aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/tools/testing/selftests/powerpc/signal/sigreturn_vdso.c
blob: e282fff0fe259e169ef0894456d62c638d1b7bc5 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
// SPDX-License-Identifier: GPL-2.0
/*
 * Test that we can take signals with and without the VDSO mapped, which trigger
 * different paths in the signal handling code.
 *
 * See handle_rt_signal64() and setup_trampoline() in signal_64.c
 */

#define _GNU_SOURCE

#include <errno.h>
#include <stdio.h>
#include <signal.h>
#include <stdlib.h>
#include <string.h>
#include <sys/mman.h>
#include <sys/types.h>
#include <unistd.h>

// Ensure assert() is not compiled out
#undef NDEBUG
#include <assert.h>

#include "utils.h"

static int search_proc_maps(char *needle, unsigned long *low, unsigned long *high)
{
	unsigned long start, end;
	static char buf[4096];
	char name[128];
	FILE *f;
	int rc = -1;

	f = fopen("/proc/self/maps", "r");
	if (!f) {
		perror("fopen");
		return -1;
	}

	while (fgets(buf, sizeof(buf), f)) {
		rc = sscanf(buf, "%lx-%lx %*c%*c%*c%*c %*x %*d:%*d %*d %127s\n",
			    &start, &end, name);
		if (rc == 2)
			continue;

		if (rc != 3) {
			printf("sscanf errored\n");
			rc = -1;
			break;
		}

		if (strstr(name, needle)) {
			*low = start;
			*high = end - 1;
			rc = 0;
			break;
		}
	}

	fclose(f);

	return rc;
}

static volatile sig_atomic_t took_signal = 0;

static void sigusr1_handler(int sig)
{
	took_signal++;
}

int test_sigreturn_vdso(void)
{
	unsigned long low, high, size;
	struct sigaction act;
	char *p;

	act.sa_handler = sigusr1_handler;
	act.sa_flags = 0;
	sigemptyset(&act.sa_mask);

	assert(sigaction(SIGUSR1, &act, NULL) == 0);

	// Confirm the VDSO is mapped, and work out where it is
	assert(search_proc_maps("[vdso]", &low, &high) == 0);
	size = high - low + 1;
	printf("VDSO is at 0x%lx-0x%lx (%lu bytes)\n", low, high, size);

	kill(getpid(), SIGUSR1);
	assert(took_signal == 1);
	printf("Signal delivered OK with VDSO mapped\n");

	// Remap the VDSO somewhere else
	p = mmap(NULL, size, PROT_READ|PROT_WRITE, MAP_ANONYMOUS|MAP_PRIVATE, -1, 0);
	assert(p != MAP_FAILED);
	assert(mremap((void *)low, size, size, MREMAP_MAYMOVE|MREMAP_FIXED, p) != MAP_FAILED);
	assert(search_proc_maps("[vdso]", &low, &high) == 0);
	size = high - low + 1;
	printf("VDSO moved to 0x%lx-0x%lx (%lu bytes)\n", low, high, size);

	kill(getpid(), SIGUSR1);
	assert(took_signal == 2);
	printf("Signal delivered OK with VDSO moved\n");

	assert(munmap((void *)low, size) == 0);
	printf("Unmapped VDSO\n");

	// Confirm the VDSO is not mapped anymore
	assert(search_proc_maps("[vdso]", &low, &high) != 0);

	// Make the stack executable
	assert(search_proc_maps("[stack]", &low, &high) == 0);
	size = high - low + 1;
	mprotect((void *)low, size, PROT_READ|PROT_WRITE|PROT_EXEC);
	printf("Remapped the stack executable\n");

	kill(getpid(), SIGUSR1);
	assert(took_signal == 3);
	printf("Signal delivered OK with VDSO unmapped\n");

	return 0;
}

int main(void)
{
	return test_harness(test_sigreturn_vdso, "sigreturn_vdso");
}