smack-test: add smack tests from meta-intel-iot-security

ported over smack tests

Signed-off-by: Armin Kuster <akuster808@gmail.com>
This commit is contained in:
Armin Kuster
2019-05-06 11:36:58 -07:00
parent 5d37937f2e
commit 8eee8727cb
16 changed files with 1364 additions and 0 deletions

View File

@@ -0,0 +1,529 @@
import unittest
import re
import os
import string
from oeqa.runtime.case import OERuntimeTestCase
from oeqa.core.decorator.depends import OETestDepends
from oeqa.runtime.decorator.package import OEHasPackage
from oeqa.core.decorator.data import skipIfNotFeature
MAX_LABEL_LEN = 255
LABEL = "a" * MAX_LABEL_LEN
class SmackBasicTest(OERuntimeTestCase):
''' base smack test '''
@classmethod
def setUpClass(cls):
cls.smack_path = ""
cls.current_label = ""
cls.uid = 1000
@skipIfNotFeature('smack',
'Test requires smack to be in DISTRO_FEATURES')
@OEHasPackage(['smack-test'])
@OETestDepends(['ssh.SSHTest.test_ssh'])
def test_smack_basic(self):
status, output = self.target.run("grep smack /proc/mounts | awk '{print $2}'")
self.smack_path = output
status,output = self.target.run("cat /proc/self/attr/current")
self.current_label = output.strip()
class SmackAccessLabel(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_add_access_label(self):
''' Test if chsmack can correctly set a SMACK label '''
filename = "/tmp/test_access_label"
self.target.run("touch %s" %filename)
status, output = self.target.run("chsmack -a %s %s" %(LABEL, filename))
self.assertEqual(
status, 0,
"Cannot set smack access label. "
"Status and output: %d %s" %(status, output))
status, output = self.target.run("chsmack %s" %filename)
self.target.run("rm %s" %filename)
m = re.search('(?<=access=")\S+(?=")', output)
if m is None:
self.fail("Did not find access attribute")
else:
label_retrieved = m .group(0)
self.assertEqual(
LABEL, label_retrieved,
"label not set correctly. expected and gotten: "
"%s %s" %(LABEL,label_retrieved))
class SmackExecLabel(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_add_exec_label(self):
'''Test if chsmack can correctly set a SMACK Exec label'''
filename = "/tmp/test_exec_label"
self.target.run("touch %s" %filename)
status, output = self.target.run("chsmack -e %s %s" %(LABEL, filename))
self.assertEqual(
status, 0,
"Cannot set smack exec label. "
"Status and output: %d %s" %(status, output))
status, output = self.target.run("chsmack %s" %filename)
self.target.run("rm %s" %filename)
m= re.search('(?<=execute=")\S+(?=")', output)
if m is None:
self.fail("Did not find execute attribute")
else:
label_retrieved = m.group(0)
self.assertEqual(
LABEL, label_retrieved,
"label not set correctly. expected and gotten: " +
"%s %s" %(LABEL,label_retrieved))
class SmackMmapLabel(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_add_mmap_label(self):
'''Test if chsmack can correctly set a SMACK mmap label'''
filename = "/tmp/test_exec_label"
self.target.run("touch %s" %filename)
status, output = self.target.run("chsmack -m %s %s" %(LABEL, filename))
self.assertEqual(
status, 0,
"Cannot set smack mmap label. "
"Status and output: %d %s" %(status, output))
status, output = self.target.run("chsmack %s" %filename)
self.target.run("rm %s" %filename)
m = re.search('(?<=mmap=")\S+(?=")', output)
if m is None:
self.fail("Did not find mmap attribute")
else:
label_retrieved = m.group(0)
self.assertEqual(
LABEL, label_retrieved,
"label not set correctly. expected and gotten: " +
"%s %s" %(LABEL,label_retrieved))
class SmackTransmutable(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_add_transmutable(self):
'''Test if chsmack can correctly set a SMACK transmutable mode'''
directory = "~/test_transmutable"
self.target.run("mkdir -p %s" %directory)
status, output = self.target.run("chsmack -t %s" %directory)
self.assertEqual(status, 0, "Cannot set smack transmutable. "
"Status and output: %d %s" %(status, output))
status, output = self.target.run("chsmack %s" %directory)
self.target.run("rmdir %s" %directory)
m = re.search('(?<=transmute=")\S+(?=")', output)
if m is None:
self.fail("Did not find transmute attribute")
else:
label_retrieved = m.group(0)
self.assertEqual(
"TRUE", label_retrieved,
"label not set correctly. expected and gotten: " +
"%s %s" %(LABEL,label_retrieved))
class SmackChangeSelfLabelPrivilege(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_privileged_change_self_label(self):
'''Test if privileged process (with CAP_MAC_ADMIN privilege)
can change its label.
'''
labelf = "/proc/self/attr/current"
command = "/bin/sh -c 'echo PRIVILEGED >%s; cat %s'" %(labelf, labelf)
status, output = self.target.run(
"notroot.py 0 %s %s" %(self.current_label, command))
self.assertIn("PRIVILEGED", output,
"Privilege process did not change label.Output: %s" %output)
class SmackChangeSelfLabelUnprivilege(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_unprivileged_change_self_label(self):
'''Test if unprivileged process (without CAP_MAC_ADMIN privilege)
cannot change its label'''
command = "/bin/sh -c 'echo %s >/proc/self/attr/current'" %LABEL
status, output = self.target.run(
"notroot.py %d %s %s"
%(self.uid, self.current_label, command) +
" 2>&1 | grep 'Operation not permitted'" )
self.assertEqual(
status, 0,
"Unprivileged process should not be able to change its label")
class SmackChangeFileLabelPrivilege(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_unprivileged_change_file_label(self):
'''Test if unprivileged process cannot change file labels'''
status, chsmack = self.target.run("which chsmack")
status, touch = self.target.run("which touch")
filename = "/tmp/test_unprivileged_change_file_label"
self.target.run("touch %s" % filename)
self.target.run("notroot.py %d %s" %(self.uid, self.current_label))
status, output = self.target.run(
"notroot.py " +
"%d unprivileged %s -a %s %s 2>&1 " %(self.uid, chsmack, LABEL, filename) +
"| grep 'Operation not permitted'" )
self.target.run("rm %s" % filename)
self.assertEqual( status, 0, "Unprivileged process changed label for %s" %filename)
class SmackLoadRule(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_load_smack_rule(self):
