| // libminijail_unittest.cpp |
| // Copyright (C) 2016 The Android Open Source Project |
| // |
| // Licensed under the Apache License, Version 2.0 (the "License"); |
| // you may not use this file except in compliance with the License. |
| // You may obtain a copy of the License at |
| // |
| // http://www.apache.org/licenses/LICENSE-2.0 |
| // |
| // Unless required by applicable law or agreed to in writing, software |
| // distributed under the License is distributed on an "AS IS" BASIS, |
| // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| // See the License for the specific language governing permissions and |
| // limitations under the License. |
| // |
| // Test platform independent logic of Minijail using gtest. |
| |
| #include <errno.h> |
| |
| #include <fcntl.h> |
| #include <sys/types.h> |
| #include <sys/stat.h> |
| #include <sys/wait.h> |
| |
| #include <gtest/gtest.h> |
| |
| #include "libminijail.h" |
| #include "libminijail-private.h" |
| #include "util.h" |
| |
| #if defined(__ANDROID__) |
| const char *kShellPath = "/system/bin/sh"; |
| #else |
| const char *kShellPath = "/bin/sh"; |
| #endif |
| |
| /* Prototypes needed only by test. */ |
| void *consumebytes(size_t length, char **buf, size_t *buflength); |
| char *consumestr(char **buf, size_t *buflength); |
| size_t minijail_get_tmpfs_size(const struct minijail *); |
| |
| /* Silence unused variable warnings. */ |
| TEST(silence, silence_unused) { |
| EXPECT_STREQ(kLdPreloadEnvVar, kLdPreloadEnvVar); |
| EXPECT_STREQ(kFdEnvVar, kFdEnvVar); |
| EXPECT_STRNE(kFdEnvVar, kLdPreloadEnvVar); |
| } |
| |
| TEST(consumebytes, zero) { |
| char buf[1024]; |
| size_t len = sizeof(buf); |
| char *pos = &buf[0]; |
| EXPECT_NE(nullptr, consumebytes(0, &pos, &len)); |
| EXPECT_EQ(&buf[0], pos); |
| EXPECT_EQ(sizeof(buf), len); |
| } |
| |
| TEST(consumebytes, exact) { |
| char buf[1024]; |
| size_t len = sizeof(buf); |
| char *pos = &buf[0]; |
| /* One past the end since it consumes the whole buffer. */ |
| char *end = &buf[sizeof(buf)]; |
| EXPECT_NE(nullptr, consumebytes(len, &pos, &len)); |
| EXPECT_EQ((size_t)0, len); |
| EXPECT_EQ(end, pos); |
| } |
| |
| TEST(consumebytes, half) { |
| char buf[1024]; |
| size_t len = sizeof(buf); |
| char *pos = &buf[0]; |
| /* One past the end since it consumes the whole buffer. */ |
| char *end = &buf[sizeof(buf) / 2]; |
| EXPECT_NE(nullptr, consumebytes(len / 2, &pos, &len)); |
| EXPECT_EQ(sizeof(buf) / 2, len); |
| EXPECT_EQ(end, pos); |
| } |
| |
| TEST(consumebytes, toolong) { |
| char buf[1024]; |
| size_t len = sizeof(buf); |
| char *pos = &buf[0]; |
| /* One past the end since it consumes the whole buffer. */ |
| EXPECT_EQ(nullptr, consumebytes(len + 1, &pos, &len)); |
| EXPECT_EQ(sizeof(buf), len); |
| EXPECT_EQ(&buf[0], pos); |
| } |
| |
| TEST(consumestr, zero) { |
| char buf[1024]; |
| size_t len = 0; |
| char *pos = &buf[0]; |
| memset(buf, 0xff, sizeof(buf)); |
| EXPECT_EQ(nullptr, consumestr(&pos, &len)); |
| EXPECT_EQ((size_t)0, len); |
| EXPECT_EQ(&buf[0], pos); |
| } |
| |
| TEST(consumestr, nonul) { |
| char buf[1024]; |
| size_t len = sizeof(buf); |
| char *pos = &buf[0]; |
| memset(buf, 0xff, sizeof(buf)); |
| EXPECT_EQ(nullptr, consumestr(&pos, &len)); |
