123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171 |
- // SPDX-License-Identifier: GPL-2.0
- /*
- * ioperm.c - Test case for ioperm(2)
- * Copyright (c) 2015 Andrew Lutomirski
- */
- #define _GNU_SOURCE
- #include <err.h>
- #include <stdio.h>
- #include <stdint.h>
- #include <signal.h>
- #include <setjmp.h>
- #include <stdlib.h>
- #include <string.h>
- #include <errno.h>
- #include <unistd.h>
- #include <sys/types.h>
- #include <sys/wait.h>
- #include <stdbool.h>
- #include <sched.h>
- #include <sys/io.h>
- static int nerrs = 0;
- static void sethandler(int sig, void (*handler)(int, siginfo_t *, void *),
- int flags)
- {
- struct sigaction sa;
- memset(&sa, 0, sizeof(sa));
- sa.sa_sigaction = handler;
- sa.sa_flags = SA_SIGINFO | flags;
- sigemptyset(&sa.sa_mask);
- if (sigaction(sig, &sa, 0))
- err(1, "sigaction");
- }
- static void clearhandler(int sig)
- {
- struct sigaction sa;
- memset(&sa, 0, sizeof(sa));
- sa.sa_handler = SIG_DFL;
- sigemptyset(&sa.sa_mask);
- if (sigaction(sig, &sa, 0))
- err(1, "sigaction");
- }
- static jmp_buf jmpbuf;
- static void sigsegv(int sig, siginfo_t *si, void *ctx_void)
- {
- siglongjmp(jmpbuf, 1);
- }
- static bool try_outb(unsigned short port)
- {
- sethandler(SIGSEGV, sigsegv, SA_RESETHAND);
- if (sigsetjmp(jmpbuf, 1) != 0) {
- return false;
- } else {
- asm volatile ("outb %%al, %w[port]"
- : : [port] "Nd" (port), "a" (0));
- return true;
- }
- clearhandler(SIGSEGV);
- }
- static void expect_ok(unsigned short port)
- {
- if (!try_outb(port)) {
- printf("[FAIL]\toutb to 0x%02hx failed\n", port);
- exit(1);
- }
- printf("[OK]\toutb to 0x%02hx worked\n", port);
- }
- static void expect_gp(unsigned short port)
- {
- if (try_outb(port)) {
- printf("[FAIL]\toutb to 0x%02hx worked\n", port);
- exit(1);
- }
- printf("[OK]\toutb to 0x%02hx failed\n", port);
- }
- int main(void)
- {
- cpu_set_t cpuset;
- CPU_ZERO(&cpuset);
- CPU_SET(0, &cpuset);
- if (sched_setaffinity(0, sizeof(cpuset), &cpuset) != 0)
- err(1, "sched_setaffinity to CPU 0");
- expect_gp(0x80);
- expect_gp(0xed);
- /*
- * Probe for ioperm support. Note that clearing ioperm bits
- * works even as nonroot.
- */
- printf("[RUN]\tenable 0x80\n");
- if (ioperm(0x80, 1, 1) != 0) {
- printf("[OK]\tioperm(0x80, 1, 1) failed (%d) -- try running as root\n",
- errno);
- return 0;
- }
- expect_ok(0x80);
- expect_gp(0xed);
- printf("[RUN]\tdisable 0x80\n");
- if (ioperm(0x80, 1, 0) != 0) {
- printf("[FAIL]\tioperm(0x80, 1, 0) failed (%d)", errno);
- return 1;
- }
- expect_gp(0x80);
- expect_gp(0xed);
- /* Make sure that fork() preserves ioperm. */
- if (ioperm(0x80, 1, 1) != 0) {
- printf("[FAIL]\tioperm(0x80, 1, 0) failed (%d)", errno);
- return 1;
- }
- pid_t child = fork();
- if (child == -1)
- err(1, "fork");
- if (child == 0) {
- printf("[RUN]\tchild: check that we inherited permissions\n");
- expect_ok(0x80);
- expect_gp(0xed);
- return 0;
- } else {
- int status;
- if (waitpid(child, &status, 0) != child ||
- !WIFEXITED(status)) {
- printf("[FAIL]\tChild died\n");
- nerrs++;
- } else if (WEXITSTATUS(status) != 0) {
- printf("[FAIL]\tChild failed\n");
- nerrs++;
- } else {
- printf("[OK]\tChild succeeded\n");
- }
- }
- /* Test the capability checks. */
- printf("\tDrop privileges\n");
- if (setresuid(1, 1, 1) != 0) {
- printf("[WARN]\tDropping privileges failed\n");
- return 0;
- }
- printf("[RUN]\tdisable 0x80\n");
- if (ioperm(0x80, 1, 0) != 0) {
- printf("[FAIL]\tioperm(0x80, 1, 0) failed (%d)", errno);
- return 1;
- }
- printf("[OK]\tit worked\n");
- printf("[RUN]\tenable 0x80 again\n");
- if (ioperm(0x80, 1, 1) == 0) {
- printf("[FAIL]\tit succeeded but should have failed.\n");
- return 1;
- }
- printf("[OK]\tit failed\n");
- return 0;
- }
|