xref: /OK3568_Linux_fs/kernel/tools/testing/selftests/x86/iopl.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun  * iopl.c - Test case for a Linux on Xen 64-bit bug
4*4882a593Smuzhiyun  * Copyright (c) 2015 Andrew Lutomirski
5*4882a593Smuzhiyun  */
6*4882a593Smuzhiyun 
7*4882a593Smuzhiyun #define _GNU_SOURCE
8*4882a593Smuzhiyun #include <err.h>
9*4882a593Smuzhiyun #include <stdio.h>
10*4882a593Smuzhiyun #include <stdint.h>
11*4882a593Smuzhiyun #include <signal.h>
12*4882a593Smuzhiyun #include <setjmp.h>
13*4882a593Smuzhiyun #include <stdlib.h>
14*4882a593Smuzhiyun #include <string.h>
15*4882a593Smuzhiyun #include <errno.h>
16*4882a593Smuzhiyun #include <unistd.h>
17*4882a593Smuzhiyun #include <sys/types.h>
18*4882a593Smuzhiyun #include <sys/wait.h>
19*4882a593Smuzhiyun #include <stdbool.h>
20*4882a593Smuzhiyun #include <sched.h>
21*4882a593Smuzhiyun #include <sys/io.h>
22*4882a593Smuzhiyun 
23*4882a593Smuzhiyun static int nerrs = 0;
24*4882a593Smuzhiyun 
sethandler(int sig,void (* handler)(int,siginfo_t *,void *),int flags)25*4882a593Smuzhiyun static void sethandler(int sig, void (*handler)(int, siginfo_t *, void *),
26*4882a593Smuzhiyun 		       int flags)
27*4882a593Smuzhiyun {
28*4882a593Smuzhiyun 	struct sigaction sa;
29*4882a593Smuzhiyun 	memset(&sa, 0, sizeof(sa));
30*4882a593Smuzhiyun 	sa.sa_sigaction = handler;
31*4882a593Smuzhiyun 	sa.sa_flags = SA_SIGINFO | flags;
32*4882a593Smuzhiyun 	sigemptyset(&sa.sa_mask);
33*4882a593Smuzhiyun 	if (sigaction(sig, &sa, 0))
34*4882a593Smuzhiyun 		err(1, "sigaction");
35*4882a593Smuzhiyun 
36*4882a593Smuzhiyun }
37*4882a593Smuzhiyun 
clearhandler(int sig)38*4882a593Smuzhiyun static void clearhandler(int sig)
39*4882a593Smuzhiyun {
40*4882a593Smuzhiyun 	struct sigaction sa;
41*4882a593Smuzhiyun 	memset(&sa, 0, sizeof(sa));
42*4882a593Smuzhiyun 	sa.sa_handler = SIG_DFL;
43*4882a593Smuzhiyun 	sigemptyset(&sa.sa_mask);
44*4882a593Smuzhiyun 	if (sigaction(sig, &sa, 0))
45*4882a593Smuzhiyun 		err(1, "sigaction");
46*4882a593Smuzhiyun }
47*4882a593Smuzhiyun 
48*4882a593Smuzhiyun static jmp_buf jmpbuf;
49*4882a593Smuzhiyun 
sigsegv(int sig,siginfo_t * si,void * ctx_void)50*4882a593Smuzhiyun static void sigsegv(int sig, siginfo_t *si, void *ctx_void)
51*4882a593Smuzhiyun {
52*4882a593Smuzhiyun 	siglongjmp(jmpbuf, 1);
53*4882a593Smuzhiyun }
54*4882a593Smuzhiyun 
try_outb(unsigned short port)55*4882a593Smuzhiyun static bool try_outb(unsigned short port)
56*4882a593Smuzhiyun {
57*4882a593Smuzhiyun 	sethandler(SIGSEGV, sigsegv, SA_RESETHAND);
58*4882a593Smuzhiyun 	if (sigsetjmp(jmpbuf, 1) != 0) {
59*4882a593Smuzhiyun 		return false;
60*4882a593Smuzhiyun 	} else {
61*4882a593Smuzhiyun 		asm volatile ("outb %%al, %w[port]"
62*4882a593Smuzhiyun 			      : : [port] "Nd" (port), "a" (0));
63*4882a593Smuzhiyun 		return true;
64*4882a593Smuzhiyun 	}
65*4882a593Smuzhiyun 	clearhandler(SIGSEGV);
66*4882a593Smuzhiyun }
67*4882a593Smuzhiyun 
expect_ok_outb(unsigned short port)68*4882a593Smuzhiyun static void expect_ok_outb(unsigned short port)
69*4882a593Smuzhiyun {
70*4882a593Smuzhiyun 	if (!try_outb(port)) {
71*4882a593Smuzhiyun 		printf("[FAIL]\toutb to 0x%02hx failed\n", port);
