1 | //===-- sanitizer_linux_test.cpp ------------------------------------------===// |
2 | // |
3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
4 | // See https://llvm.org/LICENSE.txt for license information. |
5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
6 | // |
7 | //===----------------------------------------------------------------------===// |
8 | // |
9 | // Tests for sanitizer_linux.h |
10 | // |
11 | //===----------------------------------------------------------------------===// |
12 | |
13 | #include "sanitizer_common/sanitizer_platform.h" |
14 | #if SANITIZER_LINUX |
15 | |
16 | # include <pthread.h> |
17 | # include <sched.h> |
18 | # include <stdlib.h> |
19 | |
20 | # include <algorithm> |
21 | # include <vector> |
22 | |
23 | # include "gtest/gtest.h" |
24 | # include "sanitizer_common/sanitizer_common.h" |
25 | # include "sanitizer_common/sanitizer_file.h" |
26 | # include "sanitizer_common/sanitizer_linux.h" |
27 | |
28 | namespace __sanitizer { |
29 | |
30 | struct TidReporterArgument { |
31 | TidReporterArgument() { |
32 | pthread_mutex_init(mutex: &terminate_thread_mutex, NULL); |
33 | pthread_mutex_init(mutex: &tid_reported_mutex, NULL); |
34 | pthread_cond_init(cond: &terminate_thread_cond, NULL); |
35 | pthread_cond_init(cond: &tid_reported_cond, NULL); |
36 | terminate_thread = false; |
37 | } |
38 | |
39 | ~TidReporterArgument() { |
40 | pthread_mutex_destroy(mutex: &terminate_thread_mutex); |
41 | pthread_mutex_destroy(mutex: &tid_reported_mutex); |
42 | pthread_cond_destroy(cond: &terminate_thread_cond); |
43 | pthread_cond_destroy(cond: &tid_reported_cond); |
44 | } |
45 | |
46 | tid_t reported_tid; |
47 | // For signaling to spawned threads that they should terminate. |
48 | pthread_cond_t terminate_thread_cond; |
49 | pthread_mutex_t terminate_thread_mutex; |
50 | bool terminate_thread; |
51 | // For signaling to main thread that a child thread has reported its tid. |
52 | pthread_cond_t tid_reported_cond; |
53 | pthread_mutex_t tid_reported_mutex; |
54 | |
55 | private: |
56 | // Disallow evil constructors |
57 | TidReporterArgument(const TidReporterArgument &); |
58 | void operator=(const TidReporterArgument &); |
59 | }; |
60 | |
61 | class ThreadListerTest : public ::testing::Test { |
62 | protected: |
63 | virtual void SetUp() { |
64 | pthread_t pthread_id; |
65 | tid_t tid; |
66 | for (uptr i = 0; i < kThreadCount; i++) { |
67 | SpawnTidReporter(pthread_id: &pthread_id, tid: &tid); |
68 | pthread_ids_.push_back(pthread_id); |
69 | tids_.push_back(tid); |
70 | } |
71 | } |
72 | |
73 | virtual void TearDown() { |
74 | pthread_mutex_lock(mutex: &thread_arg.terminate_thread_mutex); |
75 | thread_arg.terminate_thread = true; |
76 | pthread_cond_broadcast(cond: &thread_arg.terminate_thread_cond); |
77 | pthread_mutex_unlock(mutex: &thread_arg.terminate_thread_mutex); |
78 | for (uptr i = 0; i < pthread_ids_.size(); i++) |
79 | pthread_join(pthread_ids_[i], NULL); |
80 | } |
81 | |
82 | void SpawnTidReporter(pthread_t *pthread_id, tid_t *tid); |
83 | |
84 | static const uptr kThreadCount = 20; |
85 | |
86 | std::vector<pthread_t> pthread_ids_; |
87 | std::vector<tid_t> tids_; |
88 | |
89 | TidReporterArgument thread_arg; |
90 | }; |
91 | |
92 | // Writes its TID once to reported_tid and waits until signaled to terminate. |
93 | void *TidReporterThread(void *argument) { |
94 | TidReporterArgument *arg = reinterpret_cast<TidReporterArgument *>(argument); |
95 | pthread_mutex_lock(mutex: &arg->tid_reported_mutex); |
96 | arg->reported_tid = GetTid(); |
97 | pthread_cond_broadcast(cond: &arg->tid_reported_cond); |
98 | pthread_mutex_unlock(mutex: &arg->tid_reported_mutex); |
99 | |
100 | pthread_mutex_lock(mutex: &arg->terminate_thread_mutex); |
