mirror of
https://github.com/chromium/crashpad.git
synced 2024-12-27 15:32:10 +08:00
d1e6a2130d
Sanitization is controlled by a SanitizationInformation struct to be read from the client's memory. The address of this struct is either passed in a ClientInformation when the client requests a crash dump, or as a flag to the handler --sanitization_information. Bug: crashpad:30 Change-Id: I2744f8fb85b4fea7362b2b88faa4bef1da74e36b Reviewed-on: https://chromium-review.googlesource.com/1083143 Commit-Queue: Joshua Peraza <jperaza@chromium.org> Reviewed-by: Scott Graham <scottmg@chromium.org>
71 lines
2.2 KiB
C++
71 lines
2.2 KiB
C++
// Copyright 2018 The Crashpad Authors. All rights reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
#include "snapshot/sanitized/sanitization_information.h"
|
|
|
|
#include "build/build_config.h"
|
|
#include "gtest/gtest.h"
|
|
#include "util/misc/from_pointer_cast.h"
|
|
#include "util/process/process_memory_linux.h"
|
|
|
|
namespace crashpad {
|
|
namespace test {
|
|
namespace {
|
|
|
|
class WhitelistTest : public testing::Test {
|
|
public:
|
|
void SetUp() override {
|
|
ASSERT_TRUE(memory_.Initialize(getpid()));
|
|
#if defined(ARCH_CPU_64_BITS)
|
|
ASSERT_TRUE(range_.Initialize(&memory_, true));
|
|
#else
|
|
ASSERT_TRUE(range_.Initialize(&memory_, false));
|
|
#endif
|
|
}
|
|
|
|
protected:
|
|
bool ReadWhitelist(const char* const* address) {
|
|
return ReadAnnotationsWhitelist(
|
|
range_, FromPointerCast<VMAddress>(address), &whitelist_);
|
|
}
|
|
|
|
ProcessMemoryLinux memory_;
|
|
ProcessMemoryRange range_;
|
|
std::vector<std::string> whitelist_;
|
|
};
|
|
|
|
const char* const kEmptyWhitelist[] = {nullptr};
|
|
|
|
TEST_F(WhitelistTest, EmptyWhitelist) {
|
|
ASSERT_TRUE(ReadWhitelist(kEmptyWhitelist));
|
|
EXPECT_EQ(whitelist_, std::vector<std::string>());
|
|
}
|
|
|
|
const char* const kNonEmptyWhitelist[] = {"string1",
|
|
"another_string",
|
|
"",
|
|
nullptr};
|
|
|
|
TEST_F(WhitelistTest, NonEmptyWhitelist) {
|
|
ASSERT_TRUE(ReadWhitelist(kNonEmptyWhitelist));
|
|
ASSERT_EQ(whitelist_.size(), arraysize(kNonEmptyWhitelist) - 1);
|
|
for (size_t index = 0; index < arraysize(kNonEmptyWhitelist) - 1; ++index) {
|
|
EXPECT_EQ(whitelist_[index], kNonEmptyWhitelist[index]);
|
|
}
|
|
}
|
|
|
|
} // namespace
|
|
} // namespace test
|
|
} // namespace crashpad
|