Module Name:    src
Committed By:   christos
Date:           Sat Jul 29 12:16:34 UTC 2023

Modified Files:
        src/distrib/sets/lists/debug: mi
        src/distrib/sets/lists/tests: mi
        src/sys/kern: sys_memfd.c
        src/tests/kernel: Makefile t_fcntl.c
Added Files:
        src/tests/kernel: t_memfd_create.c

Log Message:
Add tests for t_memfd_create and fix bug found by tests


To generate a diff of this commit:
cvs rdiff -u -r1.407 -r1.408 src/distrib/sets/lists/debug/mi
cvs rdiff -u -r1.1278 -r1.1279 src/distrib/sets/lists/tests/mi
cvs rdiff -u -r1.4 -r1.5 src/sys/kern/sys_memfd.c
cvs rdiff -u -r1.73 -r1.74 src/tests/kernel/Makefile
cvs rdiff -u -r1.2 -r1.3 src/tests/kernel/t_fcntl.c
cvs rdiff -u -r0 -r1.1 src/tests/kernel/t_memfd_create.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/distrib/sets/lists/debug/mi
diff -u src/distrib/sets/lists/debug/mi:1.407 src/distrib/sets/lists/debug/mi:1.408
--- src/distrib/sets/lists/debug/mi:1.407	Fri Jul 28 14:18:59 2023
+++ src/distrib/sets/lists/debug/mi	Sat Jul 29 08:16:34 2023
@@ -1,4 +1,4 @@
-# $NetBSD: mi,v 1.407 2023/07/28 18:18:59 christos Exp $
+# $NetBSD: mi,v 1.408 2023/07/29 12:16:34 christos Exp $
 ./etc/mtree/set.debug                           comp-sys-root
 ./usr/lib					comp-sys-usr		compatdir
 ./usr/lib/i18n/libBIG5_g.a			comp-c-debuglib		debuglib,compatfile
@@ -1800,6 +1800,7 @@
 ./usr/libdata/debug/usr/tests/kernel/t_lock.debug			tests-kernel-tests	debug,atf,compattestfile
 ./usr/libdata/debug/usr/tests/kernel/t_lockf.debug			tests-kernel-tests	debug,atf,compattestfile
 ./usr/libdata/debug/usr/tests/kernel/t_lwpctl.debug			tests-obsolete		obsolete,compattestfile
+./usr/libdata/debug/usr/tests/kernel/t_memfd_create.debug		tests-kernel-tests	debug,atf,compattestfile
 ./usr/libdata/debug/usr/tests/kernel/t_mkdir.debug			tests-obsolete		obsolete,compattestfile
 ./usr/libdata/debug/usr/tests/kernel/t_mqueue.debug			tests-kernel-tests	debug,atf,compattestfile
 ./usr/libdata/debug/usr/tests/kernel/t_open_pr_57260.debug		tests-kernel-tests	debug,atf,compattestfile

Index: src/distrib/sets/lists/tests/mi
diff -u src/distrib/sets/lists/tests/mi:1.1278 src/distrib/sets/lists/tests/mi:1.1279
--- src/distrib/sets/lists/tests/mi:1.1278	Fri Jul 28 14:19:00 2023
+++ src/distrib/sets/lists/tests/mi	Sat Jul 29 08:16:34 2023
@@ -1,4 +1,4 @@
-# $NetBSD: mi,v 1.1278 2023/07/28 18:19:00 christos Exp $
+# $NetBSD: mi,v 1.1279 2023/07/29 12:16:34 christos Exp $
 #
 # Note: don't delete entries from here - mark them as "obsolete" instead.
 #
@@ -2310,6 +2310,7 @@
 ./usr/tests/kernel/t_lockf				tests-kernel-tests	compattestfile,atf
 ./usr/tests/kernel/t_lwpctl				tests-obsolete		obsolete
 ./usr/tests/kernel/t_magic_symlinks			tests-kernel-tests	compattestfile,atf
+./usr/tests/kernel/t_memfd_create			tests-kernel-tests	compattestfile,atf
 ./usr/tests/kernel/t_mkdir				tests-obsolete		obsolete
 ./usr/tests/kernel/t_mqueue				tests-kernel-tests	compattestfile,atf
 ./usr/tests/kernel/t_nointerpreter			tests-kernel-tests	atf

