t_ptrace.c revision 1.1
11.1Skamil/*	$NetBSD: t_ptrace.c,v 1.1 2017/04/02 21:44:00 kamil Exp $	*/
21.1Skamil
31.1Skamil/*-
41.1Skamil * Copyright (c) 2016 The NetBSD Foundation, Inc.
51.1Skamil * All rights reserved.
61.1Skamil *
71.1Skamil * Redistribution and use in source and binary forms, with or without
81.1Skamil * modification, are permitted provided that the following conditions
91.1Skamil * are met:
101.1Skamil * 1. Redistributions of source code must retain the above copyright
111.1Skamil *    notice, this list of conditions and the following disclaimer.
121.1Skamil * 2. Redistributions in binary form must reproduce the above copyright
131.1Skamil *    notice, this list of conditions and the following disclaimer in the
141.1Skamil *    documentation and/or other materials provided with the distribution.
151.1Skamil *
161.1Skamil * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
171.1Skamil * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
181.1Skamil * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
191.1Skamil * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
201.1Skamil * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
211.1Skamil * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
221.1Skamil * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
231.1Skamil * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
241.1Skamil * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
251.1Skamil * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
261.1Skamil * POSSIBILITY OF SUCH DAMAGE.
271.1Skamil */
281.1Skamil
291.1Skamil#include <sys/cdefs.h>
301.1Skamil__RCSID("$NetBSD: t_ptrace.c,v 1.1 2017/04/02 21:44:00 kamil Exp $");
311.1Skamil
321.1Skamil#include <sys/param.h>
331.1Skamil#include <sys/types.h>
341.1Skamil#include <sys/ptrace.h>
351.1Skamil#include <sys/stat.h>
361.1Skamil#include <sys/sysctl.h>
371.1Skamil#include <err.h>
381.1Skamil#include <errno.h>
391.1Skamil#include <unistd.h>
401.1Skamil
411.1Skamil#include <atf-c.h>
421.1Skamil
431.1Skamil#include "h_macros.h"
441.1Skamil
451.1Skamil/*
461.1Skamil * A child process cannot call atf functions and expect them to magically
471.1Skamil * work like in the parent.
481.1Skamil * The printf(3) messaging from a child will not work out of the box as well
491.1Skamil * without estabilishing a communication protocol with its parent. To not
501.1Skamil * overcomplicate the tests - do not log from a child and use err(3)/errx(3)
511.1Skamil * wrapped with FORKEE_ASSERT()/FORKEE_ASSERTX() as that is guaranteed to work.
521.1Skamil */
531.1Skamil#define FORKEE_ASSERTX(x)							\
541.1Skamildo {										\
551.1Skamil	int ret = (x);								\
561.1Skamil	if (!ret)								\
571.1Skamil		errx(EXIT_FAILURE, "%s:%d %s(): Assertion failed for: %s",	\
581.1Skamil		     __FILE__, __LINE__, __func__, #x);				\
591.1Skamil} while (0)
601.1Skamil
611.1Skamil#define FORKEE_ASSERT(x)							\
621.1Skamildo {										\
631.1Skamil	int ret = (x);								\
641.1Skamil	if (!ret)								\
651.1Skamil		err(EXIT_FAILURE, "%s:%d %s(): Assertion failed for: %s",	\
661.1Skamil		     __FILE__, __LINE__, __func__, #x);				\
671.1Skamil} while (0)
681.1Skamil
691.1SkamilATF_TC(attach_pid0);
701.1SkamilATF_TC_HEAD(attach_pid0, tc)
711.1Skamil{
721.1Skamil	atf_tc_set_md_var(tc, "descr",
731.1Skamil	    "Assert that a debugger cannot attach to PID 0");
741.1Skamil}
751.1Skamil
761.1SkamilATF_TC_BODY(attach_pid0, tc)
771.1Skamil{
781.1Skamil	errno = 0;
791.1Skamil	ATF_REQUIRE_ERRNO(EPERM, ptrace(PT_ATTACH, 0, NULL, 0) == -1);
801.1Skamil}
811.1Skamil
821.1SkamilATF_TC(attach_pid1);
831.1SkamilATF_TC_HEAD(attach_pid1, tc)
841.1Skamil{
851.1Skamil	atf_tc_set_md_var(tc, "descr",
861.1Skamil	    "Assert that a debugger cannot attach to PID 1 (as non-root)");
871.1Skamil
881.1Skamil	atf_tc_set_md_var(tc, "require.user", "unprivileged");
891.1Skamil}
901.1Skamil
911.1SkamilATF_TC_BODY(attach_pid1, tc)
921.1Skamil{
931.1Skamil	ATF_REQUIRE_ERRNO(EPERM, ptrace(PT_ATTACH, 1, NULL, 0) == -1);
941.1Skamil}
951.1Skamil
961.1SkamilATF_TC(attach_pid1_securelevel);
971.1SkamilATF_TC_HEAD(attach_pid1_securelevel, tc)
981.1Skamil{
991.1Skamil	atf_tc_set_md_var(tc, "descr",
