1 /*
2 * Copyright (c) 2013 Oracle and/or its affiliates. All Rights Reserved.
3 *
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License as
6 * published by the Free Software Foundation; either version 2 of
7 * the License, or (at your option) any later version.
8 *
9 * This program is distributed in the hope that it would be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write the Free Software Foundation,
16 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
17 *
18 * Author: Alexey Kodanev <alexey.kodanev@oracle.com>
19 *
20 * Test checks kernel API to safely access user-space memory using
21 * copy_to_user(), copy_from_user(), get_user(), put_user() functions.
22 *
23 */
24
25 #include <stdio.h>
26 #include <stdlib.h>
27 #include <unistd.h>
28
29 #include "test.h"
30 #include "old_module.h"
31 #include "safe_macros.h"
32
33 #include "ltp_uaccess.h"
34
35 char *TCID = DEV_NAME;
36
37 static const char dev_result[] = "/sys/devices/" DEV_NAME "/result";
38 static const char dev_tcase[] = "/sys/devices/" DEV_NAME "/tcase";
39 static const char module_name[] = DEV_NAME ".ko";
40 static int module_loaded;
41
cleanup(void)42 static void cleanup(void)
43 {
44 if (module_loaded)
45 tst_module_unload(NULL, module_name);
46 }
47
set_ptr_to_sysfs(int id,const void * ptr,const char * descr)48 static int set_ptr_to_sysfs(int id, const void *ptr, const char *descr)
49 {
50 int res;
51 tst_resm(TINFO, "TC %d: %s, ptr '%p'", id, descr, ptr);
52 SAFE_FILE_PRINTF(cleanup, dev_tcase, "%d %lu", id, (unsigned long) ptr);
53 SAFE_FILE_SCANF(cleanup, dev_result, "%d", &res);
54 if (res)
55 return TFAIL;
56
57 return TPASS;
58 }
59
60 /*
61 * Read user-space memory using copy_from_user(), get_user().
62 */
tc_read_userspace(void)63 static void tc_read_userspace(void)
64 {
65 int res = set_ptr_to_sysfs(TC_READ_USER, test_str,
66 "read user-space memory from kernel");
67
68 tst_resm(res, "copy_from_user(), get_user(): strings%sequal",
69 (res) ? " not " : " ");
70 }
71
72 /*
73 * Write from kernel-space to user-space
74 * using copy_to_user(), put_user().
75 */
tc_write_userspace(void)76 static void tc_write_userspace(void)
77 {
78 char buf[str_size];
79 memset(buf, 0, str_size);
80
81 int res = set_ptr_to_sysfs(TC_WRITE_USER, buf,
82 "write from kernel-space to user-space");
83 if (res) {
84 tst_resm(TFAIL, "failed to write from kernel");
85 return;
86 }
87
88 res = strncmp(buf, test_str, str_size) ? TFAIL : TPASS;
89 tst_resm(res, "copy_to_user(), put_user(): strings%sequal",
90 (res) ? " not " : " ");
91 }
92
main(int argc,char * argv[])93 int main(int argc, char *argv[])
94 {
95 tst_parse_opts(argc, argv, NULL, NULL);
96
97 tst_require_root();
98
99 if (tst_kvercmp(2, 6, 0) < 0) {
100 tst_brkm(TCONF, NULL,
101 "Test must be run with kernel 2.6 or newer");
102 }
103
104 tst_sig(FORK, DEF_HANDLER, cleanup);
105
106 tst_module_load(NULL, module_name, NULL);
107 module_loaded = 1;
108
109 tc_read_userspace();
110 tc_write_userspace();
111
112 cleanup();
113 tst_exit();
114 }
115