->header.kind.real.size = size; // store allocation size
|
---|
[95eb7cf] | 567 | void * addr = &(block->data); // adjust off header to user bytes
|
---|
[c1f38e6c] | 568 | verify( ((uintptr_t)addr & (libAlign() - 1)) == 0 ); // minimum alignment ?
|
---|
[c4f68dc] | 569 |
|
---|
| 570 | #ifdef __CFA_DEBUG__
|
---|
[c1f38e6c] | 571 | __atomic_add_fetch( &allocUnfreed, tsize, __ATOMIC_SEQ_CST );
|
---|
[bcb14b5] | 572 | if ( traceHeap() ) {
|
---|
| 573 | enum { BufferSize = 64 };
|
---|
| 574 | char helpText[BufferSize];
|
---|
[95eb7cf] | 575 | int len = snprintf( helpText, BufferSize, "%p = Malloc( %zu ) (allocated %zu)\n", addr, size, tsize );
|
---|
| 576 | __cfaabi_bits_write( STDERR_FILENO, helpText, len ); // print debug/nodebug
|
---|
[bcb14b5] | 577 | } // if
|
---|
[c4f68dc] | 578 | #endif // __CFA_DEBUG__
|
---|
| 579 |
|
---|
[95eb7cf] | 580 | return addr;
|
---|
[c4f68dc] | 581 | } // doMalloc
|
---|
| 582 |
|
---|
| 583 |
|
---|
[9c438546] | 584 | static inline void doFree( void * addr ) with( heapManager ) {
|
---|
[c4f68dc] | 585 | #ifdef __CFA_DEBUG__
|
---|
[95eb7cf] | 586 | if ( unlikely( heapManager.heapBegin == 0p ) ) {
|
---|
[bcb14b5] | 587 | abort( "doFree( %p ) : internal error, called before heap is initialized.", addr );
|
---|
| 588 | } // if
|
---|
[c4f68dc] | 589 | #endif // __CFA_DEBUG__
|
---|
| 590 |
|
---|
[b6830d74] | 591 | HeapManager.Storage.Header * header;
|
---|
| 592 | HeapManager.FreeHeader * freeElem;
|
---|
| 593 | size_t size, alignment; // not used (see realloc)
|
---|
[c4f68dc] | 594 |
|
---|
[b6830d74] | 595 | if ( headers( "free", addr, header, freeElem, size, alignment ) ) { // mmapped ?
|
---|
[c4f68dc] | 596 | #ifdef __STATISTICS__
|
---|
[bcb14b5] | 597 | __atomic_add_fetch( &munmap_calls, 1, __ATOMIC_SEQ_CST );
|
---|
| 598 | __atomic_add_fetch( &munmap_storage, size, __ATOMIC_SEQ_CST );
|
---|
[c4f68dc] | 599 | #endif // __STATISTICS__
|
---|
| 600 | if ( munmap( header, size ) == -1 ) {
|
---|
| 601 | #ifdef __CFA_DEBUG__
|
---|
| 602 | abort( "Attempt to deallocate storage %p not allocated or with corrupt header.\n"
|
---|
[bcb14b5] | 603 | "Possible cause is invalid pointer.",
|
---|
| 604 | addr );
|
---|
[c4f68dc] | 605 | #endif // __CFA_DEBUG__
|
---|
| 606 | } // if
|
---|
[bcb14b5] | 607 | } else {
|
---|
[c4f68dc] | 608 | #ifdef __CFA_DEBUG__
|
---|
[bcb14b5] | 609 | // Set free memory to garbage so subsequent usages might fail.
|
---|
| 610 | memset( ((HeapManager.Storage *)header)->data, '\377', freeElem->blockSize - sizeof( HeapManager.Storage ) );
|
---|
[c4f68dc] | 611 | #endif // __CFA_DEBUG__
|
---|
| 612 |
|
---|
| 613 | #ifdef __STATISTICS__
|
---|
[bcb14b5] | 614 | free_storage += size;
|
---|
[c4f68dc] | 615 | #endif // __STATISTICS__
|
---|
[9c438546] | 616 | #if BUCKETLOCK == SPINLOCK
|
---|
[bcb14b5] | 617 | lock( freeElem->lock __cfaabi_dbg_ctx2 ); // acquire spin lock
|
---|
| 618 | header->kind.real.next = freeElem->freeList; // push on stack
|
---|
| 619 | freeElem->freeList = (HeapManager.Storage *)header;
|
---|
| 620 | unlock( freeElem->lock ); // release spin lock
|
---|
[c4f68dc] | 621 | #else
|
---|
[9c438546] | 622 | push( freeElem->freeList, *(HeapManager.Storage *)header );
|
---|
| 623 | #endif // BUCKETLOCK
|
---|
[bcb14b5] | 624 | } // if
|
---|
[c4f68dc] | 625 |
|
---|
| 626 | #ifdef __CFA_DEBUG__
|
---|
[c1f38e6c] | 627 | __atomic_add_fetch( &allocUnfreed, -size, __ATOMIC_SEQ_CST );
|
---|
[bcb14b5] | 628 | if ( traceHeap() ) {
|
---|
[92aca37] | 629 | char helpText[64];
|
---|
[bcb14b5] | 630 | int len = snprintf( helpText, sizeof(helpText), "Free( %p ) size:%zu\n", addr, size );
|
---|
[95eb7cf] | 631 | __cfaabi_bits_write( STDERR_FILENO, helpText, len ); // print debug/nodebug
|
---|
[bcb14b5] | 632 | } // if
|
---|
[c4f68dc] | 633 | #endif // __CFA_DEBUG__
|
---|
| 634 | } // doFree
|
---|
| 635 |
|
---|
| 636 |
|
---|
[9c438546] | 637 | size_t prtFree( HeapManager & manager ) with( manager ) {
|
---|
[b6830d74] | 638 | size_t total = 0;
|
---|
[c4f68dc] | 639 | #ifdef __STATISTICS__
|
---|
[95eb7cf] | 640 | __cfaabi_bits_acquire();
|
---|
| 641 | __cfaabi_bits_print_nolock( STDERR_FILENO, "\nBin lists (bin size : free blocks on list)\n" );
|
---|
[c4f68dc] | 642 | #endif // __STATISTICS__
|
---|
[b6830d74] | 643 | for ( unsigned int i = 0; i < maxBucketsUsed; i += 1 ) {
|
---|
[d46ed6e] | 644 | size_t size = freeLists[i].blockSize;
|
---|
| 645 | #ifdef __STATISTICS__
|
---|
| 646 | unsigned int N = 0;
|
---|
| 647 | #endif // __STATISTICS__
|
---|
[b6830d74] | 648 |
|
---|
[9c438546] | 649 | #if BUCKETLOCK == SPINLOCK
|
---|
[95eb7cf] | 650 | for ( HeapManager.Storage * p = freeLists[i].freeList; p != 0p; p = p->header.kind.real.next ) {
|
---|
[d46ed6e] | 651 | #else
|
---|
[92aca37] | 652 | for ( HeapManager.Storage * p = top( freeLists[i].freeList ); p != 0p; p = (p)`next->top ) {
|
---|
[9c438546] | 653 | #endif // BUCKETLOCK
|
---|
[d46ed6e] | 654 | total += size;
|
---|
| 655 | #ifdef __STATISTICS__
|
---|
| 656 | N += 1;
|
---|
| 657 | #endif // __STATISTICS__
|
---|
[b6830d74] | 658 | } // for
|
---|
| 659 |
|
---|
[d46ed6e] | 660 | #ifdef __STATISTICS__
|
---|
[95eb7cf] | 661 | __cfaabi_bits_print_nolock( STDERR_FILENO, "%7zu, %-7u ", size, N );
|
---|
| 662 | if ( (i + 1) % 8 == 0 ) __cfaabi_bits_print_nolock( STDERR_FILENO, "\n" );
|
---|
[d46ed6e] | 663 | #endif // __STATISTICS__
|
---|
| 664 | } // for
|
---|
| 665 | #ifdef __STATISTICS__
|
---|
[95eb7cf] | 666 | __cfaabi_bits_print_nolock( STDERR_FILENO, "\ntotal free blocks:%zu\n", total );
|
---|
| 667 | __cfaabi_bits_release();
|
---|
[d46ed6e] | 668 | #endif // __STATISTICS__
|
---|
| 669 | return (char *)heapEnd - (char *)heapBegin - total;
|
---|
[95eb7cf] | 670 | } // prtFree
|
---|
| 671 |
|
---|
| 672 |
|
---|
[9c438546] | 673 | static void ?{}( HeapManager & manager ) with( manager ) {
|
---|
[95eb7cf] | 674 | pageSize = sysconf( _SC_PAGESIZE );
|
---|
| 675 |
|
---|
| 676 | for ( unsigned int i = 0; i < NoBucketSizes; i += 1 ) { // initialize the free lists
|
---|
| 677 | freeLists[i].blockSize = bucketSizes[i];
|
---|
| 678 | } // for
|
---|
| 679 |
|
---|
| 680 | #ifdef FASTLOOKUP
|
---|
| 681 | unsigned int idx = 0;
|
---|
| 682 | for ( unsigned int i = 0; i < LookupSizes; i += 1 ) {
|
---|
| 683 | if ( i > bucketSizes[idx] ) idx += 1;
|
---|
| 684 | lookup[i] = idx;
|
---|
| 685 | } // for
|
---|
| 686 | #endif // FASTLOOKUP
|
---|
| 687 |
|
---|
[1076d05] | 688 | if ( ! setMmapStart( default_mmap_start() ) ) {
|
---|
[95eb7cf] | 689 | abort( "HeapManager : internal error, mmap start initialization failure." );
|
---|
| 690 | } // if
|
---|
| 691 | heapExpand = default_heap_expansion();
|
---|
| 692 |
|
---|
[1e034d9] | 693 | char * end = (char *)sbrk( 0 );
|
---|
[92aca37] | 694 | heapBegin = heapEnd = sbrk( (char *)ceiling2( (long unsigned int)end, libAlign() ) - end ); // move start of heap to multiple of alignment
|
---|
[95eb7cf] | 695 | } // HeapManager
|
---|
| 696 |
|
---|
| 697 |
|
---|
| 698 | static void ^?{}( HeapManager & ) {
|
---|
| 699 | #ifdef __STATISTICS__
|
---|
[baf608a] | 700 | if ( traceHeapTerm() ) {
|
---|
| 701 | printStats();
|
---|
[92aca37] | 702 | // prtUnfreed() called in heapAppStop()
|
---|
[baf608a] | 703 | } // if
|
---|
[95eb7cf] | 704 | #endif // __STATISTICS__
|
---|
| 705 | } // ~HeapManager
|
---|
| 706 |
|
---|
| 707 |
|
---|
| 708 | static void memory_startup( void ) __attribute__(( constructor( STARTUP_PRIORITY_MEMORY ) ));
|
---|
| 709 | void memory_startup( void ) {
|
---|
| 710 | #ifdef __CFA_DEBUG__
|
---|
[92aca37] | 711 | if ( heapBoot ) { // check for recursion during system boot
|
---|
[95eb7cf] | 712 | // DO NOT USE STREAMS AS THEY MAY BE UNAVAILABLE AT THIS POINT.
|
---|
| 713 | abort( "boot() : internal error, recursively invoked during system boot." );
|
---|
| 714 | } // if
|
---|
| 715 | heapBoot = true;
|
---|
| 716 | #endif // __CFA_DEBUG__
|
---|
| 717 |
|
---|
[c1f38e6c] | 718 | //verify( heapManager.heapBegin != 0 );
|
---|
[95eb7cf] | 719 | //heapManager{};
|
---|
[1076d05] | 720 | if ( heapManager.heapBegin == 0p ) heapManager{}; // sanity check
|
---|
[95eb7cf] | 721 | } // memory_startup
|
---|
| 722 |
|
---|
| 723 | static void memory_shutdown( void ) __attribute__(( destructor( STARTUP_PRIORITY_MEMORY ) ));
|
---|
| 724 | void memory_shutdown( void ) {
|
---|
| 725 | ^heapManager{};
|
---|
| 726 | } // memory_shutdown
|
---|
[c4f68dc] | 727 |
|
---|
[bcb14b5] | 728 |
|
---|
| 729 | static inline void * mallocNoStats( size_t size ) { // necessary for malloc statistics
|
---|
[92aca37] | 730 | verify( heapManager.heapBegin != 0p ); // called before memory_startup ?
|
---|
[dd23e66] | 731 | if ( unlikely( size ) == 0 ) return 0p; // 0 BYTE ALLOCATION RETURNS NULL POINTER
|
---|
[d5d3a90] | 732 |
|
---|
[76e2113] | 733 | #if __SIZEOF_POINTER__ == 8
|
---|
| 734 | verify( size < ((typeof(size_t))1 << 48) );
|
---|
| 735 | #endif // __SIZEOF_POINTER__ == 8
|
---|
[d5d3a90] | 736 | return doMalloc( size );
|
---|
[bcb14b5] | 737 | } // mallocNoStats
|
---|
[c4f68dc] | 738 |
|
---|
| 739 |
|
---|
[76e2113] | 740 | static inline void * callocNoStats( size_t dim, size_t elemSize ) {
|
---|
| 741 | size_t size = dim * elemSize;
|
---|
[dd23e66] | 742 | if ( unlikely( size ) == 0 ) return 0p; // 0 BYTE ALLOCATION RETURNS NULL POINTER
|
---|
[95eb7cf] | 743 | char * addr = (char *)mallocNoStats( size );
|
---|
| 744 |
|
---|
| 745 | HeapManager.Storage.Header * header;
|
---|
| 746 | HeapManager.FreeHeader * freeElem;
|
---|
| 747 | size_t bsize, alignment;
|
---|
[d5d3a90] | 748 | #ifndef __CFA_DEBUG__
|
---|
| 749 | bool mapped =
|
---|
| 750 | #endif // __CFA_DEBUG__
|
---|
| 751 | headers( "calloc", addr, header, freeElem, bsize, alignment );
|
---|
[95eb7cf] | 752 | #ifndef __CFA_DEBUG__
|
---|
[dd23e66] | 753 |
|
---|
[95eb7cf] | 754 | // Mapped storage is zero filled, but in debug mode mapped memory is scrubbed in doMalloc, so it has to be reset to zero.
