1 | /* |
2 | Copyright (c) 2005-2019 Intel Corporation |
3 | |
4 | Licensed under the Apache License, Version 2.0 (the "License"); |
5 | you may not use this file except in compliance with the License. |
6 | You may obtain a copy of the License at |
7 | |
8 | http://www.apache.org/licenses/LICENSE-2.0 |
9 | |
10 | Unless required by applicable law or agreed to in writing, software |
11 | distributed under the License is distributed on an "AS IS" BASIS, |
12 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
13 | See the License for the specific language governing permissions and |
14 | limitations under the License. |
15 | */ |
16 | |
17 | |
18 | #if (_WIN32 || _WIN64) |
19 | // As the test is intentionally build with /EHs-, suppress multiple VS2005's |
20 | // warnings like C4530: C++ exception handler used, but unwind semantics are not enabled |
21 | #if defined(_MSC_VER) && !__INTEL_COMPILER |
22 | /* ICC 10.1 and 11.0 generates code that uses std::_Raise_handler, |
23 | but it's only defined in libcpmt(d), which the test doesn't linked with. |
24 | */ |
25 | #undef _HAS_EXCEPTIONS |
26 | #define _HAS_EXCEPTIONS _CPPUNWIND |
27 | #endif |
28 | // to use strdup w/o warnings |
29 | #define _CRT_NONSTDC_NO_DEPRECATE 1 |
30 | #endif // _WIN32 || _WIN64 |
31 | |
32 | #define _ISOC11_SOURCE 1 // to get C11 declarations for GLIBC |
33 | #define HARNESS_NO_PARSE_COMMAND_LINE 1 |
34 | |
35 | #include "harness_allocator_overload.h" |
36 | |
37 | #if MALLOC_WINDOWS_OVERLOAD_ENABLED |
38 | #include "tbb/tbbmalloc_proxy.h" |
39 | #endif |
40 | |
41 | #include "harness.h" |
42 | |
43 | #if !HARNESS_SKIP_TEST |
44 | |
45 | #if __ANDROID__ |
46 | #include <android/api-level.h> // for __ANDROID_API__ |
47 | #endif |
48 | |
49 | #define __TBB_POSIX_MEMALIGN_PRESENT (__linux__ && !__ANDROID__) || __APPLE__ |
50 | #define __TBB_PVALLOC_PRESENT __linux__ && !__ANDROID__ |
51 | #if __GLIBC__ |
52 | // aligned_alloc available since GLIBC 2.16 |
53 | #define __TBB_ALIGNED_ALLOC_PRESENT __GLIBC_PREREQ(2, 16) |
54 | #endif // __GLIBC__ |
55 | // later Android doesn't have valloc or dlmalloc_usable_size |
56 | #define __TBB_VALLOC_PRESENT (__linux__ && __ANDROID_API__<21) || __APPLE__ |
57 | #define __TBB_DLMALLOC_USABLE_SIZE_PRESENT __ANDROID__ && __ANDROID_API__<21 |
58 | |
59 | #include "harness_report.h" |
60 | #include "harness_assert.h" |
61 | #include <stdlib.h> |
62 | #include <string.h> |
63 | #if !__APPLE__ |
64 | #include <malloc.h> |
65 | #endif |
66 | #include <stdio.h> |
67 | #include <new> |
68 | #if MALLOC_UNIXLIKE_OVERLOAD_ENABLED || MALLOC_ZONE_OVERLOAD_ENABLED |
69 | #include <unistd.h> // for sysconf |
70 | #include <dlfcn.h> |
71 | #endif |
72 | |
73 | #if __linux__ |
74 | #include <stdint.h> // for uintptr_t |
75 | |
76 | extern "C" { |
77 | void *__libc_malloc(size_t size); |
78 | void *__libc_realloc(void *ptr, size_t size); |
79 | void *__libc_calloc(size_t num, size_t size); |
80 | void __libc_free(void *ptr); |
81 | void *__libc_memalign(size_t alignment, size_t size); |
82 | void *__libc_pvalloc(size_t size); |
83 | void *__libc_valloc(size_t size); |
