crashpad/util/linux/process_memory_range_test.cc
Joshua Peraza 1c87c92932 linux: Add ProcessMemoryRange to restrict memory reads to a range
Bug: crashpad:30
Change-Id: I0debf3b47d0f79c5c5397e5ad2faf760191381ec
Reviewed-on: https://chromium-review.googlesource.com/553657
Commit-Queue: Joshua Peraza <jperaza@chromium.org>
Reviewed-by: Mark Mentovai <mark@chromium.org>
2017-06-29 22:37:29 +00:00

92 lines
3.0 KiB
C++

// Copyright 2017 The Crashpad Authors. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include "util/linux/process_memory_range.h"
#include <unistd.h>
#include <limits>
#include "base/logging.h"
#include "build/build_config.h"
#include "gtest/gtest.h"
#include "util/misc/from_pointer_cast.h"
namespace crashpad {
namespace test {
namespace {
struct TestObject {
char string1[16];
char string2[16];
} kTestObject = {"string1", "string2"};
TEST(ProcessMemoryRange, Basic) {
pid_t pid = getpid();
#if defined(ARCH_CPU_64_BITS)
constexpr bool is_64_bit = true;
#else
constexpr bool is_64_bit = false;
#endif // ARCH_CPU_64_BITS
ProcessMemory memory;
ASSERT_TRUE(memory.Initialize(pid));
ProcessMemoryRange range;
ASSERT_TRUE(range.Initialize(&memory, is_64_bit));
EXPECT_EQ(range.Is64Bit(), is_64_bit);
// Both strings are accessible within the object's range.
auto object_addr = FromPointerCast<LinuxVMAddress>(&kTestObject);
EXPECT_TRUE(range.RestrictRange(object_addr, sizeof(kTestObject)));
TestObject object;
ASSERT_TRUE(range.Read(object_addr, sizeof(object), &object));
EXPECT_EQ(memcmp(&object, &kTestObject, sizeof(object)), 0);
std::string string;
auto string1_addr = FromPointerCast<LinuxVMAddress>(kTestObject.string1);
auto string2_addr = FromPointerCast<LinuxVMAddress>(kTestObject.string2);
ASSERT_TRUE(range.ReadCStringSizeLimited(
string1_addr, arraysize(kTestObject.string1), &string));
EXPECT_STREQ(string.c_str(), kTestObject.string1);
ASSERT_TRUE(range.ReadCStringSizeLimited(
string2_addr, arraysize(kTestObject.string2), &string));
EXPECT_STREQ(string.c_str(), kTestObject.string2);
// Limit the range to remove access to string2.
ProcessMemoryRange range2;
ASSERT_TRUE(range2.Initialize(range));
ASSERT_TRUE(
range2.RestrictRange(string1_addr, arraysize(kTestObject.string1)));
EXPECT_TRUE(range2.ReadCStringSizeLimited(
string1_addr, arraysize(kTestObject.string1), &string));
EXPECT_FALSE(range2.ReadCStringSizeLimited(
string2_addr, arraysize(kTestObject.string2), &string));
EXPECT_FALSE(range2.Read(object_addr, sizeof(object), &object));
// String reads fail if the NUL terminator is outside the range.
ASSERT_TRUE(range2.RestrictRange(string1_addr, strlen(kTestObject.string1)));
EXPECT_FALSE(range2.ReadCStringSizeLimited(
string1_addr, arraysize(kTestObject.string1), &string));
// New range outside the old range.
EXPECT_FALSE(range2.RestrictRange(string1_addr - 1, 1));
}
} // namespace
} // namespace test
} // namespace crashpad