blob: 5597f14d7ccf7e3b55bb1130ba649b594676f4c7 [file] [log] [blame]
Dan Cashman91d398d2017-09-26 12:58:29 -07001from optparse import OptionParser
2from optparse import Option, OptionValueError
3import os
4import policy
5import re
6import sys
7
8#############################################################
9# Tests
10#############################################################
11def TestDataTypeViolations(pol):
12 return pol.AssertPathTypesHaveAttr(["/data/"], [], "data_file_type")
13
Nick Kralevichdab131b2018-10-04 11:24:00 -070014def TestSystemTypeViolations(pol):
Steven Morelanda01338d2020-04-27 15:54:54 -070015 partitions = ["/system/", "/system_ext/", "/product/"]
16 exceptions = [
17 # devices before treble don't have a vendor partition
18 "/system/vendor/",
19
20 # overlay files are mounted over vendor
21 "/product/overlay/",
22 "/product/vendor_overlay/",
23 "/system/overlay/",
24 "/system/product/overlay/",
25 "/system/product/vendor_overlay/",
26 "/system/system_ext/overlay/",
27 "/system_ext/overlay/",
28 ]
29
30 return pol.AssertPathTypesHaveAttr(partitions, exceptions, "system_file_type")
Nick Kralevich5e372712018-09-27 10:21:37 -070031
Tri Vo4c80c2c2018-03-29 03:42:47 +000032def TestProcTypeViolations(pol):
33 return pol.AssertGenfsFilesystemTypesHaveAttr("proc", "proc_type")
34
Dan Cashman91d398d2017-09-26 12:58:29 -070035def TestSysfsTypeViolations(pol):
Jeff Vander Stoep1b828442018-03-21 17:27:20 -070036 ret = pol.AssertGenfsFilesystemTypesHaveAttr("sysfs", "sysfs_type")
37 ret += pol.AssertPathTypesHaveAttr(["/sys/"], ["/sys/kernel/debug/",
Dan Cashman91d398d2017-09-26 12:58:29 -070038 "/sys/kernel/tracing"], "sysfs_type")
Jeff Vander Stoep1b828442018-03-21 17:27:20 -070039 return ret
Dan Cashman91d398d2017-09-26 12:58:29 -070040
41def TestDebugfsTypeViolations(pol):
Jeff Vander Stoep1b828442018-03-21 17:27:20 -070042 ret = pol.AssertGenfsFilesystemTypesHaveAttr("debugfs", "debugfs_type")
43 ret += pol.AssertGenfsFilesystemTypesHaveAttr("tracefs", "debugfs_type")
44 ret += pol.AssertPathTypesHaveAttr(["/sys/kernel/debug/",
Dan Cashman91d398d2017-09-26 12:58:29 -070045 "/sys/kernel/tracing"], [], "debugfs_type")
Jeff Vander Stoep1b828442018-03-21 17:27:20 -070046 return ret
Tri Vo30c3c2a2018-01-10 11:04:06 -080047
48def TestVendorTypeViolations(pol):
Steven Morelanda01338d2020-04-27 15:54:54 -070049 partitions = ["/vendor/", "/odm/"]
50 exceptions = [
51 "/vendor/etc/selinux/",
52 "/vendor/odm/etc/selinux/",
53 "/odm/etc/selinux/",
54 ]
55 return pol.AssertPathTypesHaveAttr(partitions, exceptions, "vendor_file_type")
Tri Vo30c3c2a2018-01-10 11:04:06 -080056
Jeff Vander Stoepccf965e2018-01-24 07:01:13 -080057def TestCoreDataTypeViolations(pol):
Jeff Vander Stoep370a52f2018-02-08 09:54:59 -080058 return pol.AssertPathTypesHaveAttr(["/data/"], ["/data/vendor",
59 "/data/vendor_ce", "/data/vendor_de"], "core_data_file_type")
Jeff Vander Stoepccf965e2018-01-24 07:01:13 -080060
Inseob Kim1b8b1f62020-10-23 15:16:11 +090061def TestPropertyTypeViolations(pol):
62 return pol.AssertPropertyOwnersAreExclusive()
63
Alan Stokes668e74f2020-11-12 18:08:18 +000064def TestAppDataTypeViolations(pol):
65 # Types with the app_data_file_type should only be used for app data files
66 # (/data/data/package.name etc) via seapp_contexts, and never applied
67 # explicitly to other files.
68 partitions = [
69 "/data/",
70 "/vendor/",
71 "/odm/",
72 "/product/",
73 ]
74 exceptions = [
75 # These are used for app data files for the corresponding user and
76 # assorted other files.
77 # TODO(b/172812577): Use different types for the different purposes
78 "shell_data_file",
79 "bluetooth_data_file",
80 "nfc_data_file",
81 "radio_data_file",
82 ]
83 return pol.AssertPathTypesDoNotHaveAttr(partitions, [], "app_data_file_type",
84 exceptions)
85
Inseob Kim1b8b1f62020-10-23 15:16:11 +090086
Dan Cashman91d398d2017-09-26 12:58:29 -070087###
88# extend OptionParser to allow the same option flag to be used multiple times.
89# This is used to allow multiple file_contexts files and tests to be
90# specified.
