2017-07-05 18:23:32 -07:00
|
|
|
// Copyright 2017 The Crashpad Authors. All rights reserved.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2017-09-08 12:49:55 -07:00
|
|
|
#include "snapshot/elf/elf_image_reader.h"
|
2017-07-05 18:23:32 -07:00
|
|
|
|
|
|
|
#include <dlfcn.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
|
|
|
#include "base/logging.h"
|
2017-07-29 17:18:12 -04:00
|
|
|
#include "build/build_config.h"
|
2017-07-05 18:23:32 -07:00
|
|
|
#include "gtest/gtest.h"
|
|
|
|
#include "test/multiprocess.h"
|
|
|
|
#include "util/file/file_io.h"
|
|
|
|
#include "util/linux/auxiliary_vector.h"
|
|
|
|
#include "util/linux/memory_map.h"
|
2017-09-12 16:49:35 -07:00
|
|
|
#include "util/misc/address_types.h"
|
2017-07-05 18:23:32 -07:00
|
|
|
#include "util/misc/from_pointer_cast.h"
|
2017-10-11 20:01:56 -07:00
|
|
|
#include "util/process/process_memory_linux.h"
|
2017-07-05 18:23:32 -07:00
|
|
|
|
|
|
|
extern "C" {
|
|
|
|
__attribute__((visibility("default"))) void
|
|
|
|
ElfImageReaderTestExportedSymbol(){};
|
|
|
|
} // extern "C"
|
|
|
|
|
|
|
|
namespace crashpad {
|
|
|
|
namespace test {
|
|
|
|
namespace {
|
|
|
|
|
2017-09-12 16:49:35 -07:00
|
|
|
void LocateExecutable(pid_t pid, bool is_64_bit, VMAddress* elf_address) {
|
2017-07-05 18:23:32 -07:00
|
|
|
AuxiliaryVector aux;
|
|
|
|
ASSERT_TRUE(aux.Initialize(pid, is_64_bit));
|
|
|
|
|
2017-09-12 16:49:35 -07:00
|
|
|
VMAddress phdrs;
|
2017-07-05 18:23:32 -07:00
|
|
|
ASSERT_TRUE(aux.GetValue(AT_PHDR, &phdrs));
|
|
|
|
|
|
|
|
MemoryMap memory_map;
|
|
|
|
ASSERT_TRUE(memory_map.Initialize(pid));
|
2017-07-11 08:59:24 -07:00
|
|
|
const MemoryMap::Mapping* phdr_mapping = memory_map.FindMapping(phdrs);
|
|
|
|
ASSERT_TRUE(phdr_mapping);
|
|
|
|
const MemoryMap::Mapping* exe_mapping =
|
|
|
|
memory_map.FindFileMmapStart(*phdr_mapping);
|
2017-07-05 18:23:32 -07:00
|
|
|
ASSERT_TRUE(exe_mapping);
|
|
|
|
*elf_address = exe_mapping->range.Base();
|
|
|
|
}
|
|
|
|
|
2017-12-05 11:21:14 -08:00
|
|
|
void ExpectSymbol(ElfImageReader* reader,
|
|
|
|
const std::string& symbol_name,
|
|
|
|
VMAddress expected_symbol_address) {
|
2017-09-12 16:49:35 -07:00
|
|
|
VMAddress symbol_address;
|
|
|
|
VMSize symbol_size;
|
2017-07-05 18:23:32 -07:00
|
|
|
ASSERT_TRUE(
|
2017-12-05 11:21:14 -08:00
|
|
|
reader->GetDynamicSymbol(symbol_name, &symbol_address, &symbol_size));
|
2017-07-05 18:23:32 -07:00
|
|
|
EXPECT_EQ(symbol_address, expected_symbol_address);
|
|
|
|
|
|
|
|
EXPECT_FALSE(
|
2017-12-05 11:21:14 -08:00
|
|
|
reader->GetDynamicSymbol("notasymbol", &symbol_address, &symbol_size));
|
2017-07-05 18:23:32 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
void ReadThisExecutableInTarget(pid_t pid) {
|
|
|
|
#if defined(ARCH_CPU_64_BITS)
|
|
|
|
constexpr bool am_64_bit = true;
|
|
|
|
#else
|
|
|
|
constexpr bool am_64_bit = false;
|
|
|
|
#endif // ARCH_CPU_64_BITS
|
|
|
|
|
2017-09-12 16:49:35 -07:00
|
|
|
VMAddress elf_address;
|
2017-07-05 18:23:32 -07:00
|
|
|
LocateExecutable(pid, am_64_bit, &elf_address);
|
|
|
|
|
2017-12-05 11:21:14 -08:00
|
|
|
ProcessMemoryLinux memory;
|
|
|
|
ASSERT_TRUE(memory.Initialize(pid));
|
|
|
|
ProcessMemoryRange range;
|
|
|
|
ASSERT_TRUE(range.Initialize(&memory, am_64_bit));
|
|
|
|
|
|
|
|
ElfImageReader reader;
|
|
|
|
ASSERT_TRUE(reader.Initialize(range, elf_address));
|
|
|
|
|
|
|
|
ExpectSymbol(&reader,
|
|
|
|
"ElfImageReaderTestExportedSymbol",
|
|
|
|
FromPointerCast<VMAddress>(ElfImageReaderTestExportedSymbol));
|
|
|
|
|
|
|
|
ElfImageReader::NoteReader::Result result;
|
|
|
|
std::string note_name;
|
|
|
|
std::string note_desc;
|
|
|
|
ElfImageReader::NoteReader::NoteType note_type;
|
|
|
|
|
|
|
|
std::unique_ptr<ElfImageReader::NoteReader> notes = reader.Notes(-1);
|
|
|
|
while ((result = notes->NextNote(¬e_name, ¬e_type, ¬e_desc)) ==
|
|
|
|
ElfImageReader::NoteReader::Result::kSuccess) {
|
|
|
|
}
|
|
|
|
EXPECT_EQ(result, ElfImageReader::NoteReader::Result::kNoMoreNotes);
|
|
|
|
|
|
|
|
notes = reader.Notes(0);
|
|
|
|
EXPECT_EQ(notes->NextNote(¬e_name, ¬e_type, ¬e_desc),
|
|
|
|
ElfImageReader::NoteReader::Result::kNoMoreNotes);
|
|
|
|
|
|
|
|
// Find the note defined in elf_image_reader_test_note.S.
