1b2f5de03SAlexey Dobriyan /*
2b2f5de03SAlexey Dobriyan * Copyright © 2018 Alexey Dobriyan <adobriyan@gmail.com>
3b2f5de03SAlexey Dobriyan *
4b2f5de03SAlexey Dobriyan * Permission to use, copy, modify, and distribute this software for any
5b2f5de03SAlexey Dobriyan * purpose with or without fee is hereby granted, provided that the above
6b2f5de03SAlexey Dobriyan * copyright notice and this permission notice appear in all copies.
7b2f5de03SAlexey Dobriyan *
8b2f5de03SAlexey Dobriyan * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9b2f5de03SAlexey Dobriyan * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10b2f5de03SAlexey Dobriyan * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11b2f5de03SAlexey Dobriyan * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12b2f5de03SAlexey Dobriyan * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13b2f5de03SAlexey Dobriyan * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14b2f5de03SAlexey Dobriyan * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
15b2f5de03SAlexey Dobriyan */
16b2f5de03SAlexey Dobriyan // Test that /proc/$KERNEL_THREAD/fd/ is empty.
17*0387662dSPeng Hao
18b2f5de03SAlexey Dobriyan #undef NDEBUG
19b2f5de03SAlexey Dobriyan #include <sys/syscall.h>
20b2f5de03SAlexey Dobriyan #include <assert.h>
21b2f5de03SAlexey Dobriyan #include <dirent.h>
22b2f5de03SAlexey Dobriyan #include <limits.h>
23b2f5de03SAlexey Dobriyan #include <stdio.h>
24b2f5de03SAlexey Dobriyan #include <string.h>
25b2f5de03SAlexey Dobriyan #include <sys/types.h>
26b2f5de03SAlexey Dobriyan #include <sys/stat.h>
27b2f5de03SAlexey Dobriyan #include <fcntl.h>
28b2f5de03SAlexey Dobriyan #include <unistd.h>
29b2f5de03SAlexey Dobriyan
30b2f5de03SAlexey Dobriyan #include "proc.h"
31b2f5de03SAlexey Dobriyan
32b2f5de03SAlexey Dobriyan #define PF_KHTREAD 0x00200000
33b2f5de03SAlexey Dobriyan
34b2f5de03SAlexey Dobriyan /*
35b2f5de03SAlexey Dobriyan * Test for kernel threadness atomically with openat().
36b2f5de03SAlexey Dobriyan *
37b2f5de03SAlexey Dobriyan * Return /proc/$PID/fd descriptor if process is kernel thread.
38b2f5de03SAlexey Dobriyan * Return -1 if a process is userspace process.
39b2f5de03SAlexey Dobriyan */
kernel_thread_fd(unsigned int pid)40b2f5de03SAlexey Dobriyan static int kernel_thread_fd(unsigned int pid)
41b2f5de03SAlexey Dobriyan {
42b2f5de03SAlexey Dobriyan unsigned int flags = 0;
43b2f5de03SAlexey Dobriyan char buf[4096];
44b2f5de03SAlexey Dobriyan int dir_fd, fd;
45b2f5de03SAlexey Dobriyan ssize_t rv;
46b2f5de03SAlexey Dobriyan
47b2f5de03SAlexey Dobriyan snprintf(buf, sizeof(buf), "/proc/%u", pid);
48b2f5de03SAlexey Dobriyan dir_fd = open(buf, O_RDONLY|O_DIRECTORY);
49b2f5de03SAlexey Dobriyan if (dir_fd == -1)
50b2f5de03SAlexey Dobriyan return -1;
51b2f5de03SAlexey Dobriyan
52b2f5de03SAlexey Dobriyan /*
53b2f5de03SAlexey Dobriyan * Believe it or not, struct task_struct::flags is directly exposed
54b2f5de03SAlexey Dobriyan * to userspace!
