diff options
author | Wim <wim@42.be> | 2022-01-31 00:27:37 +0100 |
---|---|---|
committer | Wim <wim@42.be> | 2022-03-20 14:57:48 +0100 |
commit | e3cafeaf9292f67459ff1d186f68283bfaedf2ae (patch) | |
tree | b69c39620aa91dba695b3b935c6651c0fb37ce75 /vendor/modernc.org/libc/mem_brk.go | |
parent | e7b193788a56ee7cdb02a87a9db0ad6724ef66d5 (diff) | |
download | matterbridge-msglm-e3cafeaf9292f67459ff1d186f68283bfaedf2ae.tar.gz matterbridge-msglm-e3cafeaf9292f67459ff1d186f68283bfaedf2ae.tar.bz2 matterbridge-msglm-e3cafeaf9292f67459ff1d186f68283bfaedf2ae.zip |
Add dependencies/vendor (whatsapp)
Diffstat (limited to 'vendor/modernc.org/libc/mem_brk.go')
-rw-r--r-- | vendor/modernc.org/libc/mem_brk.go | 105 |
1 files changed, 105 insertions, 0 deletions
diff --git a/vendor/modernc.org/libc/mem_brk.go b/vendor/modernc.org/libc/mem_brk.go new file mode 100644 index 00000000..860a1a0a --- /dev/null +++ b/vendor/modernc.org/libc/mem_brk.go @@ -0,0 +1,105 @@ +// Copyright 2021 The Libc Authors. All rights reserved. +// Use of this source code is governed by a BSD-style +// license that can be found in the LICENSE file. + +//go:build libc.membrk && !libc.memgrind +// +build libc.membrk,!libc.memgrind + +// This is a debug-only version of the memory handling functions. When a +// program is built with -tags=libc.membrk a simple but safe version of malloc +// and friends is used that works like sbrk(2). Additionally free becomes a +// nop. + +package libc // import "modernc.org/libc" + +import ( + "unsafe" + + "modernc.org/libc/errno" + "modernc.org/libc/sys/types" +) + +const ( + heapSize = 20 << 30 // Adjust for your debugging session requirements and system RAM size. + heapAlign = 16 + memgrind = false +) + +var ( + heap = make([]byte, heapSize) + heapP = uintptr(unsafe.Pointer(&heap[heapAlign])) + heapLast = uintptr(unsafe.Pointer(&heap[heapSize-1])) +) + +// void *malloc(size_t size); +func Xmalloc(t *TLS, n types.Size_t) uintptr { + if n == 0 { + return 0 + } + + allocMu.Lock() + + defer allocMu.Unlock() + + n2 := uintptr(n) + uintptrSize // reserve space for recording block size + p := roundup(heapP, 16) + if p+uintptr(n2) >= heapLast { + t.setErrno(errno.ENOMEM) + return 0 + } + + heapP = p + uintptr(n2) + *(*uintptr)(unsafe.Pointer(p - uintptrSize)) = uintptr(n) + return p +} + +// void *calloc(size_t nmemb, size_t size); +func Xcalloc(t *TLS, n, size types.Size_t) uintptr { + return Xmalloc(t, n*size) +} + +// void *realloc(void *ptr, size_t size); +func Xrealloc(t *TLS, ptr uintptr, size types.Size_t) uintptr { + switch { + case ptr != 0 && size != 0: + p := Xmalloc(t, size) + sz0 := UsableSize(ptr) + if p != 0 { + copy((*RawMem)(unsafe.Pointer(p))[:size:size], (*RawMem)(unsafe.Pointer(ptr))[:sz0:sz0]) + } + return p + case ptr == 0 && size != 0: + return Xmalloc(t, size) + } + return 0 +} + +// void free(void *ptr); +func Xfree(t *TLS, p uintptr) {} + +func UsableSize(p uintptr) types.Size_t { + return types.Size_t(*(*uintptr)(unsafe.Pointer(p - uintptrSize))) +} + +// MemAuditStart locks the memory allocator, initializes and enables memory +// auditing. Finaly it unlocks the memory allocator. +// +// Some memory handling errors, like double free or freeing of unallocated +// memory, will panic when memory auditing is enabled. +// +// This memory auditing functionality has to be enabled using the libc.memgrind +// build tag. +// +// It is intended only for debug/test builds. It slows down memory allocation +// routines and it has additional memory costs. +func MemAuditStart() {} + +// MemAuditReport locks the memory allocator, reports memory leaks, if any. +// Finally it disables memory auditing and unlocks the memory allocator. +// +// This memory auditing functionality has to be enabled using the libc.memgrind +// build tag. +// +// It is intended only for debug/test builds. It slows down memory allocation +// routines and it has additional memory costs. +func MemAuditReport() error { return nil } |