1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style license that can be 3 // found in the LICENSE file. 4 5 #include <stddef.h> 6 #include <stdint.h> 7 #include <sys/socket.h> 8 #include <sys/types.h> 9 #include <unistd.h> 10 11 #include "base/bind.h" 12 #include "base/bind_helpers.h" 13 #include "base/files/file_util.h" 14 #include "base/files/scoped_file.h" 15 #include "base/location.h" 16 #include "base/pickle.h" 17 #include "base/posix/unix_domain_socket_linux.h" 18 #include "base/single_thread_task_runner.h" 19 #include "base/synchronization/waitable_event.h" 20 #include "base/threading/thread.h" 21 #include "testing/gtest/include/gtest/gtest.h" 22 23 namespace base { 24 25 namespace { 26 27 TEST(UnixDomainSocketTest, SendRecvMsgAbortOnReplyFDClose) { 28 Thread message_thread("UnixDomainSocketTest"); 29 ASSERT_TRUE(message_thread.Start()); 30 31 int fds[2]; 32 ASSERT_EQ(0, socketpair(AF_UNIX, SOCK_SEQPACKET, 0, fds)); 33 ScopedFD scoped_fd0(fds[0]); 34 ScopedFD scoped_fd1(fds[1]); 35 36 // Have the thread send a synchronous message via the socket. 37 Pickle request; 38 message_thread.task_runner()->PostTask( 39 FROM_HERE, 40 Bind(IgnoreResult(&UnixDomainSocket::SendRecvMsg), fds[1], 41 static_cast<uint8_t*>(NULL), 0U, static_cast<int*>(NULL), request)); 42 43 // Receive the message. 44 std::vector<ScopedFD> message_fds; 45 uint8_t buffer[16]; 46 ASSERT_EQ(static_cast<int>(request.size()), 47 UnixDomainSocket::RecvMsg(fds[0], buffer, sizeof(buffer), 48 &message_fds)); 49 ASSERT_EQ(1U, message_fds.size()); 50 51 // Close the reply FD. 52 message_fds.clear(); 53 54 // Check that the thread didn't get blocked. 55 WaitableEvent event(WaitableEvent::ResetPolicy::AUTOMATIC, 56 WaitableEvent::InitialState::NOT_SIGNALED); 57 message_thread.task_runner()->PostTask( 58 FROM_HERE, Bind(&WaitableEvent::Signal, Unretained(&event))); 59 ASSERT_TRUE(event.TimedWait(TimeDelta::FromMilliseconds(5000))); 60 } 61 62 TEST(UnixDomainSocketTest, SendRecvMsgAvoidsSIGPIPE) { 63 // Make sure SIGPIPE isn't being ignored. 64 struct sigaction act = {}, oldact; 65 act.sa_handler = SIG_DFL; 66 ASSERT_EQ(0, sigaction(SIGPIPE, &act, &oldact)); 67 int fds[2]; 68 ASSERT_EQ(0, socketpair(AF_UNIX, SOCK_SEQPACKET, 0, fds)); 69 ScopedFD scoped_fd1(fds[1]); 70 ASSERT_EQ(0, IGNORE_EINTR(close(fds[0]))); 71 72 // Have the thread send a synchronous message via the socket. Unless the 73 // message is sent with MSG_NOSIGNAL, this shall result in SIGPIPE. 74 Pickle request; 75 ASSERT_EQ(-1, 76 UnixDomainSocket::SendRecvMsg(fds[1], static_cast<uint8_t*>(NULL), 77 0U, static_cast<int*>(NULL), request)); 78 ASSERT_EQ(EPIPE, errno); 79 // Restore the SIGPIPE handler. 80 ASSERT_EQ(0, sigaction(SIGPIPE, &oldact, NULL)); 81 } 82 83 // Simple sanity check within a single process that receiving PIDs works. 