116 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			116 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
// SPDX-License-Identifier: GPL-2.0
 | 
						|
 | 
						|
/*
 | 
						|
 * Copyright (C) 2020 Google LLC.
 | 
						|
 */
 | 
						|
 | 
						|
#include <test_progs.h>
 | 
						|
#include <sys/mman.h>
 | 
						|
#include <sys/wait.h>
 | 
						|
#include <unistd.h>
 | 
						|
#include <malloc.h>
 | 
						|
#include <stdlib.h>
 | 
						|
 | 
						|
#include "lsm.skel.h"
 | 
						|
 | 
						|
char *CMD_ARGS[] = {"true", NULL};
 | 
						|
 | 
						|
#define GET_PAGE_ADDR(ADDR, PAGE_SIZE)					\
 | 
						|
	(char *)(((unsigned long) (ADDR + PAGE_SIZE)) & ~(PAGE_SIZE-1))
 | 
						|
 | 
						|
int stack_mprotect(void)
 | 
						|
{
 | 
						|
	void *buf;
 | 
						|
	long sz;
 | 
						|
	int ret;
 | 
						|
 | 
						|
	sz = sysconf(_SC_PAGESIZE);
 | 
						|
	if (sz < 0)
 | 
						|
		return sz;
 | 
						|
 | 
						|
	buf = alloca(sz * 3);
 | 
						|
	ret = mprotect(GET_PAGE_ADDR(buf, sz), sz,
 | 
						|
		       PROT_READ | PROT_WRITE | PROT_EXEC);
 | 
						|
	return ret;
 | 
						|
}
 | 
						|
 | 
						|
int exec_cmd(int *monitored_pid)
 | 
						|
{
 | 
						|
	int child_pid, child_status;
 | 
						|
 | 
						|
	child_pid = fork();
 | 
						|
	if (child_pid == 0) {
 | 
						|
		*monitored_pid = getpid();
 | 
						|
		execvp(CMD_ARGS[0], CMD_ARGS);
 | 
						|
		return -EINVAL;
 | 
						|
	} else if (child_pid > 0) {
 | 
						|
		waitpid(child_pid, &child_status, 0);
 | 
						|
		return child_status;
 | 
						|
	}
 | 
						|
 | 
						|
	return -EINVAL;
 | 
						|
}
 | 
						|
 | 
						|
static int test_lsm(struct lsm *skel)
 | 
						|
{
 | 
						|
	struct bpf_link *link;
 | 
						|
	int buf = 1234;
 | 
						|
	int err;
 | 
						|
 | 
						|
	err = lsm__attach(skel);
 | 
						|
	if (!ASSERT_OK(err, "attach"))
 | 
						|
		return err;
 | 
						|
 | 
						|
	/* Check that already linked program can't be attached again. */
 | 
						|
	link = bpf_program__attach(skel->progs.test_int_hook);
 | 
						|
	if (!ASSERT_ERR_PTR(link, "attach_link"))
 | 
						|
		return -1;
 | 
						|
 | 
						|
	err = exec_cmd(&skel->bss->monitored_pid);
 | 
						|
	if (!ASSERT_OK(err, "exec_cmd"))
 | 
						|
		return err;
 | 
						|
 | 
						|
	ASSERT_EQ(skel->bss->bprm_count, 1, "bprm_count");
 | 
						|
 | 
						|
	skel->bss->monitored_pid = getpid();
 | 
						|
 | 
						|
	err = stack_mprotect();
 | 
						|
	if (!ASSERT_EQ(errno, EPERM, "stack_mprotect"))
 | 
						|
		return err;
 | 
						|
 | 
						|
	ASSERT_EQ(skel->bss->mprotect_count, 1, "mprotect_count");
 | 
						|
 | 
						|
	syscall(__NR_setdomainname, &buf, -2L);
 | 
						|
	syscall(__NR_setdomainname, 0, -3L);
 | 
						|
	syscall(__NR_setdomainname, ~0L, -4L);
 | 
						|
 | 
						|
	ASSERT_EQ(skel->bss->copy_test, 3, "copy_test");
 | 
						|
 | 
						|
	lsm__detach(skel);
 | 
						|
 | 
						|
	skel->bss->copy_test = 0;
 | 
						|
	skel->bss->bprm_count = 0;
 | 
						|
	skel->bss->mprotect_count = 0;
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
void test_test_lsm(void)
 | 
						|
{
 | 
						|
	struct lsm *skel = NULL;
 | 
						|
	int err;
 | 
						|
 | 
						|
	skel = lsm__open_and_load();
 | 
						|
	if (!ASSERT_OK_PTR(skel, "lsm_skel_load"))
 | 
						|
		goto close_prog;
 | 
						|
 | 
						|
	err = test_lsm(skel);
 | 
						|
	if (!ASSERT_OK(err, "test_lsm_first_attach"))
 | 
						|
		goto close_prog;
 | 
						|
 | 
						|
	err = test_lsm(skel);
 | 
						|
	ASSERT_OK(err, "test_lsm_second_attach");
 | 
						|
 | 
						|
close_prog:
 | 
						|
	lsm__destroy(skel);
 | 
						|
}
 |