| /* |
| * QEMU seccomp test suite |
| * |
| * Copyright (c) 2021 Red Hat, Inc. |
| * |
| * This library is free software; you can redistribute it and/or |
| * modify it under the terms of the GNU Lesser General Public |
| * License as published by the Free Software Foundation; either |
| * version 2.1 of the License, or (at your option) any later version. |
| * |
| * This library is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| * Lesser General Public License for more details. |
| * |
| * You should have received a copy of the GNU Lesser General Public |
| * License along with this library; if not, see <http://www.gnu.org/licenses/>. |
| * |
| */ |
| |
| #include "qemu/osdep.h" |
| #include "qemu/config-file.h" |
| #include "qemu/option.h" |
| #include "sysemu/seccomp.h" |
| #include "qapi/error.h" |
| #include "qemu/module.h" |
| |
| #include <sys/syscall.h> |
| |
| static void test_seccomp_helper(const char *args, bool killed, |
| int errnum, int (*doit)(void)) |
| { |
| if (g_test_subprocess()) { |
| QemuOptsList *olist; |
| QemuOpts *opts; |
| int ret; |
| |
| module_call_init(MODULE_INIT_OPTS); |
| olist = qemu_find_opts("sandbox"); |
| g_assert(olist != NULL); |
| |
| opts = qemu_opts_parse_noisily(olist, args, true); |
| g_assert(opts != NULL); |
| |
| parse_sandbox(NULL, opts, &error_abort); |
| |
| /* Running in a child process */ |
| ret = doit(); |
| |
| if (errnum != 0) { |
| g_assert(ret != 0); |
| g_assert(errno == errnum); |
| } else { |
| g_assert(ret == 0); |
| } |
| |
| _exit(0); |
| } else { |
| /* Running in main test process, spawning the child */ |
| g_test_trap_subprocess(NULL, 0, 0); |
| if (killed) { |
| g_test_trap_assert_failed(); |
| } else { |
| g_test_trap_assert_passed(); |
| } |
| } |
| } |
| |
| |
| static void test_seccomp_killed(const char *args, int (*doit)(void)) |
| { |
| test_seccomp_helper(args, true, 0, doit); |
| } |
| |
| static void test_seccomp_errno(const char *args, int errnum, int (*doit)(void)) |
| { |
| test_seccomp_helper(args, false, errnum, doit); |
| } |
| |
| static void test_seccomp_passed(const char *args, int (*doit)(void)) |
| { |
| test_seccomp_helper(args, false, 0, doit); |
| } |
| |
| #ifdef SYS_fork |
| static int doit_sys_fork(void) |
| { |
| int ret = syscall(SYS_fork); |
| if (ret < 0) { |
| return ret; |
| } |
| if (ret == 0) { |
| _exit(0); |
| } |
| return 0; |
| } |
| |
| static void test_seccomp_sys_fork_on_nospawn(void) |
| { |
| test_seccomp_killed("on,spawn=deny", doit_sys_fork); |
| } |
| |
| static void test_seccomp_sys_fork_on(void) |
| { |
| test_seccomp_passed("on", doit_sys_fork); |
| } |
| |
| static void test_seccomp_sys_fork_off(void) |
| { |
| test_seccomp_passed("off", doit_sys_fork); |
| } |
| #endif |
| |
| static int doit_fork(void) |
| { |
| int ret = fork(); |
| if (ret < 0) { |
| return ret; |
| } |
| if (ret == 0) { |
| _exit(0); |
| } |
| return 0; |
| } |
| |
| static void test_seccomp_fork_on_nospawn(void) |
| { |
| test_seccomp_killed("on,spawn=deny", doit_fork); |
| } |
| |
| static void test_seccomp_fork_on(void) |
| { |
| test_seccomp_passed("on", doit_fork); |
| } |
| |
| static void test_seccomp_fork_off(void) |
| { |
| test_seccomp_passed("off", doit_fork); |
| } |
| |
