glibc/sysdeps/unix/sysv/linux/x86/tst-cet-setcontext-1.c
H.J. Lu edb5e0c8f9 x86/cet: Sync with Linux kernel 6.6 shadow stack interface
Sync with Linux kernel 6.6 shadow stack interface.  Since only x86-64 is
supported, i386 shadow stack codes are unchanged and CET shouldn't be
enabled for i386.

1. When the shadow stack base in TCB is unset, the default shadow stack
is in use.  Use the current shadow stack pointer as the marker for the
default shadow stack. It is used to identify if the current shadow stack
is the same as the target shadow stack when switching ucontexts.  If yes,
INCSSP will be used to unwind shadow stack.  Otherwise, shadow stack
restore token will be used.
2. Allocate shadow stack with the map_shadow_stack syscall.  Since there
is no function to explicitly release ucontext, there is no place to
release shadow stack allocated by map_shadow_stack in ucontext functions.
Such shadow stacks will be leaked.
3. Rename arch_prctl CET commands to ARCH_SHSTK_XXX.
4. Rewrite the CET control functions with the current kernel shadow stack
interface.

Since CET is no longer enabled by kernel, a separate patch will enable
shadow stack during startup.
2024-01-01 05:22:48 -08:00

126 lines
3.5 KiB
C

/* Check getcontext and setcontext on the context from makecontext
with shadow stack.
Copyright (C) 2018-2023 Free Software Foundation, Inc.
This file is part of the GNU C Library.
The GNU C Library is free software; you can redistribute it and/or
modify it under the terms of the GNU Lesser General Public
License as published by the Free Software Foundation; either
version 2.1 of the License, or (at your option) any later version.
The GNU C Library is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public
License along with the GNU C Library; if not, see
<https://www.gnu.org/licenses/>. */
#include <stdio.h>
#include <stdint.h>
#include <stdlib.h>
#include <ucontext.h>
#include <unistd.h>
#include <sys/mman.h>
#include <stdatomic.h>
#include <x86intrin.h>
static ucontext_t ctx[5];
static atomic_int done;
static void
__attribute__((noinline, noclone))
f2 (void)
{
printf ("start f2\n");
done++;
if (setcontext (&ctx[2]) != 0)
{
printf ("%s: setcontext: %m\n", __FUNCTION__);
exit (EXIT_FAILURE);
}
}
static void
f1 (void)
{
printf ("start f1\n");
if (getcontext (&ctx[2]) != 0)
{
printf ("%s: getcontext: %m\n", __FUNCTION__);
exit (EXIT_FAILURE);
}
if (done)
exit (EXIT_SUCCESS);
f2 ();
}
static int
do_test (void)
{
char st1[32768];
puts ("making contexts");
if (getcontext (&ctx[0]) != 0)
{
printf ("%s: getcontext: %m\n", __FUNCTION__);
exit (EXIT_FAILURE);
}
if (getcontext (&ctx[1]) != 0)
{
printf ("%s: getcontext: %m\n", __FUNCTION__);
exit (EXIT_FAILURE);
}
ctx[3].uc_stack.ss_sp = st1;
ctx[3].uc_stack.ss_size = sizeof st1;
ctx[3].uc_link = &ctx[0];
makecontext (&ctx[3], (void (*) (void)) f1, 0);
ctx[1].uc_stack.ss_sp = st1;
ctx[1].uc_stack.ss_size = sizeof st1;
ctx[1].uc_link = &ctx[0];
makecontext (&ctx[1], (void (*) (void)) f1, 0);
ctx[4].uc_stack.ss_sp = st1;
ctx[4].uc_stack.ss_size = sizeof st1;
ctx[4].uc_link = &ctx[0];
makecontext (&ctx[4], (void (*) (void)) f1, 0);
/* NB: When shadow stack is enabled, makecontext calls map_shadow_stack
to allocate a new shadow stack which can be unmapped. The base
address and size of the new shadow stack are returned in __ssp[1]
and __ssp[2]. makecontext is called for CTX1, CTX3 and CTX4. But
only CTX1 is used. New shadow stacks are allocated in the order
of CTX3, CTX1, CTX4. It is very likely that CTX1's shadow stack is
placed between CTX3 and CTX4. We munmap CTX3's and CTX4's shadow
stacks to create gaps above and below CTX1's shadow stack. We check
that setcontext CTX1 works correctly in this case. */
if (_get_ssp () != 0)
{
if (ctx[3].__ssp[1] != 0
&& munmap ((void *) (uintptr_t) ctx[3].__ssp[1],
(size_t) ctx[3].__ssp[2]) != 0)
{
printf ("%s: munmap: %m\n", __FUNCTION__);
exit (EXIT_FAILURE);
}
if (ctx[4].__ssp[1] != 0
&& munmap ((void *) (uintptr_t) ctx[4].__ssp[1],
(size_t) ctx[4].__ssp[2]) != 0)
{
printf ("%s: munmap: %m\n", __FUNCTION__);
exit (EXIT_FAILURE);
}
}
if (setcontext (&ctx[1]) != 0)
{
printf ("%s: setcontext: %m\n", __FUNCTION__);
exit (EXIT_FAILURE);
}
exit (EXIT_FAILURE);
}
#include <support/test-driver.c>