xref: /aosp_15_r20/frameworks/native/libs/binder/tests/binderAllocationLimits.cpp (revision 38e8c45f13ce32b0dcecb25141ffecaf386fa17f)
1*38e8c45fSAndroid Build Coastguard Worker /*
2*38e8c45fSAndroid Build Coastguard Worker  * Copyright (C) 2020 The Android Open Source Project
3*38e8c45fSAndroid Build Coastguard Worker  *
4*38e8c45fSAndroid Build Coastguard Worker  * Licensed under the Apache License, Version 2.0 (the "License");
5*38e8c45fSAndroid Build Coastguard Worker  * you may not use this file except in compliance with the License.
6*38e8c45fSAndroid Build Coastguard Worker  * You may obtain a copy of the License at
7*38e8c45fSAndroid Build Coastguard Worker  *
8*38e8c45fSAndroid Build Coastguard Worker  *      http://www.apache.org/licenses/LICENSE-2.0
9*38e8c45fSAndroid Build Coastguard Worker  *
10*38e8c45fSAndroid Build Coastguard Worker  * Unless required by applicable law or agreed to in writing, software
11*38e8c45fSAndroid Build Coastguard Worker  * distributed under the License is distributed on an "AS IS" BASIS,
12*38e8c45fSAndroid Build Coastguard Worker  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*38e8c45fSAndroid Build Coastguard Worker  * See the License for the specific language governing permissions and
14*38e8c45fSAndroid Build Coastguard Worker  * limitations under the License.
15*38e8c45fSAndroid Build Coastguard Worker  */
16*38e8c45fSAndroid Build Coastguard Worker 
17*38e8c45fSAndroid Build Coastguard Worker #include <android-base/logging.h>
18*38e8c45fSAndroid Build Coastguard Worker #include <binder/Binder.h>
19*38e8c45fSAndroid Build Coastguard Worker #include <binder/Functional.h>
20*38e8c45fSAndroid Build Coastguard Worker #include <binder/IServiceManager.h>
21*38e8c45fSAndroid Build Coastguard Worker #include <binder/Parcel.h>
22*38e8c45fSAndroid Build Coastguard Worker #include <binder/RpcServer.h>
23*38e8c45fSAndroid Build Coastguard Worker #include <binder/RpcSession.h>
24*38e8c45fSAndroid Build Coastguard Worker #include <cutils/trace.h>
25*38e8c45fSAndroid Build Coastguard Worker #include <gtest/gtest.h>
26*38e8c45fSAndroid Build Coastguard Worker #include <utils/CallStack.h>
27*38e8c45fSAndroid Build Coastguard Worker 
28*38e8c45fSAndroid Build Coastguard Worker #include <malloc.h>
29*38e8c45fSAndroid Build Coastguard Worker #include <functional>
30*38e8c45fSAndroid Build Coastguard Worker #include <vector>
31*38e8c45fSAndroid Build Coastguard Worker 
32*38e8c45fSAndroid Build Coastguard Worker using namespace android::binder::impl;
33*38e8c45fSAndroid Build Coastguard Worker 
34*38e8c45fSAndroid Build Coastguard Worker static android::String8 gEmpty(""); // make sure first allocation from optimization runs
35*38e8c45fSAndroid Build Coastguard Worker 
36*38e8c45fSAndroid Build Coastguard Worker struct DestructionAction {
DestructionActionDestructionAction37*38e8c45fSAndroid Build Coastguard Worker     DestructionAction(std::function<void()> f) : mF(std::move(f)) {}
~DestructionActionDestructionAction38*38e8c45fSAndroid Build Coastguard Worker     ~DestructionAction() { mF(); };
39*38e8c45fSAndroid Build Coastguard Worker private:
40*38e8c45fSAndroid Build Coastguard Worker     std::function<void()> mF;
41*38e8c45fSAndroid Build Coastguard Worker };
42*38e8c45fSAndroid Build Coastguard Worker 
43*38e8c45fSAndroid Build Coastguard Worker // Group of hooks
44*38e8c45fSAndroid Build Coastguard Worker struct MallocHooks {
45*38e8c45fSAndroid Build Coastguard Worker     decltype(__malloc_hook) malloc_hook;
46*38e8c45fSAndroid Build Coastguard Worker     decltype(__realloc_hook) realloc_hook;
47*38e8c45fSAndroid Build Coastguard Worker 
saveMallocHooks48*38e8c45fSAndroid Build Coastguard Worker     static MallocHooks save() {
49*38e8c45fSAndroid Build Coastguard Worker         return {
