OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "base/basictypes.h" | 5 #include "base/basictypes.h" |
6 #include "base/memory/scoped_ptr.h" | 6 #include "base/memory/scoped_ptr.h" |
7 #include "base/memory/shared_memory.h" | 7 #include "base/memory/shared_memory.h" |
8 #include "base/process/kill.h" | 8 #include "base/process/kill.h" |
9 #include "base/rand_util.h" | 9 #include "base/rand_util.h" |
10 #include "base/safe_numerics.h" | |
10 #include "base/strings/string_number_conversions.h" | 11 #include "base/strings/string_number_conversions.h" |
12 #include "base/strings/stringprintf.h" | |
11 #include "base/sys_info.h" | 13 #include "base/sys_info.h" |
12 #include "base/test/multiprocess_test.h" | 14 #include "base/test/multiprocess_test.h" |
13 #include "base/threading/platform_thread.h" | 15 #include "base/threading/platform_thread.h" |
14 #include "base/time/time.h" | 16 #include "base/time/time.h" |
15 #include "testing/gtest/include/gtest/gtest.h" | 17 #include "testing/gtest/include/gtest/gtest.h" |
16 #include "testing/multiprocess_func_list.h" | 18 #include "testing/multiprocess_func_list.h" |
17 | 19 |
18 #if defined(OS_MACOSX) | 20 #if defined(OS_MACOSX) |
19 #include "base/mac/scoped_nsautorelease_pool.h" | 21 #include "base/mac/scoped_nsautorelease_pool.h" |
20 #endif | 22 #endif |
21 | 23 |
22 #if defined(OS_POSIX) | 24 #if defined(OS_POSIX) |
25 #include <errno.h> | |
26 #include <fcntl.h> | |
23 #include <sys/mman.h> | 27 #include <sys/mman.h> |
24 #include <sys/stat.h> | 28 #include <sys/stat.h> |
25 #include <sys/types.h> | 29 #include <sys/types.h> |
26 #include <unistd.h> | 30 #include <unistd.h> |
27 #endif | 31 #endif |
28 | 32 |
29 static const int kNumThreads = 5; | 33 static const int kNumThreads = 5; |
30 static const int kNumTasks = 5; | 34 static const int kNumTasks = 5; |
31 | 35 |
32 namespace base { | 36 namespace base { |
(...skipping 321 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
354 else | 358 else |
355 EXPECT_EQ(0, pointers[j][0]); | 359 EXPECT_EQ(0, pointers[j][0]); |
356 } | 360 } |
357 } | 361 } |
358 | 362 |
359 for (int i = 0; i < count; i++) { | 363 for (int i = 0; i < count; i++) { |
360 memories[i].Close(); | 364 memories[i].Close(); |
361 } | 365 } |
362 } | 366 } |
363 | 367 |
368 TEST(SharedMemoryTest, AnonymousReadOnly) { | |
369 StringPiece contents = "Hello World"; | |
370 scoped_ptr<SharedMemory> shmem( | |
371 SharedMemory::NewAnonymousReadOnly("Hello World")); | |
372 | |
373 ASSERT_TRUE(shmem->Map(contents.size())); | |
374 EXPECT_EQ( | |
375 contents, | |
376 StringPiece(static_cast<const char*>(shmem->memory()), contents.size())); | |
377 | |
378 // We'd like to check that if we send the read-only segment to another | |
379 // process, then that other process can't reopen it read/write. (Since that | |
380 // would be a security hole.) Setting up multiple processes is hard in a | |
381 // unittest, so this test checks that the *current* process can't reopen the | |
382 // segment read/write. I think the test here is stronger than we actually | |
383 // care about, but there's a remote possibility that sending a file over a | |
384 // pipe would transform it into read/write. | |
385 SharedMemoryHandle handle = shmem->handle(); | |
386 #if defined(OS_POSIX) | |
387 | |
388 EXPECT_EQ(O_RDONLY, fcntl(handle.fd, F_GETFL) & O_ACCMODE) | |
389 << "The descriptor itself should be read-only."; | |
390 | |
391 errno = 0; | |
392 void* writable = mmap(NULL, | |
393 shmem->mapped_size(), | |
394 PROT_READ | PROT_WRITE, | |
395 MAP_SHARED, | |
396 handle.fd, | |
397 0); | |
398 int mmap_errno = errno; | |
399 EXPECT_EQ(MAP_FAILED, writable) | |
400 << "It shouldn't be possible to re-mmap the descriptor writable."; | |
401 EXPECT_EQ(EACCES, mmap_errno); | |
402 | |
403 struct stat fd_stat; | |
404 errno = 0; | |
405 EXPECT_EQ(0, fstat(handle.fd, &fd_stat)) << strerror(errno); | |
406 EXPECT_EQ(0400, checked_numeric_cast<int>(fd_stat.st_mode & 0777)) | |
407 << "inode should be read-only"; | |
408 EXPECT_EQ(0U, fd_stat.st_nlink) << "inode should be unlinked"; | |
409 EXPECT_EQ(geteuid(), fd_stat.st_uid) | |
