1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun * ioperm.c - Test case for ioperm(2)
4*4882a593Smuzhiyun * Copyright (c) 2015 Andrew Lutomirski
5*4882a593Smuzhiyun */
6*4882a593Smuzhiyun
7*4882a593Smuzhiyun #define _GNU_SOURCE
8*4882a593Smuzhiyun #include <err.h>
9*4882a593Smuzhiyun #include <stdio.h>
10*4882a593Smuzhiyun #include <stdint.h>
11*4882a593Smuzhiyun #include <signal.h>
12*4882a593Smuzhiyun #include <setjmp.h>
13*4882a593Smuzhiyun #include <stdlib.h>
14*4882a593Smuzhiyun #include <string.h>
15*4882a593Smuzhiyun #include <errno.h>
16*4882a593Smuzhiyun #include <unistd.h>
17*4882a593Smuzhiyun #include <sys/types.h>
18*4882a593Smuzhiyun #include <sys/wait.h>
19*4882a593Smuzhiyun #include <stdbool.h>
20*4882a593Smuzhiyun #include <sched.h>
21*4882a593Smuzhiyun #include <sys/io.h>
22*4882a593Smuzhiyun
23*4882a593Smuzhiyun static int nerrs = 0;
24*4882a593Smuzhiyun
sethandler(int sig,void (* handler)(int,siginfo_t *,void *),int flags)25*4882a593Smuzhiyun static void sethandler(int sig, void (*handler)(int, siginfo_t *, void *),
26*4882a593Smuzhiyun int flags)
27*4882a593Smuzhiyun {
28*4882a593Smuzhiyun struct sigaction sa;
29*4882a593Smuzhiyun memset(&sa, 0, sizeof(sa));
30*4882a593Smuzhiyun sa.sa_sigaction = handler;
31*4882a593Smuzhiyun sa.sa_flags = SA_SIGINFO | flags;
32*4882a593Smuzhiyun sigemptyset(&sa.sa_mask);
33*4882a593Smuzhiyun if (sigaction(sig, &sa, 0))
34*4882a593Smuzhiyun err(1, "sigaction");
35*4882a593Smuzhiyun
36*4882a593Smuzhiyun }
37*4882a593Smuzhiyun
clearhandler(int sig)38*4882a593Smuzhiyun static void clearhandler(int sig)
39*4882a593Smuzhiyun {
40*4882a593Smuzhiyun struct sigaction sa;
41*4882a593Smuzhiyun memset(&sa, 0, sizeof(sa));
42*4882a593Smuzhiyun sa.sa_handler = SIG_DFL;
43*4882a593Smuzhiyun sigemptyset(&sa.sa_mask);
44*4882a593Smuzhiyun if (sigaction(sig, &sa, 0))
45*4882a593Smuzhiyun err(1, "sigaction");
46*4882a593Smuzhiyun }
47*4882a593Smuzhiyun
48*4882a593Smuzhiyun static jmp_buf jmpbuf;
49*4882a593Smuzhiyun
sigsegv(int sig,siginfo_t * si,void * ctx_void)50*4882a593Smuzhiyun static void sigsegv(int sig, siginfo_t *si, void *ctx_void)
51*4882a593Smuzhiyun {
52*4882a593Smuzhiyun siglongjmp(jmpbuf, 1);
53*4882a593Smuzhiyun }
54*4882a593Smuzhiyun
try_outb(unsigned short port)55*4882a593Smuzhiyun static bool try_outb(unsigned short port)
56*4882a593Smuzhiyun {
57*4882a593Smuzhiyun sethandler(SIGSEGV, sigsegv, SA_RESETHAND);
58*4882a593Smuzhiyun if (sigsetjmp(jmpbuf, 1) != 0) {
59*4882a593Smuzhiyun return false;
60*4882a593Smuzhiyun } else {
61*4882a593Smuzhiyun asm volatile ("outb %%al, %w[port]"
62*4882a593Smuzhiyun : : [port] "Nd" (port), "a" (0));
