1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
9 #include <sys/resource.h>
10 #include <sys/types.h>
16 #include "base/debug/leak_annotations.h"
17 #include "base/files/file_util.h"
18 #include "base/posix/eintr_wrapper.h"
19 #include "base/third_party/valgrind/valgrind.h"
20 #include "build/build_config.h"
21 #include "sandbox/linux/tests/unit_tests.h"
23 // Specifically, PNaCl toolchain does not have this flag.
24 #if !defined(POLLRDHUP)
25 #define POLLRDHUP 0x2000
29 std::string
TestFailedMessage(const std::string
& msg
) {
30 return msg
.empty() ? std::string() : "Actual test failure: " + msg
;
33 int GetSubProcessTimeoutTimeInSeconds() {
35 // Chromecast build lab devices need this much time to complete.
36 // They only run in release.
39 // Want a shorter timeout than test runner to get a useful callstack
45 // Returns the number of threads of the current process or -1.
47 struct stat task_stat
;
48 int task_d
= stat("/proc/self/task", &task_stat
);
49 // task_stat.st_nlink should be the number of tasks + 2 (accounting for
51 if (task_d
!= 0 || task_stat
.st_nlink
< 3)
53 const int num_threads
= task_stat
.st_nlink
- 2;
62 #if defined(OS_ANDROID)
69 bool IsArchitectureArm() {
70 #if defined(ARCH_CPU_ARM_FAMILY)
77 // TODO(jln): figure out why base/.../dynamic_annotations.h's
78 // RunningOnValgrind() cannot link.
79 bool IsRunningOnValgrind() { return RUNNING_ON_VALGRIND
; }
81 static const int kExpectedValue
= 42;
82 static const int kIgnoreThisTest
= 43;
83 static const int kExitWithAssertionFailure
= 1;
84 #if !defined(OS_NACL_NONSFI)
85 static const int kExitForTimeout
= 2;
88 #if defined(SANDBOX_USES_BASE_TEST_SUITE)
89 // This is due to StackDumpSignalHandler() performing _exit(1).
90 // TODO(jln): get rid of the collision with kExitWithAssertionFailure.
91 const int kExitAfterSIGSEGV
= 1;
94 // PNaCl toolchain's signal ABIs are incompatible with Linux's.
95 // So, for simplicity, just drop the "timeout" feature from unittest framework
96 // with relying on the buildbot's timeout feature.
97 #if !defined(OS_NACL_NONSFI)
98 static void SigAlrmHandler(int) {
99 const char failure_message
[] = "Timeout reached!\n";
100 // Make sure that we never block here.
101 if (!fcntl(2, F_SETFL
, O_NONBLOCK
)) {
102 ignore_result(write(2, failure_message
, sizeof(failure_message
) - 1));
104 _exit(kExitForTimeout
);
107 // Set a timeout with a handler that will automatically fail the
109 static void SetProcessTimeout(int time_in_seconds
) {
110 struct sigaction act
= {};
111 act
.sa_handler
= SigAlrmHandler
;
112 SANDBOX_ASSERT(sigemptyset(&act
.sa_mask
) == 0);
115 struct sigaction old_act
;
116 SANDBOX_ASSERT(sigaction(SIGALRM
, &act
, &old_act
) == 0);
118 // We don't implemenet signal chaining, so make sure that nothing else
119 // is expecting to handle SIGALRM.
120 SANDBOX_ASSERT((old_act
.sa_flags
& SA_SIGINFO
) == 0);
121 SANDBOX_ASSERT(old_act
.sa_handler
== SIG_DFL
);
122 sigset_t sigalrm_set
;
123 SANDBOX_ASSERT(sigemptyset(&sigalrm_set
) == 0);
124 SANDBOX_ASSERT(sigaddset(&sigalrm_set
, SIGALRM
) == 0);
125 SANDBOX_ASSERT(sigprocmask(SIG_UNBLOCK
, &sigalrm_set
, NULL
) == 0);
126 SANDBOX_ASSERT(alarm(time_in_seconds
) == 0); // There should be no previous
129 #endif // !defined(OS_NACL_NONSFI)
131 // Runs a test in a sub-process. This is necessary for most of the code
132 // in the BPF sandbox, as it potentially makes global state changes and as
133 // it also tends to raise fatal errors, if the code has been used in an
135 void UnitTests::RunTestInProcess(SandboxTestRunner
* test_runner
,
137 const void* death_aux
) {
139 // We need to fork(), so we can't be multi-threaded, as threads could hold
141 int num_threads
= CountThreads();
142 #if !defined(THREAD_SANITIZER)
143 const int kNumExpectedThreads
= 1;
145 // Under TSAN, there is a special helper thread. It should be completely
146 // invisible to our testing, so we ignore it. It should be ok to fork()
147 // with this thread. It's currently buggy, but it's the best we can do until
148 // there is a way to delay the start of the thread
149 // (https://code.google.com/p/thread-sanitizer/issues/detail?id=19).