|
|
|
|
constexpr char kCrashpadNoteName[] = "Crashpad";
|
|
|
|
constexpr ElfImageReader::NoteReader::NoteType kCrashpadNoteType = 1;
|
|
|
|
constexpr uint32_t kCrashpadNoteDesc = 42;
|
|
|
|
notes = reader.NotesWithNameAndType(kCrashpadNoteName, kCrashpadNoteType, -1);
|
|
|
|
ASSERT_EQ(notes->NextNote(¬e_name, ¬e_type, ¬e_desc),
|
|
|
|
ElfImageReader::NoteReader::Result::kSuccess);
|
|
|
|
EXPECT_EQ(note_name, kCrashpadNoteName);
|
|
|
|
EXPECT_EQ(note_type, kCrashpadNoteType);
|
|
|
|
EXPECT_EQ(note_desc.size(), sizeof(kCrashpadNoteDesc));
|
|
|
|
EXPECT_EQ(*reinterpret_cast<decltype(kCrashpadNoteDesc)*>(¬e_desc[0]),
|
|
|
|
kCrashpadNoteDesc);
|
|
|
|
|
|
|
|
EXPECT_EQ(notes->NextNote(¬e_name, ¬e_type, ¬e_desc),
|
|
|
|
ElfImageReader::NoteReader::Result::kNoMoreNotes);
|
2017-07-05 18:23:32 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
// Assumes that libc is loaded at the same address in this process as in the
|
|
|
|
// target, which it is for the fork test below.
|
|
|
|
void ReadLibcInTarget(pid_t pid) {
|
|
|
|
#if defined(ARCH_CPU_64_BITS)
|
|
|
|
constexpr bool am_64_bit = true;
|
|
|
|
#else
|
|
|
|
constexpr bool am_64_bit = false;
|
|
|
|
#endif // ARCH_CPU_64_BITS
|
|
|
|
|
|
|
|
Dl_info info;
|
|
|
|
ASSERT_TRUE(dladdr(reinterpret_cast<void*>(getpid), &info)) << "dladdr:"
|
|
|
|
<< dlerror();
|
2017-09-12 16:49:35 -07:00
|
|
|
VMAddress elf_address = FromPointerCast<VMAddress>(info.dli_fbase);
|
2017-07-05 18:23:32 -07:00
|
|
|
|
2017-12-05 11:21:14 -08:00
|
|
|
ProcessMemoryLinux memory;
|
|
|
|
ASSERT_TRUE(memory.Initialize(pid));
|
|
|
|
ProcessMemoryRange range;
|
|
|
|
ASSERT_TRUE(range.Initialize(&memory, am_64_bit));
|
|
|
|
|
|
|
|
ElfImageReader reader;
|
|
|
|
ASSERT_TRUE(reader.Initialize(range, elf_address));
|
|
|
|
|
|
|
|
ExpectSymbol(&reader, "getpid", FromPointerCast<VMAddress>(getpid));
|
2017-07-05 18:23:32 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
class ReadExecutableChildTest : public Multiprocess {
|
|
|
|
public:
|
|
|
|
ReadExecutableChildTest() : Multiprocess() {}
|
|
|
|
~ReadExecutableChildTest() {}
|
|
|
|
|
|
|
|
private:
|
|
|
|
void MultiprocessParent() { ReadThisExecutableInTarget(ChildPID()); }
|
|
|
|
void MultiprocessChild() { CheckedReadFileAtEOF(ReadPipeHandle()); }
|
|
|
|
};
|
|
|
|
|
|
|
|
TEST(ElfImageReader, MainExecutableSelf) {
|
|
|
|
ReadThisExecutableInTarget(getpid());
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ElfImageReader, MainExecutableChild) {
|
|
|
|
ReadExecutableChildTest test;
|
|
|
|
test.Run();
|
|
|
|
}
|
|
|
|
|
|
|
|
TEST(ElfImageReader, OneModuleSelf) {
|
|
|
|
ReadLibcInTarget(getpid());
|
|
|
|
}
|
|
|
|
|
|
|
|
class ReadLibcChildTest : public Multiprocess {
|
|
|
|
public:
|
|
|
|
ReadLibcChildTest() : Multiprocess() {}
|
|
|
|
~ReadLibcChildTest() {}
|
|
|
|
|
|
|
|
private:
|
|
|
|
void MultiprocessParent() { ReadLibcInTarget(ChildPID()); }
|
|
|
|
void MultiprocessChild() { CheckedReadFileAtEOF(ReadPipeHandle()); }
|
|
|
|
};
|
|
|
|
|
|
|
|
TEST(ElfImageReader, OneModuleChild) {
|
|
|
|
ReadLibcChildTest test;
|
|
|
|
test.Run();
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace
|
|
|
|
} // namespace test
|
|
|
|
} // namespace crashpad
|