diff options
author | Baligh Uddin <baligh@google.com> | 2020-10-09 04:52:00 +0000 |
---|---|---|
committer | Baligh Uddin <baligh@google.com> | 2020-10-16 15:46:24 +0000 |
commit | ce7b63697ea8fad79ce9ec444dd0b19ee880f046 (patch) | |
tree | 3ca71216cdb3c58a5d9607d5edcfcb707df1ae50 /libunwindstack/tests/MemoryRemoteTest.cpp | |
parent | b5e565d29b2185ff36d9f96f0477e397f9eb614b (diff) |
Remove libprocinfo, libbacktrace, libunwindstack
These projects have moved to a different location.
platform/system/core [libprocinfo] -> platform/system/libprocinfo
platform/system/core [libbacktrace] -> platform/system/unwinding [libbacktrace]
platform/system/core [libunwindstack] -> platform/system/unwinding [libunwindstack]
BUG: 163786882
Test: Local build + TH
Change-Id: Id6d278d917236df0ffd40b5c32593856e112cb5b
Diffstat (limited to 'libunwindstack/tests/MemoryRemoteTest.cpp')
-rw-r--r-- | libunwindstack/tests/MemoryRemoteTest.cpp | 342 |
1 files changed, 0 insertions, 342 deletions
diff --git a/libunwindstack/tests/MemoryRemoteTest.cpp b/libunwindstack/tests/MemoryRemoteTest.cpp deleted file mode 100644 index 621893b1f..000000000 --- a/libunwindstack/tests/MemoryRemoteTest.cpp +++ /dev/null @@ -1,342 +0,0 @@ -/* - * Copyright (C) 2016 The Android Open Source Project - * - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at - * - * http://www.apache.org/licenses/LICENSE-2.0 - * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. - */ - -#include <errno.h> -#include <signal.h> -#include <stdint.h> -#include <stdlib.h> -#include <string.h> -#include <sys/mman.h> -#include <sys/ptrace.h> -#include <sys/types.h> -#include <unistd.h> - -#include <vector> - -#include <android-base/file.h> -#include <android-base/test_utils.h> -#include <gtest/gtest.h> - -#include "MemoryRemote.h" - -#include "MemoryFake.h" -#include "TestUtils.h" - -namespace unwindstack { - -TEST(MemoryRemoteTest, read) { - std::vector<uint8_t> src(1024); - memset(src.data(), 0x4c, 1024); - - pid_t pid; - if ((pid = fork()) == 0) { - while (true); - exit(1); - } - ASSERT_LT(0, pid); - TestScopedPidReaper reap(pid); - - ASSERT_TRUE(TestAttach(pid)); - - MemoryRemote remote(pid); - - std::vector<uint8_t> dst(1024); - ASSERT_TRUE(remote.ReadFully(reinterpret_cast<uint64_t>(src.data()), dst.data(), 1024)); - for (size_t i = 0; i < 1024; i++) { - ASSERT_EQ(0x4cU, dst[i]) << "Failed at byte " << i; - } - - ASSERT_TRUE(TestDetach(pid)); -} - -TEST(MemoryRemoteTest, read_large) { - static constexpr size_t kTotalPages = 245; - std::vector<uint8_t> src(kTotalPages * getpagesize()); - for (size_t i = 0; i < kTotalPages; i++) { - memset(&src[i * getpagesize()], i, getpagesize()); - } - - pid_t pid; - if ((pid = fork()) == 0) { - while (true) - ; - exit(1); - } - ASSERT_LT(0, pid); - TestScopedPidReaper reap(pid); - - ASSERT_TRUE(TestAttach(pid)); - - MemoryRemote remote(pid); - - std::vector<uint8_t> dst(kTotalPages * getpagesize()); - ASSERT_TRUE(remote.ReadFully(reinterpret_cast<uint64_t>(src.data()), dst.data(), src.size())); - for (size_t i = 0; i < kTotalPages * getpagesize(); i++) { - ASSERT_EQ(i / getpagesize(), dst[i]) << "Failed at byte " << i; - } - - ASSERT_TRUE(TestDetach(pid)); -} - -TEST(MemoryRemoteTest, read_partial) { - char* mapping = static_cast<char*>( - mmap(nullptr, 4 * getpagesize(), PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0)); - ASSERT_NE(MAP_FAILED, mapping); - memset(mapping, 0x4c, 4 * getpagesize()); - ASSERT_EQ(0, mprotect(mapping + getpagesize(), getpagesize(), PROT_NONE)); - ASSERT_EQ(0, munmap(mapping + 3 * getpagesize(), getpagesize())); - - pid_t pid; - if ((pid = fork()) == 