2015-07-14 01:54:29 +02:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2015 The Android Open Source Project
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2016-11-04 00:06:40 +01:00
|
|
|
#include <inttypes.h>
|
2016-12-07 00:17:59 +01:00
|
|
|
#include <limits.h>
|
2016-11-04 00:06:40 +01:00
|
|
|
#include <stdio.h>
|
2016-12-07 00:17:59 +01:00
|
|
|
#include <sys/capability.h>
|
2015-07-14 01:54:29 +02:00
|
|
|
#include <sys/mman.h>
|
|
|
|
#include <sys/prctl.h>
|
|
|
|
#include <unistd.h>
|
2016-11-04 00:06:40 +01:00
|
|
|
|
|
|
|
#include <string>
|
|
|
|
#include <vector>
|
|
|
|
|
|
|
|
#include <gtest/gtest.h>
|
|
|
|
|
|
|
|
#include "android-base/file.h"
|
|
|
|
#include "android-base/strings.h"
|
2015-07-14 01:54:29 +02:00
|
|
|
#include "private/bionic_prctl.h"
|
|
|
|
|
|
|
|
// http://b/20017123.
|
|
|
|
TEST(sys_prctl, bug_20017123) {
|
2016-09-17 03:16:47 +02:00
|
|
|
#if defined(__ANDROID__) // PR_SET_VMA is only available in Android kernels.
|
2015-07-14 01:54:29 +02:00
|
|
|
size_t page_size = static_cast<size_t>(sysconf(_SC_PAGESIZE));
|
|
|
|
void* p = mmap(NULL, page_size * 3, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
|
|
|
|
ASSERT_NE(MAP_FAILED, p);
|
|
|
|
ASSERT_EQ(0, mprotect(p, page_size, PROT_NONE));
|
|
|
|
ASSERT_NE(-1, prctl(PR_SET_VMA, PR_SET_VMA_ANON_NAME, p, page_size * 3, "anonymous map space"));
|
2016-11-04 00:06:40 +01:00
|
|
|
// Now read the maps and verify that there are no overlapped maps.
|
|
|
|
std::string file_data;
|
|
|
|
ASSERT_TRUE(android::base::ReadFileToString("/proc/self/maps", &file_data));
|
|
|
|
|
|
|
|
uintptr_t last_end = 0;
|
|
|
|
std::vector<std::string> lines = android::base::Split(file_data, "\n");
|
|
|
|
for (size_t i = 0; i < lines.size(); i++) {
|
|
|
|
if (lines[i].empty()) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
uintptr_t start;
|
|
|
|
uintptr_t end;
|
|
|
|
ASSERT_EQ(2, sscanf(lines[i].c_str(), "%" SCNxPTR "-%" SCNxPTR " ", &start, &end))
|
|
|
|
<< "Failed to parse line: " << lines[i];
|
|
|
|
// This will never fail on the first line, so no need to do any special checking.
|
2016-11-08 23:05:18 +01:00
|
|
|
ASSERT_GE(start, last_end)
|
|
|
|
<< "Overlapping map detected:\n" << lines[i -1] << '\n' << lines[i] << '\n';
|
2016-11-04 00:06:40 +01:00
|
|
|
last_end = end;
|
|
|
|
}
|
|
|
|
|
2015-07-14 01:54:29 +02:00
|
|
|
ASSERT_EQ(0, munmap(p, page_size * 3));
|
|
|
|
#else
|
|
|
|
GTEST_LOG_(INFO) << "This test does nothing as it tests an Android specific kernel feature.";
|
|
|
|
#endif
|
|
|
|
}
|
2016-12-07 00:17:59 +01:00
|
|
|
|
|
|
|
TEST(sys_prctl, pr_cap_ambient) {
|
|
|
|
// PR_CAP_AMBIENT was introduced in v4.3. Android devices should always
|
|
|
|
// have a backport, but we can't guarantee it's available on the host.
|
|
|
|
#if defined(__ANDROID__) || defined(PR_CAP_AMBIENT)
|
|
|
|
const std::string caps_sha =
|
|
|
|
"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/"
|
|
|
|
"?id=58319057b7847667f0c9585b9de0e8932b0fdb08";
|
|
|
|
const std::string caps_typo_sha =
|
|
|
|
"https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/"
|
|
|
|
"?id=b7f76ea2ef6739ee484a165ffbac98deb855d3d3";
|
|
|
|
|
|
|
|
auto err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_CLEAR_ALL, 0, 0, 0);
|
|
|
|
EXPECT_EQ(0, err);
|
|
|
|
// EINVAL -> unrecognized prctl option
|
|
|
|
ASSERT_NE(EINVAL, errno) << "kernel missing required commits:\n"
|
|
|
|
<< caps_sha << "\n"
|
|
|
|
<< caps_typo_sha << "\n";
|
|
|
|
|
|
|
|
// Unprivileged processes shouldn't be able to raise CAP_SYS_ADMIN,
|
|
|
|
// but they can check or lower it
|
|
|
|
err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_SYS_ADMIN, 0, 0);
|
|
|
|
EXPECT_EQ(-1, err);
|
|
|
|
EXPECT_EQ(EPERM, errno);
|
|
|
|
|
|
|
|
err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_SYS_ADMIN, 0, 0);
|
|
|
|
EXPECT_EQ(0, err);
|
|
|
|
|
|
|
|
err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_LOWER, CAP_SYS_ADMIN, 0, 0);
|
|
|
|
EXPECT_EQ(0, err);
|
|
|
|
|
|
|
|
// ULONG_MAX isn't a legal cap
|
|
|
|
err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, ULONG_MAX, 0, 0);
|
|
|
|
EXPECT_EQ(-1, err);
|
|
|
|
EXPECT_EQ(EINVAL, errno);
|
|
|
|
|
|
|
|
err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, ULONG_MAX, 0, 0);
|
|
|
|
EXPECT_EQ(-1, err);
|
|
|
|
EXPECT_EQ(EINVAL, errno);
|
|
|
|
|
|
|
|
err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_LOWER, ULONG_MAX, 0, 0);
|
|
|
|
EXPECT_EQ(-1, err);
|
|
|
|
EXPECT_EQ(EINVAL, errno);
|
|
|
|
#else
|
|
|
|
GTEST_LOG_(INFO)
|
|
|
|
<< "Skipping test that requires host support for PR_CAP_AMBIENT.";
|
|
|
|
#endif
|
|
|
|
}
|