1*6777b538SAndroid Build Coastguard Worker // Copyright 2012 The Chromium Authors
2*6777b538SAndroid Build Coastguard Worker // Use of this source code is governed by a BSD-style license that can be
3*6777b538SAndroid Build Coastguard Worker // found in the LICENSE file.
4*6777b538SAndroid Build Coastguard Worker //
5*6777b538SAndroid Build Coastguard Worker // This file contains intentional memory errors, some of which may lead to
6*6777b538SAndroid Build Coastguard Worker // crashes if the test is ran without special memory testing tools. We use these
7*6777b538SAndroid Build Coastguard Worker // errors to verify the sanity of the tools.
8*6777b538SAndroid Build Coastguard Worker
9*6777b538SAndroid Build Coastguard Worker #include <stddef.h>
10*6777b538SAndroid Build Coastguard Worker
11*6777b538SAndroid Build Coastguard Worker #include "base/atomicops.h"
12*6777b538SAndroid Build Coastguard Worker #include "base/cfi_buildflags.h"
13*6777b538SAndroid Build Coastguard Worker #include "base/debug/asan_invalid_access.h"
14*6777b538SAndroid Build Coastguard Worker #include "base/debug/profiler.h"
15*6777b538SAndroid Build Coastguard Worker #include "base/logging.h"
16*6777b538SAndroid Build Coastguard Worker #include "base/memory/raw_ptr.h"
17*6777b538SAndroid Build Coastguard Worker #include "base/sanitizer_buildflags.h"
18*6777b538SAndroid Build Coastguard Worker #include "base/threading/thread.h"
19*6777b538SAndroid Build Coastguard Worker #include "build/build_config.h"
20*6777b538SAndroid Build Coastguard Worker #include "testing/gtest/include/gtest/gtest.h"
21*6777b538SAndroid Build Coastguard Worker #include "third_party/abseil-cpp/absl/base/dynamic_annotations.h"
22*6777b538SAndroid Build Coastguard Worker
23*6777b538SAndroid Build Coastguard Worker #if BUILDFLAG(IS_WIN)
24*6777b538SAndroid Build Coastguard Worker #include <windows.h>
25*6777b538SAndroid Build Coastguard Worker #else
26*6777b538SAndroid Build Coastguard Worker #include <dlfcn.h>
27*6777b538SAndroid Build Coastguard Worker #endif
28*6777b538SAndroid Build Coastguard Worker
29*6777b538SAndroid Build Coastguard Worker namespace base {
30*6777b538SAndroid Build Coastguard Worker
31*6777b538SAndroid Build Coastguard Worker namespace {
32*6777b538SAndroid Build Coastguard Worker
33*6777b538SAndroid Build Coastguard Worker const base::subtle::Atomic32 kMagicValue = 42;
34*6777b538SAndroid Build Coastguard Worker
35*6777b538SAndroid Build Coastguard Worker // Helper for memory accesses that can potentially corrupt memory or cause a
36*6777b538SAndroid Build Coastguard Worker // crash during a native run.
37*6777b538SAndroid Build Coastguard Worker #if defined(ADDRESS_SANITIZER)
38*6777b538SAndroid Build Coastguard Worker #define HARMFUL_ACCESS(action, error_regexp) \
39*6777b538SAndroid Build Coastguard Worker EXPECT_DEATH_IF_SUPPORTED(action, error_regexp)
40*6777b538SAndroid Build Coastguard Worker #elif BUILDFLAG(IS_HWASAN)
41*6777b538SAndroid Build Coastguard Worker #define HARMFUL_ACCESS(action, error_regexp) \
42*6777b538SAndroid Build Coastguard Worker EXPECT_DEATH(action, "tag-mismatch")
43*6777b538SAndroid Build Coastguard Worker #else
44*6777b538SAndroid Build Coastguard Worker #define HARMFUL_ACCESS(action, error_regexp)
45*6777b538SAndroid Build Coastguard Worker #define HARMFUL_ACCESS_IS_NOOP
46*6777b538SAndroid Build Coastguard Worker #endif
47*6777b538SAndroid Build Coastguard Worker
DoReadUninitializedValue(volatile char * ptr)48*6777b538SAndroid Build Coastguard Worker void DoReadUninitializedValue(volatile char *ptr) {
49*6777b538SAndroid Build Coastguard Worker // Comparison with 64 is to prevent clang from optimizing away the
50*6777b538SAndroid Build Coastguard Worker // jump -- valgrind only catches jumps and conditional moves, but clang uses
51*6777b538SAndroid Build Coastguard Worker // the borrow flag if the condition is just `*ptr == '\0'`. We no longer
52*6777b538SAndroid Build Coastguard Worker // support valgrind, but this constant should be fine to keep as-is.
