linux/tools/testing/selftests/vm/memfd_secret.c
<<
>>
Prefs
   1// SPDX-License-Identifier: GPL-2.0
   2/*
   3 * Copyright IBM Corporation, 2021
   4 *
   5 * Author: Mike Rapoport <rppt@linux.ibm.com>
   6 */
   7
   8#define _GNU_SOURCE
   9#include <sys/uio.h>
  10#include <sys/mman.h>
  11#include <sys/wait.h>
  12#include <sys/types.h>
  13#include <sys/ptrace.h>
  14#include <sys/syscall.h>
  15#include <sys/resource.h>
  16#include <sys/capability.h>
  17
  18#include <stdlib.h>
  19#include <string.h>
  20#include <unistd.h>
  21#include <errno.h>
  22#include <stdio.h>
  23
  24#include "../kselftest.h"
  25
  26#define fail(fmt, ...) ksft_test_result_fail(fmt, ##__VA_ARGS__)
  27#define pass(fmt, ...) ksft_test_result_pass(fmt, ##__VA_ARGS__)
  28#define skip(fmt, ...) ksft_test_result_skip(fmt, ##__VA_ARGS__)
  29
  30#ifdef __NR_memfd_secret
  31
  32#define PATTERN 0x55
  33
  34static const int prot = PROT_READ | PROT_WRITE;
  35static const int mode = MAP_SHARED;
  36
  37static unsigned long page_size;
  38static unsigned long mlock_limit_cur;
  39static unsigned long mlock_limit_max;
  40
  41static int memfd_secret(unsigned int flags)
  42{
  43        return syscall(__NR_memfd_secret, flags);
  44}
  45
  46static void test_file_apis(int fd)
  47{
  48        char buf[64];
  49
  50        if ((read(fd, buf, sizeof(buf)) >= 0) ||
  51            (write(fd, buf, sizeof(buf)) >= 0) ||
  52            (pread(fd, buf, sizeof(buf), 0) >= 0) ||
  53            (pwrite(fd, buf, sizeof(buf), 0) >= 0))
  54                fail("unexpected file IO\n");
  55        else
  56                pass("file IO is blocked as expected\n");
  57}
  58
  59static void test_mlock_limit(int fd)
  60{
  61        size_t len;
  62        char *mem;
  63
  64        len = mlock_limit_cur;
  65        mem = mmap(NULL, len, prot, mode, fd, 0);
  66        if (mem == MAP_FAILED) {
  67                fail("unable to mmap secret memory\n");
  68                return;
  69        }
  70        munmap(mem, len);
  71
  72        len = mlock_limit_max * 2;
  73        mem = mmap(NULL, len, prot, mode, fd, 0);
  74        if (mem != MAP_FAILED) {
  75                fail("unexpected mlock limit violation\n");
  76                munmap(mem, len);
  77                return;
  78        }
  79
  80        pass("mlock limit is respected\n");
  81}
  82
  83static void try_process_vm_read(int fd, int pipefd[2])
  84{
  85        struct iovec liov, riov;
  86        char buf[64];
  87        char *mem;
  88
  89        if (read(pipefd[0], &mem, sizeof(mem)) < 0) {
  90                fail("pipe write: %s\n", strerror(errno));
  91                exit(KSFT_FAIL);
  92        }
  93
  94        liov.iov_len = riov.iov_len = sizeof(buf);
  95        liov.iov_base = buf;
  96        riov.iov_base = mem;
  97
  98        if (process_vm_readv(getppid(), &liov, 1, &riov, 1, 0) < 0) {
  99                if (errno == ENOSYS)
 100                        exit(KSFT_SKIP);
 101                exit(KSFT_PASS);
 102        }
 103
 104        exit(KSFT_FAIL);
 105}
 106
 107static void try_ptrace(int fd, int pipefd[2])
 108{
 109        pid_t ppid = getppid();
 110        int status;
 111        char *mem;
 112        long ret;
 113
 114        if (read(pipefd[0], &mem, sizeof(mem)) < 0) {
 115                perror("pipe write");
 116                exit(KSFT_FAIL);
 117        }
 118
 119        ret = ptrace(PTRACE_ATTACH, ppid, 0, 0);
 120        if (ret) {
 121                perror("ptrace_attach");
 122                exit(KSFT_FAIL);
 123        }
 124
 125        ret = waitpid(ppid, &status, WUNTRACED);
 126        if ((ret != ppid) || !(WIFSTOPPED(status))) {
 127                fprintf(stderr, "weird waitppid result %ld stat %x\n",
 128                        ret, status);
 129                exit(KSFT_FAIL);
 130        }
 131
 132        if (ptrace(PTRACE_PEEKDATA, ppid, mem, 0))
 133                exit(KSFT_PASS);
 134
 135        exit(KSFT_FAIL);
 136}
 137
 138static void check_child_status(pid_t pid, const char *name)
 139{
 140        int status;
 141
 142        waitpid(pid, &status, 0);
 143
 144        if (WIFEXITED(status) && WEXITSTATUS(status) == KSFT_SKIP) {
 145                skip("%s is not supported\n", name);
 146                return;
 147        }
 148
