1*49cdfc7eSAndroid Build Coastguard Worker // SPDX-License-Identifier: GPL-2.0-or-later
2*49cdfc7eSAndroid Build Coastguard Worker /*
3*49cdfc7eSAndroid Build Coastguard Worker * Copyright (c) International Business Machines Corp., 2001
4*49cdfc7eSAndroid Build Coastguard Worker * 07/2001 Ported by Wayne Boyer
5*49cdfc7eSAndroid Build Coastguard Worker * Copyright (c) 2023 SUSE LLC Avinesh Kumar <[email protected]>
6*49cdfc7eSAndroid Build Coastguard Worker */
7*49cdfc7eSAndroid Build Coastguard Worker
8*49cdfc7eSAndroid Build Coastguard Worker /*\
9*49cdfc7eSAndroid Build Coastguard Worker * [Description]
10*49cdfc7eSAndroid Build Coastguard Worker *
11*49cdfc7eSAndroid Build Coastguard Worker * Verify that, after a successful mmap() call, permission bits of the new
12*49cdfc7eSAndroid Build Coastguard Worker * mapping in /proc/pid/maps file matches the prot and flags arguments in
13*49cdfc7eSAndroid Build Coastguard Worker * mmap() call.
14*49cdfc7eSAndroid Build Coastguard Worker */
15*49cdfc7eSAndroid Build Coastguard Worker
16*49cdfc7eSAndroid Build Coastguard Worker #include <inttypes.h>
17*49cdfc7eSAndroid Build Coastguard Worker #include "tst_test.h"
18*49cdfc7eSAndroid Build Coastguard Worker #include <stdio.h>
19*49cdfc7eSAndroid Build Coastguard Worker
20*49cdfc7eSAndroid Build Coastguard Worker static char *addr1;
21*49cdfc7eSAndroid Build Coastguard Worker static char *addr2;
22*49cdfc7eSAndroid Build Coastguard Worker
23*49cdfc7eSAndroid Build Coastguard Worker static struct tcase {
24*49cdfc7eSAndroid Build Coastguard Worker int prot;
25*49cdfc7eSAndroid Build Coastguard Worker int flags;
26*49cdfc7eSAndroid Build Coastguard Worker char *exp_perms;
27*49cdfc7eSAndroid Build Coastguard Worker } tcases[] = {
28*49cdfc7eSAndroid Build Coastguard Worker {PROT_NONE, MAP_ANONYMOUS | MAP_PRIVATE, "---p"},
29*49cdfc7eSAndroid Build Coastguard Worker {PROT_NONE, MAP_ANONYMOUS | MAP_SHARED, "---s"},
30*49cdfc7eSAndroid Build Coastguard Worker {PROT_READ, MAP_ANONYMOUS | MAP_PRIVATE, "r--p"},
31*49cdfc7eSAndroid Build Coastguard Worker {PROT_READ, MAP_ANONYMOUS | MAP_SHARED, "r--s"},
32*49cdfc7eSAndroid Build Coastguard Worker {PROT_WRITE, MAP_ANONYMOUS | MAP_PRIVATE, "-w-p"},
33*49cdfc7eSAndroid Build Coastguard Worker {PROT_WRITE, MAP_ANONYMOUS | MAP_SHARED, "-w-s"},
34*49cdfc7eSAndroid Build Coastguard Worker {PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_PRIVATE, "rw-p"},
35*49cdfc7eSAndroid Build Coastguard Worker {PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_SHARED, "rw-s"},
36*49cdfc7eSAndroid Build Coastguard Worker {PROT_READ | PROT_EXEC, MAP_ANONYMOUS | MAP_PRIVATE, "r-xp"},
37*49cdfc7eSAndroid Build Coastguard Worker {PROT_READ | PROT_EXEC, MAP_ANONYMOUS | MAP_SHARED, "r-xs"},
38*49cdfc7eSAndroid Build Coastguard Worker {PROT_WRITE | PROT_EXEC, MAP_ANONYMOUS | MAP_PRIVATE, "-wxp"},
39*49cdfc7eSAndroid Build Coastguard Worker {PROT_WRITE | PROT_EXEC, MAP_ANONYMOUS | MAP_SHARED, "-wxs"},
