| // Copyright 2015 The Go Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style |
| // license that can be found in the LICENSE file. |
| |
| package syscall_test |
| |
| import ( |
| "bufio" |
| "fmt" |
| "io" |
| "io/ioutil" |
| "os" |
| "os/exec" |
| "os/signal" |
| "path/filepath" |
| "runtime" |
| "strconv" |
| "strings" |
| "syscall" |
| "testing" |
| "time" |
| ) |
| |
| func TestMain(m *testing.M) { |
| if os.Getenv("GO_DEATHSIG_PARENT") == "1" { |
| deathSignalParent() |
| } else if os.Getenv("GO_DEATHSIG_CHILD") == "1" { |
| deathSignalChild() |
| } else if os.Getenv("GO_SYSCALL_NOERROR") == "1" { |
| syscallNoError() |
| } |
| |
| os.Exit(m.Run()) |
| } |
| |
| func TestLinuxDeathSignal(t *testing.T) { |
| if os.Getuid() != 0 { |
| t.Skip("skipping root only test") |
| } |
| |
| // Copy the test binary to a location that a non-root user can read/execute |
| // after we drop privileges |
| tempDir, err := ioutil.TempDir("", "TestDeathSignal") |
| if err != nil { |
| t.Fatalf("cannot create temporary directory: %v", err) |
| } |
| defer os.RemoveAll(tempDir) |
| os.Chmod(tempDir, 0755) |
| |
| tmpBinary := filepath.Join(tempDir, filepath.Base(os.Args[0])) |
| |
| src, err := os.Open(os.Args[0]) |
| if err != nil { |
| t.Fatalf("cannot open binary %q, %v", os.Args[0], err) |
| } |
| defer src.Close() |
| |
| dst, err := os.OpenFile(tmpBinary, os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0755) |
| if err != nil { |
| t.Fatalf("cannot create temporary binary %q, %v", tmpBinary, err) |
| } |
| if _, err := io.Copy(dst, src); err != nil { |
| t.Fatalf("failed to copy test binary to %q, %v", tmpBinary, err) |
| } |
| err = dst.Close() |
| if err != nil { |
| t.Fatalf("failed to close test binary %q, %v", tmpBinary, err) |
| } |
| |
| cmd := exec.Command(tmpBinary) |
| cmd.Env = []string{"GO_DEATHSIG_PARENT=1"} |
| chldStdin, err := cmd.StdinPipe() |
| if err != nil { |
| t.Fatalf("failed to create new stdin pipe: %v", err) |
| } |
| chldStdout, err := cmd.StdoutPipe() |
| if err != nil { |
| t.Fatalf("failed to create new stdout pipe: %v", err) |
| } |
| cmd.Stderr = os.Stderr |
| |
| err = cmd.Start() |
| defer cmd.Wait() |
| if err != nil { |
| t.Fatalf("failed to start first child process: %v", err) |
| } |
| |
| chldPipe := bufio.NewReader(chldStdout) |
| |
| if got, err := chldPipe.ReadString('\n'); got == "start\n" { |
| syscall.Kill(cmd.Process.Pid, syscall.SIGTERM) |
| |
| go func() { |
| time.Sleep(5 * time.Second) |
| chldStdin.Close() |
| }() |
| |
| want := "ok\n" |
| if got, err = chldPipe.ReadString('\n'); got != want { |
| t.Fatalf("expected %q, received %q, %v", want, got, err) |
| } |
| } else { |
| t.Fatalf("did not receive start from child, received %q, %v", got, err) |
| } |
| } |
| |
| func deathSignalParent() { |
| cmd := exec.Command(os.Args[0]) |
| cmd.Env = []string{"GO_DEATHSIG_CHILD=1"} |
| cmd.Stdin = os.Stdin |
| cmd.Stdout = os.Stdout |
| attrs := syscall.SysProcAttr{ |
| Pdeathsig: syscall.SIGUSR1, |
| // UID/GID 99 is the user/group "nobody" on RHEL/Fedora and is |
| // unused on Ubuntu |
| Credential: &syscall.Credential{Uid: 99, Gid: 99}, |
| } |
| cmd.SysProcAttr = &attrs |
| |
| err := cmd.Start() |
| if err != nil { |
| fmt.Fprintf(os.Stderr, "death signal parent error: %v\n", err) |
| os.Exit(1) |
| } |
| cmd.Wait() |
| os.Exit(0) |
| } |
| |
| func deathSignalChild() { |
| c := make(chan os.Signal, 1) |
| signal.Notify(c, syscall.SIGUSR1) |
| go func() { |
| <-c |
| fmt.Println("ok") |
| os.Exit(0) |
| }() |
| fmt.Println("start") |
| |
| buf := make([]byte, 32) |
| os.Stdin.Read(buf) |
| |
| // We expected to be signaled before stdin closed |
| fmt.Println("not ok") |
| os.Exit(1) |
| } |
| |
| func TestParseNetlinkMessage(t *testing.T) { |
| for i, b := range [][]byte{ |
| {103, 0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2, 0, 0, 2, 11, 0, 1, 0, 0, 0, 0, 5, 8, 0, 3, |
| 0, 8, 0, 6, 0, 0, 0, 0, 1, 63, 0, 10, 0, 69, 16, 0, 59, 39, 82, 64, 0, 64, 6, 21, 89, 127, 0, 0, |
