blob: 81869e36a5115d8a1faa17ace2e9c34a9ff468e0 [file] [log] [blame]
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -07001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Elliott Hughesca3f8e42019-10-28 15:59:38 -070017#pragma once
Elliott Hughes33697a02016-01-26 13:04:57 -080018
Tom Cherryfd7216c2019-11-05 11:31:42 -080019#include <dirent.h>
Elliott Hughes966d8a32017-08-29 11:29:28 -070020#include <dlfcn.h>
Elliott Hughesa7f12942017-12-15 13:55:53 -080021#include <fcntl.h>
Mitch Phillips23f0bef2022-06-23 11:07:00 -070022#include <gtest/gtest.h>
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -070023#include <inttypes.h>
24#include <sys/mman.h>
Evgenii Stepanov53df1f32021-07-12 14:44:02 -070025#include <sys/prctl.h>
Elliott Hughes33697a02016-01-26 13:04:57 -080026#include <sys/types.h>
27#include <sys/wait.h>
Yabin Cui76144aa2015-11-19 13:52:16 -080028#include <unistd.h>
29
Martin Stjernholma2763432020-04-23 16:47:19 +010030#if defined(__BIONIC__)
Evgeny Eltsinb56d1182020-06-08 21:12:56 +020031#include <sys/system_properties.h>
32#endif
33
34#if defined(__BIONIC__)
Peter Collingbourne2528dab2020-03-12 18:29:52 -070035#include <bionic/macros.h>
Martin Stjernholma2763432020-04-23 16:47:19 +010036#else
37#define untag_address(p) p
38#endif
Peter Collingbourne2528dab2020-03-12 18:29:52 -070039
Yabin Cui76144aa2015-11-19 13:52:16 -080040#include <atomic>
41#include <string>
42#include <regex>
43
Elliott Hughes939a7e02015-12-04 15:27:46 -080044#include <android-base/file.h>
Elliott Hughes4af70b42017-11-28 18:02:16 -080045#include <android-base/macros.h>
Tom Cherryb8ab6182017-04-05 16:20:29 -070046#include <android-base/scopeguard.h>
Elliott Hughes939a7e02015-12-04 15:27:46 -080047#include <android-base/stringprintf.h>
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -070048
Dimitry Ivanov35c8e3b2017-02-27 12:17:47 -080049#if defined(__LP64__)
50#define PATH_TO_SYSTEM_LIB "/system/lib64/"
51#else
52#define PATH_TO_SYSTEM_LIB "/system/lib/"
53#endif
54
Elliott Hughes14e3ff92017-10-06 16:58:36 -070055#if defined(__GLIBC__)
56#define BIN_DIR "/bin/"
57#else
58#define BIN_DIR "/system/bin/"
59#endif
60
Josh Gao2f06e102017-01-10 13:00:37 -080061#if defined(__BIONIC__)
62#define KNOWN_FAILURE_ON_BIONIC(x) xfail_ ## x
63#else
64#define KNOWN_FAILURE_ON_BIONIC(x) x
65#endif
66
Elliott Hughes966d8a32017-08-29 11:29:28 -070067// bionic's dlsym doesn't work in static binaries, so we can't access icu,
68// so any unicode test case will fail.
69static inline bool have_dl() {
70 return (dlopen("libc.so", 0) != nullptr);
71}
72
Evgeny Eltsinb56d1182020-06-08 21:12:56 +020073static inline bool running_with_native_bridge() {
74#if defined(__BIONIC__)
Lev Rumyantsev37c5ed32020-09-18 15:09:01 -070075 static const prop_info* pi = __system_property_find("ro.dalvik.vm.isa." ABI_STRING);
Evgeny Eltsinb56d1182020-06-08 21:12:56 +020076 return pi != nullptr;
Evgeny Eltsinb56d1182020-06-08 21:12:56 +020077#endif
78 return false;
79}
80
81#define SKIP_WITH_NATIVE_BRIDGE if (running_with_native_bridge()) GTEST_SKIP()
82
Elliott Hughesffbb0f82016-10-10 18:34:27 -070083#if defined(__linux__)
84
Elliott Hughes3fa758f2017-05-17 17:36:08 -070085#include <sys/sysmacros.h>
86
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -070087struct map_record {
88 uintptr_t addr_start;
89 uintptr_t addr_end;
90
91 int perms;
92
93 size_t offset;
94
95 dev_t device;
96 ino_t inode;
97
98 std::string pathname;
99};
100
101class Maps {
102 public:
103 static bool parse_maps(std::vector<map_record>* maps) {
Elliott Hughesa8384902017-10-03 10:18:58 -0700104 maps->clear();
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -0700105
Elliott Hughesa8384902017-10-03 10:18:58 -0700106 std::unique_ptr<FILE, decltype(&fclose)> fp(fopen("/proc/self/maps", "re"), fclose);
107 if (!fp) return false;
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -0700108
109 char line[BUFSIZ];
Elliott Hughesa8384902017-10-03 10:18:58 -0700110 while (fgets(line, sizeof(line), fp.get()) != nullptr) {
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -0700111 map_record record;
Dmitriy Ivanov1dce3ed2015-04-06 19:05:58 -0700112 uint32_t dev_major, dev_minor;
Elliott Hughes15dfd632015-09-22 16:40:14 -0700113 int path_offset;
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -0700114 char prot[5]; // sizeof("rwxp")
Elliott Hughes15dfd632015-09-22 16:40:14 -0700115 if (sscanf(line, "%" SCNxPTR "-%" SCNxPTR " %4s %" SCNxPTR " %x:%x %lu %n",
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -0700116 &record.addr_start, &record.addr_end, prot, &record.offset,
Elliott Hughes15dfd632015-09-22 16:40:14 -0700117 &dev_major, &dev_minor, &record.inode, &path_offset) == 7) {
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -0700118 record.perms = 0;
119 if (prot[0] == 'r') {
120 record.perms |= PROT_READ;
121 }
122 if (prot[1] == 'w') {
123 record.perms |= PROT_WRITE;
124 }
125 if (prot[2] == 'x') {
126 record.perms |= PROT_EXEC;
127 }
128
129 // TODO: parse shared/private?