410 << "inode should be owned by current user"; | |
411 | |
412 if (0 == access("/dev/fd", X_OK)) { | |
413 // Try to re-open through /dev/fd. This is an end-run around the notion of | |
414 // an FD as a capability. | |
415 const std::string shmem_path = StringPrintf("/dev/fd/%d", handle.fd); | |
416 errno = 0; | |
417 int readable_fd = open(shmem_path.c_str(), O_RDONLY); | |
418 EXPECT_NE(-1, readable_fd) << strerror(errno); | |
419 close(readable_fd); | |
420 | |
421 errno = 0; | |
422 int writable_fd = open(shmem_path.c_str(), O_WRONLY); | |
423 int open_writable_errno = errno; | |
424 EXPECT_EQ(-1, writable_fd); | |
425 EXPECT_EQ(EACCES, open_writable_errno) << strerror(open_writable_errno); | |
426 close(writable_fd); | |
427 | |
428 // However, if we explicitly make the entry in /dev/fd writable first, the | |
429 // open() call successfully creates a writable file on Linux. The sandbox | |
430 // has to prevent opening this path. TODO(jln): Write a test that attacks | |
431 // this from inside the sandbox. | |
432 errno = 0; | |
433 EXPECT_EQ(0, fchmod(handle.fd, S_IRUSR | S_IWUSR)) << strerror(errno); | |
434 | |
435 errno = 0; | |
436 writable_fd = open(shmem_path.c_str(), O_WRONLY); | |
437 open_writable_errno = errno; | |
438 // On Linux, opening the file /dev/fd/N where 'N' is a read-only file | |
439 // descriptor, can produce a writable file descriptor if the inode is | |
440 // writable (see the fchmod above). Mac appears to restrict the open() call | |
441 // appropriately. Other systems might let the open() succeed but still | |
442 // produce a read-only descriptor. | |
443 #if !defined(OS_LINUX) | |
444 EXPECT_EQ(-1, writable_fd); | |
445 EXPECT_EQ(EACCES, open_writable_errno) << strerror(open_writable_errno); | |
446 #endif | |
447 close(writable_fd); | |
448 } | |
449 | |
450 #elif defined(OS_WIN) | |
451 EXPECT_EQ(NULL, MapViewOfFile(handle, FILE_MAP_WRITE, 0, 0, 0)) | |
452 << "Shouldn't be able to map memory writable."; | |
453 | |
454 SharedMemoryHandle writable_handle = INVALID_HANDLE_VALUE; | |
455 EXPECT_EQ(0, | |
456 ::DuplicateHandle(GetCurrentProcess(), | |
Will Harris
2013/10/16 17:01:03
should probably CloseHandle after this succeeds, o
Jeffrey Yasskin
2013/10/16 22:27:53
Thanks, done with ScopedHandle.
| |
457 handle, | |
458 GetCurrentProcess, | |
459 &writable_handle, | |
460 FILE_MAP_ALL_ACCESS, | |
461 false, | |
462 0)) | |
463 << "Shouldn't be able to duplicate the handle into a writable one."; | |
464 #else | |
465 #error Unexpected platform; write a test that tries to make 'handle' writable. | |
466 #endif | |
467 } | |
468 | |
364 TEST(SharedMemoryTest, MapAt) { | 469 TEST(SharedMemoryTest, MapAt) { |
365 ASSERT_TRUE(SysInfo::VMAllocationGranularity() >= sizeof(uint32)); | 470 ASSERT_TRUE(SysInfo::VMAllocationGranularity() >= sizeof(uint32)); |
366 const size_t kCount = SysInfo::VMAllocationGranularity(); | 471 const size_t kCount = SysInfo::VMAllocationGranularity(); |
367 const size_t kDataSize = kCount * sizeof(uint32); | 472 const size_t kDataSize = kCount * sizeof(uint32); |
368 | 473 |
369 SharedMemory memory; | 474 SharedMemory memory; |
370 ASSERT_TRUE(memory.CreateAndMapAnonymous(kDataSize)); | 475 ASSERT_TRUE(memory.CreateAndMapAnonymous(kDataSize)); |
371 ASSERT_TRUE(memory.Map(kDataSize)); | 476 ASSERT_TRUE(memory.Map(kDataSize)); |
372 uint32* ptr = static_cast<uint32*>(memory.memory()); | 477 uint32* ptr = static_cast<uint32*>(memory.memory()); |
373 ASSERT_NE(ptr, static_cast<void*>(NULL)); | 478 ASSERT_NE(ptr, static_cast<void*>(NULL)); |
(...skipping 178 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
552 SharedMemoryProcessTest::CleanUp(); | 657 SharedMemoryProcessTest::CleanUp(); |
553 } | 658 } |
554 | 659 |
555 MULTIPROCESS_TEST_MAIN(SharedMemoryTestMain) { | 660 MULTIPROCESS_TEST_MAIN(SharedMemoryTestMain) { |
556 return SharedMemoryProcessTest::TaskTestMain(); | 661 return SharedMemoryProcessTest::TaskTestMain(); |
557 } | 662 } |
558 | 663 |
559 #endif // !OS_IOS | 664 #endif // !OS_IOS |
560 | 665 |
561 } // namespace base | 666 } // namespace base |
OLD | NEW |