'''Test if new smack access rules can be loaded'''
# old 23 character format requires special spaces formatting
# 12345678901234567890123456789012345678901234567890123
ruleA="TheOne TheOther rwxat"
ruleB="TheOne TheOther r----"
clean="TheOne TheOther -----"
modeA = "rwxat"
modeB = "r"
status, output = self.target.run('echo -n "%s" > %s/load' %(ruleA, self.smack_path))
status, output = self.target.run( 'cat %s/load | grep "^TheOne" | grep " TheOther "' %self.smack_path)
self.assertEqual(status, 0, "Rule A was not added")
mode = list(filter(bool, output.split(" ")))[2].strip()
self.assertEqual( mode, modeA, "Mode A was not set correctly; mode: %s" %mode)
status, output = self.target.run( 'echo -n "%s" > %s/load' %(ruleB, self.smack_path))
status, output = self.target.run( 'cat %s/load | grep "^TheOne" | grep " TheOther "' %self.smack_path)
mode = list(filter(bool, output.split(" ")))[2].strip()
self.assertEqual( mode, modeB, "Mode B was not set correctly; mode: %s" %mode)
self.target.run('echo -n "%s" > %s/load' %(clean, self.smack_path))
class SmackOnlycap(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_smack_onlycap(self):
'''Test if smack onlycap label can be set
test needs to change the running label of the current process,
so whole test takes places on image
'''
status, output = self.target.run("sh /usr/sbin/test_smack_onlycap.sh")
self.assertEqual(status, 0, output)
class SmackNetlabel(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_smack_netlabel(self):
test_label="191.191.191.191 TheOne"
expected_label="191.191.191.191/32 TheOne"
status, output = self.target.run( "echo -n '%s' > %s/netlabel" %(test_label, self.smack_path))
self.assertEqual( status, 0, "Netlabel /32 could not be set. Output: %s" %output)
status, output = self.target.run("cat %s/netlabel" %self.smack_path)
self.assertIn( expected_label, output, "Did not find expected label in output: %s" %output)
test_label="253.253.253.0/24 TheOther"
status, output = self.target.run( "echo -n '%s' > %s/netlabel" %(test_label, self.smack_path))
self.assertEqual( status, 0, "Netlabel /24 could not be set. Output: %s" %output)
status, output = self.target.run("cat %s/netlabel" %self.smack_path)
self.assertIn(
test_label, output,
"Did not find expected label in output: %s" %output)
class SmackCipso(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_smack_cipso(self):
'''Test if smack cipso rules can be set'''
# 12345678901234567890123456789012345678901234567890123456
ruleA="TheOneA 2 0 "
ruleB="TheOneB 3 1 55 "
ruleC="TheOneC 4 2 17 33 "
status, output = self.target.run(
"echo -n '%s' > %s/cipso" %(ruleA, self.smack_path))
self.assertEqual(status, 0,
"Could not set cipso label A. Ouput: %s" %output)
status, output = self.target.run(
"cat %s/cipso | grep '^TheOneA'" %self.smack_path)
self.assertEqual(status, 0, "Cipso rule A was not set")
self.assertIn(" 2", output, "Rule A was not set correctly")
status, output = self.target.run(
"echo -n '%s' > %s/cipso" %(ruleB, self.smack_path))
self.assertEqual(status, 0,
"Could not set cipso label B. Ouput: %s" %output)
status, output = self.target.run(
"cat %s/cipso | grep '^TheOneB'" %self.smack_path)
self.assertEqual(status, 0, "Cipso rule B was not set")
self.assertIn("/55", output, "Rule B was not set correctly")
status, output = self.target.run(
"echo -n '%s' > %s/cipso" %(ruleC, self.smack_path))
self.assertEqual(
status, 0,
"Could not set cipso label C. Ouput: %s" %output)
status, output = self.target.run(
"cat %s/cipso | grep '^TheOneC'" %self.smack_path)
self.assertEqual(status, 0, "Cipso rule C was not set")
self.assertIn("/17,33", output, "Rule C was not set correctly")
class SmackDirect(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_smack_direct(self):
status, initial_direct = self.target.run(
"cat %s/direct" %self.smack_path)
test_direct="17"
status, output = self.target.run(
"echo '%s' > %s/direct" %(test_direct, self.smack_path))
self.assertEqual(status, 0 ,
"Could not set smack direct. Output: %s" %output)
status, new_direct = self.target.run("cat %s/direct" %self.smack_path)
# initial label before checking
status, output = self.target.run(
"echo '%s' > %s/direct" %(initial_direct, self.smack_path))
self.assertEqual(
test_direct, new_direct.strip(),
"Smack direct label does not match.")
class SmackAmbient(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_smack_ambient(self):
test_ambient = "test_ambient"
status, initial_ambient = self.target.run("cat %s/ambient" %self.smack_path)
status, output = self.target.run(
"echo '%s' > %s/ambient" %(test_ambient, self.smack_path))
self.assertEqual(status, 0,
"Could not set smack ambient. Output: %s" %output)
status, output = self.target.run("cat %s/ambient" %self.smack_path)
# Filter '\x00', which is sometimes added to the ambient label
new_ambient = ''.join(filter(lambda x: x in string.printable, output))
initial_ambient = ''.join(filter(lambda x: x in string.printable, initial_ambient))
status, output = self.target.run(
"echo '%s' > %s/ambient" %(initial_ambient, self.smack_path))
self.assertEqual(
test_ambient, new_ambient.strip(),
"Ambient label does not match")
class SmackloadBinary(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_smackload(self):
'''Test if smackload command works'''
rule="testobject testsubject rwx"
status, output = self.target.run("echo -n '%s' > /tmp/rules" %rule)
status, output = self.target.run("smackload /tmp/rules")
self.assertEqual( status, 0, "Smackload failed to load rule. Output: %s" %output)
status, output = self.target.run( "cat %s/load | grep '%s'" %(self.smack_path, rule))
self.assertEqual(status, 0, "Smackload rule was loaded correctly")
class SmackcipsoBinary(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_smackcipso(self):
'''Test if smackcipso command works'''
# 12345678901234567890123456789012345678901234567890123456
rule="cipsolabel 2 2 "
status, output = self.target.run("echo '%s' | smackcipso" %rule)
self.assertEqual( status, 0, "Smackcipso failed to load rule. Output: %s" %output)
