blob: edd17087e315f1543cd5cf060b67d2ee25bbf276 [file] [log] [blame]
Dan Cashman91d398d2017-09-26 12:58:29 -07001from optparse import OptionParser
2from optparse import Option, OptionValueError
3import os
4import policy
5import re
6import sys
7
8#############################################################
9# Tests
10#############################################################
11def TestDataTypeViolations(pol):
12 return pol.AssertPathTypesHaveAttr(["/data/"], [], "data_file_type")
13
Nick Kralevichdab131b2018-10-04 11:24:00 -070014def TestSystemTypeViolations(pol):
Steven Morelanda01338d2020-04-27 15:54:54 -070015 partitions = ["/system/", "/system_ext/", "/product/"]
16 exceptions = [
17 # devices before treble don't have a vendor partition
18 "/system/vendor/",
19
20 # overlay files are mounted over vendor
21 "/product/overlay/",
22 "/product/vendor_overlay/",
23 "/system/overlay/",
24 "/system/product/overlay/",
25 "/system/product/vendor_overlay/",
26 "/system/system_ext/overlay/",
27 "/system_ext/overlay/",
28 ]
29
30 return pol.AssertPathTypesHaveAttr(partitions, exceptions, "system_file_type")
Nick Kralevich5e372712018-09-27 10:21:37 -070031
Tri Vo4c80c2c2018-03-29 03:42:47 +000032def TestProcTypeViolations(pol):
33 return pol.AssertGenfsFilesystemTypesHaveAttr("proc", "proc_type")
34
Dan Cashman91d398d2017-09-26 12:58:29 -070035def TestSysfsTypeViolations(pol):
Jeff Vander Stoep1b828442018-03-21 17:27:20 -070036 ret = pol.AssertGenfsFilesystemTypesHaveAttr("sysfs", "sysfs_type")
37 ret += pol.AssertPathTypesHaveAttr(["/sys/"], ["/sys/kernel/debug/",
Dan Cashman91d398d2017-09-26 12:58:29 -070038 "/sys/kernel/tracing"], "sysfs_type")
Jeff Vander Stoep1b828442018-03-21 17:27:20 -070039 return ret
Dan Cashman91d398d2017-09-26 12:58:29 -070040
41def TestDebugfsTypeViolations(pol):
Jeff Vander Stoep1b828442018-03-21 17:27:20 -070042 ret = pol.AssertGenfsFilesystemTypesHaveAttr("debugfs", "debugfs_type")
Hridya Valsarajua00863e2021-04-23 16:38:20 +000043 ret += pol.AssertGenfsFilesystemTypesHaveAttr("tracefs", "debugfs_type")
Jeff Vander Stoep1b828442018-03-21 17:27:20 -070044 ret += pol.AssertPathTypesHaveAttr(["/sys/kernel/debug/",
Dan Cashman91d398d2017-09-26 12:58:29 -070045 "/sys/kernel/tracing"], [], "debugfs_type")
Jeff Vander Stoep1b828442018-03-21 17:27:20 -070046 return ret
Tri Vo30c3c2a2018-01-10 11:04:06 -080047
48def TestVendorTypeViolations(pol):
Steven Morelanda01338d2020-04-27 15:54:54 -070049 partitions = ["/vendor/", "/odm/"]
50 exceptions = [
51 "/vendor/etc/selinux/",
52 "/vendor/odm/etc/selinux/",
53 "/odm/etc/selinux/",
54 ]
55 return pol.AssertPathTypesHaveAttr(partitions, exceptions, "vendor_file_type")
Tri Vo30c3c2a2018-01-10 11:04:06 -080056
Jeff Vander Stoepccf965e2018-01-24 07:01:13 -080057def TestCoreDataTypeViolations(pol):
Jeff Vander Stoep370a52f2018-02-08 09:54:59 -080058 return pol.AssertPathTypesHaveAttr(["/data/"], ["/data/vendor",
59 "/data/vendor_ce", "/data/vendor_de"], "core_data_file_type")
Jeff Vander Stoepccf965e2018-01-24 07:01:13 -080060
Inseob Kim1b8b1f62020-10-23 15:16:11 +090061def TestPropertyTypeViolations(pol):
62 return pol.AssertPropertyOwnersAreExclusive()
63
Alan Stokes668e74f2020-11-12 18:08:18 +000064def TestAppDataTypeViolations(pol):
65 # Types with the app_data_file_type should only be used for app data files
66 # (/data/data/package.name etc) via seapp_contexts, and never applied
67 # explicitly to other files.
