xref: /aosp_15_r20/external/sandboxed-api/sandboxed_api/sandbox2/buffer_test.cc (revision ec63e07ab9515d95e79c211197c445ef84cefa6a)
1*ec63e07aSXin Li // Copyright 2019 Google LLC
2*ec63e07aSXin Li //
3*ec63e07aSXin Li // Licensed under the Apache License, Version 2.0 (the "License");
4*ec63e07aSXin Li // you may not use this file except in compliance with the License.
5*ec63e07aSXin Li // You may obtain a copy of the License at
6*ec63e07aSXin Li //
7*ec63e07aSXin Li //     https://www.apache.org/licenses/LICENSE-2.0
8*ec63e07aSXin Li //
9*ec63e07aSXin Li // Unless required by applicable law or agreed to in writing, software
10*ec63e07aSXin Li // distributed under the License is distributed on an "AS IS" BASIS,
11*ec63e07aSXin Li // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12*ec63e07aSXin Li // See the License for the specific language governing permissions and
13*ec63e07aSXin Li // limitations under the License.
14*ec63e07aSXin Li 
15*ec63e07aSXin Li #include "sandboxed_api/sandbox2/buffer.h"
16*ec63e07aSXin Li 
17*ec63e07aSXin Li #include <sys/stat.h>
18*ec63e07aSXin Li #include <unistd.h>
19*ec63e07aSXin Li 
20*ec63e07aSXin Li #include <cstdint>
21*ec63e07aSXin Li #include <memory>
22*ec63e07aSXin Li #include <string>
23*ec63e07aSXin Li #include <utility>
24*ec63e07aSXin Li #include <vector>
25*ec63e07aSXin Li 
26*ec63e07aSXin Li #include "gmock/gmock.h"
27*ec63e07aSXin Li #include "gtest/gtest.h"
28*ec63e07aSXin Li #include "sandboxed_api/sandbox2/executor.h"
29*ec63e07aSXin Li #include "sandboxed_api/sandbox2/ipc.h"
30*ec63e07aSXin Li #include "sandboxed_api/sandbox2/policy.h"
31*ec63e07aSXin Li #include "sandboxed_api/sandbox2/result.h"
32*ec63e07aSXin Li #include "sandboxed_api/sandbox2/sandbox2.h"
33*ec63e07aSXin Li #include "sandboxed_api/testing.h"
34*ec63e07aSXin Li #include "sandboxed_api/util/status_matchers.h"
35*ec63e07aSXin Li 
36*ec63e07aSXin Li namespace sandbox2 {
37*ec63e07aSXin Li namespace {
38*ec63e07aSXin Li 
39*ec63e07aSXin Li using ::sapi::CreateDefaultPermissiveTestPolicy;
40*ec63e07aSXin Li using ::sapi::GetTestSourcePath;
41*ec63e07aSXin Li using ::testing::Eq;
42*ec63e07aSXin Li using ::testing::Ne;
43*ec63e07aSXin Li 
44*ec63e07aSXin Li // Test all public methods of sandbox2::Buffer.
TEST(BufferTest,TestImplementation)45*ec63e07aSXin Li TEST(BufferTest, TestImplementation) {
46*ec63e07aSXin Li   constexpr int kSize = 1024;
47*ec63e07aSXin Li   SAPI_ASSERT_OK_AND_ASSIGN(auto buffer, Buffer::CreateWithSize(kSize));
48*ec63e07aSXin Li   EXPECT_THAT(buffer->size(), Eq(kSize));
49*ec63e07aSXin Li   uint8_t* raw_buf = buffer->data();
50*ec63e07aSXin Li   for (int i = 0; i < kSize; i++) {
51*ec63e07aSXin Li     raw_buf[i] = 'X';
52*ec63e07aSXin Li   }
53*ec63e07aSXin Li   SAPI_ASSERT_OK_AND_ASSIGN(auto buffer2, Buffer::CreateFromFd(buffer->fd()));
54*ec63e07aSXin Li   uint8_t* raw_buf2 = buffer2->data();
55*ec63e07aSXin Li   for (int i = 0; i < kSize; i++) {
56*ec63e07aSXin Li     EXPECT_THAT(raw_buf2[i], Eq('X'));
57*ec63e07aSXin Li   }
58*ec63e07aSXin Li }
59*ec63e07aSXin Li 
60*ec63e07aSXin Li // Test sharing of buffer between executor/sandboxee using dup/MapFd.
TEST(BufferTest,TestWithSandboxeeMapFd)61*ec63e07aSXin Li TEST(BufferTest, TestWithSandboxeeMapFd) {
62*ec63e07aSXin Li   const std::string path = GetTestSourcePath("sandbox2/testcases/buffer");
63*ec63e07aSXin Li   std::vector<std::string> args = {path};
64*ec63e07aSXin Li   auto executor = std::make_unique<Executor>(path, args);
65*ec63e07aSXin Li   SAPI_ASSERT_OK_AND_ASSIGN(auto policy,
66*ec63e07aSXin Li                             CreateDefaultPermissiveTestPolicy(path).TryBuild());
67*ec63e07aSXin Li 
68*ec63e07aSXin Li   SAPI_ASSERT_OK_AND_ASSIGN(auto buffer,
69*ec63e07aSXin Li                             Buffer::CreateWithSize(1ULL << 20 /* 1MiB */));
70*ec63e07aSXin Li   // buffer() uses the internal fd to mmap the buffer.
71*ec63e07aSXin Li   uint8_t* buf = buffer->data();
72*ec63e07aSXin Li   // Test that we can write data to the sandboxee.
73*ec63e07aSXin Li   buf[0] = 'A';
74*ec63e07aSXin Li 
75*ec63e07aSXin Li   // Map buffer as fd 3, but careful because MapFd closes the buffer fd and
76*ec63e07aSXin Li   // we need to keep it since buffer uses it for mmap, so we must dup.
77*ec63e07aSXin Li   executor->ipc()->MapFd(dup(buffer->fd()), 3);
78*ec63e07aSXin Li 
79*ec63e07aSXin Li   Sandbox2 s2(std::move(executor), std::move(policy));
80*ec63e07aSXin Li   auto result = s2.Run();
81*ec63e07aSXin Li 
82*ec63e07aSXin Li   EXPECT_THAT(result.final_status(), Eq(Result::OK));
83*ec63e07aSXin Li   EXPECT_THAT(result.reason_code(), Eq(0));
84*ec63e07aSXin Li 
85*ec63e07aSXin Li   // Test that we can read data from the sandboxee.
86*ec63e07aSXin Li   EXPECT_THAT(buf[buffer->size() - 1], Eq('B'));
87*ec63e07aSXin Li 
88*ec63e07aSXin Li   // Test that internal buffer fd remains valid.
89*ec63e07aSXin Li   struct stat stat_buf;
90*ec63e07aSXin Li   EXPECT_THAT(fstat(buffer->fd(), &stat_buf), Ne(-1));
91*ec63e07aSXin Li }
92*ec63e07aSXin Li }  // namespace
93*ec63e07aSXin Li }  // namespace sandbox2
94