[73abe95] | 1 | //
|
---|
[c4f68dc] | 2 | // Cforall Version 1.0.0 Copyright (C) 2017 University of Waterloo
|
---|
| 3 | //
|
---|
| 4 | // The contents of this file are covered under the licence agreement in the
|
---|
| 5 | // file "LICENCE" distributed with Cforall.
|
---|
[73abe95] | 6 | //
|
---|
[92aca37] | 7 | // heap.cfa --
|
---|
[73abe95] | 8 | //
|
---|
[c4f68dc] | 9 | // Author : Peter A. Buhr
|
---|
| 10 | // Created On : Tue Dec 19 21:58:35 2017
|
---|
| 11 | // Last Modified By : Peter A. Buhr
|
---|
[433905a] | 12 | // Last Modified On : Fri Apr 29 19:05:03 2022
|
---|
| 13 | // Update Count : 1167
|
---|
[73abe95] | 14 | //
|
---|
[c4f68dc] | 15 |
|
---|
[1e034d9] | 16 | #include <string.h> // memset, memcpy
|
---|
[1076d05] | 17 | #include <limits.h> // ULONG_MAX
|
---|
[31a5f418] | 18 | #include <stdlib.h> // EXIT_FAILURE
|
---|
| 19 | #include <errno.h> // errno, ENOMEM, EINVAL
|
---|
| 20 | #include <unistd.h> // STDERR_FILENO, sbrk, sysconf
|
---|
[ada0246d] | 21 | #include <malloc.h> // memalign, malloc_usable_size
|
---|
[c4f68dc] | 22 | #include <sys/mman.h> // mmap, munmap
|
---|
[31a5f418] | 23 | #include <sys/sysinfo.h> // get_nprocs
|
---|
[c4f68dc] | 24 |
|
---|
[92aca37] | 25 | #include "bits/align.hfa" // libAlign
|
---|
[bcb14b5] | 26 | #include "bits/defs.hfa" // likely, unlikely
|
---|
| 27 | #include "bits/locks.hfa" // __spinlock_t
|
---|
[73abe95] | 28 | #include "startup.hfa" // STARTUP_PRIORITY_MEMORY
|
---|
[58c671ba] | 29 | #include "math.hfa" // min
|
---|
[7cfef0d] | 30 | #include "bitmanip.hfa" // is_pow2, ceiling2
|
---|
[c4f68dc] | 31 |
|
---|
[31a5f418] | 32 | #define FASTLOOKUP
|
---|
| 33 | #define __STATISTICS__
|
---|
| 34 |
|
---|
| 35 |
|
---|
[93c2e0a] | 36 | static bool traceHeap = false;
|
---|
[d46ed6e] | 37 |
|
---|
[032234bd] | 38 | inline bool traceHeap() libcfa_public { return traceHeap; }
|
---|
[d46ed6e] | 39 |
|
---|
[032234bd] | 40 | bool traceHeapOn() libcfa_public {
|
---|
[93c2e0a] | 41 | bool temp = traceHeap;
|
---|
[d46ed6e] | 42 | traceHeap = true;
|
---|
| 43 | return temp;
|
---|
| 44 | } // traceHeapOn
|
---|
| 45 |
|
---|
[032234bd] | 46 | bool traceHeapOff() libcfa_public {
|
---|
[93c2e0a] | 47 | bool temp = traceHeap;
|
---|
[d46ed6e] | 48 | traceHeap = false;
|
---|
| 49 | return temp;
|
---|
| 50 | } // traceHeapOff
|
---|
| 51 |
|
---|
[032234bd] | 52 | bool traceHeapTerm() libcfa_public { return false; }
|
---|
[baf608a] | 53 |
|
---|
[d46ed6e] | 54 |
|
---|
[95eb7cf] | 55 | static bool prtFree = false;
|
---|
[d46ed6e] | 56 |
|
---|
[032234bd] | 57 | static bool prtFree() {
|
---|
[95eb7cf] | 58 | return prtFree;
|
---|
| 59 | } // prtFree
|
---|
[5d4fa18] | 60 |
|
---|
[032234bd] | 61 | static bool prtFreeOn() {
|
---|
[95eb7cf] | 62 | bool temp = prtFree;
|
---|
| 63 | prtFree = true;
|
---|
[5d4fa18] | 64 | return temp;
|
---|
[95eb7cf] | 65 | } // prtFreeOn
|
---|
[5d4fa18] | 66 |
|
---|
[032234bd] | 67 | static bool prtFreeOff() {
|
---|
[95eb7cf] | 68 | bool temp = prtFree;
|
---|
| 69 | prtFree = false;
|
---|
[5d4fa18] | 70 | return temp;
|
---|
[95eb7cf] | 71 | } // prtFreeOff
|
---|
[5d4fa18] | 72 |
|
---|
| 73 |
|
---|
[e723100] | 74 | enum {
|
---|
[31a5f418] | 75 | // The default extension heap amount in units of bytes. When the current heap reaches the brk address, the brk
|
---|
| 76 | // address is extended by the extension amount.
|
---|
| 77 | __CFA_DEFAULT_HEAP_EXPANSION__ = 10 * 1024 * 1024,
|
---|
[1e034d9] | 78 |
|
---|
[31a5f418] | 79 | // The mmap crossover point during allocation. Allocations less than this amount are allocated from buckets; values
|
---|
| 80 | // greater than or equal to this value are mmap from the operating system.
|
---|
| 81 | __CFA_DEFAULT_MMAP_START__ = 512 * 1024 + 1,
|
---|
[dd23e66] | 82 |
|
---|
[31a5f418] | 83 | // The default unfreed storage amount in units of bytes. When the uC++ program ends it subtracts this amount from
|
---|
| 84 | // the malloc/free counter to adjust for storage the program does not free.
|
---|
| 85 | __CFA_DEFAULT_HEAP_UNFREED__ = 0
|
---|
| 86 | }; // enum
|
---|
[e723100] | 87 |
|
---|
| 88 |
|
---|
[433905a] | 89 | //####################### Heap Statistics ####################
|
---|
[d46ed6e] | 90 |
|
---|
| 91 |
|
---|
[433905a] | 92 | #ifdef __STATISTICS__
|
---|
| 93 | enum { CntTriples = 12 }; // number of counter triples
|
---|
| 94 | enum { MALLOC, AALLOC, CALLOC, MEMALIGN, AMEMALIGN, CMEMALIGN, RESIZE, REALLOC, FREE };
|
---|
[bcb14b5] | 95 |
|
---|
[433905a] | 96 | struct StatsOverlay { // overlay for iteration
|
---|
| 97 | unsigned int calls, calls_0;
|
---|
| 98 | unsigned long long int request, alloc;
|
---|
| 99 | };
|
---|
[d46ed6e] | 100 |
|
---|
[433905a] | 101 | // Heap statistics counters.
|
---|
| 102 | union HeapStatistics {
|
---|
| 103 | struct { // minimum qualification
|
---|
| 104 | unsigned int malloc_calls, malloc_0_calls;
|
---|
| 105 | unsigned long long int malloc_storage_request, malloc_storage_alloc;
|
---|
| 106 | unsigned int aalloc_calls, aalloc_0_calls;
|
---|
| 107 | unsigned long long int aalloc_storage_request, aalloc_storage_alloc;
|
---|
| 108 | unsigned int calloc_calls, calloc_0_calls;
|
---|
| 109 | unsigned long long int calloc_storage_request, calloc_storage_alloc;
|
---|
| 110 | unsigned int memalign_calls, memalign_0_calls;
|
---|
| 111 | unsigned long long int memalign_storage_request, memalign_storage_alloc;
|
---|
| 112 | unsigned int amemalign_calls, amemalign_0_calls;
|
---|
| 113 | unsigned long long int amemalign_storage_request, amemalign_storage_alloc;
|
---|
| 114 | unsigned int cmemalign_calls, cmemalign_0_calls;
|
---|
| 115 | unsigned long long int cmemalign_storage_request, cmemalign_storage_alloc;
|
---|
| 116 | unsigned int resize_calls, resize_0_calls;
|
---|
| 117 | unsigned long long int resize_storage_request, resize_storage_alloc;
|
---|
| 118 | unsigned int realloc_calls, realloc_0_calls;
|
---|
| 119 | unsigned long long int realloc_storage_request, realloc_storage_alloc;
|
---|
| 120 | unsigned int free_calls, free_null_calls;
|
---|
| 121 | unsigned long long int free_storage_request, free_storage_alloc;
|
---|
| 122 | unsigned int away_pulls, away_pushes;
|
---|
| 123 | unsigned long long int away_storage_request, away_storage_alloc;
|
---|
| 124 | unsigned int mmap_calls, mmap_0_calls; // no zero calls
|
---|
| 125 | unsigned long long int mmap_storage_request, mmap_storage_alloc;
|
---|
| 126 | unsigned int munmap_calls, munmap_0_calls; // no zero calls
|
---|
| 127 | unsigned long long int munmap_storage_request, munmap_storage_alloc;
|
---|
| 128 | };
|
---|
| 129 | struct StatsOverlay counters[CntTriples]; // overlay for iteration
|
---|
| 130 | }; // HeapStatistics
|
---|
[1e034d9] | 131 |
|
---|
[433905a] | 132 | static_assert( sizeof(HeapStatistics) == CntTriples * sizeof(StatsOverlay),
|
---|
| 133 | "Heap statistics counter-triplets does not match with array size" );
|
---|
| 134 |
|
---|
| 135 | static void HeapStatisticsCtor( HeapStatistics & stats ) {
|
---|
| 136 | memset( &stats, '\0', sizeof(stats) ); // very fast
|
---|
| 137 | // for ( unsigned int i = 0; i < CntTriples; i += 1 ) {
|
---|
| 138 | // stats.counters[i].calls = stats.counters[i].calls_0 = stats.counters[i].request = stats.counters[i].alloc = 0;
|
---|
| 139 | // } // for
|
---|
| 140 | } // HeapStatisticsCtor
|
---|
| 141 |
|
---|
| 142 | static HeapStatistics & ?+=?( HeapStatistics & lhs, const HeapStatistics & rhs ) {
|
---|
| 143 | for ( unsigned int i = 0; i < CntTriples; i += 1 ) {
|
---|
| 144 | lhs.counters[i].calls += rhs.counters[i].calls;
|
---|
| 145 | lhs.counters[i].calls_0 += rhs.counters[i].calls_0;
|
---|
| 146 | lhs.counters[i].request += rhs.counters[i].request;
|
---|
| 147 | lhs.counters[i].alloc += rhs.counters[i].alloc;
|
---|
| 148 | } // for
|
---|
| 149 | return lhs;
|
---|
| 150 | } // ?+=?
|
---|
| 151 | #endif // __STATISTICS__
|
---|
[e723100] | 152 |
|
---|
| 153 |
|
---|
| 154 | #define SPINLOCK 0
|
---|
| 155 | #define LOCKFREE 1
|
---|
| 156 | #define BUCKETLOCK SPINLOCK
|
---|
[9c438546] | 157 | #if BUCKETLOCK == SPINLOCK
|
---|
| 158 | #elif BUCKETLOCK == LOCKFREE
|
---|
| 159 | #include <stackLockFree.hfa>
|
---|
| 160 | #else
|
---|
| 161 | #error undefined lock type for bucket lock
|
---|
[e723100] | 162 | #endif // LOCKFREE
|
---|
| 163 |
|
---|
| 164 | // Recursive definitions: HeapManager needs size of bucket array and bucket area needs sizeof HeapManager storage.
|
---|
[31a5f418] | 165 | // Break recursion by hardcoding number of buckets and statically checking number is correct after bucket array defined.
