LeakSanitizer, ThreadSanitizer, AddressSanitizer and MemorySanitizer support
```
$ cargo new --bin leak && cd $_
$ edit Cargo.toml && tail -n3 $_
```
``` toml
[profile.dev]
opt-level = 1
```
```
$ edit src/main.rs && cat $_
```
``` rust
use std::mem;
fn main() {
let xs = vec![0, 1, 2, 3];
mem::forget(xs);
}
```
```
$ RUSTFLAGS="-Z sanitizer=leak" cargo run --target x86_64-unknown-linux-gnu; echo $?
Finished dev [optimized + debuginfo] target(s) in 0.0 secs
Running `target/debug/leak`
=================================================================
==10848==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 16 byte(s) in 1 object(s) allocated from:
#0 0x557c3488db1f in __interceptor_malloc /shared/rust/checkouts/lsan/src/compiler-rt/lib/lsan/lsan_interceptors.cc:55
#1 0x557c34888aaa in alloc::heap::exchange_malloc::h68f3f8b376a0da42 /shared/rust/checkouts/lsan/src/liballoc/heap.rs:138
#2 0x557c34888afc in leak::main::hc56ab767de6d653a $PWD/src/main.rs:4
#3 0x557c348c0806 in __rust_maybe_catch_panic ($PWD/target/debug/leak+0x3d806)
SUMMARY: LeakSanitizer: 16 byte(s) leaked in 1 allocation(s).
23
```
```
$ cargo new --bin racy && cd $_
$ edit src/main.rs && cat $_
```
``` rust
use std::thread;
static mut ANSWER: i32 = 0;
fn main() {
let t1 = thread::spawn(|| unsafe { ANSWER = 42 });
unsafe {
ANSWER = 24;
}
t1.join().ok();
}
```
```
$ RUSTFLAGS="-Z sanitizer=thread" cargo run --target x86_64-unknown-linux-gnu; echo $?
==================
WARNING: ThreadSanitizer: data race (pid=12019)
Write of size 4 at 0x562105989bb4 by thread T1:
#0 racy::main::_$u7b$$u7b$closure$u7d$$u7d$::hbe13ea9e8ac73f7e $PWD/src/main.rs:6 (racy+0x000000010e3f)
#1 _$LT$std..panic..AssertUnwindSafe$LT$F$GT$$u20$as$u20$core..ops..FnOnce$LT$$LP$$RP$$GT$$GT$::call_once::h2e466a92accacc78 /shared/rust/checkouts/lsan/src/libstd/panic.rs:296 (racy+0x000000010cc5)
#2 std::panicking::try::do_call::h7f4d2b38069e4042 /shared/rust/checkouts/lsan/src/libstd/panicking.rs:460 (racy+0x00000000c8f2)
#3 __rust_maybe_catch_panic <null> (racy+0x0000000b4e56)
#4 std::panic::catch_unwind::h31ca45621ad66d5a /shared/rust/checkouts/lsan/src/libstd/panic.rs:361 (racy+0x00000000b517)
#5 std:🧵:Builder::spawn::_$u7b$$u7b$closure$u7d$$u7d$::hccfc37175dea0b01 /shared/rust/checkouts/lsan/src/libstd/thread/mod.rs:357 (racy+0x00000000c226)
#6 _$LT$F$u20$as$u20$alloc..boxed..FnBox$LT$A$GT$$GT$::call_box::hd880bbf91561e033 /shared/rust/checkouts/lsan/src/liballoc/boxed.rs:605 (racy+0x00000000f27e)
#7 std::sys:👿🧵:Thread:🆕:thread_start::hebdfc4b3d17afc85 <null> (racy+0x0000000abd40)
Previous write of size 4 at 0x562105989bb4 by main thread:
#0 racy::main::h23e6e5ca46d085c3 $PWD/src/main.rs:8 (racy+0x000000010d7c)
#1 __rust_maybe_catch_panic <null> (racy+0x0000000b4e56)
#2 __libc_start_main <null> (libc.so.6+0x000000020290)
Location is global 'racy::ANSWER::h543d2b139f819b19' of size 4 at 0x562105989bb4 (racy+0x0000002f8bb4)
Thread T1 (tid=12028, running) created by main thread at:
#0 pthread_create /shared/rust/checkouts/lsan/src/compiler-rt/lib/tsan/rtl/tsan_interceptors.cc:902 (racy+0x00000001aedb)
#1 std::sys:👿🧵:Thread:🆕:hce44187bf4a36222 <null> (racy+0x0000000ab9ae)
#2 std:🧵:spawn::he382608373eb667e /shared/rust/checkouts/lsan/src/libstd/thread/mod.rs:412 (racy+0x00000000b5aa)
#3 racy::main::h23e6e5ca46d085c3 $PWD/src/main.rs:6 (racy+0x000000010d5c)
#4 __rust_maybe_catch_panic <null> (racy+0x0000000b4e56)
#5 __libc_start_main <null> (libc.so.6+0x000000020290)
SUMMARY: ThreadSanitizer: data race $PWD/src/main.rs:6 in racy::main::_$u7b$$u7b$closure$u7d$$u7d$::hbe13ea9e8ac73f7e
==================
ThreadSanitizer: reported 1 warnings
66
```
```
$ cargo new --bin oob && cd $_
$ edit src/main.rs && cat $_
```
``` rust
fn main() {
let xs = [0, 1, 2, 3];
let y = unsafe { *xs.as_ptr().offset(4) };
}
```
```
$ RUSTFLAGS="-Z sanitizer=address" cargo run --target x86_64-unknown-linux-gnu; echo $?
