mirror of
https://github.com/bytecodealliance/wasm-micro-runtime.git
synced 2025-05-17 23:21:13 +00:00

- Direct Execution: execve() directly executes a program, bypassing the shell. This avoids vulnerabilities like shell injection, which can occur with system() if user input is not properly sanitized. - Controlled Environment: With execve(), you can explicitly specify the environment variables for the new process, providing better control over the execution context. - No Shell Overhead: execve() does not invoke a shell, reducing the risk of unintended behavior caused by shell features or configurations. - Predictable Behavior: execve() only executes the specified program, whereas system() relies on the shell, which may interpret commands differently based on the shell's configuration or environment.
106 lines
3.0 KiB
C++
106 lines
3.0 KiB
C++
/*
|
|
* Copyright (C) 2019 Intel Corporation. All rights reserved.
|
|
* SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
|
*/
|
|
|
|
#include "test_helper.h"
|
|
#include "gtest/gtest.h"
|
|
|
|
#include "bh_common.h"
|
|
|
|
class bh_common_test_suite : public testing::Test
|
|
{
|
|
protected:
|
|
// You should make the members protected s.t. they can be
|
|
// accessed from sub-classes.
|
|
|
|
// virtual void SetUp() will be called before each test is run. You
|
|
// should define it if you need to initialize the variables.
|
|
// Otherwise, this can be skipped.
|
|
virtual void SetUp() {}
|
|
|
|
// virtual void TearDown() will be called after each test is run.
|
|
// You should define it if there is cleanup work to do. Otherwise,
|
|
// you don't have to provide it.
|
|
//
|
|
virtual void TearDown() {}
|
|
|
|
public:
|
|
WAMRRuntimeRAII<512 * 1024> runtime;
|
|
};
|
|
|
|
#define STR_TEST "test"
|
|
|
|
TEST_F(bh_common_test_suite, wa_strdup)
|
|
{
|
|
EXPECT_EQ(nullptr, wa_strdup(nullptr));
|
|
EXPECT_NE(nullptr, wa_strdup(STR_TEST));
|
|
}
|
|
|
|
TEST_F(bh_common_test_suite, b_strcpy_s)
|
|
{
|
|
char dest[10] = { 0 };
|
|
|
|
EXPECT_EQ(0, b_strcpy_s(dest, sizeof(dest), STR_TEST));
|
|
|
|
// Test abnormal cases.
|
|
EXPECT_EQ(-1, b_strcpy_s(nullptr, 0, nullptr));
|
|
EXPECT_EQ(-1, b_strcpy_s(dest, sizeof(dest), nullptr));
|
|
EXPECT_EQ(-1, b_strcpy_s(dest, 0, STR_TEST));
|
|
}
|
|
|
|
TEST_F(bh_common_test_suite, b_strcat_s)
|
|
{
|
|
char dest[10] = { 0 };
|
|
|
|
EXPECT_EQ(0, b_strcat_s(dest, sizeof(dest), STR_TEST));
|
|
|
|
// Test abnormal cases.
|
|
EXPECT_EQ(-1, b_strcat_s(nullptr, 0, nullptr));
|
|
EXPECT_EQ(-1, b_strcat_s(dest, sizeof(dest), nullptr));
|
|
EXPECT_EQ(-1, b_strcat_s(dest, 0, STR_TEST));
|
|
}
|
|
|
|
TEST_F(bh_common_test_suite, bh_strdup)
|
|
{
|
|
EXPECT_NE(nullptr, bh_strdup(STR_TEST));
|
|
EXPECT_EQ(nullptr, bh_strdup(nullptr));
|
|
}
|
|
|
|
TEST_F(bh_common_test_suite, b_memmove_s)
|
|
{
|
|
char dest[10] = { 0 };
|
|
|
|
EXPECT_EQ(0, b_memmove_s(dest, sizeof(dest), STR_TEST, sizeof(STR_TEST)));
|
|
|
|
// Test abnormal cases.
|
|
EXPECT_EQ(0, b_memmove_s(dest, sizeof(dest), STR_TEST, 0));
|
|
EXPECT_EQ(0, b_memmove_s(nullptr, sizeof(dest), STR_TEST, 0));
|
|
|
|
EXPECT_EQ(0, b_memmove_s(dest, sizeof(dest), nullptr, 0));
|
|
EXPECT_EQ(-1, b_memmove_s(dest, sizeof(dest), STR_TEST, sizeof(dest) + 1));
|
|
}
|
|
|
|
TEST_F(bh_common_test_suite, b_memcpy_s)
|
|
{
|
|
char dest[10] = { 0 };
|
|
|
|
EXPECT_EQ(0, b_memcpy_s(dest, sizeof(dest), STR_TEST, sizeof(STR_TEST)));
|
|
|
|
// Test abnormal cases.
|
|
EXPECT_EQ(0, b_memcpy_s(dest, sizeof(dest), STR_TEST, 0));
|
|
EXPECT_EQ(-1,
|
|
b_memcpy_s(nullptr, sizeof(dest), STR_TEST, sizeof(STR_TEST)));
|
|
EXPECT_EQ(-1, b_memcpy_s(dest, sizeof(dest), nullptr, sizeof(STR_TEST)));
|
|
EXPECT_EQ(-1, b_memcpy_s(dest, sizeof(dest), STR_TEST, sizeof(dest) + 1));
|
|
}
|
|
|
|
TEST_F(bh_common_test_suite, bh_execve)
|
|
{
|
|
#if WASM_ENABLE_WAMR_COMPILER != 0 || WASM_ENABLE_JIT != 0
|
|
char *const argv[] = { "-n", "\"hello\"", "world", "\n", nullptr };
|
|
EXPECT_EQ(0, bh_execve("/usr/bin/echo", argv, 5));
|
|
#else
|
|
GTEST_SKIP() << "bh_execve() is not supported";
|
|
#endif
|
|
} |