1 1.9 christos /* $NetBSD: t_mprotect.c,v 1.9 2020/04/18 17:44:53 christos Exp $ */ 2 1.1 jruoho 3 1.1 jruoho /*- 4 1.9 christos * Copyright (c) 2011, 2020 The NetBSD Foundation, Inc. 5 1.1 jruoho * All rights reserved. 6 1.1 jruoho * 7 1.1 jruoho * This code is derived from software contributed to The NetBSD Foundation 8 1.1 jruoho * by Jukka Ruohonen. 9 1.1 jruoho * 10 1.1 jruoho * Redistribution and use in source and binary forms, with or without 11 1.1 jruoho * modification, are permitted provided that the following conditions 12 1.1 jruoho * are met: 13 1.1 jruoho * 1. Redistributions of source code must retain the above copyright 14 1.1 jruoho * notice, this list of conditions and the following disclaimer. 15 1.1 jruoho * 2. Redistributions in binary form must reproduce the above copyright 16 1.1 jruoho * notice, this list of conditions and the following disclaimer in the 17 1.1 jruoho * documentation and/or other materials provided with the distribution. 18 1.1 jruoho * 19 1.1 jruoho * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 20 1.1 jruoho * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 21 1.1 jruoho * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 22 1.1 jruoho * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 23 1.1 jruoho * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 24 1.1 jruoho * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 25 1.1 jruoho * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 26 1.1 jruoho * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 27 1.1 jruoho * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 28 1.1 jruoho * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 29 1.1 jruoho * POSSIBILITY OF SUCH DAMAGE. 30 1.1 jruoho */ 31 1.1 jruoho #include <sys/cdefs.h> 32 1.9 christos __RCSID("$NetBSD: t_mprotect.c,v 1.9 2020/04/18 17:44:53 christos Exp $"); 33 1.1 jruoho 34 1.1 jruoho #include <sys/param.h> 35 1.1 jruoho #include <sys/mman.h> 36 1.1 jruoho #include <sys/sysctl.h> 37 1.1 jruoho #include <sys/wait.h> 38 1.1 jruoho 39 1.1 jruoho #include <errno.h> 40 1.1 jruoho #include <fcntl.h> 41 1.1 jruoho #include <stdlib.h> 42 1.1 jruoho #include <string.h> 43 1.1 jruoho #include <unistd.h> 44 1.1 jruoho 45 1.1 jruoho #include <atf-c.h> 46 1.1 jruoho 47 1.2 jym #include "../common/exec_prot.h" 48 1.9 christos #include "t_mprotect_helper.h" 49 1.2 jym 50 1.1 jruoho static long page = 0; 51 1.1 jruoho static char path[] = "mmap"; 52 1.1 jruoho 53 1.1 jruoho static void sighandler(int); 54 1.1 jruoho static bool paxinit(void); 55 1.1 jruoho 56 1.1 jruoho static void 57 1.1 jruoho sighandler(int signo) 58 1.1 jruoho { 59 1.1 jruoho _exit(signo); 60 1.1 jruoho } 61 1.1 jruoho 62 1.1 jruoho static bool 63 1.1 jruoho paxinit(void) 64 1.1 jruoho { 65 1.1 jruoho size_t len = sizeof(int); 66 1.6 pgoyette int pax_flags; 