|
---|
| 755 | if ( ! mapped )
|
---|
| 756 | #endif // __CFA_DEBUG__
|
---|
[d5d3a90] | 757 | // <-------0000000000000000000000000000UUUUUUUUUUUUUUUUUUUUUUUUU> bsize (bucket size) U => undefined
|
---|
[1e034d9] | 758 | // `-header`-addr `-size
|
---|
[d5d3a90] | 759 | memset( addr, '\0', size ); // set to zeros
|
---|
[95eb7cf] | 760 |
|
---|
| 761 | header->kind.real.blockSize |= 2; // mark as zero filled
|
---|
| 762 | return addr;
|
---|
| 763 | } // callocNoStats
|
---|
| 764 |
|
---|
| 765 |
|
---|
[92aca37] | 766 | static inline void * memalignNoStats( size_t alignment, size_t size ) {
|
---|
[dd23e66] | 767 | if ( unlikely( size ) == 0 ) return 0p; // 0 BYTE ALLOCATION RETURNS NULL POINTER
|
---|
[d5d3a90] | 768 |
|
---|
[bcb14b5] | 769 | #ifdef __CFA_DEBUG__
|
---|
[b6830d74] | 770 | checkAlign( alignment ); // check alignment
|
---|
[bcb14b5] | 771 | #endif // __CFA_DEBUG__
|
---|
[c4f68dc] | 772 |
|
---|
[b6830d74] | 773 | // if alignment <= default alignment, do normal malloc as two headers are unnecessary
|
---|
[bcb14b5] | 774 | if ( unlikely( alignment <= libAlign() ) ) return mallocNoStats( size );
|
---|
[b6830d74] | 775 |
|
---|
| 776 | // Allocate enough storage to guarantee an address on the alignment boundary, and sufficient space before it for
|
---|
| 777 | // administrative storage. NOTE, WHILE THERE ARE 2 HEADERS, THE FIRST ONE IS IMPLICITLY CREATED BY DOMALLOC.
|
---|
| 778 | // .-------------v-----------------v----------------v----------,
|
---|
| 779 | // | Real Header | ... padding ... | Fake Header | data ... |
|
---|
| 780 | // `-------------^-----------------^-+--------------^----------'
|
---|
| 781 | // |<--------------------------------' offset/align |<-- alignment boundary
|
---|
| 782 |
|
---|
| 783 | // subtract libAlign() because it is already the minimum alignment
|
---|
| 784 | // add sizeof(Storage) for fake header
|
---|
[95eb7cf] | 785 | char * addr = (char *)mallocNoStats( size + alignment - libAlign() + sizeof(HeapManager.Storage) );
|
---|
[b6830d74] | 786 |
|
---|
| 787 | // address in the block of the "next" alignment address
|
---|
[92aca37] | 788 | char * user = (char *)ceiling2( (uintptr_t)(addr + sizeof(HeapManager.Storage)), alignment );
|
---|
[b6830d74] | 789 |
|
---|
| 790 | // address of header from malloc
|
---|
[95eb7cf] | 791 | HeapManager.Storage.Header * realHeader = headerAddr( addr );
|
---|
[4cf617e] | 792 | realHeader->kind.real.size = size; // correct size to eliminate above alignment offset
|
---|
[b6830d74] | 793 | // address of fake header * before* the alignment location
|
---|
| 794 | HeapManager.Storage.Header * fakeHeader = headerAddr( user );
|
---|
| 795 | // SKULLDUGGERY: insert the offset to the start of the actual storage block and remember alignment
|
---|
| 796 | fakeHeader->kind.fake.offset = (char *)fakeHeader - (char *)realHeader;
|
---|
| 797 | // SKULLDUGGERY: odd alignment imples fake header
|
---|
| 798 | fakeHeader->kind.fake.alignment = alignment | 1;
|
---|
| 799 |
|
---|
| 800 | return user;
|
---|
[bcb14b5] | 801 | } // memalignNoStats
|
---|
[c4f68dc] | 802 |
|
---|
| 803 |
|
---|
[76e2113] | 804 | static inline void * cmemalignNoStats( size_t alignment, size_t dim, size_t elemSize ) {
|
---|
| 805 | size_t size = dim * elemSize;
|
---|
[dd23e66] | 806 | if ( unlikely( size ) == 0 ) return 0p; // 0 BYTE ALLOCATION RETURNS NULL POINTER
|
---|
[95eb7cf] | 807 | char * addr = (char *)memalignNoStats( alignment, size );
|
---|
[d5d3a90] | 808 |
|
---|
[95eb7cf] | 809 | HeapManager.Storage.Header * header;
|
---|
| 810 | HeapManager.FreeHeader * freeElem;
|
---|
| 811 | size_t bsize;
|
---|
| 812 | #ifndef __CFA_DEBUG__
|
---|
[dd23e66] | 813 | bool mapped =
|
---|
| 814 | #endif // __CFA_DEBUG__
|
---|
| 815 | headers( "cmemalign", addr, header, freeElem, bsize, alignment );
|
---|
| 816 |
|
---|
[95eb7cf] | 817 | // Mapped storage is zero filled, but in debug mode mapped memory is scrubbed in doMalloc, so it has to be reset to zero.
|
---|
[92aca37] | 818 | #ifndef __CFA_DEBUG__
|
---|
[95eb7cf] | 819 | if ( ! mapped )
|
---|
| 820 | #endif // __CFA_DEBUG__
|
---|
[dd23e66] | 821 | // <-------0000000000000000000000000000UUUUUUUUUUUUUUUUUUUUUUUUU> bsize (bucket size) U => undefined
|
---|
| 822 | // `-header`-addr `-size
|
---|
| 823 | memset( addr, '\0', size ); // set to zeros
|
---|
[95eb7cf] | 824 |
|
---|
[cfbc703d] | 825 | header->kind.real.blockSize |= 2; // mark as zero filled
|
---|
[95eb7cf] | 826 | return addr;
|
---|
| 827 | } // cmemalignNoStats
|
---|
| 828 |
|
---|
| 829 |
|
---|
[c4f68dc] | 830 | extern "C" {
|
---|
[61248a4] | 831 | // Allocates size bytes and returns a pointer to the allocated memory. The contents are undefined. If size is 0,
|
---|
| 832 | // then malloc() returns a unique pointer value that can later be successfully passed to free().
|
---|
[b6830d74] | 833 | void * malloc( size_t size ) {
|
---|
[c4f68dc] | 834 | #ifdef __STATISTICS__
|
---|
[bcb14b5] | 835 | __atomic_add_fetch( &malloc_calls, 1, __ATOMIC_SEQ_CST );
|
---|
| 836 | __atomic_add_fetch( &malloc_storage, size, __ATOMIC_SEQ_CST );
|
---|
[c4f68dc] | 837 | #endif // __STATISTICS__
|
---|
| 838 |
|
---|
[bcb14b5] | 839 | return mallocNoStats( size );
|
---|
| 840 | } // malloc
|
---|
[c4f68dc] | 841 |
|
---|
[76e2113] | 842 |
|
---|
[61248a4] | 843 | // Same as malloc() except size bytes is an array of dim elements each of elemSize bytes.
