0
0
mirror of https://github.com/chromium/crashpad.git synced 2025-03-21 03:03:45 +00:00
crashpad/util/test/mac/mach_multiprocess.cc
Mark Mentovai bbe4d85935 Add MachMultiprocess and its test.
TEST=util_test MachMultiprocess.MachMultiprocess
R=rsesek@chromium.org

Review URL: https://codereview.chromium.org/482483002
2014-08-20 13:58:42 -04:00

357 lines
12 KiB
C++
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

// Copyright 2014 The Crashpad Authors. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include "util/test/mac/mach_multiprocess.h"
#include <AvailabilityMacros.h>
#include <bsm/libbsm.h>
#include <servers/bootstrap.h>
#include <signal.h>
#include <stdlib.h>
#include <sys/wait.h>
#include <string>
#include "base/auto_reset.h"
#include "base/files/scoped_file.h"
#include "base/logging.h"
#include "base/mac/scoped_mach_port.h"
#include "base/memory/scoped_ptr.h"
#include "base/rand_util.h"
#include "base/strings/stringprintf.h"
#include "gtest/gtest.h"
#include "util/mach/bootstrap.h"
#include "util/test/errors.h"
#include "util/test/mac/mach_errors.h"
namespace {
class ScopedNotReached {
public:
ScopedNotReached() {}
~ScopedNotReached() { abort(); }
private:
DISALLOW_COPY_AND_ASSIGN(ScopedNotReached);
};
// The “hello” message contains a send right to the child process task port.
struct SendHelloMessage : public mach_msg_base_t {
mach_msg_port_descriptor_t port_descriptor;
};
struct ReceiveHelloMessage : public SendHelloMessage {
mach_msg_audit_trailer_t audit_trailer;
};
} // namespace
namespace crashpad {
namespace test {
using namespace testing;
namespace internal {
struct MachMultiprocessInfo {
MachMultiprocessInfo()
: service_name(),
read_pipe(-1),
write_pipe(-1),
child_pid(0),
pipe_fd(-1),
local_port(MACH_PORT_NULL),
remote_port(MACH_PORT_NULL),
child_task(MACH_PORT_NULL) {}
std::string service_name;
base::ScopedFD read_pipe;
base::ScopedFD write_pipe;
pid_t child_pid; // valid only in parent
int pipe_fd; // read_pipe in parent, write_pipe in child
base::mac::ScopedMachReceiveRight local_port;
base::mac::ScopedMachSendRight remote_port;
base::mac::ScopedMachSendRight child_task; // valid only in parent
};
} // namespace internal
MachMultiprocess::MachMultiprocess() : info_(NULL) {
}
void MachMultiprocess::Run() {
ASSERT_EQ(NULL, info_);
scoped_ptr<internal::MachMultiprocessInfo> info(
new internal::MachMultiprocessInfo);
base::AutoReset<internal::MachMultiprocessInfo*> reset_info(&info_,
info.get());
int pipe_fds[2];
int rv = pipe(pipe_fds);
ASSERT_EQ(0, rv) << ErrnoMessage("pipe");
info_->read_pipe.reset(pipe_fds[0]);
info_->write_pipe.reset(pipe_fds[1]);
// Set up the parent port and register it with the bootstrap server before
// forking, so that its guaranteed to be there when the child attempts to
// look it up.
info_->service_name = "com.googlecode.crashpad.test.mach_multiprocess.";
for (int index = 0; index < 16; ++index) {
info_->service_name.append(1, base::RandInt('A', 'Z'));
}
mach_port_t local_port;
kern_return_t kr =
BootstrapCheckIn(bootstrap_port, info_->service_name, &local_port);
ASSERT_EQ(BOOTSTRAP_SUCCESS, kr)
<< BootstrapErrorMessage(kr, "bootstrap_check_in");
info_->local_port.reset(local_port);
pid_t pid = fork();
ASSERT_GE(pid, 0) << ErrnoMessage("fork");
if (pid > 0) {
info_->child_pid = pid;
RunParent();
// Waiting for the child happens here instead of in RunParent() because even
// if RunParent() returns early due to a gtest fatal assertion failure, the
// child should still be reaped.