0) { - while (true) - ; - exit(1); - } - ASSERT_LT(0, pid); - TestScopedPidReaper reap(pid); - - // Unmap from our process. - ASSERT_EQ(0, munmap(mapping, 3 * getpagesize())); - - ASSERT_TRUE(TestAttach(pid)); - - MemoryRemote remote(pid); - - std::vector<uint8_t> dst(4096); - size_t bytes = - remote.Read(reinterpret_cast<uint64_t>(mapping + getpagesize() - 1024), dst.data(), 4096); - // Some read methods can read PROT_NONE maps, allow that. - ASSERT_LE(1024U, bytes); - for (size_t i = 0; i < bytes; i++) { - ASSERT_EQ(0x4cU, dst[i]) << "Failed at byte " << i; - } - - // Now verify that reading stops at the end of a map. - bytes = - remote.Read(reinterpret_cast<uint64_t>(mapping + 3 * getpagesize() - 1024), dst.data(), 4096); - ASSERT_EQ(1024U, bytes); - for (size_t i = 0; i < bytes; i++) { - ASSERT_EQ(0x4cU, dst[i]) << "Failed at byte " << i; - } - - ASSERT_TRUE(TestDetach(pid)); -} - -TEST(MemoryRemoteTest, read_fail) { - int pagesize = getpagesize(); - void* src = mmap(nullptr, pagesize * 2, PROT_READ | PROT_WRITE, MAP_ANON | MAP_PRIVATE,-1, 0); - memset(src, 0x4c, pagesize * 2); - ASSERT_NE(MAP_FAILED, src); - // Put a hole right after the first page. - ASSERT_EQ(0, munmap(reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(src) + pagesize), - pagesize)); - - pid_t pid; - if ((pid = fork()) == 0) { - while (true); - exit(1); - } - ASSERT_LT(0, pid); - TestScopedPidReaper reap(pid); - - ASSERT_TRUE(TestAttach(pid)); - - MemoryRemote remote(pid); - - std::vector<uint8_t> dst(pagesize); - ASSERT_TRUE(remote.ReadFully(reinterpret_cast<uint64_t>(src), dst.data(), pagesize)); - for (size_t i = 0; i < 1024; i++) { - ASSERT_EQ(0x4cU, dst[i]) << "Failed at byte " << i; - } - - ASSERT_FALSE(remote.ReadFully(reinterpret_cast<uint64_t>(src) + pagesize, dst.data(), 1)); - ASSERT_TRUE(remote.ReadFully(reinterpret_cast<uint64_t>(src) + pagesize - 1, dst.data(), 1)); - ASSERT_FALSE(remote.ReadFully(reinterpret_cast<uint64_t>(src) + pagesize - 4, dst.data(), 8)); - - // Check overflow condition is caught properly. - ASSERT_FALSE(remote.ReadFully(UINT64_MAX - 100, dst.data(), 200)); - - ASSERT_EQ(0, munmap(src, pagesize)); - - ASSERT_TRUE(TestDetach(pid)); -} - -TEST(MemoryRemoteTest, read_overflow) { - pid_t pid; - if ((pid = fork()) == 0) { - while (true) - ; - exit(1); - } - ASSERT_LT(0, pid); - TestScopedPidReaper reap(pid); - - ASSERT_TRUE(TestAttach(pid)); - - MemoryRemote remote(pid); - - // Check overflow condition is caught properly. - std::vector<uint8_t> dst(200); - ASSERT_FALSE(remote.ReadFully(UINT64_MAX - 100, dst.data(), 200)); - - ASSERT_TRUE(TestDetach(pid)); -} - -TEST(MemoryRemoteTest, read_illegal) { - pid_t pid; - if ((pid = fork()) == 0) { - while (true); - exit(1); - } - ASSERT_LT(0, pid); - TestScopedPidReaper reap(pid); - - ASSERT_TRUE(TestAttach(pid)); - - MemoryRemote remote(pid); - - std::vector<uint8_t> dst(100); - ASSERT_FALSE(remote.ReadFully(0, dst.data(), 1)); - ASSERT_FALSE(remote.ReadFully(0, dst.data(), 100)); - - ASSERT_TRUE(TestDetach(pid)); -} - -TEST(MemoryRemoteTest, read_mprotect_hole) { - size_t page_size = getpagesize(); - void* mapping = - mmap(nullptr, 3 * getpagesize(), PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0); - ASSERT_NE(MAP_FAILED, mapping); - memset(mapping, 0xFF, 3 * page_size); - ASSERT_EQ(0, mprotect(static_cast<char*>(mapping) + page_size, page_size, PROT_NONE)); - - pid_t pid; - if ((pid = fork()) == 0) { - while (true); - exit(1); - } - ASSERT_LT(0, pid); - TestScopedPidReaper reap(pid); - - ASSERT_EQ(0, munmap(mapping, 3 * page_size)); - - ASSERT_TRUE(TestAttach(pid)); - - MemoryRemote