1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #define _CRT_SECURE_NO_WARNINGS
7 #include "base/process/memory.h"
11 #include "base/compiler_specific.h"
12 #include "base/debug/alias.h"
13 #include "testing/gtest/include/gtest/gtest.h"
21 #if defined(OS_MACOSX)
22 #include <malloc/malloc.h>
23 #include "base/process/memory_unittest_mac.h"
31 // HeapQueryInformation function pointer.
32 typedef BOOL (WINAPI
* HeapQueryFn
) \
33 (HANDLE
, HEAP_INFORMATION_CLASS
, PVOID
, SIZE_T
, PSIZE_T
);
35 const int kConstantInModule
= 42;
37 TEST(ProcessMemoryTest
, GetModuleFromAddress
) {
38 // Since the unit tests are their own EXE, this should be
39 // equivalent to the EXE's HINSTANCE.
41 // kConstantInModule is a constant in this file and
42 // therefore within the unit test EXE.
43 EXPECT_EQ(::GetModuleHandle(NULL
),
44 base::GetModuleFromAddress(
45 const_cast<int*>(&kConstantInModule
)));
47 // Any address within the kernel32 module should return
48 // kernel32's HMODULE. Our only assumption here is that
49 // kernel32 is larger than 4 bytes.
50 HMODULE kernel32
= ::GetModuleHandle(L
"kernel32.dll");
51 HMODULE kernel32_from_address
=
52 base::GetModuleFromAddress(reinterpret_cast<DWORD
*>(kernel32
) + 1);
53 EXPECT_EQ(kernel32
, kernel32_from_address
);
56 TEST(ProcessMemoryTest
, EnableLFH
) {
57 ASSERT_TRUE(base::EnableLowFragmentationHeap());
58 if (IsDebuggerPresent()) {
59 // Under these conditions, LFH can't be enabled. There's no point to test
61 const char* no_debug_env
= getenv("_NO_DEBUG_HEAP");
62 if (!no_debug_env
|| strcmp(no_debug_env
, "1"))
65 HMODULE kernel32
= GetModuleHandle(L
"kernel32.dll");
66 ASSERT_TRUE(kernel32
!= NULL
);
67 HeapQueryFn heap_query
= reinterpret_cast<HeapQueryFn
>(GetProcAddress(
69 "HeapQueryInformation"));
71 // On Windows 2000, the function is not exported. This is not a reason to
72 // fail but we won't be able to retrieves information about the heap, so we
74 if (heap_query
== NULL
)
77 HANDLE heaps
[1024] = { 0 };
78 unsigned number_heaps
= GetProcessHeaps(1024, heaps
);
79 EXPECT_GT(number_heaps
, 0u);
80 for (unsigned i
= 0; i
< number_heaps
; ++i
) {
83 ASSERT_NE(0, heap_query(heaps
[i
],
84 HeapCompatibilityInformation
,
88 // If flag is 0, the heap is a standard heap that does not support
89 // look-asides. If flag is 1, the heap supports look-asides. If flag is 2,
90 // the heap is a low-fragmentation heap (LFH). Note that look-asides are not
91 // supported on the LFH.
93 // We don't have any documented way of querying the HEAP_NO_SERIALIZE flag.
98 #endif // defined(OS_WIN)
100 #if defined(OS_MACOSX)
102 // For the following Mac tests:
103 // Note that base::EnableTerminationOnHeapCorruption() is called as part of
104 // test suite setup and does not need to be done again, else mach_override
107 #if !defined(ADDRESS_SANITIZER)
108 // The following code tests the system implementation of malloc() thus no need
109 // to test it under AddressSanitizer.
110 TEST(ProcessMemoryTest
, MacMallocFailureDoesNotTerminate
) {
111 // Test that ENOMEM doesn't crash via CrMallocErrorBreak two ways: the exit
112 // code and lack of the error string. The number of bytes is one less than
113 // MALLOC_ABSOLUTE_MAX_SIZE, more than which the system early-returns NULL and
114 // does not call through malloc_error_break(). See the comment at
115 // EnableTerminationOnOutOfMemory() for more information.
