blob: 72214c2b99ad8a157d55fd82fb6a799d8c83a430 [file] [log] [blame]
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -07001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Elliott Hughesca3f8e42019-10-28 15:59:38 -070017#pragma once
Elliott Hughes33697a02016-01-26 13:04:57 -080018
Tom Cherryfd7216c2019-11-05 11:31:42 -080019#include <dirent.h>
Elliott Hughes966d8a32017-08-29 11:29:28 -070020#include <dlfcn.h>
Elliott Hughesa7f12942017-12-15 13:55:53 -080021#include <fcntl.h>
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -070022#include <inttypes.h>
23#include <sys/mman.h>
Evgenii Stepanov53df1f32021-07-12 14:44:02 -070024#include <sys/prctl.h>
Elliott Hughes33697a02016-01-26 13:04:57 -080025#include <sys/types.h>
26#include <sys/wait.h>
Yabin Cui76144aa2015-11-19 13:52:16 -080027#include <unistd.h>
28
Martin Stjernholma2763432020-04-23 16:47:19 +010029#if defined(__BIONIC__)
Evgeny Eltsinb56d1182020-06-08 21:12:56 +020030#include <sys/system_properties.h>
31#endif
32
33#if defined(__BIONIC__)
Peter Collingbourne2528dab2020-03-12 18:29:52 -070034#include <bionic/macros.h>
Martin Stjernholma2763432020-04-23 16:47:19 +010035#else
36#define untag_address(p) p
37#endif
Peter Collingbourne2528dab2020-03-12 18:29:52 -070038
Yabin Cui76144aa2015-11-19 13:52:16 -080039#include <atomic>
40#include <string>
41#include <regex>
42
Elliott Hughes939a7e02015-12-04 15:27:46 -080043#include <android-base/file.h>
Elliott Hughes4af70b42017-11-28 18:02:16 -080044#include <android-base/macros.h>
Tom Cherryb8ab6182017-04-05 16:20:29 -070045#include <android-base/scopeguard.h>
Elliott Hughes939a7e02015-12-04 15:27:46 -080046#include <android-base/stringprintf.h>
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -070047
Dimitry Ivanov35c8e3b2017-02-27 12:17:47 -080048#if defined(__LP64__)
49#define PATH_TO_SYSTEM_LIB "/system/lib64/"
50#else
51#define PATH_TO_SYSTEM_LIB "/system/lib/"
52#endif
53
Elliott Hughes14e3ff92017-10-06 16:58:36 -070054#if defined(__GLIBC__)
55#define BIN_DIR "/bin/"
56#else
57#define BIN_DIR "/system/bin/"
58#endif
59
Josh Gao2f06e102017-01-10 13:00:37 -080060#if defined(__BIONIC__)
61#define KNOWN_FAILURE_ON_BIONIC(x) xfail_ ## x
62#else
63#define KNOWN_FAILURE_ON_BIONIC(x) x
64#endif
65
Elliott Hughes966d8a32017-08-29 11:29:28 -070066// bionic's dlsym doesn't work in static binaries, so we can't access icu,
67// so any unicode test case will fail.
68static inline bool have_dl() {
69 return (dlopen("libc.so", 0) != nullptr);
70}
71
Evgeny Eltsinb56d1182020-06-08 21:12:56 +020072static inline bool running_with_native_bridge() {
73#if defined(__BIONIC__)
Lev Rumyantsev37c5ed32020-09-18 15:09:01 -070074 static const prop_info* pi = __system_property_find("ro.dalvik.vm.isa." ABI_STRING);
Evgeny Eltsinb56d1182020-06-08 21:12:56 +020075 return pi != nullptr;
Evgeny Eltsinb56d1182020-06-08 21:12:56 +020076#endif
77 return false;
78}
79
80#define SKIP_WITH_NATIVE_BRIDGE if (running_with_native_bridge()) GTEST_SKIP()
81
Elliott Hughesffbb0f82016-10-10 18:34:27 -070082#if defined(__linux__)
83
Elliott Hughes3fa758f2017-05-17 17:36:08 -070084#include <sys/sysmacros.h>
85
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -070086struct map_record {
87 uintptr_t addr_start;
88 uintptr_t addr_end;
89
90 int perms;
91
92 size_t offset;
93
94 dev_t device;
95 ino_t inode;
96
97 std::string pathname;
98};
99
100class Maps {
101 public:
102 static bool parse_maps(std::vector<map_record>* maps) {
Elliott Hughesa8384902017-10-03 10:18:58 -0700103 maps->clear();
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -0700104
Elliott Hughesa8384902017-10-03 10:18:58 -0700105 std::unique_ptr<FILE, decltype(&fclose)> fp(fopen("/proc/self/maps", "re"), fclose);
106 if (!fp) return false;
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -0700107
108 char line[BUFSIZ];
Elliott Hughesa8384902017-10-03 10:18:58 -0700109 while (fgets(line, sizeof(line), fp.get()) != nullptr) {
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -0700110 map_record record;
Dmitriy Ivanov1dce3ed2015-04-06 19:05:58 -0700111 uint32_t dev_major, dev_minor;
Elliott Hughes15dfd632015-09-22 16:40:14 -0700112 int path_offset;
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -0700113 char prot[5]; // sizeof("rwxp")
Elliott Hughes15dfd632015-09-22 16:40:14 -0700114 if (sscanf(line, "%" SCNxPTR "-%" SCNxPTR " %4s %" SCNxPTR " %x:%x %lu %n",
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -0700115 &record.addr_start, &record.addr_end, prot, &record.offset,
Elliott Hughes15dfd632015-09-22 16:40:14 -0700116 &dev_major, &dev_minor, &record.inode, &path_offset) == 7) {
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -0700117 record.perms = 0;
118 if (prot[0] == 'r') {
119 record.perms |= PROT_READ;
120 }
121 if (prot[1] == 'w') {
122 record.perms |= PROT_WRITE;
123 }
124 if (prot[2] == 'x') {
125 record.perms |= PROT_EXEC;
126 }
127
128 // TODO: parse shared/private?
