• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3  * Copyright (c) 2019 Red Hat, Inc.
4  *
5  * Memory Protection Keys for Userspace (PKU aka PKEYs) is a Skylake-SP
6  * server feature that provides a mechanism for enforcing page-based
7  * protections, but without requiring modification of the page tables
8  * when an application changes protection domains. It works by dedicating
9  * 4 previously ignored bits in each page table entry to a "protection key",
10  * giving 16 possible keys.
11  *
12  * Basic method for PKEYs testing:
13  *    1. test allocates a pkey(e.g. PKEY_DISABLE_ACCESS) via pkey_alloc()
14  *    2. pkey_mprotect() apply this pkey to a piece of memory(buffer)
15  *    3. check if access right of the buffer has been changed and take effect
16  *    4. remove the access right(pkey) from this buffer via pkey_mprotect()
17  *    5. check if buffer area can be read or write after removing pkey
18  *    6. pkey_free() releases the pkey after using it
19  *
20  * Looping around this basic test on diffenrent types of memory.
21  */
22 
23 #define _GNU_SOURCE
24 #include <stdio.h>
25 #include <unistd.h>
26 #include <errno.h>
27 #include <stdlib.h>
28 #include <sys/syscall.h>
29 #include <sys/mman.h>
30 #include <sys/wait.h>
31 
32 #include "pkey.h"
33 
34 #define TEST_FILE "pkey_testfile"
35 #define STR "abcdefghijklmnopqrstuvwxyz12345\n"
36 #define PATH_VM_NRHPS "/proc/sys/vm/nr_hugepages"
37 
38 static int size;
39 
40 static struct tcase {
41 	unsigned long flags;
42 	unsigned long access_rights;
43 	char *name;
44 } tcases[] = {
45 	{0, PKEY_DISABLE_ACCESS, "PKEY_DISABLE_ACCESS"},
46 	{0, PKEY_DISABLE_WRITE, "PKEY_DISABLE_WRITE"},
47 };
48 
setup(void)49 static void setup(void)
50 {
51 	int i, fd;
52 
53 	check_pkey_support();
54 
55 	if (tst_hugepages == test.hugepages.number)
56 		size = SAFE_READ_MEMINFO("Hugepagesize:") * 1024;
57 	else
58 		size = getpagesize();
59 
60 	fd = SAFE_OPEN(TEST_FILE, O_RDWR | O_CREAT, 0664);
61 	for (i = 0; i < 128; i++)
62 		SAFE_WRITE(SAFE_WRITE_ALL, fd, STR, strlen(STR));
63 
64 	SAFE_CLOSE(fd);
65 }
66 
67 static struct mmap_param {
68 	int prot;
69 	int flags;
70 	int fd;
71 } mmap_params[] = {
72 	{PROT_READ,  MAP_ANONYMOUS | MAP_PRIVATE, -1},
73 	{PROT_READ,  MAP_ANONYMOUS | MAP_SHARED, -1},
74 	{PROT_READ,  MAP_ANONYMOUS | MAP_PRIVATE | MAP_HUGETLB, -1},
75 	{PROT_READ,  MAP_ANONYMOUS | MAP_SHARED  | MAP_HUGETLB, -1},
76 	{PROT_READ,  MAP_PRIVATE, 0},
77 	{PROT_READ,  MAP_SHARED, 0},
78 
79 	{PROT_WRITE, MAP_ANONYMOUS | MAP_PRIVATE, -1},
80 	{PROT_WRITE, MAP_ANONYMOUS | MAP_SHARED, -1},
81 	{PROT_WRITE, MAP_PRIVATE, 0},
82 	{PROT_WRITE, MAP_SHARED, 0},
83 	{PROT_WRITE, MAP_ANONYMOUS | MAP_PRIVATE | MAP_HUGETLB, -1},
84 	{PROT_WRITE, MAP_ANONYMOUS | MAP_SHARED  | MAP_HUGETLB, -1},
85 
86 	{PROT_EXEC,  MAP_ANONYMOUS | MAP_PRIVATE, -1},
87 	{PROT_EXEC,  MAP_ANONYMOUS | MAP_SHARED, -1},
88 	{PROT_EXEC,  MAP_ANONYMOUS | MAP_PRIVATE | MAP_HUGETLB, -1},
89 	{PROT_EXEC,  MAP_ANONYMOUS | MAP_SHARED  | MAP_HUGETLB, -1},
90 	{PROT_EXEC,  MAP_PRIVATE, 0},
91 	{PROT_EXEC,  MAP_SHARED, 0},
92 
93 	{PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_PRIVATE, -1},
94 	{PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_SHARED, -1},
95 	{PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_PRIVATE | MAP_HUGETLB, -1},
96 	{PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_SHARED  | MAP_HUGETLB, -1},
97 	{PROT_READ | PROT_WRITE, MAP_PRIVATE, 0},
98 	{PROT_READ | PROT_WRITE, MAP_SHARED, 0},
99 
100 	{PROT_READ | PROT_WRITE | PROT_EXEC, MAP_ANONYMOUS | MAP_PRIVATE, -1},
101 	{PROT_READ | PROT_WRITE | PROT_EXEC, MAP_ANONYMOUS | MAP_SHARED, -1},
102 	{PROT_READ | PROT_WRITE | PROT_EXEC, MAP_ANONYMOUS | MAP_PRIVATE | MAP_HUGETLB, -1},
