blob: 9cd5f7bc374a718ffe21ee0084329650b2c83169 [file] [log] [blame]
# Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
AUTHOR = "The Chromium OS Authors"
DOC = """
Locating important system files outside of the integrity-controlled
rootfs can undermine the security provided by verified boot. Therefore,
there should be a whitelisted, limited, reviewed set of locations where
we symlink from inside the rootfs out to the stateful partition. This
test enforces that.
NAME = "security_RootfsStatefulSymlinks"
PURPOSE = "To avoid circumventions of verified boot by careless symlinks."
The test succeeds if all links pointing into "bad destinations" are
accounted for by the whitelist ('baseline').
SUITE = "security"
TEST_CLASS = "security"
TEST_CATEGORY = "Functional"
TEST_TYPE = "client"