// SPDX-License-Identifier: GPL-2.0 /* * Copyright (C) 2020 Google LLC. */ #include #include #include #include #include "local_storage.skel.h" #include "network_helpers.h" #ifndef __NR_pidfd_open #define __NR_pidfd_open 434 #endif static inline int sys_pidfd_open(pid_t pid, unsigned int flags) { return syscall(__NR_pidfd_open, pid, flags); } static unsigned int duration; #define TEST_STORAGE_VALUE 0xbeefdead struct storage { void *inode; unsigned int value; /* Lock ensures that spin locked versions of local stoage operations * also work, most operations in this tests are still single threaded */ struct bpf_spin_lock lock; }; /* Copies an rm binary to a temp file. dest is a mkstemp template */ static int copy_rm(char *dest) { int fd_in, fd_out = -1, ret = 0; struct stat stat; char *buf = NULL; fd_in = open("/bin/rm", O_RDONLY); if (fd_in < 0) return -errno; fd_out = mkstemp(dest); if (fd_out < 0) { ret = -errno; goto out; } ret = fstat(fd_in, &stat); if (ret == -1) { ret = -errno; goto out; } buf = malloc(stat.st_blksize); if (!buf) { ret = -errno; goto out; } while (ret = read(fd_in, buf, stat.st_blksize), ret > 0) { ret = write(fd_out, buf, ret); if (ret < 0) { ret = -errno; goto out; } } if (ret < 0) { ret = -errno; goto out; } /* Set executable permission on the copied file */ ret = chmod(dest, 0100); if (ret == -1) ret = -errno; out: free(buf); close(fd_in); close(fd_out); return ret; } /* Fork and exec the provided rm binary and return the exit code of the * forked process and its pid. */ static int run_self_unlink(int *monitored_pid, const char *rm_path) { int child_pid, child_status, ret; int null_fd; child_pid = fork(); if (child_pid == 0) { null_fd = open("/dev/null", O_WRONLY); dup2(null_fd, STDOUT_FILENO); dup2(null_fd, STDERR_FILENO); close(null_fd); *monitored_pid = getpid(); /* Use the copied /usr/bin/rm to delete itself * /tmp/copy_of_rm /tmp/copy_of_rm. */ ret = execlp(rm_path, rm_path, rm_path, NULL); if (ret) exit(errno); } else if (child_pid > 0) { waitpid(child_pid, &child_status, 0); return WEXITSTATUS(child_status); } return -EINVAL; } static bool check_syscall_operations(int map_fd, int obj_fd) { struct storage val = { .value = TEST_STORAGE_VALUE, .lock = { 0 } }, lookup_val = { .value = 0, .lock = { 0 } }; int err; /* Looking up an existing element should fail initially */ err = bpf_map_lookup_elem_flags(map_fd, &obj_fd, &lookup_val, BPF_F_LOCK); if (CHECK(!err || errno != ENOENT, "bpf_map_lookup_elem", "err:%d errno:%d\n", err, errno)) return false; /* Create a new element */ err = bpf_map_update_elem(map_fd, &obj_fd, &val, BPF_NOEXIST | BPF_F_LOCK); if (CHECK(err < 0, "bpf_map_update_elem", "err:%d errno:%d\n", err, errno)) return false; /* Lookup the newly created element */ err = bpf_map_lookup_elem_flags(map_fd, &obj_fd, &lookup_val, BPF_F_LOCK); if (CHECK(err < 0, "bpf_map_lookup_elem", "err:%d errno:%d", err, errno)) return false; /* Check the value of the newly created element */ if (CHECK(lookup_val.value != val.value, "bpf_map_lookup_elem", "value got = %x errno:%d", lookup_val.value, val.value)) return false; err = bpf_map_delete_elem(map_fd, &obj_fd); if (CHECK(err, "bpf_map_delete_elem()", "err:%d errno:%d\n", err, errno)) return false; /* The lookup should fail, now that the element has been deleted */ err = bpf_map_lookup_elem_flags(map_fd, &obj_fd, &lookup_val, BPF_F_LOCK); if (CHECK(!err || errno != ENOENT, "bpf_map_lookup_elem", "err:%d errno:%d\n", err, errno)) return false; return true; } void test_test_local_storage(void) { char tmp_exec_path[PATH_MAX] = "/tmp/copy_of_rmXXXXXX"; int err, serv_sk = -1, task_fd = -1, rm_fd = -1; struct local_storage *skel = NULL; skel = local_storage__open_and_load(); if (CHECK(!skel, "skel_load", "lsm skeleton failed\n")) goto close_prog; err = local_storage__attach(skel); if (CHECK(err, "attach", "lsm attach failed: %d\n", err)) goto close_prog; task_fd = sys_pidfd_open(getpid(), 0); if (CHECK(task_fd < 0, "pidfd_open", "failed to get pidfd err:%d, errno:%d", task_fd, errno)) goto close_prog; if (!check_syscall_operations(bpf_map__fd(skel->maps.task_storage_map), task_fd)) goto close_prog; err = copy_rm(tmp_exec_path); if (CHECK(err < 0, "copy_rm", "err %d errno %d\n", err, errno)) goto close_prog; rm_fd = open(tmp_exec_path, O_RDONLY); if (CHECK(rm_fd < 0, "open", "failed to open %s err:%d, errno:%d", tmp_exec_path, rm_fd, errno)) goto close_prog; if (!check_syscall_operations(bpf_map__fd(skel->maps.inode_storage_map), rm_fd)) goto close_prog; /* Sets skel->bss->monitored_pid to the pid of the forked child * forks a child process that executes tmp_exec_path and tries to * unlink its executable. This operation should be denied by the loaded * LSM program. */ err = run_self_unlink(&skel->bss->monitored_pid, tmp_exec_path); if (CHECK(err != EPERM, "run_self_unlink", "err %d want EPERM\n", err)) goto close_prog_unlink; /* Set the process being monitored to be the current process */ skel->bss->monitored_pid = getpid(); /* Remove the temporary created executable */ err = unlink(tmp_exec_path); if (CHECK(err != 0, "unlink", "unable to unlink %s: %d", tmp_exec_path, errno)) goto close_prog_unlink; CHECK(skel->data->inode_storage_result != 0, "inode_storage_result", "inode_local_storage not set\n"); serv_sk = start_server(AF_INET6, SOCK_STREAM, NULL, 0, 0); if (CHECK(serv_sk < 0, "start_server", "failed to start server\n")) goto close_prog; CHECK(skel->data->sk_storage_result != 0, "sk_storage_result", "sk_local_storage not set\n"); if (!check_syscall_operations(bpf_map__fd(skel->maps.sk_storage_map), serv_sk)) goto close_prog; close_prog_unlink: unlink(tmp_exec_path); close_prog: close(serv_sk); close(rm_fd); close(task_fd); local_storage__destroy(skel); }