Chromium Code Reviews| Index: base/debug/proc_maps_linux_unittest.cc |
| diff --git a/base/debug/proc_maps_linux_unittest.cc b/base/debug/proc_maps_linux_unittest.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..0be3d7eb4d59792d3b62a90d246add6563e97f2d |
| --- /dev/null |
| +++ b/base/debug/proc_maps_linux_unittest.cc |
| @@ -0,0 +1,247 @@ |
| +// Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include "base/debug/proc_maps_linux.h" |
| +#include "base/logging.h" |
| +#include "base/strings/stringprintf.h" |
| +#include "testing/gtest/include/gtest/gtest.h" |
| + |
| +namespace base { |
| +namespace debug { |
| + |
| +TEST(ProcMapsTest, Empty) { |
| + std::vector<MappedMemoryRegion> regions; |
| + EXPECT_TRUE(ParseProcMaps("", ®ions)); |
| + EXPECT_EQ(0u, regions.size()); |
| +} |
| + |
| +TEST(ProcMapsTest, NoSpaces) { |
| + static const char kNoSpaces[] = |
| + "00400000-0040b000 r-xp 00002200 fc:00 794418 /bin/cat\n"; |
| + |
| + std::vector<MappedMemoryRegion> regions; |
| + ASSERT_TRUE(ParseProcMaps(kNoSpaces, ®ions)); |
| + ASSERT_EQ(1u, regions.size()); |
| + |
| + EXPECT_EQ(0x00400000u, regions[0].start); |
| + EXPECT_EQ(0x0040b000u, regions[0].end); |
| + EXPECT_EQ(0x00002200u, regions[0].offset); |
| + EXPECT_EQ("/bin/cat", regions[0].path); |
| +} |
| + |
| +TEST(ProcMapsTest, Spaces) { |
| + static const char kSpaces[] = |
| + "00400000-0040b000 r-xp 00002200 fc:00 794418 /bin/space cat\n"; |
| + |
| + std::vector<MappedMemoryRegion> regions; |
| + ASSERT_TRUE(ParseProcMaps(kSpaces, ®ions)); |
| + ASSERT_EQ(1u, regions.size()); |
| + |
| + EXPECT_EQ(0x00400000u, regions[0].start); |
| + EXPECT_EQ(0x0040b000u, regions[0].end); |
| + EXPECT_EQ(0x00002200u, regions[0].offset); |
| + EXPECT_EQ("/bin/space cat", regions[0].path); |
| +} |
| + |
| +TEST(ProcMapsTest, NoNewline) { |
| + static const char kNoSpaces[] = |
| + "00400000-0040b000 r-xp 00002200 fc:00 794418 /bin/cat"; |
| + |
| + std::vector<MappedMemoryRegion> regions; |
| + ASSERT_FALSE(ParseProcMaps(kNoSpaces, ®ions)); |
| +} |
| + |
| +TEST(ProcMapsTest, NoPath) { |
| + static const char kNoPath[] = |
| + "00400000-0040b000 rw-p 00000000 00:00 0 \n"; |
| + |
| + std::vector<MappedMemoryRegion> regions; |
| + ASSERT_TRUE(ParseProcMaps(kNoPath, ®ions)); |
| + ASSERT_EQ(1u, regions.size()); |
| + |
| + EXPECT_EQ(0x00400000u, regions[0].start); |
| + EXPECT_EQ(0x0040b000u, regions[0].end); |
| + EXPECT_EQ(0x00000000u, regions[0].offset); |
| + EXPECT_EQ("", regions[0].path); |
| +} |
| + |
| +TEST(ProcMapsTest, Heap) { |
| + static const char kHeap[] = |
| + "022ac000-022cd000 rw-p 00000000 00:00 0 [heap]\n"; |
| + |
| + std::vector<MappedMemoryRegion> regions; |
| + ASSERT_TRUE(ParseProcMaps(kHeap, ®ions)); |
| + ASSERT_EQ(1u, regions.size()); |
| + |
| + EXPECT_EQ(0x022ac000u, regions[0].start); |
| + EXPECT_EQ(0x022cd000u, regions[0].end); |
| + EXPECT_EQ(0x00000000u, regions[0].offset); |
| + EXPECT_EQ("[heap]", regions[0].path); |
| +} |
| + |
| +#if defined(ARCH_CPU_32_BITS) |
| +TEST(ProcMapsTest, Stack32) { |
| + static const char kStack[] = |
| + "beb04000-beb25000 rw-p 00000000 00:00 0 [stack]\n"; |
| + |
| + std::vector<MappedMemoryRegion> regions; |
| + ASSERT_TRUE(ParseProcMaps(kStack, ®ions)); |
| + ASSERT_EQ(1u, regions.size()); |
| + |
| + EXPECT_EQ(0xbeb04000u, regions[0].start); |
