jemalloc.c revision 296221
1#define	JEMALLOC_C_
2#include "jemalloc/internal/jemalloc_internal.h"
3
4/******************************************************************************/
5/* Data. */
6
7/* Work around <http://llvm.org/bugs/show_bug.cgi?id=12623>: */
8const char	*__malloc_options_1_0 = NULL;
9__sym_compat(_malloc_options, __malloc_options_1_0, FBSD_1.0);
10
11/* Runtime configuration options. */
12const char	*je_malloc_conf JEMALLOC_ATTR(weak);
13bool	opt_abort =
14#ifdef JEMALLOC_DEBUG
15    true
16#else
17    false
18#endif
19    ;
20const char	*opt_junk =
21#if (defined(JEMALLOC_DEBUG) && defined(JEMALLOC_FILL))
22    "true"
23#else
24    "false"
25#endif
26    ;
27bool	opt_junk_alloc =
28#if (defined(JEMALLOC_DEBUG) && defined(JEMALLOC_FILL))
29    true
30#else
31    false
32#endif
33    ;
34bool	opt_junk_free =
35#if (defined(JEMALLOC_DEBUG) && defined(JEMALLOC_FILL))
36    true
37#else
38    false
39#endif
40    ;
41
42size_t	opt_quarantine = ZU(0);
43bool	opt_redzone = false;
44bool	opt_utrace = false;
45bool	opt_xmalloc = false;
46bool	opt_zero = false;
47unsigned	opt_narenas = 0;
48
49/* Initialized to true if the process is running inside Valgrind. */
50bool	in_valgrind;
51
52unsigned	ncpus;
53
54/* Protects arenas initialization. */
55static malloc_mutex_t	arenas_lock;
56/*
57 * Arenas that are used to service external requests.  Not all elements of the
58 * arenas array are necessarily used; arenas are created lazily as needed.
59 *
60 * arenas[0..narenas_auto) are used for automatic multiplexing of threads and
61 * arenas.  arenas[narenas_auto..narenas_total) are only used if the application
62 * takes some action to create them and allocate from them.
63 */
64arena_t			**arenas;
65static unsigned		narenas_total; /* Use narenas_total_*(). */
66static arena_t		*a0; /* arenas[0]; read-only after initialization. */
67static unsigned		narenas_auto; /* Read-only after initialization. */
68
69typedef enum {
70	malloc_init_uninitialized	= 3,
71	malloc_init_a0_initialized	= 2,
72	malloc_init_recursible		= 1,
73	malloc_init_initialized		= 0 /* Common case --> jnz. */
74} malloc_init_t;
75static malloc_init_t	malloc_init_state = malloc_init_uninitialized;
76
77/* 0 should be the common case.  Set to true to trigger initialization. */
78static bool	malloc_slow = true;
79
80/* When malloc_slow != 0, set the corresponding bits for sanity check. */
81enum {
82	flag_opt_junk_alloc	= (1U),
83	flag_opt_junk_free	= (1U << 1),
84	flag_opt_quarantine	= (1U << 2),
85	flag_opt_zero		= (1U << 3),
86	flag_opt_utrace		= (1U << 4),
87	flag_in_valgrind	= (1U << 5),
88	flag_opt_xmalloc	= (1U << 6)
89};
90static uint8_t	malloc_slow_flags;
91
92/* Last entry for overflow detection only.  */
93JEMALLOC_ALIGNED(CACHELINE)
94const size_t	index2size_tab[NSIZES+1] = {
95#define	SC(index, lg_grp, lg_delta, ndelta, bin, lg_delta_lookup) \
96	((ZU(1)<<lg_grp) + (ZU(ndelta)<<lg_delta)),
97	SIZE_CLASSES
98#undef SC
99	ZU(0)
100};
101
102JEMALLOC_ALIGNED(CACHELINE)
103const uint8_t	size2index_tab[] = {
104#if LG_TINY_MIN == 0
105#warning "Dangerous LG_TINY_MIN"
106#define	S2B_0(i)	i,
107#elif LG_TINY_MIN == 1
108#warning "Dangerous LG_TINY_MIN"
109#define	S2B_1(i)	i,
110#elif LG_TINY_MIN == 2
111#warning "Dangerous LG_TINY_MIN"
112#define	S2B_2(i)	i,
113#elif LG_TINY_MIN == 3
114#define	S2B_3(i)	i,
115#elif LG_TINY_MIN == 4
116#define	S2B_4(i)	i,
117#elif LG_TINY_MIN == 5
118#define	S2B_5(i)	i,
119#elif LG_TINY_MIN == 6
120#define	S2B_6(i)	i,
121#elif LG_TINY_MIN == 7
122#define	S2B_7(i)	i,
123#elif LG_TINY_MIN == 8
124#define	S2B_8(i)	i,
125#elif LG_TINY_MIN == 9
126#define	S2B_9(i)	i,
127#elif LG_TINY_MIN == 10
128#define	S2B_10(i)	i,
129#elif LG_TINY_MIN == 11
130#define	S2B_11(i)	i,
131#else
132#error "Unsupported LG_TINY_MIN"
133#endif
134#if LG_TINY_MIN < 1
135#define	S2B_1(i)	S2B_0(i) S2B_0(i)
136#endif
137#if LG_TINY_MIN < 2
138#define	S2B_2(i)	S2B_1(i) S2B_1(i)
139#endif
140#if LG_TINY_MIN < 3
141#define	S2B_3(i)	S2B_2(i) S2B_2(i)
142#endif
143#if LG_TINY_MIN < 4
144#define	S2B_4(i)	S2B_3(i) S2B_3(i)
145#endif
146#if LG_TINY_MIN < 5
147#define	S2B_5(i)	S2B_4(i) S2B_4(i)
148#endif
149#if LG_TINY_MIN < 6
150#define	S2B_6(i)	S2B_5(i) S2B_5(i)
151#endif
152#if LG_TINY_MIN < 7
153#define	S2B_7(i)	S2B_6(i) S2B_6(i)
154#endif
155#if LG_TINY_MIN < 8
156#define	S2B_8(i)	S2B_7(i) S2B_7(i)
157#endif
158#if LG_TINY_MIN < 9
159#define	S2B_9(i)	S2B_8(i) S2B_8(i)
160#endif
161#if LG_TINY_MIN < 10
162#define	S2B_10(i)	S2B_9(i) S2B_9(i)
163#endif
164#if LG_TINY_MIN < 11
165#define	S2B_11(i)	S2B_10(i) S2B_10(i)
166#endif
167#define	S2B_no(i)
168#define	SC(index, lg_grp, lg_delta, ndelta, bin, lg_delta_lookup) \
169	S2B_##lg_delta_lookup(index)
170	SIZE_CLASSES
171#undef S2B_3
172#undef S2B_4
173#undef S2B_5
174#undef S2B_6
175#undef S2B_7
176#undef S2B_8
177#undef S2B_9
178#undef S2B_10
179#undef S2B_11
180#undef S2B_no
181#undef SC
182};
183
184#ifdef JEMALLOC_THREADED_INIT
185/* Used to let the initializing thread recursively allocate. */
186#  define NO_INITIALIZER	((unsigned long)0)
187#  define INITIALIZER		pthread_self()
188#  define IS_INITIALIZER	(malloc_initializer == pthread_self())
189static pthread_t		malloc_initializer = NO_INITIALIZER;
190#else
191#  define NO_INITIALIZER	false
192#  define INITIALIZER		true
193#  define IS_INITIALIZER	malloc_initializer
194static bool			malloc_initializer = NO_INITIALIZER;
195#endif
196
197/* Used to avoid initialization races. */
198#ifdef _WIN32
199#if _WIN32_WINNT >= 0x0600
200static malloc_mutex_t	init_lock = SRWLOCK_INIT;
201#else
202static malloc_mutex_t	init_lock;
203static bool init_lock_initialized = false;
204
205JEMALLOC_ATTR(constructor)
206static void WINAPI
207_init_init_lock(void)
208{
209
210	/* If another constructor in the same binary is using mallctl to
211	 * e.g. setup chunk hooks, it may end up running before this one,
212	 * and malloc_init_hard will crash trying to lock the uninitialized
213	 * lock. So we force an initialization of the lock in
214	 * malloc_init_hard as well. We don't try to care about atomicity
215	 * of the accessed to the init_lock_initialized boolean, since it
216	 * really only matters early in the process creation, before any
217	 * separate thread normally starts doing anything. */
218	if (!init_lock_initialized)
219		malloc_mutex_init(&init_lock);
220	init_lock_initialized = true;
221}
222
223#ifdef _MSC_VER
224#  pragma section(".CRT$XCU", read)
225JEMALLOC_SECTION(".CRT$XCU") JEMALLOC_ATTR(used)
226static const void (WINAPI *init_init_lock)(void) = _init_init_lock;
227#endif
228#endif
229#else
230static malloc_mutex_t	init_lock = MALLOC_MUTEX_INITIALIZER;
231#endif
232
233typedef struct {
234	void	*p;	/* Input pointer (as in realloc(p, s)). */
235	size_t	s;	/* Request size. */
236	void	*r;	/* Result pointer. */
237} malloc_utrace_t;
238
239#ifdef JEMALLOC_UTRACE
240#  define UTRACE(a, b, c) do {						\
241	if (unlikely(opt_utrace)) {					\
242		int utrace_serrno = errno;				\
243		malloc_utrace_t ut;					\
244		ut.p = (a);						\
245		ut.s = (b);						\
246		ut.r = (c);						\
247		utrace(&ut, sizeof(ut));				\
248		errno = utrace_serrno;					\
249	}								\
250} while (0)
251#else
252#  define UTRACE(a, b, c)
253#endif
254
255/******************************************************************************/
256/*
257 * Function prototypes for static functions that are referenced prior to
258 * definition.
259 */
260
261static bool	malloc_init_hard_a0(void);
262static bool	malloc_init_hard(void);
263
264/******************************************************************************/
265/*
266 * Begin miscellaneous support functions.
267 */
268
269JEMALLOC_ALWAYS_INLINE_C bool
270malloc_initialized(void)
271{
272
273	return (malloc_init_state == malloc_init_initialized);
274}
275
276JEMALLOC_ALWAYS_INLINE_C void
277malloc_thread_init(void)
278{
279
280	/*
281	 * TSD initialization can't be safely done as a side effect of
282	 * deallocation, because it is possible for a thread to do nothing but
283	 * deallocate its TLS data via free(), in which case writing to TLS
284	 * would cause write-after-free memory corruption.  The quarantine
285	 * facility *only* gets used as a side effect of deallocation, so make
286	 * a best effort attempt at initializing its TSD by hooking all
287	 * allocation events.
288	 */
289	if (config_fill && unlikely(opt_quarantine))
290		quarantine_alloc_hook();
291}
292
293JEMALLOC_ALWAYS_INLINE_C bool
294malloc_init_a0(void)
295{
296
297	if (unlikely(malloc_init_state == malloc_init_uninitialized))
298		return (malloc_init_hard_a0());
299	return (false);
300}
301
302JEMALLOC_ALWAYS_INLINE_C bool
303malloc_init(void)
304{
305
306	if (unlikely(!malloc_initialized()) && malloc_init_hard())
307		return (true);
308	malloc_thread_init();
309
310	return (false);
311}
312
313/*
314 * The a0*() functions are used instead of i[mcd]alloc() in situations that
315 * cannot tolerate TLS variable access.
316 */
317
318static void *
319a0ialloc(size_t size, bool zero, bool is_metadata)
320{
321
322	if (unlikely(malloc_init_a0()))
323		return (NULL);
324
325	return (iallocztm(NULL, size, size2index(size), zero, false,
326	    is_metadata, arena_get(0, false), true));
327}
328
329static void
330a0idalloc(void *ptr, bool is_metadata)
331{
332
333	idalloctm(NULL, ptr, false, is_metadata, true);
334}
335
336void *
337a0malloc(size_t size)
338{
339
340	return (a0ialloc(size, false, true));
341}
342
343void
344a0dalloc(void *ptr)
345{
346
347	a0idalloc(ptr, true);
348}
349
350/*
351 * FreeBSD's libc uses the bootstrap_*() functions in bootstrap-senstive
352 * situations that cannot tolerate TLS variable access (TLS allocation and very
353 * early internal data structure initialization).
