qemu-e2k/tests/tcg/aarch64/pauth-1.c
Alex Bennée b640728151 tests/tcg/arm: account for pauth randomness
Pointer authentication isn't guaranteed to always detect a clash
between different keys. Take this into account in the test by running
several times and checking the percentage hit rate of the test.

Cc: Richard Henderson <richard.henderson@linaro.org>
Signed-off-by: Alex Bennée <alex.bennee@linaro.org>
2019-03-12 17:05:21 +00:00

38 lines
752 B
C

#include <assert.h>
#include <sys/prctl.h>
#include <stdio.h>
asm(".arch armv8.4-a");
#ifndef PR_PAC_RESET_KEYS
#define PR_PAC_RESET_KEYS 54
#define PR_PAC_APDAKEY (1 << 2)
#endif
#define TESTS 1000
int main()
{
int x, i, count = 0;
void *p0 = &x, *p1, *p2;
float perc;
for (i = 0; i < TESTS; i++) {
asm volatile("pacdza %0" : "=r"(p1) : "0"(p0));
prctl(PR_PAC_RESET_KEYS, PR_PAC_APDAKEY, 0, 0, 0);
asm volatile("pacdza %0" : "=r"(p2) : "0"(p0));
if (p1 != p0) {
count++;
}
if (p1 != p2) {
count++;
}
}
perc = (float) count / (float) (TESTS * 2);
printf("Ptr Check: %0.2f%%", perc * 100.0);
assert(perc > 0.95);
return 0;
}