150 const int kNumExpectedThreads
= 2;
153 // The kernel is at liberty to wake a thread id futex before updating /proc.
154 // If another test running in the same process has stopped a thread, it may
155 // appear as still running in /proc.
156 // We poll /proc, with an exponential back-off. At most, we'll sleep around
157 // 2^iterations nanoseconds in nanosleep().
158 for (unsigned int iteration
= 0; iteration
< 30; iteration
++) {
159 struct timespec ts
= {0, 1L << iteration
/* nanoseconds */};
160 PCHECK(0 == HANDLE_EINTR(nanosleep(&ts
, &ts
)));
161 num_threads
= CountThreads();
162 if (kNumExpectedThreads
== num_threads
)
166 ASSERT_EQ(kNumExpectedThreads
, num_threads
)
167 << "Running sandbox tests with multiple threads "
168 << "is not supported and will make the tests flaky.";
170 ASSERT_EQ(0, pipe(fds
));
171 // Check that our pipe is not on one of the standard file descriptor.
172 SANDBOX_ASSERT(fds
[0] > 2 && fds
[1] > 2);
175 ASSERT_LE(0, (pid
= fork()));
178 // Redirect stderr to our pipe. This way, we can capture all error
179 // messages, if we decide we want to do so in our tests.
180 SANDBOX_ASSERT(dup2(fds
[1], 2) == 2);
181 SANDBOX_ASSERT(!close(fds
[0]));
182 SANDBOX_ASSERT(!close(fds
[1]));
184 // Don't set a timeout if running on Valgrind, since it's generally much
186 if (!IsRunningOnValgrind()) {
187 #if !defined(OS_NACL_NONSFI)
188 SetProcessTimeout(GetSubProcessTimeoutTimeInSeconds());
192 // Disable core files. They are not very useful for our individual test
194 struct rlimit no_core
= {0};
195 setrlimit(RLIMIT_CORE
, &no_core
);
198 if (test_runner
->ShouldCheckForLeaks()) {
199 #if defined(LEAK_SANITIZER)
200 __lsan_do_leak_check();
203 _exit(kExpectedValue
);
207 std::vector
<char> msg_buf
;
210 // Make sure read() will never block as we'll use poll() to
211 // block with a timeout instead.
212 const int fcntl_ret
= fcntl(fds
[0], F_SETFL
, O_NONBLOCK
);
213 ASSERT_EQ(0, fcntl_ret
);
214 struct pollfd poll_fd
= {fds
[0], POLLIN
| POLLRDHUP
, 0};
217 // We prefer the SIGALRM timeout to trigger in the child than this timeout
218 // so we double the common value here.
219 int poll_timeout
= GetSubProcessTimeoutTimeInSeconds() * 2 * 1000;
220 while ((poll_ret
= poll(&poll_fd
, 1, poll_timeout
) > 0)) {
221 const size_t kCapacity
= 256;
222 const size_t len
= msg_buf
.size();
223 msg_buf
.resize(len
+ kCapacity
);
224 rc
= HANDLE_EINTR(read(fds
[0], &msg_buf
[len
], kCapacity
));
225 msg_buf
.resize(len
+ std::max(rc
, static_cast<ssize_t
>(0)));
229 ASSERT_NE(poll_ret
, -1) << "poll() failed";
230 ASSERT_NE(poll_ret
, 0) << "Timeout while reading child state";
232 std::string
msg(msg_buf
.begin(), msg_buf
.end());
235 int waitpid_returned
= HANDLE_EINTR(waitpid(pid
, &status
, 0));
236 ASSERT_EQ(pid
, waitpid_returned
) << TestFailedMessage(msg
);
238 // At run-time, we sometimes decide that a test shouldn't actually
239 // run (e.g. when testing sandbox features on a kernel that doesn't
240 // have sandboxing support). When that happens, don't attempt to
241 // call the "death" function, as it might be looking for a
242 // death-test condition that would never have triggered.
243 if (!WIFEXITED(status
) || WEXITSTATUS(status
) != kIgnoreThisTest
||
245 // We use gtest's ASSERT_XXX() macros instead of the DeathCheck
246 // functions. This means, on failure, "return" is called. This
247 // only works correctly, if the call of the "death" callback is
248 // the very last thing in our function.