status, output = self.target.run(
"cat %s/cipso | grep 'cipsolabel'" %self.smack_path)
self.assertEqual(status, 0, "smackcipso rule was loaded correctly")
self.assertIn( "2/2", output, "Rule was not set correctly. Got: %s" %output)
class SmackEnforceFileAccess(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_smack_enforce_file_access(self):
'''Test if smack file access is enforced (rwx)
test needs to change the running label of the current process,
so whole test takes places on image
'''
status, output = self.target.run("sh /usr/sbin/smack_test_file_access.sh")
self.assertEqual(status, 0, output)
class SmackEnforceMmap(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_smack_mmap_enforced(self):
'''Test if smack mmap access is enforced'''
raise unittest.SkipTest("Depends on mmap_test, which was removed from the layer while investigating its license.")
# 12345678901234567890123456789012345678901234567890123456
delr1="mmap_label mmap_test_label1 -----"
delr2="mmap_label mmap_test_label2 -----"
delr3="mmap_file_label mmap_test_label1 -----"
delr4="mmap_file_label mmap_test_label2 -----"
RuleA="mmap_label mmap_test_label1 rw---"
RuleB="mmap_label mmap_test_label2 r--at"
RuleC="mmap_file_label mmap_test_label1 rw---"
RuleD="mmap_file_label mmap_test_label2 rwxat"
mmap_label="mmap_label"
file_label="mmap_file_label"
test_file = "/usr/sbin/smack_test_mmap"
mmap_exe = "/tmp/mmap_test"
status, echo = self.target.run("which echo")
status, output = self.target.run(
"notroot.py %d %s %s 'test' > %s" \
%(self.uid, self.current_label, echo, test_file))
status, output = self.target.run("ls %s" %test_file)
self.assertEqual(status, 0, "Could not create mmap test file")
self.target.run("chsmack -m %s %s" %(file_label, test_file))
self.target.run("chsmack -e %s %s" %(mmap_label, mmap_exe))
# test with no rules with mmap label or exec label as subject
# access should be granted
self.target.run('echo -n "%s" > %s/load' %(delr1, self.smack_path))
self.target.run('echo -n "%s" > %s/load' %(delr2, self.smack_path))
self.target.run('echo -n "%s" > %s/load' %(delr3, self.smack_path))
self.target.run('echo -n "%s" > %s/load' %(delr4, self.smack_path))
status, output = self.target.run("%s %s 0 2" % (mmap_exe, test_file))
self.assertEqual(
status, 0,
"Should have mmap access without rules. Output: %s" %output)
# add rules that do not match access required
self.target.run('echo -n "%s" > %s/load' %(RuleA, self.smack_path))
self.target.run('echo -n "%s" > %s/load' %(RuleB, self.smack_path))
status, output = self.target.run("%s %s 0 2" % (mmap_exe, test_file))
self.assertNotEqual(
status, 0,
"Should not have mmap access with unmatching rules. " +
"Output: %s" %output)
self.assertIn(
"Permission denied", output,
"Mmap access should be denied with unmatching rules")
# add rule to match only partially (one way)
self.target.run('echo -n "%s" > %s/load' %(RuleC, self.smack_path))
status, output = self.target.run("%s %s 0 2" %(mmap_exe, test_file))
self.assertNotEqual(
status, 0,
"Should not have mmap access with partial matching rules. " +
"Output: %s" %output)
self.assertIn(
"Permission denied", output,
"Mmap access should be denied with partial matching rules")
# add rule to match fully
self.target.run('echo -n "%s" > %s/load' %(RuleD, self.smack_path))
status, output = self.target.run("%s %s 0 2" %(mmap_exe, test_file))
self.assertEqual(
status, 0,
"Should have mmap access with full matching rules." +
"Output: %s" %output)
class SmackEnforceTransmutable(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_smack_transmute_dir(self):
'''Test if smack transmute attribute works
test needs to change the running label of the current process,
so whole test takes places on image
'''
test_dir = "/tmp/smack_transmute_dir"
label="transmute_label"
status, initial_label = self.target.run("cat /proc/self/attr/current")
self.target.run("mkdir -p %s" % test_dir)
self.target.run("chsmack -a %s %s" % (label, test_dir))
self.target.run("chsmack -t %s" % test_dir)
self.target.run("echo -n '%s %s rwxat' | smackload" %(initial_label, label) )
self.target.run("touch %s/test" % test_dir)
status, output = self.target.run("chsmack %s/test" % test_dir)
self.assertIn( 'access="%s"' %label, output,
"Did not get expected label. Output: %s" % output)
class SmackTcpSockets(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_smack_tcp_sockets(self):
'''Test if smack is enforced on tcp sockets
whole test takes places on image, depends on tcp_server/tcp_client'''
status, output = self.target.run("sh /usr/sbin/test_smack_tcp_sockets.sh")
self.assertEqual(status, 0, output)
class SmackUdpSockets(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_smack_udp_sockets(self):
'''Test if smack is enforced on udp sockets
whole test takes places on image, depends on udp_server/udp_client'''
status, output = self.target.run("sh /usr/sbin/test_smack_udp_sockets.sh")
self.assertEqual(status, 0, output)
class SmackFileLabels(SmackBasicTest):
@OETestDepends(['smack.SmackBasicTest.test_smack_basic'])
def test_smack_labels(self):
'''Check for correct Smack labels.'''
expected = '''
/tmp/ access="*"
/etc/ access="System::Shared" transmute="TRUE"
/etc/passwd access="System::Shared"
/etc/terminfo access="System::Shared" transmute="TRUE"
/etc/skel/ access="System::Shared" transmute="TRUE"
/etc/skel/.profile access="System::Shared"
/var/log/ access="System::Log" transmute="TRUE"
/var/tmp/ access="*"
'''
files = ' '.join([x.split()[0] for x in expected.split('\n') if x])
files_wildcard = ' '.join([x + '/*' for x in files.split()])
# Auxiliary information.
status, output = self.target.run(
'set -x; mount; ls -l -d %s; find %s | xargs ls -d -l; find %s | xargs chsmack' % (
' '.join([x.rstrip('/') for x in files.split()]), files, files
)
)
msg = "File status:\n" + output
status, output = self.target.run('chsmack %s' % files)
self.assertEqual(
status, 0, msg="status and output: %s and %s\n%s" % (status,output, msg))
self.longMessage = True
self.maxDiff = None
self.assertEqual(output.strip().split('\n'), expected.strip().split('\n'), msg=msg)