354 */
355
356void *
357bootstrap_malloc(size_t size)
358{
359
360	if (unlikely(size == 0))
361		size = 1;
362
363	return (a0ialloc(size, false, false));
364}
365
366void *
367bootstrap_calloc(size_t num, size_t size)
368{
369	size_t num_size;
370
371	num_size = num * size;
372	if (unlikely(num_size == 0)) {
373		assert(num == 0 || size == 0);
374		num_size = 1;
375	}
376
377	return (a0ialloc(num_size, true, false));
378}
379
380void
381bootstrap_free(void *ptr)
382{
383
384	if (unlikely(ptr == NULL))
385		return;
386
387	a0idalloc(ptr, false);
388}
389
390static void
391arena_set(unsigned ind, arena_t *arena)
392{
393
394	atomic_write_p((void **)&arenas[ind], arena);
395}
396
397static void
398narenas_total_set(unsigned narenas)
399{
400
401	atomic_write_u(&narenas_total, narenas);
402}
403
404static void
405narenas_total_inc(void)
406{
407
408	atomic_add_u(&narenas_total, 1);
409}
410
411unsigned
412narenas_total_get(void)
413{
414
415	return (atomic_read_u(&narenas_total));
416}
417
418/* Create a new arena and insert it into the arenas array at index ind. */
419static arena_t *
420arena_init_locked(unsigned ind)
421{
422	arena_t *arena;
423
424	assert(ind <= narenas_total_get());
425	if (ind > MALLOCX_ARENA_MAX)
426		return (NULL);
427	if (ind == narenas_total_get())
428		narenas_total_inc();
429
430	/*
431	 * Another thread may have already initialized arenas[ind] if it's an
432	 * auto arena.
433	 */
434	arena = arena_get(ind, false);
435	if (arena != NULL) {
436		assert(ind < narenas_auto);
437		return (arena);
438	}
439
440	/* Actually initialize the arena. */
441	arena = arena_new(ind);
442	arena_set(ind, arena);
443	return (arena);
444}
445
446arena_t *
447arena_init(unsigned ind)
448{
449	arena_t *arena;
450
451	malloc_mutex_lock(&arenas_lock);
452	arena = arena_init_locked(ind);
453	malloc_mutex_unlock(&arenas_lock);
454	return (arena);
455}
456
457static void
458arena_bind(tsd_t *tsd, unsigned ind)
459{
460	arena_t *arena;
461
462	arena = arena_get(ind, false);
463	arena_nthreads_inc(arena);
464
465	if (tsd_nominal(tsd))
466		tsd_arena_set(tsd, arena);
467}
468
469void
470arena_migrate(tsd_t *tsd, unsigned oldind, unsigned newind)
471{
472	arena_t *oldarena, *newarena;
473
474	oldarena = arena_get(oldind, false);
475	newarena = arena_get(newind, false);
476	arena_nthreads_dec(oldarena);
477	arena_nthreads_inc(newarena);
478	tsd_arena_set(tsd, newarena);
479}
480
481static void
482arena_unbind(tsd_t *tsd, unsigned ind)
483{
484	arena_t *arena;
485
486	arena = arena_get(ind, false);
487	arena_nthreads_dec(arena);
488	tsd_arena_set(tsd, NULL);
489}
490
491arena_tdata_t *
492arena_tdata_get_hard(tsd_t *tsd, unsigned ind)
493{
494	arena_tdata_t *tdata, *arenas_tdata_old;
495	arena_tdata_t *arenas_tdata = tsd_arenas_tdata_get(tsd);
496	unsigned narenas_tdata_old, i;
497	unsigned narenas_tdata = tsd_narenas_tdata_get(tsd);
498	unsigned narenas_actual = narenas_total_get();
499
500	/*
501	 * Dissociate old tdata array (and set up for deallocation upon return)
502	 * if it's too small.
503	 */
504	if (arenas_tdata != NULL && narenas_tdata < narenas_actual) {
505		arenas_tdata_old = arenas_tdata;
506		narenas_tdata_old = narenas_tdata;
507		arenas_tdata = NULL;
508		narenas_tdata = 0;
509		tsd_arenas_tdata_set(tsd, arenas_tdata);
510		tsd_narenas_tdata_set(tsd, narenas_tdata);
511	} else {
512		arenas_tdata_old = NULL;
513		narenas_tdata_old = 0;
514	}
515
516	/* Allocate tdata array if it's missing. */
517	if (arenas_tdata == NULL) {
518		bool *arenas_tdata_bypassp = tsd_arenas_tdata_bypassp_get(tsd);
519		narenas_tdata = (ind < narenas_actual) ? narenas_actual : ind+1;
520
521		if (tsd_nominal(tsd) && !*arenas_tdata_bypassp) {
522			*arenas_tdata_bypassp = true;
523			arenas_tdata = (arena_tdata_t *)a0malloc(
524			    sizeof(arena_tdata_t) * narenas_tdata);
525			*arenas_tdata_bypassp = false;
526		}
527		if (arenas_tdata == NULL) {
528			tdata = NULL;
529			goto label_return;
530		}
531		assert(tsd_nominal(tsd) && !*arenas_tdata_bypassp);
532		tsd_arenas_tdata_set(tsd, arenas_tdata);
533		tsd_narenas_tdata_set(tsd, narenas_tdata);
534	}
535
536	/*
537	 * Copy to tdata array.  It's possible that the actual number of arenas
538	 * has increased since narenas_total_get() was called above, but that
539	 * causes no correctness issues unless two threads concurrently execute
540	 * the arenas.extend mallctl, which we trust mallctl synchronization to
541	 * prevent.
542	 */
543
544	/* Copy/initialize tickers. */
545	for (i = 0; i < narenas_actual; i++) {
546		if (i < narenas_tdata_old) {
547			ticker_copy(&arenas_tdata[i].decay_ticker,
548			    &arenas_tdata_old[i].decay_ticker);
549		} else {
550			ticker_init(&arenas_tdata[i].decay_ticker,
551			    DECAY_NTICKS_PER_UPDATE);
552		}
553	}
554	if (narenas_tdata > narenas_actual) {
555		memset(&arenas_tdata[narenas_actual], 0, sizeof(arena_tdata_t)
556		    * (narenas_tdata - narenas_actual));
557	}
558
559	/* Read the refreshed tdata array. */
560	tdata = &arenas_tdata[ind];
561label_return:
562	if (arenas_tdata_old != NULL)
563		a0dalloc(arenas_tdata_old);
564	return (tdata);
565}
566
567/* Slow path, called only by arena_choose(). */
568arena_t *
569arena_choose_hard(tsd_t *tsd)
570{
571	arena_t *ret;
572
573	if (narenas_auto > 1) {
574		unsigned i, choose, first_null;
575
576		choose = 0;
577		first_null = narenas_auto;
578		malloc_mutex_lock(&arenas_lock);
579		assert(arena_get(0, false) != NULL);
580		for (i = 1; i < narenas_auto; i++) {
581			if (arena_get(i, false) != NULL) {
582				/*
583				 * Choose the first arena that has the lowest
584				 * number of threads assigned to it.
585				 */
586				if (arena_nthreads_get(arena_get(i, false)) <
587				    arena_nthreads_get(arena_get(choose,
588				    false)))
589					choose = i;
590			} else if (first_null == narenas_auto) {
591				/*
592				 * Record the index of the first uninitialized
593				 * arena, in case all extant arenas are in use.
594				 *
595				 * NB: It is possible for there to be
596				 * discontinuities in terms of initialized
597				 * versus uninitialized arenas, due to the
598				 * "thread.arena" mallctl.
599				 */
600				first_null = i;
601			}
602		}
603
604		if (arena_nthreads_get(arena_get(choose, false)) == 0
605		    || first_null == narenas_auto) {
606			/*
607			 * Use an unloaded arena, or the least loaded arena if
608			 * all arenas are already initialized.
609			 */
610			ret = arena_get(choose, false);
611		} else {
612			/* Initialize a new arena. */
613			choose = first_null;
614			ret = arena_init_locked(choose);
615			if (ret == NULL) {
616				malloc_mutex_unlock(&arenas_lock);
617				return (NULL);
618			}
619		}
620		arena_bind(tsd, choose);
621		malloc_mutex_unlock(&arenas_lock);
622	} else {
623		ret = arena_get(0, false);
624		arena_bind(tsd, 0);
625	}
626
627	return (ret);
628}
629
630void
631thread_allocated_cleanup(tsd_t *tsd)
632{
633
634	/* Do nothing. */
635}
636
637void
638thread_deallocated_cleanup(tsd_t *tsd)
639{
640
641	/* Do nothing. */
642}
643
644void
645arena_cleanup(tsd_t *tsd)
646{
647	arena_t *arena;
648
649	arena = tsd_arena_get(tsd);
650	if (arena != NULL)
651		arena_unbind(tsd, arena->ind);
652}
653
654void
655arenas_tdata_cleanup(tsd_t *tsd)
656{
657	arena_tdata_t *arenas_tdata;
658
659	/* Prevent tsd->arenas_tdata from being (re)created. */
660	*tsd_arenas_tdata_bypassp_get(tsd) = true;
661
662	arenas_tdata = tsd_arenas_tdata_get(tsd);
663	if (arenas_tdata != NULL) {
664		tsd_arenas_tdata_set(tsd, NULL);
665		a0dalloc(arenas_tdata);
666	}
667}
668
669void
670narenas_tdata_cleanup(tsd_t *tsd)
671{
672
673	/* Do nothing. */
674}
675
676void
677arenas_tdata_bypass_cleanup(tsd_t *tsd)
678{
679
680	/* Do nothing. */
681}
682
683static void
684stats_print_atexit(void)
685{
686
687	if (config_tcache && config_stats) {
688		unsigned narenas, i;
689
690		/*
691		 * Merge stats from extant threads.  This is racy, since
692		 * individual threads do not lock when recording tcache stats
693		 * events.  As a consequence, the final stats may be slightly
694		 * out of date by the time they are reported, if other threads
695		 * continue to allocate.
696		 */
697		for (i = 0, narenas = narenas_total_get(); i < narenas; i++) {
698			arena_t *arena = arena_get(i, false);
699			if (arena != NULL) {
700				tcache_t *tcache;
701
702				/*
703				 * tcache_stats_merge() locks bins, so if any
704				 * code is introduced that acquires both arena
705				 * and bin locks in the opposite order,
706				 * deadlocks may result.
707				 */
708				malloc_mutex_lock(&arena->lock);
709				ql_foreach(tcache, &arena->tcache_ql, link) {
710					tcache_stats_merge(tcache, arena);
711				}
712				malloc_mutex_unlock(&arena->lock);
713			}
714		}
715	}
716	je_malloc_stats_print(NULL, NULL, NULL);
717}
718
719/*
720 * End miscellaneous support functions.
721 */
722/******************************************************************************/
723/*
724 * Begin initialization functions.
725 */
726
727#ifndef JEMALLOC_HAVE_SECURE_GETENV
728static char *
729secure_getenv(const char *name)
730{
731
732#  ifdef JEMALLOC_HAVE_ISSETUGID
733	if (issetugid() != 0)
734		return (NULL);
735#  endif
736	return (getenv(name));
737}
738#endif
739
740static unsigned
741malloc_ncpus(void)
742{
743	long result;
744
745#ifdef _WIN32
746	SYSTEM_INFO si;
747	GetSystemInfo(&si);
748	result = si.dwNumberOfProcessors;
749#else
750	result = sysconf(_SC_NPROCESSORS_ONLN);
751#endif
752	return ((result == -1) ? 1 : (unsigned)result);
753}
754
755static bool
756malloc_conf_next(char const **opts_p, char const **k_p, size_t *klen_p,
757    char const **v_p, size_t *vlen_p)
758{
759	bool accept;
760	const char *opts = *opts_p;
761
762	*k_p = opts;
763
764	for (accept = false; !accept;) {
765		switch (*opts) {
766		case 'A': case 'B': case 'C': case 'D': case 'E': case 'F':
767		case 'G': case 'H': case 'I': case 'J': case 'K': case 'L':
768		case 'M': case 'N': case 'O': case 'P': case 'Q': case 'R':
769		case 'S': case 'T': case 'U': case 'V': case 'W': case 'X':
770		case 'Y': case 'Z':
771		case 'a': case 'b': case 'c': case 'd': case 'e': case 'f':
772		case 'g': case 'h': case 'i': case 'j': case 'k': case 'l':
773		case 'm': case 'n': case 'o': case 'p': case 'q': case 'r':
774		case 's': case 't': case 'u': case 'v': case 'w': case 'x':
775		case 'y': case 'z':
776		case '0': case '1': case '2': case '3': case '4': case '5':
777		case '6': case '7': case '8': case '9':
778		case '_':
779			opts++;
780			break;
781		case ':':
782			opts++;
783			*klen_p = (uintptr_t)opts - 1 - (uintptr_t)*k_p;
784			*v_p = opts;
785			accept = true;
786			break;
787		case '\0':
788			if (opts != *opts_p) {
789				malloc_write("<jemalloc>: Conf string ends "
790				    "with key\n");
791			}
792			return (true);
793		default:
794			malloc_write("<jemalloc>: Malformed conf string\n");
795			return (true);
796		}
797	}
798
799	for (accept = false; !accept;) {
800		switch (*opts) {
801		case ',':
802			opts++;
803			/*
804			 * Look ahead one character here, because the next time
805			 * this function is called, it will assume that end of
806			 * input has been cleanly reached if no input remains,
807			 * but we have optimistically already consumed the
808			 * comma if one exists.
