blob: 4abcc4c6254308a8d2980d72ccebd9cdd7bd7a37 [file] [log] [blame]
tedvessenes@gmail.com30dbbaa2012-01-13 09:11:01 +09001// Copyright (c) 2012 The Chromium Authors. All rights reserved.
agl@chromium.org1c6dcf22009-07-23 08:57:21 +09002// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include <stdio.h>
agl@chromium.org1c6dcf22009-07-23 08:57:21 +09006#include <string>
7#include <sstream>
8
avi@chromium.orga29af562013-07-18 08:00:30 +09009#include "base/message_loop/message_loop.h"
brettw@google.com7c5cc672011-01-01 11:17:08 +090010#include "base/threading/platform_thread.h"
viettrungluu@chromium.org7d86af22013-01-12 00:13:37 +090011#include "ipc/ipc_test_base.h"
agl@chromium.org1c6dcf22009-07-23 08:57:21 +090012#include "testing/gtest/include/gtest/gtest.h"
agl@chromium.org1c6dcf22009-07-23 08:57:21 +090013
viettrungluu@chromium.org7ca19132013-01-12 05:56:22 +090014// IPC messages for testing ----------------------------------------------------
darin@chromium.orgb4587d52011-08-27 06:27:30 +090015
16#define IPC_MESSAGE_IMPL
17#include "ipc/ipc_message_macros.h"
18
19#define IPC_MESSAGE_START TestMsgStart
20
21// Generic message class that is an int followed by a wstring.
22IPC_MESSAGE_CONTROL2(MsgClassIS, int, std::wstring)
23
24// Generic message class that is a wstring followed by an int.
25IPC_MESSAGE_CONTROL2(MsgClassSI, std::wstring, int)
26
27// Message to create a mutex in the IPC server, using the received name.
28IPC_MESSAGE_CONTROL2(MsgDoMutex, std::wstring, int)
29
30// Used to generate an ID for a message that should not exist.
31IPC_MESSAGE_CONTROL0(MsgUnhandled)
32
viettrungluu@chromium.org7ca19132013-01-12 05:56:22 +090033// -----------------------------------------------------------------------------
34
35namespace {
darin@chromium.orgb4587d52011-08-27 06:27:30 +090036
agl@chromium.org1c6dcf22009-07-23 08:57:21 +090037TEST(IPCMessageIntegrity, ReadBeyondBufferStr) {
38 //This was BUG 984408.
39 uint32 v1 = kuint32max - 1;
40 int v2 = 666;
bbudge@chromium.orgab4c6bc2013-11-05 07:28:12 +090041 IPC::Message m(0, 1, IPC::Message::PRIORITY_NORMAL);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +090042 EXPECT_TRUE(m.WriteInt(v1));
43 EXPECT_TRUE(m.WriteInt(v2));
44
jbates@chromium.org0fc87362012-03-08 05:42:56 +090045 PickleIterator iter(m);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +090046 std::string vs;
47 EXPECT_FALSE(m.ReadString(&iter, &vs));
48}
49
50TEST(IPCMessageIntegrity, ReadBeyondBufferWStr) {
51 //This was BUG 984408.
52 uint32 v1 = kuint32max - 1;
53 int v2 = 777;
bbudge@chromium.orgab4c6bc2013-11-05 07:28:12 +090054 IPC::Message m(0, 1, IPC::Message::PRIORITY_NORMAL);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +090055 EXPECT_TRUE(m.WriteInt(v1));
56 EXPECT_TRUE(m.WriteInt(v2));
57
jbates@chromium.org0fc87362012-03-08 05:42:56 +090058 PickleIterator iter(m);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +090059 std::wstring vs;
60 EXPECT_FALSE(m.ReadWString(&iter, &vs));
61}
62
63TEST(IPCMessageIntegrity, ReadBytesBadIterator) {
64 // This was BUG 1035467.
