""" Test basics of Minidump debugging. """ import lldb import os from lldbsuite.test.decorators import * from lldbsuite.test.lldbtest import * from lldbsuite.test import lldbutil class MiniDumpUUIDTestCase(TestBase): NO_DEBUG_INFO_TESTCASE = True def verify_module(self, module, verify_path, verify_uuid): # Compare the filename and the directory separately. We are avoiding # SBFileSpec.fullpath because it causes a slash/backslash confusion # on Windows. Similarly, we compare the directories using normcase # because they may contain a Linux-style relative path from the # minidump appended to a Windows-style root path from the host. self.assertEqual(os.path.basename(verify_path), module.GetFileSpec().basename) self.assertEqual( os.path.normcase(os.path.dirname(verify_path)), os.path.normcase(module.GetFileSpec().dirname or ""), ) self.assertEqual(verify_uuid, module.GetUUIDString()) def get_minidump_modules(self, yaml_file, exe=None): minidump_path = self.getBuildArtifact(os.path.basename(yaml_file) + ".dmp") self.yaml2obj(yaml_file, minidump_path) self.target = self.dbg.CreateTarget(exe) self.process = self.target.LoadCore(minidump_path) return self.target.modules def test_zero_uuid_modules(self): """ Test multiple modules having a MINIDUMP_MODULE.CvRecord that is valid, but contains a PDB70 value whose age is zero and whose UUID values are all zero. Prior to a fix all such modules would be duplicated to the first one since the UUIDs claimed to be valid and all zeroes. Now we ensure that the UUID is not valid for each module and that we have each of the modules in the target after loading the core """ modules = self.get_minidump_modules("linux-arm-zero-uuids.yaml") self.assertEqual(2, len(modules)) self.verify_module(modules[0], "/file/does/not/exist/a", None) self.verify_module(modules[1], "/file/does/not/exist/b", None) def test_uuid_modules_no_age(self): """ Test multiple modules having a MINIDUMP_MODULE.CvRecord that is valid, and contains a PDB70 value whose age is zero and whose UUID values are valid. Ensure we decode the UUID and don't include the age field in the UUID. """ modules = self.get_minidump_modules("linux-arm-uuids-no-age.yaml") modules = self.target.modules self.assertEqual(2, len(modules)) self.verify_module(modules[0], "/tmp/a", "01020304-0506-0708-090A-0B0C0D0E0F10") self.verify_module(modules[1], "/tmp/b", "0A141E28-323C-4650-5A64-6E78828C96A0") def test_uuid_modules_no_age_apple(self): """ Test multiple modules having a MINIDUMP_MODULE.CvRecord that is valid, and contains a PDB70 value whose age is zero and whose UUID values are valid. Ensure we decode the UUID and don't include the age field in the UUID. Also ensure that the first uint32_t is byte swapped, along with the next two uint16_t values. Breakpad incorrectly byte swaps these values when it saves Darwin minidump files. """ modules = self.get_minidump_modules("macos-arm-uuids-no-age.yaml") modules = self.target.modules self.assertEqual(2, len(modules)) self.verify_module(modules[0], "/tmp/a", "04030201-0605-0807-090A-0B0C0D0E0F10") self.verify_module(modules[1], "/tmp/b", "281E140A-3C32-5046-5A64-6E78828C96A0") def test_uuid_modules_with_age(self): """ Test multiple modules having a MINIDUMP_MODULE.CvRecord that is valid, and contains a PDB70 value whose age is valid and whose UUID values are valid. Ensure we decode the UUID and include the age field in the UUID. """ modules = self.get_minidump_modules("linux-arm-uuids-with-age.yaml") self.assertEqual(2, len(modules)) self.verify_module( modules[0], "/tmp/a", "01020304-0506-0708-090A-0B0C0D0E0F10-10101010" ) self.verify_module( modules[1], "/tmp/b", "0A141E28-323C-4650-5A64-6E78828C96A0-20202020" ) def test_uuid_modules_elf_build_id_16(self): """ Test multiple modules having a MINIDUMP_MODULE.CvRecord that is valid, and contains an ELF build ID whose value is valid and is 16 bytes long. """ modules = self.get_minidump_modules("linux-arm-uuids-elf-build-id-16.yaml") self.assertEqual(2, len(modules)) self.verify_module(modules[0], "/tmp/a", "01020304-0506-0708-090A-0B0C0D0E0F10") self.verify_module(modules[1], "/tmp/b", "0A141E28-323C-4650-5A64-6E78828C96A0") def test_uuid_modules_elf_build_id_20(self): """ Test multiple modules having a MINIDUMP_MODULE.CvRecord that is valid, and contains an ELF build ID whose value is valid and is 20 bytes long. """ modules = self.get_minidump_modules("linux-arm-uuids-elf-build-id-20.yaml") self.assertEqual(2, len(modules)) self.verify_module( modules[0], "/tmp/a", "01020304-0506-0708-090A-0B0C0D0E0F10-11121314" ) self.verify_module( modules[1], "/tmp/b", "0A141E28-323C-4650-5A64-6E78828C96A0-AAB4BEC8" ) def test_uuid_modules_elf_build_id_zero(self): """ Test multiple modules having a MINIDUMP_MODULE.CvRecord that is valid, and contains an ELF build ID whose value is all zero. """ modules = self.get_minidump_modules("linux-arm-uuids-elf-build-id-zero.yaml") self.assertEqual(2, len(modules)) self.verify_module(modules[0], "/not/exist/a", None) self.verify_module(modules[1], "/not/exist/b", None) def test_uuid_modules_elf_build_id_same(self): """ Test multiple modules having a MINIDUMP_MODULE.CvRecord that is valid, and contains an ELF build ID whose value is the same. There is an assert in the PlaceholderObjectFile that was firing when we encountered this which was crashing the process that was checking if PlaceholderObjectFile.m_base was the same as the address this fake module was being loaded at. We need to ensure we don't crash in such cases and that we add both modules even though they have the same UUID. """ modules = self.get_minidump_modules("linux-arm-same-uuids.yaml") self.assertEqual(2, len(modules)) self.verify_module( modules[0], "/file/does/not/exist/a", "11223344-1122-3344-1122-334411223344-11223344", ) self.verify_module( modules[1], "/file/does/not/exist/b", "11223344-1122-3344-1122-334411223344-11223344", ) def test_partial_uuid_match(self): """ Breakpad has been known to create minidump files using CvRecord in each module whose signature is set to PDB70 where the UUID only contains the first 16 bytes of a 20 byte ELF build ID. Code was added to ProcessMinidump.cpp to deal with this and allows partial UUID matching. This test verifies that if we have a minidump with a 16 byte UUID, that we are able to associate a symbol file with a 20 byte UUID only if the first 16 bytes match. In this case we will see the path from the file we found in the test directory and the 20 byte UUID from the actual file, not the 16 byte shortened UUID from the minidump. """ so_path = self.getBuildArtifact("libuuidmatch.so") self.yaml2obj("libuuidmatch.yaml", so_path) cmd = 'settings set target.exec-search-paths "%s"' % (os.path.dirname(so_path)) self.dbg.HandleCommand(cmd) modules = self.get_minidump_modules("linux-arm-partial-uuids-match.yaml") self.assertEqual(1, len(modules)) self.verify_module( modules[0], so_path, "7295E17C-6668-9E05-CBB5-DEE5003865D5-5267C116" ) def test_partial_uuid_mismatch(self): """ Breakpad has been known to create minidump files using CvRecord in each module whose signature is set to PDB70 where the UUID only contains the first 16 bytes of a 20 byte ELF build ID. Code was added to ProcessMinidump.cpp to deal with this and allows partial UUID matching. This test verifies that if we have a minidump with a 16 byte UUID, that we are not able to associate a symbol file with a 20 byte UUID only if any of the first 16 bytes do not match. In this case we will see the UUID from the minidump file and the path from the minidump file. """ so_path = self.getBuildArtifact("libuuidmismatch.so") self.yaml2obj("libuuidmismatch.yaml", so_path) cmd = 'settings set target.exec-search-paths "%s"' % (os.path.dirname(so_path)) self.dbg.HandleCommand(cmd) modules = self.get_minidump_modules("linux-arm-partial-uuids-mismatch.yaml") self.assertEqual(1, len(modules)) self.verify_module( modules[0], "/invalid/path/on/current/system/libuuidmismatch.so", "7295E17C-6668-9E05-CBB5-DEE5003865D5", ) def test_breakpad_hash_match(self): """ Breakpad creates minidump files using CvRecord in each module whose signature is set to PDB70 where the UUID is a hash generated by breakpad of the .text section. This is only done when the executable has no ELF build ID. This test verifies that if we have a minidump with a 16 byte UUID, that we are able to associate a symbol file with no ELF build ID and match it up