63*4882a593Smuzhiyun return true;
64*4882a593Smuzhiyun }
65*4882a593Smuzhiyun clearhandler(SIGSEGV);
66*4882a593Smuzhiyun }
67*4882a593Smuzhiyun
expect_ok(unsigned short port)68*4882a593Smuzhiyun static void expect_ok(unsigned short port)
69*4882a593Smuzhiyun {
70*4882a593Smuzhiyun if (!try_outb(port)) {
71*4882a593Smuzhiyun printf("[FAIL]\toutb to 0x%02hx failed\n", port);
72*4882a593Smuzhiyun exit(1);
73*4882a593Smuzhiyun }
74*4882a593Smuzhiyun
75*4882a593Smuzhiyun printf("[OK]\toutb to 0x%02hx worked\n", port);
76*4882a593Smuzhiyun }
77*4882a593Smuzhiyun
expect_gp(unsigned short port)78*4882a593Smuzhiyun static void expect_gp(unsigned short port)
79*4882a593Smuzhiyun {
80*4882a593Smuzhiyun if (try_outb(port)) {
81*4882a593Smuzhiyun printf("[FAIL]\toutb to 0x%02hx worked\n", port);
82*4882a593Smuzhiyun exit(1);
83*4882a593Smuzhiyun }
84*4882a593Smuzhiyun
85*4882a593Smuzhiyun printf("[OK]\toutb to 0x%02hx failed\n", port);
86*4882a593Smuzhiyun }
87*4882a593Smuzhiyun
main(void)88*4882a593Smuzhiyun int main(void)
89*4882a593Smuzhiyun {
90*4882a593Smuzhiyun cpu_set_t cpuset;
91*4882a593Smuzhiyun CPU_ZERO(&cpuset);
92*4882a593Smuzhiyun CPU_SET(0, &cpuset);
93*4882a593Smuzhiyun if (sched_setaffinity(0, sizeof(cpuset), &cpuset) != 0)
94*4882a593Smuzhiyun err(1, "sched_setaffinity to CPU 0");
95*4882a593Smuzhiyun
96*4882a593Smuzhiyun expect_gp(0x80);
97*4882a593Smuzhiyun expect_gp(0xed);
98*4882a593Smuzhiyun
99*4882a593Smuzhiyun /*
100*4882a593Smuzhiyun * Probe for ioperm support. Note that clearing ioperm bits
101*4882a593Smuzhiyun * works even as nonroot.
102*4882a593Smuzhiyun */
103*4882a593Smuzhiyun printf("[RUN]\tenable 0x80\n");
104*4882a593Smuzhiyun if (ioperm(0x80, 1, 1) != 0) {
105*4882a593Smuzhiyun printf("[OK]\tioperm(0x80, 1, 1) failed (%d) -- try running as root\n",
106*4882a593Smuzhiyun errno);
107*4882a593Smuzhiyun return 0;
108*4882a593Smuzhiyun }
109*4882a593Smuzhiyun expect_ok(0x80);
110*4882a593Smuzhiyun expect_gp(0xed);
111*4882a593Smuzhiyun
112*4882a593Smuzhiyun printf("[RUN]\tdisable 0x80\n");
113*4882a593Smuzhiyun if (ioperm(0x80, 1, 0) != 0) {
114*4882a593Smuzhiyun printf("[FAIL]\tioperm(0x80, 1, 0) failed (%d)", errno);
115*4882a593Smuzhiyun return 1;
116*4882a593Smuzhiyun }
117*4882a593Smuzhiyun expect_gp(0x80);
118*4882a593Smuzhiyun expect_gp(0xed);
119*4882a593Smuzhiyun
120*4882a593Smuzhiyun /* Make sure that fork() preserves ioperm. */
121*4882a593Smuzhiyun if (ioperm(0x80, 1, 1) != 0) {
122*4882a593Smuzhiyun printf("[FAIL]\tioperm(0x80, 1, 0) failed (%d)", errno);
123*4882a593Smuzhiyun return 1;
124*4882a593Smuzhiyun }
125*4882a593Smuzhiyun
126*4882a593Smuzhiyun pid_t child = fork();
