You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
334 lines
10 KiB
334 lines
10 KiB
4 months ago
|
/* Copyright 2017 The Chromium OS Authors. All rights reserved.
|
||
|
* Use of this source code is governed by a BSD-style license that can be
|
||
|
* found in the LICENSE file.
|
||
|
*
|
||
|
* Test system.[ch] module code using gtest.
|
||
|
*/
|
||
|
|
||
|
#include <ftw.h>
|
||
|
#include <limits.h>
|
||
|
#include <linux/securebits.h>
|
||
|
#include <stdio.h>
|
||
|
#include <stdlib.h>
|
||
|
#include <string.h>
|
||
|
#include <sys/stat.h>
|
||
|
#include <sys/statvfs.h>
|
||
|
#include <unistd.h>
|
||
|
|
||
|
#include <gtest/gtest.h>
|
||
|
|
||
|
#include <string>
|
||
|
|
||
|
#include "system.h"
|
||
|
|
||
|
namespace {
|
||
|
|
||
|
// A random path that really really should not exist on the host.
|
||
|
constexpr const char kNoSuchDir[] = "/.x/..x/...x/path/should/not/exist/";
|
||
|
|
||
|
// A random file that should exist on both Linux and Android.
|
||
|
constexpr const char kValidFile[] = "/etc/hosts";
|
||
|
|
||
|
// A random directory that should exist.
|
||
|
constexpr const char kValidDir[] = "/";
|
||
|
|
||
|
// A random character device that should exist.
|
||
|
constexpr const char kValidCharDev[] = "/dev/null";
|
||
|
|
||
|
constexpr bool is_android() {
|
||
|
#if defined(__ANDROID__)
|
||
|
return true;
|
||
|
#else
|
||
|
return false;
|
||
|
#endif
|
||
|
}
|
||
|
|
||
|
// Returns a template path that can be used as an argument to mkstemp / mkdtemp.
|
||
|
constexpr const char* temp_path_pattern() {
|
||
|
if (is_android())
|
||
|
return "/data/local/tmp/minijail.tests.XXXXXX";
|
||
|
else
|
||
|
return "minijail.tests.XXXXXX";
|
||
|
}
|
||
|
|
||
|
// Recursively deletes the subtree rooted at |path|.
|
||
|
bool rmdir_recursive(const std::string& path) {
|
||
|
auto callback = [](const char* child, const struct stat*, int file_type,
|
||
|
struct FTW*) -> int {
|
||
|
if (file_type == FTW_DP) {
|
||
|
if (rmdir(child) == -1) {
|
||
|
fprintf(stderr, "rmdir(%s): %s", child, strerror(errno));
|
||
|
return -1;
|
||
|
}
|
||
|
} else if (file_type == FTW_F) {
|
||
|
if (unlink(child) == -1) {
|
||
|
fprintf(stderr, "unlink(%s): %s", child, strerror(errno));
|
||
|
return -1;
|
||
|
}
|
||
|
}
|
||
|
return 0;
|
||
|
};
|
||
|
|
||
|
return nftw(path.c_str(), callback, 128, FTW_DEPTH) == 0;
|
||
|
}
|
||
|
|
||
|
// Creates a temporary directory that will be cleaned up upon leaving scope.
|
||
|
class TemporaryDir {
|
||
|
public:
|
||
|
TemporaryDir() : path(temp_path_pattern()) {
|
||
|
if (mkdtemp(const_cast<char*>(path.c_str())) == nullptr)
|
||
|
path.clear();
|
||
|
}
|
||
|
~TemporaryDir() {
|
||
|
if (!is_valid())
|
||
|
return;
|
||
|
rmdir_recursive(path.c_str());
|
||
|
}
|
||
|
|
||
|
bool is_valid() const { return !path.empty(); }
|
||
|
|
||
|
std::string path;
|
||
|
|
||
|
private:
|
||
|
TemporaryDir(const TemporaryDir&) = delete;
|
||
|
TemporaryDir& operator=(const TemporaryDir&) = delete;
|
||
|
};
|
||
|
|
||
|
// Creates a named temporary file that will be cleaned up upon leaving scope.
