summaryrefslogtreecommitdiff
path: root/chromium/v8/src/sandbox/testing.h
blob: c9ac6fc474676ce2738480dd3f398c8dde6e64dd (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
// Copyright 2022 the V8 project authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#ifndef V8_SANDBOX_TESTING_H_
#define V8_SANDBOX_TESTING_H_

#include "src/common/globals.h"

namespace v8 {
namespace internal {

#ifdef V8_ENABLE_SANDBOX

class SandboxTesting {
 public:
#ifdef V8_EXPOSE_MEMORY_CORRUPTION_API
  // A JavaScript API that emulates typical exploit primitives.
  //
  // This can be used for testing the sandbox, for example to write regression
  // tests for bugs in the sandbox or to develop fuzzers.
  V8_EXPORT_PRIVATE static void InstallMemoryCorruptionApi(Isolate* isolate);
#endif  // V8_EXPOSE_MEMORY_CORRUPTION_API

  // A signal handler that filters out "harmless" (for the sandbox) crashes.
  //
  // If an access violation (i.e. a SIGSEGV or SIGBUS) happens inside the
  // sandbox address space it is considered harmless for the sandbox and so the
  // process is simply terminated through _exit. On the other hand, an access
  // violation outside the sandbox address space indicates a security issue with
  // the sandbox. In that case, the signal is forwarded to the original signal
  // handler which will report the violation appropriately.
  // Currently supported on Linux only.
  V8_EXPORT_PRIVATE static void InstallSandboxCrashFilter();
};

#endif  // V8_ENABLE_SANDBOX

}  // namespace internal
}  // namespace v8

#endif  // V8_SANDBOX_TESTING_H_