Roll libvpx 861f35:1fff3e
[chromium-blink-merge.git] / sandbox / linux / tests / unit_tests.cc
blob5872e94030e143da76d49f3cd3035bf01d11cd2d
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include <fcntl.h>
6 #include <poll.h>
7 #include <signal.h>
8 #include <stdio.h>
9 #include <sys/resource.h>
10 #include <sys/time.h>
11 #include <time.h>
12 #include <unistd.h>
14 #include "base/debug/leak_annotations.h"
15 #include "base/files/file_util.h"
16 #include "base/posix/eintr_wrapper.h"
17 #include "base/third_party/valgrind/valgrind.h"
18 #include "build/build_config.h"
19 #include "sandbox/linux/tests/unit_tests.h"
21 namespace {
22 std::string TestFailedMessage(const std::string& msg) {
23 return msg.empty() ? std::string() : "Actual test failure: " + msg;
26 int GetSubProcessTimeoutTimeInSeconds() {
27 // 10s ought to be enough for anybody.
28 return 10;
31 // Returns the number of threads of the current process or -1.
32 int CountThreads() {
33 struct stat task_stat;
34 int task_d = stat("/proc/self/task", &task_stat);
35 // task_stat.st_nlink should be the number of tasks + 2 (accounting for
36 // "." and "..".
37 if (task_d != 0 || task_stat.st_nlink < 3)
38 return -1;
39 const int num_threads = task_stat.st_nlink - 2;
40 return num_threads;
43 } // namespace
45 namespace sandbox {
47 bool IsAndroid() {
48 #if defined(OS_ANDROID)
49 return true;
50 #else
51 return false;
52 #endif
55 bool IsArchitectureArm() {
56 #if defined(ARCH_CPU_ARM_FAMILY)
57 return true;
58 #else
59 return false;
60 #endif
63 // TODO(jln): figure out why base/.../dynamic_annotations.h's
64 // RunningOnValgrind() cannot link.
65 bool IsRunningOnValgrind() { return RUNNING_ON_VALGRIND; }
67 static const int kExpectedValue = 42;
68 static const int kIgnoreThisTest = 43;
69 static const int kExitWithAssertionFailure = 1;
70 static const int kExitForTimeout = 2;
72 #if !defined(OS_ANDROID)
73 // This is due to StackDumpSignalHandler() performing _exit(1).
74 // TODO(jln): get rid of the collision with kExitWithAssertionFailure.
75 const int kExitAfterSIGSEGV = 1;
76 #endif
78 static void SigAlrmHandler(int) {
79 const char failure_message[] = "Timeout reached!\n";
80 // Make sure that we never block here.
81 if (!fcntl(2, F_SETFL, O_NONBLOCK)) {
82 ignore_result(write(2, failure_message, sizeof(failure_message) - 1));
84 _exit(kExitForTimeout);
87 // Set a timeout with a handler that will automatically fail the
88 // test.
89 static void SetProcessTimeout(int time_in_seconds) {
90 struct sigaction act = {};
91 act.sa_handler = SigAlrmHandler;
92 SANDBOX_ASSERT(sigemptyset(&act.sa_mask) == 0);
93 act.sa_flags = 0;
95 struct sigaction old_act;
96 SANDBOX_ASSERT(sigaction(SIGALRM, &act, &old_act) == 0);
98 // We don't implemenet signal chaining, so make sure that nothing else
99 // is expecting to handle SIGALRM.
100 SANDBOX_ASSERT((old_act.sa_flags & SA_SIGINFO) == 0);
101 SANDBOX_ASSERT(old_act.sa_handler == SIG_DFL);
102 sigset_t sigalrm_set;
103 SANDBOX_ASSERT(sigemptyset(&sigalrm_set) == 0);
104 SANDBOX_ASSERT(sigaddset(&sigalrm_set, SIGALRM) == 0);
105 SANDBOX_ASSERT(sigprocmask(SIG_UNBLOCK, &sigalrm_set, NULL) == 0);
106 SANDBOX_ASSERT(alarm(time_in_seconds) == 0); // There should be no previous
107 // alarm.
110 // Runs a test in a sub-process. This is necessary for most of the code
111 // in the BPF sandbox, as it potentially makes global state changes and as
112 // it also tends to raise fatal errors, if the code has been used in an
113 // insecure manner.
114 void UnitTests::RunTestInProcess(SandboxTestRunner* test_runner,
115 DeathCheck death,
116 const void* death_aux) {
117 CHECK(test_runner);
118 // We need to fork(), so we can't be multi-threaded, as threads could hold
119 // locks.