|
---|
[76e2113] | 844 | void * aalloc( size_t dim, size_t elemSize ) {
|
---|
[92aca37] | 845 | size_t size = dim * elemSize;
|
---|
[76e2113] | 846 | #ifdef __STATISTICS__
|
---|
| 847 | __atomic_add_fetch( &aalloc_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[92aca37] | 848 | __atomic_add_fetch( &aalloc_storage, size, __ATOMIC_SEQ_CST );
|
---|
[76e2113] | 849 | #endif // __STATISTICS__
|
---|
| 850 |
|
---|
[92aca37] | 851 | return mallocNoStats( size );
|
---|
[76e2113] | 852 | } // aalloc
|
---|
| 853 |
|
---|
| 854 |
|
---|
[61248a4] | 855 | // Same as aalloc() with memory set to zero.
|
---|
[76e2113] | 856 | void * calloc( size_t dim, size_t elemSize ) {
|
---|
[c4f68dc] | 857 | #ifdef __STATISTICS__
|
---|
[bcb14b5] | 858 | __atomic_add_fetch( &calloc_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[76e2113] | 859 | __atomic_add_fetch( &calloc_storage, dim * elemSize, __ATOMIC_SEQ_CST );
|
---|
[c4f68dc] | 860 | #endif // __STATISTICS__
|
---|
| 861 |
|
---|
[76e2113] | 862 | return callocNoStats( dim, elemSize );
|
---|
[bcb14b5] | 863 | } // calloc
|
---|
[c4f68dc] | 864 |
|
---|
[92aca37] | 865 |
|
---|
[61248a4] | 866 | // Change the size of the memory block pointed to by oaddr to size bytes. The contents are undefined. If oaddr is
|
---|
| 867 | // 0p, then the call is equivalent to malloc(size), for all values of size; if size is equal to zero, and oaddr is
|
---|
| 868 | // not 0p, then the call is equivalent to free(oaddr). Unless oaddr is 0p, it must have been returned by an earlier
|
---|
| 869 | // call to malloc(), alloc(), calloc() or realloc(). If the area pointed to was moved, a free(oaddr) is done.
|
---|
[cfbc703d] | 870 | void * resize( void * oaddr, size_t size ) {
|
---|
| 871 | #ifdef __STATISTICS__
|
---|
| 872 | __atomic_add_fetch( &resize_calls, 1, __ATOMIC_SEQ_CST );
|
---|
| 873 | #endif // __STATISTICS__
|
---|
| 874 |
|
---|
| 875 | // If size is equal to 0, either NULL or a pointer suitable to be passed to free() is returned.
|
---|
[d5d3a90] | 876 | if ( unlikely( size == 0 ) ) { free( oaddr ); return 0p; } // special cases
|
---|
[92aca37] | 877 | if ( unlikely( oaddr == 0p ) ) {
|
---|
| 878 | #ifdef __STATISTICS__
|
---|
| 879 | __atomic_add_fetch( &resize_storage, size, __ATOMIC_SEQ_CST );
|
---|
| 880 | #endif // __STATISTICS__
|
---|
| 881 | return mallocNoStats( size );
|
---|
| 882 | } // if
|
---|
[cfbc703d] | 883 |
|
---|
| 884 | HeapManager.Storage.Header * header;
|
---|
| 885 | HeapManager.FreeHeader * freeElem;
|
---|
[92aca37] | 886 | size_t bsize, oalign;
|
---|
[cfbc703d] | 887 | headers( "resize", oaddr, header, freeElem, bsize, oalign );
|
---|
| 888 |
|
---|
[76e2113] | 889 | size_t odsize = dataStorage( bsize, oaddr, header ); // data storage available in bucket
|
---|
[cfbc703d] | 890 | // same size, DO NOT preserve STICKY PROPERTIES.
|
---|
[92aca37] | 891 | if ( oalign <= libAlign() && size <= odsize && odsize <= size * 2 ) { // allow 50% wasted storage for smaller size
|
---|
[cfbc703d] | 892 | header->kind.real.blockSize &= -2; // no alignment and turn off 0 fill
|
---|
[d5d3a90] | 893 | header->kind.real.size = size; // reset allocation size
|
---|
[cfbc703d] | 894 | return oaddr;
|
---|
| 895 | } // if
|
---|
[0f89d4f] | 896 |
|
---|
[92aca37] | 897 | #ifdef __STATISTICS__
|
---|
| 898 | __atomic_add_fetch( &resize_storage, size, __ATOMIC_SEQ_CST );
|
---|
| 899 | #endif // __STATISTICS__
|
---|
| 900 |
|
---|
[cfbc703d] | 901 | // change size, DO NOT preserve STICKY PROPERTIES.
|
---|
| 902 | free( oaddr );
|
---|
[d5d3a90] | 903 | return mallocNoStats( size ); // create new area
|
---|
[cfbc703d] | 904 | } // resize
|
---|
| 905 |
|
---|
| 906 |
|
---|
[61248a4] | 907 | // Same as resize() but the contents are unchanged in the range from the start of the region up to the minimum of
|
---|
[cfbc703d] | 908 | // the old and new sizes.
|
---|
[95eb7cf] | 909 | void * realloc( void * oaddr, size_t size ) {
|
---|
[c4f68dc] | 910 | #ifdef __STATISTICS__
|
---|
[bcb14b5] | 911 | __atomic_add_fetch( &realloc_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[c4f68dc] | 912 | #endif // __STATISTICS__
|
---|
| 913 |
|
---|
[1f6de372] | 914 | // If size is equal to 0, either NULL or a pointer suitable to be passed to free() is returned.
|
---|
[d5d3a90] | 915 | if ( unlikely( size == 0 ) ) { free( oaddr ); return 0p; } // special cases
|
---|
[92aca37] | 916 | if ( unlikely( oaddr == 0p ) ) {
|
---|
| 917 | #ifdef __STATISTICS__
|
---|
| 918 | __atomic_add_fetch( &realloc_storage, size, __ATOMIC_SEQ_CST );
|
---|
| 919 | #endif // __STATISTICS__
|
---|
| 920 | return mallocNoStats( size );
|
---|
| 921 | } // if
|
---|
[c4f68dc] | 922 |
|
---|
| 923 | HeapManager.Storage.Header * header;
|
---|
| 924 | HeapManager.FreeHeader * freeElem;
|
---|
[92aca37] | 925 | size_t bsize, oalign;
|
---|
[95eb7cf] | 926 | headers( "realloc", oaddr, header, freeElem, bsize, oalign );
|
---|
| 927 |
|
---|
| 928 | size_t odsize = dataStorage( bsize, oaddr, header ); // data storage available in bucket
|
---|
[d5d3a90] | 929 | size_t osize = header->kind.real.size; // old allocation size
|
---|
| 930 | bool ozfill = (header->kind.real.blockSize & 2) != 0; // old allocation zero filled
|
---|
| 931 | if ( unlikely( size <= odsize ) && size > odsize / 2 ) { // allow up to 50% wasted storage
|
---|
| 932 | header->kind.real.size = size; // reset allocation size
|
---|
| 933 | if ( unlikely( ozfill ) && size > osize ) { // previous request zero fill and larger ?
