blob: 4340fcd9ba53a56739f71c936553893c7af423ef [file] [log] [blame]
rsleevi@chromium.orgde3a6cf2012-04-06 12:53:02 +09001// Copyright (c) 2012 The Chromium Authors. All rights reserved.
glider@chromium.org0f9756f2009-12-17 21:37:58 +09002// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
glider@chromium.org71a6e932011-10-05 22:22:50 +09004//
5// This file contains intentional memory errors, some of which may lead to
6// crashes if the test is ran without special memory testing tools. We use these
7// errors to verify the sanity of the tools.
glider@chromium.org0f9756f2009-12-17 21:37:58 +09008
timurrrr@chromium.orgb1d5c022011-05-11 03:03:34 +09009#include "base/atomicops.h"
sebmarchand@chromium.orgd117d7a2014-06-14 17:29:37 +090010#include "base/debug/asan_invalid_access.h"
11#include "base/debug/profiler.h"
avi@chromium.orga043a862013-07-18 17:12:40 +090012#include "base/message_loop/message_loop.h"
timurrrr@chromium.orgf39c3ff2010-05-14 17:24:42 +090013#include "base/third_party/dynamic_annotations/dynamic_annotations.h"
brettw@chromium.org5b5f5e02011-01-01 10:01:06 +090014#include "base/threading/thread.h"
glider@chromium.org0f9756f2009-12-17 21:37:58 +090015#include "testing/gtest/include/gtest/gtest.h"
16
brettw@chromium.org61391822011-01-01 05:02:16 +090017namespace base {
18
glider@chromium.org0f9756f2009-12-17 21:37:58 +090019namespace {
20
timurrrr@chromium.orgb1d5c022011-05-11 03:03:34 +090021const base::subtle::Atomic32 kMagicValue = 42;
glider@chromium.org0f9756f2009-12-17 21:37:58 +090022
glider@chromium.org71a6e932011-10-05 22:22:50 +090023// Helper for memory accesses that can potentially corrupt memory or cause a
24// crash during a native run.
chrisha@google.com87839ab2014-03-28 00:08:04 +090025#if defined(ADDRESS_SANITIZER) || defined(SYZYASAN)
glider@chromium.orga3b3c432012-10-24 23:11:02 +090026#if defined(OS_IOS)
27// EXPECT_DEATH is not supported on IOS.
28#define HARMFUL_ACCESS(action,error_regexp) do { action; } while (0)
sebmarchand@chromium.orgd117d7a2014-06-14 17:29:37 +090029#elif defined(SYZYASAN)
30// We won't get a meaningful error message because we're not running under the
31// SyzyASan logger, but we can at least make sure that the error has been
32// generated in the SyzyASan runtime.
33#define HARMFUL_ACCESS(action,unused) \
34if (debug::IsBinaryInstrumented()) { EXPECT_DEATH(action, \
35 "AsanRuntime::OnError"); }
glider@chromium.orga3b3c432012-10-24 23:11:02 +090036#else
glider@chromium.org71a6e932011-10-05 22:22:50 +090037#define HARMFUL_ACCESS(action,error_regexp) EXPECT_DEATH(action,error_regexp)
sebmarchand@chromium.orgd117d7a2014-06-14 17:29:37 +090038#endif // !OS_IOS && !SYZYASAN
glider@chromium.org71a6e932011-10-05 22:22:50 +090039#else
40#define HARMFUL_ACCESS(action,error_regexp) \
41do { if (RunningOnValgrind()) { action; } } while (0)
42#endif
43
earthdok@chromium.org5a5e4652014-01-16 14:31:41 +090044void DoReadUninitializedValue(char *ptr) {
eugenis@google.com7634fc52012-05-16 17:42:08 +090045 // Comparison with 64 is to prevent clang from optimizing away the
thakis@chromium.org987f8332011-09-19 01:39:12 +090046 // jump -- valgrind only catches jumps and conditional moves, but clang uses
47 // the borrow flag if the condition is just `*ptr == '\0'`.
