mirror of
				https://git.proxmox.com/git/mirror_spl-debian
				synced 2025-10-31 08:26:28 +00:00 
			
		
		
		
	 df870a697f
			
		
	
	
		df870a697f
		
	
	
	
	
		
			
			Restructure the the SPLAT headers such that each test only includes the minimal set of headers it requires. Signed-off-by: Brian Behlendorf <behlendorf1@llnl.gov>
		
			
				
	
	
		
			251 lines
		
	
	
		
			7.2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			251 lines
		
	
	
		
			7.2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*****************************************************************************\
 | |
|  *  Copyright (C) 2007-2010 Lawrence Livermore National Security, LLC.
 | |
|  *  Copyright (C) 2007 The Regents of the University of California.
 | |
|  *  Produced at Lawrence Livermore National Laboratory (cf, DISCLAIMER).
 | |
|  *  Written by Brian Behlendorf <behlendorf1@llnl.gov>.
 | |
|  *  UCRL-CODE-235197
 | |
|  *
 | |
|  *  This file is part of the SPL, Solaris Porting Layer.
 | |
|  *  For details, see <http://github.com/behlendorf/spl/>.
 | |
|  *
 | |
|  *  The SPL is free software; you can redistribute it and/or modify it
 | |
|  *  under the terms of the GNU General Public License as published by the
 | |
|  *  Free Software Foundation; either version 2 of the License, or (at your
 | |
|  *  option) any later version.
 | |
|  *
 | |
|  *  The SPL is distributed in the hope that it will be useful, but WITHOUT
 | |
|  *  ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 | |
|  *  FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
 | |
|  *  for more details.
 | |
|  *
 | |
|  *  You should have received a copy of the GNU General Public License along
 | |
|  *  with the SPL.  If not, see <http://www.gnu.org/licenses/>.
 | |
|  *****************************************************************************
 | |
|  *  Solaris Porting LAyer Tests (SPLAT) Credential Tests.
 | |
| \*****************************************************************************/
 | |
| 
 | |
| #include <sys/cred.h>
 | |
| #include "splat-internal.h"
 | |
| 
 | |
| #define SPLAT_CRED_NAME			"cred"
 | |
| #define SPLAT_CRED_DESC			"Kernel Cred Tests"
 | |
| 
 | |
| #define SPLAT_CRED_TEST1_ID		0x0e01
 | |
| #define SPLAT_CRED_TEST1_NAME		"cred"
 | |
| #define SPLAT_CRED_TEST1_DESC		"Task Credential Test"
 | |
| 
 | |
| #define SPLAT_CRED_TEST2_ID		0x0e02
 | |
| #define SPLAT_CRED_TEST2_NAME		"kcred"
 | |
| #define SPLAT_CRED_TEST2_DESC		"Kernel Credential Test"
 | |
| 
 | |
| #define SPLAT_CRED_TEST3_ID		0x0e03
 | |
| #define SPLAT_CRED_TEST3_NAME		"groupmember"
 | |
| #define SPLAT_CRED_TEST3_DESC		"Group Member Test"
 | |
| 
 | |
| #define GROUP_STR_SIZE			128
 | |
| #define GROUP_STR_REDZONE		16
 | |
| 
 | |
| static int
 | |
| splat_cred_test1(struct file *file, void *arg)
 | |
| {
 | |
| 	char str[GROUP_STR_SIZE];
 | |
| 	uid_t uid, ruid, suid;
 | |
| 	gid_t gid, rgid, sgid, *groups;
 | |
| 	int ngroups, i, count = 0;
 | |
| 
 | |
| 	uid  = crgetuid(CRED());
 | |
| 	ruid = crgetruid(CRED());
 | |
| 	suid = crgetsuid(CRED());
 | |
| 
 | |
| 	gid  = crgetgid(CRED());
 | |
| 	rgid = crgetrgid(CRED());
 | |
| 	sgid = crgetsgid(CRED());
 | |
| 
 | |
| 	crhold(CRED());
 | |
