Index: third_party/crashpad/crashpad/snapshot/win/process_snapshot_win_test.cc |
diff --git a/third_party/crashpad/crashpad/snapshot/win/process_snapshot_win_test.cc b/third_party/crashpad/crashpad/snapshot/win/process_snapshot_win_test.cc |
index 82b2903561735305287c1c359723a1b554a09912..75e6e7089e7125e9da0fd0f95ac6a909cb773635 100644 |
--- a/third_party/crashpad/crashpad/snapshot/win/process_snapshot_win_test.cc |
+++ b/third_party/crashpad/crashpad/snapshot/win/process_snapshot_win_test.cc |
@@ -20,7 +20,8 @@ |
#include "snapshot/win/module_snapshot_win.h" |
#include "snapshot/win/pe_image_reader.h" |
#include "snapshot/win/process_reader_win.h" |
-#include "test/paths.h" |
+#include "test/errors.h" |
+#include "test/test_paths.h" |
#include "test/win/child_launcher.h" |
#include "util/file/file_io.h" |
#include "util/win/scoped_handle.h" |
@@ -35,9 +36,9 @@ void TestImageReaderChild(const base::string16& directory_modification) { |
done_uuid.InitializeWithNew(); |
ScopedKernelHANDLE done( |
CreateEvent(nullptr, true, false, done_uuid.ToString16().c_str())); |
- ASSERT_TRUE(done.get()); |
+ ASSERT_TRUE(done.is_valid()) << ErrorMessage("CreateEvent"); |
- base::FilePath test_executable = Paths::Executable(); |
+ base::FilePath test_executable = TestPaths::Executable(); |
std::wstring child_test_executable = |
test_executable.DirName() |
.Append(directory_modification) |
@@ -50,61 +51,65 @@ void TestImageReaderChild(const base::string16& directory_modification) { |
char c; |
ASSERT_TRUE( |
LoggingReadFileExactly(child.stdout_read_handle(), &c, sizeof(c))); |
- ASSERT_EQ(' ', c); |
- |
- ScopedProcessSuspend suspend(child.process_handle()); |
- |
- ProcessSnapshotWin process_snapshot; |
- ASSERT_TRUE(process_snapshot.Initialize( |
- child.process_handle(), ProcessSuspensionState::kSuspended, 0, 0)); |
- |
- ASSERT_GE(process_snapshot.Modules().size(), 2u); |
- |
- UUID uuid; |
- DWORD age; |
- std::string pdbname; |
- const std::string suffix(".pdb"); |
- |
- // Check the main .exe to see that we can retrieve its sections. |
- auto module = reinterpret_cast<const internal::ModuleSnapshotWin*>( |
- process_snapshot.Modules()[0]); |
- ASSERT_TRUE(module->pe_image_reader().DebugDirectoryInformation( |
- &uuid, &age, &pdbname)); |
- EXPECT_NE(std::string::npos, |
- pdbname.find("crashpad_snapshot_test_image_reader")); |
- EXPECT_EQ( |
- 0, |
- pdbname.compare(pdbname.size() - suffix.size(), suffix.size(), suffix)); |
- |
- // Check the dll it loads too. |
- module = reinterpret_cast<const internal::ModuleSnapshotWin*>( |
- process_snapshot.Modules().back()); |
- ASSERT_TRUE(module->pe_image_reader().DebugDirectoryInformation( |
- &uuid, &age, &pdbname)); |
- EXPECT_NE(std::string::npos, |
- pdbname.find("crashpad_snapshot_test_image_reader_module")); |
- EXPECT_EQ( |
- 0, |
- pdbname.compare(pdbname.size() - suffix.size(), suffix.size(), suffix)); |
- |
- // Sum the size of the extra memory in all the threads and confirm it's near |
- // the limit that the child process set in its CrashpadInfo. |
- EXPECT_GE(process_snapshot.Threads().size(), 100u); |
- |
- size_t extra_memory_total = 0; |
- for (const auto* thread : process_snapshot.Threads()) { |
- for (const auto* extra_memory : thread->ExtraMemory()) { |
- extra_memory_total += extra_memory->Size(); |
+ ASSERT_EQ(c, ' '); |
+ |
+ { |
+ ScopedProcessSuspend suspend(child.process_handle()); |
+ |
+ ProcessSnapshotWin process_snapshot; |
+ ASSERT_TRUE(process_snapshot.Initialize( |
+ child.process_handle(), ProcessSuspensionState::kSuspended, 0, 0)); |
+ |
+ ASSERT_GE(process_snapshot.Modules().size(), 2u); |
+ |
+ UUID uuid; |
+ DWORD age; |
+ std::string pdbname; |
+ const std::string suffix(".pdb"); |
+ |
+ // Check the main .exe to see that we can retrieve its sections. |
+ auto module = reinterpret_cast<const internal::ModuleSnapshotWin*>( |
+ process_snapshot.Modules()[0]); |
+ ASSERT_TRUE(module->pe_image_reader().DebugDirectoryInformation( |
+ &uuid, &age, &pdbname)); |
+ EXPECT_NE(pdbname.find("crashpad_snapshot_test_image_reader"), |
+ std::string::npos); |
+ EXPECT_EQ( |
+ pdbname.compare(pdbname.size() - suffix.size(), suffix.size(), suffix), |
+ 0); |
+ |
+ // Check the dll it loads too. |
+ module = reinterpret_cast<const internal::ModuleSnapshotWin*>( |
+ process_snapshot.Modules().back()); |
+ ASSERT_TRUE(module->pe_image_reader().DebugDirectoryInformation( |
+ &uuid, &age, &pdbname)); |
+ EXPECT_NE(pdbname.find("crashpad_snapshot_test_image_reader_module"), |
+ std::string::npos); |
+ EXPECT_EQ( |
+ pdbname.compare(pdbname.size() - suffix.size(), suffix.size(), suffix), |
+ 0); |
+ |
+ // Sum the size of the extra memory in all the threads and confirm it's near |
+ // the limit that the child process set in its CrashpadInfo. |
+ EXPECT_GE(process_snapshot.Threads().size(), 100u); |
+ |
+ size_t extra_memory_total = 0; |
+ for (const auto* thread : process_snapshot.Threads()) { |
+ for (const auto* extra_memory : thread->ExtraMemory()) { |
+ extra_memory_total += extra_memory->Size(); |
+ } |
} |
- } |
- // We confirm we gathered less than 1M of extra data. The cap is set to only |
- // 100K, but there are other "extra memory" regions that aren't included in |
- // the cap. (Completely uncapped it would be > 10M.) |
- EXPECT_LT(extra_memory_total, 1000000u); |
+ // Confirm that less than 1M of extra data was gathered. The cap is set to |
+ // only 100K, but there are other "extra memory" regions that aren't |
+ // included in the cap. (Completely uncapped it would be > 10M.) |
+ EXPECT_LT(extra_memory_total, 1000000u); |
+ } |
// Tell the child it can terminate. |
- SetEvent(done.get()); |
+ EXPECT_TRUE(SetEvent(done.get())) << ErrorMessage("SetEvent"); |
+ |
+ EXPECT_EQ(child.WaitForExit(), 0); |
} |
TEST(ProcessSnapshotTest, CrashpadInfoChild) { |