/*-*- mode:c;indent-tabs-mode:nil;c-basic-offset:2;tab-width:8;coding:utf-8 -*-│ │vi: set net ft=c ts=2 sts=2 sw=2 fenc=utf-8 :vi│ ╞══════════════════════════════════════════════════════════════════════════════╡ │ Copyright 2022 Justine Alexandra Roberts Tunney │ │ │ │ Permission to use, copy, modify, and/or distribute this software for │ │ any purpose with or without fee is hereby granted, provided that the │ │ above copyright notice and this permission notice appear in all copies. │ │ │ │ THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL │ │ WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED │ │ WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE │ │ AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL │ │ DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR │ │ PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER │ │ TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR │ │ PERFORMANCE OF THIS SOFTWARE. │ ╚─────────────────────────────────────────────────────────────────────────────*/ #include "libc/calls/calls.h" #include "libc/calls/internal.h" #include "libc/calls/ioctl.h" #include "libc/calls/struct/bpf.h" #include "libc/calls/struct/filter.h" #include "libc/calls/struct/flock.h" #include "libc/calls/struct/seccomp.h" #include "libc/calls/struct/sigaction.h" #include "libc/calls/struct/stat.h" #include "libc/calls/syscall_support-sysv.internal.h" #include "libc/dce.h" #include "libc/errno.h" #include "libc/macros.internal.h" #include "libc/mem/mem.h" #include "libc/runtime/runtime.h" #include "libc/sock/sock.h" #include "libc/sock/struct/sockaddr.h" #include "libc/sysv/consts/af.h" #include "libc/sysv/consts/at.h" #include "libc/sysv/consts/f.h" #include "libc/sysv/consts/fio.h" #include "libc/sysv/consts/ipproto.h" #include "libc/sysv/consts/map.h" #include "libc/sysv/consts/nrlinux.h" #include "libc/sysv/consts/o.h" #include "libc/sysv/consts/pr.h" #include "libc/sysv/consts/prot.h" #include "libc/sysv/consts/sig.h" #include "libc/sysv/consts/sock.h" #include "libc/testlib/testlib.h" char testlib_enable_tmp_setup_teardown; void OnSig(int sig) { // do nothing } void SetUp(void) { if (!__is_linux_2_6_23() && !IsOpenbsd()) { exit(0); } } TEST(pledge, default_allowsExit) { int ws, pid; ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("", 0)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws)); EXPECT_EQ(0, WEXITSTATUS(ws)); } TEST(pledge, stdio_forbidsOpeningPasswd1) { if (!IsLinux()) return; int ws, pid; ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio", 0)); ASSERT_SYS(EPERM, -1, open("/etc/passwd", O_RDWR)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws)); EXPECT_EQ(0, WEXITSTATUS(ws)); } TEST(pledge, stdio_forbidsOpeningPasswd2) { if (!IsOpenbsd()) return; int ws, pid; ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio", 0)); ASSERT_SYS(EPERM, -1, open("/etc/passwd", O_RDWR)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFSIGNALED(ws)); EXPECT_EQ(SIGABRT, WTERMSIG(ws)); } TEST(pledge, multipleCalls_canOnlyBecomeMoreRestrictive1) { if (IsOpenbsd()) return; int ws, pid; ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio", 0)); ASSERT_SYS(0, 0, pledge("stdio unix", 0)); ASSERT_SYS(0, 3, dup(2)); ASSERT_SYS(EPERM, -1, socket(AF_UNIX, SOCK_STREAM, 0)); ASSERT_SYS(EPERM, -1, prctl(PR_SET_NO_NEW_PRIVS, 0, 0, 0, 0)); ASSERT_SYS(EPERM, -1, prctl(PR_GET_SECCOMP, SECCOMP_MODE_FILTER, 0)); ASSERT_SYS(EPERM, -1, prctl(PR_SET_SECCOMP, 33, 0)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws)); EXPECT_EQ(0, WEXITSTATUS(ws)); } TEST(pledge, multipleCalls_canOnlyBecomeMoreRestrictive2) { if (!IsOpenbsd()) return; int