test/hotspot/gtest/memory/test_guardedMemory.cpp
changeset 47216 71c04702a3d5
parent 42018 921e8769926b
child 49167 ba9da6aaae36
equal deleted inserted replaced
47215:4ebc2e2fb97c 47216:71c04702a3d5
       
     1 /*
       
     2  * Copyright (c) 2016, Oracle and/or its affiliates. All rights reserved.
       
     3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
       
     4  *
       
     5  * This code is free software; you can redistribute it and/or modify it
       
     6  * under the terms of the GNU General Public License version 2 only, as
       
     7  * published by the Free Software Foundation.
       
     8  *
       
     9  * This code is distributed in the hope that it will be useful, but WITHOUT
       
    10  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
       
    11  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
       
    12  * version 2 for more details (a copy is included in the LICENSE file that
       
    13  * accompanied this code).
       
    14  *
       
    15  * You should have received a copy of the GNU General Public License version
       
    16  * 2 along with this work; if not, write to the Free Software Foundation,
       
    17  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
       
    18  *
       
    19  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
       
    20  * or visit www.oracle.com if you need additional information or have any
       
    21  * questions.
       
    22  */
       
    23 
       
    24 #include "precompiled.hpp"
       
    25 #include "memory/allocation.hpp"
       
    26 #include "memory/allocation.inline.hpp"
       
    27 #include "memory/guardedMemory.hpp"
       
    28 #include "runtime/os.hpp"
       
    29 #include "unittest.hpp"
       
    30 
       
    31 static void guarded_memory_test_check(void* p, size_t sz, void* tag) {
       
    32   ASSERT_TRUE(p != NULL) << "NULL pointer given to check";
       
    33   u_char* c = (u_char*) p;
       
    34   GuardedMemory guarded(c);
       
    35   EXPECT_EQ(guarded.get_tag(), tag) << "Tag is not the same as supplied";
       
    36   EXPECT_EQ(guarded.get_user_ptr(), c) << "User pointer is not the same as supplied";
       
    37   EXPECT_EQ(guarded.get_user_size(), sz) << "User size is not the same as supplied";
       
    38   EXPECT_TRUE(guarded.verify_guards()) << "Guard broken";
       
    39 }
       
    40 
       
    41 class GuardedMemoryTest {
       
    42  public:
       
    43   static size_t get_guard_header_size() {
       
    44     return sizeof (GuardedMemory::GuardHeader);
       
    45   }
       
    46   static size_t get_guard_size() {
       
    47     return sizeof (GuardedMemory::Guard);
       
    48   }
       
    49 };
       
    50 
       
    51 // Test GuardedMemory size
       
    52 TEST(GuardedMemory, size) {
       
    53   size_t total_sz = GuardedMemory::get_total_size(1);
       
    54   ASSERT_GT(total_sz, (size_t) 1) << "Unexpected size";
       
    55   ASSERT_GE(total_sz, GuardedMemoryTest::get_guard_header_size() + 1
       
    56           + GuardedMemoryTest::get_guard_size()) << "Unexpected size";
       
    57 }
       
    58 
       
    59 // Test the basic characteristics
       
    60 TEST(GuardedMemory, basic) {
       
    61   u_char* basep =
       
    62           (u_char*) os::malloc(GuardedMemory::get_total_size(1), mtInternal);
       
    63   GuardedMemory guarded(basep, 1, (void*) 0xf000f000);
       
    64 
       
    65   EXPECT_EQ(badResourceValue, *basep)
       
    66           << "Expected guard in the form of badResourceValue";
       
    67 
       
    68   u_char* userp = guarded.get_user_ptr();
       
    69   EXPECT_EQ(uninitBlockPad, *userp)
       
    70           << "Expected uninitialized data in the form of uninitBlockPad";
       
    71   guarded_memory_test_check(userp, 1, (void*) 0xf000f000);
       
    72 
       
    73   void* freep = guarded.release_for_freeing();
       