67 1.1 jruoho int rv; 68 1.1 jruoho 69 1.6 pgoyette rv = sysctlbyname("proc.curproc.paxflags", 70 1.6 pgoyette &pax_flags, &len, NULL, 0); 71 1.1 jruoho 72 1.1 jruoho if (rv != 0) 73 1.1 jruoho return false; 74 1.1 jruoho 75 1.6 pgoyette return ((pax_flags & CTL_PROC_PAXFLAGS_MPROTECT) != 0); 76 1.1 jruoho } 77 1.1 jruoho 78 1.1 jruoho ATF_TC_WITH_CLEANUP(mprotect_access); 79 1.1 jruoho ATF_TC_HEAD(mprotect_access, tc) 80 1.1 jruoho { 81 1.1 jruoho atf_tc_set_md_var(tc, "descr", "Test for EACCES from mprotect(2)"); 82 1.1 jruoho } 83 1.1 jruoho 84 1.1 jruoho ATF_TC_BODY(mprotect_access, tc) 85 1.1 jruoho { 86 1.1 jruoho int prot[2] = { PROT_NONE, PROT_READ }; 87 1.1 jruoho void *map; 88 1.1 jruoho size_t i; 89 1.1 jruoho int fd; 90 1.1 jruoho 91 1.8 martin fd = open(path, O_RDONLY | O_CREAT, 0600); 92 1.1 jruoho ATF_REQUIRE(fd >= 0); 93 1.1 jruoho 94 1.1 jruoho /* 95 1.1 jruoho * The call should fail with EACCES if we try to mark 96 1.1 jruoho * a PROT_NONE or PROT_READ file/section as PROT_WRITE. 97 1.1 jruoho */ 98 1.1 jruoho for (i = 0; i < __arraycount(prot); i++) { 99 1.1 jruoho 100 1.1 jruoho map = mmap(NULL, page, prot[i], MAP_SHARED, fd, 0); 101 1.1 jruoho 102 1.1 jruoho if (map == MAP_FAILED) 103 1.1 jruoho continue; 104 1.1 jruoho 105 1.1 jruoho errno = 0; 106 1.1 jruoho 107 1.1 jruoho ATF_REQUIRE(mprotect(map, page, PROT_WRITE) != 0); 108 1.1 jruoho ATF_REQUIRE(errno == EACCES); 109 1.1 jruoho ATF_REQUIRE(munmap(map, page) == 0); 110 1.1 jruoho } 111 1.1 jruoho 112 1.1 jruoho ATF_REQUIRE(close(fd) == 0); 113 1.1 jruoho } 114 1.1 jruoho 115 1.1 jruoho ATF_TC_CLEANUP(mprotect_access, tc) 116 1.1 jruoho { 117 1.1 jruoho (void)unlink(path); 118 1.1 jruoho } 119 1.1 jruoho 120 1.1 jruoho ATF_TC(mprotect_err); 121 1.1 jruoho ATF_TC_HEAD(mprotect_err, tc) 122 1.1 jruoho { 123 1.1 jruoho atf_tc_set_md_var(tc, "descr", "Test error conditions of mprotect(2)"); 124 1.1 jruoho } 125 1.1 jruoho 126 1.1 jruoho ATF_TC_BODY(mprotect_err, tc) 127 1.1 jruoho { 128 1.1 jruoho errno = 0; 129 1.1 jruoho 130 1.1 jruoho ATF_REQUIRE(mprotect((char *)-1, 1, PROT_READ) != 0); 131 1.1 jruoho ATF_REQUIRE(errno == EINVAL); 132 1.1 jruoho } 133 1.1 jruoho 134 1.2 jym ATF_TC(mprotect_exec); 135 1.2 jym ATF_TC_HEAD(mprotect_exec, tc) 136 1.2 jym { 137 1.2 jym atf_tc_set_md_var(tc, "descr", 138 1.2 jym "Test mprotect(2) executable space protections"); 139 1.2 jym } 140 1.2 jym 141 1.2 jym /* 142 1.2 jym * Trivial function -- should fit into a page 143 1.2 jym */ 144 1.2 jym ATF_TC_BODY(mprotect_exec, tc) 145 1.2 jym { 146 1.2 jym pid_t pid; 147 1.2 jym void *map; 148 1.2 jym int sta, xp_support; 149 1.2 jym 150 1.2 jym xp_support = exec_prot_support(); 151 1.2 jym 152 1.2 jym switch (xp_support) { 153 1.2 jym case NOTIMPL: 154 1.2 jym atf_tc_skip( 155 1.2 jym "Execute protection callback check not implemented"); 156 1.2 jym break; 157 1.2 jym case NO_XP: 158 1.2 jym atf_tc_skip( 159 1.2 jym "Host does not support executable space protection"); 160 1.2 jym break; 161 1.2 jym case PARTIAL_XP: case PERPAGE_XP: default: 162 1.2 jym break; 163 1.2 jym } 164 1.2 jym 165 1.2 jym /* 166 1.2 jym * Map a page read/write and copy a trivial assembly function inside. 