• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2017 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include "common_runtime_test.h"
18 
19 #include "base/memory_tool.h"
20 #include "class_linker-inl.h"
21 #include "class_root-inl.h"
22 #include "handle_scope-inl.h"
23 #include "mirror/object-inl.h"
24 #include "mirror/object_array-alloc-inl.h"
25 #include "mirror/object_array-inl.h"
26 #include "mirror/string.h"
27 #include "runtime.h"
28 #include "scoped_thread_state_change-inl.h"
29 #include "verification-inl.h"
30 
31 namespace art HIDDEN {
32 namespace gc {
33 
34 class VerificationTest : public CommonRuntimeTest {
35  protected:
VerificationTest()36   VerificationTest() {
37     use_boot_image_ = true;  // Make the Runtime creation cheaper.
38   }
39 
40   template <class T>
AllocObjectArray(Thread * self,size_t length)41   ObjPtr<mirror::ObjectArray<T>> AllocObjectArray(Thread* self, size_t length)
42       REQUIRES_SHARED(Locks::mutator_lock_) {
43     return mirror::ObjectArray<T>::Alloc(
44         self,
45         GetClassRoot<mirror::ObjectArray<mirror::Object>>(),
46         length);
47   }
48 };
49 
TEST_F(VerificationTest,IsValidHeapObjectAddress)50 TEST_F(VerificationTest, IsValidHeapObjectAddress) {
51   ScopedObjectAccess soa(Thread::Current());
52   const Verification* const v = Runtime::Current()->GetHeap()->GetVerification();
53   EXPECT_FALSE(v->IsValidHeapObjectAddress(reinterpret_cast<const void*>(1)));
54   EXPECT_FALSE(v->IsValidHeapObjectAddress(reinterpret_cast<const void*>(4)));
55   EXPECT_FALSE(v->IsValidHeapObjectAddress(nullptr));
56   VariableSizedHandleScope hs(soa.Self());
57   Handle<mirror::String> string(
58       hs.NewHandle(mirror::String::AllocFromModifiedUtf8(soa.Self(), "test")));
59   EXPECT_TRUE(v->IsValidHeapObjectAddress(string.Get()));
60   // Address in the heap that isn't aligned.
61   const void* unaligned_address =
62       reinterpret_cast<const void*>(reinterpret_cast<uintptr_t>(string.Get()) + 1);
63   EXPECT_TRUE(v->IsAddressInHeapSpace(unaligned_address));
64   EXPECT_FALSE(v->IsValidHeapObjectAddress(unaligned_address));
65   EXPECT_TRUE(v->IsValidHeapObjectAddress(string->GetClass()));
66   const uintptr_t uint_klass = reinterpret_cast<uintptr_t>(string->GetClass());
67   // Not actually a valid object but the verification can't know that. Guaranteed to be inside a
68   // heap space.
69   EXPECT_TRUE(v->IsValidHeapObjectAddress(
70       reinterpret_cast<const void*>(uint_klass + kObjectAlignment)));
71   EXPECT_FALSE(v->IsValidHeapObjectAddress(
72       reinterpret_cast<const void*>(&uint_klass)));
73 }
74 
TEST_F(VerificationTest,IsValidClassOrNotInHeap)75 TEST_F(VerificationTest, IsValidClassOrNotInHeap) {
76   ScopedObjectAccess soa(Thread::Current());
77   VariableSizedHandleScope hs(soa.Self());
78   Handle<mirror::String> string(
79       hs.NewHandle(mirror::String::AllocFromModifiedUtf8(soa.Self(), "test")));
80   const Verification* const v = Runtime::Current()->GetHeap()->GetVerification();
81   EXPECT_FALSE(v->IsValidClass(reinterpret_cast<mirror::Class*>(1)));
82   EXPECT_FALSE(v->IsValidClass(reinterpret_cast<mirror::Class*>(4)));
83   EXPECT_FALSE(v->IsValidClass(nullptr));
84   EXPECT_TRUE(v->IsValidClass(string->GetClass()));
85   EXPECT_FALSE(v->IsValidClass(reinterpret_cast<mirror::Class*>(string.Get())));
86 }
87 
TEST_F(VerificationTest,IsValidClassInHeap)88 TEST_F(VerificationTest, IsValidClassInHeap) {
89   // Now that the String class is allocated in the non-moving space when the
90   // runtime is running without a boot image (which is the case in this gtest),
91   // and we run with AddressSanizer, it is possible that the (presumably
92   // invalid) memory location `uint_klass - kObjectAlignment` tested below is
93   // poisoned when running with AddressSanizer. Disable this test in that case.