50*38e8c45fSAndroid Build Coastguard Worker             .malloc_hook = __malloc_hook,
51*38e8c45fSAndroid Build Coastguard Worker             .realloc_hook = __realloc_hook,
52*38e8c45fSAndroid Build Coastguard Worker         };
53*38e8c45fSAndroid Build Coastguard Worker     }
54*38e8c45fSAndroid Build Coastguard Worker 
overwriteMallocHooks55*38e8c45fSAndroid Build Coastguard Worker     void overwrite() const {
56*38e8c45fSAndroid Build Coastguard Worker         __malloc_hook = malloc_hook;
57*38e8c45fSAndroid Build Coastguard Worker         __realloc_hook = realloc_hook;
58*38e8c45fSAndroid Build Coastguard Worker     }
59*38e8c45fSAndroid Build Coastguard Worker };
60*38e8c45fSAndroid Build Coastguard Worker 
61*38e8c45fSAndroid Build Coastguard Worker static const MallocHooks orig_malloc_hooks = MallocHooks::save();
62*38e8c45fSAndroid Build Coastguard Worker 
63*38e8c45fSAndroid Build Coastguard Worker // When malloc is hit, executes lambda.
64*38e8c45fSAndroid Build Coastguard Worker namespace LambdaHooks {
65*38e8c45fSAndroid Build Coastguard Worker     using AllocationHook = std::function<void(size_t)>;
66*38e8c45fSAndroid Build Coastguard Worker     static std::vector<AllocationHook> lambdas = {};
67*38e8c45fSAndroid Build Coastguard Worker 
68*38e8c45fSAndroid Build Coastguard Worker     static void* lambda_realloc_hook(void* ptr, size_t bytes, const void* arg);
69*38e8c45fSAndroid Build Coastguard Worker     static void* lambda_malloc_hook(size_t bytes, const void* arg);
70*38e8c45fSAndroid Build Coastguard Worker 
71*38e8c45fSAndroid Build Coastguard Worker     static const MallocHooks lambda_malloc_hooks = {
72*38e8c45fSAndroid Build Coastguard Worker         .malloc_hook = lambda_malloc_hook,
73*38e8c45fSAndroid Build Coastguard Worker         .realloc_hook = lambda_realloc_hook,
74*38e8c45fSAndroid Build Coastguard Worker     };
75*38e8c45fSAndroid Build Coastguard Worker 
lambda_malloc_hook(size_t bytes,const void * arg)76*38e8c45fSAndroid Build Coastguard Worker     static void* lambda_malloc_hook(size_t bytes, const void* arg) {
77*38e8c45fSAndroid Build Coastguard Worker         {
78*38e8c45fSAndroid Build Coastguard Worker             orig_malloc_hooks.overwrite();
79*38e8c45fSAndroid Build Coastguard Worker             lambdas.at(lambdas.size() - 1)(bytes);
80*38e8c45fSAndroid Build Coastguard Worker             lambda_malloc_hooks.overwrite();
81*38e8c45fSAndroid Build Coastguard Worker         }
82*38e8c45fSAndroid Build Coastguard Worker         return orig_malloc_hooks.malloc_hook(bytes, arg);
83*38e8c45fSAndroid Build Coastguard Worker     }
84*38e8c45fSAndroid Build Coastguard Worker 
lambda_realloc_hook(void * ptr,size_t bytes,const void * arg)85*38e8c45fSAndroid Build Coastguard Worker     static void* lambda_realloc_hook(void* ptr, size_t bytes, const void* arg) {
86*38e8c45fSAndroid Build Coastguard Worker         {
87*38e8c45fSAndroid Build Coastguard Worker             orig_malloc_hooks.overwrite();
88*38e8c45fSAndroid Build Coastguard Worker             lambdas.at(lambdas.size() - 1)(bytes);
89*38e8c45fSAndroid Build Coastguard Worker             lambda_malloc_hooks.overwrite();
90*38e8c45fSAndroid Build Coastguard Worker         }
91*38e8c45fSAndroid Build Coastguard Worker         return orig_malloc_hooks.realloc_hook(ptr, bytes, arg);
92*38e8c45fSAndroid Build Coastguard Worker     }
93*38e8c45fSAndroid Build Coastguard Worker 
94*38e8c45fSAndroid Build Coastguard Worker }
95*38e8c45fSAndroid Build Coastguard Worker 
96*38e8c45fSAndroid Build Coastguard Worker // Action to execute when malloc is hit. Supports nesting. Malloc is not
97*38e8c45fSAndroid Build Coastguard Worker // restricted when the allocation hook is being processed.
