
r=thestig at http://breakpad.appspot.com/242001/show git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@741 4c0a9323-5329-0410-9bdc-e9ce6186880e
775 lines
25 KiB
C++
775 lines
25 KiB
C++
// Copyright (c) 2010 Google Inc.
|
|
// All rights reserved.
|
|
//
|
|
// Redistribution and use in source and binary forms, with or without
|
|
// modification, are permitted provided that the following conditions are
|
|
// met:
|
|
//
|
|
// * Redistributions of source code must retain the above copyright
|
|
// notice, this list of conditions and the following disclaimer.
|
|
// * Redistributions in binary form must reproduce the above
|
|
// copyright notice, this list of conditions and the following disclaimer
|
|
// in the documentation and/or other materials provided with the
|
|
// distribution.
|
|
// * Neither the name of Google Inc. nor the names of its
|
|
// contributors may be used to endorse or promote products derived from
|
|
// this software without specific prior written permission.
|
|
//
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
#include <stdint.h>
|
|
#include <unistd.h>
|
|
#include <signal.h>
|
|
#include <sys/mman.h>
|
|
#include <sys/poll.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/uio.h>
|
|
#include <sys/wait.h>
|
|
|
|
#include <string>
|
|
|
|
#include "breakpad_googletest_includes.h"
|
|
#include "client/linux/handler/exception_handler.h"
|
|
#include "client/linux/minidump_writer/minidump_writer.h"
|
|
#include "common/linux/eintr_wrapper.h"
|
|
#include "common/linux/file_id.h"
|
|
#include "common/linux/linux_libc_support.h"
|
|
#include "third_party/lss/linux_syscall_support.h"
|
|
#include "google_breakpad/processor/minidump.h"
|
|
|
|
using namespace google_breakpad;
|
|
|
|
#if !defined(__ANDROID__)
|
|
#define TEMPDIR "/tmp"
|
|
#else
|
|
#define TEMPDIR "/data/local/tmp"
|
|
#endif
|
|
|
|
// Length of a formatted GUID string =
|
|
// sizeof(MDGUID) * 2 + 4 (for dashes) + 1 (null terminator)
|
|
const int kGUIDStringSize = 37;
|
|
|
|
static void sigchld_handler(int signo) { }
|
|
|
|
class ExceptionHandlerTest : public ::testing::Test {
|
|
protected:
|
|
void SetUp() {
|
|
// We need to be able to wait for children, so SIGCHLD cannot be SIG_IGN.
|
|
struct sigaction sa;
|
|
memset(&sa, 0, sizeof(sa));
|
|
sa.sa_handler = sigchld_handler;
|
|
ASSERT_NE(sigaction(SIGCHLD, &sa, &old_action), -1);
|
|
}
|
|
|
|
void TearDown() {
|
|
sigaction(SIGCHLD, &old_action, NULL);
|
|
}
|
|
|
|
struct sigaction old_action;
|
|
};
|
|
|
|
TEST(ExceptionHandlerTest, Simple) {
|
|
ExceptionHandler handler(TEMPDIR, NULL, NULL, NULL, true);
|
|
}
|
|
|
|
static bool DoneCallback(const char* dump_path,
|
|
const char* minidump_id,
|
|
void* context,
|
|
bool succeeded) {
|
|
if (!succeeded)
|
|
return succeeded;
|
|
|
|
int fd = (intptr_t) context;
|
|
uint32_t len = my_strlen(minidump_id);
|
|
HANDLE_EINTR(sys_write(fd, &len, sizeof(len)));
|
|
HANDLE_EINTR(sys_write(fd, minidump_id, len));
|
|
sys_close(fd);
|
|
|
|
return true;
|
|
}
|
|
|
|
TEST(ExceptionHandlerTest, ChildCrash) {
|
|
int fds[2];
|
|
ASSERT_NE(pipe(fds), -1);
|
|
|
|
const pid_t child = fork();
|
|
if (child == 0) {
|
|
close(fds[0]);
|
|
ExceptionHandler handler(TEMPDIR, NULL, DoneCallback, (void*) fds[1],
|
|
true);
|
|
*reinterpret_cast<int*>(NULL) = 0;
|
|
}
|
|
close(fds[1]);
|
|
|
|
int status;
|
|
ASSERT_NE(HANDLE_EINTR(waitpid(child, &status, 0)), -1);
