wild_bctr.c 3.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170
  1. // SPDX-License-Identifier: GPL-2.0+
  2. /*
  3. * Copyright 2018, Michael Ellerman, IBM Corp.
  4. *
  5. * Test that an out-of-bounds branch to counter behaves as expected.
  6. */
  7. #include <setjmp.h>
  8. #include <stdio.h>
  9. #include <stdlib.h>
  10. #include <string.h>
  11. #include <sys/mman.h>
  12. #include <sys/types.h>
  13. #include <sys/wait.h>
  14. #include <ucontext.h>
  15. #include <unistd.h>
  16. #include "utils.h"
  17. #define BAD_NIP 0x788c545a18000000ull
  18. static struct pt_regs signal_regs;
  19. static jmp_buf setjmp_env;
  20. static void save_regs(ucontext_t *ctxt)
  21. {
  22. struct pt_regs *regs = ctxt->uc_mcontext.regs;
  23. memcpy(&signal_regs, regs, sizeof(signal_regs));
  24. }
  25. static void segv_handler(int signum, siginfo_t *info, void *ctxt_v)
  26. {
  27. save_regs(ctxt_v);
  28. longjmp(setjmp_env, 1);
  29. }
  30. static void usr2_handler(int signum, siginfo_t *info, void *ctxt_v)
  31. {
  32. save_regs(ctxt_v);
  33. }
  34. static int ok(void)
  35. {
  36. printf("Everything is OK in here.\n");
  37. return 0;
  38. }
  39. #define REG_POISON 0x5a5a
  40. #define POISONED_REG(n) ((((unsigned long)REG_POISON) << 48) | ((n) << 32) | \
  41. (((unsigned long)REG_POISON) << 16) | (n))
  42. static inline void poison_regs(void)
  43. {
  44. #define POISON_REG(n) \
  45. "lis " __stringify(n) "," __stringify(REG_POISON) ";" \
  46. "addi " __stringify(n) "," __stringify(n) "," __stringify(n) ";" \
  47. "sldi " __stringify(n) "," __stringify(n) ", 32 ;" \
  48. "oris " __stringify(n) "," __stringify(n) "," __stringify(REG_POISON) ";" \
  49. "addi " __stringify(n) "," __stringify(n) "," __stringify(n) ";"
  50. asm (POISON_REG(15)
  51. POISON_REG(16)
  52. POISON_REG(17)
  53. POISON_REG(18)
  54. POISON_REG(19)
  55. POISON_REG(20)
  56. POISON_REG(21)
  57. POISON_REG(22)
  58. POISON_REG(23)
  59. POISON_REG(24)
  60. POISON_REG(25)
  61. POISON_REG(26)
  62. POISON_REG(27)
  63. POISON_REG(28)
  64. POISON_REG(29)
  65. : // inputs
  66. : // outputs
  67. : "15", "16", "17", "18", "19", "20", "21", "22", "23", "24", "25",
  68. "26", "27", "28", "29"
  69. );
  70. #undef POISON_REG
  71. }
  72. static int check_regs(void)
  73. {
  74. unsigned long i;
  75. for (i = 15; i <= 29; i++)
  76. FAIL_IF(signal_regs.gpr[i] != POISONED_REG(i));
  77. printf("Regs OK\n");
  78. return 0;
  79. }
  80. static void dump_regs(void)
  81. {
  82. for (int i = 0; i < 32; i += 4) {
  83. printf("r%02d 0x%016lx r%02d 0x%016lx " \
  84. "r%02d 0x%016lx r%02d 0x%016lx\n",
  85. i, signal_regs.gpr[i],
  86. i+1, signal_regs.gpr[i+1],
  87. i+2, signal_regs.gpr[i+2],
  88. i+3, signal_regs.gpr[i+3]);
  89. }
  90. }
  91. #ifdef _CALL_AIXDESC
  92. struct opd {
  93. unsigned long ip;
  94. unsigned long toc;
  95. unsigned long env;
  96. };
  97. static struct opd bad_opd = {
  98. .ip = BAD_NIP,
  99. };
  100. #define BAD_FUNC (&bad_opd)
  101. #else
  102. #define BAD_FUNC BAD_NIP
  103. #endif
  104. int test_wild_bctr(void)
  105. {
  106. int (*func_ptr)(void);
  107. struct sigaction segv = {
  108. .sa_sigaction = segv_handler,
  109. .sa_flags = SA_SIGINFO
  110. };
  111. struct sigaction usr2 = {
  112. .sa_sigaction = usr2_handler,
  113. .sa_flags = SA_SIGINFO
  114. };
  115. FAIL_IF(sigaction(SIGSEGV, &segv, NULL));
  116. FAIL_IF(sigaction(SIGUSR2, &usr2, NULL));
  117. bzero(&signal_regs, sizeof(signal_regs));
  118. if (setjmp(setjmp_env) == 0) {
  119. func_ptr = ok;
  120. func_ptr();
  121. kill(getpid(), SIGUSR2);
  122. printf("Regs before:\n");
  123. dump_regs();
  124. bzero(&signal_regs, sizeof(signal_regs));
  125. poison_regs();
  126. func_ptr = (int (*)(void))BAD_FUNC;
  127. func_ptr();
  128. FAIL_IF(1); /* we didn't segv? */
  129. }
  130. FAIL_IF(signal_regs.nip != BAD_NIP);
  131. printf("All good - took SEGV as expected branching to 0x%llx\n", BAD_NIP);
  132. dump_regs();
  133. FAIL_IF(check_regs());
  134. return 0;
  135. }
  136. int main(void)
  137. {
  138. return test_harness(test_wild_bctr, "wild_bctr");
  139. }