crashpad/util/linux/socket_test.cc
Hans Wennborg 161bfed35a Remove/replace unnecessary includes of logging.h
If the file just needs the CHECK/CHECK_OP/NOTREACHED
macros, use the appropriate header for that instead.
Or if logging.h is not needed at all, remove it.

This is both a nice cleanup (logging.h is a big header,
and including it unnecessarily has compile-time costs),
and part of the final step towards making logging.h no
longer include check.h and the others.

Bug: chromium:1031540
Change-Id: Ia46806bd95fe498bcf3cf6d2c13ffa4081678043
Reviewed-on: https://chromium-review.googlesource.com/c/crashpad/crashpad/+/2255361
Reviewed-by: Mark Mentovai <mark@chromium.org>
Commit-Queue: Hans Wennborg <hans@chromium.org>
2020-06-22 11:59:03 +00:00

139 lines
4.2 KiB
C++

// Copyright 2019 The Crashpad Authors. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include "util/linux/socket.h"
#include "base/macros.h"
#include "base/posix/eintr_wrapper.h"
#include "gtest/gtest.h"
#include "util/linux/socket.h"
namespace crashpad {
namespace test {
namespace {
TEST(Socket, Credentials) {
ScopedFileHandle send_sock, recv_sock;
ASSERT_TRUE(
UnixCredentialSocket::CreateCredentialSocketpair(&send_sock, &recv_sock));
char msg = 42;
ASSERT_EQ(UnixCredentialSocket::SendMsg(send_sock.get(), &msg, sizeof(msg)),
0);
char recv_msg = 0;
ucred creds;
ASSERT_TRUE(UnixCredentialSocket::RecvMsg(
recv_sock.get(), &recv_msg, sizeof(recv_msg), &creds));
EXPECT_EQ(recv_msg, msg);
EXPECT_EQ(creds.pid, getpid());
EXPECT_EQ(creds.uid, geteuid());
EXPECT_EQ(creds.gid, getegid());
}
TEST(Socket, EmptyMessages) {
ScopedFileHandle send_sock, recv_sock;
ASSERT_TRUE(
UnixCredentialSocket::CreateCredentialSocketpair(&send_sock, &recv_sock));
ASSERT_EQ(UnixCredentialSocket::SendMsg(send_sock.get(), nullptr, 0), 0);
ucred creds;
ASSERT_TRUE(
UnixCredentialSocket::RecvMsg(recv_sock.get(), nullptr, 0, &creds));
EXPECT_EQ(creds.pid, getpid());
EXPECT_EQ(creds.uid, geteuid());
EXPECT_EQ(creds.gid, getegid());
}
TEST(Socket, Hangup) {
ScopedFileHandle send_sock, recv_sock;
ASSERT_TRUE(
UnixCredentialSocket::CreateCredentialSocketpair(&send_sock, &recv_sock));
send_sock.reset();
char recv_msg = 0;
ucred creds;
EXPECT_FALSE(UnixCredentialSocket::RecvMsg(
recv_sock.get(), &recv_msg, sizeof(recv_msg), &creds));
}
TEST(Socket, FileDescriptors) {
ScopedFileHandle send_sock, recv_sock;
ASSERT_TRUE(
UnixCredentialSocket::CreateCredentialSocketpair(&send_sock, &recv_sock));
ScopedFileHandle test_fd1, test_fd2;
ASSERT_TRUE(
UnixCredentialSocket::CreateCredentialSocketpair(&test_fd1, &test_fd2));
char msg = 42;
ASSERT_EQ(UnixCredentialSocket::SendMsg(
send_sock.get(), &msg, sizeof(msg), &test_fd1.get(), 1),
0);
char recv_msg = 0;
ucred creds;
std::vector<ScopedFileHandle> fds;
ASSERT_TRUE(UnixCredentialSocket::RecvMsg(
recv_sock.get(), &recv_msg, sizeof(recv_msg), &creds, &fds));
ASSERT_EQ(fds.size(), 1u);
}
TEST(Socket, RecvClosesFileDescriptors) {
ScopedFileHandle send_sock, recv_sock;
ASSERT_TRUE(
UnixCredentialSocket::CreateCredentialSocketpair(&send_sock, &recv_sock));
ScopedFileHandle send_fds[UnixCredentialSocket::kMaxSendRecvMsgFDs];
ScopedFileHandle recv_fds[UnixCredentialSocket::kMaxSendRecvMsgFDs];
int raw_recv_fds[UnixCredentialSocket::kMaxSendRecvMsgFDs];
for (size_t index = 0; index < UnixCredentialSocket::kMaxSendRecvMsgFDs;
++index) {
ASSERT_TRUE(UnixCredentialSocket::CreateCredentialSocketpair(
&send_fds[index], &recv_fds[index]));
raw_recv_fds[index] = recv_fds[index].get();
}
char msg = 42;
ASSERT_EQ(
UnixCredentialSocket::SendMsg(send_sock.get(),
&msg,
sizeof(msg),
raw_recv_fds,
UnixCredentialSocket::kMaxSendRecvMsgFDs),
0);
char recv_msg = 0;
ucred creds;
ASSERT_TRUE(UnixCredentialSocket::RecvMsg(
recv_sock.get(), &recv_msg, sizeof(recv_msg), &creds));
EXPECT_EQ(creds.pid, getpid());
for (size_t index = 0; index < UnixCredentialSocket::kMaxSendRecvMsgFDs;
++index) {
recv_fds[index].reset();
char c;
EXPECT_EQ(
HANDLE_EINTR(send(send_fds[index].get(), &c, sizeof(c), MSG_NOSIGNAL)),
-1);
EXPECT_EQ(errno, EPIPE);
}
}
} // namespace
} // namespace test
} // namespace crashpad