235 lines
7.5 KiB
C++
235 lines
7.5 KiB
C++
|
|
// Copyright 2018 The Chromium Authors
|
||
|
|
// Use of this source code is governed by a BSD-style license that can be
|
||
|
|
// found in the LICENSE file.
|
||
|
|
|
||
|
|
#include "base/debug/elf_reader.h"
|
||
|
|
|
||
|
|
#include <dlfcn.h>
|
||
|
|
|
||
|
|
#include <cstdint>
|
||
|
|
|
||
|
|
#include "base/debug/test_elf_image_builder.h"
|
||
|
|
#include "base/files/memory_mapped_file.h"
|
||
|
|
#include "base/native_library.h"
|
||
|
|
#include "base/strings/string_util.h"
|
||
|
|
#include "build/build_config.h"
|
||
|
|
#include "testing/gtest/include/gtest/gtest.h"
|
||
|
|
#include "third_party/abseil-cpp/absl/types/optional.h"
|
||
|
|
|
||
|
|
extern char __executable_start;
|
||
|
|
|
||
|
|
namespace base {
|
||
|
|
namespace debug {
|
||
|
|
|
||
|
|
namespace {
|
||
|
|
constexpr uint8_t kBuildIdBytes[] = {0xab, 0xcd, 0x12, 0x34};
|
||
|
|
constexpr const char kBuildIdHexString[] = "ABCD1234";
|
||
|
|
constexpr const char kBuildIdHexStringLower[] = "ABCD1234";
|
||
|
|
|
||
|
|
std::string ParamInfoToString(
|
||
|
|
const ::testing::TestParamInfo<base::TestElfImageBuilder::MappingType>&
|
||
|
|
param_info) {
|
||
|
|
switch (param_info.param) {
|
||
|
|
case TestElfImageBuilder::RELOCATABLE:
|
||
|
|
return "Relocatable";
|
||
|
|
|
||
|
|
case TestElfImageBuilder::RELOCATABLE_WITH_BIAS:
|
||
|
|
return "RelocatableWithBias";
|
||
|
|
|
||
|
|
case TestElfImageBuilder::NON_RELOCATABLE:
|
||
|
|
return "NonRelocatable";
|
||
|
|
}
|
||
|
|
}
|
||
|
|
} // namespace
|
||
|
|
|
||
|
|
using ElfReaderTest =
|
||
|
|
::testing::TestWithParam<TestElfImageBuilder::MappingType>;
|
||
|
|
|
||
|
|
TEST_P(ElfReaderTest, ReadElfBuildIdUppercase) {
|
||
|
|
TestElfImage image =
|
||
|
|
TestElfImageBuilder(GetParam())
|
||
|
|
.AddLoadSegment(PF_R | PF_X, /* size = */ 2000)
|
||
|
|
.AddNoteSegment(NT_GNU_BUILD_ID, "GNU", kBuildIdBytes)
|
||
|
|
.Build();
|
||
|
|
|
||
|
|
ElfBuildIdBuffer build_id;
|
||
|
|
size_t build_id_size = ReadElfBuildId(image.elf_start(), true, build_id);
|
||
|
|
EXPECT_EQ(8u, build_id_size);
|
||
|
|
EXPECT_EQ(kBuildIdHexString, StringPiece(&build_id[0], build_id_size));
|
||
|
|
}
|
||
|
|
|
||
|
|
TEST_P(ElfReaderTest, ReadElfBuildIdLowercase) {
|
||
|
|
TestElfImage image =
|
||
|
|
TestElfImageBuilder(GetParam())
|
||
|
|
.AddLoadSegment(PF_R | PF_X, /* size = */ 2000)
|
||
|
|
.AddNoteSegment(NT_GNU_BUILD_ID, "GNU", kBuildIdBytes)
|
||
|
|
.Build();
|
||
|
|
|
||
|
|
ElfBuildIdBuffer build_id;
|
||
|
|
size_t build_id_size = ReadElfBuildId(image.elf_start(), false, build_id);
|
||
|
|
EXPECT_EQ(8u, build_id_size);
|
||
|
|
EXPECT_EQ(ToLowerASCII(kBuildIdHexStringLower),
|
||
|
|
StringPiece(&build_id[0], build_id_size));
|
||
|
|
}
|
||
|
|
|
||
|
|
TEST_P(ElfReaderTest, ReadElfBuildIdMultipleNotes) {
|
||
|
|
constexpr uint8_t kOtherNoteBytes[] = {0xef, 0x56};
|
||
|
|
|
||
|
|
TestElfImage image =
|
||
|
|
TestElfImageBuilder(GetParam())
