Author | Tokens | Token Proportion | Commits | Commit Proportion |
---|---|---|---|---|
David Herrmann | 3628 | 60.41% | 1 | 5.00% |
Aleksa Sarai | 893 | 14.87% | 3 | 15.00% |
Jeff Xu | 422 | 7.03% | 2 | 10.00% |
Daniel Verkamp | 384 | 6.39% | 1 | 5.00% |
Mike Kravetz | 376 | 6.26% | 1 | 5.00% |
Joel A Fernandes | 225 | 3.75% | 2 | 10.00% |
Marc-André Lureau | 41 | 0.68% | 3 | 15.00% |
Pranith Kumar | 29 | 0.48% | 2 | 10.00% |
Ben Hutchings | 3 | 0.05% | 1 | 5.00% |
Lei Yang | 2 | 0.03% | 1 | 5.00% |
Michael Ellerman | 1 | 0.02% | 1 | 5.00% |
Chunyan Zhang | 1 | 0.02% | 1 | 5.00% |
Greg Kroah-Hartman | 1 | 0.02% | 1 | 5.00% |
Total | 6006 | 20 |
// SPDX-License-Identifier: GPL-2.0 #define _GNU_SOURCE #define __EXPORTED_HEADERS__ #include <errno.h> #include <inttypes.h> #include <limits.h> #include <linux/falloc.h> #include <fcntl.h> #include <linux/memfd.h> #include <sched.h> #include <stdio.h> #include <stdlib.h> #include <signal.h> #include <string.h> #include <sys/mman.h> #include <sys/stat.h> #include <sys/syscall.h> #include <sys/wait.h> #include <unistd.h> #include <ctype.h> #include "common.h" #define MEMFD_STR "memfd:" #define MEMFD_HUGE_STR "memfd-hugetlb:" #define SHARED_FT_STR "(shared file-table)" #define MFD_DEF_SIZE 8192 #define STACK_SIZE 65536 #define F_SEAL_EXEC 0x0020 #define F_WX_SEALS (F_SEAL_SHRINK | \ F_SEAL_GROW | \ F_SEAL_WRITE | \ F_SEAL_FUTURE_WRITE | \ F_SEAL_EXEC) #define MFD_NOEXEC_SEAL 0x0008U /* * Default is not to test hugetlbfs */ static size_t mfd_def_size = MFD_DEF_SIZE; static const char *memfd_str = MEMFD_STR; static ssize_t fd2name(int fd, char *buf, size_t bufsize) { char buf1[PATH_MAX]; int size; ssize_t nbytes; size = snprintf(buf1, PATH_MAX, "/proc/self/fd/%d", fd); if (size < 0) { printf("snprintf(%d) failed on %m\n", fd); abort(); } /* * reserver one byte for string termination. */ nbytes = readlink(buf1, buf, bufsize-1); if (nbytes == -1) { printf("readlink(%s) failed %m\n", buf1); abort(); } buf[nbytes] = '\0'; return nbytes; } static int mfd_assert_new(const char *name, loff_t sz, unsigned int flags) { int r, fd; fd = sys_memfd_create(name, flags); if (fd < 0) { printf("memfd_create(\"%s\", %u) failed: %m\n", name, flags); abort(); } r = ftruncate(fd, sz); if (r < 0) { printf("ftruncate(%llu) failed: %m\n", (unsigned long long)sz); abort(); } return fd; } static void sysctl_assert_write(const char *val) { int fd = open("/proc/sys/vm/memfd_noexec", O_WRONLY | O_CLOEXEC); if (fd < 0) { printf("open sysctl failed: %m\n"); abort(); } if (write(fd, val, strlen(val)) < 0) { printf("write sysctl %s failed: %m\n", val); abort(); } } static void sysctl_fail_write(const char *val) { int fd = open("/proc/sys/vm/memfd_noexec", O_WRONLY | O_CLOEXEC); if (fd < 0) { printf("open sysctl failed: %m\n"); abort(); } if (write(fd, val, strlen(val)) >= 0) { printf("write sysctl %s succeeded, but failure expected\n", val); abort(); } } static void sysctl_assert_equal(const char *val) { char *p, buf[128] = {}; int fd = open("/proc/sys/vm/memfd_noexec", O_RDONLY | O_CLOEXEC); if (fd < 0) { printf("open sysctl failed: %m\n"); abort(); } if (read(fd, buf, sizeof(buf)) < 0) { printf("read sysctl failed: %m\n"); abort(); } /* Strip trailing whitespace. */ p = buf; while (!isspace(*p)) p++; *p = '\0'; if (strcmp(buf, val) != 0) { printf("unexpected sysctl value: expected %s, got %s\n", val, buf); abort(); } } static int mfd_assert_reopen_fd(int fd_in) { int fd; char path[100]; sprintf(path, "/proc/self/fd/%d", fd_in); fd = open(path, O_RDWR); if (fd < 0) { printf("re-open of existing fd %d failed\n", fd_in); abort(); } return fd; } static void mfd_fail_new(const char *name, unsigned int flags) { int r; r = sys_memfd_create(name, flags); if (r >= 0) { printf("memfd_create(\"%s\", %u) succeeded, but failure expected\n", name, flags); close(r); abort(); } } static unsigned int mfd_assert_get_seals(int fd) { int r; r = fcntl(fd, F_GET_SEALS); if (r < 0) { printf("GET_SEALS(%d) failed: %m\n", fd); abort(); } return (unsigned int)r; } static void mfd_assert_has_seals(int fd, unsigned int seals) { char buf[PATH_MAX]; unsigned int s; fd2name(fd, buf, PATH_MAX); s = mfd_assert_get_seals(fd); if (s != seals) { printf("%u != %u = GET_SEALS(%s)\n", seals, s, buf); abort(); } } static void mfd_assert_add_seals(int fd, unsigned int seals) { int r; unsigned int s; s = mfd_assert_get_seals(fd); r = fcntl(fd, F_ADD_SEALS, seals); if (r < 0) { printf("ADD_SEALS(%d, %u -> %u) failed: %m\n", fd, s, seals); abort(); } } static void mfd_fail_add_seals(int fd, unsigned int seals) { int r; unsigned int s; r = fcntl(fd, F_GET_SEALS); if (r < 0) s = 0; else s = (unsigned int)r; r = fcntl(fd, F_ADD_SEALS, seals); if (r >= 0) { printf("ADD_SEALS(%d, %u -> %u) didn't fail as expected\n", fd, s, seals); abort(); } } static void mfd_assert_size(int fd, size_t size) { struct stat st; int r; r = fstat(fd, &st); if (r < 0) { printf("fstat(%d) failed: %m\n", fd); abort(); } else if (st.st_size != size) { printf("wrong file size %lld, but expected %lld\n", (long long)st.st_size, (long long)size); abort(); } } static int mfd_assert_dup(int fd) { int r; r = dup(fd); if (r < 0) { printf("dup(%d) failed: %m\n", fd); abort(); } return r; } static void *mfd_assert_mmap_shared(int fd) { void *p; p = mmap(NULL, mfd_def_size, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0); if (p == MAP_FAILED) { printf("mmap() failed: %m\n"); abort(); } return p; } static void *mfd_assert_mmap_private(int fd) { void *p; p = mmap(NULL, mfd_def_size, PROT_READ, MAP_PRIVATE, fd, 0); if (p == MAP_FAILED) { printf("mmap() failed: %m\n"); abort(); } return p; } static int mfd_assert_open(int fd, int flags, mode_t mode) { char buf[512]; int r; sprintf(buf, "/proc/self/fd/%d", fd); r = open(buf, flags, mode); if (r < 0) { printf("open(%s) failed: %m\n", buf); abort(); } return r; } static void mfd_fail_open(int fd, int flags, mode_t mode) { char buf[512]; int r; sprintf(buf, "/proc/self/fd/%d", fd); r = open(buf, flags, mode); if (r >= 0) { printf("open(%s) didn't fail as expected\n", buf); abort(); } } static void mfd_assert_read(int fd) { char buf[16]; void *p; ssize_t l; l = read(fd, buf, sizeof(buf)); if (l != sizeof(buf)) { printf("read() failed: %m\n"); abort(); } /* verify PROT_READ *is* allowed */ p = mmap(NULL, mfd_def_size, PROT_READ, MAP_PRIVATE, fd, 0); if (p == MAP_FAILED) { printf("mmap() failed: %m\n"); abort(); } munmap(p, mfd_def_size); /* verify MAP_PRIVATE is *always* allowed (even writable) */ p = mmap(NULL, mfd_def_size, PROT_READ | PROT_WRITE, MAP_PRIVATE, fd, 0); if (p == MAP_FAILED) { printf("mmap() failed: %m\n"); abort(); } munmap(p, mfd_def_size); } /* Test that PROT_READ + MAP_SHARED mappings work. */ static void mfd_assert_read_shared(int fd) { void *p; /* verify PROT_READ and MAP_SHARED *is* allowed */ p = mmap(NULL, mfd_def_size, PROT_READ, MAP_SHARED, fd, 0); if (p == MAP_FAILED) { printf("mmap() failed: %m\n"); abort(); } munmap(p, mfd_def_size); } static void mfd_assert_fork_private_write(int fd) { int *p; pid_t pid; p = mmap(NULL, mfd_def_size, PROT_READ | PROT_WRITE, MAP_PRIVATE, fd, 0); if (p == MAP_FAILED) { printf("mmap() failed: %m\n"); abort(); } p[0] = 22; pid = fork(); if (pid == 0) { p[0] = 33; exit(0); } else { waitpid(pid, NULL, 0); if (p[0] != 22) { printf("MAP_PRIVATE copy-on-write failed: %m\n"); abort(); } } munmap(p, mfd_def_size); } static void mfd_assert_write(int fd) { ssize_t l; void *p; int r; /* * huegtlbfs does not support write, but we want to * verify everything else here. */ if (!hugetlbfs_test) { /* verify write() succeeds */ l = write(fd, "\0\0\0\0", 4); if (l != 4) { printf("write() failed: %m\n"); abort(); } } /* verify PROT_READ | PROT_WRITE is allowed */ p = mmap(NULL, mfd_def_size, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0); if (p == MAP_FAILED) { printf("mmap() failed: %m\n"); abort(); } *(char *)p = 0; munmap(p, mfd_def_size); /* verify PROT_WRITE is allowed */ p = mmap(NULL, mfd_def_size, PROT_WRITE, MAP_SHARED, fd, 0); if (p == MAP_FAILED) { printf("mmap() failed: %m\n"); abort(); } *(char *)p = 0; munmap(p, mfd_def_size); /* verify PROT_READ with MAP_SHARED is allowed and a following * mprotect(PROT_WRITE) allows writing */ p = mmap(NULL, mfd_def_size, PROT_READ, MAP_SHARED, fd, 0); if (p == MAP_FAILED) { printf("mmap() failed: %m\n"); abort(); } r = mprotect(p, mfd_def_size, PROT_READ | PROT_WRITE); if (r < 0) { printf("mprotect() failed: %m\n"); abort(); } *(char *)p = 0; munmap(p, mfd_def_size); /* verify PUNCH_HOLE works */ r = fallocate(fd, FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE, 0, mfd_def_size); if (r < 0) { printf("fallocate(PUNCH_HOLE) failed: %m\n"); abort(); } } static void mfd_fail_write(int fd) { ssize_t l; void *p; int r; /* verify write() fails */ l = write(fd, "data", 4); if (l != -EPERM) { printf("expected EPERM on write(), but got %d: %m\n", (int)l); abort(); } /* verify PROT_READ | PROT_WRITE is not allowed */ p = mmap(NULL, mfd_def_size, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0); if (p != MAP_FAILED) { printf("mmap() didn't fail as expected\n"); abort(); } /* verify PROT_WRITE is not allowed */ p = mmap(NULL, mfd_def_size, PROT_WRITE, MAP_SHARED, fd, 0); if (p != MAP_FAILED) { printf("mmap() didn't fail as expected\n"); abort(); } /* Verify PROT_READ with MAP_SHARED with a following mprotect is not * allowed. Note that for r/w the kernel already prevents the mmap. */ p = mmap(NULL, mfd_def_size, PROT_READ, MAP_SHARED, fd, 0); if (p != MAP_FAILED) { r = mprotect(p, mfd_def_size, PROT_READ | PROT_WRITE); if (r >= 0) { printf("mmap()+mprotect() didn't fail as expected\n"); abort(); } munmap(p, mfd_def_size); } /* verify PUNCH_HOLE fails */ r = fallocate(fd, FALLOC_FL_PUNCH_HOLE | FALLOC_FL_KEEP_SIZE, 0, mfd_def_size); if (r >= 0) { printf("fallocate(PUNCH_HOLE) didn't fail as expected\n"); abort(); } } static void mfd_assert_shrink(int fd) { int r, fd2; r = ftruncate(fd, mfd_def_size / 2); if (r < 0) { printf("ftruncate(SHRINK) failed: %m\n"); abort(); } mfd_assert_size(fd, mfd_def_size / 2); fd2 = mfd_assert_open(fd, O_RDWR | O_CREAT | O_TRUNC, S_IRUSR | S_IWUSR); close(fd2); mfd_assert_size(fd, 0); } static void mfd_fail_shrink(int fd) { int r; r = ftruncate(fd, mfd_def_size / 2); if (r >= 0) { printf("ftruncate(SHRINK) didn't fail as expected\n"); abort(); } mfd_fail_open(fd, O_RDWR | O_CREAT | O_TRUNC, S_IRUSR | S_IWUSR); } static void mfd_assert_grow(int fd) { int r; r = ftruncate(fd, mfd_def_size * 2); if (r < 0) { printf("ftruncate(GROW) failed: %m\n"); abort(); } mfd_assert_size(fd, mfd_def_size * 2); r = fallocate(fd, 0, 0, mfd_def_size * 4); if (r < 0) { printf("fallocate(ALLOC) failed: %m\n"); abort(); } mfd_assert_size(fd, mfd_def_size * 4); } static void mfd_fail_grow(int fd) { int r; r = ftruncate(fd, mfd_def_size * 2); if (r >= 0) { printf("ftruncate(GROW) didn't fail as expected\n"); abort(); } r = fallocate(fd, 0, 0, mfd_def_size * 4); if (r >= 0) { printf("fallocate(ALLOC) didn't fail as expected\n"); abort(); } } static void mfd_assert_grow_write(int fd) { static char *buf; ssize_t l; /* hugetlbfs does not support write */ if (hugetlbfs_test) return; buf = malloc(mfd_def_size * 8); if (!buf) { printf("malloc(%zu) failed: %m\n", mfd_def_size * 8); abort(); } l = pwrite(fd, buf, mfd_def_size * 8, 0); if (l != (mfd_def_size * 8)) { printf("pwrite() failed: %m\n"); abort(); } mfd_assert_size(fd, mfd_def_size * 8); } static void mfd_fail_grow_write(int fd) { static char *buf; ssize_t l; /* hugetlbfs does not support write */ if (hugetlbfs_test) return; buf = malloc(mfd_def_size * 8); if (!buf) { printf("malloc(%zu) failed: %m\n", mfd_def_size * 8); abort(); } l = pwrite(fd, buf, mfd_def_size * 8, 0); if (l == (mfd_def_size * 8)) { printf("pwrite() didn't fail as expected\n"); abort(); } } static void mfd_assert_mode(int fd, int mode) { struct stat st; char buf[PATH_MAX]; fd2name(fd, buf, PATH_MAX); if (fstat(fd, &st) < 