• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // Copyright 2009, Google Inc.
2 // All rights reserved.
3 //
4 // Redistribution and use in source and binary forms, with or without
5 // modification, are permitted provided that the following conditions are
6 // met:
7 //
8 //     * Redistributions of source code must retain the above copyright
9 // notice, this list of conditions and the following disclaimer.
10 //     * Redistributions in binary form must reproduce the above
11 // copyright notice, this list of conditions and the following disclaimer
12 // in the documentation and/or other materials provided with the
13 // distribution.
14 //     * Neither the name of Google Inc. nor the names of its
15 // contributors may be used to endorse or promote products derived from
16 // this software without specific prior written permission.
17 //
18 // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
19 // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
20 // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
21 // A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
22 // OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
23 // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
24 // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25 // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26 // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27 // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
28 // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
29 
30 #include <windows.h>
31 #include <dbghelp.h>
32 #include <strsafe.h>
33 #include <objbase.h>
34 #include <shellapi.h>
35 
36 #include <string>
37 
38 #include "breakpad_googletest_includes.h"
39 #include "client/windows/crash_generation/crash_generation_server.h"
40 #include "client/windows/handler/exception_handler.h"
41 #include "client/windows/unittests/exception_handler_test.h"
42 #include "common/windows/string_utils-inl.h"
43 #include "google_breakpad/processor/minidump.h"
44 
45 namespace {
46 
47 using std::wstring;
48 using namespace google_breakpad;
49 
50 const wchar_t kPipeName[] = L"\\\\.\\pipe\\BreakpadCrashTest\\TestCaseServer";
51 const char kSuccessIndicator[] = "success";
52 const char kFailureIndicator[] = "failure";
53 
54 // Utility function to test for a path's existence.
55 BOOL DoesPathExist(const TCHAR *path_name);
56 
57 enum OutOfProcGuarantee {
58   OUT_OF_PROC_GUARANTEED,
59   OUT_OF_PROC_BEST_EFFORT,
60 };
61 
62 class ExceptionHandlerDeathTest : public ::testing::Test {
63  protected:
64   // Member variable for each test that they can use
65   // for temporary storage.
66   TCHAR temp_path_[MAX_PATH];
67   // Actually constructs a temp path name.
68   virtual void SetUp();
69   // A helper method that tests can use to crash.
70   void DoCrashAccessViolation(const OutOfProcGuarantee out_of_proc_guarantee);
71   void DoCrashPureVirtualCall();
72 };
73 
SetUp()74 void ExceptionHandlerDeathTest::SetUp() {
75   const ::testing::TestInfo* const test_info =
76     ::testing::UnitTest::GetInstance()->current_test_info();
77   TCHAR temp_path[MAX_PATH] = { '\0' };
78   TCHAR test_name_wide[MAX_PATH] = { '\0' };
79   // We want the temporary directory to be what the OS returns
80   // to us, + the test case name.
81   GetTempPath(MAX_PATH, temp_path);
82   // The test case name is exposed as a c-style string,
83   // convert it to a wchar_t string.
84   int dwRet = MultiByteToWideChar(CP_ACP, 0, test_info->name(),
85                                   strlen(test_info->name()),
86                                   test_name_wide,
87                                   MAX_PATH);
88   if (!dwRet) {
89     assert(false);
90   }
91   StringCchPrintfW(temp_path_, MAX_PATH, L"%s%s", temp_path, test_name_wide);
92   CreateDirectory(temp_path_, NULL);
93 }
94 
DoesPathExist(const TCHAR * path_name)95 BOOL DoesPathExist(const TCHAR *path_name) {
96   DWORD flags = GetFileAttributes(path_name);
97   if (flags == INVALID_FILE_ATTRIBUTES) {
98     return FALSE;
99   }
100   return TRUE;
101 }
102 
MinidumpWrittenCallback(const wchar_t * dump_path,const wchar_t * minidump_id,void * context,EXCEPTION_POINTERS * exinfo,MDRawAssertionInfo * assertion,bool succeeded)103 bool MinidumpWrittenCallback(const wchar_t* dump_path,
104                              const wchar_t* minidump_id,
105                              void* context,
106                              EXCEPTION_POINTERS* exinfo,
107                              MDRawAssertionInfo* assertion,
108                              bool succeeded) {
109   if (succeeded && DoesPathExist(dump_path)) {
110     fprintf(stderr, kSuccessIndicator);
111   } else {
112     fprintf(stderr, kFailureIndicator);
113   }
114   // If we don't flush, the output doesn't get sent before
115   // this process dies.
116   fflush(stderr);
117   return succeeded;
118 }
119 
TEST_F(ExceptionHandlerDeathTest,InProcTest)120 TEST_F(ExceptionHandlerDeathTest, InProcTest) {
121   // For the in-proc test, we just need to instantiate an exception
122   // handler in in-proc mode, and crash.   Since the entire test is
123   // reexecuted in the child process, we don't have to worry about
124   // the semantics of the exception handler being inherited/not
125   // inherited across CreateProcess().
126   ASSERT_TRUE(DoesPathExist(temp_path_));
127   scoped_ptr<google_breakpad::ExceptionHandler> exc(
128       new google_breakpad::ExceptionHandler(
129           temp_path_,
130           NULL,
131           &MinidumpWrittenCallback,
132           NULL,
133           google_breakpad::ExceptionHandler::HANDLER_ALL));
134 
135   // Disable GTest SEH handler
136   testing::DisableExceptionHandlerInScope disable_exception_handler;
137 
138   int *i = NULL;
139   ASSERT_DEATH((*i)++, kSuccessIndicator);
140 }
141 
142 static bool gDumpCallbackCalled = false;
143 
clientDumpCallback(void * dump_context,const google_breakpad::ClientInfo * client_info,const std::wstring * dump_path)144 void clientDumpCallback(void *dump_context,
145                         const google_breakpad::ClientInfo *client_info,
146                         const std::wstring *dump_path) {
147   gDumpCallbackCalled = true;
148 }
149 
DoCrashAccessViolation(const OutOfProcGuarantee out_of_proc_guarantee)150 void ExceptionHandlerDeathTest::DoCrashAccessViolation(
151     const OutOfProcGuarantee out_of_proc_guarantee) {
152   scoped_ptr<google_breakpad::ExceptionHandler> exc;
153 
154   if (out_of_proc_guarantee == OUT_OF_PROC_GUARANTEED) {
155     google_breakpad::CrashGenerationClient *client =
156         new google_breakpad::CrashGenerationClient(kPipeName,
157                                                    MiniDumpNormal,
158                                                    NULL);  // custom_info
159     ASSERT_TRUE(client->Register());
160     exc.reset(new google_breakpad::ExceptionHandler(
161         temp_path_,
162         NULL,   // filter
163         NULL,   // callback
164         NULL,   // callback_context
165         google_breakpad::ExceptionHandler::HANDLER_ALL,
166         client));
167   } else {
168     ASSERT_TRUE(out_of_proc_guarantee == OUT_OF_PROC_BEST_EFFORT);
169     exc.reset(new google_breakpad::ExceptionHandler(
170         temp_path_,
171         NULL,   // filter
172         NULL,   // callback
173         NULL,   // callback_context
174         google_breakpad::ExceptionHandler::HANDLER_ALL,
175         MiniDumpNormal,
176         kPipeName,
177         NULL));  // custom_info
178   }
179 
180   // Disable GTest SEH handler
181   testing::DisableExceptionHandlerInScope disable_exception_handler;
182 
183   // Although this is executing in the child process of the death test,
184   // if it's not true we'll still get an error rather than the crash
185   // being expected.
186   ASSERT_TRUE(exc->IsOutOfProcess());
187   int *i = NULL;
188   printf("%d\n", (*i)++);
189 }
190 
TEST_F(ExceptionHandlerDeathTest,OutOfProcTest)191 TEST_F(ExceptionHandlerDeathTest, OutOfProcTest) {
192   // We can take advantage of a detail of google test here to save some
193   // complexity in testing: when you do a death test, it actually forks.
194   // So we can make the main test harness the crash generation server,
195   // and call ASSERT_DEATH on a NULL dereference, it to expecting test
196   // the out of process scenario, since it's happening in a different
197   // process!  This is different from the above because, above, we pass
198   // a NULL pipe name, and we also don't start a crash generation server.
199 
200   ASSERT_TRUE(DoesPathExist(temp_path_));
201   std::wstring dump_path(temp_path_);
202   google_breakpad::CrashGenerationServer server(
203       kPipeName, NULL, NULL, NULL, &clientDumpCallback, NULL, NULL, NULL, NULL,
204       NULL, true, &dump_path);
205 
206   // This HAS to be EXPECT_, because when this test case is executed in the
207   // child process, the server registration will fail due to the named pipe
208   // being the same.