|
---|
[95eb7cf] | 166 | enum { NoBucketSizes = 91 }; // number of buckets sizes
|
---|
[d46ed6e] | 167 |
|
---|
[31a5f418] | 168 | struct Heap {
|
---|
[c4f68dc] | 169 | struct Storage {
|
---|
[bcb14b5] | 170 | struct Header { // header
|
---|
[c4f68dc] | 171 | union Kind {
|
---|
| 172 | struct RealHeader {
|
---|
| 173 | union {
|
---|
[bcb14b5] | 174 | struct { // 4-byte word => 8-byte header, 8-byte word => 16-byte header
|
---|
[c4f68dc] | 175 | union {
|
---|
[31a5f418] | 176 | // 2nd low-order bit => zero filled, 3rd low-order bit => mmapped
|
---|
[9c438546] | 177 | // FreeHeader * home; // allocated block points back to home locations (must overlay alignment)
|
---|
[c4f68dc] | 178 | void * home; // allocated block points back to home locations (must overlay alignment)
|
---|
| 179 | size_t blockSize; // size for munmap (must overlay alignment)
|
---|
[9c438546] | 180 | #if BUCKETLOCK == SPINLOCK
|
---|
[31a5f418] | 181 | Storage * next; // freed block points to next freed block of same size
|
---|
[c4f68dc] | 182 | #endif // SPINLOCK
|
---|
| 183 | };
|
---|
[9c438546] | 184 | size_t size; // allocation size in bytes
|
---|
[c4f68dc] | 185 | };
|
---|
[9c438546] | 186 | #if BUCKETLOCK == LOCKFREE
|
---|
| 187 | Link(Storage) next; // freed block points next freed block of same size (double-wide)
|
---|
[c4f68dc] | 188 | #endif // LOCKFREE
|
---|
| 189 | };
|
---|
[93c2e0a] | 190 | } real; // RealHeader
|
---|
[9c438546] | 191 |
|
---|
[c4f68dc] | 192 | struct FakeHeader {
|
---|
[31a5f418] | 193 | uintptr_t alignment; // 1st low-order bit => fake header & alignment
|
---|
| 194 | uintptr_t offset;
|
---|
[93c2e0a] | 195 | } fake; // FakeHeader
|
---|
| 196 | } kind; // Kind
|
---|
[bcb14b5] | 197 | } header; // Header
|
---|
[31a5f418] | 198 |
|
---|
[95eb7cf] | 199 | char pad[libAlign() - sizeof( Header )];
|
---|
[bcb14b5] | 200 | char data[0]; // storage
|
---|
[c4f68dc] | 201 | }; // Storage
|
---|
| 202 |
|
---|
[31a5f418] | 203 | static_assert( libAlign() >= sizeof( Storage ), "minimum alignment < sizeof( Storage )" );
|
---|
[c4f68dc] | 204 |
|
---|
| 205 | struct FreeHeader {
|
---|
[433905a] | 206 | size_t blockSize __attribute__(( aligned (8) )); // size of allocations on this list
|
---|
[9c438546] | 207 | #if BUCKETLOCK == SPINLOCK
|
---|
[433905a] | 208 | __spinlock_t lock;
|
---|
[bcb14b5] | 209 | Storage * freeList;
|
---|
[c4f68dc] | 210 | #else
|
---|
[9c438546] | 211 | StackLF(Storage) freeList;
|
---|
| 212 | #endif // BUCKETLOCK
|
---|
[433905a] | 213 | } __attribute__(( aligned (8) )); // FreeHeader
|
---|
[c4f68dc] | 214 |
|
---|
| 215 | FreeHeader freeLists[NoBucketSizes]; // buckets for different allocation sizes
|
---|
| 216 |
|
---|
[433905a] | 217 | __spinlock_t extlock; // protects allocation-buffer extension
|
---|
[c4f68dc] | 218 | void * heapBegin; // start of heap
|
---|
| 219 | void * heapEnd; // logical end of heap
|
---|
| 220 | size_t heapRemaining; // amount of storage not allocated in the current chunk
|
---|
[31a5f418] | 221 | }; // Heap
|
---|
[c4f68dc] | 222 |
|
---|
[9c438546] | 223 | #if BUCKETLOCK == LOCKFREE
|
---|
[c45d2fa] | 224 | static inline {
|
---|
[31a5f418] | 225 | Link(Heap.Storage) * ?`next( Heap.Storage * this ) { return &this->header.kind.real.next; }
|
---|
| 226 | void ?{}( Heap.FreeHeader & ) {}
|
---|
| 227 | void ^?{}( Heap.FreeHeader & ) {}
|
---|
[c45d2fa] | 228 | } // distribution
|
---|
[9c438546] | 229 | #endif // LOCKFREE
|
---|
| 230 |
|
---|
[31a5f418] | 231 | static inline size_t getKey( const Heap.FreeHeader & freeheader ) { return freeheader.blockSize; }
|
---|
[5d4fa18] | 232 |
|
---|
[e723100] | 233 |
|
---|
[31a5f418] | 234 | #ifdef FASTLOOKUP
|
---|
| 235 | enum { LookupSizes = 65_536 + sizeof(Heap.Storage) }; // number of fast lookup sizes
|
---|
| 236 | static unsigned char lookup[LookupSizes]; // O(1) lookup for small sizes
|
---|
| 237 | #endif // FASTLOOKUP
|
---|
| 238 |
|
---|
| 239 | static const off_t mmapFd = -1; // fake or actual fd for anonymous file
|
---|
| 240 | #ifdef __CFA_DEBUG__
|
---|
| 241 | static bool heapBoot = 0; // detect recursion during boot
|
---|
| 242 | #endif // __CFA_DEBUG__
|
---|
| 243 |
|
---|
[5d4fa18] | 244 |
|
---|
[c1f38e6c] | 245 | // Size of array must harmonize with NoBucketSizes and individual bucket sizes must be multiple of 16.
|
---|
[d5d3a90] | 246 | // Smaller multiples of 16 and powers of 2 are common allocation sizes, so make them generate the minimum required bucket size.
|
---|
| 247 | // malloc(0) returns 0p, so no bucket is necessary for 0 bytes returning an address that can be freed.
|
---|
[e723100] | 248 | static const unsigned int bucketSizes[] @= { // different bucket sizes
|
---|
[31a5f418] | 249 | 16 + sizeof(Heap.Storage), 32 + sizeof(Heap.Storage), 48 + sizeof(Heap.Storage), 64 + sizeof(Heap.Storage), // 4
|
---|
| 250 | 96 + sizeof(Heap.Storage), 112 + sizeof(Heap.Storage), 128 + sizeof(Heap.Storage), // 3
|
---|
| 251 | 160, 192, 224, 256 + sizeof(Heap.Storage), // 4
|
---|
| 252 | 320, 384, 448, 512 + sizeof(Heap.Storage), // 4
|
---|
| 253 | 640, 768, 896, 1_024 + sizeof(Heap.Storage), // 4
|
---|
| 254 | 1_536, 2_048 + sizeof(Heap.Storage), // 2
|
---|
| 255 | 2_560, 3_072, 3_584, 4_096 + sizeof(Heap.Storage), // 4
|
---|
| 256 | 6_144, 8_192 + sizeof(Heap.Storage), // 2
|
---|
| 257 | 9_216, 10_240, 11_264, 12_288, 13_312, 14_336, 15_360, 16_384 + sizeof(Heap.Storage), // 8
|
---|
| 258 | 18_432, 20_480, 22_528, 24_576, 26_624, 28_672, 30_720, 32_768 + sizeof(Heap.Storage), // 8
|
---|
| 259 | 36_864, 40_960, 45_056, 49_152, 53_248, 57_344, 61_440, 65_536 + sizeof(Heap.Storage), // 8
|
---|
| 260 | 73_728, 81_920, 90_112, 98_304, 106_496, 114_688, 122_880, 131_072 + sizeof(Heap.Storage), // 8
|
---|
| 261 | 147_456, 163_840, 180_224, 196_608, 212_992, 229_376, 245_760, 262_144 + sizeof(Heap.Storage), // 8
|
---|
| 262 | 294_912, 327_680, 360_448, 393_216, 425_984, 458_752, 491_520, 524_288 + sizeof(Heap.Storage), // 8
|
---|
| 263 | 655_360, 786_432, 917_504, 1_048_576 + sizeof(Heap.Storage), // 4
|
---|
| 264 | 1_179_648, 1_310_720, 1_441_792, 1_572_864, 1_703_936, 1_835_008, 1_966_080, 2_097_152 + sizeof(Heap.Storage), // 8
|
---|
| 265 | 2_621_440, 3_145_728, 3_670_016, 4_194_304 + sizeof(Heap.Storage), // 4
|
---|
[5d4fa18] | 266 | };
|
---|
[e723100] | 267 |
|
---|
[c1f38e6c] | 268 | static_assert( NoBucketSizes == sizeof(bucketSizes) / sizeof(bucketSizes[0] ), "size of bucket array wrong" );
|
---|
[e723100] | 269 |
|
---|
[9c438546] | 270 | // The constructor for heapManager is called explicitly in memory_startup.
|
---|
[31a5f418] | 271 | static Heap heapManager __attribute__(( aligned (128) )) @= {}; // size of cache line to prevent false sharing
|
---|
[5d4fa18] | 272 |
|
---|
[c4f68dc] | 273 |
|
---|
[19e5d65d] | 274 | //####################### Memory Allocation Routines Helpers ####################
|
---|
| 275 |
|
---|
| 276 |
|
---|
[433905a] | 277 | #ifdef __CFA_DEBUG__
|
---|
| 278 | static size_t allocUnfreed; // running total of allocations minus frees
|
---|
[31a5f418] | 279 |
|
---|
[433905a] | 280 | static void prtUnfreed() {
|
---|
| 281 | if ( allocUnfreed != 0 ) {
|
---|
| 282 | // DO NOT USE STREAMS AS THEY MAY BE UNAVAILABLE AT THIS POINT.
|
---|
| 283 | char helpText[512];
|
---|
| 284 | __cfaabi_bits_print_buffer( STDERR_FILENO, helpText, sizeof(helpText),
|
---|
| 285 | "CFA warning (UNIX pid:%ld) : program terminating with %zu(0x%zx) bytes of storage allocated but not freed.\n"
|
---|
| 286 | "Possible cause is unfreed storage allocated by the program or system/library routines called from the program.\n",
|
---|
| 287 | (long int)getpid(), allocUnfreed, allocUnfreed ); // always print the UNIX pid
|
---|
| 288 | } // if
|
---|
| 289 | } // prtUnfreed
|
---|
[31a5f418] | 290 |
|
---|
[433905a] | 291 | extern int cfa_main_returned; // from interpose.cfa
|
---|
| 292 | extern "C" {
|
---|
| 293 | void heapAppStart() { // called by __cfaabi_appready_startup
|
---|
| 294 | allocUnfreed = 0;
|
---|
| 295 | } // heapAppStart
|
---|
[31a5f418] | 296 |
|
---|
[433905a] | 297 | void heapAppStop() { // called by __cfaabi_appready_startdown
|
---|
| 298 | fclose( stdin ); fclose( stdout );
|
---|
| 299 | if ( cfa_main_returned ) prtUnfreed(); // do not check unfreed storage if exit called
|
---|
| 300 | } // heapAppStop
|
---|
| 301 | } // extern "C"
|
---|
| 302 | #endif // __CFA_DEBUG__
|
---|
[31a5f418] | 303 |
|
---|
| 304 |
|
---|
[433905a] | 305 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 306 | static HeapStatistics stats; // zero filled
|
---|
[c1f38e6c] | 307 | static unsigned int sbrk_calls;
|
---|
| 308 | static unsigned long long int sbrk_storage;
|
---|
[95eb7cf] | 309 | // Statistics file descriptor (changed by malloc_stats_fd).
|
---|
[709b812] | 310 | static int stats_fd = STDERR_FILENO; // default stderr
|
---|
[c4f68dc] | 311 |
|
---|
[31a5f418] | 312 | #define prtFmt \
|
---|
| 313 | "\nHeap statistics: (storage request / allocation)\n" \
|
---|
| 314 | " malloc >0 calls %'u; 0 calls %'u; storage %'llu / %'llu bytes\n" \
|
---|
| 315 | " aalloc >0 calls %'u; 0 calls %'u; storage %'llu / %'llu bytes\n" \
|
---|
| 316 | " calloc >0 calls %'u; 0 calls %'u; storage %'llu / %'llu bytes\n" \
|
---|
| 317 | " memalign >0 calls %'u; 0 calls %'u; storage %'llu / %'llu bytes\n" \
|
---|
| 318 | " amemalign >0 calls %'u; 0 calls %'u; storage %'llu / %'llu bytes\n" \
|
---|
| 319 | " cmemalign >0 calls %'u; 0 calls %'u; storage %'llu / %'llu bytes\n" \
|
---|
| 320 | " resize >0 calls %'u; 0 calls %'u; storage %'llu / %'llu bytes\n" \
|
---|
| 321 | " realloc >0 calls %'u; 0 calls %'u; storage %'llu / %'llu bytes\n" \
|
---|
| 322 | " free !null calls %'u; null calls %'u; storage %'llu / %'llu bytes\n" \
|
---|
| 323 | " sbrk calls %'u; storage %'llu bytes\n" \
|
---|
| 324 | " mmap calls %'u; storage %'llu / %'llu bytes\n" \
|
---|
| 325 | " munmap calls %'u; storage %'llu / %'llu bytes\n" \
|
---|
| 326 |
|
---|
[c4f68dc] | 327 | // Use "write" because streams may be shutdown when calls are made.
|
---|
[19e5d65d] | 328 | static int printStats() { // see malloc_stats
|
---|
[31a5f418] | 329 | char helpText[sizeof(prtFmt) + 1024]; // space for message and values
|
---|
[19e5d65d] | 330 | return __cfaabi_bits_print_buffer( STDERR_FILENO, helpText, sizeof(helpText), prtFmt,
|
---|
[31a5f418] | 331 | stats.malloc_calls, stats.malloc_0_calls, stats.malloc_storage_request, stats.malloc_storage_alloc,
|
---|
| 332 | stats.aalloc_calls, stats.aalloc_0_calls, stats.aalloc_storage_request, stats.aalloc_storage_alloc,
|
---|
| 333 | stats.calloc_calls, stats.calloc_0_calls, stats.calloc_storage_request, stats.calloc_storage_alloc,
|
---|
| 334 | stats.memalign_calls, stats.memalign_0_calls, stats.memalign_storage_request, stats.memalign_storage_alloc,
|
---|
| 335 | stats.amemalign_calls, stats.amemalign_0_calls, stats.amemalign_storage_request, stats.amemalign_storage_alloc,
|
---|
| 336 | stats.cmemalign_calls, stats.cmemalign_0_calls, stats.cmemalign_storage_request, stats.cmemalign_storage_alloc,
|
---|
| 337 | stats.resize_calls, stats.resize_0_calls, stats.resize_storage_request, stats.resize_storage_alloc,
|
---|
| 338 | stats.realloc_calls, stats.realloc_0_calls, stats.realloc_storage_request, stats.realloc_storage_alloc,
|
---|
| 339 | stats.free_calls, stats.free_null_calls, stats.free_storage_request, stats.free_storage_alloc,
|
---|
| 340 | sbrk_calls, sbrk_storage,
|
---|
| 341 | stats.mmap_calls, stats.mmap_storage_request, stats.mmap_storage_alloc,
|
---|
| 342 | stats.munmap_calls, stats.munmap_storage_request, stats.munmap_storage_alloc
|
---|
[c4f68dc] | 343 | );
|
---|
[d46ed6e] | 344 | } // printStats
|
---|
[c4f68dc] | 345 |
|
---|
[31a5f418] | 346 | #define prtFmtXML \
|
---|
| 347 | "<malloc version=\"1\">\n" \
|
---|
| 348 | "<heap nr=\"0\">\n" \
|
---|
| 349 | "<sizes>\n" \
|
---|
| 350 | "</sizes>\n" \
|
---|
| 351 | "<total type=\"malloc\" >0 count=\"%'u;\" 0 count=\"%'u;\" size=\"%'llu / %'llu\"/> bytes\n" \
|
---|
| 352 | "<total type=\"aalloc\" >0 count=\"%'u;\" 0 count=\"%'u;\" size=\"%'llu / %'llu\"/> bytes\n" \
|
---|
| 353 | "<total type=\"calloc\" >0 count=\"%'u;\" 0 count=\"%'u;\" size=\"%'llu / %'llu\"/> bytes\n" \
|
---|
| 354 | "<total type=\"memalign\" >0 count=\"%'u;\" 0 count=\"%'u;\" size=\"%'llu / %'llu\"/> bytes\n" \
|
---|
| 355 | "<total type=\"amemalign\" >0 count=\"%'u;\" 0 count=\"%'u;\" size=\"%'llu / %'llu\"/> bytes\n" \
|
---|
| 356 | "<total type=\"cmemalign\" >0 count=\"%'u;\" 0 count=\"%'u;\" size=\"%'llu / %'llu\"/> bytes\n" \
|
---|
| 357 | "<total type=\"resize\" >0 count=\"%'u;\" 0 count=\"%'u;\" size=\"%'llu / %'llu\"/> bytes\n" \
|
---|
| 358 | "<total type=\"realloc\" >0 count=\"%'u;\" 0 count=\"%'u;\" size=\"%'llu / %'llu\"/> bytes\n" \
|
---|
| 359 | "<total type=\"free\" !null=\"%'u;\" 0 null=\"%'u;\" size=\"%'llu / %'llu\"/> bytes\n" \
|
---|
| 360 | "<total type=\"sbrk\" count=\"%'u;\" size=\"%'llu\"/> bytes\n" \
|
---|
| 361 | "<total type=\"mmap\" count=\"%'u;\" size=\"%'llu / %'llu\" / > bytes\n" \
|
---|
| 362 | "<total type=\"munmap\" count=\"%'u;\" size=\"%'llu / %'llu\"/> bytes\n" \
|
---|
| 363 | "</malloc>"
|
---|
| 364 |
|
---|
[bcb14b5] | 365 | static int printStatsXML( FILE * stream ) { // see malloc_info
|
---|
[31a5f418] | 366 | char helpText[sizeof(prtFmtXML) + 1024]; // space for message and values
|
---|
| 367 | return __cfaabi_bits_print_buffer( fileno( stream ), helpText, sizeof(helpText), prtFmtXML,
|
---|
| 368 | stats.malloc_calls, stats.malloc_0_calls, stats.malloc_storage_request, stats.malloc_storage_alloc,
|
---|
| 369 | stats.aalloc_calls, stats.aalloc_0_calls, stats.aalloc_storage_request, stats.aalloc_storage_alloc,
|
---|
| 370 | stats.calloc_calls, stats.calloc_0_calls, stats.calloc_storage_request, stats.calloc_storage_alloc,
|
---|
| 371 | stats.memalign_calls, stats.memalign_0_calls, stats.memalign_storage_request, stats.memalign_storage_alloc,
|
---|
| 372 | stats.amemalign_calls, stats.amemalign_0_calls, stats.amemalign_storage_request, stats.amemalign_storage_alloc,
|
---|
| 373 | stats.cmemalign_calls, stats.cmemalign_0_calls, stats.cmemalign_storage_request, stats.cmemalign_storage_alloc,
|
---|
| 374 | stats.resize_calls, stats.resize_0_calls, stats.resize_storage_request, stats.resize_storage_alloc,
|
---|
| 375 | stats.realloc_calls, stats.realloc_0_calls, stats.realloc_storage_request, stats.realloc_storage_alloc,
|
---|
| 376 | stats.free_calls, stats.free_null_calls, stats.free_storage_request, stats.free_storage_alloc,
|
---|
| 377 | sbrk_calls, sbrk_storage,
|
---|
| 378 | stats.mmap_calls, stats.mmap_storage_request, stats.mmap_storage_alloc,
|
---|
| 379 | stats.munmap_calls, stats.munmap_storage_request, stats.munmap_storage_alloc
|
---|
[c4f68dc] | 380 | );
|
---|
[d46ed6e] | 381 | } // printStatsXML
|
---|
[c4f68dc] | 382 | #endif // __STATISTICS__
|
---|
| 383 |
|
---|
[95eb7cf] | 384 |
|
---|
[433905a] | 385 | // statically allocated variables => zero filled.