129
130 record.device = makedev(dev_major, dev_minor);
Elliott Hughes15dfd632015-09-22 16:40:14 -0700131 record.pathname = line + path_offset;
132 if (!record.pathname.empty() && record.pathname.back() == '\n') {
133 record.pathname.pop_back();
134 }
Dmitriy Ivanovaae859c2015-03-31 11:14:03 -0700135 maps->push_back(record);
136 }
137 }
138
139 return true;
140 }
141};
142
Yabin Cui76144aa2015-11-19 13:52:16 -0800143extern "C" pid_t gettid();
144
Elliott Hughesffbb0f82016-10-10 18:34:27 -0700145#endif
146
Yabin Cui76144aa2015-11-19 13:52:16 -0800147static inline void WaitUntilThreadSleep(std::atomic<pid_t>& tid) {
148 while (tid == 0) {
149 usleep(1000);
150 }
151 std::string filename = android::base::StringPrintf("/proc/%d/stat", tid.load());
152 std::regex regex {R"(\s+S\s+)"};
153
154 while (true) {
155 std::string content;
156 ASSERT_TRUE(android::base::ReadFileToString(filename, &content));
157 if (std::regex_search(content, regex)) {
158 break;
159 }
160 usleep(1000);
161 }
162}
163
Christopher Ferrisd6a1dc22018-02-07 18:42:14 -0800164static inline void AssertChildExited(int pid, int expected_exit_status,
165 const std::string* error_msg = nullptr) {
Elliott Hughes33697a02016-01-26 13:04:57 -0800166 int status;
Christopher Ferrisd6a1dc22018-02-07 18:42:14 -0800167 std::string error;
168 if (error_msg == nullptr) {
169 error_msg = &error;
170 }
171 ASSERT_EQ(pid, TEMP_FAILURE_RETRY(waitpid(pid, &status, 0))) << *error_msg;
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800172 if (expected_exit_status >= 0) {
Christopher Ferrisd6a1dc22018-02-07 18:42:14 -0800173 ASSERT_TRUE(WIFEXITED(status)) << *error_msg;
174 ASSERT_EQ(expected_exit_status, WEXITSTATUS(status)) << *error_msg;
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800175 } else {
Christopher Ferrisd6a1dc22018-02-07 18:42:14 -0800176 ASSERT_TRUE(WIFSIGNALED(status)) << *error_msg;
177 ASSERT_EQ(-expected_exit_status, WTERMSIG(status)) << *error_msg;
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800178 }
Elliott Hughes33697a02016-01-26 13:04:57 -0800179}
180
Elliott Hughesf9cfecf2021-02-04 16:58:13 -0800181static inline bool CloseOnExec(int fd) {
Elliott Hughesa7f12942017-12-15 13:55:53 -0800182 int flags = fcntl(fd, F_GETFD);
Elliott Hughesf9cfecf2021-02-04 16:58:13 -0800183 // This isn't ideal, but the alternatives are worse:
184 // * If we return void and use ASSERT_NE here, we get failures at utils.h:191
185 // rather than in the relevant test.
186 // * If we ignore failures of fcntl(), well, that's obviously a bad idea.
187 if (flags == -1) abort();
188 return flags & FD_CLOEXEC;
Elliott Hughesa7f12942017-12-15 13:55:53 -0800189}
190
Dimitry Ivanov2ba1cf32016-05-17 13:29:37 -0700191// The absolute path to the executable
192const std::string& get_executable_path();
Dimitry Ivanovd17a3772016-03-01 13:11:28 -0800193
Dimitry Ivanov55437462016-07-20 15:33:07 -0700194// Access to argc/argv/envp
195int get_argc();
196char** get_argv();
197char** get_envp();
198
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800199// ExecTestHelper is only used in bionic and glibc tests.