0) { printf("fstat(%s) failed: %m\n", buf); abort(); } if ((st.st_mode & 07777) != mode) { printf("fstat(%s) wrong file mode 0%04o, but expected 0%04o\n", buf, (int)st.st_mode & 07777, mode); abort(); } } static void mfd_assert_chmod(int fd, int mode) { char buf[PATH_MAX]; fd2name(fd, buf, PATH_MAX); if (fchmod(fd, mode) < 0) { printf("fchmod(%s, 0%04o) failed: %m\n", buf, mode); abort(); } mfd_assert_mode(fd, mode); } static void mfd_fail_chmod(int fd, int mode) { struct stat st; char buf[PATH_MAX]; fd2name(fd, buf, PATH_MAX); if (fstat(fd, &st) < 0) { printf("fstat(%s) failed: %m\n", buf); abort(); } if (fchmod(fd, mode) == 0) { printf("fchmod(%s, 0%04o) didn't fail as expected\n", buf, mode); abort(); } /* verify that file mode bits did not change */ mfd_assert_mode(fd, st.st_mode & 07777); } static int idle_thread_fn(void *arg) { sigset_t set; int sig; /* dummy waiter; SIGTERM terminates us anyway */ sigemptyset(&set); sigaddset(&set, SIGTERM); sigwait(&set, &sig); return 0; } static pid_t spawn_thread(unsigned int flags, int (*fn)(void *), void *arg) { uint8_t *stack; pid_t pid; stack = malloc(STACK_SIZE); if (!stack) { printf("malloc(STACK_SIZE) failed: %m\n"); abort(); } pid = clone(fn, stack + STACK_SIZE, SIGCHLD | flags, arg); if (pid < 0) { printf("clone() failed: %m\n"); abort(); } return pid; } static void join_thread(pid_t pid) { int wstatus; if (waitpid(pid, &wstatus, 0) < 0) { printf("newpid thread: waitpid() failed: %m\n"); abort(); } if (WIFEXITED(wstatus) && WEXITSTATUS(wstatus) != 0) { printf("newpid thread: exited with non-zero error code %d\n", WEXITSTATUS(wstatus)); abort(); } if (WIFSIGNALED(wstatus)) { printf("newpid thread: killed by signal %d\n", WTERMSIG(wstatus)); abort(); } } static pid_t spawn_idle_thread(unsigned int flags) { return spawn_thread(flags, idle_thread_fn, NULL); } static void join_idle_thread(pid_t pid) { kill(pid, SIGTERM); waitpid(pid, NULL, 0); } /* * Test memfd_create() syscall * Verify syscall-argument validation, including name checks, flag validation * and more. */ static void test_create(void) { char buf[2048]; int fd; printf("%s CREATE\n", memfd_str); /* test NULL name */ mfd_fail_new(NULL, 0); /* test over-long name (not zero-terminated) */ memset(buf, 0xff, sizeof(buf)); mfd_fail_new(buf, 0); /* test over-long zero-terminated name */ memset(buf, 0xff, sizeof(buf)); buf[sizeof(buf) - 1] = 0; mfd_fail_new(buf, 0); /* verify "" is a valid name */ fd = mfd_assert_new("", 0, 0); close(fd); /* verify invalid O_* open flags */ mfd_fail_new("", 0x0100); mfd_fail_new("", ~MFD_CLOEXEC); mfd_fail_new("", ~MFD_ALLOW_SEALING); mfd_fail_new("", ~0); mfd_fail_new("", 0x80000000U); /* verify EXEC and NOEXEC_SEAL can't both be set */ mfd_fail_new("", MFD_EXEC | MFD_NOEXEC_SEAL); /* verify MFD_CLOEXEC is allowed */ fd = mfd_assert_new("", 0, MFD_CLOEXEC); close(fd); /* verify MFD_ALLOW_SEALING is allowed */ fd = mfd_assert_new("", 0, MFD_ALLOW_SEALING); close(fd); /* verify MFD_ALLOW_SEALING | MFD_CLOEXEC is allowed */ fd = mfd_assert_new("", 0, MFD_ALLOW_SEALING | MFD_CLOEXEC); close(fd); } /* * Test basic sealing * A very basic sealing test to see whether setting/retrieving seals works. */ static void test_basic(void) { int fd; printf("%s BASIC\n", memfd_str); fd = mfd_assert_new("kern_memfd_basic", mfd_def_size, MFD_CLOEXEC | MFD_ALLOW_SEALING); /* add basic seals */ mfd_assert_has_seals(fd, 0); mfd_assert_add_seals(fd, F_SEAL_SHRINK | F_SEAL_WRITE); mfd_assert_has_seals(fd, F_SEAL_SHRINK | F_SEAL_WRITE); /* add them again */ mfd_assert_add_seals(fd, F_SEAL_SHRINK | F_SEAL_WRITE); mfd_assert_has_seals(fd, F_SEAL_SHRINK | F_SEAL_WRITE); /* add more seals and seal against sealing */ mfd_assert_add_seals(fd, F_SEAL_GROW | F_SEAL_SEAL); mfd_assert_has_seals(fd, F_SEAL_SHRINK | F_SEAL_GROW | F_SEAL_WRITE | F_SEAL_SEAL); /* verify that sealing no longer works */ mfd_fail_add_seals(fd, F_SEAL_GROW); mfd_fail_add_seals(fd, 0); close(fd); /* verify sealing does not work without