bbudge@chromium.orgab4c6bc2013-11-05 07:28:12 +090065 IPC::Message m(0, 1, IPC::Message::PRIORITY_NORMAL);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +090066 EXPECT_TRUE(m.WriteInt(1));
67 EXPECT_TRUE(m.WriteInt(2));
68
jbates@chromium.org0fc87362012-03-08 05:42:56 +090069 PickleIterator iter(m);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +090070 const char* data = NULL;
mpcomplete@chromium.org0409ecb2010-03-31 08:52:24 +090071 EXPECT_TRUE(m.ReadBytes(&iter, &data, sizeof(int)));
agl@chromium.org1c6dcf22009-07-23 08:57:21 +090072}
73
74TEST(IPCMessageIntegrity, ReadVectorNegativeSize) {
75 // A slight variation of BUG 984408. Note that the pickling of vector<char>
76 // has a specialized template which is not vulnerable to this bug. So here
77 // try to hit the non-specialized case vector<P>.
bbudge@chromium.orgab4c6bc2013-11-05 07:28:12 +090078 IPC::Message m(0, 1, IPC::Message::PRIORITY_NORMAL);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +090079 EXPECT_TRUE(m.WriteInt(-1)); // This is the count of elements.
80 EXPECT_TRUE(m.WriteInt(1));
81 EXPECT_TRUE(m.WriteInt(2));
82 EXPECT_TRUE(m.WriteInt(3));
83
84 std::vector<double> vec;
jbates@chromium.org0fc87362012-03-08 05:42:56 +090085 PickleIterator iter(m);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +090086 EXPECT_FALSE(ReadParam(&m, &iter, &vec));
87}
88
89TEST(IPCMessageIntegrity, ReadVectorTooLarge1) {
90 // This was BUG 1006367. This is the large but positive length case. Again
91 // we try to hit the non-specialized case vector<P>.
bbudge@chromium.orgab4c6bc2013-11-05 07:28:12 +090092 IPC::Message m(0, 1, IPC::Message::PRIORITY_NORMAL);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +090093 EXPECT_TRUE(m.WriteInt(0x21000003)); // This is the count of elements.
94 EXPECT_TRUE(m.WriteInt64(1));
95 EXPECT_TRUE(m.WriteInt64(2));
96
97 std::vector<int64> vec;
jbates@chromium.org0fc87362012-03-08 05:42:56 +090098 PickleIterator iter(m);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +090099 EXPECT_FALSE(ReadParam(&m, &iter, &vec));
100}
101
102TEST(IPCMessageIntegrity, ReadVectorTooLarge2) {
103 // This was BUG 1006367. This is the large but positive with an additional
104 // integer overflow when computing the actual byte size. Again we try to hit
105 // the non-specialized case vector<P>.
bbudge@chromium.orgab4c6bc2013-11-05 07:28:12 +0900106 IPC::Message m(0, 1, IPC::Message::PRIORITY_NORMAL);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900107 EXPECT_TRUE(m.WriteInt(0x71000000)); // This is the count of elements.
108 EXPECT_TRUE(m.WriteInt64(1));
109 EXPECT_TRUE(m.WriteInt64(2));
110
111 std::vector<int64> vec;
jbates@chromium.org0fc87362012-03-08 05:42:56 +0900112 PickleIterator iter(m);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900113 EXPECT_FALSE(ReadParam(&m, &iter, &vec));
114}
115
brettw@chromium.orgf947ed02012-06-12 07:35:26 +0900116class SimpleListener : public IPC::Listener {
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900117 public:
118 SimpleListener() : other_(NULL) {
119 }
brettw@chromium.orgf947ed02012-06-12 07:35:26 +0900120 void Init(IPC::Sender* s) {
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900121 other_ = s;
122 }
123 protected:
brettw@chromium.orgf947ed02012-06-12 07:35:26 +0900124 IPC::Sender* other_;
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900125};
126
127enum {
128 FUZZER_ROUTING_ID = 5
129};
130
131// The fuzzer server class. It runs in a child process and expects
132// only two IPC calls; after that it exits the message loop which
133// terminates the child process.
