blob: ccbb8c97760fb25c7ce384cdfe618ee453537582 [file] [log] [blame]
Connor O'Briena963ae82016-09-12 15:52:04 -07001/*
2 * Copyright (C) 2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Mark Salyzyn276758d2018-01-18 07:59:38 -080017#include <errno.h>
18#include <linux/fs.h>
19#include <stdint.h>
20#include <string.h>
21#include <sys/mman.h>
22#include <sys/types.h>
23#include <unistd.h>
24
Vilas Bhatf791b992024-02-13 16:43:09 +000025#include <vector>
26
Mark Salyzyn276758d2018-01-18 07:59:38 -080027#include <android-base/macros.h>
Greg Hackmannbe11d572017-04-05 10:03:10 -070028#include <android-base/unique_fd.h>
Connor O'Briena963ae82016-09-12 15:52:04 -070029#include <cutils/ashmem.h>
30#include <gtest/gtest.h>
Connor O'Briena963ae82016-09-12 15:52:04 -070031
32using android::base::unique_fd;
33
34void TestCreateRegion(size_t size, unique_fd &fd, int prot) {
35 fd = unique_fd(ashmem_create_region(nullptr, size));
36 ASSERT_TRUE(fd >= 0);
37 ASSERT_TRUE(ashmem_valid(fd));
38 ASSERT_EQ(size, static_cast<size_t>(ashmem_get_size_region(fd)));
39 ASSERT_EQ(0, ashmem_set_prot_region(fd, prot));
Elliott Hughes790ef052020-09-03 10:53:16 -070040
41 // We've been inconsistent historically about whether or not these file
42 // descriptors were CLOEXEC. Make sure we're consistent going forward.
43 // https://issuetracker.google.com/165667331
44 ASSERT_EQ(FD_CLOEXEC, (fcntl(fd, F_GETFD) & FD_CLOEXEC));
Connor O'Briena963ae82016-09-12 15:52:04 -070045}
46
Greg Hackmannbe11d572017-04-05 10:03:10 -070047void TestMmap(const unique_fd& fd, size_t size, int prot, void** region, off_t off = 0) {
Mark Salyzyn276758d2018-01-18 07:59:38 -080048 ASSERT_TRUE(fd >= 0);
49 ASSERT_TRUE(ashmem_valid(fd));
Greg Hackmannbe11d572017-04-05 10:03:10 -070050 *region = mmap(nullptr, size, prot, MAP_SHARED, fd, off);
Connor O'Briena963ae82016-09-12 15:52:04 -070051 ASSERT_NE(MAP_FAILED, *region);
52}
53
54void TestProtDenied(const unique_fd &fd, size_t size, int prot) {
Mark Salyzyn276758d2018-01-18 07:59:38 -080055 ASSERT_TRUE(fd >= 0);
56 ASSERT_TRUE(ashmem_valid(fd));
Connor O'Briena963ae82016-09-12 15:52:04 -070057 EXPECT_EQ(MAP_FAILED, mmap(nullptr, size, prot, MAP_SHARED, fd, 0));
58}
59
Greg Hackmann4a9531d2017-04-11 15:08:36 -070060void TestProtIs(const unique_fd& fd, int prot) {
Mark Salyzyn276758d2018-01-18 07:59:38 -080061 ASSERT_TRUE(fd >= 0);
62 ASSERT_TRUE(ashmem_valid(fd));
Greg Hackmann4a9531d2017-04-11 15:08:36 -070063 EXPECT_EQ(prot, ioctl(fd, ASHMEM_GET_PROT_MASK));
64}
65
Vilas Bhatf791b992024-02-13 16:43:09 +000066void FillData(std::vector<uint8_t>& data) {
67 for (size_t i = 0; i < data.size(); i++) {
Connor O'Briena963ae82016-09-12 15:52:04 -070068 data[i] = i & 0xFF;
69 }
70}
71
Connor O'Briena963ae82016-09-12 15:52:04 -070072TEST(AshmemTest, ForkTest) {
Vilas Bhatf791b992024-02-13 16:43:09 +000073 const size_t size = getpagesize();