809			 */
810			if (*opts == '\0') {
811				malloc_write("<jemalloc>: Conf string ends "
812				    "with comma\n");
813			}
814			*vlen_p = (uintptr_t)opts - 1 - (uintptr_t)*v_p;
815			accept = true;
816			break;
817		case '\0':
818			*vlen_p = (uintptr_t)opts - (uintptr_t)*v_p;
819			accept = true;
820			break;
821		default:
822			opts++;
823			break;
824		}
825	}
826
827	*opts_p = opts;
828	return (false);
829}
830
831static void
832malloc_conf_error(const char *msg, const char *k, size_t klen, const char *v,
833    size_t vlen)
834{
835
836	malloc_printf("<jemalloc>: %s: %.*s:%.*s\n", msg, (int)klen, k,
837	    (int)vlen, v);
838}
839
840static void
841malloc_slow_flag_init(void)
842{
843	/*
844	 * Combine the runtime options into malloc_slow for fast path.  Called
845	 * after processing all the options.
846	 */
847	malloc_slow_flags |= (opt_junk_alloc ? flag_opt_junk_alloc : 0)
848	    | (opt_junk_free ? flag_opt_junk_free : 0)
849	    | (opt_quarantine ? flag_opt_quarantine : 0)
850	    | (opt_zero ? flag_opt_zero : 0)
851	    | (opt_utrace ? flag_opt_utrace : 0)
852	    | (opt_xmalloc ? flag_opt_xmalloc : 0);
853
854	if (config_valgrind)
855		malloc_slow_flags |= (in_valgrind ? flag_in_valgrind : 0);
856
857	malloc_slow = (malloc_slow_flags != 0);
858}
859
860static void
861malloc_conf_init(void)
862{
863	unsigned i;
864	char buf[PATH_MAX + 1];
865	const char *opts, *k, *v;
866	size_t klen, vlen;
867
868	/*
869	 * Automatically configure valgrind before processing options.  The
870	 * valgrind option remains in jemalloc 3.x for compatibility reasons.
871	 */
872	if (config_valgrind) {
873		in_valgrind = (RUNNING_ON_VALGRIND != 0) ? true : false;
874		if (config_fill && unlikely(in_valgrind)) {
875			opt_junk = "false";
876			opt_junk_alloc = false;
877			opt_junk_free = false;
878			assert(!opt_zero);
879			opt_quarantine = JEMALLOC_VALGRIND_QUARANTINE_DEFAULT;
880			opt_redzone = true;
881		}
882		if (config_tcache && unlikely(in_valgrind))
883			opt_tcache = false;
884	}
885
886	for (i = 0; i < 4; i++) {
887		/* Get runtime configuration. */
888		switch (i) {
889		case 0:
890			opts = config_malloc_conf;
891			break;
892		case 1:
893			if (je_malloc_conf != NULL) {
894				/*
895				 * Use options that were compiled into the
896				 * program.
897				 */
898				opts = je_malloc_conf;
899			} else {
900				/* No configuration specified. */
901				buf[0] = '\0';
902				opts = buf;
903			}
904			break;
905		case 2: {
906			ssize_t linklen = 0;
907#ifndef _WIN32
908			int saved_errno = errno;
909			const char *linkname =
910#  ifdef JEMALLOC_PREFIX
911			    "/etc/"JEMALLOC_PREFIX"malloc.conf"
912#  else
913			    "/etc/malloc.conf"
914#  endif
915			    ;
916
917			/*
918			 * Try to use the contents of the "/etc/malloc.conf"
919			 * symbolic link's name.
920			 */
921			linklen = readlink(linkname, buf, sizeof(buf) - 1);
922			if (linklen == -1) {
923				/* No configuration specified. */
924				linklen = 0;
925				/* Restore errno. */
926				set_errno(saved_errno);
927			}
928#endif
929			buf[linklen] = '\0';
930			opts = buf;
931			break;
932		} case 3: {
933			const char *envname =
934#ifdef JEMALLOC_PREFIX
935			    JEMALLOC_CPREFIX"MALLOC_CONF"
936#else
937			    "MALLOC_CONF"
938#endif
939			    ;
940
941			if ((opts = secure_getenv(envname)) != NULL) {
942				/*
943				 * Do nothing; opts is already initialized to
944				 * the value of the MALLOC_CONF environment
945				 * variable.
946				 */
947			} else {
948				/* No configuration specified. */
949				buf[0] = '\0';
950				opts = buf;
951			}
952			break;
953		} default:
954			not_reached();
955			buf[0] = '\0';
956			opts = buf;
957		}
958
959		while (*opts != '\0' && !malloc_conf_next(&opts, &k, &klen, &v,
960		    &vlen)) {
961#define	CONF_MATCH(n)							\
962	(sizeof(n)-1 == klen && strncmp(n, k, klen) == 0)
963#define	CONF_MATCH_VALUE(n)						\
964	(sizeof(n)-1 == vlen && strncmp(n, v, vlen) == 0)
965#define	CONF_HANDLE_BOOL(o, n, cont)					\
966			if (CONF_MATCH(n)) {				\
967				if (CONF_MATCH_VALUE("true"))		\
968					o = true;			\
969				else if (CONF_MATCH_VALUE("false"))	\
970					o = false;			\
971				else {					\
972					malloc_conf_error(		\
973					    "Invalid conf value",	\
974					    k, klen, v, vlen);		\
975				}					\
976				if (cont)				\
977					continue;			\
978			}
979#define	CONF_HANDLE_T_U(t, o, n, min, max, clip)			\
980			if (CONF_MATCH(n)) {				\
981				uintmax_t um;				\
982				char *end;				\
983									\
984				set_errno(0);				\
985				um = malloc_strtoumax(v, &end, 0);	\
986				if (get_errno() != 0 || (uintptr_t)end -\
987				    (uintptr_t)v != vlen) {		\
988					malloc_conf_error(		\
989					    "Invalid conf value",	\
990					    k, klen, v, vlen);		\
991				} else if (clip) {			\
992					if ((min) != 0 && um < (min))	\
993						o = (t)(min);		\
994					else if (um > (max))		\
995						o = (t)(max);		\
996					else				\
997						o = (t)um;		\
998				} else {				\
999					if (((min) != 0 && um < (min))	\
1000					    || um > (max)) {		\
1001						malloc_conf_error(	\
1002						    "Out-of-range "	\
1003						    "conf value",	\
1004						    k, klen, v, vlen);	\
1005					} else				\
1006						o = (t)um;		\
1007				}					\
1008				continue;				\
1009			}
1010#define	CONF_HANDLE_UNSIGNED(o, n, min, max, clip)			\
1011			CONF_HANDLE_T_U(unsigned, o, n, min, max, clip)
1012#define	CONF_HANDLE_SIZE_T(o, n, min, max, clip)			\
1013			CONF_HANDLE_T_U(size_t, o, n, min, max, clip)
1014#define	CONF_HANDLE_SSIZE_T(o, n, min, max)				\
1015			if (CONF_MATCH(n)) {				\
1016				long l;					\
1017				char *end;				\
1018									\
1019				set_errno(0);				\
1020				l = strtol(v, &end, 0);			\
1021				if (get_errno() != 0 || (uintptr_t)end -\
1022				    (uintptr_t)v != vlen) {		\
1023					malloc_conf_error(		\
1024					    "Invalid conf value",	\
1025					    k, klen, v, vlen);		\
1026				} else if (l < (ssize_t)(min) || l >	\
1027				    (ssize_t)(max)) {			\
1028					malloc_conf_error(		\
1029					    "Out-of-range conf value",	\
1030					    k, klen, v, vlen);		\
1031				} else					\
1032					o = l;				\
1033				continue;				\
1034			}
1035#define	CONF_HANDLE_CHAR_P(o, n, d)					\
1036			if (CONF_MATCH(n)) {				\
1037				size_t cpylen = (vlen <=		\
1038				    sizeof(o)-1) ? vlen :		\
1039				    sizeof(o)-1;			\
1040				strncpy(o, v, cpylen);			\
1041				o[cpylen] = '\0';			\
1042				continue;				\
1043			}
1044
1045			CONF_HANDLE_BOOL(opt_abort, "abort", true)
1046			/*
1047			 * Chunks always require at least one header page,
1048			 * as many as 2^(LG_SIZE_CLASS_GROUP+1) data pages, and
1049			 * possibly an additional page in the presence of
1050			 * redzones.  In order to simplify options processing,
1051			 * use a conservative bound that accommodates all these
1052			 * constraints.
1053			 */
1054			CONF_HANDLE_SIZE_T(opt_lg_chunk, "lg_chunk", LG_PAGE +
1055			    LG_SIZE_CLASS_GROUP + (config_fill ? 2 : 1),
1056			    (sizeof(size_t) << 3) - 1, true)
1057			if (strncmp("dss", k, klen) == 0) {
1058				int i;
1059				bool match = false;
1060				for (i = 0; i < dss_prec_limit; i++) {
1061					if (strncmp(dss_prec_names[i], v, vlen)
1062					    == 0) {
1063						if (chunk_dss_prec_set(i)) {
1064							malloc_conf_error(
1065							    "Error setting dss",
1066							    k, klen, v, vlen);
1067						} else {
1068							opt_dss =
1069							    dss_prec_names[i];
1070							match = true;
1071							break;
1072						}
1073					}
1074				}
1075				if (!match) {
1076					malloc_conf_error("Invalid conf value",
1077					    k, klen, v, vlen);
1078				}
1079				continue;
1080			}
1081			CONF_HANDLE_UNSIGNED(opt_narenas, "narenas", 1,
1082			    UINT_MAX, false)
1083			if (strncmp("purge", k, klen) == 0) {
1084				int i;
1085				bool match = false;
1086				for (i = 0; i < purge_mode_limit; i++) {
1087					if (strncmp(purge_mode_names[i], v,
1088					    vlen) == 0) {
1089						opt_purge = (purge_mode_t)i;
1090						match = true;
1091						break;
1092					}
1093				}
1094				if (!match) {
1095					malloc_conf_error("Invalid conf value",
1096					    k, klen, v, vlen);
1097				}
1098				continue;
1099			}
1100			CONF_HANDLE_SSIZE_T(opt_lg_dirty_mult, "lg_dirty_mult",
1101			    -1, (sizeof(size_t) << 3) - 1)
1102			CONF_HANDLE_SSIZE_T(opt_decay_time, "decay_time", -1,
1103			    NSTIME_SEC_MAX);
1104			CONF_HANDLE_BOOL(opt_stats_print, "stats_print", true)
1105			if (config_fill) {
1106				if (CONF_MATCH("junk")) {
1107					if (CONF_MATCH_VALUE("true")) {
1108						opt_junk = "true";
1109						opt_junk_alloc = opt_junk_free =
1110						    true;
1111					} else if (CONF_MATCH_VALUE("false")) {
1112						opt_junk = "false";
1113						opt_junk_alloc = opt_junk_free =
1114						    false;
1115					} else if (CONF_MATCH_VALUE("alloc")) {
1116						opt_junk = "alloc";
1117						opt_junk_alloc = true;
1118						opt_junk_free = false;
1119					} else if (CONF_MATCH_VALUE("free")) {
1120						opt_junk = "free";
1121						opt_junk_alloc = false;
1122						opt_junk_free = true;
1123					} else {
1124						malloc_conf_error(
1125						    "Invalid conf value", k,
1126						    klen, v, vlen);
1127					}
1128					continue;
1129				}
1130				CONF_HANDLE_SIZE_T(opt_quarantine, "quarantine",
1131				    0, SIZE_T_MAX, false)
1132				CONF_HANDLE_BOOL(opt_redzone, "redzone", true)
1133				CONF_HANDLE_BOOL(opt_zero, "zero", true)
1134			}
1135			if (config_utrace) {
1136				CONF_HANDLE_BOOL(opt_utrace, "utrace", true)
1137			}
1138			if (config_xmalloc) {
1139				CONF_HANDLE_BOOL(opt_xmalloc, "xmalloc", true)
1140			}
1141			if (config_tcache) {
1142				CONF_HANDLE_BOOL(opt_tcache, "tcache",
1143				    !config_valgrind || !in_valgrind)
1144				if (CONF_MATCH("tcache")) {
1145					assert(config_valgrind && in_valgrind);
1146					if (opt_tcache) {
1147						opt_tcache = false;
1148						malloc_conf_error(
1149						"tcache cannot be enabled "
1150						"while running inside Valgrind",
1151						k, klen, v, vlen);
1152					}
1153					continue;
1154				}
1155				CONF_HANDLE_SSIZE_T(opt_lg_tcache_max,
1156				    "lg_tcache_max", -1,
1157				    (sizeof(size_t) << 3) - 1)
1158			}
1159			if (config_prof) {
1160				CONF_HANDLE_BOOL(opt_prof, "prof", true)
1161				CONF_HANDLE_CHAR_P(opt_prof_prefix,
1162				    "prof_prefix", "jeprof")
1163				CONF_HANDLE_BOOL(opt_prof_active, "prof_active",
1164				    true)
1165				CONF_HANDLE_BOOL(opt_prof_thread_active_init,
1166				    "prof_thread_active_init", true)
1167				CONF_HANDLE_SIZE_T(opt_lg_prof_sample,
1168				    "lg_prof_sample", 0,
1169				    (sizeof(uint64_t) << 3) - 1, true)
1170				CONF_HANDLE_BOOL(opt_prof_accum, "prof_accum",
1171				    true)
1172				CONF_HANDLE_SSIZE_T(opt_lg_prof_interval,
1173				    "lg_prof_interval", -1,
1174				    (sizeof(uint64_t) << 3) - 1)
1175				CONF_HANDLE_BOOL(opt_prof_gdump, "prof_gdump",
1176				    true)
1177				CONF_HANDLE_BOOL(opt_prof_final, "prof_final",
1178				    true)
1179				CONF_HANDLE_BOOL(opt_prof_leak, "prof_leak",
1180				    true)
1181			}
1182			malloc_conf_error("Invalid conf pair", k, klen, v,
1183			    vlen);
1184#undef CONF_MATCH
1185#undef CONF_HANDLE_BOOL
1186#undef CONF_HANDLE_SIZE_T
1187#undef CONF_HANDLE_SSIZE_T
1188#undef CONF_HANDLE_CHAR_P
1189		}
1190	}
1191}
1192
1193/* init_lock must be held. */
1194static bool
1195malloc_init_hard_needed(void)
1196{
1197
1198	if (malloc_initialized() || (IS_INITIALIZER && malloc_init_state ==
1199	    malloc_init_recursible)) {
1200		/*
1201		 * Another thread initialized the allocator before this one
1202		 * acquired init_lock, or this thread is the initializing
1203		 * thread, and it is recursively allocating.
