I've heard in a lot of places (musl mailing list, macOS forums, etc.) that brk()
and sbrk()
are unsafe. Many of these places either don't give explanations at all, or give very vague explanations. For example, this link states that "these functions are fundamentally broken", and goes on to say that the malloc
and sbrk
subsystems are utterly broken, that they ruin the heap, et al.
My question is: Why is this so? If malloc
is used in such a way that it allocates a block of memory with sbrk
large enough to quell or substantially decrease the need for further allocations, then shouldn't sbrk
and brk
be perfectly safe to use?
Here are my implementations of sbrk
and brk
:
sbrk
:
#include <unistd.h>
#include <stddef.h>
void *sbrk(intptr_t inc)
{
intptr_t curbrk = syscall(SYS_brk, NULL);
if( inc == 0 ) goto ret;
if( curbrk < 0 ) return (void *)-1;
curbrk((void *)(curbrk+inc));
ret:
return (void *)curbrk;
}
brk
:
#include <unistd.h>
intptr_t brk(void *ptr)
{
if( (void *)syscall(SYS_brk, ptr) != ptr )
return -1;
else
return 0;
}
The reality highly depends on the implementation but here are some elements:
unsafe
brk
/sbrk
were invented to allow a process to request more memory from the system, and release it in a single contiguous segment. As such, they were used by manymalloc
andfree
implementations. The problem was that, as it returned a unique segment, things would go wrong as multiple modules (of the same process) use it directly. It became even worse in a multi-threaded process because of race conditions. Suppose 2 threads want to add new memory. They will look at the current top address withsbrk(0)
, see the same address, request new memory with eitherbrk
orsbrk
, and because of the race condition, will both use the same memory.Even in a single threaded process, some
malloc
andfree
implementations assume that they only are allowed to use the low levels/brk
interface, and that any other code should use them. In that case things will go wrong if the image of the break segment that they internally maintain is no longer the assumed value. They should have to guess that some parts of the segment are "reserved" for other uses, possibly breaking the ability to release any memory.For that reason, user code should never directly use
brk
/sbrk
and only rely onmalloc
/free
. If, and only if, you are writing an implementation of the standard library includingmalloc
/realloc
/calloc
/free
, you can safely usebrk
/sbrk
legacy
On modern system,
mmap
can make a much nicer usage of virtual memory management. You can use as many dynamic memory segments as you need with no interaction between them. So, on a modern system, unless you have a specific need for memory allocation usingbrk
/sbrk
, you should usemmap
.portability
The FreeBSD reference for
brk
andsbrk
states this:and later: