xref: /OK3568_Linux_fs/kernel/tools/testing/selftests/arm64/pauth/pac.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun // Copyright (C) 2020 ARM Limited
3*4882a593Smuzhiyun 
4*4882a593Smuzhiyun #define _GNU_SOURCE
5*4882a593Smuzhiyun 
6*4882a593Smuzhiyun #include <sys/auxv.h>
7*4882a593Smuzhiyun #include <sys/types.h>
8*4882a593Smuzhiyun #include <sys/wait.h>
9*4882a593Smuzhiyun #include <signal.h>
10*4882a593Smuzhiyun #include <setjmp.h>
11*4882a593Smuzhiyun #include <sched.h>
12*4882a593Smuzhiyun 
13*4882a593Smuzhiyun #include "../../kselftest_harness.h"
14*4882a593Smuzhiyun #include "helper.h"
15*4882a593Smuzhiyun 
16*4882a593Smuzhiyun #define PAC_COLLISION_ATTEMPTS 10
17*4882a593Smuzhiyun /*
18*4882a593Smuzhiyun  * The kernel sets TBID by default. So bits 55 and above should remain
19*4882a593Smuzhiyun  * untouched no matter what.
20*4882a593Smuzhiyun  * The VA space size is 48 bits. Bigger is opt-in.
21*4882a593Smuzhiyun  */
22*4882a593Smuzhiyun #define PAC_MASK (~0xff80ffffffffffff)
23*4882a593Smuzhiyun #define ARBITRARY_VALUE (0x1234)
24*4882a593Smuzhiyun #define ASSERT_PAUTH_ENABLED() \
25*4882a593Smuzhiyun do { \
26*4882a593Smuzhiyun 	unsigned long hwcaps = getauxval(AT_HWCAP); \
27*4882a593Smuzhiyun 	/* data key instructions are not in NOP space. This prevents a SIGILL */ \
28*4882a593Smuzhiyun 	if (!(hwcaps & HWCAP_PACA))					\
29*4882a593Smuzhiyun 		SKIP(return, "PAUTH not enabled"); \
30*4882a593Smuzhiyun } while (0)
31*4882a593Smuzhiyun #define ASSERT_GENERIC_PAUTH_ENABLED() \
32*4882a593Smuzhiyun do { \
33*4882a593Smuzhiyun 	unsigned long hwcaps = getauxval(AT_HWCAP); \
34*4882a593Smuzhiyun 	/* generic key instructions are not in NOP space. This prevents a SIGILL */ \
35*4882a593Smuzhiyun 	if (!(hwcaps & HWCAP_PACG)) \
36*4882a593Smuzhiyun 		SKIP(return, "Generic PAUTH not enabled");	\
37*4882a593Smuzhiyun } while (0)
38*4882a593Smuzhiyun 
sign_specific(struct signatures * sign,size_t val)39*4882a593Smuzhiyun void sign_specific(struct signatures *sign, size_t val)
40*4882a593Smuzhiyun {
41*4882a593Smuzhiyun 	sign->keyia = keyia_sign(val);
42*4882a593Smuzhiyun 	sign->keyib = keyib_sign(val);
43*4882a593Smuzhiyun 	sign->keyda = keyda_sign(val);
44*4882a593Smuzhiyun 	sign->keydb = keydb_sign(val);
45*4882a593Smuzhiyun }
46*4882a593Smuzhiyun 
sign_all(struct signatures * sign,size_t val)47*4882a593Smuzhiyun void sign_all(struct signatures *sign, size_t val)
48*4882a593Smuzhiyun {
49*4882a593Smuzhiyun 	sign->keyia = keyia_sign(val);
50*4882a593Smuzhiyun 	sign->keyib = keyib_sign(val);
51*4882a593Smuzhiyun 	sign->keyda = keyda_sign(val);
52*4882a593Smuzhiyun 	sign->keydb = keydb_sign(val);
53*4882a593Smuzhiyun 	sign->keyg  = keyg_sign(val);
54*4882a593Smuzhiyun }
55*4882a593Smuzhiyun 
n_same(struct signatures * old,struct signatures * new,int nkeys)56*4882a593Smuzhiyun int n_same(struct signatures *old, struct signatures *new, int nkeys)
57*4882a593Smuzhiyun {