68 partitions = [
69 "/data/",
70 "/vendor/",
71 "/odm/",
72 "/product/",
73 ]
74 exceptions = [
75 # These are used for app data files for the corresponding user and
76 # assorted other files.
77 # TODO(b/172812577): Use different types for the different purposes
78 "shell_data_file",
79 "bluetooth_data_file",
80 "nfc_data_file",
81 "radio_data_file",
82 ]
83 return pol.AssertPathTypesDoNotHaveAttr(partitions, [], "app_data_file_type",
84 exceptions)
Hridya Valsaraju8c9cf622020-12-14 22:57:49 -080085def TestDmaHeapDevTypeViolations(pol):
86 return pol.AssertPathTypesHaveAttr(["/dev/dma_heap/"], [],
87 "dmabuf_heap_device_type")
88
Alan Stokes668e74f2020-11-12 18:08:18 +000089
Inseob Kim1b8b1f62020-10-23 15:16:11 +090090
Dan Cashman91d398d2017-09-26 12:58:29 -070091###
92# extend OptionParser to allow the same option flag to be used multiple times.
93# This is used to allow multiple file_contexts files and tests to be
94# specified.
95#
96class MultipleOption(Option):
97 ACTIONS = Option.ACTIONS + ("extend",)
98 STORE_ACTIONS = Option.STORE_ACTIONS + ("extend",)
99 TYPED_ACTIONS = Option.TYPED_ACTIONS + ("extend",)
100 ALWAYS_TYPED_ACTIONS = Option.ALWAYS_TYPED_ACTIONS + ("extend",)
101
102 def take_action(self, action, dest, opt, value, values, parser):
103 if action == "extend":
104 values.ensure_value(dest, []).append(value)
105 else:
106 Option.take_action(self, action, dest, opt, value, values, parser)
107
Tri Vo4c80c2c2018-03-29 03:42:47 +0000108Tests = [
109 "TestDataTypeViolators",
110 "TestProcTypeViolations",
111 "TestSysfsTypeViolations",
Nick Kralevichdab131b2018-10-04 11:24:00 -0700112 "TestSystemTypeViolators",
Tri Vo4c80c2c2018-03-29 03:42:47 +0000113 "TestDebugfsTypeViolations",
114 "TestVendorTypeViolations",
115 "TestCoreDataTypeViolations",
Alan Stokes668e74f2020-11-12 18:08:18 +0000116 "TestPropertyTypeViolations",
117 "TestAppDataTypeViolations",
Hridya Valsaraju8c9cf622020-12-14 22:57:49 -0800118 "TestDmaHeapDevTypeViolations",
Tri Vo4c80c2c2018-03-29 03:42:47 +0000119]
Dan Cashman91d398d2017-09-26 12:58:29 -0700120
121if __name__ == '__main__':
Jeff Vander Stoep3ca843a2017-10-04 09:42:29 -0700122 usage = "sepolicy_tests -l $(ANDROID_HOST_OUT)/lib64/libsepolwrap.so "
Bowgo Tsaiafbcf212018-02-05 17:34:52 +0800123 usage += "-f vendor_file_contexts -f "
Dan Cashman91d398d2017-09-26 12:58:29 -0700124 usage +="plat_file_contexts -p policy [--test test] [--help]"
125 parser = OptionParser(option_class=MultipleOption, usage=usage)
126 parser.add_option("-f", "--file_contexts", dest="file_contexts",
127 metavar="FILE", action="extend", type="string")
128 parser.add_option("-p", "--policy", dest="policy", metavar="FILE")
129 parser.add_option("-l", "--library-path", dest="libpath", metavar="FILE")
130 parser.add_option("-t", "--test", dest="test", action="extend",
131 help="Test options include "+str(Tests))
132
133 (options, args) = parser.parse_args()
