/* SPDX-License-Identifier: LGPL-2.1-or-later */ #include #include "alloc-util.h" #include "coredump-util.h" #include "fileio.h" #include "fd-util.h" #include "format-util.h" #include "macro.h" #include "tests.h" TEST(coredump_filter_to_from_string) { for (CoredumpFilter i = 0; i < _COREDUMP_FILTER_MAX; i++) { const char *n; assert_se(n = coredump_filter_to_string(i)); log_info("0x%x\t%s", 1u << i, n); assert_se(coredump_filter_from_string(n) == i); uint64_t f; assert_se(coredump_filter_mask_from_string(n, &f) == 0); assert_se(f == 1u << i); } } TEST(coredump_filter_mask_from_string) { uint64_t f; assert_se(coredump_filter_mask_from_string("default", &f) == 0); assert_se(f == COREDUMP_FILTER_MASK_DEFAULT); assert_se(coredump_filter_mask_from_string(" default\tdefault\tdefault ", &f) == 0); assert_se(f == COREDUMP_FILTER_MASK_DEFAULT); assert_se(coredump_filter_mask_from_string("defaulta", &f) < 0); assert_se(coredump_filter_mask_from_string("default defaulta default", &f) < 0); assert_se(coredump_filter_mask_from_string("default default defaulta", &f) < 0); assert_se(coredump_filter_mask_from_string("private-anonymous default", &f) == 0); assert_se(f == COREDUMP_FILTER_MASK_DEFAULT); assert_se(coredump_filter_mask_from_string("shared-file-backed shared-dax", &f) == 0); assert_se(f == (1 << COREDUMP_FILTER_SHARED_FILE_BACKED | 1 << COREDUMP_FILTER_SHARED_DAX)); assert_se(coredump_filter_mask_from_string("private-file-backed private-dax 0xF", &f) == 0); assert_se(f == (1 << COREDUMP_FILTER_PRIVATE_FILE_BACKED | 1 << COREDUMP_FILTER_PRIVATE_DAX | 0xF)); assert_se(coredump_filter_mask_from_string("11", &f) == 0); assert_se(f == 0x11); assert_se(coredump_filter_mask_from_string("0x1101", &f) == 0); assert_se(f == 0x1101); assert_se(coredump_filter_mask_from_string("0", &f) == 0); assert_se(f == 0); assert_se(coredump_filter_mask_from_string("all", &f) == 0); assert_se(FLAGS_SET(f, (1 << COREDUMP_FILTER_PRIVATE_ANONYMOUS | 1 << COREDUMP_FILTER_SHARED_ANONYMOUS | 1 << COREDUMP_FILTER_PRIVATE_FILE_BACKED | 1 << COREDUMP_FILTER_SHARED_FILE_BACKED | 1 << COREDUMP_FILTER_ELF_HEADERS | 1 << COREDUMP_FILTER_PRIVATE_HUGE | 1 << COREDUMP_FILTER_SHARED_HUGE | 1 << COREDUMP_FILTER_PRIVATE_DAX | 1 << COREDUMP_FILTER_SHARED_DAX))); } static void test_parse_auxv_two( uint8_t elf_class, size_t offset, const char *data, size_t data_size, int expect_at_secure, uid_t expect_uid, uid_t expect_euid, gid_t expect_gid, gid_t expect_egid) { int at_secure; uid_t uid, euid; gid_t gid, egid; assert_se(parse_auxv(LOG_ERR, elf_class, data, data_size, &at_secure, &uid, &euid, &gid, &egid) == 0); log_debug("[offset=%zu] at_secure=%d, uid="UID_FMT", euid="UID_FMT", gid="GID_FMT", egid="GID_FMT, offset, at_secure, uid, euid, gid, egid); assert_se(uid == expect_uid); assert_se(euid == expect_euid); assert_se(gid == expect_gid); assert_se(egid == expect_egid); } static void test_parse_auxv_one( uint8_t elf_class, int dir_fd, const char *filename, int expect_at_secure, uid_t expect_uid, uid_t expect_euid, gid_t expect_gid, gid_t expect_egid) { _cleanup_free_ char *buf; const char *data; size_t data_size; log_info("Parsing %s…", filename); assert_se(read_full_file_at(dir_fd, filename, &buf, &data_size) >= 0); for (size_t offset = 0; offset < 8; offset++) { _cleanup_free_ char *buf2 = NULL; if (offset == 0) data = buf; else { assert_se(buf2 = malloc(offset + data_size)); memcpy(buf2 + offset, buf, data_size); data = buf2 + offset; } test_parse_auxv_two(elf_class, offset, data, data_size, expect_at_secure, expect_uid, expect_euid, expect_gid, expect_egid); } } TEST(test_parse_auxv) { _cleanup_free_ char *dir = NULL; _cleanup_close_ int dir_fd = -EBADF; assert_se(get_testdata_dir("auxv", &dir) >= 0); dir_fd = open(dir, O_RDONLY | O_CLOEXEC | O_DIRECTORY | O_PATH); assert_se(dir_fd >= 0); if (__BYTE_ORDER == __LITTLE_ENDIAN) { test_parse_auxv_one(ELFCLASS32, dir_fd, "resolved.arm32", 0, 193, 193, 193, 193); test_parse_auxv_one(ELFCLASS64, dir_fd, "bash.riscv64", 0, 1001, 1001, 1001, 1001); test_parse_auxv_one(ELFCLASS32, dir_fd, "sleep.i686", 0, 1000, 1000, 1000, 1000); /* after chgrp and chmod g+s */ test_parse_auxv_one(ELFCLASS32, dir_fd, "sleep32.i686", 1, 1000, 1000, 1000, 10); test_parse_auxv_one(ELFCLASS64, dir_fd, "sleep64.amd64", 1, 1000, 1000, 1000, 10); test_parse_auxv_one(ELFCLASS64, dir_fd, "sudo.aarch64", 1, 1494200408, 0, 1494200408, 1494200408); test_parse_auxv_one(ELFCLASS64, dir_fd, "sudo.amd64", 1, 1000, 0, 1000, 1000); /* Those run unprivileged, but start as root. */ test_parse_auxv_one(ELFCLASS64, dir_fd, "dbus-broker-launch.amd64", 0, 0, 0, 0, 0); test_parse_auxv_one(ELFCLASS64, dir_fd, "dbus-broker-launch.aarch64", 0, 0, 0, 0, 0); test_parse_auxv_one(ELFCLASS64, dir_fd, "polkitd.aarch64", 0, 0, 0, 0, 0); } else { test_parse_auxv_one(ELFCLASS64, dir_fd, "cat.s390x", 0, 3481, 3481, 3481, 3481); } } DEFINE_TEST_MAIN(LOG_INFO);