blob: a5cc34a2a66f0e125afdcf9c3de7d432524d6195 [file] [log] [blame]
Christopher Ferris885f3b92013-05-21 17:48:01 -07001/*
2 * Copyright (C) 2013 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <gtest/gtest.h>
18
Christopher Ferrise4cdbc42019-02-08 17:30:58 -080019#include <elf.h>
Christopher Ferrisa4037802014-06-09 19:14:11 -070020#include <limits.h>
Christopher Ferris1fc5ccf2019-02-15 18:06:15 -080021#include <pthread.h>
Christopher Ferrisa4037802014-06-09 19:14:11 -070022#include <stdint.h>
Christopher Ferris6c619a02019-03-01 17:59:51 -080023#include <stdio.h>
Christopher Ferris885f3b92013-05-21 17:48:01 -070024#include <stdlib.h>
Christopher Ferris1fc5ccf2019-02-15 18:06:15 -080025#include <string.h>
26#include <sys/types.h>
27#include <sys/wait.h>
Christopher Ferris885f3b92013-05-21 17:48:01 -070028#include <malloc.h>
Christopher Ferrisa4037802014-06-09 19:14:11 -070029#include <unistd.h>
Christopher Ferris885f3b92013-05-21 17:48:01 -070030
Christopher Ferris1fc5ccf2019-02-15 18:06:15 -080031#include <atomic>
Dan Albert4caa1f02014-08-20 09:16:57 -070032#include <tinyxml2.h>
33
Christopher Ferrise4cdbc42019-02-08 17:30:58 -080034#include <android-base/file.h>
35
Christopher Ferris63619642014-06-16 23:35:53 -070036#include "private/bionic_config.h"
Ryan Savitskiecc37e32018-12-14 15:57:21 +000037#include "private/bionic_malloc.h"
Evgenii Stepanovacd6f4f2018-11-06 16:48:27 -080038#include "utils.h"
Dan Alberte5fdaa42014-06-14 01:04:31 +000039
Elliott Hughesb1770852018-09-18 12:52:42 -070040#if defined(__BIONIC__)
41#define HAVE_REALLOCARRAY 1
42#else
43#define HAVE_REALLOCARRAY __GLIBC_PREREQ(2, 26)
44#endif
45
Christopher Ferris885f3b92013-05-21 17:48:01 -070046TEST(malloc, malloc_std) {
47 // Simple malloc test.
48 void *ptr = malloc(100);
Yi Kong32bc0fc2018-08-02 17:31:13 -070049 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -070050 ASSERT_LE(100U, malloc_usable_size(ptr));
Christopher Ferris885f3b92013-05-21 17:48:01 -070051 free(ptr);
52}
53
Christopher Ferrisa4037802014-06-09 19:14:11 -070054TEST(malloc, malloc_overflow) {
Evgenii Stepanovacd6f4f2018-11-06 16:48:27 -080055 SKIP_WITH_HWASAN;
Christopher Ferrisa4037802014-06-09 19:14:11 -070056 errno = 0;
Yi Kong32bc0fc2018-08-02 17:31:13 -070057 ASSERT_EQ(nullptr, malloc(SIZE_MAX));
Christopher Ferrisa4037802014-06-09 19:14:11 -070058 ASSERT_EQ(ENOMEM, errno);
59}
60
Christopher Ferris885f3b92013-05-21 17:48:01 -070061TEST(malloc, calloc_std) {
62 // Simple calloc test.
63 size_t alloc_len = 100;
64 char *ptr = (char *)calloc(1, alloc_len);
Yi Kong32bc0fc2018-08-02 17:31:13 -070065 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -070066 ASSERT_LE(alloc_len, malloc_usable_size(ptr));
67 for (size_t i = 0; i < alloc_len; i++) {
68 ASSERT_EQ(0, ptr[i]);
69 }
Christopher Ferris885f3b92013-05-21 17:48:01 -070070 free(ptr);
71}
72
Christopher Ferrisa4037802014-06-09 19:14:11 -070073TEST(malloc, calloc_illegal) {
Evgenii Stepanovacd6f4f2018-11-06 16:48:27 -080074 SKIP_WITH_HWASAN;
Christopher Ferrisa4037802014-06-09 19:14:11 -070075 errno = 0;
Yi Kong32bc0fc2018-08-02 17:31:13 -070076 ASSERT_EQ(nullptr, calloc(-1, 100));
Christopher Ferrisa4037802014-06-09 19:14:11 -070077 ASSERT_EQ(ENOMEM, errno);
78}
79
80TEST(malloc, calloc_overflow) {
Evgenii Stepanovacd6f4f2018-11-06 16:48:27 -080081 SKIP_WITH_HWASAN;
Christopher Ferrisa4037802014-06-09 19:14:11 -070082 errno = 0;
Yi Kong32bc0fc2018-08-02 17:31:13 -070083 ASSERT_EQ(nullptr, calloc(1, SIZE_MAX));
Christopher Ferrisa4037802014-06-09 19:14:11 -070084 ASSERT_EQ(ENOMEM, errno);
85 errno = 0;
Yi Kong32bc0fc2018-08-02 17:31:13 -070086 ASSERT_EQ(nullptr, calloc(SIZE_MAX, SIZE_MAX));
Christopher Ferrisa4037802014-06-09 19:14:11 -070087 ASSERT_EQ(ENOMEM, errno);
88 errno = 0;
Yi Kong32bc0fc2018-08-02 17:31:13 -070089 ASSERT_EQ(nullptr, calloc(2, SIZE_MAX));
Christopher Ferrisa4037802014-06-09 19:14:11 -070090 ASSERT_EQ(ENOMEM, errno);
91 errno = 0;
Yi Kong32bc0fc2018-08-02 17:31:13 -070092 ASSERT_EQ(nullptr, calloc(SIZE_MAX, 2));
Christopher Ferrisa4037802014-06-09 19:14:11 -070093 ASSERT_EQ(ENOMEM, errno);
94}
95
Christopher Ferris885f3b92013-05-21 17:48:01 -070096TEST(malloc, memalign_multiple) {
Elliott Hughesbcaa4542019-03-08 15:20:23 -080097 SKIP_WITH_HWASAN << "hwasan requires power of 2 alignment";
Christopher Ferris885f3b92013-05-21 17:48:01 -070098 // Memalign test where the alignment is any value.
