21dfa4300d
``` grep -Irl assert_ test/ | xargs sed -i \ 's/witness_assert/witness_do_not_replace/g'; grep -Irl assert_ test/ | xargs sed -i \ 's/malloc_mutex_assert_owner/malloc_mutex_do_not_replace_owner/g'; grep -Ir assert_ test/ | grep -o "[_a-zA-Z]*assert_[_a-zA-Z]*" | \ grep -v "^assert_"; # confirm no output grep -Irl assert_ test/ | xargs sed -i 's/assert_/expect_/g'; grep -Irl witness_do_not_replace test/ | xargs sed -i \ 's/witness_do_not_replace/witness_assert/g'; grep -Irl malloc_mutex_do_not_replace_owner test/ | xargs sed -i \ 's/malloc_mutex_do_not_replace_owner/malloc_mutex_assert_owner/g'; ```
60 lines
1.9 KiB
C
60 lines
1.9 KiB
C
#include "test/jemalloc_test.h"
|
|
|
|
/*
|
|
* GCC "-Walloc-size-larger-than" warning detects when one of the memory
|
|
* allocation functions is called with a size larger than the maximum size that
|
|
* they support. Here we want to explicitly test that the allocation functions
|
|
* do indeed fail properly when this is the case, which triggers the warning.
|
|
* Therefore we disable the warning for these tests.
|
|
*/
|
|
JEMALLOC_DIAGNOSTIC_PUSH
|
|
JEMALLOC_DIAGNOSTIC_IGNORE_ALLOC_SIZE_LARGER_THAN
|
|
|
|
TEST_BEGIN(test_overflow) {
|
|
unsigned nlextents;
|
|
size_t mib[4];
|
|
size_t sz, miblen, max_size_class;
|
|
void *p;
|
|
|
|
sz = sizeof(unsigned);
|
|
expect_d_eq(mallctl("arenas.nlextents", (void *)&nlextents, &sz, NULL,
|
|
0), 0, "Unexpected mallctl() error");
|
|
|
|
miblen = sizeof(mib) / sizeof(size_t);
|
|
expect_d_eq(mallctlnametomib("arenas.lextent.0.size", mib, &miblen), 0,
|
|
"Unexpected mallctlnametomib() error");
|
|
mib[2] = nlextents - 1;
|
|
|
|
sz = sizeof(size_t);
|
|
expect_d_eq(mallctlbymib(mib, miblen, (void *)&max_size_class, &sz,
|
|
NULL, 0), 0, "Unexpected mallctlbymib() error");
|
|
|
|
expect_ptr_null(malloc(max_size_class + 1),
|
|
"Expected OOM due to over-sized allocation request");
|
|
expect_ptr_null(malloc(SIZE_T_MAX),
|
|
"Expected OOM due to over-sized allocation request");
|
|
|
|
expect_ptr_null(calloc(1, max_size_class + 1),
|
|
"Expected OOM due to over-sized allocation request");
|
|
expect_ptr_null(calloc(1, SIZE_T_MAX),
|
|
"Expected OOM due to over-sized allocation request");
|
|
|
|
p = malloc(1);
|
|
expect_ptr_not_null(p, "Unexpected malloc() OOM");
|
|
expect_ptr_null(realloc(p, max_size_class + 1),
|
|
"Expected OOM due to over-sized allocation request");
|
|
expect_ptr_null(realloc(p, SIZE_T_MAX),
|
|
"Expected OOM due to over-sized allocation request");
|
|
free(p);
|
|
}
|
|
TEST_END
|
|
|
|
/* Re-enable the "-Walloc-size-larger-than=" warning */
|
|
JEMALLOC_DIAGNOSTIC_POP
|
|
|
|
int
|
|
main(void) {
|
|
return test(
|
|
test_overflow);
|
|
}
|