74 std::vector<uint8_t> data(size);
75 FillData(data);
Connor O'Briena963ae82016-09-12 15:52:04 -070076
77 unique_fd fd;
78 ASSERT_NO_FATAL_FAILURE(TestCreateRegion(size, fd, PROT_READ | PROT_WRITE));
79
Chih-Hung Hsieh0ebbc622022-12-20 11:54:11 -080080 void* region1 = nullptr;
Connor O'Briena963ae82016-09-12 15:52:04 -070081 ASSERT_NO_FATAL_FAILURE(TestMmap(fd, size, PROT_READ | PROT_WRITE, &region1));
82
Vilas Bhatf791b992024-02-13 16:43:09 +000083 memcpy(region1, data.data(), size);
84 ASSERT_EQ(0, memcmp(region1, data.data(), size));
Connor O'Briena963ae82016-09-12 15:52:04 -070085 EXPECT_EQ(0, munmap(region1, size));
86
Mark Salyzyn276758d2018-01-18 07:59:38 -080087 ASSERT_EXIT(
88 {
89 if (!ashmem_valid(fd)) {
90 _exit(3);
91 }
92 void* region2 = mmap(nullptr, size, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0);
93 if (region2 == MAP_FAILED) {
94 _exit(1);
95 }
Vilas Bhatf791b992024-02-13 16:43:09 +000096 if (memcmp(region2, data.data(), size) != 0) {
Mark Salyzyn276758d2018-01-18 07:59:38 -080097 _exit(2);
98 }
99 memset(region2, 0, size);
100 munmap(region2, size);
101 _exit(0);
102 },
103 ::testing::ExitedWithCode(0), "");
Connor O'Briena963ae82016-09-12 15:52:04 -0700104
Vilas Bhatf791b992024-02-13 16:43:09 +0000105 memset(data.data(), 0, size);
Connor O'Briena963ae82016-09-12 15:52:04 -0700106 void *region2;
107 ASSERT_NO_FATAL_FAILURE(TestMmap(fd, size, PROT_READ | PROT_WRITE, &region2));
Vilas Bhatf791b992024-02-13 16:43:09 +0000108 ASSERT_EQ(0, memcmp(region2, data.data(), size));
Connor O'Briena963ae82016-09-12 15:52:04 -0700109 EXPECT_EQ(0, munmap(region2, size));
110}
111
Greg Hackmannbe11d572017-04-05 10:03:10 -0700112TEST(AshmemTest, FileOperationsTest) {
113 unique_fd fd;
Chih-Hung Hsieh0ebbc622022-12-20 11:54:11 -0800114 void* region = nullptr;
Greg Hackmannbe11d572017-04-05 10:03:10 -0700115
116 // Allocate a 4-page buffer, but leave page-sized holes on either side
Vilas Bhatf791b992024-02-13 16:43:09 +0000117 const size_t pageSize = getpagesize();
118 const size_t size = pageSize * 4;
119 const size_t dataSize = pageSize * 2;
120 const size_t holeSize = pageSize;
Greg Hackmannbe11d572017-04-05 10:03:10 -0700121 ASSERT_NO_FATAL_FAILURE(TestCreateRegion(size, fd, PROT_READ | PROT_WRITE));
122 ASSERT_NO_FATAL_FAILURE(TestMmap(fd, dataSize, PROT_READ | PROT_WRITE, &region, holeSize));
123
Vilas Bhatf791b992024-02-13 16:43:09 +0000124 std::vector<uint8_t> data(dataSize);
125 FillData(data);
126 memcpy(region, data.data(), dataSize);
Greg Hackmannbe11d572017-04-05 10:03:10 -0700127
Vilas Bhatf791b992024-02-13 16:43:09 +0000128 const off_t dataStart = holeSize;
129 const off_t dataEnd = dataStart + dataSize;
Greg Hackmannbe11d572017-04-05 10:03:10 -0700130
131 // The sequence of seeks below looks something like this:
132 //
133 // [ ][data][data][ ]
134 // --^ lseek(99, SEEK_SET)