|
---|
| 386 | static size_t heapExpand; // sbrk advance
|
---|
| 387 | static size_t mmapStart; // cross over point for mmap
|
---|
| 388 | static unsigned int maxBucketsUsed; // maximum number of buckets in use
|
---|
| 389 | // extern visibility, used by runtime kernel
|
---|
[032234bd] | 390 | // would be cool to remove libcfa_public but it's needed for libcfathread
|
---|
| 391 | libcfa_public size_t __page_size; // architecture pagesize
|
---|
| 392 | libcfa_public int __map_prot; // common mmap/mprotect protection
|
---|
[433905a] | 393 |
|
---|
| 394 |
|
---|
[1e034d9] | 395 | // thunk problem
|
---|
| 396 | size_t Bsearchl( unsigned int key, const unsigned int * vals, size_t dim ) {
|
---|
| 397 | size_t l = 0, m, h = dim;
|
---|
| 398 | while ( l < h ) {
|
---|
| 399 | m = (l + h) / 2;
|
---|
| 400 | if ( (unsigned int &)(vals[m]) < key ) { // cast away const
|
---|
| 401 | l = m + 1;
|
---|
| 402 | } else {
|
---|
| 403 | h = m;
|
---|
| 404 | } // if
|
---|
| 405 | } // while
|
---|
| 406 | return l;
|
---|
| 407 | } // Bsearchl
|
---|
| 408 |
|
---|
| 409 |
|
---|
[95eb7cf] | 410 | static inline bool setMmapStart( size_t value ) { // true => mmapped, false => sbrk
|
---|
[ad2dced] | 411 | if ( value < __page_size || bucketSizes[NoBucketSizes - 1] < value ) return false;
|
---|
[95eb7cf] | 412 | mmapStart = value; // set global
|
---|
| 413 |
|
---|
| 414 | // find the closest bucket size less than or equal to the mmapStart size
|
---|
[1e034d9] | 415 | maxBucketsUsed = Bsearchl( (unsigned int)mmapStart, bucketSizes, NoBucketSizes ); // binary search
|
---|
[95eb7cf] | 416 | assert( maxBucketsUsed < NoBucketSizes ); // subscript failure ?
|
---|
| 417 | assert( mmapStart <= bucketSizes[maxBucketsUsed] ); // search failure ?
|
---|
[1076d05] | 418 | return true;
|
---|
[95eb7cf] | 419 | } // setMmapStart
|
---|
| 420 |
|
---|
| 421 |
|
---|
[cfbc703d] | 422 | // <-------+----------------------------------------------------> bsize (bucket size)
|
---|
| 423 | // |header |addr
|
---|
| 424 | //==================================================================================
|
---|
| 425 | // align/offset |
|
---|
| 426 | // <-----------------<------------+-----------------------------> bsize (bucket size)
|
---|
| 427 | // |fake-header | addr
|
---|
[19e5d65d] | 428 | #define HeaderAddr( addr ) ((Heap.Storage.Header *)( (char *)addr - sizeof(Heap.Storage) ))
|
---|
| 429 | #define RealHeader( header ) ((Heap.Storage.Header *)((char *)header - header->kind.fake.offset))
|
---|
[cfbc703d] | 430 |
|
---|
| 431 | // <-------<<--------------------- dsize ---------------------->> bsize (bucket size)
|
---|
| 432 | // |header |addr
|
---|
| 433 | //==================================================================================
|
---|
| 434 | // align/offset |
|
---|
| 435 | // <------------------------------<<---------- dsize --------->>> bsize (bucket size)
|
---|
| 436 | // |fake-header |addr
|
---|
[19e5d65d] | 437 | #define DataStorage( bsize, addr, header ) (bsize - ( (char *)addr - (char *)header ))
|
---|
[cfbc703d] | 438 |
|
---|
| 439 |
|
---|
| 440 | static inline void checkAlign( size_t alignment ) {
|
---|
[19e5d65d] | 441 | if ( unlikely( alignment < libAlign() || ! is_pow2( alignment ) ) ) {
|
---|
| 442 | abort( "**** Error **** alignment %zu for memory allocation is less than %d and/or not a power of 2.", alignment, libAlign() );
|
---|
[cfbc703d] | 443 | } // if
|
---|
| 444 | } // checkAlign
|
---|
| 445 |
|
---|
| 446 |
|
---|
[e3fea42] | 447 | static inline void checkHeader( bool check, const char name[], void * addr ) {
|
---|
[b6830d74] | 448 | if ( unlikely( check ) ) { // bad address ?
|
---|
[19e5d65d] | 449 | abort( "**** Error **** attempt to %s storage %p with address outside the heap.\n"
|
---|
[bcb14b5] | 450 | "Possible cause is duplicate free on same block or overwriting of memory.",
|
---|
| 451 | name, addr );
|
---|
[b6830d74] | 452 | } // if
|
---|
[c4f68dc] | 453 | } // checkHeader
|
---|
| 454 |
|
---|
[95eb7cf] | 455 |
|
---|
[19e5d65d] | 456 | // Manipulate sticky bits stored in unused 3 low-order bits of an address.
|
---|
| 457 | // bit0 => alignment => fake header
|
---|
| 458 | // bit1 => zero filled (calloc)
|
---|
| 459 | // bit2 => mapped allocation versus sbrk
|
---|
| 460 | #define StickyBits( header ) (((header)->kind.real.blockSize & 0x7))
|
---|
| 461 | #define ClearStickyBits( addr ) (typeof(addr))((uintptr_t)(addr) & ~7)
|
---|
| 462 | #define MarkAlignmentBit( align ) ((align) | 1)
|
---|
| 463 | #define AlignmentBit( header ) ((((header)->kind.fake.alignment) & 1))
|
---|
| 464 | #define ClearAlignmentBit( header ) (((header)->kind.fake.alignment) & ~1)
|
---|
| 465 | #define ZeroFillBit( header ) ((((header)->kind.real.blockSize) & 2))
|
---|
| 466 | #define ClearZeroFillBit( header ) ((((header)->kind.real.blockSize) &= ~2))
|
---|
| 467 | #define MarkZeroFilledBit( header ) ((header)->kind.real.blockSize |= 2)
|
---|
| 468 | #define MmappedBit( header ) ((((header)->kind.real.blockSize) & 4))
|
---|
| 469 | #define MarkMmappedBit( size ) ((size) | 4)
|
---|
| 470 |
|
---|
| 471 |
|
---|
[31a5f418] | 472 | static inline void fakeHeader( Heap.Storage.Header *& header, size_t & alignment ) {
|
---|
[19e5d65d] | 473 | if ( unlikely( AlignmentBit( header ) ) ) { // fake header ?
|
---|
| 474 | alignment = ClearAlignmentBit( header ); // clear flag from value
|
---|
[c4f68dc] | 475 | #ifdef __CFA_DEBUG__
|
---|
| 476 | checkAlign( alignment ); // check alignment
|
---|
| 477 | #endif // __CFA_DEBUG__
|
---|
[19e5d65d] | 478 | header = RealHeader( header ); // backup from fake to real header
|
---|
[d5d3a90] | 479 | } else {
|
---|
[c1f38e6c] | 480 | alignment = libAlign(); // => no fake header
|
---|
[b6830d74] | 481 | } // if
|
---|
[c4f68dc] | 482 | } // fakeHeader
|
---|
| 483 |
|
---|
[95eb7cf] | 484 |
|
---|
[19e5d65d] | 485 | static inline bool headers( const char name[] __attribute__(( unused )), void * addr, Heap.Storage.Header *& header,
|
---|
| 486 | Heap.FreeHeader *& freeHead, size_t & size, size_t & alignment ) with( heapManager ) {
|
---|
| 487 | header = HeaderAddr( addr );
|
---|
[c4f68dc] | 488 |
|
---|
| 489 | #ifdef __CFA_DEBUG__
|
---|
[31a5f418] | 490 | checkHeader( header < (Heap.Storage.Header *)heapBegin, name, addr ); // bad low address ?
|
---|
[c4f68dc] | 491 | #endif // __CFA_DEBUG__
|
---|
[b6830d74] | 492 |
|
---|
[19e5d65d] | 493 | if ( likely( ! StickyBits( header ) ) ) { // no sticky bits ?
|
---|
| 494 | freeHead = (Heap.FreeHeader *)(header->kind.real.home);
|
---|
| 495 | alignment = libAlign();
|
---|
| 496 | } else {
|
---|
| 497 | fakeHeader( header, alignment );
|
---|
[433905a] | 498 | if ( unlikely( MmappedBit( header ) ) ) { // mmapped ?
|
---|
| 499 | verify( addr < heapBegin || heapEnd < addr );
|
---|
[19e5d65d] | 500 | size = ClearStickyBits( header->kind.real.blockSize ); // mmap size
|
---|
| 501 | return true;
|
---|
| 502 | } // if
|
---|
| 503 |
|
---|
| 504 | freeHead = (Heap.FreeHeader *)(ClearStickyBits( header->kind.real.home ));
|
---|
| 505 | } // if
|
---|
| 506 | size = freeHead->blockSize;
|
---|
| 507 |
|
---|
[c4f68dc] | 508 | #ifdef __CFA_DEBUG__
|
---|
[31a5f418] | 509 | checkHeader( header < (Heap.Storage.Header *)heapBegin || (Heap.Storage.Header *)heapEnd < header, name, addr ); // bad address ? (offset could be + or -)
|
---|
[c4f68dc] | 510 |
|
---|
[433905a] | 511 | Heap * homeManager;
|
---|
| 512 | if ( unlikely( freeHead == 0p || // freed and only free-list node => null link
|
---|
| 513 | // freed and link points at another free block not to a bucket in the bucket array.
|
---|
| 514 | freeHead < &freeLists[0] || &freeLists[NoBucketSizes] <= freeHead ) ) {
|
---|
| 515 | abort( "**** Error **** attempt to %s storage %p with corrupted header.\n"
|
---|
| 516 | "Possible cause is duplicate free on same block or overwriting of header information.",
|
---|
| 517 | name, addr );
|
---|
| 518 | } // if
|
---|
[c4f68dc] | 519 | #endif // __CFA_DEBUG__
|
---|
[19e5d65d] | 520 |
|
---|
[bcb14b5] | 521 | return false;
|
---|
[c4f68dc] | 522 | } // headers
|
---|
| 523 |
|
---|
[709b812] | 524 | // #ifdef __CFA_DEBUG__
|
---|
| 525 | // #if __SIZEOF_POINTER__ == 4
|
---|
| 526 | // #define MASK 0xdeadbeef
|
---|
| 527 | // #else
|
---|
| 528 | // #define MASK 0xdeadbeefdeadbeef
|
---|
| 529 | // #endif
|
---|
| 530 | // #define STRIDE size_t
|
---|
[e4b6b7d3] | 531 |
|
---|
[709b812] | 532 | // static void * Memset( void * addr, STRIDE size ) { // debug only
|
---|
| 533 | // if ( size % sizeof(STRIDE) != 0 ) abort( "Memset() : internal error, size %zd not multiple of %zd.", size, sizeof(STRIDE) );
|
---|
| 534 | // if ( (STRIDE)addr % sizeof(STRIDE) != 0 ) abort( "Memset() : internal error, addr %p not multiple of %zd.", addr, sizeof(STRIDE) );
|
---|
[e4b6b7d3] | 535 |
|
---|
[709b812] | 536 | // STRIDE * end = (STRIDE *)addr + size / sizeof(STRIDE);
|
---|
| 537 | // for ( STRIDE * p = (STRIDE *)addr; p < end; p += 1 ) *p = MASK;
|
---|
| 538 | // return addr;
|
---|
| 539 | // } // Memset
|
---|
| 540 | // #endif // __CFA_DEBUG__
|
---|
[e4b6b7d3] | 541 |
|
---|
[13fece5] | 542 |
|
---|
[92aca37] | 543 | #define NO_MEMORY_MSG "insufficient heap memory available for allocating %zd new bytes."