=================================================================
==13328==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fff29f3ecd0 at pc 0x55802dc6bf7e bp 0x7fff29f3ec90 sp 0x7fff29f3ec88
READ of size 4 at 0x7fff29f3ecd0 thread T0
#0 0x55802dc6bf7d in oob::main::h0adc7b67e5feb2e7 $PWD/src/main.rs:3
#1 0x55802dd60426 in __rust_maybe_catch_panic ($PWD/target/debug/oob+0xfe426)
#2 0x55802dd58dd9 in std::rt::lang_start::hb2951fc8a59d62a7 ($PWD/target/debug/oob+0xf6dd9)
#3 0x55802dc6c002 in main ($PWD/target/debug/oob+0xa002)
#4 0x7fad8c3b3290 in __libc_start_main (/usr/lib/libc.so.6+0x20290)
#5 0x55802dc6b719 in _start ($PWD/target/debug/oob+0x9719)
Address 0x7fff29f3ecd0 is located in stack of thread T0 at offset 48 in frame
#0 0x55802dc6bd5f in oob::main::h0adc7b67e5feb2e7 $PWD/src/main.rs:1
This frame has 1 object(s):
[32, 48) 'xs' <== Memory access at offset 48 overflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext
(longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow $PWD/src/main.rs:3 in oob::main::h0adc7b67e5feb2e7
Shadow bytes around the buggy address:
0x1000653dfd40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000653dfd50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000653dfd60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000653dfd70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000653dfd80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x1000653dfd90: 00 00 00 00 f1 f1 f1 f1 00 00[f3]f3 00 00 00 00
0x1000653dfda0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000653dfdb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000653dfdc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000653dfdd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1000653dfde0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==13328==ABORTING
1
```
```
$ cargo new --bin uninit && cd $_
$ edit src/main.rs && cat $_
```
``` rust
use std::mem;
fn main() {
let xs: [u8; 4] = unsafe { mem::uninitialized() };
let y = xs[0] + xs[1];
}
```
```
$ RUSTFLAGS="-Z sanitizer=memory" cargo run; echo $?
==30198==WARNING: MemorySanitizer: use-of-uninitialized-value
#0 0x563f4b6867da in uninit::main::hc2731cd4f2ed48f8 $PWD/src/main.rs:5
#1 0x563f4b7033b6 in __rust_maybe_catch_panic ($PWD/target/debug/uninit+0x873b6)
#2 0x563f4b6fbd69 in std::rt::lang_start::hb2951fc8a59d62a7 ($PWD/target/debug/uninit+0x7fd69)
#3 0x563f4b6868a9 in main ($PWD/target/debug/uninit+0xa8a9)
#4 0x7fe844354290 in __libc_start_main (/usr/lib/libc.so.6+0x20290)
#5 0x563f4b6864f9 in _start ($PWD/target/debug/uninit+0xa4f9)
SUMMARY: MemorySanitizer: use-of-uninitialized-value $PWD/src/main.rs:5 in uninit::main::hc2731cd4f2ed48f8
Exiting
77
```
661 lines
24 KiB
Rust
661 lines
24 KiB
Rust
// Copyright 2016 The Rust Project Developers. See the COPYRIGHT
|
|
// file at the top-level directory of this distribution and at
|
|
// http://rust-lang.org/COPYRIGHT.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
|
|
// http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
|
|
// <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
|
|
// option. This file may not be copied, modified, or distributed
|
|
// except according to those terms.
|
|
|
|
//! Implementation of the test-related targets of the build system.
|
|
//!
|
|
//! This file implements the various regression test suites that we execute on
|
|
//! our CI.
