/* * Check decoding of pkey_mprotect syscall. * * Copyright (c) 2016 Eugene Syromyatnikov <evgsyr@gmail.com> * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. The name of the author may not be used to endorse or promote products * derived from this software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include "tests.h" #include <asm/unistd.h> #include "scno.h" #ifdef __NR_pkey_mprotect # include <stdio.h> # include <unistd.h> # include <sys/mman.h> const char * sprintptr(kernel_ulong_t ptr) { static char buf[sizeof(ptr) * 2 + sizeof("0x")]; if (ptr) snprintf(buf, sizeof(buf), "%#llx", (unsigned long long) ptr); else return "NULL"; return buf; } int main(void) { static const kernel_ulong_t ptrs[] = { 0, (kernel_ulong_t) 0xfacebeef00000000ULL, (kernel_ulong_t) 0xbadc0dedda7a1057ULL, }; static const kernel_ulong_t sizes[] = { 0, (kernel_ulong_t) 0xfacebeef00000000ULL, (kernel_ulong_t) 0xfedcba9876543210ULL, (kernel_ulong_t) 0x123456789abcdef0ULL, (kernel_ulong_t) 0xbadc0dedda7a1057ULL, }; static const struct { kernel_ulong_t val; const char *str; } prots[] = { { ARG_STR(PROT_READ) }, /* For now, only 0x0300001f are used */ { (kernel_ulong_t) 0xdeadfeed00ca7500ULL, sizeof(kernel_ulong_t) > sizeof(int) ? "0xdeadfeed00ca7500 /* PROT_??? */" : "0xca7500 /* PROT_??? */" }, { ARG_STR(PROT_READ|PROT_WRITE|0xface00) }, }; static const kernel_ulong_t pkeys[] = { 0, -1LL, (kernel_ulong_t) 0xface1e55, (kernel_ulong_t) 0xbadc0ded00000001, }; long rc; unsigned int i; unsigned int j; unsigned int k; unsigned int l; for (i = 0; i < ARRAY_SIZE(ptrs); i++) { for (j = 0; j < ARRAY_SIZE(sizes); j++) { for (k = 0; k < ARRAY_SIZE(prots); k++) { for (l = 0; l < ARRAY_SIZE(pkeys); l++) { rc = syscall(__NR_pkey_mprotect, ptrs[i], sizes[j], prots[k].val, pkeys[l]); printf("pkey_mprotect(%s, %llu, %s, %d)" " = %s\n", sprintptr(ptrs[i]), (unsigned long long) sizes[j], prots[k].str, (int) pkeys[l], sprintrc(rc)); } } } } puts("+++ exited with 0 +++"); return 0; } #else SKIP_MAIN_UNDEFINED("__NR_pkey_mprotect"); #endif