|
---|
[c4f68dc] | 544 |
|
---|
[9c438546] | 545 | static inline void * extend( size_t size ) with( heapManager ) {
|
---|
[b6830d74] | 546 | lock( extlock __cfaabi_dbg_ctx2 );
|
---|
[19e5d65d] | 547 |
|
---|
[b6830d74] | 548 | ptrdiff_t rem = heapRemaining - size;
|
---|
[19e5d65d] | 549 | if ( unlikely( rem < 0 ) ) {
|
---|
[c4f68dc] | 550 | // If the size requested is bigger than the current remaining storage, increase the size of the heap.
|
---|
| 551 |
|
---|
[69ec0fb] | 552 | size_t increase = ceiling2( size > heapExpand ? size : heapExpand, __page_size );
|
---|
[ad2dced] | 553 | // Do not call abort or strerror( errno ) as they may call malloc.
|
---|
[92aca37] | 554 | if ( sbrk( increase ) == (void *)-1 ) { // failed, no memory ?
|
---|
[c4f68dc] | 555 | unlock( extlock );
|
---|
[ad2dced] | 556 | __cfaabi_bits_print_nolock( STDERR_FILENO, NO_MEMORY_MSG, size );
|
---|
[709b812] | 557 | _exit( EXIT_FAILURE ); // give up
|
---|
[92aca37] | 558 | } // if
|
---|
[19e5d65d] | 559 |
|
---|
[709b812] | 560 | // Make storage executable for thunks.
|
---|
[69ec0fb] | 561 | if ( mprotect( (char *)heapEnd + heapRemaining, increase, __map_prot ) ) {
|
---|
| 562 | unlock( extlock );
|
---|
| 563 | __cfaabi_bits_print_nolock( STDERR_FILENO, "extend() : internal error, mprotect failure, heapEnd:%p size:%zd, errno:%d.\n", heapEnd, increase, errno );
|
---|
| 564 | _exit( EXIT_FAILURE );
|
---|
| 565 | } // if
|
---|
[19e5d65d] | 566 |
|
---|
[bcb14b5] | 567 | #ifdef __STATISTICS__
|
---|
[c4f68dc] | 568 | sbrk_calls += 1;
|
---|
| 569 | sbrk_storage += increase;
|
---|
[bcb14b5] | 570 | #endif // __STATISTICS__
|
---|
[433905a] | 571 |
|
---|
[bcb14b5] | 572 | #ifdef __CFA_DEBUG__
|
---|
[c4f68dc] | 573 | // Set new memory to garbage so subsequent uninitialized usages might fail.
|
---|
[13fece5] | 574 | memset( (char *)heapEnd + heapRemaining, '\xde', increase );
|
---|
[ad2dced] | 575 | //Memset( (char *)heapEnd + heapRemaining, increase );
|
---|
[bcb14b5] | 576 | #endif // __CFA_DEBUG__
|
---|
[433905a] | 577 |
|
---|
[c4f68dc] | 578 | rem = heapRemaining + increase - size;
|
---|
[b6830d74] | 579 | } // if
|
---|
[c4f68dc] | 580 |
|
---|
[31a5f418] | 581 | Heap.Storage * block = (Heap.Storage *)heapEnd;
|
---|
[b6830d74] | 582 | heapRemaining = rem;
|
---|
| 583 | heapEnd = (char *)heapEnd + size;
|
---|
| 584 | unlock( extlock );
|
---|
| 585 | return block;
|
---|
[c4f68dc] | 586 | } // extend
|
---|
| 587 |
|
---|
| 588 |
|
---|
[9c438546] | 589 | static inline void * doMalloc( size_t size ) with( heapManager ) {
|
---|
[31a5f418] | 590 | Heap.Storage * block; // pointer to new block of storage
|
---|
[c4f68dc] | 591 |
|
---|
[b6830d74] | 592 | // Look up size in the size list. Make sure the user request includes space for the header that must be allocated
|
---|
| 593 | // along with the block and is a multiple of the alignment size.
|
---|
[69ec0fb] | 594 |
|
---|
[31a5f418] | 595 | size_t tsize = size + sizeof(Heap.Storage);
|
---|
[19e5d65d] | 596 |
|
---|
[b6830d74] | 597 | if ( likely( tsize < mmapStart ) ) { // small size => sbrk
|
---|
[e723100] | 598 | size_t posn;
|
---|
| 599 | #ifdef FASTLOOKUP
|
---|
| 600 | if ( tsize < LookupSizes ) posn = lookup[tsize];
|
---|
| 601 | else
|
---|
| 602 | #endif // FASTLOOKUP
|
---|
| 603 | posn = Bsearchl( (unsigned int)tsize, bucketSizes, (size_t)maxBucketsUsed );
|
---|
[31a5f418] | 604 | Heap.FreeHeader * freeElem = &freeLists[posn];
|
---|
[c1f38e6c] | 605 | verify( freeElem <= &freeLists[maxBucketsUsed] ); // subscripting error ?
|
---|
| 606 | verify( tsize <= freeElem->blockSize ); // search failure ?
|
---|
[c4f68dc] | 607 | tsize = freeElem->blockSize; // total space needed for request
|
---|
| 608 |
|
---|
| 609 | // Spin until the lock is acquired for this particular size of block.
|
---|
| 610 |
|
---|
[9c438546] | 611 | #if BUCKETLOCK == SPINLOCK
|
---|
[bcb14b5] | 612 | lock( freeElem->lock __cfaabi_dbg_ctx2 );
|
---|
| 613 | block = freeElem->freeList; // remove node from stack
|
---|
[c4f68dc] | 614 | #else
|
---|
[9c438546] | 615 | block = pop( freeElem->freeList );
|
---|
| 616 | #endif // BUCKETLOCK
|
---|
[95eb7cf] | 617 | if ( unlikely( block == 0p ) ) { // no free block ?
|
---|
[9c438546] | 618 | #if BUCKETLOCK == SPINLOCK
|
---|
[c4f68dc] | 619 | unlock( freeElem->lock );
|
---|
[9c438546] | 620 | #endif // BUCKETLOCK
|
---|
[bcb14b5] | 621 |
|
---|
[c4f68dc] | 622 | // Freelist for that size was empty, so carve it out of the heap if there's enough left, or get some more
|
---|
| 623 | // and then carve it off.
|
---|
| 624 |
|
---|
[31a5f418] | 625 | block = (Heap.Storage *)extend( tsize ); // mutual exclusion on call
|
---|
[9c438546] | 626 | #if BUCKETLOCK == SPINLOCK
|
---|
[c4f68dc] | 627 | } else {
|
---|
| 628 | freeElem->freeList = block->header.kind.real.next;
|
---|
| 629 | unlock( freeElem->lock );
|
---|
[9c438546] | 630 | #endif // BUCKETLOCK
|
---|
[c4f68dc] | 631 | } // if
|
---|
| 632 |
|
---|
| 633 | block->header.kind.real.home = freeElem; // pointer back to free list of apropriate size
|
---|
[bcb14b5] | 634 | } else { // large size => mmap
|
---|
[ad2dced] | 635 | if ( unlikely( size > ULONG_MAX - __page_size ) ) return 0p;
|
---|
| 636 | tsize = ceiling2( tsize, __page_size ); // must be multiple of page size
|
---|
[c4f68dc] | 637 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 638 | __atomic_add_fetch( &stats.mmap_calls, 1, __ATOMIC_SEQ_CST );
|
---|
| 639 | __atomic_add_fetch( &stats.mmap_storage_request, size, __ATOMIC_SEQ_CST );
|
---|
| 640 | __atomic_add_fetch( &stats.mmap_storage_alloc, tsize, __ATOMIC_SEQ_CST );
|
---|
[c4f68dc] | 641 | #endif // __STATISTICS__
|
---|
[92aca37] | 642 |
|
---|
[31a5f418] | 643 | block = (Heap.Storage *)mmap( 0, tsize, __map_prot, MAP_PRIVATE | MAP_ANONYMOUS, mmapFd, 0 );
|
---|
| 644 | if ( block == (Heap.Storage *)MAP_FAILED ) { // failed ?
|
---|
[92aca37] | 645 | if ( errno == ENOMEM ) abort( NO_MEMORY_MSG, tsize ); // no memory
|
---|
[c4f68dc] | 646 | // Do not call strerror( errno ) as it may call malloc.
|
---|
[31a5f418] | 647 | abort( "(Heap &)0x%p.doMalloc() : internal error, mmap failure, size:%zu errno:%d.", &heapManager, tsize, errno );
|
---|
[92aca37] | 648 | } //if
|
---|
[bcb14b5] | 649 | #ifdef __CFA_DEBUG__
|
---|
[c4f68dc] | 650 | // Set new memory to garbage so subsequent uninitialized usages might fail.
|
---|
[13fece5] | 651 | memset( block, '\xde', tsize );
|
---|
[ad2dced] | 652 | //Memset( block, tsize );
|
---|
[bcb14b5] | 653 | #endif // __CFA_DEBUG__
|
---|
[19e5d65d] | 654 | block->header.kind.real.blockSize = MarkMmappedBit( tsize ); // storage size for munmap
|
---|
[bcb14b5] | 655 | } // if
|
---|
[c4f68dc] | 656 |
|
---|
[9c438546] | 657 | block->header.kind.real.size = size; // store allocation size
|
---|
[95eb7cf] | 658 | void * addr = &(block->data); // adjust off header to user bytes
|
---|
[c1f38e6c] | 659 | verify( ((uintptr_t)addr & (libAlign() - 1)) == 0 ); // minimum alignment ?
|
---|
[c4f68dc] | 660 |
|
---|
| 661 | #ifdef __CFA_DEBUG__
|
---|
[c1f38e6c] | 662 | __atomic_add_fetch( &allocUnfreed, tsize, __ATOMIC_SEQ_CST );
|
---|
[bcb14b5] | 663 | if ( traceHeap() ) {
|
---|
[433905a] | 664 | char helpText[64];
|
---|
| 665 | __cfaabi_bits_print_buffer( STDERR_FILENO, helpText, sizeof(helpText),
|
---|
| 666 | "%p = Malloc( %zu ) (allocated %zu)\n", addr, size, tsize ); // print debug/nodebug
|
---|
[bcb14b5] | 667 | } // if
|
---|
[c4f68dc] | 668 | #endif // __CFA_DEBUG__
|
---|
| 669 |
|
---|
[95eb7cf] | 670 | return addr;
|
---|
[c4f68dc] | 671 | } // doMalloc
|
---|
| 672 |
|
---|
| 673 |
|
---|
[9c438546] | 674 | static inline void doFree( void * addr ) with( heapManager ) {
|
---|
[c4f68dc] | 675 | #ifdef __CFA_DEBUG__
|
---|
[95eb7cf] | 676 | if ( unlikely( heapManager.heapBegin == 0p ) ) {
|
---|
[bcb14b5] | 677 | abort( "doFree( %p ) : internal error, called before heap is initialized.", addr );
|
---|
| 678 | } // if
|
---|
[c4f68dc] | 679 | #endif // __CFA_DEBUG__
|
---|
| 680 |
|
---|
[31a5f418] | 681 | Heap.Storage.Header * header;
|
---|
| 682 | Heap.FreeHeader * freeElem;
|
---|
[b6830d74] | 683 | size_t size, alignment; // not used (see realloc)
|
---|
[c4f68dc] | 684 |
|
---|
[b6830d74] | 685 | if ( headers( "free", addr, header, freeElem, size, alignment ) ) { // mmapped ?
|
---|
[c4f68dc] | 686 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 687 | __atomic_add_fetch( &stats.munmap_calls, 1, __ATOMIC_SEQ_CST );
|
---|
| 688 | __atomic_add_fetch( &stats.munmap_storage_request, header->kind.real.size, __ATOMIC_SEQ_CST );
|
---|
| 689 | __atomic_add_fetch( &stats.munmap_storage_alloc, size, __ATOMIC_SEQ_CST );
|
---|
[c4f68dc] | 690 | #endif // __STATISTICS__
|
---|
| 691 | if ( munmap( header, size ) == -1 ) {
|
---|
| 692 | abort( "Attempt to deallocate storage %p not allocated or with corrupt header.\n"
|
---|
[bcb14b5] | 693 | "Possible cause is invalid pointer.",
|
---|
| 694 | addr );
|
---|
[c4f68dc] | 695 | } // if
|
---|
[bcb14b5] | 696 | } else {
|
---|
[c4f68dc] | 697 | #ifdef __CFA_DEBUG__
|
---|
[bcb14b5] | 698 | // Set free memory to garbage so subsequent usages might fail.
