#ifdef UNSAFE_BUFFERS_BUILD
#pragma allow_unsafe_buffers
#endif
#include <stddef.h>
#include "base/atomicops.h"
#include "base/cfi_buildflags.h"
#include "base/debug/asan_invalid_access.h"
#include "base/debug/profiler.h"
#include "base/logging.h"
#include "base/memory/raw_ptr.h"
#include "base/sanitizer_buildflags.h"
#include "base/threading/thread.h"
#include "build/build_config.h"
#include "testing/gtest/include/gtest/gtest.h"
#include "third_party/abseil-cpp/absl/base/dynamic_annotations.h"
#if BUILDFLAG(IS_WIN)
#include <windows.h>
#else
#include <dlfcn.h>
#endif
namespace base {
namespace {
const base::subtle::Atomic32 kMagicValue = …;
#if defined(ADDRESS_SANITIZER)
#define HARMFUL_ACCESS …
#elif BUILDFLAG(IS_HWASAN)
#define HARMFUL_ACCESS …
#else
#define HARMFUL_ACCESS …
#define HARMFUL_ACCESS_IS_NOOP
#endif
void DoReadUninitializedValue(volatile char *ptr) { … }
void ReadUninitializedValue(volatile char *ptr) { … }
#ifndef HARMFUL_ACCESS_IS_NOOP
void ReadValueOutOfArrayBoundsLeft(char *ptr) {
char c = ptr[-2];
VLOG(1) << "Reading a byte out of bounds: " << c;
}
void ReadValueOutOfArrayBoundsRight(char *ptr, size_t size) {
char c = ptr[size + 1];
VLOG(1) << "Reading a byte out of bounds: " << c;
}
void WriteValueOutOfArrayBoundsLeft(char *ptr) {
ptr[-1] = kMagicValue;
}
void WriteValueOutOfArrayBoundsRight(char *ptr, size_t size) {
ptr[size] = kMagicValue;
}
#endif
void MakeSomeErrors(char *ptr, size_t size) { … }
}
#if defined(ADDRESS_SANITIZER) || defined(LEAK_SANITIZER) || \
defined(MEMORY_SANITIZER) || defined(THREAD_SANITIZER) || \
defined(UNDEFINED_SANITIZER)
#if BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_WIN)
#define MAYBE_LinksSanitizerOptions …
#else
#define MAYBE_LinksSanitizerOptions …
#endif
TEST(ToolsSanityTest, MAYBE_LinksSanitizerOptions) {
constexpr char kSym[] = "_sanitizer_options_link_helper";
#if BUILDFLAG(IS_WIN)
auto sym = GetProcAddress(GetModuleHandle(nullptr), kSym);
#else
void* sym = dlsym(RTLD_DEFAULT, kSym);
#endif
EXPECT_TRUE(sym != nullptr);
}
#endif
TEST(ToolsSanityTest, MemoryLeak) { … }
TEST(ToolsSanityTest, AccessesToNewMemory) { … }
TEST(ToolsSanityTest, AccessesToMallocMemory) { … }
TEST(ToolsSanityTest, AccessesToStack) { … }
#if defined(ADDRESS_SANITIZER)
#if BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN) || \
BUILDFLAG(IS_FUCHSIA)
#define MAYBE_SingleElementDeletedWithBraces …
#define MAYBE_ArrayDeletedWithoutBraces …
#else
#define MAYBE_ArrayDeletedWithoutBraces …
#define MAYBE_SingleElementDeletedWithBraces …
#endif
static int* allocateArray() {
return new int[10];
}
TEST(ToolsSanityTest, MAYBE_ArrayDeletedWithoutBraces) {
int* volatile foo = allocateArray();
HARMFUL_ACCESS(delete foo, "alloc-dealloc-mismatch");
delete [] foo;
}
static int* allocateScalar() {
return new int;
}
TEST(ToolsSanityTest, MAYBE_SingleElementDeletedWithBraces) {
int* volatile foo = allocateScalar();
(void) foo;
HARMFUL_ACCESS(delete [] foo, "alloc-dealloc-mismatch");
delete foo;
}
#endif
