On Wed, 2010-09-29 at 08:56 -0500, Serge E. Hallyn wrote:
> This adds basic tests of the keepcaps securebits settings.
> 
> Lots more securebits tests to come (see my email from one
> or 1.5 years ago, and, heck, write them if you have time :).
> 
> Signed-off-by: Serge E. Hallyn <[email protected]>

Great, i get the following output on my machine:

# uname -a 
Linux 2.6.35.4 #2 SMP Tue Sep 28 16:07:27 IST 2010 ppc64 ppc64 ppc64
GNU/Linux

# cat /etc/issue
Fedora release 13 (Goddard)

# ./runltp -f securebits

Running tests.......
<<<test_start>>>
tag=Securebits stime=1285772204
cmdline="run_securebits.sh"
contacts=""
analysis=exit
<<<test_output>>>
incrementing stop
testing keepcaps
keepcaps    1  TPASS  :  dropped privs as expected
keepcaps    1  TPASS  :  kept privs as expected
keepcaps    1  TPASS  :  kept privs as expected
<<<execution_status>>>
initiation_status="ok"
duration=0 termination_type=exited termination_id=0 corefile=no
cutime=0 cstime=0
<<<test_end>>>
INFO: ltp-pan reported all tests PASS
LTP Version: LTP-20100831
        
       ###############################################################"
        
            Done executing testcases."
            LTP Version:  LTP-20100831
       ###############################################################"

Looks fine to be,i just need a little documentation file which would
say:
        What securebits is all about (some pointers/links)? Any specific
configuration required to run these tests, etc ?