1204		 */
1205		return (false);
1206	}
1207#ifdef JEMALLOC_THREADED_INIT
1208	if (malloc_initializer != NO_INITIALIZER && !IS_INITIALIZER) {
1209		/* Busy-wait until the initializing thread completes. */
1210		do {
1211			malloc_mutex_unlock(&init_lock);
1212			CPU_SPINWAIT;
1213			malloc_mutex_lock(&init_lock);
1214		} while (!malloc_initialized());
1215		return (false);
1216	}
1217#endif
1218	return (true);
1219}
1220
1221/* init_lock must be held. */
1222static bool
1223malloc_init_hard_a0_locked(void)
1224{
1225
1226	malloc_initializer = INITIALIZER;
1227
1228	if (config_prof)
1229		prof_boot0();
1230	malloc_conf_init();
1231	if (opt_stats_print) {
1232		/* Print statistics at exit. */
1233		if (atexit(stats_print_atexit) != 0) {
1234			malloc_write("<jemalloc>: Error in atexit()\n");
1235			if (opt_abort)
1236				abort();
1237		}
1238	}
1239	if (base_boot())
1240		return (true);
1241	if (chunk_boot())
1242		return (true);
1243	if (ctl_boot())
1244		return (true);
1245	if (config_prof)
1246		prof_boot1();
1247	if (arena_boot())
1248		return (true);
1249	if (config_tcache && tcache_boot())
1250		return (true);
1251	if (malloc_mutex_init(&arenas_lock))
1252		return (true);
1253	/*
1254	 * Create enough scaffolding to allow recursive allocation in
1255	 * malloc_ncpus().
1256	 */
1257	narenas_auto = 1;
1258	narenas_total_set(narenas_auto);
1259	arenas = &a0;
1260	memset(arenas, 0, sizeof(arena_t *) * narenas_auto);
1261	/*
1262	 * Initialize one arena here.  The rest are lazily created in
1263	 * arena_choose_hard().
1264	 */
1265	if (arena_init(0) == NULL)
1266		return (true);
1267	malloc_init_state = malloc_init_a0_initialized;
1268	return (false);
1269}
1270
1271static bool
1272malloc_init_hard_a0(void)
1273{
1274	bool ret;
1275
1276	malloc_mutex_lock(&init_lock);
1277	ret = malloc_init_hard_a0_locked();
1278	malloc_mutex_unlock(&init_lock);
1279	return (ret);
1280}
1281
1282/*
1283 * Initialize data structures which may trigger recursive allocation.
1284 *
1285 * init_lock must be held.
1286 */
1287static bool
1288malloc_init_hard_recursible(void)
1289{
1290	bool ret = false;
1291
1292	malloc_init_state = malloc_init_recursible;
1293	malloc_mutex_unlock(&init_lock);
1294
1295	/* LinuxThreads' pthread_setspecific() allocates. */
1296	if (malloc_tsd_boot0()) {
1297		ret = true;
1298		goto label_return;
1299	}
1300
1301	ncpus = malloc_ncpus();
1302
1303#if (!defined(JEMALLOC_MUTEX_INIT_CB) && !defined(JEMALLOC_ZONE) \
1304    && !defined(_WIN32) && !defined(__native_client__))
1305	/* LinuxThreads' pthread_atfork() allocates. */
1306	if (pthread_atfork(jemalloc_prefork, jemalloc_postfork_parent,
1307	    jemalloc_postfork_child) != 0) {
1308		ret = true;
1309		malloc_write("<jemalloc>: Error in pthread_atfork()\n");
1310		if (opt_abort)
1311			abort();
1312	}
1313#endif
1314
1315label_return:
1316	malloc_mutex_lock(&init_lock);
1317	return (ret);
1318}
1319
1320/* init_lock must be held. */
1321static bool
1322malloc_init_hard_finish(void)
1323{
1324
1325	if (mutex_boot())
1326		return (true);
1327
1328	if (opt_narenas == 0) {
1329		/*
1330		 * For SMP systems, create more than one arena per CPU by
1331		 * default.
1332		 */
1333		if (ncpus > 1)
1334			opt_narenas = ncpus << 2;
1335		else
1336			opt_narenas = 1;
1337	}
1338	narenas_auto = opt_narenas;
1339	/*
1340	 * Limit the number of arenas to the indexing range of MALLOCX_ARENA().
1341	 */
1342	if (narenas_auto > MALLOCX_ARENA_MAX) {
1343		narenas_auto = MALLOCX_ARENA_MAX;
1344		malloc_printf("<jemalloc>: Reducing narenas to limit (%d)\n",
1345		    narenas_auto);
1346	}
1347	narenas_total_set(narenas_auto);
1348
1349	/* Allocate and initialize arenas. */
1350	arenas = (arena_t **)base_alloc(sizeof(arena_t *) *
1351	    (MALLOCX_ARENA_MAX+1));
1352	if (arenas == NULL)
1353		return (true);
1354	/* Copy the pointer to the one arena that was already initialized. */
1355	arena_set(0, a0);
1356
1357	malloc_init_state = malloc_init_initialized;
1358	malloc_slow_flag_init();
1359
1360	return (false);
1361}
1362
1363static bool
1364malloc_init_hard(void)
1365{
1366
1367#if defined(_WIN32) && _WIN32_WINNT < 0x0600
1368	_init_init_lock();
1369#endif
1370	malloc_mutex_lock(&init_lock);
1371	if (!malloc_init_hard_needed()) {
1372		malloc_mutex_unlock(&init_lock);
1373		return (false);
1374	}
1375
1376	if (malloc_init_state != malloc_init_a0_initialized &&
1377	    malloc_init_hard_a0_locked()) {
1378		malloc_mutex_unlock(&init_lock);
1379		return (true);
1380	}
1381
1382	if (malloc_init_hard_recursible()) {
1383		malloc_mutex_unlock(&init_lock);
1384		return (true);
1385	}
1386
1387	if (config_prof && prof_boot2()) {
1388		malloc_mutex_unlock(&init_lock);
1389		return (true);
1390	}
1391
1392	if (malloc_init_hard_finish()) {
1393		malloc_mutex_unlock(&init_lock);
1394		return (true);
1395	}
1396
1397	malloc_mutex_unlock(&init_lock);
1398	malloc_tsd_boot1();
1399	return (false);
1400}
1401
1402/*
1403 * End initialization functions.
1404 */
1405/******************************************************************************/
1406/*
1407 * Begin malloc(3)-compatible functions.
1408 */
1409
1410static void *
1411imalloc_prof_sample(tsd_t *tsd, size_t usize, szind_t ind,
1412    prof_tctx_t *tctx, bool slow_path)
1413{
1414	void *p;
1415
1416	if (tctx == NULL)
1417		return (NULL);
1418	if (usize <= SMALL_MAXCLASS) {
1419		szind_t ind_large = size2index(LARGE_MINCLASS);
1420		p = imalloc(tsd, LARGE_MINCLASS, ind_large, slow_path);
1421		if (p == NULL)
1422			return (NULL);
1423		arena_prof_promoted(p, usize);
1424	} else
1425		p = imalloc(tsd, usize, ind, slow_path);
1426
1427	return (p);
1428}
1429
1430JEMALLOC_ALWAYS_INLINE_C void *
1431imalloc_prof(tsd_t *tsd, size_t usize, szind_t ind, bool slow_path)
1432{
1433	void *p;
1434	prof_tctx_t *tctx;
1435
1436	tctx = prof_alloc_prep(tsd, usize, prof_active_get_unlocked(), true);
1437	if (unlikely((uintptr_t)tctx != (uintptr_t)1U))
1438		p = imalloc_prof_sample(tsd, usize, ind, tctx, slow_path);
1439	else
1440		p = imalloc(tsd, usize, ind, slow_path);
1441	if (unlikely(p == NULL)) {
1442		prof_alloc_rollback(tsd, tctx, true);
1443		return (NULL);
1444	}
1445	prof_malloc(p, usize, tctx);
1446
1447	return (p);
1448}
1449
1450JEMALLOC_ALWAYS_INLINE_C void *
1451imalloc_body(size_t size, tsd_t **tsd, size_t *usize, bool slow_path)
1452{
1453	szind_t ind;
1454
1455	if (slow_path && unlikely(malloc_init()))
1456		return (NULL);
1457	*tsd = tsd_fetch();
1458	ind = size2index(size);
1459	if (unlikely(ind >= NSIZES))
1460		return (NULL);
1461
1462	if (config_stats || (config_prof && opt_prof) || (slow_path &&
1463	    config_valgrind && unlikely(in_valgrind))) {
1464		*usize = index2size(ind);
1465		assert(*usize > 0 && *usize <= HUGE_MAXCLASS);
1466	}
1467
1468	if (config_prof && opt_prof)
1469		return (imalloc_prof(*tsd, *usize, ind, slow_path));
1470
1471	return (imalloc(*tsd, size, ind, slow_path));
1472}
1473
1474JEMALLOC_ALWAYS_INLINE_C void
1475imalloc_post_check(void *ret, tsd_t *tsd, size_t usize, bool slow_path)
1476{
1477	if (unlikely(ret == NULL)) {
1478		if (slow_path && config_xmalloc && unlikely(opt_xmalloc)) {
1479			malloc_write("<jemalloc>: Error in malloc(): "
1480			    "out of memory\n");
1481			abort();
1482		}
1483		set_errno(ENOMEM);
1484	}
1485	if (config_stats && likely(ret != NULL)) {
1486		assert(usize == isalloc(ret, config_prof));
1487		*tsd_thread_allocatedp_get(tsd) += usize;
1488	}
1489}
1490
1491JEMALLOC_EXPORT JEMALLOC_ALLOCATOR JEMALLOC_RESTRICT_RETURN
1492void JEMALLOC_NOTHROW *
1493JEMALLOC_ATTR(malloc) JEMALLOC_ALLOC_SIZE(1)
1494je_malloc(size_t size)
1495{
1496	void *ret;
1497	tsd_t *tsd;
1498	size_t usize JEMALLOC_CC_SILENCE_INIT(0);
1499
1500	if (size == 0)
1501		size = 1;
1502
1503	if (likely(!malloc_slow)) {
1504		/*
1505		 * imalloc_body() is inlined so that fast and slow paths are
1506		 * generated separately with statically known slow_path.
