aboutsummaryrefslogtreecommitdiff
path: root/tests-mx32/kcmp.c
diff options
context:
space:
mode:
Diffstat (limited to 'tests-mx32/kcmp.c')
-rw-r--r--tests-mx32/kcmp.c149
1 files changed, 140 insertions, 9 deletions
diff --git a/tests-mx32/kcmp.c b/tests-mx32/kcmp.c
index cb497c9f2..60cd30031 100644
--- a/tests-mx32/kcmp.c
+++ b/tests-mx32/kcmp.c
@@ -1,7 +1,7 @@
/*
* Check decoding of kcmp syscall.
*
- * Copyright (c) 2016 Eugene Syromyatnikov <evgsyr@gmail.com>
+ * Copyright (c) 2016-2017 Eugene Syromyatnikov <evgsyr@gmail.com>
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
@@ -34,15 +34,67 @@
#ifdef __NR_kcmp
+# include <fcntl.h>
+# include <stdarg.h>
+# include <stdint.h>
# include <stdio.h>
+# include <string.h>
# include <unistd.h>
-# define KCMP_FILE 0
-# define KCMP_SYSVSEM 6
+# ifndef VERBOSE_FD
+# define VERBOSE_FD 0
+# endif
+/*
+ * We prefer to use system headers in order to catch some possible deviations in
+ * system's headers from our perception of reality, but happy to include our own
+ * definitions as well.
+ */
+# ifdef HAVE_LINUX_KCMP_H
+# include <linux/kcmp.h>
+# else
+# define KCMP_FILE 0
+# define KCMP_VM 1
+# define KCMP_FILES 2
+# define KCMP_FS 3
+# define KCMP_SIGHAND 4
+# define KCMP_IO 5
+# define KCMP_SYSVSEM 6
+# endif
+
+/* All other kcmp types have been added atomically */
+# define KCMP_EPOLL_TFD 7
+
+# ifndef HAVE_STRUCT_KCMP_EPOLL_SLOT
+struct kcmp_epoll_slot {
+ uint32_t efd;
+ uint32_t tfd;
+ uint32_t toff;
+};
+# endif
+
+static const kernel_ulong_t kcmp_max_type = KCMP_EPOLL_TFD;
+
+static const char null_path[] = "/dev/null";
+static const char zero_path[] = "/dev/zero";
+
+# define NULL_FD 23
+# define ZERO_FD 42
+
+static void
+printpidfd(const char *prefix, pid_t pid, unsigned fd)
+{
+ printf("%s%d", prefix, fd);
+}
+
+/*
+ * Last argument is optional and is used as follows:
+ * * When type is KCMP_EPOLL_TFD, it signalises whether idx2 is a valid
+ * pointer.
+ */
static void
do_kcmp(kernel_ulong_t pid1, kernel_ulong_t pid2, kernel_ulong_t type,
- const char *type_str, kernel_ulong_t idx1, kernel_ulong_t idx2)
+ const char *type_str, kernel_ulong_t idx1, kernel_ulong_t idx2, ...)
{
long rc;
const char *errstr;
@@ -57,11 +109,37 @@ do_kcmp(kernel_ulong_t pid1, kernel_ulong_t pid2, kernel_ulong_t type,
else
printf("%#x /* KCMP_??? */", (int) type);
- if (type == KCMP_FILE)
- printf(", %u, %u", (unsigned) idx1, (unsigned) idx2);
- else if (type > KCMP_SYSVSEM)
+ if (type == KCMP_FILE) {
+ printpidfd(", ", pid1, idx1);
+ printpidfd(", ", pid2, idx2);
+ } else if (type == KCMP_EPOLL_TFD) {
+ va_list ap;
+ int valid_ptr;
+
+ va_start(ap, idx2);
+ valid_ptr = va_arg(ap, int);
+ va_end(ap);
+
+ printpidfd(", ", pid1, idx1);
+ printf(", ");
+
+ if (valid_ptr) {
+ struct kcmp_epoll_slot *slot =
+ (struct kcmp_epoll_slot *) (uintptr_t) idx2;
+
+ printpidfd("{efd=", pid2, slot->efd);
+ printpidfd(", tfd=", pid2, slot->tfd);
+ printf(", toff=%llu}", (unsigned long long) slot->toff);
+ } else {
+ if (idx2)
+ printf("%#llx", (unsigned long long) idx2);
+ else
+ printf("NULL");
+ }
+ } else if (type > kcmp_max_type) {
printf(", %#llx, %#llx",
(unsigned long long) idx1, (unsigned long long) idx2);
+ }
printf(") = %s\n", errstr);
}
@@ -79,18 +157,71 @@ main(void)
(kernel_ulong_t) 0xdec0ded3dec0ded4ULL;
static const kernel_ulong_t bogus_idx2 =
(kernel_ulong_t) 0xba5e1e55deadc0deULL;
+ static const struct kcmp_epoll_slot slot_data[] = {
+ { 0xdeadc0de, 0xfacef157, 0xbadc0ded },
+ { NULL_FD, ZERO_FD, 0 },
+ { 0, 0, 0 },
+ };
+ static kernel_ulong_t ptr_check =
+ F8ILL_KULONG_SUPPORTED ? F8ILL_KULONG_MASK : 0;
+
+ int fd;
+ unsigned i;
+ struct kcmp_epoll_slot *slot = tail_alloc(sizeof(*slot));
+
+ /* Open some files to test printpidfd */
+ fd = open(null_path, O_RDONLY);
+ if (fd < 0)
+ perror_msg_and_fail("open(\"%s\")", null_path);
+ if (fd != NULL_FD) {
+ if (dup2(fd, NULL_FD) < 0)
+ perror_msg_and_fail("dup2(fd, NULL_FD)");
+ close(fd);
+ }
+
+ fd = open(zero_path, O_RDONLY);
+ if (fd < 0)
+ perror_msg_and_fail("open(\"%s\")", zero_path);
+ if (fd != ZERO_FD) {
+ if (dup2(fd, ZERO_FD) < 0)
+ perror_msg_and_fail("dup2(fd, ZERO_FD)");
+ close(fd);
+ }
+
+ close(0);
/* Invalid values */
do_kcmp(bogus_pid1, bogus_pid2, bogus_type, NULL, bogus_idx1,
bogus_idx2);
- do_kcmp(0, 0, KCMP_SYSVSEM + 1, NULL, 0, 0);
+ do_kcmp(F8ILL_KULONG_MASK, F8ILL_KULONG_MASK, kcmp_max_type + 1, NULL,
+ 0, 0);
/* KCMP_FILE is the only type which has additional args */
do_kcmp(3141592653U, 2718281828U, ARG_STR(KCMP_FILE), bogus_idx1,
bogus_idx2);
- /* Some type without additional args */
+ do_kcmp(-1, -1, ARG_STR(KCMP_FILE), NULL_FD, ZERO_FD);
+
+ /* Types without additional args */
+ do_kcmp(-1, -1, ARG_STR(KCMP_VM), bogus_idx1, bogus_idx2);
+ do_kcmp(-1, -1, ARG_STR(KCMP_FILES), bogus_idx1, bogus_idx2);
+ do_kcmp(-1, -1, ARG_STR(KCMP_FS), bogus_idx1, bogus_idx2);
+ do_kcmp(-1, -1, ARG_STR(KCMP_SIGHAND), bogus_idx1, bogus_idx2);
+ do_kcmp(-1, -1, ARG_STR(KCMP_IO), bogus_idx1, bogus_idx2);
do_kcmp(-1, -1, ARG_STR(KCMP_SYSVSEM), bogus_idx1, bogus_idx2);
+ /* KCMP_EPOLL_TFD checks */
+ do_kcmp(-1, -1, ARG_STR(KCMP_EPOLL_TFD),
+ F8ILL_KULONG_MASK | 2718281828U, ptr_check, 0);
+ do_kcmp(-1, -1, ARG_STR(KCMP_EPOLL_TFD),
+ 3141592653U, (uintptr_t) slot + 1, 0);
+
+ for (i = 0; i < ARRAY_SIZE(slot_data); i++) {
+ memcpy(slot, slot_data + i, sizeof(*slot));
+
+ do_kcmp(getpid(), getppid(), ARG_STR(KCMP_EPOLL_TFD), NULL_FD,
+ (uintptr_t) slot, 1);
+ }
+
puts("+++ exited with 0 +++");
return 0;