/* $Id: tstRTR0MemUserKernel.cpp $ */ /** @file * IPRT R0 Testcase - Thread Preemption. */ /* * Copyright (C) 2009-2019 Oracle Corporation * * This file is part of VirtualBox Open Source Edition (OSE), as * available from http://www.virtualbox.org. This file is free software; * you can redistribute it and/or modify it under the terms of the GNU * General Public License (GPL) as published by the Free Software * Foundation, in version 2 as it comes in the "COPYING" file of the * VirtualBox OSE distribution. VirtualBox OSE is distributed in the * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind. * * The contents of this file may alternatively be used under the terms * of the Common Development and Distribution License Version 1.0 * (CDDL) only, as it comes in the "COPYING.CDDL" file of the * VirtualBox OSE distribution, in which case the provisions of the * CDDL are applicable instead of those of the GPL. * * You may elect to license modified versions of this file under the * terms and conditions of either the GPL or the CDDL or both. */ /********************************************************************************************************************************* * Header Files * *********************************************************************************************************************************/ #include #include #include #include #include #include #include "tstRTR0MemUserKernel.h" /** * Service request callback function. * * @returns VBox status code. * @param pSession The caller's session. * @param u64Arg 64-bit integer argument. * @param pReqHdr The request header. Input / Output. Optional. */ DECLEXPORT(int) TSTRTR0MemUserKernelSrvReqHandler(PSUPDRVSESSION pSession, uint32_t uOperation, uint64_t u64Arg, PSUPR0SERVICEREQHDR pReqHdr) { NOREF(pSession); if (!VALID_PTR(pReqHdr)) return VERR_INVALID_PARAMETER; char *pszErr = (char *)(pReqHdr + 1); size_t cchErr = pReqHdr->cbReq - sizeof(*pReqHdr); if (cchErr < 32 || cchErr >= 0x10000) return VERR_INVALID_PARAMETER; *pszErr = '\0'; /* * R3Ptr is valid and good for up to a page. The page before * and after are both invalid. Or, it's a kernel page. */ RTR3PTR R3Ptr = (RTR3PTR)u64Arg; if (R3Ptr != u64Arg) return VERR_INVALID_PARAMETER; /* * Allocate a kernel buffer. */ uint8_t *pbKrnlBuf = (uint8_t *)RTMemAlloc(PAGE_SIZE * 2); if (!pbKrnlBuf) { RTStrPrintf(pszErr, cchErr, "!no memory for kernel buffers"); return VINF_SUCCESS; } /* * The big switch. */ switch (uOperation) { case TSTRTR0MEMUSERKERNEL_SANITY_OK: break; case TSTRTR0MEMUSERKERNEL_SANITY_FAILURE: RTStrPrintf(pszErr, cchErr, "!42failure42%1024s", ""); break; case TSTRTR0MEMUSERKERNEL_BASIC: { int rc = RTR0MemUserCopyFrom(pbKrnlBuf, R3Ptr, PAGE_SIZE); if (rc == VINF_SUCCESS) { rc = RTR0MemUserCopyTo(R3Ptr, pbKrnlBuf, PAGE_SIZE); if (rc == VINF_SUCCESS) { if (RTR0MemUserIsValidAddr(R3Ptr)) { if (RTR0MemKernelIsValidAddr(pbKrnlBuf)) { if (RTR0MemAreKrnlAndUsrDifferent()) { RTStrPrintf(pszErr, cchErr, "RTR0MemAreKrnlAndUsrDifferent returns true"); if (!RTR0MemUserIsValidAddr((uintptr_t)pbKrnlBuf)) { if (!RTR0MemKernelIsValidAddr((void *)R3Ptr)) { /* done */ } else RTStrPrintf(pszErr, cchErr, "! #5 - RTR0MemKernelIsValidAddr -> true, expected false"); } else RTStrPrintf(pszErr, cchErr, "! #5 - RTR0MemUserIsValidAddr -> true, expected false"); } else RTStrPrintf(pszErr, cchErr, "RTR0MemAreKrnlAndUsrDifferent returns false"); } else RTStrPrintf(pszErr, cchErr, "! #4 - RTR0MemKernelIsValidAddr -> false, expected true"); } else RTStrPrintf(pszErr, cchErr, "! #3 - RTR0MemUserIsValidAddr -> false, expected true"); } else RTStrPrintf(pszErr, cchErr, "! #2 - RTR0MemUserCopyTo -> %Rrc expected %Rrc", rc, VINF_SUCCESS); } else RTStrPrintf(pszErr, cchErr, "! #1 - RTR0MemUserCopyFrom -> %Rrc expected %Rrc", rc, VINF_SUCCESS); break; } #define TEST_OFF_SIZE(off, size, rcExpect) \ if (1) \ { \ int rc = RTR0MemUserCopyFrom(pbKrnlBuf, R3Ptr + (off), (size)); \ if (rc != (rcExpect)) \ { \ RTStrPrintf(pszErr, cchErr, "!RTR0MemUserCopyFrom(, +%#x, %#x) -> %Rrc, expected %Rrc", \ (off), (size), rc, (rcExpect)); \ break; \ } \ rc = RTR0MemUserCopyTo(R3Ptr + (off), pbKrnlBuf, (size)); \ if (rc != (rcExpect)) \ { \ RTStrPrintf(pszErr, cchErr, "!RTR0MemUserCopyTo(+%#x,, %#x) -> %Rrc, expected %Rrc", \ (off), (size), rc, (rcExpect)); \ break; \ } \ } else do {} while (0) case TSTRTR0MEMUSERKERNEL_GOOD: { for (unsigned off = 0; off < 16 && !*pszErr; off++) for (unsigned cb = 0; cb < PAGE_SIZE - 16; cb++) TEST_OFF_SIZE(off, cb, VINF_SUCCESS); break; } case TSTRTR0MEMUSERKERNEL_BAD: { for (unsigned off = 0; off < 16 && !*pszErr; off++) for (unsigned cb = 0; cb < PAGE_SIZE - 16; cb++) TEST_OFF_SIZE(off, cb, cb > 0 ? VERR_ACCESS_DENIED : VINF_SUCCESS); break; } case TSTRTR0MEMUSERKERNEL_INVALID_ADDRESS: { if ( !RTR0MemUserIsValidAddr(R3Ptr) && RTR0MemKernelIsValidAddr((void *)R3Ptr)) { for (unsigned off = 0; off < 16 && !*pszErr; off++) for (unsigned cb = 0; cb < PAGE_SIZE - 16; cb++) TEST_OFF_SIZE(off, cb, cb > 0 ? VERR_ACCESS_DENIED : VINF_SUCCESS); /* ... */ } else RTStrPrintf(pszErr, cchErr, "RTR0MemUserIsValidAddr returns true"); break; } default: RTStrPrintf(pszErr, cchErr, "!Unknown test #%d", uOperation); break; } /* The error indicator is the '!' in the message buffer. */ RTMemFree(pbKrnlBuf); return VINF_SUCCESS; }