98*38e8c45fSAndroid Build Coastguard Worker __attribute__((warn_unused_result))
OnMalloc(LambdaHooks::AllocationHook f)99*38e8c45fSAndroid Build Coastguard Worker DestructionAction OnMalloc(LambdaHooks::AllocationHook f) {
100*38e8c45fSAndroid Build Coastguard Worker     MallocHooks before = MallocHooks::save();
101*38e8c45fSAndroid Build Coastguard Worker     LambdaHooks::lambdas.emplace_back(std::move(f));
102*38e8c45fSAndroid Build Coastguard Worker     LambdaHooks::lambda_malloc_hooks.overwrite();
103*38e8c45fSAndroid Build Coastguard Worker     return DestructionAction([before]() {
104*38e8c45fSAndroid Build Coastguard Worker         before.overwrite();
105*38e8c45fSAndroid Build Coastguard Worker         LambdaHooks::lambdas.pop_back();
106*38e8c45fSAndroid Build Coastguard Worker     });
107*38e8c45fSAndroid Build Coastguard Worker }
108*38e8c45fSAndroid Build Coastguard Worker 
109*38e8c45fSAndroid Build Coastguard Worker // exported symbol, to force compiler not to optimize away pointers we set here
110*38e8c45fSAndroid Build Coastguard Worker const void* imaginary_use;
111*38e8c45fSAndroid Build Coastguard Worker 
TEST(TestTheTest,OnMalloc)112*38e8c45fSAndroid Build Coastguard Worker TEST(TestTheTest, OnMalloc) {
113*38e8c45fSAndroid Build Coastguard Worker     size_t mallocs = 0;
114*38e8c45fSAndroid Build Coastguard Worker     {
115*38e8c45fSAndroid Build Coastguard Worker         const auto on_malloc = OnMalloc([&](size_t bytes) {
116*38e8c45fSAndroid Build Coastguard Worker             mallocs++;
117*38e8c45fSAndroid Build Coastguard Worker             EXPECT_EQ(bytes, 40u);
118*38e8c45fSAndroid Build Coastguard Worker         });
119*38e8c45fSAndroid Build Coastguard Worker 
120*38e8c45fSAndroid Build Coastguard Worker         imaginary_use = new int[10];
121*38e8c45fSAndroid Build Coastguard Worker     }
122*38e8c45fSAndroid Build Coastguard Worker     EXPECT_EQ(mallocs, 1u);
123*38e8c45fSAndroid Build Coastguard Worker }
124*38e8c45fSAndroid Build Coastguard Worker 
125*38e8c45fSAndroid Build Coastguard Worker 
126*38e8c45fSAndroid Build Coastguard Worker __attribute__((warn_unused_result))
ScopeDisallowMalloc()127*38e8c45fSAndroid Build Coastguard Worker DestructionAction ScopeDisallowMalloc() {
128*38e8c45fSAndroid Build Coastguard Worker     return OnMalloc([&](size_t bytes) {
129*38e8c45fSAndroid Build Coastguard Worker         ADD_FAILURE() << "Unexpected allocation: " << bytes;
130*38e8c45fSAndroid Build Coastguard Worker         using android::CallStack;
131*38e8c45fSAndroid Build Coastguard Worker         std::cout << CallStack::stackToString("UNEXPECTED ALLOCATION", CallStack::getCurrent(4 /*ignoreDepth*/).get())
132*38e8c45fSAndroid Build Coastguard Worker                   << std::endl;
133*38e8c45fSAndroid Build Coastguard Worker     });
134*38e8c45fSAndroid Build Coastguard Worker }
135*38e8c45fSAndroid Build Coastguard Worker 
136*38e8c45fSAndroid Build Coastguard Worker using android::BBinder;
137*38e8c45fSAndroid Build Coastguard Worker using android::defaultServiceManager;
138*38e8c45fSAndroid Build Coastguard Worker using android::IBinder;
139*38e8c45fSAndroid Build Coastguard Worker using android::IServiceManager;
140*38e8c45fSAndroid Build Coastguard Worker using android::OK;
141*38e8c45fSAndroid Build Coastguard Worker using android::Parcel;
