// SPDX-License-Identifier: GPL-2.0 /* * Copyright (C) 2020 Google LLC. */ #include #include #include #include #include #include #include "lsm.skel.h" char *CMD_ARGS[] = {"true", NULL}; int heap_mprotect(void) { void *buf; long sz; int ret; sz = sysconf(_SC_PAGESIZE); if (sz < 0) return sz; buf = memalign(sz, 2 * sz); if (buf == NULL) return -ENOMEM; ret = mprotect(buf, sz, PROT_READ | PROT_WRITE | PROT_EXEC); free(buf); return ret; } int exec_cmd(int *monitored_pid) { int child_pid, child_status; child_pid = fork(); if (child_pid == 0) { *monitored_pid = getpid(); execvp(CMD_ARGS[0], CMD_ARGS); return -EINVAL; } else if (child_pid > 0) { waitpid(child_pid, &child_status, 0); return child_status; } return -EINVAL; } void test_test_lsm(void) { struct lsm *skel = NULL; int err, duration = 0; skel = lsm__open_and_load(); if (CHECK(!skel, "skel_load", "lsm skeleton failed\n")) goto close_prog; err = lsm__attach(skel); if (CHECK(err, "attach", "lsm attach failed: %d\n", err)) goto close_prog; err = exec_cmd(&skel->bss->monitored_pid); if (CHECK(err < 0, "exec_cmd", "err %d errno %d\n", err, errno)) goto close_prog; CHECK(skel->bss->bprm_count != 1, "bprm_count", "bprm_count = %d\n", skel->bss->bprm_count); skel->bss->monitored_pid = getpid(); err = heap_mprotect(); if (CHECK(errno != EPERM, "heap_mprotect", "want errno=EPERM, got %d\n", errno)) goto close_prog; CHECK(skel->bss->mprotect_count != 1, "mprotect_count", "mprotect_count = %d\n", skel->bss->mprotect_count); close_prog: lsm__destroy(skel); }