Run raw IP socket syscall tests on Fuchsia

+ Do not check for CAP_NET_RAW on Fuchsia

  Fuchsia does not support capabilities the same way Linux does. Instead
  emulate the check for CAP_NET_RAW by checking if a raw IP sockets may
  be created.

PiperOrigin-RevId: 389663218
This commit is contained in:
Ghanan Gowripalan 2021-08-09 10:16:59 -07:00 committed by gVisor bot
parent c07dc3828a
commit 34ec00c5e7
10 changed files with 234 additions and 113 deletions

View File

@ -7,6 +7,9 @@ package(
exports_files(
[
"raw_socket.cc",
"raw_socket_hdrincl.cc",
"raw_socket_icmp.cc",
"socket.cc",
"socket_inet_loopback.cc",
"socket_inet_loopback_isolated.cc",

View File

@ -13,8 +13,6 @@
// limitations under the License.
#include <arpa/inet.h>
#include <linux/capability.h>
#include <linux/filter.h>
#include <netinet/in.h>
#include <netinet/ip.h>
#include <netinet/ip6.h>

View File

@ -12,7 +12,6 @@
// See the License for the specific language governing permissions and
// limitations under the License.
#include <linux/capability.h>
#include <netinet/in.h>
#include <netinet/ip.h>
#include <netinet/ip_icmp.h>

View File

@ -12,7 +12,6 @@
// See the License for the specific language governing permissions and
// limitations under the License.
#include <linux/capability.h>
#include <netinet/in.h>
#include <netinet/ip.h>
#include <netinet/ip_icmp.h>

View File

@ -8,13 +8,21 @@ package(
cc_library(
name = "capability_util",
testonly = 1,
srcs = ["capability_util.cc"],
hdrs = ["capability_util.h"],
srcs = [
"fuchsia_capability_util.cc",
"linux_capability_util.cc",
],
hdrs = [
"capability_util.h",
"fuchsia_capability_util.h",
"linux_capability_util.h",
],
deps = [
":cleanup",
":memory_util",
":posix_error",
":save_util",
":socket_util",
":test_util",
"@com_google_absl//absl/strings",
],

