aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/tools/testing/selftests/bpf/prog_tests/read_vsyscall.c
blob: 3405923fe4e65bda241f143313b01aaab1776165 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
// SPDX-License-Identifier: GPL-2.0
/* Copyright (C) 2024. Huawei Technologies Co., Ltd */
#include "test_progs.h"
#include "read_vsyscall.skel.h"

#if defined(__x86_64__)
/* For VSYSCALL_ADDR */
#include <asm/vsyscall.h>
#else
/* To prevent build failure on non-x86 arch */
#define VSYSCALL_ADDR 0UL
#endif

struct read_ret_desc {
	const char *name;
	int ret;
} all_read[] = {
	{ .name = "probe_read_kernel", .ret = -ERANGE },
	{ .name = "probe_read_kernel_str", .ret = -ERANGE },
	{ .name = "probe_read", .ret = -ERANGE },
	{ .name = "probe_read_str", .ret = -ERANGE },
	{ .name = "probe_read_user", .ret = -EFAULT },
	{ .name = "probe_read_user_str", .ret = -EFAULT },
	{ .name = "copy_from_user", .ret = -EFAULT },
	{ .name = "copy_from_user_task", .ret = -EFAULT },
};

void test_read_vsyscall(void)
{
	struct read_vsyscall *skel;
	unsigned int i;
	int err;

#if !defined(__x86_64__)
	test__skip();
	return;
#endif
	skel = read_vsyscall__open_and_load();
	if (!ASSERT_OK_PTR(skel, "read_vsyscall open_load"))
		return;

	skel->bss->target_pid = getpid();
	err = read_vsyscall__attach(skel);
	if (!ASSERT_EQ(err, 0, "read_vsyscall attach"))
		goto out;

	/* userspace may don't have vsyscall page due to LEGACY_VSYSCALL_NONE,
	 * but it doesn't affect the returned error codes.
	 */
	skel->bss->user_ptr = (void *)VSYSCALL_ADDR;
	usleep(1);

	for (i = 0; i < ARRAY_SIZE(all_read); i++)
		ASSERT_EQ(skel->bss->read_ret[i], all_read[i].ret, all_read[i].name);
out:
	read_vsyscall__destroy(skel);
}