remote(pid); - std::vector<uint8_t> dst(getpagesize() * 4, 0xCC); - size_t read_size = remote.Read(reinterpret_cast<uint64_t>(mapping), dst.data(), page_size * 3); - // Some read methods can read PROT_NONE maps, allow that. - ASSERT_LE(page_size, read_size); - for (size_t i = 0; i < read_size; ++i) { - ASSERT_EQ(0xFF, dst[i]); - } - for (size_t i = read_size; i < dst.size(); ++i) { - ASSERT_EQ(0xCC, dst[i]); - } - - ASSERT_TRUE(TestDetach(pid)); -} - -TEST(MemoryRemoteTest, read_munmap_hole) { - size_t page_size = getpagesize(); - void* mapping = - mmap(nullptr, 3 * getpagesize(), PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0); - ASSERT_NE(MAP_FAILED, mapping); - memset(mapping, 0xFF, 3 * page_size); - ASSERT_EQ(0, munmap(static_cast<char*>(mapping) + page_size, page_size)); - - pid_t pid; - if ((pid = fork()) == 0) { - while (true) - ; - exit(1); - } - ASSERT_LT(0, pid); - TestScopedPidReaper reap(pid); - - ASSERT_EQ(0, munmap(mapping, page_size)); - ASSERT_EQ(0, munmap(static_cast<char*>(mapping) + 2 * page_size, page_size)); - - ASSERT_TRUE(TestAttach(pid)); - - MemoryRemote remote(pid); - std::vector<uint8_t> dst(getpagesize() * 4, 0xCC); - size_t read_size = remote.Read(reinterpret_cast<uint64_t>(mapping), dst.data(), page_size * 3); - ASSERT_EQ(page_size, read_size); - for (size_t i = 0; i < read_size; ++i) { - ASSERT_EQ(0xFF, dst[i]); - } - for (size_t i = read_size; i < dst.size(); ++i) { - ASSERT_EQ(0xCC, dst[i]); - } - - ASSERT_TRUE(TestDetach(pid)); -} - -// Verify that the memory remote object chooses a memory read function -// properly. Either process_vm_readv or ptrace. -TEST(MemoryRemoteTest, read_choose_correctly) { - size_t page_size = getpagesize(); - void* mapping = - mmap(nullptr, 2 * getpagesize(), PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0); - ASSERT_NE(MAP_FAILED, mapping); - memset(mapping, 0xFC, 2 * page_size); - ASSERT_EQ(0, mprotect(static_cast<char*>(mapping), page_size, PROT_NONE)); - - pid_t pid; - if ((pid = fork()) == 0) { - while (true) - ; - exit(1); - } - ASSERT_LT(0, pid); - TestScopedPidReaper reap(pid); - - ASSERT_EQ(0, munmap(mapping, 2 * page_size)); - - ASSERT_TRUE(TestAttach(pid)); - - // We know that process_vm_readv of a mprotect'd PROT_NONE region will fail. - // Read from the PROT_NONE area first to force the choice of ptrace. - MemoryRemote remote_ptrace(pid); - uint32_t value; - size_t bytes = remote_ptrace.Read(reinterpret_cast<uint64_t>(mapping), &value, sizeof(value)); - ASSERT_EQ(sizeof(value), bytes); - ASSERT_EQ(0xfcfcfcfcU, value); - bytes = remote_ptrace.Read(reinterpret_cast<uint64_t>(mapping) + page_size, &value, sizeof(value)); - ASSERT_EQ(sizeof(value), bytes); - ASSERT_EQ(0xfcfcfcfcU, value); - bytes = remote_ptrace.Read(reinterpret_cast<uint64_t>(mapping), &value, sizeof(value)); - ASSERT_EQ(sizeof(value), bytes); - ASSERT_EQ(0xfcfcfcfcU, value); - - // Now verify that choosing process_vm_readv results in failing reads of - // the PROT_NONE part of the map. Read from a valid map first which - // should prefer process_vm_readv, and keep that as the read function. - MemoryRemote remote_readv(pid); - bytes = remote_readv.Read(reinterpret_cast<uint64_t>(mapping) + page_size, &value, sizeof(value)); - ASSERT_EQ(sizeof(value), bytes); - ASSERT_EQ(0xfcfcfcfcU, value); - bytes = remote_readv.Read(reinterpret_cast<uint64_t>(mapping), &value, sizeof(value)); - ASSERT_EQ(0U, bytes); - bytes = remote_readv.Read(reinterpret_cast<uint64_t>(mapping) + page_size, &value, sizeof(value)); - ASSERT_EQ(sizeof(value), bytes); - ASSERT_EQ(0xfcfcfcfcU, value); - - ASSERT_TRUE(TestDetach(pid)); -} - -} // namespace unwindstack |