162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
262306a36Sopenharmony_ci
362306a36Sopenharmony_ci/*
462306a36Sopenharmony_ci * Copyright 2022, Nicholas Miehlbradt, IBM Corporation
562306a36Sopenharmony_ci * based on pkey_exec_prot.c
662306a36Sopenharmony_ci *
762306a36Sopenharmony_ci * Test if applying execute protection on pages works as expected.
862306a36Sopenharmony_ci */
962306a36Sopenharmony_ci
1062306a36Sopenharmony_ci#define _GNU_SOURCE
1162306a36Sopenharmony_ci#include <stdio.h>
1262306a36Sopenharmony_ci#include <stdlib.h>
1362306a36Sopenharmony_ci#include <string.h>
1462306a36Sopenharmony_ci#include <signal.h>
1562306a36Sopenharmony_ci
1662306a36Sopenharmony_ci#include <unistd.h>
1762306a36Sopenharmony_ci#include <sys/mman.h>
1862306a36Sopenharmony_ci
1962306a36Sopenharmony_ci#include "pkeys.h"
2062306a36Sopenharmony_ci
2162306a36Sopenharmony_ci
2262306a36Sopenharmony_ci#define PPC_INST_NOP	0x60000000
2362306a36Sopenharmony_ci#define PPC_INST_TRAP	0x7fe00008
2462306a36Sopenharmony_ci#define PPC_INST_BLR	0x4e800020
2562306a36Sopenharmony_ci
2662306a36Sopenharmony_cistatic volatile sig_atomic_t fault_code;
2762306a36Sopenharmony_cistatic volatile sig_atomic_t remaining_faults;
2862306a36Sopenharmony_cistatic volatile unsigned int *fault_addr;
2962306a36Sopenharmony_cistatic unsigned long pgsize, numinsns;
3062306a36Sopenharmony_cistatic unsigned int *insns;
3162306a36Sopenharmony_cistatic bool pkeys_supported;
3262306a36Sopenharmony_ci
3362306a36Sopenharmony_cistatic bool is_fault_expected(int fault_code)
3462306a36Sopenharmony_ci{
3562306a36Sopenharmony_ci	if (fault_code == SEGV_ACCERR)
3662306a36Sopenharmony_ci		return true;
3762306a36Sopenharmony_ci
3862306a36Sopenharmony_ci	/* Assume any pkey error is fine since pkey_exec_prot test covers them */
3962306a36Sopenharmony_ci	if (fault_code == SEGV_PKUERR && pkeys_supported)
4062306a36Sopenharmony_ci		return true;
4162306a36Sopenharmony_ci
4262306a36Sopenharmony_ci	return false;
4362306a36Sopenharmony_ci}
4462306a36Sopenharmony_ci
4562306a36Sopenharmony_cistatic void trap_handler(int signum, siginfo_t *sinfo, void *ctx)
4662306a36Sopenharmony_ci{
4762306a36Sopenharmony_ci	/* Check if this fault originated from the expected address */
4862306a36Sopenharmony_ci	if (sinfo->si_addr != (void *)fault_addr)
4962306a36Sopenharmony_ci		sigsafe_err("got a fault for an unexpected address\n");
5062306a36Sopenharmony_ci
5162306a36Sopenharmony_ci	_exit(1);
5262306a36Sopenharmony_ci}
5362306a36Sopenharmony_ci
5462306a36Sopenharmony_cistatic void segv_handler(int signum, siginfo_t *sinfo, void *ctx)
5562306a36Sopenharmony_ci{
5662306a36Sopenharmony_ci	fault_code = sinfo->si_code;
5762306a36Sopenharmony_ci
5862306a36Sopenharmony_ci	/* Check if this fault originated from the expected address */
5962306a36Sopenharmony_ci	if (sinfo->si_addr != (void *)fault_addr) {
6062306a36Sopenharmony_ci		sigsafe_err("got a fault for an unexpected address\n");
6162306a36Sopenharmony_ci		_exit(1);
6262306a36Sopenharmony_ci	}
6362306a36Sopenharmony_ci