Regards--
Subrata

> ---
>  m4/ltp-securebits.m4                               |   24 +++
>  runtest/securebits                                 |    2 +
>  testcases/kernel/security/Makefile                 |    5 +-
>  testcases/kernel/security/securebits/Makefile      |   28 ++++
>  .../kernel/security/securebits/check_keepcaps.c    |  161 
> ++++++++++++++++++++
>  .../kernel/security/securebits/run_securebits.sh   |   20 +++
>  6 files changed, 239 insertions(+), 1 deletions(-)
>  create mode 100644 m4/ltp-securebits.m4
>  create mode 100644 runtest/securebits
>  create mode 100644 testcases/kernel/security/securebits/Makefile
>  create mode 100644 testcases/kernel/security/securebits/check_keepcaps.c
>  create mode 100644 testcases/kernel/security/securebits/run_securebits.sh
> 
> diff --git a/m4/ltp-securebits.m4 b/m4/ltp-securebits.m4
> new file mode 100644
> index 0000000..6407eb8
> --- /dev/null
> +++ b/m4/ltp-securebits.m4
> @@ -0,0 +1,24 @@
> +dnl
> +dnl Copyright (c) Serge Hallyn (2010)
> +dnl
> +dnl This program is free software;  you can redistribute it and/or modify
> +dnl it under the terms of the GNU General Public License as published by
> +dnl the Free Software Foundation; either version 2 of the License, or
> +dnl (at your option) any later version.
> +dnl
> +dnl This program is distributed in the hope that it will be useful,
> +dnl but WITHOUT ANY WARRANTY;  without even the implied warranty of
> +dnl MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
> +dnl the GNU General Public License for more details.
> +dnl
> +dnl You should have received a copy of the GNU General Public License
> +dnl along with this program;  if not, write to the Free Software
> +dnl Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
> +dnl
> +
> +
> +AC_DEFUN([LTP_CHECK_SECUREBITS],
> +AC_CHECK_HEADERS(linux/securebits.h,[
> +     LTP_SECUREBITS=yes
> +])
> +)
> diff --git a/runtest/securebits b/runtest/securebits
> new file mode 100644
> index 0000000..d78a66f
> --- /dev/null
> +++ b/runtest/securebits
> @@ -0,0 +1,2 @@
> +#DESCRIPTION:securebits tests
> +Securebits   run_securebits.sh
> diff --git a/testcases/kernel/security/Makefile 
> b/testcases/kernel/security/Makefile
> index 52b8d06..a877836 100644
> --- a/testcases/kernel/security/Makefile
> +++ b/testcases/kernel/security/Makefile
> @@ -27,11 +27,14 @@ include   $(top_srcdir)/include/mk/env_pre.mk
>  # For broken compilers and toolchains, like Montavista, that improperly 
> detect
>  # system headers when running autoconf -_-... bleh.
>  ifeq ($(strip $(CAP_LIBS)),)
> -FILTER_OUT_DIRS              := cap_bound filecaps
> +FILTER_OUT_DIRS              := cap_bound filecaps securebits
>  endif
>  ifeq ($(HAVE_SETCAP),false)
>  FILTER_OUT_DIRS              += filecaps
>  endif
> +ifeq ($(LTP_SECUREBITS),false)
> +FILTER_OUT_DIRS              += securebits
> +endif
> 
>  # XXX (garrcoop): avoid compilation failures on RHEL 5.4, as reported by
>  # Mitani-san, because of policy versioning issues...
> diff --git a/testcases/kernel/security/securebits/Makefile 
> b/testcases/kernel/security/securebits/Makefile
> new file mode 100644
> index 0000000..a76f2e0
> --- /dev/null
> +++ b/testcases/kernel/security/securebits/Makefile
> @@ -0,0 +1,28 @@
> +################################################################################
> +##                                                                           
>  ##
> +## Copyright (c) International Business Machines  Corp., 2009                
>  ##
> +##                                                                           
>  ##
> +## This program is free software;  you can redistribute it and#or modify     
>  ##
> +## it under the terms of the GNU General Public License as published by      
>  ##
> +## the Free Software Foundation; either version 2 of the License, or         
>  ## ## (at your option) any later version.                                    
>     ##
> +##                                                                           
>  ##
> +## This program is distributed in the hope that it will be useful, but       
>  ##
> +## WITHOUT ANY WARRANTY; without even the implied warranty of 
> MERCHANTABILITY ##
> +## or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License  
>  ##
> +## for more details.                                                         
>  ##
> +##                                                                           
>  ##
> +## You should have received a copy of the GNU General Public License         
>  ##
> +## along with this program;  if not, write to the Free Software              
>  ##
> +## Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA   
>  ##
> +##                                                                           
>  ##
> +################################################################################
> +
> +top_srcdir           ?= ../../../..
> +
> +include $(top_srcdir)/include/mk/testcases.mk
> +
> +LDLIBS                       += $(CAP_LIBS)
> +
> +INSTALL_TARGETS              := *.sh
> +
> +include $(top_srcdir)/include/mk/generic_leaf_target.mk
> diff --git a/testcases/kernel/security/securebits/check_keepcaps.c 
> b/testcases/kernel/security/securebits/check_keepcaps.c
> new file mode 100644
> index 0000000..e969ae4
> --- /dev/null
> +++ b/testcases/kernel/security/securebits/check_keepcaps.c
> @@ -0,0 +1,161 @@
> +#include <errno.h>
> +#include "config.h"
> +#if HAVE_SYS_CAPABILITY_H
> +#include <sys/capability.h>
> +#endif
> +#include <sys/prctl.h>
> +#include <linux/securebits.h>
> +#include <test.h>