| + EXPECT_EQ(0xbeb25000u, regions[0].end); |
| + EXPECT_EQ(0x00000000u, regions[0].offset); |
| + EXPECT_EQ("[stack]", regions[0].path); |
| +} |
| +#elif defined(ARCH_CPU_64_BITS) |
| +TEST(ProcMapsTest, Stack64) { |
| + static const char kStack[] = |
| + "7fff69c5b000-7fff69c7d000 rw-p 00000000 00:00 0 [stack]\n"; |
| + |
| + std::vector<MappedMemoryRegion> regions; |
| + ASSERT_TRUE(ParseProcMaps(kStack, ®ions)); |
| + ASSERT_EQ(1u, regions.size()); |
| + |
| + EXPECT_EQ(0x7fff69c5b000u, regions[0].start); |
| + EXPECT_EQ(0x7fff69c7d000u, regions[0].end); |
| + EXPECT_EQ(0x00000000u, regions[0].offset); |
| + EXPECT_EQ("[stack]", regions[0].path); |
| +} |
| +#endif |
| + |
| +TEST(ProcMapsTest, Multiple) { |
| + static const char kMultiple[] = |
| + "00400000-0040b000 r-xp 00000000 fc:00 794418 /bin/cat\n" |
| + "0060a000-0060b000 r--p 0000a000 fc:00 794418 /bin/cat\n" |
| + "0060b000-0060c000 rw-p 0000b000 fc:00 794418 /bin/cat\n"; |
| + |
| + std::vector<MappedMemoryRegion> regions; |
| + ASSERT_TRUE(ParseProcMaps(kMultiple, ®ions)); |
| + ASSERT_EQ(3u, regions.size()); |
| + |
| + EXPECT_EQ(0x00400000u, regions[0].start); |
| + EXPECT_EQ(0x0040b000u, regions[0].end); |
| + EXPECT_EQ(0x00000000u, regions[0].offset); |
| + EXPECT_EQ("/bin/cat", regions[0].path); |
| + |
| + EXPECT_EQ(0x0060a000u, regions[1].start); |
| + EXPECT_EQ(0x0060b000u, regions[1].end); |
| + EXPECT_EQ(0x0000a000u, regions[1].offset); |
| + EXPECT_EQ("/bin/cat", regions[1].path); |
| + |
| + EXPECT_EQ(0x0060b000u, regions[2].start); |
| + EXPECT_EQ(0x0060c000u, regions[2].end); |
| + EXPECT_EQ(0x0000b000u, regions[2].offset); |
| + EXPECT_EQ("/bin/cat", regions[2].path); |
| +} |
| + |
| +TEST(ProcMapsTest, Permissions) { |
| + static struct { |
| + const char* input; |
| + uint8 permissions; |
| + } kTestCases[] = { |
| + {"00400000-0040b000 ---s 00000000 fc:00 794418 /bin/cat\n", 0}, |
| + {"00400000-0040b000 ---S 00000000 fc:00 794418 /bin/cat\n", 0}, |
| + {"00400000-0040b000 r--s 00000000 fc:00 794418 /bin/cat\n", |
| + MappedMemoryRegion::READ}, |
| + {"00400000-0040b000 -w-s 00000000 fc:00 794418 /bin/cat\n", |
| + MappedMemoryRegion::WRITE}, |
| + {"00400000-0040b000 --xs 00000000 fc:00 794418 /bin/cat\n", |
| + MappedMemoryRegion::EXECUTE}, |
| + {"00400000-0040b000 rwxs 00000000 fc:00 794418 /bin/cat\n", |
| + MappedMemoryRegion::READ | MappedMemoryRegion::WRITE | |
| + MappedMemoryRegion::EXECUTE}, |
| + {"00400000-0040b000 ---p 00000000 fc:00 794418 /bin/cat\n", |
| + MappedMemoryRegion::PRIVATE}, |
| + {"00400000-0040b000 r--p 00000000 fc:00 794418 /bin/cat\n", |
| + MappedMemoryRegion::READ | MappedMemoryRegion::PRIVATE}, |
| + {"00400000-0040b000 -w-p 00000000 fc:00 794418 /bin/cat\n", |
| + MappedMemoryRegion::WRITE | MappedMemoryRegion::PRIVATE}, |
| + {"00400000-0040b000 --xp 00000000 fc:00 794418 /bin/cat\n", |
| + MappedMemoryRegion::EXECUTE | MappedMemoryRegion::PRIVATE}, |
| + {"00400000-0040b000 rwxp 00000000 fc:00 794418 /bin/cat\n", |
| + MappedMemoryRegion::READ | MappedMemoryRegion::WRITE | |
| + MappedMemoryRegion::EXECUTE | MappedMemoryRegion::PRIVATE}, |
| + { NULL, 0 }, |
| + }; |
| + |
| + for (size_t i = 0; kTestCases[i].input != NULL; ++i) { |
| + SCOPED_TRACE( |
| + base::StringPrintf("kTestCases[%zu] = %s", i, kTestCases[i].input)); |
| + |