eugenis@google.com7634fc52012-05-16 17:42:08 +090048 if (*ptr == 64) {
earthdok@chromium.org5a5e4652014-01-16 14:31:41 +090049 VLOG(1) << "Uninit condition is true";
timurrrr@chromium.org46315442010-09-23 18:12:37 +090050 } else {
earthdok@chromium.org5a5e4652014-01-16 14:31:41 +090051 VLOG(1) << "Uninit condition is false";
timurrrr@chromium.org46315442010-09-23 18:12:37 +090052 }
53}
54
earthdok@chromium.org5a5e4652014-01-16 14:31:41 +090055void ReadUninitializedValue(char *ptr) {
56#if defined(MEMORY_SANITIZER)
57 EXPECT_DEATH(DoReadUninitializedValue(ptr),
58 "use-of-uninitialized-value");
59#else
60 DoReadUninitializedValue(ptr);
61#endif
62}
63
timurrrr@chromium.org4597f342010-03-26 21:54:44 +090064void ReadValueOutOfArrayBoundsLeft(char *ptr) {
pkasting@chromium.org4baea272010-10-19 08:57:49 +090065 char c = ptr[-2];
66 VLOG(1) << "Reading a byte out of bounds: " << c;
timurrrr@chromium.org4597f342010-03-26 21:54:44 +090067}
68
69void ReadValueOutOfArrayBoundsRight(char *ptr, size_t size) {
pkasting@chromium.org4baea272010-10-19 08:57:49 +090070 char c = ptr[size + 1];
71 VLOG(1) << "Reading a byte out of bounds: " << c;
timurrrr@chromium.org4597f342010-03-26 21:54:44 +090072}
73
74// This is harmless if you run it under Valgrind thanks to redzones.
75void WriteValueOutOfArrayBoundsLeft(char *ptr) {
timurrrr@chromium.orgb1d5c022011-05-11 03:03:34 +090076 ptr[-1] = kMagicValue;
timurrrr@chromium.org4597f342010-03-26 21:54:44 +090077}
78
79// This is harmless if you run it under Valgrind thanks to redzones.
80void WriteValueOutOfArrayBoundsRight(char *ptr, size_t size) {
timurrrr@chromium.orgb1d5c022011-05-11 03:03:34 +090081 ptr[size] = kMagicValue;
timurrrr@chromium.org4597f342010-03-26 21:54:44 +090082}
83
84void MakeSomeErrors(char *ptr, size_t size) {
timurrrr@chromium.org46315442010-09-23 18:12:37 +090085 ReadUninitializedValue(ptr);
mithro@mithis.com62c72272013-12-18 14:31:33 +090086
glider@chromium.org71a6e932011-10-05 22:22:50 +090087 HARMFUL_ACCESS(ReadValueOutOfArrayBoundsLeft(ptr),
mithro@mithis.com62c72272013-12-18 14:31:33 +090088 "2 bytes to the left");
glider@chromium.org71a6e932011-10-05 22:22:50 +090089 HARMFUL_ACCESS(ReadValueOutOfArrayBoundsRight(ptr, size),
mithro@mithis.com62c72272013-12-18 14:31:33 +090090 "1 bytes to the right");
glider@chromium.org71a6e932011-10-05 22:22:50 +090091 HARMFUL_ACCESS(WriteValueOutOfArrayBoundsLeft(ptr),
mithro@mithis.com62c72272013-12-18 14:31:33 +090092 "1 bytes to the left");
glider@chromium.org71a6e932011-10-05 22:22:50 +090093 HARMFUL_ACCESS(WriteValueOutOfArrayBoundsRight(ptr, size),
mithro@mithis.com62c72272013-12-18 14:31:33 +090094 "0 bytes to the right");
timurrrr@chromium.org4597f342010-03-26 21:54:44 +090095}
96
glider@chromium.orgb311fbc2010-10-14 17:25:54 +090097} // namespace
98
99// A memory leak detector should report an error in this test.
100TEST(ToolsSanityTest, MemoryLeak) {
thakis@chromium.org1a3c5d12011-11-01 20:08:09 +0900101 // Without the |volatile|, clang optimizes away the next two lines.
102 int* volatile leak = new int[256]; // Leak some memory intentionally.
glider@chromium.orgb311fbc2010-10-14 17:25:54 +0900103 leak[4] = 1; // Make sure the allocated memory is used.
104}
105
chrisha@chromium.org3f23a1a2014-03-29 02:35:10 +0900106#if (defined(ADDRESS_SANITIZER) && defined(OS_IOS)) || defined(SYZYASAN)
glider@chromium.orga3b3c432012-10-24 23:11:02 +0900107// Because iOS doesn't support death tests, each of the following tests will
chrisha@chromium.org3f23a1a2014-03-29 02:35:10 +0900108// crash the whole program under Asan. On Windows Asan is based on SyzyAsan; the
109// error report mechanism is different than with Asan so these tests will fail.
glider@chromium.orga3b3c432012-10-24 23:11:02 +0900110#define MAYBE_AccessesToNewMemory DISABLED_AccessesToNewMemory
111#define MAYBE_AccessesToMallocMemory DISABLED_AccessesToMallocMemory
glider@chromium.org738e89d2014-05-14 20:50:37 +0900112#else
113#define MAYBE_AccessesToNewMemory AccessesToNewMemory
114#define MAYBE_AccessesToMallocMemory AccessesToMallocMemory
tzik@chromium.orgf65e67e2014-07-18 11:40:40 +0900115#endif // (defined(ADDRESS_SANITIZER) && defined(OS_IOS)) || defined(SYZYASAN)
glider@chromium.orge43d0062014-05-15 01:04:30 +0900116
117// The following tests pass with Clang r170392, but not r172454, which
118// makes AddressSanitizer detect errors in them. We disable these tests under
119// AddressSanitizer until we fully switch to Clang r172454. After that the
120// tests should be put back under the (defined(OS_IOS) || defined(OS_WIN))
121// clause above.
122// See also http://crbug.com/172614.
123#if defined(ADDRESS_SANITIZER) || defined(SYZYASAN)
glider@chromium.org738e89d2014-05-14 20:50:37 +0900124#define MAYBE_SingleElementDeletedWithBraces \
125 DISABLED_SingleElementDeletedWithBraces
glider@chromium.orge43d0062014-05-15 01:04:30 +0900126#define MAYBE_ArrayDeletedWithoutBraces DISABLED_ArrayDeletedWithoutBraces
tzik@chromium.orgf65e67e2014-07-18 11:40:40 +0900127#else
128#define MAYBE_ArrayDeletedWithoutBraces ArrayDeletedWithoutBraces
129#define MAYBE_SingleElementDeletedWithBraces SingleElementDeletedWithBraces
130#endif // defined(ADDRESS_SANITIZER) || defined(SYZYASAN)
131
glider@chromium.orga3b3c432012-10-24 23:11:02 +0900132TEST(ToolsSanityTest, MAYBE_AccessesToNewMemory) {
timurrrr@chromium.org4597f342010-03-26 21:54:44 +0900133 char *foo = new char[10];
134 MakeSomeErrors(foo, 10);
135 delete [] foo;
glider@chromium.org71a6e932011-10-05 22:22:50 +0900136 // Use after delete.
137 HARMFUL_ACCESS(foo[5] = 0, "heap-use-after-free");
timurrrr@chromium.org4597f342010-03-26 21:54:44 +0900138}
139
glider@chromium.orga3b3c432012-10-24 23:11:02 +0900140TEST(ToolsSanityTest, MAYBE_AccessesToMallocMemory) {
timurrrr@chromium.org4597f342010-03-26 21:54:44 +0900141 char *foo = reinterpret_cast<char*>(malloc(10));
142 MakeSomeErrors(foo, 10);
143 free(foo);
glider@chromium.org71a6e932011-10-05 22:22:50 +0900144 // Use after free.
