// Copyright (c) 2011 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include #include #include #include #include "base/debug/debugging_buildflags.h" #include "base/debug/stack_trace.h" #include "base/logging.h" #include "base/process/kill.h" #include "base/process/process_handle.h" #include "base/test/test_timeouts.h" #include "build/build_config.h" #include "testing/gtest/include/gtest/gtest.h" #include "testing/multiprocess_func_list.h" #if defined(OS_POSIX) && !defined(OS_ANDROID) && !defined(OS_IOS) #include "base/test/multiprocess_test.h" #endif namespace base { namespace debug { #if defined(OS_POSIX) && !defined(OS_ANDROID) && !defined(OS_IOS) typedef MultiProcessTest StackTraceTest; #else typedef testing::Test StackTraceTest; #endif #if !defined(__UCLIBC__) && !defined(_AIX) // StackTrace::OutputToStream() is not implemented under uclibc, nor AIX. // See https://crbug.com/706728 TEST_F(StackTraceTest, OutputToStream) { StackTrace trace; // Dump the trace into a string. std::ostringstream os; trace.OutputToStream(&os); std::string backtrace_message = os.str(); // ToString() should produce the same output. EXPECT_EQ(backtrace_message, trace.ToString()); size_t frames_found = 0; const void* const* addresses = trace.Addresses(&frames_found); #if defined(OFFICIAL_BUILD) && \ ((defined(OS_POSIX) && !defined(OS_MACOSX)) || defined(OS_FUCHSIA)) // Stack traces require an extra data table that bloats our binaries, // so they're turned off for official builds. Stop the test here, so // it at least verifies that StackTrace calls don't crash. return; #endif // defined(OFFICIAL_BUILD) && // ((defined(OS_POSIX) && !defined(OS_MACOSX)) || defined(OS_FUCHSIA)) ASSERT_TRUE(addresses); ASSERT_GT(frames_found, 5u) << "Too few frames found."; #if defined(OFFICIAL_BUILD) && defined(OS_MACOSX) // Official Mac OS X builds contain enough information to unwind the stack, // but not enough to symbolize the output. return; #endif // defined(OFFICIAL_BUILD) && defined(OS_MACOSX) #if defined(OS_FUCHSIA) || defined(OS_ANDROID) // Under Fuchsia and Android, StackTrace emits executable build-Ids and // address offsets which are symbolized on the test host system, rather than // being symbolized in-process. return; #endif // defined(OS_FUCHSIA) || defined(OS_ANDROID) #if defined(ADDRESS_SANITIZER) || defined(THREAD_SANITIZER) || \ defined(MEMORY_SANITIZER) // Sanitizer configurations (ASan, TSan, MSan) emit unsymbolized stacks. return; #endif // defined(ADDRESS_SANITIZER) || defined(THREAD_SANITIZER) || // defined(MEMORY_SANITIZER) // Check if the output has symbol initialization warning. If it does, fail. ASSERT_EQ(backtrace_message.find("Dumping unresolved backtrace"), std::string::npos) << "Unable to resolve symbols."; // Expect a demangled symbol. // Note that Windows Release builds omit the function parameters from the // demangled stack output, otherwise this could be "testing::Test::Run()". EXPECT_TRUE(backtrace_message.find("testing::Test::Run") != std::string::npos) << "Expected a demangled symbol in backtrace:\n" << backtrace_message; // Expect to at least find main. EXPECT_TRUE(backtrace_message.find("main") != std::string::npos) << "Expected to find main in backtrace:\n" << backtrace_message; // Expect to find this function as well. // Note: This will fail if not linked with -rdynamic (aka -export_dynamic) EXPECT_TRUE(backtrace_message.find(__func__) != std::string::npos) << "Expected to find " << __func__ << " in backtrace:\n" << backtrace_message; } #if !defined(OFFICIAL_BUILD) && !defined(NO_UNWIND_TABLES) // Disabled in Official builds, where Link-Time Optimization can result in two // or fewer stack frames