53*6777b538SAndroid Build Coastguard Worker if (*ptr == 64) {
54*6777b538SAndroid Build Coastguard Worker VLOG(1) << "Uninit condition is true";
55*6777b538SAndroid Build Coastguard Worker } else {
56*6777b538SAndroid Build Coastguard Worker VLOG(1) << "Uninit condition is false";
57*6777b538SAndroid Build Coastguard Worker }
58*6777b538SAndroid Build Coastguard Worker }
59*6777b538SAndroid Build Coastguard Worker
ReadUninitializedValue(volatile char * ptr)60*6777b538SAndroid Build Coastguard Worker void ReadUninitializedValue(volatile char *ptr) {
61*6777b538SAndroid Build Coastguard Worker #if defined(MEMORY_SANITIZER)
62*6777b538SAndroid Build Coastguard Worker EXPECT_DEATH(DoReadUninitializedValue(ptr),
63*6777b538SAndroid Build Coastguard Worker "use-of-uninitialized-value");
64*6777b538SAndroid Build Coastguard Worker #else
65*6777b538SAndroid Build Coastguard Worker DoReadUninitializedValue(ptr);
66*6777b538SAndroid Build Coastguard Worker #endif
67*6777b538SAndroid Build Coastguard Worker }
68*6777b538SAndroid Build Coastguard Worker
69*6777b538SAndroid Build Coastguard Worker #ifndef HARMFUL_ACCESS_IS_NOOP
ReadValueOutOfArrayBoundsLeft(char * ptr)70*6777b538SAndroid Build Coastguard Worker void ReadValueOutOfArrayBoundsLeft(char *ptr) {
71*6777b538SAndroid Build Coastguard Worker char c = ptr[-2];
72*6777b538SAndroid Build Coastguard Worker VLOG(1) << "Reading a byte out of bounds: " << c;
73*6777b538SAndroid Build Coastguard Worker }
74*6777b538SAndroid Build Coastguard Worker
ReadValueOutOfArrayBoundsRight(char * ptr,size_t size)75*6777b538SAndroid Build Coastguard Worker void ReadValueOutOfArrayBoundsRight(char *ptr, size_t size) {
76*6777b538SAndroid Build Coastguard Worker char c = ptr[size + 1];
77*6777b538SAndroid Build Coastguard Worker VLOG(1) << "Reading a byte out of bounds: " << c;
78*6777b538SAndroid Build Coastguard Worker }
79*6777b538SAndroid Build Coastguard Worker
WriteValueOutOfArrayBoundsLeft(char * ptr)80*6777b538SAndroid Build Coastguard Worker void WriteValueOutOfArrayBoundsLeft(char *ptr) {
81*6777b538SAndroid Build Coastguard Worker ptr[-1] = kMagicValue;
82*6777b538SAndroid Build Coastguard Worker }
83*6777b538SAndroid Build Coastguard Worker
WriteValueOutOfArrayBoundsRight(char * ptr,size_t size)84*6777b538SAndroid Build Coastguard Worker void WriteValueOutOfArrayBoundsRight(char *ptr, size_t size) {
85*6777b538SAndroid Build Coastguard Worker ptr[size] = kMagicValue;
86*6777b538SAndroid Build Coastguard Worker }
87*6777b538SAndroid Build Coastguard Worker #endif // HARMFUL_ACCESS_IS_NOOP
88*6777b538SAndroid Build Coastguard Worker
MakeSomeErrors(char * ptr,size_t size)89*6777b538SAndroid Build Coastguard Worker void MakeSomeErrors(char *ptr, size_t size) {
90*6777b538SAndroid Build Coastguard Worker ReadUninitializedValue(ptr);
91*6777b538SAndroid Build Coastguard Worker
92*6777b538SAndroid Build Coastguard Worker HARMFUL_ACCESS(ReadValueOutOfArrayBoundsLeft(ptr), "2 bytes before");
93*6777b538SAndroid Build Coastguard Worker HARMFUL_ACCESS(ReadValueOutOfArrayBoundsRight(ptr, size), "1 bytes after");
94*6777b538SAndroid Build Coastguard Worker HARMFUL_ACCESS(WriteValueOutOfArrayBoundsLeft(ptr), "1 bytes before");
95*6777b538SAndroid Build Coastguard Worker HARMFUL_ACCESS(WriteValueOutOfArrayBoundsRight(ptr, size), "0 bytes after");
96*6777b538SAndroid Build Coastguard Worker }
97*6777b538SAndroid Build Coastguard Worker
98*6777b538SAndroid Build Coastguard Worker } // namespace
99*6777b538SAndroid Build Coastguard Worker
100*6777b538SAndroid Build Coastguard Worker #if defined(ADDRESS_SANITIZER) || defined(LEAK_SANITIZER) || \
101*6777b538SAndroid Build Coastguard Worker defined(MEMORY_SANITIZER) || defined(THREAD_SANITIZER) || \
102*6777b538SAndroid Build Coastguard Worker defined(UNDEFINED_SANITIZER)
103*6777b538SAndroid Build Coastguard Worker // build/sanitizers/sanitizer_options.cc defines symbols like
104*6777b538SAndroid Build Coastguard Worker // __asan_default_options which the sanitizer runtime calls if they exist
105*6777b538SAndroid Build Coastguard Worker // in the executable. If they don't, the sanitizer runtime silently uses an
106*6777b538SAndroid Build Coastguard Worker // internal default value instead. The build puts the symbol
107*6777b538SAndroid Build Coastguard Worker // _sanitizer_options_link_helper (which the sanitizer runtime doesn't know
108*6777b538SAndroid Build Coastguard Worker // about, it's a chrome thing) in that file and then tells the linker that
109*6777b538SAndroid Build Coastguard Worker // that symbol must exist. This causes sanitizer_options.cc to be part of
110*6777b538SAndroid Build Coastguard Worker // our binaries, which in turn makes sure our __asan_default_options are used.
