blob: c4be78c7299a5a8c8c5e0500dddce17749df80c3 [file] [log] [blame]
Elliott Hughesad88a082012-10-24 18:37:21 -07001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17/*
18 * Contributed by: Intel Corporation
19 */
20
21#include <gtest/gtest.h>
22
23#include <pthread.h>
24#include <stdint.h>
25#include <stdio.h>
Elliott Hughesad88a082012-10-24 18:37:21 -070026#include <unistd.h>
27#include <set>
28
Elliott Hughes141b9172021-04-09 17:13:09 -070029#include <android-base/silent_death_test.h>
30
Mitch Phillips7ce3ec32024-01-19 12:40:25 +010031#include "platform/bionic/mte.h"
Elliott Hughesfc69a8a2016-03-04 11:53:09 -080032#include "private/bionic_tls.h"
Elliott Hughesad88a082012-10-24 18:37:21 -070033
Elliott Hughesfc69a8a2016-03-04 11:53:09 -080034extern "C" pid_t gettid(); // glibc defines this but doesn't declare it anywhere.
35
36#if defined(__BIONIC__)
37extern uintptr_t __stack_chk_guard;
38#endif
Elliott Hughesad88a082012-10-24 18:37:21 -070039
40struct stack_protector_checker {
41 std::set<pid_t> tids;
Elliott Hughesfc69a8a2016-03-04 11:53:09 -080042 std::set<void*> guards;
Elliott Hughesad88a082012-10-24 18:37:21 -070043
44 void Check() {
45 pid_t tid = gettid();
Elliott Hughesfc69a8a2016-03-04 11:53:09 -080046 void* guard = __get_tls()[TLS_SLOT_STACK_GUARD];
Elliott Hughesad88a082012-10-24 18:37:21 -070047
Elliott Hughesfc69a8a2016-03-04 11:53:09 -080048 printf("[thread %d] TLS stack guard = %p\n", tid, guard);
Elliott Hughesad88a082012-10-24 18:37:21 -070049
50 // Duplicate tid. gettid(2) bug? Seeing this would be very upsetting.
51 ASSERT_TRUE(tids.find(tid) == tids.end());
Elliott Hughesd3920b32013-02-07 18:39:34 -080052
Elliott Hughesfc69a8a2016-03-04 11:53:09 -080053 // Uninitialized guard. Our bug. Note this is potentially flaky; we _could_
54 // get four random zero bytes, but it should be vanishingly unlikely.
55 ASSERT_NE(guard, nullptr);
56
57#if defined(__BIONIC__)
58 // bionic always has the global too.
59 ASSERT_EQ(__stack_chk_guard, reinterpret_cast<uintptr_t>(guard));
60#endif
Elliott Hughesad88a082012-10-24 18:37:21 -070061
62 tids.insert(tid);
63 guards.insert(guard);
64 }
65};
66
Elliott Hughesd3920b32013-02-07 18:39:34 -080067TEST(stack_protector, same_guard_per_thread) {
Elliott Hughesfc69a8a2016-03-04 11:53:09 -080068 // Everyone has the TLS slot set, even if their stack protector
69 // implementation doesn't yet use it.
Elliott Hughesad88a082012-10-24 18:37:21 -070070 stack_protector_checker checker;
Elliott Hughesfc69a8a2016-03-04 11:53:09 -080071
72 // Check the main thread.
73 ASSERT_EQ(getpid(), gettid()); // We are the main thread, right?
74 checker.Check();
75
76 size_t thread_count = 9;
77 for (size_t i = 1; i < thread_count; ++i) {
Elliott Hughesad88a082012-10-24 18:37:21 -070078 pthread_t t;
Yi Kong32bc0fc2018-08-02 17:31:13 -070079 ASSERT_EQ(0, pthread_create(&t, nullptr, [](void* arg) -> void* {
Elliott Hughesfc69a8a2016-03-04 11:53:09 -080080 stack_protector_checker* checker = reinterpret_cast<stack_protector_checker*>(arg);
81 checker->Check();
82 return nullptr;
83 }, &checker));
Elliott Hughesad88a082012-10-24 18:37:21 -070084 void* result;
85 ASSERT_EQ(0, pthread_join(t, &result));
Yi Kong32bc0fc2018-08-02 17:31:13 -070086 ASSERT_EQ(nullptr, result);
Elliott Hughesad88a082012-10-24 18:37:21 -070087 }
88 ASSERT_EQ(thread_count, checker.tids.size());
89
Elliott Hughesfc69a8a2016-03-04 11:53:09 -080090 // Both bionic and glibc use the same guard for every thread.
Elliott Hughesad88a082012-10-24 18:37:21 -070091 ASSERT_EQ(1U, checker.guards.size());
Elliott Hughesad88a082012-10-24 18:37:21 -070092}
93
Christopher Ferrisf04935c2013-12-20 18:43:21 -080094TEST(stack_protector, global_guard) {
Elliott Hughesfc69a8a2016-03-04 11:53:09 -080095#if defined(__BIONIC__)
96 // Bionic always has a global, even if it's using TLS.
Christopher Ferrisf04935c2013-12-20 18:43:21 -080097 ASSERT_NE(0, gettid());
98 ASSERT_NE(0U, __stack_chk_guard);
Elliott Hughesfc69a8a2016-03-04 11:53:09 -080099#else
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800100 GTEST_SKIP() << "glibc doesn't have a global __stack_chk_guard";
Elliott Hughesfc69a8a2016-03-04 11:53:09 -0800101#endif
Nick Kralevichdcab1b22013-01-10 17:12:29 -0800102}
103
Mitch Phillips7ce3ec32024-01-19 12:40:25 +0100104// Make sure that a stack variable (`*p`) is tagged under MTE, by forcing the
105// stack safety analysis to fail.
106int z;
107__attribute__((noinline)) void escape_stack_safety_analysis(int* p) {
108 *p = z;
109}
110
111bool stack_mte_enabled() {
112 if (!mte_supported()) return false;
113 int stack_variable;
114 escape_stack_safety_analysis(&stack_variable);
115#if defined(__aarch64__)
116 return reinterpret_cast<uintptr_t>(&stack_variable) & (0xfull << 56);
117#else // !defined(__aarch64__)
118 return false;
119#endif // defined(__aarch64__)
120}
121
122bool hwasan_enabled() {
123#if __has_feature(hwaddress_sanitizer)
124 return true;
125#else
126 return false;
127#endif // __has_feature(hwaddress_sanitizer)
128}
129
Elliott Hughes141b9172021-04-09 17:13:09 -0700130using stack_protector_DeathTest = SilentDeathTest;
Yabin Cui9df70402014-11-05 18:01:01 -0800131
132TEST_F(stack_protector_DeathTest, modify_stack_protector) {
Elliott Hughesfc69a8a2016-03-04 11:53:09 -0800133 // In another file to prevent inlining, which removes stack protection.
134 extern void modify_stack_protector_test();
Mitch Phillips7ce3ec32024-01-19 12:40:25 +0100135
136 if (stack_mte_enabled()) {
137 GTEST_SKIP() << "Stack MTE is enabled, stack protector is not available";
138 } else if (hwasan_enabled()) {
139 ASSERT_EXIT(modify_stack_protector_test(), testing::KilledBySignal(SIGABRT), "tag-mismatch");
140 } else {
141 ASSERT_EXIT(modify_stack_protector_test(), testing::KilledBySignal(SIGABRT),
142 "stack corruption detected");
143 }
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800144}