127*4882a593Smuzhiyun if (child == -1)
128*4882a593Smuzhiyun err(1, "fork");
129*4882a593Smuzhiyun
130*4882a593Smuzhiyun if (child == 0) {
131*4882a593Smuzhiyun printf("[RUN]\tchild: check that we inherited permissions\n");
132*4882a593Smuzhiyun expect_ok(0x80);
133*4882a593Smuzhiyun expect_gp(0xed);
134*4882a593Smuzhiyun printf("[RUN]\tchild: Extend permissions to 0x81\n");
135*4882a593Smuzhiyun if (ioperm(0x81, 1, 1) != 0) {
136*4882a593Smuzhiyun printf("[FAIL]\tioperm(0x81, 1, 1) failed (%d)", errno);
137*4882a593Smuzhiyun return 1;
138*4882a593Smuzhiyun }
139*4882a593Smuzhiyun printf("[RUN]\tchild: Drop permissions to 0x80\n");
140*4882a593Smuzhiyun if (ioperm(0x80, 1, 0) != 0) {
141*4882a593Smuzhiyun printf("[FAIL]\tioperm(0x80, 1, 0) failed (%d)", errno);
142*4882a593Smuzhiyun return 1;
143*4882a593Smuzhiyun }
144*4882a593Smuzhiyun expect_gp(0x80);
145*4882a593Smuzhiyun return 0;
146*4882a593Smuzhiyun } else {
147*4882a593Smuzhiyun int status;
148*4882a593Smuzhiyun if (waitpid(child, &status, 0) != child ||
149*4882a593Smuzhiyun !WIFEXITED(status)) {
150*4882a593Smuzhiyun printf("[FAIL]\tChild died\n");
151*4882a593Smuzhiyun nerrs++;
152*4882a593Smuzhiyun } else if (WEXITSTATUS(status) != 0) {
153*4882a593Smuzhiyun printf("[FAIL]\tChild failed\n");
154*4882a593Smuzhiyun nerrs++;
155*4882a593Smuzhiyun } else {
156*4882a593Smuzhiyun printf("[OK]\tChild succeeded\n");
157*4882a593Smuzhiyun }
158*4882a593Smuzhiyun }
159*4882a593Smuzhiyun
160*4882a593Smuzhiyun /* Verify that the child dropping 0x80 did not affect the parent */
161*4882a593Smuzhiyun printf("\tVerify that unsharing the bitmap worked\n");
162*4882a593Smuzhiyun expect_ok(0x80);
163*4882a593Smuzhiyun
164*4882a593Smuzhiyun /* Test the capability checks. */
165*4882a593Smuzhiyun printf("\tDrop privileges\n");
166*4882a593Smuzhiyun if (setresuid(1, 1, 1) != 0) {
167*4882a593Smuzhiyun printf("[WARN]\tDropping privileges failed\n");
168*4882a593Smuzhiyun return 0;
169*4882a593Smuzhiyun }
170*4882a593Smuzhiyun
171*4882a593Smuzhiyun printf("[RUN]\tdisable 0x80\n");
172*4882a593Smuzhiyun if (ioperm(0x80, 1, 0) != 0) {
173*4882a593Smuzhiyun printf("[FAIL]\tioperm(0x80, 1, 0) failed (%d)", errno);
174*4882a593Smuzhiyun return 1;
175*4882a593Smuzhiyun }
176*4882a593Smuzhiyun printf("[OK]\tit worked\n");
177*4882a593Smuzhiyun
178*4882a593Smuzhiyun printf("[RUN]\tenable 0x80 again\n");
179*4882a593Smuzhiyun if (ioperm(0x80, 1, 1) == 0) {
180*4882a593Smuzhiyun printf("[FAIL]\tit succeeded but should have failed.\n");
181*4882a593Smuzhiyun return 1;
182*4882a593Smuzhiyun }
183*4882a593Smuzhiyun printf("[OK]\tit failed\n");
184*4882a593Smuzhiyun return 0;
185*4882a593Smuzhiyun }
186