111*6777b538SAndroid Build Coastguard Worker // We had problems with __asan_default_options not being used, so this test
112*6777b538SAndroid Build Coastguard Worker // verifies that _sanitizer_options_link_helper actually makes it into our
113*6777b538SAndroid Build Coastguard Worker // binaries.
114*6777b538SAndroid Build Coastguard Worker #if BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_WIN)
115*6777b538SAndroid Build Coastguard Worker // TODO(https://crbug.com/1322143): Sanitizer options are currently broken
116*6777b538SAndroid Build Coastguard Worker // on Android.
117*6777b538SAndroid Build Coastguard Worker // TODO(https://crbug.com/1321584): __asan_default_options should be used
118*6777b538SAndroid Build Coastguard Worker // on Windows too, but currently isn't.
119*6777b538SAndroid Build Coastguard Worker #define MAYBE_LinksSanitizerOptions DISABLED_LinksSanitizerOptions
120*6777b538SAndroid Build Coastguard Worker #else
121*6777b538SAndroid Build Coastguard Worker #define MAYBE_LinksSanitizerOptions LinksSanitizerOptions
122*6777b538SAndroid Build Coastguard Worker #endif
TEST(ToolsSanityTest,MAYBE_LinksSanitizerOptions)123*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, MAYBE_LinksSanitizerOptions) {
124*6777b538SAndroid Build Coastguard Worker constexpr char kSym[] = "_sanitizer_options_link_helper";
125*6777b538SAndroid Build Coastguard Worker #if BUILDFLAG(IS_WIN)
126*6777b538SAndroid Build Coastguard Worker auto sym = GetProcAddress(GetModuleHandle(nullptr), kSym);
127*6777b538SAndroid Build Coastguard Worker #else
128*6777b538SAndroid Build Coastguard Worker void* sym = dlsym(RTLD_DEFAULT, kSym);
129*6777b538SAndroid Build Coastguard Worker #endif
130*6777b538SAndroid Build Coastguard Worker EXPECT_TRUE(sym != nullptr);
131*6777b538SAndroid Build Coastguard Worker }
132*6777b538SAndroid Build Coastguard Worker #endif // sanitizers
133*6777b538SAndroid Build Coastguard Worker
134*6777b538SAndroid Build Coastguard Worker // A memory leak detector should report an error in this test.
TEST(ToolsSanityTest,MemoryLeak)135*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, MemoryLeak) {
136*6777b538SAndroid Build Coastguard Worker // Without the |volatile|, clang optimizes away the next two lines.
137*6777b538SAndroid Build Coastguard Worker int* volatile leak = new int[256]; // Leak some memory intentionally.
138*6777b538SAndroid Build Coastguard Worker leak[4] = 1; // Make sure the allocated memory is used.
139*6777b538SAndroid Build Coastguard Worker }
140*6777b538SAndroid Build Coastguard Worker
TEST(ToolsSanityTest,AccessesToNewMemory)141*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, AccessesToNewMemory) {
142*6777b538SAndroid Build Coastguard Worker char* foo = new char[16];
143*6777b538SAndroid Build Coastguard Worker MakeSomeErrors(foo, 16);
144*6777b538SAndroid Build Coastguard Worker delete [] foo;
145*6777b538SAndroid Build Coastguard Worker // Use after delete.
146*6777b538SAndroid Build Coastguard Worker HARMFUL_ACCESS(foo[5] = 0, "heap-use-after-free");
147*6777b538SAndroid Build Coastguard Worker }
148*6777b538SAndroid Build Coastguard Worker
TEST(ToolsSanityTest,AccessesToMallocMemory)149*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, AccessesToMallocMemory) {
150*6777b538SAndroid Build Coastguard Worker char* foo = reinterpret_cast<char*>(malloc(16));
151*6777b538SAndroid Build Coastguard Worker MakeSomeErrors(foo, 16);
152*6777b538SAndroid Build Coastguard Worker free(foo);
153*6777b538SAndroid Build Coastguard Worker // Use after free.
154*6777b538SAndroid Build Coastguard Worker HARMFUL_ACCESS(foo[5] = 0, "heap-use-after-free");
155*6777b538SAndroid Build Coastguard Worker }
156*6777b538SAndroid Build Coastguard Worker
TEST(ToolsSanityTest,AccessesToStack)157*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, AccessesToStack) {
158*6777b538SAndroid Build Coastguard Worker char foo[16];
159*6777b538SAndroid Build Coastguard Worker
160*6777b538SAndroid Build Coastguard Worker ReadUninitializedValue(foo);
161*6777b538SAndroid Build Coastguard Worker HARMFUL_ACCESS(ReadValueOutOfArrayBoundsLeft(foo),
162*6777b538SAndroid Build Coastguard Worker "underflows this variable");
163*6777b538SAndroid Build Coastguard Worker HARMFUL_ACCESS(ReadValueOutOfArrayBoundsRight(foo, 16),
164*6777b538SAndroid Build Coastguard Worker "overflows this variable");
165*6777b538SAndroid Build Coastguard Worker HARMFUL_ACCESS(WriteValueOutOfArrayBoundsLeft(foo),
166*6777b538SAndroid Build Coastguard Worker "underflows this variable");
167*6777b538SAndroid Build Coastguard Worker HARMFUL_ACCESS(WriteValueOutOfArrayBoundsRight(foo, 16),
168*6777b538SAndroid Build Coastguard Worker "overflows this variable");
169*6777b538SAndroid Build Coastguard Worker }
170*6777b538SAndroid Build Coastguard Worker
171*6777b538SAndroid Build Coastguard Worker #if defined(ADDRESS_SANITIZER)
172*6777b538SAndroid Build Coastguard Worker
173*6777b538SAndroid Build Coastguard Worker // alloc_dealloc_mismatch defaults to
174*6777b538SAndroid Build Coastguard Worker // !SANITIZER_MAC && !SANITIZER_WINDOWS && !SANITIZER_ANDROID,
175*6777b538SAndroid Build Coastguard Worker // in the sanitizer runtime upstream.
