 c2affbf9a5
			
		
	
	
	c2affbf9a5
	
	
	
		
			
			Test a couple of special cases in 32-bit kernels for entries from vm86 mode. This will OOPS both old kernels due to a bug and and 4.1-rc5 due to a regression I introduced, and it should make sure that the SYSENTER-from-vm86-mode hack in the kernel keeps working. Signed-off-by: Andy Lutomirski <luto@kernel.org> Cc: Jan Beulich <JBeulich@suse.com> Cc: Linus Torvalds <torvalds@linux-foundation.org> Cc: Peter Zijlstra <peterz@infradead.org> Cc: Shuah Khan <shuahkh@osg.samsung.com> Cc: Thomas Gleixner <tglx@linutronix.de> Link: http://lkml.kernel.org/r/09a9916761e0a9e42d4922f147af45a0079cc1e8.1432936374.git.luto@kernel.org Tests:394838c960x86/asm/entry/32: Fix user_mode() misuses Tests:7ba554b5acx86/asm/entry/32: Really make user_mode() work correctly for VM86 mode Signed-off-by: Ingo Molnar <mingo@kernel.org>
		
			
				
	
	
		
			114 lines
		
	
	
	
		
			2.6 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			114 lines
		
	
	
	
		
			2.6 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * entry_from_vm86.c - tests kernel entries from vm86 mode
 | |
|  * Copyright (c) 2014-2015 Andrew Lutomirski
 | |
|  *
 | |
|  * This exercises a few paths that need to special-case vm86 mode.
 | |
|  *
 | |
|  * GPL v2.
 | |
|  */
 | |
| 
 | |
| #define _GNU_SOURCE
 | |
| 
 | |
| #include <assert.h>
 | |
| #include <stdlib.h>
 | |
| #include <sys/syscall.h>
 | |
| #include <sys/signal.h>
 | |
| #include <sys/ucontext.h>
 | |
| #include <unistd.h>
 | |
| #include <stdio.h>
 | |
| #include <string.h>
 | |
| #include <inttypes.h>
 | |
| #include <sys/mman.h>
 | |
| #include <err.h>
 | |
| #include <stddef.h>
 | |
| #include <stdbool.h>
 | |
| #include <errno.h>
 | |
| #include <sys/vm86.h>
 | |
| 
 | |
| static unsigned long load_addr = 0x10000;
 | |
| static int nerrs = 0;
 | |
| 
 | |
| asm (
 | |
| 	".pushsection .rodata\n\t"
 | |
| 	".type vmcode_bound, @object\n\t"
 | |
| 	"vmcode:\n\t"
 | |
| 	"vmcode_bound:\n\t"
 | |
| 	".code16\n\t"
 | |
| 	"bound %ax, (2048)\n\t"
 | |
| 	"int3\n\t"
 | |
| 	"vmcode_sysenter:\n\t"
 | |
| 	"sysenter\n\t"
 | |
| 	".size vmcode, . - vmcode\n\t"
 | |
| 	"end_vmcode:\n\t"
 | |
| 	".code32\n\t"
 | |
| 	".popsection"
 | |
| 	);
 | |
| 
 | |
| extern unsigned char vmcode[], end_vmcode[];
 | |
| extern unsigned char vmcode_bound[], vmcode_sysenter[];
 | |
| 
 | |
| static void do_test(struct vm86plus_struct *v86, unsigned long eip,
 | |
| 		    const char *text)
 | |
| {
 | |
| 	long ret;
 | |
| 
 | |
| 	printf("[RUN]\t%s from vm86 mode\n", text);
 | |
| 	v86->regs.eip = eip;
 | |
| 	ret = vm86(VM86_ENTER, v86);
 | |
| 
 | |
| 	if (ret == -1 && errno == ENOSYS) {
 | |
| 		printf("[SKIP]\tvm86 not supported\n");
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	if (VM86_TYPE(ret) == VM86_INTx) {
 | |
| 		char trapname[32];
 | |
| 		int trapno = VM86_ARG(ret);
 | |
| 		if (trapno == 13)
 | |
| 			strcpy(trapname, "GP");
 | |
| 		else if (trapno == 5)
 | |
| 			strcpy(trapname, "BR");
 | |
| 		else if (trapno == 14)
 | |
| 			strcpy(trapname, "PF");
 | |
| 		else
 | |
| 			sprintf(trapname, "%d", trapno);
 | |
| 
 | |
| 		printf("[OK]\tExited vm86 mode due to #%s\n", trapname);
 | |
| 	} else if (VM86_TYPE(ret) == VM86_UNKNOWN) {
 | |
| 		printf("[OK]\tExited vm86 mode due to unhandled GP fault\n");
 | |
| 	} else {
 | |
| 		printf("[OK]\tExited vm86 mode due to type %ld, arg %ld\n",
 | |
| 		       VM86_TYPE(ret), VM86_ARG(ret));
 | |
| 	}
 | |
| }
 | |
| 
 | |
| int main(void)
 | |
| {
 | |
| 	struct vm86plus_struct v86;
 | |
| 	unsigned char *addr = mmap((void *)load_addr, 4096,
 | |
| 				   PROT_READ | PROT_WRITE | PROT_EXEC,
 | |
| 				   MAP_ANONYMOUS | MAP_PRIVATE, -1,0);
 | |
| 	if (addr != (unsigned char *)load_addr)
 | |
| 		err(1, "mmap");
 | |
| 
 | |
| 	memcpy(addr, vmcode, end_vmcode - vmcode);
 | |
| 	addr[2048] = 2;
 | |
| 	addr[2050] = 3;
 | |
| 
 | |
| 	memset(&v86, 0, sizeof(v86));
 | |
| 
 | |
| 	v86.regs.cs = load_addr / 16;
 | |
| 	v86.regs.ss = load_addr / 16;
 | |
| 	v86.regs.ds = load_addr / 16;
 | |
| 	v86.regs.es = load_addr / 16;
 | |
| 
 | |
| 	assert((v86.regs.cs & 3) == 0);	/* Looks like RPL = 0 */
 | |
| 
 | |
| 	/* #BR -- should deliver SIG??? */
 | |
| 	do_test(&v86, vmcode_bound - vmcode, "#BR");
 | |
| 
 | |
| 	/* SYSENTER -- should cause #GP or #UD depending on CPU */
 | |
| 	do_test(&v86, vmcode_sysenter - vmcode, "SYSENTER");
 | |
| 
 | |
| 	return (nerrs == 0 ? 0 : 1);
 | |
| }
 |