1 /*- 2 * Copyright (c) 2008-2009 Robert N. M. Watson 3 * Copyright (c) 2011 Jonathan Anderson 4 * All rights reserved. 5 * 6 * Redistribution and use in source and binary forms, with or without 7 * modification, are permitted provided that the following conditions 8 * are met: 9 * 1. Redistributions of source code must retain the above copyright 10 * notice, this list of conditions and the following disclaimer. 11 * 2. Redistributions in binary form must reproduce the above copyright 12 * notice, this list of conditions and the following disclaimer in the 13 * documentation and/or other materials provided with the distribution. 14 * 15 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 16 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 17 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 18 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 19 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25 * SUCH DAMAGE. 26 * 27 * $FreeBSD$ 28 */ 29 30 /* 31 * Test routines to make sure a variety of system calls are or are not 32 * available in capability mode. The goal is not to see if they work, just 33 * whether or not they return the expected ECAPMODE. 34 */ 35 36 #include <sys/cdefs.h> 37 __FBSDID("$FreeBSD$"); 38 39 #include <sys/param.h> 40 #include <sys/capsicum.h> 41 #include <sys/errno.h> 42 #include <sys/mman.h> 43 #include <sys/mount.h> 44 #include <sys/socket.h> 45 #include <sys/stat.h> 46 #include <sys/wait.h> 47 48 #include <machine/sysarch.h> 49 50 #include <err.h> 51 #include <fcntl.h> 52 #include <stdlib.h> 53 #include <string.h> 54 #include <unistd.h> 55 56 #include "cap_test.h" 57 58 #define CHECK_SYSCALL_VOID_NOT_ECAPMODE(syscall, ...) do { \ 59 errno = 0; \ 60 (void)syscall(__VA_ARGS__); \ 61 if (errno == ECAPMODE) \ 62 FAIL("capmode: %s failed with ECAPMODE", #syscall); \ 63 } while (0) 64 65 int 66 test_capmode(void) 67 { 68 struct statfs statfs; 69 struct stat sb; 70 long sysarch_arg = 0; 71 int fd_close, fd_dir, fd_file, fd_socket, fd2[2]; 72 int success = PASSED; 73 pid_t pid, wpid; 74 char ch; 75 76 /* Open some files to play with. */ 77 REQUIRE(fd_file = open("/tmp/cap_capmode", O_RDWR|O_CREAT, 0644)); 78 REQUIRE(fd_close = open("/dev/null", O_RDWR)); 79 REQUIRE(fd_dir = open("/tmp", O_RDONLY)); 80 REQUIRE(fd_socket = socket(PF_INET, SOCK_DGRAM, 0)); 81 82 /* Enter capability mode. */ 83 REQUIRE(cap_enter()); 84 85 /* 86 * System calls that are not permitted in capability mode. 87 */ 88 CHECK_CAPMODE(access, "/tmp/cap_capmode_access", F_OK); 89 CHECK_CAPMODE(acct, "/tmp/cap_capmode_acct"); 90 CHECK_CAPMODE(bind, PF_INET, NULL, 0); 91 CHECK_CAPMODE(chdir, "/tmp/cap_capmode_chdir"); 92 CHECK_CAPMODE(chflags, "/tmp/cap_capmode_chflags", UF_NODUMP); 93 CHECK_CAPMODE(chmod, "/tmp/cap_capmode_chmod", 0644); 94 CHECK_CAPMODE(chown, "/tmp/cap_capmode_chown", -1, -1); 95 CHECK_CAPMODE(chroot, "/tmp/cap_capmode_chroot"); 96 CHECK_CAPMODE(connect, PF_INET, NULL, 0); 97 CHECK_CAPMODE(creat, "/tmp/cap_capmode_creat", 0644); 98 CHECK_CAPMODE(fchdir, fd_dir); 99 CHECK_CAPMODE(getfsstat, &statfs, sizeof(statfs), MNT_NOWAIT); 100 CHECK_CAPMODE(link, "/tmp/foo", "/tmp/bar"); 101 CHECK_CAPMODE(lstat, "/tmp/cap_capmode_lstat", &sb); 102 CHECK_CAPMODE(mknod, "/tmp/capmode_mknod", 06440, 0); 103 