being available, causing the test to fail. TEST_F(StackTraceTest, TruncatedTrace) { StackTrace trace; size_t count = 0; trace.Addresses(&count); ASSERT_LT(2u, count); StackTrace truncated(2); truncated.Addresses(&count); EXPECT_EQ(2u, count); } #endif // !defined(OFFICIAL_BUILD) && !defined(NO_UNWIND_TABLES) // The test is used for manual testing, e.g., to see the raw output. TEST_F(StackTraceTest, DebugOutputToStream) { StackTrace trace; std::ostringstream os; trace.OutputToStream(&os); VLOG(1) << os.str(); } // The test is used for manual testing, e.g., to see the raw output. TEST_F(StackTraceTest, DebugPrintBacktrace) { StackTrace().Print(); } // The test is used for manual testing, e.g., to see the raw output. TEST_F(StackTraceTest, DebugPrintWithPrefixBacktrace) { StackTrace().PrintWithPrefix("[test]"); } // Make sure nullptr prefix doesn't crash. Output not examined, much // like the DebugPrintBacktrace test above. TEST_F(StackTraceTest, DebugPrintWithNullPrefixBacktrace) { StackTrace().PrintWithPrefix(nullptr); } // Test OutputToStreamWithPrefix, mainly to make sure it doesn't // crash. Any "real" stack trace testing happens above. TEST_F(StackTraceTest, DebugOutputToStreamWithPrefix) { StackTrace trace; const char* prefix_string = "[test]"; std::ostringstream os; trace.OutputToStreamWithPrefix(&os, prefix_string); std::string backtrace_message = os.str(); // ToStringWithPrefix() should produce the same output. EXPECT_EQ(backtrace_message, trace.ToStringWithPrefix(prefix_string)); } // Make sure nullptr prefix doesn't crash. Output not examined, much // like the DebugPrintBacktrace test above. TEST_F(StackTraceTest, DebugOutputToStreamWithNullPrefix) { StackTrace trace; std::ostringstream os; trace.OutputToStreamWithPrefix(&os, nullptr); trace.ToStringWithPrefix(nullptr); } #endif // !defined(__UCLIBC__) && !defined(_AIX) #if defined(OS_POSIX) && !defined(OS_ANDROID) #if !defined(OS_IOS) static char* newArray() { // Clang warns about the mismatched new[]/delete if they occur in the same // function. return new char[10]; } MULTIPROCESS_TEST_MAIN(MismatchedMallocChildProcess) { char* pointer = newArray(); delete pointer; return 2; } // Regression test for StackDumpingSignalHandler async-signal unsafety. // Combined with tcmalloc's debugallocation, that signal handler // and e.g. mismatched new[]/delete would cause a hang because // of re-entering malloc. TEST_F(StackTraceTest, AsyncSignalUnsafeSignalHandlerHang) { Process child = SpawnChild("MismatchedMallocChildProcess"); ASSERT_TRUE(child.IsValid()); int exit_code; ASSERT_TRUE( child.WaitForExitWithTimeout(TestTimeouts::action_timeout(), &exit_code)); } #endif // !defined(OS_IOS) namespace { std::string itoa_r_wrapper(intptr_t i, size_t sz, int base, size_t padding) { char buffer[1024]; CHECK_LE(sz, sizeof(buffer)); char* result = internal::itoa_r(i, buffer, sz, base, padding); EXPECT_TRUE(result); return std::string(buffer); } } // namespace TEST_F(StackTraceTest, itoa_r) { EXPECT_EQ("0", itoa_r_wrapper(0, 128, 10, 0)); EXPECT_EQ("-1", itoa_r_wrapper(-1, 128, 10, 0)); // Test edge cases. if (sizeof(intptr_t) == 4) { EXPECT_EQ("ffffffff", itoa_r_wrapper(-1, 128, 16, 0)); EXPECT_EQ("-2147483648", itoa_r_wrapper(std::numeric_limits::min(), 128, 10, 0)); EXPECT_EQ("2147483647", itoa_r_wrapper(std::numeric_limits::max(), 128, 10, 0)); EXPECT_EQ("80000000", itoa_r_wrapper(std::numeric_limits::min(), 128, 16, 0)); EXPECT_EQ("7fffffff", itoa_r_wrapper(std::numeric_limits::max(), 128, 16, 0)); } else if (sizeof(intptr_t) == 8) { EXPECT_EQ("ffffffffffffffff", itoa_r_wrapper(-1, 128, 16, 0)); EXPECT_EQ("-9223372036854775808", itoa_r_wrapper(std::numeric_limits::min(), 