ws, pid; ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio", 0)); ASSERT_SYS(EPERM, -1, pledge("stdio unix", 0)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws)); EXPECT_EQ(0, WEXITSTATUS(ws)); } TEST(pledge, multipleCalls_canOnlyBecomeMoreRestrictive3) { if (!IsOpenbsd()) return; int ws, pid; ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio unix", 0)); ASSERT_SYS(0, 0, pledge("stdio", 0)); ASSERT_SYS(0, 3, dup(2)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws)); EXPECT_EQ(0, WEXITSTATUS(ws)); } TEST(pledge, stdio_fcntl_allowsSomeFirstArgs) { if (IsOpenbsd()) return; // b/c testing linux bpf int ws, pid; struct flock lk; ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio inet", 0)); ASSERT_SYS(0, 0, pledge("stdio", 0)); ASSERT_NE(-1, fcntl(0, F_GETFL)); ASSERT_SYS(0, 0, fcntl(0, F_GETFD)); ASSERT_SYS(0, 3, fcntl(2, F_DUPFD_CLOEXEC, 3)); ASSERT_SYS(0, 0, ioctl(0, FIOCLEX, 0)); ASSERT_SYS(EPERM, 0, isatty(0)); ASSERT_SYS(EPERM, -1, fcntl(0, -1)); ASSERT_SYS(EPERM, -1, fcntl(0, F_GETLK, &lk)); ASSERT_SYS(EPERM, -1, fcntl(0, F_NOTIFY)); ASSERT_SYS(EPERM, -1, socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws) && !WEXITSTATUS(ws)); } TEST(pledge, stdioTty_sendtoRestricted_requiresNullAddr) { if (IsOpenbsd()) return; // b/c testing linux bpf int ws, pid, sv[2]; ASSERT_SYS(0, 0, socketpair(AF_UNIX, SOCK_STREAM, 0, sv)); ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio tty", 0)); ASSERT_SYS(0, 5, send(sv[0], "hello", 5, 0)); ASSERT_SYS(0, 5, sendto(sv[0], "hello", 5, 0, 0, 0)); isatty(0); ASSERT_NE(EPERM, errno); errno = 0; // set lower 32-bit word of pointer to zero lool struct sockaddr_in *sin = mmap((void *)0x300000000000, FRAMESIZE, PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0); sin->sin_family = AF_INET; ASSERT_SYS(EPERM, -1, sendto(sv[0], "hello", 5, 0, sin, sizeof(*sin))); _Exit(0); } close(sv[0]); close(sv[1]); EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws) && !WEXITSTATUS(ws)); } TEST(pledge, unix_forbidsInetSockets) { if (IsOpenbsd()) return; // b/c testing linux bpf int ws, pid; ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio unix", 0)); ASSERT_SYS(0, 3, socket(AF_UNIX, SOCK_STREAM, 0)); ASSERT_SYS(0, 4, socket(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0)); ASSERT_SYS(EPERM, -1, socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)); ASSERT_SYS(EPERM, -1, socket(AF_INET6, SOCK_STREAM, IPPROTO_TCP)); ASSERT_SYS(EPERM, -1, socket(AF_UNIX, SOCK_RAW, 0)); ASSERT_SYS(EPERM, -1, socket(AF_UNIX, SOCK_STREAM, 1)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws) && !WEXITSTATUS(ws)); } TEST(pledge, inet_forbidsOtherSockets) { if (IsOpenbsd()) return; // b/c testing linux bpf int ws, pid; ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio inet", 0)); ASSERT_SYS(0, 3, socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)); ASSERT_SYS(0, 4, socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP)); ASSERT_SYS(0, 5, socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)); ASSERT_SYS(0, 6, socket(AF_INET6, SOCK_DGRAM, IPPROTO_UDP)); ASSERT_SYS(0, 7, socket(AF_INET6, SOCK_DGRAM | SOCK_NONBLOCK, IPPROTO_UDP)); ASSERT_SYS(EPERM, -1, socket(AF_UNIX, SOCK_STREAM, 0)); ASSERT_SYS(EPERM, -1, socket(AF_BLUETOOTH, SOCK_DGRAM, IPPROTO_UDP)); ASSERT_SYS(EPERM, -1, socket(AF_INET, SOCK_RAW, IPPROTO_UDP)); ASSERT_SYS(EPERM, -1, socket(AF_INET, SOCK_DGRAM, IPPROTO_RAW)); struct sockaddr_in sin = {AF_INET, 0, {htonl(0x7f000001)}}; ASSERT_SYS(0, 0, bind(4, &sin, sizeof(sin))); uint32_t az = sizeof(sin); ASSERT_SYS(0, 0, getsockname(4, &sin, &az)); ASSERT_SYS(0, 5, sendto(3, "hello", 