| // SPDX-License-Identifier: GPL-2.0-only |
| /* |
| * Copyright (c) 2020 Collabora Ltd. |
| * |
| * Test code for syscall user dispatch |
| */ |
| |
| #define _GNU_SOURCE |
| #include <sys/prctl.h> |
| #include <sys/sysinfo.h> |
| #include <sys/syscall.h> |
| #include <signal.h> |
| #include <stdbool.h> |
| #include <stdlib.h> |
| |
| #include <asm/unistd.h> |
| #include "../kselftest_harness.h" |
| |
| #ifndef PR_SET_SYSCALL_USER_DISPATCH |
| # define PR_SET_SYSCALL_USER_DISPATCH 59 |
| # define PR_SYS_DISPATCH_OFF 0 |
| # define SYSCALL_DISPATCH_FILTER_ALLOW 0 |
| # define SYSCALL_DISPATCH_FILTER_BLOCK 1 |
| #endif |
| |
| #ifndef PR_SYS_DISPATCH_EXCLUSIVE_ON |
| # define PR_SYS_DISPATCH_EXCLUSIVE_ON 1 |
| # define PR_SYS_DISPATCH_INCLUSIVE_ON 2 |
| #endif |
| |
| #ifndef SYS_USER_DISPATCH |
| # define SYS_USER_DISPATCH 2 |
| #endif |
| |
| #ifdef __NR_syscalls |
| # define MAGIC_SYSCALL_1 (__NR_syscalls + 1) /* Bad Linux syscall number */ |
| #else |
| # define MAGIC_SYSCALL_1 (0xff00) /* Bad Linux syscall number */ |
| #endif |
| |
| #define SYSCALL_DISPATCH_ON(x) ((x) = SYSCALL_DISPATCH_FILTER_BLOCK) |
| #define SYSCALL_DISPATCH_OFF(x) ((x) = SYSCALL_DISPATCH_FILTER_ALLOW) |
| |
| /* Test Summary: |
| * |
| * - dispatch_trigger_sigsys: Verify if PR_SET_SYSCALL_USER_DISPATCH is |
| * able to trigger SIGSYS on a syscall. |
| * |
| * - bad_selector: Test that a bad selector value triggers SIGSYS with |
| * si_errno EINVAL. |
| * |
| * - bad_prctl_param: Test that the API correctly rejects invalid |
| * parameters on prctl |
| * |
| * - dispatch_and_return: Test that a syscall is selectively dispatched |
| * to userspace depending on the value of selector. |
| * |
| * - disable_dispatch: Test that the PR_SYS_DISPATCH_OFF correctly |
| * disables the dispatcher |
| * |
| * - direct_dispatch_range: Test that a syscall within the allowed range |
| * can bypass the dispatcher. |
| */ |
| |
| TEST_SIGNAL(dispatch_trigger_sigsys, SIGSYS) |
| { |
| char sel = SYSCALL_DISPATCH_FILTER_ALLOW; |
| struct sysinfo info; |
| int ret; |
| |
| ret = sysinfo(&info); |
| ASSERT_EQ(0, ret); |
| |
| ret = prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_EXCLUSIVE_ON, 0, 0, &sel); |
| ASSERT_EQ(0, ret) { |
| TH_LOG("Kernel does not support CONFIG_SYSCALL_USER_DISPATCH"); |
| } |
| |
| SYSCALL_DISPATCH_ON(sel); |
| |
| sysinfo(&info); |
| |
| EXPECT_FALSE(true) { |
| TH_LOG("Unreachable!"); |
| } |
| } |
| |
| static void prctl_valid(struct __test_metadata *_metadata, |
| unsigned long op, unsigned long off, |
| unsigned long size, void *sel) |
| { |
| EXPECT_EQ(0, prctl(PR_SET_SYSCALL_USER_DISPATCH, op, off, size, sel)); |
| } |
| |
| static void prctl_invalid(struct __test_metadata *_metadata, |
