162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci 362306a36Sopenharmony_ci/* 462306a36Sopenharmony_ci * Copyright 2022, Nicholas Miehlbradt, IBM Corporation 562306a36Sopenharmony_ci * based on pkey_exec_prot.c 662306a36Sopenharmony_ci * 762306a36Sopenharmony_ci * Test if applying execute protection on pages works as expected. 862306a36Sopenharmony_ci */ 962306a36Sopenharmony_ci 1062306a36Sopenharmony_ci#define _GNU_SOURCE 1162306a36Sopenharmony_ci#include <stdio.h> 1262306a36Sopenharmony_ci#include <stdlib.h> 1362306a36Sopenharmony_ci#include <string.h> 1462306a36Sopenharmony_ci#include <signal.h> 1562306a36Sopenharmony_ci 1662306a36Sopenharmony_ci#include <unistd.h> 1762306a36Sopenharmony_ci#include <sys/mman.h> 1862306a36Sopenharmony_ci 1962306a36Sopenharmony_ci#include "pkeys.h" 2062306a36Sopenharmony_ci 2162306a36Sopenharmony_ci 2262306a36Sopenharmony_ci#define PPC_INST_NOP 0x60000000 2362306a36Sopenharmony_ci#define PPC_INST_TRAP 0x7fe00008 2462306a36Sopenharmony_ci#define PPC_INST_BLR 0x4e800020 2562306a36Sopenharmony_ci 2662306a36Sopenharmony_cistatic volatile sig_atomic_t fault_code; 2762306a36Sopenharmony_cistatic volatile sig_atomic_t remaining_faults; 2862306a36Sopenharmony_cistatic volatile unsigned int *fault_addr; 2962306a36Sopenharmony_cistatic unsigned long pgsize, numinsns; 3062306a36Sopenharmony_cistatic unsigned int *insns; 3162306a36Sopenharmony_cistatic bool pkeys_supported; 3262306a36Sopenharmony_ci 3362306a36Sopenharmony_cistatic bool is_fault_expected(int fault_code) 3462306a36Sopenharmony_ci{ 3562306a36Sopenharmony_ci if (fault_code == SEGV_ACCERR) 3662306a36Sopenharmony_ci return true; 3762306a36Sopenharmony_ci 3862306a36Sopenharmony_ci /* Assume any pkey error is fine since pkey_exec_prot test covers them */ 3962306a36Sopenharmony_ci if (fault_code == SEGV_PKUERR && pkeys_supported) 4062306a36Sopenharmony_ci return true; 4162306a36Sopenharmony_ci 4262306a36Sopenharmony_ci return false; 4362306a36Sopenharmony_ci} 4462306a36Sopenharmony_ci 4562306a36Sopenharmony_cistatic void trap_handler(int signum, siginfo_t *sinfo, void *ctx) 4662306a36Sopenharmony_ci{ 4762306a36Sopenharmony_ci /* Check if this fault originated from the expected address */ 4862306a36Sopenharmony_ci if (sinfo->si_addr != (void *)fault_addr) 4962306a36Sopenharmony_ci sigsafe_err("got a fault for an unexpected address\n"); 5062306a36Sopenharmony_ci 5162306a36Sopenharmony_ci _exit(1); 5262306a36Sopenharmony_ci} 5362306a36Sopenharmony_ci 5462306a36Sopenharmony_cistatic void segv_handler(int signum, siginfo_t *sinfo, void *ctx) 5562306a36Sopenharmony_ci{ 5662306a36Sopenharmony_ci fault_code = sinfo->si_code; 5762306a36Sopenharmony_ci 5862306a36Sopenharmony_ci /* Check if this fault originated from the expected address */ 5962306a36Sopenharmony_ci if (sinfo->si_addr != (void *)fault_addr) { 6062306a36Sopenharmony_ci sigsafe_err("got a fault for an unexpected address\n"); 6162306a36Sopenharmony_ci _exit(1); 