| OLD | NEW |
| (Empty) |
| 1 /* Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 * Use of this source code is governed by a BSD-style license that can be | |
| 3 * found in the LICENSE file. | |
| 4 */ | |
| 5 | |
| 6 #include <errno.h> | |
| 7 #include <fcntl.h> | |
| 8 #include <pthread.h> | |
| 9 #include <sys/stat.h> | |
| 10 | |
| 11 #include <map> | |
| 12 #include <string> | |
| 13 | |
| 14 #include "nacl_mounts/kernel_handle.h" | |
| 15 #include "nacl_mounts/kernel_intercept.h" | |
| 16 #include "nacl_mounts/kernel_proxy.h" | |
| 17 #include "nacl_mounts/mount.h" | |
| 18 #include "nacl_mounts/mount_mem.h" | |
| 19 #include "nacl_mounts/path.h" | |
| 20 | |
| 21 #include "gtest/gtest.h" | |
| 22 | |
| 23 | |
| 24 class KernelProxyTest : public ::testing::Test { | |
| 25 public: | |
| 26 KernelProxyTest() | |
| 27 : kp_(new KernelProxy) { | |
| 28 ki_init(kp_); | |
| 29 } | |
| 30 | |
| 31 ~KernelProxyTest() { | |
| 32 ki_uninit(); | |
| 33 delete kp_; | |
| 34 } | |
| 35 | |
| 36 private: | |
| 37 KernelProxy* kp_; | |
| 38 }; | |
| 39 | |
| 40 | |
| 41 TEST_F(KernelProxyTest, WorkingDirectory) { | |
| 42 char text[1024]; | |
| 43 | |
| 44 text[0] = 0; | |
| 45 ki_getcwd(text, sizeof(text)); | |
| 46 EXPECT_STREQ("/", text); | |
| 47 | |
| 48 char* alloc = ki_getwd(NULL); | |
| 49 EXPECT_EQ((char *) NULL, alloc); | |
| 50 EXPECT_EQ(EFAULT, errno); | |
| 51 | |
| 52 text[0] = 0; | |
| 53 alloc = ki_getwd(text); | |
| 54 EXPECT_STREQ("/", alloc); | |
| 55 | |
| 56 EXPECT_EQ(-1, ki_chdir("/foo")); | |
| 57 EXPECT_EQ(ENOENT, errno); | |
| 58 | |
| 59 EXPECT_EQ(0, ki_chdir("/")); | |
| 60 | |
| 61 EXPECT_EQ(0, ki_mkdir("/foo", S_IREAD | S_IWRITE)); | |
| 62 EXPECT_EQ(-1, ki_mkdir("/foo", S_IREAD | S_IWRITE)); | |
| 63 EXPECT_EQ(EEXIST, errno); | |
| 64 | |
| 65 memset(text, 0, sizeof(text)); | |
| 66 EXPECT_EQ(0, ki_chdir("foo")); | |
| 67 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); | |
| 68 EXPECT_STREQ("/foo", text); | |
| 69 | |
| 70 memset(text, 0, sizeof(text)); | |
| 71 EXPECT_EQ(-1, ki_chdir("foo")); | |
| 72 EXPECT_EQ(ENOENT, errno); | |
| 73 EXPECT_EQ(0, ki_chdir("..")); | |
| 74 EXPECT_EQ(0, ki_chdir("/foo")); | |
| 75 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); | |
| 76 EXPECT_STREQ("/foo", text); | |
| 77 } | |
| 78 | |
| 79 TEST_F(KernelProxyTest, MemMountIO) { | |
| 80 char text[1024]; | |
| 81 int fd1, fd2, fd3; | |
| 82 int len; | |
| 83 | |
| 84 // Create "/foo" | |
| 85 EXPECT_EQ(0, ki_mkdir("/foo", S_IREAD | S_IWRITE)); | |
| 86 | |
| 87 // Fail to open "/foo/bar" | |
| 88 EXPECT_EQ(-1, ki_open("/foo/bar", O_RDONLY)); | |
