[apparmor] query_label regression test failures
John Johansen
john.johansen at canonical.com
Sat Jul 11 19:04:37 UTC 2015
On 06/25/2015 11:55 AM, Tyler Hicks wrote:
> On 2015-06-25 01:21:39, Steve Beattie wrote:
>> Hi,
>>
>> When running the apparmor regression tests on wily with the trunk of
>> the userspace tools, I'm getting the following two failures in the
>> query_label test:
>>
>> Error: query_label failed. Test 'QUERY file (all base perms #1)' was expected to 'pass'. Reason for failure 'FAIL: the access should not be allowed and should be audited'
>> Error: query_label failed. Test 'QUERY file (all base perms #2)' was expected to 'pass'. Reason for failure 'FAIL: the access should not be allowed and should be audited'
>
> Note that the test passes when we run them against the wily apparmor
> userspace (2.9.2-0ubuntu1). Seems to be something broken specifically in
> trunk.
>
So after further investigation there are a couple of problems.
1. The test is using the wrong defines: It is using the defines from the
parser for the packed dfa permissions. This set of permissions is not
meant to be exposed to the outside world
2. The kernel is using the wrong mapping function for the permissions
in the file class. This results in partially exposing the packed
permissions, but even then it doesn't fully line up with the packed
permissions, and is not correct for several of the potential permissions.
Attached is a patch that fixes the test, and moves the two tests that
fail due to the kernel to xpass.
---
=== modified file 'tests/regression/apparmor/query_label.c'
--- tests/regression/apparmor/query_label.c 2015-05-28 19:48:46 +0000
+++ tests/regression/apparmor/query_label.c 2015-07-10 20:45:07 +0000
@@ -35,28 +35,68 @@
#define AA_MAY_APPEND (1 << 3)
#endif
+#ifndef AA_MAY_CREATE
+#define AA_MAY_CREATE (1 << 4)
+#endif
+
+#ifndef AA_MAY_DELETE
+#define AA_MAY_DELETE (1 << 5)
+#endif
+
+#ifndef AA_MAY_OPEN
+#define AA_MAY_OPEN (1 << 6)
+#endif
+
+#ifndef AA_MAY_RENAME
+#define AA_MAY_RENAME (1 << 7)
+#endif
+
+#ifndef AA_MAY_SETATTR
+#define AA_MAY_SETATTR (1 << 8)
+#endif
+
+#ifndef AA_MAY_GETATTR
+#define AA_MAY_GETATTR (1 << 9)
+#endif
+
+#ifndef AA_MAY_SETCRED
+#define AA_MAY_SETCRED (1 << 10)
+#endif
+
+#ifndef AA_MAY_GETCRED
+#define AA_MAY_GETCRED (1 << 11)
+#endif
+
+#ifndef AA_MAY_CHMOD
+#define AA_MAY_CHMOD (1 << 12)
+#endif
+
+#ifndef AA_MAY_CHOWN
+#define AA_MAY_CHOWN (1 << 13)
+#endif
+
+#ifndef AA_MAY_LCOK
+#define AA_MAY_LOCK 0x8000
+#endif
+
+#ifndef AA_EXEC_MMAP
+#define AA_EXEC_MMAP 0x10000
+#endif
+
#ifndef AA_MAY_LINK
-#define AA_MAY_LINK (1 << 4)
-#endif
-
-#ifndef AA_MAY_LOCK
-#define AA_MAY_LOCK (1 << 5)
-#endif
-
-#ifndef AA_EXEC_MMAP
-#define AA_EXEC_MMAP (1 << 6)
-#endif
-
-#ifndef AA_EXEC_PUX
-#define AA_EXEC_PUX (1 << 7)
-#endif
-
-#ifndef AA_EXEC_UNSAFE
-#define AA_EXEC_UNSAFE (1 << 8)
-#endif
-
-#ifndef AA_EXEC_INHERIT
-#define AA_EXEC_INHERIT (1 << 9)
+#define AA_MAY_LINK 0x40000
+#endif
+
+#ifndef AA_LINK_SUBSET /* overlayed perm in pair */
+#define AA_LINK_SUBSET AA_MAY_LOCK
+#endif
+
+#ifndef AA_MAY_ONEXEC
+#define AA_MAY_ONEXEC 0x20000000
+#endif
+
+#ifndef AA_MAY_CHANGE_PROFILE
+#define AA_MAY_CHANGE_PROFILE 0x40000000
#endif
static char *progname = NULL;
@@ -148,18 +188,26 @@
*mask |= AA_MAY_READ;
else if (!strcmp(perm, "append"))
*mask |= AA_MAY_APPEND;
+ else if (!strcmp(perm, "create"))
+ *mask |= AA_MAY_CREATE;
+ else if (!strcmp(perm, "delete"))
+ *mask |= AA_MAY_DELETE;
+ else if (!strcmp(perm, "setattr"))
+ *mask |= AA_MAY_SETATTR;
+ else if (!strcmp(perm, "getattr"))
+ *mask |= AA_MAY_GETATTR;
+ else if (!strcmp(perm, "chmod"))
+ *mask |= AA_MAY_CHMOD;
+ else if (!strcmp(perm, "chown"))
+ *mask |= AA_MAY_CHOWN;
else if (!strcmp(perm, "link"))
*mask |= AA_MAY_LINK;
else if (!strcmp(perm, "lock"))
*mask |= AA_MAY_LOCK;
+ else if (!strcmp(perm, "linksubset"))
+ *mask |= AA_LINK_SUBSET;
else if (!strcmp(perm, "exec_mmap"))
*mask |= AA_EXEC_MMAP;
- else if (!strcmp(perm, "exec_pux"))
- *mask |= AA_EXEC_PUX;
- else if (!strcmp(perm, "exec_unsafe"))
- *mask |= AA_EXEC_UNSAFE;
- else if (!strcmp(perm, "exec_inherit"))
- *mask |= AA_EXEC_INHERIT;
else {
fprintf(stderr, "FAIL: unknown perm: %s\n", perm);
return 1;
@@ -264,8 +312,8 @@
(allowed == should_allow && audited == should_audit)) {
printf("PASS\n");
} else {
- fprintf(stderr, "FAIL: the access should %sbe allowed and should %sbe audited\n",
- allowed ? "" : "not ", audited ? "" : "not ");
+ fprintf(stderr, "FAIL: the access should %sbe allowed and should %sbe audited. mask 0x%x\n",
+ allowed ? "" : "not ", audited ? "" : "not ", mask);
exit(1);
}
=== modified file 'tests/regression/apparmor/query_label.sh'
--- tests/regression/apparmor/query_label.sh 2015-05-28 19:48:53 +0000
+++ tests/regression/apparmor/query_label.sh 2015-07-11 18:54:55 +0000
@@ -212,9 +212,9 @@
genqueryprofile "file,"
expect allow
-perms file exec,write,read,append,link,lock
-querytest "QUERY file (all base perms #1)" pass /anything
-querytest "QUERY file (all base perms #2)" pass /everything
+perms file exec,write,read,append,create,delete,setattr,getattr,chmod,chown,link,linksubset,lock,exec_mmap
+querytest "QUERY file (all base perms #1)" xpass /anything
+querytest "QUERY file (all base perms #2)" xpass /everything
genqueryprofile "/etc/passwd r,"
expect allow
More information about the AppArmor
mailing list