99 for (size_t i = 0; i <= 12; i++) {
100 for (size_t alignment = 1 << i; alignment < (1U << (i+1)); alignment++) {
Christopher Ferrisa4037802014-06-09 19:14:11 -0700101 char *ptr = reinterpret_cast<char*>(memalign(alignment, 100));
Yi Kong32bc0fc2018-08-02 17:31:13 -0700102 ASSERT_TRUE(ptr != nullptr) << "Failed at alignment " << alignment;
Christopher Ferrisa4037802014-06-09 19:14:11 -0700103 ASSERT_LE(100U, malloc_usable_size(ptr)) << "Failed at alignment " << alignment;
104 ASSERT_EQ(0U, reinterpret_cast<uintptr_t>(ptr) % ((1U << i)))
105 << "Failed at alignment " << alignment;
Christopher Ferris885f3b92013-05-21 17:48:01 -0700106 free(ptr);
107 }
108 }
109}
110
Christopher Ferrisa4037802014-06-09 19:14:11 -0700111TEST(malloc, memalign_overflow) {
Evgenii Stepanovacd6f4f2018-11-06 16:48:27 -0800112 SKIP_WITH_HWASAN;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700113 ASSERT_EQ(nullptr, memalign(4096, SIZE_MAX));
Christopher Ferrisa4037802014-06-09 19:14:11 -0700114}
115
116TEST(malloc, memalign_non_power2) {
Evgenii Stepanovacd6f4f2018-11-06 16:48:27 -0800117 SKIP_WITH_HWASAN;
Christopher Ferrisa4037802014-06-09 19:14:11 -0700118 void* ptr;
119 for (size_t align = 0; align <= 256; align++) {
120 ptr = memalign(align, 1024);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700121 ASSERT_TRUE(ptr != nullptr) << "Failed at align " << align;
Christopher Ferrisa4037802014-06-09 19:14:11 -0700122 free(ptr);
123 }
124}
125
Christopher Ferris885f3b92013-05-21 17:48:01 -0700126TEST(malloc, memalign_realloc) {
127 // Memalign and then realloc the pointer a couple of times.
128 for (size_t alignment = 1; alignment <= 4096; alignment <<= 1) {
129 char *ptr = (char*)memalign(alignment, 100);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700130 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700131 ASSERT_LE(100U, malloc_usable_size(ptr));
132 ASSERT_EQ(0U, (intptr_t)ptr % alignment);
133 memset(ptr, 0x23, 100);
134
135 ptr = (char*)realloc(ptr, 200);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700136 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700137 ASSERT_LE(200U, malloc_usable_size(ptr));
Yi Kong32bc0fc2018-08-02 17:31:13 -0700138 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700139 for (size_t i = 0; i < 100; i++) {
140 ASSERT_EQ(0x23, ptr[i]);
141 }
142 memset(ptr, 0x45, 200);
143
144 ptr = (char*)realloc(ptr, 300);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700145 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700146 ASSERT_LE(300U, malloc_usable_size(ptr));
147 for (size_t i = 0; i < 200; i++) {
148 ASSERT_EQ(0x45, ptr[i]);
149 }
150 memset(ptr, 0x67, 300);
151
152 ptr = (char*)realloc(ptr, 250);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700153 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700154 ASSERT_LE(250U, malloc_usable_size(ptr));
155 for (size_t i = 0; i < 250; i++) {
156 ASSERT_EQ(0x67, ptr[i]);
157 }
Christopher Ferris885f3b92013-05-21 17:48:01 -0700158 free(ptr);
159 }
160}
161
162TEST(malloc, malloc_realloc_larger) {
163 // Realloc to a larger size, malloc is used for the original allocation.
164 char *ptr = (char *)malloc(100);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700165 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700166 ASSERT_LE(100U, malloc_usable_size(ptr));
167 memset(ptr, 67, 100);
168
169 ptr = (char *)realloc(ptr, 200);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700170 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700171 ASSERT_LE(200U, malloc_usable_size(ptr));
172 for (size_t i = 0; i < 100; i++) {
173 ASSERT_EQ(67, ptr[i]);
174 }
Christopher Ferris885f3b92013-05-21 17:48:01 -0700175 free(ptr);
176}
177
178TEST(malloc, malloc_realloc_smaller) {
179 // Realloc to a smaller size, malloc is used for the original allocation.
180 char *ptr = (char *)malloc(200);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700181 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700182 ASSERT_LE(200U, malloc_usable_size(ptr));
183 memset(ptr, 67, 200);
184
185 ptr = (char *)realloc(ptr, 100);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700186 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700187 ASSERT_LE(100U, malloc_usable_size(ptr));
188 for (size_t i = 0; i < 100; i++) {
189 ASSERT_EQ(67, ptr[i]);
190 }
Christopher Ferris885f3b92013-05-21 17:48:01 -0700191 free(ptr);
192}
193
194TEST(malloc, malloc_multiple_realloc) {
195 // Multiple reallocs, malloc is used for the original allocation.