View File

@@ -0,0 +1,7 @@
#include <stdio.h>
int main(int argc, char **argv)
{
printf("Original test program removed while investigating its license.\n");
return 1;
}

View File

@@ -0,0 +1,16 @@
SUMMARY = "Mmap binary used to test smack mmap attribute"
DESCRIPTION = "Mmap binary used to test smack mmap attribute"
LICENSE = "MIT"
LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/MIT;md5=0835ade698e0bcf8506ecda2f7b4f302"
SRC_URI = "file://mmap.c"
S = "${WORKDIR}"
do_compile() {
${CC} mmap.c ${LDFLAGS} -o mmap_test
}
do_install() {
install -d ${D}${bindir}
install -m 0755 mmap_test ${D}${bindir}
}

View File

@@ -0,0 +1,33 @@
#!/usr/bin/env python
#
# Script used for running executables with custom labels, as well as custom uid/gid
# Process label is changed by writing to /proc/self/attr/curent
#
# Script expects user id and group id to exist, and be the same.
#
# From adduser manual:
# """By default, each user in Debian GNU/Linux is given a corresponding group
# with the same name. """
#
# Usage: root@desk:~# python notroot.py <uid> <label> <full_path_to_executable> [arguments ..]
# eg: python notroot.py 1000 User::Label /bin/ping -c 3 192.168.1.1
#
# Author: Alexandru Cornea <alexandru.cornea@intel.com>
import os
import sys
try:
uid = int(sys.argv[1])
sys.argv.pop(1)
label = sys.argv[1]
sys.argv.pop(1)
open("/proc/self/attr/current", "w").write(label)
path=sys.argv[1]
sys.argv.pop(0)
os.setgid(uid)
os.setuid(uid)
os.execv(path,sys.argv)
except Exception,e:
print e.message
sys.exit(1)

