mirror of
https://github.com/RGBCube/serenity
synced 2025-07-26 02:07:35 +00:00
Tests: Convert unveil-test-failures.cpp to be LibTest based.
This commit is contained in:
parent
a9df58d7b2
commit
122869f086
3 changed files with 62 additions and 80 deletions
|
@ -1,4 +1,6 @@
|
||||||
file(GLOB CMD_SOURCES CONFIGURE_DEPENDS "*.cpp")
|
file(GLOB CMD_SOURCES CONFIGURE_DEPENDS "*.cpp")
|
||||||
|
file(GLOB LIBTEST_BASED_SOURCES "Test*.cpp")
|
||||||
|
list(REMOVE_ITEM CMD_SOURCES ${LIBTEST_BASED_SOURCES})
|
||||||
|
|
||||||
# FIXME: These tests do not use LibTest
|
# FIXME: These tests do not use LibTest
|
||||||
foreach(CMD_SRC ${CMD_SOURCES})
|
foreach(CMD_SRC ${CMD_SOURCES})
|
||||||
|
@ -8,6 +10,11 @@ foreach(CMD_SRC ${CMD_SOURCES})
|
||||||
install(TARGETS ${CMD_NAME} RUNTIME DESTINATION usr/Tests/Kernel)
|
install(TARGETS ${CMD_NAME} RUNTIME DESTINATION usr/Tests/Kernel)
|
||||||
endforeach()
|
endforeach()
|
||||||
|
|
||||||
|
|
||||||
|
foreach(TEST_SRC ${LIBTEST_BASED_SOURCES})
|
||||||
|
serenity_test(${TEST_SRC} Kernel)
|
||||||
|
endforeach()
|
||||||
|
|
||||||
target_link_libraries(elf-execve-mmap-race LibPthread)
|
target_link_libraries(elf-execve-mmap-race LibPthread)
|
||||||
target_link_libraries(kill-pidtid-confusion LibPthread)
|
target_link_libraries(kill-pidtid-confusion LibPthread)
|
||||||
target_link_libraries(nanosleep-race-outbuf-munmap LibPthread)
|
target_link_libraries(nanosleep-race-outbuf-munmap LibPthread)
|
||||||
|
|
55
Userland/Tests/Kernel/TestKernelUnveil.cpp
Normal file
55
Userland/Tests/Kernel/TestKernelUnveil.cpp
Normal file
|
@ -0,0 +1,55 @@
|
||||||
|
/*
|
||||||
|
* Copyright (c) 2020, the SerenityOS developers.
|
||||||
|
*
|
||||||
|
* SPDX-License-Identifier: BSD-2-Clause
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include <LibTest/TestCase.h>
|
||||||
|
#include <unistd.h>
|
||||||
|
|
||||||
|
TEST_CASE(test_failures)
|
||||||
|
{
|
||||||
|
auto res = unveil("/etc", "r");
|
||||||
|
if (res < 0)
|
||||||
|
FAIL("unveil read only failed");
|
||||||
|
|
||||||
|
res = unveil("/etc", "w");
|
||||||
|
if (res >= 0)
|
||||||
|
FAIL("unveil write permitted after unveil read only");
|
||||||
|
|
||||||
|
res = unveil("/etc", "x");
|
||||||
|
if (res >= 0)
|
||||||
|
FAIL("unveil execute permitted after unveil read only");
|
||||||
|
|
||||||
|
res = unveil("/etc", "c");
|
||||||
|
if (res >= 0)
|
||||||
|
FAIL("unveil create permitted after unveil read only");
|
||||||
|
|
||||||
|
res = unveil("/tmp/doesnotexist", "c");
|
||||||
|
if (res < 0)
|
||||||
|
FAIL("unveil create on non-existent path failed");
|
||||||
|
|
||||||
|
res = unveil("/home", "b");
|
||||||
|
if (res < 0)
|
||||||
|
FAIL("unveil browse failed");
|
||||||
|
|
||||||
|
res = unveil("/home", "w");
|
||||||
|
if (res >= 0)
|
||||||
|
FAIL("unveil write permitted after unveil browse only");
|
||||||
|
|
||||||
|
res = unveil("/home", "x");
|
||||||
|
if (res >= 0)
|
||||||
|
FAIL("unveil execute permitted after unveil browse only");
|
||||||
|
|
||||||
|
res = unveil("/home", "c");
|
||||||
|
if (res >= 0)
|
||||||
|
FAIL("unveil create permitted after unveil browse only");
|
||||||
|
|
||||||
|
res = unveil(nullptr, nullptr);
|
||||||
|
if (res < 0)
|
||||||
|
FAIL("unveil state lock failed");
|
||||||
|
|
||||||
|
res = unveil("/bin", "w");
|
||||||
|
if (res >= 0)
|
||||||
|
FAIL("unveil permitted after unveil state locked");
|
||||||
|
}
|
|
@ -1,80 +0,0 @@
|
||||||
/*
|
|
||||||
* Copyright (c) 2020, the SerenityOS developers.
|
|
||||||
*
|
|
||||||
* SPDX-License-Identifier: BSD-2-Clause
|
|
||||||
*/
|
|
||||||
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <unistd.h>
|
|
||||||
|
|
||||||
int main()
|
|
||||||
{
|
|
||||||
int res = unveil("/etc", "r");
|
|
||||||
if (res < 0) {
|
|
||||||
fprintf(stderr, "FAIL, unveil read only failed\n");
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
res = unveil("/etc", "w");
|
|
||||||
if (res >= 0) {
|
|
||||||
fprintf(stderr, "FAIL, unveil write permitted after unveil read only\n");
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
res = unveil("/etc", "x");
|
|
||||||
if (res >= 0) {
|
|
||||||
fprintf(stderr, "FAIL, unveil execute permitted after unveil read only\n");
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
res = unveil("/etc", "c");
|
|
||||||
if (res >= 0) {
|
|
||||||
fprintf(stderr, "FAIL, unveil create permitted after unveil read only\n");
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
res = unveil("/tmp/doesnotexist", "c");
|
|
||||||
if (res < 0) {
|
|
||||||
fprintf(stderr, "FAIL, unveil create on non-existent path failed\n");
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
res = unveil("/home", "b");
|
|
||||||
if (res < 0) {
|
|
||||||
fprintf(stderr, "FAIL, unveil browse failed\n");
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
res = unveil("/home", "w");
|
|
||||||
if (res >= 0) {
|
|
||||||
fprintf(stderr, "FAIL, unveil write permitted after unveil browse only\n");
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
res = unveil("/home", "x");
|
|
||||||
if (res >= 0) {
|
|
||||||
fprintf(stderr, "FAIL, unveil execute permitted after unveil browse only\n");
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
res = unveil("/home", "c");
|
|
||||||
if (res >= 0) {
|
|
||||||
fprintf(stderr, "FAIL, unveil create permitted after unveil browse only\n");
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
res = unveil(nullptr, nullptr);
|
|
||||||
if (res < 0) {
|
|
||||||
fprintf(stderr, "FAIL, unveil state lock failed\n");
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
res = unveil("/bin", "w");
|
|
||||||
if (res >= 0) {
|
|
||||||
fprintf(stderr, "FAIL, unveil permitted after unveil state locked\n");
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
printf("PASS\n");
|
|
||||||
return 0;
|
|
||||||
}
|
|
Loading…
Add table
Add a link
Reference in a new issue