/*
* Check decoding of kexec_load syscall.
*
* Copyright (c) 2016 Eugene Syromyatnikov <evgsyr@gmail.com>
* Copyright (c) 2016-2018 The strace developers.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote products
* derived from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "tests.h"
#include <asm/unistd.h>
#ifdef __NR_kexec_load
# include <stdio.h>
# include <unistd.h>
struct strval {
kernel_ulong_t val;
const char *str64;
const char *str32;
const char *str;
};
struct segm {
void *buf;
size_t bufsz;
void *mem;
size_t memsz;
};
int
main(void)
{
enum {
NUM_SEGMS = 17,
NUM_SEGMS_UNCUT = 5,
NUM_SEGMS_UNCUT_MAX = 9,
NUM_SEGMS_CUT = 12,
SEGMS_ARRAY_SIZE = sizeof(struct segm) * NUM_SEGMS,
};
static const kernel_ulong_t bogus_zero =
sizeof(long) < sizeof(kernel_long_t) ? F8ILL_KULONG_MASK : 0;
static const kernel_ulong_t bogus_entry =
(kernel_ulong_t) 0xdeadca57badda7a1ULL;
static const kernel_ulong_t bogus_nsegs =
(kernel_ulong_t) 0xdec0ded1defaced2ULL;
static const struct strval flags[] = {
{ (kernel_ulong_t) 0xbadc0dedda7a1054ULL,
"0xda7a0000 /* KEXEC_ARCH_??? */|0xbadc0ded0000",
"0xda7a0000 /* KEXEC_ARCH_??? */|0x",
"1054 /* KEXEC_??? */" },
{ 0, "", "", "KEXEC_ARCH_DEFAULT" },
{ 0x2a0003, "", "",
"KEXEC_ARCH_SH|KEXEC_ON_CRASH|KEXEC_PRESERVE_CONTEXT" },
{ 0xdead0000, "", "", "0xdead0000 /* KEXEC_ARCH_??? */" },
};
const char *errstr;
long rc;
struct segm *segms = tail_alloc(SEGMS_ARRAY_SIZE);
unsigned int i;
fill_memory(segms, SEGMS_ARRAY_SIZE);
segms[0].buf = segms[0].mem = NULL;
rc = syscall(__NR_kexec_load, bogus_zero, bogus_zero, bogus_zero,
flags[0].val);
printf("kexec_load(NULL, 0, NULL, %s%s) = %s\n",
sizeof(long) == 8 ? flags[0].str64 : flags[0].str32,
flags[0].str, sprintrc(rc));
rc = syscall(__NR_kexec_load, bogus_entry, bogus_nsegs,
segms + SEGMS_ARRAY_SIZE, flags[1].val);
printf("kexec_load(%#lx, %lu, %p, %s) = %s\n",
(unsigned long) bogus_entry, (unsigned long) bogus_nsegs,
segms + SEGMS_ARRAY_SIZE, flags[1].str, sprintrc(rc));
rc = syscall(__NR_kexec_load, bogus_entry, NUM_SEGMS,
segms, flags[2].val);
printf("kexec_load(%#lx, %lu, %p, %s) = %s\n",
(unsigned long) bogus_entry, (unsigned long) NUM_SEGMS,
segms, flags[2].str, sprintrc(rc));
rc = syscall(__NR_kexec_load, bogus_entry, NUM_SEGMS_CUT,
segms, flags[3].val);
errstr = sprintrc(rc);
printf("kexec_load(%#lx, %lu, [{buf=NULL, bufsz=%zu, mem=NULL, "
"memsz=%zu}, ",
(unsigned long) bogus_entry, (unsigned long) NUM_SEGMS_CUT,
segms[0].bufsz, segms[0].memsz);
for (i = 1; i < NUM_SEGMS_UNCUT_MAX; i++)
printf("{buf=%p, bufsz=%zu, mem=%p, memsz=%zu}, ",
segms[i].buf, segms[i].bufsz,
segms[i].mem, segms[i].memsz);
printf("...], %s) = %s\n", flags[3].str, errstr);
rc = syscall(__NR_kexec_load, bogus_entry, NUM_SEGMS_CUT,
segms + (NUM_SEGMS - NUM_SEGMS_UNCUT_MAX),
flags[0].val);
errstr = sprintrc(rc);
printf("kexec_load(%#lx, %lu, [",
(unsigned long) bogus_entry, (unsigned long) NUM_SEGMS_CUT);
for (i = NUM_SEGMS - NUM_SEGMS_UNCUT_MAX; i < NUM_SEGMS; i++)
printf("{buf=%p, bufsz=%zu, mem=%p, memsz=%zu}, ",
segms[i].buf, segms[i].bufsz,
segms[i].mem, segms[i].memsz);
printf("... /* %p */], %s%s) = %s\n",
segms + NUM_SEGMS,
sizeof(long) == 8 ? flags[0].str64 : flags[0].str32,
flags[0].str, errstr);
rc = syscall(__NR_kexec_load, bogus_entry, NUM_SEGMS_UNCUT,
segms + (NUM_SEGMS - NUM_SEGMS_UNCUT),
flags[1].val);
errstr = sprintrc(rc);
printf("kexec_load(%#lx, %lu, [",
(unsigned long) bogus_entry, (unsigned long) NUM_SEGMS_UNCUT);
for (i = NUM_SEGMS - NUM_SEGMS_UNCUT; i < NUM_SEGMS; i++)
printf("{buf=%p, bufsz=%zu, mem=%p, memsz=%zu}%s",
segms[i].buf, segms[i].bufsz,
segms[i].mem, segms[i].memsz,
(i == NUM_SEGMS - 1) ? "" : ", ");
printf("], %s) = %s\n", flags[1].str, errstr);
rc = syscall(__NR_kexec_load, bogus_entry, NUM_SEGMS_CUT,
segms + 1, flags[2].val);
errstr = sprintrc(rc);
printf("kexec_load(%#lx, %lu, [",
(unsigned long) bogus_entry, (unsigned long) NUM_SEGMS_CUT);
for (i = 1; i < NUM_SEGMS_UNCUT_MAX + 1; i++)
printf("{buf=%p, bufsz=%zu, mem=%p, memsz=%zu}, ",
segms[i].buf, segms[i].bufsz,
segms[i].mem, segms[i].memsz);
printf("...], %s) = %s\n", flags[2].str, errstr);
puts("+++ exited with 0 +++");
return 0;
}
#else
SKIP_MAIN_UNDEFINED("__NR_kexec_load");
#endif