72*4882a593Smuzhiyun 		exit(1);
73*4882a593Smuzhiyun 	}
74*4882a593Smuzhiyun 
75*4882a593Smuzhiyun 	printf("[OK]\toutb to 0x%02hx worked\n", port);
76*4882a593Smuzhiyun }
77*4882a593Smuzhiyun 
expect_gp_outb(unsigned short port)78*4882a593Smuzhiyun static void expect_gp_outb(unsigned short port)
79*4882a593Smuzhiyun {
80*4882a593Smuzhiyun 	if (try_outb(port)) {
81*4882a593Smuzhiyun 		printf("[FAIL]\toutb to 0x%02hx worked\n", port);
82*4882a593Smuzhiyun 		nerrs++;
83*4882a593Smuzhiyun 	}
84*4882a593Smuzhiyun 
85*4882a593Smuzhiyun 	printf("[OK]\toutb to 0x%02hx failed\n", port);
86*4882a593Smuzhiyun }
87*4882a593Smuzhiyun 
88*4882a593Smuzhiyun #define RET_FAULTED	0
89*4882a593Smuzhiyun #define RET_FAIL	1
90*4882a593Smuzhiyun #define RET_EMUL	2
91*4882a593Smuzhiyun 
try_cli(void)92*4882a593Smuzhiyun static int try_cli(void)
93*4882a593Smuzhiyun {
94*4882a593Smuzhiyun 	unsigned long flags;
95*4882a593Smuzhiyun 
96*4882a593Smuzhiyun 	sethandler(SIGSEGV, sigsegv, SA_RESETHAND);
97*4882a593Smuzhiyun 	if (sigsetjmp(jmpbuf, 1) != 0) {
98*4882a593Smuzhiyun 		return RET_FAULTED;
99*4882a593Smuzhiyun 	} else {
100*4882a593Smuzhiyun 		asm volatile("cli; pushf; pop %[flags]"
101*4882a593Smuzhiyun 				: [flags] "=rm" (flags));
102*4882a593Smuzhiyun 
103*4882a593Smuzhiyun 		/* X86_FLAGS_IF */
104*4882a593Smuzhiyun 		if (!(flags & (1 << 9)))
105*4882a593Smuzhiyun 			return RET_FAIL;
106*4882a593Smuzhiyun 		else
107*4882a593Smuzhiyun 			return RET_EMUL;
108*4882a593Smuzhiyun 	}
109*4882a593Smuzhiyun 	clearhandler(SIGSEGV);
110*4882a593Smuzhiyun }
111*4882a593Smuzhiyun 
try_sti(bool irqs_off)112*4882a593Smuzhiyun static int try_sti(bool irqs_off)
113*4882a593Smuzhiyun {
114*4882a593Smuzhiyun 	unsigned long flags;
115*4882a593Smuzhiyun 
116*4882a593Smuzhiyun 	sethandler(SIGSEGV, sigsegv, SA_RESETHAND);
117*4882a593Smuzhiyun 	if (sigsetjmp(jmpbuf, 1) != 0) {
118*4882a593Smuzhiyun 		return RET_FAULTED;
119*4882a593Smuzhiyun 	} else {
120*4882a593Smuzhiyun 		asm volatile("sti; pushf; pop %[flags]"
121*4882a593Smuzhiyun 				: [flags] "=rm" (flags));
122*4882a593Smuzhiyun 
123*4882a593Smuzhiyun 		/* X86_FLAGS_IF */
124*4882a593Smuzhiyun 		if (irqs_off && (flags & (1 << 9)))
125*4882a593Smuzhiyun 			return RET_FAIL;
126*4882a593Smuzhiyun 		else
127*4882a593Smuzhiyun 			return RET_EMUL;
128*4882a593Smuzhiyun 	}
129*4882a593Smuzhiyun 	clearhandler(SIGSEGV);
130*4882a593Smuzhiyun }
131*4882a593Smuzhiyun 
expect_gp_sti(bool irqs_off)132*4882a593Smuzhiyun static void expect_gp_sti(bool irqs_off)
133*4882a593Smuzhiyun {
134*4882a593Smuzhiyun 	int ret = try_sti(irqs_off);
135*4882a593Smuzhiyun 
136*4882a593Smuzhiyun 	switch (ret) {
137*4882a593Smuzhiyun 	case RET_FAULTED:
138*4882a593Smuzhiyun 		printf("[OK]\tSTI faulted\n");
139*4882a593Smuzhiyun 		break;
140*4882a593Smuzhiyun 	case RET_EMUL:
141*4882a593Smuzhiyun 		printf("[OK]\tSTI NOPped\n");
142*4882a593Smuzhiyun 		break;
143*4882a593Smuzhiyun 	default:
144*4882a593Smuzhiyun 		printf("[FAIL]\tSTI worked\n");
145*4882a593Smuzhiyun 		nerrs++;
146*4882a593Smuzhiyun 	}
147*4882a593Smuzhiyun }
148*4882a593Smuzhiyun 
149*4882a593Smuzhiyun /*
150*4882a593Smuzhiyun  * Returns whether it managed to disable interrupts.
