mirror of
https://github.com/jart/cosmopolitan.git
synced 2025-02-01 03:53:33 +00:00
f531acc8f9
- Invent openatemp() API - Invent O_UNLINK open flag - Introduce getenv_secure() API - Remove `git pull` from cosmocc - Fix utimes() when path is NULL - Fix mktemp() to never return NULL - Fix utimensat() UTIME_OMIT on XNU - Improve utimensat() code for RHEL5 - Turn `argv[0]` C:/ to /C/ on Windows - Introduce tmpnam() and tmpnam_r() APIs - Fix more const issues with internal APIs - Permit utimes() on WIN32 in O_RDONLY mode - Fix fdopendir() to check fd is a directory - Fix recent crash regression in landlock make - Fix futimens(AT_FDCWD, NULL) to return EBADF - Use workaround so `make -j` doesn't fork bomb - Rename dontdiscard to __wur (just like glibc) - Fix st_size for WIN32 symlinks containing UTF-8 - Introduce stdio ext APIs needed by GNU coreutils - Fix lstat() on WIN32 for symlinks to directories - Move some constants from normalize.inc to limits.h - Fix segv with memchr() and memcmp() overlapping page - Implement POSIX fflush() behavior for reader streams - Implement AT_SYMLINK_NOFOLLOW for utimensat() on WIN32 - Don't change read-only status of existing files on WIN32 - Correctly handle `0x[^[:xdigit:]]` case in strtol() functions
135 lines
5.3 KiB
C
135 lines
5.3 KiB
C
/*-*- mode:c;indent-tabs-mode:nil;c-basic-offset:2;tab-width:8;coding:utf-8 -*-│
|
|
│vi: set net ft=c ts=2 sts=2 sw=2 fenc=utf-8 :vi│
|
|
╞══════════════════════════════════════════════════════════════════════════════╡
|
|
│ Copyright 2022 Justine Alexandra Roberts Tunney │
|
|
│ │
|
|
│ Permission to use, copy, modify, and/or distribute this software for │
|
|
│ any purpose with or without fee is hereby granted, provided that the │
|
|
│ above copyright notice and this permission notice appear in all copies. │
|
|
│ │
|
|
│ THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL │
|
|
│ WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED │
|
|
│ WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE │
|
|
│ AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL │
|
|
│ DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR │
|
|
│ PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER │
|
|
│ TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR │
|
|
│ PERFORMANCE OF THIS SOFTWARE. │
|
|
╚─────────────────────────────────────────────────────────────────────────────*/
|
|
#include "libc/calls/calls.h"
|
|
#include "libc/calls/internal.h"
|
|
#include "libc/calls/struct/bpf.internal.h"
|
|
#include "libc/calls/struct/filter.internal.h"
|
|
#include "libc/calls/struct/iovec.h"
|
|
#include "libc/calls/struct/seccomp.internal.h"
|
|
#include "libc/calls/syscall_support-sysv.internal.h"
|
|
#include "libc/errno.h"
|
|
#include "libc/runtime/runtime.h"
|
|
#include "libc/sock/sock.h"
|
|
#include "libc/sysv/consts/audit.h"
|
|
#include "libc/sysv/consts/o.h"
|
|
#include "libc/sysv/consts/pr.h"
|
|
#include "libc/sysv/consts/sig.h"
|
|
#include "libc/testlib/testlib.h"
|
|
#include "tool/net/sandbox.h"
|
|
|
|
void SetUpOnce(void) {
|
|
ASSERT_SYS(0, 0, pledge("stdio proc", 0));
|
|
}
|
|
|
|
// It's been reported that Chromebooks return EINVAL here.