View File

@ -17,112 +17,12 @@
#ifndef GVISOR_TEST_UTIL_CAPABILITY_UTIL_H_
#define GVISOR_TEST_UTIL_CAPABILITY_UTIL_H_
#ifdef __linux__
#include <errno.h>
#include <linux/capability.h>
#include <sys/syscall.h>
#include <unistd.h>
#include "test/util/cleanup.h"
#include "test/util/posix_error.h"
#include "test/util/save_util.h"
#include "test/util/test_util.h"
#ifndef _LINUX_CAPABILITY_VERSION_3
#error Expecting _LINUX_CAPABILITY_VERSION_3 support
#if defined(__Fuchsia__)
#include "test/util/fuchsia_capability_util.h"
#elif defined(__linux__)
#include "test/util/linux_capability_util.h"
#else
#error "Unhandled platform"
#endif
namespace gvisor {
namespace testing {
// HaveCapability returns true if the process has the specified EFFECTIVE
// capability.
inline PosixErrorOr<bool> HaveCapability(int cap) {
if (!cap_valid(cap)) {
return PosixError(EINVAL, "Invalid capability");
}
struct __user_cap_header_struct header = {_LINUX_CAPABILITY_VERSION_3, 0};
struct __user_cap_data_struct caps[_LINUX_CAPABILITY_U32S_3] = {};
RETURN_ERROR_IF_SYSCALL_FAIL(syscall(__NR_capget, &header, &caps));
MaybeSave();
return (caps[CAP_TO_INDEX(cap)].effective & CAP_TO_MASK(cap)) != 0;
}
// SetCapability sets the specified EFFECTIVE capability.
inline PosixError SetCapability(int cap, bool set) {
if (!cap_valid(cap)) {
return PosixError(EINVAL, "Invalid capability");
}
struct __user_cap_header_struct header = {_LINUX_CAPABILITY_VERSION_3, 0};
struct __user_cap_data_struct caps[_LINUX_CAPABILITY_U32S_3] = {};
RETURN_ERROR_IF_SYSCALL_FAIL(syscall(__NR_capget, &header, &caps));
MaybeSave();
if (set) {
caps[CAP_TO_INDEX(cap)].effective |= CAP_TO_MASK(cap);
} else {
caps[CAP_TO_INDEX(cap)].effective &= ~CAP_TO_MASK(cap);
}
header = {_LINUX_CAPABILITY_VERSION_3, 0};
RETURN_ERROR_IF_SYSCALL_FAIL(syscall(__NR_capset, &header, &caps));
MaybeSave();
return NoError();
}
// DropPermittedCapability drops the specified PERMITTED. The EFFECTIVE
// capabilities must be a subset of PERMITTED, so those are dropped as well.
inline PosixError DropPermittedCapability(int cap) {
if (!cap_valid(cap)) {
return PosixError(EINVAL, "Invalid capability");
}
struct __user_cap_header_struct header = {_LINUX_CAPABILITY_VERSION_3, 0};
struct __user_cap_data_struct caps[_LINUX_CAPABILITY_U32S_3] = {};
RETURN_ERROR_IF_SYSCALL_FAIL(syscall(__NR_capget, &header, &caps));
MaybeSave();
caps[CAP_TO_INDEX(cap)].effective &= ~CAP_TO_MASK(cap);
caps[CAP_TO_INDEX(cap)].permitted &= ~CAP_TO_MASK(cap);
header = {_LINUX_CAPABILITY_VERSION_3, 0};
RETURN_ERROR_IF_SYSCALL_FAIL(syscall(__NR_capset, &header, &caps));
MaybeSave();
return NoError();
}
PosixErrorOr<bool> CanCreateUserNamespace();
class AutoCapability {
public:
AutoCapability(int cap, bool set) : cap_(cap), set_(set) {
const bool has = EXPECT_NO_ERRNO_AND_VALUE(HaveCapability(cap));
if (set != has) {
EXPECT_NO_ERRNO(SetCapability(cap_, set_));
applied_ = true;
}
}
~AutoCapability() {
if (applied_) {
EXPECT_NO_ERRNO(SetCapability(cap_, !set_));
}
}
private:
int cap_;
bool set_;
bool applied_ = false;
};
} // namespace testing
} // namespace gvisor
#endif // __linux__
#endif // GVISOR_TEST_UTIL_CAPABILITY_UTIL_H_

View File

@ -0,0 +1,45 @@
// Copyright 2021 The gVisor Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#ifdef __Fuchsia__
#include "test/util/fuchsia_capability_util.h"
#include <netinet/in.h>
#include <sys/socket.h>
#include "test/util/socket_util.h"
namespace gvisor {
namespace testing {
PosixErrorOr<bool> HaveCapability(int cap) {
if (cap == CAP_NET_RAW) {
auto s = Socket(AF_INET, SOCK_RAW, IPPROTO_UDP);
if (s.ok()) {
return true;
}
if (s.error().errno_value() == EPERM) {
return false;
}
return s.error();
}
return false;
}
} // namespace testing
} // namespace gvisor
#endif // __Fuchsia__

View File

@ -0,0 +1,41 @@
// Copyright 2021 The gVisor Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
// Utilities for testing capabilities on Fuchsia.
#ifndef GVISOR_TEST_UTIL_FUCHSIA_CAPABILITY_UTIL_H_
#define GVISOR_TEST_UTIL_FUCHSIA_CAPABILITY_UTIL_H_
#ifdef __Fuchsia__
#include "test/util/posix_error.h"
#ifdef CAP_NET_RAW
#error "Fuchsia should not define CAP_NET_RAW"
#endif // CAP_NET_RAW
#define CAP_NET_RAW 0
namespace gvisor {
namespace testing {
// HaveCapability returns true if the process has the specified EFFECTIVE
// capability.
PosixErrorOr<bool> HaveCapability(int cap);
} // namespace testing
} // namespace gvisor
#endif // __Fuchsia__
#endif // GVISOR_TEST_UTIL_FUCHSIA_CAPABILITY_UTIL_H_

View File

@ -14,7 +14,7 @@
#ifdef __linux__
#include "test/util/capability_util.h"
#include "test/util/linux_capability_util.h"
#include <linux/capability.h>
#include <sched.h>

