blob: 154a5d77490c3132be9f1df4a722d132f203d020 [file] [log] [blame]
Tom Rini10e47792018-05-06 17:58:06 -04001// SPDX-License-Identifier: GPL-2.0+
Simon Glasscd0684f2011-10-03 19:26:44 +00002/*
3 * Copyright (c) 2011 The Chromium OS Authors.
Simon Glasscd0684f2011-10-03 19:26:44 +00004 */
5
Heinrich Schuchardt28eb5092020-11-12 00:29:56 +01006#define _GNU_SOURCE
7
Simon Glassf1c45c82012-12-26 09:53:34 +00008#include <dirent.h>
Simon Glasse8015a62012-01-10 15:54:05 -08009#include <errno.h>
Simon Glasscd0684f2011-10-03 19:26:44 +000010#include <fcntl.h>
Andrew Scull2b40f802022-05-30 10:00:11 +000011#include <pthread.h>
Simon Glass8a3e0352012-02-15 15:51:16 -080012#include <getopt.h>
Simon Glass5dccd152018-05-16 09:42:22 -060013#include <setjmp.h>
Rasmus Villemoes2b72ad22020-02-14 10:58:37 +000014#include <signal.h>
Heinrich Schuchardtbb63ea82022-04-04 22:45:03 +020015#include <stdarg.h>
Simon Glassf1c45c82012-12-26 09:53:34 +000016#include <stdio.h>
Simon Glassfb4b4e82013-05-19 16:45:35 -070017#include <stdint.h>
Simon Glasscd0684f2011-10-03 19:26:44 +000018#include <stdlib.h>
Simon Glassf1c45c82012-12-26 09:53:34 +000019#include <string.h>
Mike Frysingera5baaee2011-10-26 00:21:29 +000020#include <termios.h>
Matthias Weisser0d3dd142011-11-29 12:16:40 +010021#include <time.h>
Heinrich Schuchardt28eb5092020-11-12 00:29:56 +010022#include <ucontext.h>
Simon Glasse8015a62012-01-10 15:54:05 -080023#include <unistd.h>
Matthias Weisserb5f7b472011-11-05 11:40:34 +010024#include <sys/mman.h>
Simon Glasse8015a62012-01-10 15:54:05 -080025#include <sys/stat.h>
Simon Glass17064c02012-01-10 15:54:06 -080026#include <sys/time.h>
Simon Glasse8015a62012-01-10 15:54:05 -080027#include <sys/types.h>
Heinrich Schuchardt28eb5092020-11-12 00:29:56 +010028#include <linux/compiler_attributes.h>
Matthias Weisser0d3dd142011-11-29 12:16:40 +010029#include <linux/types.h>
Simon Glasscd0684f2011-10-03 19:26:44 +000030
Andrew Scull2b40f802022-05-30 10:00:11 +000031#include <asm/fuzzing_engine.h>
Simon Glass8a3e0352012-02-15 15:51:16 -080032#include <asm/getopt.h>
Andrew Scullca5d1372022-05-30 10:00:10 +000033#include <asm/main.h>
Simon Glass8a3e0352012-02-15 15:51:16 -080034#include <asm/sections.h>
35#include <asm/state.h>
Simon Glasscd0684f2011-10-03 19:26:44 +000036#include <os.h>
Simon Glass504548f2015-04-20 12:37:22 -060037#include <rtc_def.h>
Simon Glasscd0684f2011-10-03 19:26:44 +000038
Heinrich Schuchardtc0d1a002020-12-30 18:07:48 +010039/* Environment variable for time offset */
40#define ENV_TIME_OFFSET "UBOOT_SB_TIME_OFFSET"
41
Simon Glasscd0684f2011-10-03 19:26:44 +000042/* Operating System Interface */
43
Simon Glass1e6594c2013-11-10 10:26:57 -070044struct os_mem_hdr {
45 size_t length; /* number of bytes in the block */
46};
47
Simon Glasscd0684f2011-10-03 19:26:44 +000048ssize_t os_read(int fd, void *buf, size_t count)
49{
50 return read(fd, buf, count);
51}
52
53ssize_t os_write(int fd, const void *buf, size_t count)
54{
55 return write(fd, buf, count);
56}
57
Heinrich Schuchardtbb63ea82022-04-04 22:45:03 +020058int os_printf(const char *fmt, ...)
59{
60 va_list args;
61 int i;
62
63 va_start(args, fmt);
64 i = vfprintf(stdout, fmt, args);
65 va_end(args);
66
67 return i;
68}
69
Mike Frysinger60addac2011-10-25 13:02:58 +020070off_t os_lseek(int fd, off_t offset, int whence)
71{
72 if (whence == OS_SEEK_SET)
73 whence = SEEK_SET;
74 else if (whence == OS_SEEK_CUR)
75 whence = SEEK_CUR;
76 else if (whence == OS_SEEK_END)
77 whence = SEEK_END;
78 else
79 os_exit(1);
80 return lseek(fd, offset, whence);
81}
82
Simon Glass3196d752012-02-20 23:56:58 -050083int os_open(const char *pathname, int os_flags)
Simon Glasscd0684f2011-10-03 19:26:44 +000084{
Simon Glass3196d752012-02-20 23:56:58 -050085 int flags;
86
87 switch (os_flags & OS_O_MASK) {
88 case OS_O_RDONLY:
89 default:
90 flags = O_RDONLY;
91 break;
92
93 case OS_O_WRONLY:
94 flags = O_WRONLY;
95 break;
96
97 case OS_O_RDWR:
98 flags = O_RDWR;
99 break;
100 }
101
102 if (os_flags & OS_O_CREAT)
103 flags |= O_CREAT;
Simon Glassce55a112018-10-01 11:55:07 -0600104 if (os_flags & OS_O_TRUNC)
105 flags |= O_TRUNC;
Heinrich Schuchardtfc96df62020-10-27 20:29:24 +0100106 /*
107 * During a cold reset execv() is used to relaunch the U-Boot binary.
108 * We must ensure that all files are closed in this case.