58*4882a593Smuzhiyun 	int res = 0;
59*4882a593Smuzhiyun 
60*4882a593Smuzhiyun 	res += old->keyia == new->keyia;
61*4882a593Smuzhiyun 	res += old->keyib == new->keyib;
62*4882a593Smuzhiyun 	res += old->keyda == new->keyda;
63*4882a593Smuzhiyun 	res += old->keydb == new->keydb;
64*4882a593Smuzhiyun 	if (nkeys == NKEYS)
65*4882a593Smuzhiyun 		res += old->keyg == new->keyg;
66*4882a593Smuzhiyun 
67*4882a593Smuzhiyun 	return res;
68*4882a593Smuzhiyun }
69*4882a593Smuzhiyun 
n_same_single_set(struct signatures * sign,int nkeys)70*4882a593Smuzhiyun int n_same_single_set(struct signatures *sign, int nkeys)
71*4882a593Smuzhiyun {
72*4882a593Smuzhiyun 	size_t vals[nkeys];
73*4882a593Smuzhiyun 	int same = 0;
74*4882a593Smuzhiyun 
75*4882a593Smuzhiyun 	vals[0] = sign->keyia & PAC_MASK;
76*4882a593Smuzhiyun 	vals[1] = sign->keyib & PAC_MASK;
77*4882a593Smuzhiyun 	vals[2] = sign->keyda & PAC_MASK;
78*4882a593Smuzhiyun 	vals[3] = sign->keydb & PAC_MASK;
79*4882a593Smuzhiyun 
80*4882a593Smuzhiyun 	if (nkeys >= 4)
81*4882a593Smuzhiyun 		vals[4] = sign->keyg & PAC_MASK;
82*4882a593Smuzhiyun 
83*4882a593Smuzhiyun 	for (int i = 0; i < nkeys - 1; i++) {
84*4882a593Smuzhiyun 		for (int j = i + 1; j < nkeys; j++) {
85*4882a593Smuzhiyun 			if (vals[i] == vals[j])
86*4882a593Smuzhiyun 				same += 1;
87*4882a593Smuzhiyun 		}
88*4882a593Smuzhiyun 	}
89*4882a593Smuzhiyun 	return same;
90*4882a593Smuzhiyun }
91*4882a593Smuzhiyun 
exec_sign_all(struct signatures * signed_vals,size_t val)92*4882a593Smuzhiyun int exec_sign_all(struct signatures *signed_vals, size_t val)
93*4882a593Smuzhiyun {
94*4882a593Smuzhiyun 	int new_stdin[2];
95*4882a593Smuzhiyun 	int new_stdout[2];
96*4882a593Smuzhiyun 	int status;
97*4882a593Smuzhiyun 	int i;
98*4882a593Smuzhiyun 	ssize_t ret;
99*4882a593Smuzhiyun 	pid_t pid;
100*4882a593Smuzhiyun 	cpu_set_t mask;
101*4882a593Smuzhiyun 
102*4882a593Smuzhiyun 	ret = pipe(new_stdin);
103*4882a593Smuzhiyun 	if (ret == -1) {
104*4882a593Smuzhiyun 		perror("pipe returned error");
105*4882a593Smuzhiyun 		return -1;
106*4882a593Smuzhiyun 	}
107*4882a593Smuzhiyun 
108*4882a593Smuzhiyun 	ret = pipe(new_stdout);
109*4882a593Smuzhiyun 	if (ret == -1) {
110*4882a593Smuzhiyun 		perror("pipe returned error");
111*4882a593Smuzhiyun 		return -1;
112*4882a593Smuzhiyun 	}
113*4882a593Smuzhiyun 
114*4882a593Smuzhiyun 	/*
115*4882a593Smuzhiyun 	 * pin this process and all its children to a single CPU, so it can also
116*4882a593Smuzhiyun 	 * guarantee a context switch with its child
117*4882a593Smuzhiyun 	 */
118*4882a593Smuzhiyun 	sched_getaffinity(0, sizeof(mask), &mask);
119*4882a593Smuzhiyun 
120*4882a593Smuzhiyun 	for (i = 0; i < sizeof(cpu_set_t); i++)
121*4882a593Smuzhiyun 		if (CPU_ISSET(i, &mask))
122*4882a593Smuzhiyun 			break;
123*4882a593Smuzhiyun 
124*4882a593Smuzhiyun 	CPU_ZERO(&mask);
125*4882a593Smuzhiyun 	CPU_SET(i, &mask);
126*4882a593Smuzhiyun 	sched_setaffinity(0, sizeof(mask), &mask);
