Home | History | Annotate | Line # | Download | only in libi386
t_user_ldt.c revision 1.4
      1 /*	$NetBSD: t_user_ldt.c,v 1.4 2020/07/03 16:07:52 maxv Exp $	*/
      2 
      3 /*
      4  * Copyright (c) 2020 The NetBSD Foundation, Inc.
      5  * All rights reserved.
      6  *
      7  * This code is derived from software contributed to The NetBSD Foundation
      8  * by Maxime Villard.
      9  *
     10  * Redistribution and use in source and binary forms, with or without
     11  * modification, are permitted provided that the following conditions
     12  * are met:
     13  * 1. Redistributions of source code must retain the above copyright
     14  *    notice, this list of conditions and the following disclaimer.
     15  * 2. Redistributions in binary form must reproduce the above copyright
     16  *    notice, this list of conditions and the following disclaimer in the
     17  *    documentation and/or other materials provided with the distribution.
     18  *
     19  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29  * POSSIBILITY OF SUCH DAMAGE.
     30  */
     31 
     32 #include <stdio.h>
     33 #include <stdlib.h>
     34 #include <string.h>
     35 #include <unistd.h>
     36 #include <errno.h>
     37 #include <signal.h>
     38 
     39 #include <sys/types.h>
     40 #include <sys/mman.h>
     41 #include <machine/segments.h>
     42 #include <machine/sysarch.h>
     43 #include <machine/vmparam.h>
     44 
     45 #define _LOCORE /* XXX a bit of a hack, but whatever */
     46 #include <machine/gdt.h>
     47 #undef _LOCORE
     48 
     49 #include <atf-c.h>
     50 
     51 static uint8_t *ldt_base;
     52 static bool user_ldt_supported;
     53 
     54 static void
     55 user_ldt_detect(void)
     56 {
     57 	union descriptor desc;
     58 	int ret;
     59 
     60 	ret = i386_get_ldt(0, &desc, 1);
     61 	user_ldt_supported = (ret != -1) || (errno != ENOSYS);
     62 }
     63 
     64 static void
     65 init_ldt_base(void)
     66 {
     67 	ldt_base = (uint8_t *)mmap(NULL, 2 * PAGE_SIZE, PROT_READ | PROT_WRITE,
     68 	    MAP_PRIVATE | MAP_ANON, -1, 0);
     69 	if (ldt_base == MAP_FAILED)
     70 		atf_tc_fail("mmap failed");
     71 	munmap(ldt_base + PAGE_SIZE, PAGE_SIZE);
     72 }
     73 
     74 static void
     75 build_desc(union descriptor *desc, void *basep, uint32_t limit, int type,
     76     int dpl, int def32, int gran)
     77 {
     78 	uintptr_t base = (uintptr_t)basep;
     79 
     80 	limit--;
     81 
     82 	desc->sd.sd_lolimit = limit & 0x0000ffff;
     83 	desc->sd.sd_lobase  = base & 0x00ffffff;
     84 	desc->sd.sd_type    = type & 0x1F;
     85 	desc->sd.sd_dpl     = dpl & 0x3;
     86 	desc->sd.sd_p       = 1;
     87 	desc->sd.sd_hilimit = (limit & 0x00ff0000) >> 16;
     88 	desc->sd.sd_xx      = 0;
     89 	desc->sd.sd_def32   = def32 ? 1 : 0;
     90 	desc->sd.sd_gran    = gran ? 1 : 0;
     91 	desc->sd.sd_hibase  = (base & 0xff000000) >> 24;
     92 }
     93 
     94 static void
     95 set_ds(unsigned int val)
     96 {
     97 	__asm volatile("mov %0,%%ds"::"r" ((unsigned short)val));
     98 }
     99 
    100 static void
    101 set_fs(unsigned int val)
    102 {
    103 	__asm volatile("mov %0,%%fs"::"r" ((unsigned short)val));
    104 }
    105 
    106 static uint8_t __noinline
    107 get_fs_byte(const char *addr)
    108 {
    109 	uint8_t val;
    110 	__asm volatile (
    111 		".globl fs_read_begin; fs_read_begin:\n"
    112 		"movb %%fs:%1,%0\n"
    113 		".globl fs_read_end; fs_read_end:\n"
    114 		: "=q" (val) : "m" (*addr)
    115 	);
    116 	return val;
    117 }
    118 
    119 /* -------------------------------------------------------------------------- */
    120 
    121 ATF_TC(filter_ops);
    122 ATF_TC_HEAD(filter_ops, tc)
