// Copyright (c) 2013 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "base/debug/proc_maps_linux.h" #include "base/files/file_path.h" #include "base/path_service.h" #include "base/strings/stringprintf.h" #include "base/third_party/dynamic_annotations/dynamic_annotations.h" #include "testing/gtest/include/gtest/gtest.h" namespace base { namespace debug { TEST(ProcMapsTest, Empty) { std::vector regions; EXPECT_TRUE(ParseProcMaps("", ®ions)); EXPECT_EQ(0u, regions.size()); } TEST(ProcMapsTest, NoSpaces) { static const char kNoSpaces[] = "00400000-0040b000 r-xp 00002200 fc:00 794418 /bin/cat\n"; std::vector regions; ASSERT_TRUE(ParseProcMaps(kNoSpaces, ®ions)); ASSERT_EQ(1u, regions.size()); EXPECT_EQ(0x00400000u, regions[0].start); EXPECT_EQ(0x0040b000u, regions[0].end); EXPECT_EQ(0x00002200u, regions[0].offset); EXPECT_EQ("/bin/cat", regions[0].path); } TEST(ProcMapsTest, Spaces) { static const char kSpaces[] = "00400000-0040b000 r-xp 00002200 fc:00 794418 /bin/space cat\n"; std::vector regions; ASSERT_TRUE(ParseProcMaps(kSpaces, ®ions)); ASSERT_EQ(1u, regions.size()); EXPECT_EQ(0x00400000u, regions[0].start); EXPECT_EQ(0x0040b000u, regions[0].end); EXPECT_EQ(0x00002200u, regions[0].offset); EXPECT_EQ("/bin/space cat", regions[0].path); } TEST(ProcMapsTest, NoNewline) { static const char kNoSpaces[] = "00400000-0040b000 r-xp 00002200 fc:00 794418 /bin/cat"; std::vector regions; ASSERT_FALSE(ParseProcMaps(kNoSpaces, ®ions)); } TEST(ProcMapsTest, NoPath) { static const char kNoPath[] = "00400000-0040b000 rw-p 00000000 00:00 0 \n"; std::vector regions; ASSERT_TRUE(ParseProcMaps(kNoPath, ®ions)); ASSERT_EQ(1u, regions.size()); EXPECT_EQ(0x00400000u, regions[0].start); EXPECT_EQ(0x0040b000u, regions[0].end); EXPECT_EQ(0x00000000u, regions[0].offset); EXPECT_EQ("", regions[0].path); } TEST(ProcMapsTest, Heap) { static const char kHeap[] = "022ac000-022cd000 rw-p 00000000 00:00 0 [heap]\n"; std::vector regions; ASSERT_TRUE(ParseProcMaps(kHeap, ®ions)); ASSERT_EQ(1u, regions.size()); EXPECT_EQ(0x022ac000u, regions[0].start); EXPECT_EQ(0x022cd000u, regions[0].end); EXPECT_EQ(0x00000000u, regions[0].offset); EXPECT_EQ("[heap]", regions[0].path); } #if defined(ARCH_CPU_32_BITS) TEST(ProcMapsTest, Stack32) { static const char kStack[] = "beb04000-beb25000 rw-p 00000000 00:00 0 [stack]\n"; std::vector regions; ASSERT_TRUE(ParseProcMaps(kStack, ®ions)); ASSERT_EQ(1u, regions.size()); EXPECT_EQ(0xbeb04000u, regions[0].start); EXPECT_EQ(0xbeb25000u, regions[0].end); EXPECT_EQ(0x00000000u, regions[0].offset); EXPECT_EQ("[stack]", regions[0].path); } #elif defined(ARCH_CPU_64_BITS) TEST(ProcMapsTest, Stack64) { static const char kStack[] = "7fff69c5b000-7fff69c7d000 rw-p 00000000 00:00 0 [stack]\n"; std::vector regions; ASSERT_TRUE(ParseProcMaps(kStack, ®ions)); ASSERT_EQ(1u, regions.size()); EXPECT_EQ(0x7fff69c5b000u, regions[0].start); EXPECT_EQ(0x7fff69c7d000u, regions[0].end); EXPECT_EQ(0x00000000u, regions[0].offset); EXPECT_EQ("[stack]", regions[0].path); } #endif