diff options
Diffstat (limited to 'base/debug/stack_trace_unittest.cc')
-rw-r--r-- | base/debug/stack_trace_unittest.cc | 320 |
1 files changed, 320 insertions, 0 deletions
diff --git a/base/debug/stack_trace_unittest.cc b/base/debug/stack_trace_unittest.cc new file mode 100644 index 0000000000..02f076a2ae --- /dev/null +++ b/base/debug/stack_trace_unittest.cc @@ -0,0 +1,320 @@ +// Copyright (c) 2011 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#include <stddef.h> + +#include <limits> +#include <sstream> +#include <string> + +#include "base/debug/debugging_buildflags.h" +#include "base/debug/stack_trace.h" +#include "base/logging.h" +#include "base/process/kill.h" +#include "base/process/process_handle.h" +#include "base/test/test_timeouts.h" +#include "build/build_config.h" +#include "testing/gtest/include/gtest/gtest.h" +#include "testing/multiprocess_func_list.h" + +#if defined(OS_POSIX) && !defined(OS_ANDROID) && !defined(OS_IOS) +#include "base/test/multiprocess_test.h" +#endif + +namespace base { +namespace debug { + +#if defined(OS_POSIX) && !defined(OS_ANDROID) && !defined(OS_IOS) +typedef MultiProcessTest StackTraceTest; +#else +typedef testing::Test StackTraceTest; +#endif + +// Note: On Linux, this test currently only fully works on Debug builds. +// See comments in the #ifdef soup if you intend to change this. +#if defined(OS_WIN) +// Always fails on Windows: crbug.com/32070 +#define MAYBE_OutputToStream DISABLED_OutputToStream +#else +#define MAYBE_OutputToStream OutputToStream +#endif +#if !defined(__UCLIBC__) && !defined(_AIX) +TEST_F(StackTraceTest, MAYBE_OutputToStream) { + StackTrace trace; + + // Dump the trace into a string. + std::ostringstream os; + trace.OutputToStream(&os); + std::string backtrace_message = os.str(); + + // ToString() should produce the same output. + EXPECT_EQ(backtrace_message, trace.ToString()); + +#if defined(OS_POSIX) && !defined(OS_MACOSX) && NDEBUG + // Stack traces require an extra data table that bloats our binaries, + // so they're turned off for release builds. We stop the test here, + // at least letting us verify that the calls don't crash. + return; +#endif // defined(OS_POSIX) && !defined(OS_MACOSX) && NDEBUG + + size_t frames_found = 0; + trace.Addresses(&frames_found); + ASSERT_GE(frames_found, 5u) << + "No stack frames found. Skipping rest of test."; + + // Check if the output has symbol initialization warning. If it does, fail. + ASSERT_EQ(backtrace_message.find("Dumping unresolved backtrace"), + std::string::npos) << + "Unable to resolve symbols. Skipping rest of test."; + +#if defined(OS_MACOSX) +#if 0 + // Disabled due to -fvisibility=hidden in build config. + + // Symbol resolution via the backtrace_symbol function does not work well + // in OS X. + // See this thread: + // + // http://lists.apple.com/archives/darwin-dev/2009/Mar/msg00111.html + // + // Just check instead that we find our way back to the "start" symbol + // which should be the first symbol in the trace. + // + // TODO(port): Find a more reliable way to resolve symbols. + + // Expect to at least find main. + EXPECT_TRUE(backtrace_message.find("start") != std::string::npos) + << "Expected to find start in backtrace:\n" + << backtrace_message; + +#endif +#elif defined(USE_SYMBOLIZE) + // This branch is for gcc-compiled code, but not Mac due to the + // above #if. + // Expect a demangled symbol. + EXPECT_TRUE(backtrace_message.find("testing::Test::Run()") != + std::string::npos) + << "Expected a demangled symbol in backtrace:\n" + << backtrace_message; + +#elif 0 + // This is the fall-through case; it used to cover Windows. + // But it's disabled because of varying buildbot configs; + // some lack