1 .\" Copyright (c) 2012 by Michael Kerrisk <mtk.manpages@gmail.com>
3 .\" %%%LICENSE_START(VERBATIM)
4 .\" Permission is granted to make and distribute verbatim copies of this
5 .\" manual provided the copyright notice and this permission notice are
6 .\" preserved on all copies.
8 .\" Permission is granted to copy and distribute modified versions of this
9 .\" manual under the conditions for verbatim copying, provided that the
10 .\" entire resulting derived work is distributed under the terms of a
11 .\" permission notice identical to this one.
13 .\" Since the Linux kernel and libraries are constantly changing, this
14 .\" manual page may be incorrect or out-of-date. The author(s) assume no
15 .\" responsibility for errors or omissions, or for damages resulting from
16 .\" the use of the information contained herein. The author(s) may not
17 .\" have taken the same level of care in the production of this manual,
18 .\" which is licensed free of charge, as they might when working
21 .\" Formatted or processed versions of this manual, if unaccompanied by
22 .\" the source, must acknowledge the copyright and authors of this work.
25 .TH MALLOC_USABLE_SIZE 3 2021-03-22 "GNU" "Linux Programmer's Manual"
27 malloc_usable_size \- obtain size of block of memory allocated from heap
30 .B #include <malloc.h>
32 .BI "size_t malloc_usable_size(void *" ptr );
36 .BR malloc_usable_size ()
37 function returns the number of usable bytes in the block pointed to by
39 a pointer to a block of memory allocated by
41 or a related function.
43 .BR malloc_usable_size ()
44 returns the number of usable bytes in
45 the block of allocated memory pointed to by
49 is NULL, 0 is returned.
51 For an explanation of the terms used in this section, see
59 Interface Attribute Value
61 .BR malloc_usable_size ()
62 T} Thread safety MT-Safe
68 This function is a GNU extension.
71 .BR malloc_usable_size ()
72 may be greater than the requested size of the allocation because
73 of alignment and minimum size constraints.
74 Although the excess bytes can be overwritten by the application
76 this is not good programming practice:
77 the number of excess bytes in an allocation depends on
78 the underlying implementation.
80 The main use of this function is for debugging and introspection.