1 // SPDX-License-Identifier: GPL-2.0+
2
3 /*
4 * Copyright 2020, Sandipan Das, IBM Corp.
5 *
6 * Test if applying execute protection on pages using memory
7 * protection keys works as expected.
8 */
9
10 #define _GNU_SOURCE
11 #include <stdio.h>
12 #include <stdlib.h>
13 #include <string.h>
14 #include <signal.h>
15
16 #include <unistd.h>
17
18 #include "pkeys.h"
19
20 #define PPC_INST_NOP 0x60000000
21 #define PPC_INST_TRAP 0x7fe00008
22 #define PPC_INST_BLR 0x4e800020
23
24 static volatile sig_atomic_t fault_pkey, fault_code, fault_type;
25 static volatile sig_atomic_t remaining_faults;
26 static volatile unsigned int *fault_addr;
27 static unsigned long pgsize, numinsns;
28 static unsigned int *insns;
29
trap_handler(int signum,siginfo_t * sinfo,void * ctx)30 static void trap_handler(int signum, siginfo_t *sinfo, void *ctx)
31 {
32 /* Check if this fault originated from the expected address */
33 if (sinfo->si_addr != (void *) fault_addr)
34 sigsafe_err("got a fault for an unexpected address\n");
35
36 _exit(1);
37 }
38
segv_handler(int signum,siginfo_t * sinfo,void * ctx)39 static void segv_handler(int signum, siginfo_t *sinfo, void *ctx)
40 {
41 int signal_pkey;
42
43 signal_pkey = siginfo_pkey(sinfo);
44 fault_code = sinfo->si_code;
45
46 /* Check if this fault originated from the expected address */
47 if (sinfo->si_addr != (void *) fault_addr) {
48 sigsafe_err("got a fault for an unexpected address\n");
49 _exit(1);
50 }
51
52 /* Check if too many faults have occurred for a single test case */
53 if (!remaining_faults) {
54 sigsafe_err("got too many faults for the same address\n");
55 _exit(1);
56 }
57
58
59 /* Restore permissions in order to continue */
60 switch (fault_code) {
61 case SEGV_ACCERR:
62 if (mprotect(insns, pgsize, PROT_READ | PROT_WRITE)) {
63 sigsafe_err("failed to set access permissions\n");
64 _exit(1);
65 }
66 break;
67 case SEGV_PKUERR:
68 if (signal_pkey != fault_pkey) {
69 sigsafe_err("got a fault for an unexpected pkey\n");
70 _exit(1);
71 }
72
73 switch (fault_type) {
74 case PKEY_DISABLE_ACCESS:
75 pkey_set_rights(fault_pkey, 0);
76 break;
77 case PKEY_DISABLE_EXECUTE:
78 /*
79 * Reassociate the exec-only pkey with the region
80 * to be able to continue. Unlike AMR, we cannot
81 * set IAMR directly from userspace to restore the
82 * permissions.
83 */
84 if (mprotect(insns, pgsize, PROT_EXEC)) {
85 sigsafe_err("failed to set execute permissions\n");
86 _exit(1);
87 }
88 break;
89 default:
90 sigsafe_err("got a fault with an unexpected type\n");
91 _exit(1);
92 }
93 break;
94 default:
95 sigsafe_err("got a fault with an unexpected code\n");
96 _exit(1);
97 }
98
99 remaining_faults--;
100 }
101
test(void)102 static int test(void)
103 {
104 struct sigaction segv_act, trap_act;
105 unsigned long rights;
106 int pkey, ret, i;
107
108 ret = pkeys_unsupported();
109 if (ret)
110 return ret;
111
112 /* Setup SIGSEGV handler */
113 segv_act.sa_handler = 0;
114 segv_act.sa_sigaction = segv_handler;
115 FAIL_IF(sigprocmask(SIG_SETMASK, 0, &segv_act.sa_mask) != 0);
116 segv_act.sa_flags = SA_SIGINFO;
117 segv_act.sa_restorer = 0;
118 FAIL_IF(sigaction(SIGSEGV, &segv_act, NULL) != 0);
119
120 /* Setup SIGTRAP handler */
121 trap_act.sa_handler = 0;
122 trap_act.sa_sigaction = trap_handler;
123 FAIL_IF(sigprocmask(SIG_SETMASK, 0, &trap_act.sa_mask) != 0);
124 trap_act.sa_flags = SA_SIGINFO;
125 trap_act.sa_restorer = 0;
126 FAIL_IF(sigaction(SIGTRAP, &trap_act, NULL) != 0);
127
128 /* Setup executable region */
129 pgsize = getpagesize();
130 numinsns = pgsize / sizeof(unsigned int);
131 insns = (unsigned int *) mmap(NULL, pgsize, PROT_READ | PROT_WRITE,
132 MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
133 FAIL_IF(insns == MAP_FAILED);
134
135 /* Write the instruction words */
136 for (i = 1; i < numinsns - 1; i++)
137 insns[i] = PPC_INST_NOP;
138
139 /*
140 * Set the first instruction as an unconditional trap. If
141 * the last write to this address succeeds, this should
142 * get overwritten by a no-op.