135 // ------^ lseek(dataStart, SEEK_CUR)
136 // ------^ lseek(0, SEEK_DATA)
137 // ------------^ lseek(dataStart, SEEK_HOLE)
138 // ^-- lseek(-99, SEEK_END)
139 // ^------ lseek(-dataStart, SEEK_CUR)
140 const struct {
141 // lseek() parameters
142 off_t offset;
143 int whence;
144 // Expected lseek() return value
145 off_t ret;
146 } seeks[] = {
Vilas Bhatf791b992024-02-13 16:43:09 +0000147 {99, SEEK_SET, 99},
148 {dataStart, SEEK_CUR, dataStart + 99},
149 {0, SEEK_DATA, dataStart},
150 {dataStart, SEEK_HOLE, dataEnd},
151 {-99, SEEK_END, static_cast<off_t>(size) - 99},
152 {-dataStart, SEEK_CUR, dataEnd - 99},
Greg Hackmannbe11d572017-04-05 10:03:10 -0700153 };
154 for (const auto& cfg : seeks) {
155 errno = 0;
Mark Salyzyn276758d2018-01-18 07:59:38 -0800156 ASSERT_TRUE(ashmem_valid(fd));
Greg Hackmannbe11d572017-04-05 10:03:10 -0700157 auto off = lseek(fd, cfg.offset, cfg.whence);
158 ASSERT_EQ(cfg.ret, off) << "lseek(" << cfg.offset << ", " << cfg.whence << ") failed"
159 << (errno ? ": " : "") << (errno ? strerror(errno) : "");
160
161 if (off >= dataStart && off < dataEnd) {
162 off_t dataOff = off - dataStart;
163 ssize_t readSize = dataSize - dataOff;
164 uint8_t buf[readSize];
165
166 ASSERT_EQ(readSize, TEMP_FAILURE_RETRY(read(fd, buf, readSize)));
Vilas Bhatf791b992024-02-13 16:43:09 +0000167 EXPECT_EQ(0, memcmp(buf, &data[dataOff], readSize));
Greg Hackmannbe11d572017-04-05 10:03:10 -0700168 }
169 }
170
171 EXPECT_EQ(0, munmap(region, dataSize));
172}
173
Connor O'Briena963ae82016-09-12 15:52:04 -0700174TEST(AshmemTest, ProtTest) {
175 unique_fd fd;
Vilas Bhatf791b992024-02-13 16:43:09 +0000176 const size_t size = getpagesize();
Connor O'Briena963ae82016-09-12 15:52:04 -0700177 void *region;
178
179 ASSERT_NO_FATAL_FAILURE(TestCreateRegion(size, fd, PROT_READ));
180 TestProtDenied(fd, size, PROT_WRITE);
Greg Hackmann4a9531d2017-04-11 15:08:36 -0700181 TestProtIs(fd, PROT_READ);
Connor O'Briena963ae82016-09-12 15:52:04 -0700182 ASSERT_NO_FATAL_FAILURE(TestMmap(fd, size, PROT_READ, &region));
183 EXPECT_EQ(0, munmap(region, size));
184
185 ASSERT_NO_FATAL_FAILURE(TestCreateRegion(size, fd, PROT_WRITE));
186 TestProtDenied(fd, size, PROT_READ);
Greg Hackmann4a9531d2017-04-11 15:08:36 -0700187 TestProtIs(fd, PROT_WRITE);
Connor O'Briena963ae82016-09-12 15:52:04 -0700188 ASSERT_NO_FATAL_FAILURE(TestMmap(fd, size, PROT_WRITE, &region));
189 EXPECT_EQ(0, munmap(region, size));
Greg Hackmann4a9531d2017-04-11 15:08:36 -0700190
191 ASSERT_NO_FATAL_FAILURE(TestCreateRegion(size, fd, PROT_READ | PROT_WRITE));
192 TestProtIs(fd, PROT_READ | PROT_WRITE);
193 ASSERT_EQ(0, ashmem_set_prot_region(fd, PROT_READ));
194 errno = 0;
195 ASSERT_EQ(-1, ashmem_set_prot_region(fd, PROT_READ | PROT_WRITE))
196 << "kernel shouldn't allow adding protection bits";
197 EXPECT_EQ(EINVAL, errno);
198 TestProtIs(fd, PROT_READ);
199 TestProtDenied(fd, size, PROT_WRITE);
