~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/tools/testing/selftests/powerpc/mm/exec_prot.c

Version: ~ [ linux-6.11.5 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.58 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.114 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.169 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.228 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.284 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.322 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 // SPDX-License-Identifier: GPL-2.0
  2 
  3 /*
  4  * Copyright 2022, Nicholas Miehlbradt, IBM Corporation
  5  * based on pkey_exec_prot.c
  6  *
  7  * Test if applying execute protection on pages works as expected.
  8  */
  9 
 10 #define _GNU_SOURCE
 11 #include <stdio.h>
 12 #include <stdlib.h>
 13 #include <string.h>
 14 #include <signal.h>
 15 
 16 #include <unistd.h>
 17 #include <sys/mman.h>
 18 
 19 #include "pkeys.h"
 20 
 21 
 22 #define PPC_INST_NOP    0x60000000
 23 #define PPC_INST_TRAP   0x7fe00008
 24 #define PPC_INST_BLR    0x4e800020
 25 
 26 static volatile sig_atomic_t fault_code;
 27 static volatile sig_atomic_t remaining_faults;
 28 static volatile unsigned int *fault_addr;
 29 static unsigned long pgsize, numinsns;
 30 static unsigned int *insns;
 31 static bool pkeys_supported;
 32 
 33 static bool is_fault_expected(int fault_code)
 34 {
 35         if (fault_code == SEGV_ACCERR)
 36                 return true;
 37 
 38         /* Assume any pkey error is fine since pkey_exec_prot test covers them */
 39         if (fault_code == SEGV_PKUERR && pkeys_supported)
 40                 return true;
 41 
 42         return false;
 43 }
 44 
 45 static void trap_handler(int signum, siginfo_t *sinfo, void *ctx)
 46 {
 47         /* Check if this fault originated from the expected address */
 48         if (sinfo->si_addr != (void *)fault_addr)
 49                 sigsafe_err("got a fault for an unexpected address\n");
 50 
 51         _exit(1);
 52 }
 53 
 54 static void segv_handler(int signum, siginfo_t *sinfo, void *ctx)
 55 {
 56         fault_code = sinfo->si_code;
 57 
 58         /* Check if this fault originated from the expected address */
 59         if (sinfo->si_addr != (void *)fault_addr) {
 60                 sigsafe_err("got a fault for an unexpected address\n");
 61                 _exit(1);
 62         }
 63 
 64         /* Check if too many faults have occurred for a single test case */
 65         if (!remaining_faults) {
 66                 sigsafe_err("got too many faults for the same address\n");
 67                 _exit(1);
 68         }
 69 
 70 
 71         /* Restore permissions in order to continue */
 72         if (is_fault_expected(fault_code)) {
 73                 if (mprotect(insns, pgsize, PROT_READ | PROT_WRITE | PROT_EXEC)) {
 74                         sigsafe_err("failed to set access permissions\n");
 75                         _exit(1);
 76                 }
 77         } else {
 78                 sigsafe_err("got a fault with an unexpected code\n");
 79                 _exit(1);
 80         }
 81 
 82         remaining_faults--;
 83 }
 84 
 85 static int check_exec_fault(int rights)
 86 {
 87         /*
 88          * Jump to the executable region.
 89          *
 90          * The first iteration also checks if the overwrite of the
 91          * first instruction word from a trap to a no-op succeeded.
