blob: 5409a935a8bf67ad0a4d87010a2fd64c2711abf1 [file] [log] [blame]
Paul Bakker6e339b52013-07-03 13:37:05 +02001/*
2 * Buffer-based memory allocator
3 *
Paul Bakker7dc4c442014-02-01 22:50:26 +01004 * Copyright (C) 2006-2014, Brainspark B.V.
Paul Bakker6e339b52013-07-03 13:37:05 +02005 *
6 * This file is part of PolarSSL (http://www.polarssl.org)
7 * Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
8 *
9 * All rights reserved.
10 *
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
15 *
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
20 *
21 * You should have received a copy of the GNU General Public License along
22 * with this program; if not, write to the Free Software Foundation, Inc.,
23 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
24 */
25
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020026#if !defined(POLARSSL_CONFIG_FILE)
Paul Bakker6e339b52013-07-03 13:37:05 +020027#include "polarssl/config.h"
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020028#else
29#include POLARSSL_CONFIG_FILE
30#endif
Paul Bakker6e339b52013-07-03 13:37:05 +020031
Paul Bakkerdefc0ca2014-02-04 17:30:24 +010032#if defined(POLARSSL_MEMORY_BUFFER_ALLOC_C)
Paul Bakker6e339b52013-07-03 13:37:05 +020033
Paul Bakkerdefc0ca2014-02-04 17:30:24 +010034#include "polarssl/memory_buffer_alloc.h"
Paul Bakker6e339b52013-07-03 13:37:05 +020035
36#include <string.h>
37
38#if defined(POLARSSL_MEMORY_DEBUG)
39#include <stdio.h>
40#if defined(POLARSSL_MEMORY_BACKTRACE)
41#include <execinfo.h>
42#endif
43#endif
44
Paul Bakker1337aff2013-09-29 14:45:34 +020045#if defined(POLARSSL_THREADING_C)
46#include "polarssl/threading.h"
47#endif
48
Paul Bakker7dc4c442014-02-01 22:50:26 +010049#if defined(POLARSSL_PLATFORM_C)
50#include "polarssl/platform.h"
51#else
52#define polarssl_fprintf fprintf
53#endif
54
Paul Bakker6e339b52013-07-03 13:37:05 +020055#define MAGIC1 0xFF00AA55
56#define MAGIC2 0xEE119966
57#define MAX_BT 20
58
59typedef struct _memory_header memory_header;
60struct _memory_header
61{
62 size_t magic1;
63 size_t size;
64 size_t alloc;
65 memory_header *prev;
66 memory_header *next;
Paul Bakker1ef120f2013-07-03 17:20:39 +020067 memory_header *prev_free;
68 memory_header *next_free;
Paul Bakker6e339b52013-07-03 13:37:05 +020069#if defined(POLARSSL_MEMORY_BACKTRACE)
70 char **trace;
71 size_t trace_count;
72#endif
73 size_t magic2;
74};
75
76typedef struct
77{
78 unsigned char *buf;
79 size_t len;
80 memory_header *first;
Paul Bakker1ef120f2013-07-03 17:20:39 +020081 memory_header *first_free;
Paul Bakker6e339b52013-07-03 13:37:05 +020082 size_t current_alloc_size;
83 int verify;
Paul Bakker891998e2013-07-03 14:45:05 +020084#if defined(POLARSSL_MEMORY_DEBUG)
85 size_t malloc_count;
86 size_t free_count;
87 size_t total_used;
88 size_t maximum_used;
89 size_t header_count;
Manuel Pégourié-Gonnard70896a02013-12-30 18:06:41 +010090 size_t maximum_header_count;
Paul Bakker891998e2013-07-03 14:45:05 +020091#endif
Paul Bakker1337aff2013-09-29 14:45:34 +020092#if defined(POLARSSL_THREADING_C)
93 threading_mutex_t mutex;
94#endif
Paul Bakker6e339b52013-07-03 13:37:05 +020095}
96buffer_alloc_ctx;
97
98static buffer_alloc_ctx heap;
99
100#if defined(POLARSSL_MEMORY_DEBUG)