5, 0, &sin, sizeof(sin))); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws) && !WEXITSTATUS(ws)); } TEST(pledge, mmap) { if (IsOpenbsd()) return; // b/c testing linux bpf char *p; int ws, pid; ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio", 0)); ASSERT_NE(MAP_FAILED, (p = mmap(0, FRAMESIZE, PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0))); ASSERT_SYS(0, 0, mprotect(p, FRAMESIZE, PROT_READ)); ASSERT_SYS(EPERM, MAP_FAILED, mprotect(p, FRAMESIZE, PROT_READ | PROT_EXEC)); ASSERT_SYS(EPERM, MAP_FAILED, mmap(0, FRAMESIZE, PROT_EXEC | PROT_READ, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws) && !WEXITSTATUS(ws)); } TEST(pledge, mmapExec) { if (IsOpenbsd()) return; // b/c testing linux bpf char *p; int ws, pid; ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio exec", 0)); ASSERT_NE(MAP_FAILED, (p = mmap(0, FRAMESIZE, PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0))); ASSERT_SYS(0, 0, mprotect(p, FRAMESIZE, PROT_READ)); ASSERT_SYS(EPERM, MAP_FAILED, mprotect(p, FRAMESIZE, PROT_READ | PROT_EXEC)); ASSERT_NE(MAP_FAILED, mmap(0, FRAMESIZE, PROT_EXEC | PROT_READ, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws) && !WEXITSTATUS(ws)); } TEST(pledge, msyscall) { if (IsOpenbsd()) return; // b/c testing linux bpf int ax, ws, pid; ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio", 0)); // now issue authorized syscall where rip isn't privileged asm volatile("syscall" : "=a"(ax) : "0"(__NR_linux_dup), "D"(2) : "rcx", "r11", "memory"); _Exit(1); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFSIGNALED(ws)); EXPECT_EQ(SIGSYS, WTERMSIG(ws)); } TEST(pledge, chmod_ignoresDangerBits) { if (IsOpenbsd()) return; // b/c testing linux bpf int ws, pid; struct stat st; ASSERT_SYS(0, 3, creat("foo", 0644)); ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio rpath wpath", 0)); ASSERT_SYS(0, 0, fchmod(3, 00700)); ASSERT_SYS(0, 0, chmod("foo", 00700)); ASSERT_SYS(0, 0, fchmodat(AT_FDCWD, "foo", 00700, 0)); ASSERT_SYS(EPERM, -1, fchmod(3, 07700)); ASSERT_SYS(EPERM, -1, chmod("foo", 04700)); ASSERT_SYS(EPERM, -1, fchmodat(AT_FDCWD, "foo", 02700, 0)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws) && !WEXITSTATUS(ws)); close(3); } TEST(pledge, open_rpath) { if (IsOpenbsd()) return; // b/c testing linux bpf int ws, pid; struct stat st; ASSERT_SYS(0, 0, touch("foo", 0644)); ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio rpath", 0)); ASSERT_SYS(0, 3, open("foo", O_RDONLY)); ASSERT_SYS(EPERM, -1, open("foo", O_RDWR | O_TRUNC | O_CREAT, 0644)); ASSERT_SYS(EPERM, -1, open("foo", O_WRONLY | O_TRUNC | O_CREAT, 0644)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws) && !WEXITSTATUS(ws)); } TEST(pledge, open_wpath) { if (IsOpenbsd()) return; // b/c testing linux bpf int ws, pid; struct stat st; ASSERT_SYS(0, 0, touch("foo", 0644)); ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio wpath", 0)); ASSERT_SYS(0, 3, open("foo", O_RDONLY)); ASSERT_SYS(EPERM, -1, open(".", O_RDWR | O_TMPFILE, 07644)); ASSERT_SYS(EPERM, -1, open("foo", O_WRONLY | O_TRUNC | O_CREAT, 07644)); ASSERT_SYS(0, 4, open("foo", O_WRONLY | O_TRUNC | O_CREAT, 0644)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws) && !WEXITSTATUS(ws)); } TEST(pledge, sigaction_isFineButForbidsSigsys) { if (IsOpenbsd()) return; // b/c testing linux bpf int ws, pid; struct stat st; ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio", 0)); struct sigaction sa = {.sa_handler = OnSig}; ASSERT_SYS(0, 0, sigaction(SIGINT, &sa, 0)); ASSERT_SYS(EPERM, -1, sigaction(SIGSYS, &sa, 0)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws) && !WEXITSTATUS(ws)); }