|
||
|
class TemporaryFile {
|
||
|
public:
|
||
|
TemporaryFile() : path(temp_path_pattern()) {
|
||
|
int fd = mkstemp(const_cast<char*>(path.c_str()));
|
||
|
if (fd == -1) {
|
||
|
path.clear();
|
||
|
return;
|
||
|
}
|
||
|
close(fd);
|
||
|
}
|
||
|
~TemporaryFile() {
|
||
|
if (!is_valid())
|
||
|
return;
|
||
|
unlink(path.c_str());
|
||
|
}
|
||
|
|
||
|
bool is_valid() const { return !path.empty(); }
|
||
|
|
||
|
std::string path;
|
||
|
|
||
|
private:
|
||
|
TemporaryFile(const TemporaryFile&) = delete;
|
||
|
TemporaryFile& operator=(const TemporaryFile&) = delete;
|
||
|
};
|
||
|
|
||
|
} // namespace
|
||
|
|
||
|
TEST(secure_noroot_set_and_locked, zero_mask) {
|
||
|
ASSERT_EQ(secure_noroot_set_and_locked(0), 0);
|
||
|
}
|
||
|
|
||
|
TEST(secure_noroot_set_and_locked, set) {
|
||
|
ASSERT_EQ(secure_noroot_set_and_locked(issecure_mask(SECURE_NOROOT) |
|
||
|
issecure_mask(SECURE_NOROOT_LOCKED)),
|
||
|
1);
|
||
|
}
|
||
|
|
||
|
TEST(secure_noroot_set_and_locked, not_set) {
|
||
|
ASSERT_EQ(secure_noroot_set_and_locked(issecure_mask(SECURE_KEEP_CAPS) |
|
||
|
issecure_mask(SECURE_NOROOT_LOCKED)),
|
||
|
0);
|
||
|
}
|
||
|
|
||
|
// Sanity check for the cap range.
|
||
|
TEST(get_last_valid_cap, basic) {
|
||
|
unsigned int cap = get_last_valid_cap();
|
||
|
|
||
|
// We pick 35 as it's been that since at least v3.0.
|
||
|
// If this test is run on older kernels, it might fail.
|
||
|
EXPECT_GE(cap, 35u);
|
||
|
|
||
|
// Pick a really large number that we probably won't hit for a long time.
|
||
|
// It helps that caps are bitfields.
|
||
|
EXPECT_LT(cap, 128u);
|
||
|
}
|
||
|
|
||
|
// Might be useful to figure out the return value, but for now,
|
||
|
// just make sure it doesn't crash?
|
||
|
TEST(cap_ambient_supported, smoke) {
|
||
|
cap_ambient_supported();
|
||
|
}
|
||
|
|
||
|
// An invalid path should return an error.
|
||
|
TEST(write_pid_to_path, bad_path) {
|
||
|
EXPECT_NE(0, write_pid_to_path(0, kNoSuchDir));
|
||
|
}
|
||
|
|
||
|
// Make sure we can write a pid to the file.
|
||
|
TEST(write_pid_to_path, basic) {
|
||
|
TemporaryFile tmp;
|
||
|
ASSERT_TRUE(tmp.is_valid());
|
||
|
|
||
|
EXPECT_EQ(0, write_pid_to_path(1234, tmp.path.c_str()));
|
||
|
FILE *fp = fopen(tmp.path.c_str(), "re");
|
||
|
EXPECT_NE(nullptr, fp);
|
||
|
char data[6] = {};
|
||
|
EXPECT_EQ(5u, fread(data, 1, sizeof(data), fp));
|
||
|
fclose(fp);
|
||
|
EXPECT_EQ(0, strcmp(data, "1234\n"));
|
||
|
}
|
||
|
|
||
|
// If the destination exists, there's nothing to do.
|
||
|
// Also check trailing slash handling.
|
||
|
TEST(mkdir_p, dest_exists) {
|
||
|
EXPECT_EQ(0, mkdir_p("/", 0, true));
|
||
|
EXPECT_EQ(0, mkdir_p("///", 0, true));
|
||
|
EXPECT_EQ(0, mkdir_p("/proc", 0, true));
|
||
|
EXPECT_EQ(0, mkdir_p("/proc/", 0, true));
|
||
|
EXPECT_EQ(0, mkdir_p("/dev", 0, true));
|
||
|
EXPECT_EQ(0, mkdir_p("/dev/", 0, true));
|
||
|
}
|
||
|
|
||
|
// Create a directory tree that doesn't exist.