134class FuzzerServerListener : public SimpleListener {
135 public:
136 FuzzerServerListener() : message_count_(2), pending_messages_(0) {
137 }
rsleevi@chromium.org5a8d7ef2013-02-06 19:08:55 +0900138 virtual bool OnMessageReceived(const IPC::Message& msg) OVERRIDE {
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900139 if (msg.routing_id() == MSG_ROUTING_CONTROL) {
140 ++pending_messages_;
141 IPC_BEGIN_MESSAGE_MAP(FuzzerServerListener, msg)
142 IPC_MESSAGE_HANDLER(MsgClassIS, OnMsgClassISMessage)
143 IPC_MESSAGE_HANDLER(MsgClassSI, OnMsgClassSIMessage)
144 IPC_END_MESSAGE_MAP()
145 if (pending_messages_) {
146 // Probably a problem de-serializing the message.
147 ReplyMsgNotHandled(msg.type());
148 }
149 }
jam@chromium.org8a2c7842010-12-24 15:19:28 +0900150 return true;
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900151 }
152
153 private:
154 void OnMsgClassISMessage(int value, const std::wstring& text) {
155 UseData(MsgClassIS::ID, value, text);
156 RoundtripAckReply(FUZZER_ROUTING_ID, MsgClassIS::ID, value);
157 Cleanup();
158 }
159
160 void OnMsgClassSIMessage(const std::wstring& text, int value) {
161 UseData(MsgClassSI::ID, value, text);
162 RoundtripAckReply(FUZZER_ROUTING_ID, MsgClassSI::ID, value);
163 Cleanup();
164 }
165
thomasvl@google.com9a242072010-07-23 23:18:59 +0900166 bool RoundtripAckReply(int routing, uint32 type_id, int reply) {
bbudge@chromium.orgab4c6bc2013-11-05 07:28:12 +0900167 IPC::Message* message = new IPC::Message(routing, type_id,
168 IPC::Message::PRIORITY_NORMAL);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900169 message->WriteInt(reply + 1);
170 message->WriteInt(reply);
171 return other_->Send(message);
172 }
173
174 void Cleanup() {
175 --message_count_;
176 --pending_messages_;
177 if (0 == message_count_)
xhwang@chromium.org0b2c2a52013-05-01 05:55:03 +0900178 base::MessageLoop::current()->Quit();
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900179 }
180
thomasvl@google.com9a242072010-07-23 23:18:59 +0900181 void ReplyMsgNotHandled(uint32 type_id) {
darin@chromium.orgb4587d52011-08-27 06:27:30 +0900182 RoundtripAckReply(FUZZER_ROUTING_ID, MsgUnhandled::ID, type_id);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900183 Cleanup();
184 }
185
186 void UseData(int caller, int value, const std::wstring& text) {
187 std::wostringstream wos;
188 wos << L"IPC fuzzer:" << caller << " [" << value << L" " << text << L"]\n";
189 std::wstring output = wos.str();
190 LOG(WARNING) << output.c_str();
191 };
192
193 int message_count_;
194 int pending_messages_;
195};
196
197class FuzzerClientListener : public SimpleListener {
198 public:
199 FuzzerClientListener() : last_msg_(NULL) {
200 }
201
rsleevi@chromium.org5a8d7ef2013-02-06 19:08:55 +0900202 virtual bool OnMessageReceived(const IPC::Message& msg) OVERRIDE {
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900203 last_msg_ = new IPC::Message(msg);
xhwang@chromium.org0b2c2a52013-05-01 05:55:03 +0900204 base::MessageLoop::current()->Quit();
jam@chromium.org8a2c7842010-12-24 15:19:28 +0900205 return true;
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900206 }
207
thomasvl@google.com9a242072010-07-23 23:18:59 +0900208 bool ExpectMessage(int value, uint32 type_id) {
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900209 if (!MsgHandlerInternal(type_id))
210 return false;
211 int msg_value1 = 0;
212 int msg_value2 = 0;
jbates@chromium.org0fc87362012-03-08 05:42:56 +0900213 PickleIterator iter(*last_msg_);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900214 if (!last_msg_->ReadInt(&iter, &msg_value1))
215 return false;
216 if (!last_msg_->ReadInt(&iter, &msg_value2))
