/*-*- mode:c;indent-tabs-mode:nil;c-basic-offset:2;tab-width:8;coding:utf-8 -*-│ │vi: set net ft=c ts=2 sts=2 sw=2 fenc=utf-8 :vi│ ╞══════════════════════════════════════════════════════════════════════════════╡ │ Copyright 2022 Justine Alexandra Roberts Tunney │ │ │ │ Permission to use, copy, modify, and/or distribute this software for │ │ any purpose with or without fee is hereby granted, provided that the │ │ above copyright notice and this permission notice appear in all copies. │ │ │ │ THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL │ │ WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED │ │ WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE │ │ AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL │ │ DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR │ │ PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER │ │ TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR │ │ PERFORMANCE OF THIS SOFTWARE. │ ╚─────────────────────────────────────────────────────────────────────────────*/ #include "libc/calls/calls.h" #include "libc/calls/internal.h" #include "libc/calls/ioctl.h" #include "libc/calls/struct/bpf.h" #include "libc/calls/struct/filter.h" #include "libc/calls/struct/flock.h" #include "libc/calls/struct/seccomp.h" #include "libc/calls/struct/stat.h" #include "libc/calls/syscall_support-sysv.internal.h" #include "libc/dce.h" #include "libc/errno.h" #include "libc/mem/mem.h" #include "libc/runtime/runtime.h" #include "libc/sock/sock.h" #include "libc/sock/struct/sockaddr.h" #include "libc/sysv/consts/af.h" #include "libc/sysv/consts/at.h" #include "libc/sysv/consts/f.h" #include "libc/sysv/consts/fio.h" #include "libc/sysv/consts/ipproto.h" #include "libc/sysv/consts/map.h" #include "libc/sysv/consts/nrlinux.h" #include "libc/sysv/consts/o.h" #include "libc/sysv/consts/pr.h" #include "libc/sysv/consts/prot.h" #include "libc/sysv/consts/sig.h" #include "libc/sysv/consts/sock.h" #include "libc/testlib/testlib.h" char testlib_enable_tmp_setup_teardown; void SetUp(void) { if (!__is_linux_2_6_23() && !IsOpenbsd()) { exit(0); } } TEST(pledge, default_allowsExit) { int ws, pid; ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("", 0)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws)); EXPECT_EQ(0, WEXITSTATUS(ws)); } TEST(pledge, stdio_forbidsOpeningPasswd) { int ws, pid; ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio", 0)); ASSERT_SYS(EPERM, -1, open("/etc/passwd", O_RDWR)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); if (IsLinux()) { EXPECT_TRUE(WIFEXITED(ws)); EXPECT_EQ(0, WEXITSTATUS(ws)); } else { EXPECT_TRUE(WIFSIGNALED(ws)); EXPECT_EQ(SIGABRT, WTERMSIG(ws)); } } TEST(pledge, stdio_fcntl_allowsSomeFirstArgs) { if (IsOpenbsd()) return; // b/c testing linux bpf int ws, pid; struct flock lk; ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio", 0)); ASSERT_NE(-1, fcntl(0, F_GETFL)); ASSERT_SYS(0, 0, fcntl(0, F_GETFD)); ASSERT_SYS(0, 3, fcntl(2, F_DUPFD_CLOEXEC, 3)); ASSERT_SYS(0, 0, ioctl(0, FIOCLEX, 0)); ASSERT_SYS(EPERM, 0, isatty(0)); ASSERT_SYS(EPERM, -1, fcntl(0, -1)); ASSERT_SYS(EPERM, -1, fcntl(0, F_GETLK, &lk)); ASSERT_SYS(EPERM, -1, fcntl(0, F_NOTIFY)); ASSERT_SYS(EPERM, -1, socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws) && !WEXITSTATUS(ws)); } TEST(pledge, stdioTty_sendtoRestricted_requiresNullAddr) { if (IsOpenbsd()) return; // b/c testing linux bpf int ws, pid, sv[2]; struct sockaddr_in sa = {AF_UNIX}; ASSERT_SYS(0, 0, socketpair(AF_UNIX, SOCK_STREAM, 0, sv)); ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio tty", 0)); ASSERT_SYS(0, 5, send(sv[0], "hello", 5, 0)); ASSERT_SYS(0, 5, sendto(sv[0], "hello", 5, 0, 0, 0)); isatty(0); ASSERT_NE(EPERM, errno); errno = 