MFD_ALLOW_SEALING */ fd = mfd_assert_new("kern_memfd_basic", mfd_def_size, MFD_CLOEXEC); mfd_assert_has_seals(fd, F_SEAL_SEAL); mfd_fail_add_seals(fd, F_SEAL_SHRINK | F_SEAL_GROW | F_SEAL_WRITE); mfd_assert_has_seals(fd, F_SEAL_SEAL); close(fd); } /* * Test SEAL_WRITE * Test whether SEAL_WRITE actually prevents modifications. */ static void test_seal_write(void) { int fd; printf("%s SEAL-WRITE\n", memfd_str); fd = mfd_assert_new("kern_memfd_seal_write", mfd_def_size, MFD_CLOEXEC | MFD_ALLOW_SEALING); mfd_assert_has_seals(fd, 0); mfd_assert_add_seals(fd, F_SEAL_WRITE); mfd_assert_has_seals(fd, F_SEAL_WRITE); mfd_assert_read(fd); mfd_fail_write(fd); mfd_assert_shrink(fd); mfd_assert_grow(fd); mfd_fail_grow_write(fd); close(fd); } /* * Test SEAL_FUTURE_WRITE * Test whether SEAL_FUTURE_WRITE actually prevents modifications. */ static void test_seal_future_write(void) { int fd, fd2; void *p; printf("%s SEAL-FUTURE-WRITE\n", memfd_str); fd = mfd_assert_new("kern_memfd_seal_future_write", mfd_def_size, MFD_CLOEXEC | MFD_ALLOW_SEALING); p = mfd_assert_mmap_shared(fd); mfd_assert_has_seals(fd, 0); mfd_assert_add_seals(fd, F_SEAL_FUTURE_WRITE); mfd_assert_has_seals(fd, F_SEAL_FUTURE_WRITE); /* read should pass, writes should fail */ mfd_assert_read(fd); mfd_assert_read_shared(fd); mfd_fail_write(fd); fd2 = mfd_assert_reopen_fd(fd); /* read should pass, writes should still fail */ mfd_assert_read(fd2); mfd_assert_read_shared(fd2); mfd_fail_write(fd2); mfd_assert_fork_private_write(fd); munmap(p, mfd_def_size); close(fd2); close(fd); } /* * Test SEAL_SHRINK * Test whether SEAL_SHRINK actually prevents shrinking */ static void test_seal_shrink(void) { int fd; printf("%s SEAL-SHRINK\n", memfd_str); fd = mfd_assert_new("kern_memfd_seal_shrink", mfd_def_size, MFD_CLOEXEC | MFD_ALLOW_SEALING); mfd_assert_has_seals(fd, 0); mfd_assert_add_seals(fd, F_SEAL_SHRINK); mfd_assert_has_seals(fd, F_SEAL_SHRINK); mfd_assert_read(fd); mfd_assert_write(fd); mfd_fail_shrink(fd); mfd_assert_grow(fd); mfd_assert_grow_write(fd); close(fd); } /* * Test SEAL_GROW * Test whether SEAL_GROW actually prevents growing */ static void test_seal_grow(void) { int fd; printf("%s SEAL-GROW\n", memfd_str); fd = mfd_assert_new("kern_memfd_seal_grow", mfd_def_size, MFD_CLOEXEC | MFD_ALLOW_SEALING); mfd_assert_has_seals(fd, 0); mfd_assert_add_seals(fd, F_SEAL_GROW); mfd_assert_has_seals(fd, F_SEAL_GROW); mfd_assert_read(fd); mfd_assert_write(fd); mfd_assert_shrink(fd); mfd_fail_grow(fd); mfd_fail_grow_write(fd); close(fd); } /* * Test SEAL_SHRINK | SEAL_GROW * Test whether SEAL_SHRINK | SEAL_GROW actually prevents resizing */ static void test_seal_resize(void) { int fd; printf("%s SEAL-RESIZE\n", memfd_str); fd = mfd_assert_new("kern_memfd_seal_resize", mfd_def_size, MFD_CLOEXEC | MFD_ALLOW_SEALING); mfd_assert_has_seals(fd, 0); mfd_assert_add_seals(fd, F_SEAL_SHRINK | F_SEAL_GROW); mfd_assert_has_seals(fd, F_SEAL_SHRINK | F_SEAL_GROW); mfd_assert_read(fd); mfd_assert_write(fd); mfd_fail_shrink(fd); mfd_fail_grow(fd); mfd_fail_grow_write(fd); close(fd); } /* * Test SEAL_EXEC * Test fd is created with exec and allow sealing. * chmod() cannot change x bits after sealing. */ static void test_exec_seal(void) { int fd; printf("%s SEAL-EXEC\n", memfd_str); printf("%s Apply SEAL_EXEC\n", memfd_str); fd = mfd_assert_new("kern_memfd_seal_exec", mfd_def_size, MFD_CLOEXEC | MFD_ALLOW_SEALING | MFD_EXEC); mfd_assert_mode(fd, 0777); mfd_assert_chmod(fd, 0644); mfd_assert_has_seals(fd, 0); mfd_assert_add_seals(fd, F_SEAL_EXEC); mfd_assert_has_seals(fd, F_SEAL_EXEC); mfd_assert_chmod(fd, 0600); mfd_fail_chmod(fd, 0777); mfd_fail_chmod(fd, 0670); mfd_fail_chmod(fd, 0605); mfd_fail_chmod(fd, 0700); mfd_fail_chmod(fd, 0100); mfd_assert_chmod(fd, 0666); mfd_assert_write(fd); close(fd); printf("%s Apply ALL_SEALS\n", memfd_str); fd = mfd_assert_new("kern_memfd_seal_exec", mfd_def_size, MFD_CLOEXEC | MFD_ALLOW_SEALING | MFD_EXEC); mfd_assert_mode(fd, 0777); mfd_assert_chmod(fd, 