linux/tools/testing/selftests/powerpc/mm/exec_prot.c

// SPDX-License-Identifier: GPL-2.0

/*
 * Copyright 2022, Nicholas Miehlbradt, IBM Corporation
 * based on pkey_exec_prot.c
 *
 * Test if applying execute protection on pages works as expected.
 */

#define _GNU_SOURCE
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <signal.h>

#include <unistd.h>
#include <sys/mman.h>

#include "pkeys.h"


#define PPC_INST_NOP	0x60000000
#define PPC_INST_TRAP	0x7fe00008
#define PPC_INST_BLR	0x4e800020

static volatile sig_atomic_t fault_code;
static volatile sig_atomic_t remaining_faults;
static volatile unsigned int *fault_addr;
static unsigned long pgsize, numinsns;
static unsigned int *insns;
static bool pkeys_supported;

static bool is_fault_expected(int fault_code)
{
	if (fault_code == SEGV_ACCERR)
		return true;

	/* Assume any pkey error is fine since pkey_exec_prot test covers them */
	if (fault_code == SEGV_PKUERR && pkeys_supported)
		return true;

	return false;
}

static void trap_handler(int signum, siginfo_t *sinfo, void *ctx)
{
	/* Check if this fault originated from the expected address */
	if (sinfo->si_addr != (void *)fault_addr)
		sigsafe_err("got a fault for an unexpected address\n");

	_exit(1);
}

static void segv_handler(int signum, siginfo_t *sinfo, void *ctx)
{
	fault_code = sinfo->si_code;

	/* Check if this fault originated from the expected address */
	if (sinfo->si_addr != (void *)fault_addr) {
		sigsafe_err("got a fault for an unexpected address\n");
		_exit(1);
	}

	/* Check if too many faults have occurred for a single test case */
	if (!remaining_faults) {
		sigsafe_err("got too many faults for the same address\n");
		_exit(1);
	}


	/* Restore permissions in order to continue */
	if (is_fault_expected(fault_code)) {
		if (mprotect(insns, pgsize, PROT_READ | PROT_WRITE | PROT_EXEC)) {
			sigsafe_err("failed to set access permissions\n");
			_exit(1);
		}
	} else {
		sigsafe_err("got a fault with an unexpected code\n");
		_exit(1);
	}

	remaining_faults--;
}

static int check_exec_fault(int rights)
{
	/*
	 * Jump to the executable region.
	 *
	 * The first iteration also checks if the overwrite of the
	 * first instruction word from a trap to a no-op succeeded.
	 */
	fault_code = -1;
	remaining_faults = 0;
	if (!(rights & PROT_EXEC))
		remaining_faults = 1;

	FAIL_IF(mprotect(insns, pgsize, rights) != 0);
	asm volatile("mtctr	%0; bctrl" : : "r"(insns));

	FAIL_IF(remaining_faults != 0);
	if (!(rights & PROT_EXEC))
		FAIL_IF(!is_fault_expected(fault_code));

	return 0;
}

static int test(void)
{
	struct sigaction segv_act, trap_act;
	int i;

	/* Skip the test if the CPU doesn't support Radix */
	SKIP_IF(!have_hwcap2(PPC_FEATURE2_ARCH_3_00));

	/* Check if pkeys are supported */
	pkeys_supported = pkeys_unsupported() == 0;

	/* Setup SIGSEGV handler */
	segv_act.sa_handler = 0;
	segv_act.sa_sigaction = segv_handler;
	FAIL_IF(sigprocmask(SIG_SETMASK, 0, &segv_act.sa_mask) != 0);
	segv_act.sa_flags = SA_SIGINFO;
	segv_act.sa_restorer = 0;
	FAIL_IF(sigaction(SIGSEGV, &segv_act, NULL) != 0);

	/* Setup SIGTRAP handler */
	trap_act.sa_handler = 0;
	trap_act.sa_sigaction = trap_handler;
	FAIL_IF(sigprocmask(SIG_SETMASK, 0, &trap_act.sa_mask) != 0);
	trap_act.sa_flags = SA_SIGINFO;
	trap_act.sa_restorer = 0;
	FAIL_IF(sigaction(SIGTRAP, &trap_act, NULL) != 0);

	/* Setup executable region */
	pgsize = getpagesize();
	numinsns = pgsize / sizeof(unsigned int);
	insns = (unsigned int *)mmap(NULL, pgsize, PROT_READ | PROT_WRITE,
				      MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
	FAIL_IF(insns == MAP_FAILED);

	/* Write the instruction words */
	for (i = 1; i < numinsns - 1; i++)
		insns[i] = PPC_INST_NOP;

	/*
	 * Set the first instruction as an unconditional trap. If
	 * the last write to this address succeeds, this should
	 * get overwritten by a no-op.
	 */
	insns[0] = PPC_INST_TRAP;

	/*
	 * Later, to jump to the executable region, we use a branch
	 * and link instruction (bctrl) which sets the return address
	 * automatically in LR. Use that to return back.
	 */
	insns[numinsns - 1] = PPC_INST_BLR;

	/*
	 * Pick the first instruction's address from the executable
	 * region.
	 */
	fault_addr = insns;

	/*
	 * Read an instruction word from the address when the page
	 * is execute only. This should generate an access fault.
	 */
	fault_code = -1;
	remaining_faults = 1;
	printf("Testing read on --x, should fault...");
	FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0);
	i = *fault_addr;
	FAIL_IF(remaining_faults != 0 || !is_fault_expected(fault_code));
	printf("ok!\n");

	/*
	 * Write an instruction word to the address when the page
	 * execute only. This should also generate an access fault.
	 */
	fault_code = -1;
	remaining_faults = 1;
	printf("Testing write on --x, should fault...");
	FAIL_IF(mprotect(insns, pgsize, PROT_EXEC) != 0);
	*fault_addr = PPC_INST_NOP;
	FAIL_IF(remaining_faults != 0 || !is_fault_expected(fault_code));
	printf("ok!\n");

	printf("Testing exec on ---, should fault...");
	FAIL_IF(check_exec_fault(PROT_NONE));
	printf("ok!\n");

	printf("Testing exec on r--, should fault...");
	FAIL_IF(check_exec_fault(PROT_READ));
	printf("ok!\n");

	printf("Testing exec on -w-, should fault...");
	FAIL_IF(check_exec_fault(PROT_WRITE));
	printf("ok!\n");

	printf("Testing exec on rw-, should fault...");
	FAIL_IF(check_exec_fault(PROT_READ | PROT_WRITE));
	printf("ok!\n");

	printf("Testing exec on --x, should succeed...");
	FAIL_IF(check_exec_fault(PROT_EXEC));
	printf("ok!\n");

	printf("Testing exec on r-x, should succeed...");
	FAIL_IF(check_exec_fault(PROT_READ | PROT_EXEC));
	printf("ok!\n");

	printf("Testing exec on -wx, should succeed...");
	FAIL_IF(check_exec_fault(PROT_WRITE | PROT_EXEC));
	printf("ok!\n");

	printf("Testing exec on rwx, should succeed...");
	FAIL_IF(check_exec_fault(PROT_READ | PROT_WRITE | PROT_EXEC));
	printf("ok!\n");

	/* Cleanup */
	FAIL_IF(munmap((void *)insns, pgsize));

	return 0;
}

int main(void)
{
	return test_harness(test, "exec_prot");
}