Home | History | Annotate | Download | only in sbrk
      1 /*
      2  * Copyright (c) 2016 Linux Test Project.
      3  *
      4  * This program is free software: you can redistribute it and/or modify
      5  * it under the terms of the GNU General Public License as published by
      6  * the Free Software Foundation, either version 3 of the License, or
      7  * (at your option) any later version.
      8  *
      9  * This program is distributed in the hope that it will be useful,
     10  * but WITHOUT ANY WARRANTY; without even the implied warranty of
     11  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
     12  * GNU General Public License for more details.
     13  *
     14  * You should have received a copy of the GNU General Public License
     15  * along with this program.  If not, see <http://www.gnu.org/licenses/>.
     16  */
     17 
     18 /*
     19  * DESCRIPTION
     20  *
     21  * Total s390 2^31 addr space is 0x80000000.
     22  *
     23  *     0x80000000 - 0x10000000 = 0x70000000
     24  *
     25  * 0x70000000 is a valid positive intptr_t and adding it to the current offset
     26  * produces a valid uintptr_t without overflow (since the MSB being set is OK),
     27  * but that is irrelevant for s390 since it has 31-bit pointers and not 32-bit
     28  * pointers. Consequently, the brk syscall behaves incorrectly with the invalid
     29  * address and changes the program break to the overflowed address. The glibc
     30  * part of the implementation detects this overflow and returns a failure with
     31  * ENOMEM, but does not reset the program break.
     32  *
     33  * So the bug is in sbrk as well as the brk syscall. brk() should validate the
     34  * address being passed and return an error. sbrk() should not result in a brk
     35  * call at all for an invalid address. One could argue in favour of fixing brk
     36  * in glibc, but it should be the kernel since one could call the syscall
     37  * directly without using the glibc entry points.
     38  *
     39  * The kernel part was fixed on v3.15 by commits:
     40  *     473a06572fcd (s390/compat: convert system call wrappers to C part 02)
     41  *
     42  * Note:
     43  *     The reproducer should be built(gcc -m31) in 32bit on s390 platform
     44  *
     45  */
     46 
     47 #include <stdio.h>
     48 #include <unistd.h>
     49 #include "tst_test.h"
     50 
     51 static void sbrk_test(void)
     52 {
     53 #if defined(__s390__) && __WORDSIZE == 32
     54 	void *ret1, *ret2;
     55 
     56 	/* set bkr to 0x10000000 */
     57 	tst_res(TINFO, "initial brk: %d", brk((void *)0x10000000));
     58 
     59 	/* add 0x10000000, up to total of 0x20000000 */
     60 	tst_res(TINFO, "sbrk increm: %p", sbrk(0x10000000));
     61 	ret1 = sbrk(0);
     62 
     63 	/* sbrk() returns -1 on s390, but still does overflowed brk() */
     64 	tst_res(TINFO, "sbrk increm: %p", sbrk(0x70000000));
     65 	ret2 = sbrk(0);
     66 
     67 	if (ret1 != ret2) {
     68 		tst_res(TFAIL, "Bug! sbrk: %p", ret2);
     69 		return;
     70 	}
     71 
     72 	tst_res(TPASS, "sbrk verify: %p", ret2);
     73 #else
     74 	tst_res(TCONF, "Only works in 32bit on s390 series system");
     75 #endif
     76 }
     77 
     78 static struct tst_test test = {
     79 	.tid = "sbrk03",
     80 	.test_all = sbrk_test,
     81 };
     82