Loading...
1// SPDX-License-Identifier: GPL-2.0-or-later
2/*
3 * test_kprobes.c - simple sanity test for *probes
4 *
5 * Copyright IBM Corp. 2008
6 */
7
8#define pr_fmt(fmt) "Kprobe smoke test: " fmt
9
10#include <linux/kernel.h>
11#include <linux/kprobes.h>
12#include <linux/random.h>
13
14#define div_factor 3
15
16static u32 rand1, preh_val, posth_val;
17static int errors, handler_errors, num_tests;
18static u32 (*target)(u32 value);
19static u32 (*target2)(u32 value);
20
21static noinline u32 kprobe_target(u32 value)
22{
23 return (value / div_factor);
24}
25
26static int kp_pre_handler(struct kprobe *p, struct pt_regs *regs)
27{
28 if (preemptible()) {
29 handler_errors++;
30 pr_err("pre-handler is preemptible\n");
31 }
32 preh_val = (rand1 / div_factor);
33 return 0;
34}
35
36static void kp_post_handler(struct kprobe *p, struct pt_regs *regs,
37 unsigned long flags)
38{
39 if (preemptible()) {
40 handler_errors++;
41 pr_err("post-handler is preemptible\n");
42 }
43 if (preh_val != (rand1 / div_factor)) {
44 handler_errors++;
45 pr_err("incorrect value in post_handler\n");
46 }
47 posth_val = preh_val + div_factor;
48}
49
50static struct kprobe kp = {
51 .symbol_name = "kprobe_target",
52 .pre_handler = kp_pre_handler,
53 .post_handler = kp_post_handler
54};
55
56static int test_kprobe(void)
57{
58 int ret;
59
60 ret = register_kprobe(&kp);
61 if (ret < 0) {
62 pr_err("register_kprobe returned %d\n", ret);
63 return ret;
64 }
65
66 ret = target(rand1);
67 unregister_kprobe(&kp);
68
69 if (preh_val == 0) {
70 pr_err("kprobe pre_handler not called\n");
71 handler_errors++;
72 }
73
74 if (posth_val == 0) {
75 pr_err("kprobe post_handler not called\n");
76 handler_errors++;
77 }
78
79 return 0;
80}
81
82static noinline u32 kprobe_target2(u32 value)
83{
84 return (value / div_factor) + 1;
85}
86
87static int kp_pre_handler2(struct kprobe *p, struct pt_regs *regs)
88{
89 preh_val = (rand1 / div_factor) + 1;
90 return 0;
91}
92
93static void kp_post_handler2(struct kprobe *p, struct pt_regs *regs,
94 unsigned long flags)
95{
96 if (preh_val != (rand1 / div_factor) + 1) {
97 handler_errors++;
98 pr_err("incorrect value in post_handler2\n");
99 }
100 posth_val = preh_val + div_factor;
101}
102
103static struct kprobe kp2 = {
104 .symbol_name = "kprobe_target2",
105 .pre_handler = kp_pre_handler2,
106 .post_handler = kp_post_handler2
107};
108
109static int test_kprobes(void)
110{
111 int ret;
112 struct kprobe *kps[2] = {&kp, &kp2};
113
114 /* addr and flags should be cleard for reusing kprobe. */
115 kp.addr = NULL;
116 kp.flags = 0;
117 ret = register_kprobes(kps, 2);
118 if (ret < 0) {
119 pr_err("register_kprobes returned %d\n", ret);
120 return ret;
121 }
122
123 preh_val = 0;
124 posth_val = 0;
125 ret = target(rand1);
126
127 if (preh_val == 0) {
128 pr_err("kprobe pre_handler not called\n");
129 handler_errors++;
130 }
131
132 if (posth_val == 0) {
133 pr_err("kprobe post_handler not called\n");
134 handler_errors++;
135 }
136
137 preh_val = 0;
138 posth_val = 0;
139 ret = target2(rand1);
140
141 if (preh_val == 0) {
142 pr_err("kprobe pre_handler2 not called\n");
143 handler_errors++;
144 }
145
146 if (posth_val == 0) {
147 pr_err("kprobe post_handler2 not called\n");
148 handler_errors++;
149 }
150
151 unregister_kprobes(kps, 2);
152 return 0;
153
154}
155
156#ifdef CONFIG_KRETPROBES
157static u32 krph_val;
158
159static int entry_handler(struct kretprobe_instance *ri, struct pt_regs *regs)
160{
161 if (preemptible()) {
162 handler_errors++;
163 pr_err("kretprobe entry handler is preemptible\n");
