/* * Copyright (C) 2015 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include #include #include #include #include #include #include #include #include #include #include "android-base/file.h" #include "android-base/strings.h" #include "private/bionic_prctl.h" // http://b/20017123. TEST(sys_prctl, bug_20017123) { #if defined(__ANDROID__) // PR_SET_VMA is only available in Android kernels. size_t page_size = static_cast(sysconf(_SC_PAGESIZE)); void* p = mmap(NULL, page_size * 3, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0); ASSERT_NE(MAP_FAILED, p); ASSERT_EQ(0, mprotect(p, page_size, PROT_NONE)); ASSERT_NE(-1, prctl(PR_SET_VMA, PR_SET_VMA_ANON_NAME, p, page_size * 3, "anonymous map space")); // Now read the maps and verify that there are no overlapped maps. std::string file_data; ASSERT_TRUE(android::base::ReadFileToString("/proc/self/maps", &file_data)); uintptr_t last_end = 0; std::vector lines = android::base::Split(file_data, "\n"); for (size_t i = 0; i < lines.size(); i++) { if (lines[i].empty()) { continue; } uintptr_t start; uintptr_t end; ASSERT_EQ(2, sscanf(lines[i].c_str(), "%" SCNxPTR "-%" SCNxPTR " ", &start, &end)) << "Failed to parse line: " << lines[i]; // This will never fail on the first line, so no need to do any special checking. ASSERT_GE(start, last_end) << "Overlapping map detected:\n" << lines[i -1] << '\n' << lines[i] << '\n'; last_end = end; } ASSERT_EQ(0, munmap(p, page_size * 3)); #else GTEST_LOG_(INFO) << "This test does nothing as it tests an Android specific kernel feature."; #endif } TEST(sys_prctl, pr_cap_ambient) { // PR_CAP_AMBIENT was introduced in v4.3. Android devices should always // have a backport, but we can't guarantee it's available on the host. #if defined(__ANDROID__) || defined(PR_CAP_AMBIENT) const std::string caps_sha = "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/" "?id=58319057b7847667f0c9585b9de0e8932b0fdb08"; const std::string caps_typo_sha = "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/" "?id=b7f76ea2ef6739ee484a165ffbac98deb855d3d3"; auto err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_CLEAR_ALL, 0, 0, 0); EXPECT_EQ(0, err); // EINVAL -> unrecognized prctl option ASSERT_NE(EINVAL, errno) << "kernel missing required commits:\n" << caps_sha << "\n" << caps_typo_sha << "\n"; // Unprivileged processes shouldn't be able to raise CAP_SYS_ADMIN, // but they can check or lower it err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_SYS_ADMIN, 0, 0); EXPECT_EQ(-1, err); EXPECT_EQ(EPERM, errno); err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_SYS_ADMIN, 0, 0); EXPECT_EQ(0, err); err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_LOWER, CAP_SYS_ADMIN, 0, 0); EXPECT_EQ(0, err); // ULONG_MAX isn't a legal cap err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, ULONG_MAX, 0, 0); EXPECT_EQ(-1, err); EXPECT_EQ(EINVAL, errno); err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, ULONG_MAX, 0, 0); EXPECT_EQ(-1, err); EXPECT_EQ(EINVAL, errno); err = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_LOWER, ULONG_MAX, 0, 0); EXPECT_EQ(-1, err); EXPECT_EQ(EINVAL, errno); #else GTEST_LOG_(INFO) << "Skipping test that requires host support for PR_CAP_AMBIENT."; #endif }