1507		 */
1508		ret = imalloc_body(size, &tsd, &usize, false);
1509		imalloc_post_check(ret, tsd, usize, false);
1510	} else {
1511		ret = imalloc_body(size, &tsd, &usize, true);
1512		imalloc_post_check(ret, tsd, usize, true);
1513		UTRACE(0, size, ret);
1514		JEMALLOC_VALGRIND_MALLOC(ret != NULL, ret, usize, false);
1515	}
1516
1517	return (ret);
1518}
1519
1520static void *
1521imemalign_prof_sample(tsd_t *tsd, size_t alignment, size_t usize,
1522    prof_tctx_t *tctx)
1523{
1524	void *p;
1525
1526	if (tctx == NULL)
1527		return (NULL);
1528	if (usize <= SMALL_MAXCLASS) {
1529		assert(sa2u(LARGE_MINCLASS, alignment) == LARGE_MINCLASS);
1530		p = ipalloc(tsd, LARGE_MINCLASS, alignment, false);
1531		if (p == NULL)
1532			return (NULL);
1533		arena_prof_promoted(p, usize);
1534	} else
1535		p = ipalloc(tsd, usize, alignment, false);
1536
1537	return (p);
1538}
1539
1540JEMALLOC_ALWAYS_INLINE_C void *
1541imemalign_prof(tsd_t *tsd, size_t alignment, size_t usize)
1542{
1543	void *p;
1544	prof_tctx_t *tctx;
1545
1546	tctx = prof_alloc_prep(tsd, usize, prof_active_get_unlocked(), true);
1547	if (unlikely((uintptr_t)tctx != (uintptr_t)1U))
1548		p = imemalign_prof_sample(tsd, alignment, usize, tctx);
1549	else
1550		p = ipalloc(tsd, usize, alignment, false);
1551	if (unlikely(p == NULL)) {
1552		prof_alloc_rollback(tsd, tctx, true);
1553		return (NULL);
1554	}
1555	prof_malloc(p, usize, tctx);
1556
1557	return (p);
1558}
1559
1560JEMALLOC_ATTR(nonnull(1))
1561static int
1562imemalign(void **memptr, size_t alignment, size_t size, size_t min_alignment)
1563{
1564	int ret;
1565	tsd_t *tsd;
1566	size_t usize;
1567	void *result;
1568
1569	assert(min_alignment != 0);
1570
1571	if (unlikely(malloc_init())) {
1572		result = NULL;
1573		goto label_oom;
1574	}
1575	tsd = tsd_fetch();
1576	if (size == 0)
1577		size = 1;
1578
1579	/* Make sure that alignment is a large enough power of 2. */
1580	if (unlikely(((alignment - 1) & alignment) != 0
1581	    || (alignment < min_alignment))) {
1582		if (config_xmalloc && unlikely(opt_xmalloc)) {
1583			malloc_write("<jemalloc>: Error allocating "
1584			    "aligned memory: invalid alignment\n");
1585			abort();
1586		}
1587		result = NULL;
1588		ret = EINVAL;
1589		goto label_return;
1590	}
1591
1592	usize = sa2u(size, alignment);
1593	if (unlikely(usize == 0 || usize > HUGE_MAXCLASS)) {
1594		result = NULL;
1595		goto label_oom;
1596	}
1597
1598	if (config_prof && opt_prof)
1599		result = imemalign_prof(tsd, alignment, usize);
1600	else
1601		result = ipalloc(tsd, usize, alignment, false);
1602	if (unlikely(result == NULL))
1603		goto label_oom;
1604	assert(((uintptr_t)result & (alignment - 1)) == ZU(0));
1605
1606	*memptr = result;
1607	ret = 0;
1608label_return:
1609	if (config_stats && likely(result != NULL)) {
1610		assert(usize == isalloc(result, config_prof));
1611		*tsd_thread_allocatedp_get(tsd) += usize;
1612	}
1613	UTRACE(0, size, result);
1614	return (ret);
1615label_oom:
1616	assert(result == NULL);
1617	if (config_xmalloc && unlikely(opt_xmalloc)) {
1618		malloc_write("<jemalloc>: Error allocating aligned memory: "
1619		    "out of memory\n");
1620		abort();
1621	}
1622	ret = ENOMEM;
1623	goto label_return;
1624}
1625
1626JEMALLOC_EXPORT int JEMALLOC_NOTHROW
1627JEMALLOC_ATTR(nonnull(1))
1628je_posix_memalign(void **memptr, size_t alignment, size_t size)
1629{
1630	int ret = imemalign(memptr, alignment, size, sizeof(void *));
1631	JEMALLOC_VALGRIND_MALLOC(ret == 0, *memptr, isalloc(*memptr,
1632	    config_prof), false);
1633	return (ret);
1634}
1635
1636JEMALLOC_EXPORT JEMALLOC_ALLOCATOR JEMALLOC_RESTRICT_RETURN
1637void JEMALLOC_NOTHROW *
1638JEMALLOC_ATTR(malloc) JEMALLOC_ALLOC_SIZE(2)
1639je_aligned_alloc(size_t alignment, size_t size)
1640{
1641	void *ret;
1642	int err;
1643
1644	if (unlikely((err = imemalign(&ret, alignment, size, 1)) != 0)) {
1645		ret = NULL;
1646		set_errno(err);
1647	}
1648	JEMALLOC_VALGRIND_MALLOC(err == 0, ret, isalloc(ret, config_prof),
1649	    false);
1650	return (ret);
1651}
1652
1653static void *
1654icalloc_prof_sample(tsd_t *tsd, size_t usize, szind_t ind, prof_tctx_t *tctx)
1655{
1656	void *p;
1657
1658	if (tctx == NULL)
1659		return (NULL);
1660	if (usize <= SMALL_MAXCLASS) {
1661		szind_t ind_large = size2index(LARGE_MINCLASS);
1662		p = icalloc(tsd, LARGE_MINCLASS, ind_large);
1663		if (p == NULL)
1664			return (NULL);
1665		arena_prof_promoted(p, usize);
1666	} else
1667		p = icalloc(tsd, usize, ind);
1668
1669	return (p);
1670}
1671
1672JEMALLOC_ALWAYS_INLINE_C void *
1673icalloc_prof(tsd_t *tsd, size_t usize, szind_t ind)
1674{
1675	void *p;
1676	prof_tctx_t *tctx;
1677
1678	tctx = prof_alloc_prep(tsd, usize, prof_active_get_unlocked(), true);
1679	if (unlikely((uintptr_t)tctx != (uintptr_t)1U))
1680		p = icalloc_prof_sample(tsd, usize, ind, tctx);
1681	else
1682		p = icalloc(tsd, usize, ind);
1683	if (unlikely(p == NULL)) {
1684		prof_alloc_rollback(tsd, tctx, true);
1685		return (NULL);
1686	}
1687	prof_malloc(p, usize, tctx);
1688
1689	return (p);
1690}
1691
1692JEMALLOC_EXPORT JEMALLOC_ALLOCATOR JEMALLOC_RESTRICT_RETURN
1693void JEMALLOC_NOTHROW *
1694JEMALLOC_ATTR(malloc) JEMALLOC_ALLOC_SIZE2(1, 2)
1695je_calloc(size_t num, size_t size)
1696{
1697	void *ret;
1698	tsd_t *tsd;
1699	size_t num_size;
1700	szind_t ind;
1701	size_t usize JEMALLOC_CC_SILENCE_INIT(0);
1702
1703	if (unlikely(malloc_init())) {
1704		num_size = 0;
1705		ret = NULL;
1706		goto label_return;
1707	}
1708	tsd = tsd_fetch();
1709
1710	num_size = num * size;
1711	if (unlikely(num_size == 0)) {
1712		if (num == 0 || size == 0)
1713			num_size = 1;
1714		else {
1715			ret = NULL;
1716			goto label_return;
1717		}
1718	/*
1719	 * Try to avoid division here.  We know that it isn't possible to
1720	 * overflow during multiplication if neither operand uses any of the
1721	 * most significant half of the bits in a size_t.
1722	 */
1723	} else if (unlikely(((num | size) & (SIZE_T_MAX << (sizeof(size_t) <<
1724	    2))) && (num_size / size != num))) {
1725		/* size_t overflow. */
1726		ret = NULL;
1727		goto label_return;
1728	}
1729
1730	ind = size2index(num_size);
1731	if (unlikely(ind >= NSIZES)) {
1732		ret = NULL;
1733		goto label_return;
1734	}
1735	if (config_prof && opt_prof) {
1736		usize = index2size(ind);
1737		ret = icalloc_prof(tsd, usize, ind);
1738	} else {
1739		if (config_stats || (config_valgrind && unlikely(in_valgrind)))
1740			usize = index2size(ind);
1741		ret = icalloc(tsd, num_size, ind);
1742	}
1743
1744label_return:
1745	if (unlikely(ret == NULL)) {
1746		if (config_xmalloc && unlikely(opt_xmalloc)) {
1747			malloc_write("<jemalloc>: Error in calloc(): out of "
1748			    "memory\n");
1749			abort();
1750		}
1751		set_errno(ENOMEM);
1752	}
1753	if (config_stats && likely(ret != NULL)) {
1754		assert(usize == isalloc(ret, config_prof));
1755		*tsd_thread_allocatedp_get(tsd) += usize;
1756	}
1757	UTRACE(0, num_size, ret);
1758	JEMALLOC_VALGRIND_MALLOC(ret != NULL, ret, usize, true);
1759	return (ret);
1760}
1761
1762static void *
1763irealloc_prof_sample(tsd_t *tsd, void *old_ptr, size_t old_usize, size_t usize,
1764    prof_tctx_t *tctx)
1765{
1766	void *p;
1767
1768	if (tctx == NULL)
1769		return (NULL);
1770	if (usize <= SMALL_MAXCLASS) {
1771		p = iralloc(tsd, old_ptr, old_usize, LARGE_MINCLASS, 0, false);
1772		if (p == NULL)
1773			return (NULL);
1774		arena_prof_promoted(p, usize);
1775	} else
1776		p = iralloc(tsd, old_ptr, old_usize, usize, 0, false);
1777
1778	return (p);
1779}
1780
1781JEMALLOC_ALWAYS_INLINE_C void *
1782irealloc_prof(tsd_t *tsd, void *old_ptr, size_t old_usize, size_t usize)
1783{
1784	void *p;
1785	bool prof_active;
1786	prof_tctx_t *old_tctx, *tctx;
1787
1788	prof_active = prof_active_get_unlocked();
1789	old_tctx = prof_tctx_get(old_ptr);
1790	tctx = prof_alloc_prep(tsd, usize, prof_active, true);
1791	if (unlikely((uintptr_t)tctx != (uintptr_t)1U))
1792		p = irealloc_prof_sample(tsd, old_ptr, old_usize, usize, tctx);
1793	else
1794		p = iralloc(tsd, old_ptr, old_usize, usize, 0, false);
1795	if (unlikely(p == NULL)) {
1796		prof_alloc_rollback(tsd, tctx, true);
1797		return (NULL);
1798	}
1799	prof_realloc(tsd, p, usize, tctx, prof_active, true, old_ptr, old_usize,
1800	    old_tctx);
1801
1802	return (p);
1803}
1804
1805JEMALLOC_INLINE_C void
1806ifree(tsd_t *tsd, void *ptr, tcache_t *tcache, bool slow_path)
1807{
1808	size_t usize;
1809	UNUSED size_t rzsize JEMALLOC_CC_SILENCE_INIT(0);
1810
1811	assert(ptr != NULL);
1812	assert(malloc_initialized() || IS_INITIALIZER);
1813
1814	if (config_prof && opt_prof) {
1815		usize = isalloc(ptr, config_prof);
1816		prof_free(tsd, ptr, usize);
1817	} else if (config_stats || config_valgrind)
1818		usize = isalloc(ptr, config_prof);
1819	if (config_stats)
1820		*tsd_thread_deallocatedp_get(tsd) += usize;
1821
1822	if (likely(!slow_path))
1823		iqalloc(tsd, ptr, tcache, false);
1824	else {
1825		if (config_valgrind && unlikely(in_valgrind))
1826			rzsize = p2rz(ptr);
1827		iqalloc(tsd, ptr, tcache, true);
1828		JEMALLOC_VALGRIND_FREE(ptr, rzsize);
1829	}
1830}
1831
1832JEMALLOC_INLINE_C void
1833isfree(tsd_t *tsd, void *ptr, size_t usize, tcache_t *tcache)
1834{
1835	UNUSED size_t rzsize JEMALLOC_CC_SILENCE_INIT(0);
1836
1837	assert(ptr != NULL);
1838	assert(malloc_initialized() || IS_INITIALIZER);
1839
1840	if (config_prof && opt_prof)
1841		prof_free(tsd, ptr, usize);
1842	if (config_stats)
1843		*tsd_thread_deallocatedp_get(tsd) += usize;
1844	if (config_valgrind && unlikely(in_valgrind))
1845		rzsize = p2rz(ptr);
1846	isqalloc(tsd, ptr, usize, tcache);
1847	JEMALLOC_VALGRIND_FREE(ptr, rzsize);
1848}
1849
1850JEMALLOC_EXPORT JEMALLOC_ALLOCATOR JEMALLOC_RESTRICT_RETURN
1851void JEMALLOC_NOTHROW *
1852JEMALLOC_ALLOC_SIZE(2)
1853je_realloc(void *ptr, size_t size)
1854{
1855	void *ret;
1856	tsd_t *tsd JEMALLOC_CC_SILENCE_INIT(NULL);
1857	size_t usize JEMALLOC_CC_SILENCE_INIT(0);
1858	size_t old_usize = 0;
1859	UNUSED size_t old_rzsize JEMALLOC_CC_SILENCE_INIT(0);
1860
1861	if (unlikely(size == 0)) {
1862		if (ptr != NULL) {
1863			/* realloc(ptr, 0) is equivalent to free(ptr). */
1864			UTRACE(ptr, 0, 0);
1865			tsd = tsd_fetch();
1866			ifree(tsd, ptr, tcache_get(tsd, false), true);
1867			return (NULL);
1868		}
1869		size = 1;
1870	}
1871
1872	if (likely(ptr != NULL)) {
1873		assert(malloc_initialized() || IS_INITIALIZER);
1874		malloc_thread_init();
1875		tsd = tsd_fetch();
1876
1877		old_usize = isalloc(ptr, config_prof);
1878		if (config_valgrind && unlikely(in_valgrind))
1879			old_rzsize = config_prof ? p2rz(ptr) : u2rz(old_usize);
1880
1881		if (config_prof && opt_prof) {
1882			usize = s2u(size);
1883			ret = unlikely(usize == 0 || usize > HUGE_MAXCLASS) ?