Index: src/sys/kern/sys_memfd.c
diff -u src/sys/kern/sys_memfd.c:1.4 src/sys/kern/sys_memfd.c:1.5
--- src/sys/kern/sys_memfd.c:1.4	Sat Jul 29 04:46:47 2023
+++ src/sys/kern/sys_memfd.c	Sat Jul 29 08:16:34 2023
@@ -1,4 +1,4 @@
-/*	$NetBSD: sys_memfd.c,v 1.4 2023/07/29 08:46:47 riastradh Exp $	*/
+/*	$NetBSD: sys_memfd.c,v 1.5 2023/07/29 12:16:34 christos Exp $	*/
 
 /*-
  * Copyright (c) 2023 The NetBSD Foundation, Inc.
@@ -30,7 +30,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: sys_memfd.c,v 1.4 2023/07/29 08:46:47 riastradh Exp $");
+__KERNEL_RCSID(0, "$NetBSD: sys_memfd.c,v 1.5 2023/07/29 12:16:34 christos Exp $");
 
 #include <sys/param.h>
 #include <sys/types.h>
@@ -165,6 +165,7 @@ memfd_read(file_t *fp, off_t *offp, stru
 	todo = MIN(uio->uio_resid, mfd->mfd_size - *offp);
 	error = ubc_uiomove(mfd->mfd_uobj, uio, todo, UVM_ADV_SEQUENTIAL,
 	    UBC_READ|UBC_PARTIALOK);
+	*offp = uio->uio_offset;
 
 leave:
 	if (offp == &fp->f_offset)
@@ -215,6 +216,7 @@ memfd_write(file_t *fp, off_t *offp, str
 
 	error = ubc_uiomove(mfd->mfd_uobj, uio, todo, UVM_ADV_SEQUENTIAL,
 	    UBC_WRITE|UBC_PARTIALOK);
+	*offp = uio->uio_offset;
 
 	getnanotime(&mfd->mfd_mtime);
 

Index: src/tests/kernel/Makefile
diff -u src/tests/kernel/Makefile:1.73 src/tests/kernel/Makefile:1.74
--- src/tests/kernel/Makefile:1.73	Fri Jul 28 14:19:01 2023
+++ src/tests/kernel/Makefile	Sat Jul 29 08:16:34 2023
@@ -1,4 +1,4 @@
-# $NetBSD: Makefile,v 1.73 2023/07/28 18:19:01 christos Exp $
+# $NetBSD: Makefile,v 1.74 2023/07/29 12:16:34 christos Exp $
 
 NOMAN=		# defined
 
@@ -12,6 +12,7 @@ TESTS_C+=	t_fcntl
 TESTS_C+=	t_lock
 TESTS_C+=	t_lockf
 TESTS_C+=	t_pty
+TESTS_C+=	t_memfd_create
 TESTS_C+=	t_mqueue
 TESTS_C+=	t_proccwd
 TESTS_C+=	t_sysv

Index: src/tests/kernel/t_fcntl.c
diff -u src/tests/kernel/t_fcntl.c:1.2 src/tests/kernel/t_fcntl.c:1.3
--- src/tests/kernel/t_fcntl.c:1.2	Sun Oct 20 12:02:11 2019
+++ src/tests/kernel/t_fcntl.c	Sat Jul 29 08:16:34 2023
@@ -1,4 +1,4 @@
-/*	$NetBSD: t_fcntl.c,v 1.2 2019/10/20 16:02:11 christos Exp $	*/
+/*	$NetBSD: t_fcntl.c,v 1.3 2023/07/29 12:16:34 christos Exp $	*/
 
 /*-
  * Copyright (c) 2019 The NetBSD Foundation, Inc.
@@ -31,6 +31,7 @@
 
 #include <sys/param.h>
 #include <sys/types.h>
+#include <sys/mman.h>
 #include <atf-c.h>
 #include <fcntl.h>
 #include <errno.h>
@@ -38,11 +39,11 @@
 #include <string.h>
 #include <unistd.h>
 
