| Index: base/memory/shared_memory_unittest.cc
|
| diff --git a/base/memory/shared_memory_unittest.cc b/base/memory/shared_memory_unittest.cc
|
| index 5c0cc8b8a8efcc25c03c4892b648043d66ba840f..ea93900fdd83adec097bd58e6570146d4a665fd1 100644
|
| --- a/base/memory/shared_memory_unittest.cc
|
| +++ b/base/memory/shared_memory_unittest.cc
|
| @@ -8,6 +8,8 @@
|
| #endif
|
| #include "base/memory/scoped_ptr.h"
|
| #include "base/memory/shared_memory.h"
|
| +#include "base/rand_util.h"
|
| +#include "base/strings/string_number_conversions.h"
|
| #include "base/sys_info.h"
|
| #include "base/test/multiprocess_test.h"
|
| #include "base/threading/platform_thread.h"
|
| @@ -21,6 +23,9 @@
|
|
|
| #if defined(OS_POSIX)
|
| #include <sys/mman.h>
|
| +#include <sys/stat.h>
|
| +#include <sys/types.h>
|
| +#include <unistd.h>
|
| #endif
|
|
|
| static const int kNumThreads = 5;
|
| @@ -401,7 +406,60 @@ TEST(SharedMemoryTest, AnonymousExecutable) {
|
| EXPECT_EQ(0, mprotect(shared_memory.memory(), shared_memory.requested_size(),
|
| PROT_READ | PROT_EXEC));
|
| }
|
| -#endif
|
| +
|
| +// Create a shared memory object, check its permissions.
|
| +TEST(SharedMemoryTest, FilePermissionsAnonymous) {
|
| + const uint32 kTestSize = 1 << 8;
|
| +
|
| + SharedMemory shared_memory;
|
| + SharedMemoryCreateOptions options;
|
| + options.size = kTestSize;
|
| + // Set a permissive umask.
|
| + mode_t old_umask = umask(S_IWGRP | S_IWOTH);
|
| +
|
| + EXPECT_TRUE(shared_memory.Create(options));
|
| +
|
| + int shm_fd = shared_memory.handle().fd;
|
| + struct stat shm_stat;
|
| + EXPECT_EQ(0, fstat(shm_fd, &shm_stat));
|
| + // Neither the group, nor others should be able to read the shared memory
|
| + // file.
|
| + EXPECT_FALSE(shm_stat.st_mode & S_IRWXO);
|
| + EXPECT_FALSE(shm_stat.st_mode & S_IRWXG);
|
| +
|
| + // Restore umask.
|
| + umask(old_umask);
|
| +}
|
| +
|
| +// Create a shared memory object, check its permissions.
|
| +TEST(SharedMemoryTest, FilePermissionsNamed) {
|
| + const uint32 kTestSize = 1 << 8;
|
| +
|
| + SharedMemory shared_memory;
|
| + SharedMemoryCreateOptions options;
|
| + options.size = kTestSize;
|
| + std::string shared_mem_name =
|
| + "shared_perm_test-" + Uint64ToString(RandUint64());
|
| + options.name = &shared_mem_name;
|
| + // Set a permissive umask.
|
| + mode_t old_umask = umask(S_IWGRP | S_IWOTH);
|
| +
|
| + EXPECT_TRUE(shared_memory.Create(options));
|
| + // Clean-up the backing file immediately, we don't need it.
|
| + EXPECT_TRUE(shared_memory.Delete(shared_mem_name));
|
| +
|
| + int shm_fd = shared_memory.handle().fd;
|
| + struct stat shm_stat;
|
| + EXPECT_EQ(0, fstat(shm_fd, &shm_stat));
|
| + // Neither the group, nor others should be able to read the shared memory
|
| + // file.
|
| + EXPECT_FALSE(shm_stat.st_mode & S_IRWXO);
|
| + EXPECT_FALSE(shm_stat.st_mode & S_IRWXG);
|
| + // Restore umask.
|
| + umask(old_umask);
|
| +}
|
| +
|
| +#endif // defined(OS_POSIX)
|
|
|
| // Map() will return addresses which are aligned to the platform page size, this
|
| // varies from platform to platform though. Since we'd like to advertise a
|
|
|