142*38e8c45fSAndroid Build Coastguard Worker using android::RpcServer;
143*38e8c45fSAndroid Build Coastguard Worker using android::RpcSession;
144*38e8c45fSAndroid Build Coastguard Worker using android::sp;
145*38e8c45fSAndroid Build Coastguard Worker using android::status_t;
146*38e8c45fSAndroid Build Coastguard Worker using android::statusToString;
147*38e8c45fSAndroid Build Coastguard Worker using android::String16;
148*38e8c45fSAndroid Build Coastguard Worker 
GetRemoteBinder()149*38e8c45fSAndroid Build Coastguard Worker static sp<IBinder> GetRemoteBinder() {
150*38e8c45fSAndroid Build Coastguard Worker     // This gets binder representing the service manager
151*38e8c45fSAndroid Build Coastguard Worker     // the current IServiceManager API doesn't expose the binder, and
152*38e8c45fSAndroid Build Coastguard Worker     // I want to avoid adding usages of the AIDL generated interface it
153*38e8c45fSAndroid Build Coastguard Worker     // is using underneath, so to avoid people copying it.
154*38e8c45fSAndroid Build Coastguard Worker     sp<IBinder> binder = defaultServiceManager()->checkService(String16("manager"));
155*38e8c45fSAndroid Build Coastguard Worker     EXPECT_NE(nullptr, binder);
156*38e8c45fSAndroid Build Coastguard Worker     return binder;
157*38e8c45fSAndroid Build Coastguard Worker }
158*38e8c45fSAndroid Build Coastguard Worker 
TEST(BinderAllocation,ParcelOnStack)159*38e8c45fSAndroid Build Coastguard Worker TEST(BinderAllocation, ParcelOnStack) {
160*38e8c45fSAndroid Build Coastguard Worker     const auto m = ScopeDisallowMalloc();
161*38e8c45fSAndroid Build Coastguard Worker     Parcel p;
162*38e8c45fSAndroid Build Coastguard Worker     imaginary_use = p.data();
163*38e8c45fSAndroid Build Coastguard Worker }
164*38e8c45fSAndroid Build Coastguard Worker 
TEST(BinderAllocation,GetServiceManager)165*38e8c45fSAndroid Build Coastguard Worker TEST(BinderAllocation, GetServiceManager) {
166*38e8c45fSAndroid Build Coastguard Worker     defaultServiceManager(); // first call may alloc
167*38e8c45fSAndroid Build Coastguard Worker     const auto m = ScopeDisallowMalloc();
168*38e8c45fSAndroid Build Coastguard Worker     defaultServiceManager();
169*38e8c45fSAndroid Build Coastguard Worker }
170*38e8c45fSAndroid Build Coastguard Worker 
171*38e8c45fSAndroid Build Coastguard Worker // note, ping does not include interface descriptor
TEST(BinderAllocation,PingTransaction)172*38e8c45fSAndroid Build Coastguard Worker TEST(BinderAllocation, PingTransaction) {
173*38e8c45fSAndroid Build Coastguard Worker     sp<IBinder> a_binder = GetRemoteBinder();
174*38e8c45fSAndroid Build Coastguard Worker     const auto m = ScopeDisallowMalloc();
175*38e8c45fSAndroid Build Coastguard Worker     a_binder->pingBinder();
176*38e8c45fSAndroid Build Coastguard Worker }
177*38e8c45fSAndroid Build Coastguard Worker 
TEST(BinderAllocation,MakeScopeGuard)178*38e8c45fSAndroid Build Coastguard Worker TEST(BinderAllocation, MakeScopeGuard) {
179*38e8c45fSAndroid Build Coastguard Worker     const auto m = ScopeDisallowMalloc();
180*38e8c45fSAndroid Build Coastguard Worker     {
181*38e8c45fSAndroid Build Coastguard Worker         auto guard1 = make_scope_guard([] {});
182*38e8c45fSAndroid Build Coastguard Worker         guard1.release();
183*38e8c45fSAndroid Build Coastguard Worker 
