0ff8205261
Change the unittest runner to no longer uncondtionally set up a default platform in the "environment", but to instead make platform set-up part of the "mixin" framework for test fixtures. Requires modifying some tests that expect the platform to be available, and all flag implications resolved, before the mixin constructors run. We still keep the environment for setting up the process for cppgc. This process setup can only be done once per process, so it can no longer use the platform -- that's ok though, the page allocator used by cppgc's process initialisation doesn't have to be the same as the platform's so we can just pass in a separate new one. Change-Id: Ic8ccf39722e8212962c5bba87350c4b304388a7c Reviewed-on: https://chromium-review.googlesource.com/c/v8/v8/+/3571886 Reviewed-by: Michael Lippautz <mlippautz@chromium.org> Auto-Submit: Leszek Swirski <leszeks@chromium.org> Commit-Queue: Leszek Swirski <leszeks@chromium.org> Cr-Commit-Position: refs/heads/main@{#79820}
181 lines
6.0 KiB
C++
181 lines
6.0 KiB
C++
// Copyright 2017 the V8 project authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "src/utils/allocation.h"
|
|
|
|
#include "test/unittests/test-utils.h"
|
|
|
|
#if V8_OS_POSIX
|
|
#include <setjmp.h>
|
|
#include <signal.h>
|
|
#include <unistd.h>
|
|
#endif // V8_OS_POSIX
|
|
|
|
#include "testing/gtest/include/gtest/gtest.h"
|
|
|
|
namespace v8 {
|
|
namespace internal {
|
|
|
|
// TODO(eholk): Add a windows version of permissions tests.
|
|
#if V8_OS_POSIX
|
|
namespace {
|
|
|
|
// These tests make sure the routines to allocate memory do so with the correct
|
|
// permissions.
|
|
//
|
|
// Unfortunately, there is no API to find the protection of a memory address,
|
|
// so instead we test permissions by installing a signal handler, probing a
|
|
// memory location and recovering from the fault.
|
|
//
|
|
// We don't test the execution permission because to do so we'd have to
|
|
// dynamically generate code and test if we can execute it.
|
|
|
|
class MemoryAllocationPermissionsTest : public TestWithPlatform {
|
|
static void SignalHandler(int signal, siginfo_t* info, void*) {
|
|
siglongjmp(continuation_, 1);
|
|
}
|
|
struct sigaction old_action_;
|
|
// On Mac, sometimes we get SIGBUS instead of SIGSEGV.
|
|
#if V8_OS_DARWIN
|
|
struct sigaction old_bus_action_;
|
|
#endif
|
|
|
|
protected:
|
|
void SetUp() override {
|
|
struct sigaction action;
|
|
action.sa_sigaction = SignalHandler;
|
|
sigemptyset(&action.sa_mask);
|
|
action.sa_flags = SA_SIGINFO;
|
|
sigaction(SIGSEGV, &action, &old_action_);
|
|
#if V8_OS_DARWIN
|
|
sigaction(SIGBUS, &action, &old_bus_action_);
|
|
#endif
|
|
}
|
|
|
|
void TearDown() override {
|
|
// Be a good citizen and restore the old signal handler.
|
|
sigaction(SIGSEGV, &old_action_, nullptr);
|
|
#if V8_OS_DARWIN
|
|
sigaction(SIGBUS, &old_bus_action_, nullptr);
|
|
#endif
|
|
}
|
|
|
|
public:
|
|
static sigjmp_buf continuation_;
|
|
|
|
enum class MemoryAction { kRead, kWrite };
|
|
|
|
void ProbeMemory(volatile int* buffer, MemoryAction action,
|
|
bool should_succeed) {
|
|
const int save_sigs = 1;
|
|
if (!sigsetjmp(continuation_, save_sigs)) {
|
|
switch (action) {
|
|
case MemoryAction::kRead: {
|
|
// static_cast to remove the reference and force a memory read.
