1 /*
   2  * Copyright (c) 2016, Oracle and/or its affiliates. All rights reserved.
   3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
   4  *
   5  * This code is free software; you can redistribute it and/or modify it
   6  * under the terms of the GNU General Public License version 2 only, as
   7  * published by the Free Software Foundation.
   8  *
   9  * This code is distributed in the hope that it will be useful, but WITHOUT
  10  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  11  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
  12  * version 2 for more details (a copy is included in the LICENSE file that
  13  * accompanied this code).
  14  *
  15  * You should have received a copy of the GNU General Public License version
  16  * 2 along with this work; if not, write to the Free Software Foundation,
  17  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
  18  *
  19  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
  20  * or visit www.oracle.com if you need additional information or have any
  21  * questions.
  22  */
  23 
  24 #include "precompiled.hpp"
  25 #include "memory/allocation.hpp"
  26 #include "memory/allocation.inline.hpp"
  27 #include "memory/guardedMemory.hpp"
  28 #include "runtime/os.hpp"
  29 #include "unittest.hpp"
  30 
  31 static void guarded_memory_test_check(void* p, size_t sz, void* tag) {
  32   ASSERT_TRUE(p != NULL) << "NULL pointer given to check";
  33   u_char* c = (u_char*) p;
  34   GuardedMemory guarded(c);
  35   EXPECT_EQ(guarded.get_tag(), tag) << "Tag is not the same as supplied";
  36   EXPECT_EQ(guarded.get_user_ptr(), c) << "User pointer is not the same as supplied";
  37   EXPECT_EQ(guarded.get_user_size(), sz) << "User size is not the same as supplied";
  38   EXPECT_TRUE(guarded.verify_guards()) << "Guard broken";
  39 }
  40 
  41 class GuardedMemoryTest {
  42  public:
  43   static size_t get_guard_header_size() {
  44     return sizeof (GuardedMemory::GuardHeader);
  45   }
  46   static size_t get_guard_size() {
  47     return sizeof (GuardedMemory::Guard);
  48   }
  49 };
  50 
  51 // Test GuardedMemory size
  52 TEST(GuardedMemory, size) {
  53   size_t total_sz = GuardedMemory::get_total_size(1);
  54   ASSERT_GT(total_sz, (size_t) 1) << "Unexpected size";
  55   ASSERT_GE(total_sz, GuardedMemoryTest::get_guard_header_size() + 1
  56           + GuardedMemoryTest::get_guard_size()) << "Unexpected size";
  57 }
  58 
  59 // Test the basic characteristics
  60 TEST(GuardedMemory, basic) {
  61   u_char* basep =
  62           (u_char*) os::malloc(GuardedMemory::get_total_size(1), mtInternal);
  63   GuardedMemory guarded(basep, 1, (void*) 0xf000f000);
  64 
  65   EXPECT_EQ(badResourceValue, *basep)
  66           << "Expected guard in the form of badResourceValue";
  67 
  68   u_char* userp = guarded.get_user_ptr();
  69   EXPECT_EQ(uninitBlockPad, *userp)
  70           << "Expected uninitialized data in the form of uninitBlockPad";
  71   guarded_memory_test_check(userp, 1, (void*) 0xf000f000);
  72 
  73   void* freep = guarded.release_for_freeing();
  74   EXPECT_EQ((u_char*) freep, basep) << "Expected the same pointer guard was ";
  75   EXPECT_EQ(freeBlockPad, *userp) << "Expected user data to be free block padded";
  76   EXPECT_FALSE(guarded.verify_guards());
  77   os::free(freep);
  78 }
  79 
  80 // Test a number of odd sizes
  81 TEST(GuardedMemory, odd_sizes) {
  82   u_char* basep =
  83           (u_char*) os::malloc(GuardedMemory::get_total_size(1), mtInternal);
  84   GuardedMemory guarded(basep, 1, (void*) 0xf000f000);
  85 
  86   size_t sz = 0;
  87   do {
  88     void* p = os::malloc(GuardedMemory::get_total_size(sz), mtInternal);
  89     void* up = guarded.wrap_with_guards(p, sz, (void*) 1);
  90     memset(up, 0, sz);
  91     guarded_memory_test_check(up, sz, (void*) 1);
  92     if (HasFatalFailure()) {
  93       return;
  94     }
  95 
  96     os::free(guarded.release_for_freeing());
  97     sz = (sz << 4) + 1;
  98   } while (sz < (256 * 1024));
  99 }
 100 
 101 // Test buffer overrun into head...
 102 TEST(GuardedMemory, buffer_overrun_head) {
 103   u_char* basep =
 104           (u_char*) os::malloc(GuardedMemory::get_total_size(1), mtInternal);
 105   GuardedMemory guarded(basep, 1, (void*) 0xf000f000);
 106 
 107   guarded.wrap_with_guards(basep, 1);
 108   *basep = 0;
 109   EXPECT_FALSE(guarded.verify_guards());
 110   os::free(basep);
 111 }
 112 
 113 // Test buffer overrun into tail with a number of odd sizes
 114 TEST(GuardedMemory, buffer_overrun_tail) {
 115   u_char* basep =
 116           (u_char*) os::malloc(GuardedMemory::get_total_size(1), mtInternal);
 117   GuardedMemory guarded(basep, 1, (void*) 0xf000f000);
 118 
 119   size_t sz = 1;
 120   do {
 121     void* p = os::malloc(GuardedMemory::get_total_size(sz), mtInternal);
 122     void* up = guarded.wrap_with_guards(p, sz, (void*) 1);
 123     memset(up, 0, sz + 1); // Buffer-overwrite (within guard)
 124     EXPECT_FALSE(guarded.verify_guards()) << "Guard was not broken as expected";
 125     os::free(guarded.release_for_freeing());
 126     sz = (sz << 4) + 1;
 127   } while (sz < (256 * 1024));
 128 }
 129 
 130 // Test wrap_copy/wrap_free
 131 TEST(GuardedMemory, wrap) {
 132   EXPECT_TRUE(GuardedMemory::free_copy(NULL)) << "Expected free NULL to be OK";
 133 
 134   const char* str = "Check my bounds out";
 135   size_t str_sz = strlen(str) + 1;
 136   char* str_copy = (char*) GuardedMemory::wrap_copy(str, str_sz);
 137   guarded_memory_test_check(str_copy, str_sz, NULL);
 138   if (HasFatalFailure()) {
 139     return;
 140   }
 141   EXPECT_EQ(0, strcmp(str, str_copy)) << "Not identical copy";
 142   EXPECT_TRUE(GuardedMemory::free_copy(str_copy)) << "Free copy failed to verify";
 143 
 144   void* no_data = NULL;
 145   void* no_data_copy = GuardedMemory::wrap_copy(no_data, 0);
 146   EXPECT_TRUE(GuardedMemory::free_copy(no_data_copy))
 147           << "Expected valid guards even for no data copy";
 148 }