| Index: base/debug/asan_invalid_access.h
|
| diff --git a/base/debug/asan_invalid_access.h b/base/debug/asan_invalid_access.h
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..eee7dcbed73c80c32e34191e45a65ecb7a3f623e
|
| --- /dev/null
|
| +++ b/base/debug/asan_invalid_access.h
|
| @@ -0,0 +1,46 @@
|
| +// Copyright 2014 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +//
|
| +// Defines some functions that intentionally do an invalid memory access in
|
| +// order to trigger an AddressSanitizer (ASan) error report.
|
| +
|
| +#ifndef BASE_DEBUG_ASAN_INVALID_ACCESS_H_
|
| +#define BASE_DEBUG_ASAN_INVALID_ACCESS_H_
|
| +
|
| +#include "base/compiler_specific.h"
|
| +
|
| +namespace base {
|
| +namespace debug {
|
| +
|
| +#if defined(ADDRESS_SANITIZER) || defined(SYZYASAN)
|
| +
|
| +// Generates an heap buffer overflow.
|
| +NOINLINE void AsanHeapOverflow();
|
| +
|
| +// Generates an heap buffer underflow.
|
| +NOINLINE void AsanHeapUnderflow();
|
| +
|
| +// Generates an use after free.
|
| +NOINLINE void AsanHeapUseAfterFree();
|
| +
|
| +#endif // ADDRESS_SANITIZER || SYZYASAN
|
| +
|
| +// The "corrupt-block" and "corrupt-heap" classes of bugs is specific to
|
| +// SyzyASan.
|
| +#if defined(SYZYASAN)
|
| +
|
| +// Corrupts a memory block and makes sure that the corruption gets detected when
|
| +// we try to free this block.
|
| +NOINLINE void AsanCorruptHeapBlock();
|
| +
|
| +// Corrupts the heap and makes sure that the corruption gets detected when a
|
| +// crash occur.
|
| +NOINLINE void AsanCorruptHeap();
|
| +
|
| +#endif // SYZYASAN
|
| +
|
| +} // namespace debug
|
| +} // namespace base
|
| +
|
| +#endif // BASE_DEBUG_ASAN_INVALID_ACCESS_H_
|
|
|