symbols. + + // Expect to at least find main. + EXPECT_TRUE(backtrace_message.find("main") != std::string::npos) + << "Expected to find main in backtrace:\n" + << backtrace_message; + +#if defined(OS_WIN) +// MSVC doesn't allow the use of C99's __func__ within C++, so we fake it with +// MSVC's __FUNCTION__ macro. +#define __func__ __FUNCTION__ +#endif + + // Expect to find this function as well. + // Note: This will fail if not linked with -rdynamic (aka -export_dynamic) + EXPECT_TRUE(backtrace_message.find(__func__) != std::string::npos) + << "Expected to find " << __func__ << " in backtrace:\n" + << backtrace_message; + +#endif // define(OS_MACOSX) +} + +#if !defined(OFFICIAL_BUILD) && !defined(NO_UNWIND_TABLES) +// Disabled in Official builds, where Link-Time Optimization can result in two +// or fewer stack frames being available, causing the test to fail. +TEST_F(StackTraceTest, TruncatedTrace) { + StackTrace trace; + + size_t count = 0; + trace.Addresses(&count); + ASSERT_LT(2u, count); + + StackTrace truncated(2); + truncated.Addresses(&count); + EXPECT_EQ(2u, count); +} +#endif // !defined(OFFICIAL_BUILD) + +// The test is used for manual testing, e.g., to see the raw output. +TEST_F(StackTraceTest, DebugOutputToStream) { + StackTrace trace; + std::ostringstream os; + trace.OutputToStream(&os); + VLOG(1) << os.str(); +} + +// The test is used for manual testing, e.g., to see the raw output. +TEST_F(StackTraceTest, DebugPrintBacktrace) { + StackTrace().Print(); +} +#endif // !defined(__UCLIBC__) + +#if defined(OS_POSIX) && !defined(OS_ANDROID) +#if !defined(OS_IOS) +static char* newArray() { + // Clang warns about the mismatched new[]/delete if they occur in the same + // function. + return new char[10]; +} + +MULTIPROCESS_TEST_MAIN(MismatchedMallocChildProcess) { + char* pointer = newArray(); + delete pointer; + return 2; +} + +// Regression test for StackDumpingSignalHandler async-signal unsafety. +// Combined with tcmalloc's debugallocation, that signal handler +// and e.g. mismatched new[]/delete would cause a hang because +// of re-entering malloc. +TEST_F(StackTraceTest, AsyncSignalUnsafeSignalHandlerHang) { + Process child = SpawnChild("MismatchedMallocChildProcess"); + ASSERT_TRUE(child.IsValid()); + int exit_code; + ASSERT_TRUE( + child.WaitForExitWithTimeout(TestTimeouts::action_timeout(), &exit_code)); +} +#endif // !defined(OS_IOS) + +namespace { + +std::string itoa_r_wrapper(intptr_t i, size_t sz, int base, size_t padding) { + char buffer[1024]; + CHECK_LE(sz, sizeof(buffer)); + + char* result = internal::itoa_r(i, buffer, sz, base, padding); + EXPECT_TRUE(result); + return std::string(buffer); +} + +} // namespace + +TEST_F(StackTraceTest, itoa_r) { + EXPECT_EQ("0", itoa_r_wrapper(0, 128, 10, 0)); + EXPECT_EQ("-1", itoa_r_wrapper(-1, 128, 10, 0)); + + // Test edge cases. + if (sizeof(intptr_t) == 4) { + EXPECT_EQ("ffffffff", itoa_r_wrapper(-1, 128, 16, 0)); + EXPECT_EQ("-2147483648", + itoa_r_wrapper(std::numeric_limits<intptr_t>::min(), 128, 10, 0)); + EXPECT_EQ("2147483647", + itoa_r_wrapper(std::numeric_limits<intptr_t>::max(), 128, 10, 0)); + + EXPECT_EQ("80000000", + itoa_r_wrapper(std::numeric_limits<intptr_t>::min(), 128, 16, 0)); + EXPECT_EQ("7fffffff", + itoa_r_wrapper(std::numeric_limits<intptr_t>::max(), 128, 16, 0)); + } else if (sizeof(intptr_t) == 8) { + EXPECT_EQ("ffffffffffffffff", itoa_r_wrapper(-1, 128, 16, 0)); + EXPECT_EQ("-9223372036854775808", + itoa_r_wrapper(std::numeric_limits<intptr_t>::min(), 128, 10, 0)); + EXPECT_EQ("9223372036854775807", + itoa_r_wrapper(std::numeric_limits<intptr_t>::max(), 128, 10, 0)); + + EXPECT_EQ("8000000000000000", + itoa_r_wrapper(std::numeric_limits<intptr_t>::min(), 