442 lines
15 KiB
C++
442 lines
15 KiB
C++
// Copyright 2011 The Chromium Authors
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include <stddef.h>
|
|
|
|
#include <limits>
|
|
#include <sstream>
|
|
#include <string>
|
|
|
|
#include "base/debug/debugging_buildflags.h"
|
|
#include "base/debug/stack_trace.h"
|
|
#include "base/logging.h"
|
|
#include "base/process/kill.h"
|
|
#include "base/process/process_handle.h"
|
|
#include "base/profiler/stack_buffer.h"
|
|
#include "base/profiler/stack_copier.h"
|
|
#include "base/test/test_timeouts.h"
|
|
#include "build/build_config.h"
|
|
#include "testing/gtest/include/gtest/gtest.h"
|
|
#include "testing/multiprocess_func_list.h"
|
|
|
|
#if BUILDFLAG(IS_POSIX) && !BUILDFLAG(IS_ANDROID) && !BUILDFLAG(IS_IOS)
|
|
#include "base/test/multiprocess_test.h"
|
|
#endif
|
|
|
|
namespace base {
|
|
namespace debug {
|
|
|
|
#if BUILDFLAG(IS_POSIX) && !BUILDFLAG(IS_ANDROID) && !BUILDFLAG(IS_IOS)
|
|
typedef MultiProcessTest StackTraceTest;
|
|
#else
|
|
typedef testing::Test StackTraceTest;
|
|
#endif
|
|
|
|
#if !defined(__UCLIBC__) && !defined(_AIX)
|
|
// StackTrace::OutputToStream() is not implemented under uclibc, nor AIX.
|
|
// See https://crbug.com/706728
|
|
|
|
TEST_F(StackTraceTest, OutputToStream) {
|
|
StackTrace trace;
|
|
|
|
// Dump the trace into a string.
|
|
std::ostringstream os;
|
|
trace.OutputToStream(&os);
|
|
std::string backtrace_message = os.str();
|
|
|
|
// ToString() should produce the same output.
|
|
EXPECT_EQ(backtrace_message, trace.ToString());
|
|
|
|
size_t frames_found = 0;
|
|
const void* const* addresses = trace.Addresses(&frames_found);
|
|
|
|
#if defined(OFFICIAL_BUILD) && \
|
|
((BUILDFLAG(IS_POSIX) && !BUILDFLAG(IS_APPLE)) || BUILDFLAG(IS_FUCHSIA))
|
|
// Stack traces require an extra data table that bloats our binaries,
|
|
// so they're turned off for official builds. Stop the test here, so
|
|
// it at least verifies that StackTrace calls don't crash.
|
|
return;
|
|
#endif // defined(OFFICIAL_BUILD) &&
|
|
// ((BUILDFLAG(IS_POSIX) && !BUILDFLAG(IS_APPLE)) ||
|
|
// BUILDFLAG(IS_FUCHSIA))
|
|
|
|
ASSERT_TRUE(addresses);
|
|
ASSERT_GT(frames_found, 5u) << "Too few frames found.";
|
|
|
|
if (!StackTrace::WillSymbolizeToStreamForTesting())
|
|
return;
|
|
|
|
// Check if the output has symbol initialization warning. If it does, fail.
|
|
ASSERT_EQ(backtrace_message.find("Dumping unresolved backtrace"),
|
|
std::string::npos)
|
|
<< "Unable to resolve symbols.";
|
|
|
|
// Expect a demangled symbol.
|
|
// Note that Windows Release builds omit the function parameters from the
|
|
// demangled stack output, otherwise this could be "testing::UnitTest::Run()".
|
|
EXPECT_TRUE(backtrace_message.find("testing::UnitTest::Run") !=
|
|
std::string::npos)
|
|
<< "Expected a demangled symbol in backtrace:\n"
|
|
<< backtrace_message;
|
|
|
|
// Expect to at least find main.
