/thirdparty/breakpad/client/linux/handler/exception_handler_unittest.cc
http://github.com/tomahawk-player/tomahawk · C++ · 786 lines · 575 code · 113 blank · 98 comment · 39 complexity · 452ff11368949d81e1abfac83c4414d2 MD5 · raw file
- // Copyright (c) 2010 Google Inc.
- // All rights reserved.
- //
- // Redistribution and use in source and binary forms, with or without
- // modification, are permitted provided that the following conditions are
- // met:
- //
- // * Redistributions of source code must retain the above copyright
- // notice, this list of conditions and the following disclaimer.
- // * Redistributions in binary form must reproduce the above
- // copyright notice, this list of conditions and the following disclaimer
- // in the documentation and/or other materials provided with the
- // distribution.
- // * Neither the name of Google Inc. nor the names of its
- // contributors may be used to endorse or promote products derived from
- // this software without specific prior written permission.
- //
- // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
- // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
- // A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
- // OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
- // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
- // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
- // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
- // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
- // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
- #include <stdint.h>
- #include <unistd.h>
- #include <signal.h>
- #include <sys/mman.h>
- #include <sys/poll.h>
- #include <sys/socket.h>
- #include <sys/uio.h>
- #include <sys/wait.h>
- #include <string>
- #include "breakpad_googletest_includes.h"
- #include "client/linux/handler/exception_handler.h"
- #include "client/linux/minidump_writer/minidump_writer.h"
- #include "common/linux/eintr_wrapper.h"
- #include "common/linux/file_id.h"
- #include "common/linux/linux_libc_support.h"
- #include "common/tests/auto_tempdir.h"
- #include "third_party/lss/linux_syscall_support.h"
- #include "google_breakpad/processor/minidump.h"
- using namespace google_breakpad;
- // Length of a formatted GUID string =
- // sizeof(MDGUID) * 2 + 4 (for dashes) + 1 (null terminator)
- const int kGUIDStringSize = 37;
- static void sigchld_handler(int signo) { }
- class ExceptionHandlerTest : public ::testing::Test {
- protected:
- void SetUp() {
- // We need to be able to wait for children, so SIGCHLD cannot be SIG_IGN.
- struct sigaction sa;
- memset(&sa, 0, sizeof(sa));
- sa.sa_handler = sigchld_handler;
- ASSERT_NE(sigaction(SIGCHLD, &sa, &old_action), -1);
- }
- void TearDown() {
- sigaction(SIGCHLD, &old_action, NULL);
- }
- struct sigaction old_action;
- };
- TEST(ExceptionHandlerTest, Simple) {
- AutoTempDir temp_dir;
- ExceptionHandler handler(temp_dir.path(), NULL, NULL, NULL, true);
- }
- static bool DoneCallback(const char* dump_path,
- const char* minidump_id,
- void* context,
- bool succeeded) {
- if (!succeeded)
- return succeeded;
- int fd = (intptr_t) context;
- uint32_t len = my_strlen(minidump_id);
- HANDLE_EINTR(sys_write(fd, &len, sizeof(len)));
- HANDLE_EINTR(sys_write(fd, minidump_id, len));
- sys_close(fd);
- return true;
- }
- TEST(ExceptionHandlerTest, ChildCrash) {
- AutoTempDir temp_dir;
- int fds[2];
- ASSERT_NE(pipe(fds), -1);
- const pid_t child = fork();
- if (child == 0) {
- close(fds[0]);
- ExceptionHandler handler(temp_dir.path(), NULL, DoneCallback, (void*) fds[1],
- true);
- *reinterpret_cast<volatile int*>(NULL) = 0;
- }
- close(fds[1]);
- int status;
- ASSERT_NE(HANDLE_EINTR(waitpid(child, &status, 0)), -1);
- ASSERT_TRUE(WIFSIGNALED(status));
- ASSERT_EQ(WTERMSIG(status), SIGSEGV);
- struct pollfd pfd;
- memset(&pfd, 0, sizeof(pfd));
- pfd.fd = fds[0];
- pfd.events = POLLIN | POLLERR;
- const int r = HANDLE_EINTR(poll(&pfd, 1, 0));
- ASSERT_EQ(r, 1);
- ASSERT_TRUE(pfd.revents & POLLIN);
- uint32_t len;
- ASSERT_EQ(read(fds[0], &len, sizeof(len)), (ssize_t)sizeof(len));
- ASSERT_LT(len, (uint32_t)2048);
- char* filename = reinterpret_cast<char*>(malloc(len + 1));
- ASSERT_EQ(read(fds[0], filename, len), len);
- filename[len] = 0;
- close(fds[0]);
- const std::string minidump_filename = temp_dir.path() + "/" + filename +
- ".dmp";
- struct stat st;
- ASSERT_EQ(stat(minidump_filename.c_str(), &st), 0);
- ASSERT_GT(st.st_size, 0u);
- unlink(minidump_filename.c_str());
- }
- // Test that memory around the instruction pointer is written
- // to the dump as a MinidumpMemoryRegion.
