aboutsummaryrefslogtreecommitdiff
path: root/src/lib/malloc/lib_malloc.md
blob: ff61722f026f4af4ff669d13f895e016e6bbad15 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
@dir /lib/malloc
@brief lib/malloc: Wrappers and utilities for memory management.


Tor imposes a few light wrappers over C's native malloc and free
functions, to improve convenience, and to allow wholescale replacement
of malloc and free as needed.

You should never use 'malloc', 'calloc', 'realloc, or 'free' on their
own; always use the variants prefixed with 'tor_'.
They are the same as the standard C functions, with the following
exceptions:

   * `tor_free(NULL)` is a no-op.
   * `tor_free()` is a macro that takes an lvalue as an argument and sets it to
     NULL after freeing it.  To avoid this behavior, you can use `tor_free_()`
     instead.
   * tor_malloc() and friends fail with an assertion if they are asked to
     allocate a value so large that it is probably an underflow.
   * It is always safe to `tor_malloc(0)`, regardless of whether your libc
     allows it.
   * `tor_malloc()`, `tor_realloc()`, and friends are never allowed to fail.
     Instead, Tor will die with an assertion.  This means that you never
     need to check their return values.  See the next subsection for
     information on why we think this is a good idea.

We define additional general-purpose memory allocation functions as well:

   * `tor_malloc_zero(x)` behaves as `calloc(1, x)`, except the it makes clear
     the intent to allocate a single zeroed-out value.
   * `tor_reallocarray(x,y)` behaves as the OpenBSD reallocarray function.
     Use it for cases when you need to realloc() in a multiplication-safe
     way.

And specific-purpose functions as well:

   * `tor_strdup()` and `tor_strndup()` behaves as the underlying libc
     functions, but use `tor_malloc()` instead of the underlying function.
   * `tor_memdup()` copies a chunk of memory of a given size.
   * `tor_memdup_nulterm()` copies a chunk of memory of a given size, then
     NUL-terminates it just to be safe.

#### Why assert on allocation failure?

Why don't we allow `tor_malloc()` and its allies to return NULL?

First, it's error-prone.  Many programmers forget to check for NULL return
values, and testing for `malloc()` failures is a major pain.

Second, it's not necessarily a great way to handle OOM conditions. It's
probably better (we think) to have a memory target where we dynamically free
things ahead of time in order to stay under the target.  Trying to respond to
an OOM at the point of `tor_malloc()` failure, on the other hand, would involve
a rare operation invoked from deep in the call stack.  (Again, that's
error-prone and hard to debug.)

Third, thanks to the rise of Linux and other operating systems that allow
memory to be overcommitted, you can't actually ever rely on getting a NULL
from `malloc()` when you're out of memory; instead you have to use an approach
closer to tracking the total memory usage.

#### Conventions for your own allocation functions.

Whenever you create a new type, the convention is to give it a pair of
`x_new()` and `x_free_()` functions, named after the type.

Calling `x_free(NULL)` should always be a no-op.

There should additionally be an `x_free()` macro, defined in terms of
`x_free_()`.  This macro should set its lvalue to NULL.  You can define it
using the FREE_AND_NULL macro, as follows:

```
#define x_free(ptr) FREE_AND_NULL(x_t, x_free_, (ptr))
```