84 | #if __TBB_DLMALLOC_USABLE_SIZE_PRESENT |
85 | #define malloc_usable_size(p) dlmalloc_usable_size(p) |
86 | size_t dlmalloc_usable_size(const void *ptr); |
87 | #endif |
88 | } |
89 | |
90 | #elif __APPLE__ |
91 | |
92 | #include <malloc/malloc.h> |
93 | #define malloc_usable_size(p) malloc_size(p) |
94 | |
95 | #elif _WIN32 |
96 | #include <stddef.h> |
97 | #if __MINGW32__ |
98 | #include <unistd.h> |
99 | #else |
100 | typedef unsigned __int16 uint16_t; |
101 | typedef unsigned __int32 uint32_t; |
102 | typedef unsigned __int64 uint64_t; |
103 | #endif |
104 | |
105 | #endif /* OS selection */ |
106 | |
107 | #if _WIN32 |
108 | // On Windows, the trick with string "dependency on msvcpXX.dll" is necessary to create |
109 | // dependency on msvcpXX.dll, for sake of a regression test. |
110 | // On Linux, C++ RTL headers are undesirable because of breaking strict ANSI mode. |
111 | #if defined(_MSC_VER) && _MSC_VER >= 1300 && _MSC_VER <= 1310 && !defined(__INTEL_COMPILER) |
112 | /* Fixing compilation error reported by VS2003 for exception class |
113 | when _HAS_EXCEPTIONS is 0: |
114 | bad_cast that inherited from exception is not in std namespace. |
115 | */ |
116 | using namespace std; |
117 | #endif |
118 | #include <string> |
119 | #include <set> |
120 | #include <sstream> |
121 | #endif |
122 | |
123 | #include "../tbbmalloc/shared_utils.h" // alignDown, alignUp, estimatedCacheLineSize |
124 | |
125 | /* start of code replicated from src/tbbmalloc */ |
126 | |
127 | class BackRefIdx { // composite index to backreference array |
128 | private: |
129 | uint16_t master; // index in BackRefMaster |
130 | uint16_t largeObj:1; // is this object "large"? |
131 | uint16_t offset :15; // offset from beginning of BackRefBlock |
132 | public: |
133 | BackRefIdx() : master((uint16_t)-1) {} |
134 | bool isInvalid() { return master == (uint16_t)-1; } |
135 | bool isLargeObject() const { return largeObj; } |
136 | uint16_t getMaster() const { return master; } |
137 | uint16_t getOffset() const { return offset; } |
138 | |
139 | // only newBackRef can modify BackRefIdx |
140 | static BackRefIdx newBackRef(bool largeObj); |
141 | }; |
142 | |
143 | class MemoryPool; |
144 | class ExtMemoryPool; |
145 | |
146 | struct BlockI { |
147 | intptr_t blockState[2]; |
148 | }; |
149 | |
150 | struct LargeMemoryBlock : public BlockI { |
151 | MemoryPool *pool; // owner pool |
152 | LargeMemoryBlock *next, // ptrs in list of cached blocks |
153 | *prev, |
154 | *gPrev, // in pool's global list |
155 | *gNext; |
156 | uintptr_t age; // age of block while in cache |
157 | size_t objectSize; // the size requested by a client |
158 | size_t unalignedSize; // the size requested from getMemory |
159 | bool fromMapMemory; |
160 | BackRefIdx backRefIdx; // cached here, used copy is in LargeObjectHdr |
161 | void registerInPool(ExtMemoryPool *extMemPool); |
162 | void unregisterFromPool(ExtMemoryPool *extMemPool); |
163 | }; |
164 | |
165 | struct LargeObjectHdr { |
166 | LargeMemoryBlock *memoryBlock; |
167 | /* Have to duplicate it here from CachedObjectHdr, |
