fuchsia/
lib.rs

1// Copyright 2020 The Fuchsia Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5//! Macros for creating Fuchsia components and tests.
6//!
7//! These macros work on Fuchsia, and also on host with some limitations (that are called out
8//! where they exist).
9
10// Features from those macros are expected to be implemented by exactly one function in this
11// module. We strive for simple, independent, single purpose functions as building blocks to allow
12// dead code elimination to have the very best chance of removing unused code that might be
13// otherwise pulled in here.
14
15#![deny(missing_docs)]
16
17pub use fuchsia_macro::{main, test};
18use libc as _;
19#[doc(hidden)]
20pub use log::error;
21use std::future::Future;
22
23#[cfg(fuchsia_api_level_less_than = "NEXT")]
24pub use fidl_fuchsia_diagnostics::{Interest, Severity};
25#[cfg(fuchsia_api_level_at_least = "NEXT")]
26pub use fidl_fuchsia_diagnostics_types::{Interest, Severity};
27
28//
29// LOGGING INITIALIZATION
30//
31
32/// Options used when initializing logging.
33#[derive(Default, Clone)]
34pub struct LoggingOptions<'a> {
35    /// Tags with which to initialize the logging system. All logs will carry the tags configured
36    /// here.
37    pub tags: &'a [&'static str],
38
39    /// Allows to configure the minimum severity of the logs being emitted. Logs of lower severity
40    /// won't be emitted.
41    pub interest: Interest,
42
43    /// Whether or not logs will be blocking. By default logs are dropped when they can't be
44    /// written to the socket. However, when this is set, the log statement will block until the
45    /// log can be written to the socket or the socket is closed.
46    ///
47    /// NOTE: this is ignored on `host`.
48    pub blocking: bool,
49
50    /// String to include in logged panic messages.
51    pub panic_prefix: &'static str,
52
53    /// True to always log file/line information, false to only log
54    /// when severity is ERROR or above.
55    pub always_log_file_line: bool,
56}
57
58#[cfg(not(target_os = "fuchsia"))]
59impl<'a> From<LoggingOptions<'a>> for diagnostics_log::PublishOptions<'a> {
60    fn from(logging: LoggingOptions<'a>) -> Self {
61        let mut options = diagnostics_log::PublishOptions::default().tags(logging.tags);
62        if let Some(severity) = logging.interest.min_severity {
63            options = options.minimum_severity(severity);
64        }
65        options = options.panic_prefix(logging.panic_prefix);
66        options
67    }
68}
69
70#[cfg(target_os = "fuchsia")]
71impl<'a> From<LoggingOptions<'a>> for diagnostics_log::PublishOptions<'a> {
72    fn from(logging: LoggingOptions<'a>) -> Self {
73        let mut options = diagnostics_log::PublishOptions::default().tags(logging.tags);
74        options = options.blocking(logging.blocking);
75        if let Some(severity) = logging.interest.min_severity {
76            options = options.minimum_severity(severity);
77        }
78        if logging.always_log_file_line {
79            options = options.always_log_file_line();
80        }
81        options = options.panic_prefix(logging.panic_prefix);
82        options
83    }
84}
85
86/// Initialize logging
87#[doc(hidden)]
88pub fn init_logging_for_component_with_executor<'a, R>(
89    func: impl FnOnce() -> R + 'a,
90    logging: LoggingOptions<'a>,
91) -> impl FnOnce() -> R + 'a {
92    move || {
93        diagnostics_log::initialize(logging.into()).expect("initialize_logging");
94        func()
95    }
96}
97
98/// Initialize logging
99#[doc(hidden)]
100pub fn init_logging_for_component_with_threads<'a, R>(
101    func: impl FnOnce() -> R + 'a,
102    logging: LoggingOptions<'a>,
103) -> impl FnOnce() -> R + 'a {
104    move || {
105        let _guard = init_logging_with_threads(logging);
106        func()
107    }
108}
109
110/// Initialize logging
111#[doc(hidden)]
112pub fn init_logging_for_test_with_executor<'a, R>(
113    func: impl Fn(usize) -> R + 'a,
114    logging: LoggingOptions<'a>,
115) -> impl Fn(usize) -> R + 'a {
116    move |n| {
117        diagnostics_log::initialize(logging.clone().into()).expect("initalize logging");
118        func(n)
119    }
120}
121
122/// Initialize logging
123#[doc(hidden)]
124pub fn init_logging_for_test_with_threads<'a, R>(
125    func: impl Fn(usize) -> R + 'a,
126    logging: LoggingOptions<'a>,
127) -> impl Fn(usize) -> R + 'a {
128    move |n| {
129        let _guard = init_logging_with_threads(logging.clone());
130        func(n)
131    }
132}
133
134/// Initializes logging on a background thread, returning a guard which cancels interest listening
135/// when dropped.