| EXPECT_EQ(sizeof(buf), len); |
| EXPECT_EQ(&buf[0], pos); |
| } |
| |
| TEST(consumestr, full) { |
| char buf[1024]; |
| size_t len = sizeof(buf); |
| char *pos = &buf[0]; |
| memset(buf, 0xff, sizeof(buf)); |
| buf[sizeof(buf)-1] = '\0'; |
| EXPECT_EQ((void *)buf, consumestr(&pos, &len)); |
| EXPECT_EQ((size_t)0, len); |
| EXPECT_EQ(&buf[sizeof(buf)], pos); |
| } |
| |
| TEST(consumestr, trailing_nul) { |
| char buf[1024]; |
| size_t len = sizeof(buf) - 1; |
| char *pos = &buf[0]; |
| memset(buf, 0xff, sizeof(buf)); |
| buf[sizeof(buf)-1] = '\0'; |
| EXPECT_EQ(nullptr, consumestr(&pos, &len)); |
| EXPECT_EQ(sizeof(buf) - 1, len); |
| EXPECT_EQ(&buf[0], pos); |
| } |
| |
| class MarshalTest : public ::testing::Test { |
| protected: |
| virtual void SetUp() { |
| m_ = minijail_new(); |
| j_ = minijail_new(); |
| size_ = minijail_size(m_); |
| } |
| virtual void TearDown() { |
| minijail_destroy(m_); |
| minijail_destroy(j_); |
| } |
| |
| char buf_[4096]; |
| struct minijail *m_; |
| struct minijail *j_; |
| size_t size_; |
| }; |
| |
| TEST_F(MarshalTest, empty) { |
| ASSERT_EQ(0, minijail_marshal(m_, buf_, sizeof(buf_))); |
| EXPECT_EQ(0, minijail_unmarshal(j_, buf_, size_)); |
| } |
| |
| TEST_F(MarshalTest, 0xff) { |
| memset(buf_, 0xff, sizeof(buf_)); |
| /* Should fail on the first consumestr since a NUL will never be found. */ |
| EXPECT_EQ(-EINVAL, minijail_unmarshal(j_, buf_, sizeof(buf_))); |
| } |
| |
| TEST(Test, minijail_run_pid_pipes_no_preload) { |
| pid_t pid; |
| int child_stdin, child_stdout, child_stderr; |
| int mj_run_ret; |
| ssize_t write_ret, read_ret; |
| const size_t buf_len = 128; |
| char buf[buf_len]; |
| int status; |
| #if defined(__ANDROID__) |
| char filename[] = "/system/bin/cat"; |
| #else |
| char filename[] = "/bin/cat"; |
| #endif |
| char teststr[] = "test\n"; |
| size_t teststr_len = strlen(teststr); |
| char *argv[4]; |
| |
| struct minijail *j = minijail_new(); |
| |
| argv[0] = filename; |
| argv[1] = NULL; |
| mj_run_ret = minijail_run_pid_pipes_no_preload(j, argv[0], argv, |
| &pid, |
| &child_stdin, &child_stdout, |
| NULL); |
| EXPECT_EQ(mj_run_ret, 0); |
| |
| write_ret = write(child_stdin, teststr, teststr_len); |
| EXPECT_EQ(write_ret, (int)teststr_len); |
| |
| read_ret = read(child_stdout, buf, 8); |
| EXPECT_EQ(read_ret, (int)teststr_len); |
| buf[teststr_len] = 0; |
| EXPECT_EQ(strcmp(buf, teststr), 0); |
| |
| EXPECT_EQ(kill(pid, SIGTERM), 0); |
| waitpid(pid, &status, 0); |
| ASSERT_TRUE(WIFSIGNALED(status)); |
| EXPECT_EQ(WTERMSIG(status), SIGTERM); |
| |
| argv[0] = (char*)kShellPath; |
| argv[1] = "-c"; |
| argv[2] = "echo test >&2"; |
| argv[3] = NULL; |
| mj_run_ret = minijail_run_pid_pipes_no_preload(j, argv[0], argv, &pid, |
| &child_stdin, &child_stdout, |
| &child_stderr); |
| EXPECT_EQ(mj_run_ret, 0); |
| |
| read_ret = read(child_stderr, buf, buf_len); |
| EXPECT_GE(read_ret, (int)teststr_len); |
| |
| waitpid(pid, &status, 0); |
| ASSERT_TRUE(WIFEXITED(status)); |
| EXPECT_EQ(WEXITSTATUS(status), 0); |
| |
| minijail_destroy(j); |
| } |
| |
| TEST(Test, test_minijail_no_fd_leaks) { |
| pid_t pid; |
| int child_stdout; |
| int mj_run_ret; |
| ssize_t read_ret; |
| const size_t buf_len = 128; |
| char buf[buf_len]; |