TEST(ToolsSanityTest, DISABLED_AddressSanitizerNullDerefCrashTest) { … }
TEST(ToolsSanityTest, DISABLED_AddressSanitizerLocalOOBCrashTest) { … }
namespace {
int g_asan_test_global_array[10];
}
TEST(ToolsSanityTest, DISABLED_AddressSanitizerGlobalOOBCrashTest) { … }
#ifndef HARMFUL_ACCESS_IS_NOOP
TEST(ToolsSanityTest, AsanHeapOverflow) {
HARMFUL_ACCESS(debug::AsanHeapOverflow(), "after");
}
TEST(ToolsSanityTest, AsanHeapUnderflow) {
HARMFUL_ACCESS(debug::AsanHeapUnderflow(), "before");
}
TEST(ToolsSanityTest, AsanHeapUseAfterFree) {
HARMFUL_ACCESS(debug::AsanHeapUseAfterFree(), "heap-use-after-free");
}
#if BUILDFLAG(IS_WIN)
TEST(ToolsSanityTest, DISABLED_AsanCorruptHeapBlock) {
HARMFUL_ACCESS(debug::AsanCorruptHeapBlock(), "");
}
TEST(ToolsSanityTest, DISABLED_AsanCorruptHeap) {
EXPECT_DEATH(debug::AsanCorruptHeap(), "");
}
#endif
#endif
namespace {
class TOOLS_SANITY_TEST_CONCURRENT_THREAD : public PlatformThread::Delegate { … };
class ReleaseStoreThread : public PlatformThread::Delegate { … };
class AcquireLoadThread : public PlatformThread::Delegate { … };
void RunInParallel(PlatformThread::Delegate *d1, PlatformThread::Delegate *d2) { … }
#if defined(THREAD_SANITIZER)
void DataRace() {
bool *shared = new bool(false);
TOOLS_SANITY_TEST_CONCURRENT_THREAD thread1(shared), thread2(shared);
RunInParallel(&thread1, &thread2);
EXPECT_TRUE(*shared);
delete shared;
CHECK(0);
}
#endif
}
#if defined(THREAD_SANITIZER)
TEST(ToolsSanityTest, DataRace) {
EXPECT_DEATH(DataRace(), "1 race:base/tools_sanity_unittest.cc");
}
#endif
TEST(ToolsSanityTest, AnnotateBenignRace) { … }
TEST(ToolsSanityTest, AtomicsAreIgnored) { … }
#if BUILDFLAG(CFI_ENFORCEMENT_TRAP)
#if BUILDFLAG(IS_WIN)
#define CFI_ERROR_MSG …
#elif BUILDFLAG(IS_ANDROID)
#define CFI_ERROR_MSG …
#else
#define CFI_ERROR_MSG …
#endif
#elif BUILDFLAG(CFI_ENFORCEMENT_DIAGNOSTIC)
#define CFI_ERROR_MSG …
#endif
#if defined(CFI_ERROR_MSG)
class A {
public:
A(): n_(0) {}
virtual void f() { n_++; }
protected:
int n_;
};
class B: public A {
public:
void f() override { n_--; }
};
class C: public B {
public:
void f() override { n_ += 2; }
};
NOINLINE void KillVptrAndCall(A *obj) {
*reinterpret_cast<void **>(obj) = 0;
obj->f();
}
TEST(ToolsSanityTest, BadVirtualCallNull) {
A a;
B b;
EXPECT_DEATH({ KillVptrAndCall(&a); KillVptrAndCall(&b); }, CFI_ERROR_MSG);
}
NOINLINE void OverwriteVptrAndCall(B *obj, A *vptr) {
*reinterpret_cast<void **>(obj) = *reinterpret_cast<void **>(vptr);
obj->f();
}
TEST(ToolsSanityTest, BadVirtualCallWrongType) {
A a;
B b;
C c;
EXPECT_DEATH({ OverwriteVptrAndCall(&b, &a); OverwriteVptrAndCall(&b, &c); },
CFI_ERROR_MSG);
}
#if BUILDFLAG(CFI_CAST_CHECK)
TEST(ToolsSanityTest, BadDerivedCast) {
A a;
EXPECT_DEATH((void)(B*)&a, CFI_ERROR_MSG);
}
TEST(ToolsSanityTest, BadUnrelatedCast) {
class A {
virtual void f() {}
};
class B {
virtual void f() {}
};
A a;
EXPECT_DEATH((void)(B*)&a, CFI_ERROR_MSG);
}
#endif
#endif
#undef CFI_ERROR_MSG
#undef HARMFUL_ACCESS
#undef HARMFUL_ACCESS_IS_NOOP
}