0; ASSERT_SYS(EPERM, -1, sendto(sv[0], "hello", 5, 0, &sa, sizeof(sa))); _Exit(0); } close(sv[0]); close(sv[1]); EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws) && !WEXITSTATUS(ws)); } TEST(pledge, unix_forbidsInetSockets) { if (IsOpenbsd()) return; // b/c testing linux bpf int ws, pid; ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio unix", 0)); ASSERT_SYS(0, 3, socket(AF_UNIX, SOCK_STREAM, 0)); ASSERT_SYS(EPERM, -1, socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)); ASSERT_SYS(EPERM, -1, socket(AF_INET6, SOCK_STREAM, IPPROTO_TCP)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws) && !WEXITSTATUS(ws)); } TEST(pledge, inet_forbidsOtherSockets) { if (IsOpenbsd()) return; // b/c testing linux bpf int ws, pid; ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio inet", 0)); ASSERT_SYS(0, 3, socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)); ASSERT_SYS(0, 4, socket(AF_INET6, SOCK_DGRAM, IPPROTO_UDP)); ASSERT_SYS(EPERM, -1, socket(AF_UNIX, SOCK_STREAM, 0)); ASSERT_SYS(EPERM, -1, socket(AF_BLUETOOTH, SOCK_STREAM, 0)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws) && !WEXITSTATUS(ws)); } TEST(pledge, mmap) { if (IsOpenbsd()) return; // b/c testing linux bpf char *p; int ws, pid; ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio", 0)); ASSERT_NE(MAP_FAILED, (p = mmap(0, FRAMESIZE, PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0))); ASSERT_SYS(0, 0, mprotect(p, FRAMESIZE, PROT_READ)); ASSERT_SYS(EPERM, MAP_FAILED, mprotect(p, FRAMESIZE, PROT_READ | PROT_EXEC)); ASSERT_SYS(EPERM, MAP_FAILED, mmap(0, FRAMESIZE, PROT_EXEC | PROT_READ, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws) && !WEXITSTATUS(ws)); } TEST(pledge, msyscall) { if (IsOpenbsd()) return; // b/c testing linux bpf int ax, ws, pid; ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio", 0)); // now issue authorized syscall where rip isn't privileged asm volatile("syscall" : "=a"(ax) : "0"(__NR_linux_dup), "D"(2) : "rcx", "r11", "memory"); _Exit(1); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFSIGNALED(ws)); EXPECT_EQ(SIGSYS, WTERMSIG(ws)); } TEST(pledge, chmod_ignoresDangerBits) { if (IsOpenbsd()) return; // b/c testing linux bpf int ws, pid; struct stat st; ASSERT_SYS(0, 3, creat("foo", 0644)); ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio rpath", 0)); ASSERT_SYS(0, 0, fchmod(3, 00700)); ASSERT_SYS(0, 0, chmod("foo", 00700)); ASSERT_SYS(0, 0, fchmodat(AT_FDCWD, "foo", 00700, 0)); ASSERT_SYS(EPERM, -1, fchmod(3, 07700)); ASSERT_SYS(EPERM, -1, chmod("foo", 04700)); ASSERT_SYS(EPERM, -1, fchmodat(AT_FDCWD, "foo", 02700, 0)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws) && !WEXITSTATUS(ws)); close(3); } TEST(pledge, open_rpath) { if (IsOpenbsd()) return; // b/c testing linux bpf int ws, pid; struct stat st; ASSERT_SYS(0, 0, touch("foo", 0644)); ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio rpath", 0)); ASSERT_SYS(0, 3, open("foo", O_RDONLY)); ASSERT_SYS(EPERM, -1, open("foo", O_RDWR | O_TRUNC | O_CREAT, 0644)); ASSERT_SYS(EPERM, -1, open("foo", O_WRONLY | O_TRUNC | O_CREAT, 0644)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws) && !WEXITSTATUS(ws)); close(3); } TEST(pledge, open_wpath) { if (IsOpenbsd()) return; // b/c testing linux bpf int ws, pid; struct stat st; ASSERT_SYS(0, 0, touch("foo", 0644)); ASSERT_NE(-1, (pid = fork())); if (!pid) { ASSERT_SYS(0, 0, pledge("stdio wpath", 0)); ASSERT_SYS(0, 3, open("foo", O_RDONLY)); ASSERT_SYS(EPERM, -1, open(".", O_RDWR | O_TMPFILE, 07644)); ASSERT_SYS(EPERM, -1, open("foo", O_WRONLY | O_TRUNC | O_CREAT, 07644)); ASSERT_SYS(0, 4, open("foo", O_WRONLY | O_TRUNC | O_CREAT, 0644)); _Exit(0); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws) && !WEXITSTATUS(ws)); close(3); }