176*6777b538SAndroid Build Coastguard Worker #if BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_MAC) || BUILDFLAG(IS_WIN) || \
177*6777b538SAndroid Build Coastguard Worker BUILDFLAG(IS_FUCHSIA)
178*6777b538SAndroid Build Coastguard Worker #define MAYBE_SingleElementDeletedWithBraces \
179*6777b538SAndroid Build Coastguard Worker DISABLED_SingleElementDeletedWithBraces
180*6777b538SAndroid Build Coastguard Worker #define MAYBE_ArrayDeletedWithoutBraces DISABLED_ArrayDeletedWithoutBraces
181*6777b538SAndroid Build Coastguard Worker #else
182*6777b538SAndroid Build Coastguard Worker #define MAYBE_ArrayDeletedWithoutBraces ArrayDeletedWithoutBraces
183*6777b538SAndroid Build Coastguard Worker #define MAYBE_SingleElementDeletedWithBraces SingleElementDeletedWithBraces
184*6777b538SAndroid Build Coastguard Worker #endif // defined(ADDRESS_SANITIZER)
185*6777b538SAndroid Build Coastguard Worker
allocateArray()186*6777b538SAndroid Build Coastguard Worker static int* allocateArray() {
187*6777b538SAndroid Build Coastguard Worker // Clang warns about the mismatched new[]/delete if they occur in the same
188*6777b538SAndroid Build Coastguard Worker // function.
189*6777b538SAndroid Build Coastguard Worker return new int[10];
190*6777b538SAndroid Build Coastguard Worker }
191*6777b538SAndroid Build Coastguard Worker
192*6777b538SAndroid Build Coastguard Worker // This test may corrupt memory if not compiled with AddressSanitizer.
TEST(ToolsSanityTest,MAYBE_ArrayDeletedWithoutBraces)193*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, MAYBE_ArrayDeletedWithoutBraces) {
194*6777b538SAndroid Build Coastguard Worker // Without the |volatile|, clang optimizes away the next two lines.
195*6777b538SAndroid Build Coastguard Worker int* volatile foo = allocateArray();
196*6777b538SAndroid Build Coastguard Worker HARMFUL_ACCESS(delete foo, "alloc-dealloc-mismatch");
197*6777b538SAndroid Build Coastguard Worker // Under ASan the crash happens in the process spawned by HARMFUL_ACCESS,
198*6777b538SAndroid Build Coastguard Worker // need to free the memory in the parent.
199*6777b538SAndroid Build Coastguard Worker delete [] foo;
200*6777b538SAndroid Build Coastguard Worker }
201*6777b538SAndroid Build Coastguard Worker
allocateScalar()202*6777b538SAndroid Build Coastguard Worker static int* allocateScalar() {
203*6777b538SAndroid Build Coastguard Worker // Clang warns about the mismatched new/delete[] if they occur in the same
204*6777b538SAndroid Build Coastguard Worker // function.
205*6777b538SAndroid Build Coastguard Worker return new int;
206*6777b538SAndroid Build Coastguard Worker }
207*6777b538SAndroid Build Coastguard Worker
208*6777b538SAndroid Build Coastguard Worker // This test may corrupt memory if not compiled with AddressSanitizer.
TEST(ToolsSanityTest,MAYBE_SingleElementDeletedWithBraces)209*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, MAYBE_SingleElementDeletedWithBraces) {
210*6777b538SAndroid Build Coastguard Worker // Without the |volatile|, clang optimizes away the next two lines.
211*6777b538SAndroid Build Coastguard Worker int* volatile foo = allocateScalar();
212*6777b538SAndroid Build Coastguard Worker (void) foo;
213*6777b538SAndroid Build Coastguard Worker HARMFUL_ACCESS(delete [] foo, "alloc-dealloc-mismatch");
214*6777b538SAndroid Build Coastguard Worker // Under ASan the crash happens in the process spawned by HARMFUL_ACCESS,
215*6777b538SAndroid Build Coastguard Worker // need to free the memory in the parent.
216*6777b538SAndroid Build Coastguard Worker delete foo;
217*6777b538SAndroid Build Coastguard Worker }
218*6777b538SAndroid Build Coastguard Worker #endif
219*6777b538SAndroid Build Coastguard Worker
TEST(ToolsSanityTest,DISABLED_AddressSanitizerNullDerefCrashTest)220*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, DISABLED_AddressSanitizerNullDerefCrashTest) {
221*6777b538SAndroid Build Coastguard Worker // Intentionally crash to make sure AddressSanitizer is running.
222*6777b538SAndroid Build Coastguard Worker // This test should not be ran on bots.