|
|
|
|
extern crate build_helper;
|
|
|
|
use std::collections::HashSet;
|
|
use std::env;
|
|
use std::fmt;
|
|
use std::fs;
|
|
use std::path::{PathBuf, Path};
|
|
use std::process::Command;
|
|
|
|
use build_helper::output;
|
|
|
|
use {Build, Compiler, Mode};
|
|
use dist;
|
|
use util::{self, dylib_path, dylib_path_var, exe};
|
|
|
|
const ADB_TEST_DIR: &'static str = "/data/tmp";
|
|
|
|
/// The two modes of the test runner; tests or benchmarks.
|
|
#[derive(Copy, Clone)]
|
|
pub enum TestKind {
|
|
/// Run `cargo test`
|
|
Test,
|
|
/// Run `cargo bench`
|
|
Bench,
|
|
}
|
|
|
|
impl TestKind {
|
|
// Return the cargo subcommand for this test kind
|
|
fn subcommand(self) -> &'static str {
|
|
match self {
|
|
TestKind::Test => "test",
|
|
TestKind::Bench => "bench",
|
|
}
|
|
}
|
|
}
|
|
|
|
impl fmt::Display for TestKind {
|
|
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
|
|
f.write_str(match *self {
|
|
TestKind::Test => "Testing",
|
|
TestKind::Bench => "Benchmarking",
|
|
})
|
|
}
|
|
}
|
|
|
|
/// Runs the `linkchecker` tool as compiled in `stage` by the `host` compiler.
|
|
///
|
|
/// This tool in `src/tools` will verify the validity of all our links in the
|
|
/// documentation to ensure we don't have a bunch of dead ones.
|
|
pub fn linkcheck(build: &Build, host: &str) {
|
|
println!("Linkcheck ({})", host);
|
|
let compiler = Compiler::new(0, host);
|
|
|
|
let _time = util::timeit();
|
|
build.run(build.tool_cmd(&compiler, "linkchecker")
|
|
.arg(build.out.join(host).join("doc")));
|
|
}
|
|
|
|
/// Runs the `cargotest` tool as compiled in `stage` by the `host` compiler.
|
|
///
|
|
/// This tool in `src/tools` will check out a few Rust projects and run `cargo
|
|
/// test` to ensure that we don't regress the test suites there.
|
|
pub fn cargotest(build: &Build, stage: u32, host: &str) {
|
|
let ref compiler = Compiler::new(stage, host);
|
|
|
|
// Configure PATH to find the right rustc. NB. we have to use PATH
|
|
// and not RUSTC because the Cargo test suite has tests that will
|
|
// fail if rustc is not spelled `rustc`.
|
|
let path = build.sysroot(compiler).join("bin");
|
|
let old_path = ::std::env::var("PATH").expect("");
|
|
let sep = if cfg!(windows) { ";" } else {":" };
|
|
let ref newpath = format!("{}{}{}", path.display(), sep, old_path);
|
|
|
|
// Note that this is a short, cryptic, and not scoped directory name. This
|
|
// is currently to minimize the length of path on Windows where we otherwise
|
|
// quickly run into path name limit constraints.
|
|
let out_dir = build.out.join("ct");
|
|
t!(fs::create_dir_all(&out_dir));
|
|
|
|
let _time = util::timeit();
|
|
let mut cmd = Command::new(build.tool(&Compiler::new(0, host), "cargotest"));
|
|
build.prepare_tool_cmd(compiler, &mut cmd);
|
|
build.run(cmd.env("PATH", newpath)
|
|
.arg(&build.cargo)
|
|
.arg(&out_dir));
|
|
}
|
|
|
|
/// Runs the `tidy` tool as compiled in `stage` by the `host` compiler.
|
|
///
|
|
/// This tool in `src/tools` checks up on various bits and pieces of style and
|
|
/// otherwise just implements a few lint-like checks that are specific to the
|
|
/// compiler itself.
|
|
pub fn tidy(build: &Build, host: &str) {
|
|
println!("tidy check ({})", host);
|
|
let compiler = Compiler::new(0, host);
|
|
build.run(build.tool_cmd(&compiler, "tidy")
|
|
.arg(build.src.join("src")));
|
|
}
|
|
|
|
fn testdir(build: &Build, host: &str) -> PathBuf {
|
|
build.out.join(host).join("test")
|
|
}
|
|
|
|
/// Executes the `compiletest` tool to run a suite of tests.
|
|
///
|
|
/// Compiles all tests with `compiler` for `target` with the specified
|
|
/// compiletest `mode` and `suite` arguments. For example `mode` can be
|
|
/// "run-pass" or `suite` can be something like `debuginfo`.
