// Copyright 2016 The Crashpad Authors. All rights reserved. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. #include "snapshot/win/module_snapshot_win.h" #include #include #include #include "base/files/file_path.h" #include "build/build_config.h" #include "client/crashpad_info.h" #include "client/simple_address_range_bag.h" #include "gtest/gtest.h" #include "snapshot/win/process_snapshot_win.h" #include "test/gtest_disabled.h" #include "test/test_paths.h" #include "test/win/child_launcher.h" #include "util/file/file_io.h" #include "util/win/process_info.h" namespace crashpad { namespace test { namespace { enum TestType { // Don't crash, just test the CrashpadInfo interface. kDontCrash = 0, // The child process should crash by __debugbreak(). kCrashDebugBreak, }; void TestExtraMemoryRanges(TestType type, TestPaths::Architecture architecture) { // Spawn a child process, passing it the pipe name to connect to. base::FilePath child_test_executable = TestPaths::BuildArtifact(L"snapshot", L"extra_memory_ranges", TestPaths::FileType::kExecutable, architecture); ChildLauncher child(child_test_executable, L""); ASSERT_NO_FATAL_FAILURE(child.Start()); // Wait for the child process to indicate that it's done setting up its // annotations via the CrashpadInfo interface. char c; CheckedReadFileExactly(child.stdout_read_handle(), &c, sizeof(c)); ProcessSnapshotWin snapshot; ASSERT_TRUE(snapshot.Initialize( child.process_handle(), ProcessSuspensionState::kRunning, 0, 0)); // Verify the extra memory ranges set via the CrashpadInfo interface. std::set> all_ranges; for (const auto* module : snapshot.Modules()) { for (const auto& range : module->ExtraMemoryRanges()) all_ranges.insert(range); } EXPECT_EQ(all_ranges.size(), 5u); EXPECT_NE(all_ranges.find(CheckedRange(0, 1)), all_ranges.end()); EXPECT_NE(all_ranges.find(CheckedRange(1, 0)), all_ranges.end()); EXPECT_NE(all_ranges.find(CheckedRange(1234, 5678)), all_ranges.end()); EXPECT_NE(all_ranges.find(CheckedRange(0x1000000000ULL, 0x1000)), all_ranges.end()); EXPECT_NE(all_ranges.find(CheckedRange(0x2000, 0x2000000000ULL)), all_ranges.end()); // Tell the child process to continue. DWORD expected_exit_code; switch (type) { case kDontCrash: c = ' '; expected_exit_code = 0; break; case kCrashDebugBreak: c = 'd'; expected_exit_code = STATUS_BREAKPOINT; break; default: FAIL(); } CheckedWriteFile(child.stdin_write_handle(), &c, sizeof(c)); EXPECT_EQ(child.WaitForExit(), expected_exit_code); } TEST(ExtraMemoryRanges, DontCrash) { TestExtraMemoryRanges(kDontCrash, TestPaths::Architecture::kDefault); } TEST(ExtraMemoryRanges, CrashDebugBreak) { TestExtraMemoryRanges(kCrashDebugBreak, TestPaths::Architecture::kDefault); } #if defined(ARCH_CPU_64_BITS) TEST(ExtraMemoryRanges, DontCrashWOW64) { if (!TestPaths::Has32BitBuildArtifacts()) { DISABLED_TEST(); } TestExtraMemoryRanges(kDontCrash, TestPaths::Architecture::k32Bit); } TEST(ExtraMemoryRanges, CrashDebugBreakWOW64) { if (!TestPaths::Has32BitBuildArtifacts()) { DISABLED_TEST(); } TestExtraMemoryRanges(kCrashDebugBreak, TestPaths::Architecture::k32Bit); } #endif // ARCH_CPU_64_BITS } // namespace } // namespace test } // namespace crashpad