91#
92class MultipleOption(Option):
93 ACTIONS = Option.ACTIONS + ("extend",)
94 STORE_ACTIONS = Option.STORE_ACTIONS + ("extend",)
95 TYPED_ACTIONS = Option.TYPED_ACTIONS + ("extend",)
96 ALWAYS_TYPED_ACTIONS = Option.ALWAYS_TYPED_ACTIONS + ("extend",)
97
98 def take_action(self, action, dest, opt, value, values, parser):
99 if action == "extend":
100 values.ensure_value(dest, []).append(value)
101 else:
102 Option.take_action(self, action, dest, opt, value, values, parser)
103
Tri Vo4c80c2c2018-03-29 03:42:47 +0000104Tests = [
105 "TestDataTypeViolators",
106 "TestProcTypeViolations",
107 "TestSysfsTypeViolations",
Nick Kralevichdab131b2018-10-04 11:24:00 -0700108 "TestSystemTypeViolators",
Tri Vo4c80c2c2018-03-29 03:42:47 +0000109 "TestDebugfsTypeViolations",
110 "TestVendorTypeViolations",
111 "TestCoreDataTypeViolations",
Alan Stokes668e74f2020-11-12 18:08:18 +0000112 "TestPropertyTypeViolations",
113 "TestAppDataTypeViolations",
Tri Vo4c80c2c2018-03-29 03:42:47 +0000114]
Dan Cashman91d398d2017-09-26 12:58:29 -0700115
116if __name__ == '__main__':
Jeff Vander Stoep3ca843a2017-10-04 09:42:29 -0700117 usage = "sepolicy_tests -l $(ANDROID_HOST_OUT)/lib64/libsepolwrap.so "
Bowgo Tsaiafbcf212018-02-05 17:34:52 +0800118 usage += "-f vendor_file_contexts -f "
Dan Cashman91d398d2017-09-26 12:58:29 -0700119 usage +="plat_file_contexts -p policy [--test test] [--help]"
120 parser = OptionParser(option_class=MultipleOption, usage=usage)
121 parser.add_option("-f", "--file_contexts", dest="file_contexts",
122 metavar="FILE", action="extend", type="string")
123 parser.add_option("-p", "--policy", dest="policy", metavar="FILE")
124 parser.add_option("-l", "--library-path", dest="libpath", metavar="FILE")
125 parser.add_option("-t", "--test", dest="test", action="extend",
126 help="Test options include "+str(Tests))
127
128 (options, args) = parser.parse_args()
129
130 if not options.libpath:
Jeff Vander Stoep3ca843a2017-10-04 09:42:29 -0700131 sys.exit("Must specify path to libsepolwrap library\n" + parser.usage)
Dan Cashman91d398d2017-09-26 12:58:29 -0700132 if not os.path.exists(options.libpath):
133 sys.exit("Error: library-path " + options.libpath + " does not exist\n"
134 + parser.usage)
135
136 if not options.policy:
137 sys.exit("Must specify monolithic policy file\n" + parser.usage)
138 if not os.path.exists(options.policy):
139 sys.exit("Error: policy file " + options.policy + " does not exist\n"
140 + parser.usage)
141
142 if not options.file_contexts:
143 sys.exit("Error: Must specify file_contexts file(s)\n" + parser.usage)
144 for f in options.file_contexts:
145 if not os.path.exists(f):
146 sys.exit("Error: File_contexts file " + f + " does not exist\n" +
147 parser.usage)
148
149 pol = policy.Policy(options.policy, options.file_contexts, options.libpath)
150
151 results = ""
152 # If an individual test is not specified, run all tests.
Jeff Vander Stoep3ca843a2017-10-04 09:42:29 -0700153 if options.test is None or "TestDataTypeViolations" in options.test:
Dan Cashman91d398d2017-09-26 12:58:29 -0700154 results += TestDataTypeViolations(pol)
Tri Vo4c80c2c2018-03-29 03:42:47 +0000155 if options.test is None or "TestProcTypeViolations" in options.test:
156 results += TestProcTypeViolations(pol)
Jeff Vander Stoep3ca843a2017-10-04 09:42:29 -0700157 if options.test is None or "TestSysfsTypeViolations" in options.test:
Dan Cashman91d398d2017-09-26 12:58:29 -0700158 results += TestSysfsTypeViolations(pol)
Nick Kralevichdab131b2018-10-04 11:24:00 -0700159 if options.test is None or "TestSystemTypeViolations" in options.test:
160 results += TestSystemTypeViolations(pol)
Jeff Vander Stoep3ca843a2017-10-04 09:42:29 -0700161 if options.test is None or "TestDebugfsTypeViolations" in options.test:
Dan Cashman91d398d2017-09-26 12:58:29 -0700162 results += TestDebugfsTypeViolations(pol)
Tri Vo30c3c2a2018-01-10 11:04:06 -0800163 if options.test is None or "TestVendorTypeViolations" in options.test:
164 results += TestVendorTypeViolations(pol)
Jeff Vander Stoepccf965e2018-01-24 07:01:13 -0800165 if options.test is None or "TestCoreDataTypeViolations" in options.test:
166 results += TestCoreDataTypeViolations(pol)
Inseob Kim1b8b1f62020-10-23 15:16:11 +0900167 if options.test is None or "TestPropertyTypeViolations" in options.test:
168 results += TestPropertyTypeViolations(pol)
Alan Stokes668e74f2020-11-12 18:08:18 +0000169 if options.test is None or "TestAppDataTypeViolations" in options.test:
170 results += TestAppDataTypeViolations(pol)
Dan Cashman91d398d2017-09-26 12:58:29 -0700171
172 if len(results) > 0:
173 sys.exit(results)