|
|
EXPECT_TRUE(backtrace_message.find("main") != std::string::npos)
|
|
<< "Expected to find main in backtrace:\n"
|
|
<< backtrace_message;
|
|
|
|
// Expect to find this function as well.
|
|
// Note: This will fail if not linked with -rdynamic (aka -export_dynamic)
|
|
EXPECT_TRUE(backtrace_message.find(__func__) != std::string::npos)
|
|
<< "Expected to find " << __func__ << " in backtrace:\n"
|
|
<< backtrace_message;
|
|
}
|
|
|
|
#if !defined(OFFICIAL_BUILD) && !defined(NO_UNWIND_TABLES)
|
|
// Disabled in Official builds, where Link-Time Optimization can result in two
|
|
// or fewer stack frames being available, causing the test to fail.
|
|
TEST_F(StackTraceTest, TruncatedTrace) {
|
|
StackTrace trace;
|
|
|
|
size_t count = 0;
|
|
trace.Addresses(&count);
|
|
ASSERT_LT(2u, count);
|
|
|
|
StackTrace truncated(2);
|
|
truncated.Addresses(&count);
|
|
EXPECT_EQ(2u, count);
|
|
}
|
|
#endif // !defined(OFFICIAL_BUILD) && !defined(NO_UNWIND_TABLES)
|
|
|
|
// The test is used for manual testing, e.g., to see the raw output.
|
|
TEST_F(StackTraceTest, DebugOutputToStream) {
|
|
StackTrace trace;
|
|
std::ostringstream os;
|
|
trace.OutputToStream(&os);
|
|
VLOG(1) << os.str();
|
|
}
|
|
|
|
// The test is used for manual testing, e.g., to see the raw output.
|
|
TEST_F(StackTraceTest, DebugPrintBacktrace) {
|
|
StackTrace().Print();
|
|
}
|
|
|
|
// The test is used for manual testing, e.g., to see the raw output.
|
|
TEST_F(StackTraceTest, DebugPrintWithPrefixBacktrace) {
|
|
StackTrace().PrintWithPrefix("[test]");
|
|
}
|
|
|
|
// Make sure nullptr prefix doesn't crash. Output not examined, much
|
|
// like the DebugPrintBacktrace test above.
|
|
TEST_F(StackTraceTest, DebugPrintWithNullPrefixBacktrace) {
|
|
StackTrace().PrintWithPrefix(nullptr);
|
|
}
|
|
|
|
// Test OutputToStreamWithPrefix, mainly to make sure it doesn't
|
|
// crash. Any "real" stack trace testing happens above.
|
|
TEST_F(StackTraceTest, DebugOutputToStreamWithPrefix) {
|
|
StackTrace trace;
|
|
const char* prefix_string = "[test]";
|
|
std::ostringstream os;
|
|
trace.OutputToStreamWithPrefix(&os, prefix_string);
|
|
std::string backtrace_message = os.str();
|
|
|
|
// ToStringWithPrefix() should produce the same output.
|
|
EXPECT_EQ(backtrace_message, trace.ToStringWithPrefix(prefix_string));
|
|
}
|
|
|
|
// Make sure nullptr prefix doesn't crash. Output not examined, much
|
|
// like the DebugPrintBacktrace test above.
|
|
TEST_F(StackTraceTest, DebugOutputToStreamWithNullPrefix) {
|
|
StackTrace trace;
|
|
std::ostringstream os;
|
|
trace.OutputToStreamWithPrefix(&os, nullptr);
|
|
trace.ToStringWithPrefix(nullptr);
|
|
}
|
|
|
|
#endif // !defined(__UCLIBC__) && !defined(_AIX)
|
|
|
|
#if BUILDFLAG(IS_POSIX) && !BUILDFLAG(IS_ANDROID)
|
|
#if !BUILDFLAG(IS_IOS)
|
|
static char* newArray() {
|
|
// Clang warns about the mismatched new[]/delete if they occur in the same
|
|
// function.