// This will make the parent hang up on the child as much as would be
// visible from the childs perspective. The childs side of the pipe will
// be broken, the childs remote port will become a dead name, and an
// attempt by the child to look up the service will fail. If this werent
// done, the child might hang while waiting for a parent that has already
// triggered a fatal assertion failure to do something.
info.reset();
info_ = NULL;
int status;
pid_t wait_pid = waitpid(pid, &status, 0);
ASSERT_EQ(pid, wait_pid) << ErrnoMessage("waitpid");
if (status != 0) {
std::string message;
if (WIFEXITED(status)) {
message = base::StringPrintf("Child exited with code %d",
WEXITSTATUS(status));
} else if (WIFSIGNALED(status)) {
message = base::StringPrintf("Child terminated by signal %d (%s) %s",
WTERMSIG(status),
strsignal(WTERMSIG(status)),
WCOREDUMP(status) ? " (core dumped)" : "");
}
ASSERT_EQ(0, status) << message;
}
} else {
RunChild();
}
}
MachMultiprocess::~MachMultiprocess() {
}
pid_t MachMultiprocess::ChildPID() const {
EXPECT_NE(0, info_->child_pid);
return info_->child_pid;
}
int MachMultiprocess::PipeFD() const {
EXPECT_NE(-1, info_->pipe_fd);
return info_->pipe_fd;
}
mach_port_t MachMultiprocess::LocalPort() const {
EXPECT_NE(static_cast<mach_port_t>(MACH_PORT_NULL), info_->local_port);
return info_->local_port;
}
mach_port_t MachMultiprocess::RemotePort() const {
EXPECT_NE(static_cast<mach_port_t>(MACH_PORT_NULL), info_->remote_port);
return info_->remote_port;
}
mach_port_t MachMultiprocess::ChildTask() const {
EXPECT_NE(static_cast<mach_port_t>(MACH_PORT_NULL), info_->child_task);
return info_->child_task;
}
void MachMultiprocess::RunParent() {
// The parent uses the read end of the pipe.
info_->write_pipe.reset();
info_->pipe_fd = info_->read_pipe.get();
ReceiveHelloMessage message = {};
kern_return_t kr =
mach_msg(&message.header,
MACH_RCV_MSG | MACH_RCV_TRAILER_TYPE(MACH_MSG_TRAILER_FORMAT_0) |
MACH_RCV_TRAILER_ELEMENTS(MACH_RCV_TRAILER_AUDIT),
0,
sizeof(message),
info_->local_port,
MACH_MSG_TIMEOUT_NONE,
MACH_PORT_NULL);
ASSERT_EQ(MACH_MSG_SUCCESS, kr) << MachErrorMessage(kr, "mach_msg");
// Comb through the entire message, checking every field against its expected
// value.
EXPECT_EQ(MACH_MSGH_BITS(MACH_MSG_TYPE_MOVE_SEND, MACH_MSG_TYPE_MOVE_SEND) |
MACH_MSGH_BITS_COMPLEX,
message.header.msgh_bits);
ASSERT_EQ(sizeof(SendHelloMessage), message.header.msgh_size);
EXPECT_EQ(info_->local_port, message.header.msgh_local_port);
ASSERT_EQ(1u, message.body.msgh_descriptor_count);
EXPECT_EQ(static_cast<mach_msg_type_name_t>(MACH_MSG_TYPE_MOVE_SEND),
message.port_descriptor.disposition);
ASSERT_EQ(static_cast<mach_msg_descriptor_type_t>(MACH_MSG_PORT_DESCRIPTOR),
message.port_descriptor.type);
ASSERT_EQ(static_cast<mach_msg_trailer_type_t>(MACH_MSG_TRAILER_FORMAT_0),
message.audit_trailer.msgh_trailer_type);
ASSERT_EQ(sizeof(message.audit_trailer),
message.audit_trailer.msgh_trailer_size);
EXPECT_EQ(0u, message.audit_trailer.msgh_seqno);
// Check the audit trailers values for sanity. This is a little bit of
// overkill, but because the service was registered with the bootstrap server
// and other processes will be able to look it up and send messages to it,
// these checks disambiguate genuine failures later on in the test from those
// that would occur if an errant process sends a message to this service.