-ATF_TC(getpath);
-ATF_TC_HEAD(getpath, tc)
+ATF_TC(getpath_vnode);
+ATF_TC_HEAD(getpath_vnode, tc)
 {  
 
-	atf_tc_set_md_var(tc, "descr", "Checks fcntl(2) F_GETPATH");
+	atf_tc_set_md_var(tc, "descr", "Checks fcntl(2) F_GETPATH for vnodes");
 }
 
 static const struct {
@@ -57,7 +58,7 @@ static const struct {
 	{ "/", ENOENT },
 };
 
-ATF_TC_BODY(getpath, tc)
+ATF_TC_BODY(getpath_vnode, tc)
 {
 	char path[MAXPATHLEN];
 	int fd, rv;
@@ -81,9 +82,47 @@ ATF_TC_BODY(getpath, tc)
 	}
 }
 
+ATF_TC(getpath_memfd);
+ATF_TC_HEAD(getpath_memfd, tc)
+{
+
+	atf_tc_set_md_var(tc, "descr",
+	    "Checks fcntl(2) F_GETPATH for fds created by memfd_create");
+}
+
+#define	MEMFD_NAME(name)	{ name, "memfd:" name }
+static const struct {
+	const char *bare;
+	const char *prefixed;
+} memfd_names[] = {
+	MEMFD_NAME(""),
+	MEMFD_NAME("some text"),
+	MEMFD_NAME("memfd:"),
+	MEMFD_NAME("../\\"),
+};
+
+ATF_TC_BODY(getpath_memfd, tc)
+{
+	char path[MAXPATHLEN];
+	int fd, rv;
+
+	for (size_t i = 0; i < __arraycount(memfd_names); i++) {
+		fd = memfd_create(memfd_names[i].bare, 0);
+		ATF_REQUIRE_MSG(fd != -1, "Failed to create memfd (%s)",
+		    strerror(errno));
+		rv = fcntl(fd, F_GETPATH, path);
+		ATF_REQUIRE_MSG(rv != -1, "Can't get path `%s' (%s)",
+		    memfd_names[i].bare, strerror(errno));
+		ATF_REQUIRE_MSG(strcmp(memfd_names[i].prefixed, path) == 0,
+		    "Bad name `%s' != `%s'", path, memfd_names[i].prefixed);
+		close(fd);
+	}
+}
+
 ATF_TP_ADD_TCS(tp)
 {
-	ATF_TP_ADD_TC(tp, getpath); 
+	ATF_TP_ADD_TC(tp, getpath_vnode);
+	ATF_TP_ADD_TC(tp, getpath_memfd);
 
 	return atf_no_error();
 }

Added files:

