* xlat/pr_spec_cmds.in: New fille. * xlat/pr_spec_get_store_bypass_flags.in: Likewise. * xlat/pr_spec_set_store_bypass_flags.in: Likewise. * xlat/prctl_options.in (PR_GET_SPECULATION_CTRL, PR_SET_SPECULATION_CTRL): New constants, introduced by Linux commit v4.17-rc3-15-gb617cfc. * prctl.c (SYS_FUNC(prctl)) <case PR_GET_SPECULATION_CTRL, case PR_SET_SPECULATION_CTRL>: Implement decoding of new prctl options. * tests/Makefile.am (check_PROGRAMS): Add prctl-spec-inject. (DECODER_TESTS): Add prctl-spec-inject.test. * tests/prctl-spec-inject.c: New file. * tests/prctl-spec-inject.test: New test. * tests/.gitignore: Add prctl-spec-inject.
28 lines
592 B
Bash
Executable File
28 lines
592 B
Bash
Executable File
#!/bin/sh -efu
|
|
|
|
. "${srcdir=.}/scno_tampering.sh"
|
|
|
|
fault_args='-a53 -e trace=prctl -e inject=prctl:'
|
|
prog="../$NAME"
|
|
|
|
test_run_rval()
|
|
{
|
|
local run rval injexpr
|
|
run="$1"; shift
|
|
rval="$1"; shift
|
|
injexpr="$1"; shift
|
|
|
|
run_strace $fault_args$injexpr $prog $rval > "$EXP"
|
|
LC_ALL=C grep -Ev '^prctl\(PR_[GS]ET_([^S][^P][^E][^C]])' \
|
|
< "$LOG" > "$OUT"
|
|
match_diff "$OUT" "$EXP"
|
|
}
|
|
|
|
test_run_rval 0 -1 "error=ENOTTY"
|
|
test_run_rval 1 0 "retval=0"
|
|
test_run_rval 2 1 "retval=1"
|
|
test_run_rval 3 3 "retval=3"
|
|
test_run_rval 4 8 "retval=8"
|
|
test_run_rval 5 16 "retval=16"
|
|
test_run_rval 6 42 "retval=42"
|