6462306a36Sopenharmony_ci	/* Check if too many faults have occurred for a single test case */
6562306a36Sopenharmony_ci	if (!remaining_faults) {
6662306a36Sopenharmony_ci		sigsafe_err("got too many faults for the same address\n");
6762306a36Sopenharmony_ci		_exit(1);
6862306a36Sopenharmony_ci	}
6962306a36Sopenharmony_ci
7062306a36Sopenharmony_ci
7162306a36Sopenharmony_ci	/* Restore permissions in order to continue */
7262306a36Sopenharmony_ci	if (is_fault_expected(fault_code)) {
7362306a36Sopenharmony_ci		if (mprotect(insns, pgsize, PROT_READ | PROT_WRITE | PROT_EXEC)) {
7462306a36Sopenharmony_ci			sigsafe_err("failed to set access permissions\n");
7562306a36Sopenharmony_ci			_exit(1);
7662306a36Sopenharmony_ci		}
7762306a36Sopenharmony_ci	} else {
7862306a36Sopenharmony_ci		sigsafe_err("got a fault with an unexpected code\n");
7962306a36Sopenharmony_ci		_exit(1);
8062306a36Sopenharmony_ci	}
8162306a36Sopenharmony_ci
8262306a36Sopenharmony_ci	remaining_faults--;
8362306a36Sopenharmony_ci}
8462306a36Sopenharmony_ci
8562306a36Sopenharmony_cistatic int check_exec_fault(int rights)
8662306a36Sopenharmony_ci{
8762306a36Sopenharmony_ci	/*
8862306a36Sopenharmony_ci	 * Jump to the executable region.
8962306a36Sopenharmony_ci	 *
9062306a36Sopenharmony_ci	 * The first iteration also checks if the overwrite of the
9162306a36Sopenharmony_ci	 * first instruction word from a trap to a no-op succeeded.
9262306a36Sopenharmony_ci	 */
9362306a36Sopenharmony_ci	fault_code = -1;
9462306a36Sopenharmony_ci	remaining_faults = 0;
9562306a36Sopenharmony_ci	if (!(rights & PROT_EXEC))
9662306a36Sopenharmony_ci		remaining_faults = 1;
9762306a36Sopenharmony_ci
9862306a36Sopenharmony_ci	FAIL_IF(mprotect(insns, pgsize, rights) != 0);
9962306a36Sopenharmony_ci	asm volatile("mtctr	%0; bctrl" : : "r"(insns));
10062306a36Sopenharmony_ci
10162306a36Sopenharmony_ci	FAIL_IF(remaining_faults != 0);
10262306a36Sopenharmony_ci	if (!(rights & PROT_EXEC))
10362306a36Sopenharmony_ci		FAIL_IF(!is_fault_expected(fault_code));
10462306a36Sopenharmony_ci
10562306a36Sopenharmony_ci	return 0;
10662306a36Sopenharmony_ci}
10762306a36Sopenharmony_ci
10862306a36Sopenharmony_cistatic int test(void)
10962306a36Sopenharmony_ci{
11062306a36Sopenharmony_ci	struct sigaction segv_act, trap_act;
11162306a36Sopenharmony_ci	int i;
11262306a36Sopenharmony_ci
11362306a36Sopenharmony_ci	/* Skip the test if the CPU doesn't support Radix */
11462306a36Sopenharmony_ci	SKIP_IF(!have_hwcap2(PPC_FEATURE2_ARCH_3_00));
11562306a36Sopenharmony_ci
11662306a36Sopenharmony_ci	/* Check if pkeys are supported */
11762306a36Sopenharmony_ci	pkeys_supported = pkeys_unsupported() == 0;
11862306a36Sopenharmony_ci
11962306a36Sopenharmony_ci	/* Setup SIGSEGV handler */
12062306a36Sopenharmony_ci	segv_act.sa_handler = 0;
12162306a36Sopenharmony_ci	segv_act.sa_sigaction = segv_handler;
12262306a36Sopenharmony_ci	FAIL_IF(sigprocmask(SIG_SETMASK, 0, &segv_act.sa_mask) != 0);
12362306a36Sopenharmony_ci	segv_act.sa_flags = SA_SIGINFO;
12462306a36Sopenharmony_ci	segv_act.sa_restorer = 0;
12562306a36Sopenharmony_ci	FAIL_IF(sigaction(SIGSEGV, &segv_act, NULL) != 0);