    123 {
    124 	atf_tc_set_md_var(tc, "descr",
    125 	    "Ensure that the kernel correctly filters the descriptors");
    126 }
    127 ATF_TC_BODY(filter_ops, tc)
    128 {
    129 	union descriptor desc;
    130 	const int forbidden_types[] = {
    131 		SDT_SYS286TSS,
    132 		SDT_SYSLDT,
    133 		SDT_SYS286BSY,
    134 		SDT_SYS286CGT,
    135 		SDT_SYSTASKGT,
    136 		SDT_SYS286IGT,
    137 		SDT_SYS286TGT,
    138 		SDT_SYSNULL2,
    139 		SDT_SYS386TSS,
    140 		SDT_SYSNULL3,
    141 		SDT_SYS386BSY,
    142 		SDT_SYS386CGT,
    143 		SDT_SYSNULL4,
    144 		SDT_SYS386IGT,
    145 		SDT_SYS386TGT
    146 	};
    147 	size_t i;
    148 
    149 	if (!user_ldt_supported) {
    150 		atf_tc_skip("USER_LDT disabled");
    151 	}
    152 
    153 	/* The first LDT slots should not be settable. */
    154 	for (i = 0; i < 10; i++) {
    155 		build_desc(&desc, ldt_base, PAGE_SIZE, SDT_MEMRW,
    156 		    SEL_UPL, 1, 0);
    157 		ATF_REQUIRE_EQ(i386_set_ldt(i, &desc, 1), -1);
    158 		ATF_REQUIRE_EQ(errno, EINVAL);
    159 	}
    160 
    161 	/* SEL_KPL should not be allowed. */
    162 	build_desc(&desc, ldt_base, PAGE_SIZE, SDT_MEMRW, SEL_KPL, 1, 0);
    163 	ATF_REQUIRE_EQ(i386_set_ldt(256, &desc, 1), -1);
    164 	ATF_REQUIRE_EQ(errno, EACCES);
    165 
    166 	/* Long-mode segments should not be allowed. */
    167 	build_desc(&desc, ldt_base, PAGE_SIZE, SDT_MEMRW, SEL_UPL, 1, 0);
    168 	desc.sd.sd_xx = 0b11; /* sd_avl | sd_long */
    169 	ATF_REQUIRE_EQ(i386_set_ldt(256, &desc, 1), -1);
    170 	ATF_REQUIRE_EQ(errno, EACCES);
    171 
    172 	/* No forbidden type should be allowed. */
    173 	for (i = 0; i < __arraycount(forbidden_types); i++) {
    174 		build_desc(&desc, ldt_base, PAGE_SIZE, forbidden_types[i],
    175 		    SEL_UPL, 1, 0);
    176 		ATF_REQUIRE_EQ(i386_set_ldt(256, &desc, 1), -1);
    177 		ATF_REQUIRE_EQ(errno, EACCES);
    178 	}
    179 
    180 	/* Check the slot limit. */
    181 	build_desc(&desc, ldt_base, PAGE_SIZE, SDT_MEMRW, SEL_UPL, 1, 0);
    182 	ATF_REQUIRE_EQ(i386_set_ldt(MAX_USERLDT_SLOTS-1, &desc, 1),
    183 	    MAX_USERLDT_SLOTS-1);
    184 	ATF_REQUIRE_EQ(i386_set_ldt(MAX_USERLDT_SLOTS, &desc, 1), -1);
    185 	ATF_REQUIRE_EQ(errno, EINVAL);
    186 }
    187 
    188 /* -------------------------------------------------------------------------- */
    189 
    190 static void
    191 iretq_gp__gp_handler(int signo, siginfo_t *sig, void *ctx)
    192 {
    193 	ATF_REQUIRE(sig->si_signo == SIGSEGV);
    194 	ATF_REQUIRE(sig->si_code == SEGV_ACCERR);
    195 	atf_tc_pass();
    196 	/* NOTREACHED */
    197 }
    198 
    199 ATF_TC(iretq_gp);
    200 ATF_TC_HEAD(iretq_gp, tc)
    201 {
    202 	atf_tc_set_md_var(tc, "descr",
    203 	    "Ensure that the kernel correctly handles iretq #GP faults");
    204 }
    205 ATF_TC_BODY(iretq_gp, tc)
    206 {
    207 	union descriptor desc;
    208 	struct sigaction act;
    209 
    210 	if (!user_ldt_supported) {
    211 		atf_tc_skip("USER_LDT disabled");
    212 	}
    213 
    214 	/* Build a desc, set %ds to it. */
    215 	build_desc(&desc, 0, 0xFFFFFUL, SDT_MEMRWA, SEL_UPL, 1, 1);
    216 	ATF_REQUIRE_EQ(i386_set_ldt(256, &desc, 1), 256);
    217 	set_ds(LSEL(256, SEL_UPL));
    218 
    219 	/* Register the fault handler. */
    220 	memset(&act, 0, sizeof(act));
    221 	act.sa_sigaction = iretq_gp__gp_handler;
    222 	act.sa_flags = SA_SIGINFO;
    223 	ATF_REQUIRE_EQ(sigaction(SIGSEGV, &act, NULL), 0);
    224 
    225 	/* Set NULL on %ds, iretq should fault. */
    226 	memset(&desc, 0, sizeof(desc));
    227 	ATF_REQUIRE_EQ(i386_set_ldt(256, &desc, 1), 256);
    228 
    229 	atf_tc_fail("test did not fault as expected");
    230 }
    231 
    232 /* -------------------------------------------------------------------------- */