184*38e8c45fSAndroid Build Coastguard Worker         auto guard2 = make_scope_guard([&guard1, ptr = imaginary_use] {
185*38e8c45fSAndroid Build Coastguard Worker             if (ptr == nullptr) guard1.release();
186*38e8c45fSAndroid Build Coastguard Worker         });
187*38e8c45fSAndroid Build Coastguard Worker     }
188*38e8c45fSAndroid Build Coastguard Worker }
189*38e8c45fSAndroid Build Coastguard Worker 
TEST(BinderAllocation,InterfaceDescriptorTransaction)190*38e8c45fSAndroid Build Coastguard Worker TEST(BinderAllocation, InterfaceDescriptorTransaction) {
191*38e8c45fSAndroid Build Coastguard Worker     sp<IBinder> a_binder = GetRemoteBinder();
192*38e8c45fSAndroid Build Coastguard Worker 
193*38e8c45fSAndroid Build Coastguard Worker     size_t mallocs = 0;
194*38e8c45fSAndroid Build Coastguard Worker     const auto on_malloc = OnMalloc([&](size_t bytes) {
195*38e8c45fSAndroid Build Coastguard Worker         mallocs++;
196*38e8c45fSAndroid Build Coastguard Worker         // Happens to be SM package length. We could switch to forking
197*38e8c45fSAndroid Build Coastguard Worker         // and registering our own service if it became an issue.
198*38e8c45fSAndroid Build Coastguard Worker #if defined(__LP64__)
199*38e8c45fSAndroid Build Coastguard Worker         EXPECT_EQ(bytes, 78u);
200*38e8c45fSAndroid Build Coastguard Worker #else
201*38e8c45fSAndroid Build Coastguard Worker         EXPECT_EQ(bytes, 70u);
202*38e8c45fSAndroid Build Coastguard Worker #endif
203*38e8c45fSAndroid Build Coastguard Worker     });
204*38e8c45fSAndroid Build Coastguard Worker 
205*38e8c45fSAndroid Build Coastguard Worker     a_binder->getInterfaceDescriptor();
206*38e8c45fSAndroid Build Coastguard Worker     a_binder->getInterfaceDescriptor();
207*38e8c45fSAndroid Build Coastguard Worker     a_binder->getInterfaceDescriptor();
208*38e8c45fSAndroid Build Coastguard Worker 
209*38e8c45fSAndroid Build Coastguard Worker     EXPECT_EQ(mallocs, 1u);
210*38e8c45fSAndroid Build Coastguard Worker }
211*38e8c45fSAndroid Build Coastguard Worker 
TEST(BinderAllocation,SmallTransaction)212*38e8c45fSAndroid Build Coastguard Worker TEST(BinderAllocation, SmallTransaction) {
213*38e8c45fSAndroid Build Coastguard Worker     String16 empty_descriptor = String16("");
214*38e8c45fSAndroid Build Coastguard Worker     sp<IServiceManager> manager = defaultServiceManager();
215*38e8c45fSAndroid Build Coastguard Worker 
216*38e8c45fSAndroid Build Coastguard Worker     size_t mallocs = 0;
217*38e8c45fSAndroid Build Coastguard Worker     const auto on_malloc = OnMalloc([&](size_t bytes) {
218*38e8c45fSAndroid Build Coastguard Worker         mallocs++;
219*38e8c45fSAndroid Build Coastguard Worker         // Parcel should allocate a small amount by default
220*38e8c45fSAndroid Build Coastguard Worker         EXPECT_EQ(bytes, 128u);
221*38e8c45fSAndroid Build Coastguard Worker     });
222*38e8c45fSAndroid Build Coastguard Worker     manager->checkService(empty_descriptor);
223*38e8c45fSAndroid Build Coastguard Worker 
224*38e8c45fSAndroid Build Coastguard Worker     EXPECT_EQ(mallocs, 1u);
225*38e8c45fSAndroid Build Coastguard Worker }
226*38e8c45fSAndroid Build Coastguard Worker 
TEST(RpcBinderAllocation,SetupRpcServer)227*38e8c45fSAndroid Build Coastguard Worker TEST(RpcBinderAllocation, SetupRpcServer) {