6262306a36Sopenharmony_ci } 6362306a36Sopenharmony_ci 6462306a36Sopenharmony_ci /* Check if too many faults have occurred for a single test case */ 6562306a36Sopenharmony_ci if (!remaining_faults) { 6662306a36Sopenharmony_ci sigsafe_err("got too many faults for the same address\n"); 6762306a36Sopenharmony_ci _exit(1); 6862306a36Sopenharmony_ci } 6962306a36Sopenharmony_ci 7062306a36Sopenharmony_ci 7162306a36Sopenharmony_ci /* Restore permissions in order to continue */ 7262306a36Sopenharmony_ci if (is_fault_expected(fault_code)) { 7362306a36Sopenharmony_ci if (mprotect(insns, pgsize, PROT_READ | PROT_WRITE | PROT_EXEC)) { 7462306a36Sopenharmony_ci sigsafe_err("failed to set access permissions\n"); 7562306a36Sopenharmony_ci _exit(1); 7662306a36Sopenharmony_ci } 7762306a36Sopenharmony_ci } else { 7862306a36Sopenharmony_ci sigsafe_err("got a fault with an unexpected code\n"); 7962306a36Sopenharmony_ci _exit(1); 8062306a36Sopenharmony_ci } 8162306a36Sopenharmony_ci 8262306a36Sopenharmony_ci remaining_faults--; 8362306a36Sopenharmony_ci} 8462306a36Sopenharmony_ci 8562306a36Sopenharmony_cistatic int check_exec_fault(int rights) 8662306a36Sopenharmony_ci{ 8762306a36Sopenharmony_ci /* 8862306a36Sopenharmony_ci * Jump to the executable region. 8962306a36Sopenharmony_ci * 9062306a36Sopenharmony_ci * The first iteration also checks if the overwrite of the 9162306a36Sopenharmony_ci * first instruction word from a trap to a no-op succeeded. 9262306a36Sopenharmony_ci */ 9362306a36Sopenharmony_ci fault_code = -1; 9462306a36Sopenharmony_ci remaining_faults = 0; 9562306a36Sopenharmony_ci if (!(rights & PROT_EXEC)) 9662306a36Sopenharmony_ci remaining_faults = 1; 9762306a36Sopenharmony_ci 9862306a36Sopenharmony_ci FAIL_IF(mprotect(insns, pgsize, rights) != 0); 9962306a36Sopenharmony_ci asm volatile("mtctr %0; bctrl" : : "r"(insns)); 10062306a36Sopenharmony_ci 10162306a36Sopenharmony_ci FAIL_IF(remaining_faults != 0); 10262306a36Sopenharmony_ci if (!(rights & PROT_EXEC)) 10362306a36Sopenharmony_ci FAIL_IF(!is_fault_expected(fault_code)); 10462306a36Sopenharmony_ci 10562306a36Sopenharmony_ci return 0; 10662306a36Sopenharmony_ci} 10762306a36Sopenharmony_ci 10862306a36Sopenharmony_cistatic int test(void) 10962306a36Sopenharmony_ci{ 11062306a36Sopenharmony_ci struct sigaction segv_act, trap_act; 11162306a36Sopenharmony_ci int i; 11262306a36Sopenharmony_ci 11362306a36Sopenharmony_ci /* Skip the test if the CPU doesn't support Radix */ 11462306a36Sopenharmony_ci SKIP_IF(!have_hwcap2(PPC_FEATURE2_ARCH_3_00)); 11562306a36Sopenharmony_ci 11662306a36Sopenharmony_ci /* Check if pkeys are supported */ 11762306a36Sopenharmony_ci pkeys_supported = pkeys_unsupported() == 0; 11862306a36Sopenharmony_ci 11962306a36Sopenharmony_ci /* Setup SIGSEGV handler */ 12062306a36Sopenharmony_ci segv_act.sa_handler = 0; 12162306a36Sopenharmony_ci segv_act.sa_sigaction = segv_handler; 12262306a36Sopenharmony_ci FAIL_IF(sigprocmask(SIG_SETMASK, 