    233 
    234 static void
    235 iretq_np__np_handler(int signo, siginfo_t *sig, void *ctx)
    236 {
    237 	ATF_REQUIRE(sig->si_signo == SIGBUS);
    238 	ATF_REQUIRE(sig->si_code == BUS_ADRERR);
    239 	atf_tc_pass();
    240 	/* NOTREACHED */
    241 }
    242 
    243 ATF_TC(iretq_np);
    244 ATF_TC_HEAD(iretq_np, tc)
    245 {
    246 	atf_tc_set_md_var(tc, "descr",
    247 	    "Ensure that the kernel correctly handles iretq #NP faults");
    248 }
    249 ATF_TC_BODY(iretq_np, tc)
    250 {
    251 	union descriptor desc;
    252 	struct sigaction act;
    253 
    254 	if (!user_ldt_supported) {
    255 		atf_tc_skip("USER_LDT disabled");
    256 	}
    257 
    258 	/* Build a desc, set %ds to it. */
    259 	build_desc(&desc, 0, 0xFFFFFFFFUL, SDT_MEMRWA, SEL_UPL, 1, 1);
    260 	ATF_REQUIRE_EQ(i386_set_ldt(256, &desc, 1), 256);
    261 	set_ds(LSEL(256, SEL_UPL));
    262 
    263 	/* Register the fault handler. */
    264 	memset(&act, 0, sizeof(act));
    265 	act.sa_sigaction = iretq_np__np_handler;
    266 	act.sa_flags = SA_SIGINFO;
    267 	ATF_REQUIRE_EQ(sigaction(SIGBUS, &act, NULL), 0);
    268 
    269 	/* Set non-present on %ds, iretq should fault. */
    270 	desc.sd.sd_p = 0;
    271 	ATF_REQUIRE_EQ(i386_set_ldt(256, &desc, 1), 256);
    272 
    273 	atf_tc_fail("test did not fault as expected");
    274 }
    275 
    276 /* -------------------------------------------------------------------------- */
    277 
    278 static volatile bool expect_crash;
    279 
    280 static void
    281 user_ldt__gp_handler(int signo, siginfo_t *sig, void *ctx)
    282 {
    283 	ucontext_t *uctx = ctx;
    284 	extern uint8_t fs_read_begin;
    285 
    286 	if (!expect_crash) {
    287 		atf_tc_fail("unexpected #GP");
    288 	}
    289 
    290 	ATF_REQUIRE(sig->si_signo == SIGSEGV);
    291 	ATF_REQUIRE(sig->si_code == SEGV_ACCERR);
    292 
    293 	if (uctx->uc_mcontext.__gregs[_REG_EIP] != (intptr_t)&fs_read_begin) {
    294 		atf_tc_fail("got #GP on the wrong instruction");
    295 	}
    296 
    297 	set_fs(GSEL(GUDATA_SEL, SEL_UPL));
    298 
    299 	atf_tc_pass();
    300 	/* NOTREACHED */
    301 }
    302 
    303 ATF_TC(user_ldt);
    304 ATF_TC_HEAD(user_ldt, tc)
    305 {
    306 	atf_tc_set_md_var(tc, "descr",
    307 	    "Ensure that USER_LDT works as expected");
    308 }
    309 ATF_TC_BODY(user_ldt, tc)
    310 {
    311 	union descriptor desc;
    312 	struct sigaction act;
    313 
    314 	if (!user_ldt_supported) {
    315 		atf_tc_skip("USER_LDT disabled");
    316 	}
    317 
    318 	memset(&act, 0, sizeof(act));
    319 	act.sa_sigaction = user_ldt__gp_handler;
    320 	act.sa_flags = SA_SIGINFO;
    321 	ATF_REQUIRE_EQ(sigaction(SIGSEGV, &act, NULL), 0);
    322 
    323 	build_desc(&desc, ldt_base, PAGE_SIZE, SDT_MEMRW, SEL_UPL, 1, 0);
    324 	ATF_REQUIRE_EQ(i386_set_ldt(256, &desc, 1), 256);
    325 
    326 	set_fs(LSEL(256, SEL_UPL));
    327 
    328 	ldt_base[666] = 123;
    329 	ldt_base[PAGE_SIZE-1] = 213;
    330 	__insn_barrier();
    331 	ATF_REQUIRE_EQ(get_fs_byte((char *)666), 123);
    332 	ATF_REQUIRE_EQ(get_fs_byte((char *)PAGE_SIZE-1), 213);
    333 
    334 	/* This one should fault, and it concludes our test case. */
    335 	expect_crash = true;
    336 	get_fs_byte((char *)PAGE_SIZE);
    337 
    338 	atf_tc_fail("test did not fault as expected");
    339 }
    340 
    341 /* -------------------------------------------------------------------------- */
    342 
    343 ATF_TP_ADD_TCS(tp)
    344 {
    345 	user_ldt_detect();
    346 	init_ldt_base();
    347 
    348 	ATF_TP_ADD_TC(tp, filter_ops);
    349 	ATF_TP_ADD_TC(tp, iretq_gp);
    350 	ATF_TP_ADD_TC(tp, iretq_np);
    351 	ATF_TP_ADD_TC(tp, user_ldt);
    352 
    353 	return atf_no_error();
    354 }
    355