| unsigned long op, unsigned long off, |
| unsigned long size, void *sel, int err) |
| { |
| EXPECT_EQ(-1, prctl(PR_SET_SYSCALL_USER_DISPATCH, op, off, size, sel)); |
| EXPECT_EQ(err, errno); |
| } |
| |
| TEST(bad_prctl_param) |
| { |
| char sel = SYSCALL_DISPATCH_FILTER_ALLOW; |
| int op; |
| |
| /* Invalid op */ |
| op = -1; |
| prctl_invalid(_metadata, op, 0, 0, &sel, EINVAL); |
| |
| /* PR_SYS_DISPATCH_OFF */ |
| op = PR_SYS_DISPATCH_OFF; |
| |
| /* offset != 0 */ |
| prctl_invalid(_metadata, op, 0x1, 0x0, 0, EINVAL); |
| |
| /* len != 0 */ |
| prctl_invalid(_metadata, op, 0x0, 0xff, 0, EINVAL); |
| |
| /* sel != NULL */ |
| prctl_invalid(_metadata, op, 0x0, 0x0, &sel, EINVAL); |
| |
| /* Valid parameter */ |
| prctl_valid(_metadata, op, 0x0, 0x0, 0x0); |
| |
| /* PR_SYS_DISPATCH_EXCLUSIVE_ON */ |
| op = PR_SYS_DISPATCH_EXCLUSIVE_ON; |
| |
| /* Dispatcher region is bad (offset > 0 && len == 0) */ |
| prctl_invalid(_metadata, op, 0x1, 0x0, &sel, EINVAL); |
| prctl_invalid(_metadata, op, -1L, 0x0, &sel, EINVAL); |
| |
| /* Invalid selector */ |
| prctl_invalid(_metadata, op, 0x0, 0x1, (void *) -1, EFAULT); |
| |
| /* |
| * Dispatcher range overflows unsigned long |
| */ |
| prctl_invalid(_metadata, PR_SYS_DISPATCH_EXCLUSIVE_ON, 1, -1L, &sel, EINVAL); |
| |
| /* |
| * Allowed range overflows usigned long |
| */ |
| prctl_invalid(_metadata, PR_SYS_DISPATCH_EXCLUSIVE_ON, -1L, 0x1, &sel, EINVAL); |
| |
| /* 0 len should fail for PR_SYS_DISPATCH_INCLUSIVE_ON */ |
| prctl_invalid(_metadata, PR_SYS_DISPATCH_INCLUSIVE_ON, 1, 0, 0, EINVAL); |
| |
| /* Range wrap-around should fail */ |
| prctl_invalid(_metadata, PR_SYS_DISPATCH_INCLUSIVE_ON, -1L, 2, 0, EINVAL); |
| |
| /* Normal range shouldn't fail */ |
| prctl_valid(_metadata, PR_SYS_DISPATCH_INCLUSIVE_ON, 2, 3, 0); |
| |
| /* Invalid selector */ |
| prctl_invalid(_metadata, PR_SYS_DISPATCH_INCLUSIVE_ON, 2, 3, (void *) -1, EFAULT); |
| } |
| |
| /* |
| * Use global selector for handle_sigsys tests, to avoid passing |
| * selector to signal handler |
| */ |
| char glob_sel; |
| int nr_syscalls_emulated; |
| int si_code; |
| int si_errno; |
| unsigned long syscall_addr; |
| |
| static void handle_sigsys(int sig, siginfo_t *info, void *ucontext) |
| { |
| si_code = info->si_code; |
| si_errno = info->si_errno; |
| syscall_addr = (unsigned long)info->si_call_addr; |
| |
| if (info->si_syscall == MAGIC_SYSCALL_1) |
| nr_syscalls_emulated++; |
| |
| /* In preparation for sigreturn. */ |
| SYSCALL_DISPATCH_OFF(glob_sel); |
| |
| /* |
| * The tests for argument handling assume that `syscall(x) == x`. This |
| * is a NOP on x86 because the syscall number is passed in %rax, which |
| * happens to also be the function ABI return register. Other |