|
||
|
|
.AddLoadSegment(PF_R | PF_X, /* size = */ 2000)
|
||
|
|
.AddNoteSegment(NT_GNU_BUILD_ID + 1, "ABC", kOtherNoteBytes)
|
||
|
|
.AddNoteSegment(NT_GNU_BUILD_ID, "GNU", kBuildIdBytes)
|
||
|
|
.Build();
|
||
|
|
|
||
|
|
ElfBuildIdBuffer build_id;
|
||
|
|
size_t build_id_size = ReadElfBuildId(image.elf_start(), true, build_id);
|
||
|
|
EXPECT_EQ(8u, build_id_size);
|
||
|
|
EXPECT_EQ(kBuildIdHexString, StringPiece(&build_id[0], build_id_size));
|
||
|
|
}
|
||
|
|
|
||
|
|
TEST_P(ElfReaderTest, ReadElfBuildIdWrongName) {
|
||
|
|
TestElfImage image =
|
||
|
|
TestElfImageBuilder(GetParam())
|
||
|
|
.AddLoadSegment(PF_R | PF_X, /* size = */ 2000)
|
||
|
|
.AddNoteSegment(NT_GNU_BUILD_ID, "ABC", kBuildIdBytes)
|
||
|
|
.Build();
|
||
|
|
|
||
|
|
ElfBuildIdBuffer build_id;
|
||
|
|
size_t build_id_size = ReadElfBuildId(image.elf_start(), true, build_id);
|
||
|
|
EXPECT_EQ(0u, build_id_size);
|
||
|
|
}
|
||
|
|
|
||
|
|
TEST_P(ElfReaderTest, ReadElfBuildIdWrongType) {
|
||
|
|
TestElfImage image =
|
||
|
|
TestElfImageBuilder(GetParam())
|
||
|
|
.AddLoadSegment(PF_R | PF_X, /* size = */ 2000)
|
||
|
|
.AddNoteSegment(NT_GNU_BUILD_ID + 1, "GNU", kBuildIdBytes)
|
||
|
|
.Build();
|
||
|
|
|
||
|
|
ElfBuildIdBuffer build_id;
|
||
|
|
size_t build_id_size = ReadElfBuildId(image.elf_start(), true, build_id);
|
||
|
|
EXPECT_EQ(0u, build_id_size);
|
||
|
|
}
|
||
|
|
|
||
|
|
TEST_P(ElfReaderTest, ReadElfBuildIdNoBuildId) {
|
||
|
|
TestElfImage image = TestElfImageBuilder(GetParam())
|
||
|
|
.AddLoadSegment(PF_R | PF_X, /* size = */ 2000)
|
||
|
|
.Build();
|
||
|
|
|
||
|
|
ElfBuildIdBuffer build_id;
|
||
|
|
size_t build_id_size = ReadElfBuildId(image.elf_start(), true, build_id);
|
||
|
|
EXPECT_EQ(0u, build_id_size);
|
||
|
|
}
|
||
|
|
|
||
|
|
TEST_P(ElfReaderTest, ReadElfLibraryName) {
|
||
|
|
TestElfImage image = TestElfImageBuilder(GetParam())
|
||
|
|
.AddLoadSegment(PF_R | PF_X, /* size = */ 2000)
|
||
|
|
.AddSoName("mysoname")
|
||
|
|
.Build();
|
||
|
|
|
||
|
|
absl::optional<StringPiece> library_name =
|
||
|
|
ReadElfLibraryName(image.elf_start());
|
||
|
|
ASSERT_NE(absl::nullopt, library_name);
|
||
|
|
EXPECT_EQ("mysoname", *library_name);
|
||
|
|
}
|
||
|
|
|
||
|
|
TEST_P(ElfReaderTest, ReadElfLibraryNameNoSoName) {
|
||
|
|
TestElfImage image = TestElfImageBuilder(GetParam())
|
||
|
|
.AddLoadSegment(PF_R | PF_X, /* size = */ 2000)
|
||
|
|
.Build();
|
||
|
|
|
||
|
|
absl::optional<StringPiece> library_name =
|
||
|
|
ReadElfLibraryName(image.elf_start());
|
||
|
|
EXPECT_EQ(absl::nullopt, library_name);
|
||
|
|
}
|
||
|
|
|
||
|
|
TEST_P(ElfReaderTest, GetRelocationOffset) {
|
||
|
|
TestElfImage image = TestElfImageBuilder(GetParam())
|
||
|
|
.AddLoadSegment(PF_R | PF_X, /* size = */ 2000)
|
||
|
|
.Build();
|
||
|
|
|
||
|
|
switch (GetParam()) {
|
||
|
|
case TestElfImageBuilder::RELOCATABLE:
|
||
|
|
EXPECT_EQ(reinterpret_cast<size_t>(image.elf_start()),
|
||
|
|
GetRelocationOffset(image.elf_start()));