0, &segv_act.sa_mask) != 0); 12362306a36Sopenharmony_ci segv_act.sa_flags = SA_SIGINFO; 12462306a36Sopenharmony_ci segv_act.sa_restorer = 0; 12562306a36Sopenharmony_ci FAIL_IF(sigaction(SIGSEGV, &segv_act, NULL) != 0); 12662306a36Sopenharmony_ci 12762306a36Sopenharmony_ci /* Setup SIGTRAP handler */ 12862306a36Sopenharmony_ci trap_act.sa_handler = 0; 12962306a36Sopenharmony_ci trap_act.sa_sigaction = trap_handler; 13062306a36Sopenharmony_ci FAIL_IF(sigprocmask(SIG_SETMASK, 0, &trap_act.sa_mask) != 0); 13162306a36Sopenharmony_ci trap_act.sa_flags = SA_SIGINFO; 13262306a36Sopenharmony_ci trap_act.sa_restorer = 0; 13362306a36Sopenharmony_ci FAIL_IF(sigaction(SIGTRAP, &trap_act, NULL) != 0); 13462306a36Sopenharmony_ci 13562306a36Sopenharmony_ci /* Setup executable region */ 13662306a36Sopenharmony_ci pgsize = getpagesize(); 13762306a36Sopenharmony_ci numinsns = pgsize / sizeof(unsigned int); 13862306a36Sopenharmony_ci insns = (unsigned int *)mmap(NULL, pgsize, PROT_READ | PROT_WRITE, 13962306a36Sopenharmony_ci MAP_PRIVATE | MAP_ANONYMOUS, -1, 0); 14062306a36Sopenharmony_ci FAIL_IF(insns == MAP_FAILED); 14162306a36Sopenharmony_ci 14262306a36Sopenharmony_ci /* Write the instruction words */ 14362306a36Sopenharmony_ci for (i = 1; i < numinsns - 1; i++) 14462306a36Sopenharmony_ci insns[i] = PPC_INST_NOP; 14562306a36Sopenharmony_ci 14662306a36Sopenharmony_ci /* 14762306a36Sopenharmony_ci * Set the first instruction as an unconditional trap. If 14862306a36Sopenharmony_ci * the last write to this address succeeds, this should 14962306a36Sopenharmony_ci * get overwritten by a no-op. 15062306a36Sopenharmony_ci */ 15162306a36Sopenharmony_ci insns[0] = PPC_INST_TRAP; 15262306a36Sopenharmony_ci 15362306a36Sopenharmony_ci /* 15462306a36Sopenharmony_ci * Later, to jump to the executable region, we use a branch 15562306a36Sopenharmony_ci * and link instruction (bctrl) which sets the return address 15662306a36Sopenharmony_ci * automatically in LR. Use that to return back. 15762306a36Sopenharmony_ci */ 15862306a36Sopenharmony_ci insns[numinsns - 1] = PPC_INST_BLR; 15962306a36Sopenharmony_ci 16062306a36Sopenharmony_ci /* 16162306a36Sopenharmony_ci * Pick the first instruction's address from the executable 16262306a36Sopenharmony_ci * region. 16362306a36Sopenharmony_ci */ 16462306a36Sopenharmony_ci fault_addr = insns; 16562306a36Sopenharmony_ci 16662306a36Sopenharmony_ci /* 16762306a36Sopenharmony_ci * Read an instruction word from the address when the page 16862306a36Sopenharmony_ci * is execute only. This should generate an access fault. 16962306a36Sopenharmony_ci */ 17062306a36Sopenharmony_ci fault_code = -1; 17162306a36Sopenharmony_ci remaining_faults = 1; 17262306a36Sopenharmony_ci printf("Testing read on --x, should fault..."); 17362306a36Sopenharmony_ci FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0); 17462306a36Sopenharmony_ci i = *fault_addr; 17562306a36Sopenharmony_ci FAIL_IF(remaining_faults != 0 || !is_fault_expected(fault_code)); 17662306a36Sopenharmony_ci printf("ok!