127*4882a593Smuzhiyun 
128*4882a593Smuzhiyun 	pid = fork();
129*4882a593Smuzhiyun 	// child
130*4882a593Smuzhiyun 	if (pid == 0) {
131*4882a593Smuzhiyun 		dup2(new_stdin[0], STDIN_FILENO);
132*4882a593Smuzhiyun 		if (ret == -1) {
133*4882a593Smuzhiyun 			perror("dup2 returned error");
134*4882a593Smuzhiyun 			exit(1);
135*4882a593Smuzhiyun 		}
136*4882a593Smuzhiyun 
137*4882a593Smuzhiyun 		dup2(new_stdout[1], STDOUT_FILENO);
138*4882a593Smuzhiyun 		if (ret == -1) {
139*4882a593Smuzhiyun 			perror("dup2 returned error");
140*4882a593Smuzhiyun 			exit(1);
141*4882a593Smuzhiyun 		}
142*4882a593Smuzhiyun 
143*4882a593Smuzhiyun 		close(new_stdin[0]);
144*4882a593Smuzhiyun 		close(new_stdin[1]);
145*4882a593Smuzhiyun 		close(new_stdout[0]);
146*4882a593Smuzhiyun 		close(new_stdout[1]);
147*4882a593Smuzhiyun 
148*4882a593Smuzhiyun 		ret = execl("exec_target", "exec_target", (char *)NULL);
149*4882a593Smuzhiyun 		if (ret == -1) {
150*4882a593Smuzhiyun 			perror("exec returned error");
151*4882a593Smuzhiyun 			exit(1);
152*4882a593Smuzhiyun 		}
153*4882a593Smuzhiyun 	}
154*4882a593Smuzhiyun 
155*4882a593Smuzhiyun 	close(new_stdin[0]);
156*4882a593Smuzhiyun 	close(new_stdout[1]);
157*4882a593Smuzhiyun 
158*4882a593Smuzhiyun 	ret = write(new_stdin[1], &val, sizeof(size_t));
159*4882a593Smuzhiyun 	if (ret == -1) {
160*4882a593Smuzhiyun 		perror("write returned error");
161*4882a593Smuzhiyun 		return -1;
162*4882a593Smuzhiyun 	}
163*4882a593Smuzhiyun 
164*4882a593Smuzhiyun 	/*
165*4882a593Smuzhiyun 	 * wait for the worker to finish, so that read() reads all data
166*4882a593Smuzhiyun 	 * will also context switch with worker so that this function can be used
167*4882a593Smuzhiyun 	 * for context switch tests
168*4882a593Smuzhiyun 	 */
169*4882a593Smuzhiyun 	waitpid(pid, &status, 0);
170*4882a593Smuzhiyun 	if (WIFEXITED(status) == 0) {
171*4882a593Smuzhiyun 		fprintf(stderr, "worker exited unexpectedly\n");
172*4882a593Smuzhiyun 		return -1;
173*4882a593Smuzhiyun 	}
174*4882a593Smuzhiyun 	if (WEXITSTATUS(status) != 0) {
175*4882a593Smuzhiyun 		fprintf(stderr, "worker exited with error\n");
176*4882a593Smuzhiyun 		return -1;
177*4882a593Smuzhiyun 	}
178*4882a593Smuzhiyun 
179*4882a593Smuzhiyun 	ret = read(new_stdout[0], signed_vals, sizeof(struct signatures));
180*4882a593Smuzhiyun 	if (ret == -1) {
181*4882a593Smuzhiyun 		perror("read returned error");
182*4882a593Smuzhiyun 		return -1;
183*4882a593Smuzhiyun 	}
184*4882a593Smuzhiyun 
185*4882a593Smuzhiyun 	return 0;
186*4882a593Smuzhiyun }
187*4882a593Smuzhiyun 
188*4882a593Smuzhiyun sigjmp_buf jmpbuf;
pac_signal_handler(int signum,siginfo_t * si,void * uc)189*4882a593Smuzhiyun void pac_signal_handler(int signum, siginfo_t *si, void *uc)
190*4882a593Smuzhiyun {
191*4882a593Smuzhiyun 	if (signum == SIGSEGV || signum == SIGILL)
192*4882a593Smuzhiyun 		siglongjmp(jmpbuf, 1);
193*4882a593Smuzhiyun }
194*4882a593Smuzhiyun 