|
|
pub fn compiletest(build: &Build,
|
|
compiler: &Compiler,
|
|
target: &str,
|
|
mode: &str,
|
|
suite: &str) {
|
|
println!("Check compiletest suite={} mode={} ({} -> {})",
|
|
suite, mode, compiler.host, target);
|
|
let mut cmd = Command::new(build.tool(&Compiler::new(0, compiler.host),
|
|
"compiletest"));
|
|
build.prepare_tool_cmd(compiler, &mut cmd);
|
|
|
|
// compiletest currently has... a lot of arguments, so let's just pass all
|
|
// of them!
|
|
|
|
cmd.arg("--compile-lib-path").arg(build.rustc_libdir(compiler));
|
|
cmd.arg("--run-lib-path").arg(build.sysroot_libdir(compiler, target));
|
|
cmd.arg("--rustc-path").arg(build.compiler_path(compiler));
|
|
cmd.arg("--rustdoc-path").arg(build.rustdoc(compiler));
|
|
cmd.arg("--src-base").arg(build.src.join("src/test").join(suite));
|
|
cmd.arg("--build-base").arg(testdir(build, compiler.host).join(suite));
|
|
cmd.arg("--stage-id").arg(format!("stage{}-{}", compiler.stage, target));
|
|
cmd.arg("--mode").arg(mode);
|
|
cmd.arg("--target").arg(target);
|
|
cmd.arg("--host").arg(compiler.host);
|
|
cmd.arg("--llvm-filecheck").arg(build.llvm_filecheck(&build.config.build));
|
|
|
|
if let Some(nodejs) = build.config.nodejs.as_ref() {
|
|
cmd.arg("--nodejs").arg(nodejs);
|
|
}
|
|
|
|
let mut flags = vec!["-Crpath".to_string()];
|
|
if build.config.rust_optimize_tests {
|
|
flags.push("-O".to_string());
|
|
}
|
|
if build.config.rust_debuginfo_tests {
|
|
flags.push("-g".to_string());
|
|
}
|
|
|
|
let mut hostflags = build.rustc_flags(&compiler.host);
|
|
hostflags.extend(flags.clone());
|
|
cmd.arg("--host-rustcflags").arg(hostflags.join(" "));
|
|
|
|
let mut targetflags = build.rustc_flags(&target);
|
|
targetflags.extend(flags);
|
|
targetflags.push(format!("-Lnative={}",
|
|
build.test_helpers_out(target).display()));
|
|
cmd.arg("--target-rustcflags").arg(targetflags.join(" "));
|
|
|
|
cmd.arg("--docck-python").arg(build.python());
|
|
|
|
if build.config.build.ends_with("apple-darwin") {
|
|
// Force /usr/bin/python on OSX for LLDB tests because we're loading the
|
|
// LLDB plugin's compiled module which only works with the system python
|
|
// (namely not Homebrew-installed python)
|
|
cmd.arg("--lldb-python").arg("/usr/bin/python");
|
|
} else {
|
|
cmd.arg("--lldb-python").arg(build.python());
|
|
}
|
|
|
|
if let Some(ref gdb) = build.config.gdb {
|
|
cmd.arg("--gdb").arg(gdb);
|
|
}
|
|
if let Some(ref vers) = build.lldb_version {
|
|
cmd.arg("--lldb-version").arg(vers);
|
|
}
|
|
if let Some(ref dir) = build.lldb_python_dir {
|
|
cmd.arg("--lldb-python-dir").arg(dir);
|
|
}
|
|
let llvm_config = build.llvm_config(target);
|
|
let llvm_version = output(Command::new(&llvm_config).arg("--version"));
|
|
cmd.arg("--llvm-version").arg(llvm_version);
|
|
|
|
cmd.args(&build.flags.cmd.test_args());
|
|
|
|
if build.config.verbose() || build.flags.verbose() {
|
|
cmd.arg("--verbose");
|
|
}
|
|
|
|
if build.config.quiet_tests {
|
|
cmd.arg("--quiet");
|
|
}
|
|
|
|
// Only pass correct values for these flags for the `run-make` suite as it
|
|
// requires that a C++ compiler was configured which isn't always the case.
|
|
if suite == "run-make" {
|
|
let llvm_components = output(Command::new(&llvm_config).arg("--components"));
|
|
let llvm_cxxflags = output(Command::new(&llvm_config).arg("--cxxflags"));
|
|
cmd.arg("--cc").arg(build.cc(target))
|
|
.arg("--cxx").arg(build.cxx(target))
|
|
.arg("--cflags").arg(build.cflags(target).join(" "))
|
|
.arg("--llvm-components").arg(llvm_components.trim())
|
|
.arg("--llvm-cxxflags").arg(llvm_cxxflags.trim());
|
|
} else {
|
|
cmd.arg("--cc").arg("")
|
|
.arg("--cxx").arg("")
|
|
.arg("--cflags").arg("")
|
|
.arg("--llvm-components").arg("")
|
|
.arg("--llvm-cxxflags").arg("");
|
|
}
|
|
|
|
if build.qemu_rootfs(target).is_some() {
|
|
cmd.arg("--qemu-test-client")
|
|
.arg(build.tool(&Compiler::new(0, &build.config.build),
|
|
"qemu-test-client"));
|
|
}
|
|
|
|
// Running a C compiler on MSVC requires a few env vars to be set, to be
|
|
// sure to set them here.