209   EXPECT_TRUE(server.Start());
210   gDumpCallbackCalled = false;
211   ASSERT_DEATH(this->DoCrashAccessViolation(OUT_OF_PROC_BEST_EFFORT), "");
212   EXPECT_TRUE(gDumpCallbackCalled);
213 }
214 
TEST_F(ExceptionHandlerDeathTest,OutOfProcGuaranteedTest)215 TEST_F(ExceptionHandlerDeathTest, OutOfProcGuaranteedTest) {
216   // This is similar to the previous test (OutOfProcTest).  The only difference
217   // is that in this test, the crash generation client is created and registered
218   // with the crash generation server outside of the ExceptionHandler
219   // constructor which allows breakpad users to opt out of the default
220   // in-process dump generation when the registration with the crash generation
221   // server fails.
222 
223   ASSERT_TRUE(DoesPathExist(temp_path_));
224   std::wstring dump_path(temp_path_);
225   google_breakpad::CrashGenerationServer server(
226       kPipeName, NULL, NULL, NULL, &clientDumpCallback, NULL, NULL, NULL, NULL,
227       NULL, true, &dump_path);
228 
229   // This HAS to be EXPECT_, because when this test case is executed in the
230   // child process, the server registration will fail due to the named pipe
231   // being the same.
232   EXPECT_TRUE(server.Start());
233   gDumpCallbackCalled = false;
234   ASSERT_DEATH(this->DoCrashAccessViolation(OUT_OF_PROC_GUARANTEED), "");
235   EXPECT_TRUE(gDumpCallbackCalled);
236 }
237 
TEST_F(ExceptionHandlerDeathTest,InvalidParameterTest)238 TEST_F(ExceptionHandlerDeathTest, InvalidParameterTest) {
239   using google_breakpad::ExceptionHandler;
240 
241   ASSERT_TRUE(DoesPathExist(temp_path_));
242   ExceptionHandler handler(temp_path_, NULL, NULL, NULL,
243                            ExceptionHandler::HANDLER_INVALID_PARAMETER);
244 
245   // Disable the message box for assertions
246   _CrtSetReportMode(_CRT_ASSERT, 0);
247 
248   // Call with a bad argument. The invalid parameter will be swallowed
249   // and a dump will be generated, the process will exit(0).
250   ASSERT_EXIT(printf(NULL), ::testing::ExitedWithCode(0), "");
251 }
252 
253 
254 struct PureVirtualCallBase {
PureVirtualCallBase__anon419f23880111::PureVirtualCallBase255   PureVirtualCallBase() {
256     // We have to reinterpret so the linker doesn't get confused because the
257     // method isn't defined.
258     reinterpret_cast<PureVirtualCallBase*>(this)->PureFunction();
259   }
~PureVirtualCallBase__anon419f23880111::PureVirtualCallBase260   virtual ~PureVirtualCallBase() {}
261   virtual void PureFunction() const = 0;
262 };
263 struct PureVirtualCall : public PureVirtualCallBase {
PureVirtualCall__anon419f23880111::PureVirtualCall264   PureVirtualCall() { PureFunction(); }
PureFunction__anon419f23880111::PureVirtualCall265   virtual void PureFunction() const {}
266 };
267 
DoCrashPureVirtualCall()268 void ExceptionHandlerDeathTest::DoCrashPureVirtualCall() {
269   PureVirtualCall instance;
270 }
271 
TEST_F(ExceptionHandlerDeathTest,PureVirtualCallTest)272 TEST_F(ExceptionHandlerDeathTest, PureVirtualCallTest) {
273   using google_breakpad::ExceptionHandler;
274 
275   ASSERT_TRUE(DoesPathExist(temp_path_));
276   ExceptionHandler handler(temp_path_, NULL, NULL, NULL,
277                            ExceptionHandler::HANDLER_PURECALL);
278 
279   // Disable the message box for assertions
280   _CrtSetReportMode(_CRT_ASSERT, 0);
281 
282   // Calls a pure virtual function.
