// Copyright (c) 2011 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include #include #include #include #include "base/debug/debugging_buildflags.h" #include "base/debug/stack_trace.h" #include "base/logging.h" #include "base/process/kill.h" #include "base/process/process_handle.h" #include "base/test/test_timeouts.h" #include "build/build_config.h" #include "testing/gtest/include/gtest/gtest.h" #include "testing/multiprocess_func_list.h" #if defined(OS_POSIX) && !defined(OS_ANDROID) && !defined(OS_IOS) #include "base/test/multiprocess_test.h" #endif namespace base { namespace debug { #if defined(OS_POSIX) && !defined(OS_ANDROID) && !defined(OS_IOS) typedef MultiProcessTest StackTraceTest; #else typedef testing::Test StackTraceTest; #endif // Note: On Linux, this test currently only fully works on Debug builds. // See comments in the #ifdef soup if you intend to change this. #if defined(OS_WIN) // Always fails on Windows: crbug.com/32070 #define MAYBE_OutputToStream DISABLED_OutputToStream #else #define MAYBE_OutputToStream OutputToStream #endif #if !defined(__UCLIBC__) && !defined(_AIX) TEST_F(StackTraceTest, MAYBE_OutputToStream) { StackTrace trace; // Dump the trace into a string. std::ostringstream os; trace.OutputToStream(&os); std::string backtrace_message = os.str(); // ToString() should produce the same output. EXPECT_EQ(backtrace_message, trace.ToString()); #if defined(OS_POSIX) && !defined(OS_MACOSX) && NDEBUG // Stack traces require an extra data table that bloats our binaries, // so they're turned off for release builds. We stop the test here, // at least letting us verify that the calls don't crash. return; #endif // defined(OS_POSIX) && !defined(OS_MACOSX) && NDEBUG size_t frames_found = 0; trace.Addresses(&frames_found); ASSERT_GE(frames_found, 5u) << "No stack frames found. Skipping rest of test."; // Check if the output has symbol initialization warning. If it does, fail. ASSERT_EQ(backtrace_message.find("Dumping unresolved backtrace"), std::string::npos) << "Unable to resolve symbols. Skipping rest of test."; #if defined(OS_MACOSX) #if 0 // Disabled due to -fvisibility=hidden in build config. // Symbol resolution via the backtrace_symbol function does not work well // in OS X. // See this thread: // // http://lists.apple.com/archives/darwin-dev/2009/Mar/msg00111.html // // Just check instead that we find our way back to the "start" symbol // which should be the first symbol in the trace. // // TODO(port): Find a more reliable way to resolve symbols. // Expect to at least find main. EXPECT_TRUE(backtrace_message.find("start") != std::string::npos) << "Expected to find start in backtrace:\n" << backtrace_message; #endif #elif defined(USE_SYMBOLIZE) // This branch is for gcc-compiled code, but not Mac due to the // above #if. // Expect a demangled symbol. EXPECT_TRUE(backtrace_message.find("testing::Test::Run()") != std::string::npos) << "Expected a demangled symbol in backtrace:\n" << backtrace_message; #elif 0 // This is the fall-through case; it used to cover Windows. // But it's disabled because of varying buildbot configs; // some lack symbols. // Expect to at least find main. EXPECT_TRUE(backtrace_message.find("main") != std::string::npos) << "Expected to find main in backtrace:\n" << backtrace_message; #if defined(OS_WIN) // MSVC doesn't allow the use of C99's __func__ within C++, so we fake it with // MSVC's __FUNCTION__ macro. #define __func__ __FUNCTION__ #endif // Expect to find this function as well. // Note: This will fail if not linked with -rdynamic (aka -export_dynamic) EXPECT_TRUE(backtrace_message.find(__func__) != std::string::npos) << "Expected to find " << __func__ << " in backtrace:\n" << backtrace_message; #endif // define(OS_MACOSX) } #if !defined(OFFICIAL_BUILD) && !defined(NO_UNWIND_TABLES) // Disabled in Official builds, where Link-Time Optimization can result in two // or fewer stack frames being available, causing the test to fail. TEST_F(StackTraceTest, TruncatedTrace) { StackTrace trace; size_t count = 0; trace.Addresses(&count); ASSERT_LT(2u, count); StackTrace truncated(2); truncated.Addresses(&count); EXPECT_EQ(2u, count); } #endif // !defined(OFFICIAL_BUILD) // The test is used for manual testing, e.g., to see the raw output. TEST_F(StackTraceTest, DebugOutputToStream) { StackTrace trace; std::ostringstream os; trace.OutputToStream(&os); VLOG(1) << os.str(); } // The test is used for manual testing, e.g., to see the raw output. TEST_F(StackTraceTest, DebugPrintBacktrace) { StackTrace().Print(); } #endif // !defined(__UCLIBC__) #if defined(OS_POSIX) && !defined(OS_ANDROID) #if !defined(OS_IOS) static char* newArray() { // Clang warns about the mismatched new[]/delete if they occur in the same // function. return new char[10]; } MULTIPROCESS_TEST_MAIN(MismatchedMallocChildProcess) { char* pointer = newArray(); delete pointer; return 2; } // Regression test for StackDumpingSignalHandler async-signal unsafety. // Combined with tcmalloc's debugallocation, that signal handler // and e.g. mismatched new[]/delete would cause a hang because // of re-entering malloc. TEST_F(StackTraceTest, AsyncSignalUnsafeSignalHandlerHang) { Process child = SpawnChild("MismatchedMallocChildProcess"); ASSERT_TRUE(child.IsValid()); int exit_code; ASSERT_TRUE( child.WaitForExitWithTimeout(TestTimeouts::action_timeout(), &exit_code)); } #endif // !defined(OS_IOS) namespace { std::string itoa_r_wrapper(intptr_t i, size_t sz, int base, size_t padding) { char buffer[1024]; CHECK_LE(sz, sizeof(buffer)); char* result = internal::itoa_r(i, buffer, sz, base, padding); EXPECT_TRUE(result); return std::string(buffer); } } // namespace TEST_F(StackTraceTest, itoa_r) { EXPECT_EQ("0", itoa_r_wrapper(0, 128, 10, 0)); EXPECT_EQ("-1", itoa_r_wrapper(-1, 128, 10, 0)); // Test edge cases. if (sizeof(intptr_t) == 4) { EXPECT_EQ("ffffffff", itoa_r_wrapper(-1, 128, 16, 0)); EXPECT_EQ("-2147483648", itoa_r_wrapper(std::numeric_limits::min(), 128, 10, 0)); EXPECT_EQ("2147483647", itoa_r_wrapper(std::numeric_limits::max(), 128, 10, 0)); EXPECT_EQ("80000000", itoa_r_wrapper(std::numeric_limits::min(), 128, 16, 0)); EXPECT_EQ("7fffffff", itoa_r_wrapper(std::numeric_limits::max(), 128, 16, 0)); } else if (sizeof(intptr_t) == 8) { EXPECT_EQ("ffffffffffffffff", itoa_r_wrapper(-1, 128, 16, 0)); EXPECT_EQ("-9223372036854775808", itoa_r_wrapper(std::numeric_limits::min(), 128, 10, 0)); EXPECT_EQ("9223372036854775807", itoa_r_wrapper(std::numeric_limits::max(), 128, 10, 0)); EXPECT_EQ("8000000000000000", itoa_r_wrapper(std::numeric_limits::min(), 128, 16, 0)); EXPECT_EQ("7fffffffffffffff", itoa_r_wrapper(std::numeric_limits::max(), 128, 16, 0)); } else { ADD_FAILURE() << "Missing