1884			    NULL : irealloc_prof(tsd, ptr, old_usize, usize);
1885		} else {
1886			if (config_stats || (config_valgrind &&
1887			    unlikely(in_valgrind)))
1888				usize = s2u(size);
1889			ret = iralloc(tsd, ptr, old_usize, size, 0, false);
1890		}
1891	} else {
1892		/* realloc(NULL, size) is equivalent to malloc(size). */
1893		if (likely(!malloc_slow))
1894			ret = imalloc_body(size, &tsd, &usize, false);
1895		else
1896			ret = imalloc_body(size, &tsd, &usize, true);
1897	}
1898
1899	if (unlikely(ret == NULL)) {
1900		if (config_xmalloc && unlikely(opt_xmalloc)) {
1901			malloc_write("<jemalloc>: Error in realloc(): "
1902			    "out of memory\n");
1903			abort();
1904		}
1905		set_errno(ENOMEM);
1906	}
1907	if (config_stats && likely(ret != NULL)) {
1908		assert(usize == isalloc(ret, config_prof));
1909		*tsd_thread_allocatedp_get(tsd) += usize;
1910		*tsd_thread_deallocatedp_get(tsd) += old_usize;
1911	}
1912	UTRACE(ptr, size, ret);
1913	JEMALLOC_VALGRIND_REALLOC(true, ret, usize, true, ptr, old_usize,
1914	    old_rzsize, true, false);
1915	return (ret);
1916}
1917
1918JEMALLOC_EXPORT void JEMALLOC_NOTHROW
1919je_free(void *ptr)
1920{
1921
1922	UTRACE(ptr, 0, 0);
1923	if (likely(ptr != NULL)) {
1924		tsd_t *tsd = tsd_fetch();
1925		if (likely(!malloc_slow))
1926			ifree(tsd, ptr, tcache_get(tsd, false), false);
1927		else
1928			ifree(tsd, ptr, tcache_get(tsd, false), true);
1929	}
1930}
1931
1932/*
1933 * End malloc(3)-compatible functions.
1934 */
1935/******************************************************************************/
1936/*
1937 * Begin non-standard override functions.
1938 */
1939
1940#ifdef JEMALLOC_OVERRIDE_MEMALIGN
1941JEMALLOC_EXPORT JEMALLOC_ALLOCATOR JEMALLOC_RESTRICT_RETURN
1942void JEMALLOC_NOTHROW *
1943JEMALLOC_ATTR(malloc)
1944je_memalign(size_t alignment, size_t size)
1945{
1946	void *ret JEMALLOC_CC_SILENCE_INIT(NULL);
1947	if (unlikely(imemalign(&ret, alignment, size, 1) != 0))
1948		ret = NULL;
1949	JEMALLOC_VALGRIND_MALLOC(ret != NULL, ret, size, false);
1950	return (ret);
1951}
1952#endif
1953
1954#ifdef JEMALLOC_OVERRIDE_VALLOC
1955JEMALLOC_EXPORT JEMALLOC_ALLOCATOR JEMALLOC_RESTRICT_RETURN
1956void JEMALLOC_NOTHROW *
1957JEMALLOC_ATTR(malloc)
1958je_valloc(size_t size)
1959{
1960	void *ret JEMALLOC_CC_SILENCE_INIT(NULL);
1961	if (unlikely(imemalign(&ret, PAGE, size, 1) != 0))
1962		ret = NULL;
1963	JEMALLOC_VALGRIND_MALLOC(ret != NULL, ret, size, false);
1964	return (ret);
1965}
1966#endif
1967
1968/*
1969 * is_malloc(je_malloc) is some macro magic to detect if jemalloc_defs.h has
1970 * #define je_malloc malloc
1971 */
1972#define	malloc_is_malloc 1
1973#define	is_malloc_(a) malloc_is_ ## a
1974#define	is_malloc(a) is_malloc_(a)
1975
1976#if ((is_malloc(je_malloc) == 1) && defined(JEMALLOC_GLIBC_MALLOC_HOOK))
1977/*
1978 * glibc provides the RTLD_DEEPBIND flag for dlopen which can make it possible
1979 * to inconsistently reference libc's malloc(3)-compatible functions
1980 * (https://bugzilla.mozilla.org/show_bug.cgi?id=493541).
1981 *
1982 * These definitions interpose hooks in glibc.  The functions are actually
1983 * passed an extra argument for the caller return address, which will be
1984 * ignored.
1985 */
1986JEMALLOC_EXPORT void (*__free_hook)(void *ptr) = je_free;
1987JEMALLOC_EXPORT void *(*__malloc_hook)(size_t size) = je_malloc;
1988JEMALLOC_EXPORT void *(*__realloc_hook)(void *ptr, size_t size) = je_realloc;
1989# ifdef JEMALLOC_GLIBC_MEMALIGN_HOOK
1990JEMALLOC_EXPORT void *(*__memalign_hook)(size_t alignment, size_t size) =
1991    je_memalign;
1992# endif
1993#endif
1994
1995/*
1996 * End non-standard override functions.
1997 */
1998/******************************************************************************/
1999/*
2000 * Begin non-standard functions.
2001 */
2002
2003JEMALLOC_ALWAYS_INLINE_C bool
2004imallocx_flags_decode_hard(tsd_t *tsd, size_t size, int flags, size_t *usize,
2005    size_t *alignment, bool *zero, tcache_t **tcache, arena_t **arena)
2006{
2007
2008	if ((flags & MALLOCX_LG_ALIGN_MASK) == 0) {
2009		*alignment = 0;
2010		*usize = s2u(size);
2011	} else {
2012		*alignment = MALLOCX_ALIGN_GET_SPECIFIED(flags);
2013		*usize = sa2u(size, *alignment);
2014	}
2015	if (unlikely(*usize == 0 || *usize > HUGE_MAXCLASS))
2016		return (true);
2017	*zero = MALLOCX_ZERO_GET(flags);
2018	if ((flags & MALLOCX_TCACHE_MASK) != 0) {
2019		if ((flags & MALLOCX_TCACHE_MASK) == MALLOCX_TCACHE_NONE)
2020			*tcache = NULL;
2021		else
2022			*tcache = tcaches_get(tsd, MALLOCX_TCACHE_GET(flags));
2023	} else
2024		*tcache = tcache_get(tsd, true);
2025	if ((flags & MALLOCX_ARENA_MASK) != 0) {
2026		unsigned arena_ind = MALLOCX_ARENA_GET(flags);
2027		*arena = arena_get(arena_ind, true);
2028		if (unlikely(*arena == NULL))
2029			return (true);
2030	} else
2031		*arena = NULL;
2032	return (false);
2033}
2034
2035JEMALLOC_ALWAYS_INLINE_C bool
2036imallocx_flags_decode(tsd_t *tsd, size_t size, int flags, size_t *usize,
2037    size_t *alignment, bool *zero, tcache_t **tcache, arena_t **arena)
2038{
2039
2040	if (likely(flags == 0)) {
2041		*usize = s2u(size);
2042		if (unlikely(*usize == 0 || *usize > HUGE_MAXCLASS))
2043			return (true);
2044		*alignment = 0;
2045		*zero = false;
2046		*tcache = tcache_get(tsd, true);
2047		*arena = NULL;
2048		return (false);
2049	} else {
2050		return (imallocx_flags_decode_hard(tsd, size, flags, usize,
2051		    alignment, zero, tcache, arena));
2052	}
2053}
2054
2055JEMALLOC_ALWAYS_INLINE_C void *
2056imallocx_flags(tsd_t *tsd, size_t usize, size_t alignment, bool zero,
2057    tcache_t *tcache, arena_t *arena)
2058{
2059	szind_t ind;
2060
2061	if (unlikely(alignment != 0))
2062		return (ipalloct(tsd, usize, alignment, zero, tcache, arena));
2063	ind = size2index(usize);
2064	assert(ind < NSIZES);
2065	if (unlikely(zero))
2066		return (icalloct(tsd, usize, ind, tcache, arena));
2067	return (imalloct(tsd, usize, ind, tcache, arena));
2068}
2069
2070static void *
2071imallocx_prof_sample(tsd_t *tsd, size_t usize, size_t alignment, bool zero,
2072    tcache_t *tcache, arena_t *arena)
2073{
2074	void *p;
2075
2076	if (usize <= SMALL_MAXCLASS) {
2077		assert(((alignment == 0) ? s2u(LARGE_MINCLASS) :
2078		    sa2u(LARGE_MINCLASS, alignment)) == LARGE_MINCLASS);
2079		p = imallocx_flags(tsd, LARGE_MINCLASS, alignment, zero, tcache,
2080		    arena);
2081		if (p == NULL)
2082			return (NULL);
2083		arena_prof_promoted(p, usize);
2084	} else
2085		p = imallocx_flags(tsd, usize, alignment, zero, tcache, arena);
2086
2087	return (p);
2088}
2089
2090JEMALLOC_ALWAYS_INLINE_C void *
2091imallocx_prof(tsd_t *tsd, size_t size, int flags, size_t *usize)
2092{
2093	void *p;
2094	size_t alignment;
2095	bool zero;
2096	tcache_t *tcache;
2097	arena_t *arena;
2098	prof_tctx_t *tctx;
2099
2100	if (unlikely(imallocx_flags_decode(tsd, size, flags, usize, &alignment,
2101	    &zero, &tcache, &arena)))
2102		return (NULL);
2103	tctx = prof_alloc_prep(tsd, *usize, prof_active_get_unlocked(), true);
2104	if (likely((uintptr_t)tctx == (uintptr_t)1U))
2105		p = imallocx_flags(tsd, *usize, alignment, zero, tcache, arena);
2106	else if ((uintptr_t)tctx > (uintptr_t)1U) {
2107		p = imallocx_prof_sample(tsd, *usize, alignment, zero, tcache,
2108		    arena);
2109	} else
2110		p = NULL;
2111	if (unlikely(p == NULL)) {
2112		prof_alloc_rollback(tsd, tctx, true);
2113		return (NULL);
2114	}
2115	prof_malloc(p, *usize, tctx);
2116
2117	assert(alignment == 0 || ((uintptr_t)p & (alignment - 1)) == ZU(0));
2118	return (p);
2119}
2120
2121JEMALLOC_ALWAYS_INLINE_C void *
2122imallocx_no_prof(tsd_t *tsd, size_t size, int flags, size_t *usize)
2123{
2124	void *p;
2125	size_t alignment;
2126	bool zero;
2127	tcache_t *tcache;
2128	arena_t *arena;
2129
2130	if (likely(flags == 0)) {
2131		szind_t ind = size2index(size);
2132		if (unlikely(ind >= NSIZES))
2133			return (NULL);
2134		if (config_stats || (config_valgrind &&
2135		    unlikely(in_valgrind))) {
2136			*usize = index2size(ind);
2137			assert(*usize > 0 && *usize <= HUGE_MAXCLASS);
2138		}
2139		return (imalloc(tsd, size, ind, true));
2140	}
2141
2142	if (unlikely(imallocx_flags_decode_hard(tsd, size, flags, usize,
2143	    &alignment, &zero, &tcache, &arena)))
2144		return (NULL);
2145	p = imallocx_flags(tsd, *usize, alignment, zero, tcache, arena);
2146	assert(alignment == 0 || ((uintptr_t)p & (alignment - 1)) == ZU(0));
2147	return (p);
2148}
2149
2150JEMALLOC_EXPORT JEMALLOC_ALLOCATOR JEMALLOC_RESTRICT_RETURN
2151void JEMALLOC_NOTHROW *
2152JEMALLOC_ATTR(malloc) JEMALLOC_ALLOC_SIZE(1)
2153je_mallocx(size_t size, int flags)
2154{
2155	tsd_t *tsd;
2156	void *p;
2157	size_t usize;
2158
2159	assert(size != 0);
2160
2161	if (unlikely(malloc_init()))
2162		goto label_oom;
2163	tsd = tsd_fetch();
2164
2165	if (config_prof && opt_prof)
2166		p = imallocx_prof(tsd, size, flags, &usize);
2167	else
2168		p = imallocx_no_prof(tsd, size, flags, &usize);
2169	if (unlikely(p == NULL))
2170		goto label_oom;
2171
2172	if (config_stats) {
2173		assert(usize == isalloc(p, config_prof));
2174		*tsd_thread_allocatedp_get(tsd) += usize;
2175	}
2176	UTRACE(0, size, p);
2177	JEMALLOC_VALGRIND_MALLOC(true, p, usize, MALLOCX_ZERO_GET(flags));
2178	return (p);
2179label_oom:
2180	if (config_xmalloc && unlikely(opt_xmalloc)) {
2181		malloc_write("<jemalloc>: Error in mallocx(): out of memory\n");
2182		abort();
2183	}
2184	UTRACE(0, size, 0);
2185	return (NULL);
2186}
2187
2188static void *
2189irallocx_prof_sample(tsd_t *tsd, void *old_ptr, size_t old_usize,
2190    size_t usize, size_t alignment, bool zero, tcache_t *tcache, arena_t *arena,
2191    prof_tctx_t *tctx)
2192{
2193	void *p;
2194
2195	if (tctx == NULL)
2196		return (NULL);
2197	if (usize <= SMALL_MAXCLASS) {
2198		p = iralloct(tsd, old_ptr, old_usize, LARGE_MINCLASS, alignment,
2199		    zero, tcache, arena);
2200		if (p == NULL)
2201			return (NULL);
2202		arena_prof_promoted(p, usize);
2203	} else {
2204		p = iralloct(tsd, old_ptr, old_usize, usize, alignment, zero,
2205		    tcache, arena);
2206	}
2207
2208	return (p);
2209}
2210
2211JEMALLOC_ALWAYS_INLINE_C void *
2212irallocx_prof(tsd_t *tsd, void *old_ptr, size_t old_usize, size_t size,
2213    size_t alignment, size_t *usize, bool zero, tcache_t *tcache,
2214    arena_t *arena)
2215{
2216	void *p;
2217	bool prof_active;
2218	prof_tctx_t *old_tctx, *tctx;
2219
2220	prof_active = prof_active_get_unlocked();
2221	old_tctx = prof_tctx_get(old_ptr);
2222	tctx = prof_alloc_prep(tsd, *usize, prof_active, true);
2223	if (unlikely((uintptr_t)tctx != (uintptr_t)1U)) {
2224		p = irallocx_prof_sample(tsd, old_ptr, old_usize, *usize,
2225		    alignment, zero, tcache, arena, tctx);
2226	} else {
2227		p = iralloct(tsd, old_ptr, old_usize, size, alignment, zero,
2228		    tcache, arena);
2229	}
2230	if (unlikely(p == NULL)) {
2231		prof_alloc_rollback(tsd, tctx, true);
2232		return (NULL);
2233	}
2234
2235	if (p == old_ptr && alignment != 0) {
2236		/*
2237		 * The allocation did not move, so it is possible that the size
2238		 * class is smaller than would guarantee the requested
2239		 * alignment, and that the alignment constraint was
2240		 * serendipitously satisfied.  Additionally, old_usize may not
2241		 * be the same as the current usize because of in-place large
2242		 * reallocation.  Therefore, query the actual value of usize.
