summaryrefslogtreecommitdiff
path: root/Tests/Kernel/TestProcFSWrite.cpp
blob: 25595437770708e7c63400fb74f42ca4be4dbf19 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
/*
 * Copyright (c) 2021, Ben Wiederhake <BenWiederhake.GitHub@gmx.de>
 *
 * SPDX-License-Identifier: BSD-2-Clause
 */

#include <LibTest/TestCase.h>
#include <fcntl.h>
#include <sys/prctl.h>
#include <unistd.h>

TEST_CASE(check_root)
{
    auto uid = geteuid();
    // This test only makes sense as root.
    EXPECT_EQ(uid, 0u);

    // Before we make the process dumpable, become "fully" root, so that the user cannot tamper with our memory:
    EXPECT_EQ(setuid(0), 0);

    // If running as setuid, the process is automatically marked as non-dumpable, which bars access to /proc/self/.
    // However, that is the easiest guess for a /proc/$PID/ directory, so we'd like to use that.
    // In order to do so, mark this process as dumpable:
    EXPECT_EQ(prctl(PR_SET_DUMPABLE, 1, 0), 0);
}

TEST_CASE(root_writes_to_procfs)
{
    int fd = open("/proc/self/unveil", O_RDWR | O_APPEND | O_CREAT, 0666); // = 6
    if (fd < 0) {
        perror("open");
        dbgln("fd was {}", fd);
        FAIL("open failed?! See debugout");
        return;
    }

    int rc = write(fd, "hello", 5);
    perror("write");
    dbgln("write rc = {}", rc);
    if (rc >= 0) {
        FAIL("Wrote successfully?!");
    }
}