// SPDX-License-Identifier: GPL-2.0 /* * Copyright 2022, Nicholas Miehlbradt, IBM Corporation * based on pkey_exec_prot.c * * Test if applying execute protection on pages works as expected. */ #define _GNU_SOURCE #include #include #include #include #include #include #include "pkeys.h" #define PPC_INST_NOP 0x60000000 #define PPC_INST_TRAP 0x7fe00008 #define PPC_INST_BLR 0x4e800020 static volatile sig_atomic_t fault_code; static volatile sig_atomic_t remaining_faults; static volatile unsigned int *fault_addr; static unsigned long pgsize, numinsns; static unsigned int *insns; static bool pkeys_supported; static bool is_fault_expected(int fault_code) { if (fault_code == SEGV_ACCERR) return true; /* Assume any pkey error is fine since pkey_exec_prot test covers them */ if (fault_code == SEGV_PKUERR && pkeys_supported) return true; return false; } static void trap_handler(int signum, siginfo_t *sinfo, void *ctx) { /* Check if this fault originated from the expected address */ if (sinfo->si_addr != (void *)fault_addr) sigsafe_err("got a fault for an unexpected address\n"); _exit(1); } static void segv_handler(int signum, siginfo_t *sinfo, void *ctx) { fault_code = sinfo->si_code; /* Check if this fault originated from the expected address */ if (sinfo->si_addr != (void *)fault_addr) { sigsafe_err("got a fault for an unexpected address\n"); _exit(1); } /* Check if too many faults have occurred for a single test case */ if (!remaining_faults) { sigsafe_err("got too many faults for the same address\n"); _exit(1); } /* Restore permissions in order to continue */ if (is_fault_expected(fault_code)) { if (mprotect(insns, pgsize, PROT_READ | PROT_WRITE | PROT_EXEC)) { sigsafe_err("failed to set access permissions\n"); _exit(1); } } else { sigsafe_err("got a fault with an unexpected code\n"); _exit(1); } remaining_faults--; } static int check_exec_fault(int rights) { /* * Jump to the executable region. * * The first iteration also checks if the overwrite of the * first instruction word from a trap to a no-op succeeded. */ fault_code = -1; remaining_faults = 0; if (!(rights & PROT_EXEC)) remaining_faults = 1; FAIL_IF(mprotect(insns, pgsize, rights) != 0); asm volatile("mtctr %0; bctrl" : : "r"(insns)); FAIL_IF(remaining_faults != 0); if (!(rights & PROT_EXEC)) FAIL_IF(!is_fault_expected(fault_code)); return 0; } static int test(void) { struct sigaction segv_act, trap_act; int i; /* Skip the test if the CPU doesn't support Radix */ SKIP_IF(!have_hwcap2(PPC_FEATURE2_ARCH_3_00)); /* Check if pkeys are supported */ pkeys_supported = pkeys_unsupported() == 0; /* Setup SIGSEGV handler */ segv_act.sa_handler = 0; segv_act.sa_sigaction = segv_handler; FAIL_IF(sigprocmask(SIG_SETMASK, 0, &segv_act.sa_mask) != 0); segv_act.sa_flags = SA_SIGINFO; segv_act.sa_restorer = 0; FAIL_IF(sigaction(SIGSEGV, &segv_act, NULL) != 0); /* Setup SIGTRAP handler */ trap_act.sa_handler = 0; trap_act.sa_sigaction = trap_handler; FAIL_IF(sigprocmask(SIG_SETMASK, 0, &trap_act.sa_mask) != 0); trap_act.sa_flags = SA_SIGINFO; trap_act.sa_restorer = 0; FAIL_IF(sigaction(SIGTRAP, &trap_act, NULL) != 0); /* Setup executable region */ pgsize = getpagesize(); numinsns = pgsize / sizeof(unsigned int); insns = (unsigned int *)mmap(NULL, pgsize, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0); FAIL_IF(insns == MAP_FAILED); /* Write the instruction words */ for (i = 1; i < numinsns - 1; i++) insns[i] = PPC_INST_NOP; /* * Set the first instruction as an unconditional trap. If * the last write to this address succeeds, this should * get overwritten by a no-op. */ insns[0] = PPC_INST_TRAP; /* * Later, to jump to the executable region, we use a branch * and link instruction (bctrl) which sets the return address * automatically in LR. Use that to return back. */ insns[numinsns - 1] = PPC_INST_BLR; /* * Pick the first instruction's address from the executable * region. */ fault_addr = insns; /* * Read an instruction word from the address when the page * is execute only. This should generate an access fault. */ fault_code = -1; remaining_faults = 1; printf("Testing read on --x, should fault..."); FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0); i = *fault_addr; FAIL_IF(remaining_faults != 0 || !is_fault_expected(fault_code)); printf("ok!\n"); /* * Write an instruction word to the address when the page * execute only. This should also generate an access fault. */ fault_code = -1; remaining_faults = 1; printf("Testing write on --x, should fault..."); FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0); *fault_addr = PPC_INST_NOP; FAIL_IF(remaining_faults != 0 || !is_fault_expected(fault_code)); printf("ok!\n"); printf("Testing exec on ---, should fault..."); FAIL_IF(check_exec_fault(PROT_NONE)); printf("ok!\n"); printf("Testing exec on r--, should fault..."); FAIL_IF(check_exec_fault(PROT_READ)); printf("ok!\n"); printf("Testing exec on -w-, should fault..."); FAIL_IF(check_exec_fault(PROT_WRITE)); printf("ok!\n"); printf("Testing exec on rw-, should fault..."); FAIL_IF(check_exec_fault(PROT_READ | PROT_WRITE)); printf("ok!\n"); printf("Testing exec on --x, should succeed..."); FAIL_IF(check_exec_fault(PROT_EXEC)); printf("ok!\n"); printf("Testing exec on r-x, should succeed..."); FAIL_IF(check_exec_fault(PROT_READ | PROT_EXEC)); printf("ok!\n"); printf("Testing exec on -wx, should succeed..."); FAIL_IF(check_exec_fault(PROT_WRITE | PROT_EXEC)); printf("ok!\n"); printf("Testing exec on rwx, should succeed..."); FAIL_IF(check_exec_fault(PROT_READ | PROT_WRITE | PROT_EXEC)); printf("ok!\n"); /* Cleanup */ FAIL_IF(munmap((void *)insns, pgsize)); return 0; } int main(void) { return test_harness(test, "exec_prot"); }