84 TEST(UnixDomainSocketTest, RecvPid) { 85 int fds[2]; 86 ASSERT_EQ(0, socketpair(AF_UNIX, SOCK_SEQPACKET, 0, fds)); 87 ScopedFD recv_sock(fds[0]); 88 ScopedFD send_sock(fds[1]); 89 90 ASSERT_TRUE(UnixDomainSocket::EnableReceiveProcessId(recv_sock.get())); 91 92 static const char kHello[] = "hello"; 93 ASSERT_TRUE(UnixDomainSocket::SendMsg( 94 send_sock.get(), kHello, sizeof(kHello), std::vector<int>())); 95 96 // Extra receiving buffer space to make sure we really received only 97 // sizeof(kHello) bytes and it wasn't just truncated to fit the buffer. 98 char buf[sizeof(kHello) + 1]; 99 ProcessId sender_pid; 100 std::vector<ScopedFD> fd_vec; 101 const ssize_t nread = UnixDomainSocket::RecvMsgWithPid( 102 recv_sock.get(), buf, sizeof(buf), &fd_vec, &sender_pid); 103 ASSERT_EQ(sizeof(kHello), static_cast<size_t>(nread)); 104 ASSERT_EQ(0, memcmp(buf, kHello, sizeof(kHello))); 105 ASSERT_EQ(0U, fd_vec.size()); 106 107 ASSERT_EQ(getpid(), sender_pid); 108 } 109 110 // Same as above, but send the max number of file descriptors too. 111 TEST(UnixDomainSocketTest, RecvPidWithMaxDescriptors) { 112 int fds[2]; 113 ASSERT_EQ(0, socketpair(AF_UNIX, SOCK_SEQPACKET, 0, fds)); 114 ScopedFD recv_sock(fds[0]); 115 ScopedFD send_sock(fds[1]); 116 117 ASSERT_TRUE(UnixDomainSocket::EnableReceiveProcessId(recv_sock.get())); 118 119 static const char kHello[] = "hello"; 120 std::vector<int> send_fds(UnixDomainSocket::kMaxFileDescriptors, 121 send_sock.get()); 122 ASSERT_TRUE(UnixDomainSocket::SendMsg( 123 send_sock.get(), kHello, sizeof(kHello), send_fds)); 124 125 // Extra receiving buffer space to make sure we really received only 126 // sizeof(kHello) bytes and it wasn't just truncated to fit the buffer. 127 char buf[sizeof(kHello) + 1]; 128 ProcessId sender_pid; 129 std::vector<ScopedFD> recv_fds; 130 const ssize_t nread = UnixDomainSocket::RecvMsgWithPid( 131 recv_sock.get(), buf, sizeof(buf), &recv_fds, &sender_pid); 132 ASSERT_EQ(sizeof(kHello), static_cast<size_t>(nread)); 133 ASSERT_EQ(0, memcmp(buf, kHello, sizeof(kHello))); 134 ASSERT_EQ(UnixDomainSocket::kMaxFileDescriptors, recv_fds.size()); 135 136 ASSERT_EQ(getpid(), sender_pid); 137 } 138 139 // Check that RecvMsgWithPid doesn't DCHECK fail when reading EOF from a 140 // disconnected socket. 141 TEST(UnixDomianSocketTest, RecvPidDisconnectedSocket) { 142 int fds[2]; 143 ASSERT_EQ(0, socketpair(AF_UNIX, SOCK_SEQPACKET, 0, fds)); 144 ScopedFD recv_sock(fds[0]); 145 ScopedFD send_sock(fds[1]); 146 147 ASSERT_TRUE(UnixDomainSocket::EnableReceiveProcessId(recv_sock.get())); 148 149 send_sock.reset(); 150 151 char ch; 152 ProcessId sender_pid; 153 std::vector<ScopedFD> recv_fds; 154 const ssize_t nread = UnixDomainSocket::RecvMsgWithPid( 155 recv_sock.get(), &ch, sizeof(ch), &recv_fds, &sender_pid); 156 ASSERT_EQ(0, nread); 157 ASSERT_EQ(-1, sender_pid); 158 ASSERT_EQ(0U, recv_fds.size()); 159 } 160 161 } // namespace 162 163 } // namespace base 164