- TEST(ExceptionHandlerTest, InstructionPointerMemory) {
- AutoTempDir temp_dir;
- int fds[2];
- ASSERT_NE(pipe(fds), -1);
- // These are defined here so the parent can use them to check the
- // data from the minidump afterwards.
- const u_int32_t kMemorySize = 256; // bytes
- const int kOffset = kMemorySize / 2;
- // This crashes with SIGILL on x86/x86-64/arm.
- const unsigned char instructions[] = { 0xff, 0xff, 0xff, 0xff };
- const pid_t child = fork();
- if (child == 0) {
- close(fds[0]);
- ExceptionHandler handler(temp_dir.path(), NULL, DoneCallback,
- (void*) fds[1], true);
- // Get some executable memory.
- char* memory =
- reinterpret_cast<char*>(mmap(NULL,
- kMemorySize,
- PROT_READ | PROT_WRITE | PROT_EXEC,
- MAP_PRIVATE | MAP_ANON,
- -1,
- 0));
- if (!memory)
- exit(0);
- // Write some instructions that will crash. Put them in the middle
- // of the block of memory, because the minidump should contain 128
- // bytes on either side of the instruction pointer.
- memcpy(memory + kOffset, instructions, sizeof(instructions));
- // Now execute the instructions, which should crash.
- typedef void (*void_function)(void);
- void_function memory_function =
- reinterpret_cast<void_function>(memory + kOffset);
- memory_function();
- }
- close(fds[1]);
- int status;
- ASSERT_NE(HANDLE_EINTR(waitpid(child, &status, 0)), -1);
- ASSERT_TRUE(WIFSIGNALED(status));
- ASSERT_EQ(WTERMSIG(status), SIGILL);
- struct pollfd pfd;
- memset(&pfd, 0, sizeof(pfd));
- pfd.fd = fds[0];
- pfd.events = POLLIN | POLLERR;
- const int r = HANDLE_EINTR(poll(&pfd, 1, 0));
- ASSERT_EQ(r, 1);
- ASSERT_TRUE(pfd.revents & POLLIN);
- uint32_t len;
- ASSERT_EQ(read(fds[0], &len, sizeof(len)), (ssize_t)sizeof(len));
- ASSERT_LT(len, (uint32_t)2048);
- char* filename = reinterpret_cast<char*>(malloc(len + 1));
- ASSERT_EQ(read(fds[0], filename, len), len);
- filename[len] = 0;
- close(fds[0]);
- const std::string minidump_filename = temp_dir.path() + "/" + filename +
- ".dmp";
- struct stat st;
- ASSERT_EQ(stat(minidump_filename.c_str(), &st), 0);
- ASSERT_GT(st.st_size, 0u);
- // Read the minidump. Locate the exception record and the
- // memory list, and then ensure that there is a memory region
- // in the memory list that covers the instruction pointer from
- // the exception record.