40*49cdfc7eSAndroid Build Coastguard Worker {PROT_READ | PROT_WRITE | PROT_EXEC, MAP_ANONYMOUS | MAP_PRIVATE, "rwxp"},
41*49cdfc7eSAndroid Build Coastguard Worker {PROT_READ | PROT_WRITE | PROT_EXEC, MAP_ANONYMOUS | MAP_SHARED, "rwxs"}
42*49cdfc7eSAndroid Build Coastguard Worker };
43*49cdfc7eSAndroid Build Coastguard Worker
run(unsigned int i)44*49cdfc7eSAndroid Build Coastguard Worker static void run(unsigned int i)
45*49cdfc7eSAndroid Build Coastguard Worker {
46*49cdfc7eSAndroid Build Coastguard Worker struct tcase *tc = &tcases[i];
47*49cdfc7eSAndroid Build Coastguard Worker char perms[8];
48*49cdfc7eSAndroid Build Coastguard Worker char fmt[1024];
49*49cdfc7eSAndroid Build Coastguard Worker unsigned int pagesize;
50*49cdfc7eSAndroid Build Coastguard Worker int flag;
51*49cdfc7eSAndroid Build Coastguard Worker
52*49cdfc7eSAndroid Build Coastguard Worker pagesize = SAFE_SYSCONF(_SC_PAGESIZE);
53*49cdfc7eSAndroid Build Coastguard Worker
54*49cdfc7eSAndroid Build Coastguard Worker /* To avoid new mapping getting merged with existing mappings, we first
55*49cdfc7eSAndroid Build Coastguard Worker * create a 2-page mapping with the different permissions, and then remap
56*49cdfc7eSAndroid Build Coastguard Worker * the 2nd page with the perms being tested.
57*49cdfc7eSAndroid Build Coastguard Worker */
58*49cdfc7eSAndroid Build Coastguard Worker flag = (tc->flags & MAP_PRIVATE) ? MAP_SHARED : MAP_PRIVATE;
59*49cdfc7eSAndroid Build Coastguard Worker addr1 = SAFE_MMAP(NULL, pagesize * 2, PROT_NONE, MAP_ANONYMOUS | flag, -1, 0);
60*49cdfc7eSAndroid Build Coastguard Worker
61*49cdfc7eSAndroid Build Coastguard Worker addr2 = SAFE_MMAP(addr1 + pagesize, pagesize, tc->prot, tc->flags | MAP_FIXED, -1, 0);
62*49cdfc7eSAndroid Build Coastguard Worker
63*49cdfc7eSAndroid Build Coastguard Worker sprintf(fmt, "%" PRIxPTR "-%%*x %%s", (uintptr_t)addr2);
64*49cdfc7eSAndroid Build Coastguard Worker SAFE_FILE_LINES_SCANF("/proc/self/maps", fmt, perms);
65*49cdfc7eSAndroid Build Coastguard Worker
66*49cdfc7eSAndroid Build Coastguard Worker if (!strcmp(perms, tc->exp_perms)) {
67*49cdfc7eSAndroid Build Coastguard Worker tst_res(TPASS, "mapping permissions in /proc matched: %s", perms);
68*49cdfc7eSAndroid Build Coastguard Worker } else {
69*49cdfc7eSAndroid Build Coastguard Worker tst_res(TFAIL, "mapping permissions in /proc mismatched, expected: %s, found: %s",
70*49cdfc7eSAndroid Build Coastguard Worker tc->exp_perms, perms);
71*49cdfc7eSAndroid Build Coastguard Worker }
72*49cdfc7eSAndroid Build Coastguard Worker
73*49cdfc7eSAndroid Build Coastguard Worker SAFE_MUNMAP(addr1, pagesize * 2);
74*49cdfc7eSAndroid Build Coastguard Worker }
75*49cdfc7eSAndroid Build Coastguard Worker
76*49cdfc7eSAndroid Build Coastguard Worker static struct tst_test test = {
77*49cdfc7eSAndroid Build Coastguard Worker .test = run,
78*49cdfc7eSAndroid Build Coastguard Worker .tcnt = ARRAY_SIZE(tcases),
79*49cdfc7eSAndroid Build Coastguard Worker };
80