151*4882a593Smuzhiyun  */
test_cli(void)152*4882a593Smuzhiyun static bool test_cli(void)
153*4882a593Smuzhiyun {
154*4882a593Smuzhiyun 	int ret = try_cli();
155*4882a593Smuzhiyun 
156*4882a593Smuzhiyun 	switch (ret) {
157*4882a593Smuzhiyun 	case RET_FAULTED:
158*4882a593Smuzhiyun 		printf("[OK]\tCLI faulted\n");
159*4882a593Smuzhiyun 		break;
160*4882a593Smuzhiyun 	case RET_EMUL:
161*4882a593Smuzhiyun 		printf("[OK]\tCLI NOPped\n");
162*4882a593Smuzhiyun 		break;
163*4882a593Smuzhiyun 	default:
164*4882a593Smuzhiyun 		printf("[FAIL]\tCLI worked\n");
165*4882a593Smuzhiyun 		nerrs++;
166*4882a593Smuzhiyun 		return true;
167*4882a593Smuzhiyun 	}
168*4882a593Smuzhiyun 
169*4882a593Smuzhiyun 	return false;
170*4882a593Smuzhiyun }
171*4882a593Smuzhiyun 
main(void)172*4882a593Smuzhiyun int main(void)
173*4882a593Smuzhiyun {
174*4882a593Smuzhiyun 	cpu_set_t cpuset;
175*4882a593Smuzhiyun 
176*4882a593Smuzhiyun 	CPU_ZERO(&cpuset);
177*4882a593Smuzhiyun 	CPU_SET(0, &cpuset);
178*4882a593Smuzhiyun 	if (sched_setaffinity(0, sizeof(cpuset), &cpuset) != 0)
179*4882a593Smuzhiyun 		err(1, "sched_setaffinity to CPU 0");
180*4882a593Smuzhiyun 
181*4882a593Smuzhiyun 	/* Probe for iopl support.  Note that iopl(0) works even as nonroot. */
182*4882a593Smuzhiyun 	switch(iopl(3)) {
183*4882a593Smuzhiyun 	case 0:
184*4882a593Smuzhiyun 		break;
185*4882a593Smuzhiyun 	case -ENOSYS:
186*4882a593Smuzhiyun 		printf("[OK]\tiopl() nor supported\n");
187*4882a593Smuzhiyun 		return 0;
188*4882a593Smuzhiyun 	default:
189*4882a593Smuzhiyun 		printf("[OK]\tiopl(3) failed (%d) -- try running as root\n",
190*4882a593Smuzhiyun 		       errno);
191*4882a593Smuzhiyun 		return 0;
192*4882a593Smuzhiyun 	}
193*4882a593Smuzhiyun 
194*4882a593Smuzhiyun 	/* Make sure that CLI/STI are blocked even with IOPL level 3 */
195*4882a593Smuzhiyun 	expect_gp_sti(test_cli());
196*4882a593Smuzhiyun 	expect_ok_outb(0x80);
197*4882a593Smuzhiyun 
198*4882a593Smuzhiyun 	/* Establish an I/O bitmap to test the restore */
199*4882a593Smuzhiyun 	if (ioperm(0x80, 1, 1) != 0)
200*4882a593Smuzhiyun 		err(1, "ioperm(0x80, 1, 1) failed\n");
201*4882a593Smuzhiyun 
202*4882a593Smuzhiyun 	/* Restore our original state prior to starting the fork test. */
203*4882a593Smuzhiyun 	if (iopl(0) != 0)
204*4882a593Smuzhiyun 		err(1, "iopl(0)");
205*4882a593Smuzhiyun 
206*4882a593Smuzhiyun 	/*
207*4882a593Smuzhiyun 	 * Verify that IOPL emulation is disabled and the I/O bitmap still
208*4882a593Smuzhiyun 	 * works.
