2017-01-31 22:19:30 +01:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2017 The Android Open Source Project
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2017-02-01 02:10:03 +01:00
|
|
|
#include <dlfcn.h>
|
2017-01-31 22:19:30 +01:00
|
|
|
#include <sys/stat.h>
|
2016-07-06 22:20:59 +02:00
|
|
|
|
2020-04-02 01:59:57 +02:00
|
|
|
#include <vector>
|
|
|
|
|
2021-04-10 02:13:09 +02:00
|
|
|
#include <gtest/gtest.h>
|
|
|
|
|
2017-01-31 22:19:30 +01:00
|
|
|
#include "gtest_globals.h"
|
|
|
|
#include "utils.h"
|
2016-07-06 22:20:59 +02:00
|
|
|
|
2017-09-19 02:51:48 +02:00
|
|
|
#if defined(__BIONIC__)
|
|
|
|
#include "private/CFIShadow.h"
|
|
|
|
#endif
|
|
|
|
|
2016-07-06 22:20:59 +02:00
|
|
|
// Private libdl interface.
|
|
|
|
extern "C" {
|
|
|
|
void __cfi_slowpath(uint64_t CallSiteTypeId, void* Ptr);
|
|
|
|
void __cfi_slowpath_diag(uint64_t CallSiteTypeId, void* Ptr, void* DiagData);
|
2017-08-03 01:34:44 +02:00
|
|
|
size_t __cfi_shadow_size();
|
2016-07-06 22:20:59 +02:00
|
|
|
}
|
|
|
|
|
2022-02-10 00:56:27 +01:00
|
|
|
// Disables debuggerd stack traces to speed up death tests, make them less
|
|
|
|
// noisy in logcat, and avoid expected deaths from showing up in stability
|
|
|
|
// metrics.
|
|
|
|
// We don't use the usual libbase class because (a) we don't care about most
|
|
|
|
// of the signals it blocks but (b) we do need to block SIGILL, which normal
|
|
|
|
// death tests shouldn't ever hit. (It's possible that a design where a
|
|
|
|
// deathtest always declares its expected signals up front is a better one,
|
|
|
|
// and maybe that's an interesting future direction for libbase.)
|
2022-02-15 19:12:23 +01:00
|
|
|
//
|
|
|
|
// We include SIGSEGV because there's a test that passes heap addresses to
|
|
|
|
// __cfi_slowpath and we only map the executable code shadow as readable.
|
|
|
|
// We don't always get SIGSEGV there though: if the heap allocation happens
|
|
|
|
// to be close enough to an executable mapping that its shadow is in the
|
|
|
|
// same page as the executable shadow, we'll get SIGILL/SIGTRAP.
|
2022-02-10 00:56:27 +01:00
|
|
|
class cfi_test_DeathTest : public testing::Test {
|
|
|
|
protected:
|
|
|
|
void SetUp() override {
|
|
|
|
struct sigaction64 action = {.sa_handler = SIG_DFL};
|
|
|
|
sigaction64(SIGILL, &action, &previous_sigill_);
|
2022-02-15 19:12:23 +01:00
|
|
|
sigaction64(SIGSEGV, &action, &previous_sigsegv_);
|
|
|
|
sigaction64(SIGTRAP, &action, &previous_sigtrap_);
|
2022-02-10 00:56:27 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void TearDown() override {
|
2022-02-15 19:12:23 +01:00
|
|
|
sigaction64(SIGTRAP, &previous_sigtrap_, nullptr);
|
2022-02-10 00:56:27 +01:00
|
|
|
sigaction64(SIGSEGV, &previous_sigsegv_, nullptr);
|
2022-02-15 19:12:23 +01:00
|
|
|
sigaction64(SIGILL, &previous_sigill_, nullptr);
|
2022-02-10 00:56:27 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
struct sigaction64 previous_sigill_;
|
2022-02-15 19:12:23 +01:00
|
|
|
struct sigaction64 previous_sigsegv_;
|
|
|
|
struct sigaction64 previous_sigtrap_;
|
2022-02-10 00:56:27 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
static bool KilledByCfi(int status) {
|
2022-02-15 19:12:23 +01:00
|
|
|
return WIFSIGNALED(status) &&
|
|
|
|