101static void debug_header( memory_header *hdr )
102{
103#if defined(POLARSSL_MEMORY_BACKTRACE)
104 size_t i;
105#endif
106
Paul Bakker7dc4c442014-02-01 22:50:26 +0100107 polarssl_fprintf( stderr, "HDR: PTR(%10u), PREV(%10u), NEXT(%10u), "
108 "ALLOC(%u), SIZE(%10u)\n",
109 (size_t) hdr, (size_t) hdr->prev, (size_t) hdr->next,
110 hdr->alloc, hdr->size );
111 polarssl_fprintf( stderr, " FPREV(%10u), FNEXT(%10u)\n",
112 (size_t) hdr->prev_free, (size_t) hdr->next_free );
Paul Bakker6e339b52013-07-03 13:37:05 +0200113
114#if defined(POLARSSL_MEMORY_BACKTRACE)
Paul Bakker7dc4c442014-02-01 22:50:26 +0100115 polarssl_fprintf( stderr, "TRACE: \n" );
Paul Bakker6e339b52013-07-03 13:37:05 +0200116 for( i = 0; i < hdr->trace_count; i++ )
Paul Bakker7dc4c442014-02-01 22:50:26 +0100117 polarssl_fprintf( stderr, "%s\n", hdr->trace[i] );
118 polarssl_fprintf( stderr, "\n" );
Paul Bakker6e339b52013-07-03 13:37:05 +0200119#endif
120}
121
122static void debug_chain()
123{
124 memory_header *cur = heap.first;
125
Paul Bakker7dc4c442014-02-01 22:50:26 +0100126 polarssl_fprintf( stderr, "\nBlock list\n" );
Paul Bakker6e339b52013-07-03 13:37:05 +0200127 while( cur != NULL )
128 {
129 debug_header( cur );
Paul Bakker6e339b52013-07-03 13:37:05 +0200130 cur = cur->next;
131 }
Paul Bakker1ef120f2013-07-03 17:20:39 +0200132
Paul Bakker7dc4c442014-02-01 22:50:26 +0100133 polarssl_fprintf( stderr, "Free list\n" );
Paul Bakker1ef120f2013-07-03 17:20:39 +0200134 cur = heap.first_free;
135
136 while( cur != NULL )
137 {
138 debug_header( cur );
139 cur = cur->next_free;
140 }
Paul Bakker6e339b52013-07-03 13:37:05 +0200141}
142#endif /* POLARSSL_MEMORY_DEBUG */
143
144static int verify_header( memory_header *hdr )
145{
146 if( hdr->magic1 != MAGIC1 )
147 {
148#if defined(POLARSSL_MEMORY_DEBUG)
Paul Bakker7dc4c442014-02-01 22:50:26 +0100149 polarssl_fprintf( stderr, "FATAL: MAGIC1 mismatch\n" );
Paul Bakker6e339b52013-07-03 13:37:05 +0200150#endif
151 return( 1 );
152 }
153
154 if( hdr->magic2 != MAGIC2 )
155 {
156#if defined(POLARSSL_MEMORY_DEBUG)
Paul Bakker7dc4c442014-02-01 22:50:26 +0100157 polarssl_fprintf( stderr, "FATAL: MAGIC2 mismatch\n" );
Paul Bakker6e339b52013-07-03 13:37:05 +0200158#endif
159 return( 1 );
160 }
161
162 if( hdr->alloc > 1 )
163 {
164#if defined(POLARSSL_MEMORY_DEBUG)
Paul Bakker7dc4c442014-02-01 22:50:26 +0100165 polarssl_fprintf( stderr, "FATAL: alloc has illegal value\n" );
Paul Bakker6e339b52013-07-03 13:37:05 +0200166#endif
167 return( 1 );
168 }
169
Paul Bakker1ef120f2013-07-03 17:20:39 +0200170 if( hdr->prev != NULL && hdr->prev == hdr->next )
171 {
172#if defined(POLARSSL_MEMORY_DEBUG)
Paul Bakker7dc4c442014-02-01 22:50:26 +0100173 polarssl_fprintf( stderr, "FATAL: prev == next\n" );
Paul Bakker1ef120f2013-07-03 17:20:39 +0200174#endif
175 return( 1 );
176 }
177
178 if( hdr->prev_free != NULL && hdr->prev_free == hdr->next_free )
179 {
180#if defined(POLARSSL_MEMORY_DEBUG)
Paul Bakker7dc4c442014-02-01 22:50:26 +0100181 polarssl_fprintf( stderr, "FATAL: prev_free == next_free\n" );
Paul Bakker1ef120f2013-07-03 17:20:39 +0200182#endif
183 return( 1 );
184 }
185
Paul Bakker6e339b52013-07-03 13:37:05 +0200186 return( 0 );
187}
188
189static int verify_chain()
190{
