asan_invalid_access.h 1.34 KB
Newer Older
gejun's avatar
gejun committed
1 2 3 4 5 6 7
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
//
// Defines some functions that intentionally do an invalid memory access in
// order to trigger an AddressSanitizer (ASan) error report.

8 9
#ifndef BUTIL_DEBUG_ASAN_INVALID_ACCESS_H_
#define BUTIL_DEBUG_ASAN_INVALID_ACCESS_H_
gejun's avatar
gejun committed
10

11 12
#include "butil/base_export.h"
#include "butil/compiler_specific.h"
gejun's avatar
gejun committed
13

14
namespace butil {
gejun's avatar
gejun committed
15 16 17 18 19
namespace debug {

#if defined(ADDRESS_SANITIZER) || defined(SYZYASAN)

// Generates an heap buffer overflow.
20
BUTIL_EXPORT NOINLINE void AsanHeapOverflow();
gejun's avatar
gejun committed
21 22

// Generates an heap buffer underflow.
23
BUTIL_EXPORT NOINLINE void AsanHeapUnderflow();
gejun's avatar
gejun committed
24 25

// Generates an use after free.
26
BUTIL_EXPORT NOINLINE void AsanHeapUseAfterFree();
gejun's avatar
gejun committed
27 28 29 30 31 32 33 34 35

#endif  // ADDRESS_SANITIZER || SYZYASAN

// The "corrupt-block" and "corrupt-heap" classes of bugs is specific to
// SyzyASan.
#if defined(SYZYASAN)

// Corrupts a memory block and makes sure that the corruption gets detected when
// we try to free this block.
36
BUTIL_EXPORT NOINLINE void AsanCorruptHeapBlock();
gejun's avatar
gejun committed
37 38 39

// Corrupts the heap and makes sure that the corruption gets detected when a
// crash occur.
40
BUTIL_EXPORT NOINLINE void AsanCorruptHeap();
gejun's avatar
gejun committed
41 42 43 44

#endif  // SYZYASAN

}  // namespace debug
45
}  // namespace butil
gejun's avatar
gejun committed
46

47
#endif  // BUTIL_DEBUG_ASAN_INVALID_ACCESS_H_