|
---|
| 934 | memset( (char *)oaddr + osize, (int)'\0', size - osize ); // initialize added storage
|
---|
| 935 | } // if
|
---|
[95eb7cf] | 936 | return oaddr;
|
---|
[c4f68dc] | 937 | } // if
|
---|
| 938 |
|
---|
[92aca37] | 939 | #ifdef __STATISTICS__
|
---|
| 940 | __atomic_add_fetch( &realloc_storage, size, __ATOMIC_SEQ_CST );
|
---|
| 941 | #endif // __STATISTICS__
|
---|
| 942 |
|
---|
[95eb7cf] | 943 | // change size and copy old content to new storage
|
---|
| 944 |
|
---|
| 945 | void * naddr;
|
---|
[92aca37] | 946 | if ( likely( oalign <= libAlign() ) ) { // previous request not aligned ?
|
---|
[d5d3a90] | 947 | naddr = mallocNoStats( size ); // create new area
|
---|
[c4f68dc] | 948 | } else {
|
---|
[d5d3a90] | 949 | naddr = memalignNoStats( oalign, size ); // create new aligned area
|
---|
[c4f68dc] | 950 | } // if
|
---|
[1e034d9] | 951 |
|
---|
[95eb7cf] | 952 | headers( "realloc", naddr, header, freeElem, bsize, oalign );
|
---|
[d5d3a90] | 953 | memcpy( naddr, oaddr, MIN( osize, size ) ); // copy bytes
|
---|
[95eb7cf] | 954 | free( oaddr );
|
---|
[d5d3a90] | 955 |
|
---|
| 956 | if ( unlikely( ozfill ) ) { // previous request zero fill ?
|
---|
| 957 | header->kind.real.blockSize |= 2; // mark new request as zero filled
|
---|
| 958 | if ( size > osize ) { // previous request larger ?
|
---|
| 959 | memset( (char *)naddr + osize, (int)'\0', size - osize ); // initialize added storage
|
---|
| 960 | } // if
|
---|
| 961 | } // if
|
---|
[95eb7cf] | 962 | return naddr;
|
---|
[b6830d74] | 963 | } // realloc
|
---|
[c4f68dc] | 964 |
|
---|
[c1f38e6c] | 965 |
|
---|
[61248a4] | 966 | // Same as malloc() except the memory address is a multiple of alignment, which must be a power of two. (obsolete)
|
---|
[bcb14b5] | 967 | void * memalign( size_t alignment, size_t size ) {
|
---|
[c4f68dc] | 968 | #ifdef __STATISTICS__
|
---|
| 969 | __atomic_add_fetch( &memalign_calls, 1, __ATOMIC_SEQ_CST );
|
---|
| 970 | __atomic_add_fetch( &memalign_storage, size, __ATOMIC_SEQ_CST );
|
---|
| 971 | #endif // __STATISTICS__
|
---|
| 972 |
|
---|
[95eb7cf] | 973 | return memalignNoStats( alignment, size );
|
---|
[bcb14b5] | 974 | } // memalign
|
---|
[c4f68dc] | 975 |
|
---|
[95eb7cf] | 976 |
|
---|
[76e2113] | 977 | // Same as aalloc() with memory alignment.
|
---|
| 978 | void * amemalign( size_t alignment, size_t dim, size_t elemSize ) {
|
---|
[92aca37] | 979 | size_t size = dim * elemSize;
|
---|
[76e2113] | 980 | #ifdef __STATISTICS__
|
---|
| 981 | __atomic_add_fetch( &cmemalign_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[92aca37] | 982 | __atomic_add_fetch( &cmemalign_storage, size, __ATOMIC_SEQ_CST );
|
---|
[76e2113] | 983 | #endif // __STATISTICS__
|
---|
| 984 |
|
---|
[92aca37] | 985 | return memalignNoStats( alignment, size );
|
---|
[76e2113] | 986 | } // amemalign
|
---|
| 987 |
|
---|
| 988 |
|
---|
[ca7949b] | 989 | // Same as calloc() with memory alignment.
|
---|
[76e2113] | 990 | void * cmemalign( size_t alignment, size_t dim, size_t elemSize ) {
|
---|
[95eb7cf] | 991 | #ifdef __STATISTICS__
|
---|
| 992 | __atomic_add_fetch( &cmemalign_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[76e2113] | 993 | __atomic_add_fetch( &cmemalign_storage, dim * elemSize, __ATOMIC_SEQ_CST );
|
---|
[95eb7cf] | 994 | #endif // __STATISTICS__
|
---|
| 995 |
|
---|
[76e2113] | 996 | return cmemalignNoStats( alignment, dim, elemSize );
|
---|
[95eb7cf] | 997 | } // cmemalign
|
---|
| 998 |
|
---|
[ca7949b] | 999 | // Same as memalign(), but ISO/IEC 2011 C11 Section 7.22.2 states: the value of size shall be an integral multiple
|
---|
| 1000 | // of alignment. This requirement is universally ignored.
|
---|
[b6830d74] | 1001 | void * aligned_alloc( size_t alignment, size_t size ) {
|
---|
[c4f68dc] | 1002 | return memalign( alignment, size );
|
---|
[b6830d74] | 1003 | } // aligned_alloc
|
---|
[c4f68dc] | 1004 |
|
---|
| 1005 |
|
---|
[ca7949b] | 1006 | // Allocates size bytes and places the address of the allocated memory in *memptr. The address of the allocated
|
---|
| 1007 | // memory shall be a multiple of alignment, which must be a power of two and a multiple of sizeof(void *). If size
|
---|
| 1008 | // is 0, then posix_memalign() returns either 0p, or a unique pointer value that can later be successfully passed to
|
---|
| 1009 | // free(3).
|
---|
[b6830d74] | 1010 | int posix_memalign( void ** memptr, size_t alignment, size_t size ) {
|
---|
[92aca37] | 1011 | if ( alignment < libAlign() || ! is_pow2( alignment ) ) return EINVAL; // check alignment
|
---|
[c4f68dc] | 1012 | * memptr = memalign( alignment, size );
|
---|
| 1013 | return 0;
|
---|
[b6830d74] | 1014 | } // posix_memalign
|
---|
[c4f68dc] | 1015 |
|
---|
[ca7949b] | 1016 | // Allocates size bytes and returns a pointer to the allocated memory. The memory address shall be a multiple of the
|
---|
| 1017 | // page size. It is equivalent to memalign(sysconf(_SC_PAGESIZE),size).
|
---|
[b6830d74] | 1018 | void * valloc( size_t size ) {
|
---|
[c4f68dc] | 1019 | return memalign( pageSize, size );
|
---|
[b6830d74] | 1020 | } // valloc
|
---|
[c4f68dc] | 1021 |
|
---|
| 1022 |
|
---|
[ca7949b] | 1023 | // Same as valloc but rounds size to multiple of page size.