283   EXPECT_EXIT(DoCrashPureVirtualCall(), ::testing::ExitedWithCode(0), "");
284 }
285 
find_minidump_in_directory(const wstring & directory)286 wstring find_minidump_in_directory(const wstring &directory) {
287   wstring search_path = directory + L"\\*";
288   WIN32_FIND_DATA find_data;
289   HANDLE find_handle = FindFirstFileW(search_path.c_str(), &find_data);
290   if (find_handle == INVALID_HANDLE_VALUE)
291     return wstring();
292 
293   wstring filename;
294   do {
295     const wchar_t extension[] = L".dmp";
296     const int extension_length = sizeof(extension) / sizeof(extension[0]) - 1;
297     const int filename_length = wcslen(find_data.cFileName);
298     if (filename_length > extension_length &&
299     wcsncmp(extension,
300             find_data.cFileName + filename_length - extension_length,
301             extension_length) == 0) {
302       filename = directory + L"\\" + find_data.cFileName;
303       break;
304     }
305   } while (FindNextFile(find_handle, &find_data));
306   FindClose(find_handle);
307   return filename;
308 }
309 
310 #ifndef ADDRESS_SANITIZER
311 
TEST_F(ExceptionHandlerDeathTest,InstructionPointerMemory)312 TEST_F(ExceptionHandlerDeathTest, InstructionPointerMemory) {
313   ASSERT_TRUE(DoesPathExist(temp_path_));
314   scoped_ptr<google_breakpad::ExceptionHandler> exc(
315       new google_breakpad::ExceptionHandler(
316           temp_path_,
317           NULL,
318           NULL,
319           NULL,
320           google_breakpad::ExceptionHandler::HANDLER_ALL));
321 
322   // Disable GTest SEH handler
323   testing::DisableExceptionHandlerInScope disable_exception_handler;
324 
325   // Get some executable memory.
326   const uint32_t kMemorySize = 256;  // bytes
327   const int kOffset = kMemorySize / 2;
328   // This crashes with SIGILL on x86/x86-64/arm.
329   const unsigned char instructions[] = { 0xff, 0xff, 0xff, 0xff };
330   char* memory = reinterpret_cast<char*>(VirtualAlloc(NULL,
331                                                       kMemorySize,
332                                                       MEM_COMMIT | MEM_RESERVE,
333                                                       PAGE_EXECUTE_READWRITE));
334   ASSERT_TRUE(memory);
335 
336   // Write some instructions that will crash. Put them
337   // in the middle of the block of memory, because the
338   // minidump should contain 128 bytes on either side of the
339   // instruction pointer.
340   memcpy(memory + kOffset, instructions, sizeof(instructions));
341 
342   // Now execute the instructions, which should crash.
343   typedef void (*void_function)(void);
344   void_function memory_function =
345       reinterpret_cast<void_function>(memory + kOffset);
346   ASSERT_DEATH(memory_function(), "");
347 
348   // free the memory.
349   VirtualFree(memory, 0, MEM_RELEASE);
350 
351   // Verify that the resulting minidump contains the memory around the IP
352   wstring minidump_filename_wide = find_minidump_in_directory(temp_path_);
353   ASSERT_FALSE(minidump_filename_wide.empty());
354   string minidump_filename;
355   ASSERT_TRUE(WindowsStringUtils::safe_wcstombs(minidump_filename_wide,
356                                                 &minidump_filename));
357 
358   // Read the minidump. Locate the exception record and the
359   // memory list, and then ensure that there is a memory region
360   // in the memory list that covers the instruction pointer from
361   // the exception record.
362   {
363     Minidump minidump(minidump_filename);
364     ASSERT_TRUE(minidump.Read());
365 
366     MinidumpException* exception = minidump.GetException();
367     MinidumpMemoryList* memory_list = minidump.GetMemoryList();
368     ASSERT_TRUE(exception);
369     ASSERT_TRUE(memory_list);
370     ASSERT_LT((unsigned)0, memory_list->region_count());
371 
372     MinidumpContext* context = exception->GetContext();
373     ASSERT_TRUE(context);
374 
375     uint64_t instruction_pointer;
376     ASSERT_TRUE(context->GetInstructionPointer(&instruction_pointer));
377 
378     MinidumpMemoryRegion* region =
379         memory_list->GetMemoryRegionForAddress(instruction_pointer);
380     ASSERT_TRUE(region);
381 
382     EXPECT_EQ(kMemorySize, region->GetSize());
383     const uint8_t* bytes = region->GetMemory();
384     ASSERT_TRUE(bytes);
385 
386     uint8_t prefix_bytes[kOffset];
387     uint8_t suffix_bytes[kMemorySize - kOffset - sizeof(instructions)];
388     memset(prefix_bytes, 0, sizeof(prefix_bytes));
389     memset(suffix_bytes, 0, sizeof(suffix_bytes));
390     EXPECT_EQ(0, memcmp(bytes, prefix_bytes, sizeof(prefix_bytes)));
391     EXPECT_EQ(0, memcmp(bytes + kOffset, instructions, sizeof(instructions)));
392     EXPECT_EQ(0, memcmp(bytes + kOffset + sizeof(instructions),
393                         suffix_bytes, sizeof(suffix_bytes)));
394   }
395 
396   DeleteFileW(minidump_filename_wide.c_str());
397 }
398 
TEST_F(ExceptionHandlerDeathTest,InstructionPointerMemoryMinBound)399 TEST_F(ExceptionHandlerDeathTest, InstructionPointerMemoryMinBound) {
400   ASSERT_TRUE(DoesPathExist(temp_path_));
401   scoped_ptr<google_breakpad::ExceptionHandler> exc(
402       new google_breakpad::ExceptionHandler(
403           temp_path_,
404           NULL,
405           NULL,
406           NULL,
407           google_breakpad::ExceptionHandler::HANDLER_ALL));
408 
409   // Disable GTest SEH handler
410   testing::DisableExceptionHandlerInScope disable_exception_handler;