136#[cfg(target_os = "fuchsia")]
137fn init_logging_with_threads(logging: LoggingOptions<'_>) -> impl Drop {
138    diagnostics_log::initialize_sync(logging.into())
139}
140
141#[cfg(not(target_os = "fuchsia"))]
142fn init_logging_with_threads(logging: LoggingOptions<'_>) {
143    diagnostics_log::initialize(logging.into()).expect("initialize_logging");
144}
145
146#[cfg(target_os = "fuchsia")]
147fn set_thread_role(role_name: &str) {
148    if let Err(e) = fuchsia_scheduler::set_role_for_this_thread(role_name) {
149        log::warn!(e:%, role_name:%; "Couldn't apply thread role.");
150    }
151}
152
153//
154// MAIN FUNCTION WRAPPERS
155//
156
157/// Run a non-async main function.
158#[doc(hidden)]
159pub fn main_not_async<F, R>(f: F) -> R
160where
161    F: FnOnce() -> R,
162{
163    f()
164}
165
166/// Run a non-async main function, applying `role_name` as the thread role.
167#[doc(hidden)]
168pub fn main_not_async_with_role<F, R>(f: F, _role_name: &'static str) -> R
169where
170    F: FnOnce() -> R,
171{
172    #[cfg(target_os = "fuchsia")]
173    set_thread_role(_role_name);
174    f()
175}
176
177/// Run an async main function with a single threaded executor.
178#[doc(hidden)]
179pub fn main_singlethreaded<F, Fut, R>(f: F) -> R
180where
181    F: FnOnce() -> Fut,
182    Fut: Future<Output = R> + 'static,
183{
184    fuchsia_async::LocalExecutor::new().run_singlethreaded(f())
185}
186
187/// Run an async main function with a single threaded executor, applying `role_name`.
188#[doc(hidden)]
189pub fn main_singlethreaded_with_role<F, Fut, R>(f: F, _role_name: &'static str) -> R
190where
191    F: FnOnce() -> Fut,
192    Fut: Future<Output = R> + 'static,
193{
194    #[cfg(target_os = "fuchsia")]
195    set_thread_role(_role_name);
196    fuchsia_async::LocalExecutor::new().run_singlethreaded(f())
197}
198
199/// Run an async main function with a multi threaded executor (containing `num_threads`).
200#[doc(hidden)]
201pub fn main_multithreaded<F, Fut, R>(f: F, num_threads: u8) -> R
202where
203    F: FnOnce() -> Fut,
204    Fut: Future<Output = R> + Send + 'static,
205    R: Send + 'static,
206{
207    fuchsia_async::SendExecutor::new(num_threads).run(f())
208}
209
210/// Run an async main function with a multi threaded executor (containing `num_threads`) and apply
211/// `role_name` to all of the threads.
212#[doc(hidden)]
213pub fn main_multithreaded_with_role<F, Fut, R>(f: F, num_threads: u8, _role_name: &'static str) -> R
214where
215    F: FnOnce() -> Fut,
216    Fut: Future<Output = R> + Send + 'static,
217    R: Send + 'static,
218{
219    let mut exec = fuchsia_async::SendExecutor::new(num_threads);
220    #[cfg(target_os = "fuchsia")]
221    {
222        set_thread_role(_role_name);
223        exec.set_worker_init(move || set_thread_role(_role_name));
224    }
225    exec.run(f())
226}
227
228//
229// TEST FUNCTION WRAPPERS
230//
231
232/// Run a non-async test function.
