Path: blob/master/tools/testing/selftests/exec/check-exec.c
26285 views
// SPDX-License-Identifier: GPL-2.01/*2* Test execveat(2) with AT_EXECVE_CHECK, and prctl(2) with3* SECBIT_EXEC_RESTRICT_FILE, SECBIT_EXEC_DENY_INTERACTIVE, and their locked4* counterparts.5*6* Copyright © 2018-2020 ANSSI7* Copyright © 2024 Microsoft Corporation8*9* Author: Mickaël Salaün <[email protected]>10*/1112#include <asm-generic/unistd.h>13#include <errno.h>14#include <fcntl.h>15#include <linux/prctl.h>16#include <linux/securebits.h>17#include <stdio.h>18#include <stdlib.h>19#include <sys/capability.h>20#include <sys/mount.h>21#include <sys/prctl.h>22#include <sys/socket.h>23#include <sys/stat.h>24#include <sys/syscall.h>25#include <sys/sysmacros.h>26#include <unistd.h>2728/* Defines AT_EXECVE_CHECK without type conflicts. */29#define _ASM_GENERIC_FCNTL_H30#include <linux/fcntl.h>3132#include "../kselftest_harness.h"3334static int sys_execveat(int dirfd, const char *pathname, char *const argv[],35char *const envp[], int flags)36{37return syscall(__NR_execveat, dirfd, pathname, argv, envp, flags);38}3940static void drop_privileges(struct __test_metadata *const _metadata)41{42const unsigned int noroot = SECBIT_NOROOT | SECBIT_NOROOT_LOCKED;43cap_t cap_p;4445if ((cap_get_secbits() & noroot) != noroot)46EXPECT_EQ(0, cap_set_secbits(noroot));4748cap_p = cap_get_proc();49EXPECT_NE(NULL, cap_p);50EXPECT_NE(-1, cap_clear(cap_p));5152/*53* Drops everything, especially CAP_SETPCAP, CAP_DAC_OVERRIDE, and54* CAP_DAC_READ_SEARCH.55*/56EXPECT_NE(-1, cap_set_proc(cap_p));57EXPECT_NE(-1, cap_free(cap_p));58}5960static int test_secbits_set(const unsigned int secbits)61{62int err;6364err = prctl(PR_SET_SECUREBITS, secbits);65if (err)66return errno;67return 0;68}6970FIXTURE(access)71{72int memfd, pipefd;73int pipe_fds[2], socket_fds[2];74};7576FIXTURE_VARIANT(access)77{78const bool mount_exec;79const bool file_exec;80};8182/* clang-format off */83FIXTURE_VARIANT_ADD(access, mount_exec_file_exec) {84/* clang-format on */85.mount_exec = true,86.file_exec = true,87};8889/* clang-format off */90FIXTURE_VARIANT_ADD(access, mount_exec_file_noexec) {91/* clang-format on */92.mount_exec = true,93.file_exec = false,94};9596/* clang-format off */97FIXTURE_VARIANT_ADD(access, mount_noexec_file_exec) {98/* clang-format on */99.mount_exec = false,100.file_exec = true,101};102103/* clang-format off */104FIXTURE_VARIANT_ADD(access, mount_noexec_file_noexec) {105/* clang-format on */106.mount_exec = false,107.file_exec = false,108};109110static const char binary_path[] = "./false";111static const char workdir_path[] = "./test-mount";112static const char reg_file_path[] = "./test-mount/regular_file";113static const char dir_path[] = "./test-mount/directory";114static const char block_dev_path[] = "./test-mount/block_device";115static const char char_dev_path[] = "./test-mount/character_device";116static const char fifo_path[] = "./test-mount/fifo";117118FIXTURE_SETUP(access)119{120int procfd_path_size;121static const char path_template[] = "/proc/self/fd/%d";122char procfd_path[sizeof(path_template) + 10];123124/* Makes sure we are not already restricted nor locked. */125EXPECT_EQ(0, test_secbits_set(0));126127/*128* Cleans previous workspace if any error previously happened (don't129* check errors).130*/131umount(workdir_path);132rmdir(workdir_path);133134/* Creates a clean mount point. */135ASSERT_EQ(0, mkdir(workdir_path, 00700));136ASSERT_EQ(0, mount("test", workdir_path, "tmpfs",137MS_MGC_VAL | (variant->mount_exec ? 