• David Rowley's avatar
    Fix some possibly latent bugs in slab.c · 6ec89610
    David Rowley authored
    Primarily, this fixes an incorrect calculation in SlabCheck which was
    looking in the wrong byte for the sentinel check.  The reason that we've
    never noticed this before in the form of a failing sentinel check is
    because the pre-check to this always fails because all current core users
    of slab contexts have a chunk size which is already MAXALIGNed, therefore
    there's never any space for the sentinel byte.  It is possible that an
    extension needs to use a slab context and if they do with a chunk size
    that's not MAXALIGNed, then they'll likely get errors about overwritten
    sentinel bytes.
    
    Additionally, this patch changes various calculations which are being done
    based on the sizeof(SlabBlock).  Currently, sizeof(SlabBlock) is a
    multiple of 8, therefore sizeof(SlabBlock) is the same as
    MAXALIGN(sizeof(SlabBlock)), however, if we were to ever have to add any
    fields to that struct as part of a bug fix, then SlabAlloc could end up
    returning a non-MAXALIGNed pointer.  To be safe, let's ensure we always
    MAXALIGN sizeof(SlabBlock) before using it in any calculations.
    
    This patch has already been applied to master in d5ee4db0e.
    
    Diagnosed-by: Tomas Vondra, Tom Lane
    Author: Tomas Vondra, David Rowley
    Discussion: https://postgr.es/m/CAA4eK1%2B1JyW5TiL%3DyV-3Uq1CrfnTyn0Xrk5uArt31Z%3D8rgPhXQ%40mail.gmail.com
    Backpatch-through: 10
    6ec89610
slab.c 23.3 KB