| char script[buf_len]; |
| int status; |
| char *argv[4]; |
| |
| int dev_null = open("/dev/null", O_RDONLY); |
| ASSERT_NE(dev_null, -1); |
| snprintf(script, |
| sizeof(script), |
| "[ -e /proc/self/fd/%d ] && echo yes || echo no", |
| dev_null); |
| |
| struct minijail *j = minijail_new(); |
| |
| argv[0] = (char*)kShellPath; |
| argv[1] = "-c"; |
| argv[2] = script; |
| argv[3] = NULL; |
| mj_run_ret = minijail_run_pid_pipes_no_preload( |
| j, argv[0], argv, &pid, NULL, &child_stdout, NULL); |
| EXPECT_EQ(mj_run_ret, 0); |
| |
| read_ret = read(child_stdout, buf, buf_len); |
| EXPECT_GE(read_ret, 0); |
| buf[read_ret] = '\0'; |
| EXPECT_STREQ(buf, "yes\n"); |
| |
| waitpid(pid, &status, 0); |
| ASSERT_TRUE(WIFEXITED(status)); |
| EXPECT_EQ(WEXITSTATUS(status), 0); |
| |
| minijail_close_open_fds(j); |
| mj_run_ret = minijail_run_pid_pipes_no_preload( |
| j, argv[0], argv, &pid, NULL, &child_stdout, NULL); |
| EXPECT_EQ(mj_run_ret, 0); |
| |
| read_ret = read(child_stdout, buf, buf_len); |
| EXPECT_GE(read_ret, 0); |
| buf[read_ret] = '\0'; |
| EXPECT_STREQ(buf, "no\n"); |
| |
| waitpid(pid, &status, 0); |
| ASSERT_TRUE(WIFEXITED(status)); |
| EXPECT_EQ(WEXITSTATUS(status), 0); |
| |
| minijail_destroy(j); |
| |
| close(dev_null); |
| } |
| |
| static int early_exit(void* payload) { |
| exit(static_cast<int>(reinterpret_cast<intptr_t>(payload))); |
| } |
| |
| TEST(Test, test_minijail_callback) { |
| pid_t pid; |
| int mj_run_ret; |
| int status; |
| #if defined(__ANDROID__) |
| char filename[] = "/system/bin/cat"; |
| #else |
| char filename[] = "/bin/cat"; |
| #endif |
| char *argv[2]; |
| int exit_code = 42; |
| |
| struct minijail *j = minijail_new(); |
| |
| status = |
| minijail_add_hook(j, &early_exit, reinterpret_cast<void *>(exit_code), |
| MINIJAIL_HOOK_EVENT_PRE_DROP_CAPS); |
| EXPECT_EQ(status, 0); |
| |
| argv[0] = filename; |
| argv[1] = NULL; |
| mj_run_ret = minijail_run_pid_pipes_no_preload(j, argv[0], argv, &pid, NULL, |
| NULL, NULL); |
| EXPECT_EQ(mj_run_ret, 0); |
| |
| status = minijail_wait(j); |
| EXPECT_EQ(status, exit_code); |
| |
| minijail_destroy(j); |
| } |
| |
| TEST(Test, test_minijail_preserve_fd) { |
| int mj_run_ret; |
| int status; |
| #if defined(__ANDROID__) |
| char filename[] = "/system/bin/cat"; |
| #else |
| char filename[] = "/bin/cat"; |
| #endif |
| char *argv[2]; |
| char teststr[] = "test\n"; |
| size_t teststr_len = strlen(teststr); |
| int read_pipe[2]; |
| int write_pipe[2]; |
| char buf[1024]; |
| |
| struct minijail *j = minijail_new(); |
| |
| status = pipe(read_pipe); |
| ASSERT_EQ(status, 0); |
| status = pipe(write_pipe); |
| ASSERT_EQ(status, 0); |
| |
| status = minijail_preserve_fd(j, write_pipe[0], STDIN_FILENO); |
| ASSERT_EQ(status, 0); |
| status = minijail_preserve_fd(j, read_pipe[1], STDOUT_FILENO); |
| ASSERT_EQ(status, 0); |
| minijail_close_open_fds(j); |
| |
| argv[0] = filename; |
| argv[1] = NULL; |
| mj_run_ret = minijail_run_no_preload(j, argv[0], argv); |
| EXPECT_EQ(mj_run_ret, 0); |
| |
| close(write_pipe[0]); |
| status = write(write_pipe[1], teststr, teststr_len); |
| EXPECT_EQ(status, (int)teststr_len); |
| close(write_pipe[1]); |
| |
| close(read_pipe[1]); |
| status = read(read_pipe[0], buf, 8); |