411 
412   SYSTEM_INFO sSysInfo;         // Useful information about the system
413   GetSystemInfo(&sSysInfo);     // Initialize the structure.
414 
415   const uint32_t kMemorySize = 256;  // bytes
416   const DWORD kPageSize = sSysInfo.dwPageSize;
417   const int kOffset = 0;
418   // This crashes with SIGILL on x86/x86-64/arm.
419   const unsigned char instructions[] = { 0xff, 0xff, 0xff, 0xff };
420   // Get some executable memory. Specifically, reserve two pages,
421   // but only commit the second.
422   char* all_memory = reinterpret_cast<char*>(VirtualAlloc(NULL,
423                                                           kPageSize * 2,
424                                                           MEM_RESERVE,
425                                                           PAGE_NOACCESS));
426   ASSERT_TRUE(all_memory);
427   char* memory = all_memory + kPageSize;
428   ASSERT_TRUE(VirtualAlloc(memory, kPageSize,
429                            MEM_COMMIT, PAGE_EXECUTE_READWRITE));
430 
431   // Write some instructions that will crash. Put them
432   // in the middle of the block of memory, because the
433   // minidump should contain 128 bytes on either side of the
434   // instruction pointer.
435   memcpy(memory + kOffset, instructions, sizeof(instructions));
436 
437   // Now execute the instructions, which should crash.
438   typedef void (*void_function)(void);
439   void_function memory_function =
440       reinterpret_cast<void_function>(memory + kOffset);
441   ASSERT_DEATH(memory_function(), "");
442 
443   // free the memory.
444   VirtualFree(memory, 0, MEM_RELEASE);
445 
446   // Verify that the resulting minidump contains the memory around the IP
447   wstring minidump_filename_wide = find_minidump_in_directory(temp_path_);
448   ASSERT_FALSE(minidump_filename_wide.empty());
449   string minidump_filename;
450   ASSERT_TRUE(WindowsStringUtils::safe_wcstombs(minidump_filename_wide,
451                                                 &minidump_filename));
452 
453   // Read the minidump. Locate the exception record and the
454   // memory list, and then ensure that there is a memory region
455   // in the memory list that covers the instruction pointer from
456   // the exception record.
457   {
458     Minidump minidump(minidump_filename);
459     ASSERT_TRUE(minidump.Read());
460 
461     MinidumpException* exception = minidump.GetException();
462     MinidumpMemoryList* memory_list = minidump.GetMemoryList();
463     ASSERT_TRUE(exception);
464     ASSERT_TRUE(memory_list);
465     ASSERT_LT((unsigned)0, memory_list->region_count());
466 
467     MinidumpContext* context = exception->GetContext();
468     ASSERT_TRUE(context);
469 
470     uint64_t instruction_pointer;
471     ASSERT_TRUE(context->GetInstructionPointer(&instruction_pointer));
472 
473     MinidumpMemoryRegion* region =
474         memory_list->GetMemoryRegionForAddress(instruction_pointer);
475     ASSERT_TRUE(region);
476 
477     EXPECT_EQ(kMemorySize / 2, region->GetSize());
478     const uint8_t* bytes = region->GetMemory();
479     ASSERT_TRUE(bytes);
480 
481     uint8_t suffix_bytes[kMemorySize / 2 - sizeof(instructions)];
482     memset(suffix_bytes, 0, sizeof(suffix_bytes));
483     EXPECT_TRUE(memcmp(bytes + kOffset,
484                        instructions, sizeof(instructions)) == 0);
485     EXPECT_TRUE(memcmp(bytes + kOffset + sizeof(instructions),
486                        suffix_bytes, sizeof(suffix_bytes)) == 0);
487   }
488 
489   DeleteFileW(minidump_filename_wide.c_str());
490 }
491 
TEST_F(ExceptionHandlerDeathTest,InstructionPointerMemoryMaxBound)492 TEST_F(ExceptionHandlerDeathTest, InstructionPointerMemoryMaxBound) {
493   ASSERT_TRUE(DoesPathExist(temp_path_));
494   scoped_ptr<google_breakpad::ExceptionHandler> exc(
495       new google_breakpad::ExceptionHandler(
496           temp_path_,
497           NULL,
498           NULL,
499           NULL,
500           google_breakpad::ExceptionHandler::HANDLER_ALL));
501 
502   // Disable GTest SEH handler
503   testing::DisableExceptionHandlerInScope disable_exception_handler;