196 char *ptr = (char *)malloc(200);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700197 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700198 ASSERT_LE(200U, malloc_usable_size(ptr));
199 memset(ptr, 0x23, 200);
200
201 ptr = (char *)realloc(ptr, 100);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700202 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700203 ASSERT_LE(100U, malloc_usable_size(ptr));
204 for (size_t i = 0; i < 100; i++) {
205 ASSERT_EQ(0x23, ptr[i]);
206 }
207
208 ptr = (char*)realloc(ptr, 50);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700209 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700210 ASSERT_LE(50U, malloc_usable_size(ptr));
211 for (size_t i = 0; i < 50; i++) {
212 ASSERT_EQ(0x23, ptr[i]);
213 }
214
215 ptr = (char*)realloc(ptr, 150);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700216 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700217 ASSERT_LE(150U, malloc_usable_size(ptr));
218 for (size_t i = 0; i < 50; i++) {
219 ASSERT_EQ(0x23, ptr[i]);
220 }
221 memset(ptr, 0x23, 150);
222
223 ptr = (char*)realloc(ptr, 425);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700224 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700225 ASSERT_LE(425U, malloc_usable_size(ptr));
226 for (size_t i = 0; i < 150; i++) {
227 ASSERT_EQ(0x23, ptr[i]);
228 }
Christopher Ferris885f3b92013-05-21 17:48:01 -0700229 free(ptr);
230}
Christopher Ferrisa4037802014-06-09 19:14:11 -0700231
Christopher Ferris885f3b92013-05-21 17:48:01 -0700232TEST(malloc, calloc_realloc_larger) {
233 // Realloc to a larger size, calloc is used for the original allocation.
234 char *ptr = (char *)calloc(1, 100);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700235 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700236 ASSERT_LE(100U, malloc_usable_size(ptr));
237
238 ptr = (char *)realloc(ptr, 200);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700239 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700240 ASSERT_LE(200U, malloc_usable_size(ptr));
241 for (size_t i = 0; i < 100; i++) {
242 ASSERT_EQ(0, ptr[i]);
243 }
Christopher Ferris885f3b92013-05-21 17:48:01 -0700244 free(ptr);
245}
246
247TEST(malloc, calloc_realloc_smaller) {
248 // Realloc to a smaller size, calloc is used for the original allocation.
249 char *ptr = (char *)calloc(1, 200);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700250 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700251 ASSERT_LE(200U, malloc_usable_size(ptr));
252
253 ptr = (char *)realloc(ptr, 100);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700254 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700255 ASSERT_LE(100U, malloc_usable_size(ptr));
256 for (size_t i = 0; i < 100; i++) {
257 ASSERT_EQ(0, ptr[i]);
258 }
Christopher Ferris885f3b92013-05-21 17:48:01 -0700259 free(ptr);
260}
261
262TEST(malloc, calloc_multiple_realloc) {
263 // Multiple reallocs, calloc is used for the original allocation.
264 char *ptr = (char *)calloc(1, 200);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700265 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700266 ASSERT_LE(200U, malloc_usable_size(ptr));
267
268 ptr = (char *)realloc(ptr, 100);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700269 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700270 ASSERT_LE(100U, malloc_usable_size(ptr));
271 for (size_t i = 0; i < 100; i++) {
272 ASSERT_EQ(0, ptr[i]);
273 }
274
275 ptr = (char*)realloc(ptr, 50);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700276 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700277 ASSERT_LE(50U, malloc_usable_size(ptr));
278 for (size_t i = 0; i < 50; i++) {
279 ASSERT_EQ(0, ptr[i]);
280 }
281
282 ptr = (char*)realloc(ptr, 150);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700283 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700284 ASSERT_LE(150U, malloc_usable_size(ptr));
285 for (size_t i = 0; i < 50; i++) {
286 ASSERT_EQ(0, ptr[i]);
287 }
288 memset(ptr, 0, 150);
289
290 ptr = (char*)realloc(ptr, 425);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700291 ASSERT_TRUE(ptr != nullptr);
Christopher Ferris885f3b92013-05-21 17:48:01 -0700292 ASSERT_LE(425U, malloc_usable_size(ptr));
293 for (size_t i = 0; i < 150; i++) {
294 ASSERT_EQ(0, ptr[i]);
295 }
Christopher Ferris885f3b92013-05-21 17:48:01 -0700296 free(ptr);
297}
Christopher Ferris72bbd422014-05-08 11:14:03 -0700298
Christopher Ferrisa4037802014-06-09 19:14:11 -0700299TEST(malloc, realloc_overflow) {
Evgenii Stepanovacd6f4f2018-11-06 16:48:27 -0800300 SKIP_WITH_HWASAN;
Christopher Ferrisa4037802014-06-09 19:14:11 -0700301 errno = 0;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700302 ASSERT_EQ(nullptr, realloc(nullptr, SIZE_MAX));
Christopher Ferrisa4037802014-06-09 19:14:11 -0700303 ASSERT_EQ(ENOMEM, errno);