|
|
ASSERT_TRUE(WIFSIGNALED(status));
|
|
ASSERT_EQ(WTERMSIG(status), SIGSEGV);
|
|
|
|
struct pollfd pfd;
|
|
memset(&pfd, 0, sizeof(pfd));
|
|
pfd.fd = fds[0];
|
|
pfd.events = POLLIN | POLLERR;
|
|
|
|
const int r = HANDLE_EINTR(poll(&pfd, 1, 0));
|
|
ASSERT_EQ(r, 1);
|
|
ASSERT_TRUE(pfd.revents & POLLIN);
|
|
|
|
uint32_t len;
|
|
ASSERT_EQ(read(fds[0], &len, sizeof(len)), (ssize_t)sizeof(len));
|
|
ASSERT_LT(len, (uint32_t)2048);
|
|
char* filename = reinterpret_cast<char*>(malloc(len + 1));
|
|
ASSERT_EQ(read(fds[0], filename, len), len);
|
|
filename[len] = 0;
|
|
close(fds[0]);
|
|
|
|
const std::string minidump_filename = std::string(TEMPDIR) + "/" + filename +
|
|
".dmp";
|
|
|
|
struct stat st;
|
|
ASSERT_EQ(stat(minidump_filename.c_str(), &st), 0);
|
|
ASSERT_GT(st.st_size, 0u);
|
|
unlink(minidump_filename.c_str());
|
|
}
|
|
|
|
// Test that memory around the instruction pointer is written
|
|
// to the dump as a MinidumpMemoryRegion.
|
|
TEST(ExceptionHandlerTest, InstructionPointerMemory) {
|
|
int fds[2];
|
|
ASSERT_NE(pipe(fds), -1);
|
|
|
|
// These are defined here so the parent can use them to check the
|
|
// data from the minidump afterwards.
|
|
const u_int32_t kMemorySize = 256; // bytes
|
|
const int kOffset = kMemorySize / 2;
|
|
// This crashes with SIGILL on x86/x86-64/arm.
|
|
const unsigned char instructions[] = { 0xff, 0xff, 0xff, 0xff };
|
|
|
|
const pid_t child = fork();
|
|
if (child == 0) {
|
|
close(fds[0]);
|
|
ExceptionHandler handler(TEMPDIR, NULL, DoneCallback, (void*) fds[1],
|
|
true);
|
|
// Get some executable memory.
|
|
char* memory =
|
|
reinterpret_cast<char*>(mmap(NULL,
|
|
kMemorySize,
|
|
PROT_READ | PROT_WRITE | PROT_EXEC,
|
|
MAP_PRIVATE | MAP_ANON,
|
|
-1,
|
|
0));
|
|
if (!memory)
|
|
exit(0);
|
|
|
|
// Write some instructions that will crash. Put them in the middle
|
|
// of the block of memory, because the minidump should contain 128
|
|
// bytes on either side of the instruction pointer.
|
|
memcpy(memory + kOffset, instructions, sizeof(instructions));
|
|
|
|
// Now execute the instructions, which should crash.
|
|
typedef void (*void_function)(void);
|
|
void_function memory_function =
|
|
reinterpret_cast<void_function>(memory + kOffset);
|
|
memory_function();
|
|
}
|
|
close(fds[1]);
|
|
|
|
int status;
|
|
ASSERT_NE(HANDLE_EINTR(waitpid(child, &status, 0)), -1);
|
|
ASSERT_TRUE(WIFSIGNALED(status));
|
|
ASSERT_EQ(WTERMSIG(status), SIGILL);
|
|
|
|
struct pollfd pfd;
|
|
memset(&pfd, 0, sizeof(pfd));
|
|
pfd.fd = fds[0];
|
|
pfd.events = POLLIN | POLLERR;
|
|
|
|
const int r = HANDLE_EINTR(poll(&pfd, 1, 0));
|
|
ASSERT_EQ(r, 1);
|
|
ASSERT_TRUE(pfd.revents & POLLIN);
|
|
|
|
uint32_t len;
|
|
ASSERT_EQ(read(fds[0], &len, sizeof(len)), (ssize_t)sizeof(len));
|
|
ASSERT_LT(len, (uint32_t)2048);
|
|
char* filename = reinterpret_cast<char*>(malloc(len + 1));
|
|
ASSERT_EQ(read(fds[0], filename, len), len);
|
|
filename[len] = 0;
|
|
close(fds[0]);
|
|
|
|
const std::string minidump_filename = std::string(TEMPDIR) + "/" + filename +
|
|
".dmp";
|
|
|
|
struct stat st;
|
|
ASSERT_EQ(stat(minidump_filename.c_str(), &st), 0);
|
|
ASSERT_GT(st.st_size, 0u);
|
|
|
|
// Read the minidump. Locate the exception record and the
|
|
// memory list, and then ensure that there is a memory region
|
|
// in the memory list that covers the instruction pointer from
|
|
// the exception record.