- Minidump minidump(minidump_filename);
- ASSERT_TRUE(minidump.Read());
- MinidumpException* exception = minidump.GetException();
- MinidumpMemoryList* memory_list = minidump.GetMemoryList();
- ASSERT_TRUE(exception);
- ASSERT_TRUE(memory_list);
- ASSERT_LT(0, memory_list->region_count());
- MinidumpContext* context = exception->GetContext();
- ASSERT_TRUE(context);
- u_int64_t instruction_pointer;
- switch (context->GetContextCPU()) {
- case MD_CONTEXT_X86:
- instruction_pointer = context->GetContextX86()->eip;
- break;
- case MD_CONTEXT_AMD64:
- instruction_pointer = context->GetContextAMD64()->rip;
- break;
- case MD_CONTEXT_ARM:
- instruction_pointer = context->GetContextARM()->iregs[15];
- break;
- default:
- FAIL() << "Unknown context CPU: " << context->GetContextCPU();
- break;
- }
- MinidumpMemoryRegion* region =
- memory_list->GetMemoryRegionForAddress(instruction_pointer);
- ASSERT_TRUE(region);
- EXPECT_EQ(kMemorySize, region->GetSize());
- const u_int8_t* bytes = region->GetMemory();
- ASSERT_TRUE(bytes);
- u_int8_t prefix_bytes[kOffset];
- u_int8_t suffix_bytes[kMemorySize - kOffset - sizeof(instructions)];
- memset(prefix_bytes, 0, sizeof(prefix_bytes));
- memset(suffix_bytes, 0, sizeof(suffix_bytes));
- EXPECT_TRUE(memcmp(bytes, prefix_bytes, sizeof(prefix_bytes)) == 0);
- EXPECT_TRUE(memcmp(bytes + kOffset, instructions, sizeof(instructions)) == 0);
- EXPECT_TRUE(memcmp(bytes + kOffset + sizeof(instructions),
- suffix_bytes, sizeof(suffix_bytes)) == 0);
- unlink(minidump_filename.c_str());
- free(filename);
- }
- // Test that the memory region around the instruction pointer is
- // bounded correctly on the low end.
- TEST(ExceptionHandlerTest, InstructionPointerMemoryMinBound) {
- AutoTempDir temp_dir;
- int fds[2];
- ASSERT_NE(pipe(fds), -1);
- // These are defined here so the parent can use them to check the
- // data from the minidump afterwards.
- const u_int32_t kMemorySize = 256; // bytes
- const int kOffset = 0;
- // This crashes with SIGILL on x86/x86-64/arm.
- const unsigned char instructions[] = { 0xff, 0xff, 0xff, 0xff };
- const pid_t child = fork();
- if (child == 0) {
- close(fds[0]);
- ExceptionHandler handler(temp_dir.path(), NULL, DoneCallback,
- (void*) fds[1], true);
- // Get some executable memory.
- char* memory =
- reinterpret_cast<char*>(mmap(NULL,
- kMemorySize,
- PROT_READ | PROT_WRITE | PROT_EXEC,
- MAP_PRIVATE | MAP_ANON,
- -1,
- 0));
- if (!memory)
- exit(0);
- // Write some instructions that will crash. Put them in the middle
- // of the block of memory, because the minidump should contain 128
- // bytes on either side of the instruction pointer.
- memcpy(memory + kOffset, instructions, sizeof(instructions));
- // Now execute the instructions, which should crash.
- typedef void (*void_function)(void);
- void_function memory_function =
- reinterpret_cast<void_function>(memory + kOffset);
- memory_function();
- }
- close(fds[1]);
- int status;
- ASSERT_NE(HANDLE_EINTR(waitpid(child, &status, 0)), -1);
- ASSERT_TRUE(WIFSIGNALED(status));
- ASSERT_EQ(WTERMSIG(status), SIGILL);
- struct pollfd pfd;
- memset(&pfd, 0, sizeof(pfd));
- pfd.fd = fds[0];
- pfd.events = POLLIN | POLLERR;
- const int r = HANDLE_EINTR(poll(&pfd, 1, 0));
- ASSERT_EQ(r, 1);
- ASSERT_TRUE(pfd.revents & POLLIN);
- uint32_t len;
- ASSERT_EQ(read(fds[0], &len, sizeof(len)), (ssize_t)sizeof(len));
- ASSERT_LT(len, (uint32_t)2048);
- char* filename = reinterpret_cast<char*>(malloc(len + 1));
- ASSERT_EQ(read(fds[0], filename, len), len);
- filename[len] = 0;
- close(fds[0]);
- const std::string minidump_filename = temp_dir.path() + "/" + filename +
- ".dmp";
- struct stat st;
- ASSERT_EQ(stat(minidump_filename.c_str(), &st), 0);
- ASSERT_GT(st.st_size, 0u);
- // Read the minidump. Locate the exception record and the
- // memory list, and then ensure that there is a memory region
- // in the memory list that covers the instruction pointer from
- // the exception record.