|
||
|
|
break;
|
||
|
|
|
||
|
|
case TestElfImageBuilder::RELOCATABLE_WITH_BIAS:
|
||
|
|
EXPECT_EQ(reinterpret_cast<size_t>(image.elf_start()) -
|
||
|
|
TestElfImageBuilder::kLoadBias,
|
||
|
|
GetRelocationOffset(image.elf_start()));
|
||
|
|
break;
|
||
|
|
|
||
|
|
case TestElfImageBuilder::NON_RELOCATABLE:
|
||
|
|
EXPECT_EQ(0u, GetRelocationOffset(image.elf_start()));
|
||
|
|
break;
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
INSTANTIATE_TEST_SUITE_P(
|
||
|
|
MappingTypes,
|
||
|
|
ElfReaderTest,
|
||
|
|
::testing::Values(TestElfImageBuilder::RELOCATABLE,
|
||
|
|
TestElfImageBuilder::RELOCATABLE_WITH_BIAS,
|
||
|
|
TestElfImageBuilder::NON_RELOCATABLE),
|
||
|
|
&ParamInfoToString);
|
||
|
|
|
||
|
|
TEST(ElfReaderTestWithCurrentElfImage, ReadElfBuildId) {
|
||
|
|
ElfBuildIdBuffer build_id;
|
||
|
|
size_t build_id_size = ReadElfBuildId(&__executable_start, true, build_id);
|
||
|
|
ASSERT_NE(build_id_size, 0u);
|
||
|
|
|
||
|
|
#if defined(OFFICIAL_BUILD)
|
||
|
|
constexpr size_t kExpectedBuildIdStringLength = 40; // SHA1 hash in hex.
|
||
|
|
#else
|
||
|
|
constexpr size_t kExpectedBuildIdStringLength = 16; // 64-bit int in hex.
|
||
|
|
#endif
|
||
|
|
|
||
|
|
EXPECT_EQ(kExpectedBuildIdStringLength, build_id_size);
|
||
|
|
for (size_t i = 0; i < build_id_size; ++i) {
|
||
|
|
char c = build_id[i];
|
||
|
|
EXPECT_TRUE(IsHexDigit(c));
|
||
|
|
EXPECT_FALSE(IsAsciiLower(c));
|
||
|
|
}
|
||
|
|
}
|
||
|
|
|
||
|
|
TEST(ElfReaderTestWithCurrentImage, ReadElfBuildId) {
|
||
|
|
#if BUILDFLAG(IS_ANDROID)
|
||
|
|
// On Android the library loader memory maps the full so file.
|
||
|
|
const char kLibraryName[] = "libbase_unittests__library";
|
||
|
|
const void* addr = &__executable_start;
|
||
|
|
#else
|
||
|
|
const char kLibraryName[] = MALLOC_WRAPPER_LIB;
|
||
|
|
// On Linux the executable does not contain soname and is not mapped till
|
||
|
|
// dynamic segment. So, use malloc wrapper so file on which the test already
|
||
|
|
// depends on.
|
||
|
|
// Find any symbol in the loaded file.
|
||
|
|
//
|
||
|
|
NativeLibraryLoadError error;
|
||
|
|
NativeLibrary library =
|
||
|
|
LoadNativeLibrary(base::FilePath(kLibraryName), &error);
|
||
|
|
void* init_addr =
|
||
|
|
GetFunctionPointerFromNativeLibrary(library, "MallocWrapper");
|
||
|
|
|
||
|
|
// Use this symbol to get full path to the loaded library.
|
||
|
|
Dl_info info;
|
||
|
|
int res = dladdr(init_addr, &info);
|
||
|
|
ASSERT_NE(0, res);
|
||
|
|
const void* addr = info.dli_fbase;
|
||
|
|
#endif
|
||
|
|
|
||
|
|
auto name = ReadElfLibraryName(addr);
|
||
|
|
ASSERT_TRUE(name);
|
||
|
|
EXPECT_NE(std::string::npos, name->find(kLibraryName))
|
||
|
|
<< "Library name " << *name << " doesn't contain expected "
|
||
|
|
<< kLibraryName;
|
||
|
|
|
||
|
|
#if !BUILDFLAG(IS_ANDROID)
|
||
|
|
UnloadNativeLibrary(library);
|
||
|
|
#endif
|
||
|
|
}
|
||
|
|
|
||
|
|
} // namespace debug
|
||
|
|
} // namespace base
|