|
||
|
TEST(mkdir_p, create_tree) {
|
||
|
TemporaryDir dir;
|
||
|
ASSERT_TRUE(dir.is_valid());
|
||
|
|
||
|
// Run `mkdir -p <path>/a/b/c`.
|
||
|
std::string path_a = dir.path + "/a";
|
||
|
std::string path_a_b = path_a + "/b";
|
||
|
std::string path_a_b_c = path_a_b + "/c";
|
||
|
|
||
|
// First try creating it as a file.
|
||
|
EXPECT_EQ(0, mkdir_p(path_a_b_c.c_str(), 0700, false));
|
||
|
|
||
|
// Make sure the final path doesn't exist yet.
|
||
|
struct stat st;
|
||
|
EXPECT_EQ(0, stat(path_a_b.c_str(), &st));
|
||
|
EXPECT_EQ(true, S_ISDIR(st.st_mode));
|
||
|
EXPECT_EQ(-1, stat(path_a_b_c.c_str(), &st));
|
||
|
|
||
|
// Then create it as a complete dir.
|
||
|
EXPECT_EQ(0, mkdir_p(path_a_b_c.c_str(), 0700, true));
|
||
|
|
||
|
// Make sure the final dir actually exists.
|
||
|
EXPECT_EQ(0, stat(path_a_b_c.c_str(), &st));
|
||
|
EXPECT_EQ(true, S_ISDIR(st.st_mode));
|
||
|
}
|
||
|
|
||
|
// If the destination exists, there's nothing to do.
|
||
|
TEST(setup_mount_destination, dest_exists) {
|
||
|
// Pick some paths that should always exist. We pass in invalid pointers
|
||
|
// for other args so we crash if the dest check doesn't short circuit.
|
||
|
EXPECT_EQ(0, setup_mount_destination(nullptr, kValidDir, 0, 0, false,
|
||
|
nullptr));
|
||
|
EXPECT_EQ(0, setup_mount_destination(nullptr, "/proc", 0, 0, true, nullptr));
|
||
|
EXPECT_EQ(0, setup_mount_destination(nullptr, "/dev", 0, 0, false, nullptr));
|
||
|
}
|
||
|
|
||
|
// Mount flags should be obtained for bind-mounts.
|
||
|
TEST(setup_mount_destination, mount_flags) {
|
||
|
struct statvfs stvfs_buf;
|
||
|
ASSERT_EQ(0, statvfs("/proc", &stvfs_buf));
|
||
|
|
||
|
TemporaryDir dir;
|
||
|
ASSERT_TRUE(dir.is_valid());
|
||
|
|
||
|
unsigned long mount_flags = -1;
|
||
|
// Passing -1 for user ID/group ID tells chown to make no changes.
|
||
|
std::string proc = dir.path + "/proc";
|
||
|
EXPECT_EQ(0, setup_mount_destination("/proc", proc.c_str(), -1, -1, true,
|
||
|
&mount_flags));
|
||
|
EXPECT_EQ(stvfs_buf.f_flag, mount_flags);
|
||
|
EXPECT_EQ(0, rmdir(proc.c_str()));
|
||
|
|
||
|
// Same thing holds for children of a mount.
|
||
|
mount_flags = -1;
|
||
|
std::string proc_self = dir.path + "/proc_self";
|
||
|
EXPECT_EQ(0, setup_mount_destination("/proc/self", proc_self.c_str(), -1, -1,
|
||
|
true, &mount_flags));
|
||
|
EXPECT_EQ(stvfs_buf.f_flag, mount_flags);
|
||
|
EXPECT_EQ(0, rmdir(proc_self.c_str()));
|
||
|
}
|
||
|
|
||
|
// When given a bind mount where the source is relative, reject it.
|
||
|
TEST(setup_mount_destination, reject_relative_bind) {
|
||
|
// Pick a destination we know doesn't exist.
|
||
|
EXPECT_NE(0, setup_mount_destination("foo", kNoSuchDir, 0, 0, true, nullptr));
|
||
|
}
|
||
|
|
||
|
// A mount of a pseudo filesystem should make the destination dir.