|
---|
[31a5f418] | 699 | memset( ((Heap.Storage *)header)->data, '\xde', freeElem->blockSize - sizeof( Heap.Storage ) );
|
---|
| 700 | //Memset( ((Heap.Storage *)header)->data, freeElem->blockSize - sizeof( Heap.Storage ) );
|
---|
[c4f68dc] | 701 | #endif // __CFA_DEBUG__
|
---|
| 702 |
|
---|
| 703 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 704 | __atomic_add_fetch( &stats.free_calls, 1, __ATOMIC_SEQ_CST );
|
---|
| 705 | __atomic_add_fetch( &stats.free_storage_request, header->kind.real.size, __ATOMIC_SEQ_CST );
|
---|
| 706 | __atomic_add_fetch( &stats.free_storage_alloc, size, __ATOMIC_SEQ_CST );
|
---|
[c4f68dc] | 707 | #endif // __STATISTICS__
|
---|
[b38b22f] | 708 |
|
---|
[9c438546] | 709 | #if BUCKETLOCK == SPINLOCK
|
---|
[bcb14b5] | 710 | lock( freeElem->lock __cfaabi_dbg_ctx2 ); // acquire spin lock
|
---|
| 711 | header->kind.real.next = freeElem->freeList; // push on stack
|
---|
[31a5f418] | 712 | freeElem->freeList = (Heap.Storage *)header;
|
---|
[bcb14b5] | 713 | unlock( freeElem->lock ); // release spin lock
|
---|
[c4f68dc] | 714 | #else
|
---|
[31a5f418] | 715 | push( freeElem->freeList, *(Heap.Storage *)header );
|
---|
[9c438546] | 716 | #endif // BUCKETLOCK
|
---|
[bcb14b5] | 717 | } // if
|
---|
[c4f68dc] | 718 |
|
---|
| 719 | #ifdef __CFA_DEBUG__
|
---|
[c1f38e6c] | 720 | __atomic_add_fetch( &allocUnfreed, -size, __ATOMIC_SEQ_CST );
|
---|
[bcb14b5] | 721 | if ( traceHeap() ) {
|
---|
[92aca37] | 722 | char helpText[64];
|
---|
[433905a] | 723 | __cfaabi_bits_print_buffer( STDERR_FILENO, helpText, sizeof(helpText),
|
---|
| 724 | "Free( %p ) size:%zu\n", addr, size ); // print debug/nodebug
|
---|
[bcb14b5] | 725 | } // if
|
---|
[c4f68dc] | 726 | #endif // __CFA_DEBUG__
|
---|
| 727 | } // doFree
|
---|
| 728 |
|
---|
| 729 |
|
---|
[032234bd] | 730 | static size_t prtFree( Heap & manager ) with( manager ) {
|
---|
[b6830d74] | 731 | size_t total = 0;
|
---|
[c4f68dc] | 732 | #ifdef __STATISTICS__
|
---|
[95eb7cf] | 733 | __cfaabi_bits_acquire();
|
---|
| 734 | __cfaabi_bits_print_nolock( STDERR_FILENO, "\nBin lists (bin size : free blocks on list)\n" );
|
---|
[c4f68dc] | 735 | #endif // __STATISTICS__
|
---|
[b6830d74] | 736 | for ( unsigned int i = 0; i < maxBucketsUsed; i += 1 ) {
|
---|
[d46ed6e] | 737 | size_t size = freeLists[i].blockSize;
|
---|
| 738 | #ifdef __STATISTICS__
|
---|
| 739 | unsigned int N = 0;
|
---|
| 740 | #endif // __STATISTICS__
|
---|
[b6830d74] | 741 |
|
---|
[9c438546] | 742 | #if BUCKETLOCK == SPINLOCK
|
---|
[31a5f418] | 743 | for ( Heap.Storage * p = freeLists[i].freeList; p != 0p; p = p->header.kind.real.next ) {
|
---|
[d46ed6e] | 744 | #else
|
---|
[b4aa1ab] | 745 | for(;;) {
|
---|
[31a5f418] | 746 | // for ( Heap.Storage * p = top( freeLists[i].freeList ); p != 0p; p = (p)`next->top ) {
|
---|
| 747 | // for ( Heap.Storage * p = top( freeLists[i].freeList ); p != 0p; /* p = getNext( p )->top */) {
|
---|
| 748 | // Heap.Storage * temp = p->header.kind.real.next.top; // FIX ME: direct assignent fails, initialization works`
|
---|
[7cfef0d] | 749 | // typeof(p) temp = (( p )`next)->top; // FIX ME: direct assignent fails, initialization works`
|
---|
| 750 | // p = temp;
|
---|
[9c438546] | 751 | #endif // BUCKETLOCK
|
---|
[d46ed6e] | 752 | total += size;
|
---|
| 753 | #ifdef __STATISTICS__
|
---|
| 754 | N += 1;
|
---|
| 755 | #endif // __STATISTICS__
|
---|
[b6830d74] | 756 | } // for
|
---|
| 757 |
|
---|
[d46ed6e] | 758 | #ifdef __STATISTICS__
|
---|
[95eb7cf] | 759 | __cfaabi_bits_print_nolock( STDERR_FILENO, "%7zu, %-7u ", size, N );
|
---|
| 760 | if ( (i + 1) % 8 == 0 ) __cfaabi_bits_print_nolock( STDERR_FILENO, "\n" );
|
---|
[d46ed6e] | 761 | #endif // __STATISTICS__
|
---|
| 762 | } // for
|
---|
| 763 | #ifdef __STATISTICS__
|
---|
[95eb7cf] | 764 | __cfaabi_bits_print_nolock( STDERR_FILENO, "\ntotal free blocks:%zu\n", total );
|
---|
| 765 | __cfaabi_bits_release();
|
---|
[d46ed6e] | 766 | #endif // __STATISTICS__
|
---|
| 767 | return (char *)heapEnd - (char *)heapBegin - total;
|
---|
[95eb7cf] | 768 | } // prtFree
|
---|
| 769 |
|
---|
| 770 |
|
---|
[31a5f418] | 771 | static void ?{}( Heap & manager ) with( manager ) {
|
---|
[ad2dced] | 772 | __page_size = sysconf( _SC_PAGESIZE );
|
---|
| 773 | __map_prot = PROT_READ | PROT_WRITE | PROT_EXEC;
|
---|
[95eb7cf] | 774 |
|
---|
| 775 | for ( unsigned int i = 0; i < NoBucketSizes; i += 1 ) { // initialize the free lists
|
---|
| 776 | freeLists[i].blockSize = bucketSizes[i];
|
---|
| 777 | } // for
|
---|
| 778 |
|
---|
| 779 | #ifdef FASTLOOKUP
|
---|
| 780 | unsigned int idx = 0;
|
---|
| 781 | for ( unsigned int i = 0; i < LookupSizes; i += 1 ) {
|
---|
| 782 | if ( i > bucketSizes[idx] ) idx += 1;
|
---|
| 783 | lookup[i] = idx;
|
---|
| 784 | } // for
|
---|
| 785 | #endif // FASTLOOKUP
|
---|
| 786 |
|
---|
[31a5f418] | 787 | if ( ! setMmapStart( malloc_mmap_start() ) ) {
|
---|
| 788 | abort( "Heap : internal error, mmap start initialization failure." );
|
---|
[95eb7cf] | 789 | } // if
|
---|
[31a5f418] | 790 | heapExpand = malloc_expansion();
|
---|
[95eb7cf] | 791 |
|
---|
[1e034d9] | 792 | char * end = (char *)sbrk( 0 );
|
---|
[ad2dced] | 793 | heapBegin = heapEnd = sbrk( (char *)ceiling2( (long unsigned int)end, __page_size ) - end ); // move start of heap to multiple of alignment
|
---|
[31a5f418] | 794 | } // Heap
|
---|
[95eb7cf] | 795 |
|
---|
| 796 |
|
---|
[31a5f418] | 797 | static void ^?{}( Heap & ) {
|
---|
[95eb7cf] | 798 | #ifdef __STATISTICS__
|
---|
[baf608a] | 799 | if ( traceHeapTerm() ) {
|
---|
| 800 | printStats();
|
---|
[92aca37] | 801 | // prtUnfreed() called in heapAppStop()
|
---|
[baf608a] | 802 | } // if
|
---|
[95eb7cf] | 803 | #endif // __STATISTICS__
|
---|
[31a5f418] | 804 | } // ~Heap
|
---|
[95eb7cf] | 805 |
|
---|
| 806 |
|
---|
| 807 | static void memory_startup( void ) __attribute__(( constructor( STARTUP_PRIORITY_MEMORY ) ));
|
---|
| 808 | void memory_startup( void ) {
|
---|
| 809 | #ifdef __CFA_DEBUG__
|
---|
[92aca37] | 810 | if ( heapBoot ) { // check for recursion during system boot
|
---|
[95eb7cf] | 811 | abort( "boot() : internal error, recursively invoked during system boot." );
|
---|
| 812 | } // if
|
---|
| 813 | heapBoot = true;
|
---|
| 814 | #endif // __CFA_DEBUG__
|
---|
| 815 |
|
---|
[c1f38e6c] | 816 | //verify( heapManager.heapBegin != 0 );
|
---|
[95eb7cf] | 817 | //heapManager{};
|
---|
[1076d05] | 818 | if ( heapManager.heapBegin == 0p ) heapManager{}; // sanity check
|
---|
[95eb7cf] | 819 | } // memory_startup
|
---|
| 820 |
|
---|
| 821 | static void memory_shutdown( void ) __attribute__(( destructor( STARTUP_PRIORITY_MEMORY ) ));
|
---|
| 822 | void memory_shutdown( void ) {
|
---|
| 823 | ^heapManager{};
|
---|
| 824 | } // memory_shutdown
|
---|
[c4f68dc] | 825 |
|
---|
[bcb14b5] | 826 |
|
---|
| 827 | static inline void * mallocNoStats( size_t size ) { // necessary for malloc statistics
|
---|
[92aca37] | 828 | verify( heapManager.heapBegin != 0p ); // called before memory_startup ?
|
---|
[dd23e66] | 829 | if ( unlikely( size ) == 0 ) return 0p; // 0 BYTE ALLOCATION RETURNS NULL POINTER
|
---|
[d5d3a90] | 830 |
|
---|
[76e2113] | 831 | #if __SIZEOF_POINTER__ == 8
|
---|
| 832 | verify( size < ((typeof(size_t))1 << 48) );
|
---|
| 833 | #endif // __SIZEOF_POINTER__ == 8
|
---|
[d5d3a90] | 834 | return doMalloc( size );
|
---|
[bcb14b5] | 835 | } // mallocNoStats
|
---|
[c4f68dc] | 836 |
|
---|
| 837 |
|
---|
[92aca37] | 838 | static inline void * memalignNoStats( size_t alignment, size_t size ) {
|
---|
[dd23e66] | 839 | if ( unlikely( size ) == 0 ) return 0p; // 0 BYTE ALLOCATION RETURNS NULL POINTER
|
---|
[d5d3a90] | 840 |
|
---|
[bcb14b5] | 841 | #ifdef __CFA_DEBUG__
|
---|
[b6830d74] | 842 | checkAlign( alignment ); // check alignment
|
---|
[bcb14b5] | 843 | #endif // __CFA_DEBUG__
|
---|
[c4f68dc] | 844 |
|
---|
[b6830d74] | 845 | // if alignment <= default alignment, do normal malloc as two headers are unnecessary
|
---|
[bcb14b5] | 846 | if ( unlikely( alignment <= libAlign() ) ) return mallocNoStats( size );
|
---|
[b6830d74] | 847 |
|
---|
| 848 | // Allocate enough storage to guarantee an address on the alignment boundary, and sufficient space before it for
|
---|
| 849 | // administrative storage. NOTE, WHILE THERE ARE 2 HEADERS, THE FIRST ONE IS IMPLICITLY CREATED BY DOMALLOC.
|
---|
| 850 | // .-------------v-----------------v----------------v----------,
|
---|
| 851 | // | Real Header | ... padding ... | Fake Header | data ... |
|
---|
| 852 | // `-------------^-----------------^-+--------------^----------'
|
---|
| 853 | // |<--------------------------------' offset/align |<-- alignment boundary
|
---|
| 854 |
|
---|
| 855 | // subtract libAlign() because it is already the minimum alignment
|
---|
| 856 | // add sizeof(Storage) for fake header
|
---|
[31a5f418] | 857 | char * addr = (char *)mallocNoStats( size + alignment - libAlign() + sizeof(Heap.Storage) );
|
---|
[b6830d74] | 858 |
|
---|
| 859 | // address in the block of the "next" alignment address
|
---|
[31a5f418] | 860 | char * user = (char *)ceiling2( (uintptr_t)(addr + sizeof(Heap.Storage)), alignment );
|
---|
[b6830d74] | 861 |
|
---|
| 862 | // address of header from malloc
|
---|
[19e5d65d] | 863 | Heap.Storage.Header * RealHeader = HeaderAddr( addr );
|
---|
| 864 | RealHeader->kind.real.size = size; // correct size to eliminate above alignment offset
|
---|
[b6830d74] | 865 | // address of fake header * before* the alignment location
|
---|
[19e5d65d] | 866 | Heap.Storage.Header * fakeHeader = HeaderAddr( user );
|
---|
[b6830d74] | 867 | // SKULLDUGGERY: insert the offset to the start of the actual storage block and remember alignment
|
---|
[19e5d65d] | 868 | fakeHeader->kind.fake.offset = (char *)fakeHeader - (char *)RealHeader;
|
---|
[69ec0fb] | 869 | // SKULLDUGGERY: odd alignment implies fake header
|
---|
[19e5d65d] | 870 | fakeHeader->kind.fake.alignment = MarkAlignmentBit( alignment );
|
---|
[b6830d74] | 871 |
|
---|
| 872 | return user;
|
---|
[bcb14b5] | 873 | } // memalignNoStats
|
---|
[c4f68dc] | 874 |
|
---|
| 875 |
|
---|
[19e5d65d] | 876 | //####################### Memory Allocation Routines ####################
|
---|
| 877 |
|
---|
| 878 |
|
---|
[c4f68dc] | 879 | extern "C" {
|
---|
[61248a4] | 880 | // Allocates size bytes and returns a pointer to the allocated memory. The contents are undefined. If size is 0,
|
---|
| 881 | // then malloc() returns a unique pointer value that can later be successfully passed to free().
|
---|
[032234bd] | 882 | void * malloc( size_t size ) libcfa_public {
|
---|
[c4f68dc] | 883 | #ifdef __STATISTICS__
|
---|
[709b812] | 884 | if ( likely( size > 0 ) ) {
|
---|
[31a5f418] | 885 | __atomic_add_fetch( &stats.malloc_calls, 1, __ATOMIC_SEQ_CST );
|
---|
| 886 | __atomic_add_fetch( &stats.malloc_storage_request, size, __ATOMIC_SEQ_CST );
|
---|
[709b812] | 887 | } else {
|
---|
[31a5f418] | 888 | __atomic_add_fetch( &stats.malloc_0_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[709b812] | 889 | } // if
|
---|
[c4f68dc] | 890 | #endif // __STATISTICS__
|
---|
| 891 |
|
---|
[bcb14b5] | 892 | return mallocNoStats( size );
|
---|
| 893 | } // malloc
|
---|
[c4f68dc] | 894 |
|
---|
[76e2113] | 895 |
|
---|
[61248a4] | 896 | // Same as malloc() except size bytes is an array of dim elements each of elemSize bytes.