by hashing the .text section. """ so_path = self.getBuildArtifact("libbreakpad.so") self.yaml2obj("libbreakpad.yaml", so_path) cmd = 'settings set target.exec-search-paths "%s"' % (os.path.dirname(so_path)) self.dbg.HandleCommand(cmd) modules = self.get_minidump_modules("linux-arm-breakpad-uuid-match.yaml") self.assertEqual(1, len(modules)) # LLDB makes up it own UUID as well when there is no build ID so we # will check that this matches. self.verify_module(modules[0], so_path, "D9C480E8") def test_breakpad_hash_match_sysroot(self): """ Check that we can match the breakpad .text section hash when the module is located under a user-provided sysroot. """ sysroot_path = os.path.join(self.getBuildDir(), "mock_sysroot") # Create the directory under the sysroot where the minidump reports # the module. so_dir = os.path.join( sysroot_path, "invalid", "path", "on", "current", "system" ) so_path = os.path.join(so_dir, "libbreakpad.so") lldbutil.mkdir_p(so_dir) self.yaml2obj("libbreakpad.yaml", so_path) self.runCmd("platform select remote-linux --sysroot '%s'" % sysroot_path) modules = self.get_minidump_modules("linux-arm-breakpad-uuid-match.yaml") self.assertEqual(1, len(modules)) # LLDB makes up its own UUID as well when there is no build ID so we # will check that this matches. self.verify_module(modules[0], so_path, "D9C480E8") def test_breakpad_hash_match_sysroot_decoy(self): """ Check that we can match the breakpad .text section hash when there is a module with the right name but wrong contents under a user-provided sysroot, and the right module is at the given search path.. """ sysroot_path = os.path.join(self.getBuildDir(), "mock_sysroot") # Create the directory under the sysroot where the minidump reports # the module. decoy_dir = os.path.join( sysroot_path, "invalid", "path", "on", "current", "system" ) decoy_path = os.path.join(decoy_dir, "libbreakpad.so") lldbutil.mkdir_p(decoy_dir) self.yaml2obj("libbreakpad-decoy.yaml", decoy_path) self.runCmd("platform select remote-linux --sysroot '%s'" % sysroot_path) so_dir = os.path.join(self.getBuildDir(), "searchpath_dir") so_path = os.path.join(so_dir, "libbreakpad.so") lldbutil.mkdir_p(so_dir) self.yaml2obj("libbreakpad.yaml", so_path) self.runCmd('settings set target.exec-search-paths "%s"' % so_dir) modules = self.get_minidump_modules("linux-arm-breakpad-uuid-match.yaml") self.assertEqual(1, len(modules)) # LLDB makes up its own UUID as well when there is no build ID so we # will check that this matches. self.verify_module(modules[0], so_path, "D9C480E8") def test_breakpad_overflow_hash_match(self): """ This is a similar to test_breakpad_hash_match, but it verifies that if the .text section does not end on a 16 byte boundary, then it will overflow into the next section's data by up to 15 bytes. This verifies that we are able to match what breakpad does as it will do this. """ so_path = self.getBuildArtifact("libbreakpad.so") self.yaml2obj("libbreakpad-overflow.yaml", so_path) cmd = 'settings set target.exec-search-paths "%s"' % (os.path.dirname(so_path)) self.dbg.HandleCommand(cmd) modules = self.get_minidump_modules("linux-arm-breakpad-uuid-match.yaml") self.assertEqual(1, len(modules)) # LLDB makes up it own UUID as well when there is no build ID so we # will check that this matches. self.verify_module(modules[0], so_path, "48EB9FD7") def test_breakpad_hash_match_exe_outside_sysroot(self): """ Check that we can match the breakpad .text section hash when the module is specified as the exe during launch, and a syroot is provided, which does not contain the exe. """ sysroot_path = os.path.join(self.getBuildDir(), "mock_sysroot") lldbutil.mkdir_p(sysroot_path) so_dir = os.path.join(self.getBuildDir(), "binary") so_path = os.path.join(so_dir, "libbreakpad.so") lldbutil.mkdir_p(so_dir) self.yaml2obj("libbreakpad.yaml", so_path) self.runCmd("platform select remote-linux --sysroot '%s'" % sysroot_path) modules = self.get_minidump_modules( "linux-arm-breakpad-uuid-match.yaml", so_path ) self.assertEqual(1, len(modules)) # LLDB makes up its own UUID as well when there is no build ID so we # will check that this matches. self.verify_module(modules[0], so_path, "D9C480E8") def