View File

@@ -0,0 +1,54 @@
#!/bin/sh
SMACK_PATH=`grep smack /proc/mounts | awk '{print $2}' `
RC=0
TMP="/tmp"
test_file=$TMP/smack_test_access_file
CAT=`which cat`
ECHO=`which echo`
uid=1000
initial_label=`cat /proc/self/attr/current`
python $TMP/notroot.py $uid "TheOther" $ECHO 'TEST' > $test_file
chsmack -a "TheOther" $test_file
# 12345678901234567890123456789012345678901234567890123456
delrule="TheOne TheOther -----"
rule_ro="TheOne TheOther r----"
# Remove pre-existent rules for "TheOne TheOther <access>"
echo -n "$delrule" > $SMACK_PATH/load
python $TMP/notroot.py $uid "TheOne" $CAT $test_file 2>&1 1>/dev/null | grep -q "Permission denied" || RC=$?
if [ $RC -ne 0 ]; then
echo "Process with different label than the test file and no read access on it can read it"
exit $RC
fi
# adding read access
echo -n "$rule_ro" > $SMACK_PATH/load
python $TMP/notroot.py $uid "TheOne" $CAT $test_file | grep -q "TEST" || RC=$?
if [ $RC -ne 0 ]; then
echo "Process with different label than the test file but with read access on it cannot read it"
exit $RC
fi
# Remove pre-existent rules for "TheOne TheOther <access>"
echo -n "$delrule" > $SMACK_PATH/load
# changing label of test file to *
# according to SMACK documentation, read access on a * object is always permitted
chsmack -a '*' $test_file
python $TMP/notroot.py $uid "TheOne" $CAT $test_file | grep -q "TEST" || RC=$?
if [ $RC -ne 0 ]; then
echo "Process cannot read file with * label"
exit $RC
fi
# changing subject label to *
# according to SMACK documentation, every access requested by a star labeled subject is rejected
TOUCH=`which touch`
python $TMP/notroot.py $uid '*' $TOUCH $TMP/test_file_2
ls -la $TMP/test_file_2 2>&1 | grep -q 'No such file or directory' || RC=$?
if [ $RC -ne 0 ];then
echo "Process with label '*' should not have any access"
exit $RC
fi
exit 0

View File

@@ -0,0 +1,18 @@
#!/bin/sh
initial_label=`cat /proc/self/attr/current 2>/dev/null`
modified_label="test_label"
echo "$modified_label" >/proc/self/attr/current 2>/dev/null
new_label=`cat /proc/self/attr/current 2>/dev/null`
if [ "$new_label" != "$modified_label" ]; then
# restore proper label
echo $initial_label >/proc/self/attr/current
echo "Privileged process could not change its label"
exit 1
fi
echo "$initial_label" >/proc/self/attr/current 2>/dev/null
exit 0

View File

@@ -0,0 +1,27 @@
#!/bin/sh
RC=0
SMACK_PATH=`grep smack /proc/mounts | awk '{print $2}'`
test_label="test_label"
onlycap_initial=`cat $SMACK_PATH/onlycap`
smack_initial=`cat /proc/self/attr/current`
# need to set out label to be the same as onlycap, otherwise we lose our smack privileges
# even if we are root
echo "$test_label" > /proc/self/attr/current
echo "$test_label" > $SMACK_PATH/onlycap || RC=$?
if [ $RC -ne 0 ]; then
echo "Onlycap label could not be set"
return $RC
fi
if [ `cat $SMACK_PATH/onlycap` != "$test_label" ]; then
echo "Onlycap label was not set correctly."
return 1
fi
# resetting original onlycap label
echo "$onlycap_initial" > $SMACK_PATH/onlycap 2>/dev/null
# resetting our initial's process label
echo "$smack_initial" > /proc/self/attr/current

View File

@@ -0,0 +1,21 @@
SUMMARY = "Smack test scripts"
DESCRIPTION = "Smack scripts"
LICENSE = "MIT"
LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/MIT;md5=0835ade698e0bcf8506ecda2f7b4f302"
SRC_URI = " \
file://notroot.py \
file://smack_test_file_access.sh \
file://test_privileged_change_self_label.sh \
file://test_smack_onlycap.sh \
"
S = "${WORKDIR}"
do_install() {
install -d ${D}${sbindir}
install -m 0755 notroot.py ${D}${sbindir}
install -m 0755 *.sh ${D}${sbindir}
}
RDEPENDS_${PN} = "smack python mmap-smack-test tcp-smack-test udp-smack-test"

View File

@@ -0,0 +1,111 @@
// (C) Copyright 2015 Intel Corporation
//
// Permission is hereby granted, free of charge, to any person obtaining a copy
// of this software and associated documentation files (the "Software"), to deal
// in the Software without restriction, including without limitation the rights
// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
// copies of the Software, and to permit persons to whom the Software is
// furnished to do so, subject to the following conditions:
//
// The above copyright notice and this permission notice shall be included in
// all copies or substantial portions of the Software.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
// THE SOFTWARE.
#include <stdio.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <errno.h>
#include <netinet/in.h>
#include <unistd.h>
#include <netdb.h>
#include <string.h>
#include <sys/xattr.h>
int main(int argc, char* argv[])
{
int sock;
char message[255] = "hello";
struct sockaddr_in server_addr;
char* label_in;
char* label_out;
char* attr_out = "security.SMACK64IPOUT";
char* attr_in = "security.SMACK64IPIN";
char out[256];
int port;
struct timeval timeout;
timeout.tv_sec = 15;
timeout.tv_usec = 0;
struct hostent* host = gethostbyname("localhost");
if (argc != 4)
{
perror("Client: Arguments missing, please provide socket labels");
return 2;
}
port = atoi(argv[1]);
label_in = argv[2];
label_out = argv[3];
if((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0)
{
perror("Client: Socket failure");
return 2;
}
if(fsetxattr(sock, attr_out, label_out, strlen(label_out), 0) < 0)
{
perror("Client: Unable to set attribute SMACK64IPOUT");
return 2;
}
if(fsetxattr(sock, attr_in, label_in, strlen(label_in), 0) < 0)
{
perror("Client: Unable to set attribute SMACK64IPIN");
return 2;
}
server_addr.sin_family = AF_INET;
server_addr.sin_port = htons(port);
bcopy((char*) host->h_addr, (char*) &server_addr.sin_addr.s_addr,host->h_length);
bzero(&(server_addr.sin_zero),8);
if(setsockopt(sock, SOL_SOCKET, SO_SNDTIMEO, &timeout, sizeof(timeout)) < 0)
{
perror("Client: Set timeout failed\n");
return 2;
}
if (connect(sock, (struct sockaddr *)&server_addr,sizeof(struct sockaddr)) == -1)
{
perror("Client: Connection failure");
close(sock);
return 1;
}
if(write(sock, message, strlen(message)) < 0)
{
perror("Client: Error sending data\n");
close(sock);
return 1;
}
close(sock);
return 0;
}