167 1.2 jym * We will then change the mapping rights: 168 1.2 jym * - first by setting the execution right, and check that we can 169 1.2 jym * call the code found in the allocated page. 170 1.2 jym * - second by removing the execution right. This should generate 171 1.2 jym * a SIGSEGV on architectures that can enforce --x permissions. 172 1.2 jym */ 173 1.2 jym 174 1.7 joerg map = mmap(NULL, page, PROT_MPROTECT(PROT_EXEC)|PROT_WRITE|PROT_READ, 175 1.7 joerg MAP_ANON, -1, 0); 176 1.2 jym ATF_REQUIRE(map != MAP_FAILED); 177 1.2 jym 178 1.2 jym memcpy(map, (void *)return_one, 179 1.2 jym (uintptr_t)return_one_end - (uintptr_t)return_one); 180 1.2 jym 181 1.2 jym /* give r-x rights then call code in page */ 182 1.2 jym ATF_REQUIRE(mprotect(map, page, PROT_EXEC|PROT_READ) == 0); 183 1.2 jym ATF_REQUIRE(((int (*)(void))map)() == 1); 184 1.2 jym 185 1.2 jym /* remove --x right */ 186 1.2 jym ATF_REQUIRE(mprotect(map, page, PROT_READ) == 0); 187 1.2 jym 188 1.2 jym pid = fork(); 189 1.2 jym ATF_REQUIRE(pid >= 0); 190 1.2 jym 191 1.2 jym if (pid == 0) { 192 1.2 jym ATF_REQUIRE(signal(SIGSEGV, sighandler) != SIG_ERR); 193 1.2 jym ATF_CHECK(((int (*)(void))map)() == 1); 194 1.2 jym _exit(0); 195 1.2 jym } 196 1.2 jym 197 1.2 jym (void)wait(&sta); 198 1.2 jym 199 1.3 jym ATF_REQUIRE(munmap(map, page) == 0); 200 1.3 jym 201 1.2 jym ATF_REQUIRE(WIFEXITED(sta) != 0); 202 1.2 jym 203 1.2 jym switch (xp_support) { 204 1.2 jym case PARTIAL_XP: 205 1.3 jym /* Partial protection might fail; skip the test when it does */ 206 1.3 jym if (WEXITSTATUS(sta) != SIGSEGV) { 207 1.3 jym atf_tc_skip("Host only supports " 208 1.3 jym "partial executable space protection"); 209 1.3 jym } 210 1.2 jym break; 211 1.2 jym case PERPAGE_XP: default: 212 1.2 jym /* Per-page --x protection should not fail */ 213 1.2 jym ATF_REQUIRE(WEXITSTATUS(sta) == SIGSEGV); 214 1.2 jym break; 215 1.2 jym } 216 1.2 jym } 217 1.2 jym 218 1.1 jruoho ATF_TC(mprotect_pax); 219 1.1 jruoho ATF_TC_HEAD(mprotect_pax, tc) 220 1.1 jruoho { 221 1.2 jym atf_tc_set_md_var(tc, "descr", "PaX restrictions and mprotect(2)"); 222 1.1 jruoho atf_tc_set_md_var(tc, "require.user", "root"); 223 1.1 jruoho } 224 1.1 jruoho 225 1.1 jruoho ATF_TC_BODY(mprotect_pax, tc) 226 1.1 jruoho { 227 1.1 jruoho const int prot[4] = { PROT_NONE, PROT_READ, PROT_WRITE }; 228 1.1 jruoho const char *str = NULL; 229 1.1 jruoho void *map; 230 1.1 jruoho size_t i; 231 1.1 jruoho int rv; 232 1.1 jruoho 233 1.5 martin if (!paxinit()) 234 1.5 martin