Index: src/tests/kernel/t_memfd_create.c
diff -u /dev/null src/tests/kernel/t_memfd_create.c:1.1
--- /dev/null	Sat Jul 29 08:16:35 2023
+++ src/tests/kernel/t_memfd_create.c	Sat Jul 29 08:16:34 2023
@@ -0,0 +1,455 @@
+/*	$NetBSD: t_memfd_create.c,v 1.1 2023/07/29 12:16:34 christos Exp $	*/
+
+/*-
+ * Copyright (c) 2023 The NetBSD Foundation, Inc.
+ * All rights reserved.
+ *
+ * This code is derived from software contributed to The NetBSD Foundation
+ * by Theodore Preduta.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
+ * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
+ * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+ * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
+ * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
+ * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
+ * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
+ * POSSIBILITY OF SUCH DAMAGE.
+ */
+#include <sys/cdefs.h>
+__RCSID("$NetBSD: t_memfd_create.c,v 1.1 2023/07/29 12:16:34 christos Exp $");
+
+#include <sys/param.h>
+#include <sys/types.h>
+#include <sys/mman.h>
+#include <sys/stat.h>
+#include <errno.h>
+#include <fcntl.h>
+
+#include <atf-c.h>
+
+#include "h_macros.h"
+
+char name_buf[NAME_MAX];
+char write_buf[8192];
+char read_buf[8192];
+
+ATF_TC(create_null_name);
+ATF_TC_HEAD(create_null_name, tc)
+{
+
+	atf_tc_set_md_var(tc, "descr",
+	    "Checks memfd_create fails with EFAULT when invalid memory"
+	    " is provided");
+}
+ATF_TC_BODY(create_null_name, tc)
+{
+	int fd;
+
+	ATF_REQUIRE_EQ_MSG(fd = memfd_create(NULL, 0), -1,
+	    "Unexpected success");
+	ATF_REQUIRE_ERRNO(EFAULT, true);
+}
+
+ATF_TC(create_long_name);
+ATF_TC_HEAD(create_long_name, tc)
+{
+
+	atf_tc_set_md_var(tc, "descr",
+	    "Checks memfd_create fails for names longer than NAME_MAX-6");
+}
+ATF_TC_BODY(create_long_name, tc)
+{
+	int fd;
+
+        memset(name_buf, 'A', sizeof(name_buf));
+	name_buf[NAME_MAX-6] = '\0';
+
+	ATF_REQUIRE_EQ_MSG(fd = memfd_create(name_buf, 0), -1,
+	    "Unexpected success");
+	ATF_REQUIRE_ERRNO(ENAMETOOLONG, true);
+
+	name_buf[NAME_MAX-7] = '\0';
+
+	RL(fd = memfd_create(name_buf, 0));
+}
+
+ATF_TC(read_write);
+ATF_TC_HEAD(read_write, tc)
+{
+
+	atf_tc_set_md_var(tc, "descr",
+	    "Checks that data can be written to/read from a memfd");
+}
+ATF_TC_BODY(read_write, tc)
+{
+	int fd;
+	off_t offset;
+
+	RL(fd = memfd_create("", 0));
+
+	tests_makegarbage(write_buf, sizeof(write_buf));
+	memset(read_buf, 0, sizeof(read_buf));
+
+	RL(write(fd, write_buf, sizeof(write_buf)));
+	offset = lseek(fd, 0, SEEK_CUR);
+	ATF_REQUIRE_EQ_MSG(offset, sizeof(write_buf),
+	    "File offset not set after write (%ld != %ld)", offset,
+	    sizeof(write_buf));
+
+	RZ(lseek(fd, 0, SEEK_SET));
+
+	RL(read(fd, read_buf, sizeof(read_buf)));
+	offset = lseek(fd, 0, SEEK_CUR);
+	ATF_REQUIRE_EQ_MSG(offset, sizeof(read_buf),