55b2f5de03SAlexey Dobriyan */
56b2f5de03SAlexey Dobriyan fd = openat(dir_fd, "stat", O_RDONLY);
57b2f5de03SAlexey Dobriyan if (fd == -1) {
58b2f5de03SAlexey Dobriyan close(dir_fd);
59b2f5de03SAlexey Dobriyan return -1;
60b2f5de03SAlexey Dobriyan }
61b2f5de03SAlexey Dobriyan rv = read(fd, buf, sizeof(buf));
62b2f5de03SAlexey Dobriyan close(fd);
63b2f5de03SAlexey Dobriyan if (0 < rv && rv <= sizeof(buf)) {
64b2f5de03SAlexey Dobriyan unsigned long long flags_ull;
65b2f5de03SAlexey Dobriyan char *p, *end;
66b2f5de03SAlexey Dobriyan int i;
67b2f5de03SAlexey Dobriyan
68b2f5de03SAlexey Dobriyan assert(buf[rv - 1] == '\n');
69b2f5de03SAlexey Dobriyan buf[rv - 1] = '\0';
70b2f5de03SAlexey Dobriyan
71b2f5de03SAlexey Dobriyan /* Search backwards: ->comm can contain whitespace and ')'. */
72b2f5de03SAlexey Dobriyan for (i = 0; i < 43; i++) {
73b2f5de03SAlexey Dobriyan p = strrchr(buf, ' ');
74b2f5de03SAlexey Dobriyan assert(p);
75b2f5de03SAlexey Dobriyan *p = '\0';
76b2f5de03SAlexey Dobriyan }
77b2f5de03SAlexey Dobriyan
78b2f5de03SAlexey Dobriyan p = strrchr(buf, ' ');
79b2f5de03SAlexey Dobriyan assert(p);
80b2f5de03SAlexey Dobriyan
81b2f5de03SAlexey Dobriyan flags_ull = xstrtoull(p + 1, &end);
82b2f5de03SAlexey Dobriyan assert(*end == '\0');
83b2f5de03SAlexey Dobriyan assert(flags_ull == (unsigned int)flags_ull);
84b2f5de03SAlexey Dobriyan
85b2f5de03SAlexey Dobriyan flags = flags_ull;
86b2f5de03SAlexey Dobriyan }
87b2f5de03SAlexey Dobriyan
88b2f5de03SAlexey Dobriyan fd = -1;
89b2f5de03SAlexey Dobriyan if (flags & PF_KHTREAD) {
90b2f5de03SAlexey Dobriyan fd = openat(dir_fd, "fd", O_RDONLY|O_DIRECTORY);
91b2f5de03SAlexey Dobriyan }
92b2f5de03SAlexey Dobriyan close(dir_fd);
93b2f5de03SAlexey Dobriyan return fd;
94b2f5de03SAlexey Dobriyan }
95b2f5de03SAlexey Dobriyan
test_readdir(int fd)96b2f5de03SAlexey Dobriyan static void test_readdir(int fd)
97b2f5de03SAlexey Dobriyan {
98b2f5de03SAlexey Dobriyan DIR *d;
99b2f5de03SAlexey Dobriyan struct dirent *de;
100b2f5de03SAlexey Dobriyan
101b2f5de03SAlexey Dobriyan d = fdopendir(fd);
102b2f5de03SAlexey Dobriyan assert(d);
103b2f5de03SAlexey Dobriyan
104b2f5de03SAlexey Dobriyan de = xreaddir(d);
105b2f5de03SAlexey Dobriyan assert(streq(de->d_name, "."));
106b2f5de03SAlexey Dobriyan assert(de->d_type == DT_DIR);
107b2f5de03SAlexey Dobriyan
108b2f5de03SAlexey Dobriyan de = xreaddir(d);
109b2f5de03SAlexey Dobriyan assert(streq(de->d_name, ".."));
110b2f5de03SAlexey Dobriyan assert(de->d_type == DT_DIR);
111b2f5de03SAlexey Dobriyan
112b2f5de03SAlexey Dobriyan de = xreaddir(d);
113b2f5de03SAlexey Dobriyan assert(!de);
114b2f5de03SAlexey Dobriyan }
115b2f5de03SAlexey Dobriyan
sys_statx(int dirfd,const char * pathname,int flags,unsigned int mask,void * stx)116b2f5de03SAlexey Dobriyan static inline int sys_statx(int dirfd, const char *pathname, int flags,
117b2f5de03SAlexey Dobriyan unsigned int mask, void *stx)
118b2f5de03SAlexey Dobriyan {