0700); mfd_assert_has_seals(fd, 0); mfd_assert_add_seals(fd, F_SEAL_EXEC); mfd_assert_has_seals(fd, F_WX_SEALS); mfd_fail_chmod(fd, 0711); mfd_fail_chmod(fd, 0600); mfd_fail_write(fd); close(fd); } /* * Test EXEC_NO_SEAL * Test fd is created with exec and not allow sealing. */ static void test_exec_no_seal(void) { int fd; printf("%s EXEC_NO_SEAL\n", memfd_str); /* Create with EXEC but without ALLOW_SEALING */ fd = mfd_assert_new("kern_memfd_exec_no_sealing", mfd_def_size, MFD_CLOEXEC | MFD_EXEC); mfd_assert_mode(fd, 0777); mfd_assert_has_seals(fd, F_SEAL_SEAL); mfd_assert_chmod(fd, 0666); close(fd); } /* * Test memfd_create with MFD_NOEXEC flag */ static void test_noexec_seal(void) { int fd; printf("%s NOEXEC_SEAL\n", memfd_str); /* Create with NOEXEC and ALLOW_SEALING */ fd = mfd_assert_new("kern_memfd_noexec", mfd_def_size, MFD_CLOEXEC | MFD_ALLOW_SEALING | MFD_NOEXEC_SEAL); mfd_assert_mode(fd, 0666); mfd_assert_has_seals(fd, F_SEAL_EXEC); mfd_fail_chmod(fd, 0777); close(fd); /* Create with NOEXEC but without ALLOW_SEALING */ fd = mfd_assert_new("kern_memfd_noexec", mfd_def_size, MFD_CLOEXEC | MFD_NOEXEC_SEAL); mfd_assert_mode(fd, 0666); mfd_assert_has_seals(fd, F_SEAL_EXEC); mfd_fail_chmod(fd, 0777); close(fd); } static void test_sysctl_sysctl0(void) { int fd; sysctl_assert_equal("0"); fd = mfd_assert_new("kern_memfd_sysctl_0_dfl", mfd_def_size, MFD_CLOEXEC | MFD_ALLOW_SEALING); mfd_assert_mode(fd, 0777); mfd_assert_has_seals(fd, 0); mfd_assert_chmod(fd, 0644); close(fd); } static void test_sysctl_set_sysctl0(void) { sysctl_assert_write("0"); test_sysctl_sysctl0(); } static void test_sysctl_sysctl1(void) { int fd; sysctl_assert_equal("1"); fd = mfd_assert_new("kern_memfd_sysctl_1_dfl", mfd_def_size, MFD_CLOEXEC | MFD_ALLOW_SEALING); mfd_assert_mode(fd, 0666); mfd_assert_has_seals(fd, F_SEAL_EXEC); mfd_fail_chmod(fd, 0777); close(fd); fd = mfd_assert_new("kern_memfd_sysctl_1_exec", mfd_def_size, MFD_CLOEXEC | MFD_EXEC | MFD_ALLOW_SEALING); mfd_assert_mode(fd, 0777); mfd_assert_has_seals(fd, 0); mfd_assert_chmod(fd, 0644); close(fd); fd = mfd_assert_new("kern_memfd_sysctl_1_noexec", mfd_def_size, MFD_CLOEXEC | MFD_NOEXEC_SEAL | MFD_ALLOW_SEALING); mfd_assert_mode(fd, 0666); mfd_assert_has_seals(fd, F_SEAL_EXEC); mfd_fail_chmod(fd, 0777); close(fd); } static void test_sysctl_set_sysctl1(void) { sysctl_assert_write("1"); test_sysctl_sysctl1(); } static void test_sysctl_sysctl2(void) { int fd; sysctl_assert_equal("2"); fd = mfd_assert_new("kern_memfd_sysctl_2_dfl", mfd_def_size, MFD_CLOEXEC | MFD_ALLOW_SEALING); mfd_assert_mode(fd, 0666); mfd_assert_has_seals(fd, F_SEAL_EXEC); mfd_fail_chmod(fd, 0777); close(fd); mfd_fail_new("kern_memfd_sysctl_2_exec", MFD_CLOEXEC | MFD_EXEC | MFD_ALLOW_SEALING); fd = mfd_assert_new("kern_memfd_sysctl_2_noexec", mfd_def_size, MFD_CLOEXEC | MFD_NOEXEC_SEAL | MFD_ALLOW_SEALING); mfd_assert_mode(fd, 0666); mfd_assert_has_seals(fd, F_SEAL_EXEC); mfd_fail_chmod(fd, 0777); close(fd); } static void test_sysctl_set_sysctl2(void) { sysctl_assert_write("2"); test_sysctl_sysctl2(); } static int sysctl_simple_child(void *arg) { printf("%s sysctl 0\n", memfd_str); test_sysctl_set_sysctl0(); printf("%s sysctl 1\n", memfd_str); test_sysctl_set_sysctl1(); printf("%s sysctl 0\n", memfd_str); test_sysctl_set_sysctl0(); printf("%s sysctl 2\n", memfd_str); test_sysctl_set_sysctl2(); printf("%s sysctl 1\n", memfd_str); test_sysctl_set_sysctl1(); printf("%s sysctl 0\n", memfd_str); test_sysctl_set_sysctl0(); return 0; } /* * Test sysctl * A very basic test to make sure the core sysctl semantics work. */ static void test_sysctl_simple(void) { int pid = spawn_thread(CLONE_NEWPID, sysctl_simple_child, NULL); join_thread(pid); } static int sysctl_nested(void *arg) { void (*fn)(void) = arg; fn(); return 0; } static int sysctl_nested_wait(void *arg) { /* Wait for a SIGCONT. */ kill(getpid(), SIGSTOP); return sysctl_nested(arg); } static void test_sysctl_sysctl1_failset(void) { sysctl_fail_write("0"); test_sysctl_sysctl1(); } static