Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp156074imm; Tue, 9 Oct 2018 15:36:17 -0700 (PDT) X-Google-Smtp-Source: ACcGV62MdxnGeIH7K84HUwgBEUK9LqcJyZxqvxtyOLefap0W945UBncmC0pWldrvpmxZhUQSws+a X-Received: by 2002:a63:40c2:: with SMTP id n185-v6mr7198869pga.116.1539124577325; Tue, 09 Oct 2018 15:36:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539124577; cv=none; d=google.com; s=arc-20160816; b=HcHU0Q9eVBacxvg3Bd6Mg0QrCFyxLt2Dy9bRZB0B9vh5WKOkaB0WObKIjfvIVyXXX/ h4Ak98ktsEbVPny1EBvpjblAzcQa/zCPndWRCqlPnxW5gFeUPt+NvtHCU3HdvIFWBi07 3tE0Mo4YdBd3VhsjqikXCjf4DWrdR/cSItczlwr4e+l+EjDopREiCvtLsHrRG/hCfpVG L04xYIAHGok5cky/cQZQJzoV1I49VN4ygQEM10VcfNUszYqLG3Mvw/PUubmzgZXsLpJq umVLCa40sr+wdCtTneqUtphEIVjGITK1ZaExg/p9uqd1ofLdX2niVbdk4gtclgWW9JDB kGow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=NwVBvxLxnExW8Y+lohGiDTTSEx7kt3RXBm0dcq5Azr4=; b=ipMYIU4bMAHPqBItLW57fLfCb27KJqOe9gYI9NXl46yTERHyPm2uADwWLqxoKhWcz5 x4CnLG5E6DVtiJcTv2doIwQ3dkyY+RwO4opHkuRRMEz785KnpIyIZ7q7ewNqE/dtQtlY MgZG3zvUogTscPYKbDJaDyAql6aQNpW5ck7Zl+rJCJie65HkWtjL4CjbzkT+tbxyjkTn xHeDDe3kRFooE2velxG2+8TsUmayBW9w5yvsWFpMNrgAAdJmNGGoug8fHthFv3V6oz7e V1HFze7MzCZj915yYlM234pY+3UyQWHJ3ezRf05oICBzJre2qY/GriGX9uljM4WEXlU8 BgQw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@joelfernandes.org header.s=google header.b=K0PLEdHL; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b6-v6si21600669pgh.542.2018.10.09.15.36.00; Tue, 09 Oct 2018 15:36:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@joelfernandes.org header.s=google header.b=K0PLEdHL; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727786AbeJJFxX (ORCPT + 99 others); Wed, 10 Oct 2018 01:53:23 -0400 Received: from mail-pg1-f194.google.com ([209.85.215.194]:37925 "EHLO mail-pg1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727635AbeJJFxW (ORCPT ); Wed, 10 Oct 2018 01:53:22 -0400 Received: by mail-pg1-f194.google.com with SMTP id f8-v6so1512027pgq.5 for ; Tue, 09 Oct 2018 15:34:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelfernandes.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=NwVBvxLxnExW8Y+lohGiDTTSEx7kt3RXBm0dcq5Azr4=; b=K0PLEdHLkE371oIDFHdv6F8/JVPxj9tzXqw+vx0g7tG+cdecE8npNfh6om8DBgrlJI SvhKDoPvaR7S/E32obYtPIx+uHd6dR8xjx60M6T7nqBfArcUyTK980kW8iKDTDDI2u1+ O3WSvRIvKD4rsOu8AbrQDZQdaQVGOucrOJ6V4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=NwVBvxLxnExW8Y+lohGiDTTSEx7kt3RXBm0dcq5Azr4=; b=gGU+pLflufJnuCqGGlTiJRMq9iNRoBIuVxJ6ELbfIEKdvjiIaG22QwvC0INeU87CU+ ieZwiHlreQAUM5fj6pbH1IfbsPC0jtdBz/VrZyScNYCOfr0lWjQrPF8aaOpBGNdnyWmS MmAesapplerWuGv7nzXS6nm+v2r+dP2GQVrTqYx5qDNuLEmygf3bF+Q67z1TGiHak0yr s4jdz2N5tkIYnukodoDj0eUAuLWreU9DUXu7RP8K1KuoDYoAzy1XR19HBz9KIG4IuHTC m3CZMZDc5lQWzOe4xvYCEsp2Ahrbp/6Mwi77jNSDPAKlqkZyWDKFQNyi8FEbtCUyV7l3 lgyQ== X-Gm-Message-State: ABuFfogHDuppPqHzwM/KcDNLxMRB20l6QsUrT8NoNsxVxrWJlYvn/BhR xRb2oQ/Kc6Vy61BpD5lPD1mISbT5dNM= X-Received: by 2002:a63:ea43:: with SMTP id l3-v6mr27556911pgk.427.1539124453705; Tue, 09 Oct 2018 15:34:13 -0700 (PDT) Received: from localhost ([2620:0:1000:1601:3aef:314f:b9ea:889f]) by smtp.gmail.com with ESMTPSA id r25-v6sm23920355pgm.59.2018.10.09.15.34.12 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 09 Oct 2018 15:34:12 -0700 (PDT) Date: Tue, 9 Oct 2018 15:34:11 -0700 From: Joel Fernandes To: linux-kernel@vger.kernel.org Cc: kernel-team@android.com, dancol@google.com, minchan@kernel.org, Andrew Morton , gregkh@linuxfoundation.org, "J. Bruce Fields" , Jeff Layton , john.stultz@linaro.org, jreck@google.com, Khalid Aziz , linux-fsdevel@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-mm@kvack.org, Mike Kravetz , Shuah Khan , tkjos@google.com Subject: Re: [PATCH v2 2/2] selftests/memfd: Add tests for F_SEAL_FS_WRITE seal Message-ID: <20181009223411.GA13848@joelaf.mtv.corp.google.com> References: <20181009222042.9781-1-joel@joelfernandes.org> <20181009222042.9781-2-joel@joelfernandes.