2243		 */
2244		*usize = isalloc(p, config_prof);
2245	}
2246	prof_realloc(tsd, p, *usize, tctx, prof_active, true, old_ptr,
2247	    old_usize, old_tctx);
2248
2249	return (p);
2250}
2251
2252JEMALLOC_EXPORT JEMALLOC_ALLOCATOR JEMALLOC_RESTRICT_RETURN
2253void JEMALLOC_NOTHROW *
2254JEMALLOC_ALLOC_SIZE(2)
2255je_rallocx(void *ptr, size_t size, int flags)
2256{
2257	void *p;
2258	tsd_t *tsd;
2259	size_t usize;
2260	size_t old_usize;
2261	UNUSED size_t old_rzsize JEMALLOC_CC_SILENCE_INIT(0);
2262	size_t alignment = MALLOCX_ALIGN_GET(flags);
2263	bool zero = flags & MALLOCX_ZERO;
2264	arena_t *arena;
2265	tcache_t *tcache;
2266
2267	assert(ptr != NULL);
2268	assert(size != 0);
2269	assert(malloc_initialized() || IS_INITIALIZER);
2270	malloc_thread_init();
2271	tsd = tsd_fetch();
2272
2273	if (unlikely((flags & MALLOCX_ARENA_MASK) != 0)) {
2274		unsigned arena_ind = MALLOCX_ARENA_GET(flags);
2275		arena = arena_get(arena_ind, true);
2276		if (unlikely(arena == NULL))
2277			goto label_oom;
2278	} else
2279		arena = NULL;
2280
2281	if (unlikely((flags & MALLOCX_TCACHE_MASK) != 0)) {
2282		if ((flags & MALLOCX_TCACHE_MASK) == MALLOCX_TCACHE_NONE)
2283			tcache = NULL;
2284		else
2285			tcache = tcaches_get(tsd, MALLOCX_TCACHE_GET(flags));
2286	} else
2287		tcache = tcache_get(tsd, true);
2288
2289	old_usize = isalloc(ptr, config_prof);
2290	if (config_valgrind && unlikely(in_valgrind))
2291		old_rzsize = u2rz(old_usize);
2292
2293	if (config_prof && opt_prof) {
2294		usize = (alignment == 0) ? s2u(size) : sa2u(size, alignment);
2295		if (unlikely(usize == 0 || usize > HUGE_MAXCLASS))
2296			goto label_oom;
2297		p = irallocx_prof(tsd, ptr, old_usize, size, alignment, &usize,
2298		    zero, tcache, arena);
2299		if (unlikely(p == NULL))
2300			goto label_oom;
2301	} else {
2302		p = iralloct(tsd, ptr, old_usize, size, alignment, zero,
2303		     tcache, arena);
2304		if (unlikely(p == NULL))
2305			goto label_oom;
2306		if (config_stats || (config_valgrind && unlikely(in_valgrind)))
2307			usize = isalloc(p, config_prof);
2308	}
2309	assert(alignment == 0 || ((uintptr_t)p & (alignment - 1)) == ZU(0));
2310
2311	if (config_stats) {
2312		*tsd_thread_allocatedp_get(tsd) += usize;
2313		*tsd_thread_deallocatedp_get(tsd) += old_usize;
2314	}
2315	UTRACE(ptr, size, p);
2316	JEMALLOC_VALGRIND_REALLOC(true, p, usize, false, ptr, old_usize,
2317	    old_rzsize, false, zero);
2318	return (p);
2319label_oom:
2320	if (config_xmalloc && unlikely(opt_xmalloc)) {
2321		malloc_write("<jemalloc>: Error in rallocx(): out of memory\n");
2322		abort();
2323	}
2324	UTRACE(ptr, size, 0);
2325	return (NULL);
2326}
2327
2328JEMALLOC_ALWAYS_INLINE_C size_t
2329ixallocx_helper(tsd_t *tsd, void *ptr, size_t old_usize, size_t size,
2330    size_t extra, size_t alignment, bool zero)
2331{
2332	size_t usize;
2333
2334	if (ixalloc(tsd, ptr, old_usize, size, extra, alignment, zero))
2335		return (old_usize);
2336	usize = isalloc(ptr, config_prof);
2337
2338	return (usize);
2339}
2340
2341static size_t
2342ixallocx_prof_sample(tsd_t *tsd, void *ptr, size_t old_usize, size_t size,
2343    size_t extra, size_t alignment, bool zero, prof_tctx_t *tctx)
2344{
2345	size_t usize;
2346
2347	if (tctx == NULL)
2348		return (old_usize);
2349	usize = ixallocx_helper(tsd, ptr, old_usize, size, extra, alignment,
2350	    zero);
2351
2352	return (usize);
2353}
2354
2355JEMALLOC_ALWAYS_INLINE_C size_t
2356ixallocx_prof(tsd_t *tsd, void *ptr, size_t old_usize, size_t size,
2357    size_t extra, size_t alignment, bool zero)
2358{
2359	size_t usize_max, usize;
2360	bool prof_active;
2361	prof_tctx_t *old_tctx, *tctx;
2362
2363	prof_active = prof_active_get_unlocked();
2364	old_tctx = prof_tctx_get(ptr);
2365	/*
2366	 * usize isn't knowable before ixalloc() returns when extra is non-zero.
2367	 * Therefore, compute its maximum possible value and use that in
2368	 * prof_alloc_prep() to decide whether to capture a backtrace.
2369	 * prof_realloc() will use the actual usize to decide whether to sample.
2370	 */
2371	if (alignment == 0) {
2372		usize_max = s2u(size+extra);
2373		assert(usize_max > 0 && usize_max <= HUGE_MAXCLASS);
2374	} else {
2375		usize_max = sa2u(size+extra, alignment);
2376		if (unlikely(usize_max == 0 || usize_max > HUGE_MAXCLASS)) {
2377			/*
2378			 * usize_max is out of range, and chances are that
2379			 * allocation will fail, but use the maximum possible
2380			 * value and carry on with prof_alloc_prep(), just in
2381			 * case allocation succeeds.
2382			 */
2383			usize_max = HUGE_MAXCLASS;
2384		}
2385	}
2386	tctx = prof_alloc_prep(tsd, usize_max, prof_active, false);
2387
2388	if (unlikely((uintptr_t)tctx != (uintptr_t)1U)) {
2389		usize = ixallocx_prof_sample(tsd, ptr, old_usize, size, extra,
2390		    alignment, zero, tctx);
2391	} else {
2392		usize = ixallocx_helper(tsd, ptr, old_usize, size, extra,
2393		    alignment, zero);
2394	}
2395	if (usize == old_usize) {
2396		prof_alloc_rollback(tsd, tctx, false);
2397		return (usize);
2398	}
2399	prof_realloc(tsd, ptr, usize, tctx, prof_active, false, ptr, old_usize,
2400	    old_tctx);
2401
2402	return (usize);
2403}
2404
2405JEMALLOC_EXPORT size_t JEMALLOC_NOTHROW
2406je_xallocx(void *ptr, size_t size, size_t extra, int flags)
2407{
2408	tsd_t *tsd;
2409	size_t usize, old_usize;
2410	UNUSED size_t old_rzsize JEMALLOC_CC_SILENCE_INIT(0);
2411	size_t alignment = MALLOCX_ALIGN_GET(flags);
2412	bool zero = flags & MALLOCX_ZERO;
2413
2414	assert(ptr != NULL);
2415	assert(size != 0);
2416	assert(SIZE_T_MAX - size >= extra);
2417	assert(malloc_initialized() || IS_INITIALIZER);
2418	malloc_thread_init();
2419	tsd = tsd_fetch();
2420
2421	old_usize = isalloc(ptr, config_prof);
2422
2423	/*
2424	 * The API explicitly absolves itself of protecting against (size +
2425	 * extra) numerical overflow, but we may need to clamp extra to avoid
2426	 * exceeding HUGE_MAXCLASS.
2427	 *
2428	 * Ordinarily, size limit checking is handled deeper down, but here we
2429	 * have to check as part of (size + extra) clamping, since we need the
2430	 * clamped value in the above helper functions.