CHECK_CAPMODE(mount, "procfs", "/not_mounted", 0, NULL); 104 CHECK_CAPMODE(open, "/dev/null", O_RDWR); 105 CHECK_CAPMODE(readlink, "/tmp/cap_capmode_readlink", NULL, 0); 106 CHECK_CAPMODE(revoke, "/tmp/cap_capmode_revoke"); 107 CHECK_CAPMODE(stat, "/tmp/cap_capmode_stat", &sb); 108 CHECK_CAPMODE(symlink, 109 "/tmp/cap_capmode_symlink_from", 110 "/tmp/cap_capmode_symlink_to"); 111 CHECK_CAPMODE(unlink, "/tmp/cap_capmode_unlink"); 112 CHECK_CAPMODE(unmount, "/not_mounted", 0); 113 114 /* 115 * System calls that are permitted in capability mode. 116 */ 117 CHECK_SYSCALL_SUCCEEDS(close, fd_close); 118 CHECK_SYSCALL_SUCCEEDS(dup, fd_file); 119 CHECK_SYSCALL_SUCCEEDS(fstat, fd_file, &sb); 120 CHECK_SYSCALL_SUCCEEDS(lseek, fd_file, 0, SEEK_SET); 121 CHECK_SYSCALL_SUCCEEDS(msync, &fd_file, 8192, MS_ASYNC); 122 CHECK_SYSCALL_SUCCEEDS(profil, NULL, 0, 0, 0); 123 CHECK_SYSCALL_SUCCEEDS(read, fd_file, &ch, sizeof(ch)); 124 CHECK_SYSCALL_SUCCEEDS(recvfrom, fd_socket, NULL, 0, 0, NULL, NULL); 125 CHECK_SYSCALL_SUCCEEDS(setuid, getuid()); 126 CHECK_SYSCALL_SUCCEEDS(write, fd_file, &ch, sizeof(ch)); 127 128 /* 129 * These calls will fail for lack of e.g. a proper name to send to, 130 * but they are allowed in capability mode, so errno != ECAPMODE. 131 */ 132 CHECK_NOT_CAPMODE(accept, fd_socket, NULL, NULL); 133 CHECK_NOT_CAPMODE(getpeername, fd_socket, NULL, NULL); 134 CHECK_NOT_CAPMODE(getsockname, fd_socket, NULL, NULL); 135 CHECK_NOT_CAPMODE(fchflags, fd_file, UF_NODUMP); 136 CHECK_NOT_CAPMODE(recvmsg, fd_socket, NULL, 0); 137 CHECK_NOT_CAPMODE(sendmsg, fd_socket, NULL, 0); 138 CHECK_NOT_CAPMODE(sendto, fd_socket, NULL, 0, 0, NULL, 0); 139 140 /* 141 * System calls which should be allowed in capability mode, but which 142 * don't return errors, and are thus difficult to check. 143 * 144 * We will try anyway, by checking errno. 145 */ 146 CHECK_SYSCALL_VOID_NOT_ECAPMODE(getegid); 147 CHECK_SYSCALL_VOID_NOT_ECAPMODE(geteuid); 148 CHECK_SYSCALL_VOID_NOT_ECAPMODE(getgid); 149 CHECK_SYSCALL_VOID_NOT_ECAPMODE(getpid); 150 CHECK_SYSCALL_VOID_NOT_ECAPMODE(getppid); 151 CHECK_SYSCALL_VOID_NOT_ECAPMODE(getuid); 152 153 /* 154 * Finally, tests for system calls that don't fit the pattern very well. 155 */ 156 pid = fork(); 157 if (pid >= 0) { 158 if (pid == 0) { 159 exit(0); 160 } else if (pid > 0) { 161 wpid = waitpid(pid, NULL, 0); 162 if (wpid < 0) { 163 if (errno != ECAPMODE) 164 FAIL("capmode:waitpid"); 165 } else 166 FAIL("capmode:waitpid succeeded"); 167 } 168 } else 169 FAIL("capmode:fork"); 170 171 if (getlogin() == NULL) 172 FAIL("test_sycalls:getlogin %d", errno); 173 174 if (getsockname(fd_socket, NULL, NULL) < 0) { 175 if (errno == ECAPMODE) 176 FAIL("capmode:getsockname"); 177 } 178 179 /* XXXRW: ktrace */ 180 181 if (pipe(fd2) == 0) { 182 close(fd2[0]); 183 close(fd2[1]); 184 } else if (errno == ECAPMODE) 185 FAIL("capmode:pipe"); 186 187 /* XXXRW: ptrace. */ 188 189 /* sysarch() is, by definition, architecture-dependent */ 190 #if defined (__amd64__) || defined (__i386__) 191 CHECK_CAPMODE(sysarch, I386_SET_IOPERM, &sysarch_arg); 192 #else 193 /* XXXJA: write a test for arm */ 194 FAIL("capmode:no sysarch() test for current architecture"); 195 #endif 196 197 /* XXXRW: No error return from sync(2) to test. */ 198 199 return (success); 200 } 201