- Minidump minidump(minidump_filename);
- ASSERT_TRUE(minidump.Read());
- MinidumpException* exception = minidump.GetException();
- MinidumpMemoryList* memory_list = minidump.GetMemoryList();
- ASSERT_TRUE(exception);
- ASSERT_TRUE(memory_list);
- ASSERT_LT(0, memory_list->region_count());
- MinidumpContext* context = exception->GetContext();
- ASSERT_TRUE(context);
- u_int64_t instruction_pointer;
- switch (context->GetContextCPU()) {
- case MD_CONTEXT_X86:
- instruction_pointer = context->GetContextX86()->eip;
- break;
- case MD_CONTEXT_AMD64:
- instruction_pointer = context->GetContextAMD64()->rip;
- break;
- case MD_CONTEXT_ARM:
- instruction_pointer = context->GetContextARM()->iregs[15];
- break;
- default:
- FAIL() << "Unknown context CPU: " << context->GetContextCPU();
- break;
- }
- MinidumpMemoryRegion* region =
- memory_list->GetMemoryRegionForAddress(instruction_pointer);
- ASSERT_TRUE(region);
- EXPECT_EQ(kMemorySize / 2, region->GetSize());
- const u_int8_t* bytes = region->GetMemory();
- ASSERT_TRUE(bytes);
- u_int8_t suffix_bytes[kMemorySize / 2 - sizeof(instructions)];
- memset(suffix_bytes, 0, sizeof(suffix_bytes));
- EXPECT_TRUE(memcmp(bytes + kOffset, instructions, sizeof(instructions)) == 0);
- EXPECT_TRUE(memcmp(bytes + kOffset + sizeof(instructions),
- suffix_bytes, sizeof(suffix_bytes)) == 0);
- unlink(minidump_filename.c_str());
- free(filename);
- }
- // Test that the memory region around the instruction pointer is
- // bounded correctly on the high end.
- TEST(ExceptionHandlerTest, InstructionPointerMemoryMaxBound) {
- AutoTempDir temp_dir;
- int fds[2];
- ASSERT_NE(pipe(fds), -1);
- // These are defined here so the parent can use them to check the
- // data from the minidump afterwards.
- // Use 4k here because the OS will hand out a single page even
- // if a smaller size is requested, and this test wants to
- // test the upper bound of the memory range.
- const u_int32_t kMemorySize = 4096; // bytes
- // This crashes with SIGILL on x86/x86-64/arm.
- const unsigned char instructions[] = { 0xff, 0xff, 0xff, 0xff };
- const int kOffset = kMemorySize - sizeof(instructions);
- const pid_t child = fork();
- if (child == 0) {
- close(fds[0]);
- ExceptionHandler handler(temp_dir.path(), NULL, DoneCallback,
- (void*) fds[1], true);
- // Get some executable memory.
- char* memory =
- reinterpret_cast<char*>(mmap(NULL,
- kMemorySize,
- PROT_READ | PROT_WRITE | PROT_EXEC,
- MAP_PRIVATE | MAP_ANON,
- -1,
- 0));
- if (!memory)
- exit(0);
- // Write some instructions that will crash. Put them in the middle
- // of the block of memory, because the minidump should contain 128
- // bytes on either side of the instruction pointer.
- memcpy(memory + kOffset, instructions, sizeof(instructions));
- // Now execute the instructions, which should crash.
- typedef void (*void_function)(void);
- void_function memory_function =
- reinterpret_cast<void_function>(memory + kOffset);
- memory_function();
- }
- close(fds[1]);
- int status;
- ASSERT_NE(HANDLE_EINTR(waitpid(child, &status, 0)), -1);
- ASSERT_TRUE(WIFSIGNALED(status));
- ASSERT_EQ(WTERMSIG(status), SIGILL);
- struct pollfd pfd;
- memset(&pfd, 0, sizeof(pfd));
- pfd.fd = fds[0];
- pfd.events = POLLIN | POLLERR;
- const int r = HANDLE_EINTR(poll(&pfd, 1, 0));
- ASSERT_EQ(r, 1);
- ASSERT_TRUE(pfd.revents & POLLIN);
- uint32_t len;
- ASSERT_EQ(read(fds[0], &len, sizeof(len)), (ssize_t)sizeof(len));
- ASSERT_LT(len, (uint32_t)2048);
- char* filename = reinterpret_cast<char*>(malloc(len + 1));
- ASSERT_EQ(read(fds[0], filename, len), len);
- filename[len] = 0;
- close(fds[0]);
- const std::string minidump_filename = temp_dir.path() + "/" + filename +
- ".dmp";
- struct stat st;
- ASSERT_EQ(stat(minidump_filename.c_str(), &st), 0);
- ASSERT_GT(st.st_size, 0u);
- // Read the minidump. Locate the exception record and the
- // memory list, and then ensure that there is a memory region
- // in the memory list that covers the instruction pointer from
- // the exception record.
