 bfe7bf8590
			
		
	
	
		bfe7bf8590
		
	
	
	
	
		
			
			This commit was created with scripts/clean-includes. Signed-off-by: Markus Armbruster <armbru@redhat.com> Acked-by: Christian Schoenebeck <qemu_oss@crudebyte.com> Reviewed-by: Michael S. Tsirkin <mst@redhat.com> Message-Id: <20230202133830.2152150-19-armbru@redhat.com>
		
			
				
	
	
		
			269 lines
		
	
	
		
			6.6 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			269 lines
		
	
	
		
			6.6 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * QEMU seccomp test suite
 | |
|  *
 | |
|  * Copyright (c) 2021 Red Hat, Inc.
 | |
|  *
 | |
|  * This library is free software; you can redistribute it and/or
 | |
|  * modify it under the terms of the GNU Lesser General Public
 | |
|  * License as published by the Free Software Foundation; either
 | |
|  * version 2.1 of the License, or (at your option) any later version.
 | |
|  *
 | |
|  * This library is distributed in the hope that it will be useful,
 | |
|  * but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
|  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 | |
|  * Lesser General Public License for more details.
 | |
|  *
 | |
|  * You should have received a copy of the GNU Lesser General Public
 | |
|  * License along with this library; if not, see <http://www.gnu.org/licenses/>.
 | |
|  *
 | |
|  */
 | |
| 
 | |
| #include "qemu/osdep.h"
 | |
| #include "qemu/config-file.h"
 | |
| #include "qemu/option.h"
 | |
| #include "sysemu/seccomp.h"
 | |
| #include "qapi/error.h"
 | |
| #include "qemu/module.h"
 | |
| 
 | |
| #include <sys/syscall.h>
 | |
| 
 | |
| static void test_seccomp_helper(const char *args, bool killed,
 | |
|                                 int errnum, int (*doit)(void))
 | |
| {
 | |
|     if (g_test_subprocess()) {
 | |
|         QemuOptsList *olist;
 | |
|         QemuOpts *opts;
 | |
|         int ret;
 | |
| 
 | |
|         module_call_init(MODULE_INIT_OPTS);
 | |
|         olist = qemu_find_opts("sandbox");
 | |
|         g_assert(olist != NULL);
 | |
| 
 | |
|         opts = qemu_opts_parse_noisily(olist, args, true);
 | |
|         g_assert(opts != NULL);
 | |
| 
 | |
|         parse_sandbox(NULL, opts, &error_abort);
 | |
| 
 | |
|         /* Running in a child process */
 | |
|         ret = doit();
 | |
| 
 | |
|         if (errnum != 0) {
 | |
|             g_assert(ret != 0);
 | |
|             g_assert(errno == errnum);
 | |
|         } else {
 | |
|             g_assert(ret == 0);
 | |
|         }
 | |
| 
 | |
|         _exit(0);
 | |
|     } else {
 | |
|         /* Running in main test process, spawning the child */
 | |
|         g_test_trap_subprocess(NULL, 0, 0);
 | |
|         if (killed) {
 | |
|             g_test_trap_assert_failed();
 | |
|         } else {
 | |
|             g_test_trap_assert_passed();
 | |
|         }
 | |
|     }
 | |
| }
 | |
| 
 | |
| 
 | |
| static void test_seccomp_killed(const char *args, int (*doit)(void))
 | |
| {
 | |
|     test_seccomp_helper(args, true, 0, doit);
 | |
| }
 | |
| 
 | |
| static void test_seccomp_errno(const char *args, int errnum, int (*doit)(void))
 | |
| {
 | |
|     test_seccomp_helper(args, false, errnum, doit);
 | |
| }
 | |
| 
 | |
| static void test_seccomp_passed(const char *args, int (*doit)(void))
 | |
| {
 | |
|     test_seccomp_helper(args, false, 0, doit);
 | |
| }
 | |
| 
 | |
| #ifdef SYS_fork
 | |
| static int doit_sys_fork(void)
 | |
| {
 | |
|     int ret = syscall(SYS_fork);
 | |
|     if (ret < 0) {
 | |
|         return ret;
 | |
|     }
 | |
|     if (ret == 0) {
 | |
|         _exit(0);
 | |
|     }
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static void test_seccomp_sys_fork_on_nospawn(void)
 | |
| {
 | |
|     test_seccomp_killed("on,spawn=deny", doit_sys_fork);
 | |
| }
 | |
| 
 | |
| static void test_seccomp_sys_fork_on(void)
 | |
| {
 | |
|     test_seccomp_passed("on", doit_sys_fork);
 | |
| }
 | |
| 
 | |
| static void test_seccomp_sys_fork_off(void)
 | |
| {
 | |
|     test_seccomp_passed("off", doit_sys_fork);
 | |
| }
 | |
| #endif
 | |
| 
 | |
| static int doit_fork(void)
 | |
| {
 | |
|     int ret = fork();
 | |
|     if (ret < 0) {
 | |
|         return ret;
 | |
|     }
 | |
|     if (ret == 0) {
 | |
|         _exit(0);
 | |
|     }
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static void test_seccomp_fork_on_nospawn(void)
 | |
| {
 | |
|     test_seccomp_killed("on,spawn=deny", doit_fork);
 | |
| }
 | |
| 
 | |
| static void test_seccomp_fork_on(void)
 | |
| {
 | |
|     test_seccomp_passed("on", doit_fork);
 | |
| }
