Supervised user import: Listen for profile creation/deletion
[chromium-blink-merge.git] / chrome_elf / elf_imports_unittest.cc
blobdda1bb122df5dace48a4976830e665ab88d9df89
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include <stdint.h>
6 #include <windows.h>
8 #include <algorithm>
9 #include <vector>
11 #include "base/base_paths.h"
12 #include "base/basictypes.h"
13 #include "base/compiler_specific.h"
14 #include "base/files/file_path.h"
15 #include "base/files/memory_mapped_file.h"
16 #include "base/path_service.h"
17 #include "base/strings/string_util.h"
18 #include "base/win/pe_image.h"
19 #include "testing/gtest/include/gtest/gtest.h"
21 namespace {
23 class ELFImportsTest : public testing::Test {
24 protected:
25 static bool ImportsCallback(const base::win::PEImage &image,
26 LPCSTR module,
27 PIMAGE_THUNK_DATA name_table,
28 PIMAGE_THUNK_DATA iat,
29 PVOID cookie) {
30 std::vector<std::string>* import_list =
31 reinterpret_cast<std::vector<std::string>*>(cookie);
32 import_list->push_back(module);
33 return true;
36 void GetImports(const base::FilePath& module_path,
37 std::vector<std::string>* imports) {
38 ASSERT_TRUE(imports != NULL);
40 base::MemoryMappedFile module_mmap;
42 ASSERT_TRUE(module_mmap.Initialize(module_path));
43 base::win::PEImageAsData pe_image_data(
44 reinterpret_cast<HMODULE>(const_cast<uint8*>(module_mmap.data())));
45 pe_image_data.EnumImportChunks(ELFImportsTest::ImportsCallback, imports);
49 TEST_F(ELFImportsTest, ChromeElfSanityCheck) {
50 std::vector<std::string> elf_imports;
52 base::FilePath dll;
53 ASSERT_TRUE(PathService::Get(base::DIR_EXE, &dll));
54 dll = dll.Append(L"chrome_elf.dll");
55 GetImports(dll, &elf_imports);
57 // Check that ELF has imports.
58 ASSERT_LT(0u, elf_imports.size()) << "Ensure the chrome_elf_unittests "
59 "target was built, instead of chrome_elf_unittests.exe";
61 std::vector<std::string>::iterator it(elf_imports.begin());
63 static const char* const kValidFilePatterns[] = {
64 "KERNEL32.dll",
65 "MSVC*",
66 #if defined(SYZYASAN)
67 "syzyasan_rtl.dll",
68 #endif
69 #if defined(ADDRESS_SANITIZER) && defined(COMPONENT_BUILD)
70 "clang_rt.asan_dynamic-i386.dll",
71 #endif
72 "ADVAPI32.dll"
75 // Make sure all of ELF's imports are in the valid imports list.
76 for (; it != elf_imports.end(); it++) {
77 bool match = false;
78 for (int i = 0; i < arraysize(kValidFilePatterns); ++i) {
79 if (MatchPattern(*it, kValidFilePatterns[i]))
80 match = true;
82 ASSERT_TRUE(match) << "Illegal import in chrome_elf.dll: " << *it;
86 TEST_F(ELFImportsTest, ChromeExeSanityCheck) {
87 std::vector<std::string> exe_imports;
89 base::FilePath exe;
90 ASSERT_TRUE(PathService::Get(base::DIR_EXE, &exe));
91 exe = exe.Append(L"chrome.exe");
92 GetImports(exe, &exe_imports);
94 // Check that chrome.exe has imports.
95 ASSERT_LT(0u, exe_imports.size()) << "Ensure the chrome_elf_unittests "
96 "target was built, instead of chrome_elf_unittests.exe";
98 // Chrome.exe's first import must be ELF.
99 EXPECT_EQ("chrome_elf.dll", exe_imports[0]) <<
100 "Illegal import order in chrome.exe (ensure the chrome_elf_unittest "
101 "target was built, instead of just chrome_elf_unittests.exe)";
104 } // namespace