|
---|
| 1024 | void * pvalloc( size_t size ) {
|
---|
[92aca37] | 1025 | return memalign( pageSize, ceiling2( size, pageSize ) );
|
---|
[ca7949b] | 1026 | } // pvalloc
|
---|
| 1027 |
|
---|
| 1028 |
|
---|
| 1029 | // Frees the memory space pointed to by ptr, which must have been returned by a previous call to malloc(), calloc()
|
---|
[1076d05] | 1030 | // or realloc(). Otherwise, or if free(ptr) has already been called before, undefined behaviour occurs. If ptr is
|
---|
[ca7949b] | 1031 | // 0p, no operation is performed.
|
---|
[b6830d74] | 1032 | void free( void * addr ) {
|
---|
[c4f68dc] | 1033 | #ifdef __STATISTICS__
|
---|
[bcb14b5] | 1034 | __atomic_add_fetch( &free_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[c4f68dc] | 1035 | #endif // __STATISTICS__
|
---|
| 1036 |
|
---|
[95eb7cf] | 1037 | if ( unlikely( addr == 0p ) ) { // special case
|
---|
| 1038 | // #ifdef __CFA_DEBUG__
|
---|
| 1039 | // if ( traceHeap() ) {
|
---|
| 1040 | // #define nullmsg "Free( 0x0 ) size:0\n"
|
---|
[1e034d9] | 1041 | // // Do not debug print free( 0p ), as it can cause recursive entry from sprintf.
|
---|
[95eb7cf] | 1042 | // __cfaabi_dbg_write( nullmsg, sizeof(nullmsg) - 1 );
|
---|
| 1043 | // } // if
|
---|
| 1044 | // #endif // __CFA_DEBUG__
|
---|
[c4f68dc] | 1045 | return;
|
---|
| 1046 | } // exit
|
---|
| 1047 |
|
---|
| 1048 | doFree( addr );
|
---|
[b6830d74] | 1049 | } // free
|
---|
[93c2e0a] | 1050 |
|
---|
[c4f68dc] | 1051 |
|
---|
[76e2113] | 1052 | // Returns the alignment of an allocation.
|
---|
[b6830d74] | 1053 | size_t malloc_alignment( void * addr ) {
|
---|
[95eb7cf] | 1054 | if ( unlikely( addr == 0p ) ) return libAlign(); // minimum alignment
|
---|
[1aa6ecb] | 1055 | HeapManager.Storage.Header * header = headerAddr( addr );
|
---|
[c4f68dc] | 1056 | if ( (header->kind.fake.alignment & 1) == 1 ) { // fake header ?
|
---|
| 1057 | return header->kind.fake.alignment & -2; // remove flag from value
|
---|
| 1058 | } else {
|
---|
[cfbc703d] | 1059 | return libAlign(); // minimum alignment
|
---|
[c4f68dc] | 1060 | } // if
|
---|
[bcb14b5] | 1061 | } // malloc_alignment
|
---|
[c4f68dc] | 1062 |
|
---|
[92aca37] | 1063 |
|
---|
[76e2113] | 1064 | // Set the alignment for an the allocation and return previous alignment or 0 if no alignment.
|
---|
| 1065 | size_t $malloc_alignment_set( void * addr, size_t alignment ) {
|
---|
| 1066 | if ( unlikely( addr == 0p ) ) return libAlign(); // minimum alignment
|
---|
| 1067 | size_t ret;
|
---|
| 1068 | HeapManager.Storage.Header * header = headerAddr( addr );
|
---|
| 1069 | if ( (header->kind.fake.alignment & 1) == 1 ) { // fake header ?
|
---|
| 1070 | ret = header->kind.fake.alignment & -2; // remove flag from old value
|
---|
| 1071 | header->kind.fake.alignment = alignment | 1; // add flag to new value
|
---|
| 1072 | } else {
|
---|
| 1073 | ret = 0; // => no alignment to change
|
---|
| 1074 | } // if
|
---|
| 1075 | return ret;
|
---|
| 1076 | } // $malloc_alignment_set
|
---|
| 1077 |
|
---|
[c4f68dc] | 1078 |
|
---|
[76e2113] | 1079 | // Returns true if the allocation is zero filled, e.g., allocated by calloc().
|
---|
[b6830d74] | 1080 | bool malloc_zero_fill( void * addr ) {
|
---|
[95eb7cf] | 1081 | if ( unlikely( addr == 0p ) ) return false; // null allocation is not zero fill
|
---|
[1aa6ecb] | 1082 | HeapManager.Storage.Header * header = headerAddr( addr );
|
---|
[c4f68dc] | 1083 | if ( (header->kind.fake.alignment & 1) == 1 ) { // fake header ?
|
---|
[cfbc703d] | 1084 | header = realHeader( header ); // backup from fake to real header
|
---|
[c4f68dc] | 1085 | } // if
|
---|
[76e2113] | 1086 | return (header->kind.real.blockSize & 2) != 0; // zero filled ?
|
---|
[bcb14b5] | 1087 | } // malloc_zero_fill
|
---|
[c4f68dc] | 1088 |
|
---|
[76e2113] | 1089 | // Set allocation is zero filled and return previous zero filled.
|
---|
| 1090 | bool $malloc_zero_fill_set( void * addr ) {
|
---|
| 1091 | if ( unlikely( addr == 0p ) ) return false; // null allocation is not zero fill
|
---|
| 1092 | HeapManager.Storage.Header * header = headerAddr( addr );
|
---|
| 1093 | if ( (header->kind.fake.alignment & 1) == 1 ) { // fake header ?
|
---|
| 1094 | header = realHeader( header ); // backup from fake to real header
|
---|
| 1095 | } // if
|
---|
| 1096 | bool ret = (header->kind.real.blockSize & 2) != 0; // zero filled ?
|
---|
| 1097 | header->kind.real.blockSize |= 2; // mark as zero filled
|
---|
| 1098 | return ret;
|
---|
| 1099 | } // $malloc_zero_fill_set
|
---|
| 1100 |
|
---|
[c4f68dc] | 1101 |
|
---|
[76e2113] | 1102 | // Returns original total allocation size (not bucket size) => array size is dimension * sizeif(T).
|
---|
| 1103 | size_t malloc_size( void * addr ) {
|
---|
[849fb370] | 1104 | if ( unlikely( addr == 0p ) ) return 0; // null allocation has zero size
|
---|
[cfbc703d] | 1105 | HeapManager.Storage.Header * header = headerAddr( addr );
|
---|
| 1106 | if ( (header->kind.fake.alignment & 1) == 1 ) { // fake header ?
|
---|
| 1107 | header = realHeader( header ); // backup from fake to real header
|
---|
| 1108 | } // if
|
---|
[9c438546] | 1109 | return header->kind.real.size;
|
---|
[76e2113] | 1110 | } // malloc_size
|
---|
| 1111 |
|
---|
| 1112 | // Set allocation size and return previous size.
|
---|
| 1113 | size_t $malloc_size_set( void * addr, size_t size ) {
|
---|
[849fb370] | 1114 | if ( unlikely( addr == 0p ) ) return 0; // null allocation has 0 size
|
---|
[76e2113] | 1115 | HeapManager.Storage.Header * header = headerAddr( addr );
|
---|
| 1116 | if ( (header->kind.fake.alignment & 1) == 1 ) { // fake header ?