TEST(ProcMapsTest, Multiple) { static const char kMultiple[] = "00400000-0040b000 r-xp 00000000 fc:00 794418 /bin/cat\n" "0060a000-0060b000 r--p 0000a000 fc:00 794418 /bin/cat\n" "0060b000-0060c000 rw-p 0000b000 fc:00 794418 /bin/cat\n"; std::vector regions; ASSERT_TRUE(ParseProcMaps(kMultiple, ®ions)); ASSERT_EQ(3u, regions.size()); EXPECT_EQ(0x00400000u, regions[0].start); EXPECT_EQ(0x0040b000u, regions[0].end); EXPECT_EQ(0x00000000u, regions[0].offset); EXPECT_EQ("/bin/cat", regions[0].path); EXPECT_EQ(0x0060a000u, regions[1].start); EXPECT_EQ(0x0060b000u, regions[1].end); EXPECT_EQ(0x0000a000u, regions[1].offset); EXPECT_EQ("/bin/cat", regions[1].path); EXPECT_EQ(0x0060b000u, regions[2].start); EXPECT_EQ(0x0060c000u, regions[2].end); EXPECT_EQ(0x0000b000u, regions[2].offset); EXPECT_EQ("/bin/cat", regions[2].path); } TEST(ProcMapsTest, Permissions) { static struct { const char* input; uint8 permissions; } kTestCases[] = { {"00400000-0040b000 ---s 00000000 fc:00 794418 /bin/cat\n", 0}, {"00400000-0040b000 ---S 00000000 fc:00 794418 /bin/cat\n", 0}, {"00400000-0040b000 r--s 00000000 fc:00 794418 /bin/cat\n", MappedMemoryRegion::READ}, {"00400000-0040b000 -w-s 00000000 fc:00 794418 /bin/cat\n", MappedMemoryRegion::WRITE}, {"00400000-0040b000 --xs 00000000 fc:00 794418 /bin/cat\n", MappedMemoryRegion::EXECUTE}, {"00400000-0040b000 rwxs 00000000 fc:00 794418 /bin/cat\n", MappedMemoryRegion::READ | MappedMemoryRegion::WRITE | MappedMemoryRegion::EXECUTE}, {"00400000-0040b000 ---p 00000000 fc:00 794418 /bin/cat\n", MappedMemoryRegion::PRIVATE}, {"00400000-0040b000 r--p 00000000 fc:00 794418 /bin/cat\n", MappedMemoryRegion::READ | MappedMemoryRegion::PRIVATE}, {"00400000-0040b000 -w-p 00000000 fc:00 794418 /bin/cat\n", MappedMemoryRegion::WRITE | MappedMemoryRegion::PRIVATE}, {"00400000-0040b000 --xp 00000000 fc:00 794418 /bin/cat\n", MappedMemoryRegion::EXECUTE | MappedMemoryRegion::PRIVATE}, {"00400000-0040b000 rwxp 00000000 fc:00 794418 /bin/cat\n", MappedMemoryRegion::READ | MappedMemoryRegion::WRITE | MappedMemoryRegion::EXECUTE | MappedMemoryRegion::PRIVATE}, }; for (size_t i = 0; i < ARRAYSIZE_UNSAFE(kTestCases); ++i) { SCOPED_TRACE( base::StringPrintf("kTestCases[%zu] = %s", i, kTestCases[i].input)); std::vector regions; EXPECT_TRUE(ParseProcMaps(kTestCases[i].input, ®ions)); EXPECT_EQ(1u, regions.size()); if (regions.empty()) continue; EXPECT_EQ(kTestCases[i].permissions, regions[0].permissions); } } // ProcMapsTest.ReadProcMaps fails under TSan on Linux, // see http://crbug.com/258451. #if defined(THREAD_SANITIZER) #define MAYBE_ReadProcMaps DISABLED_ReadProcMaps #else #define MAYBE_ReadProcMaps ReadProcMaps #endif TEST(ProcMapsTest, MAYBE_ReadProcMaps) { std::string proc_maps; ASSERT_TRUE(ReadProcMaps(&proc_maps)); std::vector regions; ASSERT_TRUE(ParseProcMaps(proc_maps, ®ions)); ASSERT_FALSE(regions.empty()); // We should be able to find both the current executable as well as the stack // mapped into memory. Use the