233#[doc(hidden)]
234pub fn test_not_async<F, R>(f: F) -> R
235where
236    F: FnOnce(usize) -> R,
237    R: fuchsia_async::test_support::TestResult,
238{
239    let result = f(0);
240    if result.is_ok() {
241        install_lsan_hook();
242    }
243    result
244}
245
246/// Run an async test function with a single threaded executor.
247#[doc(hidden)]
248pub fn test_singlethreaded<F, Fut, R>(f: F) -> R
249where
250    F: Fn(usize) -> Fut + Sync + 'static,
251    Fut: Future<Output = R> + 'static,
252    R: fuchsia_async::test_support::TestResult,
253{
254    let result = fuchsia_async::test_support::run_singlethreaded_test(f);
255    if result.is_ok() {
256        install_lsan_hook();
257    }
258    result
259}
260
261/// Run an async test function with a multi threaded executor (containing `num_threads`).
262#[doc(hidden)]
263pub fn test_multithreaded<F, Fut, R>(f: F, num_threads: u8) -> R
264where
265    F: Fn(usize) -> Fut + Sync + 'static,
266    Fut: Future<Output = R> + Send + 'static,
267    R: fuchsia_async::test_support::MultithreadedTestResult,
268{
269    let result = fuchsia_async::test_support::run_test(f, num_threads);
270    if result.is_ok() {
271        install_lsan_hook();
272    }
273    result
274}
275
276/// Run an async test function until it stalls. The executor will also use fake time.
277#[doc(hidden)]
278#[cfg(target_os = "fuchsia")]
279pub fn test_until_stalled<F, Fut, R>(f: F) -> R
280where
281    F: 'static + Sync + Fn(usize) -> Fut,
282    Fut: 'static + Future<Output = R>,
283    R: fuchsia_async::test_support::TestResult,
284{
285    let result = fuchsia_async::test_support::run_until_stalled_test(true, f);
286    if result.is_ok() {
287        install_lsan_hook();
288    }
289    result
290}
291
292//
293// FUNCTION ARGUMENT ADAPTERS
294//
295
296/// Take a main function `f` that takes an argument and return a function that takes none but calls
297/// `f` with the arguments parsed via argh.
298#[doc(hidden)]
299pub fn adapt_to_parse_arguments<A, R>(f: impl FnOnce(A) -> R) -> impl FnOnce() -> R
300where
301    A: argh::TopLevelCommand,
302{
303    move || f(argh::from_env())
304}
305
306/// Take a test function `f` that takes no parameters and return a function that takes the run
307/// number as required by our test runners.
308#[doc(hidden)]
309pub fn adapt_to_take_test_run_number<R>(f: impl Fn() -> R) -> impl Fn(usize) -> R {
310    move |_| f()
311}
312
313//
314// LEAK SANITIZER SUPPORT
315//
316
317// Note that the variant is named variant_asan (for AddressSanitizer), but the specific sanitizer we
318// are targeting is lsan (LeakSanitizer), which is enabled as part of the asan variant.
319
320#[doc(hidden)]
321#[cfg(not(feature = "variant_asan"))]
322pub fn disable_lsan_for_should_panic() {}
323
324#[doc(hidden)]
325#[cfg(feature = "variant_asan")]
326pub fn disable_lsan_for_should_panic() {
327    extern "C" {
328        fn __lsan_disable();
329    }
330    unsafe {
331        __lsan_disable();
332    }
333}
334
335#[cfg(not(feature = "variant_asan"))]
336fn install_lsan_hook() {}
337
338#[cfg(feature = "variant_asan")]
339fn install_lsan_hook() {
340    extern "C" {
341        fn __lsan_do_leak_check();
342    }
343    // Wrap the call because atexit requires a safe function pointer.
344    extern "C" fn lsan_do_leak_check() {
345        unsafe { __lsan_do_leak_check() }
346    }
347    // Wait until atexit hooks are called, in case there is more cleanup left to do.
348    let err = unsafe { libc::atexit(lsan_do_leak_check) };
349    if err != 0 {
350        panic!("Failed to install atexit hook for LeakSanitizer: atexit returned {err}");
351    }
352}