0 : MS_NOEXEC),138"mode=0700,size=9m"));139140/* Creates a regular file. */141ASSERT_EQ(0, mknod(reg_file_path,142S_IFREG | (variant->file_exec ? 0700 : 0600), 0));143/* Creates a directory. */144ASSERT_EQ(0, mkdir(dir_path, variant->file_exec ? 0700 : 0600));145/* Creates a character device: /dev/null. */146ASSERT_EQ(0, mknod(char_dev_path, S_IFCHR | 0400, makedev(1, 3)));147/* Creates a block device: /dev/loop0 */148ASSERT_EQ(0, mknod(block_dev_path, S_IFBLK | 0400, makedev(7, 0)));149/* Creates a fifo. */150ASSERT_EQ(0, mknod(fifo_path, S_IFIFO | 0600, 0));151152/* Creates a regular file without user mount point. */153self->memfd = memfd_create("test-exec-probe", MFD_CLOEXEC);154ASSERT_LE(0, self->memfd);155/* Sets mode, which must be ignored by the exec check. */156ASSERT_EQ(0, fchmod(self->memfd, variant->file_exec ? 0700 : 0600));157158/* Creates a pipefs file descriptor. */159ASSERT_EQ(0, pipe(self->pipe_fds));160procfd_path_size = snprintf(procfd_path, sizeof(procfd_path),161path_template, self->pipe_fds[0]);162ASSERT_LT(procfd_path_size, sizeof(procfd_path));163self->pipefd = open(procfd_path, O_RDWR | O_CLOEXEC);164ASSERT_LE(0, self->pipefd);165ASSERT_EQ(0, fchmod(self->pipefd, variant->file_exec ? 0700 : 0600));166167/* Creates a socket file descriptor. */168ASSERT_EQ(0, socketpair(AF_UNIX, SOCK_DGRAM | SOCK_CLOEXEC, 0,169self->socket_fds));170}171172FIXTURE_TEARDOWN_PARENT(access)173{174/* There is no need to unlink the test files. */175EXPECT_EQ(0, umount(workdir_path));176EXPECT_EQ(0, rmdir(workdir_path));177}178179static void fill_exec_fd(struct __test_metadata *_metadata, const int fd_out)180{181char buf[1024];182size_t len;183int fd_in;184185fd_in = open(binary_path, O_CLOEXEC | O_RDONLY);186ASSERT_LE(0, fd_in);187/* Cannot use copy_file_range(2) because of EXDEV. */188len = read(fd_in, buf, sizeof(buf));189EXPECT_LE(0, len);190while (len > 0) {191EXPECT_EQ(len, write(fd_out, buf, len))192{193TH_LOG("Failed to write: %s (%d)", strerror(errno),194errno);195}196len = read(fd_in, buf, sizeof(buf));197EXPECT_LE(0, len);198}199EXPECT_EQ(0, close(fd_in));200}201202static void fill_exec_path(struct __test_metadata *_metadata,203const char *const path)204{205int fd_out;206207fd_out = open(path, O_CLOEXEC | O_WRONLY);208ASSERT_LE(0, fd_out)209{210TH_LOG("Failed to open %s: %s", path, strerror(errno));211}212fill_exec_fd(_metadata, fd_out);213EXPECT_EQ(0, close(fd_out));214}215216static void test_exec_fd(struct __test_metadata *_metadata, const int fd,217const int err_code)218{219char *const argv[] = { "", NULL };220int access_ret, access_errno;221222/*223* If we really execute fd, filled with the "false" binary, the current224* thread will exits with an error, which will be interpreted