191 memory_header *prv = heap.first, *cur = heap.first->next;
192
193 if( verify_header( heap.first ) != 0 )
194 {
195#if defined(POLARSSL_MEMORY_DEBUG)
Paul Bakker7dc4c442014-02-01 22:50:26 +0100196 polarssl_fprintf( stderr, "FATAL: verification of first header "
197 "failed\n" );
Paul Bakker6e339b52013-07-03 13:37:05 +0200198#endif
199 return( 1 );
200 }
201
202 if( heap.first->prev != NULL )
203 {
204#if defined(POLARSSL_MEMORY_DEBUG)
Paul Bakker7dc4c442014-02-01 22:50:26 +0100205 polarssl_fprintf( stderr, "FATAL: verification failed: "
206 "first->prev != NULL\n" );
Paul Bakker6e339b52013-07-03 13:37:05 +0200207#endif
208 return( 1 );
209 }
210
211 while( cur != NULL )
212 {
213 if( verify_header( cur ) != 0 )
214 {
215#if defined(POLARSSL_MEMORY_DEBUG)
Paul Bakker7dc4c442014-02-01 22:50:26 +0100216 polarssl_fprintf( stderr, "FATAL: verification of header "
217 "failed\n" );
Paul Bakker6e339b52013-07-03 13:37:05 +0200218#endif
219 return( 1 );
220 }
221
222 if( cur->prev != prv )
223 {
224#if defined(POLARSSL_MEMORY_DEBUG)
Paul Bakker7dc4c442014-02-01 22:50:26 +0100225 polarssl_fprintf( stderr, "FATAL: verification failed: "
226 "cur->prev != prv\n" );
Paul Bakker6e339b52013-07-03 13:37:05 +0200227#endif
228 return( 1 );
229 }
230
231 prv = cur;
232 cur = cur->next;
233 }
234
235 return( 0 );
236}
237
238static void *buffer_alloc_malloc( size_t len )
239{
Paul Bakker1ef120f2013-07-03 17:20:39 +0200240 memory_header *new, *cur = heap.first_free;
Paul Bakker6e339b52013-07-03 13:37:05 +0200241 unsigned char *p;
242#if defined(POLARSSL_MEMORY_BACKTRACE)
243 void *trace_buffer[MAX_BT];
244 size_t trace_cnt;
245#endif
246
247 if( heap.buf == NULL || heap.first == NULL )
248 return( NULL );
249
250 if( len % POLARSSL_MEMORY_ALIGN_MULTIPLE )
251 {
252 len -= len % POLARSSL_MEMORY_ALIGN_MULTIPLE;
253 len += POLARSSL_MEMORY_ALIGN_MULTIPLE;
254 }
255
256 // Find block that fits
257 //
258 while( cur != NULL )
259 {
Paul Bakker1ef120f2013-07-03 17:20:39 +0200260 if( cur->size >= len )
Paul Bakker6e339b52013-07-03 13:37:05 +0200261 break;
262
Paul Bakker1ef120f2013-07-03 17:20:39 +0200263 cur = cur->next_free;
Paul Bakker6e339b52013-07-03 13:37:05 +0200264 }
265
266 if( cur == NULL )
267 return( NULL );
268
Paul Bakker1ef120f2013-07-03 17:20:39 +0200269 if( cur->alloc != 0 )
270 {
271#if defined(POLARSSL_MEMORY_DEBUG)
Paul Bakker7dc4c442014-02-01 22:50:26 +0100272 polarssl_fprintf( stderr, "FATAL: block in free_list but allocated "
273 "data\n" );
Paul Bakker1ef120f2013-07-03 17:20:39 +0200274#endif
275 exit( 1 );
276 }
277
Paul Bakker891998e2013-07-03 14:45:05 +0200278#if defined(POLARSSL_MEMORY_DEBUG)
279 heap.malloc_count++;
280#endif
281
Paul Bakker6e339b52013-07-03 13:37:05 +0200282 // Found location, split block if > memory_header + 4 room left
283 //
284 if( cur->size - len < sizeof(memory_header) + POLARSSL_MEMORY_ALIGN_MULTIPLE )
285 {
286 cur->alloc = 1;
287
Paul Bakker1ef120f2013-07-03 17:20:39 +0200288 // Remove from free_list
289 //
290 if( cur->prev_free != NULL )
291 cur->prev_free->next_free = cur->next_free;
292 else
293 heap.first_free = cur->next_free;
294
295 if( cur->next_free != NULL )
296 cur->next_free->prev_free = cur->prev_free;
297
298 cur->prev_free = NULL;
