| /* Copyright 2016 The Chromium OS Authors. All rights reserved. |
| * Use of this source code is governed by a BSD-style license that can be |
| * found in the LICENSE file. |
| * |
| * Test platform independent logic of Minijail using gtest. |
| */ |
| |
| #include <errno.h> |
| |
| #include <fcntl.h> |
| #include <sys/types.h> |
| #include <sys/stat.h> |
| #include <sys/wait.h> |
| #include <unistd.h> |
| |
| #include <gtest/gtest.h> |
| |
| #include "libminijail.h" |
| #include "libminijail-private.h" |
| #include "util.h" |
| |
| namespace { |
| |
| #if defined(__ANDROID__) |
| # define ROOT_PREFIX "/system" |
| #else |
| # define ROOT_PREFIX "" |
| #endif |
| |
| const char kShellPath[] = ROOT_PREFIX "/bin/sh"; |
| const char kCatPath[] = ROOT_PREFIX "/bin/cat"; |
| |
| } // namespace |
| |
| /* Prototypes needed only by test. */ |
| size_t minijail_get_tmpfs_size(const struct minijail *); |
| |
| /* Silence unused variable warnings. */ |
| TEST(silence, silence_unused) { |
| EXPECT_STREQ(kLdPreloadEnvVar, kLdPreloadEnvVar); |
| EXPECT_STREQ(kFdEnvVar, kFdEnvVar); |
| EXPECT_STRNE(kFdEnvVar, kLdPreloadEnvVar); |
| } |
| |
| TEST(consumebytes, zero) { |
| char buf[1024]; |
| size_t len = sizeof(buf); |
| char *pos = &buf[0]; |
| EXPECT_NE(nullptr, consumebytes(0, &pos, &len)); |
| EXPECT_EQ(&buf[0], pos); |
| EXPECT_EQ(sizeof(buf), len); |
| } |
| |
| TEST(consumebytes, exact) { |
| char buf[1024]; |
| size_t len = sizeof(buf); |
| char *pos = &buf[0]; |
| /* One past the end since it consumes the whole buffer. */ |
| char *end = &buf[sizeof(buf)]; |
| EXPECT_NE(nullptr, consumebytes(len, &pos, &len)); |
| EXPECT_EQ((size_t)0, len); |
| EXPECT_EQ(end, pos); |
| } |
| |
| TEST(consumebytes, half) { |
| char buf[1024]; |
| size_t len = sizeof(buf); |
| char *pos = &buf[0]; |
| /* One past the end since it consumes the whole buffer. */ |
| char *end = &buf[sizeof(buf) / 2]; |
| EXPECT_NE(nullptr, consumebytes(len / 2, &pos, &len)); |
| EXPECT_EQ(sizeof(buf) / 2, len); |
| EXPECT_EQ(end, pos); |
| } |
| |
| TEST(consumebytes, toolong) { |
| char buf[1024]; |
| size_t len = sizeof(buf); |
| char *pos = &buf[0]; |
| /* One past the end since it consumes the whole buffer. */ |
| EXPECT_EQ(nullptr, consumebytes(len + 1, &pos, &len)); |
| EXPECT_EQ(sizeof(buf), len); |
| EXPECT_EQ(&buf[0], pos); |
| } |
| |
| TEST(consumestr, zero) { |
| char buf[1024]; |
| size_t len = 0; |
| char *pos = &buf[0]; |
| memset(buf, 0xff, sizeof(buf)); |
| EXPECT_EQ(nullptr, consumestr(&pos, &len)); |
| EXPECT_EQ((size_t)0, len); |
| EXPECT_EQ(&buf[0], pos); |
| } |
| |
| TEST(consumestr, nonul) { |
| char buf[1024]; |
| size_t len = sizeof(buf); |
| char *pos = &buf[0]; |
| memset(buf, 0xff, sizeof(buf)); |
| EXPECT_EQ(nullptr, consumestr(&pos, &len)); |