195*4882a593Smuzhiyun /* check that a corrupted PAC results in SIGSEGV or SIGILL */
TEST(corrupt_pac)196*4882a593Smuzhiyun TEST(corrupt_pac)
197*4882a593Smuzhiyun {
198*4882a593Smuzhiyun 	struct sigaction sa;
199*4882a593Smuzhiyun 
200*4882a593Smuzhiyun 	ASSERT_PAUTH_ENABLED();
201*4882a593Smuzhiyun 	if (sigsetjmp(jmpbuf, 1) == 0) {
202*4882a593Smuzhiyun 		sa.sa_sigaction = pac_signal_handler;
203*4882a593Smuzhiyun 		sa.sa_flags = SA_SIGINFO | SA_RESETHAND;
204*4882a593Smuzhiyun 		sigemptyset(&sa.sa_mask);
205*4882a593Smuzhiyun 
206*4882a593Smuzhiyun 		sigaction(SIGSEGV, &sa, NULL);
207*4882a593Smuzhiyun 		sigaction(SIGILL, &sa, NULL);
208*4882a593Smuzhiyun 
209*4882a593Smuzhiyun 		pac_corruptor();
210*4882a593Smuzhiyun 		ASSERT_TRUE(0) TH_LOG("SIGSEGV/SIGILL signal did not occur");
211*4882a593Smuzhiyun 	}
212*4882a593Smuzhiyun }
213*4882a593Smuzhiyun 
214*4882a593Smuzhiyun /*
215*4882a593Smuzhiyun  * There are no separate pac* and aut* controls so checking only the pac*
216*4882a593Smuzhiyun  * instructions is sufficient
217*4882a593Smuzhiyun  */
TEST(pac_instructions_not_nop)218*4882a593Smuzhiyun TEST(pac_instructions_not_nop)
219*4882a593Smuzhiyun {
220*4882a593Smuzhiyun 	size_t keyia = 0;
221*4882a593Smuzhiyun 	size_t keyib = 0;
222*4882a593Smuzhiyun 	size_t keyda = 0;
223*4882a593Smuzhiyun 	size_t keydb = 0;
224*4882a593Smuzhiyun 
225*4882a593Smuzhiyun 	ASSERT_PAUTH_ENABLED();
226*4882a593Smuzhiyun 
227*4882a593Smuzhiyun 	for (int i = 0; i < PAC_COLLISION_ATTEMPTS; i++) {
228*4882a593Smuzhiyun 		keyia |= keyia_sign(i) & PAC_MASK;
229*4882a593Smuzhiyun 		keyib |= keyib_sign(i) & PAC_MASK;
230*4882a593Smuzhiyun 		keyda |= keyda_sign(i) & PAC_MASK;
231*4882a593Smuzhiyun 		keydb |= keydb_sign(i) & PAC_MASK;
232*4882a593Smuzhiyun 	}
233*4882a593Smuzhiyun 
234*4882a593Smuzhiyun 	ASSERT_NE(0, keyia) TH_LOG("keyia instructions did nothing");
235*4882a593Smuzhiyun 	ASSERT_NE(0, keyib) TH_LOG("keyib instructions did nothing");
236*4882a593Smuzhiyun 	ASSERT_NE(0, keyda) TH_LOG("keyda instructions did nothing");
237*4882a593Smuzhiyun 	ASSERT_NE(0, keydb) TH_LOG("keydb instructions did nothing");
238*4882a593Smuzhiyun }
239*4882a593Smuzhiyun 
TEST(pac_instructions_not_nop_generic)240*4882a593Smuzhiyun TEST(pac_instructions_not_nop_generic)
241*4882a593Smuzhiyun {
242*4882a593Smuzhiyun 	size_t keyg = 0;
243*4882a593Smuzhiyun 
244*4882a593Smuzhiyun 	ASSERT_GENERIC_PAUTH_ENABLED();
245*4882a593Smuzhiyun 
246*4882a593Smuzhiyun 	for (int i = 0; i < PAC_COLLISION_ATTEMPTS; i++)
247*4882a593Smuzhiyun 		keyg |= keyg_sign(i) & PAC_MASK;
248*4882a593Smuzhiyun 
249*4882a593Smuzhiyun 	ASSERT_NE(0, keyg)  TH_LOG("keyg instructions did nothing");
250*4882a593Smuzhiyun }
251*4882a593Smuzhiyun 
TEST(single_thread_different_keys)252*4882a593Smuzhiyun TEST(single_thread_different_keys)
253*4882a593Smuzhiyun {
254*4882a593Smuzhiyun 	int same = 10;
255*4882a593Smuzhiyun 	int nkeys = NKEYS;
256*4882a593Smuzhiyun 	int tmp;