|
|
//
|
|
// Note that if we encounter `PATH` we make sure to append to our own `PATH`
|
|
// rather than stomp over it.
|
|
if target.contains("msvc") {
|
|
for &(ref k, ref v) in build.cc[target].0.env() {
|
|
if k != "PATH" {
|
|
cmd.env(k, v);
|
|
}
|
|
}
|
|
}
|
|
cmd.env("RUSTC_BOOTSTRAP", "1");
|
|
build.add_rust_test_threads(&mut cmd);
|
|
|
|
if build.config.sanitizers {
|
|
cmd.env("SANITIZER_SUPPORT", "1");
|
|
}
|
|
|
|
cmd.arg("--adb-path").arg("adb");
|
|
cmd.arg("--adb-test-dir").arg(ADB_TEST_DIR);
|
|
if target.contains("android") {
|
|
// Assume that cc for this target comes from the android sysroot
|
|
cmd.arg("--android-cross-path")
|
|
.arg(build.cc(target).parent().unwrap().parent().unwrap());
|
|
} else {
|
|
cmd.arg("--android-cross-path").arg("");
|
|
}
|
|
|
|
let _time = util::timeit();
|
|
build.run(&mut cmd);
|
|
}
|
|
|
|
/// Run `rustdoc --test` for all documentation in `src/doc`.
|
|
///
|
|
/// This will run all tests in our markdown documentation (e.g. the book)
|
|
/// located in `src/doc`. The `rustdoc` that's run is the one that sits next to
|
|
/// `compiler`.
|
|
pub fn docs(build: &Build, compiler: &Compiler) {
|
|
// Do a breadth-first traversal of the `src/doc` directory and just run
|
|
// tests for all files that end in `*.md`
|
|
let mut stack = vec![build.src.join("src/doc")];
|
|
let _time = util::timeit();
|
|
|
|
while let Some(p) = stack.pop() {
|
|
if p.is_dir() {
|
|
stack.extend(t!(p.read_dir()).map(|p| t!(p).path()));
|
|
continue
|
|
}
|
|
|
|
if p.extension().and_then(|s| s.to_str()) != Some("md") {
|
|
continue
|
|
}
|
|
|
|
println!("doc tests for: {}", p.display());
|
|
markdown_test(build, compiler, &p);
|
|
}
|
|
}
|
|
|
|
/// Run the error index generator tool to execute the tests located in the error
|
|
/// index.
|
|
///
|
|
/// The `error_index_generator` tool lives in `src/tools` and is used to
|
|
/// generate a markdown file from the error indexes of the code base which is
|
|
/// then passed to `rustdoc --test`.
|
|
pub fn error_index(build: &Build, compiler: &Compiler) {
|
|
println!("Testing error-index stage{}", compiler.stage);
|
|
|
|
let dir = testdir(build, compiler.host);
|
|
t!(fs::create_dir_all(&dir));
|
|
let output = dir.join("error-index.md");
|
|
|
|
let _time = util::timeit();
|
|
build.run(build.tool_cmd(&Compiler::new(0, compiler.host),
|
|
"error_index_generator")
|
|
.arg("markdown")
|
|
.arg(&output)
|
|
.env("CFG_BUILD", &build.config.build));
|
|
|
|
markdown_test(build, compiler, &output);
|
|
}
|
|
|
|
fn markdown_test(build: &Build, compiler: &Compiler, markdown: &Path) {
|
|
let mut cmd = Command::new(build.rustdoc(compiler));
|
|
build.add_rustc_lib_path(compiler, &mut cmd);
|
|
build.add_rust_test_threads(&mut cmd);
|
|
cmd.arg("--test");
|
|
cmd.arg(markdown);
|
|
cmd.env("RUSTC_BOOTSTRAP", "1");
|
|
|
|
let mut test_args = build.flags.cmd.test_args().join(" ");
|
|
if build.config.quiet_tests {
|
|
test_args.push_str(" --quiet");
|
|
}
|
|
cmd.arg("--test-args").arg(test_args);
|
|
|
|
build.run(&mut cmd);
|
|
}
|
|
|
|
/// Run all unit tests plus documentation tests for an entire crate DAG defined
|
|
/// by a `Cargo.toml`
|
|
///
|
|
/// This is what runs tests for crates like the standard library, compiler, etc.
