Path: blob/master/tools/testing/selftests/arm64/pauth/pac.c
26292 views
// SPDX-License-Identifier: GPL-2.01// Copyright (C) 2020 ARM Limited23#define _GNU_SOURCE45#include <sys/auxv.h>6#include <sys/types.h>7#include <sys/wait.h>8#include <signal.h>9#include <setjmp.h>10#include <sched.h>1112#include "../../kselftest_harness.h"13#include "helper.h"1415#define PAC_COLLISION_ATTEMPTS 100016/*17* The kernel sets TBID by default. So bits 55 and above should remain18* untouched no matter what.19* The VA space size is 48 bits. Bigger is opt-in.20*/21#define PAC_MASK (~0xff80ffffffffffff)22#define ARBITRARY_VALUE (0x1234)23#define ASSERT_PAUTH_ENABLED() \24do { \25unsigned long hwcaps = getauxval(AT_HWCAP); \26/* data key instructions are not in NOP space. This prevents a SIGILL */ \27if (!(hwcaps & HWCAP_PACA)) \28SKIP(return, "PAUTH not enabled"); \29} while (0)30#define ASSERT_GENERIC_PAUTH_ENABLED() \31do { \32unsigned long hwcaps = getauxval(AT_HWCAP); \33/* generic key instructions are not in NOP space. This prevents a SIGILL */ \34if (!(hwcaps & HWCAP_PACG)) \35SKIP(return, "Generic PAUTH not enabled"); \36} while (0)3738void sign_specific(struct signatures *sign, size_t val)39{40sign->keyia = keyia_sign(val);41sign->keyib = keyib_sign(val);42sign->keyda = keyda_sign(val);43sign->keydb = keydb_sign(val);44}4546void sign_all(struct signatures *sign, size_t val)47{48sign->keyia = keyia_sign(val);49sign->keyib = keyib_sign(val);50sign->keyda = keyda_sign(val);51sign->keydb = keydb_sign(val);52sign->keyg = keyg_sign(val);53}5455int n_same(struct signatures *old, struct signatures *new, int nkeys)56{57int res = 0;5859res += old->keyia == new->keyia;60res += old->keyib == new->keyib;61res += old->keyda == new->keyda;62res += old->keydb == new->keydb;63if (nkeys == NKEYS)64res += old->keyg == new->keyg;6566return res;67}6869int n_same_single_set(struct signatures *sign, int nkeys)70{71size_t vals[nkeys];72int same = 0;7374vals[0] = sign->keyia & PAC_MASK;75vals[1] = sign->keyib & PAC_MASK;76vals[2] = sign->keyda & PAC_MASK;77vals[3] = sign->keydb & PAC_MASK;7879if (nkeys >= 4)80vals[4] = sign->keyg & PAC_MASK;8182for (int i = 0; i < nkeys - 1; i++) {83for (int j = i + 1; j < nkeys; j++) {84if (vals[i] == vals[j])85same += 1;86}87}88return same;89}9091int exec_sign_all(struct signatures *signed_vals, size_t val)92{93int new_stdin[2];94int new_stdout[2];95int status;96int i;97ssize_t ret;98pid_t pid;99cpu_set_t mask;100101ret = pipe(new_stdin);102if (ret == -1) {103perror("pipe returned error");104return -1;105}106107ret = pipe(new_stdout);108if (ret == -1) {109perror("pipe returned error");110return -1;111}112113/*114* pin this process and all its children to a single CPU, so it can also115* guarantee a context switch with its child116*/117sched_getaffinity(0, sizeof(mask), &mask);118119for (i = 0; i < sizeof(cpu_set_t); i++)120if (CPU_ISSET(i, &mask))121break;122123CPU_ZERO(&mask);124CPU_SET(i, &mask);125sched_setaffinity(0, sizeof(mask), &mask);126127pid = fork();128// child129if (pid == 0) {130dup2(new_stdin[0], STDIN_FILENO);131if (ret == -1) {132perror("dup2 returned error");133exit(1);134}135136dup2(new_stdout[1], STDOUT_FILENO);137if (ret == -1) {138perror("dup2 returned error");139exit(1);140}141142close(new_stdin[0]);143close(new_stdin[1]);144close(new_stdout[0]);145close(new_stdout[1]);146147ret = execl("exec_target", "exec_target", (char *)NULL);148if (ret == -1) {149perror("exec returned error");150exit(1);151}152}153154close(new_stdin[0]);155close(new_stdout[1]);156157ret = write(new_stdin[1], &val, sizeof(size_t));158if (ret == -1) {159perror("write returned error");160return -1;161}162163/*164* wait for the worker to finish, so that read() reads all data165* will also context switch with worker so that this function can be used166* for context switch tests167*/168waitpid(pid, &status, 0);169if (WIFEXITED(status) == 0) {170fprintf(stderr, "worker exited unexpectedly\n");171return -1;172}173if (WEXITSTATUS(status) != 0) {174fprintf(stderr, "worker exited with error\n");175return -1;176}177178ret = read(new_stdout[0], signed_vals, sizeof(struct signatures));179if (ret == -1) {180perror("read returned error");181return -1;182}183184close(new_stdin[1]);185close(new_stdout[0]);186187return 0;188}189190sigjmp_buf jmpbuf;191void pac_signal_handler(int signum, siginfo_t *si, void *uc)192{193if (signum == SIGSEGV || signum == SIGILL)194siglongjmp(jmpbuf, 1);195}196197/* check that a corrupted PAC results in SIGSEGV or SIGILL */198TEST(corrupt_pac)199{200struct sigaction sa;201202ASSERT_PAUTH_ENABLED();203if (sigsetjmp(jmpbuf, 1) == 0) {204sa.sa_sigaction = pac_signal_handler;205sa.sa_flags = SA_SIGINFO | SA_RESETHAND;206sigemptyset(&sa.sa_mask);207208sigaction(SIGSEGV, &sa, NULL);209sigaction(SIGILL, &sa, NULL);210211pac_corruptor();212ASSERT_TRUE(0) TH_LOG("SIGSEGV/SIGILL signal did not occur");213}214}215216/*217* There are no separate pac* and aut* controls so checking only the pac*218* instructions is sufficient219*/220TEST(pac_instructions_not_nop)221{222size_t keyia = 0;223size_t keyib = 0;224size_t keyda = 0;225size_t keydb = 0;226227ASSERT_PAUTH_ENABLED();228229for (int i = 0; i < PAC_COLLISION_ATTEMPTS; i++) {230keyia |= keyia_sign(i) & PAC_MASK;231keyib |= keyib_sign(i) & PAC_MASK;232keyda |= keyda_sign(i) & PAC_MASK;233keydb |= keydb_sign(i) & PAC_MASK;234}235236ASSERT_NE(0, keyia) TH_LOG("keyia instructions did nothing");237ASSERT_NE(0, keyib) TH_LOG("keyib instructions did nothing");238ASSERT_NE(0, keyda) TH_LOG("keyda instructions did nothing");239ASSERT_NE(0, keydb) TH_LOG("keydb instructions did nothing");240}241242TEST(pac_instructions_not_nop_generic)243{244size_t keyg = 0;245246ASSERT_GENERIC_PAUTH_ENABLED();247248for (int i = 0; i < PAC_COLLISION_ATTEMPTS; i++)249keyg |= keyg_sign(i) & PAC_MASK;250251ASSERT_NE(0, keyg) TH_LOG("keyg instructions did nothing");252}253254TEST(single_thread_different_keys)255{256int same = 10;257int nkeys = NKEYS;258int tmp;259struct signatures signed_vals;260unsigned long hwcaps = getauxval(AT_HWCAP);261262/* generic and data key instructions are not in NOP space. This prevents a SIGILL */263ASSERT_PAUTH_ENABLED();264if (!(hwcaps & HWCAP_PACG)) {265TH_LOG("WARNING: Generic PAUTH not enabled. Skipping generic key checks");266nkeys = NKEYS - 1;267}268269/*270* In Linux the PAC field can be up to 7 bits wide. Even if keys are271* different, there is about 5% chance for PACs to collide with272* different addresses. This chance rapidly increases with fewer bits273* allocated for the PAC (e.g. wider address). A comparison of the keys274* directly will be more reliable.275* All signed values need to be different at least once out of n276* attempts to be certain that the keys are different277*/278for (int i = 0; i < PAC_COLLISION_ATTEMPTS; i++) {279if (nkeys == NKEYS)280sign_all(&signed_vals, i);281else282sign_specific(&signed_vals, i);283284tmp = n_same_single_set(&signed_vals, nkeys);285if (tmp < same)286same = tmp;287}288289ASSERT_EQ(0, same) TH_LOG("%d keys clashed every time", same);290}291292/*293* fork() does not change keys. Only exec() does so call a worker program.294* Its only job is to sign a value and report back the resutls295*/296TEST(exec_changed_keys)297{298struct signatures new_keys;299struct signatures old_keys;300int ret;301int same = 10;302int nkeys = NKEYS;303unsigned long hwcaps = getauxval(AT_HWCAP);304305/* generic and data key instructions are not in NOP space. This prevents a SIGILL */306ASSERT_PAUTH_ENABLED();307if (!(hwcaps & HWCAP_PACG)) {308TH_LOG("WARNING: Generic PAUTH not enabled. Skipping generic key checks");309nkeys = NKEYS - 1;310}311312for (int i = 0; i < PAC_COLLISION_ATTEMPTS; i++) {313ret = exec_sign_all(&new_keys, i);314ASSERT_EQ(0, ret) TH_LOG("failed to run worker");315316if (nkeys == NKEYS)317sign_all(&old_keys, i);318else319sign_specific(&old_keys, i);320321ret = n_same(&old_keys, &new_keys, nkeys);322if (ret < same)323same = ret;324}325326ASSERT_EQ(0, same) TH_LOG("exec() did not change %d keys", same);327}328329TEST(context_switch_keep_keys)330{331int ret;332struct signatures trash;333struct signatures before;334struct signatures after;335336ASSERT_PAUTH_ENABLED();337338sign_specific(&before, ARBITRARY_VALUE);339340/* will context switch with a process with different keys at least once */341ret = exec_sign_all(&trash, ARBITRARY_VALUE);342ASSERT_EQ(0, ret) TH_LOG("failed to run worker");343344sign_specific(&after, ARBITRARY_VALUE);345346ASSERT_EQ(before.keyia, after.keyia) TH_LOG("keyia changed after context switching");347ASSERT_EQ(before.keyib, after.keyib) TH_LOG("keyib changed after context switching");348ASSERT_EQ(before.keyda, after.keyda) TH_LOG("keyda changed after context switching");349ASSERT_EQ(before.keydb, after.keydb) TH_LOG("keydb changed after context switching");350}351352TEST(context_switch_keep_keys_generic)353{354int ret;355struct signatures trash;356size_t before;357size_t after;358359ASSERT_GENERIC_PAUTH_ENABLED();360361before = keyg_sign(ARBITRARY_VALUE);362363/* will context switch with a process with different keys at least once */364ret = exec_sign_all(&trash, ARBITRARY_VALUE);365ASSERT_EQ(0, ret) TH_LOG("failed to run worker");366367after = keyg_sign(ARBITRARY_VALUE);368369ASSERT_EQ(before, after) TH_LOG("keyg changed after context switching");370}371372TEST_HARNESS_MAIN373374375