304 void* ptr = malloc(100);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700305 ASSERT_TRUE(ptr != nullptr);
Christopher Ferrisa4037802014-06-09 19:14:11 -0700306 errno = 0;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700307 ASSERT_EQ(nullptr, realloc(ptr, SIZE_MAX));
Christopher Ferrisa4037802014-06-09 19:14:11 -0700308 ASSERT_EQ(ENOMEM, errno);
309 free(ptr);
Christopher Ferris72bbd422014-05-08 11:14:03 -0700310}
311
Dan Alberte5fdaa42014-06-14 01:04:31 +0000312#if defined(HAVE_DEPRECATED_MALLOC_FUNCS)
313extern "C" void* pvalloc(size_t);
314extern "C" void* valloc(size_t);
315
Christopher Ferrisa4037802014-06-09 19:14:11 -0700316TEST(malloc, pvalloc_std) {
317 size_t pagesize = sysconf(_SC_PAGESIZE);
318 void* ptr = pvalloc(100);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700319 ASSERT_TRUE(ptr != nullptr);
Christopher Ferrisa4037802014-06-09 19:14:11 -0700320 ASSERT_TRUE((reinterpret_cast<uintptr_t>(ptr) & (pagesize-1)) == 0);
321 ASSERT_LE(pagesize, malloc_usable_size(ptr));
322 free(ptr);
323}
324
325TEST(malloc, pvalloc_overflow) {
Yi Kong32bc0fc2018-08-02 17:31:13 -0700326 ASSERT_EQ(nullptr, pvalloc(SIZE_MAX));
Christopher Ferrisa4037802014-06-09 19:14:11 -0700327}
328
329TEST(malloc, valloc_std) {
330 size_t pagesize = sysconf(_SC_PAGESIZE);
331 void* ptr = pvalloc(100);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700332 ASSERT_TRUE(ptr != nullptr);
Christopher Ferrisa4037802014-06-09 19:14:11 -0700333 ASSERT_TRUE((reinterpret_cast<uintptr_t>(ptr) & (pagesize-1)) == 0);
334 free(ptr);
335}
336
337TEST(malloc, valloc_overflow) {
Yi Kong32bc0fc2018-08-02 17:31:13 -0700338 ASSERT_EQ(nullptr, valloc(SIZE_MAX));
Christopher Ferris72bbd422014-05-08 11:14:03 -0700339}
Dan Alberte5fdaa42014-06-14 01:04:31 +0000340#endif
Dan Albert4caa1f02014-08-20 09:16:57 -0700341
342TEST(malloc, malloc_info) {
343#ifdef __BIONIC__
Evgenii Stepanov8de6b462019-03-22 13:22:28 -0700344 SKIP_WITH_HWASAN; // hwasan does not implement malloc_info
Dan Albert4caa1f02014-08-20 09:16:57 -0700345 char* buf;
346 size_t bufsize;
347 FILE* memstream = open_memstream(&buf, &bufsize);
348 ASSERT_NE(nullptr, memstream);
349 ASSERT_EQ(0, malloc_info(0, memstream));
350 ASSERT_EQ(0, fclose(memstream));
351
352 tinyxml2::XMLDocument doc;
353 ASSERT_EQ(tinyxml2::XML_SUCCESS, doc.Parse(buf));
354
355 auto root = doc.FirstChildElement();
356 ASSERT_NE(nullptr, root);
357 ASSERT_STREQ("malloc", root->Name());
Christopher Ferris6c619a02019-03-01 17:59:51 -0800358 if (std::string(root->Attribute("version")) == "jemalloc-1") {
359 // Verify jemalloc version of this data.
360 ASSERT_STREQ("jemalloc-1", root->Attribute("version"));
Dan Albert4caa1f02014-08-20 09:16:57 -0700361
Christopher Ferris6c619a02019-03-01 17:59:51 -0800362 auto arena = root->FirstChildElement();
363 for (; arena != nullptr; arena = arena->NextSiblingElement()) {
364 int val;
Dan Albert4caa1f02014-08-20 09:16:57 -0700365
Christopher Ferris6c619a02019-03-01 17:59:51 -0800366 ASSERT_STREQ("heap", arena->Name());
367 ASSERT_EQ(tinyxml2::XML_SUCCESS, arena->QueryIntAttribute("nr", &val));
368 ASSERT_EQ(tinyxml2::XML_SUCCESS,
369 arena->FirstChildElement("allocated-large")->QueryIntText(&val));
370 ASSERT_EQ(tinyxml2::XML_SUCCESS,
371 arena->FirstChildElement("allocated-huge")->QueryIntText(&val));
372 ASSERT_EQ(tinyxml2::XML_SUCCESS,
373 arena->FirstChildElement("allocated-bins")->QueryIntText(&val));
374 ASSERT_EQ(tinyxml2::XML_SUCCESS,
375 arena->FirstChildElement("bins-total")->QueryIntText(&val));
Dan Albert4caa1f02014-08-20 09:16:57 -0700376
Christopher Ferris6c619a02019-03-01 17:59:51 -0800377 auto bin = arena->FirstChildElement("bin");
378 for (; bin != nullptr; bin = bin ->NextSiblingElement()) {
379 if (strcmp(bin->Name(), "bin") == 0) {
380 ASSERT_EQ(tinyxml2::XML_SUCCESS, bin->QueryIntAttribute("nr", &val));
381 ASSERT_EQ(tinyxml2::XML_SUCCESS,
382 bin->FirstChildElement("allocated")->QueryIntText(&val));
383 ASSERT_EQ(tinyxml2::XML_SUCCESS,
384 bin->FirstChildElement("nmalloc")->QueryIntText(&val));
385 ASSERT_EQ(tinyxml2::XML_SUCCESS,
386 bin->FirstChildElement("ndalloc")->QueryIntText(&val));
387 }
Dan Albert4caa1f02014-08-20 09:16:57 -0700388 }
389 }
Christopher Ferris6c619a02019-03-01 17:59:51 -0800390 } else {
391 // Only verify that this is debug-malloc-1, the malloc debug unit tests
392 // verify the output.
393 ASSERT_STREQ("debug-malloc-1", root->Attribute("version"));
Dan Albert4caa1f02014-08-20 09:16:57 -0700394 }
395#endif
396}
Christopher Ferrisad33ebe2015-12-16 12:07:25 -0800397
398TEST(malloc, calloc_usable_size) {
399 for (size_t size = 1; size <= 2048; size++) {
400 void* pointer = malloc(size);
401 ASSERT_TRUE(pointer != nullptr);
402 memset(pointer, 0xeb, malloc_usable_size(pointer));
403 free(pointer);
404
405 // We should get a previous pointer that has been set to non-zero.
406 // If calloc does not zero out all of the data, this will fail.