168 | as backreference must be checked without further pointer dereference. |
169 | Points to LargeObjectHdr. */ |
170 | BackRefIdx backRefIdx; |
171 | }; |
172 | |
173 | /* |
174 | * Objects of size minLargeObjectSize and larger are considered large objects. |
175 | */ |
176 | const uintptr_t blockSize = 16*1024; |
177 | const uint32_t fittingAlignment = rml::internal::estimatedCacheLineSize; |
178 | #define SET_FITTING_SIZE(N) ( (blockSize-2*rml::internal::estimatedCacheLineSize)/N ) & ~(fittingAlignment-1) |
179 | const uint32_t fittingSize5 = SET_FITTING_SIZE(2); // 8128/8064 |
180 | #undef SET_FITTING_SIZE |
181 | const uint32_t minLargeObjectSize = fittingSize5 + 1; |
182 | |
183 | /* end of code replicated from src/tbbmalloc */ |
184 | |
185 | static void scalableMallocCheckSize(void *object, size_t size) |
186 | { |
187 | #if __clang__ |
188 | // This prevents Clang from throwing out the calls to new & delete in CheckNewDeleteOverload(). |
189 | static void *v = object; |
190 | Harness::suppress_unused_warning(v); |
191 | #endif |
192 | ASSERT(object, NULL); |
193 | if (size >= minLargeObjectSize) { |
194 | LargeMemoryBlock *lmb = ((LargeObjectHdr*)object-1)->memoryBlock; |
195 | ASSERT(uintptr_t(lmb)<uintptr_t(((LargeObjectHdr*)object-1)) |
196 | && lmb->objectSize >= size, NULL); |
197 | } |
198 | #if MALLOC_UNIXLIKE_OVERLOAD_ENABLED || MALLOC_ZONE_OVERLOAD_ENABLED |
199 | ASSERT(malloc_usable_size(object) >= size, NULL); |
200 | #elif MALLOC_WINDOWS_OVERLOAD_ENABLED |
201 | // Check that _msize works correctly |
202 | ASSERT(_msize(object) >= size, NULL); |
203 | ASSERT(size<8 || _aligned_msize(object,8,0) >= size, NULL); |
204 | #endif |
205 | } |
206 | |
207 | void CheckStdFuncOverload(void *(*malloc_p)(size_t), void *(*calloc_p)(size_t, size_t), |
208 | void *(*realloc_p)(void *, size_t), void (*free_p)(void *)) |
209 | { |
210 | void *ptr = malloc_p(minLargeObjectSize); |
211 | scalableMallocCheckSize(ptr, minLargeObjectSize); |
212 | free(ptr); |
213 | |
214 | ptr = calloc_p(minLargeObjectSize, 2); |
215 | scalableMallocCheckSize(ptr, 2*minLargeObjectSize); |
216 | void *ptr1 = realloc_p(ptr, 10*minLargeObjectSize); |
217 | scalableMallocCheckSize(ptr1, 10*minLargeObjectSize); |
218 | free_p(ptr1); |
219 | } |
220 | |
221 | #if MALLOC_UNIXLIKE_OVERLOAD_ENABLED || MALLOC_ZONE_OVERLOAD_ENABLED |
222 | |
223 | void CheckMemalignFuncOverload(void *(*memalign_p)(size_t, size_t), |
224 | void (*free_p)(void*)) |
225 | { |
226 | void *ptr = memalign_p(128, 4*minLargeObjectSize); |
227 | scalableMallocCheckSize(ptr, 4*minLargeObjectSize); |
228 | ASSERT(is_aligned(ptr, 128), NULL); |
229 | free_p(ptr); |
230 | } |
231 | |
232 | void CheckVallocFuncOverload(void *(*valloc_p)(size_t), void (*free_p)(void*)) |
233 | { |
234 | void *ptr = valloc_p(minLargeObjectSize); |
235 | scalableMallocCheckSize(ptr, minLargeObjectSize); |
236 | ASSERT(is_aligned(ptr, sysconf(_SC_PAGESIZE)), NULL); |
237 | free_p(ptr); |
238 | } |
239 | |
240 | void CheckPvalloc(void *(*pvalloc_p)(size_t), void (*free_p)(void*)) |
241 | { |
242 | const long memoryPageSize = sysconf(_SC_PAGESIZE); |