101 | while (!arg->terminate_thread) |
102 | pthread_cond_wait(cond: &arg->terminate_thread_cond, |
103 | mutex: &arg->terminate_thread_mutex); |
104 | pthread_mutex_unlock(mutex: &arg->terminate_thread_mutex); |
105 | return NULL; |
106 | } |
107 | |
108 | void ThreadListerTest::SpawnTidReporter(pthread_t *pthread_id, tid_t *tid) { |
109 | pthread_mutex_lock(mutex: &thread_arg.tid_reported_mutex); |
110 | thread_arg.reported_tid = -1; |
111 | ASSERT_EQ(0, |
112 | pthread_create(newthread: pthread_id, NULL, start_routine: TidReporterThread, arg: &thread_arg)); |
113 | while (thread_arg.reported_tid == (tid_t)(-1)) |
114 | pthread_cond_wait(cond: &thread_arg.tid_reported_cond, |
115 | mutex: &thread_arg.tid_reported_mutex); |
116 | pthread_mutex_unlock(mutex: &thread_arg.tid_reported_mutex); |
117 | *tid = thread_arg.reported_tid; |
118 | } |
119 | |
120 | static std::vector<tid_t> ReadTidsToVector(ThreadLister *thread_lister) { |
121 | std::vector<tid_t> listed_tids; |
122 | InternalMmapVector<tid_t> threads(128); |
123 | EXPECT_TRUE(thread_lister->ListThreads(&threads)); |
124 | return std::vector<tid_t>(threads.begin(), threads.end()); |
125 | } |
126 | |
127 | static bool Includes(std::vector<tid_t> first, std::vector<tid_t> second) { |
128 | std::sort(first.begin(), first.end()); |
129 | std::sort(second.begin(), second.end()); |
130 | return std::includes(first.begin(), first.end(), second.begin(), |
131 | second.end()); |
132 | } |
133 | |
134 | static bool HasElement(const std::vector<tid_t> &vector, tid_t element) { |
135 | return std::find(vector.begin(), vector.end(), element) != vector.end(); |
136 | } |
137 | |
138 | // ThreadLister's output should include the current thread's TID and the TID of |
139 | // every thread we spawned. |
140 | TEST_F(ThreadListerTest, ThreadListerSeesAllSpawnedThreads) { |
141 | tid_t self_tid = GetTid(); |
142 | ThreadLister thread_lister(getpid()); |
143 | std::vector<tid_t> listed_tids = ReadTidsToVector(&thread_lister); |
144 | ASSERT_TRUE(HasElement(listed_tids, self_tid)); |
145 | ASSERT_TRUE(Includes(listed_tids, tids_)); |
146 | |
147 | ASSERT_NE(nullptr, thread_lister.LoadStatus(tid: self_tid)); |
148 | for (auto tid : tids_) ASSERT_NE(nullptr, thread_lister.LoadStatus(tid)); |
149 | } |
150 | |
151 | TEST_F(ThreadListerTest, DoNotForgetThreads) { |
152 | ThreadLister thread_lister(getpid()); |
153 | |
154 | // Run the loop body twice, because ThreadLister might behave differently if |
155 | // called on a freshly created object. |
156 | for (uptr i = 0; i < 2; i++) { |
157 | std::vector<tid_t> listed_tids = ReadTidsToVector(&thread_lister); |
158 | ASSERT_TRUE(Includes(listed_tids, tids_)); |
159 | } |
160 | } |
161 | |
162 | // If new threads have spawned during ThreadLister object's lifetime, calling |
163 | // relisting should cause ThreadLister to recognize their existence. |
164 | TEST_F(ThreadListerTest, NewThreads) { |
165 | ThreadLister thread_lister(getpid()); |
166 | std::vector<tid_t> threads_before_extra = ReadTidsToVector(&thread_lister); |
167 | |
168 | pthread_t ; |
169 | tid_t ; |
170 | SpawnTidReporter(&extra_pthread_id, &extra_tid); |
171 | // Register the new thread so it gets terminated in TearDown(). |
172 | pthread_ids_.push_back(extra_pthread_id); |
173 | |
174 | // It would be very bizarre if the new TID had been listed before we even |
175 | // spawned that thread, but it would also cause a false success in this test, |
176 | // so better check for that. |
177 | ASSERT_FALSE(HasElement(threads_before_extra, extra_tid)); |
178 | |
179 | std::vector<tid_t> threads_after_extra = ReadTidsToVector(&thread_lister); |
180 | ASSERT_TRUE(HasElement(threads_after_extra, extra_tid)); |
181 | } |
182 | |
