Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4876670pxj; Wed, 12 May 2021 15:26:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxuZVPgNZi/GjMB50AQUTgsH1OMQjnmyWAPw827Z1iHhWqGBrZTG3EV7kBap94mfykIH2rk X-Received: by 2002:a17:906:c827:: with SMTP id dd7mr40367435ejb.225.1620858270529; Wed, 12 May 2021 15:24:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620858270; cv=none; d=google.com; s=arc-20160816; b=hMtgURb3gMNKiLSyWUh+gjsPIwrwLs5jD8js+Jxt+1xnU09hYkbTsXu2Tkn78AEJ1+ bTIwUTAqifYuDcoAlrQ6+nNZSn5/3fVFQGOlnPpdbolvX6hY2Snq3qEK+2Cb2AIKnLMs Ting+/a5OZJ0fJe7yhipbOdTAQkgTTgNs7cyi62hETYZPaNN5VelnzPJrIOJAfrJi2M6 /LGVQyLAiy1MNqHvV3mjdWBFmTqot+cB67qbeYzr6m8thbYCezbuUUk42uI3D8yYbdns OhR+T9N5RsaLfLjRPlYnHbCkooPHuFZsbIoOjesGog8xZzwK33vfliU3motiKg7+ROgS wFlA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=UFP8vUENCbTY1r9I0PIqKpAGBIGgvyQ/D9WT2QOFwyI=; b=exb8/i7/j0fqb9a24v8bviJnGgAAoI/HrUVwfGfN3mcVIwCW8y1hDbaLAPGuzOinur m5zyqEXKoA/P1V4vwgBDkdBHB0B8weX/IY5MRSBaxGUKzRBU0yHY1aeUb+wTxmqK1Ek1 yVef/cp/Mcv0y6A5AQvCAN0H3XoyafTIkGS8LNLdqR3NHE3CokjkqpIXzrlQa2SiqsfQ Aa/CZE5CJ5GTJpv2//LzkjSgcGZQ3+1bY3pcZy7/yod5YdEKKg+5DoJVSXSj1oJMxAgb kblJCrqZ9EM5+dqKdcP7+0Kjl+AEwq0rzIcXdFsPN34MbkJnFManBdWBBl6nsN8BKkyz zkDQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="iFpAe//x"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a22si1131666ejg.414.2021.05.12.15.24.06; Wed, 12 May 2021 15:24:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="iFpAe//x"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1443481AbhELWS4 (ORCPT + 99 others); Wed, 12 May 2021 18:18:56 -0400 Received: from mail.kernel.org ([198.145.29.99]:47588 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1347659AbhELVyv (ORCPT ); Wed, 12 May 2021 17:54:51 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 9989C613BD; Wed, 12 May 2021 21:53:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1620856419; bh=E5lvyrlrcxx/jGyE3lihbWzxiqC8Lw5xS1SIkXGygZk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=iFpAe//xKIYEikCEjwaOeXDRBM841qfPpk8OVCt/9mFkT+eHGkdDJjZYkw4sOYT+H MF+fOr0eCY3bLX+rDHdqVG8A77Ca3+q5QcVYeP1acDMCEJgC7Gw37w2bXDSqAiVig8 XIT70na5ETg5zbtxJZTH/9GROBaKrpQohE1vXzquIlcaXhgFSClGzG+YIF7IBh7+6r m03xdJvzutbfrf5Y9274rZxu642P6FLhKMGQADXUFlDbW3mplYVvqVQZSn4hw/7tZh 5wrCs4CVIgzAGLrJ4dlKJRqoAR/7KDFXbugWA0oN0va+Dy/a46lbXs7QFuMsKwEFKp zH4JXI3/OLaNQ== From: Jarkko Sakkinen To: shuah@kernel.org Cc: linux-kselftest@vger.kernel.org, linux-sgx@vger.kernel.org, Reinette Chatre , Jarkko Sakkinen , Dave Hansen , linux-kernel@vger.kernel.org Subject: [PATCH v5 2/2] selftests/sgx: Migrate to kselftest harness Date: Thu, 13 May 2021 00:53:23 +0300 Message-Id: <20210512215323.420639-2-jarkko@kernel.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210512215323.420639-1-jarkko@kernel.org> References: <20210512215323.420639-1-jarkko@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Migrate to kselftest harness. Use a fixture test with enclave initialized and de-initialized for each of the existing three tests, in other words: 1. One FIXTURE() for managing the enclave life-cycle. 