|
|
Minidump minidump(minidump_filename);
|
|
ASSERT_TRUE(minidump.Read());
|
|
|
|
MinidumpException* exception = minidump.GetException();
|
|
MinidumpMemoryList* memory_list = minidump.GetMemoryList();
|
|
ASSERT_TRUE(exception);
|
|
ASSERT_TRUE(memory_list);
|
|
ASSERT_LT(0, memory_list->region_count());
|
|
|
|
MinidumpContext* context = exception->GetContext();
|
|
ASSERT_TRUE(context);
|
|
|
|
u_int64_t instruction_pointer;
|
|
switch (context->GetContextCPU()) {
|
|
case MD_CONTEXT_X86:
|
|
instruction_pointer = context->GetContextX86()->eip;
|
|
break;
|
|
case MD_CONTEXT_AMD64:
|
|
instruction_pointer = context->GetContextAMD64()->rip;
|
|
break;
|
|
case MD_CONTEXT_ARM:
|
|
instruction_pointer = context->GetContextARM()->iregs[15];
|
|
break;
|
|
default:
|
|
FAIL() << "Unknown context CPU: " << context->GetContextCPU();
|
|
break;
|
|
}
|
|
|
|
MinidumpMemoryRegion* region =
|
|
memory_list->GetMemoryRegionForAddress(instruction_pointer);
|
|
ASSERT_TRUE(region);
|
|
|
|
EXPECT_EQ(kMemorySize, region->GetSize());
|
|
const u_int8_t* bytes = region->GetMemory();
|
|
ASSERT_TRUE(bytes);
|
|
|
|
u_int8_t prefix_bytes[kOffset];
|
|
u_int8_t suffix_bytes[kMemorySize - kOffset - sizeof(instructions)];
|
|
memset(prefix_bytes, 0, sizeof(prefix_bytes));
|
|
memset(suffix_bytes, 0, sizeof(suffix_bytes));
|
|
EXPECT_TRUE(memcmp(bytes, prefix_bytes, sizeof(prefix_bytes)) == 0);
|
|
EXPECT_TRUE(memcmp(bytes + kOffset, instructions, sizeof(instructions)) == 0);
|
|
EXPECT_TRUE(memcmp(bytes + kOffset + sizeof(instructions),
|
|
suffix_bytes, sizeof(suffix_bytes)) == 0);
|
|
|
|
unlink(minidump_filename.c_str());
|
|
free(filename);
|
|
}
|
|
|
|
// Test that the memory region around the instruction pointer is
|
|
// bounded correctly on the low end.
|
|
TEST(ExceptionHandlerTest, InstructionPointerMemoryMinBound) {
|
|
int fds[2];
|
|
ASSERT_NE(pipe(fds), -1);
|
|
|
|
// These are defined here so the parent can use them to check the
|
|
// data from the minidump afterwards.
|
|
const u_int32_t kMemorySize = 256; // bytes
|
|
const int kOffset = 0;
|
|
// This crashes with SIGILL on x86/x86-64/arm.
|
|
const unsigned char instructions[] = { 0xff, 0xff, 0xff, 0xff };
|
|
|
|
const pid_t child = fork();
|
|
if (child == 0) {
|
|
close(fds[0]);
|
|
ExceptionHandler handler(TEMPDIR, NULL, DoneCallback, (void*) fds[1],
|
|
true);
|
|
// Get some executable memory.
|
|
char* memory =
|
|
reinterpret_cast<char*>(mmap(NULL,
|
|
kMemorySize,
|
|
PROT_READ | PROT_WRITE | PROT_EXEC,
|
|
MAP_PRIVATE | MAP_ANON,
|
|
-1,
|
|
0));
|
|
if (!memory)
|
|
exit(0);
|
|
|
|
// Write some instructions that will crash. Put them in the middle
|
|
// of the block of memory, because the minidump should contain 128
|
|
// bytes on either side of the instruction pointer.
|
|
memcpy(memory + kOffset, instructions, sizeof(instructions));
|
|
|
|
// Now execute the instructions, which should crash.
