2 * Copyright (c) 2015, 2020 The FreeBSD Foundation
5 * This software was developed by Konstantin Belousov <kib@FreeBSD.org>
6 * under sponsorship from the FreeBSD Foundation.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 #include <sys/cdefs.h>
31 __FBSDID("$FreeBSD$");
33 #include <sys/param.h>
35 #include <sys/sysctl.h>
48 #include <machine/vmparam.h>
50 static int scratch_file;
53 copyin_checker(uintptr_t uaddr, size_t len)
57 ret = write(scratch_file, (const void *)uaddr, len);
58 return (ret == -1 ? errno : 0);
61 #if __SIZEOF_POINTER__ == 8
63 * A slightly more direct path to calling copyin(), but without the ability
64 * to specify a length.
67 copyin_checker2(uintptr_t uaddr)
71 ret = fcntl(scratch_file, F_GETLK, (const void *)uaddr);
72 return (ret == -1 ? errno : 0);
77 get_vm_layout(struct kinfo_vm_layout *kvm)
84 mib[2] = KERN_PROC_VM_LAYOUT;
88 return (sysctl(mib, nitems(mib), kvm, &len, NULL, 0));
91 #define FMAX ULONG_MAX
92 #if __SIZEOF_POINTER__ == 8
94 #define ADDR_SIGNED 0x800000c000000000
97 ATF_TC_WITHOUT_HEAD(kern_copyin);
98 ATF_TC_BODY(kern_copyin, tc)
100 char template[] = "copyin.XXXXXX";
101 struct kinfo_vm_layout kvm;
109 error = get_vm_layout(&kvm);
110 ATF_REQUIRE(error == 0);
112 page_size = sysconf(_SC_PAGESIZE);
113 ATF_REQUIRE(page_size != (long)-1);
115 maxuser = kvm.kvm_max_user_addr;
116 scratch_file = mkstemp(template);
117 ATF_REQUIRE(scratch_file != -1);
121 * Since the shared page address can be randomized we need to make
122 * sure that something is mapped at the top of the user address space.
123 * Otherwise reading bytes from maxuser-X will fail rendering this test
126 if (kvm.kvm_shp_addr + kvm.kvm_shp_size < maxuser) {
127 addr = mmap((void *)(maxuser - page_size), page_size, PROT_READ,
128 MAP_ANON | MAP_FIXED, -1, 0);
129 ATF_REQUIRE(addr != MAP_FAILED);
132 ATF_CHECK(copyin_checker(0, 0) == 0);
133 ATF_CHECK(copyin_checker(maxuser - 10, 9) == 0);
134 ATF_CHECK(copyin_checker(maxuser - 10, 10) == 0);
135 ATF_CHECK(copyin_checker(maxuser - 10, 11) == EFAULT);
136 ATF_CHECK(copyin_checker(maxuser - 1, 1) == 0);
137 ATF_CHECK(copyin_checker(maxuser, 0) == 0);
138 ATF_CHECK(copyin_checker(maxuser, 1) == EFAULT);
139 ATF_CHECK(copyin_checker(maxuser, 2) == EFAULT);
140 ATF_CHECK(copyin_checker(maxuser + 1, 0) == 0);
141 ATF_CHECK(copyin_checker(maxuser + 1, 2) == EFAULT);
142 ATF_CHECK(copyin_checker(FMAX - 10, 9) == EFAULT);
143 ATF_CHECK(copyin_checker(FMAX - 10, 10) == EFAULT);
144 ATF_CHECK(copyin_checker(FMAX - 10, 11) == EFAULT);
145 #if __SIZEOF_POINTER__ == 8
146 ATF_CHECK(copyin_checker(ADDR_SIGNED, 1) == EFAULT);
147 ATF_CHECK(copyin_checker2(ADDR_SIGNED) == EFAULT);
150 if (addr != MAP_FAILED)
151 munmap(addr, PAGE_SIZE);
157 ATF_TP_ADD_TC(tp, kern_copyin);
158 return (atf_no_error());