299 cur->next_free = NULL;
300
Paul Bakker891998e2013-07-03 14:45:05 +0200301#if defined(POLARSSL_MEMORY_DEBUG)
302 heap.total_used += cur->size;
303 if( heap.total_used > heap.maximum_used)
304 heap.maximum_used = heap.total_used;
305#endif
Paul Bakker6e339b52013-07-03 13:37:05 +0200306#if defined(POLARSSL_MEMORY_BACKTRACE)
307 trace_cnt = backtrace( trace_buffer, MAX_BT );
308 cur->trace = backtrace_symbols( trace_buffer, trace_cnt );
309 cur->trace_count = trace_cnt;
310#endif
311
312 if( ( heap.verify & MEMORY_VERIFY_ALLOC ) && verify_chain() != 0 )
313 exit( 1 );
314
315 return ( (unsigned char *) cur ) + sizeof(memory_header);
316 }
317
318 p = ( (unsigned char *) cur ) + sizeof(memory_header) + len;
319 new = (memory_header *) p;
320
321 new->size = cur->size - len - sizeof(memory_header);
322 new->alloc = 0;
323 new->prev = cur;
324 new->next = cur->next;
325#if defined(POLARSSL_MEMORY_BACKTRACE)
326 new->trace = NULL;
327 new->trace_count = 0;
328#endif
329 new->magic1 = MAGIC1;
330 new->magic2 = MAGIC2;
331
332 if( new->next != NULL )
333 new->next->prev = new;
334
Paul Bakker1ef120f2013-07-03 17:20:39 +0200335 // Replace cur with new in free_list
336 //
337 new->prev_free = cur->prev_free;
338 new->next_free = cur->next_free;
339 if( new->prev_free != NULL )
340 new->prev_free->next_free = new;
341 else
342 heap.first_free = new;
343
344 if( new->next_free != NULL )
345 new->next_free->prev_free = new;
346
Paul Bakker6e339b52013-07-03 13:37:05 +0200347 cur->alloc = 1;
348 cur->size = len;
349 cur->next = new;
Paul Bakker1ef120f2013-07-03 17:20:39 +0200350 cur->prev_free = NULL;
351 cur->next_free = NULL;
Paul Bakker6e339b52013-07-03 13:37:05 +0200352
Paul Bakker891998e2013-07-03 14:45:05 +0200353#if defined(POLARSSL_MEMORY_DEBUG)
354 heap.header_count++;
Manuel Pégourié-Gonnard70896a02013-12-30 18:06:41 +0100355 if( heap.header_count > heap.maximum_header_count )
356 heap.maximum_header_count = heap.header_count;
Paul Bakker891998e2013-07-03 14:45:05 +0200357 heap.total_used += cur->size;
358 if( heap.total_used > heap.maximum_used)
359 heap.maximum_used = heap.total_used;
360#endif
Paul Bakker6e339b52013-07-03 13:37:05 +0200361#if defined(POLARSSL_MEMORY_BACKTRACE)
362 trace_cnt = backtrace( trace_buffer, MAX_BT );
363 cur->trace = backtrace_symbols( trace_buffer, trace_cnt );
364 cur->trace_count = trace_cnt;
365#endif
366
367 if( ( heap.verify & MEMORY_VERIFY_ALLOC ) && verify_chain() != 0 )
368 exit( 1 );
369
370 return ( (unsigned char *) cur ) + sizeof(memory_header);
371}
372
373static void buffer_alloc_free( void *ptr )
374{
Paul Bakker1ef120f2013-07-03 17:20:39 +0200375 memory_header *hdr, *old = NULL;
Paul Bakker6e339b52013-07-03 13:37:05 +0200376 unsigned char *p = (unsigned char *) ptr;
377
Paul Bakker6e339b52013-07-03 13:37:05 +0200378 if( ptr == NULL || heap.buf == NULL || heap.first == NULL )
379 return;
380
381 if( p < heap.buf || p > heap.buf + heap.len )
382 {
383#if defined(POLARSSL_MEMORY_DEBUG)
Paul Bakker7dc4c442014-02-01 22:50:26 +0100384 polarssl_fprintf( stderr, "FATAL: polarssl_free() outside of managed "
385 "space\n" );
Paul Bakker6e339b52013-07-03 13:37:05 +0200386#endif
Paul Bakker41350a92013-07-03 15:33:47 +0200387 exit( 1 );