atf_tc_skip("PaX MPROTECT restrictions not enabled"); 235 1.1 jruoho 236 1.1 jruoho /* 237 1.1 jruoho * As noted in the original PaX documentation [1], 238 1.1 jruoho * the following restrictions should apply: 239 1.1 jruoho * 240 1.1 jruoho * (1) creating executable anonymous mappings 241 1.1 jruoho * 242 1.1 jruoho * (2) creating executable/writable file mappings 243 1.1 jruoho * 244 1.1 jruoho * (3) making a non-executable mapping executable 245 1.1 jruoho * 246 1.1 jruoho * (4) making an executable/read-only file mapping 247 1.9 christos * writable except for performing relocations 248 1.9 christos * on an ET_DYN ELF file (non-PIC shared library) 249 1.1 jruoho * 250 1.1 jruoho * The following will test only the case (3). 251 1.1 jruoho * 252 1.1 jruoho * [1] http://pax.grsecurity.net/docs/mprotect.txt 253 1.1 jruoho * 254 1.1 jruoho * (Sun Apr 3 11:06:53 EEST 2011.) 255 1.1 jruoho */ 256 1.1 jruoho for (i = 0; i < __arraycount(prot); i++) { 257 1.1 jruoho 258 1.1 jruoho map = mmap(NULL, page, prot[i], MAP_ANON, -1, 0); 259 1.1 jruoho 260 1.1 jruoho if (map == MAP_FAILED) 261 1.1 jruoho continue; 262 1.1 jruoho 263 1.1 jruoho rv = mprotect(map, 1, prot[i] | PROT_EXEC); 264 1.1 jruoho 265 1.1 jruoho (void)munmap(map, page); 266 1.1 jruoho 267 1.1 jruoho if (rv == 0) { 268 1.1 jruoho str = "non-executable mapping made executable"; 269 1.1 jruoho goto out; 270 1.1 jruoho } 271 1.1 jruoho } 272 1.1 jruoho 273 1.1 jruoho out: 274 1.1 jruoho if (str != NULL) 275 1.1 jruoho atf_tc_fail("%s", str); 276 1.1 jruoho } 277 1.1 jruoho 278 1.1 jruoho ATF_TC(mprotect_write); 279 1.1 jruoho ATF_TC_HEAD(mprotect_write, tc) 280 1.1 jruoho { 281 1.2 jym atf_tc_set_md_var(tc, "descr", "Test mprotect(2) write protections"); 282 1.1 jruoho } 283 1.1 jruoho 284 1.1 jruoho ATF_TC_BODY(mprotect_write, tc) 285 1.1 jruoho { 286 1.1 jruoho pid_t pid; 287 1.1 jruoho void *map; 288 1.1 jruoho int sta; 289 1.1 jruoho 290 1.1 jruoho /* 291 1.1 jruoho * Map a page read/write, change the protection 292 1.1 jruoho * to read-only with mprotect(2), and try to write 293 1.1 jruoho * to the page. This should generate a SIGSEGV. 294 1.1 jruoho */ 295 1.1 jruoho map = mmap(NULL, page, PROT_WRITE|PROT_READ, MAP_ANON, -1, 0); 296 1.1 jruoho ATF_REQUIRE(map != MAP_FAILED); 297 1.1 jruoho 298 1.1 jruoho ATF_REQUIRE(strlcpy(map, "XXX", 3) == 3); 299 1.1 jruoho ATF_REQUIRE(mprotect(map, page, PROT_READ) == 0); 300 1.1 jruoho 301 1.1 jruoho pid = fork(); 302 1.1 jruoho ATF_REQUIRE(pid >= 0); 303 1.1 jruoho 304 1.1 jruoho if (pid == 0) { 305 1.1 jruoho ATF_REQUIRE(signal(SIGSEGV, sighandler) != SIG_ERR); 306 1.1 jruoho ATF_REQUIRE(strlcpy(map, "XXX", 3) == 0); 307 1.1 jruoho } 308 1.1 jruoho 309 1.1 jruoho (void)wait(&sta); 310 1.1 jruoho 311 1.1 jruoho ATF_REQUIRE(WIFEXITED(sta) != 0); 312 1.1 jruoho ATF_REQUIRE(WEXITSTATUS(sta) == SIGSEGV); 