109 */
110 flags |= O_CLOEXEC;
Simon Glass3196d752012-02-20 23:56:58 -0500111
112 return open(pathname, flags, 0777);
Simon Glasscd0684f2011-10-03 19:26:44 +0000113}
114
115int os_close(int fd)
116{
Heinrich Schuchardt69db2ee2020-10-27 20:29:21 +0100117 /* Do not close the console input */
118 if (fd)
119 return close(fd);
120 return -1;
Simon Glasscd0684f2011-10-03 19:26:44 +0000121}
122
Stephen Warrencd5edba2014-03-01 22:18:00 -0700123int os_unlink(const char *pathname)
124{
125 return unlink(pathname);
126}
127
Simon Glasscd0684f2011-10-03 19:26:44 +0000128void os_exit(int exit_code)
129{
130 exit(exit_code);
131}
Mike Frysingera5baaee2011-10-26 00:21:29 +0000132
Rasmus Villemoesae400f32022-09-27 11:54:04 +0200133unsigned int os_alarm(unsigned int seconds)
134{
135 return alarm(seconds);
136}
137
138void os_set_alarm_handler(void (*handler)(int))
139{
140 if (!handler)
141 handler = SIG_DFL;
142 signal(SIGALRM, handler);
143}
144
145void os_raise_sigalrm(void)
146{
147 raise(SIGALRM);
148}
149
Simon Glass8d176d82018-11-06 15:21:25 -0700150int os_write_file(const char *fname, const void *buf, int size)
Simon Glasscbfa8452018-10-01 11:55:08 -0600151{
Simon Glasscbfa8452018-10-01 11:55:08 -0600152 int fd;
153
154 fd = os_open(fname, OS_O_WRONLY | OS_O_CREAT | OS_O_TRUNC);
155 if (fd < 0) {
156 printf("Cannot open file '%s'\n", fname);
157 return -EIO;
158 }
159 if (os_write(fd, buf, size) != size) {
160 printf("Cannot write to file '%s'\n", fname);
Simon Glass8d176d82018-11-06 15:21:25 -0700161 os_close(fd);
Simon Glasscbfa8452018-10-01 11:55:08 -0600162 return -EIO;
163 }
164 os_close(fd);
Simon Glasscbfa8452018-10-01 11:55:08 -0600165
166 return 0;
167}
168
Heinrich Schuchardt6db1b652023-04-05 11:34:15 +0200169off_t os_filesize(int fd)
Simon Glass7b9cf84f2021-08-18 21:40:30 -0600170{
171 off_t size;
172
173 size = os_lseek(fd, 0, OS_SEEK_END);
174 if (size < 0)
175 return -errno;
176 if (os_lseek(fd, 0, OS_SEEK_SET) < 0)
177 return -errno;
178
179 return size;
180}
181
Simon Glass8d176d82018-11-06 15:21:25 -0700182int os_read_file(const char *fname, void **bufp, int *sizep)
183{
184 off_t size;
185 int ret = -EIO;
186 int fd;
187
188 fd = os_open(fname, OS_O_RDONLY);
189 if (fd < 0) {
190 printf("Cannot open file '%s'\n", fname);
Heinrich Schuchardt8ac326d2024-04-10 23:50:34 +0200191 return -EIO;
Simon Glass8d176d82018-11-06 15:21:25 -0700192 }
Simon Glass7b9cf84f2021-08-18 21:40:30 -0600193 size = os_filesize(fd);
Simon Glass8d176d82018-11-06 15:21:25 -0700194 if (size < 0) {
Simon Glass7b9cf84f2021-08-18 21:40:30 -0600195 printf("Cannot get file size of '%s'\n", fname);
Simon Glass8d176d82018-11-06 15:21:25 -0700196 goto err;
197 }
Simon Glass7b9cf84f2021-08-18 21:40:30 -0600198
Simon Glassedd094e2021-02-06 09:57:33 -0700199 *bufp = os_malloc(size);
Simon Glass8d176d82018-11-06 15:21:25 -0700200 if (!*bufp) {
201 printf("Not enough memory to read file '%s'\n", fname);
202 ret = -ENOMEM;
203 goto err;
204 }
205 if (os_read(fd, *bufp, size) != size) {
206 printf("Cannot read from file '%s'\n", fname);
207 goto err;
208 }
209 os_close(fd);
210 *sizep = size;
211
212 return 0;
213err:
214 os_close(fd);
215 return ret;
216}
217
Simon Glasse4c25c82021-08-18 21:40:31 -0600218int os_map_file(const char *pathname, int os_flags, void **bufp, int *sizep)
219{
220 void *ptr;
Heinrich Schuchardt6db1b652023-04-05 11:34:15 +0200221 off_t size;
Sean Andersonc7bc6cd2023-11-04 15:57:33 -0400222 int ifd, ret = 0;
Simon Glasse4c25c82021-08-18 21:40:31 -0600223
224 ifd = os_open(pathname, os_flags);
225 if (ifd < 0) {
226 printf("Cannot open file '%s'\n", pathname);
227 return -EIO;
228 }
229 size = os_filesize(ifd);
230 if (size < 0) {
231 printf("Cannot get file size of '%s'\n", pathname);
Sean Andersonc7bc6cd2023-11-04 15:57:33 -0400232 ret = -EIO;
233 goto out;
Simon Glasse4c25c82021-08-18 21:40:31 -0600234 }
Heinrich Schuchardt6db1b652023-04-05 11:34:15 +0200235 if ((unsigned long long)size > (unsigned long long)SIZE_MAX) {
236 printf("File '%s' too large to map\n", pathname);
Sean Andersonc7bc6cd2023-11-04 15:57:33 -0400237 ret = -EIO;
238 goto out;
Heinrich Schuchardt6db1b652023-04-05 11:34:15 +0200239 }
Simon Glasse4c25c82021-08-18 21:40:31 -0600240
241 ptr = mmap(0, size, PROT_READ | PROT_WRITE, MAP_SHARED, ifd, 0);
242 if (ptr == MAP_FAILED) {
243 printf("Can't map file '%s': %s\n", pathname, strerror(errno));
Sean Andersonc7bc6cd2023-11-04 15:57:33 -0400244 ret = -EPERM;
245 goto out;
Simon Glasse4c25c82021-08-18 21:40:31 -0600246 }
247
248 *bufp = ptr;
249 *sizep = size;
250
Sean Andersonc7bc6cd2023-11-04 15:57:33 -0400251out:
252 os_close(ifd);
253 return ret;
Simon Glasse4c25c82021-08-18 21:40:31 -0600254}
255
Simon Glass5c1fd582021-10-23 17:25:58 -0600256int os_unmap(void *buf, int size)
257{
258 if (munmap(buf, size)) {
259 printf("Can't unmap %p %x\n", buf, size);
260 return -EIO;
261 }
262
263 return 0;
264}
265
Simon Glass528a0f62023-08-24 13:55:37 -0600266int os_persistent_file(char *buf, int maxsize, const char *fname)
267{
268 const char *dirname = getenv("U_BOOT_PERSISTENT_DATA_DIR");
269 char *ptr;
270 int len;
271