(WTERMSIG(status) == SIGTRAP || WTERMSIG(status) == SIGILL || WTERMSIG(status) == SIGSEGV);
|
2022-02-10 00:56:27 +01:00
|
|
|
}
|
2021-02-19 02:11:56 +01:00
|
|
|
|
2016-07-06 22:20:59 +02:00
|
|
|
static void f() {}
|
|
|
|
|
2020-04-02 01:59:57 +02:00
|
|
|
static void test_cfi_slowpath_with_alloc() {
|
|
|
|
std::vector<void*> allocs;
|
|
|
|
for (size_t i = 0; i < 1000; i++) {
|
|
|
|
allocs.push_back(malloc(4096));
|
|
|
|
__cfi_slowpath(46, allocs.back());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-02-19 02:11:56 +01:00
|
|
|
TEST_F(cfi_test_DeathTest, basic) {
|
2017-01-31 22:19:30 +01:00
|
|
|
#if defined(__BIONIC__)
|
2016-07-06 22:20:59 +02:00
|
|
|
void* handle;
|
|
|
|
handle = dlopen("libcfi-test.so", RTLD_NOW | RTLD_LOCAL);
|
|
|
|
ASSERT_TRUE(handle != nullptr) << dlerror();
|
|
|
|
|
2017-08-03 01:34:44 +02:00
|
|
|
EXPECT_NE(0U, __cfi_shadow_size());
|
|
|
|
|
2016-07-06 22:20:59 +02:00
|
|
|
#define SYM(type, name) auto name = reinterpret_cast<type>(dlsym(handle, #name))
|
2017-09-19 02:51:48 +02:00
|
|
|
SYM(size_t (*)(), get_count);
|
2016-07-06 22:20:59 +02:00
|
|
|
SYM(uint64_t(*)(), get_last_type_id);
|
|
|
|
SYM(void* (*)(), get_last_address);
|
|
|
|
SYM(void* (*)(), get_last_diag);
|
|
|
|
SYM(void* (*)(), get_global_address);
|
|
|
|
SYM(void (*)(uint64_t, void*, void*), __cfi_check);
|
2017-09-19 02:51:48 +02:00
|
|
|
SYM(char*, bss);
|
2016-07-06 22:20:59 +02:00
|
|
|
#undef SYM
|
|
|
|
|
2017-09-19 02:51:48 +02:00
|
|
|
size_t c = get_count();
|
2016-07-06 22:20:59 +02:00
|
|
|
|
|
|
|
// CFI check for code inside the DSO. Can't use just any function address - this is only
|
|
|
|
// guaranteed to work for code addresses above __cfi_check.
|
|
|
|
void* code_ptr = reinterpret_cast<char*>(__cfi_check) + 1234;
|
|
|
|
void* diag_ptr = reinterpret_cast<void*>(5678);
|
|
|
|
__cfi_slowpath_diag(42, code_ptr, diag_ptr);
|
|
|
|
EXPECT_EQ(42U, get_last_type_id());
|
|
|
|
EXPECT_EQ(code_ptr, get_last_address());
|
|
|
|
EXPECT_EQ(diag_ptr, get_last_diag());
|
|
|
|
EXPECT_EQ(++c, get_count());
|
|
|
|
|
|
|
|
// __cfi_slowpath passes nullptr for the Diag argument.
|
|
|
|
__cfi_slowpath(42, code_ptr);
|
|
|
|
EXPECT_EQ(42U, get_last_type_id());
|
|
|
|
EXPECT_EQ(code_ptr, get_last_address());
|
|
|
|
EXPECT_EQ(nullptr, get_last_diag());
|
|
|
|
EXPECT_EQ(++c, get_count());
|
|
|
|
|
|
|
|
// CFI check for a data address inside the DSO.
|
|
|
|
__cfi_slowpath(43, get_global_address());
|
|
|
|
EXPECT_EQ(43U, get_last_type_id());
|
|
|
|
EXPECT_EQ(get_global_address(), get_last_address());
|
|
|
|
EXPECT_EQ(++c, get_count());
|
|
|
|
|
|
|
|
// CFI check for a function inside _this_ DSO. It either goes to this DSO's __cfi_check,
|
|
|
|
// or (if missing) is simply ignored. Any way, it does not affect the test lib's counters.
|
|
|
|
__cfi_slowpath(44, reinterpret_cast<void*>(&f));
|
|
|
|
EXPECT_EQ(43U, get_last_type_id());
|
|
|
|
EXPECT_EQ(get_global_address(), get_last_address());
|
|
|
|
EXPECT_EQ(c, get_count());
|
|
|
|
|
2020-04-02 01:59:57 +02:00
|
|
|
// CFI check for a heap address.
|
|
|
|
// It's possible that this allocation could wind up in the same CFI granule as
|
|
|
|
// an unchecked library, which means the below might not crash. To force a
|
|
|
|
// crash keep allocating up to a max until there is a crash.
