313 lines
7.0 KiB
C
313 lines
7.0 KiB
C
|
// SPDX-License-Identifier: GPL-2.0-only
|
||
|
/*
|
||
|
* Copyright (c) 2020 Collabora Ltd.
|
||
|
*
|
||
|
* Test code for syscall user dispatch
|
||
|
*/
|
||
|
|
||
|
#define _GNU_SOURCE
|
||
|
#include <sys/prctl.h>
|
||
|
#include <sys/sysinfo.h>
|
||
|
#include <sys/syscall.h>
|
||
|
#include <signal.h>
|
||
|
|
||
|
#include <asm/unistd.h>
|
||
|
#include "../kselftest_harness.h"
|
||
|
|
||
|
#ifndef PR_SET_SYSCALL_USER_DISPATCH
|
||
|
# define PR_SET_SYSCALL_USER_DISPATCH 59
|
||
|
# define PR_SYS_DISPATCH_OFF 0
|
||
|
# define PR_SYS_DISPATCH_ON 1
|
||
|
# define SYSCALL_DISPATCH_FILTER_ALLOW 0
|
||
|
# define SYSCALL_DISPATCH_FILTER_BLOCK 1
|
||
|
#endif
|
||
|
|
||
|
#ifndef SYS_USER_DISPATCH
|
||
|
# define SYS_USER_DISPATCH 2
|
||
|
#endif
|
||
|
|
||
|
#ifdef __NR_syscalls
|
||
|
# define MAGIC_SYSCALL_1 (__NR_syscalls + 1) /* Bad Linux syscall number */
|
||
|
#else
|
||
|
# define MAGIC_SYSCALL_1 (0xff00) /* Bad Linux syscall number */
|
||
|
#endif
|
||
|
|
||
|
#define SYSCALL_DISPATCH_ON(x) ((x) = SYSCALL_DISPATCH_FILTER_BLOCK)
|
||
|
#define SYSCALL_DISPATCH_OFF(x) ((x) = SYSCALL_DISPATCH_FILTER_ALLOW)
|
||
|
|
||
|
/* Test Summary:
|
||
|
*
|
||
|
* - dispatch_trigger_sigsys: Verify if PR_SET_SYSCALL_USER_DISPATCH is
|
||
|
* able to trigger SIGSYS on a syscall.
|
||
|
*
|
||
|
* - bad_selector: Test that a bad selector value triggers SIGSYS with
|
||
|
* si_errno EINVAL.
|
||
|
*
|
||
|
* - bad_prctl_param: Test that the API correctly rejects invalid
|
||
|
* parameters on prctl
|
||
|
*
|
||
|
* - dispatch_and_return: Test that a syscall is selectively dispatched
|
||
|
* to userspace depending on the value of selector.
|
||
|
*
|
||
|
* - disable_dispatch: Test that the PR_SYS_DISPATCH_OFF correctly
|
||
|
* disables the dispatcher
|
||
|
*
|
||
|
* - direct_dispatch_range: Test that a syscall within the allowed range
|
||
|
* can bypass the dispatcher.
|
||
|
*/
|
||
|
|
||
|
TEST_SIGNAL(dispatch_trigger_sigsys, SIGSYS)
|
||
|
{
|
||
|
char sel = SYSCALL_DISPATCH_FILTER_ALLOW;
|
||
|
struct sysinfo info;
|
||
|
int ret;
|
||
|
|
||
|
ret = sysinfo(&info);
|
||
|
ASSERT_EQ(0, ret);
|
||
|
|
||
|
ret = prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_ON, 0, 0, &sel);
|
||
|
ASSERT_EQ(0, ret) {
|
||
|
TH_LOG("Kernel does not support CONFIG_SYSCALL_USER_DISPATCH");
|
||
|
}
|
||
|
|
||
|
SYSCALL_DISPATCH_ON(sel);
|
||
|
|
||
|
sysinfo(&info);
|
||
|
|
||
|
EXPECT_FALSE(true) {
|
||
|
TH_LOG("Unreachable!");
|
||
|
}
|
||
|
}
|
||
|
|
||
|
TEST(bad_prctl_param)
|
||
|
{
|
||
|
char sel = SYSCALL_DISPATCH_FILTER_ALLOW;
|
||
|
int op;
|
||
|
|
||
|
/* Invalid op */
|
||
|
op = -1;
|
||
|
prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0, 0, &sel);
|
||
|
ASSERT_EQ(EINVAL, errno);
|
||
|
|
||
|
/* PR_SYS_DISPATCH_OFF */
|
||
|
op = PR_SYS_DISPATCH_OFF;
|
||
|
|
||
|
/* offset != 0 */
|
||
|
prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x1, 0x0, 0);
|
||
|
EXPECT_EQ(EINVAL, errno);
|
||
|
|
||
|
/* len != 0 */
|
||
|
prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x0, 0xff, 0);
|
||
|
EXPECT_EQ(EINVAL, errno);
|
||
|
|
||
|
/* sel != NULL */
|
||
|
prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x0, 0x0, &sel);
|
||
|
EXPECT_EQ(EINVAL, errno);
|
||
|
|
||
|
/* Valid parameter */
|
||
|
errno = 0;
|
||
|
prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x0, 0x0, 0x0);
|
||
|
EXPECT_EQ(0, errno);
|
||
|
|
||
|
/* PR_SYS_DISPATCH_ON */
|
||
|
op = PR_SYS_DISPATCH_ON;
|
||
|
|
||
|
/* Dispatcher region is bad (offset > 0 && len == 0) */
|
||
|
prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x1, 0x0, &sel);
|
||
|
EXPECT_EQ(EINVAL, errno);
|
||
|
prctl(PR_SET_SYSCALL_USER_DISPATCH, op, -1L, 0x0, &sel);
|
||
|
EXPECT_EQ(EINVAL, errno);
|
||
|
|
||
|
/* Invalid selector */
|
||
|
prctl(PR_SET_SYSCALL_USER_DISPATCH, op, 0x0, 0x1, (void *) -1);
|
||
|
ASSERT_EQ(EFAULT, errno);
|
||
|
|
||
|
/*
|
||
|
* Dispatcher range overflows unsigned long
|
||
|
*/
|
||
|
prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_ON, 1, -1L, &sel);
|
||
|
ASSERT_EQ(EINVAL, errno) {
|
||
|
TH_LOG("Should reject bad syscall range");
|
||
|
}
|
||
|
|
||
|
/*
|
||
|
* Allowed range overflows usigned long
|
||
|
*/
|
||
|
prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_ON, -1L, 0x1, &sel);
|
||
|
ASSERT_EQ(EINVAL, errno) {
|
||
|
TH_LOG("Should reject bad syscall range");
|
||
|
}
|
||
|
}
|
||
|
|
||
|
/*
|
||
|
* Use global selector for handle_sigsys tests, to avoid passing
|
||
|
* selector to signal handler
|
||
|
*/
|
||
|
char glob_sel;
|
||
|
int nr_syscalls_emulated;
|
||
|
int si_code;
|
||
|
int si_errno;
|
||
|
|
||
|
static void handle_sigsys(int sig, siginfo_t *info, void *ucontext)
|
||
|
{
|
||
|
si_code = info->si_code;
|
||
|
si_errno = info->si_errno;
|
||
|
|
||
|
if (info->si_syscall == MAGIC_SYSCALL_1)
|
||
|
nr_syscalls_emulated++;
|
||
|
|
||
|
/* In preparation for sigreturn. */
|
||
|
SYSCALL_DISPATCH_OFF(glob_sel);
|
||
|
}
|
||
|
|
||
|
TEST(dispatch_and_return)
|
||
|
{
|
||
|
long ret;
|
||
|
struct sigaction act;
|
||
|
sigset_t mask;
|
||
|
|
||
|
glob_sel = 0;
|
||
|
nr_syscalls_emulated = 0;
|
||
|
si_code = 0;
|
||
|
si_errno = 0;
|
||
|
|
||
|
memset(&act, 0, sizeof(act));
|
||
|
sigemptyset(&mask);
|
||
|
|
||
|
act.sa_sigaction = handle_sigsys;
|
||
|
act.sa_flags = SA_SIGINFO;
|
||
|
act.sa_mask = mask;
|
||
|
|
||
|
ret = sigaction(SIGSYS, &act, NULL);
|
||
|
ASSERT_EQ(0, ret);
|
||
|
|
||
|
/* Make sure selector is good prior to prctl. */
|
||
|
SYSCALL_DISPATCH_OFF(glob_sel);
|
||
|
|
||
|
ret = prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_ON, 0, 0, &glob_sel);
|
||
|
ASSERT_EQ(0, ret) {
|
||
|
TH_LOG("Kernel does not support CONFIG_SYSCALL_USER_DISPATCH");
|
||
|
}
|
||
|
|
||
|
/* MAGIC_SYSCALL_1 doesn't exist. */
|
||
|
SYSCALL_DISPATCH_OFF(glob_sel);
|
||
|
ret = syscall(MAGIC_SYSCALL_1);
|
||
|
EXPECT_EQ(-1, ret) {
|
||
|
TH_LOG("Dispatch triggered unexpectedly");
|
||
|
}
|
||
|
|
||
|
/* MAGIC_SYSCALL_1 should be emulated. */
|
||
|
nr_syscalls_emulated = 0;
|
||
|