|
|
/// It essentially is the driver for running `cargo test`.
|
|
///
|
|
/// Currently this runs all tests for a DAG by passing a bunch of `-p foo`
|
|
/// arguments, and those arguments are discovered from `cargo metadata`.
|
|
pub fn krate(build: &Build,
|
|
compiler: &Compiler,
|
|
target: &str,
|
|
mode: Mode,
|
|
test_kind: TestKind,
|
|
krate: Option<&str>) {
|
|
let (name, path, features, root) = match mode {
|
|
Mode::Libstd => {
|
|
("libstd", "src/rustc/std_shim", build.std_features(), "std_shim")
|
|
}
|
|
Mode::Libtest => {
|
|
("libtest", "src/rustc/test_shim", String::new(), "test_shim")
|
|
}
|
|
Mode::Librustc => {
|
|
("librustc", "src/rustc", build.rustc_features(), "rustc-main")
|
|
}
|
|
_ => panic!("can only test libraries"),
|
|
};
|
|
println!("{} {} stage{} ({} -> {})", test_kind, name, compiler.stage,
|
|
compiler.host, target);
|
|
|
|
// If we're not doing a full bootstrap but we're testing a stage2 version of
|
|
// libstd, then what we're actually testing is the libstd produced in
|
|
// stage1. Reflect that here by updating the compiler that we're working
|
|
// with automatically.
|
|
let compiler = if build.force_use_stage1(compiler, target) {
|
|
Compiler::new(1, compiler.host)
|
|
} else {
|
|
compiler.clone()
|
|
};
|
|
|
|
// Build up the base `cargo test` command.
|
|
//
|
|
// Pass in some standard flags then iterate over the graph we've discovered
|
|
// in `cargo metadata` with the maps above and figure out what `-p`
|
|
// arguments need to get passed.
|
|
let mut cargo = build.cargo(&compiler, mode, target, test_kind.subcommand());
|
|
cargo.arg("--manifest-path")
|
|
.arg(build.src.join(path).join("Cargo.toml"))
|
|
.arg("--features").arg(features);
|
|
|
|
match krate {
|
|
Some(krate) => {
|
|
cargo.arg("-p").arg(krate);
|
|
}
|
|
None => {
|
|
let mut visited = HashSet::new();
|
|
let mut next = vec![root];
|
|
while let Some(name) = next.pop() {
|
|
// Right now jemalloc is our only target-specific crate in the
|
|
// sense that it's not present on all platforms. Custom skip it
|
|
// here for now, but if we add more this probably wants to get
|
|
// more generalized.
|
|
//
|
|
// Also skip `build_helper` as it's not compiled normally for
|
|
// target during the bootstrap and it's just meant to be a
|
|
// helper crate, not tested. If it leaks through then it ends up
|
|
// messing with various mtime calculations and such.
|
|
if !name.contains("jemalloc") && name != "build_helper" {
|
|
cargo.arg("-p").arg(&format!("{}:0.0.0", name));
|
|
}
|
|
for dep in build.crates[name].deps.iter() {
|
|
if visited.insert(dep) {
|
|
next.push(dep);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// The tests are going to run with the *target* libraries, so we need to
|
|
// ensure that those libraries show up in the LD_LIBRARY_PATH equivalent.
|
|
//
|
|
// Note that to run the compiler we need to run with the *host* libraries,
|
|
// but our wrapper scripts arrange for that to be the case anyway.
