• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (c) 2013 Oracle and/or its affiliates. All Rights Reserved.
3  *
4  * This program is free software; you can redistribute it and/or
5  * modify it under the terms of the GNU General Public License as
6  * published by the Free Software Foundation; either version 2 of
7  * the License, or (at your option) any later version.
8  *
9  * This program is distributed in the hope that it would be useful,
10  * but WITHOUT ANY WARRANTY; without even the implied warranty of
11  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
12  * GNU General Public License for more details.
13  *
14  * You should have received a copy of the GNU General Public License
15  * along with this program; if not, write the Free Software Foundation,
16  * Inc.,  51 Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
17  *
18  * Author: Alexey Kodanev <alexey.kodanev@oracle.com>
19  *
20  * Test checks kernel API to safely access user-space memory using
21  * copy_to_user(), copy_from_user(), get_user(), put_user() functions.
22  *
23  */
24 
25 #include <stdio.h>
26 #include <stdlib.h>
27 #include <unistd.h>
28 
29 #include "test.h"
30 #include "old_module.h"
31 #include "safe_macros.h"
32 
33 #include "ltp_uaccess.h"
34 
35 char *TCID = DEV_NAME;
36 
37 static const char dev_result[]	= "/sys/devices/" DEV_NAME "/result";
38 static const char dev_tcase[]	= "/sys/devices/" DEV_NAME "/tcase";
39 static const char module_name[]	= DEV_NAME ".ko";
40 static int module_loaded;
41 
cleanup(void)42 static void cleanup(void)
43 {
44 	if (module_loaded)
45 		tst_module_unload(NULL, module_name);
46 }
47 
set_ptr_to_sysfs(int id,const void * ptr,const char * descr)48 static int set_ptr_to_sysfs(int id, const void *ptr, const char *descr)
49 {
50 	int res;
51 	tst_resm(TINFO, "TC %d: %s, ptr '%p'", id, descr, ptr);
52 	SAFE_FILE_PRINTF(cleanup, dev_tcase, "%d %lu", id, (unsigned long) ptr);
53 	SAFE_FILE_SCANF(cleanup, dev_result, "%d", &res);
54 	if (res)
55 		return TFAIL;
56 
57 	return TPASS;
58 }
59 
60 /*
61  * Read user-space memory using copy_from_user(), get_user().
62  */
tc_read_userspace(void)63 static void tc_read_userspace(void)
64 {
65 	int res = set_ptr_to_sysfs(TC_READ_USER, test_str,
66 		"read user-space memory from kernel");
67 
68 	tst_resm(res, "copy_from_user(), get_user(): strings%sequal",
69 		(res) ? " not " : " ");
70 }
71 
72 /*
73  * Write from kernel-space to user-space
74  * using copy_to_user(), put_user().
75  */
tc_write_userspace(void)76 static void tc_write_userspace(void)
77 {
78 	char buf[str_size];
79 	memset(buf, 0, str_size);
80 
81 	int res = set_ptr_to_sysfs(TC_WRITE_USER, buf,
82 		"write from kernel-space to user-space");
83 	if (res) {
84 		tst_resm(TFAIL, "failed to write from kernel");
85 		return;
86 	}
87 
88 	res = strncmp(buf, test_str, str_size) ? TFAIL : TPASS;
89 	tst_resm(res, "copy_to_user(), put_user(): strings%sequal",
90 		(res) ? " not " : " ");
91 }
92 
main(int argc,char * argv[])93 int main(int argc, char *argv[])
94 {
95 	tst_parse_opts(argc, argv, NULL, NULL);
96 
97 	tst_require_root();
98 
99 	if (tst_kvercmp(2, 6, 0) < 0) {
100 		tst_brkm(TCONF, NULL,
101 			"Test must be run with kernel 2.6 or newer");
102 	}
103 
104 	tst_sig(FORK, DEF_HANDLER, cleanup);
105 
106 	tst_module_load(NULL, module_name, NULL);
107 	module_loaded = 1;
108 
109 	tc_read_userspace();
110 	tc_write_userspace();
111 
112 	cleanup();
113 	tst_exit();
114 }
115