Connor O'Briena963ae82016-09-12 15:52:04 -0700200}
201
202TEST(AshmemTest, ForkProtTest) {
203 unique_fd fd;
Vilas Bhatf791b992024-02-13 16:43:09 +0000204 const size_t size = getpagesize();
Connor O'Briena963ae82016-09-12 15:52:04 -0700205
206 int protFlags[] = { PROT_READ, PROT_WRITE };
Mark Salyzyn276758d2018-01-18 07:59:38 -0800207 for (size_t i = 0; i < arraysize(protFlags); i++) {
Connor O'Briena963ae82016-09-12 15:52:04 -0700208 ASSERT_NO_FATAL_FAILURE(TestCreateRegion(size, fd, PROT_READ | PROT_WRITE));
Mark Salyzyn276758d2018-01-18 07:59:38 -0800209 ASSERT_EXIT(
210 {
211 if (!ashmem_valid(fd)) {
212 _exit(3);
213 } else if (ashmem_set_prot_region(fd, protFlags[i]) >= 0) {
214 _exit(0);
215 } else {
216 _exit(1);
217 }
218 },
219 ::testing::ExitedWithCode(0), "");
Connor O'Briena963ae82016-09-12 15:52:04 -0700220 ASSERT_NO_FATAL_FAILURE(TestProtDenied(fd, size, protFlags[1-i]));
221 }
222}
223
224TEST(AshmemTest, ForkMultiRegionTest) {
Vilas Bhatf791b992024-02-13 16:43:09 +0000225 const size_t size = getpagesize();
226 std::vector<uint8_t> data(size);
227 FillData(data);
Connor O'Briena963ae82016-09-12 15:52:04 -0700228
229 constexpr int nRegions = 16;
230 unique_fd fd[nRegions];
231 for (int i = 0; i < nRegions; i++) {
232 ASSERT_NO_FATAL_FAILURE(TestCreateRegion(size, fd[i], PROT_READ | PROT_WRITE));
Chih-Hung Hsieh0ebbc622022-12-20 11:54:11 -0800233 void* region = nullptr;
Connor O'Briena963ae82016-09-12 15:52:04 -0700234 ASSERT_NO_FATAL_FAILURE(TestMmap(fd[i], size, PROT_READ | PROT_WRITE, &region));
Vilas Bhatf791b992024-02-13 16:43:09 +0000235 memcpy(region, data.data(), size);
236 ASSERT_EQ(0, memcmp(region, data.data(), size));
Connor O'Briena963ae82016-09-12 15:52:04 -0700237 EXPECT_EQ(0, munmap(region, size));
238 }
239
240 ASSERT_EXIT({
241 for (int i = 0; i < nRegions; i++) {
Mark Salyzyn276758d2018-01-18 07:59:38 -0800242 if (!ashmem_valid(fd[i])) {
243 _exit(3);
244 }
Connor O'Briena963ae82016-09-12 15:52:04 -0700245 void *region = mmap(nullptr, size, PROT_READ | PROT_WRITE, MAP_SHARED, fd[i], 0);
246 if (region == MAP_FAILED) {
247 _exit(1);
248 }
Vilas Bhatf791b992024-02-13 16:43:09 +0000249 if (memcmp(region, data.data(), size) != 0) {
Connor O'Briena963ae82016-09-12 15:52:04 -0700250 munmap(region, size);
251 _exit(2);
252 }
253 memset(region, 0, size);
254 munmap(region, size);
255 }
256 _exit(0);
257 }, ::testing::ExitedWithCode(0), "");
258
Vilas Bhatf791b992024-02-13 16:43:09 +0000259 memset(data.data(), 0, size);
Connor O'Briena963ae82016-09-12 15:52:04 -0700260 for (int i = 0; i < nRegions; i++) {
261 void *region;
262 ASSERT_NO_FATAL_FAILURE(TestMmap(fd[i], size, PROT_READ | PROT_WRITE, &region));
Vilas Bhatf791b992024-02-13 16:43:09 +0000263 ASSERT_EQ(0, memcmp(region, data.data(), size));
Connor O'Briena963ae82016-09-12 15:52:04 -0700264 EXPECT_EQ(0, munmap(region, size));
265 }
266}