Paul Bakker6e339b52013-07-03 13:37:05 +0200388 }
389
390 p -= sizeof(memory_header);
391 hdr = (memory_header *) p;
392
393 if( verify_header( hdr ) != 0 )
394 exit( 1 );
395
396 if( hdr->alloc != 1 )
397 {
398#if defined(POLARSSL_MEMORY_DEBUG)
Paul Bakker7dc4c442014-02-01 22:50:26 +0100399 polarssl_fprintf( stderr, "FATAL: polarssl_free() on unallocated "
400 "data\n" );
Paul Bakker6e339b52013-07-03 13:37:05 +0200401#endif
Paul Bakker41350a92013-07-03 15:33:47 +0200402 exit( 1 );
Paul Bakker6e339b52013-07-03 13:37:05 +0200403 }
404
405 hdr->alloc = 0;
406
Paul Bakker891998e2013-07-03 14:45:05 +0200407#if defined(POLARSSL_MEMORY_DEBUG)
408 heap.free_count++;
409 heap.total_used -= hdr->size;
410#endif
411
Paul Bakker6e339b52013-07-03 13:37:05 +0200412 // Regroup with block before
413 //
414 if( hdr->prev != NULL && hdr->prev->alloc == 0 )
415 {
Paul Bakker891998e2013-07-03 14:45:05 +0200416#if defined(POLARSSL_MEMORY_DEBUG)
417 heap.header_count--;
418#endif
Paul Bakker6e339b52013-07-03 13:37:05 +0200419 hdr->prev->size += sizeof(memory_header) + hdr->size;
420 hdr->prev->next = hdr->next;
421 old = hdr;
422 hdr = hdr->prev;
423
424 if( hdr->next != NULL )
425 hdr->next->prev = hdr;
426
427#if defined(POLARSSL_MEMORY_BACKTRACE)
428 free( old->trace );
429#endif
430 memset( old, 0, sizeof(memory_header) );
431 }
432
433 // Regroup with block after
434 //
435 if( hdr->next != NULL && hdr->next->alloc == 0 )
436 {
Paul Bakker891998e2013-07-03 14:45:05 +0200437#if defined(POLARSSL_MEMORY_DEBUG)
438 heap.header_count--;
439#endif
Paul Bakker6e339b52013-07-03 13:37:05 +0200440 hdr->size += sizeof(memory_header) + hdr->next->size;
441 old = hdr->next;
442 hdr->next = hdr->next->next;
443
Paul Bakker1ef120f2013-07-03 17:20:39 +0200444 if( hdr->prev_free != NULL || hdr->next_free != NULL )
445 {
446 if( hdr->prev_free != NULL )
447 hdr->prev_free->next_free = hdr->next_free;
448 else
449 heap.first_free = hdr->next_free;
450
451 if( hdr->next_free != NULL )
452 hdr->next_free->prev_free = hdr->prev_free;
453 }
454
455 hdr->prev_free = old->prev_free;
456 hdr->next_free = old->next_free;
457
458 if( hdr->prev_free != NULL )
459 hdr->prev_free->next_free = hdr;
460 else
461 heap.first_free = hdr;
462
463 if( hdr->next_free != NULL )
464 hdr->next_free->prev_free = hdr;
465
Paul Bakker6e339b52013-07-03 13:37:05 +0200466 if( hdr->next != NULL )
467 hdr->next->prev = hdr;
468
469#if defined(POLARSSL_MEMORY_BACKTRACE)
470 free( old->trace );
471#endif
472 memset( old, 0, sizeof(memory_header) );
473 }
474
Paul Bakker1ef120f2013-07-03 17:20:39 +0200475 // Prepend to free_list if we have not merged
476 // (Does not have to stay in same order as prev / next list)
477 //
478 if( old == NULL )
479 {
480 hdr->next_free = heap.first_free;
481 heap.first_free->prev_free = hdr;
482 heap.first_free = hdr;
483 }
484
Paul Bakker6e339b52013-07-03 13:37:05 +0200485#if defined(POLARSSL_MEMORY_BACKTRACE)
486 hdr->trace = NULL;
487 hdr->trace_count = 0;
488#endif
489
490 if( ( heap.verify & MEMORY_VERIFY_FREE ) && verify_chain() != 0 )
491 exit( 1 );
492}
493
Paul Bakkerbf796ac2013-09-28 11:06:38 +0200494void memory_buffer_set_verify( int verify )
495{
496 heap.verify = verify;
497}
498