| static void *noop(void *arg) |
| { |
| return arg; |
| } |
| |
| static int doit_thread(void) |
| { |
| pthread_t th; |
| int ret = pthread_create(&th, NULL, noop, NULL); |
| if (ret != 0) { |
| errno = ret; |
| return -1; |
| } else { |
| pthread_join(th, NULL); |
| return 0; |
| } |
| } |
| |
| static void test_seccomp_thread_on(void) |
| { |
| test_seccomp_passed("on", doit_thread); |
| } |
| |
| static void test_seccomp_thread_on_nospawn(void) |
| { |
| test_seccomp_passed("on,spawn=deny", doit_thread); |
| } |
| |
| static void test_seccomp_thread_off(void) |
| { |
| test_seccomp_passed("off", doit_thread); |
| } |
| |
| static int doit_sched(void) |
| { |
| struct sched_param param = { .sched_priority = 0 }; |
| return sched_setscheduler(getpid(), SCHED_OTHER, ¶m); |
| } |
| |
| static void test_seccomp_sched_on_nores(void) |
| { |
| test_seccomp_errno("on,resourcecontrol=deny", EPERM, doit_sched); |
| } |
| |
| static void test_seccomp_sched_on(void) |
| { |
| test_seccomp_passed("on", doit_sched); |
| } |
| |
| static void test_seccomp_sched_off(void) |
| { |
| test_seccomp_passed("off", doit_sched); |
| } |
| |
| static bool can_play_with_seccomp(void) |
| { |
| g_autofree char *status = NULL; |
| g_auto(GStrv) lines = NULL; |
| size_t i; |
| |
| if (!g_file_get_contents("/proc/self/status", &status, NULL, NULL)) { |
| return false; |
| } |
| |
| lines = g_strsplit(status, "\n", 0); |
| |
| for (i = 0; lines[i] != NULL; i++) { |
| if (g_str_has_prefix(lines[i], "Seccomp:")) { |
| /* |
| * "Seccomp: 1" or "Seccomp: 2" indicate we're already |
| * confined, probably as we're inside a container. In |
| * this case our tests might get unexpected results, |
| * so we can't run reliably |
| */ |
| if (!strchr(lines[i], '0')) { |
| return false; |
| } |
| |
| return true; |
| } |
| } |
| |
| /* Doesn't look like seccomp is enabled in the kernel */ |
| return false; |
| } |
| |
| int main(int argc, char **argv) |
| { |
| g_test_init(&argc, &argv, NULL); |
| if (can_play_with_seccomp()) { |
| #ifdef SYS_fork |
| g_test_add_func("/softmmu/seccomp/sys-fork/on", |
| test_seccomp_sys_fork_on); |
| g_test_add_func("/softmmu/seccomp/sys-fork/on-nospawn", |
| test_seccomp_sys_fork_on_nospawn); |
| g_test_add_func("/softmmu/seccomp/sys-fork/off", |
| test_seccomp_sys_fork_off); |
| #endif |
| |
| g_test_add_func("/softmmu/seccomp/fork/on", |
| test_seccomp_fork_on); |
| g_test_add_func("/softmmu/seccomp/fork/on-nospawn", |
| test_seccomp_fork_on_nospawn); |
| g_test_add_func("/softmmu/seccomp/fork/off", |
| test_seccomp_fork_off); |
| |
| g_test_add_func("/softmmu/seccomp/thread/on", |
| test_seccomp_thread_on); |
| g_test_add_func("/softmmu/seccomp/thread/on-nospawn", |
| test_seccomp_thread_on_nospawn); |
| g_test_add_func("/softmmu/seccomp/thread/off", |
| test_seccomp_thread_off); |
| |
| if (doit_sched() == 0) { |
| /* |
| * musl doesn't impl sched_setscheduler, hence |
| * we check above if it works first |
| */ |
| g_test_add_func("/softmmu/seccomp/sched/on", |
| test_seccomp_sched_on); |
| g_test_add_func("/softmmu/seccomp/sched/on-nores", |
| test_seccomp_sched_on_nores); |
| g_test_add_func("/softmmu/seccomp/sched/off", |
| test_seccomp_sched_off); |
| } |
| } |
| return g_test_run(); |
| } |