183 | TEST(SanitizerCommon, SetEnvTest) { |
184 | const char kEnvName[] = "ENV_FOO" ; |
185 | SetEnv(name: kEnvName, value: "value" ); |
186 | EXPECT_STREQ("value" , getenv(name: kEnvName)); |
187 | unsetenv(name: kEnvName); |
188 | EXPECT_EQ(0, getenv(name: kEnvName)); |
189 | } |
190 | |
191 | # if (defined(__x86_64__) || defined(__i386__)) && !SANITIZER_ANDROID |
192 | // libpthread puts the thread descriptor at the end of stack space. |
193 | void *thread_descriptor_size_test_func(void *arg) { |
194 | uptr descr_addr = (uptr)pthread_self(); |
195 | pthread_attr_t attr; |
196 | pthread_getattr_np(th: pthread_self(), attr: &attr); |
197 | void *stackaddr; |
198 | size_t stacksize; |
199 | pthread_attr_getstack(attr: &attr, stackaddr: &stackaddr, stacksize: &stacksize); |
200 | return (void *)((uptr)stackaddr + stacksize - descr_addr); |
201 | } |
202 | |
203 | TEST(SanitizerLinux, ThreadDescriptorSize) { |
204 | pthread_t tid; |
205 | void *result; |
206 | ASSERT_EQ(0, pthread_create(&tid, 0, thread_descriptor_size_test_func, 0)); |
207 | ASSERT_EQ(0, pthread_join(tid, &result)); |
208 | InitTlsSize(); |
209 | EXPECT_EQ((uptr)result, ThreadDescriptorSize()); |
210 | } |
211 | # endif |
212 | |
213 | TEST(SanitizerCommon, LibraryNameIs) { |
214 | EXPECT_FALSE(LibraryNameIs("" , "" )); |
215 | |
216 | char full_name[256]; |
217 | const char *paths[] = {"" , "/" , "/path/to/" }; |
218 | const char *suffixes[] = {"" , "-linux" , ".1.2" , "-linux.1.2" }; |
219 | const char *base_names[] = {"lib" , "lib.0" , "lib-i386" }; |
220 | const char *wrong_names[] = {"" , "lib.9" , "lib-x86_64" }; |
221 | for (uptr i = 0; i < ARRAY_SIZE(paths); i++) |
222 | for (uptr j = 0; j < ARRAY_SIZE(suffixes); j++) { |
223 | for (uptr k = 0; k < ARRAY_SIZE(base_names); k++) { |
224 | internal_snprintf(full_name, ARRAY_SIZE(full_name), "%s%s%s.so" , |
225 | paths[i], base_names[k], suffixes[j]); |
226 | EXPECT_TRUE(LibraryNameIs(full_name, base_names[k])) |
227 | << "Full name " << full_name << " doesn't match base name " |
228 | << base_names[k]; |
229 | for (uptr m = 0; m < ARRAY_SIZE(wrong_names); m++) |
230 | EXPECT_FALSE(LibraryNameIs(full_name, wrong_names[m])) |
231 | << "Full name " << full_name << " matches base name " |
232 | << wrong_names[m]; |
233 | } |
234 | } |
235 | } |
236 | |
237 | # if defined(__mips64) |
238 | // Effectively, this is a test for ThreadDescriptorSize() which is used to |
239 | // compute ThreadSelf(). |
240 | TEST(SanitizerLinux, ThreadSelfTest) { |
241 | ASSERT_EQ(pthread_self(), ThreadSelf()); |
242 | } |
243 | # endif |
244 | |
245 | TEST(SanitizerCommon, StartSubprocessTest) { |
246 | int pipe_fds[2]; |
247 | ASSERT_EQ(0, pipe(pipe_fds)); |
248 | # if SANITIZER_ANDROID |
249 | const char *shell = "/system/bin/sh" ; |
250 | # else |
251 | const char *shell = "/bin/sh" ; |
252 | # endif |
253 | const char *argv[] = {shell, "-c" , "echo -n 'hello'" , (char *)NULL}; |
254 | int pid = StartSubprocess(shell, argv, GetEnviron(), |
255 | /* stdin */ kInvalidFd, /* stdout */ pipe_fds[1]); |
256 | ASSERT_GT(pid, 0); |
257 | |
258 | // wait for process to finish. |
259 | while (IsProcessRunning(pid)) { |
260 | } |
261 | ASSERT_FALSE(IsProcessRunning(pid)); |
262 | |
263 | char buffer[256]; |
264 | { |
265 | char *ptr = buffer; |
266 | uptr bytes_read; |
267 | while (ReadFromFile(pipe_fds[0], ptr, 256, &bytes_read)) { |
268 | if (!bytes_read) { |
269 | break; |
270 | } |
271 | ptr += bytes_read; |
272 | } |
273 | ASSERT_EQ(5, ptr - buffer); |
274 | *ptr = 0; |
275 | } |
276 | ASSERT_EQ(0, strcmp(buffer, "hello" )) << "Buffer: " << buffer; |
277 | internal_close(pipe_fds[0]); |
278 | } |
279 | |
280 | } // namespace __sanitizer |
281 | |
282 | #endif // SANITIZER_LINUX |
283 | |