407 uint8_t* zero_mem = reinterpret_cast<uint8_t*>(calloc(1, size));
408 ASSERT_TRUE(pointer != nullptr);
409 size_t usable_size = malloc_usable_size(zero_mem);
410 for (size_t i = 0; i < usable_size; i++) {
411 ASSERT_EQ(0, zero_mem[i]) << "Failed at allocation size " << size << " at byte " << i;
412 }
413 free(zero_mem);
414 }
415}
Elliott Hughes884f76e2016-02-10 20:43:22 -0800416
417TEST(malloc, malloc_0) {
418 void* p = malloc(0);
419 ASSERT_TRUE(p != nullptr);
420 free(p);
421}
422
423TEST(malloc, calloc_0_0) {
424 void* p = calloc(0, 0);
425 ASSERT_TRUE(p != nullptr);
426 free(p);
427}
428
429TEST(malloc, calloc_0_1) {
430 void* p = calloc(0, 1);
431 ASSERT_TRUE(p != nullptr);
432 free(p);
433}
434
435TEST(malloc, calloc_1_0) {
436 void* p = calloc(1, 0);
437 ASSERT_TRUE(p != nullptr);
438 free(p);
439}
440
441TEST(malloc, realloc_nullptr_0) {
442 // realloc(nullptr, size) is actually malloc(size).
443 void* p = realloc(nullptr, 0);
444 ASSERT_TRUE(p != nullptr);
445 free(p);
446}
447
448TEST(malloc, realloc_0) {
449 void* p = malloc(1024);
450 ASSERT_TRUE(p != nullptr);
451 // realloc(p, 0) is actually free(p).
452 void* p2 = realloc(p, 0);
453 ASSERT_TRUE(p2 == nullptr);
454}
Christopher Ferris72df6702016-02-11 15:51:31 -0800455
456constexpr size_t MAX_LOOPS = 200;
457
458// Make sure that memory returned by malloc is aligned to allow these data types.
459TEST(malloc, verify_alignment) {
460 uint32_t** values_32 = new uint32_t*[MAX_LOOPS];
461 uint64_t** values_64 = new uint64_t*[MAX_LOOPS];
462 long double** values_ldouble = new long double*[MAX_LOOPS];
463 // Use filler to attempt to force the allocator to get potentially bad alignments.
464 void** filler = new void*[MAX_LOOPS];
465
466 for (size_t i = 0; i < MAX_LOOPS; i++) {
467 // Check uint32_t pointers.
468 filler[i] = malloc(1);
469 ASSERT_TRUE(filler[i] != nullptr);
470
471 values_32[i] = reinterpret_cast<uint32_t*>(malloc(sizeof(uint32_t)));
472 ASSERT_TRUE(values_32[i] != nullptr);
473 *values_32[i] = i;
474 ASSERT_EQ(*values_32[i], i);
475 ASSERT_EQ(0U, reinterpret_cast<uintptr_t>(values_32[i]) & (sizeof(uint32_t) - 1));
476
477 free(filler[i]);
478 }
479
480 for (size_t i = 0; i < MAX_LOOPS; i++) {
481 // Check uint64_t pointers.
482 filler[i] = malloc(1);
483 ASSERT_TRUE(filler[i] != nullptr);
484
485 values_64[i] = reinterpret_cast<uint64_t*>(malloc(sizeof(uint64_t)));
486 ASSERT_TRUE(values_64[i] != nullptr);
487 *values_64[i] = 0x1000 + i;
488 ASSERT_EQ(*values_64[i], 0x1000 + i);
489 ASSERT_EQ(0U, reinterpret_cast<uintptr_t>(values_64[i]) & (sizeof(uint64_t) - 1));
490
491 free(filler[i]);
492 }
493
494 for (size_t i = 0; i < MAX_LOOPS; i++) {
495 // Check long double pointers.
496 filler[i] = malloc(1);
497 ASSERT_TRUE(filler[i] != nullptr);
498
499 values_ldouble[i] = reinterpret_cast<long double*>(malloc(sizeof(long double)));
500 ASSERT_TRUE(values_ldouble[i] != nullptr);
501 *values_ldouble[i] = 5.5 + i;
502 ASSERT_DOUBLE_EQ(*values_ldouble[i], 5.5 + i);
503 // 32 bit glibc has a long double size of 12 bytes, so hardcode the
504 // required alignment to 0x7.
505#if !defined(__BIONIC__) && !defined(__LP64__)
506 ASSERT_EQ(0U, reinterpret_cast<uintptr_t>(values_ldouble[i]) & 0x7);
507#else
508 ASSERT_EQ(0U, reinterpret_cast<uintptr_t>(values_ldouble[i]) & (sizeof(long double) - 1));
509#endif
510
511 free(filler[i]);
512 }
513
514 for (size_t i = 0; i < MAX_LOOPS; i++) {
515 free(values_32[i]);
516 free(values_64[i]);
517 free(values_ldouble[i]);
518 }
519
520 delete[] filler;
521 delete[] values_32;
522 delete[] values_64;
523 delete[] values_ldouble;
524}
Christopher Ferrisa1c0d2f2017-05-15 15:50:19 -0700525
526TEST(malloc, mallopt_smoke) {
527 errno = 0;
528 ASSERT_EQ(0, mallopt(-1000, 1));
529 // mallopt doesn't set errno.
