diff options
author | antirez <antirez@gmail.com> | 2015-10-06 16:18:30 +0200 |
---|---|---|
committer | antirez <antirez@gmail.com> | 2015-10-06 16:55:37 +0200 |
commit | a9951b1b6a326532163e0fe4ee1a26e972258a1e (patch) | |
tree | ca555f37238537175cc1b34aa62a9f873026047f /deps/jemalloc/test/integration/overflow.c | |
parent | e3ded0273c43986a49ddd9d5fb4a20d187d015de (diff) | |
download | redis-a9951b1b6a326532163e0fe4ee1a26e972258a1e.tar.gz |
Jemalloc updated to 4.0.3.
Diffstat (limited to 'deps/jemalloc/test/integration/overflow.c')
-rw-r--r-- | deps/jemalloc/test/integration/overflow.c | 49 |
1 files changed, 49 insertions, 0 deletions
diff --git a/deps/jemalloc/test/integration/overflow.c b/deps/jemalloc/test/integration/overflow.c new file mode 100644 index 000000000..303d9b2d3 --- /dev/null +++ b/deps/jemalloc/test/integration/overflow.c @@ -0,0 +1,49 @@ +#include "test/jemalloc_test.h" + +TEST_BEGIN(test_overflow) +{ + unsigned nhchunks; + size_t mib[4]; + size_t sz, miblen, max_size_class; + void *p; + + sz = sizeof(unsigned); + assert_d_eq(mallctl("arenas.nhchunks", &nhchunks, &sz, NULL, 0), 0, + "Unexpected mallctl() error"); + + miblen = sizeof(mib) / sizeof(size_t); + assert_d_eq(mallctlnametomib("arenas.hchunk.0.size", mib, &miblen), 0, + "Unexpected mallctlnametomib() error"); + mib[2] = nhchunks - 1; + + sz = sizeof(size_t); + assert_d_eq(mallctlbymib(mib, miblen, &max_size_class, &sz, NULL, 0), 0, + "Unexpected mallctlbymib() error"); + + assert_ptr_null(malloc(max_size_class + 1), + "Expected OOM due to over-sized allocation request"); + assert_ptr_null(malloc(SIZE_T_MAX), + "Expected OOM due to over-sized allocation request"); + + assert_ptr_null(calloc(1, max_size_class + 1), + "Expected OOM due to over-sized allocation request"); + assert_ptr_null(calloc(1, SIZE_T_MAX), + "Expected OOM due to over-sized allocation request"); + + p = malloc(1); + assert_ptr_not_null(p, "Unexpected malloc() OOM"); + assert_ptr_null(realloc(p, max_size_class + 1), + "Expected OOM due to over-sized allocation request"); + assert_ptr_null(realloc(p, SIZE_T_MAX), + "Expected OOM due to over-sized allocation request"); + free(p); +} +TEST_END + +int +main(void) +{ + + return (test( + test_overflow)); +} |