164 }
165 krph_val = (rand1 / div_factor);
166 return 0;
167}
168
169static int return_handler(struct kretprobe_instance *ri, struct pt_regs *regs)
170{
171 unsigned long ret = regs_return_value(regs);
172
173 if (preemptible()) {
174 handler_errors++;
175 pr_err("kretprobe return handler is preemptible\n");
176 }
177 if (ret != (rand1 / div_factor)) {
178 handler_errors++;
179 pr_err("incorrect value in kretprobe handler\n");
180 }
181 if (krph_val == 0) {
182 handler_errors++;
183 pr_err("call to kretprobe entry handler failed\n");
184 }
185
186 krph_val = rand1;
187 return 0;
188}
189
190static struct kretprobe rp = {
191 .handler = return_handler,
192 .entry_handler = entry_handler,
193 .kp.symbol_name = "kprobe_target"
194};
195
196static int test_kretprobe(void)
197{
198 int ret;
199
200 ret = register_kretprobe(&rp);
201 if (ret < 0) {
202 pr_err("register_kretprobe returned %d\n", ret);
203 return ret;
204 }
205
206 ret = target(rand1);
207 unregister_kretprobe(&rp);
208 if (krph_val != rand1) {
209 pr_err("kretprobe handler not called\n");
210 handler_errors++;
211 }
212
213 return 0;
214}
215
216static int return_handler2(struct kretprobe_instance *ri, struct pt_regs *regs)
217{
218 unsigned long ret = regs_return_value(regs);
219
220 if (ret != (rand1 / div_factor) + 1) {
221 handler_errors++;
222 pr_err("incorrect value in kretprobe handler2\n");
223 }
224 if (krph_val == 0) {
225 handler_errors++;
226 pr_err("call to kretprobe entry handler failed\n");
227 }
228
229 krph_val = rand1;
230 return 0;
231}
232
233static struct kretprobe rp2 = {
234 .handler = return_handler2,
235 .entry_handler = entry_handler,
236 .kp.symbol_name = "kprobe_target2"
237};
238
239static int test_kretprobes(void)
240{
241 int ret;
242 struct kretprobe *rps[2] = {&rp, &rp2};
243
244 /* addr and flags should be cleard for reusing kprobe. */
245 rp.kp.addr = NULL;
246 rp.kp.flags = 0;
247 ret = register_kretprobes(rps, 2);
248 if (ret < 0) {
249 pr_err("register_kretprobe returned %d\n", ret);
250 return ret;
251 }
252
253 krph_val = 0;
254 ret = target(rand1);
255 if (krph_val != rand1) {
256 pr_err("kretprobe handler not called\n");
257 handler_errors++;
258 }
259
260 krph_val = 0;
261 ret = target2(rand1);
262 if (krph_val != rand1) {
263 pr_err("kretprobe handler2 not called\n");
264 handler_errors++;
265 }
266 unregister_kretprobes(rps, 2);
267 return 0;
268}
269#endif /* CONFIG_KRETPROBES */
270
271int init_test_probes(void)
272{
273 int ret;
274
275 target = kprobe_target;
276 target2 = kprobe_target2;
277
278 do {
279 rand1 = prandom_u32();
280 } while (rand1 <= div_factor);
281
282 pr_info("started\n");
283 num_tests++;
284 ret = test_kprobe();
285 if (ret < 0)
286 errors++;
287
288 num_tests++;
289 ret = test_kprobes();
290 if (ret < 0)
291 errors++;
292
293#ifdef CONFIG_KRETPROBES
294 num_tests++;
295 ret = test_kretprobe();
296 if (ret < 0)
297 errors++;
298
299 num_tests++;
300 ret = test_kretprobes();
301 if (ret < 0)
302 errors++;
303#endif /* CONFIG_KRETPROBES */
304
305 if (errors)
306 pr_err("BUG: %d out of %d tests failed\n", errors, num_tests);
307 else if (handler_errors)
308 pr_err("BUG: %d error(s) running handlers\n", handler_errors);
309 else
310 pr_info("passed successfully\n");
311
312 return 0;
313}
1/*
2 * test_kprobes.c - simple sanity test for *probes
3 *
4 * Copyright IBM Corp. 2008
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it would be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
14 * the GNU General Public License for more details.