120 int num_threads = CountThreads();
121 #if !defined(THREAD_SANITIZER)
122 const int kNumExpectedThreads = 1;
123 #else
124 // Under TSAN, there is a special helper thread. It should be completely
125 // invisible to our testing, so we ignore it. It should be ok to fork()
126 // with this thread. It's currently buggy, but it's the best we can do until
127 // there is a way to delay the start of the thread
128 // (https://code.google.com/p/thread-sanitizer/issues/detail?id=19).
129 const int kNumExpectedThreads = 2;
130 #endif
132 // The kernel is at liberty to wake a thread id futex before updating /proc.
133 // If another test running in the same process has stopped a thread, it may
134 // appear as still running in /proc.
135 // We poll /proc, with an exponential back-off. At most, we'll sleep around
136 // 2^iterations nanoseconds in nanosleep().
137 for (unsigned int iteration = 0; iteration < 30; iteration++) {
138 struct timespec ts = {0, 1L << iteration /* nanoseconds */};
139 PCHECK(0 == HANDLE_EINTR(nanosleep(&ts, &ts)));
140 num_threads = CountThreads();
141 if (kNumExpectedThreads == num_threads)
142 break;
145 ASSERT_EQ(kNumExpectedThreads, num_threads)
146 << "Running sandbox tests with multiple threads "
147 << "is not supported and will make the tests flaky.";
148 int fds[2];
149 ASSERT_EQ(0, pipe(fds));
150 // Check that our pipe is not on one of the standard file descriptor.
151 SANDBOX_ASSERT(fds[0] > 2 && fds[1] > 2);
153 pid_t pid;
154 ASSERT_LE(0, (pid = fork()));
155 if (!pid) {
156 // In child process
157 // Redirect stderr to our pipe. This way, we can capture all error
158 // messages, if we decide we want to do so in our tests.
159 SANDBOX_ASSERT(dup2(fds[1], 2) == 2);
160 SANDBOX_ASSERT(!close(fds[0]));
161 SANDBOX_ASSERT(!close(fds[1]));
163 // Don't set a timeout if running on Valgrind, since it's generally much
164 // slower.
165 if (!IsRunningOnValgrind()) {
166 SetProcessTimeout(GetSubProcessTimeoutTimeInSeconds());
169 // Disable core files. They are not very useful for our individual test
170 // cases.
171 struct rlimit no_core = {0};
172 setrlimit(RLIMIT_CORE, &no_core);
174 test_runner->Run();
175 if (test_runner->ShouldCheckForLeaks()) {
176 #if defined(LEAK_SANITIZER)
177 __lsan_do_leak_check();
178 #endif
180 _exit(kExpectedValue);
183 close(fds[1]);
184 std::vector<char> msg_buf;
185 ssize_t rc;
187 // Make sure read() will never block as we'll use poll() to
188 // block with a timeout instead.
189 const int fcntl_ret = fcntl(fds[0], F_SETFL, O_NONBLOCK);
190 ASSERT_EQ(0, fcntl_ret);
191 struct pollfd poll_fd = {fds[0], POLLIN | POLLRDHUP, 0};
193 int poll_ret;
194 // We prefer the SIGALRM timeout to trigger in the child than this timeout
195 // so we double the common value here.
196 int poll_timeout = GetSubProcessTimeoutTimeInSeconds() * 2 * 1000;
197 while ((poll_ret = poll(&poll_fd, 1, poll_timeout) > 0)) {
198 const size_t kCapacity = 256;
199 const size_t len = msg_buf.size();
200 msg_buf.resize(len + kCapacity);
201 rc = HANDLE_EINTR(read(fds[0], &msg_buf[len], kCapacity));
202 msg_buf.resize(len + std::max(rc, static_cast<ssize_t>(0)));
203 if (rc <= 0)
204 break;
206 ASSERT_NE(poll_ret, -1) << "poll() failed";
207 ASSERT_NE(poll_ret, 0) << "Timeout while reading child state";
208 close(fds[0]);
209 std::string msg(msg_buf.begin(), msg_buf.end());
211 int status = 0;
212 int waitpid_returned = HANDLE_EINTR(waitpid(pid, &status, 0));
213 ASSERT_EQ(pid, waitpid_returned) << TestFailedMessage(msg);
215 // At run-time, we sometimes decide that a test shouldn't actually
216 // run (e.g. when testing sandbox features on a kernel that doesn't
217 // have sandboxing support). When that happens, don't attempt to
218 // call the "death" function, as it might be looking for a
219 // death-test condition that would never have triggered.
220 if (!WIFEXITED(status) || WEXITSTATUS(status) != kIgnoreThisTest ||
221 !msg.empty()) {
222 // We use gtest's ASSERT_XXX() macros instead of the DeathCheck
223 // functions. This means, on failure, "return" is called. This
224 // only works correctly, if the call of the "death" callback is
225 // the very last thing in our function.