530 ASSERT_EQ(0, errno);
531}
Elliott Hughesb1770852018-09-18 12:52:42 -0700532
Christopher Ferrisaf1b8dd2018-11-07 15:28:16 -0800533TEST(malloc, mallopt_decay) {
534#if defined(__BIONIC__)
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800535 SKIP_WITH_HWASAN << "hwasan does not implement mallopt";
Christopher Ferrisaf1b8dd2018-11-07 15:28:16 -0800536 errno = 0;
537 ASSERT_EQ(1, mallopt(M_DECAY_TIME, 1));
538 ASSERT_EQ(1, mallopt(M_DECAY_TIME, 0));
539 ASSERT_EQ(1, mallopt(M_DECAY_TIME, 1));
540 ASSERT_EQ(1, mallopt(M_DECAY_TIME, 0));
541#else
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800542 GTEST_SKIP() << "bionic-only test";
Christopher Ferrisaf1b8dd2018-11-07 15:28:16 -0800543#endif
544}
545
546TEST(malloc, mallopt_purge) {
547#if defined(__BIONIC__)
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800548 SKIP_WITH_HWASAN << "hwasan does not implement mallopt";
Christopher Ferrisaf1b8dd2018-11-07 15:28:16 -0800549 errno = 0;
550 ASSERT_EQ(1, mallopt(M_PURGE, 0));
551#else
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800552 GTEST_SKIP() << "bionic-only test";
Christopher Ferrisaf1b8dd2018-11-07 15:28:16 -0800553#endif
554}
555
Elliott Hughesb1770852018-09-18 12:52:42 -0700556TEST(malloc, reallocarray_overflow) {
557#if HAVE_REALLOCARRAY
558 // Values that cause overflow to a result small enough (8 on LP64) that malloc would "succeed".
559 size_t a = static_cast<size_t>(INTPTR_MIN + 4);
560 size_t b = 2;
561
562 errno = 0;
563 ASSERT_TRUE(reallocarray(nullptr, a, b) == nullptr);
564 ASSERT_EQ(ENOMEM, errno);
565
566 errno = 0;
567 ASSERT_TRUE(reallocarray(nullptr, b, a) == nullptr);
568 ASSERT_EQ(ENOMEM, errno);
569#else
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800570 GTEST_SKIP() << "reallocarray not available";
Elliott Hughesb1770852018-09-18 12:52:42 -0700571#endif
572}
573
574TEST(malloc, reallocarray) {
575#if HAVE_REALLOCARRAY
576 void* p = reallocarray(nullptr, 2, 32);
577 ASSERT_TRUE(p != nullptr);
578 ASSERT_GE(malloc_usable_size(p), 64U);
579#else
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800580 GTEST_SKIP() << "reallocarray not available";
Elliott Hughesb1770852018-09-18 12:52:42 -0700581#endif
582}
Christopher Ferris09a19aa2018-11-16 13:28:56 -0800583
584TEST(malloc, mallinfo) {
585#if defined(__BIONIC__)
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800586 SKIP_WITH_HWASAN << "hwasan does not implement mallinfo";
Christopher Ferris09a19aa2018-11-16 13:28:56 -0800587 static size_t sizes[] = {
588 8, 32, 128, 4096, 32768, 131072, 1024000, 10240000, 20480000, 300000000
589 };
590
591 constexpr static size_t kMaxAllocs = 50;
592
593 for (size_t size : sizes) {
594 // If some of these allocations are stuck in a thread cache, then keep
595 // looping until we make an allocation that changes the total size of the
596 // memory allocated.
597 // jemalloc implementations counts the thread cache allocations against
598 // total memory allocated.
599 void* ptrs[kMaxAllocs] = {};
600 bool pass = false;
601 for (size_t i = 0; i < kMaxAllocs; i++) {
602 size_t allocated = mallinfo().uordblks;
603 ptrs[i] = malloc(size);
604 ASSERT_TRUE(ptrs[i] != nullptr);
605 size_t new_allocated = mallinfo().uordblks;
606 if (allocated != new_allocated) {
607 size_t usable_size = malloc_usable_size(ptrs[i]);
Christopher Ferris4e562282019-02-07 14:20:03 -0800608 // Only check if the total got bigger by at least allocation size.
609 // Sometimes the mallinfo numbers can go backwards due to compaction
610 // and/or freeing of cached data.
611 if (new_allocated >= allocated + usable_size) {
612 pass = true;
613 break;
614 }
Christopher Ferris09a19aa2018-11-16 13:28:56 -0800615 }
616 }
617 for (void* ptr : ptrs) {
618 free(ptr);
619 }
620 ASSERT_TRUE(pass)
621 << "For size " << size << " allocated bytes did not increase after "
622 << kMaxAllocs << " allocations.";
623 }
624#else
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800625 GTEST_SKIP() << "glibc is broken";
Christopher Ferris09a19aa2018-11-16 13:28:56 -0800626#endif
627}
Ryan Savitskiecc37e32018-12-14 15:57:21 +0000628
629TEST(android_mallopt, error_on_unexpected_option) {
630#if defined(__BIONIC__)
631 const int unrecognized_option = -1;
632 errno = 0;
633 EXPECT_EQ(false, android_mallopt(unrecognized_option, nullptr, 0));
634 EXPECT_EQ(ENOTSUP, errno);
635#else
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800636 GTEST_SKIP() << "bionic-only test";
Ryan Savitskiecc37e32018-12-14 15:57:21 +0000637#endif
638}
639
Christopher Ferrise4cdbc42019-02-08 17:30:58 -0800640bool IsDynamic() {
641#if defined(__LP64__)
642 Elf64_Ehdr ehdr;
643#else
644 Elf32_Ehdr ehdr;
645#endif
646 std::string path(android::base::GetExecutablePath());
647
648 int fd = open(path.c_str(), O_RDONLY | O_CLOEXEC);
649 if (fd == -1) {
650 // Assume dynamic on error.
651 return true;
652 }
653 bool read_completed = android::base::ReadFully(fd, &ehdr, sizeof(ehdr));
654 close(fd);
655 // Assume dynamic in error cases.
656 return !read_completed || ehdr.e_type == ET_DYN;
657}
658
Ryan Savitskiecc37e32018-12-14 15:57:21 +0000659TEST(android_mallopt, init_zygote_child_profiling) {
660#if defined(__BIONIC__)
661 // Successful call.
662 errno = 0;
Christopher Ferrise4cdbc42019-02-08 17:30:58 -0800663 if (IsDynamic()) {
664 EXPECT_EQ(true, android_mallopt(M_INIT_ZYGOTE_CHILD_PROFILING, nullptr, 0));
665 EXPECT_EQ(0, errno);
666 } else {
667 // Not supported in static executables.