|
---|
| 1117 | header = realHeader( header ); // backup from fake to real header
|
---|
| 1118 | } // if
|
---|
[9c438546] | 1119 | size_t ret = header->kind.real.size;
|
---|
| 1120 | header->kind.real.size = size;
|
---|
[76e2113] | 1121 | return ret;
|
---|
| 1122 | } // $malloc_size_set
|
---|
[cfbc703d] | 1123 |
|
---|
| 1124 |
|
---|
[ca7949b] | 1125 | // Returns the number of usable bytes in the block pointed to by ptr, a pointer to a block of memory allocated by
|
---|
| 1126 | // malloc or a related function.
|
---|
[95eb7cf] | 1127 | size_t malloc_usable_size( void * addr ) {
|
---|
| 1128 | if ( unlikely( addr == 0p ) ) return 0; // null allocation has 0 size
|
---|
| 1129 | HeapManager.Storage.Header * header;
|
---|
| 1130 | HeapManager.FreeHeader * freeElem;
|
---|
| 1131 | size_t bsize, alignment;
|
---|
| 1132 |
|
---|
| 1133 | headers( "malloc_usable_size", addr, header, freeElem, bsize, alignment );
|
---|
[dd23e66] | 1134 | return dataStorage( bsize, addr, header ); // data storage in bucket
|
---|
[95eb7cf] | 1135 | } // malloc_usable_size
|
---|
| 1136 |
|
---|
| 1137 |
|
---|
[ca7949b] | 1138 | // Prints (on default standard error) statistics about memory allocated by malloc and related functions.
|
---|
[b6830d74] | 1139 | void malloc_stats( void ) {
|
---|
[c4f68dc] | 1140 | #ifdef __STATISTICS__
|
---|
[bcb14b5] | 1141 | printStats();
|
---|
[95eb7cf] | 1142 | if ( prtFree() ) prtFree( heapManager );
|
---|
[c4f68dc] | 1143 | #endif // __STATISTICS__
|
---|
[bcb14b5] | 1144 | } // malloc_stats
|
---|
[c4f68dc] | 1145 |
|
---|
[92aca37] | 1146 |
|
---|
[ca7949b] | 1147 | // Changes the file descripter where malloc_stats() writes statistics.
|
---|
[95eb7cf] | 1148 | int malloc_stats_fd( int fd __attribute__(( unused )) ) {
|
---|
[c4f68dc] | 1149 | #ifdef __STATISTICS__
|
---|
[92aca37] | 1150 | int temp = stat_fd;
|
---|
| 1151 | stat_fd = fd;
|
---|
[bcb14b5] | 1152 | return temp;
|
---|
[c4f68dc] | 1153 | #else
|
---|
[bcb14b5] | 1154 | return -1;
|
---|
[c4f68dc] | 1155 | #endif // __STATISTICS__
|
---|
[bcb14b5] | 1156 | } // malloc_stats_fd
|
---|
[c4f68dc] | 1157 |
|
---|
[95eb7cf] | 1158 |
|
---|
[1076d05] | 1159 | // Adjusts parameters that control the behaviour of the memory-allocation functions (see malloc). The param argument
|
---|
[ca7949b] | 1160 | // specifies the parameter to be modified, and value specifies the new value for that parameter.
|
---|
[95eb7cf] | 1161 | int mallopt( int option, int value ) {
|
---|
| 1162 | choose( option ) {
|
---|
| 1163 | case M_TOP_PAD:
|
---|
[1076d05] | 1164 | heapExpand = ceiling( value, pageSize ); return 1;
|
---|
[95eb7cf] | 1165 | case M_MMAP_THRESHOLD:
|
---|
| 1166 | if ( setMmapStart( value ) ) return 1;
|
---|
[1076d05] | 1167 | break;
|
---|
[95eb7cf] | 1168 | } // switch
|
---|
| 1169 | return 0; // error, unsupported
|
---|
| 1170 | } // mallopt
|
---|
| 1171 |
|
---|
[c1f38e6c] | 1172 |
|
---|
[ca7949b] | 1173 | // Attempt to release free memory at the top of the heap (by calling sbrk with a suitable argument).
|
---|
[95eb7cf] | 1174 | int malloc_trim( size_t ) {
|
---|
| 1175 | return 0; // => impossible to release memory
|
---|
| 1176 | } // malloc_trim
|
---|
| 1177 |
|
---|
| 1178 |
|
---|
[ca7949b] | 1179 | // Exports an XML string that describes the current state of the memory-allocation implementation in the caller.
|
---|
| 1180 | // The string is printed on the file stream stream. The exported string includes information about all arenas (see
|
---|
| 1181 | // malloc).
|
---|
[c4f68dc] | 1182 | int malloc_info( int options, FILE * stream ) {
|
---|
[92aca37] | 1183 | if ( options != 0 ) { errno = EINVAL; return -1; }
|
---|
| 1184 | #ifdef __STATISTICS__
|
---|
[d46ed6e] | 1185 | return printStatsXML( stream );
|
---|
[92aca37] | 1186 | #else
|
---|
| 1187 | return 0; // unsupported
|
---|
| 1188 | #endif // __STATISTICS__
|
---|
[c4f68dc] | 1189 | } // malloc_info
|
---|
| 1190 |
|
---|
| 1191 |
|
---|
[ca7949b] | 1192 | // Records the current state of all malloc internal bookkeeping variables (but not the actual contents of the heap
|
---|
| 1193 | // or the state of malloc_hook functions pointers). The state is recorded in a system-dependent opaque data
|
---|
| 1194 | // structure dynamically allocated via malloc, and a pointer to that data structure is returned as the function
|
---|
| 1195 | // result. (The caller must free this memory.)
|
---|
[c4f68dc] | 1196 | void * malloc_get_state( void ) {
|
---|
[95eb7cf] | 1197 | return 0p; // unsupported
|
---|
[c4f68dc] | 1198 | } // malloc_get_state
|
---|
| 1199 |
|
---|
[bcb14b5] | 1200 |
|
---|
[ca7949b] | 1201 | // Restores the state of all malloc internal bookkeeping variables to the values recorded in the opaque data
|
---|
| 1202 | // structure pointed to by state.
|
---|
[92aca37] | 1203 | int malloc_set_state( void * ) {
|
---|
[bcb14b5] | 1204 | return 0; // unsupported
|
---|
[c4f68dc] | 1205 | } // malloc_set_state
|
---|
| 1206 | } // extern "C"
|
---|
| 1207 |
|
---|
| 1208 |
|
---|
[95eb7cf] | 1209 | // Must have CFA linkage to overload with C linkage realloc.
|
---|
[cfbc703d] | 1210 | void * resize( void * oaddr, size_t nalign, size_t size ) {
|
---|
[1e034d9] | 1211 | #ifdef __STATISTICS__
|
---|
[cfbc703d] | 1212 | __atomic_add_fetch( &resize_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[1e034d9] | 1213 | #endif // __STATISTICS__
|
---|
[95eb7cf] | 1214 |
|
---|
[1f6de372] | 1215 | // If size is equal to 0, either NULL or a pointer suitable to be passed to free() is returned.