226 death(status, msg, death_aux);
230 void UnitTests::DeathSuccess(int status, const std::string& msg, const void*) {
231 std::string details(TestFailedMessage(msg));
233 bool subprocess_terminated_normally = WIFEXITED(status);
234 ASSERT_TRUE(subprocess_terminated_normally) << details;
235 int subprocess_exit_status = WEXITSTATUS(status);
236 ASSERT_EQ(kExpectedValue, subprocess_exit_status) << details;
237 bool subprocess_exited_but_printed_messages = !msg.empty();
238 EXPECT_FALSE(subprocess_exited_but_printed_messages) << details;
241 void UnitTests::DeathSuccessAllowNoise(int status,
242 const std::string& msg,
243 const void*) {
244 std::string details(TestFailedMessage(msg));
246 bool subprocess_terminated_normally = WIFEXITED(status);
247 ASSERT_TRUE(subprocess_terminated_normally) << details;
248 int subprocess_exit_status = WEXITSTATUS(status);
249 ASSERT_EQ(kExpectedValue, subprocess_exit_status) << details;
252 void UnitTests::DeathMessage(int status,
253 const std::string& msg,
254 const void* aux) {
255 std::string details(TestFailedMessage(msg));
256 const char* expected_msg = static_cast<const char*>(aux);
258 bool subprocess_terminated_normally = WIFEXITED(status);
259 ASSERT_TRUE(subprocess_terminated_normally) << "Exit status: " << status
260 << " " << details;
261 int subprocess_exit_status = WEXITSTATUS(status);
262 ASSERT_EQ(1, subprocess_exit_status) << details;
264 bool subprocess_exited_without_matching_message =
265 msg.find(expected_msg) == std::string::npos;
267 // In official builds CHECK messages are dropped, so look for SIGABRT.
268 // See https://code.google.com/p/chromium/issues/detail?id=437312
269 #if defined(OFFICIAL_BUILD) && defined(NDEBUG) && !defined(OS_ANDROID)
270 if (subprocess_exited_without_matching_message) {
271 static const char kSigAbortMessage[] = "Received signal 6";
272 subprocess_exited_without_matching_message =
273 msg.find(kSigAbortMessage) == std::string::npos;
275 #endif
276 EXPECT_FALSE(subprocess_exited_without_matching_message) << details;
279 void UnitTests::DeathSEGVMessage(int status,
280 const std::string& msg,
281 const void* aux) {
282 std::string details(TestFailedMessage(msg));
283 const char* expected_msg = static_cast<const char*>(aux);
285 #if defined(OS_ANDROID)
286 const bool subprocess_got_sigsegv =
287 WIFSIGNALED(status) && (SIGSEGV == WTERMSIG(status));
288 #else
289 const bool subprocess_got_sigsegv =
290 WIFEXITED(status) && (kExitAfterSIGSEGV == WEXITSTATUS(status));
291 #endif
293 ASSERT_TRUE(subprocess_got_sigsegv) << "Exit status: " << status
294 << " " << details;
296 bool subprocess_exited_without_matching_message =
297 msg.find(expected_msg) == std::string::npos;
298 EXPECT_FALSE(subprocess_exited_without_matching_message) << details;
301 void UnitTests::DeathExitCode(int status,
302 const std::string& msg,
303 const void* aux) {
304 int expected_exit_code = static_cast<int>(reinterpret_cast<intptr_t>(aux));
305 std::string details(TestFailedMessage(msg));
307 bool subprocess_terminated_normally = WIFEXITED(status);
308 ASSERT_TRUE(subprocess_terminated_normally) << details;
309 int subprocess_exit_status = WEXITSTATUS(status);
310 ASSERT_EQ(expected_exit_code, subprocess_exit_status) << details;
313 void UnitTests::DeathBySignal(int status,
314 const std::string& msg,
315 const void* aux) {
316 int expected_signo = static_cast<int>(reinterpret_cast<intptr_t>(aux));
317 std::string details(TestFailedMessage(msg));
319 bool subprocess_terminated_by_signal = WIFSIGNALED(status);
320 ASSERT_TRUE(subprocess_terminated_by_signal) << details;
321 int subprocess_signal_number = WTERMSIG(status);
322 ASSERT_EQ(expected_signo, subprocess_signal_number) << details;
325 void UnitTests::AssertionFailure(const char* expr, const char* file, int line) {
326 fprintf(stderr, "%s:%d:%s", file, line, expr);
327 fflush(stderr);
328 _exit(kExitWithAssertionFailure);
331 void UnitTests::IgnoreThisTest() {
332 fflush(stderr);
333 _exit(kIgnoreThisTest);
336 } // namespace