Jason Evans | 0d6c5d8 | 2013-12-17 15:14:36 -0800 | [diff] [blame] | 1 | #include "test/jemalloc_test.h" |
| 2 | |
| 3 | #define QUARANTINE_SIZE 8192 |
| 4 | #define STRINGIFY_HELPER(x) #x |
| 5 | #define STRINGIFY(x) STRINGIFY_HELPER(x) |
| 6 | |
| 7 | #ifdef JEMALLOC_FILL |
| 8 | const char *malloc_conf = "abort:false,junk:true,redzone:true,quarantine:" |
| 9 | STRINGIFY(QUARANTINE_SIZE); |
| 10 | #endif |
| 11 | |
| 12 | void |
| 13 | quarantine_clear(void) |
| 14 | { |
| 15 | void *p; |
| 16 | |
| 17 | p = mallocx(QUARANTINE_SIZE*2, 0); |
| 18 | assert_ptr_not_null(p, "Unexpected mallocx() failure"); |
| 19 | dallocx(p, 0); |
| 20 | } |
| 21 | |
| 22 | TEST_BEGIN(test_quarantine) |
| 23 | { |
Jason Evans | ab8c79f | 2014-03-30 11:21:09 -0700 | [diff] [blame] | 24 | #define SZ ZU(256) |
Jason Evans | 0d6c5d8 | 2013-12-17 15:14:36 -0800 | [diff] [blame] | 25 | #define NQUARANTINED (QUARANTINE_SIZE/SZ) |
| 26 | void *quarantined[NQUARANTINED+1]; |
| 27 | size_t i, j; |
| 28 | |
| 29 | test_skip_if(!config_fill); |
| 30 | |
| 31 | assert_zu_eq(nallocx(SZ, 0), SZ, |
| 32 | "SZ=%zu does not precisely equal a size class", SZ); |
| 33 | |
| 34 | quarantine_clear(); |
| 35 | |
| 36 | /* |
| 37 | * Allocate enough regions to completely fill the quarantine, plus one |
| 38 | * more. The last iteration occurs with a completely full quarantine, |
| 39 | * but no regions should be drained from the quarantine until the last |
| 40 | * deallocation occurs. Therefore no region recycling should occur |
| 41 | * until after this loop completes. |
| 42 | */ |
| 43 | for (i = 0; i < NQUARANTINED+1; i++) { |
| 44 | void *p = mallocx(SZ, 0); |
| 45 | assert_ptr_not_null(p, "Unexpected mallocx() failure"); |
| 46 | quarantined[i] = p; |
| 47 | dallocx(p, 0); |
| 48 | for (j = 0; j < i; j++) { |
| 49 | assert_ptr_ne(p, quarantined[j], |
| 50 | "Quarantined region recycled too early; " |
| 51 | "i=%zu, j=%zu", i, j); |
| 52 | } |
| 53 | } |
| 54 | #undef NQUARANTINED |
| 55 | #undef SZ |
| 56 | } |
| 57 | TEST_END |
| 58 | |
| 59 | static bool detected_redzone_corruption; |
| 60 | |
| 61 | static void |
| 62 | arena_redzone_corruption_replacement(void *ptr, size_t usize, bool after, |
| 63 | size_t offset, uint8_t byte) |
| 64 | { |
| 65 | |
| 66 | detected_redzone_corruption = true; |
| 67 | } |
| 68 | |
| 69 | TEST_BEGIN(test_quarantine_redzone) |
| 70 | { |
| 71 | char *s; |
| 72 | arena_redzone_corruption_t *arena_redzone_corruption_orig; |
| 73 | |
| 74 | test_skip_if(!config_fill); |
| 75 | |
Jason Evans | 6b694c4 | 2014-01-07 16:47:56 -0800 | [diff] [blame] | 76 | arena_redzone_corruption_orig = arena_redzone_corruption; |
| 77 | arena_redzone_corruption = arena_redzone_corruption_replacement; |
Jason Evans | 0d6c5d8 | 2013-12-17 15:14:36 -0800 | [diff] [blame] | 78 | |
| 79 | /* Test underflow. */ |
| 80 | detected_redzone_corruption = false; |
| 81 | s = (char *)mallocx(1, 0); |
| 82 | assert_ptr_not_null((void *)s, "Unexpected mallocx() failure"); |
| 83 | s[-1] = 0xbb; |
| 84 | dallocx(s, 0); |
| 85 | assert_true(detected_redzone_corruption, |
| 86 | "Did not detect redzone corruption"); |
| 87 | |
| 88 | /* Test overflow. */ |
| 89 | detected_redzone_corruption = false; |
| 90 | s = (char *)mallocx(1, 0); |
| 91 | assert_ptr_not_null((void *)s, "Unexpected mallocx() failure"); |
| 92 | s[sallocx(s, 0)] = 0xbb; |
| 93 | dallocx(s, 0); |
| 94 | assert_true(detected_redzone_corruption, |
| 95 | "Did not detect redzone corruption"); |
| 96 | |
Jason Evans | 6b694c4 | 2014-01-07 16:47:56 -0800 | [diff] [blame] | 97 | arena_redzone_corruption = arena_redzone_corruption_orig; |
Jason Evans | 0d6c5d8 | 2013-12-17 15:14:36 -0800 | [diff] [blame] | 98 | } |
| 99 | TEST_END |
| 100 | |
| 101 | int |
| 102 | main(void) |
| 103 | { |
| 104 | |
| 105 | return (test( |
| 106 | test_quarantine, |
| 107 | test_quarantine_redzone)); |
| 108 | } |