- Minidump minidump(minidump_filename);
- ASSERT_TRUE(minidump.Read());
- MinidumpException* exception = minidump.GetException();
- MinidumpMemoryList* memory_list = minidump.GetMemoryList();
- ASSERT_TRUE(exception);
- ASSERT_TRUE(memory_list);
- ASSERT_LT(0, memory_list->region_count());
- MinidumpContext* context = exception->GetContext();
- ASSERT_TRUE(context);
- u_int64_t instruction_pointer;
- switch (context->GetContextCPU()) {
- case MD_CONTEXT_X86:
- instruction_pointer = context->GetContextX86()->eip;
- break;
- case MD_CONTEXT_AMD64:
- instruction_pointer = context->GetContextAMD64()->rip;
- break;
- case MD_CONTEXT_ARM:
- instruction_pointer = context->GetContextARM()->iregs[15];
- break;
- default:
- FAIL() << "Unknown context CPU: " << context->GetContextCPU();
- break;
- }
- MinidumpMemoryRegion* region =
- memory_list->GetMemoryRegionForAddress(instruction_pointer);
- ASSERT_TRUE(region);
- const size_t kPrefixSize = 128; // bytes
- EXPECT_EQ(kPrefixSize + sizeof(instructions), region->GetSize());
- const u_int8_t* bytes = region->GetMemory();
- ASSERT_TRUE(bytes);
- u_int8_t prefix_bytes[kPrefixSize];
- memset(prefix_bytes, 0, sizeof(prefix_bytes));
- EXPECT_TRUE(memcmp(bytes, prefix_bytes, sizeof(prefix_bytes)) == 0);
- EXPECT_TRUE(memcmp(bytes + kPrefixSize,
- instructions, sizeof(instructions)) == 0);
- unlink(minidump_filename.c_str());
- free(filename);
- }
- // Ensure that an extra memory block doesn't get added when the
- // instruction pointer is not in mapped memory.
- TEST(ExceptionHandlerTest, InstructionPointerMemoryNullPointer) {
- AutoTempDir temp_dir;
- int fds[2];
- ASSERT_NE(pipe(fds), -1);
- const pid_t child = fork();
- if (child == 0) {
- close(fds[0]);
- ExceptionHandler handler(temp_dir.path(), NULL, DoneCallback,
- (void*) fds[1], true);
- // Try calling a NULL pointer.
- typedef void (*void_function)(void);
- void_function memory_function =
- reinterpret_cast<void_function>(NULL);
- memory_function();
- }
- close(fds[1]);
- int status;
- ASSERT_NE(HANDLE_EINTR(waitpid(child, &status, 0)), -1);
- ASSERT_TRUE(WIFSIGNALED(status));
- ASSERT_EQ(WTERMSIG(status), SIGSEGV);
- struct pollfd pfd;
- memset(&pfd, 0, sizeof(pfd));
- pfd.fd = fds[0];
- pfd.events = POLLIN | POLLERR;
- const int r = HANDLE_EINTR(poll(&pfd, 1, 0));
- ASSERT_EQ(r, 1);
- ASSERT_TRUE(pfd.revents & POLLIN);
- uint32_t len;
- ASSERT_EQ(read(fds[0], &len, sizeof(len)), (ssize_t)sizeof(len));
- ASSERT_LT(len, (uint32_t)2048);
- char* filename = reinterpret_cast<char*>(malloc(len + 1));
- ASSERT_EQ(read(fds[0], filename, len), len);
- filename[len] = 0;
- close(fds[0]);
- const std::string minidump_filename = temp_dir.path() + "/" + filename +
- ".dmp";
- struct stat st;
- ASSERT_EQ(stat(minidump_filename.c_str(), &st), 0);
- ASSERT_GT(st.st_size, 0u);
- // Read the minidump. Locate the exception record and the
- // memory list, and then ensure that there is a memory region
- // in the memory list that covers the instruction pointer from
- // the exception record.
