| from optparse import OptionParser |
| from optparse import Option, OptionValueError |
| import os |
| import policy |
| import re |
| import sys |
| |
| ############################################################# |
| # Tests |
| ############################################################# |
| def TestDataTypeViolations(pol): |
| return pol.AssertPathTypesHaveAttr(["/data/"], [], "data_file_type") |
| |
| def TestSystemTypeViolations(pol): |
| return pol.AssertPathTypesHaveAttr(["/system/"], [], "system_file_type") |
| |
| def TestProcTypeViolations(pol): |
| return pol.AssertGenfsFilesystemTypesHaveAttr("proc", "proc_type") |
| |
| def TestSysfsTypeViolations(pol): |
| ret = pol.AssertGenfsFilesystemTypesHaveAttr("sysfs", "sysfs_type") |
| ret += pol.AssertPathTypesHaveAttr(["/sys/"], ["/sys/kernel/debug/", |
| "/sys/kernel/tracing"], "sysfs_type") |
| return ret |
| |
| def TestDebugfsTypeViolations(pol): |
| ret = pol.AssertGenfsFilesystemTypesHaveAttr("debugfs", "debugfs_type") |
| ret += pol.AssertGenfsFilesystemTypesHaveAttr("tracefs", "debugfs_type") |
| ret += pol.AssertPathTypesHaveAttr(["/sys/kernel/debug/", |
| "/sys/kernel/tracing"], [], "debugfs_type") |
| return ret |
| |
| def TestVendorTypeViolations(pol): |
| return pol.AssertPathTypesHaveAttr(["/vendor/"], [], "vendor_file_type") |
| |
| def TestCoreDataTypeViolations(pol): |
| return pol.AssertPathTypesHaveAttr(["/data/"], ["/data/vendor", |
| "/data/vendor_ce", "/data/vendor_de"], "core_data_file_type") |
| |
| ### |
| # extend OptionParser to allow the same option flag to be used multiple times. |
| # This is used to allow multiple file_contexts files and tests to be |
| # specified. |
| # |
| class MultipleOption(Option): |
| ACTIONS = Option.ACTIONS + ("extend",) |
| STORE_ACTIONS = Option.STORE_ACTIONS + ("extend",) |
| TYPED_ACTIONS = Option.TYPED_ACTIONS + ("extend",) |
| ALWAYS_TYPED_ACTIONS = Option.ALWAYS_TYPED_ACTIONS + ("extend",) |
| |
| def take_action(self, action, dest, opt, value, values, parser): |
| if action == "extend": |
| values.ensure_value(dest, []).append(value) |
| else: |
| Option.take_action(self, action, dest, opt, value, values, parser) |
| |
| Tests = [ |
| "TestDataTypeViolators", |
| "TestProcTypeViolations", |
| "TestSysfsTypeViolations", |
| "TestSystemTypeViolators", |
| "TestDebugfsTypeViolations", |
| "TestVendorTypeViolations", |
| "TestCoreDataTypeViolations", |
| ] |
| |
| if __name__ == '__main__': |
| usage = "sepolicy_tests -l $(ANDROID_HOST_OUT)/lib64/libsepolwrap.so " |
| usage += "-f vendor_file_contexts -f " |
| usage +="plat_file_contexts -p policy [--test test] [--help]" |
| parser = OptionParser(option_class=MultipleOption, usage=usage) |
| parser.add_option("-f", "--file_contexts", dest="file_contexts", |
| metavar="FILE", action="extend", type="string") |
| parser.add_option("-p", "--policy", dest="policy", metavar="FILE") |
| parser.add_option("-l", "--library-path", dest="libpath", metavar="FILE") |
| parser.add_option("-t", "--test", dest="test", action="extend", |
| help="Test options include "+str(Tests)) |
| |
| (options, args) = parser.parse_args() |
| |
| if not options.libpath: |
| sys.exit("Must specify path to libsepolwrap library\n" + parser.usage) |
| if not os.path.exists(options.libpath): |
| sys.exit("Error: library-path " + options.libpath + " does not exist\n" |
| + parser.usage) |
| |
| if not options.policy: |
| sys.exit("Must specify monolithic policy file\n" + parser.usage) |
| if not os.path.exists(options.policy): |
| sys.exit("Error: policy file " + options.policy + " does not exist\n" |
| + parser.usage) |
| |
| if not options.file_contexts: |
| sys.exit("Error: Must specify file_contexts file(s)\n" + parser.usage) |
| for f in options.file_contexts: |
| if not os.path.exists(f): |
| sys.exit("Error: File_contexts file " + f + " does not exist\n" + |
| parser.usage) |
| |
| pol = policy.Policy(options.policy, options.file_contexts, options.libpath) |
| |
| results = "" |
| # If an individual test is not specified, run all tests. |
| if options.test is None or "TestDataTypeViolations" in options.test: |
| results += TestDataTypeViolations(pol) |
| if options.test is None or "TestProcTypeViolations" in options.test: |
| results += TestProcTypeViolations(pol) |
| if options.test is None or "TestSysfsTypeViolations" in options.test: |
| results += TestSysfsTypeViolations(pol) |
| if options.test is None or "TestSystemTypeViolations" in options.test: |
| results += TestSystemTypeViolations(pol) |
| if options.test is None or "TestDebugfsTypeViolations" in options.test: |
| results += TestDebugfsTypeViolations(pol) |
| if options.test is None or "TestVendorTypeViolations" in options.test: |
| results += TestVendorTypeViolations(pol) |
| if options.test is None or "TestCoreDataTypeViolations" in options.test: |
| results += TestCoreDataTypeViolations(pol) |
| |
| if len(results) > 0: |
| sys.exit(results) |