Paul Bakker6e339b52013-07-03 13:37:05 +0200499int memory_buffer_alloc_verify()
500{
501 return verify_chain();
502}
503
504#if defined(POLARSSL_MEMORY_DEBUG)
505void memory_buffer_alloc_status()
506{
Paul Bakker7dc4c442014-02-01 22:50:26 +0100507 polarssl_fprintf( stderr,
508 "Current use: %u blocks / %u bytes, max: %u blocks / "
509 "%u bytes (total %u bytes), malloc / free: %u / %u\n",
510 heap.header_count, heap.total_used,
511 heap.maximum_header_count, heap.maximum_used,
512 heap.maximum_header_count * sizeof( memory_header )
513 + heap.maximum_used,
514 heap.malloc_count, heap.free_count );
Paul Bakker891998e2013-07-03 14:45:05 +0200515
Paul Bakker6e339b52013-07-03 13:37:05 +0200516 if( heap.first->next == NULL )
Paul Bakker7dc4c442014-02-01 22:50:26 +0100517 polarssl_fprintf( stderr, "All memory de-allocated in stack buffer\n" );
Paul Bakker6e339b52013-07-03 13:37:05 +0200518 else
519 {
Paul Bakker7dc4c442014-02-01 22:50:26 +0100520 polarssl_fprintf( stderr, "Memory currently allocated:\n" );
Paul Bakker6e339b52013-07-03 13:37:05 +0200521 debug_chain();
522 }
523}
Paul Bakker119602b2014-02-05 15:42:55 +0100524#endif /* POLARSSL_MEMORY_DEBUG */
Paul Bakker6e339b52013-07-03 13:37:05 +0200525
Paul Bakker1337aff2013-09-29 14:45:34 +0200526#if defined(POLARSSL_THREADING_C)
527static void *buffer_alloc_malloc_mutexed( size_t len )
528{
529 void *buf;
530 polarssl_mutex_lock( &heap.mutex );
531 buf = buffer_alloc_malloc( len );
532 polarssl_mutex_unlock( &heap.mutex );
533 return( buf );
534}
535
536static void buffer_alloc_free_mutexed( void *ptr )
537{
538 polarssl_mutex_lock( &heap.mutex );
539 buffer_alloc_free( ptr );
540 polarssl_mutex_unlock( &heap.mutex );
541}
Paul Bakker9af723c2014-05-01 13:03:14 +0200542#endif /* POLARSSL_THREADING_C */
Paul Bakker1337aff2013-09-29 14:45:34 +0200543
Paul Bakker6e339b52013-07-03 13:37:05 +0200544int memory_buffer_alloc_init( unsigned char *buf, size_t len )
545{
Paul Bakker6e339b52013-07-03 13:37:05 +0200546 memset( &heap, 0, sizeof(buffer_alloc_ctx) );
547 memset( buf, 0, len );
548
Paul Bakker1337aff2013-09-29 14:45:34 +0200549#if defined(POLARSSL_THREADING_C)
550 polarssl_mutex_init( &heap.mutex );
Paul Bakkerdefc0ca2014-02-04 17:30:24 +0100551 platform_set_malloc_free( buffer_alloc_malloc_mutexed,
552 buffer_alloc_free_mutexed );
Paul Bakker1337aff2013-09-29 14:45:34 +0200553#else
Paul Bakkerdefc0ca2014-02-04 17:30:24 +0100554 platform_set_malloc_free( buffer_alloc_malloc, buffer_alloc_free );
Paul Bakker1337aff2013-09-29 14:45:34 +0200555#endif
556
Paul Bakker6e339b52013-07-03 13:37:05 +0200557 heap.buf = buf;
558 heap.len = len;
559
560 heap.first = (memory_header *) buf;
561 heap.first->size = len - sizeof(memory_header);
562 heap.first->magic1 = MAGIC1;
563 heap.first->magic2 = MAGIC2;
Paul Bakker1ef120f2013-07-03 17:20:39 +0200564 heap.first_free = heap.first;
Paul Bakker6e339b52013-07-03 13:37:05 +0200565 return( 0 );
566}
567
Paul Bakker1337aff2013-09-29 14:45:34 +0200568void memory_buffer_alloc_free()
569{
570#if defined(POLARSSL_THREADING_C)
571 polarssl_mutex_free( &heap.mutex );
572#endif
573 memset( &heap, 0, sizeof(buffer_alloc_ctx) );
574}
575
Paul Bakkerdefc0ca2014-02-04 17:30:24 +0100576#endif /* POLARSSL_MEMORY_BUFFER_ALLOC_C */