Orange Pi5 kernel

Deprecated Linux kernel 5.10.110 for OrangePi 5/5B/5+ boards

3 Commits   0 Branches   0 Tags   |
/*
* Copyright © 2018 Alexey Dobriyan <adobriyan@gmail.com>
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
// Test that /proc/$KERNEL_THREAD/fd/ is empty.
#undef NDEBUG
#include <sys/syscall.h>
#include <assert.h>
#include <dirent.h>
#include <limits.h>
#include <stdio.h>
#include <string.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <unistd.h>
#include "proc.h"
#define PF_KHTREAD 0x00200000
/*
* Test for kernel threadness atomically with openat().
*
* Return /proc/$PID/fd descriptor if process is kernel thread.
* Return -1 if a process is userspace process.
*/
static int kernel_thread_fd(unsigned int pid)
{
<------>unsigned int flags = 0;
<------>char buf[4096];
<------>int dir_fd, fd;
<------>ssize_t rv;
<------>snprintf(buf, sizeof(buf), "/proc/%u", pid);
<------>dir_fd = open(buf, O_RDONLY|O_DIRECTORY);
<------>if (dir_fd == -1)
<------><------>return -1;
<------>/*
<------> * Believe it or not, struct task_struct::flags is directly exposed
<------> * to userspace!
<------> */
<------>fd = openat(dir_fd, "stat", O_RDONLY);
<------>if (fd == -1) {
<------><------>close(dir_fd);
<------><------>return -1;
<------>}
<------>rv = read(fd, buf, sizeof(buf));
<------>close(fd);
<------>if (0 < rv && rv <= sizeof(buf)) {
<------><------>unsigned long long flags_ull;
<------><------>char *p, *end;
<------><------>int i;
<------><------>assert(buf[rv - 1] == '\n');
<------><------>buf[rv - 1] = '\0';
<------><------>/* Search backwards: ->comm can contain whitespace and ')'. */
<------><------>for (i = 0; i < 43; i++) {
<------><------><------>p = strrchr(buf, ' ');
<------><------><------>assert(p);
<------><------><------>*p = '\0';
<------><------>}
<------><------>p = strrchr(buf, ' ');
<------><------>assert(p);
<------><------>flags_ull = xstrtoull(p + 1, &end);
<------><------>assert(*end == '\0');
<------><------>assert(flags_ull == (unsigned int)flags_ull);
<------><------>flags = flags_ull;
<------>}
<------>fd = -1;
<------>if (flags & PF_KHTREAD) {
<------><------>fd = openat(dir_fd, "fd", O_RDONLY|O_DIRECTORY);
<------>}
<------>close(dir_fd);
<------>return fd;
}
static void test_readdir(int fd)
{
<------>DIR *d;
<------>struct dirent *de;
<------>d = fdopendir(fd);
<------>assert(d);
<------>de = xreaddir(d);
<------>assert(streq(de->d_name, "."));
<------>assert(de->d_type == DT_DIR);
<------>de = xreaddir(d);
<------>assert(streq(de->d_name, ".."));
<------>assert(de->d_type == DT_DIR);
<------>de = xreaddir(d);
<------>assert(!de);
}
static inline int sys_statx(int dirfd, const char *pathname, int flags,
<------><------><------> unsigned int mask, void *stx)
{
<------>return syscall(SYS_statx, dirfd, pathname, flags, mask, stx);
}
static void test_lookup_fail(int fd, const char *pathname)
{
<------>char stx[256] __attribute__((aligned(8)));
<------>int rv;
<------>rv = sys_statx(fd, pathname, AT_SYMLINK_NOFOLLOW, 0, (void *)stx);
<------>assert(rv == -1 && errno == ENOENT);
}
static void test_lookup(int fd)
{
<------>char buf[64];
<------>unsigned int u;
<------>int i;
<------>for (i = INT_MIN; i < INT_MIN + 1024; i++) {
<------><------>snprintf(buf, sizeof(buf), "%d", i);
<------><------>test_lookup_fail(fd, buf);
<------>}
<------>for (i = -1024; i < 1024; i++) {
<------><------>snprintf(buf, sizeof(buf), "%d", i);
<------><------>test_lookup_fail(fd, buf);
<------>}
<------>for (u = INT_MAX - 1024; u < (unsigned int)INT_MAX + 1024; u++) {
<------><------>snprintf(buf, sizeof(buf), "%u", u);
<------><------>test_lookup_fail(fd, buf);
<------>}
<------>for (u = UINT_MAX - 1024; u != 0; u++) {
<------><------>snprintf(buf, sizeof(buf), "%u", u);
<------><------>test_lookup_fail(fd, buf);
<------>}
}
int main(void)
{
<------>unsigned int pid;
<------>int fd;
<------>/*
<------> * In theory this will loop indefinitely if kernel threads are exiled
<------> * from /proc.
<------> *
<------> * Start with kthreadd.
<------> */
<------>pid = 2;
<------>while ((fd = kernel_thread_fd(pid)) == -1 && pid < 1024) {
<------><------>pid++;
<------>}
<------>/* EACCES if run as non-root. */
<------>if (pid >= 1024)
<------><------>return 1;
<------>test_readdir(fd);
<------>test_lookup(fd);
<------>return 0;
}