Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(86)

Side by Side Diff: trunk/src/base/tools_sanity_unittest.cc

Issue 288723003: Revert 270383 "Reland https://codereview.chromium.org/276493002:..." (Closed) Base URL: svn://svn.chromium.org/chrome/
Patch Set: Created 6 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 // 4 //
5 // This file contains intentional memory errors, some of which may lead to 5 // This file contains intentional memory errors, some of which may lead to
6 // crashes if the test is ran without special memory testing tools. We use these 6 // crashes if the test is ran without special memory testing tools. We use these
7 // errors to verify the sanity of the tools. 7 // errors to verify the sanity of the tools.
8 8
9 #include "base/atomicops.h" 9 #include "base/atomicops.h"
10 #include "base/message_loop/message_loop.h" 10 #include "base/message_loop/message_loop.h"
(...skipping 82 matching lines...) Expand 10 before | Expand all | Expand 10 after
93 int* volatile leak = new int[256]; // Leak some memory intentionally. 93 int* volatile leak = new int[256]; // Leak some memory intentionally.
94 leak[4] = 1; // Make sure the allocated memory is used. 94 leak[4] = 1; // Make sure the allocated memory is used.
95 } 95 }
96 96
97 #if (defined(ADDRESS_SANITIZER) && defined(OS_IOS)) || defined(SYZYASAN) 97 #if (defined(ADDRESS_SANITIZER) && defined(OS_IOS)) || defined(SYZYASAN)
98 // Because iOS doesn't support death tests, each of the following tests will 98 // Because iOS doesn't support death tests, each of the following tests will
99 // crash the whole program under Asan. On Windows Asan is based on SyzyAsan; the 99 // crash the whole program under Asan. On Windows Asan is based on SyzyAsan; the
100 // error report mechanism is different than with Asan so these tests will fail. 100 // error report mechanism is different than with Asan so these tests will fail.
101 #define MAYBE_AccessesToNewMemory DISABLED_AccessesToNewMemory 101 #define MAYBE_AccessesToNewMemory DISABLED_AccessesToNewMemory
102 #define MAYBE_AccessesToMallocMemory DISABLED_AccessesToMallocMemory 102 #define MAYBE_AccessesToMallocMemory DISABLED_AccessesToMallocMemory
103 #else
104 #define MAYBE_AccessesToNewMemory AccessesToNewMemory
105 #define MAYBE_AccessesToMallocMemory AccessesToMallocMemory
106 #define MAYBE_ArrayDeletedWithoutBraces ArrayDeletedWithoutBraces
107 #define MAYBE_SingleElementDeletedWithBraces SingleElementDeletedWithBraces
108 #endif
109
110 // The following tests pass with Clang r170392, but not r172454, which
111 // makes AddressSanitizer detect errors in them. We disable these tests under
112 // AddressSanitizer until we fully switch to Clang r172454. After that the
113 // tests should be put back under the (defined(OS_IOS) || defined(OS_WIN))
114 // clause above.
115 // See also http://crbug.com/172614.
116 #if defined(ADDRESS_SANITIZER) || defined(SYZYASAN)
103 #define MAYBE_SingleElementDeletedWithBraces \ 117 #define MAYBE_SingleElementDeletedWithBraces \
104 DISABLED_SingleElementDeletedWithBraces 118 DISABLED_SingleElementDeletedWithBraces
105 #define MAYBE_ArrayDeletedWithoutBraces DISABLED_ArrayDeletedWithoutBraces 119 #define MAYBE_ArrayDeletedWithoutBraces DISABLED_ArrayDeletedWithoutBraces
106 #else
107 #define MAYBE_AccessesToNewMemory AccessesToNewMemory
108 #define MAYBE_AccessesToMallocMemory AccessesToMallocMemory
109
110 #if defined(ADDRESS_SANITIZER) && !defined(OS_MACOSX)
111 // AddressSanitizer for OSX doesn't support alloc-dealloc mismatch checks.
112 #define MAYBE_ArrayDeletedWithoutBraces ArrayDeletedWithoutBraces
113 #define MAYBE_SingleElementDeletedWithBraces SingleElementDeletedWithBraces
114 #else
115 #define MAYBE_ArrayDeletedWithoutBraces DISABLED_ArrayDeletedWithoutBraces
116 #define MAYBE_SingleElementDeletedWithBraces \
117 DISABLED_SingleElementDeletedWithBraces
118 #endif 120 #endif
119
120 #endif
121
122 TEST(ToolsSanityTest, MAYBE_AccessesToNewMemory) { 121 TEST(ToolsSanityTest, MAYBE_AccessesToNewMemory) {
123 char *foo = new char[10]; 122 char *foo = new char[10];
124 MakeSomeErrors(foo, 10); 123 MakeSomeErrors(foo, 10);
125 delete [] foo; 124 delete [] foo;
126 // Use after delete. 125 // Use after delete.