119 base::EnableTerminationOnOutOfMemory();
121 buf
= malloc(std::numeric_limits
<size_t>::max() - (2 * PAGE_SIZE
) - 1);
123 testing::KilledBySignal(SIGTRAP
),
124 "\\*\\*\\* error: can't allocate region.*"
125 "(Terminating process due to a potential for future heap "
128 base::debug::Alias(buf
);
130 #endif // !defined(ADDRESS_SANITIZER)
132 TEST(ProcessMemoryTest
, MacTerminateOnHeapCorruption
) {
133 // Assert that freeing an unallocated pointer will crash the process.
135 asm("" : "=r" (buf
)); // Prevent clang from being too smart.
137 // On 64 bit Macs, the malloc system automatically abort()s on heap corruption
138 // but does not output anything.
139 ASSERT_DEATH(free(buf
), "");
140 #elif defined(ADDRESS_SANITIZER)
141 // AddressSanitizer replaces malloc() and prints a different error message on
143 ASSERT_DEATH(free(buf
), "attempting free on address which "
144 "was not malloc\\(\\)-ed");
146 ASSERT_DEATH(free(buf
), "being freed.*"
147 "\\*\\*\\* set a breakpoint in malloc_error_break to debug.*"
148 "Terminating process due to a potential for future heap corruption");
149 #endif // ARCH_CPU_64_BITS || defined(ADDRESS_SANITIZER)
152 #endif // defined(OS_MACOSX)
154 // Android doesn't implement set_new_handler, so we can't use the
155 // OutOfMemoryTest cases.
156 // OpenBSD does not support these tests either.
157 // AddressSanitizer and ThreadSanitizer define the malloc()/free()/etc.
158 // functions so that they don't crash if the program is out of memory, so the
159 // OOM tests aren't supposed to work.
160 // TODO(vandebo) make this work on Windows too.
161 #if !defined(OS_ANDROID) && !defined(OS_OPENBSD) && \
162 !defined(OS_WIN) && \
163 !defined(ADDRESS_SANITIZER) && !defined(THREAD_SANITIZER)
165 #if defined(USE_TCMALLOC)
167 int tc_set_new_mode(int mode
);
169 #endif // defined(USE_TCMALLOC)
171 class OutOfMemoryDeathTest
: public testing::Test
{
173 OutOfMemoryDeathTest()
175 // Make test size as large as possible minus a few pages so
176 // that alignment or other rounding doesn't make it wrap.
177 test_size_(std::numeric_limits
<std::size_t>::max() - 12 * 1024),
178 signed_test_size_(std::numeric_limits
<ssize_t
>::max()) {
181 #if defined(USE_TCMALLOC)
182 virtual void SetUp() OVERRIDE
{
186 virtual void TearDown() OVERRIDE
{
189 #endif // defined(USE_TCMALLOC)
191 void SetUpInDeathAssert() {
192 // Must call EnableTerminationOnOutOfMemory() because that is called from
193 // chrome's main function and therefore hasn't been called yet.
194 // Since this call may result in another thread being created and death
195 // tests shouldn't be started in a multithread environment, this call
196 // should be done inside of the ASSERT_DEATH.
197 base::EnableTerminationOnOutOfMemory();
202 ssize_t signed_test_size_
;
205 TEST_F(OutOfMemoryDeathTest
, New
) {
207 SetUpInDeathAssert();
208 value_
= operator new(test_size_
);
212 TEST_F(OutOfMemoryDeathTest
, NewArray
) {
214 SetUpInDeathAssert();
215 value_
= new char[test_size_
];
219 TEST_F(OutOfMemoryDeathTest
, Malloc
) {
221 SetUpInDeathAssert();
222 value_
= malloc(test_size_
);
226 TEST_F(OutOfMemoryDeathTest
, Realloc
) {
228 SetUpInDeathAssert();
229 value_
= realloc(NULL
, test_size_
);
233 TEST_F(OutOfMemoryDeathTest
, Calloc
) {
235 SetUpInDeathAssert();
236 value_
= calloc(1024, test_size_
/ 1024L);
240 TEST_F(OutOfMemoryDeathTest
, Valloc
) {
242 SetUpInDeathAssert();
243 value_
= valloc(test_size_
);
247 #if defined(OS_LINUX)
248 TEST_F(OutOfMemoryDeathTest
, Pvalloc
) {
250 SetUpInDeathAssert();
251 value_
= pvalloc(test_size_
);
255 TEST_F(OutOfMemoryDeathTest
, Memalign
) {
257 SetUpInDeathAssert();
258 value_
= memalign(4, test_size_
);
262 TEST_F(OutOfMemoryDeathTest
, ViaSharedLibraries
) {
263 // g_try_malloc is documented to return NULL on failure. (g_malloc is the
264 // 'safe' default that crashes if allocation fails). However, since we have
265 // hopefully overridden malloc, even g_try_malloc should fail. This tests
266 // that the run-time symbol resolution is overriding malloc for shared
267 // libraries as well as for our code.