128, 10, 0)); EXPECT_EQ("9223372036854775807", itoa_r_wrapper(std::numeric_limits::max(), 128, 10, 0)); EXPECT_EQ("8000000000000000", itoa_r_wrapper(std::numeric_limits::min(), 128, 16, 0)); EXPECT_EQ("7fffffffffffffff", itoa_r_wrapper(std::numeric_limits::max(), 128, 16, 0)); } else { ADD_FAILURE() << "Missing test case for your size of intptr_t (" << sizeof(intptr_t) << ")"; } // Test hex output. EXPECT_EQ("688", itoa_r_wrapper(0x688, 128, 16, 0)); EXPECT_EQ("deadbeef", itoa_r_wrapper(0xdeadbeef, 128, 16, 0)); // Check that itoa_r respects passed buffer size limit. char buffer[1024]; EXPECT_TRUE(internal::itoa_r(0xdeadbeef, buffer, 10, 16, 0)); EXPECT_TRUE(internal::itoa_r(0xdeadbeef, buffer, 9, 16, 0)); EXPECT_FALSE(internal::itoa_r(0xdeadbeef, buffer, 8, 16, 0)); EXPECT_FALSE(internal::itoa_r(0xdeadbeef, buffer, 7, 16, 0)); EXPECT_TRUE(internal::itoa_r(0xbeef, buffer, 5, 16, 4)); EXPECT_FALSE(internal::itoa_r(0xbeef, buffer, 5, 16, 5)); EXPECT_FALSE(internal::itoa_r(0xbeef, buffer, 5, 16, 6)); // Test padding. EXPECT_EQ("1", itoa_r_wrapper(1, 128, 10, 0)); EXPECT_EQ("1", itoa_r_wrapper(1, 128, 10, 1)); EXPECT_EQ("01", itoa_r_wrapper(1, 128, 10, 2)); EXPECT_EQ("001", itoa_r_wrapper(1, 128, 10, 3)); EXPECT_EQ("0001", itoa_r_wrapper(1, 128, 10, 4)); EXPECT_EQ("00001", itoa_r_wrapper(1, 128, 10, 5)); EXPECT_EQ("688", itoa_r_wrapper(0x688, 128, 16, 0)); EXPECT_EQ("688", itoa_r_wrapper(0x688, 128, 16, 1)); EXPECT_EQ("688", itoa_r_wrapper(0x688, 128, 16, 2)); EXPECT_EQ("688", itoa_r_wrapper(0x688, 128, 16, 3)); EXPECT_EQ("0688", itoa_r_wrapper(0x688, 128, 16, 4)); EXPECT_EQ("00688", itoa_r_wrapper(0x688, 128, 16, 5)); } #endif // defined(OS_POSIX) && !defined(OS_ANDROID) #if BUILDFLAG(CAN_UNWIND_WITH_FRAME_POINTERS) template void NOINLINE ExpectStackFramePointers(const void** frames, size_t max_depth) { code_start: // Calling __builtin_frame_address() forces compiler to emit // frame pointers, even if they are not enabled. EXPECT_NE(nullptr, __builtin_frame_address(0)); ExpectStackFramePointers(frames, max_depth); constexpr size_t frame_index = Depth - 1; const void* frame = frames[frame_index]; EXPECT_GE(frame, &&code_start) << "For frame at index " << frame_index; EXPECT_LE(frame, &&code_end) << "For frame at index " << frame_index; code_end: return; } template <> void NOINLINE ExpectStackFramePointers<1>(const void** frames, size_t max_depth) { code_start: // Calling __builtin_frame_address() forces compiler to emit // frame pointers, even if they are not enabled. EXPECT_NE(nullptr, __builtin_frame_address(0)); size_t count = TraceStackFramePointers(frames, max_depth, 0); ASSERT_EQ(max_depth, count); const void* frame = frames[0]; EXPECT_GE(frame, &&code_start) << "For the top frame"; EXPECT_LE(frame, &&code_end) << "For the top frame"; code_end: return; } #if defined(MEMORY_SANITIZER) // The test triggers use-of-uninitialized-value errors on MSan bots. // This is expected because we're walking and reading the stack, and // sometimes we read fp / pc from the place that previously held // uninitialized value. #define MAYBE_TraceStackFramePointers DISABLED_TraceStackFramePointers #else #define MAYBE_TraceStackFramePointers TraceStackFramePointers #endif TEST_F(StackTraceTest, MAYBE_TraceStackFramePointers) { constexpr size_t kDepth = 5; const void* frames[kDepth]; ExpectStackFramePointers(frames, kDepth); } #if defined(OS_ANDROID) || defined(OS_MACOSX) #define MAYBE_StackEnd StackEnd #else #define MAYBE_StackEnd DISABLED_StackEnd #endif TEST_F(StackTraceTest, MAYBE_StackEnd) { EXPECT_NE(0u, GetStackEnd()); } #endif // BUILDFLAG(CAN_UNWIND_WITH_FRAME_POINTERS) } // namespace debug } // namespace base