228*38e8c45fSAndroid Build Coastguard Worker     std::string tmp = getenv("TMPDIR") ?: "/tmp";
229*38e8c45fSAndroid Build Coastguard Worker     std::string addr = tmp + "/binderRpcBenchmark";
230*38e8c45fSAndroid Build Coastguard Worker     (void)unlink(addr.c_str());
231*38e8c45fSAndroid Build Coastguard Worker     auto server = RpcServer::make();
232*38e8c45fSAndroid Build Coastguard Worker     server->setRootObject(sp<BBinder>::make());
233*38e8c45fSAndroid Build Coastguard Worker 
234*38e8c45fSAndroid Build Coastguard Worker     ASSERT_EQ(OK, server->setupUnixDomainServer(addr.c_str()));
235*38e8c45fSAndroid Build Coastguard Worker 
236*38e8c45fSAndroid Build Coastguard Worker     std::thread([server]() { server->join(); }).detach();
237*38e8c45fSAndroid Build Coastguard Worker 
238*38e8c45fSAndroid Build Coastguard Worker     auto session = RpcSession::make();
239*38e8c45fSAndroid Build Coastguard Worker     status_t status = session->setupUnixDomainClient(addr.c_str());
240*38e8c45fSAndroid Build Coastguard Worker     ASSERT_EQ(status, OK) << "Could not connect: " << addr << ": " << statusToString(status).c_str();
241*38e8c45fSAndroid Build Coastguard Worker 
242*38e8c45fSAndroid Build Coastguard Worker     auto remoteBinder = session->getRootObject();
243*38e8c45fSAndroid Build Coastguard Worker     ASSERT_NE(remoteBinder, nullptr);
244*38e8c45fSAndroid Build Coastguard Worker 
245*38e8c45fSAndroid Build Coastguard Worker     size_t mallocs = 0, totalBytes = 0;
246*38e8c45fSAndroid Build Coastguard Worker     {
247*38e8c45fSAndroid Build Coastguard Worker         const auto on_malloc = OnMalloc([&](size_t bytes) {
248*38e8c45fSAndroid Build Coastguard Worker             mallocs++;
249*38e8c45fSAndroid Build Coastguard Worker             totalBytes += bytes;
250*38e8c45fSAndroid Build Coastguard Worker         });
251*38e8c45fSAndroid Build Coastguard Worker         ASSERT_EQ(OK, remoteBinder->pingBinder());
252*38e8c45fSAndroid Build Coastguard Worker     }
253*38e8c45fSAndroid Build Coastguard Worker     EXPECT_EQ(mallocs, 1u);
254*38e8c45fSAndroid Build Coastguard Worker     EXPECT_EQ(totalBytes, 40u);
255*38e8c45fSAndroid Build Coastguard Worker }
256*38e8c45fSAndroid Build Coastguard Worker 
main(int argc,char ** argv)257*38e8c45fSAndroid Build Coastguard Worker int main(int argc, char** argv) {
258*38e8c45fSAndroid Build Coastguard Worker     if (getenv("LIBC_HOOKS_ENABLE") == nullptr) {
259*38e8c45fSAndroid Build Coastguard Worker         CHECK(0 == setenv("LIBC_HOOKS_ENABLE", "1", true /*overwrite*/));
260*38e8c45fSAndroid Build Coastguard Worker         execv(argv[0], argv);
261*38e8c45fSAndroid Build Coastguard Worker         return 1;
262*38e8c45fSAndroid Build Coastguard Worker     }
263*38e8c45fSAndroid Build Coastguard Worker     ::testing::InitGoogleTest(&argc, argv);
264*38e8c45fSAndroid Build Coastguard Worker 
265*38e8c45fSAndroid Build Coastguard Worker     // if tracing is enabled, take in one-time cost
266*38e8c45fSAndroid Build Coastguard Worker     (void)ATRACE_INIT();
267*38e8c45fSAndroid Build Coastguard Worker     (void)ATRACE_GET_ENABLED_TAGS();
268*38e8c45fSAndroid Build Coastguard Worker 
269*38e8c45fSAndroid Build Coastguard Worker     return RUN_ALL_TESTS();
270*38e8c45fSAndroid Build Coastguard Worker }
271