15 */
16
17#define pr_fmt(fmt) "Kprobe smoke test: " fmt
18
19#include <linux/kernel.h>
20#include <linux/kprobes.h>
21#include <linux/random.h>
22
23#define div_factor 3
24
25static u32 rand1, preh_val, posth_val, jph_val;
26static int errors, handler_errors, num_tests;
27static u32 (*target)(u32 value);
28static u32 (*target2)(u32 value);
29
30static noinline u32 kprobe_target(u32 value)
31{
32 return (value / div_factor);
33}
34
35static int kp_pre_handler(struct kprobe *p, struct pt_regs *regs)
36{
37 preh_val = (rand1 / div_factor);
38 return 0;
39}
40
41static void kp_post_handler(struct kprobe *p, struct pt_regs *regs,
42 unsigned long flags)
43{
44 if (preh_val != (rand1 / div_factor)) {
45 handler_errors++;
46 pr_err("incorrect value in post_handler\n");
47 }
48 posth_val = preh_val + div_factor;
49}
50
51static struct kprobe kp = {
52 .symbol_name = "kprobe_target",
53 .pre_handler = kp_pre_handler,
54 .post_handler = kp_post_handler
55};
56
57static int test_kprobe(void)
58{
59 int ret;
60
61 ret = register_kprobe(&kp);
62 if (ret < 0) {
63 pr_err("register_kprobe returned %d\n", ret);
64 return ret;
65 }
66
67 ret = target(rand1);
68 unregister_kprobe(&kp);
69
70 if (preh_val == 0) {
71 pr_err("kprobe pre_handler not called\n");
72 handler_errors++;
73 }
74
75 if (posth_val == 0) {
76 pr_err("kprobe post_handler not called\n");
77 handler_errors++;
78 }
79
80 return 0;
81}
82
83static noinline u32 kprobe_target2(u32 value)
84{
85 return (value / div_factor) + 1;
86}
87
88static int kp_pre_handler2(struct kprobe *p, struct pt_regs *regs)
89{
90 preh_val = (rand1 / div_factor) + 1;
91 return 0;
92}
93
94static void kp_post_handler2(struct kprobe *p, struct pt_regs *regs,
95 unsigned long flags)
96{
97 if (preh_val != (rand1 / div_factor) + 1) {
98 handler_errors++;
99 pr_err("incorrect value in post_handler2\n");
100 }
101 posth_val = preh_val + div_factor;
102}
103
104static struct kprobe kp2 = {
105 .symbol_name = "kprobe_target2",
106 .pre_handler = kp_pre_handler2,
107 .post_handler = kp_post_handler2
108};
109
110static int test_kprobes(void)
111{
112 int ret;
113 struct kprobe *kps[2] = {&kp, &kp2};
114
115 /* addr and flags should be cleard for reusing kprobe. */
116 kp.addr = NULL;
117 kp.flags = 0;
118 ret = register_kprobes(kps, 2);
119 if (ret < 0) {
120 pr_err("register_kprobes returned %d\n", ret);
121 return ret;
122 }
123
124 preh_val = 0;
125 posth_val = 0;
126 ret = target(rand1);
127
128 if (preh_val == 0) {
129 pr_err("kprobe pre_handler not called\n");
130 handler_errors++;
131 }
132
133 if (posth_val == 0) {
134 pr_err("kprobe post_handler not called\n");
135 handler_errors++;
136 }
137
138 preh_val = 0;
139 posth_val = 0;
140 ret = target2(rand1);
141
142 if (preh_val == 0) {
143 pr_err("kprobe pre_handler2 not called\n");
144 handler_errors++;
145 }
146
147 if (posth_val == 0) {
148 pr_err("kprobe post_handler2 not called\n");
149 handler_errors++;
150 }
151
152 unregister_kprobes(kps, 2);
153 return 0;
154
155}
156
157static u32 j_kprobe_target(u32 value)
158{
159 if (value != rand1) {
160 handler_errors++;
161 pr_err("incorrect value in jprobe handler\n");
162 }
163
164 jph_val = rand1;
165 jprobe_return();
166 return 0;
167}
168
169static struct jprobe jp = {
170 .entry = j_kprobe_target,
171 .kp.symbol_name = "kprobe_target"
172};
173
174static int test_jprobe(void)
175{
176 int ret;
177
178 ret = register_jprobe(&jp);
179 if (ret < 0) {
180 pr_err("register_jprobe returned %d\n", ret);
181 return ret;
182 }
183
184 ret = target(rand1);
185 unregister_jprobe(&jp);
186 if (jph_val == 0) {
187 pr_err("jprobe handler not called\n");
188 handler_errors++;
189 }
190
191 return 0;
192}
193
194static struct jprobe jp2 = {
195 .entry = j_kprobe_target,
196 .kp.symbol_name = "kprobe_target2"
197};
198
199static int test_jprobes(void)
200{
201 int ret;
202 struct jprobe *jps[2] = {&jp, &jp2};
203
204 /* addr and flags should be cleard for reusing kprobe. */