|
|
return new char[10];
|
|
}
|
|
|
|
MULTIPROCESS_TEST_MAIN(MismatchedMallocChildProcess) {
|
|
char* pointer = newArray();
|
|
delete pointer;
|
|
return 2;
|
|
}
|
|
|
|
// Regression test for StackDumpingSignalHandler async-signal unsafety.
|
|
// Combined with tcmalloc's debugallocation, that signal handler
|
|
// and e.g. mismatched new[]/delete would cause a hang because
|
|
// of re-entering malloc.
|
|
TEST_F(StackTraceTest, AsyncSignalUnsafeSignalHandlerHang) {
|
|
Process child = SpawnChild("MismatchedMallocChildProcess");
|
|
ASSERT_TRUE(child.IsValid());
|
|
int exit_code;
|
|
ASSERT_TRUE(
|
|
child.WaitForExitWithTimeout(TestTimeouts::action_timeout(), &exit_code));
|
|
}
|
|
#endif // !BUILDFLAG(IS_IOS)
|
|
|
|
namespace {
|
|
|
|
std::string itoa_r_wrapper(intptr_t i, size_t sz, int base, size_t padding) {
|
|
char buffer[1024];
|
|
CHECK_LE(sz, sizeof(buffer));
|
|
|
|
char* result = internal::itoa_r(i, buffer, sz, base, padding);
|
|
EXPECT_TRUE(result);
|
|
return std::string(buffer);
|
|
}
|
|
|
|
} // namespace
|
|
|
|
TEST_F(StackTraceTest, itoa_r) {
|
|
EXPECT_EQ("0", itoa_r_wrapper(0, 128, 10, 0));
|
|
EXPECT_EQ("-1", itoa_r_wrapper(-1, 128, 10, 0));
|
|
|
|
// Test edge cases.
|
|
if (sizeof(intptr_t) == 4) {
|
|
EXPECT_EQ("ffffffff", itoa_r_wrapper(-1, 128, 16, 0));
|
|
EXPECT_EQ("-2147483648",
|
|
itoa_r_wrapper(std::numeric_limits<intptr_t>::min(), 128, 10, 0));
|
|
EXPECT_EQ("2147483647",
|
|
itoa_r_wrapper(std::numeric_limits<intptr_t>::max(), 128, 10, 0));
|
|
|
|
EXPECT_EQ("80000000",
|
|
itoa_r_wrapper(std::numeric_limits<intptr_t>::min(), 128, 16, 0));
|
|
EXPECT_EQ("7fffffff",
|
|
itoa_r_wrapper(std::numeric_limits<intptr_t>::max(), 128, 16, 0));
|
|
} else if (sizeof(intptr_t) == 8) {
|
|
EXPECT_EQ("ffffffffffffffff", itoa_r_wrapper(-1, 128, 16, 0));
|
|
EXPECT_EQ("-9223372036854775808",
|
|
itoa_r_wrapper(std::numeric_limits<intptr_t>::min(), 128, 10, 0));
|
|
EXPECT_EQ("9223372036854775807",
|
|
itoa_r_wrapper(std::numeric_limits<intptr_t>::max(), 128, 10, 0));
|
|
|
|
EXPECT_EQ("8000000000000000",
|
|
itoa_r_wrapper(std::numeric_limits<intptr_t>::min(), 128, 16, 0));
|
|
EXPECT_EQ("7fffffffffffffff",
|
|
itoa_r_wrapper(std::numeric_limits<intptr_t>::max(), 128, 16, 0));
|
|
} else {
|
|
ADD_FAILURE() << "Missing test case for your size of intptr_t ("
|
|
<< sizeof(intptr_t) << ")";
|
|
}
|
|
|
|
// Test hex output.
|
|
EXPECT_EQ("688", itoa_r_wrapper(0x688, 128, 16, 0));
|
|
EXPECT_EQ("deadbeef", itoa_r_wrapper(0xdeadbeef, 128, 16, 0));
|
|
|
|
// Check that itoa_r respects passed buffer size limit.