209*4882a593Smuzhiyun 	 */
210*4882a593Smuzhiyun 	expect_ok_outb(0x80);
211*4882a593Smuzhiyun 	expect_gp_outb(0xed);
212*4882a593Smuzhiyun 	/* Drop the I/O bitmap */
213*4882a593Smuzhiyun 	if (ioperm(0x80, 1, 0) != 0)
214*4882a593Smuzhiyun 		err(1, "ioperm(0x80, 1, 0) failed\n");
215*4882a593Smuzhiyun 
216*4882a593Smuzhiyun 	pid_t child = fork();
217*4882a593Smuzhiyun 	if (child == -1)
218*4882a593Smuzhiyun 		err(1, "fork");
219*4882a593Smuzhiyun 
220*4882a593Smuzhiyun 	if (child == 0) {
221*4882a593Smuzhiyun 		printf("\tchild: set IOPL to 3\n");
222*4882a593Smuzhiyun 		if (iopl(3) != 0)
223*4882a593Smuzhiyun 			err(1, "iopl");
224*4882a593Smuzhiyun 
225*4882a593Smuzhiyun 		printf("[RUN]\tchild: write to 0x80\n");
226*4882a593Smuzhiyun 		asm volatile ("outb %%al, $0x80" : : "a" (0));
227*4882a593Smuzhiyun 
228*4882a593Smuzhiyun 		return 0;
229*4882a593Smuzhiyun 	} else {
230*4882a593Smuzhiyun 		int status;
231*4882a593Smuzhiyun 		if (waitpid(child, &status, 0) != child ||
232*4882a593Smuzhiyun 		    !WIFEXITED(status)) {
233*4882a593Smuzhiyun 			printf("[FAIL]\tChild died\n");
234*4882a593Smuzhiyun 			nerrs++;
235*4882a593Smuzhiyun 		} else if (WEXITSTATUS(status) != 0) {
236*4882a593Smuzhiyun 			printf("[FAIL]\tChild failed\n");
237*4882a593Smuzhiyun 			nerrs++;
238*4882a593Smuzhiyun 		} else {
239*4882a593Smuzhiyun 			printf("[OK]\tChild succeeded\n");
240*4882a593Smuzhiyun 		}
241*4882a593Smuzhiyun 	}
242*4882a593Smuzhiyun 
243*4882a593Smuzhiyun 	printf("[RUN]\tparent: write to 0x80 (should fail)\n");
244*4882a593Smuzhiyun 
245*4882a593Smuzhiyun 	expect_gp_outb(0x80);
246*4882a593Smuzhiyun 	expect_gp_sti(test_cli());
247*4882a593Smuzhiyun 
248*4882a593Smuzhiyun 	/* Test the capability checks. */
249*4882a593Smuzhiyun 	printf("\tiopl(3)\n");
250*4882a593Smuzhiyun 	if (iopl(3) != 0)
251*4882a593Smuzhiyun 		err(1, "iopl(3)");
252*4882a593Smuzhiyun 
253*4882a593Smuzhiyun 	printf("\tDrop privileges\n");
254*4882a593Smuzhiyun 	if (setresuid(1, 1, 1) != 0) {
255*4882a593Smuzhiyun 		printf("[WARN]\tDropping privileges failed\n");
256*4882a593Smuzhiyun 		goto done;
257*4882a593Smuzhiyun 	}
258*4882a593Smuzhiyun 
259*4882a593Smuzhiyun 	printf("[RUN]\tiopl(3) unprivileged but with IOPL==3\n");
260*4882a593Smuzhiyun 	if (iopl(3) != 0) {
261*4882a593Smuzhiyun 		printf("[FAIL]\tiopl(3) should work if iopl is already 3 even if unprivileged\n");
262*4882a593Smuzhiyun 		nerrs++;
263*4882a593Smuzhiyun 	}
264*4882a593Smuzhiyun 
265*4882a593Smuzhiyun 	printf("[RUN]\tiopl(0) unprivileged\n");
266*4882a593Smuzhiyun 	if (iopl(0) != 0) {
267*4882a593Smuzhiyun 		printf("[FAIL]\tiopl(0) should work if iopl is already 3 even if unprivileged\n");
268*4882a593Smuzhiyun 		nerrs++;
269*4882a593Smuzhiyun 	}
270*4882a593Smuzhiyun 
271*4882a593Smuzhiyun 	printf("[RUN]\tiopl(3) unprivileged\n");
272*4882a593Smuzhiyun 	if (iopl(3) == 0) {
273*4882a593Smuzhiyun 		printf("[FAIL]\tiopl(3) should fail if when unprivileged if iopl==0\n");
274*4882a593Smuzhiyun 		nerrs++;
275*4882a593Smuzhiyun 	} else {
276*4882a593Smuzhiyun 		printf("[OK]\tFailed as expected\n");
277*4882a593Smuzhiyun 	}
278*4882a593Smuzhiyun 
279*4882a593Smuzhiyun done:
280*4882a593Smuzhiyun 	return nerrs ? 1 : 0;
281*4882a593Smuzhiyun }
282