| * architectures may need to swizzle the arguments around. |
| */ |
| #if defined(__riscv) |
| /* REG_A7 is not defined in libc headers */ |
| # define REG_A7 (REG_A0 + 7) |
| |
| ((ucontext_t *)ucontext)->uc_mcontext.__gregs[REG_A0] = |
| ((ucontext_t *)ucontext)->uc_mcontext.__gregs[REG_A7]; |
| #endif |
| } |
| |
| int setup_sigsys_handler(void) |
| { |
| struct sigaction act; |
| sigset_t mask; |
| |
| memset(&act, 0, sizeof(act)); |
| sigemptyset(&mask); |
| act.sa_sigaction = handle_sigsys; |
| act.sa_flags = SA_SIGINFO; |
| act.sa_mask = mask; |
| return sigaction(SIGSYS, &act, NULL); |
| } |
| |
| TEST(dispatch_and_return) |
| { |
| long ret; |
| |
| glob_sel = 0; |
| nr_syscalls_emulated = 0; |
| si_code = 0; |
| si_errno = 0; |
| |
| ASSERT_EQ(0, setup_sigsys_handler()); |
| |
| /* Make sure selector is good prior to prctl. */ |
| SYSCALL_DISPATCH_OFF(glob_sel); |
| |
| ret = prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_EXCLUSIVE_ON, 0, 0, &glob_sel); |
| ASSERT_EQ(0, ret) { |
| TH_LOG("Kernel does not support CONFIG_SYSCALL_USER_DISPATCH"); |
| } |
| |
| /* MAGIC_SYSCALL_1 doesn't exist. */ |
| SYSCALL_DISPATCH_OFF(glob_sel); |
| ret = syscall(MAGIC_SYSCALL_1); |
| EXPECT_EQ(-1, ret) { |
| TH_LOG("Dispatch triggered unexpectedly"); |
| } |
| |
| /* MAGIC_SYSCALL_1 should be emulated. */ |
| nr_syscalls_emulated = 0; |
| SYSCALL_DISPATCH_ON(glob_sel); |
| |
| ret = syscall(MAGIC_SYSCALL_1); |
| EXPECT_EQ(MAGIC_SYSCALL_1, ret) { |
| TH_LOG("Failed to intercept syscall"); |
| } |
| EXPECT_EQ(1, nr_syscalls_emulated) { |
| TH_LOG("Failed to emulate syscall"); |
| } |
| ASSERT_EQ(SYS_USER_DISPATCH, si_code) { |
| TH_LOG("Bad si_code in SIGSYS"); |
| } |
| ASSERT_EQ(0, si_errno) { |
| TH_LOG("Bad si_errno in SIGSYS"); |
| } |
| } |
| |
| TEST_SIGNAL(bad_selector, SIGSYS) |
| { |
| long ret; |
| struct sigaction act; |
| sigset_t mask; |
| struct sysinfo info; |
| |
| glob_sel = SYSCALL_DISPATCH_FILTER_ALLOW; |
| nr_syscalls_emulated = 0; |
| si_code = 0; |
| si_errno = 0; |
| |
| memset(&act, 0, sizeof(act)); |
| sigemptyset(&mask); |
| |
| act.sa_sigaction = handle_sigsys; |
| act.sa_flags = SA_SIGINFO; |
| act.sa_mask = mask; |
| |
| ret = sigaction(SIGSYS, &act, NULL); |
| ASSERT_EQ(0, ret); |
| |
| /* Make sure selector is good prior to prctl. */ |
| SYSCALL_DISPATCH_OFF(glob_sel); |
| |
| ret = prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_EXCLUSIVE_ON, 0, 0, &glob_sel); |
| ASSERT_EQ(0, ret) { |
| TH_LOG("Kernel does not support CONFIG_SYSCALL_USER_DISPATCH"); |
| } |
| |
| glob_sel = -1; |
| |
| sysinfo(&info); |
| |
| /* Even though it is ready to catch SIGSYS, the signal is |
| * supposed to be uncatchable. |
| */ |
| |
| EXPECT_FALSE(true) { |
