platform_bionic/tests/utils.h
Christopher Ferris db478a6274 Implement malloc hooks.
Use the malloc debug framework to implement the malloc debug hooks
since it can introduce a performance issue.

Also, modify the bionic/tests/utils.h slightly to dump an error message
when the exe failed.

Bug: 30561479

Test: Ran malloc hook unit tests.
Test: Ran malloc debug unit tests.
Test: Enabled malloc hooks and ran bionic unit tests and verified no
Test: unexpected failures.
Test: Enabled malloc debug and malloc hooks and verified malloc debug wins.
Test: Enabled malloc debug using env, property, and property with name
Test: still works.

Change-Id: Ib50046a0493c5c2050cf831befb812310bdcc249
(cherry picked from commit d6a1dc2379)
2018-02-13 13:37:30 -08:00

236 lines
5.8 KiB
C++

/*
* Copyright (C) 2012 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#ifndef __TEST_UTILS_H
#define __TEST_UTILS_H
#include <dlfcn.h>
#include <fcntl.h>
#include <inttypes.h>
#include <sys/mman.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <unistd.h>
#include <atomic>
#include <string>
#include <regex>
#include <android-base/file.h>
#include <android-base/macros.h>
#include <android-base/scopeguard.h>
#include <android-base/stringprintf.h>
#if defined(__LP64__)
#define PATH_TO_SYSTEM_LIB "/system/lib64/"
#else
#define PATH_TO_SYSTEM_LIB "/system/lib/"
#endif
#if defined(__GLIBC__)
#define BIN_DIR "/bin/"
#else
#define BIN_DIR "/system/bin/"
#endif
#if defined(__BIONIC__)
#define KNOWN_FAILURE_ON_BIONIC(x) xfail_ ## x
#else
#define KNOWN_FAILURE_ON_BIONIC(x) x
#endif
// bionic's dlsym doesn't work in static binaries, so we can't access icu,
// so any unicode test case will fail.
static inline bool have_dl() {
return (dlopen("libc.so", 0) != nullptr);
}
#if defined(__linux__)
#include <sys/sysmacros.h>
struct map_record {
uintptr_t addr_start;
uintptr_t addr_end;
int perms;
size_t offset;
dev_t device;
ino_t inode;
std::string pathname;
};
class Maps {
public:
static bool parse_maps(std::vector<map_record>* maps) {
maps->clear();
std::unique_ptr<FILE, decltype(&fclose)> fp(fopen("/proc/self/maps", "re"), fclose);
if (!fp) return false;
char line[BUFSIZ];
while (fgets(line, sizeof(line), fp.get()) != nullptr) {
map_record record;
uint32_t dev_major, dev_minor;
int path_offset;
char prot[5]; // sizeof("rwxp")
if (sscanf(line, "%" SCNxPTR "-%" SCNxPTR " %4s %" SCNxPTR " %x:%x %lu %n",
&record.addr_start, &record.addr_end, prot, &record.offset,
&dev_major, &dev_minor, &record.inode, &path_offset) == 7) {
record.perms = 0;
if (prot[0] == 'r') {
record.perms |= PROT_READ;
}
if (prot[1] == 'w') {
record.perms |= PROT_WRITE;
}
if (prot[2] == 'x') {
record.perms |= PROT_EXEC;
}
// TODO: parse shared/private?
record.device = makedev(dev_major, dev_minor);
record.pathname = line + path_offset;
if (!record.pathname.empty() && record.pathname.back() == '\n') {
record.pathname.pop_back();
}
maps->push_back(record);
}
}
return true;
}
};
extern "C" pid_t gettid();
#endif
static inline void WaitUntilThreadSleep(std::atomic<pid_t>& tid) {
while (tid == 0) {
usleep(1000);
}
std::string filename = android::base::StringPrintf("/proc/%d/stat", tid.load());
std::regex regex {R"(\s+S\s+)"};
while (true) {
std::string content;
ASSERT_TRUE(android::base::ReadFileToString(filename, &content));
if (std::regex_search(content, regex)) {
break;
}
usleep(1000);
}
}
static inline void AssertChildExited(int pid, int expected_exit_status,
const std::string* error_msg = nullptr) {
int status;
std::string error;
if (error_msg == nullptr) {
error_msg = &error;
}
ASSERT_EQ(pid, TEMP_FAILURE_RETRY(waitpid(pid, &status, 0))) << *error_msg;
if (expected_exit_status >= 0) {
ASSERT_TRUE(WIFEXITED(status)) << *error_msg;
ASSERT_EQ(expected_exit_status, WEXITSTATUS(status)) << *error_msg;
} else {
ASSERT_TRUE(WIFSIGNALED(status)) << *error_msg;
ASSERT_EQ(-expected_exit_status, WTERMSIG(status)) << *error_msg;
}
}
static inline void AssertCloseOnExec(int fd, bool close_on_exec) {
int flags = fcntl(fd, F_GETFD);
ASSERT_NE(flags, -1);
ASSERT_EQ(close_on_exec ? FD_CLOEXEC : 0, flags & FD_CLOEXEC);
}
// The absolute path to the executable
const std::string& get_executable_path();
// Access to argc/argv/envp
int get_argc();
char** get_argv();
char** get_envp();
// ExecTestHelper is only used in bionic and glibc tests.
#ifndef __APPLE__
class ExecTestHelper {
public:
char** GetArgs() {
return const_cast<char**>(args_.data());
}
const char* GetArg0() {
return args_[0];
}
char** GetEnv() {
return const_cast<char**>(env_.data());
}
void SetArgs(const std::vector<const char*>& args) {
args_ = args;
}
void SetEnv(const std::vector<const char*>& env) {
env_ = env;
}
void Run(const std::function<void()>& child_fn, int expected_exit_status,
const char* expected_output) {
int fds[2];
ASSERT_NE(pipe(fds), -1);
pid_t pid = fork();
ASSERT_NE(pid, -1);
if (pid == 0) {
// Child.
close(fds[0]);
dup2(fds[1], STDOUT_FILENO);
dup2(fds[1], STDERR_FILENO);
if (fds[1] != STDOUT_FILENO && fds[1] != STDERR_FILENO) close(fds[1]);
child_fn();
FAIL();
}
// Parent.
close(fds[1]);
std::string output;
char buf[BUFSIZ];
ssize_t bytes_read;
while ((bytes_read = TEMP_FAILURE_RETRY(read(fds[0], buf, sizeof(buf)))) > 0) {
output.append(buf, bytes_read);
}
close(fds[0]);
std::string error_msg("Test output:\n" + output);
AssertChildExited(pid, expected_exit_status, &error_msg);
if (expected_output != nullptr) {
ASSERT_EQ(expected_output, output);
}
}
private:
std::vector<const char*> args_;
std::vector<const char*> env_;
};
#endif
#endif