/* * Copyright (C) 2016 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include "MemoryRemote.h" #include "TestUtils.h" #include "utils/MemoryFake.h" namespace unwindstack { TEST(MemoryRemoteTest, read) { std::vector src(1024); memset(src.data(), 0x4c, 1024); pid_t pid; if ((pid = fork()) == 0) { while (true); exit(1); } ASSERT_LT(0, pid); TestScopedPidReaper reap(pid); ASSERT_TRUE(TestAttach(pid)); MemoryRemote remote(pid); std::vector dst(1024); ASSERT_TRUE(remote.ReadFully(reinterpret_cast(src.data()), dst.data(), 1024)); for (size_t i = 0; i < 1024; i++) { ASSERT_EQ(0x4cU, dst[i]) << "Failed at byte " << i; } ASSERT_TRUE(TestDetach(pid)); } TEST(MemoryRemoteTest, read_large) { static constexpr size_t kTotalPages = 245; std::vector src(kTotalPages * getpagesize()); for (size_t i = 0; i < kTotalPages; i++) { memset(&src[i * getpagesize()], i, getpagesize()); } pid_t pid; if ((pid = fork()) == 0) { while (true) ; exit(1); } ASSERT_LT(0, pid); TestScopedPidReaper reap(pid); ASSERT_TRUE(TestAttach(pid)); MemoryRemote remote(pid); std::vector dst(kTotalPages * getpagesize()); ASSERT_TRUE(remote.ReadFully(reinterpret_cast(src.data()), dst.data(), src.size())); for (size_t i = 0; i < kTotalPages * getpagesize(); i++) { ASSERT_EQ(i / getpagesize(), dst[i]) << "Failed at byte " << i; } ASSERT_TRUE(TestDetach(pid)); } TEST(MemoryRemoteTest, read_partial) { char* mapping = static_cast( mmap(nullptr, 4 * getpagesize(), PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0)); ASSERT_NE(MAP_FAILED, mapping); memset(mapping, 0x4c, 4 * getpagesize()); ASSERT_EQ(0, mprotect(mapping + getpagesize(), getpagesize(), PROT_NONE)); ASSERT_EQ(0, munmap(mapping + 3 * getpagesize(), getpagesize())); pid_t pid; if ((pid = fork()) == 0) { while (true) ; exit(1); } ASSERT_LT(0, pid); TestScopedPidReaper reap(pid); // Unmap from our process. ASSERT_EQ(0, munmap(mapping, 3 * getpagesize())); ASSERT_TRUE(TestAttach(pid)); MemoryRemote remote(pid); std::vector dst(4096); size_t bytes = remote.Read(reinterpret_cast(mapping + getpagesize() - 1024), dst.data(), 4096); // Some read methods can read PROT_NONE maps, allow that. ASSERT_LE(1024U, bytes); for (size_t i = 0; i < bytes; i++) { ASSERT_EQ(0x4cU, dst[i]) << "Failed at byte " << i; } // Now verify that reading stops at the end of a map. bytes = remote.Read(reinterpret_cast(mapping + 3 * getpagesize() - 1024), dst.data(), 4096); ASSERT_EQ(1024U, bytes); for (size_t i = 0; i < bytes; i++) { ASSERT_EQ(0x4cU, dst[i]) << "Failed at byte " << i; } ASSERT_TRUE(TestDetach(pid)); } TEST(MemoryRemoteTest, read_fail) { int pagesize = getpagesize(); void* src = mmap(nullptr, pagesize * 2, PROT_READ | PROT_WRITE, MAP_ANON | MAP_PRIVATE,-1, 0); memset(src, 0x4c, pagesize * 2); ASSERT_NE(MAP_FAILED, src); // Put a hole right after the first page. ASSERT_EQ(0, munmap(reinterpret_cast(reinterpret_cast(src) + pagesize), pagesize)); pid_t pid; if ((pid = fork()) == 0) { while (true); exit(1); } ASSERT_LT(0, pid); TestScopedPidReaper reap(pid); ASSERT_TRUE(TestAttach(pid)); MemoryRemote remote(pid); std::vector dst(pagesize); ASSERT_TRUE(remote.ReadFully(reinterpret_cast(src), dst.data(), pagesize)); for (size_t i = 0; i < 1024; i++) { ASSERT_EQ(0x4cU, dst[i]) << "Failed at byte " << i; } ASSERT_FALSE(remote.ReadFully(reinterpret_cast(src) + pagesize, dst.data(), 1)); ASSERT_TRUE(remote.ReadFully(reinterpret_cast(src) + pagesize - 1, dst.data(), 1)); ASSERT_FALSE(remote.ReadFully(reinterpret_cast(src) + pagesize - 4, dst.data(), 8)); // Check overflow condition is caught properly. ASSERT_FALSE(remote.ReadFully(UINT64_MAX - 100, dst.data(), 200)); ASSERT_EQ(0, munmap(src, pagesize)); ASSERT_TRUE(TestDetach(pid)); } TEST(MemoryRemoteTest, read_overflow) { pid_t pid; if ((pid = fork()) == 0) { while (true) ; exit(1); } ASSERT_LT(0, pid); TestScopedPidReaper reap(pid); ASSERT_TRUE(TestAttach(pid)); MemoryRemote remote(pid); // Check overflow condition is caught properly. std::vector dst(200); ASSERT_FALSE(remote.ReadFully(UINT64_MAX - 100, dst.data(), 200)); ASSERT_TRUE(TestDetach(pid)); } TEST(MemoryRemoteTest, read_illegal) { pid_t pid; if ((pid = fork()) == 0) { while (true); exit(1); } ASSERT_LT(0, pid); TestScopedPidReaper reap(pid); ASSERT_TRUE(TestAttach(pid)); MemoryRemote remote(pid); std::vector dst(100); ASSERT_FALSE(remote.ReadFully(0, dst.data(), 1)); ASSERT_FALSE(remote.ReadFully(0, dst.data(), 100)); ASSERT_TRUE(TestDetach(pid)); } TEST(MemoryRemoteTest, read_mprotect_hole) { size_t page_size = getpagesize(); void* mapping = mmap(nullptr, 3 * getpagesize(), PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0); ASSERT_NE(MAP_FAILED, mapping); memset(mapping, 0xFF, 3 * page_size); ASSERT_EQ(0, mprotect(static_cast(mapping) + page_size, page_size, PROT_NONE)); pid_t pid; if ((pid = fork()) == 0) { while (true); exit(1); } ASSERT_LT(0, pid); TestScopedPidReaper reap(pid); ASSERT_EQ(0, munmap(mapping, 3 * page_size)); ASSERT_TRUE(TestAttach(pid)); MemoryRemote remote(pid); std::vector dst(getpagesize() * 4, 0xCC); size_t read_size = remote.Read(reinterpret_cast(mapping), dst.data(), page_size * 3); // Some read methods can read PROT_NONE maps, allow that. ASSERT_LE(page_size, read_size); for (size_t i = 0; i < read_size; ++i) { ASSERT_EQ(0xFF, dst[i]); } for (size_t i = read_size; i < dst.size(); ++i) { ASSERT_EQ(0xCC, dst[i]); } ASSERT_TRUE(TestDetach(pid)); } TEST(MemoryRemoteTest, read_munmap_hole) { size_t page_size = getpagesize(); void* mapping = mmap(nullptr, 3 * getpagesize(), PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0); ASSERT_NE(MAP_FAILED, mapping); memset(mapping, 0xFF, 3 * page_size); ASSERT_EQ(0, munmap(static_cast(mapping) + page_size, page_size)); pid_t pid; if ((pid = fork()) == 0) { while (true) ; exit(1); } ASSERT_LT(0, pid); TestScopedPidReaper reap(pid); ASSERT_EQ(0, munmap(mapping, page_size)); ASSERT_EQ(0, munmap(static_cast(mapping) + 2 * page_size, page_size)); ASSERT_TRUE(TestAttach(pid)); MemoryRemote remote(pid); std::vector dst(getpagesize() * 4, 0xCC); size_t read_size = remote.Read(reinterpret_cast(mapping), dst.data(), page_size * 3); ASSERT_EQ(page_size, read_size); for (size_t i = 0; i < read_size; ++i) { ASSERT_EQ(0xFF, dst[i]); } for (size_t i = read_size; i < dst.size(); ++i) { ASSERT_EQ(0xCC, dst[i]); } ASSERT_TRUE(TestDetach(pid)); } // Verify that the memory remote object chooses a memory read function // properly. Either process_vm_readv or ptrace. TEST(MemoryRemoteTest, read_choose_correctly) { size_t page_size = getpagesize(); void* mapping = mmap(nullptr, 2 * getpagesize(), PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0); ASSERT_NE(MAP_FAILED, mapping); memset(mapping, 0xFC, 2 * page_size); ASSERT_EQ(0, mprotect(static_cast(mapping), page_size, PROT_NONE)); pid_t pid; if ((pid = fork()) == 0) { while (true) ; exit(1); } ASSERT_LT(0, pid); TestScopedPidReaper reap(pid); ASSERT_EQ(0, munmap(mapping, 2 * page_size)); ASSERT_TRUE(TestAttach(pid)); // We know that process_vm_readv of a mprotect'd PROT_NONE region will fail. // Read from the PROT_NONE area first to force the choice of ptrace. MemoryRemote remote_ptrace(pid); uint32_t value; size_t bytes = remote_ptrace.Read(reinterpret_cast(mapping), &value, sizeof(value)); ASSERT_EQ(sizeof(value), bytes); ASSERT_EQ(0xfcfcfcfcU, value); bytes = remote_ptrace.Read(reinterpret_cast(mapping) + page_size, &value, sizeof(value)); ASSERT_EQ(sizeof(value), bytes); ASSERT_EQ(0xfcfcfcfcU, value); bytes = remote_ptrace.Read(reinterpret_cast(mapping), &value, sizeof(value)); ASSERT_EQ(sizeof(value), bytes); ASSERT_EQ(0xfcfcfcfcU, value); // Now verify that choosing process_vm_readv results in failing reads of // the PROT_NONE part of the map. Read from a valid map first which // should prefer process_vm_readv, and keep that as the read function. MemoryRemote remote_readv(pid); bytes = remote_readv.Read(reinterpret_cast(mapping) + page_size, &value, sizeof(value)); ASSERT_EQ(sizeof(value), bytes); ASSERT_EQ(0xfcfcfcfcU, value); bytes = remote_readv.Read(reinterpret_cast(mapping), &value, sizeof(value)); ASSERT_EQ(0U, bytes); bytes = remote_readv.Read(reinterpret_cast(mapping) + page_size, &value, sizeof(value)); ASSERT_EQ(sizeof(value), bytes); ASSERT_EQ(0xfcfcfcfcU, value); ASSERT_TRUE(TestDetach(pid)); } } // namespace unwindstack