blob: d48978773d0057d6885356151172315e9b9e415a [file] [log] [blame]
// Copyright 2021 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <cstdint>
#include <string>
#include <vector>
#include "build/build_config.h"
#include "partition_alloc/partition_alloc_config.h"
#include "partition_alloc/partition_freelist_entry.h"
#include "partition_alloc/partition_page.h"
#include "partition_alloc/partition_root.h"
#include "testing/gtest/include/gtest/gtest.h"
// With *SAN, PartitionAlloc is rerouted to malloc().
#if !defined(MEMORY_TOOL_REPLACES_ALLOCATOR)
namespace partition_alloc::internal {
namespace {
// Death tests misbehave on Android, crbug.com/1240184
#if !BUILDFLAG(IS_ANDROID) && defined(GTEST_HAS_DEATH_TEST) && \
PA_CONFIG(HAS_FREELIST_SHADOW_ENTRY)
TEST(HardeningTest, PartialCorruption) {
std::string important_data("very important");
char* to_corrupt = const_cast<char*>(important_data.c_str());
PartitionOptions opts;
opts.aligned_alloc = PartitionOptions::kAllowed;
PartitionRoot root(opts);
root.UncapEmptySlotSpanMemoryForTesting();
const size_t kAllocSize = 100;
void* data = root.Alloc(kAllocSize);
void* data2 = root.Alloc(kAllocSize);
root.Free(data2);
root.Free(data);
// root->bucket->active_slot_span_head->freelist_head points to data, next_
// points to data2. We can corrupt *data to get overwrite the next_ pointer.
// Even if it looks reasonable (valid encoded pointer), freelist corruption
// detection will make the code crash, because shadow_ doesn't match
// encoded_next_.
EncodedNextFreelistEntry::EmplaceAndInitForTest(root.ObjectToSlotStart(data),
to_corrupt, false);
EXPECT_DEATH(root.Alloc(kAllocSize), "");
}
TEST(HardeningTest, OffHeapPointerCrashing) {
std::string important_data("very important");
char* to_corrupt = const_cast<char*>(important_data.c_str());
PartitionOptions opts;
opts.aligned_alloc = PartitionOptions::kAllowed;
PartitionRoot root(opts);
root.UncapEmptySlotSpanMemoryForTesting();
const size_t kAllocSize = 100;
void* data = root.Alloc(kAllocSize);
void* data2 = root.Alloc(kAllocSize);
root.Free(data2);
root.Free(data);
// See "PartialCorruption" above for details. This time, make shadow_
// consistent.
EncodedNextFreelistEntry::EmplaceAndInitForTest(root.ObjectToSlotStart(data),
to_corrupt, true);
// Crashes, because |to_corrupt| is not on the same superpage as data.
EXPECT_DEATH(root.Alloc(kAllocSize), "");
}
TEST(HardeningTest, MetadataPointerCrashing) {
PartitionOptions opts;
opts.aligned_alloc = PartitionOptions::kAllowed;
PartitionRoot root(opts);
root.UncapEmptySlotSpanMemoryForTesting();
const size_t kAllocSize = 100;
void* data = root.Alloc(kAllocSize);
void* data2 = root.Alloc(kAllocSize);
root.Free(data2);
root.Free(data);
uintptr_t slot_start = root.ObjectToSlotStart(data);
auto* metadata = SlotSpanMetadata::FromSlotStart(slot_start);
EncodedNextFreelistEntry::EmplaceAndInitForTest(slot_start, metadata, true);
// Crashes, because |metadata| points inside the metadata area.
EXPECT_DEATH(root.Alloc(kAllocSize), "");
}
#endif // !BUILDFLAG(IS_ANDROID) && defined(GTEST_HAS_DEATH_TEST) &&
// PA_CONFIG(HAS_FREELIST_SHADOW_ENTRY)
// Below test also misbehaves on Android; as above, death tests don't
// quite work (crbug.com/1240184), and having free slot bitmaps enabled
// force the expectations below to crash.
#if !BUILDFLAG(IS_ANDROID)
TEST(HardeningTest, SuccessfulCorruption) {
PartitionOptions opts;
opts.aligned_alloc = PartitionOptions::kAllowed;
PartitionRoot root(opts);
root.UncapEmptySlotSpanMemoryForTesting();
uintptr_t* zero_vector = reinterpret_cast<uintptr_t*>(
root.Alloc<AllocFlags::kZeroFill>(100 * sizeof(uintptr_t), ""));
ASSERT_TRUE(zero_vector);
// Pointer to the middle of an existing allocation.
uintptr_t* to_corrupt = zero_vector + 20;
const size_t kAllocSize = 100;
void* data = root.Alloc(kAllocSize);
void* data2 = root.Alloc(kAllocSize);
root.Free(data2);
root.Free(data);
EncodedNextFreelistEntry::EmplaceAndInitForTest(root.ObjectToSlotStart(data),
to_corrupt, true);
#if BUILDFLAG(USE_FREESLOT_BITMAP)
// This part crashes with freeslot bitmap because it detects freelist
// corruptions, which is rather desirable behavior.
EXPECT_DEATH_IF_SUPPORTED(root.Alloc(kAllocSize), "");
#else
// Next allocation is what was in
// root->bucket->active_slot_span_head->freelist_head, so not the corrupted
// pointer.
void* new_data = root.Alloc(kAllocSize);
ASSERT_EQ(new_data, data);
// Not crashing, because a zeroed area is a "valid" freelist entry.
void* new_data2 = root.Alloc(kAllocSize);
// Now we have a pointer to the middle of an existing allocation.
EXPECT_EQ(new_data2, to_corrupt);
#endif // BUILDFLAG(USE_FREESLOT_BITMAP)
}
#endif // !BUILDFLAG(IS_ANDROID)
} // namespace
} // namespace partition_alloc::internal
#endif // !defined(MEMORY_TOOL_REPLACES_ALLOCATOR)