32 lines
		
	
	
		
			1.2 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
			
		
		
	
	
			32 lines
		
	
	
		
			1.2 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
| # Copyright 2018 The Chromium OS Authors. All rights reserved.
 | |
| # Use of this source code is governed by a BSD-style license that can be
 | |
| # found in the LICENSE file.
 | |
| 
 | |
| TIME="SHORT"
 | |
| AUTHOR = "The Chromium OS Authors"
 | |
| DOC = """
 | |
| Linux provides no way to give a process the CAP_SETUID runtime capability
 | |
| without indescriminately allowing that process to change UID to any user on the
 | |
| system, including the root user. This is an obstacle to sandboxing system
 | |
| services in ChromeOS that spawn programs which setuid() to a different user.
 | |
| To solve this problem, we have added functionality to the ChromiumOS LSM which
 | |
| allows for configuring per-UID policies in ChromeOS that restrict which UIDs
 | |
| can be switched to by processes spawned under the restricted UID.
 | |
| """
 | |
| NAME = "security_ProcessManagementPolicy"
 | |
| PURPOSE = """
 | |
| Prevent compromised non-root processes from being able to escalate
 | |
| privileges to root through a simple setuid() call.
 | |
| """
 | |
| CRITERIA = """
 | |
| This autotest ensures that restricted users can only setuid() to UIDs approved
 | |
| by the security policy installed on the system.
 | |
| """
 | |
| ATTRIBUTES = "suite:bvt-perbuild"
 | |
| TEST_CLASS = "security"
 | |
| TEST_CATEGORY = "Functional"
 | |
| TEST_TYPE = "client"
 | |
| JOB_RETRIES = 2
 | |
| 
 | |
| job.run_test("security_ProcessManagementPolicy")
 |