| 	ngroups = crgetngroups(CRED());
 | |
| 	groups  = crgetgroups(CRED());
 | |
| 
 | |
| 	memset(str, 0, GROUP_STR_SIZE);
 | |
| 	for (i = 0; i < ngroups; i++) {
 | |
| 		count += sprintf(str + count, "%d ", groups[i]);
 | |
| 
 | |
| 		if (count > (GROUP_STR_SIZE - GROUP_STR_REDZONE)) {
 | |
| 			splat_vprint(file, SPLAT_CRED_TEST1_NAME,
 | |
| 				     "Failed too many group entries for temp "
 | |
| 				     "buffer: %d, %s\n", ngroups, str);
 | |
| 			return -ENOSPC;
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	crfree(CRED());
 | |
| 
 | |
| 	splat_vprint(file, SPLAT_CRED_TEST1_NAME,
 | |
| 		     "uid: %d ruid: %d suid: %d "
 | |
| 		     "gid: %d rgid: %d sgid: %d\n",
 | |
| 		     uid, ruid, suid, gid, rgid, sgid);
 | |
| 	splat_vprint(file, SPLAT_CRED_TEST1_NAME,
 | |
| 		     "ngroups: %d groups: %s\n", ngroups, str);
 | |
| 
 | |
| 	if (uid || ruid || suid || gid || rgid || sgid) {
 | |
| 		splat_vprint(file, SPLAT_CRED_TEST1_NAME,
 | |
| 			     "Failed expected all uids+gids to be %d\n", 0);
 | |
| 		return -EIDRM;
 | |
| 	}
 | |
| 
 | |
| 	if (ngroups > NGROUPS_MAX) {
 | |
| 		splat_vprint(file, SPLAT_CRED_TEST1_NAME,
 | |
| 			     "Failed ngroups must not exceed NGROUPS_MAX: "
 | |
| 			     "%d > %d\n", ngroups, NGROUPS_MAX);
 | |
| 		return -EIDRM;
 | |
| 	}
 | |
| 
 | |
| 	splat_vprint(file, SPLAT_CRED_TEST1_NAME,
 | |
| 		     "Success sane CRED(): %d\n", 0);
 | |
| 
 | |
|         return 0;
 | |
| } /* splat_cred_test1() */
 | |
| 
 | |
| static int
 | |
| splat_cred_test2(struct file *file, void *arg)
 | |
| {
 | |
| 	char str[GROUP_STR_SIZE];
 | |
| 	uid_t uid, ruid, suid;
 | |
| 	gid_t gid, rgid, sgid, *groups;
 | |
| 	int ngroups, i, count = 0;
 | |
| 
 | |
| 	uid  = crgetuid(kcred);
 | |
| 	ruid = crgetruid(kcred);
 | |
| 	suid = crgetsuid(kcred);
 | |
| 
 | |
| 	gid  = crgetgid(kcred);
 | |
| 	rgid = crgetrgid(kcred);
 | |
| 	sgid = crgetsgid(kcred);
 | |
| 
 | |
| 	crhold(kcred);
 | |
| 	ngroups = crgetngroups(kcred);
 | |
| 	groups  = crgetgroups(kcred);
 | |
| 
 | |
| 	memset(str, 0, GROUP_STR_SIZE);
 | |
| 	for (i = 0; i < ngroups; i++) {
 | |
| 		count += sprintf(str + count, "%d ", groups[i]);
 | |
| 
 | |
| 		if (count > (GROUP_STR_SIZE - GROUP_STR_REDZONE)) {
 | |
| 			splat_vprint(file, SPLAT_CRED_TEST2_NAME,
 | |
| 				     "Failed too many group entries for temp "
 | |
| 				     "buffer: %d, %s\n", ngroups, str);
 | |
| 			return -ENOSPC;
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	crfree(kcred);
 | |
| 
 | |
| 	splat_vprint(file, SPLAT_CRED_TEST2_NAME,
 | |
| 		     "uid: %d ruid: %d suid: %d "
 | |
| 		     "gid: %d rgid: %d sgid: %d\n",
 | |
| 		     uid, ruid, suid, gid, rgid, sgid);
 | |
| 	splat_vprint(file, SPLAT_CRED_TEST2_NAME,
 | |
| 		     "ngroups: %d groups: %s\n", ngroups, str);
 | |
| 
 | |
| 	if (uid || ruid || suid || gid || rgid || sgid) {
 | |
| 		splat_vprint(file, SPLAT_CRED_TEST2_NAME,
 | |
| 			     "Failed expected all uids+gids to be %d\n", 0);
 | |
| 		return -EIDRM;
 | |
| 	}
 | |
| 
 | |
| 	if (ngroups > NGROUPS_MAX) {
 | |
| 		splat_vprint(file, SPLAT_CRED_TEST2_NAME,
 | |
| 			     "Failed ngroups must not exceed NGROUPS_MAX: "
 | |
| 			     "%d > %d\n", ngroups, NGROUPS_MAX);
 | |
