diff --git a/security_lite/permission_posix/capability/src/ActsCapabilityTest.cpp b/security_lite/permission_posix/capability/src/ActsCapabilityTest.cpp index e631d0ec1052b19e092c95a518c531bb11b99570..2f60981316f95d2fbffc4df17fbf6e0d4cfd298c 100755 --- a/security_lite/permission_posix/capability/src/ActsCapabilityTest.cpp +++ b/security_lite/permission_posix/capability/src/ActsCapabilityTest.cpp @@ -1490,7 +1490,7 @@ HWTEST_F(CapabilityTestSuite, CapabilityTest2100, Reliability | MediumTest | Lev } #endif -#if defined(LITE_FS_JFFS2) || defined(LITE_FS_VFAT) +#if defined(LITE_FS_JFFS2) /* * @tc.number : SUB_SEC_AppSEC_PermissionMgmt_Capability_2200 * @tc.name : Check whether the default configuration of the system process capabilities @@ -1530,6 +1530,46 @@ HWTEST_F(CapabilityTestSuite, CapabilityTest2200, Security | MediumTest | Level1 } #endif +#if defined(LITE_FS_VFAT) +/* + * @tc.number : SUB_SEC_AppSEC_PermissionMgmt_Capability_2200 + * @tc.name : Check whether the default configuration of the system process capabilities + is the same as that described in the design document + * @tc.desc : [C-SECURITY-0100] + */ +HWTEST_F(CapabilityTestSuite, CapabilityTest2200, Security | MediumTest | Level1) +{ + int ret; + // Step 1: Check the capability of process 'init', pid = 1 + ret = CapgetWithCaps(INIT_PID_2, INIT_CAP); + EXPECT_EQ(ret, 0) << "ErrInfo: Pid = 1, process init has wrong capability"; + // Step 2: Check the capability of process 'KProcess', pid = 2 + ret = CapgetWithCaps(KPROCESS_PID_2, KPROCESS_CAP); + EXPECT_EQ(ret, 0) << "ErrInfo: Pid = 2, process KProcess has wrong capability"; + // Step 3: Check the capability of process 'shell', pid = 8 + ret = CapgetWithCaps(SHELL_PID_2, SHELL_CAP); + EXPECT_EQ(ret, 0) << "ErrInfo: Pid = 8, process shell has wrong capability"; + // Step 4: Check the capability of process 'apphilogcat', pid = 10 + ret = CapgetWithCaps(HILOGCAT_PID_2, HILOGCAT_CAP); + EXPECT_EQ(ret, 0) << "ErrInfo: Pid = 10, process apphilogcat has wrong capability"; + // Step 5: Check the capability of process 'foundation', pid = 3 + ret = CapgetWithCaps(FOUNDATION_PID_2, FOUNDATION_CAP); + EXPECT_EQ(ret, 0) << "ErrInfo: Pid = 3, process foundation has wrong capability"; + // Step 6: Check the capability of process 'bundle_daemon', pid = 4 + ret = CapgetWithCaps(BUNDLE_DAEMON_PID_2, BUNDLE_DAEMON_CAP); + EXPECT_EQ(ret, 0) << "ErrInfo: Pid = 4, process bundle_daemon has wrong capability"; + // Step 7: Check the capability of process 'appspawn', pid = 5 + ret = CapgetWithCaps(APPSPAWN_PID_2, APPSPAWN_CAP); + EXPECT_EQ(ret, 0) << "ErrInfo: Pid = 5, process appspawn has wrong capability"; + // Step 8: Check the capability of process 'media_server', pid = 6 + ret = CapgetWithCaps(MEDIA_SERVER_PID_2, MEDIA_SERVER_CAP); + EXPECT_EQ(ret, 0) << "ErrInfo: Pid = 6, process media_server has wrong capability"; + // Step 9: Check the capability of process 'wms_server' or 'ai_server', pid = 7 + ret = CapgetWithCaps(WMS_SERVER_OR_AI_SERVER_PID_2, WMS_SERVER_OR_AI_SERVER_CAP); + EXPECT_EQ(ret, 0) << "ErrInfo: Pid = 7, process wms_server or ai_server has wrong capability"; +} +#endif + #if defined(LITE_FS_JFFS2) || defined(LITE_FS_VFAT) /* * @tc.number : SUB_SEC_AppSEC_PermissionMgmt_Capability_2300 diff --git a/security_lite/permission_posix/capability/src/ActsCapabilityTest.h b/security_lite/permission_posix/capability/src/ActsCapabilityTest.h index 7157d15bd7cefb3d6b6eb600dfb50654384edafb..6b19338bcc1e8461336b1e442fa0a377488f4f76 100755 --- a/security_lite/permission_posix/capability/src/ActsCapabilityTest.h +++ b/security_lite/permission_posix/capability/src/ActsCapabilityTest.h @@ -46,6 +46,18 @@ constexpr int MEDIA_SERVER_PID = 8; constexpr int WMS_SERVER_OR_AI_SERVER_PID = 9; constexpr int HIVIEW_PID = 10; constexpr int OTHER_PID = 11; +constexpr int INIT_PID_2 = 1; +constexpr int KPROCESS_PID_2 = 2; +constexpr int SHELL_PID_2 = 8; +constexpr int HILOGCAT_PID_2 = 10; +constexpr int FOUNDATION_PID_2 = 3; +constexpr int BUNDLE_DAEMON_PID_2 = 4; +constexpr int APPSPAWN_PID_2 = 5; +constexpr int MEDIA_SERVER_PID_2 = 6; +constexpr int WMS_SERVER_OR_AI_SERVER_PID_2 = 7; +constexpr int HIVIEW_PID_2 = 10; +constexpr int OTHER_PID_2 = 11; + constexpr unsigned int INIT_CAP = 0x02e83def; constexpr unsigned int KPROCESS_CAP = 0x02e83def; constexpr unsigned int SHELL_CAP = 0x02e83def; @@ -140,4 +152,4 @@ char *GetCurrentPath(); int CheckFsMount(const char *topDir, const char *topDirMountInfo); -#endif \ No newline at end of file +#endif