/*-*- mode:c;indent-tabs-mode:nil;c-basic-offset:2;tab-width:8;coding:utf-8 -*-│ │vi: set net ft=c ts=2 sts=2 sw=2 fenc=utf-8 :vi│ ╞══════════════════════════════════════════════════════════════════════════════╡ │ Copyright 2022 Justine Alexandra Roberts Tunney │ │ │ │ Permission to use, copy, modify, and/or distribute this software for │ │ any purpose with or without fee is hereby granted, provided that the │ │ above copyright notice and this permission notice appear in all copies. │ │ │ │ THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL │ │ WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED │ │ WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE │ │ AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL │ │ DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR │ │ PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER │ │ TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR │ │ PERFORMANCE OF THIS SOFTWARE. │ ╚─────────────────────────────────────────────────────────────────────────────*/ #include "libc/calls/calls.h" #include "libc/calls/internal.h" #include "libc/calls/struct/bpf.h" #include "libc/calls/struct/filter.h" #include "libc/calls/struct/iovec.h" #include "libc/calls/struct/seccomp.h" #include "libc/calls/syscall_support-sysv.internal.h" #include "libc/errno.h" #include "libc/runtime/runtime.h" #include "libc/sock/sock.h" #include "libc/sysv/consts/audit.h" #include "libc/sysv/consts/o.h" #include "libc/sysv/consts/pr.h" #include "libc/sysv/consts/sig.h" #include "libc/testlib/testlib.h" #include "tool/net/sandbox.h" void SetUpOnce(void) { ASSERT_SYS(0, 0, pledge("stdio proc", 0)); } // It's been reported that Chromebooks return EINVAL here. bool CanUseSeccomp(void) { int ws, pid; ASSERT_NE(-1, (pid = fork())); if (!pid) { if (seccomp(SECCOMP_SET_MODE_STRICT, 0, 0) != -1) { _Exit1(0); } else { _Exit1(1); } } EXPECT_NE(-1, wait(&ws)); return WIFEXITED(ws) && !WEXITSTATUS(ws); } void SetUp(void) { if (!__is_linux_2_6_23() || !CanUseSeccomp()) { exit(0); } } TEST(seccompStrictMode, evilProcess_getsKill9d) { int ws, pid; ASSERT_NE(-1, (pid = fork())); if (!pid) { EXPECT_EQ(0, seccomp(SECCOMP_SET_MODE_STRICT, 0, 0)); open("/etc/passwd", O_RDWR); _Exit1(127); } EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFSIGNALED(ws)); EXPECT_EQ(SIGKILL, WTERMSIG(ws)); } TEST(seccompStrictMode, goodProcess_isAuthorized) { int ws, pid; int pfds[2]; char buf[3] = {0}; ASSERT_SYS(0, 0, pipe(pfds)); ASSERT_NE(-1, (pid = fork())); if (!pid) { EXPECT_EQ(0, seccomp(SECCOMP_SET_MODE_STRICT, 0, 0)); write(pfds[1], "hi", 3); _Exit1(0); } EXPECT_SYS(0, 0, close(pfds[1])); EXPECT_SYS(0, 3, read(pfds[0], buf, 3)); EXPECT_SYS(0, 0, close(pfds[0])); EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws)); EXPECT_EQ(0, WEXITSTATUS(ws)); EXPECT_STREQ("hi", buf); } TEST(seccompFilter, isSoMuchBetter) { char buf[3] = {0}; int ws, pid, pfds[2]; ASSERT_SYS(0, 0, pipe(pfds)); ASSERT_NE(-1, (pid = fork())); if (!pid) { struct sock_filter filter[] = { _SECCOMP_MACHINE(AUDIT_ARCH_X86_64), // _SECCOMP_LOAD_SYSCALL_NR(), // _SECCOMP_ALLOW_SYSCALL(0x0013), // readv _SECCOMP_ALLOW_SYSCALL(0x0014), // writev _SECCOMP_ALLOW_SYSCALL(0x0000), // read _SECCOMP_ALLOW_SYSCALL(0x0001), // write _SECCOMP_ALLOW_SYSCALL(0x0003), // close _SECCOMP_ALLOW_SYSCALL(0x000f), // rt_sigreturn _SECCOMP_ALLOW_SYSCALL(0x00e7), // exit_group _SECCOMP_ALLOW_SYSCALL(0x0009), // mmap _SECCOMP_ALLOW_SYSCALL(0x0106), // newfstatat _SECCOMP_ALLOW_SYSCALL(0x0008), // lseek _SECCOMP_ALLOW_SYSCALL(0x000b), // munmap _SECCOMP_ALLOW_SYSCALL(0x00e4), // clock_gettime _SECCOMP_ALLOW_SYSCALL(0x003f), // uname _SECCOMP_LOG_AND_RETURN_ERRNO(1), // EPERM }; struct sock_fprog prog = { .len = ARRAYLEN(filter), .filter = filter, }; ASSERT_EQ(0, prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0)); ASSERT_EQ(0, prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog)); ASSERT_SYS(0, 3, write(pfds[1], "hi", 3)); ASSERT_SYS(EPERM, -1, open("/etc/passwd", O_RDONLY)); _Exit(0); } EXPECT_SYS(0, 0, close(pfds[1])); EXPECT_SYS(0, 3, read(pfds[0], buf, 3)); EXPECT_SYS(0, 0, close(pfds[0])); EXPECT_NE(-1, wait(&ws)); EXPECT_TRUE(WIFEXITED(ws)); EXPECT_EQ(0, WEXITSTATUS(ws)); EXPECT_STREQ("hi", buf); }