1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
|
#!/bin/sh -efu
#
# Check decoding of ioctls using syscall injection.
#
# Expects a binary that accepts IOCTL_INJECT_START as the first argument.
#
# Copyright (c) 2018-2021 The strace developers.
# All rights reserved.
#
# SPDX-License-Identifier: GPL-2.0-or-later
. "${srcdir=.}/scno_tampering.sh"
: ${IOCTL_INJECT_START=256}
: ${IOCTL_INJECT_RETVAL=42}
"../$NAME" > /dev/null || {
rc=$?
case "$rc" in
1) ;; # expected
77) skip_ "../$NAME exited with code $rc" ;;
*) fail_ "../$NAME failed with code $rc" ;;
esac
}
run_strace -a50 "$@" -e trace=ioctl \
-e inject=ioctl:retval="${IOCTL_INJECT_RETVAL}":when="${IOCTL_INJECT_START}+" \
"../$NAME" "${IOCTL_INJECT_START}" "${IOCTL_INJECT_RETVAL}" > "$EXP"
grep -v '^ioctl([012][,<]' < "$LOG" > "$OUT"
match_diff "$OUT" "$EXP"
|