RFR: 8369393: NMT: poison the canaries of malloc header under ASAN build [v13]
Afshin Zafari
azafari at openjdk.org
Wed Oct 15 11:37:57 UTC 2025
> NMT can detect malloc'd memory corruption using canary tests at header and footer of every memory region. This can only be done at free time of the memory where NNT checks the canaries and report error if they are not as expected.
> In this PR, the canary parts also are poisoned using ASAN API to get notified whenever a read/write op is done. on the canary parts. `_size` member of the malloc header is also poisoned, since it is used for finding the footer address.
Afshin Zafari has updated the pull request with a new target base due to a merge or a rebase. The incremental webrev excludes the unrelated changes brought in by the merge/rebase. The pull request contains 16 additional commits since the last revision:
- Merge remote-tracking branch 'origin/master' into _20251006_asan_hdr_footer
- include order
- clean ups
- another NOT_LP64
- NOT_LP64 code fix
- register_memory -> poison_memory
- reviews applied
- better style
- a step back
- alternative impl
- ... and 6 more: https://git.openjdk.org/jdk/compare/e95b2670...2b143527
-------------
Changes:
- all: https://git.openjdk.org/jdk/pull/27685/files
- new: https://git.openjdk.org/jdk/pull/27685/files/fadd9d6e..2b143527
Webrevs:
- full: https://webrevs.openjdk.org/?repo=jdk&pr=27685&range=12
- incr: https://webrevs.openjdk.org/?repo=jdk&pr=27685&range=11-12
Stats: 20849 lines in 508 files changed: 13342 ins; 5969 del; 1538 mod
Patch: https://git.openjdk.org/jdk/pull/27685.diff
Fetch: git fetch https://git.openjdk.org/jdk.git pull/27685/head:pull/27685
PR: https://git.openjdk.org/jdk/pull/27685
More information about the hotspot-runtime-dev
mailing list