aboutsummaryrefslogtreecommitdiff
path: root/manual
diff options
context:
space:
mode:
authorUlrich Drepper <drepper@redhat.com>1999-11-12 17:15:18 +0000
committerUlrich Drepper <drepper@redhat.com>1999-11-12 17:15:18 +0000
commitb2f46c3c0e2119545e52a01e1d73a93d21ebbc0d (patch)
treed410ddb62123cf442d47d4848d86139d8681b8a4 /manual
parente78c8e4c26d4dfa781c033ef1e069630a0678c6e (diff)
downloadglibc-b2f46c3c0e2119545e52a01e1d73a93d21ebbc0d.zip
glibc-b2f46c3c0e2119545e52a01e1d73a93d21ebbc0d.tar.gz
glibc-b2f46c3c0e2119545e52a01e1d73a93d21ebbc0d.tar.bz2
Update.
1999-11-01 Wolfram Gloger <wg@malloc.de> * malloc/malloc.h: Describe __malloc_initialize_hook. * manual/memory.texi: Document __malloc_initialize_hook. * sysdeps/unix/sysv/linux/setrlimit.c: Correctly use rlimits.
Diffstat (limited to 'manual')
-rw-r--r--manual/memory.texi48
1 files changed, 42 insertions, 6 deletions
diff --git a/manual/memory.texi b/manual/memory.texi
index c957c2f..28c619f 100644
--- a/manual/memory.texi
+++ b/manual/memory.texi
@@ -731,6 +731,34 @@ should make sure to restore all the hooks to their previous value. When
coming back from the recursive call, all the hooks should be resaved
since a hook might modify itself.
+@comment malloc.h
+@comment GNU
+@defvar __malloc_initialize_hook
+The value of this variable is a pointer to a function that is called
+once when the malloc implementation is initialized. This is a weak
+variable, so it can be overridden in the application with a definition
+like the following:
+
+@smallexample
+void (*@var{__malloc_initialize_hook}) (void) = my_init_hook;
+@end smallexample
+@end defvar
+
+An issue to look out for is the time at which the malloc hook functions
+can be safely installed. If the hook functions call the malloc-related
+functions recursively, it is necessary that malloc has already properly
+initialized itself at the time when @code{__malloc_hook} etc. is
+assigned to. On the other hand, if the hook functions provide a
+complete malloc implementation of their own, it is vital that the hooks
+are assigned to @emph{before} the very first @code{malloc} call has
+completed, because otherwise a chunk obtained from the ordinary,
+un-hooked malloc may later be handed to @code{__free_hook}, for example.
+
+In both cases, the problem can be solved by setting up the hooks from
+within a user-defined function pointed to by
+@code{__malloc_initialize_hook}---then the hooks will be set up safely
+at the right time.
+
Here is an example showing how to use @code{__malloc_hook} and
@code{__free_hook} properly. It installs a function that prints out
information every time @code{malloc} or @code{free} is called. We just
@@ -743,8 +771,21 @@ static void *(*old_malloc_hook) (size_t);
static void (*old_free_hook) (void*);
/* Prototypes for our hooks. */
+static void *my_init_hook (void);
static void *my_malloc_hook (size_t);
-static void my_free_hook(void*);
+static void my_free_hook (void*);
+
+/* Override initializing hook from the C library. */
+void (*__malloc_initialize_hook) (void) = my_init_hook;
+
+static void
+my_init_hook (void)
+@{
+ old_malloc_hook = __malloc_hook;
+ old_free_hook = __free_hook;
+ __malloc_hook = my_malloc_hook;
+ __free_hook = my_free_hook;
+@}
static void *
my_malloc_hook (size_t size)
@@ -787,11 +828,6 @@ my_free_hook (void *ptr)
main ()
@{
...
- old_malloc_hook = __malloc_hook;
- old_free_hook = __free_hook;
- __malloc_hook = my_malloc_hook;
- __free_hook = my_free_hook;
- ...
@}
@end smallexample