|
---|
[032234bd] | 897 | void * aalloc( size_t dim, size_t elemSize ) libcfa_public {
|
---|
[92aca37] | 898 | size_t size = dim * elemSize;
|
---|
[76e2113] | 899 | #ifdef __STATISTICS__
|
---|
[709b812] | 900 | if ( likely( size > 0 ) ) {
|
---|
[31a5f418] | 901 | __atomic_add_fetch( &stats.aalloc_calls, 1, __ATOMIC_SEQ_CST );
|
---|
| 902 | __atomic_add_fetch( &stats.aalloc_storage_request, size, __ATOMIC_SEQ_CST );
|
---|
[709b812] | 903 | } else {
|
---|
[31a5f418] | 904 | __atomic_add_fetch( &stats.aalloc_0_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[709b812] | 905 | } // if
|
---|
[76e2113] | 906 | #endif // __STATISTICS__
|
---|
| 907 |
|
---|
[92aca37] | 908 | return mallocNoStats( size );
|
---|
[76e2113] | 909 | } // aalloc
|
---|
| 910 |
|
---|
| 911 |
|
---|
[61248a4] | 912 | // Same as aalloc() with memory set to zero.
|
---|
[032234bd] | 913 | void * calloc( size_t dim, size_t elemSize ) libcfa_public {
|
---|
[709b812] | 914 | size_t size = dim * elemSize;
|
---|
| 915 | if ( unlikely( size ) == 0 ) { // 0 BYTE ALLOCATION RETURNS NULL POINTER
|
---|
| 916 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 917 | __atomic_add_fetch( &stats.calloc_0_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[709b812] | 918 | #endif // __STATISTICS__
|
---|
| 919 | return 0p;
|
---|
| 920 | } // if
|
---|
[c4f68dc] | 921 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 922 | __atomic_add_fetch( &stats.calloc_calls, 1, __ATOMIC_SEQ_CST );
|
---|
| 923 | __atomic_add_fetch( &stats.calloc_storage_request, dim * elemSize, __ATOMIC_SEQ_CST );
|
---|
[c4f68dc] | 924 | #endif // __STATISTICS__
|
---|
| 925 |
|
---|
[709b812] | 926 | char * addr = (char *)mallocNoStats( size );
|
---|
| 927 |
|
---|
[31a5f418] | 928 | Heap.Storage.Header * header;
|
---|
| 929 | Heap.FreeHeader * freeElem;
|
---|
[709b812] | 930 | size_t bsize, alignment;
|
---|
| 931 |
|
---|
| 932 | #ifndef __CFA_DEBUG__
|
---|
| 933 | bool mapped =
|
---|
| 934 | #endif // __CFA_DEBUG__
|
---|
| 935 | headers( "calloc", addr, header, freeElem, bsize, alignment );
|
---|
| 936 |
|
---|
| 937 | #ifndef __CFA_DEBUG__
|
---|
| 938 | // Mapped storage is zero filled, but in debug mode mapped memory is scrubbed in doMalloc, so it has to be reset to zero.
|
---|
| 939 | if ( ! mapped )
|
---|
| 940 | #endif // __CFA_DEBUG__
|
---|
| 941 | // <-------0000000000000000000000000000UUUUUUUUUUUUUUUUUUUUUUUUU> bsize (bucket size) U => undefined
|
---|
| 942 | // `-header`-addr `-size
|
---|
| 943 | memset( addr, '\0', size ); // set to zeros
|
---|
| 944 |
|
---|
[19e5d65d] | 945 | MarkZeroFilledBit( header ); // mark as zero fill
|
---|
[709b812] | 946 | return addr;
|
---|
[bcb14b5] | 947 | } // calloc
|
---|
[c4f68dc] | 948 |
|
---|
[92aca37] | 949 |
|
---|
[61248a4] | 950 | // Change the size of the memory block pointed to by oaddr to size bytes. The contents are undefined. If oaddr is
|
---|
| 951 | // 0p, then the call is equivalent to malloc(size), for all values of size; if size is equal to zero, and oaddr is
|
---|
| 952 | // not 0p, then the call is equivalent to free(oaddr). Unless oaddr is 0p, it must have been returned by an earlier
|
---|
| 953 | // call to malloc(), alloc(), calloc() or realloc(). If the area pointed to was moved, a free(oaddr) is done.
|
---|
[032234bd] | 954 | void * resize( void * oaddr, size_t size ) libcfa_public {
|
---|
[709b812] | 955 | // If size is equal to 0, either NULL or a pointer suitable to be passed to free() is returned.
|
---|
| 956 | if ( unlikely( size == 0 ) ) { // special cases
|
---|
| 957 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 958 | __atomic_add_fetch( &stats.resize_0_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[709b812] | 959 | #endif // __STATISTICS__
|
---|
| 960 | free( oaddr );
|
---|
| 961 | return 0p;
|
---|
| 962 | } // if
|
---|
[cfbc703d] | 963 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 964 | __atomic_add_fetch( &stats.resize_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[cfbc703d] | 965 | #endif // __STATISTICS__
|
---|
| 966 |
|
---|
[92aca37] | 967 | if ( unlikely( oaddr == 0p ) ) {
|
---|
| 968 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 969 | __atomic_add_fetch( &stats.resize_storage_request, size, __ATOMIC_SEQ_CST );
|
---|
[92aca37] | 970 | #endif // __STATISTICS__
|
---|
| 971 | return mallocNoStats( size );
|
---|
| 972 | } // if
|
---|
[cfbc703d] | 973 |
|
---|
[31a5f418] | 974 | Heap.Storage.Header * header;
|
---|
| 975 | Heap.FreeHeader * freeElem;
|
---|
[92aca37] | 976 | size_t bsize, oalign;
|
---|
[cfbc703d] | 977 | headers( "resize", oaddr, header, freeElem, bsize, oalign );
|
---|
[92847f7] | 978 |
|
---|
[19e5d65d] | 979 | size_t odsize = DataStorage( bsize, oaddr, header ); // data storage available in bucket
|
---|
[cfbc703d] | 980 | // same size, DO NOT preserve STICKY PROPERTIES.
|
---|
[92847f7] | 981 | if ( oalign == libAlign() && size <= odsize && odsize <= size * 2 ) { // allow 50% wasted storage for smaller size
|
---|
[19e5d65d] | 982 | ClearZeroFillBit( header ); // no alignment and turn off 0 fill
|
---|
[d5d3a90] | 983 | header->kind.real.size = size; // reset allocation size
|
---|
[cfbc703d] | 984 | return oaddr;
|
---|
| 985 | } // if
|
---|
[0f89d4f] | 986 |
|
---|
[92aca37] | 987 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 988 | __atomic_add_fetch( &stats.resize_storage_request, size, __ATOMIC_SEQ_CST );
|
---|
[92aca37] | 989 | #endif // __STATISTICS__
|
---|
| 990 |
|
---|
[cfbc703d] | 991 | // change size, DO NOT preserve STICKY PROPERTIES.
|
---|
| 992 | free( oaddr );
|
---|
[d5d3a90] | 993 | return mallocNoStats( size ); // create new area
|
---|
[cfbc703d] | 994 | } // resize
|
---|
| 995 |
|
---|
| 996 |
|
---|
[61248a4] | 997 | // Same as resize() but the contents are unchanged in the range from the start of the region up to the minimum of
|
---|
[cfbc703d] | 998 | // the old and new sizes.
|
---|
[032234bd] | 999 | void * realloc( void * oaddr, size_t size ) libcfa_public {
|
---|
[709b812] | 1000 | // If size is equal to 0, either NULL or a pointer suitable to be passed to free() is returned.
|
---|
| 1001 | if ( unlikely( size == 0 ) ) { // special cases
|
---|
| 1002 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 1003 | __atomic_add_fetch( &stats.realloc_0_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[709b812] | 1004 | #endif // __STATISTICS__
|
---|
| 1005 | free( oaddr );
|
---|
| 1006 | return 0p;
|
---|
| 1007 | } // if
|
---|
[c4f68dc] | 1008 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 1009 | __atomic_add_fetch( &stats.realloc_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[c4f68dc] | 1010 | #endif // __STATISTICS__
|
---|
| 1011 |
|
---|
[92aca37] | 1012 | if ( unlikely( oaddr == 0p ) ) {
|
---|
| 1013 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 1014 | __atomic_add_fetch( &stats.realloc_storage_request, size, __ATOMIC_SEQ_CST );
|
---|
[92aca37] | 1015 | #endif // __STATISTICS__
|
---|
| 1016 | return mallocNoStats( size );
|
---|
| 1017 | } // if
|
---|
[c4f68dc] | 1018 |
|
---|
[31a5f418] | 1019 | Heap.Storage.Header * header;
|
---|
| 1020 | Heap.FreeHeader * freeElem;
|
---|
[92aca37] | 1021 | size_t bsize, oalign;
|
---|
[95eb7cf] | 1022 | headers( "realloc", oaddr, header, freeElem, bsize, oalign );
|
---|
| 1023 |
|
---|
[19e5d65d] | 1024 | size_t odsize = DataStorage( bsize, oaddr, header ); // data storage available in bucket
|
---|
[d5d3a90] | 1025 | size_t osize = header->kind.real.size; // old allocation size
|
---|
[19e5d65d] | 1026 | bool ozfill = ZeroFillBit( header ); // old allocation zero filled
|
---|
[92847f7] | 1027 | if ( unlikely( size <= odsize ) && odsize <= size * 2 ) { // allow up to 50% wasted storage
|
---|
[d5d3a90] | 1028 | header->kind.real.size = size; // reset allocation size
|
---|
| 1029 | if ( unlikely( ozfill ) && size > osize ) { // previous request zero fill and larger ?
|
---|
[e4b6b7d3] | 1030 | memset( (char *)oaddr + osize, '\0', size - osize ); // initialize added storage
|
---|
[d5d3a90] | 1031 | } // if
|
---|
[95eb7cf] | 1032 | return oaddr;
|
---|
[c4f68dc] | 1033 | } // if
|
---|
| 1034 |
|
---|
[92aca37] | 1035 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 1036 | __atomic_add_fetch( &stats.realloc_storage_request, size, __ATOMIC_SEQ_CST );
|
---|
[92aca37] | 1037 | #endif // __STATISTICS__
|
---|
| 1038 |
|
---|
[95eb7cf] | 1039 | // change size and copy old content to new storage
|
---|
| 1040 |
|
---|
| 1041 | void * naddr;
|
---|
[92847f7] | 1042 | if ( likely( oalign == libAlign() ) ) { // previous request not aligned ?
|
---|
[d5d3a90] | 1043 | naddr = mallocNoStats( size ); // create new area
|
---|
[c4f68dc] | 1044 | } else {
|
---|
[d5d3a90] | 1045 | naddr = memalignNoStats( oalign, size ); // create new aligned area
|
---|
[c4f68dc] | 1046 | } // if
|
---|
[1e034d9] | 1047 |
|
---|
[95eb7cf] | 1048 | headers( "realloc", naddr, header, freeElem, bsize, oalign );
|
---|
[47dd0d2] | 1049 | memcpy( naddr, oaddr, min( osize, size ) ); // copy bytes
|
---|
[95eb7cf] | 1050 | free( oaddr );
|
---|
[d5d3a90] | 1051 |
|
---|
| 1052 | if ( unlikely( ozfill ) ) { // previous request zero fill ?
|
---|
[19e5d65d] | 1053 | MarkZeroFilledBit( header ); // mark new request as zero filled
|
---|
[d5d3a90] | 1054 | if ( size > osize ) { // previous request larger ?
|
---|
[e4b6b7d3] | 1055 | memset( (char *)naddr + osize, '\0', size - osize ); // initialize added storage
|
---|
[d5d3a90] | 1056 | } // if
|
---|
| 1057 | } // if
|
---|
[95eb7cf] | 1058 | return naddr;
|
---|
[b6830d74] | 1059 | } // realloc
|
---|
[c4f68dc] | 1060 |
|
---|
[c1f38e6c] | 1061 |
|
---|
[19e5d65d] | 1062 | // Same as realloc() except the new allocation size is large enough for an array of nelem elements of size elsize.
|
---|
[032234bd] | 1063 | void * reallocarray( void * oaddr, size_t dim, size_t elemSize ) libcfa_public {
|
---|
[19e5d65d] | 1064 | return realloc( oaddr, dim * elemSize );
|
---|
| 1065 | } // reallocarray
|
---|
| 1066 |
|
---|
| 1067 |
|
---|
[61248a4] | 1068 | // Same as malloc() except the memory address is a multiple of alignment, which must be a power of two. (obsolete)
|
---|
[032234bd] | 1069 | void * memalign( size_t alignment, size_t size ) libcfa_public {
|
---|
[c4f68dc] | 1070 | #ifdef __STATISTICS__
|
---|
[709b812] | 1071 | if ( likely( size > 0 ) ) {
|
---|
[31a5f418] | 1072 | __atomic_add_fetch( &stats.memalign_calls, 1, __ATOMIC_SEQ_CST );
|
---|
| 1073 | __atomic_add_fetch( &stats.memalign_storage_request, size, __ATOMIC_SEQ_CST );
|
---|
[709b812] | 1074 | } else {
|
---|
[31a5f418] | 1075 | __atomic_add_fetch( &stats.memalign_0_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[709b812] | 1076 | } // if
|
---|
[c4f68dc] | 1077 | #endif // __STATISTICS__
|
---|
| 1078 |
|
---|
[95eb7cf] | 1079 | return memalignNoStats( alignment, size );
|
---|
[bcb14b5] | 1080 | } // memalign
|
---|
[c4f68dc] | 1081 |
|
---|
[95eb7cf] | 1082 |
|
---|
[76e2113] | 1083 | // Same as aalloc() with memory alignment.