269 SetUpInDeathAssert();
270 value_
= g_try_malloc(test_size_
);
275 // Android doesn't implement posix_memalign().
276 #if defined(OS_POSIX) && !defined(OS_ANDROID)
277 TEST_F(OutOfMemoryDeathTest
, Posix_memalign
) {
278 // Grab the return value of posix_memalign to silence a compiler warning
279 // about unused return values. We don't actually care about the return
280 // value, since we're asserting death.
282 SetUpInDeathAssert();
283 EXPECT_EQ(ENOMEM
, posix_memalign(&value_
, 8, test_size_
));
286 #endif // defined(OS_POSIX) && !defined(OS_ANDROID)
288 #if defined(OS_MACOSX)
290 // Purgeable zone tests
292 TEST_F(OutOfMemoryDeathTest
, MallocPurgeable
) {
293 malloc_zone_t
* zone
= malloc_default_purgeable_zone();
295 SetUpInDeathAssert();
296 value_
= malloc_zone_malloc(zone
, test_size_
);
300 TEST_F(OutOfMemoryDeathTest
, ReallocPurgeable
) {
301 malloc_zone_t
* zone
= malloc_default_purgeable_zone();
303 SetUpInDeathAssert();
304 value_
= malloc_zone_realloc(zone
, NULL
, test_size_
);
308 TEST_F(OutOfMemoryDeathTest
, CallocPurgeable
) {
309 malloc_zone_t
* zone
= malloc_default_purgeable_zone();
311 SetUpInDeathAssert();
312 value_
= malloc_zone_calloc(zone
, 1024, test_size_
/ 1024L);
316 TEST_F(OutOfMemoryDeathTest
, VallocPurgeable
) {
317 malloc_zone_t
* zone
= malloc_default_purgeable_zone();
319 SetUpInDeathAssert();
320 value_
= malloc_zone_valloc(zone
, test_size_
);
324 TEST_F(OutOfMemoryDeathTest
, PosixMemalignPurgeable
) {
325 malloc_zone_t
* zone
= malloc_default_purgeable_zone();
327 SetUpInDeathAssert();
328 value_
= malloc_zone_memalign(zone
, 8, test_size_
);
332 // Since these allocation functions take a signed size, it's possible that
333 // calling them just once won't be enough to exhaust memory. In the 32-bit
334 // environment, it's likely that these allocation attempts will fail because
335 // not enough contiguous address space is available. In the 64-bit environment,
336 // it's likely that they'll fail because they would require a preposterous
337 // amount of (virtual) memory.
339 TEST_F(OutOfMemoryDeathTest
, CFAllocatorSystemDefault
) {
341 SetUpInDeathAssert();
343 base::AllocateViaCFAllocatorSystemDefault(signed_test_size_
))) {}
347 TEST_F(OutOfMemoryDeathTest
, CFAllocatorMalloc
) {
349 SetUpInDeathAssert();
351 base::AllocateViaCFAllocatorMalloc(signed_test_size_
))) {}
355 TEST_F(OutOfMemoryDeathTest
, CFAllocatorMallocZone
) {
357 SetUpInDeathAssert();
359 base::AllocateViaCFAllocatorMallocZone(signed_test_size_
))) {}
363 #if !defined(ARCH_CPU_64_BITS)
365 // See process_util_unittest_mac.mm for an explanation of why this test isn't
366 // run in the 64-bit environment.
368 TEST_F(OutOfMemoryDeathTest
, PsychoticallyBigObjCObject
) {
370 SetUpInDeathAssert();
371 while ((value_
= base::AllocatePsychoticallyBigObjCObject())) {}
375 #endif // !ARCH_CPU_64_BITS
378 #endif // !defined(OS_ANDROID) && !defined(OS_OPENBSD) &&
379 // !defined(OS_WIN) && !defined(ADDRESS_SANITIZER)