217 return false;
218 if ((msg_value2 + 1) != msg_value1)
219 return false;
220 if (msg_value2 != value)
221 return false;
222
223 delete last_msg_;
224 last_msg_ = NULL;
225 return true;
226 }
227
thomasvl@google.com9a242072010-07-23 23:18:59 +0900228 bool ExpectMsgNotHandled(uint32 type_id) {
darin@chromium.orgb4587d52011-08-27 06:27:30 +0900229 return ExpectMessage(type_id, MsgUnhandled::ID);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900230 }
231
232 private:
thomasvl@google.com9a242072010-07-23 23:18:59 +0900233 bool MsgHandlerInternal(uint32 type_id) {
xhwang@chromium.org0b2c2a52013-05-01 05:55:03 +0900234 base::MessageLoop::current()->Run();
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900235 if (NULL == last_msg_)
236 return false;
237 if (FUZZER_ROUTING_ID != last_msg_->routing_id())
238 return false;
239 return (type_id == last_msg_->type());
240 };
241
242 IPC::Message* last_msg_;
243};
244
viettrungluu@chromium.org00155942013-01-26 06:51:35 +0900245// Runs the fuzzing server child mode. Returns when the preset number of
246// messages have been received.
247MULTIPROCESS_IPC_TEST_CLIENT_MAIN(FuzzServerClient) {
xhwang@chromium.org0b2c2a52013-05-01 05:55:03 +0900248 base::MessageLoopForIO main_message_loop;
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900249 FuzzerServerListener listener;
morrita@chromium.org2ced0042014-05-30 12:58:59 +0900250 scoped_ptr<IPC::Channel> channel(IPC::Channel::CreateClient(
251 IPCTestBase::GetChannelName("FuzzServerClient"),
252 &listener));
253 CHECK(channel->Connect());
254 listener.Init(channel.get());
xhwang@chromium.org0b2c2a52013-05-01 05:55:03 +0900255 base::MessageLoop::current()->Run();
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900256 return 0;
257}
258
viettrungluu@chromium.org7d86af22013-01-12 00:13:37 +0900259class IPCFuzzingTest : public IPCTestBase {
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900260};
261
262// This test makes sure that the FuzzerClientListener and FuzzerServerListener
263// are working properly by generating two well formed IPC calls.
264TEST_F(IPCFuzzingTest, SanityTest) {
viettrungluu@chromium.org00155942013-01-26 06:51:35 +0900265 Init("FuzzServerClient");
266
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900267 FuzzerClientListener listener;
viettrungluu@chromium.org00155942013-01-26 06:51:35 +0900268 CreateChannel(&listener);
269 listener.Init(channel());
270 ASSERT_TRUE(ConnectChannel());
271 ASSERT_TRUE(StartClient());
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900272
273 IPC::Message* msg = NULL;
274 int value = 43;
275 msg = new MsgClassIS(value, L"expect 43");
viettrungluu@chromium.org00155942013-01-26 06:51:35 +0900276 sender()->Send(msg);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900277 EXPECT_TRUE(listener.ExpectMessage(value, MsgClassIS::ID));
278
279 msg = new MsgClassSI(L"expect 44", ++value);
viettrungluu@chromium.org00155942013-01-26 06:51:35 +0900280 sender()->Send(msg);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900281 EXPECT_TRUE(listener.ExpectMessage(value, MsgClassSI::ID));
282
viettrungluu@chromium.org00155942013-01-26 06:51:35 +0900283 EXPECT_TRUE(WaitForClientShutdown());
284 DestroyChannel();
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900285}
286
viettrungluu@chromium.org00155942013-01-26 06:51:35 +0900287// This test uses a payload that is smaller than expected. This generates an
288// error while unpacking the IPC buffer which in debug trigger an assertion and
289// in release is ignored (!). Right after we generate another valid IPC to make
290// sure framing is working properly.
