Fix: CRITICAL double-allocation bug in trc_linear_carve()
Root Cause: trc_linear_carve() used meta->used as cursor, but meta->used decrements on free, causing already-allocated blocks to be re-carved. Evidence: - [LINEAR_CARVE] used=61 batch=1 → block 61 created - (blocks freed, used decrements 62→59) - [LINEAR_CARVE] used=59 batch=3 → blocks 59,60,61 RE-CREATED! - Result: double-allocation → memory corruption → SEGV Fix Implementation: 1. Added TinySlabMeta.carved (monotonic counter, never decrements) 2. Changed trc_linear_carve() to use carved instead of used 3. carved tracks carve progress, used tracks active count Files Modified: - core/superslab/superslab_types.h: Add carved field - core/tiny_refill_opt.h: Use carved in trc_linear_carve() - core/hakmem_tiny_superslab.c: Initialize carved=0 - core/tiny_alloc_fast.inc.h: Add next pointer validation - core/hakmem_tiny_free.inc: Add drain/free validation Test Results: ✅ bench_random_mixed: 950,037 ops/s (no crash) ✅ Fail-fast mode: 651,627 ops/s (with diagnostic logs) 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
@ -26,8 +26,54 @@ void tiny_free_local_box(SuperSlab* ss, int slab_idx, TinySlabMeta* meta, void*
|
||||
}
|
||||
|
||||
void* prev = meta->freelist;
|
||||
|
||||
// FREELIST CORRUPTION DEBUG: Validate pointer before writing
|
||||
if (__builtin_expect(tiny_refill_failfast_level() >= 2, 0)) {
|
||||
size_t blk = g_tiny_class_sizes[ss->size_class];
|
||||
uint8_t* base_ss = (uint8_t*)ss;
|
||||
uint8_t* slab_base = tiny_slab_base_for(ss, slab_idx);
|
||||
|
||||
// Verify prev pointer is valid (if not NULL)
|
||||
if (prev != NULL) {
|
||||
uintptr_t prev_addr = (uintptr_t)prev;
|
||||
uintptr_t slab_addr = (uintptr_t)slab_base;
|
||||
|
||||
// Check if prev is within this slab
|
||||
if (prev_addr < (uintptr_t)base_ss || prev_addr >= (uintptr_t)base_ss + (2*1024*1024)) {
|
||||
fprintf(stderr, "[FREE_CORRUPT] prev=%p outside SuperSlab ss=%p (cls=%u slab=%d)\n",
|
||||
prev, ss, ss->size_class, slab_idx);
|
||||
tiny_failfast_abort_ptr("free_local_prev_range", ss, slab_idx, ptr, "prev_outside_ss");
|
||||
}
|
||||
|
||||
// Check alignment of prev
|
||||
if ((prev_addr - slab_addr) % blk != 0) {
|
||||
fprintf(stderr, "[FREE_CORRUPT] prev=%p misaligned (cls=%u slab=%d blk=%zu offset=%zu)\n",
|
||||
prev, ss->size_class, slab_idx, blk, (size_t)(prev_addr - slab_addr));
|
||||
fprintf(stderr, "[FREE_CORRUPT] Writing from ptr=%p, freelist was=%p\n", ptr, prev);
|
||||
tiny_failfast_abort_ptr("free_local_prev_misalign", ss, slab_idx, ptr, "prev_misaligned");
|
||||
}
|
||||
}
|
||||
|
||||
fprintf(stderr, "[FREE_VERIFY] cls=%u slab=%d ptr=%p prev=%p (offset_ptr=%zu offset_prev=%zu)\n",
|
||||
ss->size_class, slab_idx, ptr, prev,
|
||||
(size_t)((uintptr_t)ptr - (uintptr_t)slab_base),
|
||||
prev ? (size_t)((uintptr_t)prev - (uintptr_t)slab_base) : 0);
|
||||
}
|
||||
|
||||
*(void**)ptr = prev;
|
||||
meta->freelist = ptr;
|
||||
|
||||
// FREELIST CORRUPTION DEBUG: Verify write succeeded
|
||||
if (__builtin_expect(tiny_refill_failfast_level() >= 2, 0)) {
|
||||
void* readback = *(void**)ptr;
|
||||
if (readback != prev) {
|
||||
fprintf(stderr, "[FREE_CORRUPT] Wrote prev=%p to ptr=%p but read back %p!\n",
|
||||
prev, ptr, readback);
|
||||
fprintf(stderr, "[FREE_CORRUPT] Memory corruption detected during freelist push\n");
|
||||
tiny_failfast_abort_ptr("free_local_readback", ss, slab_idx, ptr, "write_corrupted");
|
||||
}
|
||||
}
|
||||
|
||||
tiny_failfast_log("free_local_box", ss->size_class, ss, meta, ptr, prev);
|
||||
// BUGFIX: Memory barrier to ensure freelist visibility before used decrement
|
||||
// Without this, other threads can see new freelist but old used count (race)
|
||||
|
||||
Reference in New Issue
Block a user