272 len = strlen(fname) + (dirname ? strlen(dirname) + 1 : 0) + 1;
273 if (len > maxsize)
274 return -ENOSPC;
275
276 ptr = buf;
277 if (dirname) {
278 strcpy(ptr, dirname);
279 ptr += strlen(dirname);
280 *ptr++ = '/';
281 }
282 strcpy(ptr, fname);
283
284 if (access(buf, F_OK) == -1)
285 return -ENOENT;
286
287 return 0;
288}
289
Sean Anderson988996f2023-11-04 16:37:51 -0400290int os_mktemp(char *fname, off_t size)
291{
292 int fd;
293
294 fd = mkostemp(fname, O_CLOEXEC);
295 if (fd < 0)
296 return -errno;
297
298 if (unlink(fname) < 0)
299 return -errno;
300
301 if (ftruncate(fd, size))
302 return -errno;
303
304 return fd;
305}
306
Mike Frysingera5baaee2011-10-26 00:21:29 +0000307/* Restore tty state when we exit */
308static struct termios orig_term;
Simon Glass678ef472014-02-27 13:26:22 -0700309static bool term_setup;
Simon Glassae50ec72018-10-01 11:55:20 -0600310static bool term_nonblock;
Mike Frysingera5baaee2011-10-26 00:21:29 +0000311
Simon Glass9c3b7d62015-05-10 21:07:27 -0600312void os_fd_restore(void)
Mike Frysingera5baaee2011-10-26 00:21:29 +0000313{
Simon Glass9c3b7d62015-05-10 21:07:27 -0600314 if (term_setup) {
Simon Glassae50ec72018-10-01 11:55:20 -0600315 int flags;
316
Simon Glass678ef472014-02-27 13:26:22 -0700317 tcsetattr(0, TCSANOW, &orig_term);
Simon Glassae50ec72018-10-01 11:55:20 -0600318 if (term_nonblock) {
319 flags = fcntl(0, F_GETFL, 0);
320 fcntl(0, F_SETFL, flags & ~O_NONBLOCK);
321 }
Simon Glass9c3b7d62015-05-10 21:07:27 -0600322 term_setup = false;
323 }
Mike Frysingera5baaee2011-10-26 00:21:29 +0000324}
325
Rasmus Villemoes2b72ad22020-02-14 10:58:37 +0000326static void os_sigint_handler(int sig)
327{
328 os_fd_restore();
329 signal(SIGINT, SIG_DFL);
330 raise(SIGINT);
331}
332
Heinrich Schuchardt28eb5092020-11-12 00:29:56 +0100333static void os_signal_handler(int sig, siginfo_t *info, void *con)
334{
335 ucontext_t __maybe_unused *context = con;
336 unsigned long pc;
337
338#if defined(__x86_64__)
339 pc = context->uc_mcontext.gregs[REG_RIP];
340#elif defined(__aarch64__)
341 pc = context->uc_mcontext.pc;
342#elif defined(__riscv)
343 pc = context->uc_mcontext.__gregs[REG_PC];
344#else
345 const char msg[] =
346 "\nUnsupported architecture, cannot read program counter\n";
347
348 os_write(1, msg, sizeof(msg));
349 pc = 0;
350#endif
351
352 os_signal_action(sig, pc);
353}
354
355int os_setup_signal_handlers(void)
356{
357 struct sigaction act;
358
359 act.sa_sigaction = os_signal_handler;
360 sigemptyset(&act.sa_mask);
Heinrich Schuchardtd3741bc2021-07-05 19:43:00 +0200361 act.sa_flags = SA_SIGINFO;
Heinrich Schuchardt28eb5092020-11-12 00:29:56 +0100362 if (sigaction(SIGILL, &act, NULL) ||
363 sigaction(SIGBUS, &act, NULL) ||
364 sigaction(SIGSEGV, &act, NULL))
365 return -1;
366 return 0;
367}
368
Mike Frysingera5baaee2011-10-26 00:21:29 +0000369/* Put tty into raw mode so <tab> and <ctrl+c> work */
Simon Glass678ef472014-02-27 13:26:22 -0700370void os_tty_raw(int fd, bool allow_sigs)
Mike Frysingera5baaee2011-10-26 00:21:29 +0000371{
Mike Frysingera5baaee2011-10-26 00:21:29 +0000372 struct termios term;
Simon Glassae50ec72018-10-01 11:55:20 -0600373 int flags;
Mike Frysingera5baaee2011-10-26 00:21:29 +0000374
Simon Glass678ef472014-02-27 13:26:22 -0700375 if (term_setup)
Mike Frysingera5baaee2011-10-26 00:21:29 +0000376 return;
Mike Frysingera5baaee2011-10-26 00:21:29 +0000377
378 /* If not a tty, don't complain */
379 if (tcgetattr(fd, &orig_term))
380 return;
381
382 term = orig_term;
383 term.c_iflag = IGNBRK | IGNPAR;
384 term.c_oflag = OPOST | ONLCR;
385 term.c_cflag = CS8 | CREAD | CLOCAL;
Simon Glass678ef472014-02-27 13:26:22 -0700386 term.c_lflag = allow_sigs ? ISIG : 0;
Mike Frysingera5baaee2011-10-26 00:21:29 +0000387 if (tcsetattr(fd, TCSANOW, &term))
388 return;
389
Simon Glassae50ec72018-10-01 11:55:20 -0600390 flags = fcntl(fd, F_GETFL, 0);
391 if (!(flags & O_NONBLOCK)) {
392 if (fcntl(fd, F_SETFL, flags | O_NONBLOCK))
393 return;
394 term_nonblock = true;
395 }
396
Simon Glass9c3b7d62015-05-10 21:07:27 -0600397 term_setup = true;
Mike Frysingera5baaee2011-10-26 00:21:29 +0000398 atexit(os_fd_restore);
Rasmus Villemoes2b72ad22020-02-14 10:58:37 +0000399 signal(SIGINT, os_sigint_handler);
Mike Frysingera5baaee2011-10-26 00:21:29 +0000400}
Matthias Weisserb5f7b472011-11-05 11:40:34 +0100401
Simon Glass4c902fa2021-02-06 09:57:32 -0700402/*
403 * Provide our own malloc so we don't use space in the sandbox ram_buf for
404 * allocations that are internal to sandbox, or need to be done before U-Boot's
405 * malloc() is ready.
406 */
Matthias Weisserb5f7b472011-11-05 11:40:34 +0100407void *os_malloc(size_t length)
408{
Simon Glassbe005d82018-09-15 00:50:54 -0600409 int page_size = getpagesize();
Simon Glassfc2dde82019-04-08 13:20:42 -0600410 struct os_mem_hdr *hdr;
Simon Glass1e6594c2013-11-10 10:26:57 -0700411
Simon Glass4c902fa2021-02-06 09:57:32 -0700412 if (!length)
413 return NULL;
Simon Glass57ba9422018-06-17 08:57:43 -0600414 /*
415 * Use an address that is hopefully available to us so that pointers
416 * to this memory are fairly obvious. If we end up with a different
417 * address, that's fine too.