313 1.1 jruoho ATF_REQUIRE(munmap(map, page) == 0); 314 1.1 jruoho } 315 1.1 jruoho 316 1.7 joerg ATF_TC(mprotect_mremap_exec); 317 1.7 joerg ATF_TC_HEAD(mprotect_mremap_exec, tc) 318 1.7 joerg { 319 1.7 joerg atf_tc_set_md_var(tc, "descr", 320 1.7 joerg "Test mremap(2)+mprotect(2) executable space protections"); 321 1.7 joerg } 322 1.7 joerg 323 1.7 joerg /* 324 1.7 joerg * Trivial function -- should fit into a page 325 1.7 joerg */ 326 1.7 joerg ATF_TC_BODY(mprotect_mremap_exec, tc) 327 1.7 joerg { 328 1.7 joerg void *map, *map2; 329 1.7 joerg pid_t pid; 330 1.7 joerg int sta; 331 1.7 joerg 332 1.7 joerg /* 333 1.7 joerg * Map a page read/write/exec and duplicate it. 334 1.7 joerg * Map the copy executable. 335 1.7 joerg * Copy a trivial assembly function to the writeable mapping. 336 1.7 joerg * Try to execute it. This should never create a SIGSEGV. 337 1.7 joerg */ 338 1.7 joerg 339 1.7 joerg map = mmap(NULL, page, PROT_MPROTECT(PROT_EXEC|PROT_WRITE|PROT_READ), 340 1.7 joerg MAP_ANON, -1, 0); 341 1.7 joerg ATF_REQUIRE(map != MAP_FAILED); 342 1.7 joerg map2 = mremap(map, page, NULL, page, MAP_REMAPDUP); 343 1.7 joerg ATF_REQUIRE(map2 != MAP_FAILED); 344 1.7 joerg ATF_REQUIRE(mprotect(map, page, PROT_WRITE|PROT_READ) == 0); 345 1.7 joerg ATF_REQUIRE(mprotect(map2, page, PROT_EXEC|PROT_READ) == 0); 346 1.7 joerg 347 1.7 joerg memcpy(map, (void *)return_one, 348 1.7 joerg (uintptr_t)return_one_end - (uintptr_t)return_one); 349 1.7 joerg __builtin___clear_cache(map, (void *)((uintptr_t)map + page)); 350 1.7 joerg 351 1.7 joerg ATF_REQUIRE(((int (*)(void))map2)() == 1); 352 1.7 joerg 353 1.7 joerg /* Double check that the executable mapping is not writeable. */ 354 1.7 joerg pid = fork(); 355 1.7 joerg ATF_REQUIRE(pid >= 0); 356 1.7 joerg 357 1.7 joerg if (pid == 0) { 358 1.7 joerg ATF_REQUIRE(signal(SIGSEGV, sighandler) != SIG_ERR); 359 1.7 joerg ATF_REQUIRE(strlcpy(map2, "XXX", 3) == 0); 360 1.7 joerg } 361 1.7 joerg 362 1.7 joerg (void)wait(&sta); 363 1.7 joerg 364 1.7 joerg ATF_REQUIRE(WIFEXITED(sta) != 0); 365 1.7 joerg ATF_REQUIRE(WEXITSTATUS(sta) == SIGSEGV); 366 1.7 joerg 367 1.7 joerg if (exec_prot_support() == PERPAGE_XP) { 368 1.7 joerg /* Double check that the writeable mapping is not executable. */ 369 1.7 joerg pid = fork(); 370 1.7 joerg ATF_REQUIRE(pid >= 0); 371 1.7 joerg 372 1.7 joerg if (pid == 0) { 373 1.7 joerg ATF_REQUIRE(signal(SIGSEGV, sighandler) != SIG_ERR); 374 1.7 joerg ATF_REQUIRE(((int (*)(void))map)() == 1); 375 1.7 joerg } 376 1.7 joerg 377 1.7 joerg (void)wait(&sta); 378 1.7 joerg 379 1.7 joerg ATF_REQUIRE(WIFEXITED(sta) != 0); 380 1.7 joerg ATF_REQUIRE(WEXITSTATUS(sta) == SIGSEGV); 381 1.7 joerg } 382 1.7 joerg 383 1.7 joerg ATF_REQUIRE(munmap(map, page) == 0); 384 1.7 joerg ATF_REQUIRE(munmap(map2, page) == 0); 385 1.7 joerg } 386 1.7 joerg 387 1.9 