| EXPECT_EQ(sizeof(buf), len); |
| EXPECT_EQ(&buf[0], pos); |
| } |
| |
| TEST(consumestr, full) { |
| char buf[1024]; |
| size_t len = sizeof(buf); |
| char *pos = &buf[0]; |
| memset(buf, 0xff, sizeof(buf)); |
| buf[sizeof(buf)-1] = '\0'; |
| EXPECT_EQ((void *)buf, consumestr(&pos, &len)); |
| EXPECT_EQ((size_t)0, len); |
| EXPECT_EQ(&buf[sizeof(buf)], pos); |
| } |
| |
| TEST(consumestr, trailing_nul) { |
| char buf[1024]; |
| size_t len = sizeof(buf) - 1; |
| char *pos = &buf[0]; |
| memset(buf, 0xff, sizeof(buf)); |
| buf[sizeof(buf)-1] = '\0'; |
| EXPECT_EQ(nullptr, consumestr(&pos, &len)); |
| EXPECT_EQ(sizeof(buf) - 1, len); |
| EXPECT_EQ(&buf[0], pos); |
| } |
| |
| class MarshalTest : public ::testing::Test { |
| protected: |
| virtual void SetUp() { |
| m_ = minijail_new(); |
| j_ = minijail_new(); |
| size_ = minijail_size(m_); |
| } |
| virtual void TearDown() { |
| minijail_destroy(m_); |
| minijail_destroy(j_); |
| } |
| |
| char buf_[4096]; |
| struct minijail *m_; |
| struct minijail *j_; |
| size_t size_; |
| }; |
| |
| TEST_F(MarshalTest, empty) { |
| ASSERT_EQ(0, minijail_marshal(m_, buf_, sizeof(buf_))); |
| EXPECT_EQ(0, minijail_unmarshal(j_, buf_, size_)); |
| } |
| |
| TEST_F(MarshalTest, 0xff) { |
| memset(buf_, 0xff, sizeof(buf_)); |
| /* Should fail on the first consumestr since a NUL will never be found. */ |
| EXPECT_EQ(-EINVAL, minijail_unmarshal(j_, buf_, sizeof(buf_))); |
| } |
| |
| TEST(Test, minijail_run_pid_pipes_no_preload) { |
| pid_t pid; |
| int child_stdin, child_stdout, child_stderr; |
| int mj_run_ret; |
| ssize_t write_ret, read_ret; |
| const size_t buf_len = 128; |
| char buf[buf_len]; |
| int status; |
| char teststr[] = "test\n"; |
| size_t teststr_len = strlen(teststr); |
| char *argv[4]; |
| |
| struct minijail *j = minijail_new(); |
| |
| argv[0] = (char*)kCatPath; |
| argv[1] = NULL; |
| mj_run_ret = minijail_run_pid_pipes_no_preload(j, argv[0], argv, |
| &pid, |
| &child_stdin, &child_stdout, |
| NULL); |
| EXPECT_EQ(mj_run_ret, 0); |
| |
| write_ret = write(child_stdin, teststr, teststr_len); |
| EXPECT_EQ(write_ret, (int)teststr_len); |
| |
| read_ret = read(child_stdout, buf, 8); |
| EXPECT_EQ(read_ret, (int)teststr_len); |
| buf[teststr_len] = 0; |
| EXPECT_EQ(strcmp(buf, teststr), 0); |
| |
| EXPECT_EQ(kill(pid, SIGTERM), 0); |
| waitpid(pid, &status, 0); |
| ASSERT_TRUE(WIFSIGNALED(status)); |
| EXPECT_EQ(WTERMSIG(status), SIGTERM); |
| |
| argv[0] = (char*)kShellPath; |
| argv[1] = "-c"; |
| argv[2] = "echo test >&2"; |
| argv[3] = NULL; |
| mj_run_ret = minijail_run_pid_pipes_no_preload(j, argv[0], argv, &pid, |
| &child_stdin, &child_stdout, |
| &child_stderr); |
| EXPECT_EQ(mj_run_ret, 0); |
| |
| read_ret = read(child_stderr, buf, buf_len); |
| EXPECT_GE(read_ret, (int)teststr_len); |