128, 16, 0)); + EXPECT_EQ("7fffffffffffffff", + itoa_r_wrapper(std::numeric_limits<intptr_t>::max(), 128, 16, 0)); + } else { + ADD_FAILURE() << "Missing test case for your size of intptr_t (" + << sizeof(intptr_t) << ")"; + } + + // Test hex output. + EXPECT_EQ("688", itoa_r_wrapper(0x688, 128, 16, 0)); + EXPECT_EQ("deadbeef", itoa_r_wrapper(0xdeadbeef, 128, 16, 0)); + + // Check that itoa_r respects passed buffer size limit. + char buffer[1024]; + EXPECT_TRUE(internal::itoa_r(0xdeadbeef, buffer, 10, 16, 0)); + EXPECT_TRUE(internal::itoa_r(0xdeadbeef, buffer, 9, 16, 0)); + EXPECT_FALSE(internal::itoa_r(0xdeadbeef, buffer, 8, 16, 0)); + EXPECT_FALSE(internal::itoa_r(0xdeadbeef, buffer, 7, 16, 0)); + EXPECT_TRUE(internal::itoa_r(0xbeef, buffer, 5, 16, 4)); + EXPECT_FALSE(internal::itoa_r(0xbeef, buffer, 5, 16, 5)); + EXPECT_FALSE(internal::itoa_r(0xbeef, buffer, 5, 16, 6)); + + // Test padding. + EXPECT_EQ("1", itoa_r_wrapper(1, 128, 10, 0)); + EXPECT_EQ("1", itoa_r_wrapper(1, 128, 10, 1)); + EXPECT_EQ("01", itoa_r_wrapper(1, 128, 10, 2)); + EXPECT_EQ("001", itoa_r_wrapper(1, 128, 10, 3)); + EXPECT_EQ("0001", itoa_r_wrapper(1, 128, 10, 4)); + EXPECT_EQ("00001", itoa_r_wrapper(1, 128, 10, 5)); + EXPECT_EQ("688", itoa_r_wrapper(0x688, 128, 16, 0)); + EXPECT_EQ("688", itoa_r_wrapper(0x688, 128, 16, 1)); + EXPECT_EQ("688", itoa_r_wrapper(0x688, 128, 16, 2)); + EXPECT_EQ("688", itoa_r_wrapper(0x688, 128, 16, 3)); + EXPECT_EQ("0688", itoa_r_wrapper(0x688, 128, 16, 4)); + EXPECT_EQ("00688", itoa_r_wrapper(0x688, 128, 16, 5)); +} +#endif // defined(OS_POSIX) && !defined(OS_ANDROID) + +#if BUILDFLAG(CAN_UNWIND_WITH_FRAME_POINTERS) + +template <size_t Depth> +void NOINLINE ExpectStackFramePointers(const void** frames, + size_t max_depth) { + code_start: + // Calling __builtin_frame_address() forces compiler to emit + // frame pointers, even if they are not enabled. + EXPECT_NE(nullptr, __builtin_frame_address(0)); + ExpectStackFramePointers<Depth - 1>(frames, max_depth); + + constexpr size_t frame_index = Depth - 1; + const void* frame = frames[frame_index]; + EXPECT_GE(frame, &&code_start) << "For frame at index " << frame_index; + EXPECT_LE(frame, &&code_end) << "For frame at index " << frame_index; + code_end: return; +} + +template <> +void NOINLINE ExpectStackFramePointers<1>(const void** frames, + size_t max_depth) { + code_start: + // Calling __builtin_frame_address() forces compiler to emit + // frame pointers, even if they are not enabled. + EXPECT_NE(nullptr, __builtin_frame_address(0)); + size_t count = TraceStackFramePointers(frames, max_depth, 0); + ASSERT_EQ(max_depth, count); + + const void* frame = frames[0]; + EXPECT_GE(frame, &&code_start) << "For the top frame"; + EXPECT_LE(frame, &&code_end) << "For the top frame"; + code_end: return; +} + +#if defined(MEMORY_SANITIZER) +// The test triggers use-of-uninitialized-value errors on MSan bots. +// This is expected because we're walking and reading the stack, and +// sometimes we read fp / pc from the place that previously held +// uninitialized value. +#define MAYBE_TraceStackFramePointers DISABLED_TraceStackFramePointers +#else +#define MAYBE_TraceStackFramePointers TraceStackFramePointers +#endif +TEST_F(StackTraceTest, MAYBE_TraceStackFramePointers) { + constexpr size_t kDepth = 5; + const void* frames[kDepth]; + ExpectStackFramePointers<kDepth>(frames, kDepth); +} + +#if defined(OS_ANDROID) || defined(OS_MACOSX) +#define MAYBE_StackEnd StackEnd +#else +#define MAYBE_StackEnd DISABLED_StackEnd +#endif + +TEST_F(StackTraceTest, MAYBE_StackEnd) { + EXPECT_NE(0u, GetStackEnd()); +} + +#endif // BUILDFLAG(CAN_UNWIND_WITH_FRAME_POINTERS) + +} // namespace debug +} // namespace base |