> +
> +int errno;
> +
> +/* Tests:
> +     1. drop capabilities at setuid if KEEPCAPS is not set and
> +        new user is nonroot
> +     2. keep capabilities if set and new user is nonroot
> +        a. do with prctl(PR_SET_KEEPCAPS)
> +        (call this test 2)
> +        b. do with prctl(PR_SET_SECUREBITS, SECURE_KEEP_CAPS)
> +        (call this test 3)
> +   TODO: test that exec clears KEEPCAPS
> +     (just create a simple executable that checks PR_GET_KEEPCAPS
> +      results, and execute that as test 4 after doing PR_SET_KEEPCAPS).
> +   TODO: all of the other securebits tests.
> + */
> +
> +char *TCID = "keepcaps";
> +int TST_TOTAL=1;
> +
> +#ifdef HAVE_LIBCAP
> +static int eff_caps_empty(cap_t c)
> +{
> +     int i, ret, v, empty=1;
> +
> +     for (i = 0; i < CAP_LAST_CAP; i++) {
> +             ret = cap_get_flag(c, i, CAP_PERMITTED, &v);
> +             if (ret || v)
> +                     empty = 0;
> +     }
> +
> +     return empty;
> +}
> +
> +static int am_privileged(void)
> +{
> +     int am_privileged = 1;
> +
> +     cap_t cap = cap_get_proc();
> +     if (eff_caps_empty(cap))
> +             am_privileged = 0;
> +     cap_free(cap);
> +
> +     return am_privileged;
> +}
> +#else
> +static int am_privileged(void)
> +{
> +     tst_resm(TBROK, "libcap not installed.");
> +     tst_exit();
> +}
> +#endif
> +
> +#define EXPECT_NOPRIVS 0
> +#define EXPECT_PRIVS 1
> +static void do_setuid(int expect_privs)
> +{
> +     int ret;
> +     int have_privs;
> +
> +     ret = setuid(1000);
> +     if (ret) {
> +             tst_resm(TERRNO | TFAIL, "setuid failed");
> +             tst_exit();
> +     }
> +
> +     have_privs = am_privileged();
> +     if (have_privs && expect_privs == EXPECT_PRIVS) {
> +             tst_resm(TPASS, "kept privs as expected");
> +             tst_exit();
> +     }
> +     if (!have_privs && expect_privs == EXPECT_PRIVS) {
> +             tst_resm(TFAIL, "expected to keep privs but did not");
> +             tst_exit();
> +     }
> +     if (!have_privs && expect_privs == EXPECT_NOPRIVS) {
> +             tst_resm(TPASS, "dropped privs as expected");
> +             tst_exit();
> +     }
> +
> +     /* have_privs && EXPECT_NOPRIVS */
> +     tst_resm(TFAIL, "expected to drop privs but did not");
> +     tst_exit();
> +}
> +
> +static int am_root(void)
> +{
> +     uid_t uid = getuid();
> +     if (uid != 0)
> +             return 0;
> +     if (!am_privileged())
> +             return 0;
> +     return 1;
> +}
> +
> +int main(int argc, char *argv[])
> +{
> +     int ret, whichtest;
> +
> +     ret = prctl(PR_GET_KEEPCAPS);
> +     if (ret) {
> +             tst_resm(TBROK, "keepcaps was already set?\n");
> +             tst_exit();
> +     }
> +     if (!am_root()) {
> +             tst_resm(TBROK, "Run me as root and privileged\n");
> +             tst_exit();
> +     }
> +
> +     if (argc < 2) {
> +             tst_resm(TBROK, "Usage: %s <tescase_num>", argv[0]);
> +             tst_exit();
> +     }
> +     whichtest = atoi(argv[1]);
> +     if (whichtest < 1 || whichtest > 3) {
> +             tst_resm(TFAIL, "Valid tests are 1-3\n");
> +             tst_exit();
> +     }
> +     switch(whichtest) {
> +     case 1:
> +             do_setuid(EXPECT_NOPRIVS); /* does not return */
> +     case 2:
> +             ret = prctl(PR_SET_KEEPCAPS, 1);
> +             if (ret == -1) {
> +                     tst_resm(TFAIL|TERRNO, "PR_SET_KEEPCAPS failed\n");
> +                     tst_exit();
> +             }
> +             ret = prctl(PR_GET_KEEPCAPS);
> +             if (!ret) {
> +                     tst_resm(TFAIL|TERRNO, "PR_SET_KEEPCAPS did not set 
> keepcaps\n");
> +                     tst_exit();
> +             }
> +             do_setuid(EXPECT_PRIVS); /* does not return */
> +     case 3:
> +             ret = prctl(PR_GET_SECUREBITS);
> +             ret = prctl(PR_SET_SECUREBITS, ret | SECBIT_KEEP_CAPS);
> +             if (ret == -1) {
> +                     tst_resm(TFAIL|TERRNO, "PR_SET_SECUREBITS failed\n");
> +                     tst_exit();
> +             }
> +             ret = prctl(PR_GET_KEEPCAPS);
> +             if (!ret) {
> +                     tst_resm(TFAIL|TERRNO, "PR_SET_SECUREBITS did not set 
> keepcaps\n");
> +                     tst_exit();
> +             }
> +             do_setuid(EXPECT_PRIVS); /* does not return */
> +     default:
> +             tst_resm(TFAIL, "should not reach here\n");
> +             tst_exit();
> +     }
> +     tst_resm(TFAIL, "should not reach here\n");
> +     tst_exit();
> +}
> diff --git a/testcases/kernel/security/securebits/run_securebits.sh 
> b/testcases/kernel/security/securebits/run_securebits.sh
> new file mode 100644
> index 0000000..4d9e272
> --- /dev/null
> +++ b/testcases/kernel/security/securebits/run_securebits.sh
> @@ -0,0 +1,20 @@
> +#!/bin/sh
> +
> +echo "testing keepcaps"
> +check_keepcaps 1
> +tmp=$?
> +if [ $tmp -ne 0 ]; then
> +     exit_code=$tmp
> +fi
> +check_keepcaps 2
> +tmp=$?
> +if [ $tmp -ne 0 ]; then
> +     exit_code=$tmp
> +fi
> +check_keepcaps 3
> +tmp=$?
> +if [ $tmp -ne 0 ]; then
> +     exit_code=$tmp
> +fi
> +
> +exit $exit_code


------------------------------------------------------------------------------
Start uncovering the many advantages of virtual appliances
and start using them to simplify application deployment and
accelerate your shift to cloud computing.
http://p.sf.net/sfu/novell-sfdev2dev
_______________________________________________
Ltp-list mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/ltp-list

Reply via email to