From 36d22d82aa202bb199967e9512281e9a53db42c9 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sun, 7 Apr 2024 21:33:14 +0200 Subject: Adding upstream version 115.7.0esr. Signed-off-by: Daniel Baumann --- .../libwebrtc/rtc_tools/sanitizers_unittest.cc | 125 +++++++++++++++++++++ 1 file changed, 125 insertions(+) create mode 100644 third_party/libwebrtc/rtc_tools/sanitizers_unittest.cc (limited to 'third_party/libwebrtc/rtc_tools/sanitizers_unittest.cc') diff --git a/third_party/libwebrtc/rtc_tools/sanitizers_unittest.cc b/third_party/libwebrtc/rtc_tools/sanitizers_unittest.cc new file mode 100644 index 0000000000..6404eb296d --- /dev/null +++ b/third_party/libwebrtc/rtc_tools/sanitizers_unittest.cc @@ -0,0 +1,125 @@ +/* + * Copyright (c) 2017 The WebRTC project authors. All Rights Reserved. + * + * Use of this source code is governed by a BSD-style license + * that can be found in the LICENSE file in the root of the source + * tree. An additional intellectual property rights grant can be found + * in the file PATENTS. All contributing project authors may + * be found in the AUTHORS file in the root of the source tree. + */ + +#include +#include + +#include +#include + +#include "rtc_base/checks.h" +#include "rtc_base/null_socket_server.h" +#include "rtc_base/thread.h" +#include "test/gtest.h" + +namespace rtc { + +namespace { + +#if defined(MEMORY_SANITIZER) +void UseOfUninitializedValue() { + int* buf = new int[2]; + std::random_device engine; + if (buf[engine() % 2]) { // Non-deterministic conditional. + printf("Externally visible action."); + } + delete[] buf; +} + +TEST(SanitizersDeathTest, MemorySanitizer) { + EXPECT_DEATH(UseOfUninitializedValue(), "use-of-uninitialized-value"); +} +#endif + +#if defined(ADDRESS_SANITIZER) +void HeapUseAfterFree() { + char* buf = new char[2]; + delete[] buf; + buf[0] = buf[1]; +} + +TEST(SanitizersDeathTest, AddressSanitizer) { + EXPECT_DEATH(HeapUseAfterFree(), "heap-use-after-free"); +} +#endif + +#if defined(UNDEFINED_SANITIZER) +// For ubsan: +void SignedIntegerOverflow() { + int32_t x = 1234567890; + x *= 2; + (void)x; +} + +// For ubsan_vptr: +struct Base { + virtual void f() {} + virtual ~Base() {} +}; +struct Derived : public Base {}; + +void InvalidVptr() { + Base b; + auto* d = static_cast(&b); // Bad downcast. + d->f(); // Virtual function call with object of wrong dynamic type. +} + +TEST(SanitizersDeathTest, UndefinedSanitizer) { + EXPECT_DEATH( + { + SignedIntegerOverflow(); + InvalidVptr(); + }, + "runtime error"); +} +#endif + +#if defined(THREAD_SANITIZER) +class IncrementThread : public Thread { + public: + explicit IncrementThread(int* value) + : Thread(std::make_unique()), value_(value) {} + + IncrementThread(const IncrementThread&) = delete; + IncrementThread& operator=(const IncrementThread&) = delete; + + void Run() override { + ++*value_; + Thread::Current()->SleepMs(100); + } + + // Un-protect Thread::Join for the test. + void Join() { Thread::Join(); } + + private: + int* value_; +}; + +void DataRace() { + int value = 0; + IncrementThread thread1(&value); + IncrementThread thread2(&value); + thread1.Start(); + thread2.Start(); + thread1.Join(); + thread2.Join(); + // TSan seems to mess with gtest's death detection. + // Fail intentionally, and rely on detecting the error message. + RTC_CHECK_NOTREACHED(); +} + +TEST(SanitizersDeathTest, ThreadSanitizer) { + EXPECT_DEATH(DataRace(), "data race"); +} +#endif + +} // namespace + +} // namespace rtc -- cgit v1.2.3