103 	{PROT_READ | PROT_WRITE | PROT_EXEC, MAP_ANONYMOUS | MAP_SHARED  | MAP_HUGETLB, -1},
104 	{PROT_READ | PROT_WRITE | PROT_EXEC, MAP_PRIVATE, 0},
105 	{PROT_READ | PROT_WRITE | PROT_EXEC, MAP_SHARED, 0},
106 };
107 
flag_to_str(int flags)108 static char *flag_to_str(int flags)
109 {
110 	switch (flags) {
111 	case MAP_PRIVATE:
112 		return "MAP_PRIVATE";
113 	case MAP_SHARED:
114 		return "MAP_SHARED";
115 	case MAP_ANONYMOUS | MAP_PRIVATE:
116 		return "MAP_ANONYMOUS|MAP_PRIVATE";
117 	case MAP_ANONYMOUS | MAP_SHARED:
118 		return "MAP_ANONYMOUS|MAP_SHARED";
119 	case MAP_ANONYMOUS | MAP_PRIVATE | MAP_HUGETLB:
120 		return "MAP_ANONYMOUS|MAP_PRIVATE|MAP_HUGETLB";
121 	case MAP_ANONYMOUS | MAP_SHARED  | MAP_HUGETLB:
122 		return "MAP_ANONYMOUS|MAP_SHARED|MAP_HUGETLB";
123 	default:
124 		return "UNKNOWN FLAGS";
125 	}
126 }
127 
pkey_test(struct tcase * tc,struct mmap_param * mpa)128 static void pkey_test(struct tcase *tc, struct mmap_param *mpa)
129 {
130 	pid_t pid;
131 	char *buffer;
132 	int pkey, status;
133 	int fd = mpa->fd;
134 
135 	if (!tst_hugepages && (mpa->flags & MAP_HUGETLB)) {
136 		tst_res(TINFO, "Skip test on (%s) buffer", flag_to_str(mpa->flags));
137 		return;
138 	}
139 
140 	if (fd == 0)
141 		fd = SAFE_OPEN(TEST_FILE, O_RDWR | O_CREAT, 0664);
142 
143 	buffer = SAFE_MMAP(NULL, size, mpa->prot, mpa->flags, fd, 0);
144 
145 	pkey = ltp_pkey_alloc(tc->flags, tc->access_rights);
146 	if (pkey == -1)
147 		tst_brk(TBROK | TERRNO, "pkey_alloc failed");
148 
149 	tst_res(TINFO, "Set %s on (%s) buffer", tc->name, flag_to_str(mpa->flags));
150 	if (ltp_pkey_mprotect(buffer, size, mpa->prot, pkey) == -1)
151 		tst_brk(TBROK | TERRNO, "pkey_mprotect failed");
152 
153 	pid = SAFE_FORK();
154 	if (pid == 0) {
155 		tst_no_corefile(0);
156 
157 		switch (tc->access_rights) {
158 		case PKEY_DISABLE_ACCESS:
159 			tst_res(TFAIL | TERRNO,
160 				"Read buffer success, buffer[0] = %d", *buffer);
161 		break;
162 		case PKEY_DISABLE_WRITE:
163 			*buffer = 'a';
164 			tst_res(TFAIL | TERRNO,
165 				"Write buffer success, buffer[0] = %d", *buffer);
166 		break;
167 		}
168 		exit(0);
169 	}
170 
171 	SAFE_WAITPID(pid, &status, 0);
172 
173         if (WIFSIGNALED(status) && WTERMSIG(status) == SIGSEGV)
174 		tst_res(TPASS, "Child ended by %s as expected", tst_strsig(SIGSEGV));
175         else
176                 tst_res(TFAIL, "Child: %s", tst_strstatus(status));
177 
178 	tst_res(TINFO, "Remove %s from the buffer", tc->name);
179 	if (ltp_pkey_mprotect(buffer, size, mpa->prot, 0x0) == -1)
180 		tst_brk(TBROK | TERRNO, "pkey_mprotect failed");
181 
182 	switch (mpa->prot) {
183 	case PROT_READ:
184 		tst_res(TPASS, "Read buffer success, buffer[0] = %d", *buffer);
185 	break;
186 	case PROT_WRITE:
187 		*buffer = 'a';
188 		tst_res(TPASS, "Write buffer success, buffer[0] = %d", *buffer);
189 	break;
190 	case PROT_READ | PROT_WRITE:
191 	case PROT_READ | PROT_WRITE | PROT_EXEC:
192 		*buffer = 'a';
193 		tst_res(TPASS, "Read & Write buffer success, buffer[0] = %d", *buffer);
194 	break;
195 	}
196 
197 	if (fd >= 0)
198 		SAFE_CLOSE(fd);
199 
200 	SAFE_MUNMAP(buffer, size);
201 
202 	if (ltp_pkey_free(pkey) == -1)
203 		tst_brk(TBROK | TERRNO, "pkey_free failed");
204 }
205 
verify_pkey(unsigned int i)206 static void verify_pkey(unsigned int i)
207 {
208 	long unsigned int j;
209 	struct mmap_param *mpa;
210 
211 	struct tcase *tc = &tcases[i];
212 
213 	for (j = 0; j < ARRAY_SIZE(mmap_params); j++) {
214 		mpa = &mmap_params[j];
215 
216 		pkey_test(tc, mpa);
217 	}
218 }
219 
220 static struct tst_test test = {
221 	.tcnt = ARRAY_SIZE(tcases),
222 	.needs_root = 1,
223 	.needs_tmpdir = 1,
224 	.forks_child = 1,
225 	.test = verify_pkey,
226 	.setup = setup,
227 	.hugepages = {1, TST_REQUEST},
228 };
229