243 | // request large object with not power-of-2 size |
244 | const size_t largeSz = alignUp(minLargeObjectSize, 16*1024) + 1; |
245 | |
246 | for (size_t sz = 0; sz<=largeSz; sz+=largeSz) { |
247 | void *ptr = pvalloc_p(sz); |
248 | scalableMallocCheckSize(ptr, sz? alignUp(sz, memoryPageSize) : memoryPageSize); |
249 | ASSERT(is_aligned(ptr, memoryPageSize), NULL); |
250 | free_p(ptr); |
251 | } |
252 | } |
253 | |
254 | #endif // MALLOC_UNIXLIKE_OVERLOAD_ENABLED || MALLOC_ZONE_OVERLOAD_ENABLED |
255 | |
256 | // regression test: on macOS scalable_free() treated small aligned object, |
257 | // placed in large block, as small block |
258 | void CheckFreeAligned() { |
259 | size_t sz[] = {8, 4*1024, 16*1024, 0}; |
260 | size_t align[] = {8, 4*1024, 16*1024, 0}; |
261 | |
262 | for (int s=0; sz[s]; s++) |
263 | for (int a=0; align[a]; a++) { |
264 | void *ptr = NULL; |
265 | #if __TBB_POSIX_MEMALIGN_PRESENT |
266 | int ret = posix_memalign(&ptr, align[a], sz[s]); |
267 | ASSERT(!ret, NULL); |
268 | #elif MALLOC_WINDOWS_OVERLOAD_ENABLED |
269 | ptr = _aligned_malloc(sz[s], align[a]); |
270 | #endif |
271 | ASSERT(is_aligned(ptr, align[a]), NULL); |
272 | free(ptr); |
273 | } |
274 | } |
275 | |
276 | #if __ANDROID__ |
277 | // Workaround for an issue with strdup somehow bypassing our malloc replacement on Android. |
278 | char *strdup(const char *str) { |
279 | REPORT( "Known issue: malloc replacement does not work for strdup on Android.\n" ); |
280 | size_t len = strlen(str)+1; |
281 | void *new_str = malloc(len); |
282 | return new_str ? reinterpret_cast<char *>(memcpy(new_str, str, len)) : 0; |
283 | } |
284 | #endif |
285 | |
286 | #if __APPLE__ |
287 | #include <mach/mach.h> |
288 | |
289 | // regression test: malloc_usable_size() that was passed to zone interface |
290 | // called system malloc_usable_size(), so for object that was not allocated |
291 | // by tbbmalloc non-zero was returned, so such objects were passed to |
292 | // tbbmalloc's free(), that is incorrect |
293 | void TestZoneOverload() { |
294 | vm_address_t *zones; |
295 | unsigned zones_num; |
296 | |
297 | kern_return_t ret = malloc_get_all_zones(mach_task_self(), NULL, &zones, &zones_num); |
298 | ASSERT(!ret && zones_num>1, NULL); |
299 | malloc_zone_t *sys_zone = (malloc_zone_t*)zones[1]; |
300 | ASSERT(strcmp("tbbmalloc" , malloc_get_zone_name(sys_zone)), |
301 | "zone 1 expected to be not tbbmalloc" ); |
302 | void *p = malloc_zone_malloc(sys_zone, 16); |
303 | free(p); |
304 | } |
305 | #else |
306 | #define TestZoneOverload() |
307 | #endif |
308 | |
309 | #if _WIN32 |
310 | // regression test: certain MSVC runtime functions use "public" allocation functions |
311 | // but internal free routines, causing crashes if tbbmalloc_proxy does not intercept the latter. |
312 | void TestRuntimeRoutines() { |
313 | system("rem should be a safe command to call" ); |
314 | } |
315 | #else |
316 | #define TestRuntimeRoutines() |
317 | #endif |
318 | |
319 | struct BigStruct { |
320 | char f[minLargeObjectSize]; |
321 | }; |
322 | |
323 | void CheckNewDeleteOverload() { |
324 | BigStruct *s1, *s2, *s3, *s4; |