127 HARMFUL_ACCESS(foo[5] = 0, "heap-use-after-free"); 126 HARMFUL_ACCESS(foo[5] = 0, "heap-use-after-free");
128 } 127 }
129 128
130 TEST(ToolsSanityTest, MAYBE_AccessesToMallocMemory) { 129 TEST(ToolsSanityTest, MAYBE_AccessesToMallocMemory) {
131 char *foo = reinterpret_cast<char*>(malloc(10)); 130 char *foo = reinterpret_cast<char*>(malloc(10));
132 MakeSomeErrors(foo, 10); 131 MakeSomeErrors(foo, 10);
133 free(foo); 132 free(foo);
134 // Use after free. 133 // Use after free.
135 HARMFUL_ACCESS(foo[5] = 0, "heap-use-after-free"); 134 HARMFUL_ACCESS(foo[5] = 0, "heap-use-after-free");
136 } 135 }
137 136
138 TEST(ToolsSanityTest, MAYBE_ArrayDeletedWithoutBraces) { 137 TEST(ToolsSanityTest, MAYBE_ArrayDeletedWithoutBraces) {
139 #if !defined(ADDRESS_SANITIZER) && !defined(SYZYASAN) 138 #if !defined(ADDRESS_SANITIZER) && !defined(SYZYASAN)
140 // This test may corrupt memory if not run under Valgrind or compiled with 139 // This test may corrupt memory if not run under Valgrind or compiled with
141 // AddressSanitizer. 140 // AddressSanitizer.
142 if (!RunningOnValgrind()) 141 if (!RunningOnValgrind())
143 return; 142 return;
144 #endif 143 #endif
145 144
146 // Without the |volatile|, clang optimizes away the next two lines. 145 // Without the |volatile|, clang optimizes away the next two lines.
147 int* volatile foo = new int[10]; 146 int* volatile foo = new int[10];
148 HARMFUL_ACCESS(delete foo, "alloc-dealloc-mismatch"); 147 delete foo;
149 #if defined(ADDRESS_SANITIZER)
150 // Under ASan the crash happens in the process spawned by HARMFUL_ACCESS,
151 // need to free the memory in the parent.
152 delete [] foo;
153 #endif
154 } 148 }
155 149
156 TEST(ToolsSanityTest, MAYBE_SingleElementDeletedWithBraces) { 150 TEST(ToolsSanityTest, MAYBE_SingleElementDeletedWithBraces) {
157 #if !defined(ADDRESS_SANITIZER) 151 #if !defined(ADDRESS_SANITIZER)
158 // This test may corrupt memory if not run under Valgrind or compiled with 152 // This test may corrupt memory if not run under Valgrind or compiled with
159 // AddressSanitizer. 153 // AddressSanitizer.
160 if (!RunningOnValgrind()) 154 if (!RunningOnValgrind())
161 return; 155 return;
162 #endif 156 #endif
163 157
164 // Without the |volatile|, clang optimizes away the next two lines. 158 // Without the |volatile|, clang optimizes away the next two lines.
165 int* volatile foo = new int; 159 int* volatile foo = new int;
166 (void) foo; 160 (void) foo;
167 HARMFUL_ACCESS(delete [] foo, "alloc-dealloc-mismatch"); 161 delete [] foo;
168 #if defined(ADDRESS_SANITIZER)
169 // Under ASan the crash happens in the child process, need to free the memory
170 // in the parent.
171 delete foo;
172 #endif
173 } 162 }
174 163
175 #if defined(ADDRESS_SANITIZER) || defined(SYZYASAN) 164 #if defined(ADDRESS_SANITIZER) || defined(SYZYASAN)
176 TEST(ToolsSanityTest, DISABLED_AddressSanitizerNullDerefCrashTest) { 165 TEST(ToolsSanityTest, DISABLED_AddressSanitizerNullDerefCrashTest) {
177 // Intentionally crash to make sure AddressSanitizer is running. 166 // Intentionally crash to make sure AddressSanitizer is running.
178 // This test should not be ran on bots. 167 // This test should not be ran on bots.
179 int* volatile zero = NULL; 168 int* volatile zero = NULL;
180 *zero = 0; 169 *zero = 0;
181 } 170 }
182 171
(...skipping 102 matching lines...) Expand 10 before | Expand all | Expand 10 after
285 274
286 TEST(ToolsSanityTest, AtomicsAreIgnored) { 275 TEST(ToolsSanityTest, AtomicsAreIgnored) {
287 base::subtle::Atomic32 shared = 0; 276 base::subtle::Atomic32 shared = 0;
288 ReleaseStoreThread thread1(&shared); 277 ReleaseStoreThread thread1(&shared);
289 AcquireLoadThread thread2(&shared); 278 AcquireLoadThread thread2(&shared);
290 RunInParallel(&thread1, &thread2); 279 RunInParallel(&thread1, &thread2);
291 EXPECT_EQ(kMagicValue, shared); 280 EXPECT_EQ(kMagicValue, shared);
292 } 281 }
293 282
294 } // namespace base 283 } // namespace base
OLDNEW
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698