| // SPDX-License-Identifier: GPL-2.0 |
| |
| /* |
| * Copyright 2022, Nicholas Miehlbradt, IBM Corporation |
| * based on pkey_exec_prot.c |
| * |
| * Test if applying execute protection on pages works as expected. |
| */ |
| |
| #define _GNU_SOURCE |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <signal.h> |
| |
| #include <unistd.h> |
| #include <sys/mman.h> |
| |
| #include "pkeys.h" |
| |
| |
| #define PPC_INST_NOP 0x60000000 |
| #define PPC_INST_TRAP 0x7fe00008 |
| #define PPC_INST_BLR 0x4e800020 |
| |
| static volatile sig_atomic_t fault_code; |
| static volatile sig_atomic_t remaining_faults; |
| static volatile unsigned int *fault_addr; |
| static unsigned long pgsize, numinsns; |
| static unsigned int *insns; |
| static bool pkeys_supported; |
| |
| static bool is_fault_expected(int fault_code) |
| { |
| if (fault_code == SEGV_ACCERR) |
| return true; |
| |
| /* Assume any pkey error is fine since pkey_exec_prot test covers them */ |
| if (fault_code == SEGV_PKUERR && pkeys_supported) |
| return true; |
| |
| return false; |
| } |
| |
| static void trap_handler(int signum, siginfo_t *sinfo, void *ctx) |
| { |
| /* Check if this fault originated from the expected address */ |
| if (sinfo->si_addr != (void *)fault_addr) |
| sigsafe_err("got a fault for an unexpected address\n"); |
| |
| _exit(1); |
| } |
| |
| static void segv_handler(int signum, siginfo_t *sinfo, void *ctx) |
| { |
| fault_code = sinfo->si_code; |
| |
| /* Check if this fault originated from the expected address */ |
| if (sinfo->si_addr != (void *)fault_addr) { |
| sigsafe_err("got a fault for an unexpected address\n"); |
| _exit(1); |
| } |
| |
| /* Check if too many faults have occurred for a single test case */ |
| if (!remaining_faults) { |
| sigsafe_err("got too many faults for the same address\n"); |
| _exit(1); |
| } |
| |
| |
| /* Restore permissions in order to continue */ |
| if (is_fault_expected(fault_code)) { |
| if (mprotect(insns, pgsize, PROT_READ | PROT_WRITE | PROT_EXEC)) { |
| sigsafe_err("failed to set access permissions\n"); |
| _exit(1); |
| } |
| } else { |
| sigsafe_err("got a fault with an unexpected code\n"); |
| _exit(1); |
| } |
| |
| remaining_faults--; |
| } |
| |
| static int check_exec_fault(int rights) |
| { |
| /* |
| * Jump to the executable region. |
| * |
| * The first iteration also checks if the overwrite of the |
| * first instruction word from a trap to a no-op succeeded. |
| */ |
| fault_code = -1; |
| remaining_faults = 0; |
| if (!(rights & PROT_EXEC)) |
| remaining_faults = 1; |
| |
| FAIL_IF(mprotect(insns, pgsize, rights) != 0); |
| asm volatile("mtctr %0; bctrl" : : "r"(insns)); |
| |
| FAIL_IF(remaining_faults != 0); |
| if (!(rights & PROT_EXEC)) |
| FAIL_IF(!is_fault_expected(fault_code)); |
| |
| return 0; |
| } |
| |
| static int test(void) |
| { |
| struct sigaction segv_act, trap_act; |
| int i; |
| |
| /* Skip the test if the CPU doesn't support Radix */ |
| SKIP_IF(!have_hwcap2(PPC_FEATURE2_ARCH_3_00)); |
| |
| /* Check if pkeys are supported */ |
| pkeys_supported = pkeys_unsupported() == 0; |
| |
| /* Setup SIGSEGV handler */ |
| segv_act.sa_handler = 0; |
| segv_act.sa_sigaction = segv_handler; |
| FAIL_IF(sigprocmask(SIG_SETMASK, 0, &segv_act.sa_mask) != 0); |
| segv_act.sa_flags = SA_SIGINFO; |
| segv_act.sa_restorer = 0; |