nsylvain@chromium.org675aad32011-09-21 05:59:01 +0900291#if defined(NDEBUG) && !defined(DCHECK_ALWAYS_ON)
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900292TEST_F(IPCFuzzingTest, MsgBadPayloadShort) {
viettrungluu@chromium.org00155942013-01-26 06:51:35 +0900293 Init("FuzzServerClient");
294
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900295 FuzzerClientListener listener;
viettrungluu@chromium.org00155942013-01-26 06:51:35 +0900296 CreateChannel(&listener);
297 listener.Init(channel());
298 ASSERT_TRUE(ConnectChannel());
299 ASSERT_TRUE(StartClient());
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900300
bbudge@chromium.orgab4c6bc2013-11-05 07:28:12 +0900301 IPC::Message* msg = new IPC::Message(MSG_ROUTING_CONTROL, MsgClassIS::ID,
302 IPC::Message::PRIORITY_NORMAL);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900303 msg->WriteInt(666);
viettrungluu@chromium.org00155942013-01-26 06:51:35 +0900304 sender()->Send(msg);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900305 EXPECT_TRUE(listener.ExpectMsgNotHandled(MsgClassIS::ID));
306
307 msg = new MsgClassSI(L"expect one", 1);
viettrungluu@chromium.org00155942013-01-26 06:51:35 +0900308 sender()->Send(msg);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900309 EXPECT_TRUE(listener.ExpectMessage(1, MsgClassSI::ID));
310
viettrungluu@chromium.org00155942013-01-26 06:51:35 +0900311 EXPECT_TRUE(WaitForClientShutdown());
312 DestroyChannel();
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900313}
nsylvain@chromium.org675aad32011-09-21 05:59:01 +0900314#endif
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900315
viettrungluu@chromium.org00155942013-01-26 06:51:35 +0900316// This test uses a payload that has too many arguments, but so the payload size
317// is big enough so the unpacking routine does not generate an error as in the
318// case of MsgBadPayloadShort test. This test does not pinpoint a flaw (per se)
319// as by design we don't carry type information on the IPC message.
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900320TEST_F(IPCFuzzingTest, MsgBadPayloadArgs) {
viettrungluu@chromium.org00155942013-01-26 06:51:35 +0900321 Init("FuzzServerClient");
322
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900323 FuzzerClientListener listener;
viettrungluu@chromium.org00155942013-01-26 06:51:35 +0900324 CreateChannel(&listener);
325 listener.Init(channel());
326 ASSERT_TRUE(ConnectChannel());
327 ASSERT_TRUE(StartClient());
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900328
bbudge@chromium.orgab4c6bc2013-11-05 07:28:12 +0900329 IPC::Message* msg = new IPC::Message(MSG_ROUTING_CONTROL, MsgClassSI::ID,
330 IPC::Message::PRIORITY_NORMAL);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900331 msg->WriteWString(L"d");
332 msg->WriteInt(0);
333 msg->WriteInt(0x65); // Extra argument.
334
viettrungluu@chromium.org00155942013-01-26 06:51:35 +0900335 sender()->Send(msg);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900336 EXPECT_TRUE(listener.ExpectMessage(0, MsgClassSI::ID));
337
338 // Now send a well formed message to make sure the receiver wasn't
339 // thrown out of sync by the extra argument.
340 msg = new MsgClassIS(3, L"expect three");
viettrungluu@chromium.org00155942013-01-26 06:51:35 +0900341 sender()->Send(msg);
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900342 EXPECT_TRUE(listener.ExpectMessage(3, MsgClassIS::ID));
343
viettrungluu@chromium.org00155942013-01-26 06:51:35 +0900344 EXPECT_TRUE(WaitForClientShutdown());
345 DestroyChannel();
agl@chromium.org1c6dcf22009-07-23 08:57:21 +0900346}
347
viettrungluu@chromium.org7ca19132013-01-12 05:56:22 +0900348} // namespace