1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172
|
// Copyright 2024 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/memory/shared_memory_switch.h"
#include "base/base_switches.h"
#include "base/command_line.h"
#include "base/metrics/persistent_histogram_allocator.h"
#include "base/process/launch.h"
#include "base/strings/string_number_conversions.h"
#include "base/strings/string_split.h"
#include "base/strings/stringprintf.h"
#include "base/strings/to_string.h"
#include "base/test/multiprocess_test.h"
#include "base/test/scoped_feature_list.h"
#include "base/test/test_timeouts.h"
#include "base/unguessable_token.h"
#include "build/build_config.h"
#include "testing/gtest/include/gtest/gtest.h"
#include "testing/multiprocess_func_list.h"
#if BUILDFLAG(IS_POSIX) || BUILDFLAG(IS_FUCHSIA)
#include "base/files/platform_file.h"
#include "base/posix/global_descriptors.h"
#endif
namespace base::shared_memory {
namespace {
constexpr char kSharedMemoryData[] = "shared_memory_data";
constexpr char kSharedMemoryGUID[] = "shared_memory_guid";
constexpr char kIsReadOnly[] = "is_read_only";
constexpr size_t kArbitrarySize = 64 << 10;
#if BUILDFLAG(IS_APPLE)
constexpr MachPortsForRendezvous::key_type kArbitraryRendezvousKey = 'smsh';
#elif BUILDFLAG(IS_POSIX)
constexpr GlobalDescriptors::Key kArbitraryDescriptorKey = 42;
#endif
} // namespace
MULTIPROCESS_TEST_MAIN(InitFromSwitchValue) {
const CommandLine& command_line = *CommandLine::ForCurrentProcess();
CHECK(command_line.HasSwitch(kSharedMemoryData));
CHECK(command_line.HasSwitch(kSharedMemoryGUID));
CHECK(command_line.HasSwitch(kIsReadOnly));
// On POSIX we generally use the descriptor map to look up inherited handles.
// On most POSIX platforms we have to manually sure the mapping is updated,
// for the purposes of this test.
//
// Note:
// - This doesn't apply on Apple platforms (which use Rendezvous Keys)
// - On Android the global descriptor table is managed by the launcher
// service, so we don't have to manually update the mapping here.
#if BUILDFLAG(IS_POSIX) && !BUILDFLAG(IS_APPLE) && !BUILDFLAG(IS_ANDROID)
GlobalDescriptors::GetInstance()->Set(
kArbitraryDescriptorKey,
kArbitraryDescriptorKey + GlobalDescriptors::kBaseDescriptor);
#endif
const std::string shared_memory_data =
command_line.GetSwitchValueASCII(kSharedMemoryData);
const bool is_read_only =
command_line.GetSwitchValueASCII(kIsReadOnly) == "true";
const std::string guid_string =
command_line.GetSwitchValueASCII(kSharedMemoryGUID);
if (is_read_only) {
auto read_only_region = ReadOnlySharedMemoryRegionFrom(shared_memory_data);
CHECK(read_only_region.has_value());
CHECK_EQ(guid_string, read_only_region.value().GetGUID().ToString());
} else {
auto unsafe_region = UnsafeSharedMemoryRegionFrom(shared_memory_data);
CHECK(unsafe_region.has_value());
CHECK_EQ(guid_string, unsafe_region.value().GetGUID().ToString());
}
return 0;
}
// The test suite takes two boolean parameters.
using SharedMemorySwitchTest = ::testing::TestWithParam<std::tuple<bool, bool>>;
// Instantiate tests for all combinations of the two boolean parameters.
INSTANTIATE_TEST_SUITE_P(All,
SharedMemorySwitchTest,
::testing::Combine(testing::Bool(), testing::Bool()));
TEST_P(SharedMemorySwitchTest, PassViaSwitch) {
const bool read_only = std::get<0>(GetParam());
const bool elevated = std::get<1>(GetParam());
SCOPED_TRACE(
base::StringPrintf("read_only=%d; elevated=%d", read_only, elevated));
// Create a shared memory region(s) to pass.
auto unsafe_region = UnsafeSharedMemoryRegion::Create(kArbitrarySize);
auto read_only_region = ReadOnlySharedMemoryRegion::Create(kArbitrarySize);
ASSERT_TRUE(unsafe_region.IsValid());
ASSERT_TRUE(read_only_region.IsValid());
// Initialize the command line and launch options.
CommandLine command_line = GetMultiProcessTestChildBaseCommandLine();
command_line.AppendSwitchASCII(
kSharedMemoryGUID,
(read_only ? read_only_region.region.GetGUID() : unsafe_region.GetGUID())
.ToString());
command_line.AppendSwitchASCII(kIsReadOnly, base::ToString(read_only));
LaunchOptions launch_options;
// On windows, check both the elevated and non-elevated launches.
#if BUILDFLAG(IS_WIN)
launch_options.start_hidden = true;
launch_options.elevated = elevated;
#elif BUILDFLAG(IS_POSIX) && !BUILDFLAG(IS_APPLE)
ScopedFD descriptor_to_share;
#endif
// Update the launch parameters.
if (read_only) {
AddToLaunchParameters(kSharedMemoryData, read_only_region.region,
#if BUILDFLAG(IS_APPLE)
kArbitraryRendezvousKey,
#elif BUILDFLAG(IS_POSIX)
kArbitraryDescriptorKey, descriptor_to_share,
#endif
&command_line, &launch_options);
} else {
AddToLaunchParameters(kSharedMemoryData, unsafe_region,
#if BUILDFLAG(IS_APPLE)
kArbitraryRendezvousKey,
#elif BUILDFLAG(IS_POSIX)
kArbitraryDescriptorKey, descriptor_to_share,
#endif
&command_line, &launch_options);
}
// The metrics shared memory handle should be added to the command line.
ASSERT_TRUE(command_line.HasSwitch(kSharedMemoryData));
SCOPED_TRACE(command_line.GetSwitchValueASCII(kSharedMemoryData));
#if BUILDFLAG(IS_POSIX) && !BUILDFLAG(IS_APPLE)
// On posix, AddToLaunchParameters() ignores the launch options and instead
// returns the descriptor to be shared. This is because the browser child
// launcher helper manages a separate list of files to share via the zygote,
// if available. If, like in this test scenario, there's ultimately no zygote
// to use, launch helper updates the launch options to share the descriptor
// mapping relative to a base descriptor.
launch_options.fds_to_remap.emplace_back(descriptor_to_share.get(),
kArbitraryDescriptorKey);
#if !BUILDFLAG(IS_ANDROID)
for (auto& pair : launch_options.fds_to_remap) {
pair.second += base::GlobalDescriptors::kBaseDescriptor;
}
#endif // !BUILDFLAG(IS_ANDROID)
#endif // BUILDFLAG(IS_POSIX) && !BUILDFLAG(IS_APPLE)
// Launch the child process.
Process process = SpawnMultiProcessTestChild("InitFromSwitchValue",
command_line, launch_options);
// The child process returns non-zero if it could not open the shared memory
// region based on the launch parameters.
int exit_code;
EXPECT_TRUE(WaitForMultiprocessTestChildExit(
process, TestTimeouts::action_timeout(), &exit_code));
EXPECT_EQ(0, exit_code);
}
} // namespace base::shared_memory
|