| FAIL_IF(sigaction(SIGSEGV, &segv_act, NULL) != 0); |
| |
| /* Setup SIGTRAP handler */ |
| trap_act.sa_handler = 0; |
| trap_act.sa_sigaction = trap_handler; |
| FAIL_IF(sigprocmask(SIG_SETMASK, 0, &trap_act.sa_mask) != 0); |
| trap_act.sa_flags = SA_SIGINFO; |
| trap_act.sa_restorer = 0; |
| FAIL_IF(sigaction(SIGTRAP, &trap_act, NULL) != 0); |
| |
| /* Setup executable region */ |
| pgsize = getpagesize(); |
| numinsns = pgsize / sizeof(unsigned int); |
| insns = (unsigned int *)mmap(NULL, pgsize, PROT_READ | PROT_WRITE, |
| MAP_PRIVATE | MAP_ANONYMOUS, -1, 0); |
| FAIL_IF(insns == MAP_FAILED); |
| |
| /* Write the instruction words */ |
| for (i = 1; i < numinsns - 1; i++) |
| insns[i] = PPC_INST_NOP; |
| |
| /* |
| * Set the first instruction as an unconditional trap. If |
| * the last write to this address succeeds, this should |
| * get overwritten by a no-op. |
| */ |
| insns[0] = PPC_INST_TRAP; |
| |
| /* |
| * Later, to jump to the executable region, we use a branch |
| * and link instruction (bctrl) which sets the return address |
| * automatically in LR. Use that to return back. |
| */ |
| insns[numinsns - 1] = PPC_INST_BLR; |
| |
| /* |
| * Pick the first instruction's address from the executable |
| * region. |
| */ |
| fault_addr = insns; |
| |
| /* |
| * Read an instruction word from the address when the page |
| * is execute only. This should generate an access fault. |
| */ |
| fault_code = -1; |
| remaining_faults = 1; |
| printf("Testing read on --x, should fault..."); |
| FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0); |
| i = *fault_addr; |
| FAIL_IF(remaining_faults != 0 || !is_fault_expected(fault_code)); |
| printf("ok!\n"); |
| |
| /* |
| * Write an instruction word to the address when the page |
| * execute only. This should also generate an access fault. |
| */ |
| fault_code = -1; |
| remaining_faults = 1; |
| printf("Testing write on --x, should fault..."); |
| FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0); |
| *fault_addr = PPC_INST_NOP; |
| FAIL_IF(remaining_faults != 0 || !is_fault_expected(fault_code)); |
| printf("ok!\n"); |
| |
| printf("Testing exec on ---, should fault..."); |
| FAIL_IF(check_exec_fault(PROT_NONE)); |
| printf("ok!\n"); |
| |
| printf("Testing exec on r--, should fault..."); |
| FAIL_IF(check_exec_fault(PROT_READ)); |
| printf("ok!\n"); |
| |
| printf("Testing exec on -w-, should fault..."); |
| FAIL_IF(check_exec_fault(PROT_WRITE)); |
| printf("ok!\n"); |
| |
| printf("Testing exec on rw-, should fault..."); |
| FAIL_IF(check_exec_fault(PROT_READ | PROT_WRITE)); |
| printf("ok!\n"); |
| |
| printf("Testing exec on --x, should succeed..."); |
| FAIL_IF(check_exec_fault(PROT_EXEC)); |
| printf("ok!\n"); |
| |
| printf("Testing exec on r-x, should succeed..."); |
| FAIL_IF(check_exec_fault(PROT_READ | PROT_EXEC)); |
| printf("ok!\n"); |
| |
| printf("Testing exec on -wx, should succeed..."); |
| FAIL_IF(check_exec_fault(PROT_WRITE | PROT_EXEC)); |
| printf("ok!\n"); |
| |
| printf("Testing exec on rwx, should succeed..."); |
| FAIL_IF(check_exec_fault(PROT_READ | PROT_WRITE | PROT_EXEC)); |
| printf("ok!\n"); |
| |
| /* Cleanup */ |
| FAIL_IF(munmap((void *)insns, pgsize)); |
| |
| return 0; |
| } |
| |
| int main(void) |
| { |
| return test_harness(test, "exec_prot"); |
| } |