| |
| waitpid(pid, &status, 0); |
| ASSERT_TRUE(WIFEXITED(status)); |
| EXPECT_EQ(WEXITSTATUS(status), 0); |
| |
| minijail_destroy(j); |
| } |
| |
| TEST(Test, test_minijail_no_fd_leaks) { |
| pid_t pid; |
| int child_stdout; |
| int mj_run_ret; |
| ssize_t read_ret; |
| const size_t buf_len = 128; |
| char buf[buf_len]; |
| char script[buf_len]; |
| int status; |
| char *argv[4]; |
| |
| int dev_null = open("/dev/null", O_RDONLY); |
| ASSERT_NE(dev_null, -1); |
| snprintf(script, |
| sizeof(script), |
| "[ -e /proc/self/fd/%d ] && echo yes || echo no", |
| dev_null); |
| |
| struct minijail *j = minijail_new(); |
| |
| argv[0] = (char*)kShellPath; |
| argv[1] = "-c"; |
| argv[2] = script; |
| argv[3] = NULL; |
| mj_run_ret = minijail_run_pid_pipes_no_preload( |
| j, argv[0], argv, &pid, NULL, &child_stdout, NULL); |
| EXPECT_EQ(mj_run_ret, 0); |
| |
| read_ret = read(child_stdout, buf, buf_len); |
| EXPECT_GE(read_ret, 0); |
| buf[read_ret] = '\0'; |
| EXPECT_STREQ(buf, "yes\n"); |
| |
| waitpid(pid, &status, 0); |
| ASSERT_TRUE(WIFEXITED(status)); |
| EXPECT_EQ(WEXITSTATUS(status), 0); |
| |
| minijail_close_open_fds(j); |
| mj_run_ret = minijail_run_pid_pipes_no_preload( |
| j, argv[0], argv, &pid, NULL, &child_stdout, NULL); |
| EXPECT_EQ(mj_run_ret, 0); |
| |
| read_ret = read(child_stdout, buf, buf_len); |
| EXPECT_GE(read_ret, 0); |
| buf[read_ret] = '\0'; |
| EXPECT_STREQ(buf, "no\n"); |
| |
| waitpid(pid, &status, 0); |
| ASSERT_TRUE(WIFEXITED(status)); |
| EXPECT_EQ(WEXITSTATUS(status), 0); |
| |
| minijail_destroy(j); |
| |
| close(dev_null); |
| } |
| |
| TEST(Test, test_minijail_fork) { |
| pid_t mj_fork_ret; |
| int status; |
| int pipe_fds[2]; |
| ssize_t pid_size = sizeof(mj_fork_ret); |
| |
| struct minijail *j = minijail_new(); |
| |
| ASSERT_EQ(pipe(pipe_fds), 0); |
| |
| mj_fork_ret = minijail_fork(j); |
| ASSERT_GE(mj_fork_ret, 0); |
| if (mj_fork_ret == 0) { |
| pid_t pid_in_parent; |
| // Wait for the parent to tell us the pid in the parent namespace. |
| EXPECT_EQ(read(pipe_fds[0], &pid_in_parent, pid_size), pid_size); |
| EXPECT_EQ(pid_in_parent, getpid()); |
| exit(0); |
| } |
| |
| EXPECT_EQ(write(pipe_fds[1], &mj_fork_ret, pid_size), pid_size); |
| waitpid(mj_fork_ret, &status, 0); |
| ASSERT_TRUE(WIFEXITED(status)); |
| EXPECT_EQ(WEXITSTATUS(status), 0); |
| |
| minijail_destroy(j); |
| } |
| |
| static int early_exit(void* payload) { |
| exit(static_cast<int>(reinterpret_cast<intptr_t>(payload))); |
| } |
| |
| TEST(Test, test_minijail_callback) { |
| pid_t pid; |
| int mj_run_ret; |
| int status; |
| char *argv[2]; |
| int exit_code = 42; |
| |
| struct minijail *j = minijail_new(); |
| |
| status = |
| minijail_add_hook(j, &early_exit, reinterpret_cast<void *>(exit_code), |
| MINIJAIL_HOOK_EVENT_PRE_DROP_CAPS); |