205 jp.kp.addr = NULL;
206 jp.kp.flags = 0;
207 ret = register_jprobes(jps, 2);
208 if (ret < 0) {
209 pr_err("register_jprobes returned %d\n", ret);
210 return ret;
211 }
212
213 jph_val = 0;
214 ret = target(rand1);
215 if (jph_val == 0) {
216 pr_err("jprobe handler not called\n");
217 handler_errors++;
218 }
219
220 jph_val = 0;
221 ret = target2(rand1);
222 if (jph_val == 0) {
223 pr_err("jprobe handler2 not called\n");
224 handler_errors++;
225 }
226 unregister_jprobes(jps, 2);
227
228 return 0;
229}
230#ifdef CONFIG_KRETPROBES
231static u32 krph_val;
232
233static int entry_handler(struct kretprobe_instance *ri, struct pt_regs *regs)
234{
235 krph_val = (rand1 / div_factor);
236 return 0;
237}
238
239static int return_handler(struct kretprobe_instance *ri, struct pt_regs *regs)
240{
241 unsigned long ret = regs_return_value(regs);
242
243 if (ret != (rand1 / div_factor)) {
244 handler_errors++;
245 pr_err("incorrect value in kretprobe handler\n");
246 }
247 if (krph_val == 0) {
248 handler_errors++;
249 pr_err("call to kretprobe entry handler failed\n");
250 }
251
252 krph_val = rand1;
253 return 0;
254}
255
256static struct kretprobe rp = {
257 .handler = return_handler,
258 .entry_handler = entry_handler,
259 .kp.symbol_name = "kprobe_target"
260};
261
262static int test_kretprobe(void)
263{
264 int ret;
265
266 ret = register_kretprobe(&rp);
267 if (ret < 0) {
268 pr_err("register_kretprobe returned %d\n", ret);
269 return ret;
270 }
271
272 ret = target(rand1);
273 unregister_kretprobe(&rp);
274 if (krph_val != rand1) {
275 pr_err("kretprobe handler not called\n");
276 handler_errors++;
277 }
278
279 return 0;
280}
281
282static int return_handler2(struct kretprobe_instance *ri, struct pt_regs *regs)
283{
284 unsigned long ret = regs_return_value(regs);
285
286 if (ret != (rand1 / div_factor) + 1) {
287 handler_errors++;
288 pr_err("incorrect value in kretprobe handler2\n");
289 }
290 if (krph_val == 0) {
291 handler_errors++;
292 pr_err("call to kretprobe entry handler failed\n");
293 }
294
295 krph_val = rand1;
296 return 0;
297}
298
299static struct kretprobe rp2 = {
300 .handler = return_handler2,
301 .entry_handler = entry_handler,
302 .kp.symbol_name = "kprobe_target2"
303};
304
305static int test_kretprobes(void)
306{
307 int ret;
308 struct kretprobe *rps[2] = {&rp, &rp2};
309
310 /* addr and flags should be cleard for reusing kprobe. */
311 rp.kp.addr = NULL;
312 rp.kp.flags = 0;
313 ret = register_kretprobes(rps, 2);
314 if (ret < 0) {
315 pr_err("register_kretprobe returned %d\n", ret);
316 return ret;
317 }
318
319 krph_val = 0;
320 ret = target(rand1);
321 if (krph_val != rand1) {
322 pr_err("kretprobe handler not called\n");
323 handler_errors++;
324 }
325
326 krph_val = 0;
327 ret = target2(rand1);
328 if (krph_val != rand1) {
329 pr_err("kretprobe handler2 not called\n");
330 handler_errors++;
331 }
332 unregister_kretprobes(rps, 2);
333 return 0;
334}
335#endif /* CONFIG_KRETPROBES */
336
337int init_test_probes(void)
338{
339 int ret;
340
341 target = kprobe_target;
342 target2 = kprobe_target2;
343
344 do {
345 rand1 = prandom_u32();
346 } while (rand1 <= div_factor);
347
348 pr_info("started\n");
349 num_tests++;
350 ret = test_kprobe();
351 if (ret < 0)
352 errors++;
353
354 num_tests++;
355 ret = test_kprobes();
356 if (ret < 0)
357 errors++;
358
359 num_tests++;
360 ret = test_jprobe();
361 if (ret < 0)
362 errors++;
363
364 num_tests++;
365 ret = test_jprobes();
366 if (ret < 0)
367 errors++;
368
369#ifdef CONFIG_KRETPROBES
370 num_tests++;
371 ret = test_kretprobe();
372 if (ret < 0)
373 errors++;
374
375 num_tests++;
376 ret = test_kretprobes();
377 if (ret < 0)
378 errors++;
379#endif /* CONFIG_KRETPROBES */
380
381 if (errors)
382 pr_err("BUG: %d out of %d tests failed\n", errors, num_tests);
383 else if (handler_errors)
384 pr_err("BUG: %d error(s) running handlers\n", handler_errors);
385 else
386 pr_info("passed successfully\n");
387
388 return 0;
389}