|
---|
[d5d3a90] | 1216 | if ( unlikely( size == 0 ) ) { free( oaddr ); return 0p; } // special cases
|
---|
[92aca37] | 1217 | if ( unlikely( oaddr == 0p ) ) {
|
---|
| 1218 | #ifdef __STATISTICS__
|
---|
| 1219 | __atomic_add_fetch( &resize_storage, size, __ATOMIC_SEQ_CST );
|
---|
| 1220 | #endif // __STATISTICS__
|
---|
| 1221 | return memalignNoStats( nalign, size );
|
---|
| 1222 | } // if
|
---|
[cfbc703d] | 1223 |
|
---|
[c1f38e6c] | 1224 | if ( unlikely( nalign < libAlign() ) ) nalign = libAlign(); // reset alignment to minimum
|
---|
[95eb7cf] | 1225 | #ifdef __CFA_DEBUG__
|
---|
[1e034d9] | 1226 | else
|
---|
[95eb7cf] | 1227 | checkAlign( nalign ); // check alignment
|
---|
| 1228 | #endif // __CFA_DEBUG__
|
---|
| 1229 |
|
---|
[cfbc703d] | 1230 | HeapManager.Storage.Header * header;
|
---|
| 1231 | HeapManager.FreeHeader * freeElem;
|
---|
[92aca37] | 1232 | size_t bsize, oalign;
|
---|
[cfbc703d] | 1233 | headers( "resize", oaddr, header, freeElem, bsize, oalign );
|
---|
| 1234 | size_t odsize = dataStorage( bsize, oaddr, header ); // data storage available in bucket
|
---|
| 1235 |
|
---|
| 1236 | if ( oalign <= nalign && (uintptr_t)oaddr % nalign == 0 ) { // <= alignment and new alignment happens to match
|
---|
[c1f38e6c] | 1237 | if ( oalign > libAlign() ) { // fake header ?
|
---|
[cfbc703d] | 1238 | headerAddr( oaddr )->kind.fake.alignment = nalign | 1; // update alignment (could be the same)
|
---|
| 1239 | } // if
|
---|
| 1240 | if ( size <= odsize && odsize <= size * 2 ) { // allow 50% wasted storage for smaller size
|
---|
| 1241 | header->kind.real.blockSize &= -2; // turn off 0 fill
|
---|
[dd23e66] | 1242 | header->kind.real.size = size; // reset allocation size
|
---|
[cfbc703d] | 1243 | return oaddr;
|
---|
| 1244 | } // if
|
---|
| 1245 | } // if
|
---|
| 1246 |
|
---|
[92aca37] | 1247 | #ifdef __STATISTICS__
|
---|
| 1248 | __atomic_add_fetch( &resize_storage, size, __ATOMIC_SEQ_CST );
|
---|
| 1249 | #endif // __STATISTICS__
|
---|
| 1250 |
|
---|
[dd23e66] | 1251 | // change size, DO NOT preserve STICKY PROPERTIES.
|
---|
[cfbc703d] | 1252 | free( oaddr );
|
---|
[dd23e66] | 1253 | return memalignNoStats( nalign, size ); // create new aligned area
|
---|
[cfbc703d] | 1254 | } // resize
|
---|
| 1255 |
|
---|
| 1256 |
|
---|
| 1257 | void * realloc( void * oaddr, size_t nalign, size_t size ) {
|
---|
[c1f38e6c] | 1258 | if ( unlikely( nalign < libAlign() ) ) nalign = libAlign(); // reset alignment to minimum
|
---|
[cfbc703d] | 1259 | #ifdef __CFA_DEBUG__
|
---|
| 1260 | else
|
---|
| 1261 | checkAlign( nalign ); // check alignment
|
---|
| 1262 | #endif // __CFA_DEBUG__
|
---|
| 1263 |
|
---|
[95eb7cf] | 1264 | HeapManager.Storage.Header * header;
|
---|
| 1265 | HeapManager.FreeHeader * freeElem;
|
---|
[92aca37] | 1266 | size_t bsize, oalign;
|
---|
[95eb7cf] | 1267 | headers( "realloc", oaddr, header, freeElem, bsize, oalign );
|
---|
| 1268 |
|
---|
[cfbc703d] | 1269 | if ( oalign <= nalign && (uintptr_t)oaddr % nalign == 0 ) { // <= alignment and new alignment happens to match
|
---|
[c1f38e6c] | 1270 | if ( oalign > libAlign() ) { // fake header ?
|
---|
[cfbc703d] | 1271 | headerAddr( oaddr )->kind.fake.alignment = nalign | 1; // update alignment (could be the same)
|
---|
| 1272 | } // if
|
---|
[95eb7cf] | 1273 | return realloc( oaddr, size );
|
---|
[1e034d9] | 1274 | } // if
|
---|
[95eb7cf] | 1275 |
|
---|
[cfbc703d] | 1276 | // change size and copy old content to new storage
|
---|
| 1277 |
|
---|
[1e034d9] | 1278 | #ifdef __STATISTICS__
|
---|
[cfbc703d] | 1279 | __atomic_add_fetch( &realloc_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[95eb7cf] | 1280 | __atomic_add_fetch( &realloc_storage, size, __ATOMIC_SEQ_CST );
|
---|
[1e034d9] | 1281 | #endif // __STATISTICS__
|
---|
| 1282 |
|
---|
[cfbc703d] | 1283 | // If size is equal to 0, either NULL or a pointer suitable to be passed to free() is returned.
|
---|
[d5d3a90] | 1284 | if ( unlikely( size == 0 ) ) { free( oaddr ); return 0p; } // special cases
|
---|
[cfbc703d] | 1285 | if ( unlikely( oaddr == 0p ) ) return memalignNoStats( nalign, size );
|
---|
[95eb7cf] | 1286 |
|
---|
[dd23e66] | 1287 | size_t osize = header->kind.real.size; // old allocation size
|
---|
| 1288 | bool ozfill = (header->kind.real.blockSize & 2) != 0; // old allocation zero filled
|
---|
| 1289 |
|
---|
| 1290 | void * naddr = memalignNoStats( nalign, size ); // create new aligned area
|
---|
[95eb7cf] | 1291 |
|
---|
[1e034d9] | 1292 | headers( "realloc", naddr, header, freeElem, bsize, oalign );
|
---|
[d5d3a90] | 1293 | memcpy( naddr, oaddr, MIN( osize, size ) ); // copy bytes
|
---|
[1e034d9] | 1294 | free( oaddr );
|
---|
[d5d3a90] | 1295 |
|
---|
| 1296 | if ( unlikely( ozfill ) ) { // previous request zero fill ?
|
---|
| 1297 | header->kind.real.blockSize |= 2; // mark new request as zero filled
|
---|
| 1298 | if ( size > osize ) { // previous request larger ?
|
---|
| 1299 | memset( (char *)naddr + osize, (int)'\0', size - osize ); // initialize added storage
|
---|
| 1300 | } // if
|
---|
| 1301 | } // if
|
---|
[1e034d9] | 1302 | return naddr;
|
---|
[95eb7cf] | 1303 | } // realloc
|
---|
| 1304 |
|
---|
| 1305 |
|
---|
[c4f68dc] | 1306 | // Local Variables: //
|
---|
| 1307 | // tab-width: 4 //
|
---|
[f8cd310] | 1308 | // compile-command: "cfa -nodebug -O2 heap.cfa" //
|
---|
[c4f68dc] | 1309 | // End: //
|
---|