Path: blob/master/tools/testing/selftests/arm64/mte/check_user_mem.c
26296 views
// SPDX-License-Identifier: GPL-2.01// Copyright (C) 2020 ARM Limited23#define _GNU_SOURCE45#include <assert.h>6#include <errno.h>7#include <fcntl.h>8#include <signal.h>9#include <stdlib.h>10#include <stdio.h>11#include <string.h>12#include <ucontext.h>13#include <unistd.h>14#include <sys/uio.h>15#include <sys/mman.h>1617#include "kselftest.h"18#include "mte_common_util.h"19#include "mte_def.h"2021static size_t page_sz;2223#define TEST_NAME_MAX 1002425enum test_type {26READ_TEST,27WRITE_TEST,28READV_TEST,29WRITEV_TEST,30LAST_TEST,31};3233static int check_usermem_access_fault(int mem_type, int mode, int mapping,34int tag_offset, int tag_len,35enum test_type test_type)36{37int fd, i, err;38char val = 'A';39ssize_t len, syscall_len;40void *ptr, *ptr_next;41int fileoff, ptroff, size;42int sizes[] = {1, 2, 3, 8, 16, 32, 4096, page_sz};4344err = KSFT_PASS;45len = 2 * page_sz;46mte_switch_mode(mode, MTE_ALLOW_NON_ZERO_TAG, false);47fd = create_temp_file();48if (fd == -1)49return KSFT_FAIL;50for (i = 0; i < len; i++)51if (write(fd, &val, sizeof(val)) != sizeof(val))52return KSFT_FAIL;53lseek(fd, 0, 0);54ptr = mte_allocate_memory(len, mem_type, mapping, true);55if (check_allocated_memory(ptr, len, mem_type, true) != KSFT_PASS) {56close(fd);57return KSFT_FAIL;58}59mte_initialize_current_context(mode, (uintptr_t)ptr, len);60/* Copy from file into buffer with valid tag */61syscall_len = read(fd, ptr, len);62mte_wait_after_trig();63if (cur_mte_cxt.fault_valid || syscall_len < len)64goto usermem_acc_err;65/* Verify same pattern is read */66for (i = 0; i < len; i++)67if (*(char *)(ptr + i) != val)68break;69if (i < len)70goto usermem_acc_err;7172if (!tag_len)73tag_len = len - tag_offset;74/* Tag a part of memory with different value */75ptr_next = (void *)((unsigned long)ptr + tag_offset);76ptr_next = mte_insert_new_tag(ptr_next);77mte_set_tag_address_range(ptr_next, tag_len);7879for (fileoff = 0; fileoff < 16; fileoff++) {80for (ptroff = 0; ptroff < 16; ptroff++) {81for (i = 0; i < ARRAY_SIZE(sizes); i++) {82size = sizes[i];83lseek(fd, 0, 0);8485/* perform file operation on buffer with invalid tag */86switch (test_type) {87case READ_TEST:88syscall_len = read(fd, ptr + ptroff, size);89break;90case WRITE_TEST:91syscall_len = write(fd, ptr + ptroff, size);92break;93case READV_TEST: {94struct iovec iov[1];95iov[0].iov_base = ptr + ptroff;96iov[0].iov_len = size;97syscall_len = readv(fd, iov, 1);98break;99}100case WRITEV_TEST: {101struct iovec iov[1];102iov[0].iov_base = ptr + ptroff;103iov[0].iov_len = size;104syscall_len = writev(fd, iov, 1);105break;106}107case LAST_TEST:108goto usermem_acc_err;109}110111mte_wait_after_trig();112/*113* Accessing user memory in kernel with invalid tag should fail in sync114* mode without fault but may not fail in async mode as per the115* implemented MTE userspace support in Arm64 kernel.116*/117if (cur_mte_cxt.fault_valid) {118goto usermem_acc_err;119}120if (mode == MTE_SYNC_ERR && syscall_len < len) {121/* test passed */122} else if (mode == MTE_ASYNC_ERR && syscall_len == size) {123/* test passed */124} else {125goto usermem_acc_err;126}127}128}129}130131goto exit;132133usermem_acc_err:134err = KSFT_FAIL;135exit:136mte_free_memory((void *)ptr, len, mem_type, true);137close(fd);138return err;139}140141void format_test_name(char* name, int name_len, int type, int sync, int map, int len, int offset) {142const char* test_type;143const char* mte_type;144const char* map_type;145146switch (type) {147case READ_TEST:148test_type = "read";149break;150case WRITE_TEST:151test_type = "write";152break;153case READV_TEST:154test_type = "readv";155break;156case WRITEV_TEST:157test_type = "writev";158break;159default:160assert(0);161break;162}163164switch (sync) {165case MTE_SYNC_ERR:166mte_type = "MTE_SYNC_ERR";167break;168case MTE_ASYNC_ERR:169mte_type = "MTE_ASYNC_ERR";170break;171default:172assert(0);173break;174}175176switch (map) {177case MAP_SHARED:178map_type = "MAP_SHARED";179break;180case MAP_PRIVATE:181map_type = "MAP_PRIVATE";182break;183default:184assert(0);185break;186}187188snprintf(name, name_len,189"test type: %s, %s, %s, tag len: %d, tag offset: %d\n",190test_type, mte_type, map_type, len, offset);191}192193int main(int argc, char *argv[])194{195int err;196int t, s, m, l, o;197int mte_sync[] = {MTE_SYNC_ERR, MTE_ASYNC_ERR};198int maps[] = {MAP_SHARED, MAP_PRIVATE};199int tag_lens[] = {0, MT_GRANULE_SIZE};200int tag_offsets[] = {page_sz, MT_GRANULE_SIZE};201char test_name[TEST_NAME_MAX];202203page_sz = getpagesize();204if (!page_sz) {205ksft_print_msg("ERR: Unable to get page size\n");206return KSFT_FAIL;207}208err = mte_default_setup();209if (err)210return err;211212/* Register signal handlers */213mte_register_signal(SIGSEGV, mte_default_handler, false);214215/* Set test plan */216ksft_set_plan(64);217218for (t = 0; t < LAST_TEST; t++) {219for (s = 0; s < ARRAY_SIZE(mte_sync); s++) {220for (m = 0; m < ARRAY_SIZE(maps); m++) {221for (l = 0; l < ARRAY_SIZE(tag_lens); l++) {222for (o = 0; o < ARRAY_SIZE(tag_offsets); o++) {223int sync = mte_sync[s];224int map = maps[m];225int offset = tag_offsets[o];226int tag_len = tag_lens[l];227int res = check_usermem_access_fault(USE_MMAP, sync,228map, offset,229tag_len, t);230format_test_name(test_name, TEST_NAME_MAX,231t, sync, map, tag_len, offset);232evaluate_test(res, test_name);233}234}235}236}237}238239mte_restore_setup();240ksft_print_cnts();241return ksft_get_fail_cnt() == 0 ? KSFT_PASS : KSFT_FAIL;242}243244245