504 
505   SYSTEM_INFO sSysInfo;         // Useful information about the system
506   GetSystemInfo(&sSysInfo);     // Initialize the structure.
507 
508   const DWORD kPageSize = sSysInfo.dwPageSize;
509   // This crashes with SIGILL on x86/x86-64/arm.
510   const unsigned char instructions[] = { 0xff, 0xff, 0xff, 0xff };
511   const int kOffset = kPageSize - sizeof(instructions);
512   // Get some executable memory. Specifically, reserve two pages,
513   // but only commit the first.
514   char* memory = reinterpret_cast<char*>(VirtualAlloc(NULL,
515                                                       kPageSize * 2,
516                                                       MEM_RESERVE,
517                                                       PAGE_NOACCESS));
518   ASSERT_TRUE(memory);
519   ASSERT_TRUE(VirtualAlloc(memory, kPageSize,
520                            MEM_COMMIT, PAGE_EXECUTE_READWRITE));
521 
522   // Write some instructions that will crash.
523   memcpy(memory + kOffset, instructions, sizeof(instructions));
524 
525   // Now execute the instructions, which should crash.
526   typedef void (*void_function)(void);
527   void_function memory_function =
528       reinterpret_cast<void_function>(memory + kOffset);
529   ASSERT_DEATH(memory_function(), "");
530 
531   // free the memory.
532   VirtualFree(memory, 0, MEM_RELEASE);
533 
534   // Verify that the resulting minidump contains the memory around the IP
535   wstring minidump_filename_wide = find_minidump_in_directory(temp_path_);
536   ASSERT_FALSE(minidump_filename_wide.empty());
537   string minidump_filename;
538   ASSERT_TRUE(WindowsStringUtils::safe_wcstombs(minidump_filename_wide,
539                                                 &minidump_filename));
540 
541   // Read the minidump. Locate the exception record and the
542   // memory list, and then ensure that there is a memory region
543   // in the memory list that covers the instruction pointer from
544   // the exception record.
545   {
546     Minidump minidump(minidump_filename);
547     ASSERT_TRUE(minidump.Read());
548 
549     MinidumpException* exception = minidump.GetException();
550     MinidumpMemoryList* memory_list = minidump.GetMemoryList();
551     ASSERT_TRUE(exception);
552     ASSERT_TRUE(memory_list);
553     ASSERT_LT((unsigned)0, memory_list->region_count());
554 
555     MinidumpContext* context = exception->GetContext();
556     ASSERT_TRUE(context);
557 
558     uint64_t instruction_pointer;
559     ASSERT_TRUE(context->GetInstructionPointer(&instruction_pointer));
560 
561     MinidumpMemoryRegion* region =
562         memory_list->GetMemoryRegionForAddress(instruction_pointer);
563     ASSERT_TRUE(region);
564 
565     const size_t kPrefixSize = 128;  // bytes
566     EXPECT_EQ(kPrefixSize + sizeof(instructions), region->GetSize());
567     const uint8_t* bytes = region->GetMemory();
568     ASSERT_TRUE(bytes);
569 
570     uint8_t prefix_bytes[kPrefixSize];
571     memset(prefix_bytes, 0, sizeof(prefix_bytes));
572     EXPECT_EQ(0, memcmp(bytes, prefix_bytes, sizeof(prefix_bytes)));
573     EXPECT_EQ(0, memcmp(bytes + kPrefixSize,
574                         instructions, sizeof(instructions)));
575   }
576 
577   DeleteFileW(minidump_filename_wide.c_str());
578 }
579 
580 #endif  // !ADDRESS_SANITIZER
581 
582 }  // namespace
583