| TH_LOG("Unreachable!"); |
| } |
| } |
| |
| TEST(disable_dispatch) |
| { |
| int ret; |
| struct sysinfo info; |
| char sel = 0; |
| |
| ret = prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_EXCLUSIVE_ON, 0, 0, &sel); |
| ASSERT_EQ(0, ret) { |
| TH_LOG("Kernel does not support CONFIG_SYSCALL_USER_DISPATCH"); |
| } |
| |
| /* MAGIC_SYSCALL_1 doesn't exist. */ |
| SYSCALL_DISPATCH_OFF(glob_sel); |
| |
| ret = prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_OFF, 0, 0, 0); |
| EXPECT_EQ(0, ret) { |
| TH_LOG("Failed to unset syscall user dispatch"); |
| } |
| |
| /* Shouldn't have any effect... */ |
| SYSCALL_DISPATCH_ON(glob_sel); |
| |
| ret = syscall(__NR_sysinfo, &info); |
| EXPECT_EQ(0, ret) { |
| TH_LOG("Dispatch triggered unexpectedly"); |
| } |
| } |
| |
| TEST(direct_dispatch_range) |
| { |
| int ret = 0; |
| struct sysinfo info; |
| char sel = SYSCALL_DISPATCH_FILTER_ALLOW; |
| |
| /* |
| * Instead of calculating libc addresses; allow the entire |
| * memory map and lock the selector. |
| */ |
| ret = prctl(PR_SET_SYSCALL_USER_DISPATCH, PR_SYS_DISPATCH_EXCLUSIVE_ON, 0, -1L, &sel); |
| ASSERT_EQ(0, ret) { |
| TH_LOG("Kernel does not support CONFIG_SYSCALL_USER_DISPATCH"); |
| } |
| |
| SYSCALL_DISPATCH_ON(sel); |
| |
| ret = sysinfo(&info); |
| ASSERT_EQ(0, ret) { |
| TH_LOG("Dispatch triggered unexpectedly"); |
| } |
| } |
| |
| static void test_range(struct __test_metadata *_metadata, |
| unsigned long op, unsigned long off, |
| unsigned long size, bool dispatch) |
| { |
| nr_syscalls_emulated = 0; |
| SYSCALL_DISPATCH_OFF(glob_sel); |
| EXPECT_EQ(0, prctl(PR_SET_SYSCALL_USER_DISPATCH, op, off, size, &glob_sel)); |
| SYSCALL_DISPATCH_ON(glob_sel); |
| if (dispatch) { |
| EXPECT_EQ(syscall(MAGIC_SYSCALL_1), MAGIC_SYSCALL_1); |
| EXPECT_EQ(nr_syscalls_emulated, 1); |
| } else { |
| EXPECT_EQ(syscall(MAGIC_SYSCALL_1), -1); |
| EXPECT_EQ(nr_syscalls_emulated, 0); |
| } |
| } |
| |
| TEST(dispatch_range) |
| { |
| ASSERT_EQ(0, setup_sigsys_handler()); |
| test_range(_metadata, PR_SYS_DISPATCH_EXCLUSIVE_ON, 0, 0, true); |
| test_range(_metadata, PR_SYS_DISPATCH_EXCLUSIVE_ON, syscall_addr, 1, false); |
| test_range(_metadata, PR_SYS_DISPATCH_EXCLUSIVE_ON, syscall_addr-100, 200, false); |
| test_range(_metadata, PR_SYS_DISPATCH_EXCLUSIVE_ON, syscall_addr+1, 100, true); |
| test_range(_metadata, PR_SYS_DISPATCH_EXCLUSIVE_ON, syscall_addr-100, 100, true); |
| test_range(_metadata, PR_SYS_DISPATCH_INCLUSIVE_ON, syscall_addr, 1, true); |
| test_range(_metadata, PR_SYS_DISPATCH_INCLUSIVE_ON, syscall_addr-1, 1, false); |
| test_range(_metadata, PR_SYS_DISPATCH_INCLUSIVE_ON, syscall_addr+1, 1, false); |
| SYSCALL_DISPATCH_OFF(glob_sel); |
| } |
| |
| TEST_HARNESS_MAIN |