| + std::vector<MappedMemoryRegion> regions; |
| + EXPECT_TRUE(ParseProcMaps(kTestCases[i].input, ®ions)); |
| + EXPECT_EQ(1u, regions.size()); |
| + if (regions.empty()) |
| + continue; |
| + EXPECT_EQ(kTestCases[i].permissions, regions[0].permissions); |
| + } |
| +} |
| + |
| +TEST(ProcMapsTest, ReadProcMaps) { |
| + std::string proc_maps; |
| + ASSERT_TRUE(ReadProcMaps(&proc_maps)); |
| + |
| + std::vector<MappedMemoryRegion> regions; |
| + ASSERT_TRUE(ParseProcMaps(proc_maps, ®ions)); |
| + ASSERT_FALSE(regions.empty()); |
| + |
| + // We should be able to find where our stack is mapped by looking at the |
| + // address of |proc_maps|. |
| + uintptr_t address = reinterpret_cast<uintptr_t>(&proc_maps); |
| + for (size_t i = 0; i < regions.size(); ++i) { |
| + if (address >= regions[i].start && address < regions[i].end) { |
| + EXPECT_EQ("[stack]", regions[i].path); |
| + EXPECT_TRUE(regions[i].permissions & MappedMemoryRegion::READ); |
| + EXPECT_TRUE(regions[i].permissions & MappedMemoryRegion::WRITE); |
| + EXPECT_FALSE(regions[i].permissions & MappedMemoryRegion::EXECUTE); |
| + EXPECT_TRUE(regions[i].permissions & MappedMemoryRegion::PRIVATE); |
| + return; |
|
Mark Mentovai
2013/07/02 22:21:36
Instead of returning here, stay in the loop to mak
scherkus (not reviewing)
2013/07/02 23:07:47
Done.
|
| + } |
| + } |
| + |
| + ADD_FAILURE() << "Did not find stack in /proc/self/maps."; |
| +} |
| + |
| +TEST(ProcMapsTest, MissingFields) { |
| + static const char* kTestCases[] = { |
| + "00400000\n", // Missing end + beyond. |
| + "00400000-0040b000\n", // Missing perms + beyond. |
| + "00400000-0040b000 r-xp\n", // Missing offset + beyond. |
| + "00400000-0040b000 r-xp 00000000\n", // Missing device + beyond. |
| + "00400000-0040b000 r-xp 00000000 fc:00\n", // Missing inode + beyond. |
| + "00400000-0040b000 00000000 fc:00 794418 /bin/cat\n", // Missing perms. |
| + "00400000-0040b000 r-xp fc:00 794418 /bin/cat\n", // Missing offset. |
| + "00400000-0040b000 r-xp 00000000 fc:00 /bin/cat\n", // Missing inode. |
| + "00400000 r-xp 00000000 fc:00 794418 /bin/cat\n", // Missing end. |
| + "-0040b000 r-xp 00000000 fc:00 794418 /bin/cat\n", // Missing start. |
| + "00400000-0040b000 r-xp 00000000 794418 /bin/cat\n", // Missing device. |
| + }; |
| + |
| + for (size_t i = 0; i < arraysize(kTestCases); ++i) { |
| + SCOPED_TRACE(base::StringPrintf("kTestCases[%zu] = %s", i, kTestCases[i])); |
| + std::vector<MappedMemoryRegion> regions; |
| + EXPECT_FALSE(ParseProcMaps(kTestCases[i], ®ions)); |
| + } |
| +} |
| + |
| +TEST(ProcMapsTest, InvalidInput) { |
| + static const char* kTestCases[] = { |
| + "thisisal-0040b000 rwxp 00000000 fc:00 794418 /bin/cat\n", |
| + "0040000d-linvalid rwxp 00000000 fc:00 794418 /bin/cat\n", |
| + "00400000-0040b000 inpu 00000000 fc:00 794418 /bin/cat\n", |
| + "00400000-0040b000 rwxp tforproc fc:00 794418 /bin/cat\n", |
| + "00400000-0040b000 rwxp 00000000 ma:ps 794418 /bin/cat\n", |
| + "00400000-0040b000 rwxp 00000000 fc:00 parse! /bin/cat\n", |
| + }; |
| + |
| + for (size_t i = 0; i < arraysize(kTestCases); ++i) { |
| + SCOPED_TRACE(base::StringPrintf("kTestCases[%zu] = %s", i, kTestCases[i])); |
| + std::vector<MappedMemoryRegion> regions; |
| + EXPECT_FALSE(ParseProcMaps(kTestCases[i], ®ions)); |
| + } |
| +} |
| + |
| +} // namespace debug |
| +} // namespace base |