 149        if ((WIFEXITED(status) && WEXITSTATUS(status) == KSFT_PASS) ||
 150            WIFSIGNALED(status)) {
 151                pass("%s is blocked as expected\n", name);
 152                return;
 153        }
 154
 155        fail("%s: unexpected memory access\n", name);
 156}
 157
 158static void test_remote_access(int fd, const char *name,
 159                               void (*func)(int fd, int pipefd[2]))
 160{
 161        int pipefd[2];
 162        pid_t pid;
 163        char *mem;
 164
 165        if (pipe(pipefd)) {
 166                fail("pipe failed: %s\n", strerror(errno));
 167                return;
 168        }
 169
 170        pid = fork();
 171        if (pid < 0) {
 172                fail("fork failed: %s\n", strerror(errno));
 173                return;
 174        }
 175
 176        if (pid == 0) {
 177                func(fd, pipefd);
 178                return;
 179        }
 180
 181        mem = mmap(NULL, page_size, prot, mode, fd, 0);
 182        if (mem == MAP_FAILED) {
 183                fail("Unable to mmap secret memory\n");
 184                return;
 185        }
 186
 187        ftruncate(fd, page_size);
 188        memset(mem, PATTERN, page_size);
 189
 190        if (write(pipefd[1], &mem, sizeof(mem)) < 0) {
 191                fail("pipe write: %s\n", strerror(errno));
 192                return;
 193        }
 194
 195        check_child_status(pid, name);
 196}
 197
 198static void test_process_vm_read(int fd)
 199{
 200        test_remote_access(fd, "process_vm_read", try_process_vm_read);
 201}
 202
 203static void test_ptrace(int fd)
 204{
 205        test_remote_access(fd, "ptrace", try_ptrace);
 206}
 207
 208static int set_cap_limits(rlim_t max)
 209{
 210        struct rlimit new;
 211        cap_t cap = cap_init();
 212
 213        new.rlim_cur = max;
 214        new.rlim_max = max;
 215        if (setrlimit(RLIMIT_MEMLOCK, &new)) {
 216                perror("setrlimit() returns error");
 217                return -1;
 218        }
 219
 220        /* drop capabilities including CAP_IPC_LOCK */
 221        if (cap_set_proc(cap)) {
 222                perror("cap_set_proc() returns error");
 223                return -2;
 224        }
 225
 226        return 0;
 227}
 228
 229static void prepare(void)
 230{
 231        struct rlimit rlim;
 232
 233        page_size = sysconf(_SC_PAGE_SIZE);
 234        if (!page_size)
 235                ksft_exit_fail_msg("Failed to get page size %s\n",
 236                                   strerror(errno));
 237
 238        if (getrlimit(RLIMIT_MEMLOCK, &rlim))
 239                ksft_exit_fail_msg("Unable to detect mlock limit: %s\n",
 240                                   strerror(errno));
 241
 242        mlock_limit_cur = rlim.rlim_cur;
 243        mlock_limit_max = rlim.rlim_max;
 244
 245        printf("page_size: %ld, mlock.soft: %ld, mlock.hard: %ld\n",
 246               page_size, mlock_limit_cur, mlock_limit_max);
 247
 248        if (page_size > mlock_limit_cur)
 249                mlock_limit_cur = page_size;
 250        if (page_size > mlock_limit_max)
 251                mlock_limit_max = page_size;
 252
 253        if (set_cap_limits(mlock_limit_max))
 254                ksft_exit_fail_msg("Unable to set mlock limit: %s\n",
 255                                   strerror(errno));
 256}
 257
 258#define NUM_TESTS 4
 259
 260int main(int argc, char *argv[])
 261{
 262        int fd;
 263
 264        prepare();
 265
 266        ksft_print_header();
 267        ksft_set_plan(NUM_TESTS);
 268
 269        fd = memfd_secret(0);
 270        if (fd < 0) {
 271                if (errno == ENOSYS)
 272                        ksft_exit_skip("memfd_secret is not supported\n");
 273                else
 274                        ksft_exit_fail_msg("memfd_secret failed: %s\n",
 275                                           strerror(errno));
 276        }
 277
 278        test_mlock_limit(fd);
 279        test_file_apis(fd);
 280        test_process_vm_read(fd);
 281        test_ptrace(fd);
 282
 283        close(fd);
 284
 285        ksft_exit(!ksft_get_fail_cnt());
 286}
 287
 288#else /* __NR_memfd_secret */
 289
 290int main(int argc, char *argv[])
 291{
 292        printf("skip: skipping memfd_secret test (missing __NR_memfd_secret)\n");
 293        return KSFT_SKIP;
 294}
 295
 296#endif /* __NR_memfd_secret */
 297