From: Sascha Hauer <sha@pengutronix.de>
To: Ahmad Fatoum <a.fatoum@pengutronix.de>
Cc: barebox@lists.infradead.org, j.martin@pengutronix.de
Subject: Re: [PATCH master 1/2] test: self: add basic testing for malloc()
Date: Tue, 24 May 2022 09:04:32 +0200 [thread overview]
Message-ID: <20220524070432.GS25578@pengutronix.de> (raw)
In-Reply-To: <20220523062756.774153-1-a.fatoum@pengutronix.de>
On Mon, May 23, 2022 at 08:27:55AM +0200, Ahmad Fatoum wrote:
> Surprisingly, the TLSF allocator is prone to overflow. Add some tests
> that trigger this behavior. These tests run to success with dlmalloc,
> but some of them fail under tlsf when compiled for 32-bit:
>
> test_malloc:40: unexpectedly succeeded to malloc(SIZE_MAX)
> test_malloc:61: unexpectedly succeeded to (tmp = realloc(p, 0xf0000000))
> test_malloc:63: unexpectedly succeeded to tmp = realloc(p, SIZE_MAX)
> ERROR: malloc: failed 3 out of 12 tests
>
> Signed-off-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
> ---
> test/self/Kconfig | 5 +++
> test/self/Makefile | 1 +
> test/self/malloc.c | 91 ++++++++++++++++++++++++++++++++++++++++++++++
> 3 files changed, 97 insertions(+)
> create mode 100644 test/self/malloc.c
Applied, thanks
Sascha
>
> diff --git a/test/self/Kconfig b/test/self/Kconfig
> index 3340a9146ee2..cf11efe54486 100644
> --- a/test/self/Kconfig
> +++ b/test/self/Kconfig
> @@ -32,6 +32,11 @@ config SELFTEST_ENABLE_ALL
> help
> Selects all self-tests compatible with current configuration
>
> +config SELFTEST_MALLOC
> + bool "malloc() selftest"
> + help
> + Tests barebox memory allocator
> +
> config SELFTEST_PRINTF
> bool "printf selftest"
> help
> diff --git a/test/self/Makefile b/test/self/Makefile
> index 05a2a6a236ec..65d01596b806 100644
> --- a/test/self/Makefile
> +++ b/test/self/Makefile
> @@ -1,6 +1,7 @@
> # SPDX-License-Identifier: GPL-2.0
>
> obj-$(CONFIG_SELFTEST) += core.o
> +obj-$(CONFIG_SELFTEST_MALLOC) += malloc.o
> obj-$(CONFIG_SELFTEST_PRINTF) += printf.o
> obj-$(CONFIG_SELFTEST_PROGRESS_NOTIFIER) += progress-notifier.o
> obj-$(CONFIG_SELFTEST_OF_MANIPULATION) += of_manipulation.o of_manipulation.dtb.o
> diff --git a/test/self/malloc.c b/test/self/malloc.c
> new file mode 100644
> index 000000000000..c25b416b9751
> --- /dev/null
> +++ b/test/self/malloc.c
> @@ -0,0 +1,91 @@
> +// SPDX-License-Identifier: GPL-2.0-only
> +
> +#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
> +
> +#include <common.h>
> +#include <bselftest.h>
> +#include <malloc.h>
> +#include <memory.h>
> +#include <linux/sizes.h>
> +
> +BSELFTEST_GLOBALS();
> +
> +static void __expect(bool cond, bool expect,
> + const char *condstr, const char *func, int line)
> +{
> + total_tests++;
> + if (cond != expect) {
> + failed_tests++;
> + printf("%s:%d: %s to %s\n", func, line,
> + expect ? "failed" : "unexpectedly succeeded",
> + condstr);
> + }
> +}
> +
> +#define expect_alloc_ok(cond) \
> + __expect((cond), true, #cond, __func__, __LINE__)
> +
> +#define expect_alloc_fail(cond) \
> + __expect((cond), false, #cond, __func__, __LINE__)
> +
> +static void test_malloc(void)
> +{
> + size_t mem_malloc_size = mem_malloc_end() - mem_malloc_start();
> + u8 *p, *tmp;
> +
> + pr_debug("mem_malloc_size = %zu\n", mem_malloc_size);
> +
> + /* System libc when built for sandbox may have overcommit, so
> + * doing very big allocations without actual use may succeed
> + * unlike in-barebox allocators, so skip these tests in that
> + * case
> + */
> + if (IS_ENABLED(CONFIG_MALLOC_LIBC)) {
> + pr_info("built with host libc allocator: Skipping tests that may trigger overcommit\n");
> + mem_malloc_size = 0;
> + }
> +
> + expect_alloc_ok(p = malloc(1));
> + free(p);
> +
> + if (mem_malloc_size) {
> + expect_alloc_fail(malloc(SIZE_MAX));
> +
> + if (0xf0000000 > mem_malloc_size) {
> + expect_alloc_fail((tmp = malloc(0xf0000000)));
> + free(tmp);
> + }
> + } else {
> + skipped_tests += 2;
> + }
> +
> + p = realloc(NULL, 1);
> + expect_alloc_ok(p = realloc(NULL, 1));
> +
> + *p = 0x42;
> +
> + expect_alloc_ok(tmp = realloc(p, 2));
> +
> + p = tmp;
> + __expect(*p == 0x42, true, "reread after realloc", __func__, __LINE__);
> +
> + if (mem_malloc_size) {
> + expect_alloc_fail(tmp = realloc(p, mem_malloc_size));
> +
> + if (0xf0000000 > mem_malloc_size)
> + expect_alloc_fail((tmp = realloc(p, 0xf0000000)));
> +
> + expect_alloc_fail(tmp = realloc(p, SIZE_MAX));
> +
> + } else {
> + skipped_tests += 3;
> + }
> +
> + free(p);
> +
> + expect_alloc_ok(p = malloc(0));
> + expect_alloc_ok(tmp = malloc(0));
> +
> + __expect(p != tmp, true, "allocate distinct 0-size buffers", __func__, __LINE__);
> +}
> +bselftest(core, test_malloc);
> --
> 2.30.2
>
>
>
--
Pengutronix e.K. | |
Steuerwalder Str. 21 | http://www.pengutronix.de/ |
31137 Hildesheim, Germany | Phone: +49-5121-206917-0 |
Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |
_______________________________________________
barebox mailing list
barebox@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/barebox
prev parent reply other threads:[~2022-05-24 7:06 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-05-23 6:27 Ahmad Fatoum
2022-05-23 6:27 ` [PATCH master 2/2] tlsf: fix internal overflow trying to allocate big buffers Ahmad Fatoum
2022-05-24 7:04 ` Sascha Hauer [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20220524070432.GS25578@pengutronix.de \
--to=sha@pengutronix.de \
--cc=a.fatoum@pengutronix.de \
--cc=barebox@lists.infradead.org \
--cc=j.martin@pengutronix.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox