Index: webrtc/rtc_tools/sanitizers_unittest.cc |
diff --git a/webrtc/rtc_tools/sanitizers_unittest.cc b/webrtc/rtc_tools/sanitizers_unittest.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..74cb081efa8337e5ce5ee07695791b750a7276fb |
--- /dev/null |
+++ b/webrtc/rtc_tools/sanitizers_unittest.cc |
@@ -0,0 +1,121 @@ |
+/* |
+ * Copyright (c) 2017 The WebRTC project authors. All Rights Reserved. |
+ * |
+ * Use of this source code is governed by a BSD-style license |
+ * that can be found in the LICENSE file in the root of the source |
+ * tree. An additional intellectual property rights grant can be found |
+ * in the file PATENTS. All contributing project authors may |
+ * be found in the AUTHORS file in the root of the source tree. |
+ */ |
+ |
+#include <stddef.h> |
+#include <stdio.h> |
+#include <random> |
+ |
+#include "webrtc/rtc_base/checks.h" |
+#include "webrtc/rtc_base/nullsocketserver.h" |
+#include "webrtc/rtc_base/ptr_util.h" |
+#include "webrtc/rtc_base/thread.h" |
+#include "webrtc/test/gtest.h" |
+ |
+namespace rtc { |
+ |
+namespace { |
+ |
+#if defined(MEMORY_SANITIZER) |
+void UseOfUninitializedValue() { |
+ int* buf = new int[2]; |
+ std::random_device engine; |
+ if (buf[engine() % 2]) { // Non-deterministic conditional. |
+ printf("Externally visible action."); |
+ } |
+ delete[] buf; |
+} |
+ |
+TEST(SanitizersDeathTest, MemorySanitizer) { |
+ EXPECT_DEATH(UseOfUninitializedValue(), "use-of-uninitialized-value"); |
+} |
+#endif |
+ |
+#if defined(ADDRESS_SANITIZER) |
+void HeapUseAfterFree() { |
+ char *buf = new char[2]; |
+ delete[] buf; |
+ buf[0] = buf[1]; |
+} |
+ |
+TEST(SanitizersDeathTest, AddressSanitizer) { |
+ EXPECT_DEATH(HeapUseAfterFree(), "heap-use-after-free"); |
+} |
+#endif |
+ |
+#if defined(UNDEFINED_SANITIZER) |
+// For ubsan: |
+void SignedIntegerOverflow() { |
+ int32_t x = 1234567890; |
+ x *= 2; |
+} |
+ |
+// For ubsan_vptr: |
+struct Base { |
+ virtual void f() {} |
+ virtual ~Base() {} |
+}; |
+struct Derived : public Base { |
+}; |
+ |
+void InvalidVptr() { |
+ Base b; |
+ auto* d = static_cast<Derived*>(&b); // Bad downcast. |
+ d->f(); // Virtual function call with object of wrong dynamic type. |
+} |
+ |
+TEST(SanitizersDeathTest, UndefinedSanitizer) { |
+ EXPECT_DEATH({ SignedIntegerOverflow(); InvalidVptr(); }, "runtime error"); |
+} |
+#endif |
+ |
+#if defined(THREAD_SANITIZER) |
+class IncrementThread : public Thread { |
+ public: |
+ explicit IncrementThread(int* value) |
+ : Thread(rtc::MakeUnique<NullSocketServer>()), |
+ value_(value) {} |
+ |
+ void Run() override { |
+ ++*value_; |
+ Thread::Current()->SleepMs(100); |
+ } |
+ |
+ // Un-protect Thread::Join for the test. |
+ void Join() { |
+ Thread::Join(); |
+ } |
+ |
+ private: |
+ int* value_; |
+ |
+ RTC_DISALLOW_COPY_AND_ASSIGN(IncrementThread); |
+}; |
+ |
+void DataRace() { |
+ int value = 0; |
+ IncrementThread thread1(&value); |
+ IncrementThread thread2(&value); |
+ thread1.Start(); |
+ thread2.Start(); |
+ thread1.Join(); |
+ thread2.Join(); |
+ // TSan seems to mess with gtest's death detection. |
+ // Fail intentionally, and rely on detecting the error message. |
+ RTC_CHECK(false); |
+} |
+ |
+TEST(SanitizersDeathTest, ThreadSanitizer) { |
+ EXPECT_DEATH(DataRace(), "data race"); |
+} |
+#endif |
+ |
+} // namespace |
+ |
+} // namespace rtc |