void test_sysctl_sysctl2_failset(void) { sysctl_fail_write("1"); test_sysctl_sysctl2(); sysctl_fail_write("0"); test_sysctl_sysctl2(); } static int sysctl_nested_child(void *arg) { int pid; printf("%s nested sysctl 0\n", memfd_str); sysctl_assert_write("0"); /* A further nested pidns works the same. */ pid = spawn_thread(CLONE_NEWPID, sysctl_simple_child, NULL); join_thread(pid); printf("%s nested sysctl 1\n", memfd_str); sysctl_assert_write("1"); /* Child inherits our setting. */ pid = spawn_thread(CLONE_NEWPID, sysctl_nested, test_sysctl_sysctl1); join_thread(pid); /* Child cannot raise the setting. */ pid = spawn_thread(CLONE_NEWPID, sysctl_nested, test_sysctl_sysctl1_failset); join_thread(pid); /* Child can lower the setting. */ pid = spawn_thread(CLONE_NEWPID, sysctl_nested, test_sysctl_set_sysctl2); join_thread(pid); /* Child lowering the setting has no effect on our setting. */ test_sysctl_sysctl1(); printf("%s nested sysctl 2\n", memfd_str); sysctl_assert_write("2"); /* Child inherits our setting. */ pid = spawn_thread(CLONE_NEWPID, sysctl_nested, test_sysctl_sysctl2); join_thread(pid); /* Child cannot raise the setting. */ pid = spawn_thread(CLONE_NEWPID, sysctl_nested, test_sysctl_sysctl2_failset); join_thread(pid); /* Verify that the rules are actually inherited after fork. */ printf("%s nested sysctl 0 -> 1 after fork\n", memfd_str); sysctl_assert_write("0"); pid = spawn_thread(CLONE_NEWPID, sysctl_nested_wait, test_sysctl_sysctl1_failset); sysctl_assert_write("1"); kill(pid, SIGCONT); join_thread(pid); printf("%s nested sysctl 0 -> 2 after fork\n", memfd_str); sysctl_assert_write("0"); pid = spawn_thread(CLONE_NEWPID, sysctl_nested_wait, test_sysctl_sysctl2_failset); sysctl_assert_write("2"); kill(pid, SIGCONT); join_thread(pid); /* * Verify that the current effective setting is saved on fork, meaning * that the parent lowering the sysctl doesn't affect already-forked * children. */ printf("%s nested sysctl 2 -> 1 after fork\n", memfd_str); sysctl_assert_write("2"); pid = spawn_thread(CLONE_NEWPID, sysctl_nested_wait, test_sysctl_sysctl2); sysctl_assert_write("1"); kill(pid, SIGCONT); join_thread(pid); printf("%s nested sysctl 2 -> 0 after fork\n", memfd_str); sysctl_assert_write("2"); pid = spawn_thread(CLONE_NEWPID, sysctl_nested_wait, test_sysctl_sysctl2); sysctl_assert_write("0"); kill(pid, SIGCONT); join_thread(pid); printf("%s nested sysctl 1 -> 0 after fork\n", memfd_str); sysctl_assert_write("1"); pid = spawn_thread(CLONE_NEWPID, sysctl_nested_wait, test_sysctl_sysctl1); sysctl_assert_write("0"); kill(pid, SIGCONT); join_thread(pid); return 0; } /* * Test sysctl with nested pid namespaces * Make sure that the sysctl nesting semantics work correctly. */ static void test_sysctl_nested(void) { int pid = spawn_thread(CLONE_NEWPID, sysctl_nested_child, NULL); join_thread(pid); } /* * Test sharing via dup() * Test that seals are shared between dupped FDs and they're all equal. */ static void test_share_dup(char *banner, char *b_suffix) { int fd, fd2; printf("%s %s %s\n", memfd_str, banner, b_suffix); fd = mfd_assert_new("kern_memfd_share_dup", mfd_def_size, MFD_CLOEXEC | MFD_ALLOW_SEALING); mfd_assert_has_seals(fd, 0); fd2 = mfd_assert_dup(fd); mfd_assert_has_seals(fd2, 0); mfd_assert_add_seals(fd, F_SEAL_WRITE); mfd_assert_has_seals(fd, F_SEAL_WRITE); mfd_assert_has_seals(fd2, F_SEAL_WRITE); mfd_assert_add_seals(fd2, F_SEAL_SHRINK); mfd_assert_has_seals(fd, F_SEAL_WRITE | F_SEAL_SHRINK); mfd_assert_has_seals(fd2, F_SEAL_WRITE | F_SEAL_SHRINK); mfd_assert_add_seals(fd, F_SEAL_SEAL); mfd_assert_has_seals(fd, F_SEAL_WRITE | F_SEAL_SHRINK | F_SEAL_SEAL); mfd_assert_has_seals(fd2, F_SEAL_WRITE | F_SEAL_SHRINK | F_SEAL_SEAL); mfd_fail_add_seals(fd, F_SEAL_GROW); mfd_fail_add_seals(fd2, F_SEAL_GROW); mfd_fail_add_seals(fd, F_SEAL_SEAL); mfd_fail_add_seals(fd2, F_SEAL_SEAL); close(fd2); mfd_fail_add_seals(fd, F_SEAL_GROW); close(fd); } /* * Test sealing with active mmap()s * Modifying seals is only allowed if no other mmap() refs exist. */ static void test_share_mmap(char *banner, char *b_suffix) { int fd; void *p; printf("%s %s %s\n", memfd_str, banner, b_suffix); fd = mfd_assert_new("kern_memfd_share_mmap", mfd_def_size, MFD_CLOEXEC | MFD_ALLOW_SEALING); mfd_assert_has_seals(fd, 0); /* shared/writable ref prevents sealing WRITE, but allows others */ p = mfd_assert_mmap_shared(fd); mfd_fail_add_seals(fd, F_SEAL_WRITE); mfd_assert_has_seals(fd, 0); mfd_assert_add_seals(fd, F_SEAL_SHRINK); mfd_assert_has_seals(fd, F_SEAL_SHRINK); munmap(p, mfd_def_size); /* readable ref allows sealing */ p = mfd_assert_mmap_private(fd); mfd_assert_add_seals(fd, F_SEAL_WRITE); mfd_assert_has_seals(fd, F_SEAL_WRITE | F_SEAL_SHRINK); munmap(p, mfd_def_size); close(fd); } /* * Test sealing with open(/proc/self/fd/%d) * Via /proc we can get access to a separate file-context for the same memfd. * This is *not* like dup(), but like a real separate open(). Make sure the * semantics are as expected and we correctly check for RDONLY / WRONLY / RDWR. */ static void test_share_open(char *banner, char *b_suffix) { int fd, fd2; printf("%s %s %s\n", memfd_str, banner, b_suffix); fd = mfd_assert_new("kern_memfd_share_open", mfd_def_size, MFD_CLOEXEC | MFD_ALLOW_SEALING); mfd_assert_has_seals(fd, 0); fd2 = mfd_assert_open(fd, O_RDWR, 0); mfd_assert_add_seals(fd, F_SEAL_WRITE); mfd_assert_has_seals(fd, F_SEAL_WRITE); mfd_assert_has_seals(fd2, F_SEAL_WRITE); mfd_assert_add_seals(fd2, F_SEAL_SHRINK); mfd_assert_has_seals(fd, F_SEAL_WRITE | F_SEAL_SHRINK); mfd_assert_has_seals(fd2, F_SEAL_WRITE | F_SEAL_SHRINK); close(fd); fd = mfd_assert_open(fd2, O_RDONLY, 0); mfd_fail_add_seals(fd, F_SEAL_SEAL); mfd_assert_has_seals(fd, F_SEAL_WRITE | F_SEAL_SHRINK); mfd_assert_has_seals(fd2, F_SEAL_WRITE | F_SEAL_SHRINK); close(fd2); fd2 = mfd_assert_open(fd, O_RDWR, 0); mfd_assert_add_seals(fd2, F_SEAL_SEAL); mfd_assert_has_seals(fd, F_SEAL_WRITE | F_SEAL_SHRINK | F_SEAL_SEAL); mfd_assert_has_seals(fd2, F_SEAL_WRITE | F_SEAL_SHRINK | F_SEAL_SEAL); close(fd2); close(fd); } /* * Test sharing via fork() * Test whether seal-modifications work as expected with forked childs. */ static void test_share_fork(char *banner, char *b_suffix) { int fd; pid_t pid; printf("%s %s %s\n", memfd_str, banner, b_suffix); fd = mfd_assert_new("kern_memfd_share_fork", mfd_def_size, MFD_CLOEXEC | MFD_ALLOW_SEALING); mfd_assert_has_seals(fd, 0); pid = spawn_idle_thread(0); mfd_assert_add_seals(fd, F_SEAL_SEAL); mfd_assert_has_seals(fd, F_SEAL_SEAL); mfd_fail_add_seals(fd, F_SEAL_WRITE); mfd_assert_has_seals(fd, F_SEAL_SEAL); join_idle_thread(pid); mfd_fail_add_seals(fd, F_SEAL_WRITE); mfd_assert_has_seals(fd, F_SEAL_SEAL); close(fd); } int main(int argc, char **argv) { pid_t pid; if (argc == 2) { if (!strcmp(argv[1], "hugetlbfs")) { unsigned long hpage_size = default_huge_page_size(); if (!hpage_size) { printf("Unable to determine huge page size\n"); abort(); } hugetlbfs_test = 1; memfd_str = MEMFD_HUGE_STR; mfd_def_size = hpage_size * 2; } else { printf("Unknown option: %s\n", argv[1]); abort(); } } test_create(); test_basic(); test_exec_seal(); test_exec_no_seal(); test_noexec_seal(); test_seal_write(); test_seal_future_write(); test_seal_shrink(); test_seal_grow(); test_seal_resize(); test_sysctl_simple(); test_sysctl_nested(); test_share_dup("SHARE-DUP", ""); test_share_mmap("SHARE-MMAP", ""); test_share_open("SHARE-OPEN", ""); test_share_fork("SHARE-FORK", ""); /* Run test-suite in a multi-threaded environment with a shared * file-table. */ pid = spawn_idle_thread(CLONE_FILES | CLONE_FS | CLONE_VM); test_share_dup("SHARE-DUP", SHARED_FT_STR); test_share_mmap("SHARE-MMAP", SHARED_FT_STR); test_share_open("SHARE-OPEN", SHARED_FT_STR); test_share_fork("SHARE-FORK", SHARED_FT_STR); join_idle_thread(pid); printf("memfd: DONE\n"); return 0; }
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with Cregit http://github.com/cregit/cregit
Version 2.0-RC1