mirror of
https://github.com/chromium/crashpad.git
synced 2024-12-27 07:14:10 +08:00
6278690abe
sed -i '' -E -e 's/Copyright (.+) The Crashpad Authors\. All rights reserved\.$/Copyright \1 The Crashpad Authors/' $(git grep -El 'Copyright (.+) The Crashpad Authors\. All rights reserved\.$') Bug: chromium:1098010 Change-Id: I8d6138469ddbe3d281a5d83f64cf918ec2491611 Reviewed-on: https://chromium-review.googlesource.com/c/crashpad/crashpad/+/3878262 Reviewed-by: Joshua Peraza <jperaza@chromium.org> Commit-Queue: Mark Mentovai <mark@chromium.org>
138 lines
4.2 KiB
C++
138 lines
4.2 KiB
C++
// Copyright 2019 The Crashpad Authors
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
#include "util/linux/socket.h"
|
|
|
|
#include "base/posix/eintr_wrapper.h"
|
|
#include "gtest/gtest.h"
|
|
#include "util/linux/socket.h"
|
|
|
|
namespace crashpad {
|
|
namespace test {
|
|
namespace {
|
|
|
|
TEST(Socket, Credentials) {
|
|
ScopedFileHandle send_sock, recv_sock;
|
|
ASSERT_TRUE(
|
|
UnixCredentialSocket::CreateCredentialSocketpair(&send_sock, &recv_sock));
|
|
|
|
char msg = 42;
|
|
ASSERT_EQ(UnixCredentialSocket::SendMsg(send_sock.get(), &msg, sizeof(msg)),
|
|
0);
|
|
|
|
char recv_msg = 0;
|
|
ucred creds;
|
|
ASSERT_TRUE(UnixCredentialSocket::RecvMsg(
|
|
recv_sock.get(), &recv_msg, sizeof(recv_msg), &creds));
|
|
EXPECT_EQ(recv_msg, msg);
|
|
EXPECT_EQ(creds.pid, getpid());
|
|
EXPECT_EQ(creds.uid, geteuid());
|
|
EXPECT_EQ(creds.gid, getegid());
|
|
}
|
|
|
|
TEST(Socket, EmptyMessages) {
|
|
ScopedFileHandle send_sock, recv_sock;
|
|
ASSERT_TRUE(
|
|
UnixCredentialSocket::CreateCredentialSocketpair(&send_sock, &recv_sock));
|
|
|
|
ASSERT_EQ(UnixCredentialSocket::SendMsg(send_sock.get(), nullptr, 0), 0);
|
|
|
|
ucred creds;
|
|
ASSERT_TRUE(
|
|
UnixCredentialSocket::RecvMsg(recv_sock.get(), nullptr, 0, &creds));
|
|
EXPECT_EQ(creds.pid, getpid());
|
|
EXPECT_EQ(creds.uid, geteuid());
|
|
EXPECT_EQ(creds.gid, getegid());
|
|
}
|
|
|
|
TEST(Socket, Hangup) {
|
|
ScopedFileHandle send_sock, recv_sock;
|
|
ASSERT_TRUE(
|
|
UnixCredentialSocket::CreateCredentialSocketpair(&send_sock, &recv_sock));
|
|
|
|
send_sock.reset();
|
|
|
|
char recv_msg = 0;
|
|
ucred creds;
|
|
EXPECT_FALSE(UnixCredentialSocket::RecvMsg(
|
|
recv_sock.get(), &recv_msg, sizeof(recv_msg), &creds));
|
|
}
|
|
|
|
TEST(Socket, FileDescriptors) {
|
|
ScopedFileHandle send_sock, recv_sock;
|
|
ASSERT_TRUE(
|
|
UnixCredentialSocket::CreateCredentialSocketpair(&send_sock, &recv_sock));
|
|
|
|
ScopedFileHandle test_fd1, test_fd2;
|
|
ASSERT_TRUE(
|
|
UnixCredentialSocket::CreateCredentialSocketpair(&test_fd1, &test_fd2));
|
|
|
|
char msg = 42;
|
|
ASSERT_EQ(UnixCredentialSocket::SendMsg(
|
|
send_sock.get(), &msg, sizeof(msg), &test_fd1.get(), 1),
|
|
0);
|
|
|
|
char recv_msg = 0;
|
|
ucred creds;
|
|
std::vector<ScopedFileHandle> fds;
|
|
ASSERT_TRUE(UnixCredentialSocket::RecvMsg(
|
|
recv_sock.get(), &recv_msg, sizeof(recv_msg), &creds, &fds));
|
|
ASSERT_EQ(fds.size(), 1u);
|
|
}
|
|
|
|
TEST(Socket, RecvClosesFileDescriptors) {
|
|
ScopedFileHandle send_sock, recv_sock;
|
|
ASSERT_TRUE(
|
|
UnixCredentialSocket::CreateCredentialSocketpair(&send_sock, &recv_sock));
|
|
|
|
ScopedFileHandle send_fds[UnixCredentialSocket::kMaxSendRecvMsgFDs];
|
|
ScopedFileHandle recv_fds[UnixCredentialSocket::kMaxSendRecvMsgFDs];
|
|
int raw_recv_fds[UnixCredentialSocket::kMaxSendRecvMsgFDs];
|
|
for (size_t index = 0; index < UnixCredentialSocket::kMaxSendRecvMsgFDs;
|
|
++index) {
|
|
ASSERT_TRUE(UnixCredentialSocket::CreateCredentialSocketpair(
|
|
&send_fds[index], &recv_fds[index]));
|
|
raw_recv_fds[index] = recv_fds[index].get();
|
|
}
|
|
|
|
char msg = 42;
|
|
ASSERT_EQ(
|
|
UnixCredentialSocket::SendMsg(send_sock.get(),
|
|
&msg,
|
|
sizeof(msg),
|
|
raw_recv_fds,
|
|
UnixCredentialSocket::kMaxSendRecvMsgFDs),
|
|
0);
|
|
|
|
char recv_msg = 0;
|
|
ucred creds;
|
|
ASSERT_TRUE(UnixCredentialSocket::RecvMsg(
|
|
recv_sock.get(), &recv_msg, sizeof(recv_msg), &creds));
|
|
EXPECT_EQ(creds.pid, getpid());
|
|
|
|
for (size_t index = 0; index < UnixCredentialSocket::kMaxSendRecvMsgFDs;
|
|
++index) {
|
|
recv_fds[index].reset();
|
|
char c;
|
|
EXPECT_EQ(
|
|
HANDLE_EINTR(send(send_fds[index].get(), &c, sizeof(c), MSG_NOSIGNAL)),
|
|
-1);
|
|
EXPECT_EQ(errno, EPIPE);
|
|
}
|
|
}
|
|
|
|
} // namespace
|
|
} // namespace test
|
|
} // namespace crashpad
|