 | |
| 
 | |
| static void test_seccomp_fork_off(void)
 | |
| {
 | |
|     test_seccomp_passed("off", doit_fork);
 | |
| }
 | |
| 
 | |
| static void *noop(void *arg)
 | |
| {
 | |
|     return arg;
 | |
| }
 | |
| 
 | |
| static int doit_thread(void)
 | |
| {
 | |
|     pthread_t th;
 | |
|     int ret = pthread_create(&th, NULL, noop, NULL);
 | |
|     if (ret != 0) {
 | |
|         errno = ret;
 | |
|         return -1;
 | |
|     } else {
 | |
|         pthread_join(th, NULL);
 | |
|         return 0;
 | |
|     }
 | |
| }
 | |
| 
 | |
| static void test_seccomp_thread_on(void)
 | |
| {
 | |
|     test_seccomp_passed("on", doit_thread);
 | |
| }
 | |
| 
 | |
| static void test_seccomp_thread_on_nospawn(void)
 | |
| {
 | |
|     test_seccomp_passed("on,spawn=deny", doit_thread);
 | |
| }
 | |
| 
 | |
| static void test_seccomp_thread_off(void)
 | |
| {
 | |
|     test_seccomp_passed("off", doit_thread);
 | |
| }
 | |
| 
 | |
| static int doit_sched(void)
 | |
| {
 | |
|     struct sched_param param = { .sched_priority = 0 };
 | |
|     return sched_setscheduler(getpid(), SCHED_OTHER, ¶m);
 | |
| }
 | |
| 
 | |
| static void test_seccomp_sched_on_nores(void)
 | |
| {
 | |
|     test_seccomp_errno("on,resourcecontrol=deny", EPERM, doit_sched);
 | |
| }
 | |
| 
 | |
| static void test_seccomp_sched_on(void)
 | |
| {
 | |
|     test_seccomp_passed("on", doit_sched);
 | |
| }
 | |
| 
 | |
| static void test_seccomp_sched_off(void)
 | |
| {
 | |
|     test_seccomp_passed("off", doit_sched);
 | |
| }
 | |
| 
 | |
| static bool can_play_with_seccomp(void)
 | |
| {
 | |
|     g_autofree char *status = NULL;
 | |
|     g_auto(GStrv) lines = NULL;
 | |
|     size_t i;
 | |
| 
 | |
|     if (!g_file_get_contents("/proc/self/status", &status, NULL, NULL)) {
 | |
|         return false;
 | |
|     }
 | |
| 
 | |
|     lines = g_strsplit(status, "\n", 0);
 | |
| 
 | |
|     for (i = 0; lines[i] != NULL; i++) {
 | |
|         if (g_str_has_prefix(lines[i], "Seccomp:")) {
 | |
|             /*
 | |
|              * "Seccomp: 1" or "Seccomp: 2" indicate we're already
 | |
|              * confined, probably as we're inside a container. In
 | |
|              * this case our tests might get unexpected results,
 | |
|              * so we can't run reliably
 | |
|              */
 | |
|             if (!strchr(lines[i], '0')) {
 | |
|                 return false;
 | |
|             }
 | |
| 
 | |
|             return true;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     /* Doesn't look like seccomp is enabled in the kernel */
 | |
|     return false;
 | |
| }
 | |
| 
 | |
| int main(int argc, char **argv)
 | |
| {
 | |
|     g_test_init(&argc, &argv, NULL);
 | |
|     if (can_play_with_seccomp()) {
 | |
| #ifdef SYS_fork
 | |
|         g_test_add_func("/softmmu/seccomp/sys-fork/on",
 | |
|                         test_seccomp_sys_fork_on);
 | |
|         g_test_add_func("/softmmu/seccomp/sys-fork/on-nospawn",
 | |
|                         test_seccomp_sys_fork_on_nospawn);
 | |
|         g_test_add_func("/softmmu/seccomp/sys-fork/off",
 | |
|                         test_seccomp_sys_fork_off);
 | |
| #endif
 | |
| 
 | |
|         g_test_add_func("/softmmu/seccomp/fork/on",
 | |
|                         test_seccomp_fork_on);
 | |
|         g_test_add_func("/softmmu/seccomp/fork/on-nospawn",
 | |
|                         test_seccomp_fork_on_nospawn);
 | |
|         g_test_add_func("/softmmu/seccomp/fork/off",
 | |
|                         test_seccomp_fork_off);
 | |
| 
 | |
|         g_test_add_func("/softmmu/seccomp/thread/on",
 | |
|                         test_seccomp_thread_on);
 | |
|         g_test_add_func("/softmmu/seccomp/thread/on-nospawn",
 | |
|                         test_seccomp_thread_on_nospawn);
 | |
|         g_test_add_func("/softmmu/seccomp/thread/off",
 | |
|                         test_seccomp_thread_off);
 | |
| 
 | |
|         if (doit_sched() == 0) {
 | |
|             /*
 | |
|              * musl doesn't impl sched_setscheduler, hence
 | |
|              * we check above if it works first
 | |
|              */
 | |
|             g_test_add_func("/softmmu/seccomp/sched/on",
 | |
|                             test_seccomp_sched_on);
 | |
|             g_test_add_func("/softmmu/seccomp/sched/on-nores",
 | |
|                             test_seccomp_sched_on_nores);
 | |
|             g_test_add_func("/softmmu/seccomp/sched/off",
 | |
|                             test_seccomp_sched_off);
 | |
|         }
 | |
|     }
 | |
|     return g_test_run();
 | |
| }
 |