| 1, 127, 0, 0, 1, 230, 228, 31, 144, 32, 186, 155, 211, 185, 151, 209, 179, 128, 24, 1, 86, |
| 53, 119, 0, 0, 1, 1, 8, 10, 0, 17, 234, 12, 0, 17, 189, 126, 107, 106, 108, 107, 106, 13, 10, |
| }, |
| {106, 0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2, 0, 0, 2, 11, 0, 1, 0, 0, 0, 0, 3, 8, 0, 3, |
| 0, 8, 0, 6, 0, 0, 0, 0, 1, 66, 0, 10, 0, 69, 0, 0, 62, 230, 255, 64, 0, 64, 6, 85, 184, 127, 0, 0, |
| 1, 127, 0, 0, 1, 237, 206, 31, 144, 73, 197, 128, 65, 250, 60, 192, 97, 128, 24, 1, 86, 253, 21, 0, |
| 0, 1, 1, 8, 10, 0, 51, 106, 89, 0, 51, 102, 198, 108, 104, 106, 108, 107, 104, 108, 107, 104, 10, |
| }, |
| {102, 0, 0, 0, 0, 3, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2, 0, 0, 2, 11, 0, 1, 0, 0, 0, 0, 1, 8, 0, 3, 0, |
| 8, 0, 6, 0, 0, 0, 0, 1, 62, 0, 10, 0, 69, 0, 0, 58, 231, 2, 64, 0, 64, 6, 85, 185, 127, 0, 0, 1, 127, |
| 0, 0, 1, 237, 206, 31, 144, 73, 197, 128, 86, 250, 60, 192, 97, 128, 24, 1, 86, 104, 64, 0, 0, 1, 1, 8, |
| 10, 0, 52, 198, 200, 0, 51, 135, 232, 101, 115, 97, 103, 103, 10, |
| }, |
| } { |
| m, err := syscall.ParseNetlinkMessage(b) |
| if err != syscall.EINVAL { |
| t.Errorf("#%d: got %v; want EINVAL", i, err) |
| } |
| if m != nil { |
| t.Errorf("#%d: got %v; want nil", i, m) |
| } |
| } |
| } |
| |
| func TestSyscallNoError(t *testing.T) { |
| // On Linux there are currently no syscalls which don't fail and return |
| // a value larger than 0xfffffffffffff001 so we could test RawSyscall |
| // vs. RawSyscallNoError on 64bit architectures. |
| if runtime.GOARCH != "386" && runtime.GOARCH != "arm" { |
| t.Skip("skipping on non-32bit architecture") |
| } |
| |
| if os.Getuid() != 0 { |
| t.Skip("skipping root only test") |
| } |
| |
| // Copy the test binary to a location that a non-root user can read/execute |
| // after we drop privileges |
| tempDir, err := ioutil.TempDir("", "TestSyscallNoError") |
| if err != nil { |
| t.Fatalf("cannot create temporary directory: %v", err) |
| } |
| defer os.RemoveAll(tempDir) |
| os.Chmod(tempDir, 0755) |
| |
| tmpBinary := filepath.Join(tempDir, filepath.Base(os.Args[0])) |
| |
| src, err := os.Open(os.Args[0]) |
| if err != nil { |
| t.Fatalf("cannot open binary %q, %v", os.Args[0], err) |
| } |
| defer src.Close() |
| |
| dst, err := os.OpenFile(tmpBinary, os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0755) |
| if err != nil { |
| t.Fatalf("cannot create temporary binary %q, %v", tmpBinary, err) |
| } |
| if _, err := io.Copy(dst, src); err != nil { |
| t.Fatalf("failed to copy test binary to %q, %v", tmpBinary, err) |
| } |
| err = dst.Close() |
| if err != nil { |
| t.Fatalf("failed to close test binary %q, %v", tmpBinary, err) |
| } |
| |
| uid := uint32(0xfffffffe) |
| err = os.Chown(tmpBinary, int(uid), -1) |
| if err != nil { |
| t.Fatalf("failed to chown test binary %q, %v", tmpBinary, err) |
| } |
| |
| err = os.Chmod(tmpBinary, 0755|os.ModeSetuid) |
| if err != nil { |
| t.Fatalf("failed to set setuid bit on test binary %q, %v", tmpBinary, err) |
| } |
| |
| cmd := exec.Command(tmpBinary) |
| cmd.Env = []string{"GO_SYSCALL_NOERROR=1"} |
| |
| out, err := cmd.CombinedOutput() |
| if err != nil { |
| t.Fatalf("failed to start first child process: %v", err) |
| } |
| |
| got := strings.TrimSpace(string(out)) |
| want := strconv.FormatUint(uint64(uid)+1, 10) + " / " + |
| strconv.FormatUint(uint64(-uid), 10) + " / " + |
| strconv.FormatUint(uint64(uid), 10) |
| if got != want { |
| t.Errorf("expected %s, got %s", want, got) |
| } |
| } |
| |
| func syscallNoError() { |
| // Test that the return value from SYS_GETEUID32 (which cannot fail) |
| // doesn't get treated as an error (see https://golang.org/issue/22924) |
| euid1, _, e := syscall.RawSyscall(syscall.Sys_GETEUID, 0, 0, 0) |
| euid2, _ := syscall.RawSyscallNoError(syscall.Sys_GETEUID, 0, 0, 0) |
| |
| fmt.Println(uintptr(euid1), "/", int(e), "/", uintptr(euid2)) |
| os.Exit(0) |
| } |