94   TEST_DISABLED_FOR_MEMORY_TOOL();
95   ScopedObjectAccess soa(Thread::Current());
96   VariableSizedHandleScope hs(soa.Self());
97   Handle<mirror::String> string(
98       hs.NewHandle(mirror::String::AllocFromModifiedUtf8(soa.Self(), "test")));
99   const Verification* const v = Runtime::Current()->GetHeap()->GetVerification();
100   uintptr_t uint_klass = reinterpret_cast<uintptr_t>(string->GetClass());
101   EXPECT_FALSE(v->IsValidClass(reinterpret_cast<mirror::Class*>(uint_klass - kObjectAlignment)));
102   EXPECT_FALSE(v->IsValidClass(reinterpret_cast<mirror::Class*>(&uint_klass)));
103 }
104 
TEST_F(VerificationTest,DumpInvalidObjectInfo)105 TEST_F(VerificationTest, DumpInvalidObjectInfo) {
106   ScopedLogSeverity sls(LogSeverity::INFO);
107   ScopedObjectAccess soa(Thread::Current());
108   Runtime* const runtime = Runtime::Current();
109   VariableSizedHandleScope hs(soa.Self());
110   const Verification* const v = runtime->GetHeap()->GetVerification();
111   LOG(INFO) << v->DumpObjectInfo(reinterpret_cast<const void*>(1), "obj");
112   LOG(INFO) << v->DumpObjectInfo(reinterpret_cast<const void*>(4), "obj");
113   LOG(INFO) << v->DumpObjectInfo(nullptr, "obj");
114 }
115 
TEST_F(VerificationTest,DumpValidObjectInfo)116 TEST_F(VerificationTest, DumpValidObjectInfo) {
117   // Now that the String class is allocated in the non-moving space when the
118   // runtime is running without a boot image (which is the case in this gtest),
119   // and we run with AddressSanizer, it is possible that the calls to
120   // Verification::DumpObjectInfo below involving the String class object
121   // (`string->GetClass()`, `uint_klass`, etc.) access poisoned memory when they
122   // call Verification::DumpRAMAroundAddress. Disable this test in that case.
123   TEST_DISABLED_FOR_MEMORY_TOOL();
124   ScopedLogSeverity sls(LogSeverity::INFO);
125   ScopedObjectAccess soa(Thread::Current());
126   Runtime* const runtime = Runtime::Current();
127   VariableSizedHandleScope hs(soa.Self());
128   Handle<mirror::String> string(
129       hs.NewHandle(mirror::String::AllocFromModifiedUtf8(soa.Self(), "obj")));
130   Handle<mirror::ObjectArray<mirror::Object>> arr(
131       hs.NewHandle(AllocObjectArray<mirror::Object>(soa.Self(), 256)));
132   const Verification* const v = runtime->GetHeap()->GetVerification();
133   LOG(INFO) << v->DumpObjectInfo(string.Get(), "test");
134   LOG(INFO) << v->DumpObjectInfo(string->GetClass(), "obj");
135   const uintptr_t uint_klass = reinterpret_cast<uintptr_t>(string->GetClass());
136   LOG(INFO) << v->DumpObjectInfo(reinterpret_cast<const void*>(uint_klass - kObjectAlignment),
137                                  "obj");
138   LOG(INFO) << v->DumpObjectInfo(reinterpret_cast<const void*>(&uint_klass), "obj");
139   LOG(INFO) << v->DumpObjectInfo(arr.Get(), "arr");
140 }
141 
TEST_F(VerificationTest,LogHeapCorruption)142 TEST_F(VerificationTest, LogHeapCorruption) {
143   // Now that the String class is allocated in the non-moving space when the
144   // runtime is running without a boot image (which is the case in this gtest),
145   // and we run with AddressSanizer, it is possible that the call to
146   // Verification::LogHeapCorruption below involving the String class object
147   // (`string->GetClass()`) accesses poisoned memory when it calls
148   // Verification::DumpRAMAroundAddress. Disable this test in that case.
149   TEST_DISABLED_FOR_MEMORY_TOOL();
150   ScopedLogSeverity sls(LogSeverity::INFO);
151   ScopedObjectAccess soa(Thread::Current());
152   Runtime* const runtime = Runtime::Current();
153   VariableSizedHandleScope hs(soa.Self());
154   Handle<mirror::String> string(
155       hs.NewHandle(mirror::String::AllocFromModifiedUtf8(soa.Self(), "obj")));
156   using ObjArray = mirror::ObjectArray<mirror::Object>;
157   Handle<ObjArray> arr(
158       hs.NewHandle(AllocObjectArray<mirror::Object>(soa.Self(), 256)));
159   const Verification* const v = runtime->GetHeap()->GetVerification();
160   arr->Set(0, string.Get());
161   // Test normal cases.
162   v->LogHeapCorruption(arr.Get(), ObjArray::DataOffset(kHeapReferenceSize), string.Get(), false);
163   v->LogHeapCorruption(string.Get(), mirror::Object::ClassOffset(), string->GetClass(), false);
164   // Test null holder cases.
165   v->LogHeapCorruption(nullptr, MemberOffset(0), string.Get(), false);
166   v->LogHeapCorruption(nullptr, MemberOffset(0), arr.Get(), false);
167 }
168 
TEST_F(VerificationTest,FindPathFromRootSet)169 TEST_F(VerificationTest, FindPathFromRootSet) {
170   ScopedLogSeverity sls(LogSeverity::INFO);
171   ScopedObjectAccess soa(Thread::Current());
172   Runtime* const runtime = Runtime::Current();
173   VariableSizedHandleScope hs(soa.Self());
174   Handle<mirror::ObjectArray<mirror::Object>> arr(
175       hs.NewHandle(AllocObjectArray<mirror::Object>(soa.Self(), 256)));
176   ObjPtr<mirror::String> str = mirror::String::AllocFromModifiedUtf8(soa.Self(), "obj");
177   arr->Set(0, str);
178   const Verification* const v = runtime->GetHeap()->GetVerification();
179   std::string path = v->FirstPathFromRootSet(str);
180   EXPECT_GT(path.length(), 0u);
181   std::ostringstream oss;
182   oss << arr.Get();
183   EXPECT_NE(path.find(oss.str()), std::string::npos);
184   LOG(INFO) << path;
185 }
186 
187 }  // namespace gc
188 }  // namespace art
189