|
2022-02-10 00:56:27 +01:00
|
|
|
EXPECT_EXIT(test_cfi_slowpath_with_alloc(), KilledByCfi, "");
|
2016-07-06 22:20:59 +02:00
|
|
|
|
2017-09-19 02:51:48 +02:00
|
|
|
// Check all the addresses.
|
|
|
|
const size_t bss_size = 1024 * 1024;
|
|
|
|
static_assert(bss_size >= kLibraryAlignment * 2, "test range not big enough");
|
|
|
|
for (size_t i = 0; i < bss_size; ++i) {
|
|
|
|
__cfi_slowpath(47, bss + i);
|
|
|
|
EXPECT_EQ(++c, get_count());
|
|
|
|
}
|
|
|
|
|
2016-07-06 22:20:59 +02:00
|
|
|
// Load the same library again.
|
|
|
|
void* handle2 = dlopen("libcfi-test.so", RTLD_NOW | RTLD_LOCAL);
|
|
|
|
ASSERT_TRUE(handle2 != nullptr) << dlerror();
|
|
|
|
EXPECT_EQ(handle2, handle);
|
|
|
|
|
|
|
|
// Check that it is still there.
|
|
|
|
__cfi_slowpath(43, get_global_address());
|
|
|
|
EXPECT_EQ(43U, get_last_type_id());
|
|
|
|
EXPECT_EQ(get_global_address(), get_last_address());
|
|
|
|
EXPECT_EQ(++c, get_count());
|
|
|
|
|
|
|
|
dlclose(handle);
|
|
|
|
dlclose(handle2);
|
|
|
|
|
|
|
|
// CFI check for a function inside the unloaded DSO. This is always invalid and gets the process
|
|
|
|
// killed.
|
2022-02-10 00:56:27 +01:00
|
|
|
EXPECT_EXIT(__cfi_slowpath(45, reinterpret_cast<void*>(code_ptr)), KilledByCfi, "");
|
2017-01-31 22:19:30 +01:00
|
|
|
#endif
|
2016-07-06 22:20:59 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
TEST(cfi_test, invalid) {
|
2017-01-31 22:19:30 +01:00
|
|
|
#if defined(__BIONIC__)
|
2016-07-06 22:20:59 +02:00
|
|
|
void* handle;
|
|
|
|
handle = dlopen("libcfi-test-bad.so", RTLD_NOW | RTLD_LOCAL);
|
|
|
|
ASSERT_FALSE(handle != nullptr) << dlerror();
|
|
|
|
|
|
|
|
handle = dlopen("libcfi-test-bad.so", RTLD_NOW | RTLD_LOCAL);
|
|
|
|
ASSERT_FALSE(handle != nullptr) << dlerror();
|
2017-01-31 22:19:30 +01:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
// cfi_test_helper exports __cfi_check, which triggers CFI initialization at startup.
|
|
|
|
TEST(cfi_test, early_init) {
|
|
|
|
#if defined(__BIONIC__)
|
2021-09-25 02:49:58 +02:00
|
|
|
std::string helper = GetTestlibRoot() + "/cfi_test_helper";
|
2017-01-31 22:19:30 +01:00
|
|
|
chmod(helper.c_str(), 0755); // TODO: "x" lost in CTS, b/34945607
|
|
|
|
ExecTestHelper eth;
|
|
|
|
eth.SetArgs({ helper.c_str(), nullptr });
|
|
|
|
eth.Run([&]() { execve(helper.c_str(), eth.GetArgs(), eth.GetEnv()); }, 0, nullptr);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
// cfi_test_helper2 depends on a library that exports __cfi_check, which triggers CFI initialization
|
|
|
|
// at startup.
|
|
|
|
TEST(cfi_test, early_init2) {
|
|
|
|
#if defined(__BIONIC__)
|
2021-09-25 02:49:58 +02:00
|
|
|
std::string helper = GetTestlibRoot() + "/cfi_test_helper2";
|
2017-01-31 22:19:30 +01:00
|
|
|
chmod(helper.c_str(), 0755); // TODO: "x" lost in CTS, b/34945607
|
|
|
|
ExecTestHelper eth;
|
|
|
|
eth.SetArgs({ helper.c_str(), nullptr });
|
|
|
|
eth.Run([&]() { execve(helper.c_str(), eth.GetArgs(), eth.GetEnv()); }, 0, nullptr);
|
|
|
|
#endif
|
2016-07-06 22:20:59 +02:00
|
|
|
}
|