OLD | NEW |
(Empty) | |
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. |
| 4 |
| 5 #include <stdio.h> |
| 6 |
| 7 #include "base/environment.h" |
| 8 #include "base/files/file_path.h" |
| 9 #include "base/files/file_util.h" |
| 10 #include "base/path_service.h" |
| 11 #include "base/win/windows_version.h" |
| 12 #include "sandbox/win/tests/common/controller.h" |
| 13 #include "testing/gtest/include/gtest/gtest.h" |
| 14 |
| 15 namespace sandbox { |
| 16 |
| 17 class AddressSanitizerTests : public ::testing::Test { |
| 18 public: |
| 19 void SetUp() { |
| 20 env_.reset(base::Environment::Create()); |
| 21 had_asan_options_ = env_->GetVar("ASAN_OPTIONS", &old_asan_options_); |
| 22 } |
| 23 |
| 24 void TearDown() { |
| 25 if (had_asan_options_) |
| 26 ASSERT_TRUE(env_->SetVar("ASAN_OPTIONS", old_asan_options_)); |
| 27 else |
| 28 env_->UnSetVar("ASAN_OPTIONS"); |
| 29 } |
| 30 |
| 31 protected: |
| 32 scoped_ptr<base::Environment> env_; |
| 33 bool had_asan_options_; |
| 34 std::string old_asan_options_; |
| 35 }; |
| 36 |
| 37 SBOX_TESTS_COMMAND int AddressSanitizerTests_Report(int argc, wchar_t** argv) { |
| 38 volatile int idx = 42; |
| 39 int *blah = new int[42]; |
| 40 blah[idx] = 42; |
| 41 return SBOX_TEST_FAILED; |
| 42 } |
| 43 |
| 44 #if defined(ADDRESS_SANITIZER) |
| 45 TEST_F(AddressSanitizerTests, TestAddressSanitizer) { |
| 46 wchar_t temp_directory[MAX_PATH]; |
| 47 wchar_t temp_file_name[MAX_PATH]; |
| 48 ASSERT_NE(::GetTempPath(MAX_PATH, temp_directory), 0u); |
| 49 ASSERT_NE(::GetTempFileName(temp_directory, L"test", 0, temp_file_name), 0u); |
| 50 |
| 51 SECURITY_ATTRIBUTES attrs = {}; |
| 52 attrs.nLength = sizeof(attrs); |
| 53 attrs.bInheritHandle = TRUE; |
| 54 HANDLE file_handle = CreateFile( |
| 55 temp_file_name, GENERIC_WRITE, |
| 56 FILE_SHARE_WRITE | FILE_SHARE_READ | FILE_SHARE_DELETE, |
| 57 &attrs, OPEN_EXISTING, 0, NULL); |
| 58 ASSERT_NE(file_handle, INVALID_HANDLE_VALUE); |
| 59 |
| 60 TestRunner runner; |
| 61 ASSERT_EQ(SBOX_ALL_OK, runner.GetPolicy()->SetStderrHandle(file_handle)); |
| 62 |
| 63 base::FilePath exe; |
| 64 ASSERT_TRUE(PathService::Get(base::FILE_EXE, &exe)); |
| 65 base::FilePath pdb_path = exe.DirName().Append(L"*.pdb"); |
| 66 ASSERT_TRUE(runner.AddFsRule(sandbox::TargetPolicy::FILES_ALLOW_READONLY, |
| 67 pdb_path.value().c_str())); |
| 68 |
| 69 env_->SetVar("ASAN_OPTIONS", "exitcode=123"); |
| 70 int result = runner.RunTest(L"AddressSanitizerTests_Report"); |
| 71 EXPECT_EQ(123, result); |
| 72 EXPECT_TRUE(::CloseHandle(file_handle)); |
| 73 |
| 74 std::string data; |
| 75 ASSERT_TRUE(base::ReadFileToString(base::FilePath(temp_file_name), &data)); |
| 76 // Redirection uses a feature that was added in Windows Vista. |
| 77 if (base::win::GetVersion() >= base::win::VERSION_VISTA) { |
| 78 ASSERT_TRUE(strstr(data.c_str(), "ERROR: AddressSanitizer")) |
| 79 << "There doesn't seem to be an ASan report:\n" << data; |
| 80 ASSERT_TRUE(strstr(data.c_str(), "AddressSanitizerTests_Report")) |
| 81 << "The ASan report doesn't appear to be symbolized:\n" << data; |
| 82 ASSERT_TRUE(strstr(data.c_str(), strrchr(__FILE__, '\\'))) |
| 83 << "The stack trace doesn't have a correct filename:\n" << data; |
| 84 } else { |
| 85 EXPECT_EQ("", data); |
| 86 } |
| 87 |
| 88 EXPECT_TRUE(::DeleteFile(temp_file_name)); |
| 89 } |
| 90 #endif |
| 91 |
| 92 } |
OLD | NEW |