|
|
typedef void (*void_function)(void);
|
|
void_function memory_function =
|
|
reinterpret_cast<void_function>(memory + kOffset);
|
|
memory_function();
|
|
}
|
|
close(fds[1]);
|
|
|
|
int status;
|
|
ASSERT_NE(HANDLE_EINTR(waitpid(child, &status, 0)), -1);
|
|
ASSERT_TRUE(WIFSIGNALED(status));
|
|
ASSERT_EQ(WTERMSIG(status), SIGILL);
|
|
|
|
struct pollfd pfd;
|
|
memset(&pfd, 0, sizeof(pfd));
|
|
pfd.fd = fds[0];
|
|
pfd.events = POLLIN | POLLERR;
|
|
|
|
const int r = HANDLE_EINTR(poll(&pfd, 1, 0));
|
|
ASSERT_EQ(r, 1);
|
|
ASSERT_TRUE(pfd.revents & POLLIN);
|
|
|
|
uint32_t len;
|
|
ASSERT_EQ(read(fds[0], &len, sizeof(len)), (ssize_t)sizeof(len));
|
|
ASSERT_LT(len, (uint32_t)2048);
|
|
char* filename = reinterpret_cast<char*>(malloc(len + 1));
|
|
ASSERT_EQ(read(fds[0], filename, len), len);
|
|
filename[len] = 0;
|
|
close(fds[0]);
|
|
|
|
const std::string minidump_filename = std::string(TEMPDIR) + "/" + filename +
|
|
".dmp";
|
|
|
|
struct stat st;
|
|
ASSERT_EQ(stat(minidump_filename.c_str(), &st), 0);
|
|
ASSERT_GT(st.st_size, 0u);
|
|
|
|
// Read the minidump. Locate the exception record and the
|
|
// memory list, and then ensure that there is a memory region
|
|
// in the memory list that covers the instruction pointer from
|
|
// the exception record.
|
|
Minidump minidump(minidump_filename);
|
|
ASSERT_TRUE(minidump.Read());
|
|
|
|
MinidumpException* exception = minidump.GetException();
|
|
MinidumpMemoryList* memory_list = minidump.GetMemoryList();
|
|
ASSERT_TRUE(exception);
|
|
ASSERT_TRUE(memory_list);
|
|
ASSERT_LT(0, memory_list->region_count());
|
|
|
|
MinidumpContext* context = exception->GetContext();
|
|
ASSERT_TRUE(context);
|
|
|
|
u_int64_t instruction_pointer;
|
|
switch (context->GetContextCPU()) {
|
|
case MD_CONTEXT_X86:
|
|
instruction_pointer = context->GetContextX86()->eip;
|
|
break;
|
|
case MD_CONTEXT_AMD64:
|
|
instruction_pointer = context->GetContextAMD64()->rip;
|
|
break;
|
|
case MD_CONTEXT_ARM:
|
|
instruction_pointer = context->GetContextARM()->iregs[15];
|
|
break;
|
|
default:
|
|
FAIL() << "Unknown context CPU: " << context->GetContextCPU();
|
|
break;
|
|
}
|
|
|
|
MinidumpMemoryRegion* region =
|
|
memory_list->GetMemoryRegionForAddress(instruction_pointer);
|
|
ASSERT_TRUE(region);
|
|
|
|
EXPECT_EQ(kMemorySize / 2, region->GetSize());
|
|
const u_int8_t* bytes = region->GetMemory();
|
|
ASSERT_TRUE(bytes);
|
|
|
|
u_int8_t suffix_bytes[kMemorySize / 2 - sizeof(instructions)];
|
|
memset(suffix_bytes, 0, sizeof(suffix_bytes));
|
|
EXPECT_TRUE(memcmp(bytes + kOffset, instructions, sizeof(instructions)) == 0);
|
|
EXPECT_TRUE(memcmp(bytes + kOffset + sizeof(instructions),
|
|
suffix_bytes, sizeof(suffix_bytes)) == 0);
|
|
|
|
unlink(minidump_filename.c_str());
|
|
free(filename);
|
|
}
|
|
|
|
// Test that the memory region around the instruction pointer is
|
|
// bounded correctly on the high end.
|
|
TEST(ExceptionHandlerTest, InstructionPointerMemoryMaxBound) {
|
|
int fds[2];
|
|
ASSERT_NE(pipe(fds), -1);
|
|
|
|
// These are defined here so the parent can use them to check the
|
|
// data from the minidump afterwards.
|
|
// Use 4k here because the OS will hand out a single page even
|
|
// if a smaller size is requested, and this test wants to
|
|
// test the upper bound of the memory range.