134
135 if not options.libpath:
Jeff Vander Stoep3ca843a2017-10-04 09:42:29 -0700136 sys.exit("Must specify path to libsepolwrap library\n" + parser.usage)
Dan Cashman91d398d2017-09-26 12:58:29 -0700137 if not os.path.exists(options.libpath):
138 sys.exit("Error: library-path " + options.libpath + " does not exist\n"
139 + parser.usage)
140
141 if not options.policy:
142 sys.exit("Must specify monolithic policy file\n" + parser.usage)
143 if not os.path.exists(options.policy):
144 sys.exit("Error: policy file " + options.policy + " does not exist\n"
145 + parser.usage)
146
147 if not options.file_contexts:
148 sys.exit("Error: Must specify file_contexts file(s)\n" + parser.usage)
149 for f in options.file_contexts:
150 if not os.path.exists(f):
151 sys.exit("Error: File_contexts file " + f + " does not exist\n" +
152 parser.usage)
153
154 pol = policy.Policy(options.policy, options.file_contexts, options.libpath)
155
156 results = ""
157 # If an individual test is not specified, run all tests.
Jeff Vander Stoep3ca843a2017-10-04 09:42:29 -0700158 if options.test is None or "TestDataTypeViolations" in options.test:
Dan Cashman91d398d2017-09-26 12:58:29 -0700159 results += TestDataTypeViolations(pol)
Tri Vo4c80c2c2018-03-29 03:42:47 +0000160 if options.test is None or "TestProcTypeViolations" in options.test:
161 results += TestProcTypeViolations(pol)
Jeff Vander Stoep3ca843a2017-10-04 09:42:29 -0700162 if options.test is None or "TestSysfsTypeViolations" in options.test:
Dan Cashman91d398d2017-09-26 12:58:29 -0700163 results += TestSysfsTypeViolations(pol)
Nick Kralevichdab131b2018-10-04 11:24:00 -0700164 if options.test is None or "TestSystemTypeViolations" in options.test:
165 results += TestSystemTypeViolations(pol)
Jeff Vander Stoep3ca843a2017-10-04 09:42:29 -0700166 if options.test is None or "TestDebugfsTypeViolations" in options.test:
Dan Cashman91d398d2017-09-26 12:58:29 -0700167 results += TestDebugfsTypeViolations(pol)
Tri Vo30c3c2a2018-01-10 11:04:06 -0800168 if options.test is None or "TestVendorTypeViolations" in options.test:
169 results += TestVendorTypeViolations(pol)
Jeff Vander Stoepccf965e2018-01-24 07:01:13 -0800170 if options.test is None or "TestCoreDataTypeViolations" in options.test:
171 results += TestCoreDataTypeViolations(pol)
Inseob Kim1b8b1f62020-10-23 15:16:11 +0900172 if options.test is None or "TestPropertyTypeViolations" in options.test:
173 results += TestPropertyTypeViolations(pol)
Alan Stokes668e74f2020-11-12 18:08:18 +0000174 if options.test is None or "TestAppDataTypeViolations" in options.test:
175 results += TestAppDataTypeViolations(pol)
Hridya Valsaraju8c9cf622020-12-14 22:57:49 -0800176 if options.test is None or "TestDmaHeapDevTypeViolations" in options.test:
177 results += TestDmaHeapDevTypeViolations(pol)
Dan Cashman91d398d2017-09-26 12:58:29 -0700178
179 if len(results) > 0:
180 sys.exit(results)