test case for your size of intptr_t (" << sizeof(intptr_t) << ")"; } // Test hex output. EXPECT_EQ("688", itoa_r_wrapper(0x688, 128, 16, 0)); EXPECT_EQ("deadbeef", itoa_r_wrapper(0xdeadbeef, 128, 16, 0)); // Check that itoa_r respects passed buffer size limit. char buffer[1024]; EXPECT_TRUE(internal::itoa_r(0xdeadbeef, buffer, 10, 16, 0)); EXPECT_TRUE(internal::itoa_r(0xdeadbeef, buffer, 9, 16, 0)); EXPECT_FALSE(internal::itoa_r(0xdeadbeef, buffer, 8, 16, 0)); EXPECT_FALSE(internal::itoa_r(0xdeadbeef, buffer, 7, 16, 0)); EXPECT_TRUE(internal::itoa_r(0xbeef, buffer, 5, 16, 4)); EXPECT_FALSE(internal::itoa_r(0xbeef, buffer, 5, 16, 5)); EXPECT_FALSE(internal::itoa_r(0xbeef, buffer, 5, 16, 6)); // Test padding. EXPECT_EQ("1", itoa_r_wrapper(1, 128, 10, 0)); EXPECT_EQ("1", itoa_r_wrapper(1, 128, 10, 1)); EXPECT_EQ("01", itoa_r_wrapper(1, 128, 10, 2)); EXPECT_EQ("001", itoa_r_wrapper(1, 128, 10, 3)); EXPECT_EQ("0001", itoa_r_wrapper(1, 128, 10, 4)); EXPECT_EQ("00001", itoa_r_wrapper(1, 128, 10, 5)); EXPECT_EQ("688", itoa_r_wrapper(0x688, 128, 16, 0)); EXPECT_EQ("688", itoa_r_wrapper(0x688, 128, 16, 1)); EXPECT_EQ("688", itoa_r_wrapper(0x688, 128, 16, 2)); EXPECT_EQ("688", itoa_r_wrapper(0x688, 128, 16, 3)); EXPECT_EQ("0688", itoa_r_wrapper(0x688, 128, 16, 4)); EXPECT_EQ("00688", itoa_r_wrapper(0x688, 128, 16, 5)); } #endif // defined(OS_POSIX) && !defined(OS_ANDROID) #if BUILDFLAG(CAN_UNWIND_WITH_FRAME_POINTERS) template void NOINLINE ExpectStackFramePointers(const void** frames, size_t max_depth) { code_start: // Calling __builtin_frame_address() forces compiler to emit // frame pointers, even if they are not enabled. EXPECT_NE(nullptr, __builtin_frame_address(0)); ExpectStackFramePointers(frames, max_depth); constexpr size_t frame_index = Depth - 1; const void* frame = frames[frame_index]; EXPECT_GE(frame, &&code_start) << "For frame at index " << frame_index; EXPECT_LE(frame, &&code_end) << "For frame at index " << frame_index; code_end: return; } template <> void NOINLINE ExpectStackFramePointers<1>(const void** frames, size_t max_depth) { code_start: // Calling __builtin_frame_address() forces compiler to emit // frame pointers, even if they are not enabled. EXPECT_NE(nullptr, __builtin_frame_address(0)); size_t count = TraceStackFramePointers(frames, max_depth, 0); ASSERT_EQ(max_depth, count); const void* frame = frames[0]; EXPECT_GE(frame, &&code_start) << "For the top frame"; EXPECT_LE(frame, &&code_end) << "For the top frame"; code_end: return; } #if defined(MEMORY_SANITIZER) // The test triggers use-of-uninitialized-value errors on MSan bots. // This is expected because we're walking and reading the stack, and // sometimes we read fp / pc from the place that previously held // uninitialized value. #define MAYBE_TraceStackFramePointers DISABLED_TraceStackFramePointers #else #define MAYBE_TraceStackFramePointers TraceStackFramePointers #endif TEST_F(StackTraceTest, MAYBE_TraceStackFramePointers) { constexpr size_t kDepth = 5; const void* frames[kDepth]; ExpectStackFramePointers(frames, kDepth); } #if defined(OS_ANDROID) || defined(OS_MACOSX) #define MAYBE_StackEnd StackEnd #else #define MAYBE_StackEnd DISABLED_StackEnd #endif TEST_F(StackTraceTest, MAYBE_StackEnd) { EXPECT_NE(0u, GetStackEnd()); } #endif // BUILDFLAG(CAN_UNWIND_WITH_FRAME_POINTERS) } // namespace debug } // namespace base