Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
S
Slurm
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Package Registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
tud-zih-energy
Slurm
Commits
77514a32
Commit
77514a32
authored
22 years ago
by
Mark Grondona
Browse files
Options
Downloads
Patches
Plain Diff
xmalloc routines, Initial revision
parent
ed5e373c
No related branches found
No related tags found
No related merge requests found
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
src/common/xmalloc.c
+138
-0
138 additions, 0 deletions
src/common/xmalloc.c
src/common/xmalloc.h
+37
-0
37 additions, 0 deletions
src/common/xmalloc.h
with
175 additions
and
0 deletions
src/common/xmalloc.c
0 → 100644
+
138
−
0
View file @
77514a32
/* $Id$ */
/* xmalloc.c: enhanced malloc routines
**
** Mark Grondona <mgrondona@llnl.gov>
**
** Started with Jim Garlick's xmalloc and tied into slurm log facility.
** Also added ability to print file, line, and function of call.
*/
#if HAVE_CONFIG_H
# include "config.h"
#endif
#include
<stdlib.h>
#include
<errno.h>
#include
<string.h>
#include
<stdio.h>
#include
<limits.h>
/* for INT_MAX */
#include
<src/common/xmalloc.h>
#include
<src/common/log.h>
#if HAVE_UNSAFE_MALLOC
# include <pthread.h>
static
pthread_mutex_t
malloc_lock
=
PTHREAD_MUTEX_INITIALIZER
;
# define MALLOC_LOCK() pthread_mutex_lock(&malloc_lock)
# define MALLOC_UNLOCK() pthread_mutex_unlock(&malloc_lock)
#else
# define MALLOC_LOCK()
# define MALLOC_UNLOCK()
#endif
static
void
malloc_assert_failed
(
char
*
,
const
char
*
,
int
,
const
char
*
,
const
char
*
);
#define xmalloc_assert(expr, _file, _line, _func) _STMT_START { \
(expr) ? ((void)(0)) : \
malloc_assert_failed(__STRING(expr), _file, _line, _func, \
__CURRENT_FUNC__) \
} _STMT_END
/*
* "Safe" version of malloc().
* size (IN) number of bytes to malloc
* RETURN pointer to allocate heap space
*/
void
*
_xmalloc
(
size_t
size
,
const
char
*
file
,
int
line
,
const
char
*
func
)
{
void
*
new
;
int
*
p
;
xmalloc_assert
(
size
>
0
&&
size
<=
INT_MAX
,
file
,
line
,
func
);
MALLOC_LOCK
();
p
=
(
int
*
)
malloc
(
size
+
2
*
sizeof
(
int
));
MALLOC_UNLOCK
();
if
(
!
p
)
{
fprintf
(
stderr
,
"%s:%d: %s: xmalloc(%d) failed
\n
"
,
file
,
line
,
func
,
(
int
)
size
);
exit
(
1
);
}
p
[
0
]
=
XMALLOC_MAGIC
;
/* add "secret" magic cookie */
p
[
1
]
=
size
;
/* store size in buffer */
new
=
&
p
[
2
];
memset
(
new
,
0
,
size
);
return
new
;
}
/*
* "Safe" version of realloc(). Args are different: pass in a pointer to
* the object to be realloced instead of the object itself.
* item (IN/OUT) double-pointer to allocated space
* newsize (IN) requested size
*/
void
_xrealloc
(
void
**
item
,
size_t
newsize
,
const
char
*
file
,
int
line
,
const
char
*
func
)
{
int
*
p
=
(
int
*
)
*
item
-
2
;
xmalloc_assert
(
*
item
!=
NULL
,
file
,
line
,
func
);
xmalloc_assert
(
newsize
>
0
&&
newsize
<=
INT_MAX
,
file
,
line
,
func
);
/* magic cookie still there? */
xmalloc_assert
(
p
[
0
]
==
XMALLOC_MAGIC
,
file
,
line
,
func
);
MALLOC_LOCK
();
p
=
(
int
*
)
realloc
(
p
,
newsize
+
2
*
sizeof
(
int
));
MALLOC_UNLOCK
();
if
(
!
p
)
{
fprintf
(
stderr
,
"%s:%d: %s: xrealloc(%d) failed
\n
"
,
file
,
line
,
func
,
(
int
)
newsize
);
exit
(
1
);
}
xmalloc_assert
(
p
[
0
]
==
XMALLOC_MAGIC
,
file
,
line
,
func
);
p
[
1
]
=
newsize
;
*
item
=
&
p
[
2
];
}
/*
* Return the size of a buffer.
* item (IN) pointer to allocated space
*/
int
_xsize
(
void
*
item
,
const
char
*
file
,
int
line
,
const
char
*
func
)
{
int
*
p
=
(
int
*
)
item
-
2
;
xmalloc_assert
(
item
!=
NULL
,
file
,
line
,
func
);
xmalloc_assert
(
p
[
0
]
==
XMALLOC_MAGIC
,
file
,
line
,
func
);
return
p
[
1
];
}
/*
* Free which takes a pointer to object to free, which it turns into a null
* object.
* item (IN/OUT) double-pointer to allocated space
*/
void
_xfree
(
void
**
item
,
const
char
*
file
,
int
line
,
const
char
*
func
)
{
int
*
p
=
(
int
*
)
*
item
-
2
;
if
(
*
item
!=
NULL
)
{
/* magic cookie still there? */
xmalloc_assert
(
p
[
0
]
==
XMALLOC_MAGIC
,
file
,
line
,
func
);
MALLOC_LOCK
();
free
(
p
);
MALLOC_UNLOCK
();
*
item
=
NULL
;
}
}
static
void
malloc_assert_failed
(
char
*
expr
,
const
char
*
file
,
int
line
,
const
char
*
caller
,
const
char
*
func
)
{
fatal
(
"malloc error: %s:%d: %s() caused assertion (%s) to fail in %s()"
,
file
,
line
,
caller
,
expr
,
func
);
abort
();
}
This diff is collapsed.
Click to expand it.
src/common/xmalloc.h
0 → 100644
+
37
−
0
View file @
77514a32
/* $Id$ */
/*
** enhanced malloc routines for slurm
**
** o attempt to report file, line, and calling function on error
** o use configurable slurm log facility for reporting error
**
*/
#ifndef _XMALLOC_H
#define _XMALLOC_H
#if HAVE_SYS_TYPES_H
# include <sys/types.h>
#endif
#include
<src/common/macros.h>
#define xmalloc(__sz) \
_xmalloc (__sz, __FILE__, __LINE__, __CURRENT_FUNC__)
#define xfree(__p) \
_xfree((void **)&(__p), __FILE__, __LINE__, __CURRENT_FUNC__)
#define xrealloc(__p, __sz) \
_xrealloc((void **)&(__p), __sz, __FILE__, __LINE__, __CURRENT_FUNC__)
#define xsize(__p) \
_xsize((void *)__p, __FILE__, __LINE__, __CURRENT_FUNC__)
void
*
_xmalloc
(
size_t
size
,
const
char
*
file
,
int
line
,
const
char
*
func
);
void
_xfree
(
void
**
p
,
const
char
*
file
,
int
line
,
const
char
*
func
);
void
_xrealloc
(
void
**
p
,
size_t
newsize
,
const
char
*
file
,
int
line
,
const
char
*
func
);
int
_xsize
(
void
*
p
,
const
char
*
file
,
int
line
,
const
char
*
func
);
#define XMALLOC_MAGIC 0x42
#endif
/* !_XMALLOC_H */
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment