1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
9 #include "base/message_loop/message_loop.h"
10 #include "base/strings/string16.h"
11 #include "base/strings/utf_string_conversions.h"
12 #include "base/threading/platform_thread.h"
13 #include "ipc/ipc_test_base.h"
14 #include "testing/gtest/include/gtest/gtest.h"
16 // IPC messages for testing ----------------------------------------------------
18 #define IPC_MESSAGE_IMPL
19 #include "ipc/ipc_message_macros.h"
21 #define IPC_MESSAGE_START TestMsgStart
23 // Generic message class that is an int followed by a string16.
24 IPC_MESSAGE_CONTROL2(MsgClassIS
, int, base::string16
)
26 // Generic message class that is a string16 followed by an int.
27 IPC_MESSAGE_CONTROL2(MsgClassSI
, base::string16
, int)
29 // Message to create a mutex in the IPC server, using the received name.
30 IPC_MESSAGE_CONTROL2(MsgDoMutex
, base::string16
, int)
32 // Used to generate an ID for a message that should not exist.
33 IPC_MESSAGE_CONTROL0(MsgUnhandled
)
35 // -----------------------------------------------------------------------------
39 TEST(IPCMessageIntegrity
, ReadBeyondBufferStr
) {
40 // This was BUG 984408.
41 uint32 v1
= kuint32max
- 1;
43 IPC::Message
m(0, 1, IPC::Message::PRIORITY_NORMAL
);
44 EXPECT_TRUE(m
.WriteInt(v1
));
45 EXPECT_TRUE(m
.WriteInt(v2
));
47 base::PickleIterator
iter(m
);
49 EXPECT_FALSE(iter
.ReadString(&vs
));
52 TEST(IPCMessageIntegrity
, ReadBeyondBufferStr16
) {
53 // This was BUG 984408.
54 uint32 v1
= kuint32max
- 1;
56 IPC::Message
m(0, 1, IPC::Message::PRIORITY_NORMAL
);
57 EXPECT_TRUE(m
.WriteInt(v1
));
58 EXPECT_TRUE(m
.WriteInt(v2
));
60 base::PickleIterator
iter(m
);
62 EXPECT_FALSE(iter
.ReadString16(&vs
));
65 TEST(IPCMessageIntegrity
, ReadBytesBadIterator
) {
66 // This was BUG 1035467.
67 IPC::Message
m(0, 1, IPC::Message::PRIORITY_NORMAL
);
68 EXPECT_TRUE(m
.WriteInt(1));
69 EXPECT_TRUE(m
.WriteInt(2));
71 base::PickleIterator
iter(m
);
72 const char* data
= NULL
;
73 EXPECT_TRUE(iter
.ReadBytes(&data
, sizeof(int)));
76 TEST(IPCMessageIntegrity
, ReadVectorNegativeSize
) {
77 // A slight variation of BUG 984408. Note that the pickling of vector<char>
78 // has a specialized template which is not vulnerable to this bug. So here
79 // try to hit the non-specialized case vector<P>.
80 IPC::Message
m(0, 1, IPC::Message::PRIORITY_NORMAL
);
81 EXPECT_TRUE(m
.WriteInt(-1)); // This is the count of elements.
82 EXPECT_TRUE(m
.WriteInt(1));
83 EXPECT_TRUE(m
.WriteInt(2));
84 EXPECT_TRUE(m
.WriteInt(3));
86 std::vector
<double> vec
;
87 base::PickleIterator
iter(m
);
88 EXPECT_FALSE(ReadParam(&m
, &iter
, &vec
));
91 #if defined(OS_ANDROID)
92 #define MAYBE_ReadVectorTooLarge1 DISABLED_ReadVectorTooLarge1
94 #define MAYBE_ReadVectorTooLarge1 ReadVectorTooLarge1
96 TEST(IPCMessageIntegrity
, MAYBE_ReadVectorTooLarge1
) {
97 // This was BUG 1006367. This is the large but positive length case. Again
98 // we try to hit the non-specialized case vector<P>.
99 IPC::Message
m(0, 1, IPC::Message::PRIORITY_NORMAL
);
100 EXPECT_TRUE(m
.WriteInt(0x21000003)); // This is the count of elements.
101 EXPECT_TRUE(m
.WriteInt64(1));
102 EXPECT_TRUE(m
.WriteInt64(2));
104 std::vector
<int64
> vec
;
105 base::PickleIterator
iter(m
);
106 EXPECT_FALSE(ReadParam(&m
, &iter
, &vec
));
109 TEST(IPCMessageIntegrity
, ReadVectorTooLarge2
) {
110 // This was BUG 1006367. This is the large but positive with an additional
111 // integer overflow when computing the actual byte size. Again we try to hit
112 // the non-specialized case vector<P>.