|
|
const u_int32_t kMemorySize = 4096; // bytes
|
|
// This crashes with SIGILL on x86/x86-64/arm.
|
|
const unsigned char instructions[] = { 0xff, 0xff, 0xff, 0xff };
|
|
const int kOffset = kMemorySize - sizeof(instructions);
|
|
|
|
const pid_t child = fork();
|
|
if (child == 0) {
|
|
close(fds[0]);
|
|
ExceptionHandler handler(TEMPDIR, NULL, DoneCallback, (void*) fds[1],
|
|
true);
|
|
// Get some executable memory.
|
|
char* memory =
|
|
reinterpret_cast<char*>(mmap(NULL,
|
|
kMemorySize,
|
|
PROT_READ | PROT_WRITE | PROT_EXEC,
|
|
MAP_PRIVATE | MAP_ANON,
|
|
-1,
|
|
0));
|
|
if (!memory)
|
|
exit(0);
|
|
|
|
// Write some instructions that will crash. Put them in the middle
|
|
// of the block of memory, because the minidump should contain 128
|
|
// bytes on either side of the instruction pointer.
|
|
memcpy(memory + kOffset, instructions, sizeof(instructions));
|
|
|
|
// Now execute the instructions, which should crash.
|
|
typedef void (*void_function)(void);
|
|
void_function memory_function =
|
|
reinterpret_cast<void_function>(memory + kOffset);
|
|
memory_function();
|
|
}
|
|
close(fds[1]);
|
|
|
|
int status;
|
|
ASSERT_NE(HANDLE_EINTR(waitpid(child, &status, 0)), -1);
|
|
ASSERT_TRUE(WIFSIGNALED(status));
|
|
ASSERT_EQ(WTERMSIG(status), SIGILL);
|
|
|
|
struct pollfd pfd;
|
|
memset(&pfd, 0, sizeof(pfd));
|
|
pfd.fd = fds[0];
|
|
pfd.events = POLLIN | POLLERR;
|
|
|
|
const int r = HANDLE_EINTR(poll(&pfd, 1, 0));
|
|
ASSERT_EQ(r, 1);
|
|
ASSERT_TRUE(pfd.revents & POLLIN);
|
|
|
|
uint32_t len;
|
|
ASSERT_EQ(read(fds[0], &len, sizeof(len)), (ssize_t)sizeof(len));
|
|
ASSERT_LT(len, (uint32_t)2048);
|
|
char* filename = reinterpret_cast<char*>(malloc(len + 1));
|
|
ASSERT_EQ(read(fds[0], filename, len), len);
|
|
filename[len] = 0;
|
|
close(fds[0]);
|
|
|
|
const std::string minidump_filename = std::string(TEMPDIR) + "/" + filename +
|
|
".dmp";
|
|
|
|
struct stat st;
|
|
ASSERT_EQ(stat(minidump_filename.c_str(), &st), 0);
|
|
ASSERT_GT(st.st_size, 0u);
|
|
|
|
// Read the minidump. Locate the exception record and the
|
|
// memory list, and then ensure that there is a memory region
|
|
// in the memory list that covers the instruction pointer from
|
|
// the exception record.
|
|
Minidump minidump(minidump_filename);
|
|
ASSERT_TRUE(minidump.Read());
|
|
|
|
MinidumpException* exception = minidump.GetException();
|
|
MinidumpMemoryList* memory_list = minidump.GetMemoryList();
|
|
ASSERT_TRUE(exception);
|
|
ASSERT_TRUE(memory_list);
|
|
ASSERT_LT(0, memory_list->region_count());
|
|
|
|
MinidumpContext* context = exception->GetContext();
|
|
ASSERT_TRUE(context);
|
|
|
|
u_int64_t instruction_pointer;
|
|
switch (context->GetContextCPU()) {
|
|
case MD_CONTEXT_X86:
|
|
instruction_pointer = context->GetContextX86()->eip;
|
|
break;
|
|
case MD_CONTEXT_AMD64:
|
|
instruction_pointer = context->GetContextAMD64()->rip;
|
|
break;
|
|
case MD_CONTEXT_ARM:
|
|
instruction_pointer = context->GetContextARM()->iregs[15];
|
|
break;
|
|
default:
|
|
FAIL() << "Unknown context CPU: " << context->GetContextCPU();
|
|
break;
|
|
}
|
|
|
|
MinidumpMemoryRegion* region =
|
|
memory_list->GetMemoryRegionForAddress(instruction_pointer);
|
|
ASSERT_TRUE(region);
|
|
|
|
const size_t kPrefixSize = 128; // bytes
|
|
EXPECT_EQ(kPrefixSize + sizeof(instructions), region->GetSize());
|
|
const u_int8_t* bytes = region->GetMemory();
|
|
ASSERT_TRUE(bytes);
|
|
|
|
u_int8_t prefix_bytes[kPrefixSize];
|
|
memset(prefix_bytes, 0, sizeof(prefix_bytes));
|
|
EXPECT_TRUE(memcmp(bytes, prefix_bytes, sizeof(prefix_bytes)) == 0);
|
|
EXPECT_TRUE(memcmp(bytes + kPrefixSize,
|
|
instructions, sizeof(instructions)) == 0);
|
|
|
|
unlink(minidump_filename.c_str());
|
|
free(filename);
|
|
}
|
|
|
|
// Ensure that an extra memory block doesn't get added when the
|
|
// instruction pointer is not in mapped memory.