by the225* test framework as an error. With AT_EXECVE_CHECK, we only check a226* potential successful execution.227*/228access_ret = sys_execveat(fd, "", argv, NULL,229AT_EMPTY_PATH | AT_EXECVE_CHECK);230access_errno = errno;231if (err_code) {232EXPECT_EQ(-1, access_ret);233EXPECT_EQ(err_code, access_errno)234{235TH_LOG("Wrong error for execveat(2): %s (%d)",236strerror(access_errno), errno);237}238} else {239EXPECT_EQ(0, access_ret)240{241TH_LOG("Access denied: %s", strerror(access_errno));242}243}244}245246static void test_exec_path(struct __test_metadata *_metadata,247const char *const path, const int err_code)248{249int flags = O_CLOEXEC;250int fd;251252/* Do not block on pipes. */253if (path == fifo_path)254flags |= O_NONBLOCK;255256fd = open(path, flags | O_RDONLY);257ASSERT_LE(0, fd)258{259TH_LOG("Failed to open %s: %s", path, strerror(errno));260}261test_exec_fd(_metadata, fd, err_code);262EXPECT_EQ(0, close(fd));263}264265/* Tests that we don't get ENOEXEC. */266TEST_F(access, regular_file_empty)267{268const int exec = variant->mount_exec && variant->file_exec;269270test_exec_path(_metadata, reg_file_path, exec ? 0 : EACCES);271272drop_privileges(_metadata);273test_exec_path(_metadata, reg_file_path, exec ? 0 : EACCES);274}275276TEST_F(access, regular_file_elf)277{278const int exec = variant->mount_exec && variant->file_exec;279280fill_exec_path(_metadata, reg_file_path);281282test_exec_path(_metadata, reg_file_path, exec ? 0 : EACCES);283284drop_privileges(_metadata);285test_exec_path(_metadata, reg_file_path, exec ? 0 : EACCES);286}287288/* Tests that we don't get ENOEXEC. */289TEST_F(access, memfd_empty)290{291const int exec = variant->file_exec;292293test_exec_fd(_metadata, self->memfd, exec ? 0 : EACCES);294295drop_privileges(_metadata);296test_exec_fd(_metadata, self->memfd, exec ? 0 : EACCES);297}298299TEST_F(access, memfd_elf)300{301const int exec = variant->file_exec;302303fill_exec_fd(_metadata, self->memfd);304305test_exec_fd(_metadata, self->memfd, exec ? 0 : EACCES);306307drop_privileges(_metadata);308test_exec_fd(_metadata, self->memfd, exec ? 0 : EACCES);309}310311TEST_F(access, non_regular_files)312{313test_exec_path(_metadata, dir_path, EACCES);314test_exec_path(_metadata, block_dev_path, EACCES);315test_exec_path(_metadata, char_dev_path, EACCES);316test_exec_path(_metadata, fifo_path, EACCES);317test_exec_fd(_metadata, self->socket_fds[0], EACCES);318test_exec_fd(_metadata, self->pipefd, EACCES);319}320321/* clang-format off */322FIXTURE(secbits) {};323/* clang-format on */324325FIXTURE_VARIANT(secbits)326{327const bool is_privileged;328const int error;329};330331/* clang-format off */332FIXTURE_VARIANT_ADD(secbits, priv) {333/* clang-format on */334.is_privileged = true,335.error = 0,336};337338/* clang-format off */339FIXTURE_VARIANT_ADD(secbits, unpriv) {340/* clang-format on */341.is_privileged = false,342.error = EPERM,343};344345FIXTURE_SETUP(secbits)346{347/* Makes sure no exec bits are set. */348EXPECT_EQ(0, test_secbits_set(0));349EXPECT_EQ(0, prctl(PR_GET_SECUREBITS));350351if (!variant->is_privileged)352drop_privileges(_metadata);353}354355FIXTURE_TEARDOWN(secbits)356{357}358359TEST_F(secbits, legacy)360{361EXPECT_EQ(variant->error, test_secbits_set(0));362}363364#define CHILD(...) \365do { \366pid_t child = vfork(); \367EXPECT_LE(0, child); \368if (child == 0) { \369__VA_ARGS__; \370_exit(0); \371} \372} while (0)373374TEST_F(secbits, exec)375{376unsigned int secbits = prctl(PR_GET_SECUREBITS);377378secbits |= SECBIT_EXEC_RESTRICT_FILE;379EXPECT_EQ(0, test_secbits_set(secbits));380EXPECT_EQ(secbits, prctl(PR_GET_SECUREBITS));381CHILD(EXPECT_EQ(secbits, prctl(PR_GET_SECUREBITS)));382383secbits |= SECBIT_EXEC_DENY_INTERACTIVE;384EXPECT_EQ(0, test_secbits_set(secbits));385EXPECT_EQ(secbits, prctl(PR_GET_SECUREBITS));386CHILD(EXPECT_EQ(secbits, prctl(PR_GET_SECUREBITS)));387388secbits &= ~(SECBIT_EXEC_RESTRICT_FILE | SECBIT_EXEC_DENY_INTERACTIVE);389EXPECT_EQ(0, test_secbits_set(secbits));390EXPECT_EQ(secbits, prctl(PR_GET_SECUREBITS));391CHILD(EXPECT_EQ(secbits, prctl(PR_GET_SECUREBITS)));392}393394TEST_F(secbits, check_locked_set)395{396unsigned int secbits = prctl(PR_GET_SECUREBITS);397398secbits |= SECBIT_EXEC_RESTRICT_FILE;399EXPECT_EQ(0, test_secbits_set(secbits));400secbits |= SECBIT_EXEC_RESTRICT_FILE_LOCKED;401EXPECT_EQ(0, test_secbits_set(secbits));402403/* Checks lock set but unchanged. */404EXPECT_EQ(variant->error, test_secbits_set(secbits));405CHILD(EXPECT_EQ(variant->error, test_secbits_set(secbits)));406407secbits &= ~SECBIT_EXEC_RESTRICT_FILE;408EXPECT_EQ(EPERM, test_secbits_set(0));409CHILD(EXPECT_EQ(EPERM, test_secbits_set(0)));410}411412TEST_F(secbits, check_locked_unset)413{414unsigned int secbits = prctl(PR_GET_SECUREBITS);415416secbits |= SECBIT_EXEC_RESTRICT_FILE_LOCKED;417EXPECT_EQ(0, test_secbits_set(secbits));418419/* Checks lock unset but unchanged. */420EXPECT_EQ(variant->error, test_secbits_set(secbits));421CHILD(EXPECT_EQ(variant->error, test_secbits_set(secbits)));422423secbits &= ~SECBIT_EXEC_RESTRICT_FILE;424EXPECT_EQ(EPERM, test_secbits_set(0));425CHILD(EXPECT_EQ(EPERM, test_secbits_set(0)));426}427428TEST_F(secbits, restrict_locked_set)429{430unsigned int secbits = prctl(PR_GET_SECUREBITS);431432secbits |= SECBIT_EXEC_DENY_INTERACTIVE;433EXPECT_EQ(0, test_secbits_set(secbits));434secbits |= SECBIT_EXEC_DENY_INTERACTIVE_LOCKED;435EXPECT_EQ(0, test_secbits_set(secbits));436437/* Checks lock set but unchanged. */438EXPECT_EQ(variant->error, test_secbits_set(secbits));439CHILD(EXPECT_EQ(variant->error, test_secbits_set(secbits)));440441secbits &= ~SECBIT_EXEC_DENY_INTERACTIVE;442EXPECT_EQ(EPERM, test_secbits_set(0));443CHILD(EXPECT_EQ(EPERM, test_secbits_set(0)));444}445446TEST_F(secbits, restrict_locked_unset)447{448unsigned int secbits = prctl(PR_GET_SECUREBITS);449450secbits |= SECBIT_EXEC_DENY_INTERACTIVE_LOCKED;451EXPECT_EQ(0, test_secbits_set(secbits));452453/* Checks lock unset but unchanged. */454EXPECT_EQ(variant->error, test_secbits_set(secbits));455CHILD(EXPECT_EQ(variant->error, test_secbits_set(secbits)));456457secbits &= ~SECBIT_EXEC_DENY_INTERACTIVE;458EXPECT_EQ(EPERM, test_secbits_set(0));459CHILD(EXPECT_EQ(EPERM, test_secbits_set(0)));460}461462TEST_HARNESS_MAIN463464465