113 IPC::Message
m(0, 1, IPC::Message::PRIORITY_NORMAL
);
114 EXPECT_TRUE(m
.WriteInt(0x71000000)); // This is the count of elements.
115 EXPECT_TRUE(m
.WriteInt64(1));
116 EXPECT_TRUE(m
.WriteInt64(2));
118 std::vector
<int64
> vec
;
119 base::PickleIterator
iter(m
);
120 EXPECT_FALSE(ReadParam(&m
, &iter
, &vec
));
123 class SimpleListener
: public IPC::Listener
{
125 SimpleListener() : other_(NULL
) {
127 void Init(IPC::Sender
* s
) {
135 FUZZER_ROUTING_ID
= 5
138 // The fuzzer server class. It runs in a child process and expects
139 // only two IPC calls; after that it exits the message loop which
140 // terminates the child process.
141 class FuzzerServerListener
: public SimpleListener
{
143 FuzzerServerListener() : message_count_(2), pending_messages_(0) {
145 bool OnMessageReceived(const IPC::Message
& msg
) override
{
146 if (msg
.routing_id() == MSG_ROUTING_CONTROL
) {
148 IPC_BEGIN_MESSAGE_MAP(FuzzerServerListener
, msg
)
149 IPC_MESSAGE_HANDLER(MsgClassIS
, OnMsgClassISMessage
)
150 IPC_MESSAGE_HANDLER(MsgClassSI
, OnMsgClassSIMessage
)
151 IPC_END_MESSAGE_MAP()
152 if (pending_messages_
) {
153 // Probably a problem de-serializing the message.
154 ReplyMsgNotHandled(msg
.type());
161 void OnMsgClassISMessage(int value
, const base::string16
& text
) {
162 UseData(MsgClassIS::ID
, value
, text
);
163 RoundtripAckReply(FUZZER_ROUTING_ID
, MsgClassIS::ID
, value
);
167 void OnMsgClassSIMessage(const base::string16
& text
, int value
) {
168 UseData(MsgClassSI::ID
, value
, text
);
169 RoundtripAckReply(FUZZER_ROUTING_ID
, MsgClassSI::ID
, value
);
173 bool RoundtripAckReply(int routing
, uint32 type_id
, int reply
) {
174 IPC::Message
* message
= new IPC::Message(routing
, type_id
,
175 IPC::Message::PRIORITY_NORMAL
);
176 message
->WriteInt(reply
+ 1);
177 message
->WriteInt(reply
);
178 return other_
->Send(message
);
184 if (0 == message_count_
)
185 base::MessageLoop::current()->Quit();
188 void ReplyMsgNotHandled(uint32 type_id
) {
189 RoundtripAckReply(FUZZER_ROUTING_ID
, MsgUnhandled::ID
, type_id
);
193 void UseData(int caller
, int value
, const base::string16
& text
) {
194 std::ostringstream os
;
195 os
<< "IPC fuzzer:" << caller
<< " [" << value
<< " "
196 << base::UTF16ToUTF8(text
) << "]\n";
197 std::string output
= os
.str();
198 LOG(WARNING
) << output
;
202 int pending_messages_
;
205 class FuzzerClientListener
: public SimpleListener
{
207 FuzzerClientListener() : last_msg_(NULL
) {
210 bool OnMessageReceived(const IPC::Message
& msg
) override
{
211 last_msg_
= new IPC::Message(msg
);
212 base::MessageLoop::current()->Quit();
216 bool ExpectMessage(int value
, uint32 type_id
) {
217 if (!MsgHandlerInternal(type_id
))
221 base::PickleIterator
iter(*last_msg_
);
222 if (!iter
.ReadInt(&msg_value1
))
224 if (!iter
.ReadInt(&msg_value2
))
226 if ((msg_value2
+ 1) != msg_value1
)
228 if (msg_value2
!= value
)
236 bool ExpectMsgNotHandled(uint32 type_id
) {
237 return ExpectMessage(type_id
, MsgUnhandled::ID
);
241 bool MsgHandlerInternal(uint32 type_id
) {
242 base::MessageLoop::current()->Run();
243 if (NULL
== last_msg_
)
245 if (FUZZER_ROUTING_ID
!= last_msg_
->routing_id())
247 return (type_id
== last_msg_
->type());
250 IPC::Message
* last_msg_
;
253 // Runs the fuzzing server child mode. Returns when the preset number of
254 // messages have been received.
255 MULTIPROCESS_IPC_TEST_CLIENT_MAIN(FuzzServerClient
) {
256 base::MessageLoopForIO main_message_loop
;
257 FuzzerServerListener listener
;
258 scoped_ptr
<IPC::Channel
> channel(IPC::Channel::CreateClient(
259 IPCTestBase::GetChannelName("FuzzServerClient"), &listener
, nullptr));
260 CHECK(channel
->Connect());
261 listener
.Init(channel
.get());
262 base::MessageLoop::current()->Run();
266 class IPCFuzzingTest
: public IPCTestBase
{
269 #if defined(OS_ANDROID)
270 #define MAYBE_SanityTest DISABLED_SanityTest
272 #define MAYBE_SanityTest SanityTest
274 // This test makes sure that the FuzzerClientListener and FuzzerServerListener
275 // are working properly by generating two well formed IPC calls.
276 TEST_F(IPCFuzzingTest
, MAYBE_SanityTest
) {
277 Init("FuzzServerClient");
279 FuzzerClientListener listener
;
280 CreateChannel(&listener
);
281 listener
.Init(channel());
282 ASSERT_TRUE(ConnectChannel());
283 ASSERT_TRUE(StartClient());
285 IPC::Message
* msg
= NULL
;
287 msg
= new MsgClassIS(value
, base::ASCIIToUTF16("expect 43"));
289 EXPECT_TRUE(listener
.ExpectMessage(value
, MsgClassIS::ID
));
291 msg
= new MsgClassSI(base::ASCIIToUTF16("expect 44"), ++value
);
293 EXPECT_TRUE(listener
.ExpectMessage(value
, MsgClassSI::ID
));
295 EXPECT_TRUE(WaitForClientShutdown());
299 #if defined(OS_ANDROID)
300 #define MAYBE_MsgBadPayloadShort DISABLED_MsgBadPayloadShort
302 #define MAYBE_MsgBadPayloadShort MsgBadPayloadShort
304 // This test uses a payload that is smaller than expected. This generates an
305 // error while unpacking the IPC buffer which in debug trigger an assertion and
306 // in release is ignored (!). Right after we generate another valid IPC to make
307 // sure framing is working properly.
308 #if defined(NDEBUG) && !defined(DCHECK_ALWAYS_ON)
309 TEST_F(IPCFuzzingTest
, MAYBE_MsgBadPayloadShort
) {
310 Init("FuzzServerClient");
312 FuzzerClientListener listener
;
313 CreateChannel(&listener
);
314 listener
.Init(channel());
315 ASSERT_TRUE(ConnectChannel());
316 ASSERT_TRUE(StartClient());
318 IPC::Message
* msg
= new IPC::Message(MSG_ROUTING_CONTROL
, MsgClassIS::ID
,
319 IPC::Message::PRIORITY_NORMAL
);
322 EXPECT_TRUE(listener
.ExpectMsgNotHandled(MsgClassIS::ID
));
324 msg
= new MsgClassSI(base::ASCIIToUTF16("expect one"), 1);
326 EXPECT_TRUE(listener
.ExpectMessage(1, MsgClassSI::ID
));
328 EXPECT_TRUE(WaitForClientShutdown());
333 #if defined(OS_ANDROID)
334 #define MAYBE_MsgBadPayloadArgs DISABLED_MsgBadPayloadArgs
336 #define MAYBE_MsgBadPayloadArgs MsgBadPayloadArgs
338 // This test uses a payload that has too many arguments, but so the payload size
339 // is big enough so the unpacking routine does not generate an error as in the
340 // case of MsgBadPayloadShort test. This test does not pinpoint a flaw (per se)
341 // as by design we don't carry type information on the IPC message.
342 TEST_F(IPCFuzzingTest
, MAYBE_MsgBadPayloadArgs
) {
343 Init("FuzzServerClient");
345 FuzzerClientListener listener
;
346 CreateChannel(&listener
);
347 listener
.Init(channel());
348 ASSERT_TRUE(ConnectChannel());
349 ASSERT_TRUE(StartClient());
351 IPC::Message
* msg
= new IPC::Message(MSG_ROUTING_CONTROL
, MsgClassSI::ID
,
352 IPC::Message::PRIORITY_NORMAL
);
353 msg
->WriteString16(base::ASCIIToUTF16("d"));
355 msg
->WriteInt(0x65); // Extra argument.
358 EXPECT_TRUE(listener
.ExpectMessage(0, MsgClassSI::ID
));
360 // Now send a well formed message to make sure the receiver wasn't
361 // thrown out of sync by the extra argument.
362 msg
= new MsgClassIS(3, base::ASCIIToUTF16("expect three"));
364 EXPECT_TRUE(listener
.ExpectMessage(3, MsgClassIS::ID
));
366 EXPECT_TRUE(WaitForClientShutdown());