2431	 */
2432	if (unlikely(size > HUGE_MAXCLASS)) {
2433		usize = old_usize;
2434		goto label_not_resized;
2435	}
2436	if (unlikely(HUGE_MAXCLASS - size < extra))
2437		extra = HUGE_MAXCLASS - size;
2438
2439	if (config_valgrind && unlikely(in_valgrind))
2440		old_rzsize = u2rz(old_usize);
2441
2442	if (config_prof && opt_prof) {
2443		usize = ixallocx_prof(tsd, ptr, old_usize, size, extra,
2444		    alignment, zero);
2445	} else {
2446		usize = ixallocx_helper(tsd, ptr, old_usize, size, extra,
2447		    alignment, zero);
2448	}
2449	if (unlikely(usize == old_usize))
2450		goto label_not_resized;
2451
2452	if (config_stats) {
2453		*tsd_thread_allocatedp_get(tsd) += usize;
2454		*tsd_thread_deallocatedp_get(tsd) += old_usize;
2455	}
2456	JEMALLOC_VALGRIND_REALLOC(false, ptr, usize, false, ptr, old_usize,
2457	    old_rzsize, false, zero);
2458label_not_resized:
2459	UTRACE(ptr, size, ptr);
2460	return (usize);
2461}
2462
2463JEMALLOC_EXPORT size_t JEMALLOC_NOTHROW
2464JEMALLOC_ATTR(pure)
2465je_sallocx(const void *ptr, int flags)
2466{
2467	size_t usize;
2468
2469	assert(malloc_initialized() || IS_INITIALIZER);
2470	malloc_thread_init();
2471
2472	if (config_ivsalloc)
2473		usize = ivsalloc(ptr, config_prof);
2474	else
2475		usize = isalloc(ptr, config_prof);
2476
2477	return (usize);
2478}
2479
2480JEMALLOC_EXPORT void JEMALLOC_NOTHROW
2481je_dallocx(void *ptr, int flags)
2482{
2483	tsd_t *tsd;
2484	tcache_t *tcache;
2485
2486	assert(ptr != NULL);
2487	assert(malloc_initialized() || IS_INITIALIZER);
2488
2489	tsd = tsd_fetch();
2490	if (unlikely((flags & MALLOCX_TCACHE_MASK) != 0)) {
2491		if ((flags & MALLOCX_TCACHE_MASK) == MALLOCX_TCACHE_NONE)
2492			tcache = NULL;
2493		else
2494			tcache = tcaches_get(tsd, MALLOCX_TCACHE_GET(flags));
2495	} else
2496		tcache = tcache_get(tsd, false);
2497
2498	UTRACE(ptr, 0, 0);
2499	ifree(tsd_fetch(), ptr, tcache, true);
2500}
2501
2502JEMALLOC_ALWAYS_INLINE_C size_t
2503inallocx(size_t size, int flags)
2504{
2505	size_t usize;
2506
2507	if (likely((flags & MALLOCX_LG_ALIGN_MASK) == 0))
2508		usize = s2u(size);
2509	else
2510		usize = sa2u(size, MALLOCX_ALIGN_GET_SPECIFIED(flags));
2511	return (usize);
2512}
2513
2514JEMALLOC_EXPORT void JEMALLOC_NOTHROW
2515je_sdallocx(void *ptr, size_t size, int flags)
2516{
2517	tsd_t *tsd;
2518	tcache_t *tcache;
2519	size_t usize;
2520
2521	assert(ptr != NULL);
2522	assert(malloc_initialized() || IS_INITIALIZER);
2523	usize = inallocx(size, flags);
2524	assert(usize == isalloc(ptr, config_prof));
2525
2526	tsd = tsd_fetch();
2527	if (unlikely((flags & MALLOCX_TCACHE_MASK) != 0)) {
2528		if ((flags & MALLOCX_TCACHE_MASK) == MALLOCX_TCACHE_NONE)
2529			tcache = NULL;
2530		else
2531			tcache = tcaches_get(tsd, MALLOCX_TCACHE_GET(flags));
2532	} else
2533		tcache = tcache_get(tsd, false);
2534
2535	UTRACE(ptr, 0, 0);
2536	isfree(tsd, ptr, usize, tcache);
2537}
2538
2539JEMALLOC_EXPORT size_t JEMALLOC_NOTHROW
2540JEMALLOC_ATTR(pure)
2541je_nallocx(size_t size, int flags)
2542{
2543	size_t usize;
2544
2545	assert(size != 0);
2546
2547	if (unlikely(malloc_init()))
2548		return (0);
2549
2550	usize = inallocx(size, flags);
2551	if (unlikely(usize > HUGE_MAXCLASS))
2552		return (0);
2553
2554	return (usize);
2555}
2556
2557JEMALLOC_EXPORT int JEMALLOC_NOTHROW
2558je_mallctl(const char *name, void *oldp, size_t *oldlenp, void *newp,
2559    size_t newlen)
2560{
2561
2562	if (unlikely(malloc_init()))
2563		return (EAGAIN);
2564
2565	return (ctl_byname(name, oldp, oldlenp, newp, newlen));
2566}
2567
2568JEMALLOC_EXPORT int JEMALLOC_NOTHROW
2569je_mallctlnametomib(const char *name, size_t *mibp, size_t *miblenp)
2570{
2571
2572	if (unlikely(malloc_init()))
2573		return (EAGAIN);
2574
2575	return (ctl_nametomib(name, mibp, miblenp));
2576}
2577
2578JEMALLOC_EXPORT int JEMALLOC_NOTHROW
2579je_mallctlbymib(const size_t *mib, size_t miblen, void *oldp, size_t *oldlenp,
2580  void *newp, size_t newlen)
2581{
2582
2583	if (unlikely(malloc_init()))
2584		return (EAGAIN);
2585
2586	return (ctl_bymib(mib, miblen, oldp, oldlenp, newp, newlen));
2587}
2588
2589JEMALLOC_EXPORT void JEMALLOC_NOTHROW
2590je_malloc_stats_print(void (*write_cb)(void *, const char *), void *cbopaque,
2591    const char *opts)
2592{
2593
2594	stats_print(write_cb, cbopaque, opts);
2595}
2596
2597JEMALLOC_EXPORT size_t JEMALLOC_NOTHROW
2598je_malloc_usable_size(JEMALLOC_USABLE_SIZE_CONST void *ptr)
2599{
2600	size_t ret;
2601
2602	assert(malloc_initialized() || IS_INITIALIZER);
2603	malloc_thread_init();
2604
2605	if (config_ivsalloc)
2606		ret = ivsalloc(ptr, config_prof);
2607	else
2608		ret = (ptr == NULL) ? 0 : isalloc(ptr, config_prof);
2609
2610	return (ret);
2611}
2612
2613/*
2614 * End non-standard functions.
2615 */
2616/******************************************************************************/
2617/*
2618 * Begin compatibility functions.
2619 */
2620
2621#define	ALLOCM_LG_ALIGN(la)	(la)
2622#define	ALLOCM_ALIGN(a)		(ffsl(a)-1)
2623#define	ALLOCM_ZERO		((int)0x40)
2624#define	ALLOCM_NO_MOVE		((int)0x80)
2625
2626#define	ALLOCM_SUCCESS		0
2627#define	ALLOCM_ERR_OOM		1
2628#define	ALLOCM_ERR_NOT_MOVED	2
2629
2630int
2631je_allocm(void **ptr, size_t *rsize, size_t size, int flags)
2632{
2633	void *p;
2634
2635	assert(ptr != NULL);
2636
2637	p = je_mallocx(size, flags);
2638	if (p == NULL)
2639		return (ALLOCM_ERR_OOM);
2640	if (rsize != NULL)
2641		*rsize = isalloc(p, config_prof);
2642	*ptr = p;
2643	return (ALLOCM_SUCCESS);
2644}
2645
2646int
2647je_rallocm(void **ptr, size_t *rsize, size_t size, size_t extra, int flags)
2648{
2649	int ret;
2650	bool no_move = flags & ALLOCM_NO_MOVE;
2651
2652	assert(ptr != NULL);
2653	assert(*ptr != NULL);
2654	assert(size != 0);
2655	assert(SIZE_T_MAX - size >= extra);
2656
2657	if (no_move) {
2658		size_t usize = je_xallocx(*ptr, size, extra, flags);
2659		ret = (usize >= size) ? ALLOCM_SUCCESS : ALLOCM_ERR_NOT_MOVED;
2660		if (rsize != NULL)
2661			*rsize = usize;
2662	} else {
2663		void *p = je_rallocx(*ptr, size+extra, flags);
2664		if (p != NULL) {
2665			*ptr = p;
2666			ret = ALLOCM_SUCCESS;
2667		} else
2668			ret = ALLOCM_ERR_OOM;
2669		if (rsize != NULL)
2670			*rsize = isalloc(*ptr, config_prof);
2671	}
2672	return (ret);
2673}
2674
2675int
2676je_sallocm(const void *ptr, size_t *rsize, int flags)
2677{
2678
2679	assert(rsize != NULL);
2680	*rsize = je_sallocx(ptr, flags);
2681	return (ALLOCM_SUCCESS);
2682}
2683
2684int
2685je_dallocm(void *ptr, int flags)
2686{
2687
2688	je_dallocx(ptr, flags);
2689	return (ALLOCM_SUCCESS);
2690}
2691
2692int
2693je_nallocm(size_t *rsize, size_t size, int flags)
2694{
2695	size_t usize;
2696
2697	usize = je_nallocx(size, flags);
2698	if (usize == 0)
2699		return (ALLOCM_ERR_OOM);
2700	if (rsize != NULL)
2701		*rsize = usize;
2702	return (ALLOCM_SUCCESS);
2703}
2704
2705#undef ALLOCM_LG_ALIGN
2706#undef ALLOCM_ALIGN
2707#undef ALLOCM_ZERO
2708#undef ALLOCM_NO_MOVE
2709
2710#undef ALLOCM_SUCCESS
2711#undef ALLOCM_ERR_OOM
2712#undef ALLOCM_ERR_NOT_MOVED
2713
2714/*
2715 * End compatibility functions.
2716 */
2717/******************************************************************************/
2718/*
2719 * The following functions are used by threading libraries for protection of
2720 * malloc during fork().
2721 */
2722
2723/*
2724 * If an application creates a thread before doing any allocation in the main
2725 * thread, then calls fork(2) in the main thread followed by memory allocation
2726 * in the child process, a race can occur that results in deadlock within the
2727 * child: the main thread may have forked while the created thread had
2728 * partially initialized the allocator.  Ordinarily jemalloc prevents
2729 * fork/malloc races via the following functions it registers during
2730 * initialization using pthread_atfork(), but of course that does no good if
2731 * the allocator isn't fully initialized at fork time.  The following library
2732 * constructor is a partial solution to this problem.  It may still be possible
2733 * to trigger the deadlock described above, but doing so would involve forking
2734 * via a library constructor that runs before jemalloc's runs.
2735 */
2736JEMALLOC_ATTR(constructor)
2737static void
2738jemalloc_constructor(void)
2739{
2740
2741	malloc_init();
2742}
2743
2744#ifndef JEMALLOC_MUTEX_INIT_CB
2745void
2746jemalloc_prefork(void)
2747#else
2748JEMALLOC_EXPORT void
2749_malloc_prefork(void)
2750#endif
2751{
2752	unsigned i, narenas;
2753
2754#ifdef JEMALLOC_MUTEX_INIT_CB
2755	if (!malloc_initialized())
2756		return;
2757#endif
2758	assert(malloc_initialized());
2759
2760	/* Acquire all mutexes in a safe order. */
2761	ctl_prefork();
2762	prof_prefork();
2763	malloc_mutex_prefork(&arenas_lock);
2764	for (i = 0, narenas = narenas_total_get(); i < narenas; i++) {
2765		arena_t *arena;
2766
2767		if ((arena = arena_get(i, false)) != NULL)
2768			arena_prefork(arena);
2769	}
2770	chunk_prefork();
2771	base_prefork();
2772}
2773
2774#ifndef JEMALLOC_MUTEX_INIT_CB
2775void
2776jemalloc_postfork_parent(void)
2777#else
2778JEMALLOC_EXPORT void
2779_malloc_postfork(void)
2780#endif
2781{
2782	unsigned i, narenas;
2783
2784#ifdef JEMALLOC_MUTEX_INIT_CB
2785	if (!malloc_initialized())
2786		return;
2787#endif
2788	assert(malloc_initialized());
2789
2790	/* Release all mutexes, now that fork() has completed. */
2791	base_postfork_parent();
2792	chunk_postfork_parent();
2793	for (i = 0, narenas = narenas_total_get(); i < narenas; i++) {
2794		arena_t *arena;
2795
2796		if ((arena = arena_get(i, false)) != NULL)
2797			arena_postfork_parent(arena);
2798	}
2799	malloc_mutex_postfork_parent(&arenas_lock);
2800	prof_postfork_parent();
2801	ctl_postfork_parent();
2802}
2803
2804void
2805jemalloc_postfork_child(void)
2806{
2807	unsigned i, narenas;
2808
2809	assert(malloc_initialized());
2810
2811	/* Release all mutexes, now that fork() has completed. */
2812	base_postfork_child();
2813	chunk_postfork_child();
2814	for (i = 0, narenas = narenas_total_get(); i < narenas; i++) {
2815		arena_t *arena;
2816
2817		if ((arena = arena_get(i, false)) != NULL)
2818			arena_postfork_child(arena);
2819	}
2820	malloc_mutex_postfork_child(&arenas_lock);
2821	prof_postfork_child();
2822	ctl_postfork_child();
2823}
2824
2825void
2826_malloc_first_thread(void)
2827{
2828
2829	(void)malloc_mutex_first_thread();
2830}
2831
2832/******************************************************************************/
2833