325 | |
326 | s1 = new BigStruct; |
327 | scalableMallocCheckSize(s1, sizeof(BigStruct)); |
328 | delete s1; |
329 | |
330 | s2 = new BigStruct[10]; |
331 | scalableMallocCheckSize(s2, 10*sizeof(BigStruct)); |
332 | delete []s2; |
333 | |
334 | s3 = new(std::nothrow) BigStruct; |
335 | scalableMallocCheckSize(s3, sizeof(BigStruct)); |
336 | delete s3; |
337 | |
338 | s4 = new(std::nothrow) BigStruct[2]; |
339 | scalableMallocCheckSize(s4, 2*sizeof(BigStruct)); |
340 | delete []s4; |
341 | } |
342 | |
343 | #if MALLOC_WINDOWS_OVERLOAD_ENABLED |
344 | void FuncReplacementInfoCheck() { |
345 | char **func_replacement_log; |
346 | int func_replacement_status = TBB_malloc_replacement_log(&func_replacement_log); |
347 | |
348 | std::set<std::string> functions; |
349 | functions.insert("free" ); |
350 | functions.insert("_msize" ); |
351 | functions.insert("_aligned_free" ); |
352 | functions.insert("_aligned_msize" ); |
353 | |
354 | int status_check = 0; |
355 | for (char** log_string = func_replacement_log; *log_string != 0; log_string++) { |
356 | std::stringstream s(*log_string); |
357 | std::string status, function_name; |
358 | s >> status >> function_name; |
359 | |
360 | if (status.find("Fail:" ) != status.npos) { |
361 | status_check = -1; |
362 | } |
363 | |
364 | functions.erase(function_name); |
365 | } |
366 | |
367 | ASSERT(functions.empty(), "Changed opcodes log must contain all required functions with \"Success\" changed status" ); |
368 | ASSERT(func_replacement_status == status_check, "replacement_opcodes_log() function return wrong status" ); |
369 | |
370 | func_replacement_status = TBB_malloc_replacement_log(NULL); |
371 | ASSERT(func_replacement_status == status_check, "replacement_opcodes_log() function return wrong status" ); |
372 | |
373 | ASSERT_WARNING(func_replacement_status == 0, "Some standard allocation functions was not replaced to tbb_malloc functions." ); |
374 | } |
375 | #endif // MALLOC_WINDOWS_OVERLOAD_ENABLED |
376 | |
377 | int TestMain() { |
378 | void *ptr = NULL; |
379 | |
380 | #if MALLOC_UNIXLIKE_OVERLOAD_ENABLED || MALLOC_ZONE_OVERLOAD_ENABLED |
381 | ASSERT(dlsym(RTLD_DEFAULT, "scalable_malloc" ), |
382 | "Lost dependency on malloc_proxy or LD_PRELOAD was not set?" ); |
383 | #endif |
384 | |
385 | /* On Windows, memory block size returned by _msize() is sometimes used |
386 | to calculate the size for an extended block. Substituting _msize, |
387 | scalable_msize initially returned 0 for regions not allocated by the scalable |
388 | allocator, which led to incorrect memory reallocation and subsequent crashes. |
389 | It was found that adding a new environment variable triggers the error. |
390 | */ |
391 | ASSERT(getenv("PATH" ), "We assume that PATH is set everywhere." ); |
392 | char *pathCopy = strdup(getenv("PATH" )); |
393 | #if __ANDROID__ |
394 | ASSERT(strcmp(pathCopy,getenv("PATH" )) == 0, "strdup workaround does not work as expected." ); |
395 | #endif |
396 | const char *newEnvName = "__TBBMALLOC_OVERLOAD_REGRESSION_TEST_FOR_REALLOC_AND_MSIZE" ; |
397 | ASSERT(!getenv(newEnvName), "Environment variable should not be used before." ); |