130
131 record.device = makedev(dev_major, dev_minor);
Elliott Hughes15dfd632015-09-22 16:40:14 -0700132 record.pathname = line + path_offset;
133 if (!record.pathname.empty() && record.pathname.back() == '\n') {
134 record.pathname.pop_back();
135 }
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -0700136 maps->push_back(record);
137 }
138 }
139
140 return true;
141 }
142};
143
Yabin Cui76144aa2015-11-19 13:52:16 -0800144extern "C" pid_t gettid();
145
Elliott Hughesffbb0f82016-10-10 18:34:27 -0700146#endif
147
Yabin Cui76144aa2015-11-19 13:52:16 -0800148static inline void WaitUntilThreadSleep(std::atomic<pid_t>& tid) {
149 while (tid == 0) {
150 usleep(1000);
151 }
152 std::string filename = android::base::StringPrintf("/proc/%d/stat", tid.load());
153 std::regex regex {R"(\s+S\s+)"};
154
155 while (true) {
156 std::string content;
157 ASSERT_TRUE(android::base::ReadFileToString(filename, &content));
158 if (std::regex_search(content, regex)) {
159 break;
160 }
161 usleep(1000);
162 }
163}
164
Christopher Ferrisd6a1dc22018-02-07 18:42:14 -0800165static inline void AssertChildExited(int pid, int expected_exit_status,
166 const std::string* error_msg = nullptr) {
Elliott Hughes33697a02016-01-26 13:04:57 -0800167 int status;
Christopher Ferrisd6a1dc22018-02-07 18:42:14 -0800168 std::string error;
169 if (error_msg == nullptr) {
170 error_msg = &error;
171 }
172 ASSERT_EQ(pid, TEMP_FAILURE_RETRY(waitpid(pid, &status, 0))) << *error_msg;
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800173 if (expected_exit_status >= 0) {
Christopher Ferrisd6a1dc22018-02-07 18:42:14 -0800174 ASSERT_TRUE(WIFEXITED(status)) << *error_msg;
175 ASSERT_EQ(expected_exit_status, WEXITSTATUS(status)) << *error_msg;
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800176 } else {
Christopher Ferrisd6a1dc22018-02-07 18:42:14 -0800177 ASSERT_TRUE(WIFSIGNALED(status)) << *error_msg;
178 ASSERT_EQ(-expected_exit_status, WTERMSIG(status)) << *error_msg;
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800179 }
Elliott Hughes33697a02016-01-26 13:04:57 -0800180}
181
Elliott Hughesf9cfecf2021-02-04 16:58:13 -0800182static inline bool CloseOnExec(int fd) {
Elliott Hughesa7f12942017-12-15 13:55:53 -0800183 int flags = fcntl(fd, F_GETFD);
Elliott Hughesf9cfecf2021-02-04 16:58:13 -0800184 // This isn't ideal, but the alternatives are worse:
185 // * If we return void and use ASSERT_NE here, we get failures at utils.h:191
186 // rather than in the relevant test.
187 // * If we ignore failures of fcntl(), well, that's obviously a bad idea.
188 if (flags == -1) abort();
189 return flags & FD_CLOEXEC;
Elliott Hughesa7f12942017-12-15 13:55:53 -0800190}
191
Dimitry Ivanov2ba1cf32016-05-17 13:29:37 -0700192// The absolute path to the executable
193const std::string& get_executable_path();
Dimitry Ivanovd17a3772016-03-01 13:11:28 -0800194
Dimitry Ivanov55437462016-07-20 15:33:07 -0700195// Access to argc/argv/envp
196int get_argc();
197char** get_argv();
198char** get_envp();
199
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800200// ExecTestHelper is only used in bionic and glibc tests.