249 death(status
, msg
, death_aux
);
253 void UnitTests::DeathSuccess(int status
, const std::string
& msg
, const void*) {
254 std::string
details(TestFailedMessage(msg
));
256 bool subprocess_terminated_normally
= WIFEXITED(status
);
257 ASSERT_TRUE(subprocess_terminated_normally
) << details
;
258 int subprocess_exit_status
= WEXITSTATUS(status
);
259 ASSERT_EQ(kExpectedValue
, subprocess_exit_status
) << details
;
260 bool subprocess_exited_but_printed_messages
= !msg
.empty();
261 EXPECT_FALSE(subprocess_exited_but_printed_messages
) << details
;
264 void UnitTests::DeathSuccessAllowNoise(int status
,
265 const std::string
& msg
,
267 std::string
details(TestFailedMessage(msg
));
269 bool subprocess_terminated_normally
= WIFEXITED(status
);
270 ASSERT_TRUE(subprocess_terminated_normally
) << details
;
271 int subprocess_exit_status
= WEXITSTATUS(status
);
272 ASSERT_EQ(kExpectedValue
, subprocess_exit_status
) << details
;
275 void UnitTests::DeathMessage(int status
,
276 const std::string
& msg
,
278 std::string
details(TestFailedMessage(msg
));
279 const char* expected_msg
= static_cast<const char*>(aux
);
281 bool subprocess_terminated_normally
= WIFEXITED(status
);
282 ASSERT_TRUE(subprocess_terminated_normally
) << "Exit status: " << status
284 int subprocess_exit_status
= WEXITSTATUS(status
);
285 ASSERT_EQ(1, subprocess_exit_status
) << details
;
287 bool subprocess_exited_without_matching_message
=
288 msg
.find(expected_msg
) == std::string::npos
;
290 // In official builds CHECK messages are dropped, so look for SIGABRT.
291 // See https://code.google.com/p/chromium/issues/detail?id=437312
292 #if defined(OFFICIAL_BUILD) && defined(NDEBUG) && !defined(OS_ANDROID)
293 if (subprocess_exited_without_matching_message
) {
294 static const char kSigAbortMessage
[] = "Received signal 6";
295 subprocess_exited_without_matching_message
=
296 msg
.find(kSigAbortMessage
) == std::string::npos
;
299 EXPECT_FALSE(subprocess_exited_without_matching_message
) << details
;
302 void UnitTests::DeathSEGVMessage(int status
,
303 const std::string
& msg
,
305 std::string
details(TestFailedMessage(msg
));
306 const char* expected_msg
= static_cast<const char*>(aux
);
308 #if !defined(SANDBOX_USES_BASE_TEST_SUITE)
309 const bool subprocess_got_sigsegv
=
310 WIFSIGNALED(status
) && (SIGSEGV
== WTERMSIG(status
));
312 // This hack is required when a signal handler is installed
313 // for SEGV that will _exit(1).
314 const bool subprocess_got_sigsegv
=
315 WIFEXITED(status
) && (kExitAfterSIGSEGV
== WEXITSTATUS(status
));
318 ASSERT_TRUE(subprocess_got_sigsegv
) << "Exit status: " << status
321 bool subprocess_exited_without_matching_message
=
322 msg
.find(expected_msg
) == std::string::npos
;
323 EXPECT_FALSE(subprocess_exited_without_matching_message
) << details
;
326 void UnitTests::DeathExitCode(int status
,
327 const std::string
& msg
,
329 int expected_exit_code
= static_cast<int>(reinterpret_cast<intptr_t>(aux
));
330 std::string
details(TestFailedMessage(msg
));
332 bool subprocess_terminated_normally
= WIFEXITED(status
);
333 ASSERT_TRUE(subprocess_terminated_normally
) << details
;
334 int subprocess_exit_status
= WEXITSTATUS(status
);
335 ASSERT_EQ(expected_exit_code
, subprocess_exit_status
) << details
;
338 void UnitTests::DeathBySignal(int status
,
339 const std::string
& msg
,
341 int expected_signo
= static_cast<int>(reinterpret_cast<intptr_t>(aux
));
342 std::string
details(TestFailedMessage(msg
));
344 bool subprocess_terminated_by_signal
= WIFSIGNALED(status
);
345 ASSERT_TRUE(subprocess_terminated_by_signal
) << details
;
346 int subprocess_signal_number
= WTERMSIG(status
);
347 ASSERT_EQ(expected_signo
, subprocess_signal_number
) << details
;
350 void UnitTests::AssertionFailure(const char* expr
, const char* file
, int line
) {
351 fprintf(stderr
, "%s:%d:%s", file
, line
, expr
);
353 _exit(kExitWithAssertionFailure
);
356 void UnitTests::IgnoreThisTest() {
358 _exit(kIgnoreThisTest
);