+	    "File offset not set after read (%ld != %ld)", offset,
+	    sizeof(read_buf));
+
+	for (size_t i = 0; i < sizeof(read_buf); i++)
+		ATF_REQUIRE_EQ_MSG(read_buf[i], write_buf[i],
+		    "Data read does not match data written");
+}
+
+ATF_TC(truncate);
+ATF_TC_HEAD(truncate, tc)
+{
+
+	atf_tc_set_md_var(tc, "descr",
+	    "Checks that truncation does result in data removal");
+}
+ATF_TC_BODY(truncate, tc)
+{
+	int fd;
+	struct stat st;
+
+	RL(fd = memfd_create("", 0));
+
+	tests_makegarbage(write_buf, sizeof(write_buf));
+	tests_makegarbage(read_buf, sizeof(read_buf));
+
+	RL(write(fd, write_buf, sizeof(write_buf)));
+
+	RL(fstat(fd, &st));
+	ATF_REQUIRE_EQ_MSG(st.st_size, sizeof(write_buf),
+	    "Write did not grow size to %ld (is %ld)", sizeof(write_buf),
+	    st.st_size);
+
+	RL(ftruncate(fd, sizeof(write_buf)/2));
+	RL(fstat(fd, &st));
+	ATF_REQUIRE_EQ_MSG(st.st_size, sizeof(write_buf)/2,
+	    "Truncate did not shrink size to %ld (is %ld)",
+	    sizeof(write_buf)/2, st.st_size);
+
+	RL(ftruncate(fd, sizeof(read_buf)));
+	RL(fstat(fd, &st));
+	ATF_REQUIRE_EQ_MSG(st.st_size, sizeof(read_buf),
+	    "Truncate did not grow size to %ld (is %ld)", sizeof(read_buf),
+	    st.st_size);
+
+	RZ(lseek(fd, 0, SEEK_SET));
+	RL(read(fd, read_buf, sizeof(read_buf)));
+
+	for (size_t i = 0; i < sizeof(read_buf)/2; i++)
+		ATF_REQUIRE_EQ_MSG(read_buf[i], write_buf[i],
+		    "Data read does not match data written");
+	for (size_t i = sizeof(read_buf)/2; i < sizeof(read_buf); i++)
+		ATF_REQUIRE_EQ_MSG(read_buf[i], 0,
+		    "Data read on growed region is not zeroed");
+}
+
+ATF_TC(mmap);
+ATF_TC_HEAD(mmap, tc)
+{
+
+	atf_tc_set_md_var(tc, "descr", "Check that mmap succeeds");
+}
+ATF_TC_BODY(mmap, tc)
+{
+	int fd;
+	void *addr;
+
+	RL(fd = memfd_create("", 0));
+	RL(ftruncate(fd, sizeof(read_buf)));
+
+	addr = mmap(NULL, sizeof(read_buf), PROT_READ|PROT_WRITE, MAP_SHARED,
+	    fd, 0);
+	ATF_REQUIRE_MSG(addr != MAP_FAILED, "Mmap failed unexpectedly (%s)",
+	    strerror(errno));
+}
+
+ATF_TC(create_no_sealing);
+ATF_TC_HEAD(create_no_sealing, tc)
+{
+
+	atf_tc_set_md_var(tc, "descr",
+	    "Checks that seals cannot be added if MFD_ALLOW_SEALING is"
+	    " not specified to memfd_create");
+}
+ATF_TC_BODY(create_no_sealing, tc)
+{
+	int fd;
+
+	RL(fd = memfd_create("", 0));
+
+	ATF_REQUIRE_EQ_MSG(fcntl(fd, F_ADD_SEALS, F_SEAL_WRITE), -1,
+	    "fcntl succeeded unexpectedly");
+	ATF_REQUIRE_ERRNO(EPERM, true);
+}
+
+ATF_TC(seal_seal);
+ATF_TC_HEAD(seal_seal, tc)
+{
+
+	atf_tc_set_md_var(tc, "descr",
+	    "Checks adding F_SEAL_SEAL prevents adding other seals");
+}
+ATF_TC_BODY(seal_seal, tc)
+{
+	int fd;
+
+	RL(fd = memfd_create("", MFD_ALLOW_SEALING));
+	RL(fcntl(fd, F_ADD_SEALS, F_SEAL_SEAL));
+
+        ATF_REQUIRE_EQ_MSG(fcntl(fd, F_ADD_SEALS, F_SEAL_WRITE), -1,
+	    "fcntl succeeded unexpectedly");
+	ATF_REQUIRE_ERRNO(EPERM, true);
+}
+
+/*