145 HARMFUL_ACCESS(foo[5] = 0, "heap-use-after-free");
timurrrr@chromium.org4597f342010-03-26 21:54:44 +0900146}
147
hanse03e7f72015-05-20 02:03:14 +0900148static int* allocateArray() {
149 // Clang warns about the mismatched new[]/delete if they occur in the same
150 // function.
151 return new int[10];
152}
153
glider@chromium.orga3b3c432012-10-24 23:11:02 +0900154TEST(ToolsSanityTest, MAYBE_ArrayDeletedWithoutBraces) {
chrisha@google.com87839ab2014-03-28 00:08:04 +0900155#if !defined(ADDRESS_SANITIZER) && !defined(SYZYASAN)
glider@chromium.org71a6e932011-10-05 22:22:50 +0900156 // This test may corrupt memory if not run under Valgrind or compiled with
157 // AddressSanitizer.
timurrrr@chromium.org4597f342010-03-26 21:54:44 +0900158 if (!RunningOnValgrind())
159 return;
glider@chromium.org71a6e932011-10-05 22:22:50 +0900160#endif
timurrrr@chromium.org4597f342010-03-26 21:54:44 +0900161
thakis@chromium.orgc3846f82011-09-19 01:30:12 +0900162 // Without the |volatile|, clang optimizes away the next two lines.
hanse03e7f72015-05-20 02:03:14 +0900163 int* volatile foo = allocateArray();
glider@chromium.orge43d0062014-05-15 01:04:30 +0900164 delete foo;
timurrrr@chromium.org4597f342010-03-26 21:54:44 +0900165}
166
hanse03e7f72015-05-20 02:03:14 +0900167static int* allocateScalar() {
168 // Clang warns about the mismatched new/delete[] if they occur in the same
169 // function.
170 return new int;
171}
172
glider@chromium.orga3b3c432012-10-24 23:11:02 +0900173TEST(ToolsSanityTest, MAYBE_SingleElementDeletedWithBraces) {
174#if !defined(ADDRESS_SANITIZER)
glider@chromium.org71a6e932011-10-05 22:22:50 +0900175 // This test may corrupt memory if not run under Valgrind or compiled with
176 // AddressSanitizer.
timurrrr@chromium.org4597f342010-03-26 21:54:44 +0900177 if (!RunningOnValgrind())
178 return;
glider@chromium.org71a6e932011-10-05 22:22:50 +0900179#endif
timurrrr@chromium.org4597f342010-03-26 21:54:44 +0900180
thakis@chromium.orgc3846f82011-09-19 01:30:12 +0900181 // Without the |volatile|, clang optimizes away the next two lines.
hanse03e7f72015-05-20 02:03:14 +0900182 int* volatile foo = allocateScalar();
pph34r@gmail.com80271292011-10-01 03:52:04 +0900183 (void) foo;
glider@chromium.orge43d0062014-05-15 01:04:30 +0900184 delete [] foo;
timurrrr@chromium.org4597f342010-03-26 21:54:44 +0900185}
186
chrisha@google.com87839ab2014-03-28 00:08:04 +0900187#if defined(ADDRESS_SANITIZER) || defined(SYZYASAN)
sebmarchand@chromium.orgd117d7a2014-06-14 17:29:37 +0900188
glider@chromium.org4b5cd882011-11-08 18:28:49 +0900189TEST(ToolsSanityTest, DISABLED_AddressSanitizerNullDerefCrashTest) {
glider@chromium.org2fa52d02011-10-13 02:18:24 +0900190 // Intentionally crash to make sure AddressSanitizer is running.
191 // This test should not be ran on bots.
192 int* volatile zero = NULL;
193 *zero = 0;
194}
glider@chromium.org4b5cd882011-11-08 18:28:49 +0900195
196TEST(ToolsSanityTest, DISABLED_AddressSanitizerLocalOOBCrashTest) {
197 // Intentionally crash to make sure AddressSanitizer is instrumenting
198 // the local variables.
199 // This test should not be ran on bots.
200 int array[5];
201 // Work around the OOB warning reported by Clang.
