/* * Copyright (c) 2013 Oracle and/or its affiliates. All Rights Reserved. * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License as * published by the Free Software Foundation; either version 2 of * the License, or (at your option) any later version. * * This program is distributed in the hope that it would be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA * * Author: Alexey Kodanev <alexey.kodanev@oracle.com> * * Test checks kernel API to safely access user-space memory using * copy_to_user(), copy_from_user(), get_user(), put_user() functions. * */ #include <stdio.h> #include <stdlib.h> #include <unistd.h> #include "test.h" #include "old_module.h" #include "safe_macros.h" #include "ltp_uaccess.h" char *TCID = DEV_NAME; static const char dev_result[] = "/sys/devices/" DEV_NAME "/result"; static const char dev_tcase[] = "/sys/devices/" DEV_NAME "/tcase"; static const char module_name[] = DEV_NAME ".ko"; static int module_loaded; static void cleanup(void) { if (module_loaded) tst_module_unload(NULL, module_name); } static int set_ptr_to_sysfs(int id, const void *ptr, const char *descr) { int res; tst_resm(TINFO, "TC %d: %s, ptr '%p'", id, descr, ptr); SAFE_FILE_PRINTF(cleanup, dev_tcase, "%d %lu", id, (unsigned long) ptr); SAFE_FILE_SCANF(cleanup, dev_result, "%d", &res); if (res) return TFAIL; return TPASS; } /* * Read user-space memory using copy_from_user(), get_user(). */ static void tc_read_userspace(void) { int res = set_ptr_to_sysfs(TC_READ_USER, test_str, "read user-space memory from kernel"); tst_resm(res, "copy_from_user(), get_user(): strings%sequal", (res) ? " not " : " "); } /* * Write from kernel-space to user-space * using copy_to_user(), put_user(). */ static void tc_write_userspace(void) { char buf[str_size]; memset(buf, 0, str_size); int res = set_ptr_to_sysfs(TC_WRITE_USER, buf, "write from kernel-space to user-space"); if (res) { tst_resm(TFAIL, "failed to write from kernel"); return; } res = strncmp(buf, test_str, str_size) ? TFAIL : TPASS; tst_resm(res, "copy_to_user(), put_user(): strings%sequal", (res) ? " not " : " "); } int main(int argc, char *argv[]) { tst_parse_opts(argc, argv, NULL, NULL); tst_require_root(); if (tst_kvercmp(2, 6, 0) < 0) { tst_brkm(TCONF, NULL, "Test must be run with kernel 2.6 or newer"); } tst_sig(FORK, DEF_HANDLER, cleanup); tst_module_load(NULL, module_name, NULL); module_loaded = 1; tc_read_userspace(); tc_write_userspace(); cleanup(); tst_exit(); }