257*4882a593Smuzhiyun 	struct signatures signed_vals;
258*4882a593Smuzhiyun 	unsigned long hwcaps = getauxval(AT_HWCAP);
259*4882a593Smuzhiyun 
260*4882a593Smuzhiyun 	/* generic and data key instructions are not in NOP space. This prevents a SIGILL */
261*4882a593Smuzhiyun 	ASSERT_PAUTH_ENABLED();
262*4882a593Smuzhiyun 	if (!(hwcaps & HWCAP_PACG)) {
263*4882a593Smuzhiyun 		TH_LOG("WARNING: Generic PAUTH not enabled. Skipping generic key checks");
264*4882a593Smuzhiyun 		nkeys = NKEYS - 1;
265*4882a593Smuzhiyun 	}
266*4882a593Smuzhiyun 
267*4882a593Smuzhiyun 	/*
268*4882a593Smuzhiyun 	 * In Linux the PAC field can be up to 7 bits wide. Even if keys are
269*4882a593Smuzhiyun 	 * different, there is about 5% chance for PACs to collide with
270*4882a593Smuzhiyun 	 * different addresses. This chance rapidly increases with fewer bits
271*4882a593Smuzhiyun 	 * allocated for the PAC (e.g. wider address). A comparison of the keys
272*4882a593Smuzhiyun 	 * directly will be more reliable.
273*4882a593Smuzhiyun 	 * All signed values need to be different at least once out of n
274*4882a593Smuzhiyun 	 * attempts to be certain that the keys are different
275*4882a593Smuzhiyun 	 */
276*4882a593Smuzhiyun 	for (int i = 0; i < PAC_COLLISION_ATTEMPTS; i++) {
277*4882a593Smuzhiyun 		if (nkeys == NKEYS)
278*4882a593Smuzhiyun 			sign_all(&signed_vals, i);
279*4882a593Smuzhiyun 		else
280*4882a593Smuzhiyun 			sign_specific(&signed_vals, i);
281*4882a593Smuzhiyun 
282*4882a593Smuzhiyun 		tmp = n_same_single_set(&signed_vals, nkeys);
283*4882a593Smuzhiyun 		if (tmp < same)
284*4882a593Smuzhiyun 			same = tmp;
285*4882a593Smuzhiyun 	}
286*4882a593Smuzhiyun 
287*4882a593Smuzhiyun 	ASSERT_EQ(0, same) TH_LOG("%d keys clashed every time", same);
288*4882a593Smuzhiyun }
289*4882a593Smuzhiyun 
290*4882a593Smuzhiyun /*
291*4882a593Smuzhiyun  * fork() does not change keys. Only exec() does so call a worker program.
292*4882a593Smuzhiyun  * Its only job is to sign a value and report back the resutls
293*4882a593Smuzhiyun  */
TEST(exec_changed_keys)294*4882a593Smuzhiyun TEST(exec_changed_keys)
295*4882a593Smuzhiyun {
296*4882a593Smuzhiyun 	struct signatures new_keys;
297*4882a593Smuzhiyun 	struct signatures old_keys;
298*4882a593Smuzhiyun 	int ret;
299*4882a593Smuzhiyun 	int same = 10;
300*4882a593Smuzhiyun 	int nkeys = NKEYS;
301*4882a593Smuzhiyun 	unsigned long hwcaps = getauxval(AT_HWCAP);
302*4882a593Smuzhiyun 
303*4882a593Smuzhiyun 	/* generic and data key instructions are not in NOP space. This prevents a SIGILL */
304*4882a593Smuzhiyun 	ASSERT_PAUTH_ENABLED();
305*4882a593Smuzhiyun 	if (!(hwcaps & HWCAP_PACG)) {
306*4882a593Smuzhiyun 		TH_LOG("WARNING: Generic PAUTH not enabled. Skipping generic key checks");
307*4882a593Smuzhiyun 		nkeys = NKEYS - 1;
308*4882a593Smuzhiyun 	}
309*4882a593Smuzhiyun 
310*4882a593Smuzhiyun 	for (int i = 0; i < PAC_COLLISION_ATTEMPTS; i++) {
311*4882a593Smuzhiyun 		ret = exec_sign_all(&new_keys, i);