398 | int r = Harness::SetEnv(newEnvName,"1" ); |
399 | ASSERT(!r, NULL); |
400 | char *path = getenv("PATH" ); |
401 | ASSERT(path && 0==strcmp(path, pathCopy), "Environment was changed erroneously." ); |
402 | free(pathCopy); |
403 | |
404 | CheckStdFuncOverload(malloc, calloc, realloc, free); |
405 | #if MALLOC_UNIXLIKE_OVERLOAD_ENABLED || MALLOC_ZONE_OVERLOAD_ENABLED |
406 | |
407 | #if __TBB_POSIX_MEMALIGN_PRESENT |
408 | int ret = posix_memalign(&ptr, 1024, 3*minLargeObjectSize); |
409 | ASSERT(0 == ret, NULL); |
410 | scalableMallocCheckSize(ptr, 3*minLargeObjectSize); |
411 | ASSERT(is_aligned(ptr, 1024), NULL); |
412 | free(ptr); |
413 | #endif |
414 | |
415 | #if __TBB_VALLOC_PRESENT |
416 | CheckVallocFuncOverload(valloc, free); |
417 | #endif |
418 | #if __TBB_PVALLOC_PRESENT |
419 | CheckPvalloc(pvalloc, free); |
420 | #endif |
421 | #if __linux__ |
422 | CheckMemalignFuncOverload(memalign, free); |
423 | #if __TBB_ALIGNED_ALLOC_PRESENT |
424 | CheckMemalignFuncOverload(aligned_alloc, free); |
425 | #endif |
426 | |
427 | struct mallinfo info = mallinfo(); |
428 | // right now mallinfo initialized by zero |
429 | ASSERT(!info.arena && !info.ordblks && !info.smblks && !info.hblks |
430 | && !info.hblkhd && !info.usmblks && !info.fsmblks |
431 | && !info.uordblks && !info.fordblks && !info.keepcost, NULL); |
432 | |
433 | #if !__ANDROID__ |
434 | // These non-standard functions are exported by GLIBC, and might be used |
435 | // in conjunction with standard malloc/free. Test that we overload them as well. |
436 | // Bionic doesn't have them. |
437 | CheckStdFuncOverload(__libc_malloc, __libc_calloc, __libc_realloc, __libc_free); |
438 | CheckMemalignFuncOverload(__libc_memalign, __libc_free); |
439 | CheckVallocFuncOverload(__libc_valloc, __libc_free); |
440 | CheckPvalloc(__libc_pvalloc, __libc_free); |
441 | #endif |
442 | #endif // __linux__ |
443 | |
444 | #else // MALLOC_WINDOWS_OVERLOAD_ENABLED |
445 | |
446 | ptr = _aligned_malloc(minLargeObjectSize, 16); |
447 | scalableMallocCheckSize(ptr, minLargeObjectSize); |
448 | ASSERT(is_aligned(ptr, 16), NULL); |
449 | |
450 | // Testing of workaround for vs "is power of 2 pow N" bug that accepts zeros |
451 | void* ptr1 = _aligned_malloc(minLargeObjectSize, 0); |
452 | scalableMallocCheckSize(ptr, minLargeObjectSize); |
453 | ASSERT(is_aligned(ptr, sizeof(void*)), NULL); |
454 | _aligned_free(ptr1); |
455 | |
456 | ptr1 = _aligned_realloc(ptr, minLargeObjectSize*10, 16); |
457 | scalableMallocCheckSize(ptr1, minLargeObjectSize*10); |
458 | ASSERT(is_aligned(ptr, 16), NULL); |
459 | _aligned_free(ptr1); |
460 | |
461 | FuncReplacementInfoCheck(); |
462 | |
463 | #endif |
464 | CheckFreeAligned(); |
465 | |
466 | CheckNewDeleteOverload(); |
467 | |
468 | #if _WIN32 |
469 | std::string stdstring = "dependency on msvcpXX.dll" ; |
470 | ASSERT(strcmp(stdstring.c_str(), "dependency on msvcpXX.dll" ) == 0, NULL); |
471 | #endif |
472 | TestZoneOverload(); |
473 | TestRuntimeRoutines(); |
474 | |
475 | return Harness::Done; |
476 | } |
477 | #endif // !HARNESS_SKIP_TEST |
478 | |