View File

@@ -0,0 +1,118 @@
// (C) Copyright 2015 Intel Corporation
//
// Permission is hereby granted, free of charge, to any person obtaining a copy
// of this software and associated documentation files (the "Software"), to deal
// in the Software without restriction, including without limitation the rights
// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
// copies of the Software, and to permit persons to whom the Software is
// furnished to do so, subject to the following conditions:
//
// The above copyright notice and this permission notice shall be included in
// all copies or substantial portions of the Software.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
// THE SOFTWARE.
#include <stdio.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <errno.h>
#include <netinet/in.h>
#include <unistd.h>
#include <string.h>
int main(int argc, char* argv[])
{
int sock;
int clientsock;
char message[255];
socklen_t client_length;
struct sockaddr_in server_addr, client_addr;
char* label_in;
char* attr_in = "security.SMACK64IPIN";
int port;
struct timeval timeout;
timeout.tv_sec = 15;
timeout.tv_usec = 0;
if (argc != 3)
{
perror("Server: Argument missing please provide port and label for SMACK64IPIN");
return 2;
}
port = atoi(argv[1]);
label_in = argv[2];
bzero(message,255);
if((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0)
{
perror("Server: Socket failure");
return 2;
}
if(fsetxattr(sock, attr_in, label_in, strlen(label_in),0) < 0)
{
perror("Server: Unable to set attribute ipin 2");
return 2;
}
server_addr.sin_family = AF_INET;
server_addr.sin_port = htons(port);
server_addr.sin_addr.s_addr = INADDR_ANY;
bzero(&(server_addr.sin_zero),8);
if(setsockopt(sock, SOL_SOCKET, SO_RCVTIMEO, &timeout, sizeof(timeout)) < 0)
{
perror("Server: Set timeout failed\n");
return 2;
}
if(bind(sock, (struct sockaddr*) &server_addr, sizeof(server_addr)) < 0)
{
perror("Server: Bind failure ");
return 2;
}
listen(sock, 1);
client_length = sizeof(client_addr);
clientsock = accept(sock,(struct sockaddr*) &client_addr, &client_length);
if (clientsock < 0)
{
perror("Server: Connection failed");
close(sock);
return 1;
}
if(fsetxattr(clientsock, "security.SMACK64IPIN", label_in, strlen(label_in),0) < 0)
{
perror(" Server: Unable to set attribute ipin 2");
close(sock);
return 2;
}
if(read(clientsock, message, 254) < 0)
{
perror("Server: Error when reading from socket");
close(clientsock);
close(sock);
return 1;
}
close(clientsock);
close(sock);
return 0;
}