 92          */
 93         fault_code = -1;
 94         remaining_faults = 0;
 95         if (!(rights & PROT_EXEC))
 96                 remaining_faults = 1;
 97 
 98         FAIL_IF(mprotect(insns, pgsize, rights) != 0);
 99         asm volatile("mtctr     %0; bctrl" : : "r"(insns));
100 
101         FAIL_IF(remaining_faults != 0);
102         if (!(rights & PROT_EXEC))
103                 FAIL_IF(!is_fault_expected(fault_code));
104 
105         return 0;
106 }
107 
108 static int test(void)
109 {
110         struct sigaction segv_act, trap_act;
111         int i;
112 
113         /* Skip the test if the CPU doesn't support Radix */
114         SKIP_IF(!have_hwcap2(PPC_FEATURE2_ARCH_3_00));
115 
116         /* Check if pkeys are supported */
117         pkeys_supported = pkeys_unsupported() == 0;
118 
119         /* Setup SIGSEGV handler */
120         segv_act.sa_handler = 0;
121         segv_act.sa_sigaction = segv_handler;
122         FAIL_IF(sigprocmask(SIG_SETMASK, 0, &segv_act.sa_mask) != 0);
123         segv_act.sa_flags = SA_SIGINFO;
124         segv_act.sa_restorer = 0;
125         FAIL_IF(sigaction(SIGSEGV, &segv_act, NULL) != 0);
126 
127         /* Setup SIGTRAP handler */
128         trap_act.sa_handler = 0;
129         trap_act.sa_sigaction = trap_handler;
130         FAIL_IF(sigprocmask(SIG_SETMASK, 0, &trap_act.sa_mask) != 0);
131         trap_act.sa_flags = SA_SIGINFO;
132         trap_act.sa_restorer = 0;
133         FAIL_IF(sigaction(SIGTRAP, &trap_act, NULL) != 0);
134 
135         /* Setup executable region */
136         pgsize = getpagesize();
137         numinsns = pgsize / sizeof(unsigned int);
138         insns = (unsigned int *)mmap(NULL, pgsize, PROT_READ | PROT_WRITE,
139                                       MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
140         FAIL_IF(insns == MAP_FAILED);
141 
142         /* Write the instruction words */
143         for (i = 1; i < numinsns - 1; i++)
144                 insns[i] = PPC_INST_NOP;
145 
146         /*
147          * Set the first instruction as an unconditional trap. If
148          * the last write to this address succeeds, this should
149          * get overwritten by a no-op.
150          */
151         insns[0] = PPC_INST_TRAP;
152 
153         /*
154          * Later, to jump to the executable region, we use a branch
155          * and link instruction (bctrl) which sets the return address
156          * automatically in LR. Use that to return back.
157          */
158         insns[numinsns - 1] = PPC_INST_BLR;
159 
160         /*
161          * Pick the first instruction's address from the executable
162          * region.
163          */
164         fault_addr = insns;
165 
166         /*
167          * Read an instruction word from the address when the page
168          * is execute only. This should generate an access fault.
169          */
170         fault_code = -1;
171         remaining_faults = 1;
172         printf("Testing read on --x, should fault...");
173         FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0);
174         i = *fault_addr;
175         FAIL_IF(remaining_faults != 0 || !is_fault_expected(fault_code));
176         printf("ok!\n");
177 
178         /*
179          * Write an instruction word to the address when the page
180          * execute only. This should also generate an access fault.
181          */
182         fault_code = -1;
183         remaining_faults = 1;
184         printf("Testing write on --x, should fault...");
185         FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0);
186         *fault_addr = PPC_INST_NOP;
187         FAIL_IF(remaining_faults != 0 || !is_fault_expected(fault_code));
188         printf("ok!\n");
189 
190         printf("Testing exec on ---, should fault...");
191         FAIL_IF(check_exec_fault(PROT_NONE));
192         printf("ok!\n");
193 
194         printf("Testing exec on r--, should fault...");
195         FAIL_IF(check_exec_fault(PROT_READ));
196         printf("ok!\n");
197 
198         printf("Testing exec on -w-, should fault...");
199         FAIL_IF(check_exec_fault(PROT_WRITE));
200         printf("ok!\n");
201 
202         printf("Testing exec on rw-, should fault...");
203         FAIL_IF(check_exec_fault(PROT_READ | PROT_WRITE));
204         printf("ok!\n");
205 
206         printf("Testing exec on --x, should succeed...");
207         FAIL_IF(check_exec_fault(PROT_EXEC));
208         printf("ok!\n");
209 
210         printf("Testing exec on r-x, should succeed...");
211         FAIL_IF(check_exec_fault(PROT_READ | PROT_EXEC));
212         printf("ok!\n");
213 
214         printf("Testing exec on -wx, should succeed...");
215         FAIL_IF(check_exec_fault(PROT_WRITE | PROT_EXEC));
216         printf("ok!\n");
217 
218         printf("Testing exec on rwx, should succeed...");
219         FAIL_IF(check_exec_fault(PROT_READ | PROT_WRITE | PROT_EXEC));
220         printf("ok!\n");
221 
222         /* Cleanup */
223         FAIL_IF(munmap((void *)insns, pgsize));
224 
225         return 0;
226 }
227 
228 int main(void)
229 {
230         return test_harness(test, "exec_prot");
231 }
232 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php