223*6777b538SAndroid Build Coastguard Worker int* volatile zero = NULL;
224*6777b538SAndroid Build Coastguard Worker *zero = 0;
225*6777b538SAndroid Build Coastguard Worker }
226*6777b538SAndroid Build Coastguard Worker
TEST(ToolsSanityTest,DISABLED_AddressSanitizerLocalOOBCrashTest)227*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, DISABLED_AddressSanitizerLocalOOBCrashTest) {
228*6777b538SAndroid Build Coastguard Worker // Intentionally crash to make sure AddressSanitizer is instrumenting
229*6777b538SAndroid Build Coastguard Worker // the local variables.
230*6777b538SAndroid Build Coastguard Worker // This test should not be ran on bots.
231*6777b538SAndroid Build Coastguard Worker int array[5];
232*6777b538SAndroid Build Coastguard Worker // Work around the OOB warning reported by Clang.
233*6777b538SAndroid Build Coastguard Worker int* volatile access = &array[5];
234*6777b538SAndroid Build Coastguard Worker *access = 43;
235*6777b538SAndroid Build Coastguard Worker }
236*6777b538SAndroid Build Coastguard Worker
237*6777b538SAndroid Build Coastguard Worker namespace {
238*6777b538SAndroid Build Coastguard Worker int g_asan_test_global_array[10];
239*6777b538SAndroid Build Coastguard Worker } // namespace
240*6777b538SAndroid Build Coastguard Worker
TEST(ToolsSanityTest,DISABLED_AddressSanitizerGlobalOOBCrashTest)241*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, DISABLED_AddressSanitizerGlobalOOBCrashTest) {
242*6777b538SAndroid Build Coastguard Worker // Intentionally crash to make sure AddressSanitizer is instrumenting
243*6777b538SAndroid Build Coastguard Worker // the global variables.
244*6777b538SAndroid Build Coastguard Worker // This test should not be ran on bots.
245*6777b538SAndroid Build Coastguard Worker
246*6777b538SAndroid Build Coastguard Worker // Work around the OOB warning reported by Clang.
247*6777b538SAndroid Build Coastguard Worker int* volatile access = g_asan_test_global_array - 1;
248*6777b538SAndroid Build Coastguard Worker *access = 43;
249*6777b538SAndroid Build Coastguard Worker }
250*6777b538SAndroid Build Coastguard Worker
251*6777b538SAndroid Build Coastguard Worker #ifndef HARMFUL_ACCESS_IS_NOOP
TEST(ToolsSanityTest,AsanHeapOverflow)252*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, AsanHeapOverflow) {
253*6777b538SAndroid Build Coastguard Worker HARMFUL_ACCESS(debug::AsanHeapOverflow(), "after");
254*6777b538SAndroid Build Coastguard Worker }
255*6777b538SAndroid Build Coastguard Worker
TEST(ToolsSanityTest,AsanHeapUnderflow)256*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, AsanHeapUnderflow) {
257*6777b538SAndroid Build Coastguard Worker HARMFUL_ACCESS(debug::AsanHeapUnderflow(), "before");
258*6777b538SAndroid Build Coastguard Worker }
259*6777b538SAndroid Build Coastguard Worker
TEST(ToolsSanityTest,AsanHeapUseAfterFree)260*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, AsanHeapUseAfterFree) {
261*6777b538SAndroid Build Coastguard Worker HARMFUL_ACCESS(debug::AsanHeapUseAfterFree(), "heap-use-after-free");
262*6777b538SAndroid Build Coastguard Worker }
263*6777b538SAndroid Build Coastguard Worker
264*6777b538SAndroid Build Coastguard Worker #if BUILDFLAG(IS_WIN)
265*6777b538SAndroid Build Coastguard Worker // The ASAN runtime doesn't detect heap corruption, this needs fixing before
266*6777b538SAndroid Build Coastguard Worker // ASAN builds can ship to the wild. See https://crbug.com/818747.
TEST(ToolsSanityTest,DISABLED_AsanCorruptHeapBlock)267*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, DISABLED_AsanCorruptHeapBlock) {
268*6777b538SAndroid Build Coastguard Worker HARMFUL_ACCESS(debug::AsanCorruptHeapBlock(), "");
269*6777b538SAndroid Build Coastguard Worker }
270*6777b538SAndroid Build Coastguard Worker
TEST(ToolsSanityTest,DISABLED_AsanCorruptHeap)271*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, DISABLED_AsanCorruptHeap) {
272*6777b538SAndroid Build Coastguard Worker // This test will kill the process by raising an exception, there's no
273*6777b538SAndroid Build Coastguard Worker // particular string to look for in the stack trace.
274*6777b538SAndroid Build Coastguard Worker EXPECT_DEATH(debug::AsanCorruptHeap(), "");
275*6777b538SAndroid Build Coastguard Worker }
276*6777b538SAndroid Build Coastguard Worker #endif // BUILDFLAG(IS_WIN)
277*6777b538SAndroid Build Coastguard Worker #endif // !HARMFUL_ACCESS_IS_NOOP
278*6777b538SAndroid Build Coastguard Worker
279*6777b538SAndroid Build Coastguard Worker namespace {
280*6777b538SAndroid Build Coastguard Worker
281*6777b538SAndroid Build Coastguard Worker // We use caps here just to ensure that the method name doesn't interfere with
282*6777b538SAndroid Build Coastguard Worker // the wildcarded suppressions.
