blob: eed3704adf8fea268487856fa6a6c7ca1604323f [file] [log] [blame]
// SPDX-License-Identifier: GPL-2.0-or-later
//
// Copyright (c) 2019 Google, Inc.
#define _GNU_SOURCE
#include "config.h"
#include <errno.h>
#include <lapi/syscalls.h>
#include <sched.h>
#include <sys/mount.h>
#include <stdlib.h>
#include "tst_test.h"
#ifdef HAVE_UNSHARE
#ifdef HAVE_LIBCAP
#include <sys/capability.h>
#endif
#define CHROOT_DIR "chroot"
#define NEW_ROOT "/new_root"
#define PUT_OLD "/new_root/put_old"
#define PUT_OLD_FS "/put_old_fs"
#define PUT_OLD_BAD "/put_old_fs/put_old"
enum {
/*
* Test consists of a series of steps that allow pivot_root to succeed,
* which is run when param is NORMAL. All other values tweak one of the
* steps to induce a failure, and check the errno is as expected.
*/
NORMAL,
/*
* EBUSY
* new_root or put_old are on the current root file system
*/
NEW_ROOT_ON_CURRENT_ROOT,
/*
* EINVAL
* put_old is not underneath new_root
* Note: if put_old and new_root are on the same fs,
* pivot_root fails with EBUSY before testing reachability
*/
PUT_OLD_NOT_UNDERNEATH_NEW_ROOT,
/*
* ENOTDIR
* new_root or put_old is not a directory
*/
PUT_OLD_NOT_DIR,
/*
* EPERM
* The calling process does not have the CAP_SYS_ADMIN capability.
*/
NO_CAP_SYS_ADMIN,
};
static const struct test_case {
int test_case;
int expected_error;
} test_cases[] = {
{NORMAL, 0},
{NEW_ROOT_ON_CURRENT_ROOT, EBUSY},
{PUT_OLD_NOT_UNDERNEATH_NEW_ROOT, EINVAL},
{PUT_OLD_NOT_DIR, ENOTDIR},
{NO_CAP_SYS_ADMIN, EPERM},
};
#ifdef HAVE_LIBCAP
static void drop_cap_sys_admin(void)
{
cap_value_t cap_value[] = { CAP_SYS_ADMIN };
cap_t cap = cap_get_proc();
if (!cap)
tst_brk(TBROK | TERRNO, "cap_get_proc failed");
if (cap_set_flag(cap, CAP_EFFECTIVE, 1, cap_value, CAP_CLEAR))
tst_brk(TBROK | TERRNO, "cap_set_flag failed");
if (cap_set_proc(cap))
tst_brk(TBROK | TERRNO, "cap_set_proc failed");
}
#endif
static void run(unsigned int test_case)
{
/* Work in child process - needed to undo unshare and chroot */
if (SAFE_FORK()) {
tst_reap_children();
return;
}
/* pivot_root requires no shared mounts exist in process namespace */
TEST(unshare(CLONE_NEWNS | CLONE_FS));
if (TST_RET == -1)
tst_brk(TFAIL | TERRNO, "unshare failed");
/*
* Create an initial root dir. pivot_root doesn't work if the initial root
* dir is a initramfs, so use chroot to create a safe environment
*/
SAFE_MOUNT("none", "/", NULL, MS_REC|MS_PRIVATE, NULL);
SAFE_MOUNT("none", CHROOT_DIR, "tmpfs", 0, 0);
SAFE_CHROOT(CHROOT_DIR);
SAFE_MKDIR(NEW_ROOT, 0777);
/*
* pivot_root only works if new_root is a mount point, so mount a tmpfs
* unless testing for that fail mode
*/
if (test_cases[test_case].test_case != NEW_ROOT_ON_CURRENT_ROOT)
SAFE_MOUNT("none", NEW_ROOT, "tmpfs", 0, 0);
/*
* Create put_old under new_root, unless testing for that specific fail
* mode
*/
const char* actual_put_old = NULL;
if (test_cases[test_case].test_case == PUT_OLD_NOT_UNDERNEATH_NEW_ROOT) {
actual_put_old = PUT_OLD_BAD;
SAFE_MKDIR(PUT_OLD_FS, 0777);
SAFE_MOUNT("none", PUT_OLD_FS, "tmpfs", 0, 0);
SAFE_MKDIR(PUT_OLD_BAD, 0777);
} else {
actual_put_old = PUT_OLD;
if (test_cases[test_case].test_case == PUT_OLD_NOT_DIR)
SAFE_CREAT(PUT_OLD, 0777);
else
SAFE_MKDIR(PUT_OLD, 0777);
}
if (test_cases[test_case].test_case == NO_CAP_SYS_ADMIN) {
#ifdef HAVE_LIBCAP
drop_cap_sys_admin();
#else
tst_res(TCONF,
"System doesn't have POSIX capabilities support");
return;
#endif
}
TEST(syscall(__NR_pivot_root, NEW_ROOT, actual_put_old));
if (test_cases[test_case].test_case == NORMAL) {
if (TST_RET)
tst_res(TFAIL | TERRNO, "pivot_root failed");
else
tst_res(TPASS, "pivot_root succeeded");
return;
}
if (TST_RET == 0) {
tst_res(TFAIL, "pivot_root succeeded unexpectedly");
return;
}
if (errno != test_cases[test_case].expected_error) {
tst_res(TFAIL | TERRNO, "pivot_root failed with wrong errno");
return;
}
tst_res(TPASS | TERRNO, "pivot_root failed as expectedly");
}
static void setup(void)
{
SAFE_MKDIR(CHROOT_DIR, 0777);
}
static struct tst_test test = {
.test = run,
.tcnt = ARRAY_SIZE(test_cases),
.needs_tmpdir = 1,
.needs_root = 1,
.forks_child = 1,
.setup = setup,
};
#else
TST_TEST_TCONF("unshare is undefined.");
#endif