View File

@@ -0,0 +1,108 @@
#!/bin/sh
RC=0
test_file=/tmp/smack_socket_tcp
SMACK_PATH=`grep smack /proc/mounts | awk '{print $2}' `
# make sure no access is granted
# 12345678901234567890123456789012345678901234567890123456
echo -n "label1 label2 -----" > $SMACK_PATH/load
tcp_server=`which tcp_server`
if [ -z $tcp_server ]; then
if [ -f "/tmp/tcp_server" ]; then
tcp_server="/tmp/tcp_server"
else
echo "tcp_server binary not found"
exit 1
fi
fi
tcp_client=`which tcp_client`
if [ -z $tcp_client ]; then
if [ -f "/tmp/tcp_client" ]; then
tcp_client="/tmp/tcp_client"
else
echo "tcp_client binary not found"
exit 1
fi
fi
# checking access for sockets with different labels
$tcp_server 50016 label1 &>/dev/null &
server_pid=$!
sleep 2
$tcp_client 50016 label2 label1 &>/dev/null &
client_pid=$!
wait $server_pid
server_rv=$?
wait $client_pid
client_rv=$?
if [ $server_rv -eq 0 -o $client_rv -eq 0 ]; then
echo "Sockets with different labels should not communicate on tcp"
exit 1
fi
# granting access between different labels
# 12345678901234567890123456789012345678901234567890123456
echo -n "label1 label2 rw---" > $SMACK_PATH/load
# checking access for sockets with different labels, but having a rule granting rw
$tcp_server 50017 label1 2>$test_file &
server_pid=$!
sleep 1
$tcp_client 50017 label2 label1 2>$test_file &
client_pid=$!
wait $server_pid
server_rv=$?
wait $client_pid
client_rv=$?
if [ $server_rv -ne 0 -o $client_rv -ne 0 ]; then
echo "Sockets with different labels, but having rw access, should communicate on tcp"
exit 1
fi
# checking access for sockets with the same label
$tcp_server 50018 label1 2>$test_file &
server_pid=$!
sleep 1
$tcp_client 50018 label1 label1 2>$test_file &
client_pid=$!
wait $server_pid
server_rv=$?
wait $client_pid
client_rv=$?
if [ $server_rv -ne 0 -o $client_rv -ne 0 ]; then
echo "Sockets with same labels should communicate on tcp"
exit 1
fi
# checking access on socket labeled star (*)
# should always be permitted
$tcp_server 50019 \* 2>$test_file &
server_pid=$!
sleep 1
$tcp_client 50019 label1 label1 2>$test_file &
client_pid=$!
wait $server_pid
server_rv=$?
wait $client_pid
client_rv=$?
if [ $server_rv -ne 0 -o $client_rv -ne 0 ]; then
echo "Should have access on tcp socket labeled star (*)"
exit 1
fi
# checking access from socket labeled star (*)
# all access from subject star should be denied
$tcp_server 50020 label1 2>$test_file &
server_pid=$!
sleep 1
$tcp_client 50020 label1 \* 2>$test_file &
client_pid=$!
wait $server_pid
server_rv=$?
wait $client_pid
client_rv=$?
if [ $server_rv -eq 0 -o $client_rv -eq 0 ]; then
echo "Socket labeled star should not have access to any tcp socket"
exit 1
fi

View File

@@ -0,0 +1,24 @@
SUMMARY = "Binary used to test smack tcp sockets"
DESCRIPTION = "Server and client binaries used to test smack attributes on TCP sockets"
LICENSE = "MIT"
LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/MIT;md5=0835ade698e0bcf8506ecda2f7b4f302"
SRC_URI = "file://tcp_server.c \
file://tcp_client.c \
file://test_smack_tcp_sockets.sh \
"
S = "${WORKDIR}"
do_compile() {
${CC} tcp_client.c ${LDFLAGS} -o tcp_client
${CC} tcp_server.c ${LDFLAGS} -o tcp_server
}
do_install() {
install -d ${D}${bindir}
install -d ${D}${sbindir}
install -m 0755 tcp_server ${D}${bindir}
install -m 0755 tcp_client ${D}${bindir}
install -m 0755 test_smack_tcp_sockets.sh ${D}${sbindir}
}

View File

@@ -0,0 +1,107 @@
#!/bin/sh
RC=0
test_file="/tmp/smack_socket_udp"
SMACK_PATH=`grep smack /proc/mounts | awk '{print $2}' `
udp_server=`which udp_server`
if [ -z $udp_server ]; then
if [ -f "/tmp/udp_server" ]; then
udp_server="/tmp/udp_server"
else
echo "udp_server binary not found"
exit 1
fi
fi
udp_client=`which udp_client`
if [ -z $udp_client ]; then
if [ -f "/tmp/udp_client" ]; then
udp_client="/tmp/udp_client"
else
echo "udp_client binary not found"
exit 1
fi
fi
# make sure no access is granted
# 12345678901234567890123456789012345678901234567890123456
echo -n "label1 label2 -----" > $SMACK_PATH/load
# checking access for sockets with different labels
$udp_server 50021 label2 2>$test_file &
server_pid=$!
sleep 1
$udp_client 50021 label1 2>$test_file &
client_pid=$!
wait $server_pid
server_rv=$?
wait $client_pid
client_rv=$?
if [ $server_rv -eq 0 ]; then
echo "Sockets with different labels should not communicate on udp"
exit 1
fi
# granting access between different labels
# 12345678901234567890123456789012345678901234567890123456
echo -n "label1 label2 rw---" > $SMACK_PATH/load
# checking access for sockets with different labels, but having a rule granting rw
$udp_server 50022 label2 2>$test_file &
server_pid=$!
sleep 1
$udp_client 50022 label1 2>$test_file &
client_pid=$!
wait $server_pid
server_rv=$?
wait $client_pid
client_rv=$?
if [ $server_rv -ne 0 -o $client_rv -ne 0 ]; then
echo "Sockets with different labels, but having rw access, should communicate on udp"
exit 1
fi
# checking access for sockets with the same label
$udp_server 50023 label1 &
server_pid=$!
sleep 1
$udp_client 50023 label1 2>$test_file &
client_pid=$!
wait $server_pid
server_rv=$?
wait $client_pid
client_rv=$?
if [ $server_rv -ne 0 -o $client_rv -ne 0 ]; then
echo "Sockets with same labels should communicate on udp"
exit 1
fi
# checking access on socket labeled star (*)
# should always be permitted
$udp_server 50024 \* 2>$test_file &
server_pid=$!
sleep 1
$udp_client 50024 label1 2>$test_file &
client_pid=$!
wait $server_pid
server_rv=$?
wait $client_pid
client_rv=$?
if [ $server_rv -ne 0 -o $client_rv -ne 0 ]; then
echo "Should have access on udp socket labeled star (*)"
exit 1
fi
# checking access from socket labeled star (*)
# all access from subject star should be denied
$udp_server 50025 label1 2>$test_file &
server_pid=$!
sleep 1
$udp_client 50025 \* 2>$test_file &
client_pid=$!
wait $server_pid
server_rv=$?
wait $client_pid
client_rv=$?
if [ $server_rv -eq 0 ]; then
echo "Socket labeled star should not have access to any udp socket"
exit 1
fi