202 int* volatile access = &array[5];
203 *access = 43;
204}
205
206namespace {
207int g_asan_test_global_array[10];
208} // namespace
209
210TEST(ToolsSanityTest, DISABLED_AddressSanitizerGlobalOOBCrashTest) {
211 // Intentionally crash to make sure AddressSanitizer is instrumenting
212 // the global variables.
213 // This test should not be ran on bots.
214
215 // Work around the OOB warning reported by Clang.
216 int* volatile access = g_asan_test_global_array - 1;
217 *access = 43;
218}
219
sebmarchand@chromium.orgd117d7a2014-06-14 17:29:37 +0900220TEST(ToolsSanityTest, AsanHeapOverflow) {
221 HARMFUL_ACCESS(debug::AsanHeapOverflow() ,"to the right");
222}
223
224TEST(ToolsSanityTest, AsanHeapUnderflow) {
225 HARMFUL_ACCESS(debug::AsanHeapUnderflow(), "to the left");
226}
227
228TEST(ToolsSanityTest, AsanHeapUseAfterFree) {
229 HARMFUL_ACCESS(debug::AsanHeapUseAfterFree(), "heap-use-after-free");
230}
231
232#if defined(SYZYASAN)
233TEST(ToolsSanityTest, AsanCorruptHeapBlock) {
234 HARMFUL_ACCESS(debug::AsanCorruptHeapBlock(), "");
235}
236
237TEST(ToolsSanityTest, AsanCorruptHeap) {
238 // This test will kill the process by raising an exception, there's no
239 // particular string to look for in the stack trace.
240 EXPECT_DEATH(debug::AsanCorruptHeap(), "");
241}
242#endif // SYZYASAN
243
244#endif // ADDRESS_SANITIZER || SYZYASAN
timurrrr@chromium.orgb1d5c022011-05-11 03:03:34 +0900245
246namespace {
247
248// We use caps here just to ensure that the method name doesn't interfere with
249// the wildcarded suppressions.
250class TOOLS_SANITY_TEST_CONCURRENT_THREAD : public PlatformThread::Delegate {
251 public:
252 explicit TOOLS_SANITY_TEST_CONCURRENT_THREAD(bool *value) : value_(value) {}
dcheng7dc8df52014-10-21 19:54:51 +0900253 ~TOOLS_SANITY_TEST_CONCURRENT_THREAD() override {}
254 void ThreadMain() override {
timurrrr@chromium.orgb1d5c022011-05-11 03:03:34 +0900255 *value_ = true;
256
257 // Sleep for a few milliseconds so the two threads are more likely to live
258 // simultaneously. Otherwise we may miss the report due to mutex
259 // lock/unlock's inside thread creation code in pure-happens-before mode...
tedvessenes@gmail.comaaa63032012-01-01 07:53:51 +0900260 PlatformThread::Sleep(TimeDelta::FromMilliseconds(100));
timurrrr@chromium.orgb1d5c022011-05-11 03:03:34 +0900261 }
262 private:
263 bool *value_;
264};
265
266class ReleaseStoreThread : public PlatformThread::Delegate {
267 public:
268 explicit ReleaseStoreThread(base::subtle::Atomic32 *value) : value_(value) {}
dcheng7dc8df52014-10-21 19:54:51 +0900269 ~ReleaseStoreThread() override {}
270 void ThreadMain() override {
timurrrr@chromium.orgb1d5c022011-05-11 03:03:34 +0900271 base::subtle::Release_Store(value_, kMagicValue);
272
273 // Sleep for a few milliseconds so the two threads are more likely to live
274 // simultaneously. Otherwise we may miss the report due to mutex
275 // lock/unlock's inside thread creation code in pure-happens-before mode...