283*6777b538SAndroid Build Coastguard Worker class TOOLS_SANITY_TEST_CONCURRENT_THREAD : public PlatformThread::Delegate {
284*6777b538SAndroid Build Coastguard Worker public:
TOOLS_SANITY_TEST_CONCURRENT_THREAD(bool * value)285*6777b538SAndroid Build Coastguard Worker explicit TOOLS_SANITY_TEST_CONCURRENT_THREAD(bool *value) : value_(value) {}
286*6777b538SAndroid Build Coastguard Worker ~TOOLS_SANITY_TEST_CONCURRENT_THREAD() override = default;
ThreadMain()287*6777b538SAndroid Build Coastguard Worker void ThreadMain() override {
288*6777b538SAndroid Build Coastguard Worker *value_ = true;
289*6777b538SAndroid Build Coastguard Worker
290*6777b538SAndroid Build Coastguard Worker // Sleep for a few milliseconds so the two threads are more likely to live
291*6777b538SAndroid Build Coastguard Worker // simultaneously. Otherwise we may miss the report due to mutex
292*6777b538SAndroid Build Coastguard Worker // lock/unlock's inside thread creation code in pure-happens-before mode...
293*6777b538SAndroid Build Coastguard Worker PlatformThread::Sleep(Milliseconds(100));
294*6777b538SAndroid Build Coastguard Worker }
295*6777b538SAndroid Build Coastguard Worker private:
296*6777b538SAndroid Build Coastguard Worker raw_ptr<bool> value_;
297*6777b538SAndroid Build Coastguard Worker };
298*6777b538SAndroid Build Coastguard Worker
299*6777b538SAndroid Build Coastguard Worker class ReleaseStoreThread : public PlatformThread::Delegate {
300*6777b538SAndroid Build Coastguard Worker public:
ReleaseStoreThread(base::subtle::Atomic32 * value)301*6777b538SAndroid Build Coastguard Worker explicit ReleaseStoreThread(base::subtle::Atomic32 *value) : value_(value) {}
302*6777b538SAndroid Build Coastguard Worker ~ReleaseStoreThread() override = default;
ThreadMain()303*6777b538SAndroid Build Coastguard Worker void ThreadMain() override {
304*6777b538SAndroid Build Coastguard Worker base::subtle::Release_Store(value_, kMagicValue);
305*6777b538SAndroid Build Coastguard Worker
306*6777b538SAndroid Build Coastguard Worker // Sleep for a few milliseconds so the two threads are more likely to live
307*6777b538SAndroid Build Coastguard Worker // simultaneously. Otherwise we may miss the report due to mutex
308*6777b538SAndroid Build Coastguard Worker // lock/unlock's inside thread creation code in pure-happens-before mode...
309*6777b538SAndroid Build Coastguard Worker PlatformThread::Sleep(Milliseconds(100));
310*6777b538SAndroid Build Coastguard Worker }
311*6777b538SAndroid Build Coastguard Worker private:
312*6777b538SAndroid Build Coastguard Worker raw_ptr<base::subtle::Atomic32> value_;
313*6777b538SAndroid Build Coastguard Worker };
314*6777b538SAndroid Build Coastguard Worker
315*6777b538SAndroid Build Coastguard Worker class AcquireLoadThread : public PlatformThread::Delegate {
316*6777b538SAndroid Build Coastguard Worker public:
AcquireLoadThread(base::subtle::Atomic32 * value)317*6777b538SAndroid Build Coastguard Worker explicit AcquireLoadThread(base::subtle::Atomic32 *value) : value_(value) {}
318*6777b538SAndroid Build Coastguard Worker ~AcquireLoadThread() override = default;
ThreadMain()319*6777b538SAndroid Build Coastguard Worker void ThreadMain() override {
320*6777b538SAndroid Build Coastguard Worker // Wait for the other thread to make Release_Store
321*6777b538SAndroid Build Coastguard Worker PlatformThread::Sleep(Milliseconds(100));
322*6777b538SAndroid Build Coastguard Worker base::subtle::Acquire_Load(value_);
323*6777b538SAndroid Build Coastguard Worker }
324*6777b538SAndroid Build Coastguard Worker private:
325*6777b538SAndroid Build Coastguard Worker raw_ptr<base::subtle::Atomic32> value_;
326*6777b538SAndroid Build Coastguard Worker };
327*6777b538SAndroid Build Coastguard Worker
RunInParallel(PlatformThread::Delegate * d1,PlatformThread::Delegate * d2)328*6777b538SAndroid Build Coastguard Worker void RunInParallel(PlatformThread::Delegate *d1, PlatformThread::Delegate *d2) {
329*6777b538SAndroid Build Coastguard Worker PlatformThreadHandle a;
330*6777b538SAndroid Build Coastguard Worker PlatformThreadHandle b;
331*6777b538SAndroid Build Coastguard Worker PlatformThread::Create(0, d1, &a);
332*6777b538SAndroid Build Coastguard Worker PlatformThread::Create(0, d2, &b);
333*6777b538SAndroid Build Coastguard Worker PlatformThread::Join(a);
334*6777b538SAndroid Build Coastguard Worker PlatformThread::Join(b);
335*6777b538SAndroid Build Coastguard Worker }
336*6777b538SAndroid Build Coastguard Worker
337*6777b538SAndroid Build Coastguard Worker #if defined(THREAD_SANITIZER)
DataRace()338*6777b538SAndroid Build Coastguard Worker void DataRace() {
339*6777b538SAndroid Build Coastguard Worker bool *shared = new bool(false);
340*6777b538SAndroid Build Coastguard Worker TOOLS_SANITY_TEST_CONCURRENT_THREAD thread1(shared), thread2(shared);
341*6777b538SAndroid Build Coastguard Worker RunInParallel(&thread1, &thread2);
342*6777b538SAndroid Build Coastguard Worker EXPECT_TRUE(*shared);
343*6777b538SAndroid Build Coastguard Worker delete shared;
344*6777b538SAndroid Build Coastguard Worker // We're in a death test - crash.
