From f215e02bf85f68d3a6106c2a1f4f7f063f819064 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Thu, 11 Apr 2024 10:17:27 +0200 Subject: Adding upstream version 7.0.14-dfsg. Signed-off-by: Daniel Baumann --- src/VBox/Runtime/testcase/tstRTR0MemUserKernel.cpp | 204 +++++++++++++++++++++ 1 file changed, 204 insertions(+) create mode 100644 src/VBox/Runtime/testcase/tstRTR0MemUserKernel.cpp (limited to 'src/VBox/Runtime/testcase/tstRTR0MemUserKernel.cpp') diff --git a/src/VBox/Runtime/testcase/tstRTR0MemUserKernel.cpp b/src/VBox/Runtime/testcase/tstRTR0MemUserKernel.cpp new file mode 100644 index 00000000..8d91e4f4 --- /dev/null +++ b/src/VBox/Runtime/testcase/tstRTR0MemUserKernel.cpp @@ -0,0 +1,204 @@ +/* $Id: tstRTR0MemUserKernel.cpp $ */ +/** @file + * IPRT R0 Testcase - Thread Preemption. + */ + +/* + * Copyright (C) 2009-2023 Oracle and/or its affiliates. + * + * This file is part of VirtualBox base platform packages, as + * available from https://www.virtualbox.org. + * + * This program is free software; you can redistribute it and/or + * modify it under the terms of the GNU General Public License + * as published by the Free Software Foundation, in version 3 of the + * License. + * + * This program is distributed in the hope that it will be useful, but + * WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + * General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, see . + * + * The contents of this file may alternatively be used under the terms + * of the Common Development and Distribution License Version 1.0 + * (CDDL), a copy of it is provided in the "COPYING.CDDL" file included + * in the VirtualBox distribution, in which case the provisions of the + * CDDL are applicable instead of those of the GPL. + * + * You may elect to license modified versions of this file under the + * terms and conditions of either the GPL or the CDDL or both. + * + * SPDX-License-Identifier: GPL-3.0-only OR CDDL-1.0 + */ + + +/********************************************************************************************************************************* +* Header Files * +*********************************************************************************************************************************/ +#include + +#include +#include +#include +#include +#include +#include "tstRTR0MemUserKernel.h" + + + +/** + * Service request callback function. + * + * @returns VBox status code. + * @param pSession The caller's session. + * @param u64Arg 64-bit integer argument. + * @param pReqHdr The request header. Input / Output. Optional. + */ +DECLEXPORT(int) TSTRTR0MemUserKernelSrvReqHandler(PSUPDRVSESSION pSession, uint32_t uOperation, + uint64_t u64Arg, PSUPR0SERVICEREQHDR pReqHdr) +{ + NOREF(pSession); + if (!RT_VALID_PTR(pReqHdr)) + return VERR_INVALID_PARAMETER; + char *pszErr = (char *)(pReqHdr + 1); + size_t cchErr = pReqHdr->cbReq - sizeof(*pReqHdr); + if (cchErr < 32 || cchErr >= 0x10000) + return VERR_INVALID_PARAMETER; + *pszErr = '\0'; + + /* + * R3Ptr is valid and good for up to a page. The page before + * and after are both invalid. Or, it's a kernel page. + */ + RTR3PTR R3Ptr = (RTR3PTR)u64Arg; + if (R3Ptr != u64Arg) + return VERR_INVALID_PARAMETER; + + /* + * Allocate a kernel buffer. + */ + uint8_t *pbKrnlBuf = (uint8_t *)RTMemAlloc(PAGE_SIZE * 2); + if (!pbKrnlBuf) + { + RTStrPrintf(pszErr, cchErr, "!no memory for kernel buffers"); + return VINF_SUCCESS; + } + + /* + * The big switch. + */ + switch (uOperation) + { + case TSTRTR0MEMUSERKERNEL_SANITY_OK: + break; + + case TSTRTR0MEMUSERKERNEL_SANITY_FAILURE: + RTStrPrintf(pszErr, cchErr, "!42failure42%1024s", ""); + break; + + case TSTRTR0MEMUSERKERNEL_BASIC: + { + int rc = RTR0MemUserCopyFrom(pbKrnlBuf, R3Ptr, PAGE_SIZE); + if (rc == VINF_SUCCESS) + { + rc = RTR0MemUserCopyTo(R3Ptr, pbKrnlBuf, PAGE_SIZE); + if (rc == VINF_SUCCESS) + { + if (RTR0MemUserIsValidAddr(R3Ptr)) + { + if (RTR0MemKernelIsValidAddr(pbKrnlBuf)) + { + if (RTR0MemAreKrnlAndUsrDifferent()) + { + RTStrPrintf(pszErr, cchErr, "RTR0MemAreKrnlAndUsrDifferent returns true"); + if (!RTR0MemUserIsValidAddr((uintptr_t)pbKrnlBuf)) + { + if (!RTR0MemKernelIsValidAddr((void *)R3Ptr)) + { + /* done */ + } + else + RTStrPrintf(pszErr, cchErr, "! #5 - RTR0MemKernelIsValidAddr -> true, expected false"); + } + else + RTStrPrintf(pszErr, cchErr, "! #5 - RTR0MemUserIsValidAddr -> true, expected false"); + } + else + RTStrPrintf(pszErr, cchErr, "RTR0MemAreKrnlAndUsrDifferent returns false"); + } + else + RTStrPrintf(pszErr, cchErr, "! #4 - RTR0MemKernelIsValidAddr -> false, expected true"); + } + else + RTStrPrintf(pszErr, cchErr, "! #3 - RTR0MemUserIsValidAddr -> false, expected true"); + } + else + RTStrPrintf(pszErr, cchErr, "! #2 - RTR0MemUserCopyTo -> %Rrc expected %Rrc", rc, VINF_SUCCESS); + } + else + RTStrPrintf(pszErr, cchErr, "! #1 - RTR0MemUserCopyFrom -> %Rrc expected %Rrc", rc, VINF_SUCCESS); + break; + } + +#define TEST_OFF_SIZE(off, size, rcExpect) \ + if (1) \ + { \ + int rc = RTR0MemUserCopyFrom(pbKrnlBuf, R3Ptr + (off), (size)); \ + if (rc != (rcExpect)) \ + { \ + RTStrPrintf(pszErr, cchErr, "!RTR0MemUserCopyFrom(, +%#x, %#x) -> %Rrc, expected %Rrc", \ + (off), (size), rc, (rcExpect)); \ + break; \ + } \ + rc = RTR0MemUserCopyTo(R3Ptr + (off), pbKrnlBuf, (size)); \ + if (rc != (rcExpect)) \ + { \ + RTStrPrintf(pszErr, cchErr, "!RTR0MemUserCopyTo(+%#x,, %#x) -> %Rrc, expected %Rrc", \ + (off), (size), rc, (rcExpect)); \ + break; \ + } \ + } else do {} while (0) + + case TSTRTR0MEMUSERKERNEL_GOOD: + { + for (unsigned off = 0; off < 16 && !*pszErr; off++) + for (unsigned cb = 0; cb < PAGE_SIZE - 16; cb++) + TEST_OFF_SIZE(off, cb, VINF_SUCCESS); + break; + } + + case TSTRTR0MEMUSERKERNEL_BAD: + { + for (unsigned off = 0; off < 16 && !*pszErr; off++) + for (unsigned cb = 0; cb < PAGE_SIZE - 16; cb++) + TEST_OFF_SIZE(off, cb, cb > 0 ? VERR_ACCESS_DENIED : VINF_SUCCESS); + break; + } + + case TSTRTR0MEMUSERKERNEL_INVALID_ADDRESS: + { + if ( !RTR0MemUserIsValidAddr(R3Ptr) + && RTR0MemKernelIsValidAddr((void *)R3Ptr)) + { + for (unsigned off = 0; off < 16 && !*pszErr; off++) + for (unsigned cb = 0; cb < PAGE_SIZE - 16; cb++) + TEST_OFF_SIZE(off, cb, cb > 0 ? VERR_ACCESS_DENIED : VINF_SUCCESS); /* ... */ + } + else + RTStrPrintf(pszErr, cchErr, "RTR0MemUserIsValidAddr returns true"); + break; + } + + default: + RTStrPrintf(pszErr, cchErr, "!Unknown test #%d", uOperation); + break; + } + + /* The error indicator is the '!' in the message buffer. */ + RTMemFree(pbKrnlBuf); + return VINF_SUCCESS; +} + -- cgit v1.2.3