christos ATF_TC(mprotect_mremap_fork_exec); 388 1.9 christos ATF_TC_HEAD(mprotect_mremap_fork_exec, tc) 389 1.9 christos { 390 1.9 christos atf_tc_set_md_var(tc, "descr", 391 1.9 christos "Test mremap(2)+fork(2)+mprotect(2) executable space protections"); 392 1.9 christos } 393 1.9 christos 394 1.9 christos ATF_TC_BODY(mprotect_mremap_fork_exec, tc) 395 1.9 christos { 396 1.9 christos void *map, *map2; 397 1.9 christos pid_t pid; 398 1.9 christos 399 1.9 christos atf_tc_expect_fail("PR lib/55177"); 400 1.9 christos 401 1.9 christos /* 402 1.9 christos * Map a page read/write/exec and duplicate it. 403 1.9 christos * Map the copy executable. 404 1.9 christos * Copy a function to the writeable mapping and execute it 405 1.9 christos * Fork a child and wait for it 406 1.9 christos * Copy a different function to the writeable mapping and execute it 407 1.9 christos * The original function shouldn't be called 408 1.9 christos */ 409 1.9 christos 410 1.9 christos map = mmap(NULL, page, PROT_READ|PROT_WRITE|PROT_MPROTECT(PROT_EXEC), 411 1.9 christos MAP_ANON, -1, 0); 412 1.9 christos ATF_REQUIRE(map != MAP_FAILED); 413 1.9 christos map2 = mremap(map, page, NULL, page, MAP_REMAPDUP); 414 1.9 christos ATF_REQUIRE(map2 != MAP_FAILED); 415 1.9 christos ATF_REQUIRE(mprotect(map2, page, PROT_EXEC|PROT_READ) == 0); 416 1.9 christos 417 1.9 christos memcpy(map, (void *)return_1, 418 1.9 christos (uintptr_t)return_2 - (uintptr_t)return_1); 419 1.9 christos __builtin___clear_cache(map, (void *)((uintptr_t)map + page)); 420 1.9 christos 421 1.9 christos ATF_REQUIRE(((int (*)(void))map2)() == 1); 422 1.9 christos 423 1.9 christos pid = fork(); 424 1.9 christos ATF_REQUIRE(pid >= 0); 425 1.9 christos 426 1.9 christos if (pid == 0) 427 1.9 christos _exit(0); 428 1.9 christos 429 1.9 christos (void)wait(NULL); 430 1.9 christos 431 1.9 christos memcpy(map, (void *)return_2, 432 1.9 christos (uintptr_t)return_3 - (uintptr_t)return_2); 433 1.9 christos __builtin___clear_cache(map, (void *)((uintptr_t)map + page)); 434 1.9 christos 435 1.9 christos ATF_REQUIRE(((int (*)(void))map2)() == 2); 436 1.9 christos 437 1.9 christos ATF_REQUIRE(munmap(map, page) == 0); 438 1.9 christos ATF_REQUIRE(munmap(map2, page) == 0); 439 1.9 christos } 440 1.9 christos 441 1.1 jruoho ATF_TP_ADD_TCS(tp) 442 1.1 jruoho { 443 1.1 jruoho page = sysconf(_SC_PAGESIZE); 444 1.1 jruoho ATF_REQUIRE(page >= 0); 445 1.1 jruoho 446 1.1 jruoho ATF_TP_ADD_TC(tp, mprotect_access); 447 1.1 jruoho ATF_TP_ADD_TC(tp, mprotect_err); 448 1.2 jym ATF_TP_ADD_TC(tp, mprotect_exec); 449 1.1 jruoho ATF_TP_ADD_TC(tp, mprotect_pax); 450 1.1 jruoho ATF_TP_ADD_TC(tp, mprotect_write); 451 1.7 joerg ATF_TP_ADD_TC(tp, mprotect_mremap_exec); 452 1.9 christos ATF_TP_ADD_TC(tp, mprotect_mremap_fork_exec); 453 1.1 jruoho 454 1.1 jruoho return atf_no_error(); 455 1.1 jruoho } 456