mirror of
https://github.com/chromium/crashpad.git
synced 2024-12-31 01:43:03 +08:00
78bcb55e1c
Update ProcessMemoryLinux to be constructed from PtraceConnection instead of being Initialize()d with a pid_t. This allows consolidating PtraceClient's BrokeredMemory with ProcessMemoryLinux and providing the PtraceConnection as a alternative to the memory file (previously only done for brokered connections). Change-Id: I1363e208030eaf595fb8051e9a2c6b255c1f9886 Reviewed-on: https://chromium-review.googlesource.com/c/crashpad/crashpad/+/3072402 Reviewed-by: Mark Mentovai <mark@chromium.org> Commit-Queue: Joshua Peraza <jperaza@chromium.org>
101 lines
3.5 KiB
C++
101 lines
3.5 KiB
C++
// Copyright 2017 The Crashpad Authors. All rights reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
#include "util/process/process_memory_range.h"
|
|
|
|
#include <limits>
|
|
|
|
#include "base/cxx17_backports.h"
|
|
#include "build/build_config.h"
|
|
#include "gtest/gtest.h"
|
|
#include "test/process_type.h"
|
|
#include "util/misc/from_pointer_cast.h"
|
|
#include "util/process/process_memory_native.h"
|
|
|
|
#if defined(OS_ANDROID) || defined(OS_LINUX) || defined(OS_CHROMEOS)
|
|
#include "test/linux/fake_ptrace_connection.h"
|
|
#endif
|
|
|
|
namespace crashpad {
|
|
namespace test {
|
|
namespace {
|
|
|
|
struct TestObject {
|
|
char string1[16];
|
|
char string2[16];
|
|
} kTestObject = {"string1", "string2"};
|
|
|
|
TEST(ProcessMemoryRange, Basic) {
|
|
#if defined(ARCH_CPU_64_BITS)
|
|
constexpr bool is_64_bit = true;
|
|
#else
|
|
constexpr bool is_64_bit = false;
|
|
#endif // ARCH_CPU_64_BITS
|
|
|
|
#if defined(OS_ANDROID) || defined(OS_LINUX) || defined(OS_CHROMEOS)
|
|
FakePtraceConnection connection;
|
|
ASSERT_TRUE(connection.Initialize(GetSelfProcess()));
|
|
ProcessMemoryLinux memory(&connection);
|
|
#else
|
|
ProcessMemoryNative memory;
|
|
ASSERT_TRUE(memory.Initialize(GetSelfProcess()));
|
|
#endif // OS_ANDROID || OS_LINUX || OS_CHROMEOS
|
|
|
|
ProcessMemoryRange range;
|
|
ASSERT_TRUE(range.Initialize(&memory, is_64_bit));
|
|
EXPECT_EQ(range.Is64Bit(), is_64_bit);
|
|
|
|
// Both strings are accessible within the object's range.
|
|
auto object_addr = FromPointerCast<VMAddress>(&kTestObject);
|
|
EXPECT_TRUE(range.RestrictRange(object_addr, sizeof(kTestObject)));
|
|
|
|
TestObject object;
|
|
ASSERT_TRUE(range.Read(object_addr, sizeof(object), &object));
|
|
EXPECT_EQ(memcmp(&object, &kTestObject, sizeof(object)), 0);
|
|
|
|
std::string string;
|
|
auto string1_addr = FromPointerCast<VMAddress>(kTestObject.string1);
|
|
auto string2_addr = FromPointerCast<VMAddress>(kTestObject.string2);
|
|
ASSERT_TRUE(range.ReadCStringSizeLimited(
|
|
string1_addr, base::size(kTestObject.string1), &string));
|
|
EXPECT_STREQ(string.c_str(), kTestObject.string1);
|
|
|
|
ASSERT_TRUE(range.ReadCStringSizeLimited(
|
|
string2_addr, base::size(kTestObject.string2), &string));
|
|
EXPECT_STREQ(string.c_str(), kTestObject.string2);
|
|
|
|
// Limit the range to remove access to string2.
|
|
ProcessMemoryRange range2;
|
|
ASSERT_TRUE(range2.Initialize(range));
|
|
ASSERT_TRUE(
|
|
range2.RestrictRange(string1_addr, base::size(kTestObject.string1)));
|
|
EXPECT_TRUE(range2.ReadCStringSizeLimited(
|
|
string1_addr, base::size(kTestObject.string1), &string));
|
|
EXPECT_FALSE(range2.ReadCStringSizeLimited(
|
|
string2_addr, base::size(kTestObject.string2), &string));
|
|
EXPECT_FALSE(range2.Read(object_addr, sizeof(object), &object));
|
|
|
|
// String reads fail if the NUL terminator is outside the range.
|
|
ASSERT_TRUE(range2.RestrictRange(string1_addr, strlen(kTestObject.string1)));
|
|
EXPECT_FALSE(range2.ReadCStringSizeLimited(
|
|
string1_addr, base::size(kTestObject.string1), &string));
|
|
|
|
// New range outside the old range.
|
|
EXPECT_FALSE(range2.RestrictRange(string1_addr - 1, 1));
|
|
}
|
|
|
|
} // namespace
|
|
} // namespace test
|
|
} // namespace crashpad
|