|
|
USE(static_cast<int>(*buffer));
|
|
break;
|
|
}
|
|
case MemoryAction::kWrite: {
|
|
*buffer = 0;
|
|
break;
|
|
}
|
|
}
|
|
if (should_succeed) {
|
|
SUCCEED();
|
|
} else {
|
|
FAIL();
|
|
}
|
|
return;
|
|
}
|
|
if (should_succeed) {
|
|
FAIL();
|
|
} else {
|
|
SUCCEED();
|
|
}
|
|
}
|
|
|
|
void TestPermissions(PageAllocator::Permission permission, bool can_read,
|
|
bool can_write) {
|
|
v8::PageAllocator* page_allocator =
|
|
v8::internal::GetPlatformPageAllocator();
|
|
const size_t page_size = page_allocator->AllocatePageSize();
|
|
int* buffer = static_cast<int*>(AllocatePages(
|
|
page_allocator, nullptr, page_size, page_size, permission));
|
|
ProbeMemory(buffer, MemoryAction::kRead, can_read);
|
|
ProbeMemory(buffer, MemoryAction::kWrite, can_write);
|
|
FreePages(page_allocator, buffer, page_size);
|
|
}
|
|
};
|
|
|
|
sigjmp_buf MemoryAllocationPermissionsTest::continuation_;
|
|
|
|
} // namespace
|
|
|
|
// TODO(almuthanna): This test was skipped because it causes a crash when it is
|
|
// ran on Fuchsia. This issue should be solved later on
|
|
// Ticket: https://crbug.com/1028617
|
|
#if !defined(V8_TARGET_OS_FUCHSIA)
|
|
TEST_F(MemoryAllocationPermissionsTest, DoTest) {
|
|
TestPermissions(PageAllocator::Permission::kNoAccess, false, false);
|
|
TestPermissions(PageAllocator::Permission::kRead, true, false);
|
|
TestPermissions(PageAllocator::Permission::kReadWrite, true, true);
|
|
TestPermissions(PageAllocator::Permission::kReadWriteExecute, true, true);
|
|
TestPermissions(PageAllocator::Permission::kReadExecute, true, false);
|
|
}
|
|
#endif
|
|
|
|
#endif // V8_OS_POSIX
|
|
|
|
// Basic tests of allocation.
|
|
|
|
class AllocationTest : public TestWithPlatform {};
|
|
|
|
TEST_F(AllocationTest, AllocateAndFree) {
|
|
size_t page_size = v8::internal::AllocatePageSize();
|
|
CHECK_NE(0, page_size);
|
|
|
|
v8::PageAllocator* page_allocator = v8::internal::GetPlatformPageAllocator();
|
|
|
|
// A large allocation, aligned at native allocation granularity.
|
|
const size_t kAllocationSize = 1 * v8::internal::MB;
|
|
void* mem_addr = v8::internal::AllocatePages(
|
|
page_allocator, page_allocator->GetRandomMmapAddr(), kAllocationSize,
|
|
page_size, PageAllocator::Permission::kReadWrite);
|
|
CHECK_NOT_NULL(mem_addr);
|
|
v8::internal::FreePages(page_allocator, mem_addr, kAllocationSize);
|
|
|
|
// A large allocation, aligned significantly beyond native granularity.
|
|
const size_t kBigAlignment = 64 * v8::internal::MB;
|
|
void* aligned_mem_addr = v8::internal::AllocatePages(
|
|
page_allocator,
|
|
AlignedAddress(page_allocator->GetRandomMmapAddr(), kBigAlignment),
|
|
kAllocationSize, kBigAlignment, PageAllocator::Permission::kReadWrite);
|
|
CHECK_NOT_NULL(aligned_mem_addr);
|
|
CHECK_EQ(aligned_mem_addr, AlignedAddress(aligned_mem_addr, kBigAlignment));
|
|
v8::internal::FreePages(page_allocator, aligned_mem_addr, kAllocationSize);
|
|
}
|
|
|
|
TEST_F(AllocationTest, ReserveMemory) {
|
|
v8::PageAllocator* page_allocator = v8::internal::GetPlatformPageAllocator();
|
|
size_t page_size = v8::internal::AllocatePageSize();
|
|
const size_t kAllocationSize = 1 * v8::internal::MB;
|
|
void* mem_addr = v8::internal::AllocatePages(
|
|
page_allocator, page_allocator->GetRandomMmapAddr(), kAllocationSize,
|
|
page_size, PageAllocator::Permission::kReadWrite);
|
|
CHECK_NE(0, page_size);
|
|
CHECK_NOT_NULL(mem_addr);
|
|
size_t commit_size = page_allocator->CommitPageSize();
|
|
CHECK(v8::internal::SetPermissions(page_allocator, mem_addr, commit_size,
|
|
PageAllocator::Permission::kReadWrite));
|
|
// Check whether we can write to memory.
|
|
int* addr = static_cast<int*>(mem_addr);
|
|
addr[v8::internal::KB - 1] = 2;
|
|
CHECK(v8::internal::SetPermissions(page_allocator, mem_addr, commit_size,
|
|
PageAllocator::Permission::kNoAccess));
|
|
v8::internal::FreePages(page_allocator, mem_addr, kAllocationSize);
|
|
}
|
|
|
|
} // namespace internal
|
|
} // namespace v8
|