418 */
419 hdr = mmap((void *)0x10000000, length + page_size,
Alexander Graf934a5452018-06-22 14:44:13 +0200420 PROT_READ | PROT_WRITE | PROT_EXEC,
421 MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
Simon Glass1e6594c2013-11-10 10:26:57 -0700422 if (hdr == MAP_FAILED)
423 return NULL;
424 hdr->length = length;
425
Simon Glassbe005d82018-09-15 00:50:54 -0600426 return (void *)hdr + page_size;
Simon Glass1e6594c2013-11-10 10:26:57 -0700427}
428
Masahiro Yamadaee957282014-01-15 13:06:41 +0900429void os_free(void *ptr)
Simon Glass1e6594c2013-11-10 10:26:57 -0700430{
Simon Glassfc2dde82019-04-08 13:20:42 -0600431 int page_size = getpagesize();
432 struct os_mem_hdr *hdr;
Simon Glass1e6594c2013-11-10 10:26:57 -0700433
Simon Glassfc2dde82019-04-08 13:20:42 -0600434 if (ptr) {
435 hdr = ptr - page_size;
436 munmap(hdr, hdr->length + page_size);
437 }
Simon Glass4c902fa2021-02-06 09:57:32 -0700438}
439
440/* These macros are from kernel.h but not accessible in this file */
441#define ALIGN(x, a) __ALIGN_MASK((x), (typeof(x))(a) - 1)
442#define __ALIGN_MASK(x, mask) (((x) + (mask)) & ~(mask))
443
444/*
445 * Provide our own malloc so we don't use space in the sandbox ram_buf for
446 * allocations that are internal to sandbox, or need to be done before U-Boot's
447 * malloc() is ready.
448 */
449void *os_realloc(void *ptr, size_t length)
450{
451 int page_size = getpagesize();
452 struct os_mem_hdr *hdr;
453 void *new_ptr;
454
455 /* Reallocating a NULL pointer is just an alloc */
456 if (!ptr)
457 return os_malloc(length);
458
459 /* Changing a length to 0 is just a free */
460 if (length) {
461 os_free(ptr);
462 return NULL;
463 }
464
465 /*
466 * If the new size is the same number of pages as the old, nothing to
467 * do. There isn't much point in shrinking things
468 */
469 hdr = ptr - page_size;
470 if (ALIGN(length, page_size) <= ALIGN(hdr->length, page_size))
471 return ptr;
472
473 /* We have to grow it, so allocate something new */
474 new_ptr = os_malloc(length);
475 memcpy(new_ptr, ptr, hdr->length);
476 os_free(ptr);
477
478 return new_ptr;
Simon Glass1e6594c2013-11-10 10:26:57 -0700479}
480
Matthias Weisser0d3dd142011-11-29 12:16:40 +0100481void os_usleep(unsigned long usec)
482{
483 usleep(usec);
484}
485
Simon Glassfb4b4e82013-05-19 16:45:35 -0700486uint64_t __attribute__((no_instrument_function)) os_get_nsec(void)
Matthias Weisser0d3dd142011-11-29 12:16:40 +0100487{
488#if defined(CLOCK_MONOTONIC) && defined(_POSIX_MONOTONIC_CLOCK)
489 struct timespec tp;
490 if (EINVAL == clock_gettime(CLOCK_MONOTONIC, &tp)) {
491 struct timeval tv;
492
493 gettimeofday(&tv, NULL);
494 tp.tv_sec = tv.tv_sec;
495 tp.tv_nsec = tv.tv_usec * 1000;
496 }
497 return tp.tv_sec * 1000000000ULL + tp.tv_nsec;
498#else
499 struct timeval tv;
500 gettimeofday(&tv, NULL);
501 return tv.tv_sec * 1000000000ULL + tv.tv_usec * 1000;
502#endif
503}
Simon Glass8a3e0352012-02-15 15:51:16 -0800504
505static char *short_opts;
506static struct option *long_opts;
507
508int os_parse_args(struct sandbox_state *state, int argc, char *argv[])
509{
Marek Behún184c4af2021-05-20 13:24:06 +0200510 struct sandbox_cmdline_option **sb_opt =
511 __u_boot_sandbox_option_start();
Simon Glass8a3e0352012-02-15 15:51:16 -0800512 size_t num_options = __u_boot_sandbox_option_count();
513 size_t i;
514
515 int hidden_short_opt;
516 size_t si;
517
518 int c;
519
520 if (short_opts || long_opts)
521 return 1;
522
523 state->argc = argc;
524 state->argv = argv;
525
526 /* dynamically construct the arguments to the system getopt_long */
Simon Glassedd094e2021-02-06 09:57:33 -0700527 short_opts = os_malloc(sizeof(*short_opts) * num_options * 2 + 1);
528 long_opts = os_malloc(sizeof(*long_opts) * (num_options + 1));
Simon Glass8a3e0352012-02-15 15:51:16 -0800529 if (!short_opts || !long_opts)
530 return 1;
531
532 /*
533 * getopt_long requires "val" to be unique (since that is what the
534 * func returns), so generate unique values automatically for flags
535 * that don't have a short option. pick 0x100 as that is above the
536 * single byte range (where ASCII/ISO-XXXX-X charsets live).
537 */
538 hidden_short_opt = 0x100;
539 si = 0;
540 for (i = 0; i < num_options; ++i) {
541 long_opts[i].name = sb_opt[i]->flag;
542 long_opts[i].has_arg = sb_opt[i]->has_arg ?
543 required_argument : no_argument;
544 long_opts[i].flag = NULL;
545
546 if (sb_opt[i]->flag_short) {
547 short_opts[si++] = long_opts[i].val = sb_opt[i]->flag_short;
548 if (long_opts[i].has_arg == required_argument)
549 short_opts[si++] = ':';
550 } else
551 long_opts[i].val = sb_opt[i]->flag_short = hidden_short_opt++;
552 }
553 short_opts[si] = '\0';
554
555 /* we need to handle output ourselves since u-boot provides printf */
556 opterr = 0;
557
Simon Glass0a4eabb2020-02-03 07:36:04 -0700558 memset(&long_opts[num_options], '\0', sizeof(*long_opts));
Simon Glass8a3e0352012-02-15 15:51:16 -0800559 /*
560 * walk all of the options the user gave us on the command line,
561 * figure out what u-boot option structure they belong to (via
562 * the unique short val key), and call the appropriate callback.