201#ifndef __APPLE__
202class ExecTestHelper {
203 public:
204 char** GetArgs() {
205 return const_cast<char**>(args_.data());
206 }
Elliott Hughes14e3ff92017-10-06 16:58:36 -0700207 const char* GetArg0() {
208 return args_[0];
209 }
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800210 char** GetEnv() {
211 return const_cast<char**>(env_.data());
212 }
Ryan Prichard8f639a42018-10-01 23:10:05 -0700213 const std::string& GetOutput() {
214 return output_;
215 }
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800216
Elliott Hughes5cec3772018-01-19 15:45:23 -0800217 void SetArgs(const std::vector<const char*>& args) {
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800218 args_ = args;
219 }
Elliott Hughes5cec3772018-01-19 15:45:23 -0800220 void SetEnv(const std::vector<const char*>& env) {
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800221 env_ = env;
222 }
223
224 void Run(const std::function<void()>& child_fn, int expected_exit_status,
Elliott Hughes419554e2021-10-01 10:12:15 -0700225 const char* expected_output_regex) {
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800226 int fds[2];
227 ASSERT_NE(pipe(fds), -1);
228
229 pid_t pid = fork();
230 ASSERT_NE(pid, -1);
231
232 if (pid == 0) {
233 // Child.
234 close(fds[0]);
235 dup2(fds[1], STDOUT_FILENO);
236 dup2(fds[1], STDERR_FILENO);
237 if (fds[1] != STDOUT_FILENO && fds[1] != STDERR_FILENO) close(fds[1]);
238 child_fn();
239 FAIL();
240 }
241
242 // Parent.
243 close(fds[1]);
Ryan Prichard8f639a42018-10-01 23:10:05 -0700244 output_.clear();
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800245 char buf[BUFSIZ];
246 ssize_t bytes_read;
247 while ((bytes_read = TEMP_FAILURE_RETRY(read(fds[0], buf, sizeof(buf)))) > 0) {
Ryan Prichard8f639a42018-10-01 23:10:05 -0700248 output_.append(buf, bytes_read);
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800249 }
250 close(fds[0]);
251
Ryan Prichard8f639a42018-10-01 23:10:05 -0700252 std::string error_msg("Test output:\n" + output_);
Christopher Ferrisd6a1dc22018-02-07 18:42:14 -0800253 AssertChildExited(pid, expected_exit_status, &error_msg);
Elliott Hughes419554e2021-10-01 10:12:15 -0700254 if (expected_output_regex != nullptr) {
Steven Moreland4ef83d62021-10-07 00:19:18 +0000255 if (!std::regex_search(output_, std::regex(expected_output_regex))) {
256 FAIL() << "regex " << expected_output_regex << " didn't match " << output_;
257 }
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800258 }
259 }
260
261 private:
262 std::vector<const char*> args_;
263 std::vector<const char*> env_;
Ryan Prichard8f639a42018-10-01 23:10:05 -0700264 std::string output_;
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800265};
Mitch Phillipse6997d52020-11-30 15:04:14 -0800266
267void RunGwpAsanTest(const char* test_name);
Mitch Phillips23f0bef2022-06-23 11:07:00 -0700268void RunSubtestNoEnv(const char* test_name);
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800269#endif
Tom Cherryfd7216c2019-11-05 11:31:42 -0800270
271class FdLeakChecker {
272 public:
273 FdLeakChecker() {
274 }
275
276 ~FdLeakChecker() {
277 size_t end_count = CountOpenFds();
278 EXPECT_EQ(start_count_, end_count);
279 }
280
281 private:
282 static size_t CountOpenFds() {
283 auto fd_dir = std::unique_ptr<DIR, decltype(&closedir)>{ opendir("/proc/self/fd"), closedir };
284 size_t count = 0;
285 dirent* de = nullptr;
286 while ((de = readdir(fd_dir.get())) != nullptr) {
287 if (de->d_type == DT_LNK) {
288 ++count;
289 }
290 }
291 return count;
292 }
293
294 size_t start_count_ = CountOpenFds();
295};
Elliott Hughes7cda75f2020-10-22 13:22:35 -0700296
297// From <benchmark/benchmark.h>.
298template <class Tp>
299static inline void DoNotOptimize(Tp const& value) {
300 asm volatile("" : : "r,m"(value) : "memory");
301}
302template <class Tp>
303static inline void DoNotOptimize(Tp& value) {
304 asm volatile("" : "+r,m"(value) : : "memory");
305}
Evgenii Stepanov53df1f32021-07-12 14:44:02 -0700306
307static inline bool running_with_mte() {
308#ifdef __aarch64__
309 int level = prctl(PR_GET_TAGGED_ADDR_CTRL, 0, 0, 0, 0);
310 return level >= 0 && (level & PR_TAGGED_ADDR_ENABLE) &&
311 (level & PR_MTE_TCF_MASK) != PR_MTE_TCF_NONE;
312#else
313 return false;
314#endif
315}