address of |proc_maps| as a way of finding the // stack. FilePath exe_path; EXPECT_TRUE(PathService::Get(FILE_EXE, &exe_path)); uintptr_t address = reinterpret_cast(&proc_maps); bool found_exe = false; bool found_stack = false; bool found_address = false; for (size_t i = 0; i < regions.size(); ++i) { if (regions[i].path == exe_path.value()) { // It's OK to find the executable mapped multiple times as there'll be // multiple sections (e.g., text, data). found_exe = true; } if (regions[i].path == "[stack]") { // Only check if |address| lies within the real stack when not running // Valgrind, otherwise |address| will be on a stack that Valgrind creates. if (!RunningOnValgrind()) { EXPECT_GE(address, regions[i].start); EXPECT_LT(address, regions[i].end); } EXPECT_TRUE(regions[i].permissions & MappedMemoryRegion::READ); EXPECT_TRUE(regions[i].permissions & MappedMemoryRegion::WRITE); EXPECT_FALSE(regions[i].permissions & MappedMemoryRegion::EXECUTE); EXPECT_TRUE(regions[i].permissions & MappedMemoryRegion::PRIVATE); EXPECT_FALSE(found_stack) << "Found duplicate stacks"; found_stack = true; } if (address >= regions[i].start && address < regions[i].end) { EXPECT_FALSE(found_address) << "Found same address in multiple regions"; found_address = true; } } EXPECT_TRUE(found_exe); EXPECT_TRUE(found_stack); EXPECT_TRUE(found_address); } TEST(ProcMapsTest, MissingFields) { static const char* kTestCases[] = { "00400000\n", // Missing end + beyond. "00400000-0040b000\n", // Missing perms + beyond. "00400000-0040b000 r-xp\n", // Missing offset + beyond. "00400000-0040b000 r-xp 00000000\n", // Missing device + beyond. "00400000-0040b000 r-xp 00000000 fc:00\n", // Missing inode + beyond. "00400000-0040b000 00000000 fc:00 794418 /bin/cat\n", // Missing perms. "00400000-0040b000 r-xp fc:00 794418 /bin/cat\n", // Missing offset. "00400000-0040b000 r-xp 00000000 fc:00 /bin/cat\n", // Missing inode. "00400000 r-xp 00000000 fc:00 794418 /bin/cat\n", // Missing end. "-0040b000 r-xp 00000000 fc:00 794418 /bin/cat\n", // Missing start. "00400000-0040b000 r-xp 00000000 794418 /bin/cat\n", // Missing device. }; for (size_t i = 0; i < arraysize(kTestCases); ++i) { SCOPED_TRACE(base::StringPrintf("kTestCases[%zu] = %s", i, kTestCases[i])); std::vector regions; EXPECT_FALSE(ParseProcMaps(kTestCases[i], ®ions)); } } TEST(ProcMapsTest, InvalidInput) { static const char* kTestCases[] = { "thisisal-0040b000 rwxp 00000000 fc:00 794418 /bin/cat\n", "0040000d-linvalid rwxp 00000000 fc:00 794418 /bin/cat\n", "00400000-0040b000 inpu 00000000 fc:00 794418 /bin/cat\n", "00400000-0040b000 rwxp tforproc fc:00 794418 /bin/cat\n", "00400000-0040b000 rwxp 00000000 ma:ps 794418 /bin/cat\n", "00400000-0040b000 rwxp 00000000 fc:00 parse! /bin/cat\n", }; for (size_t i = 0; i < arraysize(kTestCases); ++i) { SCOPED_TRACE(base::StringPrintf("kTestCases[%zu] = %s", i, kTestCases[i])); std::vector regions; EXPECT_FALSE(ParseProcMaps(kTestCases[i], ®ions)); } } } // namespace debug } // namespace base