    74   EXPECT_EQ((u_char*) freep, basep) << "Expected the same pointer guard was ";
       
    75   EXPECT_EQ(freeBlockPad, *userp) << "Expected user data to be free block padded";
       
    76   EXPECT_FALSE(guarded.verify_guards());
       
    77   os::free(freep);
       
    78 }
       
    79 
       
    80 // Test a number of odd sizes
       
    81 TEST(GuardedMemory, odd_sizes) {
       
    82   u_char* basep =
       
    83           (u_char*) os::malloc(GuardedMemory::get_total_size(1), mtInternal);
       
    84   GuardedMemory guarded(basep, 1, (void*) 0xf000f000);
       
    85 
       
    86   size_t sz = 0;
       
    87   do {
       
    88     void* p = os::malloc(GuardedMemory::get_total_size(sz), mtInternal);
       
    89     void* up = guarded.wrap_with_guards(p, sz, (void*) 1);
       
    90     memset(up, 0, sz);
       
    91     guarded_memory_test_check(up, sz, (void*) 1);
       
    92     if (HasFatalFailure()) {
       
    93       return;
       
    94     }
       
    95 
       
    96     os::free(guarded.release_for_freeing());
       
    97     sz = (sz << 4) + 1;
       
    98   } while (sz < (256 * 1024));
       
    99 }
       
   100 
       
   101 // Test buffer overrun into head...
       
   102 TEST(GuardedMemory, buffer_overrun_head) {
       
   103   u_char* basep =
       
   104           (u_char*) os::malloc(GuardedMemory::get_total_size(1), mtInternal);
       
   105   GuardedMemory guarded(basep, 1, (void*) 0xf000f000);
       
   106 
       
   107   guarded.wrap_with_guards(basep, 1);
       
   108   *basep = 0;
       
   109   EXPECT_FALSE(guarded.verify_guards());
       
   110   os::free(basep);
       
   111 }
       
   112 
       
   113 // Test buffer overrun into tail with a number of odd sizes
       
   114 TEST(GuardedMemory, buffer_overrun_tail) {
       
   115   u_char* basep =
       
   116           (u_char*) os::malloc(GuardedMemory::get_total_size(1), mtInternal);
       
   117   GuardedMemory guarded(basep, 1, (void*) 0xf000f000);
       
   118 
       
   119   size_t sz = 1;
       
   120   do {
       
   121     void* p = os::malloc(GuardedMemory::get_total_size(sz), mtInternal);
       
   122     void* up = guarded.wrap_with_guards(p, sz, (void*) 1);
       
   123     memset(up, 0, sz + 1); // Buffer-overwrite (within guard)
       
   124     EXPECT_FALSE(guarded.verify_guards()) << "Guard was not broken as expected";
       
   125     os::free(guarded.release_for_freeing());
       
   126     sz = (sz << 4) + 1;
       
   127   } while (sz < (256 * 1024));
       
   128 }
       
   129 
       
   130 // Test wrap_copy/wrap_free
       
   131 TEST(GuardedMemory, wrap) {
       
   132   EXPECT_TRUE(GuardedMemory::free_copy(NULL)) << "Expected free NULL to be OK";
       
   133 
       
   134   const char* str = "Check my bounds out";
       
   135   size_t str_sz = strlen(str) + 1;
       
   136   char* str_copy = (char*) GuardedMemory::wrap_copy(str, str_sz);
       
   137   guarded_memory_test_check(str_copy, str_sz, NULL);
       
   138   if (HasFatalFailure()) {
       
   139     return;
       
   140   }
       
   141   EXPECT_EQ(0, strcmp(str, str_copy)) << "Not identical copy";
       
   142   EXPECT_TRUE(GuardedMemory::free_copy(str_copy)) << "Free copy failed to verify";
       
   143 
       
   144   void* no_data = NULL;
       
   145   void* no_data_copy = GuardedMemory::wrap_copy(no_data, 0);
       
   146   EXPECT_TRUE(GuardedMemory::free_copy(no_data_copy))
       
   147           << "Expected valid guards even for no data copy";
       
   148 }