143 */
144 insns[0] = PPC_INST_TRAP;
145
146 /*
147 * Later, to jump to the executable region, we use a branch
148 * and link instruction (bctrl) which sets the return address
149 * automatically in LR. Use that to return back.
150 */
151 insns[numinsns - 1] = PPC_INST_BLR;
152
153 /* Allocate a pkey that restricts execution */
154 rights = PKEY_DISABLE_EXECUTE;
155 pkey = sys_pkey_alloc(0, rights);
156 FAIL_IF(pkey < 0);
157
158 /*
159 * Pick the first instruction's address from the executable
160 * region.
161 */
162 fault_addr = insns;
163
164 /* The following two cases will avoid SEGV_PKUERR */
165 fault_type = -1;
166 fault_pkey = -1;
167
168 /*
169 * Read an instruction word from the address when AMR bits
170 * are not set i.e. the pkey permits both read and write
171 * access.
172 *
173 * This should not generate a fault as having PROT_EXEC
174 * implies PROT_READ on GNU systems. The pkey currently
175 * restricts execution only based on the IAMR bits. The
176 * AMR bits are cleared.
177 */
178 remaining_faults = 0;
179 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0);
180 printf("read from %p, pkey permissions are %s\n", fault_addr,
181 pkey_rights(rights));
182 i = *fault_addr;
183 FAIL_IF(remaining_faults != 0);
184
185 /*
186 * Write an instruction word to the address when AMR bits
187 * are not set i.e. the pkey permits both read and write
188 * access.
189 *
190 * This should generate an access fault as having just
191 * PROT_EXEC also restricts writes. The pkey currently
192 * restricts execution only based on the IAMR bits. The
193 * AMR bits are cleared.
194 */
195 remaining_faults = 1;
196 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0);
197 printf("write to %p, pkey permissions are %s\n", fault_addr,
198 pkey_rights(rights));
199 *fault_addr = PPC_INST_TRAP;
200 FAIL_IF(remaining_faults != 0 || fault_code != SEGV_ACCERR);
201
202 /* The following three cases will generate SEGV_PKUERR */
203 rights |= PKEY_DISABLE_ACCESS;
204 fault_type = PKEY_DISABLE_ACCESS;
205 fault_pkey = pkey;
206
207 /*
208 * Read an instruction word from the address when AMR bits
209 * are set i.e. the pkey permits neither read nor write
210 * access.
211 *
212 * This should generate a pkey fault based on AMR bits only
213 * as having PROT_EXEC implicitly allows reads.
214 */
215 remaining_faults = 1;
216 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0);
217 pkey_set_rights(pkey, rights);
218 printf("read from %p, pkey permissions are %s\n", fault_addr,
219 pkey_rights(rights));
220 i = *fault_addr;
221 FAIL_IF(remaining_faults != 0 || fault_code != SEGV_PKUERR);
222
223 /*
224 * Write an instruction word to the address when AMR bits
225 * are set i.e. the pkey permits neither read nor write
226 * access.
227 *
228 * This should generate two faults. First, a pkey fault
229 * based on AMR bits and then an access fault since
230 * PROT_EXEC does not allow writes.
231 */
232 remaining_faults = 2;
233 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0);
234 pkey_set_rights(pkey, rights);
235 printf("write to %p, pkey permissions are %s\n", fault_addr,
236 pkey_rights(rights));
237 *fault_addr = PPC_INST_NOP;
238 FAIL_IF(remaining_faults != 0 || fault_code != SEGV_ACCERR);
239
240 /* Free the current pkey */
241 sys_pkey_free(pkey);
242
243 rights = 0;
244 do {
245 /*
246 * Allocate pkeys with all valid combinations of read,
247 * write and execute restrictions.
248 */
249 pkey = sys_pkey_alloc(0, rights);
250 FAIL_IF(pkey < 0);
251
252 /*
253 * Jump to the executable region. AMR bits may or may not
254 * be set but they should not affect execution.
255 *
256 * This should generate pkey faults based on IAMR bits which
257 * may be set to restrict execution.
258 *
259 * The first iteration also checks if the overwrite of the
260 * first instruction word from a trap to a no-op succeeded.
261 */
262 fault_pkey = pkey;
263 fault_type = -1;
264 remaining_faults = 0;
265 if (rights & PKEY_DISABLE_EXECUTE) {
266 fault_type = PKEY_DISABLE_EXECUTE;
267 remaining_faults = 1;
268 }
269
270 FAIL_IF(sys_pkey_mprotect(insns, pgsize, PROT_EXEC, pkey) != 0);
271 printf("execute at %p, pkey permissions are %s\n", fault_addr,
272 pkey_rights(rights));
273 asm volatile("mtctr %0; bctrl" : : "r"(insns));
274 FAIL_IF(remaining_faults != 0);
275 if (rights & PKEY_DISABLE_EXECUTE)
276 FAIL_IF(fault_code != SEGV_PKUERR);
277
278 /* Free the current pkey */
279 sys_pkey_free(pkey);
280
281 /* Find next valid combination of pkey rights */
282 rights = next_pkey_rights(rights);
283 } while (rights);
284
285 /* Cleanup */
286 munmap((void *) insns, pgsize);
287
288 return 0;
289 }
290
main(void)291 int main(void)
292 {
293 return test_harness(test, "pkey_exec_prot");
294 }
295