668 EXPECT_EQ(false, android_mallopt(M_INIT_ZYGOTE_CHILD_PROFILING, nullptr, 0));
669 EXPECT_EQ(ENOTSUP, errno);
670 }
Ryan Savitskiecc37e32018-12-14 15:57:21 +0000671
672 // Unexpected arguments rejected.
673 errno = 0;
674 char unexpected = 0;
675 EXPECT_EQ(false, android_mallopt(M_INIT_ZYGOTE_CHILD_PROFILING, &unexpected, 1));
Christopher Ferrise4cdbc42019-02-08 17:30:58 -0800676 if (IsDynamic()) {
677 EXPECT_EQ(EINVAL, errno);
678 } else {
679 EXPECT_EQ(ENOTSUP, errno);
680 }
Ryan Savitskiecc37e32018-12-14 15:57:21 +0000681#else
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800682 GTEST_SKIP() << "bionic-only test";
Ryan Savitskiecc37e32018-12-14 15:57:21 +0000683#endif
684}
Christopher Ferris1fc5ccf2019-02-15 18:06:15 -0800685
686#if defined(__BIONIC__)
687template <typename FuncType>
688void CheckAllocationFunction(FuncType func) {
689 // Assumes that no more than 108MB of memory is allocated before this.
690 size_t limit = 128 * 1024 * 1024;
691 ASSERT_TRUE(android_mallopt(M_SET_ALLOCATION_LIMIT_BYTES, &limit, sizeof(limit)));
692 if (!func(20 * 1024 * 1024))
693 exit(1);
694 if (func(128 * 1024 * 1024))
695 exit(1);
696 exit(0);
697}
698#endif
699
700TEST(android_mallopt, set_allocation_limit) {
701#if defined(__BIONIC__)
702 EXPECT_EXIT(CheckAllocationFunction([](size_t bytes) { return calloc(bytes, 1) != nullptr; }),
703 testing::ExitedWithCode(0), "");
704 EXPECT_EXIT(CheckAllocationFunction([](size_t bytes) { return calloc(1, bytes) != nullptr; }),
705 testing::ExitedWithCode(0), "");
706 EXPECT_EXIT(CheckAllocationFunction([](size_t bytes) { return malloc(bytes) != nullptr; }),
707 testing::ExitedWithCode(0), "");
708 EXPECT_EXIT(CheckAllocationFunction(
709 [](size_t bytes) { return memalign(sizeof(void*), bytes) != nullptr; }),
710 testing::ExitedWithCode(0), "");
711 EXPECT_EXIT(CheckAllocationFunction([](size_t bytes) {
712 void* ptr;
713 return posix_memalign(&ptr, sizeof(void *), bytes) == 0;
714 }),
715 testing::ExitedWithCode(0), "");
716 EXPECT_EXIT(CheckAllocationFunction(
717 [](size_t bytes) { return aligned_alloc(sizeof(void*), bytes) != nullptr; }),
718 testing::ExitedWithCode(0), "");
719 EXPECT_EXIT(CheckAllocationFunction([](size_t bytes) {
720 void* p = malloc(1024 * 1024);
721 return realloc(p, bytes) != nullptr;
722 }),
723 testing::ExitedWithCode(0), "");
724#if !defined(__LP64__)
725 EXPECT_EXIT(CheckAllocationFunction([](size_t bytes) { return pvalloc(bytes) != nullptr; }),
726 testing::ExitedWithCode(0), "");
727 EXPECT_EXIT(CheckAllocationFunction([](size_t bytes) { return valloc(bytes) != nullptr; }),
728 testing::ExitedWithCode(0), "");
729#endif
730#else
731 GTEST_LOG_(INFO) << "This tests a bionic extension.\n";
732#endif
733}
734
735TEST(android_mallopt, set_allocation_limit_multiple) {
736#if defined(__BIONIC__)
737 // Only the first set should work.
738 size_t limit = 256 * 1024 * 1024;
739 ASSERT_TRUE(android_mallopt(M_SET_ALLOCATION_LIMIT_BYTES, &limit, sizeof(limit)));
740 limit = 32 * 1024 * 1024;
741 ASSERT_FALSE(android_mallopt(M_SET_ALLOCATION_LIMIT_BYTES, &limit, sizeof(limit)));
742#else
743 GTEST_LOG_(INFO) << "This tests a bionic extension.\n";
744#endif
745}
746
747#if defined(__BIONIC__)
748static constexpr size_t kAllocationSize = 8 * 1024 * 1024;
749
750static size_t GetMaxAllocations() {
751 size_t max_pointers = 0;
752 void* ptrs[20];
753 for (size_t i = 0; i < sizeof(ptrs) / sizeof(void*); i++) {
754 ptrs[i] = malloc(kAllocationSize);
755 if (ptrs[i] == nullptr) {
756 max_pointers = i;
757 break;
758 }
759 }
760 for (size_t i = 0; i < max_pointers; i++) {
761 free(ptrs[i]);
762 }
763 return max_pointers;
764}
765
766static void VerifyMaxPointers(size_t max_pointers) {
767 // Now verify that we can allocate the same number as before.
768 void* ptrs[20];
769 for (size_t i = 0; i < max_pointers; i++) {
770 ptrs[i] = malloc(kAllocationSize);
771 ASSERT_TRUE(ptrs[i] != nullptr) << "Failed to allocate on iteration " << i;
772 }
773
774 // Make sure the next allocation still fails.