- Minidump minidump(minidump_filename);
- ASSERT_TRUE(minidump.Read());
- MinidumpException* exception = minidump.GetException();
- MinidumpMemoryList* memory_list = minidump.GetMemoryList();
- ASSERT_TRUE(exception);
- ASSERT_TRUE(memory_list);
- ASSERT_EQ((unsigned int)1, memory_list->region_count());
- unlink(minidump_filename.c_str());
- free(filename);
- }
- static bool SimpleCallback(const char* dump_path,
- const char* minidump_id,
- void* context,
- bool succeeded) {
- if (!succeeded)
- return succeeded;
- string* minidump_file = reinterpret_cast<string*>(context);
- minidump_file->append(dump_path);
- minidump_file->append("/");
- minidump_file->append(minidump_id);
- minidump_file->append(".dmp");
- return true;
- }
- // Test that anonymous memory maps can be annotated with names and IDs.
- TEST(ExceptionHandlerTest, ModuleInfo) {
- // These are defined here so the parent can use them to check the
- // data from the minidump afterwards.
- const u_int32_t kMemorySize = sysconf(_SC_PAGESIZE);
- const char* kMemoryName = "a fake module";
- const u_int8_t kModuleGUID[sizeof(MDGUID)] = {
- 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77,
- 0x88, 0x99, 0xAA, 0xBB, 0xCC, 0xDD, 0xEE, 0xFF
- };
- char module_identifier_buffer[kGUIDStringSize];
- FileID::ConvertIdentifierToString(kModuleGUID,
- module_identifier_buffer,
- sizeof(module_identifier_buffer));
- string module_identifier(module_identifier_buffer);
- // Strip out dashes
- size_t pos;
- while ((pos = module_identifier.find('-')) != string::npos) {
- module_identifier.erase(pos, 1);
- }
- // And append a zero, because module IDs include an "age" field
- // which is always zero on Linux.
- module_identifier += "0";
- // Get some memory.
- char* memory =
- reinterpret_cast<char*>(mmap(NULL,
- kMemorySize,
- PROT_READ | PROT_WRITE,
- MAP_PRIVATE | MAP_ANON,
- -1,
- 0));
- const uintptr_t kMemoryAddress = reinterpret_cast<uintptr_t>(memory);
- ASSERT_TRUE(memory);
- string minidump_filename;
- AutoTempDir temp_dir;
- ExceptionHandler handler(temp_dir.path(), NULL, SimpleCallback,
- (void*)&minidump_filename, true);
- // Add info about the anonymous memory mapping.
- handler.AddMappingInfo(kMemoryName,
- kModuleGUID,
- kMemoryAddress,
- kMemorySize,
- 0);
- handler.WriteMinidump();
- // Read the minidump. Load the module list, and ensure that
- // the mmap'ed |memory| is listed with the given module name
- // and debug ID.
- Minidump minidump(minidump_filename);
- ASSERT_TRUE(minidump.Read());
- MinidumpModuleList* module_list = minidump.GetModuleList();
- ASSERT_TRUE(module_list);
- const MinidumpModule* module =
- module_list->GetModuleForAddress(kMemoryAddress);
- ASSERT_TRUE(module);
- EXPECT_EQ(kMemoryAddress, module->base_address());
- EXPECT_EQ(kMemorySize, module->size());
- EXPECT_EQ(kMemoryName, module->code_file());
- EXPECT_EQ(module_identifier, module->debug_identifier());
- unlink(minidump_filename.c_str());
- }
- static const unsigned kControlMsgSize =
- CMSG_SPACE(sizeof(int)) + CMSG_SPACE(sizeof(struct ucred));
- static bool
- CrashHandler(const void* crash_context, size_t crash_context_size,
- void* context) {
- const int fd = (intptr_t) context;
- int fds[2];
- if (pipe(fds) == -1) {
- // There doesn't seem to be any way to reliably handle
- // this failure without the parent process hanging