+ * Tests that the seals provided in except to not also prevent some
+ * other operation.
+ *
+ * Note: fd must have a positive size.
+ */
+static void
+test_all_seals_except(int fd, int except)
+{
+	int rv;
+	struct stat st;
+	void *addr;
+
+	RL(fstat(fd, &st));
+	ATF_REQUIRE(st.st_size > 0);
+
+	if (except & ~F_SEAL_SEAL) {
+		rv = fcntl(fd, F_ADD_SEALS, F_SEAL_SEAL);
+		if (rv == -1) {
+			ATF_REQUIRE_MSG(errno != EPERM,
+			    "Seal %x prevented F_ADD_SEALS", except);
+			ATF_REQUIRE_MSG(errno == EPERM,
+			    "F_ADD_SEALS failed unexpectedly (%s)",
+			    strerror(errno));
+		}
+	}
+
+	if (except & ~(F_SEAL_WRITE|F_SEAL_FUTURE_WRITE)) {
+		RZ(lseek(fd, 0, SEEK_SET));
+		rv = write(fd, write_buf, sizeof(write_buf));
+		if (rv == -1) {
+			ATF_REQUIRE_MSG(errno != EPERM,
+			    "Seal %x prevented write", except);
+		        ATF_REQUIRE_MSG(errno == EPERM,
+			    "Write failed unexpectedly (%s)",
+			    strerror(errno));
+		}
+
+	        addr = mmap(NULL, st.st_size, PROT_READ|PROT_WRITE,
+		    MAP_SHARED, fd, 0);
+		ATF_REQUIRE_MSG(addr != MAP_FAILED,
+		    "Mmap failed unexpectedly (%s)", strerror(errno));
+	}
+
+	if (except & ~F_SEAL_SHRINK) {
+		rv = ftruncate(fd, st.st_size - 1);
+		if (rv == -1) {
+		        ATF_REQUIRE_MSG(errno != EPERM,
+			    "Seal %x prevented truncate to shrink", except);
+			ATF_REQUIRE_MSG(errno == EPERM,
+			    "Truncate failed unexpectedly (%s)",
+			    strerror(errno));
+		}
+	}
+
+	if (except & ~F_SEAL_GROW) {
+		rv = ftruncate(fd, st.st_size + 1);
+		if (rv == -1) {
+		        ATF_REQUIRE_MSG(errno != EPERM,
+			    "Seal %x prevented truncate to shrink", except);
+		        ATF_REQUIRE_MSG(errno == EPERM,
+			    "Truncate failed unexpectedly (%s)",
+			    strerror(errno));
+		}
+	}
+}
+
+ATF_TC(seal_shrink);
+ATF_TC_HEAD(seal_shrink, tc)
+{
+
+	atf_tc_set_md_var(tc, "descr",
+	    "Checks F_SEAL_SHRINK prevents shrinking the file");
+}
+ATF_TC_BODY(seal_shrink, tc)
+{
+	int fd;
+
+	RL(fd = memfd_create("", MFD_ALLOW_SEALING));
+	RL(ftruncate(fd, sizeof(write_buf)));
+	RL(fcntl(fd, F_ADD_SEALS, F_SEAL_SHRINK));
+
+	ATF_REQUIRE_EQ_MSG(ftruncate(fd, sizeof(write_buf)/2), -1,
+	    "Truncate succeeded unexpectedly");
+	ATF_REQUIRE_ERRNO(EPERM, true);
+
+	test_all_seals_except(fd, F_SEAL_SHRINK);
+}
+
+ATF_TC(seal_grow);
+ATF_TC_HEAD(seal_grow, tc)
+{
+
+	atf_tc_set_md_var(tc, "descr",
+	    "Checks F_SEAL_SHRINK prevents growing the file");
+}
+ATF_TC_BODY(seal_grow, tc)
+{
+	int fd;
+
+	RL(fd = memfd_create("", MFD_ALLOW_SEALING));
+	RL(ftruncate(fd, sizeof(write_buf)/2));
+	RL(fcntl(fd, F_ADD_SEALS, F_SEAL_GROW));
+
+	ATF_REQUIRE_EQ_MSG(ftruncate(fd, sizeof(write_buf)), -1,
+	    "Truncate succeeded unexpectedly");
+	ATF_REQUIRE_ERRNO(EPERM, true);
+
+	test_all_seals_except(fd, F_SEAL_GROW);
+}
+
+ATF_TC(seal_write);
+ATF_TC_HEAD(seal_write, tc)
+{
+
+	atf_tc_set_md_var(tc, "descr",
+	    "Checks F_SEAL_WRITE prevents writing");