#if MAC_OS_X_VERSION_MIN_REQUIRED < MAC_OS_X_VERSION_10_8
uid_t audit_auid;
uid_t audit_euid;
gid_t audit_egid;
uid_t audit_ruid;
gid_t audit_rgid;
pid_t audit_pid;
au_asid_t audit_asid;
audit_token_to_au32(message.audit_trailer.msgh_audit,
&audit_auid,
&audit_euid,
&audit_egid,
&audit_ruid,
&audit_rgid,
&audit_pid,
&audit_asid,
NULL);
#else
uid_t audit_auid = audit_token_to_auid(message.audit_trailer.msgh_audit);
uid_t audit_euid = audit_token_to_euid(message.audit_trailer.msgh_audit);
gid_t audit_egid = audit_token_to_egid(message.audit_trailer.msgh_audit);
uid_t audit_ruid = audit_token_to_ruid(message.audit_trailer.msgh_audit);
gid_t audit_rgid = audit_token_to_rgid(message.audit_trailer.msgh_audit);
pid_t audit_pid = audit_token_to_pid(message.audit_trailer.msgh_audit);
au_asid_t audit_asid = audit_token_to_asid(message.audit_trailer.msgh_audit);
#endif
EXPECT_EQ(geteuid(), audit_euid);
EXPECT_EQ(getegid(), audit_egid);
EXPECT_EQ(getuid(), audit_ruid);
EXPECT_EQ(getgid(), audit_rgid);
ASSERT_EQ(ChildPID(), audit_pid);
auditinfo_addr_t audit_info;
int rv = getaudit_addr(&audit_info, sizeof(audit_info));
ASSERT_EQ(0, rv) << ErrnoMessage("getaudit_addr");
EXPECT_EQ(audit_info.ai_auid, audit_auid);
EXPECT_EQ(audit_info.ai_asid, audit_asid);
// Retrieve the remote port from the message header, and the childs task port
// from the message body.
info_->remote_port.reset(message.header.msgh_remote_port);
info_->child_task.reset(message.port_descriptor.name);
// Verify that the childs task port is what it purports to be.
int mach_pid;
kr = pid_for_task(info_->child_task, &mach_pid);
ASSERT_EQ(KERN_SUCCESS, kr) << MachErrorMessage(kr, "pid_for_task");
ASSERT_EQ(ChildPID(), mach_pid);
Parent();
info_->remote_port.reset();
info_->local_port.reset();
info_->pipe_fd = -1;
info_->read_pipe.reset();
}
void MachMultiprocess::RunChild() {
ScopedNotReached must_not_leave_this_scope;
// local_port is not valid in the forked child process.
ignore_result(info_->local_port.release());
// The child uses the write end of the pipe.
info_->read_pipe.reset();
info_->pipe_fd = info_->write_pipe.get();
mach_port_t local_port;
kern_return_t kr = mach_port_allocate(
mach_task_self(), MACH_PORT_RIGHT_RECEIVE, &local_port);
ASSERT_EQ(KERN_SUCCESS, kr) << MachErrorMessage(kr, "mach_port_allocate");
info_->local_port.reset(local_port);
// The remote port can be obtained from the bootstrap server.
mach_port_t remote_port;
kr = bootstrap_look_up(
bootstrap_port, info_->service_name.c_str(), &remote_port);
ASSERT_EQ(BOOTSTRAP_SUCCESS, kr)
<< BootstrapErrorMessage(kr, "bootstrap_look_up");
info_->remote_port.reset(remote_port);
// The “hello” message will provide the parent with its remote port, a send
// right to the child tasks local port receive right. It will also carry a
// send right to the child tasks task port.
SendHelloMessage message = {};
message.header.msgh_bits =
MACH_MSGH_BITS(MACH_MSG_TYPE_COPY_SEND, MACH_MSG_TYPE_MAKE_SEND) |
MACH_MSGH_BITS_COMPLEX;
message.header.msgh_size = sizeof(message);
message.header.msgh_remote_port = info_->remote_port;
message.header.msgh_local_port = info_->local_port;
message.body.msgh_descriptor_count = 1;
message.port_descriptor.name = mach_task_self();
message.port_descriptor.disposition = MACH_MSG_TYPE_COPY_SEND;
message.port_descriptor.type = MACH_MSG_PORT_DESCRIPTOR;
kr = mach_msg(&message.header,
MACH_SEND_MSG,
message.header.msgh_size,
0,
MACH_PORT_NULL,
MACH_MSG_TIMEOUT_NONE,
MACH_PORT_NULL);
ASSERT_EQ(MACH_MSG_SUCCESS, kr) << MachErrorMessage(kr, "mach_msg");
Child();
info_->remote_port.reset();
info_->local_port.reset();
info_->pipe_fd = -1;
info_->write_pipe.reset();
if (Test::HasFailure()) {
// Trigger the ScopedNotReached destructor.
return;
}
exit(0);
}
} // namespace test
} // namespace crashpad