| EXPECT_EQ(status, 0); |
| |
| argv[0] = (char*)kCatPath; |
| argv[1] = NULL; |
| mj_run_ret = minijail_run_pid_pipes_no_preload(j, argv[0], argv, &pid, NULL, |
| NULL, NULL); |
| EXPECT_EQ(mj_run_ret, 0); |
| |
| status = minijail_wait(j); |
| EXPECT_EQ(status, exit_code); |
| |
| minijail_destroy(j); |
| } |
| |
| TEST(Test, test_minijail_preserve_fd) { |
| int mj_run_ret; |
| int status; |
| char *argv[2]; |
| char teststr[] = "test\n"; |
| size_t teststr_len = strlen(teststr); |
| int read_pipe[2]; |
| int write_pipe[2]; |
| char buf[1024]; |
| |
| struct minijail *j = minijail_new(); |
| |
| status = pipe(read_pipe); |
| ASSERT_EQ(status, 0); |
| status = pipe(write_pipe); |
| ASSERT_EQ(status, 0); |
| |
| status = minijail_preserve_fd(j, write_pipe[0], STDIN_FILENO); |
| ASSERT_EQ(status, 0); |
| status = minijail_preserve_fd(j, read_pipe[1], STDOUT_FILENO); |
| ASSERT_EQ(status, 0); |
| minijail_close_open_fds(j); |
| |
| argv[0] = (char*)kCatPath; |
| argv[1] = NULL; |
| mj_run_ret = minijail_run_no_preload(j, argv[0], argv); |
| EXPECT_EQ(mj_run_ret, 0); |
| |
| close(write_pipe[0]); |
| status = write(write_pipe[1], teststr, teststr_len); |
| EXPECT_EQ(status, (int)teststr_len); |
| close(write_pipe[1]); |
| |
| close(read_pipe[1]); |
| status = read(read_pipe[0], buf, 8); |
| EXPECT_EQ(status, (int)teststr_len); |
| buf[teststr_len] = 0; |
| EXPECT_EQ(strcmp(buf, teststr), 0); |
| |
| status = minijail_wait(j); |
| EXPECT_EQ(status, 0); |
| |
| minijail_destroy(j); |
| } |
| |
| namespace { |
| |
| // Tests that require userns access. |
| // Android unit tests don't currently support entering user namespaces as |
| // unprivileged users due to having an older kernel. Chrome OS unit tests |
| // don't support it either due to being in a chroot environment (see man 2 |
| // clone for more information about failure modes with the CLONE_NEWUSER flag). |
| class NamespaceTest : public ::testing::Test { |
| protected: |
| static void SetUpTestCase() { |
| userns_supported_ = UsernsSupported(); |
| } |
| |
| // Whether userns is supported. |
| static bool userns_supported_; |
| |
| static bool UsernsSupported() { |
| pid_t pid = fork(); |
| if (pid == -1) |
| pdie("could not fork"); |
| |
| if (pid == 0) |
| _exit(unshare(CLONE_NEWUSER) == 0 ? 0 : 1); |
| |
| int status; |
| if (waitpid(pid, &status, 0) < 0) |
| pdie("could not wait"); |
| |
| if (!WIFEXITED(status)) |
| die("child did not exit properly: %#x", status); |
| |
| bool ret = WEXITSTATUS(status) == 0; |
| if (!ret) |
| warn("Skipping userns related tests"); |
| return ret; |
| } |
| }; |
| |
| bool NamespaceTest::userns_supported_; |
| |
| } // namespace |
| |
| TEST_F(NamespaceTest, test_tmpfs_userns) { |
| int mj_run_ret; |
| int status; |
| char *argv[4]; |