563 */
564 while ((c = getopt_long(argc, argv, short_opts, long_opts, NULL)) != -1) {
565 for (i = 0; i < num_options; ++i) {
566 if (sb_opt[i]->flag_short == c) {
567 if (sb_opt[i]->callback(state, optarg)) {
568 state->parse_err = sb_opt[i]->flag;
569 return 0;
570 }
571 break;
572 }
573 }
574 if (i == num_options) {
575 /*
576 * store the faulting flag for later display. we have to
577 * store the flag itself as the getopt parsing itself is
578 * tricky: need to handle the following flags (assume all
579 * of the below are unknown):
580 * -a optopt='a' optind=<next>
581 * -abbbb optopt='a' optind=<this>
582 * -aaaaa optopt='a' optind=<this>
583 * --a optopt=0 optind=<this>
584 * as you can see, it is impossible to determine the exact
585 * faulting flag without doing the parsing ourselves, so
586 * we just report the specific flag that failed.
587 */
588 if (optopt) {
589 static char parse_err[3] = { '-', 0, '\0', };
590 parse_err[1] = optopt;
591 state->parse_err = parse_err;
592 } else
593 state->parse_err = argv[optind - 1];
594 break;
595 }
596 }
597
598 return 0;
599}
Simon Glassf1c45c82012-12-26 09:53:34 +0000600
601void os_dirent_free(struct os_dirent_node *node)
602{
603 struct os_dirent_node *next;
604
605 while (node) {
606 next = node->next;
Simon Glassedd094e2021-02-06 09:57:33 -0700607 os_free(node);
Simon Glassf1c45c82012-12-26 09:53:34 +0000608 node = next;
609 }
610}
611
612int os_dirent_ls(const char *dirname, struct os_dirent_node **headp)
613{
Stefan Brünsae71ede2016-10-01 20:41:42 +0200614 struct dirent *entry;
Simon Glassf1c45c82012-12-26 09:53:34 +0000615 struct os_dirent_node *head, *node, *next;
616 struct stat buf;
617 DIR *dir;
618 int ret;
619 char *fname;
Heinrich Schuchardtf53b5ea2017-09-21 12:56:07 +0200620 char *old_fname;
Simon Glassf1c45c82012-12-26 09:53:34 +0000621 int len;
Stefan Brünsb2129902016-10-01 20:41:40 +0200622 int dirlen;
Simon Glassf1c45c82012-12-26 09:53:34 +0000623
624 *headp = NULL;
625 dir = opendir(dirname);
626 if (!dir)
627 return -1;
628
Stefan Brünsb2129902016-10-01 20:41:40 +0200629 /* Create a buffer upfront, with typically sufficient size */
630 dirlen = strlen(dirname) + 2;
631 len = dirlen + 256;
Simon Glassedd094e2021-02-06 09:57:33 -0700632 fname = os_malloc(len);
Simon Glassf1c45c82012-12-26 09:53:34 +0000633 if (!fname) {
634 ret = -ENOMEM;
635 goto done;
636 }
637
638 for (node = head = NULL;; node = next) {
Stefan Brünsae71ede2016-10-01 20:41:42 +0200639 errno = 0;
640 entry = readdir(dir);
641 if (!entry) {
642 ret = errno;
Simon Glassf1c45c82012-12-26 09:53:34 +0000643 break;
Stefan Brünsae71ede2016-10-01 20:41:42 +0200644 }
Simon Glassedd094e2021-02-06 09:57:33 -0700645 next = os_malloc(sizeof(*node) + strlen(entry->d_name) + 1);
Heinrich Schuchardtf53b5ea2017-09-21 12:56:07 +0200646 if (!next) {
Simon Glassf1c45c82012-12-26 09:53:34 +0000647 os_dirent_free(head);
648 ret = -ENOMEM;
649 goto done;
650 }
Heinrich Schuchardtf53b5ea2017-09-21 12:56:07 +0200651 if (dirlen + strlen(entry->d_name) > len) {
652 len = dirlen + strlen(entry->d_name);
653 old_fname = fname;
Simon Glassedd094e2021-02-06 09:57:33 -0700654 fname = os_realloc(fname, len);
Heinrich Schuchardtf53b5ea2017-09-21 12:56:07 +0200655 if (!fname) {
Simon Glassedd094e2021-02-06 09:57:33 -0700656 os_free(old_fname);
657 os_free(next);
Heinrich Schuchardtf53b5ea2017-09-21 12:56:07 +0200658 os_dirent_free(head);
659 ret = -ENOMEM;
660 goto done;
661 }
662 }
Stephen Warren9671c672014-06-11 10:26:23 -0600663 next->next = NULL;
Stefan Brünsae71ede2016-10-01 20:41:42 +0200664 strcpy(next->name, entry->d_name);
665 switch (entry->d_type) {
Simon Glassf1c45c82012-12-26 09:53:34 +0000666 case DT_REG:
667 next->type = OS_FILET_REG;
668 break;
669 case DT_DIR:
670 next->type = OS_FILET_DIR;
671 break;
672 case DT_LNK:
673 next->type = OS_FILET_LNK;
674 break;
Stefan Brünsb7ffa822016-10-04 21:46:35 +0200675 default:
676 next->type = OS_FILET_UNKNOWN;
Simon Glassf1c45c82012-12-26 09:53:34 +0000677 }
678 next->size = 0;
679 snprintf(fname, len, "%s/%s", dirname, next->name);
680 if (!stat(fname, &buf))
681 next->size = buf.st_size;
682 if (node)
683 node->next = next;
Stefan Brünsd4cb8882016-10-01 20:41:39 +0200684 else
685 head = next;
Simon Glassf1c45c82012-12-26 09:53:34 +0000686 }
687 *headp = head;
688
689done:
690 closedir(dir);
Simon Glassedd094e2021-02-06 09:57:33 -0700691 os_free(fname);
Simon Glassf1c45c82012-12-26 09:53:34 +0000692 return ret;
693}
694
695const char *os_dirent_typename[OS_FILET_COUNT] = {
696 " ",
697 "SYM",
698 "DIR",
699 "???",
700};
701
702const char *os_dirent_get_typename(enum os_dirent_t type)
703{
Tom Rinib6f605e2017-05-13 20:11:30 -0400704 if (type >= OS_FILET_REG && type < OS_FILET_COUNT)
Simon Glassf1c45c82012-12-26 09:53:34 +0000705 return os_dirent_typename[type];
706
707 return os_dirent_typename[OS_FILET_UNKNOWN];
708}
709
Heinrich Schuchardt011a1e02022-01-11 01:50:24 +0100710/*
711 * For compatibility reasons avoid loff_t here.
712 * U-Boot defines loff_t as long long.
713 * But /usr/include/linux/types.h may not define it at all.
714 * Alpine Linux being one example.
