/* * Copyright (C) 2012 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #pragma once #include #include #include #include #include #include #include #include #include #include #if defined(__BIONIC__) #include #endif #if defined(__BIONIC__) #include #else #define untag_address(p) p #endif #include #include #include #include #include #include #include #if defined(__LP64__) #define PATH_TO_SYSTEM_LIB "/system/lib64/" #else #define PATH_TO_SYSTEM_LIB "/system/lib/" #endif #if defined(__GLIBC__) #define BIN_DIR "/bin/" #else #define BIN_DIR "/system/bin/" #endif #if defined(__BIONIC__) #define KNOWN_FAILURE_ON_BIONIC(x) xfail_ ## x #else #define KNOWN_FAILURE_ON_BIONIC(x) x #endif // bionic's dlsym doesn't work in static binaries, so we can't access icu, // so any unicode test case will fail. static inline bool have_dl() { return (dlopen("libc.so", 0) != nullptr); } static inline bool running_with_native_bridge() { #if defined(__BIONIC__) static const prop_info* pi = __system_property_find("ro.dalvik.vm.isa." ABI_STRING); return pi != nullptr; #endif return false; } #define SKIP_WITH_NATIVE_BRIDGE if (running_with_native_bridge()) GTEST_SKIP() #if defined(__linux__) #include struct map_record { uintptr_t addr_start; uintptr_t addr_end; int perms; size_t offset; dev_t device; ino_t inode; std::string pathname; }; class Maps { public: static bool parse_maps(std::vector* maps) { maps->clear(); std::unique_ptr fp(fopen("/proc/self/maps", "re"), fclose); if (!fp) return false; char line[BUFSIZ]; while (fgets(line, sizeof(line), fp.get()) != nullptr) { map_record record; uint32_t dev_major, dev_minor; int path_offset; char prot[5]; // sizeof("rwxp") if (sscanf(line, "%" SCNxPTR "-%" SCNxPTR " %4s %" SCNxPTR " %x:%x %lu %n", &record.addr_start, &record.addr_end, prot, &record.offset, &dev_major, &dev_minor, &record.inode, &path_offset) == 7) { record.perms = 0; if (prot[0] == 'r') { record.perms |= PROT_READ; } if (prot[1] == 'w') { record.perms |= PROT_WRITE; } if (prot[2] == 'x') { record.perms |= PROT_EXEC; } // TODO: parse shared/private? record.device = makedev(dev_major, dev_minor); record.pathname = line + path_offset; if (!record.pathname.empty() && record.pathname.back() == '\n') { record.pathname.pop_back(); } maps->push_back(record); } } return true; } }; extern "C" pid_t gettid(); #endif static inline void WaitUntilThreadSleep(std::atomic& tid) { while (tid == 0) { usleep(1000); } std::string filename = android::base::StringPrintf("/proc/%d/stat", tid.load()); std::regex regex {R"(\s+S\s+)"}; while (true) { std::string content; ASSERT_TRUE(android::base::ReadFileToString(filename, &content)); if (std::regex_search(content, regex)) { break; } usleep(1000); } } static inline void AssertChildExited(int pid, int expected_exit_status, const std::string* error_msg = nullptr) { int status; std::string error; if (error_msg == nullptr) { error_msg = &error; } ASSERT_EQ(pid, TEMP_FAILURE_RETRY(waitpid(pid, &status, 0))) << *error_msg; if (expected_exit_status >= 0) { ASSERT_TRUE(WIFEXITED(status)) << *error_msg; ASSERT_EQ(expected_exit_status, WEXITSTATUS(status)) << *error_msg; } else { ASSERT_TRUE(WIFSIGNALED(status)) << *error_msg; ASSERT_EQ(-expected_exit_status, WTERMSIG(status)) << *error_msg; } } static inline bool CloseOnExec(int fd) { int flags = fcntl(fd, F_GETFD); // This isn't ideal, but the alternatives are worse: // * If we return void and use ASSERT_NE here, we get failures at utils.h:191 // rather than in the relevant test. // * If we ignore failures of fcntl(), well, that's obviously a bad idea. if (flags == -1) abort(); return flags & FD_CLOEXEC; } // The absolute path to the executable const std::string& get_executable_path(); // Access to argc/argv/envp int get_argc(); char** get_argv(); char** get_envp(); // ExecTestHelper is only used in bionic and glibc tests. #ifndef __APPLE__ class ExecTestHelper { public: char** GetArgs() { return const_cast(args_.data()); } const char* GetArg0() { return args_[0]; } char** GetEnv() { return const_cast(env_.data()); } const std::string& GetOutput() { return output_; } void SetArgs(const std::vector& args) { args_ = args; } void SetEnv(const std::vector& env) { env_ = env; } void Run(const std::function& child_fn, int expected_exit_status, const char* expected_output_regex) { int fds[2]; ASSERT_NE(pipe(fds), -1); pid_t pid = fork(); ASSERT_NE(pid, -1); if (pid == 0) { // Child. close(fds[0]); dup2(fds[1], STDOUT_FILENO); dup2(fds[1], STDERR_FILENO); if (fds[1] != STDOUT_FILENO && fds[1] != STDERR_FILENO) close(fds[1]); child_fn(); FAIL(); } // Parent. close(fds[1]); output_.clear(); char buf[BUFSIZ]; ssize_t bytes_read; while ((bytes_read = TEMP_FAILURE_RETRY(read(fds[0], buf, sizeof(buf)))) > 0) { output_.append(buf, bytes_read); } close(fds[0]); std::string error_msg("Test output:\n" + output_); AssertChildExited(pid, expected_exit_status, &error_msg); if (expected_output_regex != nullptr) { if (!std::regex_search(output_, std::regex(expected_output_regex))) { FAIL() << "regex " << expected_output_regex << " didn't match " << output_; } } } private: std::vector args_; std::vector env_; std::string output_; }; void RunGwpAsanTest(const char* test_name); void RunSubtestNoEnv(const char* test_name); #endif class FdLeakChecker { public: FdLeakChecker() { } ~FdLeakChecker() { size_t end_count = CountOpenFds(); EXPECT_EQ(start_count_, end_count); } private: static size_t CountOpenFds() { auto fd_dir = std::unique_ptr{ opendir("/proc/self/fd"), closedir }; size_t count = 0; dirent* de = nullptr; while ((de = readdir(fd_dir.get())) != nullptr) { if (de->d_type == DT_LNK) { ++count; } } return count; } size_t start_count_ = CountOpenFds(); }; // From . template static inline void DoNotOptimize(Tp const& value) { asm volatile("" : : "r,m"(value) : "memory"); } template static inline void DoNotOptimize(Tp& value) { asm volatile("" : "+r,m"(value) : : "memory"); } static inline bool running_with_mte() { #ifdef __aarch64__ int level = prctl(PR_GET_TAGGED_ADDR_CTRL, 0, 0, 0, 0); return level >= 0 && (level & PR_TAGGED_ADDR_ENABLE) && (level & PR_MTE_TCF_MASK) != PR_MTE_TCF_NONE; #else return false; #endif } bool IsLowRamDevice(); int64_t NanoTime(); class Errno { public: Errno(int e) : errno_(e) {} int errno_; }; void PrintTo(const Errno& e, std::ostream* os); bool operator==(const Errno& lhs, const Errno& rhs); #define ASSERT_ERRNO(expected_errno) ASSERT_EQ(Errno(expected_errno), Errno(errno)) #define EXPECT_ERRNO(expected_errno) EXPECT_EQ(Errno(expected_errno), Errno(errno))