| 		return -EIDRM;
 | |
| 	}
 | |
| 
 | |
| 	splat_vprint(file, SPLAT_CRED_TEST2_NAME,
 | |
| 		     "Success sane kcred: %d\n", 0);
 | |
| 
 | |
|         return 0;
 | |
| } /* splat_cred_test2() */
 | |
| 
 | |
| /*
 | |
|  * On most/all systems it can be expected that a task with root
 | |
|  * permissions also is a member of the root group,  Since the
 | |
|  * test suite is always run as root we check first that CRED() is
 | |
|  * a member of the root group, and secondly that it is not a member
 | |
|  * of our fake group.  This test will break is someone happens to
 | |
|  * create group number NGROUPS_MAX-1 and then added root to it.
 | |
|  */
 | |
| static int
 | |
| splat_cred_test3(struct file *file, void *arg)
 | |
| {
 | |
| 	gid_t root_gid, fake_gid;
 | |
| 	int rc;
 | |
| 
 | |
| 	root_gid = 0;
 | |
| 	fake_gid = NGROUPS_MAX-1;
 | |
| 
 | |
| 	rc = groupmember(root_gid, CRED());
 | |
| 	if (!rc) {
 | |
| 		splat_vprint(file, SPLAT_CRED_TEST3_NAME,
 | |
| 			     "Failed root git %d expected to be member "
 | |
| 			     "of CRED() groups: %d\n", root_gid, rc);
 | |
| 		return -EIDRM;
 | |
| 	}
 | |
| 
 | |
| 	rc = groupmember(fake_gid, CRED());
 | |
| 	if (rc) {
 | |
| 		splat_vprint(file, SPLAT_CRED_TEST3_NAME,
 | |
| 			     "Failed fake git %d expected not to be member "
 | |
| 			     "of CRED() groups: %d\n", fake_gid, rc);
 | |
| 		return -EIDRM;
 | |
| 	}
 | |
| 
 | |
| 	splat_vprint(file, SPLAT_CRED_TEST3_NAME, "Success root gid "
 | |
| 		     "is a member of the expected groups: %d\n", rc);
 | |
| 
 | |
| 	return rc;
 | |
| } /* splat_cred_test3() */
 | |
| 
 | |
| splat_subsystem_t *
 | |
| splat_cred_init(void)
 | |
| {
 | |
|         splat_subsystem_t *sub;
 | |
| 
 | |
|         sub = kmalloc(sizeof(*sub), GFP_KERNEL);
 | |
|         if (sub == NULL)
 | |
|                 return NULL;
 | |
| 
 | |
|         memset(sub, 0, sizeof(*sub));
 | |
|         strncpy(sub->desc.name, SPLAT_CRED_NAME, SPLAT_NAME_SIZE);
 | |
| 	strncpy(sub->desc.desc, SPLAT_CRED_DESC, SPLAT_DESC_SIZE);
 | |
|         INIT_LIST_HEAD(&sub->subsystem_list);
 | |
| 	INIT_LIST_HEAD(&sub->test_list);
 | |
|         spin_lock_init(&sub->test_lock);
 | |
|         sub->desc.id = SPLAT_SUBSYSTEM_CRED;
 | |
| 
 | |
|         SPLAT_TEST_INIT(sub, SPLAT_CRED_TEST1_NAME, SPLAT_CRED_TEST1_DESC,
 | |
| 	              SPLAT_CRED_TEST1_ID, splat_cred_test1);
 | |
|         SPLAT_TEST_INIT(sub, SPLAT_CRED_TEST2_NAME, SPLAT_CRED_TEST2_DESC,
 | |
| 	              SPLAT_CRED_TEST2_ID, splat_cred_test2);
 | |
|         SPLAT_TEST_INIT(sub, SPLAT_CRED_TEST3_NAME, SPLAT_CRED_TEST3_DESC,
 | |
| 	              SPLAT_CRED_TEST3_ID, splat_cred_test3);
 | |
| 
 | |
|         return sub;
 | |
| } /* splat_cred_init() */
 | |
| 
 | |
| void
 | |
| splat_cred_fini(splat_subsystem_t *sub)
 | |
| {
 | |
|         ASSERT(sub);
 | |
| 
 | |
|         SPLAT_TEST_FINI(sub, SPLAT_CRED_TEST3_ID);
 | |
|         SPLAT_TEST_FINI(sub, SPLAT_CRED_TEST2_ID);
 | |
|         SPLAT_TEST_FINI(sub, SPLAT_CRED_TEST1_ID);
 | |
| 
 | |
|         kfree(sub);
 | |
| } /* splat_cred_fini() */
 | |
| 
 | |
| int
 | |
| splat_cred_id(void)
 | |
| {
 | |
|         return SPLAT_SUBSYSTEM_CRED;
 | |
| } /* splat_cred_id() */
 |