715 */
716int os_get_filesize(const char *fname, long long *size)
Simon Glassf1c45c82012-12-26 09:53:34 +0000717{
718 struct stat buf;
719 int ret;
720
721 ret = stat(fname, &buf);
722 if (ret)
723 return ret;
Suriyan Ramasami378da1032014-11-17 14:39:37 -0800724 *size = buf.st_size;
725 return 0;
Simon Glassf1c45c82012-12-26 09:53:34 +0000726}
Simon Glass3e9fd242013-11-10 10:27:01 -0700727
Simon Glass29d11432017-12-04 13:48:17 -0700728void os_putc(int ch)
729{
Simon Glassd56c6f42022-03-27 14:26:14 -0600730 os_write(1, &ch, 1);
Simon Glass29d11432017-12-04 13:48:17 -0700731}
732
733void os_puts(const char *str)
734{
735 while (*str)
736 os_putc(*str++);
737}
738
Pali Rohár4acd1a02022-09-05 11:31:16 +0200739void os_flush(void)
740{
741 fflush(stdout);
742}
743
Simon Glass9dd10bf2013-11-10 10:27:03 -0700744int os_write_ram_buf(const char *fname)
745{
746 struct sandbox_state *state = state_get_current();
747 int fd, ret;
748
749 fd = open(fname, O_CREAT | O_WRONLY, 0777);
750 if (fd < 0)
751 return -ENOENT;
752 ret = write(fd, state->ram_buf, state->ram_size);
753 close(fd);
754 if (ret != state->ram_size)
755 return -EIO;
756
757 return 0;
758}
759
760int os_read_ram_buf(const char *fname)
761{
762 struct sandbox_state *state = state_get_current();
763 int fd, ret;
Heinrich Schuchardt011a1e02022-01-11 01:50:24 +0100764 long long size;
Simon Glass9dd10bf2013-11-10 10:27:03 -0700765
Suriyan Ramasami378da1032014-11-17 14:39:37 -0800766 ret = os_get_filesize(fname, &size);
767 if (ret < 0)
768 return ret;
Simon Glass9dd10bf2013-11-10 10:27:03 -0700769 if (size != state->ram_size)
770 return -ENOSPC;
771 fd = open(fname, O_RDONLY);
772 if (fd < 0)
773 return -ENOENT;
774
775 ret = read(fd, state->ram_buf, state->ram_size);
776 close(fd);
777 if (ret != state->ram_size)
778 return -EIO;
779
780 return 0;
781}
Simon Glass860b7d92014-02-27 13:26:15 -0700782
783static int make_exec(char *fname, const void *data, int size)
784{
785 int fd;
786
787 strcpy(fname, "/tmp/u-boot.jump.XXXXXX");
788 fd = mkstemp(fname);
789 if (fd < 0)
790 return -ENOENT;
791 if (write(fd, data, size) < 0)
792 return -EIO;
793 close(fd);
794 if (chmod(fname, 0777))
795 return -ENOEXEC;
796
797 return 0;
798}
799
Simon Glass7dafd022018-11-15 18:44:05 -0700800/**
801 * add_args() - Allocate a new argv with the given args
802 *
803 * This is used to create a new argv array with all the old arguments and some
804 * new ones that are passed in
805 *
806 * @argvp: Returns newly allocated args list
807 * @add_args: Arguments to add, each a string
808 * @count: Number of arguments in @add_args
Heinrich Schuchardt47b4c022022-01-19 18:05:50 +0100809 * Return: 0 if OK, -ENOMEM if out of memory
Simon Glass7dafd022018-11-15 18:44:05 -0700810 */
811static int add_args(char ***argvp, char *add_args[], int count)
Simon Glass860b7d92014-02-27 13:26:15 -0700812{
Simon Glass7465f002018-11-15 18:44:07 -0700813 char **argv, **ap;
Simon Glass860b7d92014-02-27 13:26:15 -0700814 int argc;
815
Simon Glass7465f002018-11-15 18:44:07 -0700816 for (argc = 0; (*argvp)[argc]; argc++)
Simon Glass860b7d92014-02-27 13:26:15 -0700817 ;
818
Simon Glassedd094e2021-02-06 09:57:33 -0700819 argv = os_malloc((argc + count + 1) * sizeof(char *));
Simon Glass860b7d92014-02-27 13:26:15 -0700820 if (!argv) {
821 printf("Out of memory for %d argv\n", count);
822 return -ENOMEM;
823 }
Simon Glass7465f002018-11-15 18:44:07 -0700824 for (ap = *argvp, argc = 0; *ap; ap++) {
825 char *arg = *ap;
826
827 /* Drop args that we don't want to propagate */
828 if (*arg == '-' && strlen(arg) == 2) {
829 switch (arg[1]) {
830 case 'j':
831 case 'm':
832 ap++;
833 continue;
834 }
835 } else if (!strcmp(arg, "--rm_memory")) {
Simon Glass7465f002018-11-15 18:44:07 -0700836 continue;
837 }
838 argv[argc++] = arg;
839 }
840
Simon Glass860b7d92014-02-27 13:26:15 -0700841 memcpy(argv + argc, add_args, count * sizeof(char *));
842 argv[argc + count] = NULL;
843
844 *argvp = argv;
845 return 0;
846}
847
Simon Glass7dafd022018-11-15 18:44:05 -0700848/**
849 * os_jump_to_file() - Jump to a new program
850 *
851 * This saves the memory buffer, sets up arguments to the new process, then
852 * execs it.