test_facebook_hash_match(self): """ Breakpad creates minidump files using CvRecord in each module whose signature is set to PDB70 where the UUID is a hash generated by breakpad of the .text section and Facebook modified this hash to avoid collisions. This is only done when the executable has no ELF build ID. This test verifies that if we have a minidump with a 16 byte UUID, that we are able to associate a symbol file with no ELF build ID and match it up by hashing the .text section like Facebook does. """ so_path = self.getBuildArtifact("libbreakpad.so") self.yaml2obj("libbreakpad.yaml", so_path) cmd = 'settings set target.exec-search-paths "%s"' % (os.path.dirname(so_path)) self.dbg.HandleCommand(cmd) modules = self.get_minidump_modules("linux-arm-facebook-uuid-match.yaml") self.assertEqual(1, len(modules)) # LLDB makes up it own UUID as well when there is no build ID so we # will check that this matches. self.verify_module(modules[0], so_path, "D9C480E8") def test_relative_module_name(self): old_cwd = os.getcwd() self.addTearDownHook(lambda: os.chdir(old_cwd)) os.chdir(self.getBuildDir()) name = "file-with-a-name-unlikely-to-exist-in-the-current-directory.so" open(name, "a").close() modules = self.get_minidump_modules( self.getSourcePath("relative_module_name.yaml") ) self.assertEqual(1, len(modules)) self.verify_module(modules[0], name, None) def test_add_module_build_id_16(self): """ Test that adding module with 16 byte UUID returns the existing module or fails. """ modules = self.get_minidump_modules("linux-arm-uuids-elf-build-id-16.yaml") self.assertEqual(2, len(modules)) # Add the existing modules. self.assertEqual( modules[0], self.target.AddModule( "/some/local/a", "", "01020304-0506-0708-090A-0B0C0D0E0F10" ), ) self.assertEqual( modules[1], self.target.AddModule( "/some/local/b", "", "0A141E28-323C-4650-5A64-6E78828C96A0" ), ) # Adding modules with non-existing UUID should fail. self.assertFalse( self.target.AddModule( "a", "", "12345678-1234-1234-1234-123456789ABC" ).IsValid() ) self.assertFalse( self.target.AddModule( "a", "", "01020304-0506-0708-090A-0B0C0D0E0F10-12345678" ).IsValid() ) def test_add_module_build_id_20(self): """ Test that adding module with 20 byte UUID returns the existing module or fails. """ modules = self.get_minidump_modules("linux-arm-uuids-elf-build-id-20.yaml") # Add the existing modules. self.assertEqual( modules[0], self.target.AddModule( "/some/local/a", "", "01020304-0506-0708-090A-0B0C0D0E0F10-11121314" ), ) self.assertEqual( modules[1], self.target.AddModule( "/some/local/b", "", "0A141E28-323C-4650-5A64-6E78828C96A0-AAB4BEC8" ), ) # Adding modules with non-existing UUID should fail. self.assertFalse( self.target.AddModule( "a", "", "01020304-0506-0708-090A-0B0C0D0E0F10" ).IsValid() ) self.assertFalse( self.target.AddModule( "a", "", "01020304-0506-0708-090A-0B0C0D0E0F10-12345678" ).IsValid() ) def test_add_module_build_id_4(self): """ Test that adding module with 4 byte UUID returns the existing module or fails. """ modules = self.get_minidump_modules("linux-arm-uuids-elf-build-id-4.yaml") # Add the existing modules. self.assertEqual( modules[0], self.target.AddModule("/some/local/a.so", "", "01020304") ) self.assertEqual( modules[1], self.target.AddModule("/some/local/b.so", "", "0A141E28") ) # Adding modules with non-existing UUID should fail. self.assertFalse( self.target.AddModule( "a", "", "01020304-0506-0708-090A-0B0C0D0E0F10" ).IsValid() ) self.assertFalse(self.target.AddModule("a", "", "01020305").IsValid()) def test_remove_placeholder_add_real_module(self): """ Test that removing a placeholder module and adding back the real module succeeds. """ so_path = self.getBuildArtifact("libuuidmatch.so") self.yaml2obj("libuuidmatch.yaml", so_path) modules = self.get_minidump_modules("linux-arm-uuids-match.yaml") uuid = "7295E17C-6668-9E05-CBB5-DEE5003865D5-5267C116" self.assertEqual(1, len(modules)) self.verify_module(modules[0], "/target/path/libuuidmatch.so", uuid) self.target.RemoveModule(modules[0]) new_module = self.target.AddModule(so_path, "", uuid) self.verify_module(new_module, so_path, uuid) self.assertEqual(new_module, self.target.modules[0]) self.assertEqual(1, len(self.target.modules))