|
|
TEST(ExceptionHandlerTest, InstructionPointerMemoryNullPointer) {
|
|
int fds[2];
|
|
ASSERT_NE(pipe(fds), -1);
|
|
|
|
|
|
const pid_t child = fork();
|
|
if (child == 0) {
|
|
close(fds[0]);
|
|
ExceptionHandler handler(TEMPDIR, NULL, DoneCallback, (void*) fds[1],
|
|
true);
|
|
// Try calling a NULL pointer.
|
|
typedef void (*void_function)(void);
|
|
void_function memory_function =
|
|
reinterpret_cast<void_function>(NULL);
|
|
memory_function();
|
|
}
|
|
close(fds[1]);
|
|
|
|
int status;
|
|
ASSERT_NE(HANDLE_EINTR(waitpid(child, &status, 0)), -1);
|
|
ASSERT_TRUE(WIFSIGNALED(status));
|
|
ASSERT_EQ(WTERMSIG(status), SIGSEGV);
|
|
|
|
struct pollfd pfd;
|
|
memset(&pfd, 0, sizeof(pfd));
|
|
pfd.fd = fds[0];
|
|
pfd.events = POLLIN | POLLERR;
|
|
|
|
const int r = HANDLE_EINTR(poll(&pfd, 1, 0));
|
|
ASSERT_EQ(r, 1);
|
|
ASSERT_TRUE(pfd.revents & POLLIN);
|
|
|
|
uint32_t len;
|
|
ASSERT_EQ(read(fds[0], &len, sizeof(len)), (ssize_t)sizeof(len));
|
|
ASSERT_LT(len, (uint32_t)2048);
|
|
char* filename = reinterpret_cast<char*>(malloc(len + 1));
|
|
ASSERT_EQ(read(fds[0], filename, len), len);
|
|
filename[len] = 0;
|
|
close(fds[0]);
|
|
|
|
const std::string minidump_filename = std::string(TEMPDIR) + "/" + filename +
|
|
".dmp";
|
|
|
|
struct stat st;
|
|
ASSERT_EQ(stat(minidump_filename.c_str(), &st), 0);
|
|
ASSERT_GT(st.st_size, 0u);
|
|
|
|
// Read the minidump. Locate the exception record and the
|
|
// memory list, and then ensure that there is a memory region
|
|
// in the memory list that covers the instruction pointer from
|
|
// the exception record.
|
|
Minidump minidump(minidump_filename);
|
|
ASSERT_TRUE(minidump.Read());
|
|
|
|
MinidumpException* exception = minidump.GetException();
|
|
MinidumpMemoryList* memory_list = minidump.GetMemoryList();
|
|
ASSERT_TRUE(exception);
|
|
ASSERT_TRUE(memory_list);
|
|
ASSERT_EQ((unsigned int)1, memory_list->region_count());
|
|
|
|
unlink(minidump_filename.c_str());
|
|
free(filename);
|
|
}
|
|
|
|
static bool SimpleCallback(const char* dump_path,
|
|
const char* minidump_id,
|
|
void* context,
|
|
bool succeeded) {
|
|
if (!succeeded)
|
|
return succeeded;
|
|
|
|
string* minidump_file = reinterpret_cast<string*>(context);
|
|
minidump_file->append(dump_path);
|
|
minidump_file->append("/");
|
|
minidump_file->append(minidump_id);
|
|
minidump_file->append(".dmp");
|
|
return true;
|
|
}
|
|
|
|
// Test that anonymous memory maps can be annotated with names and IDs.