tedvessenes@gmail.comaaa63032012-01-01 07:53:51 +0900276 PlatformThread::Sleep(TimeDelta::FromMilliseconds(100));
timurrrr@chromium.orgb1d5c022011-05-11 03:03:34 +0900277 }
278 private:
279 base::subtle::Atomic32 *value_;
280};
281
282class AcquireLoadThread : public PlatformThread::Delegate {
283 public:
284 explicit AcquireLoadThread(base::subtle::Atomic32 *value) : value_(value) {}
dcheng7dc8df52014-10-21 19:54:51 +0900285 ~AcquireLoadThread() override {}
286 void ThreadMain() override {
timurrrr@chromium.orgb1d5c022011-05-11 03:03:34 +0900287 // Wait for the other thread to make Release_Store
tedvessenes@gmail.comaaa63032012-01-01 07:53:51 +0900288 PlatformThread::Sleep(TimeDelta::FromMilliseconds(100));
timurrrr@chromium.orgb1d5c022011-05-11 03:03:34 +0900289 base::subtle::Acquire_Load(value_);
290 }
291 private:
292 base::subtle::Atomic32 *value_;
293};
294
295void RunInParallel(PlatformThread::Delegate *d1, PlatformThread::Delegate *d2) {
296 PlatformThreadHandle a;
297 PlatformThreadHandle b;
298 PlatformThread::Create(0, d1, &a);
299 PlatformThread::Create(0, d2, &b);
300 PlatformThread::Join(a);
301 PlatformThread::Join(b);
302}
303
glider@chromium.orgc75e1372014-06-26 22:10:50 +0900304#if defined(THREAD_SANITIZER)
305void DataRace() {
glider@chromium.org7bb5ece2013-03-23 20:28:17 +0900306 bool *shared = new bool(false);
307 TOOLS_SANITY_TEST_CONCURRENT_THREAD thread1(shared), thread2(shared);
timurrrr@chromium.orgb1d5c022011-05-11 03:03:34 +0900308 RunInParallel(&thread1, &thread2);
glider@chromium.org7bb5ece2013-03-23 20:28:17 +0900309 EXPECT_TRUE(*shared);
310 delete shared;
glider@chromium.orgc75e1372014-06-26 22:10:50 +0900311 // We're in a death test - crash.
312 CHECK(0);
timurrrr@chromium.orgb1d5c022011-05-11 03:03:34 +0900313}
glider@chromium.orgc75e1372014-06-26 22:10:50 +0900314#endif
315
316} // namespace
317
318#if defined(THREAD_SANITIZER)
319// A data race detector should report an error in this test.
320TEST(ToolsSanityTest, DataRace) {
321 // The suppression regexp must match that in base/debug/tsan_suppressions.cc.
322 EXPECT_DEATH(DataRace(), "1 race:base/tools_sanity_unittest.cc");
323}
324#endif
timurrrr@chromium.orgb1d5c022011-05-11 03:03:34 +0900325
326TEST(ToolsSanityTest, AnnotateBenignRace) {
327 bool shared = false;
328 ANNOTATE_BENIGN_RACE(&shared, "Intentional race - make sure doesn't show up");
329 TOOLS_SANITY_TEST_CONCURRENT_THREAD thread1(&shared), thread2(&shared);
330 RunInParallel(&thread1, &thread2);
331 EXPECT_TRUE(shared);
332}
333
334TEST(ToolsSanityTest, AtomicsAreIgnored) {
335 base::subtle::Atomic32 shared = 0;
336 ReleaseStoreThread thread1(&shared);
337 AcquireLoadThread thread2(&shared);
338 RunInParallel(&thread1, &thread2);
339 EXPECT_EQ(kMagicValue, shared);
glider@chromium.org0f9756f2009-12-17 21:37:58 +0900340}
brettw@chromium.org61391822011-01-01 05:02:16 +0900341
pcc85bb7552015-07-31 09:19:06 +0900342#if defined(CFI_ENFORCEMENT)
343TEST(ToolsSanityTest, BadCast) {
344 class A {
345 virtual void f() {}
346 };
347
348 class B {
349 virtual void f() {}
350 };
351
352 A a;
353 EXPECT_DEATH((void)(B*)&a, "ILL_ILLOPN");
354}
355#endif
356
brettw@chromium.org61391822011-01-01 05:02:16 +0900357} // namespace base