strace/tests/prctl-spec-inject.test
Eugene Syromyatnikov be0d6a847b prctl: add PR_GET_SPECULATION_CTRL/PR_SET_SPECULATION_CTRL decoding
* xlat/pr_spec_cmds.in: New fille.
* xlat/pr_spec_get_store_bypass_flags.in: Likewise.
* xlat/pr_spec_set_store_bypass_flags.in: Likewise.
* xlat/prctl_options.in (PR_GET_SPECULATION_CTRL,
PR_SET_SPECULATION_CTRL): New constants, introduced by Linux commit
v4.17-rc3-15-gb617cfc.
* prctl.c (SYS_FUNC(prctl)) <case PR_GET_SPECULATION_CTRL,
case PR_SET_SPECULATION_CTRL>: Implement decoding of new prctl options.
* tests/Makefile.am (check_PROGRAMS): Add prctl-spec-inject.
(DECODER_TESTS): Add prctl-spec-inject.test.
* tests/prctl-spec-inject.c: New file.
* tests/prctl-spec-inject.test: New test.
* tests/.gitignore: Add prctl-spec-inject.
2018-05-25 09:15:03 +00:00

28 lines
592 B
Bash
Executable File

#!/bin/sh -efu
. "${srcdir=.}/scno_tampering.sh"
fault_args='-a53 -e trace=prctl -e inject=prctl:'
prog="../$NAME"
test_run_rval()
{
local run rval injexpr
run="$1"; shift
rval="$1"; shift
injexpr="$1"; shift
run_strace $fault_args$injexpr $prog $rval > "$EXP"
LC_ALL=C grep -Ev '^prctl\(PR_[GS]ET_([^S][^P][^E][^C]])' \
< "$LOG" > "$OUT"
match_diff "$OUT" "$EXP"
}
test_run_rval 0 -1 "error=ENOTTY"
test_run_rval 1 0 "retval=0"
test_run_rval 2 1 "retval=1"
test_run_rval 3 3 "retval=3"
test_run_rval 4 8 "retval=8"
test_run_rval 5 16 "retval=16"
test_run_rval 6 42 "retval=42"