119b2f5de03SAlexey Dobriyan return syscall(SYS_statx, dirfd, pathname, flags, mask, stx);
120b2f5de03SAlexey Dobriyan }
121b2f5de03SAlexey Dobriyan
test_lookup_fail(int fd,const char * pathname)122b2f5de03SAlexey Dobriyan static void test_lookup_fail(int fd, const char *pathname)
123b2f5de03SAlexey Dobriyan {
124b2f5de03SAlexey Dobriyan char stx[256] __attribute__((aligned(8)));
125b2f5de03SAlexey Dobriyan int rv;
126b2f5de03SAlexey Dobriyan
127b2f5de03SAlexey Dobriyan rv = sys_statx(fd, pathname, AT_SYMLINK_NOFOLLOW, 0, (void *)stx);
128b2f5de03SAlexey Dobriyan assert(rv == -1 && errno == ENOENT);
129b2f5de03SAlexey Dobriyan }
130b2f5de03SAlexey Dobriyan
test_lookup(int fd)131b2f5de03SAlexey Dobriyan static void test_lookup(int fd)
132b2f5de03SAlexey Dobriyan {
133b2f5de03SAlexey Dobriyan char buf[64];
134b2f5de03SAlexey Dobriyan unsigned int u;
135b2f5de03SAlexey Dobriyan int i;
136b2f5de03SAlexey Dobriyan
137b2f5de03SAlexey Dobriyan for (i = INT_MIN; i < INT_MIN + 1024; i++) {
138b2f5de03SAlexey Dobriyan snprintf(buf, sizeof(buf), "%d", i);
139b2f5de03SAlexey Dobriyan test_lookup_fail(fd, buf);
140b2f5de03SAlexey Dobriyan }
141b2f5de03SAlexey Dobriyan for (i = -1024; i < 1024; i++) {
142b2f5de03SAlexey Dobriyan snprintf(buf, sizeof(buf), "%d", i);
143b2f5de03SAlexey Dobriyan test_lookup_fail(fd, buf);
144b2f5de03SAlexey Dobriyan }
145b2f5de03SAlexey Dobriyan for (u = INT_MAX - 1024; u < (unsigned int)INT_MAX + 1024; u++) {
146b2f5de03SAlexey Dobriyan snprintf(buf, sizeof(buf), "%u", u);
147b2f5de03SAlexey Dobriyan test_lookup_fail(fd, buf);
148b2f5de03SAlexey Dobriyan }
149b2f5de03SAlexey Dobriyan for (u = UINT_MAX - 1024; u != 0; u++) {
150b2f5de03SAlexey Dobriyan snprintf(buf, sizeof(buf), "%u", u);
151b2f5de03SAlexey Dobriyan test_lookup_fail(fd, buf);
152b2f5de03SAlexey Dobriyan }
153b2f5de03SAlexey Dobriyan }
154b2f5de03SAlexey Dobriyan
main(void)155b2f5de03SAlexey Dobriyan int main(void)
156b2f5de03SAlexey Dobriyan {
157b2f5de03SAlexey Dobriyan unsigned int pid;
158b2f5de03SAlexey Dobriyan int fd;
159b2f5de03SAlexey Dobriyan
160b2f5de03SAlexey Dobriyan /*
161b2f5de03SAlexey Dobriyan * In theory this will loop indefinitely if kernel threads are exiled
162b2f5de03SAlexey Dobriyan * from /proc.
163b2f5de03SAlexey Dobriyan *
164b2f5de03SAlexey Dobriyan * Start with kthreadd.
165b2f5de03SAlexey Dobriyan */
166b2f5de03SAlexey Dobriyan pid = 2;
167b2f5de03SAlexey Dobriyan while ((fd = kernel_thread_fd(pid)) == -1 && pid < 1024) {
168b2f5de03SAlexey Dobriyan pid++;
169b2f5de03SAlexey Dobriyan }
170b2f5de03SAlexey Dobriyan /* EACCES if run as non-root. */
171b2f5de03SAlexey Dobriyan if (pid >= 1024)
172b2f5de03SAlexey Dobriyan return 1;
173b2f5de03SAlexey Dobriyan
174b2f5de03SAlexey Dobriyan test_readdir(fd);
175b2f5de03SAlexey Dobriyan test_lookup(fd);
176b2f5de03SAlexey Dobriyan
177b2f5de03SAlexey Dobriyan return 0;
178b2f5de03SAlexey Dobriyan }
179