|
|
char buffer[1024];
|
|
EXPECT_TRUE(internal::itoa_r(0xdeadbeef, buffer, 10, 16, 0));
|
|
EXPECT_TRUE(internal::itoa_r(0xdeadbeef, buffer, 9, 16, 0));
|
|
EXPECT_FALSE(internal::itoa_r(0xdeadbeef, buffer, 8, 16, 0));
|
|
EXPECT_FALSE(internal::itoa_r(0xdeadbeef, buffer, 7, 16, 0));
|
|
EXPECT_TRUE(internal::itoa_r(0xbeef, buffer, 5, 16, 4));
|
|
EXPECT_FALSE(internal::itoa_r(0xbeef, buffer, 5, 16, 5));
|
|
EXPECT_FALSE(internal::itoa_r(0xbeef, buffer, 5, 16, 6));
|
|
|
|
// Test padding.
|
|
EXPECT_EQ("1", itoa_r_wrapper(1, 128, 10, 0));
|
|
EXPECT_EQ("1", itoa_r_wrapper(1, 128, 10, 1));
|
|
EXPECT_EQ("01", itoa_r_wrapper(1, 128, 10, 2));
|
|
EXPECT_EQ("001", itoa_r_wrapper(1, 128, 10, 3));
|
|
EXPECT_EQ("0001", itoa_r_wrapper(1, 128, 10, 4));
|
|
EXPECT_EQ("00001", itoa_r_wrapper(1, 128, 10, 5));
|
|
EXPECT_EQ("688", itoa_r_wrapper(0x688, 128, 16, 0));
|
|
EXPECT_EQ("688", itoa_r_wrapper(0x688, 128, 16, 1));
|
|
EXPECT_EQ("688", itoa_r_wrapper(0x688, 128, 16, 2));
|
|
EXPECT_EQ("688", itoa_r_wrapper(0x688, 128, 16, 3));
|
|
EXPECT_EQ("0688", itoa_r_wrapper(0x688, 128, 16, 4));
|
|
EXPECT_EQ("00688", itoa_r_wrapper(0x688, 128, 16, 5));
|
|
}
|
|
#endif // BUILDFLAG(IS_POSIX) && !BUILDFLAG(IS_ANDROID)
|
|
|
|
#if BUILDFLAG(CAN_UNWIND_WITH_FRAME_POINTERS)
|
|
|
|
class CopyFunction : public StackCopier {
|
|
public:
|
|
using StackCopier::CopyStackContentsAndRewritePointers;
|
|
};
|
|
|
|
// Copies the current stack segment, starting from the frame pointer of the
|
|
// caller frame. Also fills in |stack_end| for the copied stack.
|
|
NOINLINE static std::unique_ptr<StackBuffer> CopyCurrentStackAndRewritePointers(
|
|
uintptr_t* out_fp,
|
|
uintptr_t* stack_end) {
|
|
const uint8_t* fp =
|
|
reinterpret_cast<const uint8_t*>(__builtin_frame_address(0));
|
|
uintptr_t original_stack_end = GetStackEnd();
|
|
size_t stack_size = original_stack_end - reinterpret_cast<uintptr_t>(fp);
|
|
auto buffer = std::make_unique<StackBuffer>(stack_size);
|
|
*out_fp = reinterpret_cast<uintptr_t>(
|
|
CopyFunction::CopyStackContentsAndRewritePointers(
|
|
fp, reinterpret_cast<const uintptr_t*>(original_stack_end),
|
|
StackBuffer::kPlatformStackAlignment, buffer->buffer()));
|
|
*stack_end = *out_fp + stack_size;
|
|
return buffer;
|
|
}
|
|
|
|
template <size_t Depth>
|
|
NOINLINE void ExpectStackFramePointers(const void** frames,
|
|
size_t max_depth,
|
|
bool copy_stack) {
|
|
code_start:
|
|
// Calling __builtin_frame_address() forces compiler to emit
|
|
// frame pointers, even if they are not enabled.