2. Three TEST_F()'s, one for each test case. This gives a leaps better reporting than before. Here's an example transcript: TAP version 13 1..3 ok 1 enclave.unclobbered_vdso ok 2 enclave.clobbered_vdso ok 3 enclave.clobbered_vdso_and_user_function Signed-off-by: Jarkko Sakkinen --- v5: * Use TH_LOG() for printing enclave address ranges instead of printf(), based on Reinette's remark. v4: * Refine to take better use of the kselftest harness macros. * Fix: TCS base address was not initialized for a run struct. v3: * Use helper macros. v2: * Add the missing string argument to ksft_test_result_pass() and ksft_test_result_fail() calls. tools/testing/selftests/sgx/load.c | 3 - tools/testing/selftests/sgx/main.c | 170 ++++++++++++++--------------- 2 files changed, 85 insertions(+), 88 deletions(-) diff --git a/tools/testing/selftests/sgx/load.c b/tools/testing/selftests/sgx/load.c index f441ac34b4d4..00928be57fc4 100644 --- a/tools/testing/selftests/sgx/load.c +++ b/tools/testing/selftests/sgx/load.c @@ -239,9 +239,6 @@ bool encl_load(const char *path, struct encl *encl) seg->offset = (phdr->p_offset & PAGE_MASK) - src_offset; seg->size = (phdr->p_filesz + PAGE_SIZE - 1) & PAGE_MASK; - printf("0x%016lx 0x%016lx 0x%02x\n", seg->offset, seg->size, - seg->prot); - j++; } diff --git a/tools/testing/selftests/sgx/main.c b/tools/testing/selftests/sgx/main.c index 43da68388e25..78b2c8b27e07 100644 --- a/tools/testing/selftests/sgx/main.c +++ b/tools/testing/selftests/sgx/main.c @@ -17,8 +17,8 @@ #include #include #include "defines.h" +#include "../kselftest_harness.h" #include "main.h" -#include "../kselftest.h" static const uint64_t MAGIC = 0x1122334455667788ULL; vdso_sgx_enter_enclave_t vdso_sgx_enter_enclave; @@ -107,85 +107,49 @@ static Elf64_Sym *vdso_symtab_get(struct vdso_symtab *symtab, const char *name) return NULL; } -bool report_results(struct sgx_enclave_run *run, int ret, uint64_t result, - const char *test) -{ - bool valid = true; - - if (ret) { - printf("FAIL: %s() returned: %d\n", test, ret); - valid = false; - } - - if (run->function != EEXIT) { - printf("FAIL: %s() function, expected: %u, got: %u\n", test, EEXIT, - run->function); - valid = false; - } - - if (result != MAGIC) { - printf("FAIL: %s(), expected: 0x%lx, got: 0x%lx\n", test, MAGIC, - result); - valid = false; - } - - if (run->user_data) { - printf("FAIL: %s() user data, expected: 0x0, got: 0x%llx\n", - test, run->user_data); - valid = false; - } - - return valid; -} - -static int user_handler(long rdi, long rsi, long rdx, long ursp, long r8, long r9, - struct sgx_enclave_run *run) -{ - run->user_data = 0; - return 0; -} +FIXTURE(enclave) { + struct encl encl; + struct sgx_enclave_run run; +}; -int main(int argc, char *argv[]) +FIXTURE_SETUP(enclave) { - struct sgx_enclave_run run; + Elf64_Sym *sgx_enter_enclave_sym = NULL; struct vdso_symtab symtab; - Elf64_Sym *sgx_enter_enclave_sym; - uint64_t result = 0; - struct encl encl; + struct encl_segment *seg; unsigned int i; void *addr; - int ret; - - memset(&run, 0, sizeof(run)); - if (!encl_load("test_encl.elf", &encl)) { - encl_delete(&encl); + if (!encl_load("test_encl.elf", &self->encl)) { + encl_delete(&self->encl); ksft_exit_skip("cannot load enclaves\n"); } - if (!encl_measure(&encl)) + for (i = 0; i < self->encl.nr_segments; i++) { + seg = &self->encl.segment_tbl[i]; + + TH_LOG("0x%016lx 0x%016lx 0x%02x\n", seg->offset, seg->size, seg->prot); + } + + if (!encl_measure(&self->encl)) goto err; - if (!encl_build(&encl)) + if (!encl_build(&self->encl)) goto err; /* * An enclave consumer only must do this. */ - for (i = 0; i < encl.nr_segments; i++) { - struct encl_segment *seg = &encl.segment_tbl[i]; - - addr = mmap((void *)encl.encl_base + seg->offset, seg->size, - seg->prot, MAP_SHARED | MAP_FIXED, encl.fd, 0); - if (addr == MAP_FAILED) { - perror("mmap() segment failed"); - exit(KSFT_FAIL); - } + for (i = 0; i < self->encl.nr_segments; i++) { + struct encl_segment *seg = &self->encl.segment_tbl[i]; + + addr = mmap((void *)self->encl.encl_base + seg->offset, seg->size, + seg->prot, MAP_SHARED | MAP_FIXED, self->encl.fd, 0); + EXPECT_NE(addr, MAP_FAILED); + if (addr == MAP_FAILED) + goto err; } - memset(&run, 0, sizeof(run)); - run.tcs = encl.encl_base; - /* Get vDSO base address */ addr = (void *)getauxval(AT_SYSINFO_EHDR); if (!addr) @@ -200,32 +164,68 @@ int main(int argc, char *argv[]) vdso_sgx_enter_enclave = addr + sgx_enter_enclave_sym->st_value; - ret = sgx_enter_enclave((void *)&MAGIC, &result, 0, EENTER, - NULL, NULL, &run); - if (!report_results(&run, ret, result, "sgx_enter_enclave_unclobbered")) - goto err; + memset(&self->run, 0, sizeof(self->run)); + self->run.tcs = self->encl.encl_base; +err: + if (!sgx_enter_enclave_sym) + encl_delete(&self->encl); - /* Invoke the vDSO directly. */ - result = 0; - ret = vdso_sgx_enter_enclave((unsigned long)&MAGIC, (unsigned long)&result, - 0, EENTER, 0, 0, &run); - if (!report_results(&run, ret, result, "sgx_enter_enclave")) - goto err; + ASSERT_NE(sgx_enter_enclave_sym, NULL); +} - /* And with an exit handler. */ - run.user_handler = (__u64)user_handler; - run.user_data = 0xdeadbeef; - ret = vdso_sgx_enter_enclave((unsigned long)&MAGIC, (unsigned long)&result, - 0, EENTER, 0, 0, &run); - if (!report_results(&run, ret, result, "user_handler")) - goto err; +FIXTURE_TEARDOWN(enclave) +{ + encl_delete(&self->encl); + vdso_sgx_enter_enclave = NULL; +} - printf("SUCCESS\n"); - encl_delete(&encl); - exit(KSFT_PASS); -err: - encl_delete(&encl); - exit(KSFT_FAIL); +TEST_F(enclave, unclobbered_vdso) +{ + uint64_t result = 0; + + EXPECT_EQ(sgx_enter_enclave((void *)&MAGIC, &result, 0, EENTER, NULL, NULL, &self->run), 0); + + EXPECT_EQ(result, MAGIC); + EXPECT_EQ(self->run.function, EEXIT); + EXPECT_EQ(self->run.user_data, 0); +} + +TEST_F(enclave, clobbered_vdso) +{ + uint64_t result = 0; + + EXPECT_EQ(vdso_sgx_enter_enclave((unsigned long)&MAGIC, (unsigned long)&result, 0, + EENTER, 0, 0, &self->run), 0); + + + EXPECT_EQ(result, MAGIC); + EXPECT_EQ(self->run.function, EEXIT); + EXPECT_EQ(self->run.user_data, 0); } + +static int test_handler(long rdi, long rsi, long rdx, long ursp, long r8, long r9, + struct sgx_enclave_run *run) +{ + run->user_data = 0; + + return 0; +} + +TEST_F(enclave, clobbered_vdso_and_user_function) +{ + uint64_t result = 0; + + self->run.user_handler = (__u64)test_handler; + self->run.user_data = 0xdeadbeef; + + EXPECT_EQ(vdso_sgx_enter_enclave((unsigned long)&MAGIC, (unsigned long)&result, 0, + EENTER, 0, 0, &self->run), 0); + + EXPECT_EQ(result, MAGIC); + EXPECT_EQ(self->run.function, EEXIT); + EXPECT_EQ(self->run.user_data, 0); +} + +TEST_HARNESS_MAIN -- 2.31.1