2 * Check decoding of kexec_load syscall.
4 * Copyright (c) 2016 Eugene Syromyatnikov <evgsyr@gmail.com>
5 * Copyright (c) 2016-2018 The strace developers.
8 * SPDX-License-Identifier: GPL-2.0-or-later
13 #include <asm/unistd.h>
15 #ifdef __NR_kexec_load
40 NUM_SEGMS_UNCUT_MAX = 9,
42 SEGMS_ARRAY_SIZE = sizeof(struct segm) * NUM_SEGMS,
45 static const kernel_ulong_t bogus_zero =
46 sizeof(long) < sizeof(kernel_long_t) ? F8ILL_KULONG_MASK : 0;
47 static const kernel_ulong_t bogus_entry =
48 (kernel_ulong_t) 0xdeadca57badda7a1ULL;
49 static const kernel_ulong_t bogus_nsegs =
50 (kernel_ulong_t) 0xdec0ded1defaced2ULL;
52 static const struct strval flags[] = {
53 { (kernel_ulong_t) 0xbadc0dedda7a1054ULL,
54 "0xda7a0000 /* KEXEC_ARCH_??? */|0xbadc0ded0000",
55 "0xda7a0000 /* KEXEC_ARCH_??? */|0x",
56 "1054 /* KEXEC_??? */" },
57 { 0, "", "", "KEXEC_ARCH_DEFAULT" },
59 "KEXEC_ARCH_SH|KEXEC_ON_CRASH|KEXEC_PRESERVE_CONTEXT" },
60 { 0xdead0000, "", "", "0xdead0000 /* KEXEC_ARCH_??? */" },
65 struct segm *segms = tail_alloc(SEGMS_ARRAY_SIZE);
68 fill_memory(segms, SEGMS_ARRAY_SIZE);
69 segms[0].buf = segms[0].mem = NULL;
71 rc = syscall(__NR_kexec_load, bogus_zero, bogus_zero, bogus_zero,
73 printf("kexec_load(NULL, 0, NULL, %s%s) = %s\n",
74 sizeof(long) == 8 ? flags[0].str64 : flags[0].str32,
75 flags[0].str, sprintrc(rc));
77 rc = syscall(__NR_kexec_load, bogus_entry, bogus_nsegs,
78 segms + SEGMS_ARRAY_SIZE, flags[1].val);
79 printf("kexec_load(%#lx, %lu, %p, %s) = %s\n",
80 (unsigned long) bogus_entry, (unsigned long) bogus_nsegs,
81 segms + SEGMS_ARRAY_SIZE, flags[1].str, sprintrc(rc));
83 rc = syscall(__NR_kexec_load, bogus_entry, NUM_SEGMS,
85 printf("kexec_load(%#lx, %lu, %p, %s) = %s\n",
86 (unsigned long) bogus_entry, (unsigned long) NUM_SEGMS,
87 segms, flags[2].str, sprintrc(rc));
89 rc = syscall(__NR_kexec_load, bogus_entry, NUM_SEGMS_CUT,
91 errstr = sprintrc(rc);
92 printf("kexec_load(%#lx, %lu, [{buf=NULL, bufsz=%zu, mem=NULL, "
94 (unsigned long) bogus_entry, (unsigned long) NUM_SEGMS_CUT,
95 segms[0].bufsz, segms[0].memsz);
96 for (i = 1; i < NUM_SEGMS_UNCUT_MAX; i++)
97 printf("{buf=%p, bufsz=%zu, mem=%p, memsz=%zu}, ",
98 segms[i].buf, segms[i].bufsz,
99 segms[i].mem, segms[i].memsz);
100 printf("...], %s) = %s\n", flags[3].str, errstr);
102 rc = syscall(__NR_kexec_load, bogus_entry, NUM_SEGMS_CUT,
103 segms + (NUM_SEGMS - NUM_SEGMS_UNCUT_MAX),
105 errstr = sprintrc(rc);
106 printf("kexec_load(%#lx, %lu, [",
107 (unsigned long) bogus_entry, (unsigned long) NUM_SEGMS_CUT);
108 for (i = NUM_SEGMS - NUM_SEGMS_UNCUT_MAX; i < NUM_SEGMS; i++)
109 printf("{buf=%p, bufsz=%zu, mem=%p, memsz=%zu}, ",
110 segms[i].buf, segms[i].bufsz,
111 segms[i].mem, segms[i].memsz);
112 printf("... /* %p */], %s%s) = %s\n",
114 sizeof(long) == 8 ? flags[0].str64 : flags[0].str32,
115 flags[0].str, errstr);
117 rc = syscall(__NR_kexec_load, bogus_entry, NUM_SEGMS_UNCUT,
118 segms + (NUM_SEGMS - NUM_SEGMS_UNCUT),
120 errstr = sprintrc(rc);
121 printf("kexec_load(%#lx, %lu, [",
122 (unsigned long) bogus_entry, (unsigned long) NUM_SEGMS_UNCUT);
123 for (i = NUM_SEGMS - NUM_SEGMS_UNCUT; i < NUM_SEGMS; i++)
124 printf("{buf=%p, bufsz=%zu, mem=%p, memsz=%zu}%s",
125 segms[i].buf, segms[i].bufsz,
126 segms[i].mem, segms[i].memsz,
127 (i == NUM_SEGMS - 1) ? "" : ", ");
128 printf("], %s) = %s\n", flags[1].str, errstr);
130 rc = syscall(__NR_kexec_load, bogus_entry, NUM_SEGMS_CUT,
131 segms + 1, flags[2].val);
132 errstr = sprintrc(rc);
133 printf("kexec_load(%#lx, %lu, [",
134 (unsigned long) bogus_entry, (unsigned long) NUM_SEGMS_CUT);
135 for (i = 1; i < NUM_SEGMS_UNCUT_MAX + 1; i++)
136 printf("{buf=%p, bufsz=%zu, mem=%p, memsz=%zu}, ",
137 segms[i].buf, segms[i].bufsz,
138 segms[i].mem, segms[i].memsz);
139 printf("...], %s) = %s\n", flags[2].str, errstr);
141 puts("+++ exited with 0 +++");
148 SKIP_MAIN_UNDEFINED("__NR_kexec_load");