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181009222042.9781-2-joel@joelfernandes.org> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Oct 09, 2018 at 03:20:42PM -0700, Joel Fernandes (Google) wrote: > Add tests to verify sealing memfds with the F_SEAL_FS_WRITE works as > expected. > > Cc: dancol@google.com > Cc: minchan@google.com > Signed-off-by: Joel Fernandes (Google) > --- > tools/testing/selftests/memfd/memfd_test.c | 51 +++++++++++++++++++++- > 1 file changed, 50 insertions(+), 1 deletion(-) > > diff --git a/tools/testing/selftests/memfd/memfd_test.c b/tools/testing/selftests/memfd/memfd_test.c > index 10baa1652fc2..4bd2b6c87bb4 100644 > --- a/tools/testing/selftests/memfd/memfd_test.c > +++ b/tools/testing/selftests/memfd/memfd_test.c > @@ -27,7 +27,7 @@ > > #define MFD_DEF_SIZE 8192 > #define STACK_SIZE 65536 > - > +#define F_SEAL_FS_WRITE 0x0010 > /* > * Default is not to test hugetlbfs > */ > @@ -170,6 +170,24 @@ static void *mfd_assert_mmap_shared(int fd) > return p; > } > > +static void *mfd_fail_mmap_shared(int fd) > +{ > + void *p; > + > + p = mmap(NULL, > + mfd_def_size, > + PROT_READ | PROT_WRITE, > + MAP_SHARED, > + fd, > + 0); > + if (p != MAP_FAILED) { > + printf("mmap() didn't fail as expected\n"); > + abort(); > + } > + > + return p; > +} > + Ah, this function is unused. I wrote it initially and used it but then figured I didn't need it, and then forgot to remove it. It does not affect the correctness of the patch. Anyway below is the updated patch. thanks, - Joel ------8<----- From: "Joel Fernandes (Google)" Subject: [PATCH v2.1] selftests/memfd: Add tests for F_SEAL_FS_WRITE seal Add tests to verify sealing memfds with the F_SEAL_FS_WRITE works as expected. Cc: dancol@google.com Cc: minchan@kernel.org Signed-off-by: Joel Fernandes (Google) --- tools/testing/selftests/memfd/memfd_test.c | 33 +++++++++++++++++++++- 1 file changed, 32 insertions(+), 1 deletion(-) diff --git a/tools/testing/selftests/memfd/memfd_test.c b/tools/testing/selftests/memfd/memfd_test.c index 10baa1652fc2..d074de568ba0 100644 --- a/tools/testing/selftests/memfd/memfd_test.c +++ b/tools/testing/selftests/memfd/memfd_test.c @@ -27,7 +27,7 @@ #define MFD_DEF_SIZE 8192 #define STACK_SIZE 65536 - +#define F_SEAL_FS_WRITE 0x0010 /* * Default is not to test hugetlbfs */ @@ -692,6 +692,36 @@ static void test_seal_write(void) close(fd); } +/* + * Test SEAL_WRITE + * Test whether SEAL_WRITE actually prevents modifications. + */ +static void test_seal_fs_write(void) +{ + int fd; + void *p; + + printf("%s SEAL-FS-WRITE\n", memfd_str); + + fd = mfd_assert_new("kern_memfd_seal_fs_write", + mfd_def_size, + MFD_CLOEXEC | MFD_ALLOW_SEALING); + + p = mfd_assert_mmap_shared(fd); + + /* FS_WRITE seal can be added even with existing + * writeable mappings */ + mfd_assert_has_seals(fd, 0); + mfd_assert_add_seals(fd, F_SEAL_FS_WRITE); + mfd_assert_has_seals(fd, F_SEAL_FS_WRITE); + + mfd_assert_read(fd); + mfd_fail_write(fd); + + munmap(p, mfd_def_size); + close(fd); +} + /* * Test SEAL_SHRINK * Test whether SEAL_SHRINK actually prevents shrinking @@ -945,6 +975,7 @@ int main(int argc, char **argv) test_basic(); test_seal_write(); + test_seal_fs_write(); test_seal_shrink(); test_seal_grow(); test_seal_resize(); -- 2.19.0.605.g01d371f741-goog