8ac5aef8f3
This change takes capsicum-test from upstream and applies some local changes to make the tests work on FreeBSD when executed via Kyua. The local modifications are as follows: 1. Make `OpenatTest.WithFlag` pass with the new dot-dot lookup behavior in FreeBSD 12.x+. 2. capsicum-test references a set of helper binaries: `mini-me`, `mini-me.noexec`, and `mini-me.setuid`, as part of the execve/fexecve tests, via execve, fexecve, and open. It achieves this upstream by assuming `mini-me*` is in the current directory, however, in order for Kyua to execute `capsicum-test`, it needs to provide a full path to `mini-me*`. In order to achieve this, I made `capsicum-test` cache the executable's path from argv[0] in main(..) and use the cached value to compute the path to `mini-me*` as part of the execve/fexecve testcases. 3. The capsicum-test test suite assumes that it's always being run on CAPABILITIES enabled kernels. However, there's a chance that the test will be run on a host without a CAPABILITIES enabled kernel, so we must check for the support before running the tests. The way to achieve this is to add the relevant `feature_present("security_capabilities")` check to SetupEnvironment::SetUp() and skip the tests when the support is not available. While here, add a check for `kern.trap_enotcap` being enabled. As noted by markj@ in https://github.com/google/capsicum-test/issues/23, this sysctl being enabled can trigger non-deterministic failures. Therefore, the tests should be skipped if this sysctl is enabled. All local changes have been submitted to the capsicum-test project (https://github.com/google/capsicum-test) and are in various stages of review. Please see the following pull requests for more details: 1. https://github.com/google/capsicum-test/pull/35 2. https://github.com/google/capsicum-test/pull/41 3. https://github.com/google/capsicum-test/pull/42 Reviewed by: asomers Discussed with: emaste, markj Approved by: emaste (mentor) MFC after: 2 months Differential Revision: https://reviews.freebsd.org/D19758
41 lines
1.2 KiB
C
41 lines
1.2 KiB
C
#ifndef __CAPSICUM_LINUX_H__
|
|
#define __CAPSICUM_LINUX_H__
|
|
|
|
#ifdef __linux__
|
|
/************************************************************
|
|
* Linux Capsicum Functionality.
|
|
************************************************************/
|
|
#include <errno.h>
|
|
#include <sys/procdesc.h>
|
|
#include <sys/capsicum.h>
|
|
|
|
#define HAVE_CAP_RIGHTS_LIMIT
|
|
#define HAVE_CAP_RIGHTS_GET
|
|
#define HAVE_CAP_FCNTLS_LIMIT
|
|
#define HAVE_CAP_IOCTLS_LIMIT
|
|
#define HAVE_PROC_FDINFO
|
|
#define HAVE_PDWAIT4
|
|
#define CAP_FROM_ACCEPT
|
|
// TODO(drysdale): uncomment if/when Linux propagates rights on sctp_peeloff.
|
|
// Linux does not generate a capability from sctp_peeloff(cap_fd,...).
|
|
// #define CAP_FROM_PEELOFF
|
|
// TODO(drysdale): uncomment if/when Linux allows intermediate .. path segments
|
|
// for openat()-like operations.
|
|
// #define HAVE_OPENAT_INTERMEDIATE_DOTDOT
|
|
|
|
// Failure to open file due to path traversal generates EPERM
|
|
#ifdef ENOTBENEATH
|
|
#define E_NO_TRAVERSE_CAPABILITY ENOTBENEATH
|
|
#define E_NO_TRAVERSE_O_BENEATH ENOTBENEATH
|
|
#else
|
|
#define E_NO_TRAVERSE_CAPABILITY EPERM
|
|
#define E_NO_TRAVERSE_O_BENEATH EPERM
|
|
#endif
|
|
|
|
// Too many links
|
|
#define E_TOO_MANY_LINKS ELOOP
|
|
|
|
#endif /* __linux__ */
|
|
|
|
#endif /*__CAPSICUM_LINUX_H__*/
|