|
|
let mut dylib_path = dylib_path();
|
|
dylib_path.insert(0, build.sysroot_libdir(&compiler, target));
|
|
cargo.env(dylib_path_var(), env::join_paths(&dylib_path).unwrap());
|
|
|
|
if target.contains("android") ||
|
|
target.contains("emscripten") ||
|
|
build.qemu_rootfs(target).is_some() {
|
|
cargo.arg("--no-run");
|
|
}
|
|
|
|
cargo.arg("--");
|
|
|
|
if build.config.quiet_tests {
|
|
cargo.arg("--quiet");
|
|
}
|
|
|
|
let _time = util::timeit();
|
|
|
|
if target.contains("android") {
|
|
build.run(&mut cargo);
|
|
krate_android(build, &compiler, target, mode);
|
|
} else if target.contains("emscripten") {
|
|
build.run(&mut cargo);
|
|
krate_emscripten(build, &compiler, target, mode);
|
|
} else if build.qemu_rootfs(target).is_some() {
|
|
build.run(&mut cargo);
|
|
krate_qemu(build, &compiler, target, mode);
|
|
} else {
|
|
cargo.args(&build.flags.cmd.test_args());
|
|
build.run(&mut cargo);
|
|
}
|
|
}
|
|
|
|
fn krate_android(build: &Build,
|
|
compiler: &Compiler,
|
|
target: &str,
|
|
mode: Mode) {
|
|
let mut tests = Vec::new();
|
|
let out_dir = build.cargo_out(compiler, mode, target);
|
|
find_tests(&out_dir, target, &mut tests);
|
|
find_tests(&out_dir.join("deps"), target, &mut tests);
|
|
|
|
for test in tests {
|
|
build.run(Command::new("adb").arg("push").arg(&test).arg(ADB_TEST_DIR));
|
|
|
|
let test_file_name = test.file_name().unwrap().to_string_lossy();
|
|
let log = format!("{}/check-stage{}-T-{}-H-{}-{}.log",
|
|
ADB_TEST_DIR,
|
|
compiler.stage,
|
|
target,
|
|
compiler.host,
|
|
test_file_name);
|
|
let quiet = if build.config.quiet_tests { "--quiet" } else { "" };
|
|
let program = format!("(cd {dir}; \
|
|
LD_LIBRARY_PATH=./{target} ./{test} \
|
|
--logfile {log} \
|
|
{quiet} \
|
|
{args})",
|
|
dir = ADB_TEST_DIR,
|
|
target = target,
|
|
test = test_file_name,
|
|
log = log,
|
|
quiet = quiet,
|
|
args = build.flags.cmd.test_args().join(" "));
|
|
|
|
let output = output(Command::new("adb").arg("shell").arg(&program));
|
|
println!("{}", output);
|
|
|
|
t!(fs::create_dir_all(build.out.join("tmp")));
|
|
build.run(Command::new("adb")
|
|
.arg("pull")
|
|
.arg(&log)
|
|
.arg(build.out.join("tmp")));
|
|
build.run(Command::new("adb").arg("shell").arg("rm").arg(&log));
|
|
if !output.contains("result: ok") {
|
|
panic!("some tests failed");
|
|
}
|
|
}
|
|
}
|
|
|
|
fn krate_emscripten(build: &Build,
|
|
compiler: &Compiler,
|
|
target: &str,
|
|
mode: Mode) {
|
|
let mut tests = Vec::new();
|
|
let out_dir = build.cargo_out(compiler, mode, target);
|
|
find_tests(&out_dir, target, &mut tests);
|
|
find_tests(&out_dir.join("deps"), target, &mut tests);
|
|
|
|
for test in tests {
|
|
let test_file_name = test.to_string_lossy().into_owned();
|
|
println!("running {}", test_file_name);
|
|
let nodejs = build.config.nodejs.as_ref().expect("nodejs not configured");
|
|
let mut cmd = Command::new(nodejs);
|
|
cmd.arg(&test_file_name);
|
|
if build.config.quiet_tests {
|
|
cmd.arg("--quiet");
|
|
}
|
|
build.run(&mut cmd);
|
|
}
|
|
}
|
|
|
|
fn krate_qemu(build: &Build,
|
|
compiler: &Compiler,
|
|
target: &str,
|
|
mode: Mode) {
|
|
let mut tests = Vec::new();
|
|
let out_dir = build.cargo_out(compiler, mode, target);
|
|
find_tests(&out_dir, target, &mut tests);
|
|
find_tests(&out_dir.join("deps"), target, &mut tests);
|
|
|
|
let tool = build.tool(&Compiler::new(0, &build.config.build),
|
|
"qemu-test-client");
|
|
for test in tests {
|
|
let mut cmd = Command::new(&tool);
|
|
cmd.arg("run")
|
|
.arg(&test);
|
|
if build.config.quiet_tests {
|
|
cmd.arg("--quiet");
|
|
}
|
|
cmd.args(&build.flags.cmd.test_args());
|
|
build.run(&mut cmd);
|
|
}
|
|
}
|
|
|
|
|
|
fn find_tests(dir: &Path,
|
|
target: &str,
|
|
dst: &mut Vec<PathBuf>) {
|
|
for e in t!(dir.read_dir()).map(|e| t!(e)) {
|
|
let file_type = t!(e.file_type());
|
|
if !file_type.is_file() {
|
|
continue
|
|
}
|
|