853 *
854 * @fname: Filename to exec
Heinrich Schuchardt47b4c022022-01-19 18:05:50 +0100855 * Return: does not return on success, any return value is an error
Simon Glass7dafd022018-11-15 18:44:05 -0700856 */
Simon Glassdafc5d72021-03-15 18:11:07 +1300857static int os_jump_to_file(const char *fname, bool delete_it)
Simon Glass860b7d92014-02-27 13:26:15 -0700858{
859 struct sandbox_state *state = state_get_current();
Simon Glass7dafd022018-11-15 18:44:05 -0700860 char mem_fname[30];
Simon Glass860b7d92014-02-27 13:26:15 -0700861 int fd, err;
Simon Glass7dafd022018-11-15 18:44:05 -0700862 char *extra_args[5];
Simon Glass860b7d92014-02-27 13:26:15 -0700863 char **argv = state->argv;
Simon Glass7465f002018-11-15 18:44:07 -0700864 int argc;
Simon Glass860b7d92014-02-27 13:26:15 -0700865#ifdef DEBUG
Simon Glass7dafd022018-11-15 18:44:05 -0700866 int i;
Simon Glass860b7d92014-02-27 13:26:15 -0700867#endif
868
Simon Glass860b7d92014-02-27 13:26:15 -0700869 strcpy(mem_fname, "/tmp/u-boot.mem.XXXXXX");
870 fd = mkstemp(mem_fname);
871 if (fd < 0)
872 return -ENOENT;
873 close(fd);
874 err = os_write_ram_buf(mem_fname);
875 if (err)
876 return err;
877
878 os_fd_restore();
879
Simon Glassdafc5d72021-03-15 18:11:07 +1300880 argc = 0;
881 if (delete_it) {
882 extra_args[argc++] = "-j";
883 extra_args[argc++] = (char *)fname;
884 }
885 extra_args[argc++] = "-m";
886 extra_args[argc++] = mem_fname;
Simon Glass7465f002018-11-15 18:44:07 -0700887 if (state->ram_buf_rm)
888 extra_args[argc++] = "--rm_memory";
889 err = add_args(&argv, extra_args, argc);
Simon Glass860b7d92014-02-27 13:26:15 -0700890 if (err)
891 return err;
Simon Glass7465f002018-11-15 18:44:07 -0700892 argv[0] = (char *)fname;
Simon Glass860b7d92014-02-27 13:26:15 -0700893
894#ifdef DEBUG
895 for (i = 0; argv[i]; i++)
896 printf("%d %s\n", i, argv[i]);
897#endif
898
899 if (state_uninit())
900 os_exit(2);
901
902 err = execv(fname, argv);
Simon Glassedd094e2021-02-06 09:57:33 -0700903 os_free(argv);
Simon Glasscca25522018-11-15 18:44:08 -0700904 if (err) {
905 perror("Unable to run image");
Simon Glass23eabbb2018-11-23 21:29:24 -0700906 printf("Image filename '%s'\n", fname);
Simon Glass860b7d92014-02-27 13:26:15 -0700907 return err;
Simon Glasscca25522018-11-15 18:44:08 -0700908 }
Simon Glass860b7d92014-02-27 13:26:15 -0700909
Simon Glassdafc5d72021-03-15 18:11:07 +1300910 if (delete_it)
911 return unlink(fname);
912
913 return -EFAULT;
Simon Glass860b7d92014-02-27 13:26:15 -0700914}
Simon Glass504548f2015-04-20 12:37:22 -0600915
Simon Glass7dafd022018-11-15 18:44:05 -0700916int os_jump_to_image(const void *dest, int size)
917{
918 char fname[30];
919 int err;
920
921 err = make_exec(fname, dest, size);
922 if (err)
923 return err;
924
Simon Glassdafc5d72021-03-15 18:11:07 +1300925 return os_jump_to_file(fname, true);
Simon Glass7dafd022018-11-15 18:44:05 -0700926}
927
Simon Glass1cd06002021-07-05 16:32:45 -0600928int os_find_u_boot(char *fname, int maxlen, bool use_img,
929 const char *cur_prefix, const char *next_prefix)
Simon Glass2c931ba2016-07-04 11:57:45 -0600930{
931 struct sandbox_state *state = state_get_current();
932 const char *progname = state->argv[0];
933 int len = strlen(progname);
Simon Glass1cd06002021-07-05 16:32:45 -0600934 char subdir[10];
935 char *suffix;
Simon Glass2c931ba2016-07-04 11:57:45 -0600936 char *p;
937 int fd;
938
939 if (len >= maxlen || len < 4)
940 return -ENOSPC;
941
Simon Glass2c931ba2016-07-04 11:57:45 -0600942 strcpy(fname, progname);
Simon Glassdc4d8eb2018-10-01 11:55:10 -0600943 suffix = fname + len - 4;
944
Simon Glass1cd06002021-07-05 16:32:45 -0600945 /* Change the existing suffix to the new one */
946 if (*suffix != '-')
947 return -EINVAL;
Simon Glassdc4d8eb2018-10-01 11:55:10 -0600948
Simon Glass1cd06002021-07-05 16:32:45 -0600949 if (*next_prefix)
950 strcpy(suffix + 1, next_prefix); /* e.g. "-tpl" to "-spl" */
951 else
952 *suffix = '\0'; /* e.g. "-spl" to "" */
953 fd = os_open(fname, O_RDONLY);
954 if (fd >= 0) {
955 close(fd);
956 return 0;
Simon Glassdc4d8eb2018-10-01 11:55:10 -0600957 }
958
Simon Glass1cd06002021-07-05 16:32:45 -0600959 /*
960 * We didn't find it, so try looking for 'u-boot-xxx' in the xxx/
961 * directory. Replace the old dirname with the new one.
962 */
963 snprintf(subdir, sizeof(subdir), "/%s/", cur_prefix);
964 p = strstr(fname, subdir);
Simon Glass2c931ba2016-07-04 11:57:45 -0600965 if (p) {
Simon Glass1cd06002021-07-05 16:32:45 -0600966 if (*next_prefix)
967 /* e.g. ".../tpl/u-boot-spl" to "../spl/u-boot-spl" */
968 memcpy(p + 1, next_prefix, strlen(next_prefix));
969 else
970 /* e.g. ".../spl/u-boot" to ".../u-boot" */
971 strcpy(p, p + 1 + strlen(cur_prefix));
Simon Glassb90e4872021-03-07 17:35:13 -0700972 if (use_img)
973 strcat(p, ".img");
Simon Glass1cd06002021-07-05 16:32:45 -0600974
Simon Glass2c931ba2016-07-04 11:57:45 -0600975 fd = os_open(fname, O_RDONLY);
976 if (fd >= 0) {
977 close(fd);
978 return 0;
979 }
980 }
981
982 return -ENOENT;
983}
984
985int os_spl_to_uboot(const char *fname)
986{
Patrick Delaunay6daf9052020-11-20 09:48:33 +0100987 struct sandbox_state *state = state_get_current();
988
Patrick Delaunay6daf9052020-11-20 09:48:33 +0100989 /* U-Boot will delete ram buffer after read: "--rm_memory"*/
990 state->ram_buf_rm = true;
Simon Glassdafc5d72021-03-15 18:11:07 +1300991
992 return os_jump_to_file(fname, false);
Simon Glass2c931ba2016-07-04 11:57:45 -0600993}
994
Heinrich Schuchardtc0d1a002020-12-30 18:07:48 +0100995long os_get_time_offset(void)
996{
997 const char *offset;
998
999 offset = getenv(ENV_TIME_OFFSET);
1000 if (offset)
1001 return strtol(offset, NULL, 0);
1002 return 0;
1003}
1004
1005void os_set_time_offset(long offset)
1006{
1007 char buf[21];
1008 int ret;
1009
1010 snprintf(buf, sizeof(buf), "%ld", offset);
1011 ret = setenv(ENV_TIME_OFFSET, buf, true);
1012 if (ret)
1013 printf("Could not set environment variable %s\n",
1014 ENV_TIME_OFFSET);
1015}
1016
Simon Glass504548f2015-04-20 12:37:22 -06001017void os_localtime(struct rtc_time *rt)
1018{
1019 time_t t = time(NULL);
1020 struct tm *tm;
1021
1022 tm = localtime(&t);
1023 rt->tm_sec = tm->tm_sec;
1024 rt->tm_min = tm->tm_min;
1025 rt->tm_hour = tm->tm_hour;
1026 rt->tm_mday = tm->tm_mday;
1027 rt->tm_mon = tm->tm_mon + 1;
1028 rt->tm_year = tm->tm_year + 1900;
1029 rt->tm_wday = tm->tm_wday;
1030 rt->tm_yday = tm->tm_yday;
1031 rt->tm_isdst = tm->tm_isdst;
1032}
Simon Glass5dccd152018-05-16 09:42:22 -06001033
Simon Glassb7255ef2018-09-15 00:50:55 -06001034void os_abort(void)
1035{
1036 abort();
1037}
Simon Glass4e766c22018-10-01 21:12:32 -06001038
1039int os_mprotect_allow(void *start, size_t len)
1040{
1041 int page_size = getpagesize();
1042
1043 /* Move start to the start of a page, len to the end */
1044 start = (void *)(((ulong)start) & ~(page_size - 1));
1045 len = (len + page_size * 2) & ~(page_size - 1);
1046
1047 return mprotect(start, len, PROT_READ | PROT_WRITE);
1048}
Simon Glass752707a2019-04-08 13:20:41 -06001049
1050void *os_find_text_base(void)
1051{
1052 char line[500];
1053 void *base = NULL;
1054 int len;
1055 int fd;
1056
1057 /*
1058 * This code assumes that the first line of /proc/self/maps holds
1059 * information about the text, for example:
1060 *
1061 * 5622d9907000-5622d9a55000 r-xp 00000000 08:01 15067168 u-boot
1062 *
1063 * The first hex value is assumed to be the address.