View File

@@ -0,0 +1,75 @@
// (C) Copyright 2015 Intel Corporation
//
// Permission is hereby granted, free of charge, to any person obtaining a copy
// of this software and associated documentation files (the "Software"), to deal
// in the Software without restriction, including without limitation the rights
// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
// copies of the Software, and to permit persons to whom the Software is
// furnished to do so, subject to the following conditions:
//
// The above copyright notice and this permission notice shall be included in
// all copies or substantial portions of the Software.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
// THE SOFTWARE.
#include <sys/socket.h>
#include <stdio.h>
#include <netinet/in.h>
#include <netdb.h>
#include <string.h>
int main(int argc, char* argv[])
{
char* message = "hello";
int sock, ret;
struct sockaddr_in server_addr;
struct hostent* host = gethostbyname("localhost");
char* label;
char* attr = "security.SMACK64IPOUT";
int port;
if (argc != 3)
{
perror("Client: Argument missing, please provide port and label for SMACK64IPOUT");
return 2;
}
port = atoi(argv[1]);
label = argv[2];
sock = socket(AF_INET, SOCK_DGRAM,0);
if(sock < 0)
{
perror("Client: Socket failure");
return 2;
}
if(fsetxattr(sock, attr, label, strlen(label),0) < 0)
{
perror("Client: Unable to set attribute ");
return 2;
}
server_addr.sin_family = AF_INET;
server_addr.sin_port = htons(port);
bcopy((char*) host->h_addr, (char*) &server_addr.sin_addr.s_addr,host->h_length);
bzero(&(server_addr.sin_zero),8);
ret = sendto(sock, message, strlen(message),0,(const struct sockaddr*)&server_addr,
sizeof(struct sockaddr_in));
close(sock);
if(ret < 0)
{
perror("Client: Error sending message\n");
return 1;
}
return 0;
}

View File

@@ -0,0 +1,93 @@
// (C) Copyright 2015 Intel Corporation
//
// Permission is hereby granted, free of charge, to any person obtaining a copy
// of this software and associated documentation files (the "Software"), to deal
// in the Software without restriction, including without limitation the rights
// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
// copies of the Software, and to permit persons to whom the Software is
// furnished to do so, subject to the following conditions:
//
// The above copyright notice and this permission notice shall be included in
// all copies or substantial portions of the Software.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
// THE SOFTWARE.
#include <sys/socket.h>
#include <stdio.h>
#include <netinet/in.h>
#include <netdb.h>
#include <string.h>
int main(int argc, char* argv[])
{
int sock,ret;
struct sockaddr_in server_addr, client_addr;
socklen_t len;
char message[5];
char* label;
char* attr = "security.SMACK64IPIN";
int port;
if(argc != 3)
{
perror("Server: Argument missing, please provide port and label for SMACK64IPIN");
return 2;
}
port = atoi(argv[1]);
label = argv[2];
struct timeval timeout;
timeout.tv_sec = 15;
timeout.tv_usec = 0;
sock = socket(AF_INET,SOCK_DGRAM,0);
if(sock < 0)
{
perror("Server: Socket error");
return 2;
}
if(fsetxattr(sock, attr, label, strlen(label), 0) < 0)
{
perror("Server: Unable to set attribute ");
return 2;
}
server_addr.sin_family = AF_INET;
server_addr.sin_port = htons(port);
server_addr.sin_addr.s_addr = INADDR_ANY;
bzero(&(server_addr.sin_zero),8);
if(setsockopt(sock, SOL_SOCKET, SO_RCVTIMEO, &timeout, sizeof(timeout)) < 0)
{
perror("Server: Set timeout failed\n");
return 2;
}
if(bind(sock, (struct sockaddr*) &server_addr, sizeof(server_addr)) < 0)
{
perror("Server: Bind failure");
return 2;
}
len = sizeof(client_addr);
ret = recvfrom(sock, message, sizeof(message), 0, (struct sockaddr*)&client_addr,
&len);
close(sock);
if(ret < 0)
{
perror("Server: Error receiving");
return 1;
}
return 0;
}

View File

@@ -0,0 +1,23 @@
SUMMARY = "Binary used to test smack udp sockets"
DESCRIPTION = "Server and client binaries used to test smack attributes on UDP sockets"
LICENSE = "MIT"
LIC_FILES_CHKSUM = "file://${COMMON_LICENSE_DIR}/MIT;md5=0835ade698e0bcf8506ecda2f7b4f302"
SRC_URI = "file://udp_server.c \
file://udp_client.c \
file://test_smack_udp_sockets.sh \
"
S = "${WORKDIR}"
do_compile() {
${CC} udp_client.c ${LDFLAGS} -o udp_client
${CC} udp_server.c ${LDFLAGS} -o udp_server
}
do_install() {
install -d ${D}${bindir}
install -d ${D}${sbindir}
install -m 0755 udp_server ${D}${bindir}
install -m 0755 udp_client ${D}${bindir}
install -m 0755 test_smack_udp_sockets.sh ${D}${sbindir}
}