1 #include "test/jemalloc_test.h" 2 3 #ifdef JEMALLOC_FILL 4 # ifndef JEMALLOC_TEST_JUNK_OPT 5 # define JEMALLOC_TEST_JUNK_OPT "junk:true" 6 # endif 7 const char *malloc_conf = 8 "abort:false,zero:false,redzone:true,quarantine:0," JEMALLOC_TEST_JUNK_OPT; 9 #endif 10 11 static arena_dalloc_junk_small_t *arena_dalloc_junk_small_orig; 12 static arena_dalloc_junk_large_t *arena_dalloc_junk_large_orig; 13 static huge_dalloc_junk_t *huge_dalloc_junk_orig; 14 static void *watch_for_junking; 15 static bool saw_junking; 16 17 static void 18 watch_junking(void *p) 19 { 20 21 watch_for_junking = p; 22 saw_junking = false; 23 } 24 25 static void 26 arena_dalloc_junk_small_intercept(void *ptr, arena_bin_info_t *bin_info) 27 { 28 size_t i; 29 30 arena_dalloc_junk_small_orig(ptr, bin_info); 31 for (i = 0; i < bin_info->reg_size; i++) { 32 assert_c_eq(((char *)ptr)[i], 0x5a, 33 "Missing junk fill for byte %zu/%zu of deallocated region", 34 i, bin_info->reg_size); 35 } 36 if (ptr == watch_for_junking) 37 saw_junking = true; 38 } 39 40 static void 41 arena_dalloc_junk_large_intercept(void *ptr, size_t usize) 42 { 43 size_t i; 44 45 arena_dalloc_junk_large_orig(ptr, usize); 46 for (i = 0; i < usize; i++) { 47 assert_c_eq(((char *)ptr)[i], 0x5a, 48 "Missing junk fill for byte %zu/%zu of deallocated region", 49 i, usize); 50 } 51 if (ptr == watch_for_junking) 52 saw_junking = true; 53 } 54 55 static void 56 huge_dalloc_junk_intercept(void *ptr, size_t usize) 57 { 58 59 huge_dalloc_junk_orig(ptr, usize); 60 /* 61 * The conditions under which junk filling actually occurs are nuanced 62 * enough that it doesn't make sense to duplicate the decision logic in 63 * test code, so don't actually check that the region is junk-filled. 64 */ 65 if (ptr == watch_for_junking) 66 saw_junking = true; 67 } 68 69 static void 70 test_junk(size_t sz_min, size_t sz_max) 71 { 72 char *s; 73 size_t sz_prev, sz, i; 74 75 if (opt_junk_free) { 76 arena_dalloc_junk_small_orig = arena_dalloc_junk_small; 77 arena_dalloc_junk_small = arena_dalloc_junk_small_intercept; 78 arena_dalloc_junk_large_orig = arena_dalloc_junk_large; 79 arena_dalloc_junk_large = arena_dalloc_junk_large_intercept; 80 huge_dalloc_junk_orig = huge_dalloc_junk; 81 huge_dalloc_junk = huge_dalloc_junk_intercept; 82 } 83 84 sz_prev = 0; 85 s = (char *)mallocx(sz_min, 0); 86 assert_ptr_not_null((void *)s, "Unexpected mallocx() failure"); 87 88 for (sz = sallocx(s, 0); sz <= sz_max; 89 sz_prev = sz, sz = sallocx(s, 0)) { 90 if (sz_prev > 0) { 91 assert_c_eq(s[0], 'a', 92 "Previously allocated byte %zu/%zu is corrupted", 93 ZU(0), sz_prev); 94 assert_c_eq(s[sz_prev-1], 'a', 95 "Previously allocated byte %zu/%zu is corrupted", 96 sz_prev-1, sz_prev); 97 } 98 99 for (i = sz_prev; i < sz; i++) { 100 if (opt_junk_alloc) { 101 assert_c_eq(s[i], 0xa5, 102 "Newly allocated byte %zu/%zu isn't " 103 "junk-filled", i, sz); 104 } 105 s[i] = 'a'; 106 } 107 108 if (xallocx(s, sz+1, 0, 0) == sz) { 109 watch_junking(s); 110 s = (char *)rallocx(s, sz+1, 0); 111 assert_ptr_not_null((void *)s, 112 "Unexpected rallocx() failure"); 113 assert_true(!opt_junk_free || saw_junking, 114 "Expected region of size %zu to be junk-filled", 115 sz); 116 } 117 } 118 119 watch_junking(s); 120 dallocx(s, 0); 121 assert_true(!opt_junk_free || saw_junking, 122 "Expected region of size %zu to be junk-filled", sz); 123 124 if (opt_junk_free) { 125 