| 89 EXPECT_EQ(ENOENT, errno); | |
| 90 | |
| 91 // Create bar "/foo/bar" | |
| 92 fd1 = ki_open("/foo/bar", O_RDONLY | O_CREAT); | |
| 93 EXPECT_NE(-1, fd1); | |
| 94 | |
| 95 // Open (optionally create) bar "/foo/bar" | |
| 96 fd2 = ki_open("/foo/bar", O_RDONLY | O_CREAT); | |
| 97 EXPECT_NE(-1, fd2); | |
| 98 | |
| 99 // Fail to exclusively create bar "/foo/bar" | |
| 100 EXPECT_EQ(-1, ki_open("/foo/bar", O_RDONLY | O_CREAT | O_EXCL)); | |
| 101 EXPECT_EQ(EEXIST, errno); | |
| 102 | |
| 103 // Write hello and world to same node with different descriptors | |
| 104 // so that we overwrite each other | |
| 105 EXPECT_EQ(5, ki_write(fd2, "WORLD", 5)); | |
| 106 EXPECT_EQ(5, ki_write(fd1, "HELLO", 5)); | |
| 107 | |
| 108 fd3 = ki_open("/foo/bar", O_WRONLY); | |
| 109 EXPECT_NE(-1, fd3); | |
| 110 | |
| 111 len = ki_read(fd3, text, sizeof(text)); | |
| 112 if (len > -0) text[len] = 0; | |
| 113 EXPECT_EQ(5, len); | |
| 114 EXPECT_STREQ("HELLO", text); | |
| 115 EXPECT_EQ(0, ki_close(fd1)); | |
| 116 EXPECT_EQ(0, ki_close(fd2)); | |
| 117 | |
| 118 fd1 = ki_open("/foo/bar", O_WRONLY | O_APPEND); | |
| 119 EXPECT_NE(-1, fd1); | |
| 120 EXPECT_EQ(5, ki_write(fd1, "WORLD", 5)); | |
| 121 | |
| 122 len = ki_read(fd3, text, sizeof(text)); | |
| 123 if (len >= 0) text[len] = 0; | |
| 124 | |
| 125 EXPECT_EQ(5, len); | |
| 126 EXPECT_STREQ("WORLD", text); | |
| 127 | |
| 128 fd2 = ki_open("/foo/bar", O_RDONLY); | |
| 129 EXPECT_NE(-1, fd2); | |
| 130 len = ki_read(fd2, text, sizeof(text)); | |
| 131 if (len > 0) text[len] = 0; | |
| 132 EXPECT_EQ(10, len); | |
| 133 EXPECT_STREQ("HELLOWORLD", text); | |
| 134 } | |
| 135 | |
| 136 TEST_F(KernelProxyTest, MemMountLseek) { | |
| 137 int fd = ki_open("/foo", O_CREAT | O_RDWR); | |
| 138 EXPECT_EQ(9, ki_write(fd, "Some text", 9)); | |
| 139 | |
| 140 EXPECT_EQ(9, ki_lseek(fd, 0, SEEK_CUR)); | |
| 141 EXPECT_EQ(9, ki_lseek(fd, 0, SEEK_END)); | |
| 142 EXPECT_EQ(-1, ki_lseek(fd, -1, SEEK_SET)); | |
| 143 EXPECT_EQ(EINVAL, errno); | |
| 144 | |
| 145 // Seek past end of file. | |
| 146 EXPECT_EQ(13, ki_lseek(fd, 13, SEEK_SET)); | |
| 147 char buffer[4]; | |
| 148 memset(&buffer[0], 0xfe, 4); | |
| 149 EXPECT_EQ(9, ki_lseek(fd, -4, SEEK_END)); | |
| 150 EXPECT_EQ(4, ki_read(fd, &buffer[0], 4)); | |
| 151 EXPECT_EQ(0, memcmp("\0\0\0\0", buffer, 4)); | |
| 152 } | |
| 153 | |
| 154 TEST_F(KernelProxyTest, CloseTwice) { | |
| 155 int fd = ki_open("/foo", O_CREAT | O_RDWR); | |
| 156 EXPECT_EQ(9, ki_write(fd, "Some text", 9)); | |
| 157 | |
| 158 int fd2 = ki_dup(fd); | |
| 159 EXPECT_NE(-1, fd2); | |
| 160 | |
| 161 EXPECT_EQ(0, ki_close(fd)); | |