- // At least make sure that this process doesn't access
- // unexpected file descriptors
- fds[0] = -1;
- fds[1] = -1;
- }
- struct kernel_msghdr msg = {0};
- struct kernel_iovec iov;
- iov.iov_base = const_cast<void*>(crash_context);
- iov.iov_len = crash_context_size;
- msg.msg_iov = &iov;
- msg.msg_iovlen = 1;
- char cmsg[kControlMsgSize];
- memset(cmsg, 0, kControlMsgSize);
- msg.msg_control = cmsg;
- msg.msg_controllen = sizeof(cmsg);
- struct cmsghdr *hdr = CMSG_FIRSTHDR(&msg);
- hdr->cmsg_level = SOL_SOCKET;
- hdr->cmsg_type = SCM_RIGHTS;
- hdr->cmsg_len = CMSG_LEN(sizeof(int));
- *((int*) CMSG_DATA(hdr)) = fds[1];
- hdr = CMSG_NXTHDR((struct msghdr*) &msg, hdr);
- hdr->cmsg_level = SOL_SOCKET;
- hdr->cmsg_type = SCM_CREDENTIALS;
- hdr->cmsg_len = CMSG_LEN(sizeof(struct ucred));
- struct ucred *cred = reinterpret_cast<struct ucred*>(CMSG_DATA(hdr));
- cred->uid = getuid();
- cred->gid = getgid();
- cred->pid = getpid();
- HANDLE_EINTR(sys_sendmsg(fd, &msg, 0));
- sys_close(fds[1]);
- char b;
- HANDLE_EINTR(sys_read(fds[0], &b, 1));
- return true;
- }
- TEST(ExceptionHandlerTest, ExternalDumper) {
- int fds[2];
- ASSERT_NE(socketpair(AF_UNIX, SOCK_DGRAM, 0, fds), -1);
- static const int on = 1;
- setsockopt(fds[0], SOL_SOCKET, SO_PASSCRED, &on, sizeof(on));
- setsockopt(fds[1], SOL_SOCKET, SO_PASSCRED, &on, sizeof(on));
- const pid_t child = fork();
- if (child == 0) {
- close(fds[0]);
- ExceptionHandler handler("/tmp1", NULL, NULL, (void*) fds[1], true);
- handler.set_crash_handler(CrashHandler);
- *reinterpret_cast<volatile int*>(NULL) = 0;
- }
- close(fds[1]);
- struct msghdr msg = {0};
- struct iovec iov;
- static const unsigned kCrashContextSize =
- sizeof(ExceptionHandler::CrashContext);
- char context[kCrashContextSize];
- char control[kControlMsgSize];
- iov.iov_base = context;
- iov.iov_len = kCrashContextSize;
- msg.msg_iov = &iov;
- msg.msg_iovlen = 1;
- msg.msg_control = control;
- msg.msg_controllen = kControlMsgSize;
- const ssize_t n = HANDLE_EINTR(recvmsg(fds[0], &msg, 0));
- ASSERT_EQ(n, kCrashContextSize);
- ASSERT_EQ(msg.msg_controllen, kControlMsgSize);
- ASSERT_EQ(msg.msg_flags, 0);
- ASSERT_EQ(close(fds[0]), 0);
- pid_t crashing_pid = -1;
- int signal_fd = -1;
- for (struct cmsghdr *hdr = CMSG_FIRSTHDR(&msg); hdr;
- hdr = CMSG_NXTHDR(&msg, hdr)) {
- if (hdr->cmsg_level != SOL_SOCKET)
- continue;
- if (hdr->cmsg_type == SCM_RIGHTS) {
- const unsigned len = hdr->cmsg_len -
- (((uint8_t*)CMSG_DATA(hdr)) - (uint8_t*)hdr);
- ASSERT_EQ(len, sizeof(int));
- signal_fd = *((int *) CMSG_DATA(hdr));
- } else if (hdr->cmsg_type == SCM_CREDENTIALS) {
- const struct ucred *cred =
- reinterpret_cast<struct ucred*>(CMSG_DATA(hdr));
- crashing_pid = cred->pid;
- }
- }
- ASSERT_NE(crashing_pid, -1);
- ASSERT_NE(signal_fd, -1);
- AutoTempDir temp_dir;
- std::string templ = temp_dir.path() + "/exception-handler-unittest";
- ASSERT_TRUE(WriteMinidump(templ.c_str(), crashing_pid, context,
- kCrashContextSize));
- static const char b = 0;
- HANDLE_EINTR(write(signal_fd, &b, 1));
- ASSERT_EQ(close(signal_fd), 0);
- int status;
- ASSERT_NE(HANDLE_EINTR(waitpid(child, &status, 0)), -1);
- ASSERT_TRUE(WIFSIGNALED(status));
- ASSERT_EQ(WTERMSIG(status), SIGSEGV);
- struct stat st;
- ASSERT_EQ(stat(templ.c_str(), &st), 0);
- ASSERT_GT(st.st_size, 0u);
- unlink(templ.c_str());
- }