| EXPECT_EQ(status, (int)teststr_len); |
| buf[teststr_len] = 0; |
| EXPECT_EQ(strcmp(buf, teststr), 0); |
| |
| status = minijail_wait(j); |
| EXPECT_EQ(status, 0); |
| |
| minijail_destroy(j); |
| } |
| |
| TEST(Test, |
| #if defined(__ANDROID__) |
| // TODO(lhchavez): Android unit tests don't currently support entering user |
| // namespaces as unprivileged users. |
| DISABLED_test_tmpfs_userns |
| #else |
| test_tmpfs_userns |
| #endif |
| ) { |
| int mj_run_ret; |
| int status; |
| char *argv[4]; |
| char uidmap[128], gidmap[128]; |
| constexpr uid_t kTargetUid = 1000; // Any non-zero value will do. |
| constexpr gid_t kTargetGid = 1000; |
| |
| struct minijail *j = minijail_new(); |
| |
| minijail_namespace_pids(j); |
| minijail_namespace_vfs(j); |
| minijail_mount_tmp(j); |
| minijail_run_as_init(j); |
| |
| // Perform userns mapping. |
| minijail_namespace_user(j); |
| snprintf(uidmap, sizeof(uidmap), "%d %d 1", kTargetUid, getuid()); |
| snprintf(gidmap, sizeof(gidmap), "%d %d 1", kTargetGid, getgid()); |
| minijail_change_uid(j, kTargetUid); |
| minijail_change_gid(j, kTargetGid); |
| minijail_uidmap(j, uidmap); |
| minijail_gidmap(j, gidmap); |
| minijail_namespace_user_disable_setgroups(j); |
| |
| argv[0] = (char*)kShellPath; |
| argv[1] = "-c"; |
| argv[2] = "exec touch /tmp/foo"; |
| argv[3] = NULL; |
| mj_run_ret = minijail_run_no_preload(j, argv[0], argv); |
| EXPECT_EQ(mj_run_ret, 0); |
| |
| status = minijail_wait(j); |
| EXPECT_EQ(status, 0); |
| |
| minijail_destroy(j); |
| } |
| |
| TEST(Test, parse_size) { |
| size_t size; |
| |
| ASSERT_EQ(0, parse_size(&size, "42")); |
| ASSERT_EQ(42U, size); |
| |
| ASSERT_EQ(0, parse_size(&size, "16K")); |
| ASSERT_EQ(16384U, size); |
| |
| ASSERT_EQ(0, parse_size(&size, "1M")); |
| ASSERT_EQ(1024U * 1024, size); |
| |
| uint64_t gigabyte = 1024ULL * 1024 * 1024; |
| ASSERT_EQ(0, parse_size(&size, "3G")); |
| ASSERT_EQ(3U, size / gigabyte); |
| ASSERT_EQ(0U, size % gigabyte); |
| |
| ASSERT_EQ(0, parse_size(&size, "4294967294")); |
| ASSERT_EQ(3U, size / gigabyte); |
| ASSERT_EQ(gigabyte - 2, size % gigabyte); |
| |
| #if __WORDSIZE == 64 |
| uint64_t exabyte = gigabyte * 1024 * 1024 * 1024; |
| ASSERT_EQ(0, parse_size(&size, "9E")); |
| ASSERT_EQ(9U, size / exabyte); |
| ASSERT_EQ(0U, size % exabyte); |
| |
| ASSERT_EQ(0, parse_size(&size, "15E")); |
| ASSERT_EQ(15U, size / exabyte); |
| ASSERT_EQ(0U, size % exabyte); |
| |
| ASSERT_EQ(0, parse_size(&size, "18446744073709551614")); |
| ASSERT_EQ(15U, size / exabyte); |
| ASSERT_EQ(exabyte - 2, size % exabyte); |
| |
| ASSERT_EQ(-ERANGE, parse_size(&size, "16E")); |
| ASSERT_EQ(-ERANGE, parse_size(&size, "19E")); |
| ASSERT_EQ(-EINVAL, parse_size(&size, "7GTPE")); |
| #elif __WORDSIZE == 32 |
| ASSERT_EQ(-ERANGE, parse_size(&size, "5G")); |
| ASSERT_EQ(-ERANGE, parse_size(&size, "9G")); |
| ASSERT_EQ(-ERANGE, parse_size(&size, "9E")); |
| ASSERT_EQ(-ERANGE, parse_size(&size, "7GTPE")); |
| #endif |
| |
| ASSERT_EQ(-EINVAL, parse_size(&size, "")); |
| ASSERT_EQ(-EINVAL, parse_size(&size, "14u")); |
| ASSERT_EQ(-EINVAL, parse_size(&size, "14.2G")); |
| ASSERT_EQ(-EINVAL, parse_size(&size, "-1G")); |
| ASSERT_EQ(-EINVAL, parse_size(&size, "; /bin/rm -- ")); |
| } |