arena_dalloc_junk_small = arena_dalloc_junk_small_orig; 126 arena_dalloc_junk_large = arena_dalloc_junk_large_orig; 127 huge_dalloc_junk = huge_dalloc_junk_orig; 128 } 129 } 130 131 TEST_BEGIN(test_junk_small) 132 { 133 134 test_skip_if(!config_fill); 135 test_junk(1, SMALL_MAXCLASS-1); 136 } 137 TEST_END 138 139 TEST_BEGIN(test_junk_large) 140 { 141 142 test_skip_if(!config_fill); 143 test_junk(SMALL_MAXCLASS+1, arena_maxclass); 144 } 145 TEST_END 146 147 TEST_BEGIN(test_junk_huge) 148 { 149 150 test_skip_if(!config_fill); 151 test_junk(arena_maxclass+1, chunksize*2); 152 } 153 TEST_END 154 155 arena_ralloc_junk_large_t *arena_ralloc_junk_large_orig; 156 static void *most_recently_trimmed; 157 158 static size_t 159 shrink_size(size_t size) 160 { 161 size_t shrink_size; 162 163 for (shrink_size = size - 1; nallocx(shrink_size, 0) == size; 164 shrink_size--) 165 ; /* Do nothing. */ 166 167 return (shrink_size); 168 } 169 170 static void 171 arena_ralloc_junk_large_intercept(void *ptr, size_t old_usize, size_t usize) 172 { 173 174 arena_ralloc_junk_large_orig(ptr, old_usize, usize); 175 assert_zu_eq(old_usize, arena_maxclass, "Unexpected old_usize"); 176 assert_zu_eq(usize, shrink_size(arena_maxclass), "Unexpected usize"); 177 most_recently_trimmed = ptr; 178 } 179 180 TEST_BEGIN(test_junk_large_ralloc_shrink) 181 { 182 void *p1, *p2; 183 184 p1 = mallocx(arena_maxclass, 0); 185 assert_ptr_not_null(p1, "Unexpected mallocx() failure"); 186 187 arena_ralloc_junk_large_orig = arena_ralloc_junk_large; 188 arena_ralloc_junk_large = arena_ralloc_junk_large_intercept; 189 190 p2 = rallocx(p1, shrink_size(arena_maxclass), 0); 191 assert_ptr_eq(p1, p2, "Unexpected move during shrink"); 192 193 arena_ralloc_junk_large = arena_ralloc_junk_large_orig; 194 195 assert_ptr_eq(most_recently_trimmed, p1, 196 "Expected trimmed portion of region to be junk-filled"); 197 } 198 TEST_END 199 200 static bool detected_redzone_corruption; 201 202 static void 203 arena_redzone_corruption_replacement(void *ptr, size_t usize, bool after, 204 size_t offset, uint8_t byte) 205 { 206 207 detected_redzone_corruption = true; 208 } 209 210 TEST_BEGIN(test_junk_redzone) 211 { 212 char *s; 213 arena_redzone_corruption_t *arena_redzone_corruption_orig; 214 215 test_skip_if(!config_fill); 216 test_skip_if(!opt_junk_alloc || !opt_junk_free); 217 218 arena_redzone_corruption_orig = arena_redzone_corruption; 219 arena_redzone_corruption = arena_redzone_corruption_replacement; 220 221 /* Test underflow. */ 222 detected_redzone_corruption = false; 223 s = (char *)mallocx(1, 0); 224 assert_ptr_not_null((void *)s, "Unexpected mallocx() failure"); 225 s[-1] = 0xbb; 226 dallocx(s, 0); 227 assert_true(detected_redzone_corruption, 228 "Did not detect redzone corruption"); 229 230 /* Test overflow. */ 231 detected_redzone_corruption = false; 232 s = (char *)mallocx(1, 0); 233 assert_ptr_not_null((void *)s, "Unexpected mallocx() failure"); 234 s[sallocx(s, 0)] = 0xbb; 235 dallocx(s, 0); 236 assert_true(detected_redzone_corruption, 237 "Did not detect redzone corruption"); 238 239 arena_redzone_corruption = arena_redzone_corruption_orig; 240 } 241 TEST_END 242 243 int 244 main(void) 245 { 246 247 assert(opt_junk_alloc || opt_junk_free); 248 return (test( 249 test_junk_small, 250 test_junk_large, 251 test_junk_huge, 252 test_junk_large_ralloc_shrink, 253 test_junk_redzone)); 254 } 255