1064 *
1065 * This is tested in Linux 4.15.
1066 */
1067 fd = open("/proc/self/maps", O_RDONLY);
1068 if (fd == -1)
1069 return NULL;
1070 len = read(fd, line, sizeof(line));
1071 if (len > 0) {
1072 char *end = memchr(line, '-', len);
1073
1074 if (end) {
Heinrich Schuchardt05a16842019-10-26 23:17:44 +02001075 uintptr_t addr;
Simon Glass752707a2019-04-08 13:20:41 -06001076
1077 *end = '\0';
Heinrich Schuchardt05a16842019-10-26 23:17:44 +02001078 if (sscanf(line, "%zx", &addr) == 1)
Simon Glass752707a2019-04-08 13:20:41 -06001079 base = (void *)addr;
1080 }
1081 }
1082 close(fd);
1083
1084 return base;
1085}
Heinrich Schuchardt1c678442020-10-27 20:29:25 +01001086
Heinrich Schuchardt79cb2412022-09-02 02:32:25 +02001087/**
1088 * os_unblock_signals() - unblock all signals
1089 *
1090 * If we are relaunching the sandbox in a signal handler, we have to unblock
1091 * the respective signal before calling execv(). See signal(7) man-page.
1092 */
1093static void os_unblock_signals(void)
1094{
1095 sigset_t sigs;
1096
1097 sigfillset(&sigs);
1098 sigprocmask(SIG_UNBLOCK, &sigs, NULL);
1099}
1100
Heinrich Schuchardt1c678442020-10-27 20:29:25 +01001101void os_relaunch(char *argv[])
1102{
Heinrich Schuchardt79cb2412022-09-02 02:32:25 +02001103 os_unblock_signals();
1104
Heinrich Schuchardt1c678442020-10-27 20:29:25 +01001105 execv(argv[0], argv);
1106 os_exit(1);
1107}
Andrew Scullca5d1372022-05-30 10:00:10 +00001108
Andrew Scull2b40f802022-05-30 10:00:11 +00001109
1110#ifdef CONFIG_FUZZ
1111static void *fuzzer_thread(void * ptr)
1112{
1113 char cmd[64];
1114 char *argv[5] = {"./u-boot", "-T", "-c", cmd, NULL};
1115 const char *fuzz_test;
1116
1117 /* Find which test to run from an environment variable. */
1118 fuzz_test = getenv("UBOOT_SB_FUZZ_TEST");
1119 if (!fuzz_test)
1120 os_abort();
1121
1122 snprintf(cmd, sizeof(cmd), "fuzz %s", fuzz_test);
1123
1124 sandbox_main(4, argv);
1125 os_abort();
1126 return NULL;
1127}
1128
1129static bool fuzzer_initialized = false;
1130static pthread_mutex_t fuzzer_mutex = PTHREAD_MUTEX_INITIALIZER;
1131static pthread_cond_t fuzzer_cond = PTHREAD_COND_INITIALIZER;
1132static const uint8_t *fuzzer_data;
1133static size_t fuzzer_size;
1134
1135int sandbox_fuzzing_engine_get_input(const uint8_t **data, size_t *size)
1136{
1137 if (!fuzzer_initialized)
1138 return -ENOSYS;
1139
1140 /* Tell the main thread we need new inputs then wait for them. */
1141 pthread_mutex_lock(&fuzzer_mutex);
1142 pthread_cond_signal(&fuzzer_cond);
1143 pthread_cond_wait(&fuzzer_cond, &fuzzer_mutex);
1144 *data = fuzzer_data;
1145 *size = fuzzer_size;
1146 pthread_mutex_unlock(&fuzzer_mutex);
1147 return 0;
1148}
1149
1150int LLVMFuzzerTestOneInput(const uint8_t *data, size_t size)
1151{
1152 static pthread_t tid;
1153
1154 pthread_mutex_lock(&fuzzer_mutex);
1155
1156 /* Initialize the sandbox on another thread. */
1157 if (!fuzzer_initialized) {
1158 fuzzer_initialized = true;
1159 if (pthread_create(&tid, NULL, fuzzer_thread, NULL))
1160 os_abort();
1161 pthread_cond_wait(&fuzzer_cond, &fuzzer_mutex);
1162 }
1163
1164 /* Hand over the input. */
1165 fuzzer_data = data;
1166 fuzzer_size = size;
1167 pthread_cond_signal(&fuzzer_cond);
1168
1169 /* Wait for the inputs to be finished with. */
1170 pthread_cond_wait(&fuzzer_cond, &fuzzer_mutex);
1171 pthread_mutex_unlock(&fuzzer_mutex);
1172
1173 return 0;
1174}
1175#else
Andrew Scullca5d1372022-05-30 10:00:10 +00001176int main(int argc, char *argv[])
1177{
1178 return sandbox_main(argc, argv);
1179}
Andrew Scull2b40f802022-05-30 10:00:11 +00001180#endif