1 // SPDX-License-Identifier: GPL-2.0
2 
3 /*
4  * Copyright (C) 2020 Google LLC.
5  */
6 
7 #include <test_progs.h>
8 #include <sys/mman.h>
9 #include <sys/wait.h>
10 #include <unistd.h>
11 #include <malloc.h>
12 #include <stdlib.h>
13 
14 #include "lsm.skel.h"
15 
16 char *CMD_ARGS[] = {"true", NULL};
17 
18 int heap_mprotect(void)
19 {
20 	void *buf;
21 	long sz;
22 	int ret;
23 
24 	sz = sysconf(_SC_PAGESIZE);
25 	if (sz < 0)
26 		return sz;
27 
28 	buf = memalign(sz, 2 * sz);
29 	if (buf == NULL)
30 		return -ENOMEM;
31 
32 	ret = mprotect(buf, sz, PROT_READ | PROT_WRITE | PROT_EXEC);
33 	free(buf);
34 	return ret;
35 }
36 
37 int exec_cmd(int *monitored_pid)
38 {
39 	int child_pid, child_status;
40 
41 	child_pid = fork();
42 	if (child_pid == 0) {
43 		*monitored_pid = getpid();
44 		execvp(CMD_ARGS[0], CMD_ARGS);
45 		return -EINVAL;
46 	} else if (child_pid > 0) {
47 		waitpid(child_pid, &child_status, 0);
48 		return child_status;
49 	}
50 
51 	return -EINVAL;
52 }
53 
54 void test_test_lsm(void)
55 {
56 	struct lsm *skel = NULL;
57 	int err, duration = 0;
58 
59 	skel = lsm__open_and_load();
60 	if (CHECK(!skel, "skel_load", "lsm skeleton failed\n"))
61 		goto close_prog;
62 
63 	err = lsm__attach(skel);
64 	if (CHECK(err, "attach", "lsm attach failed: %d\n", err))
65 		goto close_prog;
66 
67 	err = exec_cmd(&skel->bss->monitored_pid);
68 	if (CHECK(err < 0, "exec_cmd", "err %d errno %d\n", err, errno))
69 		goto close_prog;
70 
71 	CHECK(skel->bss->bprm_count != 1, "bprm_count", "bprm_count = %d\n",
72 	      skel->bss->bprm_count);
73 
74 	skel->bss->monitored_pid = getpid();
75 
76 	err = heap_mprotect();
77 	if (CHECK(errno != EPERM, "heap_mprotect", "want errno=EPERM, got %d\n",
78 		  errno))
79 		goto close_prog;
80 
81 	CHECK(skel->bss->mprotect_count != 1, "mprotect_count",
82 	      "mprotect_count = %d\n", skel->bss->mprotect_count);
83 
84 close_prog:
85 	lsm__destroy(skel);
86 }
87