312*4882a593Smuzhiyun 		ASSERT_EQ(0, ret) TH_LOG("failed to run worker");
313*4882a593Smuzhiyun 
314*4882a593Smuzhiyun 		if (nkeys == NKEYS)
315*4882a593Smuzhiyun 			sign_all(&old_keys, i);
316*4882a593Smuzhiyun 		else
317*4882a593Smuzhiyun 			sign_specific(&old_keys, i);
318*4882a593Smuzhiyun 
319*4882a593Smuzhiyun 		ret = n_same(&old_keys, &new_keys, nkeys);
320*4882a593Smuzhiyun 		if (ret < same)
321*4882a593Smuzhiyun 			same = ret;
322*4882a593Smuzhiyun 	}
323*4882a593Smuzhiyun 
324*4882a593Smuzhiyun 	ASSERT_EQ(0, same) TH_LOG("exec() did not change %d keys", same);
325*4882a593Smuzhiyun }
326*4882a593Smuzhiyun 
TEST(context_switch_keep_keys)327*4882a593Smuzhiyun TEST(context_switch_keep_keys)
328*4882a593Smuzhiyun {
329*4882a593Smuzhiyun 	int ret;
330*4882a593Smuzhiyun 	struct signatures trash;
331*4882a593Smuzhiyun 	struct signatures before;
332*4882a593Smuzhiyun 	struct signatures after;
333*4882a593Smuzhiyun 
334*4882a593Smuzhiyun 	ASSERT_PAUTH_ENABLED();
335*4882a593Smuzhiyun 
336*4882a593Smuzhiyun 	sign_specific(&before, ARBITRARY_VALUE);
337*4882a593Smuzhiyun 
338*4882a593Smuzhiyun 	/* will context switch with a process with different keys at least once */
339*4882a593Smuzhiyun 	ret = exec_sign_all(&trash, ARBITRARY_VALUE);
340*4882a593Smuzhiyun 	ASSERT_EQ(0, ret) TH_LOG("failed to run worker");
341*4882a593Smuzhiyun 
342*4882a593Smuzhiyun 	sign_specific(&after, ARBITRARY_VALUE);
343*4882a593Smuzhiyun 
344*4882a593Smuzhiyun 	ASSERT_EQ(before.keyia, after.keyia) TH_LOG("keyia changed after context switching");
345*4882a593Smuzhiyun 	ASSERT_EQ(before.keyib, after.keyib) TH_LOG("keyib changed after context switching");
346*4882a593Smuzhiyun 	ASSERT_EQ(before.keyda, after.keyda) TH_LOG("keyda changed after context switching");
347*4882a593Smuzhiyun 	ASSERT_EQ(before.keydb, after.keydb) TH_LOG("keydb changed after context switching");
348*4882a593Smuzhiyun }
349*4882a593Smuzhiyun 
TEST(context_switch_keep_keys_generic)350*4882a593Smuzhiyun TEST(context_switch_keep_keys_generic)
351*4882a593Smuzhiyun {
352*4882a593Smuzhiyun 	int ret;
353*4882a593Smuzhiyun 	struct signatures trash;
354*4882a593Smuzhiyun 	size_t before;
355*4882a593Smuzhiyun 	size_t after;
356*4882a593Smuzhiyun 
357*4882a593Smuzhiyun 	ASSERT_GENERIC_PAUTH_ENABLED();
358*4882a593Smuzhiyun 
359*4882a593Smuzhiyun 	before = keyg_sign(ARBITRARY_VALUE);
360*4882a593Smuzhiyun 
361*4882a593Smuzhiyun 	/* will context switch with a process with different keys at least once */
362*4882a593Smuzhiyun 	ret = exec_sign_all(&trash, ARBITRARY_VALUE);
363*4882a593Smuzhiyun 	ASSERT_EQ(0, ret) TH_LOG("failed to run worker");
364*4882a593Smuzhiyun 
365*4882a593Smuzhiyun 	after = keyg_sign(ARBITRARY_VALUE);
366*4882a593Smuzhiyun 
367*4882a593Smuzhiyun 	ASSERT_EQ(before, after) TH_LOG("keyg changed after context switching");
368*4882a593Smuzhiyun }
369*4882a593Smuzhiyun 
370*4882a593Smuzhiyun TEST_HARNESS_MAIN
371