|
|
EXPECT_NE(nullptr, __builtin_frame_address(0));
|
|
ExpectStackFramePointers<Depth - 1>(frames, max_depth, copy_stack);
|
|
|
|
constexpr size_t frame_index = Depth - 1;
|
|
const void* frame = frames[frame_index];
|
|
EXPECT_GE(frame, &&code_start) << "For frame at index " << frame_index;
|
|
EXPECT_LE(frame, &&code_end) << "For frame at index " << frame_index;
|
|
code_end:
|
|
return;
|
|
}
|
|
|
|
template <>
|
|
NOINLINE void ExpectStackFramePointers<1>(const void** frames,
|
|
size_t max_depth,
|
|
bool copy_stack) {
|
|
code_start:
|
|
// Calling __builtin_frame_address() forces compiler to emit
|
|
// frame pointers, even if they are not enabled.
|
|
EXPECT_NE(nullptr, __builtin_frame_address(0));
|
|
size_t count = 0;
|
|
if (copy_stack) {
|
|
uintptr_t stack_end = 0, fp = 0;
|
|
std::unique_ptr<StackBuffer> copy =
|
|
CopyCurrentStackAndRewritePointers(&fp, &stack_end);
|
|
count =
|
|
TraceStackFramePointersFromBuffer(fp, stack_end, frames, max_depth, 0);
|
|
} else {
|
|
count = TraceStackFramePointers(frames, max_depth, 0);
|
|
}
|
|
ASSERT_EQ(max_depth, count);
|
|
|
|
const void* frame = frames[0];
|
|
EXPECT_GE(frame, &&code_start) << "For the top frame";
|
|
EXPECT_LE(frame, &&code_end) << "For the top frame";
|
|
code_end:
|
|
return;
|
|
}
|
|
|
|
#if defined(MEMORY_SANITIZER)
|
|
// The test triggers use-of-uninitialized-value errors on MSan bots.
|
|
// This is expected because we're walking and reading the stack, and
|
|
// sometimes we read fp / pc from the place that previously held
|
|
// uninitialized value.
|
|
#define MAYBE_TraceStackFramePointers DISABLED_TraceStackFramePointers
|
|
#else
|
|
#define MAYBE_TraceStackFramePointers TraceStackFramePointers
|
|
#endif
|
|
TEST_F(StackTraceTest, MAYBE_TraceStackFramePointers) {
|
|
constexpr size_t kDepth = 5;
|
|
const void* frames[kDepth];
|
|
ExpectStackFramePointers<kDepth>(frames, kDepth, /*copy_stack=*/false);
|
|
}
|
|
|
|
// The test triggers use-of-uninitialized-value errors on MSan bots.
|
|
// This is expected because we're walking and reading the stack, and
|
|
// sometimes we read fp / pc from the place that previously held
|
|
// uninitialized value.
|
|
// TODO(crbug.com/1132511): Enable this test on Fuchsia.
|
|
#if defined(MEMORY_SANITIZER) || BUILDFLAG(IS_FUCHSIA)
|
|
#define MAYBE_TraceStackFramePointersFromBuffer \
|
|
DISABLED_TraceStackFramePointersFromBuffer
|
|
#else
|
|
#define MAYBE_TraceStackFramePointersFromBuffer \
|
|
TraceStackFramePointersFromBuffer
|
|
#endif
|
|
TEST_F(StackTraceTest, MAYBE_TraceStackFramePointersFromBuffer) {
|
|
constexpr size_t kDepth = 5;
|
|
const void* frames[kDepth];
|
|
ExpectStackFramePointers<kDepth>(frames, kDepth, /*copy_stack=*/true);
|
|
}
|
|
|
|
#if BUILDFLAG(IS_ANDROID) || BUILDFLAG(IS_APPLE)
|
|
#define MAYBE_StackEnd StackEnd
|
|
#else
|
|
#define MAYBE_StackEnd DISABLED_StackEnd
|
|
#endif
|
|
|
|
TEST_F(StackTraceTest, MAYBE_StackEnd) {
|
|
EXPECT_NE(0u, GetStackEnd());
|
|
}
|
|
|
|
#endif // BUILDFLAG(CAN_UNWIND_WITH_FRAME_POINTERS)
|
|
|
|
#if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_ANDROID)
|
|
|
|
#if !defined(ADDRESS_SANITIZER) && !defined(UNDEFINED_SANITIZER)
|
|
|
|
#if !defined(ARCH_CPU_ARM_FAMILY)
|
|
// On Arm architecture invalid math operations such as division by zero are not
|
|
// trapped and do not trigger a SIGFPE.