|
|
TEST(ExceptionHandlerTest, ModuleInfo) {
|
|
// These are defined here so the parent can use them to check the
|
|
// data from the minidump afterwards.
|
|
const u_int32_t kMemorySize = sysconf(_SC_PAGESIZE);
|
|
const char* kMemoryName = "a fake module";
|
|
const u_int8_t kModuleGUID[sizeof(MDGUID)] = {
|
|
0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
|
|
0x88, 0x99, 0xAA, 0xBB, 0xCC, 0xDD, 0xEE, 0xFF
|
|
};
|
|
char module_identifier_buffer[kGUIDStringSize];
|
|
FileID::ConvertIdentifierToString(kModuleGUID,
|
|
module_identifier_buffer,
|
|
sizeof(module_identifier_buffer));
|
|
string module_identifier(module_identifier_buffer);
|
|
// Strip out dashes
|
|
size_t pos;
|
|
while ((pos = module_identifier.find('-')) != string::npos) {
|
|
module_identifier.erase(pos, 1);
|
|
}
|
|
// And append a zero, because module IDs include an "age" field
|
|
// which is always zero on Linux.
|
|
module_identifier += "0";
|
|
|
|
// Get some memory.
|
|
char* memory =
|
|
reinterpret_cast<char*>(mmap(NULL,
|
|
kMemorySize,
|
|
PROT_READ | PROT_WRITE,
|
|
MAP_PRIVATE | MAP_ANON,
|
|
-1,
|
|
0));
|
|
const u_int64_t kMemoryAddress = reinterpret_cast<u_int64_t>(memory);
|
|
ASSERT_TRUE(memory);
|
|
|
|
string minidump_filename;
|
|
ExceptionHandler handler(TEMPDIR, NULL, SimpleCallback,
|
|
(void*)&minidump_filename, true);
|
|
// Add info about the anonymous memory mapping.
|
|
handler.AddMappingInfo(kMemoryName,
|
|
kModuleGUID,
|
|
kMemoryAddress,
|
|
kMemorySize,
|
|
0);
|
|
handler.WriteMinidump();
|
|
|
|
// Read the minidump. Load the module list, and ensure that
|
|
// the mmap'ed |memory| is listed with the given module name
|
|
// and debug ID.
|
|
Minidump minidump(minidump_filename);
|
|
ASSERT_TRUE(minidump.Read());
|
|
|
|
MinidumpModuleList* module_list = minidump.GetModuleList();
|
|
ASSERT_TRUE(module_list);
|
|
const MinidumpModule* module =
|
|
module_list->GetModuleForAddress(kMemoryAddress);
|
|
ASSERT_TRUE(module);
|
|
|
|
EXPECT_EQ(kMemoryAddress, module->base_address());
|
|
EXPECT_EQ(kMemorySize, module->size());
|
|
EXPECT_EQ(kMemoryName, module->code_file());
|
|
EXPECT_EQ(module_identifier, module->debug_identifier());
|
|
|
|
unlink(minidump_filename.c_str());
|
|
}
|
|
|
|
static const unsigned kControlMsgSize =
|
|
CMSG_SPACE(sizeof(int)) + CMSG_SPACE(sizeof(struct ucred));
|
|
|
|
static bool
|
|
CrashHandler(const void* crash_context, size_t crash_context_size,
|
|
void* context) {
|
|
const int fd = (intptr_t) context;
|
|
int fds[2];
|
|
pipe(fds);
|
|
struct kernel_msghdr msg = {0};
|
|
struct kernel_iovec iov;
|
|
iov.iov_base = const_cast<void*>(crash_context);
|
|
iov.iov_len = crash_context_size;
|
|
msg.msg_iov = &iov;
|
|
msg.msg_iovlen = 1;
|
|
char cmsg[kControlMsgSize];
|
|
memset(cmsg, 0, kControlMsgSize);
|
|
msg.msg_control = cmsg;
|
|
msg.msg_controllen = sizeof(cmsg);
|
|
|
|
struct cmsghdr *hdr = CMSG_FIRSTHDR(&msg);
|
|