1001.1Skamil	    "Assert that a debugger cannot attach to PID 1 with "
1011.1Skamil	    "securelevel >= 0 (as root)");
1021.1Skamil
1031.1Skamil	atf_tc_set_md_var(tc, "require.user", "root");
1041.1Skamil}
1051.1Skamil
1061.1SkamilATF_TC_BODY(attach_pid1_securelevel, tc)
1071.1Skamil{
1081.1Skamil	int level;
1091.1Skamil	size_t len = sizeof(level);
1101.1Skamil
1111.1Skamil	ATF_REQUIRE(sysctlbyname("kern.securelevel", &level, &len, NULL, 0)
1121.1Skamil	    != -1);
1131.1Skamil
1141.1Skamil	if (level < 0) {
1151.1Skamil		atf_tc_skip("Test must be run with securelevel >= 0");
1161.1Skamil	}
1171.1Skamil
1181.1Skamil	ATF_REQUIRE_ERRNO(EPERM, ptrace(PT_ATTACH, 1, NULL, 0) == -1);
1191.1Skamil}
1201.1Skamil
1211.1SkamilATF_TC(attach_self);
1221.1SkamilATF_TC_HEAD(attach_self, tc)
1231.1Skamil{
1241.1Skamil	atf_tc_set_md_var(tc, "descr",
1251.1Skamil	    "Assert that a debugger cannot attach to self (as it's nonsense)");
1261.1Skamil}
1271.1Skamil
1281.1SkamilATF_TC_BODY(attach_self, tc)
1291.1Skamil{
1301.1Skamil	ATF_REQUIRE_ERRNO(EINVAL, ptrace(PT_ATTACH, getpid(), NULL, 0) == -1);
1311.1Skamil}
1321.1Skamil
1331.1SkamilATF_TC(attach_chroot);
1341.1SkamilATF_TC_HEAD(attach_chroot, tc)
1351.1Skamil{
1361.1Skamil	atf_tc_set_md_var(tc, "descr",
1371.1Skamil	    "Assert that a debugger cannot trace another process unless the "
1381.1Skamil	    "process's root directory is at or below the tracing process's "
1391.1Skamil	    "root");
1401.1Skamil
1411.1Skamil	atf_tc_set_md_var(tc, "require.user", "root");
1421.1Skamil}
1431.1Skamil
1441.1SkamilATF_TC_BODY(attach_chroot, tc)
1451.1Skamil{
1461.1Skamil	char buf[PATH_MAX];
1471.1Skamil	pid_t child;
1481.1Skamil	int fds_toparent[2], fds_fromparent[2];
1491.1Skamil	int rv;
1501.1Skamil	uint8_t msg = 0xde; /* dummy message for IPC based on pipe(2) */
1511.1Skamil
1521.1Skamil	(void)memset(buf, '\0', sizeof(buf));
1531.1Skamil	ATF_REQUIRE(getcwd(buf, sizeof(buf)) != NULL);
1541.1Skamil	(void)strlcat(buf, "/dir", sizeof(buf));
1551.1Skamil
1561.1Skamil	ATF_REQUIRE(mkdir(buf, 0500) == 0);
1571.1Skamil	ATF_REQUIRE(chdir(buf) == 0);
1581.1Skamil
1591.1Skamil	ATF_REQUIRE(pipe(fds_toparent) == 0);
1601.1Skamil	ATF_REQUIRE(pipe(fds_fromparent) == 0);
1611.1Skamil	child = atf_utils_fork();
1621.1Skamil	if (child == 0) {
1631.1Skamil		FORKEE_ASSERT(close(fds_toparent[0]) == 0);
1641.1Skamil		FORKEE_ASSERT(close(fds_fromparent[1]) == 0);
1651.1Skamil
1661.1Skamil		FORKEE_ASSERT(chroot(buf) == 0);
1671.1Skamil
1681.1Skamil		rv = write(fds_toparent[1], &msg, sizeof(msg));
1691.1Skamil		FORKEE_ASSERTX(rv == sizeof(msg));
1701.1Skamil
1711.1Skamil		ATF_REQUIRE_ERRNO(EPERM,
1721.1Skamil			ptrace(PT_ATTACH, getppid(), NULL, 0) == -1);
1731.1Skamil
1741.1Skamil		rv = read(fds_fromparent[0], &msg, sizeof(msg));
1751.1Skamil		FORKEE_ASSERTX(rv == sizeof(msg));
1761.1Skamil
1771.1Skamil		_exit(0);
1781.1Skamil	}
1791.1Skamil	ATF_REQUIRE(close(fds_toparent[1]) == 0);
1801.1Skamil	ATF_REQUIRE(close(fds_fromparent[0]) == 0);
1811.1Skamil
1821.1Skamil	printf("Waiting for chrooting of the child PID %d", child);
1831.1Skamil	rv = read(fds_toparent[0], &msg, sizeof(msg));
1841.1Skamil	ATF_REQUIRE(rv == sizeof(msg));
1851.1Skamil
1861.1Skamil	printf("Child is ready, it will try to PT_ATTACH to parent\n");
1871.1Skamil	rv = write(fds_fromparent[1], &msg, sizeof(msg));
1881.1Skamil	ATF_REQUIRE(rv == sizeof(msg));
1891.1Skamil
1901.1Skamil        printf("fds_fromparent is no longer needed - close it\n");
1911.1Skamil        ATF_REQUIRE(close(fds_fromparent[1]) == 0);
1921.1Skamil
1931.1Skamil        printf("fds_toparent is no longer needed - close it\n");
1941.1Skamil        ATF_REQUIRE(close(fds_toparent[0]) == 0);
1951.1Skamil}
1961.1Skamil
1971.1SkamilATF_TP_ADD_TCS(tp)
1981.1Skamil{
1991.1Skamil	setvbuf(stdout, NULL, _IONBF, 0);
2001.1Skamil	setvbuf(stderr, NULL, _IONBF, 0);
2011.1Skamil	ATF_TP_ADD_TC(tp, attach_pid0);
2021.1Skamil	ATF_TP_ADD_TC(tp, attach_pid1);
2031.1Skamil	ATF_TP_ADD_TC(tp, attach_pid1_securelevel);
2041.1Skamil	ATF_TP_ADD_TC(tp, attach_self);
2051.1Skamil	ATF_TP_ADD_TC(tp, attach_chroot);
2061.1Skamil
2071.1Skamil	return atf_no_error();
2081.1Skamil}
209