345*6777b538SAndroid Build Coastguard Worker CHECK(0);
346*6777b538SAndroid Build Coastguard Worker }
347*6777b538SAndroid Build Coastguard Worker #endif
348*6777b538SAndroid Build Coastguard Worker
349*6777b538SAndroid Build Coastguard Worker } // namespace
350*6777b538SAndroid Build Coastguard Worker
351*6777b538SAndroid Build Coastguard Worker #if defined(THREAD_SANITIZER)
352*6777b538SAndroid Build Coastguard Worker // A data race detector should report an error in this test.
TEST(ToolsSanityTest,DataRace)353*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, DataRace) {
354*6777b538SAndroid Build Coastguard Worker // The suppression regexp must match that in base/debug/tsan_suppressions.cc.
355*6777b538SAndroid Build Coastguard Worker EXPECT_DEATH(DataRace(), "1 race:base/tools_sanity_unittest.cc");
356*6777b538SAndroid Build Coastguard Worker }
357*6777b538SAndroid Build Coastguard Worker #endif
358*6777b538SAndroid Build Coastguard Worker
TEST(ToolsSanityTest,AnnotateBenignRace)359*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, AnnotateBenignRace) {
360*6777b538SAndroid Build Coastguard Worker bool shared = false;
361*6777b538SAndroid Build Coastguard Worker ABSL_ANNOTATE_BENIGN_RACE(
362*6777b538SAndroid Build Coastguard Worker &shared, "Intentional race - make sure doesn't show up");
363*6777b538SAndroid Build Coastguard Worker TOOLS_SANITY_TEST_CONCURRENT_THREAD thread1(&shared), thread2(&shared);
364*6777b538SAndroid Build Coastguard Worker RunInParallel(&thread1, &thread2);
365*6777b538SAndroid Build Coastguard Worker EXPECT_TRUE(shared);
366*6777b538SAndroid Build Coastguard Worker }
367*6777b538SAndroid Build Coastguard Worker
TEST(ToolsSanityTest,AtomicsAreIgnored)368*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, AtomicsAreIgnored) {
369*6777b538SAndroid Build Coastguard Worker base::subtle::Atomic32 shared = 0;
370*6777b538SAndroid Build Coastguard Worker ReleaseStoreThread thread1(&shared);
371*6777b538SAndroid Build Coastguard Worker AcquireLoadThread thread2(&shared);
372*6777b538SAndroid Build Coastguard Worker RunInParallel(&thread1, &thread2);
373*6777b538SAndroid Build Coastguard Worker EXPECT_EQ(kMagicValue, shared);
374*6777b538SAndroid Build Coastguard Worker }
375*6777b538SAndroid Build Coastguard Worker
376*6777b538SAndroid Build Coastguard Worker #if BUILDFLAG(CFI_ENFORCEMENT_TRAP)
377*6777b538SAndroid Build Coastguard Worker #if BUILDFLAG(IS_WIN)
378*6777b538SAndroid Build Coastguard Worker #define CFI_ERROR_MSG "EXCEPTION_ILLEGAL_INSTRUCTION"
379*6777b538SAndroid Build Coastguard Worker #elif BUILDFLAG(IS_ANDROID)
380*6777b538SAndroid Build Coastguard Worker // TODO(pcc): Produce proper stack dumps on Android and test for the correct
381*6777b538SAndroid Build Coastguard Worker // si_code here.
