Re: git: 766c2466ff46 - main - mmap map_at_zero test: handle W^X

From: Jessica Clarke <jrtc27_at_freebsd.org>
Date: Mon, 21 Feb 2022 16:09:34 UTC
On 21 Feb 2022, at 15:46, Eric van Gyzen <vangyzen@FreeBSD.org> wrote:
> 
> The branch main has been updated by vangyzen:
> 
> URL: https://cgit.FreeBSD.org/src/commit/?id=766c2466ff465b3c7c1a46be729b42a6da47de03
> 
> commit 766c2466ff465b3c7c1a46be729b42a6da47de03
> Author:     Arka Sharma <arka_sharma@dell.com>
> AuthorDate: 2022-02-18 15:34:15 +0000
> Commit:     Eric van Gyzen <vangyzen@FreeBSD.org>
> CommitDate: 2022-02-21 15:43:42 +0000
> 
>    mmap map_at_zero test: handle W^X
> 
>    Use kern.elfXX.allow_wx to decide whether to map W+X or W-only memory.
> 
>    Future work could expand this test to add an "allow_wx" axis to the
>    test matrix, but I would argue that a separate test should be written,
>    since that's orthogonal to map_at_zero.
> 
>    MFC after:      1 week
>    Sponsored by:   Dell EMC Isilon
> ---
> tests/sys/vm/mmap_test.c | 27 +++++++++++++++++++++++++--
> 1 file changed, 25 insertions(+), 2 deletions(-)
> 
> diff --git a/tests/sys/vm/mmap_test.c b/tests/sys/vm/mmap_test.c
> index 61ede96fc49b..dc01a23fff21 100644
> --- a/tests/sys/vm/mmap_test.c
> +++ b/tests/sys/vm/mmap_test.c
> @@ -34,6 +34,7 @@
> #include <errno.h>
> #include <fcntl.h>
> #include <stdarg.h>
> +#include <stdbool.h>
> #include <stdio.h>
> #include <stdlib.h>
> 
> @@ -54,6 +55,12 @@ static const struct {
> 
> #define	MAP_AT_ZERO	"security.bsd.map_at_zero"
> 
> +#ifdef __LP64__
> +#define ALLOW_WX "kern.elf64.allow_wx"
> +#else
> +#define ALLOW_WX "kern.elf32.allow_wx"
> +#endif
> +
> ATF_TC_WITHOUT_HEAD(mmap__map_at_zero);
> ATF_TC_BODY(mmap__map_at_zero, tc)
> {
> @@ -61,6 +68,8 @@ ATF_TC_BODY(mmap__map_at_zero, tc)
> 	size_t len;
> 	unsigned int i;
> 	int map_at_zero;
> +	bool allow_wx;
> +	int prot_flags;
> 
> 	len = sizeof(map_at_zero);
> 	if (sysctlbyname(MAP_AT_ZERO, &map_at_zero, &len, NULL, 0) == -1) {
> @@ -69,13 +78,27 @@ ATF_TC_BODY(mmap__map_at_zero, tc)
> 		return;
> 	}
> 
> +	len = sizeof(allow_wx);
> +	if (sysctlbyname(ALLOW_WX, &allow_wx, &len, NULL, 0) == -1) {
> +		if (errno == ENOENT) {
> +			/* Allow W+X if sysctl isn't present */
> +			allow_wx = true;
> +		} else {
> +			atf_tc_skip("sysctl for %s failed: %s\n", ALLOW_WX,
> +			    strerror(errno));
> +			return;
> +		}
> +	}
> +
> 	/* Normalize to 0 or 1 for array access. */
> 	map_at_zero = !!map_at_zero;
> 
> 	for (i = 0; i < nitems(map_at_zero_tests); i++) {
> +		prot_flags = PROT_READ | PROT_WRITE;
> +		if (allow_wx)
> +			prot_flags |= PROT_EXEC;
> 		p = mmap((void *)map_at_zero_tests[i].addr, PAGE_SIZE,
> -		    PROT_READ | PROT_WRITE | PROT_EXEC, MAP_ANON | MAP_FIXED,
> -		    -1, 0);
> +		    prot_flags, MAP_ANON | MAP_FIXED, -1, 0);
> 		if (p == MAP_FAILED) {
> 			ATF_CHECK_MSG(map_at_zero_tests[i].ok[map_at_zero] == 0,
> 			    "mmap(%p, ...) failed", map_at_zero_tests[i].addr);

If the test is just as legitimate without PROT_EXEC, what’s the
justification for not just removing PROT_EXEC entirely rather than
making its behaviour depend on the sysctl, which could become confusing
(and complicates the test)? IMO either the test should be skipped for
!allow_wx or it should always just make a RW mapping; this choice is
rather odd.

Jess