|
|
// Hence disable the test for Arm platforms.
|
|
TEST(CheckExitCodeAfterSignalHandlerDeathTest, CheckSIGFPE) {
|
|
// Values are volatile to prevent reordering of instructions, i.e. for
|
|
// optimization. Reordering may lead to tests erroneously failing due to
|
|
// SIGFPE being raised outside of EXPECT_EXIT.
|
|
volatile int const nominator = 23;
|
|
volatile int const denominator = 0;
|
|
[[maybe_unused]] volatile int result;
|
|
|
|
EXPECT_EXIT(result = nominator / denominator,
|
|
::testing::KilledBySignal(SIGFPE), "");
|
|
}
|
|
#endif // !defined(ARCH_CPU_ARM_FAMILY)
|
|
|
|
TEST(CheckExitCodeAfterSignalHandlerDeathTest, CheckSIGSEGV) {
|
|
// Pointee and pointer are volatile to prevent reordering of instructions,
|
|
// i.e. for optimization. Reordering may lead to tests erroneously failing due
|
|
// to SIGSEGV being raised outside of EXPECT_EXIT.
|
|
volatile int* const volatile p_int = nullptr;
|
|
|
|
EXPECT_EXIT(*p_int = 1234, ::testing::KilledBySignal(SIGSEGV), "");
|
|
}
|
|
|
|
#if defined(ARCH_CPU_X86_64)
|
|
TEST(CheckExitCodeAfterSignalHandlerDeathTest,
|
|
CheckSIGSEGVNonCanonicalAddress) {
|
|
// Pointee and pointer are volatile to prevent reordering of instructions,
|
|
// i.e. for optimization. Reordering may lead to tests erroneously failing due
|
|
// to SIGSEGV being raised outside of EXPECT_EXIT.
|
|
//
|
|
// On Linux, the upper half of the address space is reserved by the kernel, so
|
|
// all upper bits must be 0 for canonical addresses.
|
|
volatile int* const volatile p_int =
|
|
reinterpret_cast<int*>(0xabcdabcdabcdabcdULL);
|
|
|
|
EXPECT_EXIT(*p_int = 1234, ::testing::KilledBySignal(SIGSEGV), "SI_KERNEL");
|
|
}
|
|
#endif
|
|
|
|
#endif // #if !defined(ADDRESS_SANITIZER) && !defined(UNDEFINED_SANITIZER)
|
|
|
|
TEST(CheckExitCodeAfterSignalHandlerDeathTest, CheckSIGILL) {
|
|
auto const raise_sigill = []() {
|
|
#if defined(ARCH_CPU_X86_FAMILY)
|
|
asm("ud2");
|
|
#elif defined(ARCH_CPU_ARM_FAMILY)
|
|
asm("udf 0");
|
|
#else
|
|
#error Unsupported platform!
|
|
#endif
|
|
};
|
|
|
|
EXPECT_EXIT(raise_sigill(), ::testing::KilledBySignal(SIGILL), "");
|
|
}
|
|
|
|
#endif // BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_ANDROID)
|
|
|
|
} // namespace debug
|
|
} // namespace base
|