Yabin Cui | 91ce715 | 2015-07-13 16:54:29 -0700 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2015 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
Christopher Ferris | f1649d9 | 2016-11-03 16:06:40 -0700 | [diff] [blame] | 17 | #include <inttypes.h> |
Greg Hackmann | ba1f77d | 2016-12-06 15:17:59 -0800 | [diff] [blame] | 18 | #include <limits.h> |
Christopher Ferris | f1649d9 | 2016-11-03 16:06:40 -0700 | [diff] [blame] | 19 | #include <stdio.h> |
Greg Hackmann | ba1f77d | 2016-12-06 15:17:59 -0800 | [diff] [blame] | 20 | #include <sys/capability.h> |
Yabin Cui | 91ce715 | 2015-07-13 16:54:29 -0700 | [diff] [blame] | 21 | #include <sys/mman.h> |
| 22 | #include <sys/prctl.h> |
| 23 | #include <unistd.h> |
Christopher Ferris | f1649d9 | 2016-11-03 16:06:40 -0700 | [diff] [blame] | 24 | |
| 25 | #include <string> |
| 26 | #include <vector> |
| 27 | |
| 28 | #include <gtest/gtest.h> |
| 29 | |
| 30 | #include "android-base/file.h" |
| 31 | #include "android-base/strings.h" |
Yabin Cui | 91ce715 | 2015-07-13 16:54:29 -0700 | [diff] [blame] | 32 | |
| 33 | // http://b/20017123. |
| 34 | TEST(sys_prctl, bug_20017123) { |
Elliott Hughes | 99d5465 | 2018-08-22 10:36:23 -0700 | [diff] [blame] | 35 | #if defined(PR_SET_VMA) // PR_SET_VMA is only available in Android kernels. |
Yabin Cui | 91ce715 | 2015-07-13 16:54:29 -0700 | [diff] [blame] | 36 | size_t page_size = static_cast<size_t>(sysconf(_SC_PAGESIZE)); |
| 37 | void* p = mmap(NULL, page_size * 3, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0); |
| 38 | ASSERT_NE(MAP_FAILED, p); |
| 39 | ASSERT_EQ(0, mprotect(p, page_size, PROT_NONE)); |
| 40 | ASSERT_NE(-1, prctl(PR_SET_VMA, PR_SET_VMA_ANON_NAME, p, page_size * 3, "anonymous map space")); |
Christopher Ferris | f1649d9 | 2016-11-03 16:06:40 -0700 | [diff] [blame] | 41 | // Now read the maps and verify that there are no overlapped maps. |
| 42 | std::string file_data; |
| 43 | ASSERT_TRUE(android::base::ReadFileToString("/proc/self/maps", &file_data)); |
| 44 | |
Christopher Ferris | f1649d9 | 2016-11-03 16:06:40 -0700 | [diff] [blame] | 45 | uintptr_t last_end = 0; |
| 46 | std::vector<std::string> lines = android::base::Split(file_data, "\n"); |
| 47 | for (size_t i = 0; i < lines.size(); i++) { |
| 48 | if (lines[i].empty()) { |
| 49 | continue; |
| 50 | } |
| 51 | uintptr_t start; |
| 52 | uintptr_t end; |
| 53 | ASSERT_EQ(2, sscanf(lines[i].c_str(), "%" SCNxPTR "-%" SCNxPTR " ", &start, &end)) |
| 54 | << "Failed to parse line: " << lines[i]; |
| 55 | // This will never fail on the first line, so no need to do any special checking. |
Christopher Ferris | 4dd2785 | 2016-11-08 14:05:18 -0800 | [diff] [blame] | 56 | ASSERT_GE(start, last_end) |
| 57 | << "Overlapping map detected:\n" << lines[i -1] << '\n' << lines[i] << '\n'; |
Christopher Ferris | f1649d9 | 2016-11-03 16:06:40 -0700 | [diff] [blame] | 58 | last_end = end; |
| 59 | } |
| 60 | |
Yabin Cui | 91ce715 | 2015-07-13 16:54:29 -0700 | [diff] [blame] | 61 | ASSERT_EQ(0, munmap(p, page_size * 3)); |
| 62 | #else |
| 63 | GTEST_LOG_(INFO) << "This test does nothing as it tests an Android specific kernel feature."; |
| 64 | #endif |
| 65 | } |
Greg Hackmann | ba1f77d | 2016-12-06 15:17:59 -0800 | [diff] [blame] | 66 | |
| 67 | TEST(sys_prctl, pr_cap_ambient) { |
| 68 | // PR_CAP_AMBIENT was introduced in v4.3. Android devices should always |
| 69 | // have a backport, but we can't guarantee it's available on the host. |
| 70 | #if defined(__ANDROID__) || defined(PR_CAP_AMBIENT) |
| 71 | const std::string caps_sha = |
| 72 | "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/" |
| 73 | "?id=58319057b7847667f0c9585b9de0e8932b0fdb08"; |
| 74 | const std::string caps_typo_sha = |
| 75 | "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/" |
| 76 | "?id=b7f76ea2ef6739ee484a165ffbac98deb855d3d3"; |
| 77 | |
| 78 | auto err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_CLEAR_ALL, 0, 0, 0); |
| 79 | EXPECT_EQ(0, err); |
| 80 | // EINVAL -> unrecognized prctl option |
| 81 | ASSERT_NE(EINVAL, errno) << "kernel missing required commits:\n" |
| 82 | << caps_sha << "\n" |
| 83 | << caps_typo_sha << "\n"; |
| 84 | |
| 85 | // Unprivileged processes shouldn't be able to raise CAP_SYS_ADMIN, |
| 86 | // but they can check or lower it |
| 87 | err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_SYS_ADMIN, 0, 0); |
| 88 | EXPECT_EQ(-1, err); |
| 89 | EXPECT_EQ(EPERM, errno); |
| 90 | |
| 91 | err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_SYS_ADMIN, 0, 0); |
| 92 | EXPECT_EQ(0, err); |
| 93 | |
| 94 | err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_LOWER, CAP_SYS_ADMIN, 0, 0); |
| 95 | EXPECT_EQ(0, err); |
| 96 | |
| 97 | // ULONG_MAX isn't a legal cap |
| 98 | err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, ULONG_MAX, 0, 0); |
| 99 | EXPECT_EQ(-1, err); |
| 100 | EXPECT_EQ(EINVAL, errno); |
| 101 | |
| 102 | err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, ULONG_MAX, 0, 0); |
| 103 | EXPECT_EQ(-1, err); |
| 104 | EXPECT_EQ(EINVAL, errno); |
| 105 | |
| 106 | err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_LOWER, ULONG_MAX, 0, 0); |
| 107 | EXPECT_EQ(-1, err); |
| 108 | EXPECT_EQ(EINVAL, errno); |
| 109 | #else |
| 110 | GTEST_LOG_(INFO) |
| 111 | << "Skipping test that requires host support for PR_CAP_AMBIENT."; |
| 112 | #endif |
| 113 | } |