/* * Copyright (c) 2016, 2018, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions. */ #include "precompiled.hpp" #include "memory/allocation.hpp" #include "memory/allocation.inline.hpp" #include "memory/guardedMemory.hpp" #include "runtime/os.hpp" #include "unittest.hpp" #define GEN_PURPOSE_TAG ((void *) ((uintptr_t)0xf000f000)) static void guarded_memory_test_check(void* p, size_t sz, void* tag) { ASSERT_TRUE(p != NULL) << "NULL pointer given to check"; u_char* c = (u_char*) p; GuardedMemory guarded(c); EXPECT_EQ(guarded.get_tag(), tag) << "Tag is not the same as supplied"; EXPECT_EQ(guarded.get_user_ptr(), c) << "User pointer is not the same as supplied"; EXPECT_EQ(guarded.get_user_size(), sz) << "User size is not the same as supplied"; EXPECT_TRUE(guarded.verify_guards()) << "Guard broken"; } class GuardedMemoryTest { public: static size_t get_guard_header_size() { return sizeof (GuardedMemory::GuardHeader); } static size_t get_guard_size() { return sizeof (GuardedMemory::Guard); } }; // Test GuardedMemory size TEST(GuardedMemory, size) { size_t total_sz = GuardedMemory::get_total_size(1); ASSERT_GT(total_sz, (size_t) 1) << "Unexpected size"; ASSERT_GE(total_sz, GuardedMemoryTest::get_guard_header_size() + 1 + GuardedMemoryTest::get_guard_size()) << "Unexpected size"; } // Test the basic characteristics TEST(GuardedMemory, basic) { u_char* basep = (u_char*) os::malloc(GuardedMemory::get_total_size(1), mtInternal); GuardedMemory guarded(basep, 1, GEN_PURPOSE_TAG); EXPECT_EQ(badResourceValue, *basep) << "Expected guard in the form of badResourceValue"; u_char* userp = guarded.get_user_ptr(); EXPECT_EQ(uninitBlockPad, *userp) << "Expected uninitialized data in the form of uninitBlockPad"; guarded_memory_test_check(userp, 1, GEN_PURPOSE_TAG); void* freep = guarded.release_for_freeing(); EXPECT_EQ((u_char*) freep, basep) << "Expected the same pointer guard was "; EXPECT_EQ(freeBlockPad, *userp) << "Expected user data to be free block padded"; EXPECT_FALSE(guarded.verify_guards()); os::free(freep); } // Test a number of odd sizes TEST(GuardedMemory, odd_sizes) { u_char* basep = (u_char*) os::malloc(GuardedMemory::get_total_size(1), mtInternal); GuardedMemory guarded(basep, 1, GEN_PURPOSE_TAG); size_t sz = 0; do { void* p = os::malloc(GuardedMemory::get_total_size(sz), mtInternal); void* up = guarded.wrap_with_guards(p, sz, (void*) 1); memset(up, 0, sz); guarded_memory_test_check(up, sz, (void*) 1); if (HasFatalFailure()) { return; } os::free(guarded.release_for_freeing()); sz = (sz << 4) + 1; } while (sz < (256 * 1024)); } // Test buffer overrun into head... TEST(GuardedMemory, buffer_overrun_head) { u_char* basep = (u_char*) os::malloc(GuardedMemory::get_total_size(1), mtInternal); GuardedMemory guarded(basep, 1, GEN_PURPOSE_TAG); guarded.wrap_with_guards(basep, 1); *basep = 0; EXPECT_FALSE(guarded.verify_guards()); os::free(basep); } // Test buffer overrun into tail with a number of odd sizes TEST(GuardedMemory, buffer_overrun_tail) { u_char* basep = (u_char*) os::malloc(GuardedMemory::get_total_size(1), mtInternal); GuardedMemory guarded(basep, 1, GEN_PURPOSE_TAG); size_t sz = 1; do { void* p = os::malloc(GuardedMemory::get_total_size(sz), mtInternal); void* up = guarded.wrap_with_guards(p, sz, (void*) 1); memset(up, 0, sz + 1); // Buffer-overwrite (within guard) EXPECT_FALSE(guarded.verify_guards()) << "Guard was not broken as expected"; os::free(guarded.release_for_freeing()); sz = (sz << 4) + 1; } while (sz < (256 * 1024)); } // Test wrap_copy/wrap_free TEST(GuardedMemory, wrap) { EXPECT_TRUE(GuardedMemory::free_copy(NULL)) << "Expected free NULL to be OK"; const char* str = "Check my bounds out"; size_t str_sz = strlen(str) + 1; char* str_copy = (char*) GuardedMemory::wrap_copy(str, str_sz); guarded_memory_test_check(str_copy, str_sz, NULL); if (HasFatalFailure()) { return; } EXPECT_EQ(0, strcmp(str, str_copy)) << "Not identical copy"; EXPECT_TRUE(GuardedMemory::free_copy(str_copy)) << "Free copy failed to verify"; void* no_data = NULL; void* no_data_copy = GuardedMemory::wrap_copy(no_data, 0); EXPECT_TRUE(GuardedMemory::free_copy(no_data_copy)) << "Expected valid guards even for no data copy"; }