12662306a36Sopenharmony_ci
12762306a36Sopenharmony_ci	/* Setup SIGTRAP handler */
12862306a36Sopenharmony_ci	trap_act.sa_handler = 0;
12962306a36Sopenharmony_ci	trap_act.sa_sigaction = trap_handler;
13062306a36Sopenharmony_ci	FAIL_IF(sigprocmask(SIG_SETMASK, 0, &trap_act.sa_mask) != 0);
13162306a36Sopenharmony_ci	trap_act.sa_flags = SA_SIGINFO;
13262306a36Sopenharmony_ci	trap_act.sa_restorer = 0;
13362306a36Sopenharmony_ci	FAIL_IF(sigaction(SIGTRAP, &trap_act, NULL) != 0);
13462306a36Sopenharmony_ci
13562306a36Sopenharmony_ci	/* Setup executable region */
13662306a36Sopenharmony_ci	pgsize = getpagesize();
13762306a36Sopenharmony_ci	numinsns = pgsize / sizeof(unsigned int);
13862306a36Sopenharmony_ci	insns = (unsigned int *)mmap(NULL, pgsize, PROT_READ | PROT_WRITE,
13962306a36Sopenharmony_ci				      MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
14062306a36Sopenharmony_ci	FAIL_IF(insns == MAP_FAILED);
14162306a36Sopenharmony_ci
14262306a36Sopenharmony_ci	/* Write the instruction words */
14362306a36Sopenharmony_ci	for (i = 1; i < numinsns - 1; i++)
14462306a36Sopenharmony_ci		insns[i] = PPC_INST_NOP;
14562306a36Sopenharmony_ci
14662306a36Sopenharmony_ci	/*
14762306a36Sopenharmony_ci	 * Set the first instruction as an unconditional trap. If
14862306a36Sopenharmony_ci	 * the last write to this address succeeds, this should
14962306a36Sopenharmony_ci	 * get overwritten by a no-op.
15062306a36Sopenharmony_ci	 */
15162306a36Sopenharmony_ci	insns[0] = PPC_INST_TRAP;
15262306a36Sopenharmony_ci
15362306a36Sopenharmony_ci	/*
15462306a36Sopenharmony_ci	 * Later, to jump to the executable region, we use a branch
15562306a36Sopenharmony_ci	 * and link instruction (bctrl) which sets the return address
15662306a36Sopenharmony_ci	 * automatically in LR. Use that to return back.
15762306a36Sopenharmony_ci	 */
15862306a36Sopenharmony_ci	insns[numinsns - 1] = PPC_INST_BLR;
15962306a36Sopenharmony_ci
16062306a36Sopenharmony_ci	/*
16162306a36Sopenharmony_ci	 * Pick the first instruction's address from the executable
16262306a36Sopenharmony_ci	 * region.
16362306a36Sopenharmony_ci	 */
16462306a36Sopenharmony_ci	fault_addr = insns;
16562306a36Sopenharmony_ci
16662306a36Sopenharmony_ci	/*
16762306a36Sopenharmony_ci	 * Read an instruction word from the address when the page
16862306a36Sopenharmony_ci	 * is execute only. This should generate an access fault.
16962306a36Sopenharmony_ci	 */
17062306a36Sopenharmony_ci	fault_code = -1;
17162306a36Sopenharmony_ci	remaining_faults = 1;
17262306a36Sopenharmony_ci	printf("Testing read on --x, should fault...");
17362306a36Sopenharmony_ci	FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0);
17462306a36Sopenharmony_ci	i = *fault_addr;
17562306a36Sopenharmony_ci	FAIL_IF(remaining_faults != 0 || !is_fault_expected(fault_code));
17662306a36Sopenharmony_ci	printf("ok!\n");
17762306a36Sopenharmony_ci
17862306a36Sopenharmony_ci	/*
17962306a36Sopenharmony_ci	 * Write an instruction word to the address when the page
18062306a36Sopenharmony_ci	 * execute only. This should also generate an access fault.