\n"); 17762306a36Sopenharmony_ci 17862306a36Sopenharmony_ci /* 17962306a36Sopenharmony_ci * Write an instruction word to the address when the page 18062306a36Sopenharmony_ci * execute only. This should also generate an access fault. 18162306a36Sopenharmony_ci */ 18262306a36Sopenharmony_ci fault_code = -1; 18362306a36Sopenharmony_ci remaining_faults = 1; 18462306a36Sopenharmony_ci printf("Testing write on --x, should fault..."); 18562306a36Sopenharmony_ci FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0); 18662306a36Sopenharmony_ci *fault_addr = PPC_INST_NOP; 18762306a36Sopenharmony_ci FAIL_IF(remaining_faults != 0 || !is_fault_expected(fault_code)); 18862306a36Sopenharmony_ci printf("ok!\n"); 18962306a36Sopenharmony_ci 19062306a36Sopenharmony_ci printf("Testing exec on ---, should fault..."); 19162306a36Sopenharmony_ci FAIL_IF(check_exec_fault(PROT_NONE)); 19262306a36Sopenharmony_ci printf("ok!\n"); 19362306a36Sopenharmony_ci 19462306a36Sopenharmony_ci printf("Testing exec on r--, should fault..."); 19562306a36Sopenharmony_ci FAIL_IF(check_exec_fault(PROT_READ)); 19662306a36Sopenharmony_ci printf("ok!\n"); 19762306a36Sopenharmony_ci 19862306a36Sopenharmony_ci printf("Testing exec on -w-, should fault..."); 19962306a36Sopenharmony_ci FAIL_IF(check_exec_fault(PROT_WRITE)); 20062306a36Sopenharmony_ci printf("ok!\n"); 20162306a36Sopenharmony_ci 20262306a36Sopenharmony_ci printf("Testing exec on rw-, should fault..."); 20362306a36Sopenharmony_ci FAIL_IF(check_exec_fault(PROT_READ | PROT_WRITE)); 20462306a36Sopenharmony_ci printf("ok!\n"); 20562306a36Sopenharmony_ci 20662306a36Sopenharmony_ci printf("Testing exec on --x, should succeed..."); 20762306a36Sopenharmony_ci FAIL_IF(check_exec_fault(PROT_EXEC)); 20862306a36Sopenharmony_ci printf("ok!\n"); 20962306a36Sopenharmony_ci 21062306a36Sopenharmony_ci printf("Testing exec on r-x, should succeed..."); 21162306a36Sopenharmony_ci FAIL_IF(check_exec_fault(PROT_READ | PROT_EXEC)); 21262306a36Sopenharmony_ci printf("ok!\n"); 21362306a36Sopenharmony_ci 21462306a36Sopenharmony_ci printf("Testing exec on -wx, should succeed..."); 21562306a36Sopenharmony_ci FAIL_IF(check_exec_fault(PROT_WRITE | PROT_EXEC)); 21662306a36Sopenharmony_ci printf("ok!\n"); 21762306a36Sopenharmony_ci 21862306a36Sopenharmony_ci printf("Testing exec on rwx, should succeed..."); 21962306a36Sopenharmony_ci FAIL_IF(check_exec_fault(PROT_READ | PROT_WRITE | PROT_EXEC)); 22062306a36Sopenharmony_ci printf("ok!\n"); 22162306a36Sopenharmony_ci 22262306a36Sopenharmony_ci /* Cleanup */ 22362306a36Sopenharmony_ci FAIL_IF(munmap((void *)insns, pgsize)); 22462306a36Sopenharmony_ci 22562306a36Sopenharmony_ci return 0; 22662306a36Sopenharmony_ci} 22762306a36Sopenharmony_ci 22862306a36Sopenharmony_ciint main(void) 22962306a36Sopenharmony_ci{ 23062306a36Sopenharmony_ci return test_harness(test, "exec_prot"); 23162306a36Sopenharmony_ci} 232