hdr->cmsg_level = SOL_SOCKET;
|
|
hdr->cmsg_type = SCM_RIGHTS;
|
|
hdr->cmsg_len = CMSG_LEN(sizeof(int));
|
|
*((int*) CMSG_DATA(hdr)) = fds[1];
|
|
hdr = CMSG_NXTHDR((struct msghdr*) &msg, hdr);
|
|
hdr->cmsg_level = SOL_SOCKET;
|
|
hdr->cmsg_type = SCM_CREDENTIALS;
|
|
hdr->cmsg_len = CMSG_LEN(sizeof(struct ucred));
|
|
struct ucred *cred = reinterpret_cast<struct ucred*>(CMSG_DATA(hdr));
|
|
cred->uid = getuid();
|
|
cred->gid = getgid();
|
|
cred->pid = getpid();
|
|
|
|
HANDLE_EINTR(sys_sendmsg(fd, &msg, 0));
|
|
sys_close(fds[1]);
|
|
|
|
char b;
|
|
HANDLE_EINTR(sys_read(fds[0], &b, 1));
|
|
|
|
return true;
|
|
}
|
|
|
|
TEST(ExceptionHandlerTest, ExternalDumper) {
|
|
int fds[2];
|
|
ASSERT_NE(socketpair(AF_UNIX, SOCK_DGRAM, 0, fds), -1);
|
|
static const int on = 1;
|
|
setsockopt(fds[0], SOL_SOCKET, SO_PASSCRED, &on, sizeof(on));
|
|
setsockopt(fds[1], SOL_SOCKET, SO_PASSCRED, &on, sizeof(on));
|
|
|
|
const pid_t child = fork();
|
|
if (child == 0) {
|
|
close(fds[0]);
|
|
ExceptionHandler handler("/tmp1", NULL, NULL, (void*) fds[1], true);
|
|
handler.set_crash_handler(CrashHandler);
|
|
*reinterpret_cast<int*>(NULL) = 0;
|
|
}
|
|
close(fds[1]);
|
|
struct msghdr msg = {0};
|
|
struct iovec iov;
|
|
static const unsigned kCrashContextSize =
|
|
sizeof(ExceptionHandler::CrashContext);
|
|
char context[kCrashContextSize];
|
|
char control[kControlMsgSize];
|
|
iov.iov_base = context;
|
|
iov.iov_len = kCrashContextSize;
|
|
msg.msg_iov = &iov;
|
|
msg.msg_iovlen = 1;
|
|
msg.msg_control = control;
|
|
msg.msg_controllen = kControlMsgSize;
|
|
|
|
const ssize_t n = HANDLE_EINTR(recvmsg(fds[0], &msg, 0));
|
|
ASSERT_EQ(n, kCrashContextSize);
|
|
ASSERT_EQ(msg.msg_controllen, kControlMsgSize);
|
|
ASSERT_EQ(msg.msg_flags, 0);
|
|
|
|
pid_t crashing_pid = -1;
|
|
int signal_fd = -1;
|
|
for (struct cmsghdr *hdr = CMSG_FIRSTHDR(&msg); hdr;
|
|
hdr = CMSG_NXTHDR(&msg, hdr)) {
|
|
if (hdr->cmsg_level != SOL_SOCKET)
|
|
continue;
|
|
if (hdr->cmsg_type == SCM_RIGHTS) {
|
|
const unsigned len = hdr->cmsg_len -
|
|
(((uint8_t*)CMSG_DATA(hdr)) - (uint8_t*)hdr);
|
|
ASSERT_EQ(len, sizeof(int));
|
|
signal_fd = *((int *) CMSG_DATA(hdr));
|
|
} else if (hdr->cmsg_type == SCM_CREDENTIALS) {
|
|
const struct ucred *cred =
|
|
reinterpret_cast<struct ucred*>(CMSG_DATA(hdr));
|
|
crashing_pid = cred->pid;
|
|
}
|
|
}
|
|
|
|
ASSERT_NE(crashing_pid, -1);
|
|
ASSERT_NE(signal_fd, -1);
|
|
|
|
char templ[] = TEMPDIR "/exception-handler-unittest-XXXXXX";
|
|
mktemp(templ);
|
|
ASSERT_TRUE(WriteMinidump(templ, crashing_pid, context,
|
|
kCrashContextSize));
|
|
static const char b = 0;
|
|
HANDLE_EINTR(write(signal_fd, &b, 1));
|
|
|
|
int status;
|
|
ASSERT_NE(HANDLE_EINTR(waitpid(child, &status, 0)), -1);
|
|
ASSERT_TRUE(WIFSIGNALED(status));
|
|
ASSERT_EQ(WTERMSIG(status), SIGSEGV);
|
|
|
|
struct stat st;
|
|
ASSERT_EQ(stat(templ, &st), 0);
|
|
ASSERT_GT(st.st_size, 0u);
|
|
unlink(templ);
|
|
}
|