+}
+ATF_TC_BODY(seal_write, tc)
+{
+	int fd;
+
+	RL(fd = memfd_create("", MFD_ALLOW_SEALING));
+	RL(ftruncate(fd, sizeof(write_buf)/2));
+	RL(fcntl(fd, F_ADD_SEALS, F_SEAL_WRITE));
+
+	ATF_REQUIRE_EQ_MSG(write(fd, write_buf, sizeof(write_buf)), -1,
+	    "Write succeeded unexpectedly");
+	ATF_REQUIRE_ERRNO(EPERM, true);
+
+	test_all_seals_except(fd, F_SEAL_WRITE);
+}
+
+ATF_TC(seal_write_mmap);
+ATF_TC_HEAD(seal_write_mmap, tc)
+{
+
+	atf_tc_set_md_var(tc, "descr",
+	    "Checks that F_SEAL_WRITE cannot be added with open mmaps");
+}
+ATF_TC_BODY(seal_write_mmap, tc)
+{
+	int fd;
+	void *addr;
+
+	RL(fd = memfd_create("", MFD_ALLOW_SEALING));
+	RL(ftruncate(fd, sizeof(read_buf)));
+
+	addr = mmap(NULL, sizeof(read_buf), PROT_READ|PROT_WRITE, MAP_SHARED,
+	    fd, 0);
+	ATF_REQUIRE_MSG(addr != MAP_FAILED, "Mmap failed unexpectedly (%s)",
+	    strerror(errno));
+
+	ATF_REQUIRE_EQ_MSG(fcntl(fd, F_ADD_SEALS, F_SEAL_WRITE), -1,
+	    "fcntl succeeded unexpectedly");
+	ATF_REQUIRE_ERRNO(EBUSY, true);
+}
+
+ATF_TC(seal_future_write);
+ATF_TC_HEAD(seal_future_write, tc)
+{
+
+	atf_tc_set_md_var(tc, "descr",
+	    "Checks F_SEAL_FUTURE_WRITE prevents writing");
+}
+ATF_TC_BODY(seal_future_write, tc)
+{
+	int fd;
+
+	RL(fd = memfd_create("", MFD_ALLOW_SEALING));
+	RL(ftruncate(fd, sizeof(write_buf)/2));
+	RL(fcntl(fd, F_ADD_SEALS, F_SEAL_FUTURE_WRITE));
+
+	ATF_REQUIRE_EQ_MSG(write(fd, write_buf, sizeof(write_buf)), -1,
+	    "Write succeeded unexpectedly");
+	ATF_REQUIRE_ERRNO(EPERM, true);
+
+	test_all_seals_except(fd, F_SEAL_FUTURE_WRITE);
+}
+
+ATF_TC(seal_future_write_mmap);
+ATF_TC_HEAD(seal_future_write_mmap, tc)
+{
+
+	atf_tc_set_md_var(tc, "descr",
+	    "Checks that F_SEAL_WRITE can be added with open mmaps but"
+	    " prevents creating new ones");
+}
+ATF_TC_BODY(seal_future_write_mmap, tc)
+{
+	int fd;
+	void *addr;
+
+	RL(fd = memfd_create("", MFD_ALLOW_SEALING));
+	RL(ftruncate(fd, sizeof(read_buf)));
+	addr = mmap(NULL, sizeof(read_buf), PROT_READ|PROT_WRITE, MAP_SHARED,
+	    fd, 0);
+	ATF_REQUIRE_MSG(addr != MAP_FAILED, "Mmap failed unexpectedly (%s)",
+	    strerror(errno));
+
+	RL(fcntl(fd, F_ADD_SEALS, F_SEAL_FUTURE_WRITE));
+
+	ATF_REQUIRE_EQ_MSG(mmap(NULL, sizeof(read_buf), PROT_READ|PROT_WRITE,
+	    MAP_SHARED, fd, 0), MAP_FAILED, "Mmap succeeded unexpectedly");
+	ATF_REQUIRE_ERRNO(EPERM, true);
+}
+
+
+ATF_TP_ADD_TCS(tp)
+{
+	ATF_TP_ADD_TC(tp, create_null_name);
+	ATF_TP_ADD_TC(tp, create_long_name);
+	ATF_TP_ADD_TC(tp, read_write);
+	ATF_TP_ADD_TC(tp, truncate);
+	ATF_TP_ADD_TC(tp, mmap);
+	ATF_TP_ADD_TC(tp, create_no_sealing);
+	ATF_TP_ADD_TC(tp, seal_seal);
+	ATF_TP_ADD_TC(tp, seal_shrink);
+	ATF_TP_ADD_TC(tp, seal_grow);
+	ATF_TP_ADD_TC(tp, seal_write);
+	ATF_TP_ADD_TC(tp, seal_write_mmap);
+	ATF_TP_ADD_TC(tp, seal_future_write);
+	ATF_TP_ADD_TC(tp, seal_future_write_mmap);
+
+	return atf_no_error();
+}

Reply via email to