|
|
bool CanUseSeccomp(void) {
|
|
int ws, pid;
|
|
ASSERT_NE(-1, (pid = fork()));
|
|
if (!pid) {
|
|
if (seccomp(SECCOMP_SET_MODE_STRICT, 0, 0) != -1) {
|
|
_Exit1(0);
|
|
} else {
|
|
_Exit1(1);
|
|
}
|
|
}
|
|
EXPECT_NE(-1, wait(&ws));
|
|
return WIFEXITED(ws) && !WEXITSTATUS(ws);
|
|
}
|
|
|
|
void SetUp(void) {
|
|
if (!IsLinux() || !__is_linux_2_6_23() || !CanUseSeccomp()) {
|
|
exit(0);
|
|
}
|
|
}
|
|
|
|
TEST(seccompStrictMode, evilProcess_getsKill9d) {
|
|
int ws, pid;
|
|
ASSERT_NE(-1, (pid = fork()));
|
|
if (!pid) {
|
|
EXPECT_EQ(0, seccomp(SECCOMP_SET_MODE_STRICT, 0, 0));
|
|
open("/etc/passwd", O_RDWR);
|
|
_Exit1(127);
|
|
}
|
|
EXPECT_NE(-1, wait(&ws));
|
|
EXPECT_TRUE(WIFSIGNALED(ws));
|
|
EXPECT_EQ(SIGKILL, WTERMSIG(ws));
|
|
}
|
|
|
|
TEST(seccompStrictMode, goodProcess_isAuthorized) {
|
|
int ws, pid;
|
|
int pfds[2];
|
|
char buf[3] = {0};
|
|
ASSERT_SYS(0, 0, pipe(pfds));
|
|
ASSERT_NE(-1, (pid = fork()));
|
|
if (!pid) {
|
|
EXPECT_EQ(0, seccomp(SECCOMP_SET_MODE_STRICT, 0, 0));
|
|
write(pfds[1], "hi", 3);
|
|
_Exit1(0);
|
|
}
|
|
EXPECT_SYS(0, 0, close(pfds[1]));
|
|
EXPECT_SYS(0, 3, read(pfds[0], buf, 3));
|
|
EXPECT_SYS(0, 0, close(pfds[0]));
|
|
EXPECT_NE(-1, wait(&ws));
|
|
EXPECT_TRUE(WIFEXITED(ws));
|
|
EXPECT_EQ(0, WEXITSTATUS(ws));
|
|
EXPECT_STREQ("hi", buf);
|
|
}
|
|
|
|
TEST(seccompFilter, isSoMuchBetter) {
|
|
char buf[3] = {0};
|
|
int ws, pid, pfds[2];
|
|
ASSERT_SYS(0, 0, pipe(pfds));
|
|
ASSERT_NE(-1, (pid = fork()));
|
|
if (!pid) {
|
|
struct sock_filter filter[] = {
|
|
_SECCOMP_MACHINE(AUDIT_ARCH_X86_64), //
|
|
_SECCOMP_LOAD_SYSCALL_NR(), //
|
|
_SECCOMP_ALLOW_SYSCALL(0x0013), // readv
|
|
_SECCOMP_ALLOW_SYSCALL(0x0014), // writev
|
|
_SECCOMP_ALLOW_SYSCALL(0x0000), // read
|
|
_SECCOMP_ALLOW_SYSCALL(0x0001), // write
|
|
_SECCOMP_ALLOW_SYSCALL(0x0003), // close
|
|
_SECCOMP_ALLOW_SYSCALL(0x000f), // rt_sigreturn
|
|
_SECCOMP_ALLOW_SYSCALL(0x00e7), // exit_group
|
|
_SECCOMP_ALLOW_SYSCALL(0x0009), // mmap
|
|
_SECCOMP_ALLOW_SYSCALL(0x0106), // newfstatat
|
|
_SECCOMP_ALLOW_SYSCALL(0x0008), // lseek
|
|
_SECCOMP_ALLOW_SYSCALL(0x000b), // munmap
|
|
_SECCOMP_ALLOW_SYSCALL(0x00e4), // clock_gettime
|
|
_SECCOMP_ALLOW_SYSCALL(0x003f), // uname
|
|
_SECCOMP_LOG_AND_RETURN_ERRNO(1), // EPERM
|
|
};
|
|
struct sock_fprog prog = {
|
|
.len = ARRAYLEN(filter),
|
|
.filter = filter,
|
|
};
|
|
ASSERT_EQ(0, prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0));
|
|
ASSERT_EQ(0, prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog));
|
|
ASSERT_SYS(0, 3, write(pfds[1], "hi", 3));
|
|
ASSERT_SYS(EPERM, -1, open("/etc/passwd", O_RDONLY));
|
|
_Exit(0);
|
|
}
|
|
EXPECT_SYS(0, 0, close(pfds[1]));
|
|
EXPECT_SYS(0, 3, read(pfds[0], buf, 3));
|
|
EXPECT_SYS(0, 0, close(pfds[0]));
|
|
EXPECT_NE(-1, wait(&ws));
|
|
EXPECT_TRUE(WIFEXITED(ws));
|
|
EXPECT_EQ(0, WEXITSTATUS(ws));
|
|
EXPECT_STREQ("hi", buf);
|
|
}
|