382*6777b538SAndroid Build Coastguard Worker #define CFI_ERROR_MSG "^$"
383*6777b538SAndroid Build Coastguard Worker #else
384*6777b538SAndroid Build Coastguard Worker #define CFI_ERROR_MSG "ILL_ILLOPN"
385*6777b538SAndroid Build Coastguard Worker #endif
386*6777b538SAndroid Build Coastguard Worker #elif BUILDFLAG(CFI_ENFORCEMENT_DIAGNOSTIC)
387*6777b538SAndroid Build Coastguard Worker #define CFI_ERROR_MSG "runtime error: control flow integrity check"
388*6777b538SAndroid Build Coastguard Worker #endif // BUILDFLAG(CFI_ENFORCEMENT_TRAP || CFI_ENFORCEMENT_DIAGNOSTIC)
389*6777b538SAndroid Build Coastguard Worker
390*6777b538SAndroid Build Coastguard Worker #if defined(CFI_ERROR_MSG)
391*6777b538SAndroid Build Coastguard Worker class A {
392*6777b538SAndroid Build Coastguard Worker public:
A()393*6777b538SAndroid Build Coastguard Worker A(): n_(0) {}
f()394*6777b538SAndroid Build Coastguard Worker virtual void f() { n_++; }
395*6777b538SAndroid Build Coastguard Worker protected:
396*6777b538SAndroid Build Coastguard Worker int n_;
397*6777b538SAndroid Build Coastguard Worker };
398*6777b538SAndroid Build Coastguard Worker
399*6777b538SAndroid Build Coastguard Worker class B: public A {
400*6777b538SAndroid Build Coastguard Worker public:
f()401*6777b538SAndroid Build Coastguard Worker void f() override { n_--; }
402*6777b538SAndroid Build Coastguard Worker };
403*6777b538SAndroid Build Coastguard Worker
404*6777b538SAndroid Build Coastguard Worker class C: public B {
405*6777b538SAndroid Build Coastguard Worker public:
f()406*6777b538SAndroid Build Coastguard Worker void f() override { n_ += 2; }
407*6777b538SAndroid Build Coastguard Worker };
408*6777b538SAndroid Build Coastguard Worker
KillVptrAndCall(A * obj)409*6777b538SAndroid Build Coastguard Worker NOINLINE void KillVptrAndCall(A *obj) {
410*6777b538SAndroid Build Coastguard Worker *reinterpret_cast<void **>(obj) = 0;
411*6777b538SAndroid Build Coastguard Worker obj->f();
412*6777b538SAndroid Build Coastguard Worker }
413*6777b538SAndroid Build Coastguard Worker
TEST(ToolsSanityTest,BadVirtualCallNull)414*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, BadVirtualCallNull) {
415*6777b538SAndroid Build Coastguard Worker A a;
416*6777b538SAndroid Build Coastguard Worker B b;
417*6777b538SAndroid Build Coastguard Worker EXPECT_DEATH({ KillVptrAndCall(&a); KillVptrAndCall(&b); }, CFI_ERROR_MSG);
418*6777b538SAndroid Build Coastguard Worker }
419*6777b538SAndroid Build Coastguard Worker
OverwriteVptrAndCall(B * obj,A * vptr)420*6777b538SAndroid Build Coastguard Worker NOINLINE void OverwriteVptrAndCall(B *obj, A *vptr) {
421*6777b538SAndroid Build Coastguard Worker *reinterpret_cast<void **>(obj) = *reinterpret_cast<void **>(vptr);
422*6777b538SAndroid Build Coastguard Worker obj->f();
423*6777b538SAndroid Build Coastguard Worker }
424*6777b538SAndroid Build Coastguard Worker
TEST(ToolsSanityTest,BadVirtualCallWrongType)425*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, BadVirtualCallWrongType) {
426*6777b538SAndroid Build Coastguard Worker A a;
427*6777b538SAndroid Build Coastguard Worker B b;
428*6777b538SAndroid Build Coastguard Worker C c;
429*6777b538SAndroid Build Coastguard Worker EXPECT_DEATH({ OverwriteVptrAndCall(&b, &a); OverwriteVptrAndCall(&b, &c); },
430*6777b538SAndroid Build Coastguard Worker CFI_ERROR_MSG);
431*6777b538SAndroid Build Coastguard Worker }
432*6777b538SAndroid Build Coastguard Worker
433*6777b538SAndroid Build Coastguard Worker // TODO(pcc): remove CFI_CAST_CHECK, see https://crbug.com/626794.
434*6777b538SAndroid Build Coastguard Worker #if BUILDFLAG(CFI_CAST_CHECK)
TEST(ToolsSanityTest,BadDerivedCast)435*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, BadDerivedCast) {
436*6777b538SAndroid Build Coastguard Worker A a;
437*6777b538SAndroid Build Coastguard Worker EXPECT_DEATH((void)(B*)&a, CFI_ERROR_MSG);
438*6777b538SAndroid Build Coastguard Worker }
439*6777b538SAndroid Build Coastguard Worker
TEST(ToolsSanityTest,BadUnrelatedCast)440*6777b538SAndroid Build Coastguard Worker TEST(ToolsSanityTest, BadUnrelatedCast) {
441*6777b538SAndroid Build Coastguard Worker class A {
442*6777b538SAndroid Build Coastguard Worker virtual void f() {}
443*6777b538SAndroid Build Coastguard Worker };
444*6777b538SAndroid Build Coastguard Worker
445*6777b538SAndroid Build Coastguard Worker class B {
446*6777b538SAndroid Build Coastguard Worker virtual void f() {}
447*6777b538SAndroid Build Coastguard Worker };
448*6777b538SAndroid Build Coastguard Worker
449*6777b538SAndroid Build Coastguard Worker A a;
450*6777b538SAndroid Build Coastguard Worker EXPECT_DEATH((void)(B*)&a, CFI_ERROR_MSG);
451*6777b538SAndroid Build Coastguard Worker }
452*6777b538SAndroid Build Coastguard Worker #endif // BUILDFLAG(CFI_CAST_CHECK)
453*6777b538SAndroid Build Coastguard Worker
454*6777b538SAndroid Build Coastguard Worker #endif // CFI_ERROR_MSG
455*6777b538SAndroid Build Coastguard Worker
456*6777b538SAndroid Build Coastguard Worker #undef CFI_ERROR_MSG
457*6777b538SAndroid Build Coastguard Worker #undef HARMFUL_ACCESS
458*6777b538SAndroid Build Coastguard Worker #undef HARMFUL_ACCESS_IS_NOOP
459*6777b538SAndroid Build Coastguard Worker
460*6777b538SAndroid Build Coastguard Worker } // namespace base
461