let filename = e.file_name().into_string().unwrap();
|
|
if (target.contains("windows") && filename.ends_with(".exe")) ||
|
|
(!target.contains("windows") && !filename.contains(".")) ||
|
|
(target.contains("emscripten") && filename.contains(".js")){
|
|
dst.push(e.path());
|
|
}
|
|
}
|
|
}
|
|
|
|
pub fn emulator_copy_libs(build: &Build, compiler: &Compiler, target: &str) {
|
|
if target.contains("android") {
|
|
android_copy_libs(build, compiler, target)
|
|
} else if let Some(s) = build.qemu_rootfs(target) {
|
|
qemu_copy_libs(build, compiler, target, s)
|
|
}
|
|
}
|
|
|
|
fn android_copy_libs(build: &Build, compiler: &Compiler, target: &str) {
|
|
println!("Android copy libs to emulator ({})", target);
|
|
build.run(Command::new("adb").arg("wait-for-device"));
|
|
build.run(Command::new("adb").arg("remount"));
|
|
build.run(Command::new("adb").args(&["shell", "rm", "-r", ADB_TEST_DIR]));
|
|
build.run(Command::new("adb").args(&["shell", "mkdir", ADB_TEST_DIR]));
|
|
build.run(Command::new("adb")
|
|
.arg("push")
|
|
.arg(build.src.join("src/etc/adb_run_wrapper.sh"))
|
|
.arg(ADB_TEST_DIR));
|
|
|
|
let target_dir = format!("{}/{}", ADB_TEST_DIR, target);
|
|
build.run(Command::new("adb").args(&["shell", "mkdir", &target_dir[..]]));
|
|
|
|
for f in t!(build.sysroot_libdir(compiler, target).read_dir()) {
|
|
let f = t!(f);
|
|
let name = f.file_name().into_string().unwrap();
|
|
if util::is_dylib(&name) {
|
|
build.run(Command::new("adb")
|
|
.arg("push")
|
|
.arg(f.path())
|
|
.arg(&target_dir));
|
|
}
|
|
}
|
|
}
|
|
|
|
fn qemu_copy_libs(build: &Build,
|
|
compiler: &Compiler,
|
|
target: &str,
|
|
rootfs: &Path) {
|
|
println!("QEMU copy libs to emulator ({})", target);
|
|
assert!(target.starts_with("arm"), "only works with arm for now");
|
|
t!(fs::create_dir_all(build.out.join("tmp")));
|
|
|
|
// Copy our freshly compiled test server over to the rootfs
|
|
let server = build.cargo_out(compiler, Mode::Tool, target)
|
|
.join(exe("qemu-test-server", target));
|
|
t!(fs::copy(&server, rootfs.join("testd")));
|
|
|
|
// Spawn the emulator and wait for it to come online
|
|
let tool = build.tool(&Compiler::new(0, &build.config.build),
|
|
"qemu-test-client");
|
|
build.run(Command::new(&tool)
|
|
.arg("spawn-emulator")
|
|
.arg(rootfs)
|
|
.arg(build.out.join("tmp")));
|
|
|
|
// Push all our dylibs to the emulator
|
|
for f in t!(build.sysroot_libdir(compiler, target).read_dir()) {
|
|
let f = t!(f);
|
|
let name = f.file_name().into_string().unwrap();
|
|
if util::is_dylib(&name) {
|
|
build.run(Command::new(&tool)
|
|
.arg("push")
|
|
.arg(f.path()));
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Run "distcheck", a 'make check' from a tarball
|
|
pub fn distcheck(build: &Build) {
|
|
if build.config.build != "x86_64-unknown-linux-gnu" {
|
|
return
|
|
}
|
|
if !build.config.host.iter().any(|s| s == "x86_64-unknown-linux-gnu") {
|
|
return
|
|
}
|
|
if !build.config.target.iter().any(|s| s == "x86_64-unknown-linux-gnu") {
|
|
return
|
|
}
|
|
|
|
let dir = build.out.join("tmp").join("distcheck");
|
|
let _ = fs::remove_dir_all(&dir);
|
|
t!(fs::create_dir_all(&dir));
|
|
|
|
let mut cmd = Command::new("tar");
|
|
cmd.arg("-xzf")
|
|
.arg(dist::rust_src_location(build))
|
|
.arg("--strip-components=1")
|
|
.current_dir(&dir);
|
|
build.run(&mut cmd);
|
|
build.run(Command::new("./configure")
|
|
.args(&build.config.configure_args)
|
|
.current_dir(&dir));
|
|
build.run(Command::new(build_helper::make(&build.config.build))
|
|
.arg("check")
|
|
.current_dir(&dir));
|
|
}
|
|
|
|
/// Test the build system itself
|
|
pub fn bootstrap(build: &Build) {
|
|
let mut cmd = Command::new(&build.cargo);
|
|
cmd.arg("test")
|
|
.current_dir(build.src.join("src/bootstrap"))
|
|
.env("CARGO_TARGET_DIR", build.out.join("bootstrap"))
|
|
.env("RUSTC", &build.rustc);
|
|
cmd.arg("--").args(&build.flags.cmd.test_args());
|
|
build.run(&mut cmd);
|
|
}
|