18162306a36Sopenharmony_ci	 */
18262306a36Sopenharmony_ci	fault_code = -1;
18362306a36Sopenharmony_ci	remaining_faults = 1;
18462306a36Sopenharmony_ci	printf("Testing write on --x, should fault...");
18562306a36Sopenharmony_ci	FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0);
18662306a36Sopenharmony_ci	*fault_addr = PPC_INST_NOP;
18762306a36Sopenharmony_ci	FAIL_IF(remaining_faults != 0 || !is_fault_expected(fault_code));
18862306a36Sopenharmony_ci	printf("ok!\n");
18962306a36Sopenharmony_ci
19062306a36Sopenharmony_ci	printf("Testing exec on ---, should fault...");
19162306a36Sopenharmony_ci	FAIL_IF(check_exec_fault(PROT_NONE));
19262306a36Sopenharmony_ci	printf("ok!\n");
19362306a36Sopenharmony_ci
19462306a36Sopenharmony_ci	printf("Testing exec on r--, should fault...");
19562306a36Sopenharmony_ci	FAIL_IF(check_exec_fault(PROT_READ));
19662306a36Sopenharmony_ci	printf("ok!\n");
19762306a36Sopenharmony_ci
19862306a36Sopenharmony_ci	printf("Testing exec on -w-, should fault...");
19962306a36Sopenharmony_ci	FAIL_IF(check_exec_fault(PROT_WRITE));
20062306a36Sopenharmony_ci	printf("ok!\n");
20162306a36Sopenharmony_ci
20262306a36Sopenharmony_ci	printf("Testing exec on rw-, should fault...");
20362306a36Sopenharmony_ci	FAIL_IF(check_exec_fault(PROT_READ | PROT_WRITE));
20462306a36Sopenharmony_ci	printf("ok!\n");
20562306a36Sopenharmony_ci
20662306a36Sopenharmony_ci	printf("Testing exec on --x, should succeed...");
20762306a36Sopenharmony_ci	FAIL_IF(check_exec_fault(PROT_EXEC));
20862306a36Sopenharmony_ci	printf("ok!\n");
20962306a36Sopenharmony_ci
21062306a36Sopenharmony_ci	printf("Testing exec on r-x, should succeed...");
21162306a36Sopenharmony_ci	FAIL_IF(check_exec_fault(PROT_READ | PROT_EXEC));
21262306a36Sopenharmony_ci	printf("ok!\n");
21362306a36Sopenharmony_ci
21462306a36Sopenharmony_ci	printf("Testing exec on -wx, should succeed...");
21562306a36Sopenharmony_ci	FAIL_IF(check_exec_fault(PROT_WRITE | PROT_EXEC));
21662306a36Sopenharmony_ci	printf("ok!\n");
21762306a36Sopenharmony_ci
21862306a36Sopenharmony_ci	printf("Testing exec on rwx, should succeed...");
21962306a36Sopenharmony_ci	FAIL_IF(check_exec_fault(PROT_READ | PROT_WRITE | PROT_EXEC));
22062306a36Sopenharmony_ci	printf("ok!\n");
22162306a36Sopenharmony_ci
22262306a36Sopenharmony_ci	/* Cleanup */
22362306a36Sopenharmony_ci	FAIL_IF(munmap((void *)insns, pgsize));
22462306a36Sopenharmony_ci
22562306a36Sopenharmony_ci	return 0;
22662306a36Sopenharmony_ci}
22762306a36Sopenharmony_ci
22862306a36Sopenharmony_ciint main(void)
22962306a36Sopenharmony_ci{
23062306a36Sopenharmony_ci	return test_harness(test, "exec_prot");
23162306a36Sopenharmony_ci}
232