775 ASSERT_TRUE(malloc(kAllocationSize) == nullptr);
776 for (size_t i = 0; i < max_pointers; i++) {
777 free(ptrs[i]);
778 }
779}
780#endif
781
782TEST(android_mallopt, set_allocation_limit_realloc_increase) {
783#if defined(__BIONIC__)
784 size_t limit = 128 * 1024 * 1024;
785 ASSERT_TRUE(android_mallopt(M_SET_ALLOCATION_LIMIT_BYTES, &limit, sizeof(limit)));
786
787 size_t max_pointers = GetMaxAllocations();
788 ASSERT_TRUE(max_pointers != 0) << "Limit never reached.";
789
790 void* memory = malloc(10 * 1024 * 1024);
791 ASSERT_TRUE(memory != nullptr);
792
793 // Increase size.
794 memory = realloc(memory, 20 * 1024 * 1024);
795 ASSERT_TRUE(memory != nullptr);
796 memory = realloc(memory, 40 * 1024 * 1024);
797 ASSERT_TRUE(memory != nullptr);
798 memory = realloc(memory, 60 * 1024 * 1024);
799 ASSERT_TRUE(memory != nullptr);
800 memory = realloc(memory, 80 * 1024 * 1024);
801 ASSERT_TRUE(memory != nullptr);
802 // Now push past limit.
803 memory = realloc(memory, 130 * 1024 * 1024);
804 ASSERT_TRUE(memory == nullptr);
805
806 VerifyMaxPointers(max_pointers);
807#else
808 GTEST_LOG_(INFO) << "This tests a bionic extension.\n";
809#endif
810}
811
812TEST(android_mallopt, set_allocation_limit_realloc_decrease) {
813#if defined(__BIONIC__)
814 size_t limit = 100 * 1024 * 1024;
815 ASSERT_TRUE(android_mallopt(M_SET_ALLOCATION_LIMIT_BYTES, &limit, sizeof(limit)));
816
817 size_t max_pointers = GetMaxAllocations();
818 ASSERT_TRUE(max_pointers != 0) << "Limit never reached.";
819
820 void* memory = malloc(80 * 1024 * 1024);
821 ASSERT_TRUE(memory != nullptr);
822
823 // Decrease size.
824 memory = realloc(memory, 60 * 1024 * 1024);
825 ASSERT_TRUE(memory != nullptr);
826 memory = realloc(memory, 40 * 1024 * 1024);
827 ASSERT_TRUE(memory != nullptr);
828 memory = realloc(memory, 20 * 1024 * 1024);
829 ASSERT_TRUE(memory != nullptr);
830 memory = realloc(memory, 10 * 1024 * 1024);
831 ASSERT_TRUE(memory != nullptr);
832 free(memory);
833
834 VerifyMaxPointers(max_pointers);
835#else
836 GTEST_LOG_(INFO) << "This tests a bionic extension.\n";
837#endif
838}
839
840TEST(android_mallopt, set_allocation_limit_realloc_free) {
841#if defined(__BIONIC__)
842 size_t limit = 100 * 1024 * 1024;
843 ASSERT_TRUE(android_mallopt(M_SET_ALLOCATION_LIMIT_BYTES, &limit, sizeof(limit)));
844
845 size_t max_pointers = GetMaxAllocations();
846 ASSERT_TRUE(max_pointers != 0) << "Limit never reached.";
847
848 void* memory = malloc(60 * 1024 * 1024);
849 ASSERT_TRUE(memory != nullptr);
850
851 memory = realloc(memory, 0);
852 ASSERT_TRUE(memory == nullptr);
853
854 VerifyMaxPointers(max_pointers);
855#else
856 GTEST_LOG_(INFO) << "This tests a bionic extension.\n";
857#endif
858}
859
860#if defined(__BIONIC__)
861static void* SetAllocationLimit(void* data) {
862 std::atomic_bool* go = reinterpret_cast<std::atomic_bool*>(data);
863 while (!go->load()) {
864 }
865 size_t limit = 500 * 1024 * 1024;
866 if (android_mallopt(M_SET_ALLOCATION_LIMIT_BYTES, &limit, sizeof(limit))) {
867 return reinterpret_cast<void*>(-1);
868 }
869 return nullptr;
870}
871
872static void SetAllocationLimitMultipleThreads() {
873 std::atomic_bool go;
874 go = false;
875
876 static constexpr size_t kNumThreads = 4;
877 pthread_t threads[kNumThreads];
878 for (size_t i = 0; i < kNumThreads; i++) {
879 ASSERT_EQ(0, pthread_create(&threads[i], nullptr, SetAllocationLimit, &go));
880 }
881
882 // Let them go all at once.
883 go = true;
884 ASSERT_EQ(0, kill(getpid(), __SIGRTMIN + 4));
885
886 size_t num_successful = 0;
887 for (size_t i = 0; i < kNumThreads; i++) {
888 void* result;
889 ASSERT_EQ(0, pthread_join(threads[i], &result));
890 if (result != nullptr) {
891 num_successful++;
892 }
893 }
894 ASSERT_EQ(1U, num_successful);
895 exit(0);
896}
897#endif
898
899TEST(android_mallopt, set_allocation_limit_multiple_threads) {
900#if defined(__BIONIC__)
901 if (IsDynamic()) {
902 ASSERT_TRUE(android_mallopt(M_INIT_ZYGOTE_CHILD_PROFILING, nullptr, 0));
903 }
904
905 // Run this a number of times as a stress test.
906 for (size_t i = 0; i < 100; i++) {
907 // Not using ASSERT_EXIT because errors messages are not displayed.
908 pid_t pid;
909 if ((pid = fork()) == 0) {
910 ASSERT_NO_FATAL_FAILURE(SetAllocationLimitMultipleThreads());
911 }
912 ASSERT_NE(-1, pid);
913 int status;
914 ASSERT_EQ(pid, wait(&status));
915 ASSERT_EQ(0, WEXITSTATUS(status));
916 }
917#else
918 GTEST_LOG_(INFO) << "This tests a bionic extension.\n";
919#endif
920}