SYSCALL_DISPATCH_ON(glob_sel);
|
||
|
|
||
|
ret = syscall(MAGIC_SYSCALL_1);
|
||
|
EXPECT_EQ(MAGIC_SYSCALL_1, ret) {
|
||
|
TH_LOG("Failed to intercept syscall");
|
||
|
}
|
||
|
EXPECT_EQ(1, nr_syscalls_emulated) {
|
||
|
TH_LOG("Failed to emulate syscall");
|
||
|
}
|
||
|
ASSERT_EQ(SYS_USER_DISPATCH, si_code) {
|
||
|
TH_LOG("Bad si_code in SIGSYS");
|
||
|
}
|
||
|
ASSERT_EQ(0, si_errno) {
|
||
|
TH_LOG("Bad si_errno in SIGSYS");
|
||
|
}
|
||
|
}
|
||
|
|
||
|
TEST_SIGNAL(bad_selector, SIGSYS)
|
||
|
{
|
||
|
long ret;
|
||
|
struct sigaction act;
|
||
|
sigset_t mask;
|
||
|
struct sysinfo info;
|
||
|
|
||
|
glob_sel = SYSCALL_DISPATCH_FILTER_ALLOW;
|
||
|
nr_syscalls_emulated = 0;
|
||
|
si_code = 0;
|
||
|
si_errno = 0;
|
||
|
|
||
|
memset(&act, 0, sizeof(act));
|
||
|
sigemptyset(&mask);
|
||
|
|
||
|
act.sa_sigaction = handle_sigsys;
|
||
|
act.sa_flags = SA_SIGINFO;
|
||
|
act.sa_mask = mask;
|
||
|
|
||
|
ret = sigaction(SIGSYS, &act, NULL);
|
||
|
ASSERT_EQ(0, ret);
|
||
|
|
||
|
/* Make sure selector is good prior to prctl. */
|
||
|
SYSCALL_DISPATCH_OFF(glob_sel);
|
||
|
|
||
|
ret = prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_ON, 0, 0, &glob_sel);
|
||
|
ASSERT_EQ(0, ret) {
|
||
|
TH_LOG("Kernel does not support CONFIG_SYSCALL_USER_DISPATCH");
|
||
|
}
|
||
|
|
||
|
glob_sel = -1;
|
||
|
|
||
|
sysinfo(&info);
|
||
|
|
||
|
/* Even though it is ready to catch SIGSYS, the signal is
|
||
|
* supposed to be uncatchable.
|
||
|
*/
|
||
|
|
||
|
EXPECT_FALSE(true) {
|
||
|
TH_LOG("Unreachable!");
|
||
|
}
|
||
|
}
|
||
|
|
||
|
TEST(disable_dispatch)
|
||
|
{
|
||
|
int ret;
|
||
|
struct sysinfo info;
|
||
|
char sel = 0;
|
||
|
|
||
|
ret = prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_ON, 0, 0, &sel);
|
||
|
ASSERT_EQ(0, ret) {
|
||
|
TH_LOG("Kernel does not support CONFIG_SYSCALL_USER_DISPATCH");
|
||
|
}
|
||
|
|
||
|
/* MAGIC_SYSCALL_1 doesn't exist. */
|
||
|
SYSCALL_DISPATCH_OFF(glob_sel);
|
||
|
|
||
|
ret = prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_OFF, 0, 0, 0);
|
||
|
EXPECT_EQ(0, ret) {
|
||
|
TH_LOG("Failed to unset syscall user dispatch");
|
||
|
}
|
||
|
|
||
|
/* Shouldn't have any effect... */
|
||
|
SYSCALL_DISPATCH_ON(glob_sel);
|
||
|
|
||
|
ret = syscall(__NR_sysinfo, &info);
|
||
|
EXPECT_EQ(0, ret) {
|
||
|
TH_LOG("Dispatch triggered unexpectedly");
|
||
|
}
|
||
|
}
|
||
|
|
||
|
TEST(direct_dispatch_range)
|
||
|
{
|
||
|
int ret = 0;
|
||
|
struct sysinfo info;
|
||
|
char sel = SYSCALL_DISPATCH_FILTER_ALLOW;
|
||
|
|
||
|
/*
|
||
|
* Instead of calculating libc addresses; allow the entire
|
||
|
* memory map and lock the selector.
|
||
|
*/
|
||
|
ret = prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_ON, 0, -1L, &sel);
|
||
|
ASSERT_EQ(0, ret) {
|
||
|
TH_LOG("Kernel does not support CONFIG_SYSCALL_USER_DISPATCH");
|
||
|
}
|
||
|
|
||
|
SYSCALL_DISPATCH_ON(sel);
|
||
|
|
||
|
ret = sysinfo(&info);
|
||
|
ASSERT_EQ(0, ret) {
|
||
|
TH_LOG("Dispatch triggered unexpectedly");
|
||
|
}
|
||
|
}
|
||
|
|
||
|
TEST_HARNESS_MAIN
|