View File

@ -0,0 +1,128 @@
// Copyright 2018 The gVisor Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
// Utilities for testing capabilities on Linux.
#ifndef GVISOR_TEST_UTIL_LINUX_CAPABILITY_UTIL_H_
#define GVISOR_TEST_UTIL_LINUX_CAPABILITY_UTIL_H_
#ifdef __linux__
#include <errno.h>
#include <linux/capability.h>
#include <sys/syscall.h>
#include <unistd.h>
#include "test/util/cleanup.h"
#include "test/util/posix_error.h"
#include "test/util/save_util.h"
#include "test/util/test_util.h"
#ifndef _LINUX_CAPABILITY_VERSION_3
#error Expecting _LINUX_CAPABILITY_VERSION_3 support
#endif
namespace gvisor {
namespace testing {
// HaveCapability returns true if the process has the specified EFFECTIVE
// capability.
inline PosixErrorOr<bool> HaveCapability(int cap) {
if (!cap_valid(cap)) {
return PosixError(EINVAL, "Invalid capability");
}
struct __user_cap_header_struct header = {_LINUX_CAPABILITY_VERSION_3, 0};
struct __user_cap_data_struct caps[_LINUX_CAPABILITY_U32S_3] = {};
RETURN_ERROR_IF_SYSCALL_FAIL(syscall(__NR_capget, &header, &caps));
MaybeSave();
return (caps[CAP_TO_INDEX(cap)].effective & CAP_TO_MASK(cap)) != 0;
}
// SetCapability sets the specified EFFECTIVE capability.
inline PosixError SetCapability(int cap, bool set) {
if (!cap_valid(cap)) {
return PosixError(EINVAL, "Invalid capability");
}
struct __user_cap_header_struct header = {_LINUX_CAPABILITY_VERSION_3, 0};
struct __user_cap_data_struct caps[_LINUX_CAPABILITY_U32S_3] = {};
RETURN_ERROR_IF_SYSCALL_FAIL(syscall(__NR_capget, &header, &caps));
MaybeSave();
if (set) {
caps[CAP_TO_INDEX(cap)].effective |= CAP_TO_MASK(cap);
} else {
caps[CAP_TO_INDEX(cap)].effective &= ~CAP_TO_MASK(cap);
}
header = {_LINUX_CAPABILITY_VERSION_3, 0};
RETURN_ERROR_IF_SYSCALL_FAIL(syscall(__NR_capset, &header, &caps));
MaybeSave();
return NoError();
}
// DropPermittedCapability drops the specified PERMITTED. The EFFECTIVE
// capabilities must be a subset of PERMITTED, so those are dropped as well.
inline PosixError DropPermittedCapability(int cap) {
if (!cap_valid(cap)) {
return PosixError(EINVAL, "Invalid capability");
}
struct __user_cap_header_struct header = {_LINUX_CAPABILITY_VERSION_3, 0};
struct __user_cap_data_struct caps[_LINUX_CAPABILITY_U32S_3] = {};
RETURN_ERROR_IF_SYSCALL_FAIL(syscall(__NR_capget, &header, &caps));
MaybeSave();
caps[CAP_TO_INDEX(cap)].effective &= ~CAP_TO_MASK(cap);
caps[CAP_TO_INDEX(cap)].permitted &= ~CAP_TO_MASK(cap);
header = {_LINUX_CAPABILITY_VERSION_3, 0};
RETURN_ERROR_IF_SYSCALL_FAIL(syscall(__NR_capset, &header, &caps));
MaybeSave();
return NoError();
}
PosixErrorOr<bool> CanCreateUserNamespace();
class AutoCapability {
public:
AutoCapability(int cap, bool set) : cap_(cap), set_(set) {
const bool has = EXPECT_NO_ERRNO_AND_VALUE(HaveCapability(cap));
if (set != has) {
EXPECT_NO_ERRNO(SetCapability(cap_, set_));
applied_ = true;
}
}
~AutoCapability() {
if (applied_) {
EXPECT_NO_ERRNO(SetCapability(cap_, !set_));
}
}
private:
int cap_;
bool set_;
bool applied_ = false;
};
} // namespace testing
} // namespace gvisor
#endif // __linux__
#endif // GVISOR_TEST_UTIL_LINUX_CAPABILITY_UTIL_H_