| char uidmap[128], gidmap[128]; |
| constexpr uid_t kTargetUid = 1000; // Any non-zero value will do. |
| constexpr gid_t kTargetGid = 1000; |
| |
| if (!userns_supported_) { |
| SUCCEED(); |
| return; |
| } |
| |
| struct minijail *j = minijail_new(); |
| |
| minijail_namespace_pids(j); |
| minijail_namespace_vfs(j); |
| minijail_mount_tmp(j); |
| minijail_run_as_init(j); |
| |
| // Perform userns mapping. |
| minijail_namespace_user(j); |
| snprintf(uidmap, sizeof(uidmap), "%d %d 1", kTargetUid, getuid()); |
| snprintf(gidmap, sizeof(gidmap), "%d %d 1", kTargetGid, getgid()); |
| minijail_change_uid(j, kTargetUid); |
| minijail_change_gid(j, kTargetGid); |
| minijail_uidmap(j, uidmap); |
| minijail_gidmap(j, gidmap); |
| minijail_namespace_user_disable_setgroups(j); |
| |
| argv[0] = (char*)kShellPath; |
| argv[1] = "-c"; |
| argv[2] = "exec touch /tmp/foo"; |
| argv[3] = NULL; |
| mj_run_ret = minijail_run_no_preload(j, argv[0], argv); |
| EXPECT_EQ(mj_run_ret, 0); |
| |
| status = minijail_wait(j); |
| EXPECT_EQ(status, 0); |
| |
| minijail_destroy(j); |
| } |
| |
| TEST(Test, parse_size) { |
| size_t size; |
| |
| ASSERT_EQ(0, parse_size(&size, "42")); |
| ASSERT_EQ(42U, size); |
| |
| ASSERT_EQ(0, parse_size(&size, "16K")); |
| ASSERT_EQ(16384U, size); |
| |
| ASSERT_EQ(0, parse_size(&size, "1M")); |
| ASSERT_EQ(1024U * 1024, size); |
| |
| uint64_t gigabyte = 1024ULL * 1024 * 1024; |
| ASSERT_EQ(0, parse_size(&size, "3G")); |
| ASSERT_EQ(3U, size / gigabyte); |
| ASSERT_EQ(0U, size % gigabyte); |
| |
| ASSERT_EQ(0, parse_size(&size, "4294967294")); |
| ASSERT_EQ(3U, size / gigabyte); |
| ASSERT_EQ(gigabyte - 2, size % gigabyte); |
| |
| #if __WORDSIZE == 64 |
| uint64_t exabyte = gigabyte * 1024 * 1024 * 1024; |
| ASSERT_EQ(0, parse_size(&size, "9E")); |
| ASSERT_EQ(9U, size / exabyte); |
| ASSERT_EQ(0U, size % exabyte); |
| |
| ASSERT_EQ(0, parse_size(&size, "15E")); |
| ASSERT_EQ(15U, size / exabyte); |
| ASSERT_EQ(0U, size % exabyte); |
| |
| ASSERT_EQ(0, parse_size(&size, "18446744073709551614")); |
| ASSERT_EQ(15U, size / exabyte); |
| ASSERT_EQ(exabyte - 2, size % exabyte); |
| |
| ASSERT_EQ(-ERANGE, parse_size(&size, "16E")); |
| ASSERT_EQ(-ERANGE, parse_size(&size, "19E")); |
| ASSERT_EQ(-EINVAL, parse_size(&size, "7GTPE")); |
| #elif __WORDSIZE == 32 |
| ASSERT_EQ(-ERANGE, parse_size(&size, "5G")); |
| ASSERT_EQ(-ERANGE, parse_size(&size, "9G")); |
| ASSERT_EQ(-ERANGE, parse_size(&size, "9E")); |
| ASSERT_EQ(-ERANGE, parse_size(&size, "7GTPE")); |
| #endif |
| |
| ASSERT_EQ(-EINVAL, parse_size(&size, "")); |
| ASSERT_EQ(-EINVAL, parse_size(&size, "14u")); |
| ASSERT_EQ(-EINVAL, parse_size(&size, "14.2G")); |
| ASSERT_EQ(-EINVAL, parse_size(&size, "-1G")); |
| ASSERT_EQ(-EINVAL, parse_size(&size, "; /bin/rm -- ")); |
| } |