|
||
|
TEST(setup_mount_destination, create_pseudo_fs) {
|
||
|
TemporaryDir dir;
|
||
|
ASSERT_TRUE(dir.is_valid());
|
||
|
|
||
|
// Passing -1 for user ID/group ID tells chown to make no changes.
|
||
|
std::string no_chmod = dir.path + "/no_chmod";
|
||
|
EXPECT_EQ(0, setup_mount_destination("none", no_chmod.c_str(), -1, -1, false,
|
||
|
nullptr));
|
||
|
// We check it's a directory by deleting it as such.
|
||
|
EXPECT_EQ(0, rmdir(no_chmod.c_str()));
|
||
|
|
||
|
// Confirm that a bad user ID/group ID fails the function as expected.
|
||
|
// On Android, Bionic manages user IDs directly: there is no /etc/passwd file.
|
||
|
// This results in most user IDs being valid. Instead of trying to find an
|
||
|
// invalid user ID, just skip this check.
|
||
|
if (!is_android()) {
|
||
|
std::string with_chmod = dir.path + "/with_chmod";
|
||
|
EXPECT_NE(0, setup_mount_destination("none", with_chmod.c_str(),
|
||
|
UINT_MAX / 2, UINT_MAX / 2, false,
|
||
|
nullptr));
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// If the source path does not exist, we should error out.
|
||
|
TEST(setup_mount_destination, missing_source) {
|
||
|
// The missing dest path is so we can exercise the source logic.
|
||
|
EXPECT_NE(0, setup_mount_destination(kNoSuchDir, kNoSuchDir, 0, 0, false,
|
||
|
nullptr));
|
||
|
EXPECT_NE(0, setup_mount_destination(kNoSuchDir, kNoSuchDir, 0, 0, true,
|
||
|
nullptr));
|
||
|
}
|
||
|
|
||
|
// A bind mount of a directory should create the destination dir.
|
||
|
TEST(setup_mount_destination, create_bind_dir) {
|
||
|
TemporaryDir dir;
|
||
|
ASSERT_TRUE(dir.is_valid());
|
||
|
|
||
|
// Passing -1 for user ID/group ID tells chown to make no changes.
|
||
|
std::string child_dir = dir.path + "/child_dir";
|
||
|
EXPECT_EQ(0, setup_mount_destination(kValidDir, child_dir.c_str(), -1, -1,
|
||
|
true, nullptr));
|
||
|
// We check it's a directory by deleting it as such.
|
||
|
EXPECT_EQ(0, rmdir(child_dir.c_str()));
|
||
|
}
|
||
|
|
||
|
// A bind mount of a file should create the destination file.
|
||
|
TEST(setup_mount_destination, create_bind_file) {
|
||
|
TemporaryDir dir;
|
||
|
ASSERT_TRUE(dir.is_valid());
|
||
|
|
||
|
// Passing -1 for user ID/group ID tells chown to make no changes.
|
||
|
std::string child_file = dir.path + "/child_file";
|
||
|
EXPECT_EQ(0, setup_mount_destination(kValidFile, child_file.c_str(), -1, -1,
|
||
|
true, nullptr));
|
||
|
// We check it's a file by deleting it as such.
|
||
|
EXPECT_EQ(0, unlink(child_file.c_str()));
|
||
|
}
|
||
|
|
||
|
// A mount of a character device should create the destination char.
|
||
|
TEST(setup_mount_destination, create_char_dev) {
|
||
|
TemporaryDir dir;
|
||
|
ASSERT_TRUE(dir.is_valid());
|
||
|
|
||
|
// Passing -1 for user ID/group ID tells chown to make no changes.
|
||
|
std::string child_dev = dir.path + "/child_dev";
|
||
|
EXPECT_EQ(0, setup_mount_destination(kValidCharDev, child_dev.c_str(), -1, -1,
|
||
|
false, nullptr));
|
||
|
// We check it's a directory by deleting it as such.
|
||
|
EXPECT_EQ(0, rmdir(child_dev.c_str()));
|
||
|
}
|
||
|
|
||
|
TEST(seccomp_actions_available, smoke) {
|
||
|
seccomp_ret_log_available();
|
||
|
seccomp_ret_kill_process_available();
|
||
|
}
|