|
---|
[032234bd] | 1084 | void * amemalign( size_t alignment, size_t dim, size_t elemSize ) libcfa_public {
|
---|
[92aca37] | 1085 | size_t size = dim * elemSize;
|
---|
[76e2113] | 1086 | #ifdef __STATISTICS__
|
---|
[709b812] | 1087 | if ( likely( size > 0 ) ) {
|
---|
[31a5f418] | 1088 | __atomic_add_fetch( &stats.cmemalign_calls, 1, __ATOMIC_SEQ_CST );
|
---|
| 1089 | __atomic_add_fetch( &stats.cmemalign_storage_request, size, __ATOMIC_SEQ_CST );
|
---|
[709b812] | 1090 | } else {
|
---|
[31a5f418] | 1091 | __atomic_add_fetch( &stats.cmemalign_0_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[709b812] | 1092 | } // if
|
---|
[76e2113] | 1093 | #endif // __STATISTICS__
|
---|
| 1094 |
|
---|
[92aca37] | 1095 | return memalignNoStats( alignment, size );
|
---|
[76e2113] | 1096 | } // amemalign
|
---|
| 1097 |
|
---|
| 1098 |
|
---|
[ca7949b] | 1099 | // Same as calloc() with memory alignment.
|
---|
[032234bd] | 1100 | void * cmemalign( size_t alignment, size_t dim, size_t elemSize ) libcfa_public {
|
---|
[709b812] | 1101 | size_t size = dim * elemSize;
|
---|
| 1102 | if ( unlikely( size ) == 0 ) { // 0 BYTE ALLOCATION RETURNS NULL POINTER
|
---|
| 1103 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 1104 | __atomic_add_fetch( &stats.cmemalign_0_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[709b812] | 1105 | #endif // __STATISTICS__
|
---|
| 1106 | return 0p;
|
---|
| 1107 | } // if
|
---|
[95eb7cf] | 1108 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 1109 | __atomic_add_fetch( &stats.cmemalign_calls, 1, __ATOMIC_SEQ_CST );
|
---|
| 1110 | __atomic_add_fetch( &stats.cmemalign_storage_request, dim * elemSize, __ATOMIC_SEQ_CST );
|
---|
[95eb7cf] | 1111 | #endif // __STATISTICS__
|
---|
| 1112 |
|
---|
[709b812] | 1113 | char * addr = (char *)memalignNoStats( alignment, size );
|
---|
| 1114 |
|
---|
[31a5f418] | 1115 | Heap.Storage.Header * header;
|
---|
| 1116 | Heap.FreeHeader * freeElem;
|
---|
[709b812] | 1117 | size_t bsize;
|
---|
| 1118 |
|
---|
| 1119 | #ifndef __CFA_DEBUG__
|
---|
| 1120 | bool mapped =
|
---|
| 1121 | #endif // __CFA_DEBUG__
|
---|
| 1122 | headers( "cmemalign", addr, header, freeElem, bsize, alignment );
|
---|
| 1123 |
|
---|
| 1124 | // Mapped storage is zero filled, but in debug mode mapped memory is scrubbed in doMalloc, so it has to be reset to zero.
|
---|
| 1125 | #ifndef __CFA_DEBUG__
|
---|
| 1126 | if ( ! mapped )
|
---|
| 1127 | #endif // __CFA_DEBUG__
|
---|
| 1128 | // <-------0000000000000000000000000000UUUUUUUUUUUUUUUUUUUUUUUUU> bsize (bucket size) U => undefined
|
---|
| 1129 | // `-header`-addr `-size
|
---|
| 1130 | memset( addr, '\0', size ); // set to zeros
|
---|
| 1131 |
|
---|
[19e5d65d] | 1132 | MarkZeroFilledBit( header ); // mark as zero filled
|
---|
[709b812] | 1133 | return addr;
|
---|
[95eb7cf] | 1134 | } // cmemalign
|
---|
| 1135 |
|
---|
[13fece5] | 1136 |
|
---|
[ca7949b] | 1137 | // Same as memalign(), but ISO/IEC 2011 C11 Section 7.22.2 states: the value of size shall be an integral multiple
|
---|
[19e5d65d] | 1138 | // of alignment. This requirement is universally ignored.
|
---|
[032234bd] | 1139 | void * aligned_alloc( size_t alignment, size_t size ) libcfa_public {
|
---|
[c4f68dc] | 1140 | return memalign( alignment, size );
|
---|
[b6830d74] | 1141 | } // aligned_alloc
|
---|
[c4f68dc] | 1142 |
|
---|
| 1143 |
|
---|
[ca7949b] | 1144 | // Allocates size bytes and places the address of the allocated memory in *memptr. The address of the allocated
|
---|
| 1145 | // memory shall be a multiple of alignment, which must be a power of two and a multiple of sizeof(void *). If size
|
---|
| 1146 | // is 0, then posix_memalign() returns either 0p, or a unique pointer value that can later be successfully passed to
|
---|
| 1147 | // free(3).
|
---|
[032234bd] | 1148 | int posix_memalign( void ** memptr, size_t alignment, size_t size ) libcfa_public {
|
---|
[69ec0fb] | 1149 | if ( unlikely( alignment < libAlign() || ! is_pow2( alignment ) ) ) return EINVAL; // check alignment
|
---|
[19e5d65d] | 1150 | *memptr = memalign( alignment, size );
|
---|
[c4f68dc] | 1151 | return 0;
|
---|
[b6830d74] | 1152 | } // posix_memalign
|
---|
[c4f68dc] | 1153 |
|
---|
[13fece5] | 1154 |
|
---|
[ca7949b] | 1155 | // Allocates size bytes and returns a pointer to the allocated memory. The memory address shall be a multiple of the
|
---|
| 1156 | // page size. It is equivalent to memalign(sysconf(_SC_PAGESIZE),size).
|
---|
[032234bd] | 1157 | void * valloc( size_t size ) libcfa_public {
|
---|
[ad2dced] | 1158 | return memalign( __page_size, size );
|
---|
[b6830d74] | 1159 | } // valloc
|
---|
[c4f68dc] | 1160 |
|
---|
| 1161 |
|
---|
[ca7949b] | 1162 | // Same as valloc but rounds size to multiple of page size.
|
---|
[032234bd] | 1163 | void * pvalloc( size_t size ) libcfa_public {
|
---|
[19e5d65d] | 1164 | return memalign( __page_size, ceiling2( size, __page_size ) ); // round size to multiple of page size
|
---|
[ca7949b] | 1165 | } // pvalloc
|
---|
| 1166 |
|
---|
| 1167 |
|
---|
| 1168 | // Frees the memory space pointed to by ptr, which must have been returned by a previous call to malloc(), calloc()
|
---|
[1076d05] | 1169 | // or realloc(). Otherwise, or if free(ptr) has already been called before, undefined behaviour occurs. If ptr is
|
---|
[ca7949b] | 1170 | // 0p, no operation is performed.
|
---|
[032234bd] | 1171 | void free( void * addr ) libcfa_public {
|
---|
[95eb7cf] | 1172 | if ( unlikely( addr == 0p ) ) { // special case
|
---|
[709b812] | 1173 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 1174 | __atomic_add_fetch( &stats.free_null_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[709b812] | 1175 | #endif // __STATISTICS__
|
---|
| 1176 |
|
---|
[95eb7cf] | 1177 | // #ifdef __CFA_DEBUG__
|
---|
| 1178 | // if ( traceHeap() ) {
|
---|
| 1179 | // #define nullmsg "Free( 0x0 ) size:0\n"
|
---|
[1e034d9] | 1180 | // // Do not debug print free( 0p ), as it can cause recursive entry from sprintf.
|
---|
[95eb7cf] | 1181 | // __cfaabi_dbg_write( nullmsg, sizeof(nullmsg) - 1 );
|
---|
| 1182 | // } // if
|
---|
| 1183 | // #endif // __CFA_DEBUG__
|
---|
[c4f68dc] | 1184 | return;
|
---|
| 1185 | } // exit
|
---|
| 1186 |
|
---|
| 1187 | doFree( addr );
|
---|
[b6830d74] | 1188 | } // free
|
---|
[93c2e0a] | 1189 |
|
---|
[c4f68dc] | 1190 |
|
---|
[76e2113] | 1191 | // Returns the alignment of an allocation.
|
---|
[032234bd] | 1192 | size_t malloc_alignment( void * addr ) libcfa_public {
|
---|
[95eb7cf] | 1193 | if ( unlikely( addr == 0p ) ) return libAlign(); // minimum alignment
|
---|
[19e5d65d] | 1194 | Heap.Storage.Header * header = HeaderAddr( addr );
|
---|
| 1195 | if ( unlikely( AlignmentBit( header ) ) ) { // fake header ?
|
---|
| 1196 | return ClearAlignmentBit( header ); // clear flag from value
|
---|
[c4f68dc] | 1197 | } else {
|
---|
[cfbc703d] | 1198 | return libAlign(); // minimum alignment
|
---|
[c4f68dc] | 1199 | } // if
|
---|
[bcb14b5] | 1200 | } // malloc_alignment
|
---|
[c4f68dc] | 1201 |
|
---|
[92aca37] | 1202 |
|
---|
[76e2113] | 1203 | // Returns true if the allocation is zero filled, e.g., allocated by calloc().
|
---|
[032234bd] | 1204 | bool malloc_zero_fill( void * addr ) libcfa_public {
|
---|
[95eb7cf] | 1205 | if ( unlikely( addr == 0p ) ) return false; // null allocation is not zero fill
|
---|
[19e5d65d] | 1206 | Heap.Storage.Header * header = HeaderAddr( addr );
|
---|
| 1207 | if ( unlikely( AlignmentBit( header ) ) ) { // fake header ?
|
---|
| 1208 | header = RealHeader( header ); // backup from fake to real header
|
---|
[c4f68dc] | 1209 | } // if
|
---|
[19e5d65d] | 1210 | return ZeroFillBit( header ); // zero filled ?
|
---|
[bcb14b5] | 1211 | } // malloc_zero_fill
|
---|
[c4f68dc] | 1212 |
|
---|
[19e5d65d] | 1213 |
|
---|
| 1214 | // Returns original total allocation size (not bucket size) => array size is dimension * sizeof(T).
|
---|
[032234bd] | 1215 | size_t malloc_size( void * addr ) libcfa_public {
|
---|
[849fb370] | 1216 | if ( unlikely( addr == 0p ) ) return 0; // null allocation has zero size
|
---|
[19e5d65d] | 1217 | Heap.Storage.Header * header = HeaderAddr( addr );
|
---|
| 1218 | if ( unlikely( AlignmentBit( header ) ) ) { // fake header ?
|
---|
| 1219 | header = RealHeader( header ); // backup from fake to real header
|
---|
[cfbc703d] | 1220 | } // if
|
---|
[9c438546] | 1221 | return header->kind.real.size;
|
---|
[76e2113] | 1222 | } // malloc_size
|
---|
| 1223 |
|
---|
[cfbc703d] | 1224 |
|
---|
[ca7949b] | 1225 | // Returns the number of usable bytes in the block pointed to by ptr, a pointer to a block of memory allocated by
|
---|
| 1226 | // malloc or a related function.
|
---|
[032234bd] | 1227 | size_t malloc_usable_size( void * addr ) libcfa_public {
|
---|
[95eb7cf] | 1228 | if ( unlikely( addr == 0p ) ) return 0; // null allocation has 0 size
|
---|
[31a5f418] | 1229 | Heap.Storage.Header * header;
|
---|
| 1230 | Heap.FreeHeader * freeElem;
|
---|
[95eb7cf] | 1231 | size_t bsize, alignment;
|
---|
| 1232 |
|
---|
| 1233 | headers( "malloc_usable_size", addr, header, freeElem, bsize, alignment );
|
---|
[19e5d65d] | 1234 | return DataStorage( bsize, addr, header ); // data storage in bucket
|
---|
[95eb7cf] | 1235 | } // malloc_usable_size
|
---|
| 1236 |
|
---|
| 1237 |
|
---|
[ca7949b] | 1238 | // Prints (on default standard error) statistics about memory allocated by malloc and related functions.
|
---|
[032234bd] | 1239 | void malloc_stats( void ) libcfa_public {
|
---|
[c4f68dc] | 1240 | #ifdef __STATISTICS__
|
---|
[bcb14b5] | 1241 | printStats();
|
---|
[95eb7cf] | 1242 | if ( prtFree() ) prtFree( heapManager );
|
---|
[c4f68dc] | 1243 | #endif // __STATISTICS__
|
---|
[bcb14b5] | 1244 | } // malloc_stats
|
---|
[c4f68dc] | 1245 |
|
---|
[92aca37] | 1246 |
|
---|
[19e5d65d] | 1247 | // Changes the file descriptor where malloc_stats() writes statistics.
|
---|
[032234bd] | 1248 | int malloc_stats_fd( int fd __attribute__(( unused )) ) libcfa_public {
|
---|
[c4f68dc] | 1249 | #ifdef __STATISTICS__
|
---|
[709b812] | 1250 | int temp = stats_fd;
|
---|
| 1251 | stats_fd = fd;
|
---|
[bcb14b5] | 1252 | return temp;
|
---|
[c4f68dc] | 1253 | #else
|
---|
[19e5d65d] | 1254 | return -1; // unsupported
|
---|
[c4f68dc] | 1255 | #endif // __STATISTICS__
|
---|
[bcb14b5] | 1256 | } // malloc_stats_fd
|
---|
[c4f68dc] | 1257 |
|
---|
[95eb7cf] | 1258 |
|
---|
[19e5d65d] | 1259 | // Prints an XML string that describes the current state of the memory-allocation implementation in the caller.
|
---|
| 1260 | // The string is printed on the file stream stream. The exported string includes information about all arenas (see
|
---|
| 1261 | // malloc).
|
---|
[032234bd] | 1262 | int malloc_info( int options, FILE * stream __attribute__(( unused )) ) libcfa_public {
|
---|
[19e5d65d] | 1263 | if ( options != 0 ) { errno = EINVAL; return -1; }
|
---|
| 1264 | #ifdef __STATISTICS__
|
---|
| 1265 | return printStatsXML( stream );
|
---|
| 1266 | #else
|
---|
| 1267 | return 0; // unsupported
|
---|
| 1268 | #endif // __STATISTICS__
|
---|
| 1269 | } // malloc_info
|
---|
| 1270 |
|
---|
| 1271 |
|
---|
[1076d05] | 1272 | // Adjusts parameters that control the behaviour of the memory-allocation functions (see malloc). The param argument
|
---|
[ca7949b] | 1273 | // specifies the parameter to be modified, and value specifies the new value for that parameter.
