File: mangle_pstate_invalid_daif_bits.c

package info (click to toggle)
linux 6.1.139-1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm-proposed-updates
  • size: 1,495,880 kB
  • sloc: ansic: 23,469,452; asm: 266,614; sh: 110,522; makefile: 49,887; python: 36,990; perl: 36,834; cpp: 6,056; yacc: 4,908; lex: 2,725; awk: 1,440; ruby: 25; sed: 5
file content (35 lines) | stat: -rw-r--r-- 930 bytes parent folder | download | duplicates (22)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
// SPDX-License-Identifier: GPL-2.0
/*
 * Copyright (C) 2019 ARM Limited
 *
 * Try to mangle the ucontext from inside a signal handler, mangling the
 * DAIF bits in an illegal manner: this attempt must be spotted by Kernel
 * and the test case is expected to be terminated via SEGV.
 *
 */

#include "test_signals_utils.h"
#include "testcases.h"

static int mangle_invalid_pstate_run(struct tdescr *td, siginfo_t *si,
				     ucontext_t *uc)
{
	ASSERT_GOOD_CONTEXT(uc);

	/*
	 * This config should trigger a SIGSEGV by Kernel when it checks
	 * the sigframe consistency in valid_user_regs() routine.
	 */
	uc->uc_mcontext.pstate |= PSR_D_BIT | PSR_A_BIT | PSR_I_BIT | PSR_F_BIT;

	return 1;
}

struct tdescr tde = {
		.sanity_disabled = true,
		.name = "MANGLE_PSTATE_INVALID_DAIF_BITS",
		.descr = "Mangling uc_mcontext with INVALID DAIF_BITS",
		.sig_trig = SIGUSR1,
		.sig_ok = SIGSEGV,
		.run = mangle_invalid_pstate_run,
};