| 162 EXPECT_EQ(0, ki_close(fd2)); | |
| 163 } | |
| 164 | |
| 165 TEST_F(KernelProxyTest, MemMountDup) { | |
| 166 int fd = ki_open("/foo", O_CREAT | O_RDWR); | |
| 167 | |
| 168 int dup_fd = ki_dup(fd); | |
| 169 EXPECT_NE(-1, dup_fd); | |
| 170 | |
| 171 EXPECT_EQ(9, ki_write(fd, "Some text", 9)); | |
| 172 EXPECT_EQ(9, ki_lseek(fd, 0, SEEK_CUR)); | |
| 173 EXPECT_EQ(9, ki_lseek(dup_fd, 0, SEEK_CUR)); | |
| 174 | |
| 175 int dup2_fd = 123; | |
| 176 EXPECT_EQ(dup2_fd, ki_dup2(fd, dup2_fd)); | |
| 177 EXPECT_EQ(9, ki_lseek(dup2_fd, 0, SEEK_CUR)); | |
| 178 | |
| 179 int new_fd = ki_open("/bar", O_CREAT | O_RDWR); | |
| 180 | |
| 181 EXPECT_EQ(fd, ki_dup2(new_fd, fd)); | |
| 182 // fd, new_fd -> "/bar" | |
| 183 // dup_fd, dup2_fd -> "/foo" | |
| 184 | |
| 185 // We should still be able to write to dup_fd (i.e. it should not be closed). | |
| 186 EXPECT_EQ(4, ki_write(dup_fd, "more", 4)); | |
| 187 | |
| 188 EXPECT_EQ(0, ki_close(dup2_fd)); | |
| 189 // fd, new_fd -> "/bar" | |
| 190 // dup_fd -> "/foo" | |
| 191 | |
| 192 EXPECT_EQ(dup_fd, ki_dup2(fd, dup_fd)); | |
| 193 // fd, new_fd, dup_fd -> "/bar" | |
| 194 } | |
| 195 | |
| 196 | |
| 197 StringMap_t g_StringMap; | |
| 198 | |
| 199 class MountMockInit : public MountMem { | |
| 200 public: | |
| 201 virtual bool Init(int dev, StringMap_t& args, PepperInterface* ppapi) { | |
| 202 g_StringMap = args; | |
| 203 if (args.find("false") != args.end()) | |
| 204 return false; | |
| 205 return true; | |
| 206 }; | |
| 207 }; | |
| 208 | |
| 209 class KernelProxyMountMock : public KernelProxy { | |
| 210 virtual void Init(PepperInterface* ppapi) { | |
| 211 KernelProxy::Init(NULL); | |
| 212 factories_["initfs"] = MountMockInit::Create<MountMockInit>; | |
| 213 } | |
| 214 }; | |
| 215 | |
| 216 class KernelProxyMountTest : public ::testing::Test { | |
| 217 public: | |
| 218 KernelProxyMountTest() | |
| 219 : kp_(new KernelProxyMountMock) { | |
| 220 ki_init(kp_); | |
| 221 } | |
| 222 | |
| 223 ~KernelProxyMountTest() { | |
| 224 ki_uninit(); | |
| 225 delete kp_; | |
| 226 } | |
| 227 | |
| 228 private: | |
| 229 KernelProxy* kp_; | |
| 230 }; | |
| 231 | |
| 232 | |
| 233 | |
| 234 TEST_F(KernelProxyMountTest, MountInit) { | |
| 235 int res1 = ki_mount("/", "/mnt1", "initfs", 0, "false,foo=bar"); | |
| 236 | |
| 237 EXPECT_EQ("bar", g_StringMap["foo"]); | |
| 238 EXPECT_EQ(-1, res1); | |
| 239 EXPECT_EQ(EINVAL, errno); | |
| 240 | |
| 241 int res2 = ki_mount("/", "/mnt2", "initfs", 0, "true,bar=foo,x=y"); | |
| 242 EXPECT_NE(-1, res2); | |
| 243 EXPECT_EQ("y", g_StringMap["x"]); | |
| 244 } | |
| OLD | NEW |