|
---|
[032234bd] | 1274 | int mallopt( int option, int value ) libcfa_public {
|
---|
[19e5d65d] | 1275 | if ( value < 0 ) return 0;
|
---|
[95eb7cf] | 1276 | choose( option ) {
|
---|
| 1277 | case M_TOP_PAD:
|
---|
[19e5d65d] | 1278 | heapExpand = ceiling2( value, __page_size );
|
---|
| 1279 | return 1;
|
---|
[95eb7cf] | 1280 | case M_MMAP_THRESHOLD:
|
---|
| 1281 | if ( setMmapStart( value ) ) return 1;
|
---|
[19e5d65d] | 1282 | } // choose
|
---|
[95eb7cf] | 1283 | return 0; // error, unsupported
|
---|
| 1284 | } // mallopt
|
---|
| 1285 |
|
---|
[c1f38e6c] | 1286 |
|
---|
[ca7949b] | 1287 | // Attempt to release free memory at the top of the heap (by calling sbrk with a suitable argument).
|
---|
[032234bd] | 1288 | int malloc_trim( size_t ) libcfa_public {
|
---|
[95eb7cf] | 1289 | return 0; // => impossible to release memory
|
---|
| 1290 | } // malloc_trim
|
---|
| 1291 |
|
---|
| 1292 |
|
---|
[ca7949b] | 1293 | // Records the current state of all malloc internal bookkeeping variables (but not the actual contents of the heap
|
---|
| 1294 | // or the state of malloc_hook functions pointers). The state is recorded in a system-dependent opaque data
|
---|
| 1295 | // structure dynamically allocated via malloc, and a pointer to that data structure is returned as the function
|
---|
| 1296 | // result. (The caller must free this memory.)
|
---|
[032234bd] | 1297 | void * malloc_get_state( void ) libcfa_public {
|
---|
[95eb7cf] | 1298 | return 0p; // unsupported
|
---|
[c4f68dc] | 1299 | } // malloc_get_state
|
---|
| 1300 |
|
---|
[bcb14b5] | 1301 |
|
---|
[ca7949b] | 1302 | // Restores the state of all malloc internal bookkeeping variables to the values recorded in the opaque data
|
---|
| 1303 | // structure pointed to by state.
|
---|
[032234bd] | 1304 | int malloc_set_state( void * ) libcfa_public {
|
---|
[bcb14b5] | 1305 | return 0; // unsupported
|
---|
[c4f68dc] | 1306 | } // malloc_set_state
|
---|
[31a5f418] | 1307 |
|
---|
[19e5d65d] | 1308 |
|
---|
[31a5f418] | 1309 | // Sets the amount (bytes) to extend the heap when there is insufficent free storage to service an allocation.
|
---|
[032234bd] | 1310 | __attribute__((weak)) size_t malloc_expansion() libcfa_public { return __CFA_DEFAULT_HEAP_EXPANSION__; }
|
---|
[31a5f418] | 1311 |
|
---|
| 1312 | // Sets the crossover point between allocations occuring in the sbrk area or separately mmapped.
|
---|
[032234bd] | 1313 | __attribute__((weak)) size_t malloc_mmap_start() libcfa_public { return __CFA_DEFAULT_MMAP_START__; }
|
---|
[31a5f418] | 1314 |
|
---|
| 1315 | // Amount subtracted to adjust for unfreed program storage (debug only).
|
---|
[032234bd] | 1316 | __attribute__((weak)) size_t malloc_unfreed() libcfa_public { return __CFA_DEFAULT_HEAP_UNFREED__; }
|
---|
[c4f68dc] | 1317 | } // extern "C"
|
---|
| 1318 |
|
---|
| 1319 |
|
---|
[95eb7cf] | 1320 | // Must have CFA linkage to overload with C linkage realloc.
|
---|
[032234bd] | 1321 | void * resize( void * oaddr, size_t nalign, size_t size ) libcfa_public {
|
---|
[709b812] | 1322 | // If size is equal to 0, either NULL or a pointer suitable to be passed to free() is returned.
|
---|
| 1323 | if ( unlikely( size == 0 ) ) { // special cases
|
---|
| 1324 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 1325 | __atomic_add_fetch( &stats.resize_0_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[709b812] | 1326 | #endif // __STATISTICS__
|
---|
| 1327 | free( oaddr );
|
---|
| 1328 | return 0p;
|
---|
| 1329 | } // if
|
---|
[95eb7cf] | 1330 |
|
---|
[c86f587] | 1331 | if ( unlikely( nalign < libAlign() ) ) nalign = libAlign(); // reset alignment to minimum
|
---|
| 1332 | #ifdef __CFA_DEBUG__
|
---|
[709b812] | 1333 | else checkAlign( nalign ); // check alignment
|
---|
[c86f587] | 1334 | #endif // __CFA_DEBUG__
|
---|
| 1335 |
|
---|
[92aca37] | 1336 | if ( unlikely( oaddr == 0p ) ) {
|
---|
| 1337 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 1338 | __atomic_add_fetch( &stats.resize_calls, 1, __ATOMIC_SEQ_CST );
|
---|
| 1339 | __atomic_add_fetch( &stats.resize_storage_request, size, __ATOMIC_SEQ_CST );
|
---|
[92aca37] | 1340 | #endif // __STATISTICS__
|
---|
| 1341 | return memalignNoStats( nalign, size );
|
---|
| 1342 | } // if
|
---|
[cfbc703d] | 1343 |
|
---|
[92847f7] | 1344 | // Attempt to reuse existing alignment.
|
---|
[19e5d65d] | 1345 | Heap.Storage.Header * header = HeaderAddr( oaddr );
|
---|
| 1346 | bool isFakeHeader = AlignmentBit( header ); // old fake header ?
|
---|
[92847f7] | 1347 | size_t oalign;
|
---|
[19e5d65d] | 1348 |
|
---|
| 1349 | if ( unlikely( isFakeHeader ) ) {
|
---|
| 1350 | oalign = ClearAlignmentBit( header ); // old alignment
|
---|
| 1351 | if ( unlikely( (uintptr_t)oaddr % nalign == 0 // lucky match ?
|
---|
[92847f7] | 1352 | && ( oalign <= nalign // going down
|
---|
| 1353 | || (oalign >= nalign && oalign <= 256) ) // little alignment storage wasted ?
|
---|
[19e5d65d] | 1354 | ) ) {
|
---|
| 1355 | HeaderAddr( oaddr )->kind.fake.alignment = MarkAlignmentBit( nalign ); // update alignment (could be the same)
|
---|
[31a5f418] | 1356 | Heap.FreeHeader * freeElem;
|
---|
[92847f7] | 1357 | size_t bsize, oalign;
|
---|
| 1358 | headers( "resize", oaddr, header, freeElem, bsize, oalign );
|
---|
[19e5d65d] | 1359 | size_t odsize = DataStorage( bsize, oaddr, header ); // data storage available in bucket
|
---|
[a3ade94] | 1360 |
|
---|
[92847f7] | 1361 | if ( size <= odsize && odsize <= size * 2 ) { // allow 50% wasted data storage
|
---|
[19e5d65d] | 1362 | HeaderAddr( oaddr )->kind.fake.alignment = MarkAlignmentBit( nalign ); // update alignment (could be the same)
|
---|
| 1363 | ClearZeroFillBit( header ); // turn off 0 fill
|
---|
[92847f7] | 1364 | header->kind.real.size = size; // reset allocation size
|
---|
| 1365 | return oaddr;
|
---|
| 1366 | } // if
|
---|
[cfbc703d] | 1367 | } // if
|
---|
[92847f7] | 1368 | } else if ( ! isFakeHeader // old real header (aligned on libAlign) ?
|
---|
| 1369 | && nalign == libAlign() ) { // new alignment also on libAlign => no fake header needed
|
---|
[113d785] | 1370 | return resize( oaddr, size ); // duplicate special case checks
|
---|
[cfbc703d] | 1371 | } // if
|
---|
| 1372 |
|
---|
[92aca37] | 1373 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 1374 | __atomic_add_fetch( &stats.resize_storage_request, size, __ATOMIC_SEQ_CST );
|
---|
[92aca37] | 1375 | #endif // __STATISTICS__
|
---|
| 1376 |
|
---|
[dd23e66] | 1377 | // change size, DO NOT preserve STICKY PROPERTIES.
|
---|
[cfbc703d] | 1378 | free( oaddr );
|
---|
[dd23e66] | 1379 | return memalignNoStats( nalign, size ); // create new aligned area
|
---|
[cfbc703d] | 1380 | } // resize
|
---|
| 1381 |
|
---|
| 1382 |
|
---|
[032234bd] | 1383 | void * realloc( void * oaddr, size_t nalign, size_t size ) libcfa_public {
|
---|
[709b812] | 1384 | // If size is equal to 0, either NULL or a pointer suitable to be passed to free() is returned.
|
---|
| 1385 | if ( unlikely( size == 0 ) ) { // special cases
|
---|
| 1386 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 1387 | __atomic_add_fetch( &stats.realloc_0_calls, 1, __ATOMIC_SEQ_CST );
|
---|
[709b812] | 1388 | #endif // __STATISTICS__
|
---|
| 1389 | free( oaddr );
|
---|
| 1390 | return 0p;
|
---|
| 1391 | } // if
|
---|
| 1392 |
|
---|
[c1f38e6c] | 1393 | if ( unlikely( nalign < libAlign() ) ) nalign = libAlign(); // reset alignment to minimum
|
---|
[cfbc703d] | 1394 | #ifdef __CFA_DEBUG__
|
---|
[709b812] | 1395 | else checkAlign( nalign ); // check alignment
|
---|
[cfbc703d] | 1396 | #endif // __CFA_DEBUG__
|
---|
| 1397 |
|
---|
[c86f587] | 1398 | if ( unlikely( oaddr == 0p ) ) {
|
---|
| 1399 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 1400 | __atomic_add_fetch( &stats.realloc_calls, 1, __ATOMIC_SEQ_CST );
|
---|
| 1401 | __atomic_add_fetch( &stats.realloc_storage_request, size, __ATOMIC_SEQ_CST );
|
---|
[c86f587] | 1402 | #endif // __STATISTICS__
|
---|
| 1403 | return memalignNoStats( nalign, size );
|
---|
| 1404 | } // if
|
---|
| 1405 |
|
---|
[92847f7] | 1406 | // Attempt to reuse existing alignment.
|
---|
[19e5d65d] | 1407 | Heap.Storage.Header * header = HeaderAddr( oaddr );
|
---|
| 1408 | bool isFakeHeader = AlignmentBit( header ); // old fake header ?
|
---|
[92847f7] | 1409 | size_t oalign;
|
---|
[19e5d65d] | 1410 | if ( unlikely( isFakeHeader ) ) {
|
---|
| 1411 | oalign = ClearAlignmentBit( header ); // old alignment
|
---|
| 1412 | if ( unlikely( (uintptr_t)oaddr % nalign == 0 // lucky match ?
|
---|
[92847f7] | 1413 | && ( oalign <= nalign // going down
|
---|
| 1414 | || (oalign >= nalign && oalign <= 256) ) // little alignment storage wasted ?
|
---|
[19e5d65d] | 1415 | ) ) {
|
---|
| 1416 | HeaderAddr( oaddr )->kind.fake.alignment = MarkAlignmentBit( nalign ); // update alignment (could be the same)
|
---|
| 1417 | return realloc( oaddr, size ); // duplicate special case checks
|
---|
[92847f7] | 1418 | } // if
|
---|
| 1419 | } else if ( ! isFakeHeader // old real header (aligned on libAlign) ?
|
---|
[19e5d65d] | 1420 | && nalign == libAlign() ) { // new alignment also on libAlign => no fake header needed
|
---|
| 1421 | return realloc( oaddr, size ); // duplicate special case checks
|
---|
| 1422 | } // if
|
---|
[cfbc703d] | 1423 |
|
---|
[1e034d9] | 1424 | #ifdef __STATISTICS__
|
---|
[31a5f418] | 1425 | __atomic_add_fetch( &stats.realloc_calls, 1, __ATOMIC_SEQ_CST );
|
---|
| 1426 | __atomic_add_fetch( &stats.realloc_storage_request, size, __ATOMIC_SEQ_CST );
|
---|
[1e034d9] | 1427 | #endif // __STATISTICS__
|
---|
| 1428 |
|
---|
[31a5f418] | 1429 | Heap.FreeHeader * freeElem;
|
---|
[92847f7] | 1430 | size_t bsize;
|
---|
| 1431 | headers( "realloc", oaddr, header, freeElem, bsize, oalign );
|
---|
| 1432 |
|
---|
| 1433 | // change size and copy old content to new storage
|
---|
| 1434 |
|
---|
[dd23e66] | 1435 | size_t osize = header->kind.real.size; // old allocation size
|
---|
[19e5d65d] | 1436 | bool ozfill = ZeroFillBit( header ); // old allocation zero filled
|
---|
[dd23e66] | 1437 |
|
---|
| 1438 | void * naddr = memalignNoStats( nalign, size ); // create new aligned area
|
---|
[95eb7cf] | 1439 |
|
---|
[1e034d9] | 1440 | headers( "realloc", naddr, header, freeElem, bsize, oalign );
|
---|
[47dd0d2] | 1441 | memcpy( naddr, oaddr, min( osize, size ) ); // copy bytes
|
---|
[1e034d9] | 1442 | free( oaddr );
|
---|
[d5d3a90] | 1443 |
|
---|
| 1444 | if ( unlikely( ozfill ) ) { // previous request zero fill ?
|
---|
[19e5d65d] | 1445 | MarkZeroFilledBit( header ); // mark new request as zero filled
|
---|
[d5d3a90] | 1446 | if ( size > osize ) { // previous request larger ?
|
---|
[e4b6b7d3] | 1447 | memset( (char *)naddr + osize, '\0', size - osize ); // initialize added storage
|
---|
[d5d3a90] | 1448 | } // if
|
---|
| 1449 | } // if
|
---|
[1e034d9] | 1450 | return naddr;
|
---|
[95eb7cf] | 1451 | } // realloc
|
---|
| 1452 |
|
---|
| 1453 |
|
---|
[c4f68dc] | 1454 | // Local Variables: //
|
---|
| 1455 | // tab-width: 4 //
|
---|
[f8cd310] | 1456 | // compile-command: "cfa -nodebug -O2 heap.cfa" //
|
---|
[c4f68dc] | 1457 | // End: //
|
---|