200#ifndef __APPLE__
201class ExecTestHelper {
202 public:
203 char** GetArgs() {
204 return const_cast<char**>(args_.data());
205 }
Elliott Hughes14e3ff92017-10-06 16:58:36 -0700206 const char* GetArg0() {
207 return args_[0];
208 }
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800209 char** GetEnv() {
210 return const_cast<char**>(env_.data());
211 }
Ryan Prichard8f639a42018-10-01 23:10:05 -0700212 const std::string& GetOutput() {
213 return output_;
214 }
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800215
Elliott Hughes5cec3772018-01-19 15:45:23 -0800216 void SetArgs(const std::vector<const char*>& args) {
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800217 args_ = args;
218 }
Elliott Hughes5cec3772018-01-19 15:45:23 -0800219 void SetEnv(const std::vector<const char*>& env) {
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800220 env_ = env;
221 }
222
223 void Run(const std::function<void()>& child_fn, int expected_exit_status,
Elliott Hughes419554e2021-10-01 10:12:15 -0700224 const char* expected_output_regex) {
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800225 int fds[2];
226 ASSERT_NE(pipe(fds), -1);
227
228 pid_t pid = fork();
229 ASSERT_NE(pid, -1);
230
231 if (pid == 0) {
232 // Child.
233 close(fds[0]);
234 dup2(fds[1], STDOUT_FILENO);
235 dup2(fds[1], STDERR_FILENO);
236 if (fds[1] != STDOUT_FILENO && fds[1] != STDERR_FILENO) close(fds[1]);
237 child_fn();
238 FAIL();
239 }
240
241 // Parent.
242 close(fds[1]);
Ryan Prichard8f639a42018-10-01 23:10:05 -0700243 output_.clear();
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800244 char buf[BUFSIZ];
245 ssize_t bytes_read;
246 while ((bytes_read = TEMP_FAILURE_RETRY(read(fds[0], buf, sizeof(buf)))) > 0) {
Ryan Prichard8f639a42018-10-01 23:10:05 -0700247 output_.append(buf, bytes_read);
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800248 }
249 close(fds[0]);
250
Ryan Prichard8f639a42018-10-01 23:10:05 -0700251 std::string error_msg("Test output:\n" + output_);
Christopher Ferrisd6a1dc22018-02-07 18:42:14 -0800252 AssertChildExited(pid, expected_exit_status, &error_msg);
Elliott Hughes419554e2021-10-01 10:12:15 -0700253 if (expected_output_regex != nullptr) {
Steven Moreland4ef83d62021-10-07 00:19:18 +0000254 if (!std::regex_search(output_, std::regex(expected_output_regex))) {
255 FAIL() << "regex " << expected_output_regex << " didn't match " << output_;
256 }
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800257 }
258 }
259
260 private:
261 std::vector<const char*> args_;
262 std::vector<const char*> env_;
Ryan Prichard8f639a42018-10-01 23:10:05 -0700263 std::string output_;
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800264};
Mitch Phillipse6997d52020-11-30 15:04:14 -0800265
266void RunGwpAsanTest(const char* test_name);
Evgenii Stepanov68ecec12017-01-31 13:19:30 -0800267#endif
Tom Cherryfd7216c2019-11-05 11:31:42 -0800268
269class FdLeakChecker {
270 public:
271 FdLeakChecker() {
272 }
273
274 ~FdLeakChecker() {
275 size_t end_count = CountOpenFds();
276 EXPECT_EQ(start_count_, end_count);
277 }
278
279 private:
280 static size_t CountOpenFds() {
281 auto fd_dir = std::unique_ptr<DIR, decltype(&closedir)>{ opendir("/proc/self/fd"), closedir };
282 size_t count = 0;
283 dirent* de = nullptr;
284 while ((de = readdir(fd_dir.get())) != nullptr) {
285 if (de->d_type == DT_LNK) {
286 ++count;
287 }
288 }
289 return count;
290 }
291
292 size_t start_count_ = CountOpenFds();
293};
Elliott Hughes7cda75f2020-10-22 13:22:35 -0700294
295// From <benchmark/benchmark.h>.
296template <class Tp>
297static inline void DoNotOptimize(Tp const& value) {
298 asm volatile("" : : "r,m"(value) : "memory");
299}
300template <class Tp>
301static inline void DoNotOptimize(Tp& value) {
302 asm volatile("" : "+r,m"(value) : : "memory");
303}
Evgenii Stepanov53df1f32021-07-12 14:44:02 -0700304
305static inline bool running_with_mte() {
306#ifdef __aarch64__
307 int level = prctl(PR_GET_TAGGED_ADDR_CTRL, 0, 0, 0, 0);
308 return level >= 0 && (level & PR_TAGGED_ADDR_ENABLE) &&
309 (level & PR_MTE_TCF_MASK) != PR_MTE_TCF_NONE;
310#else
311 return false;
312#endif
313}