From patchwork Thu Feb 6 06:04:32 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yang Xu X-Patchwork-Id: 1234138 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.linux.it (client-ip=2001:1418:10:5::2; helo=picard.linux.it; envelope-from=ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=cn.fujitsu.com Received: from picard.linux.it (picard.linux.it [IPv6:2001:1418:10:5::2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 48Cnvq34dGz9s29 for ; Thu, 6 Feb 2020 17:04:52 +1100 (AEDT) Received: from picard.linux.it (localhost [IPv6:::1]) by picard.linux.it (Postfix) with ESMTP id 757823C2554 for ; Thu, 6 Feb 2020 07:04:44 +0100 (CET) X-Original-To: ltp@lists.linux.it Delivered-To: ltp@picard.linux.it Received: from in-7.smtp.seeweb.it (in-7.smtp.seeweb.it [IPv6:2001:4b78:1:20::7]) by picard.linux.it (Postfix) with ESMTP id 661F93C12A1 for ; Thu, 6 Feb 2020 07:04:40 +0100 (CET) Received: from heian.cn.fujitsu.com (mail.cn.fujitsu.com [183.91.158.132]) by in-7.smtp.seeweb.it (Postfix) with ESMTP id C6241200D34 for ; Thu, 6 Feb 2020 07:04:36 +0100 (CET) X-IronPort-AV: E=Sophos;i="5.70,408,1574092800"; d="scan'208";a="82946629" Received: from unknown (HELO cn.fujitsu.com) ([10.167.33.5]) by heian.cn.fujitsu.com with ESMTP; 06 Feb 2020 14:04:32 +0800 Received: from G08CNEXMBPEKD05.g08.fujitsu.local (unknown [10.167.33.204]) by cn.fujitsu.com (Postfix) with ESMTP id 2677650A9970; Thu, 6 Feb 2020 13:55:05 +0800 (CST) Received: from G08CNEXCHPEKD02.g08.fujitsu.local (10.167.33.83) by G08CNEXMBPEKD05.g08.fujitsu.local (10.167.33.204) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Thu, 6 Feb 2020 14:04:30 +0800 Received: from localhost.localdomain (10.167.220.84) by G08CNEXCHPEKD02.g08.fujitsu.local (10.167.33.89) with Microsoft SMTP Server (TLS) id 14.3.439.0; Thu, 6 Feb 2020 14:04:29 +0800 From: Yang Xu To: Date: Thu, 6 Feb 2020 14:04:32 +0800 Message-ID: <1580969073-27367-1-git-send-email-xuyang2018.jy@cn.fujitsu.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <20200127162016.GD30831@rei.lan> References: <20200127162016.GD30831@rei.lan> MIME-Version: 1.0 X-Originating-IP: [10.167.220.84] X-yoursite-MailScanner-ID: 2677650A9970.AD1C4 X-yoursite-MailScanner: Found to be clean X-yoursite-MailScanner-From: xuyang2018.jy@cn.fujitsu.com X-Spam-Status: No, score=0.3 required=7.0 tests=KHOP_HELO_FCRDNS, SPF_HELO_NONE, SPF_NONE autolearn=disabled version=3.4.0 X-Virus-Scanned: clamav-milter 0.99.2 at in-7.smtp.seeweb.it X-Virus-Status: Clean X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on in-7.smtp.seeweb.it Subject: [LTP] [PATCH v3 1/2] syscalls/fcntl30: clean up && add more range test X-BeenThere: ltp@lists.linux.it X-Mailman-Version: 2.1.29 Precedence: list List-Id: Linux Test Project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: ltp@lists.linux.it Errors-To: ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it Sender: "ltp" When I write pipe12 test case, I have a question about F_SETPIPE_SZ can set the min and max value. So cleanup this case and add min/max/gt_max value test. -------- v2->v3: 1. remove memfree check 2. move size compution into setup and add size check under unprivileged user 3. fix other things pointed by Cyril -------- Signed-off-by: Yang Xu --- include/lapi/capability.h | 4 + testcases/kernel/syscalls/fcntl/fcntl30.c | 223 ++++++++++++++-------- 2 files changed, 147 insertions(+), 80 deletions(-) diff --git a/include/lapi/capability.h b/include/lapi/capability.h index 8833f0605..7ade78985 100644 --- a/include/lapi/capability.h +++ b/include/lapi/capability.h @@ -28,6 +28,10 @@ # define CAP_SYS_ADMIN 21 #endif +#ifndef CAP_SYS_RESOURCE +# define CAP_SYS_RESOURCE 24 +#endif + #ifndef CAP_AUDIT_READ # define CAP_AUDIT_READ 37 #endif diff --git a/testcases/kernel/syscalls/fcntl/fcntl30.c b/testcases/kernel/syscalls/fcntl/fcntl30.c index 4a409b868..860d42e8d 100644 --- a/testcases/kernel/syscalls/fcntl/fcntl30.c +++ b/testcases/kernel/syscalls/fcntl/fcntl30.c @@ -1,111 +1,174 @@ +// SPDX-License-Identifier: GPL-2.0-or-later /* - * Copyright (c) 2014 Fujitsu Ltd. + * Copyright (c) 2014-2020 FUJITSU LIMITED. All rights reserved. * Author: Xiaoguang Wang + * Author: Yang Xu * - * This program is free software; you can redistribute it and/or modify it - * under the terms of version 2 of the GNU General Public License as - * published by the Free Software Foundation. - * - * This program is distributed in the hope that it would be useful, but - * WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. - * - * You should have received a copy of the GNU General Public License along - * with this program; if not, write the Free Software Foundation, Inc., - * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. - */ - -/* * Description: - * Verify that, - * Basic test for fcntl(2) using F_SETPIPE_SZ, F_GETPIPE_SZ argument. + * Basic test for fcntl(2) using F_SETPIPE_SZ, F_GETPIPE_SZ argument. */ - -#include -#include #include #include -#include -#include #include #include - -#include "test.h" -#include "safe_macros.h" +#include "tst_test.h" #include "lapi/fcntl.h" - -char *TCID = "fcntl30"; -int TST_TOTAL = 1; - -static void setup(void); -static void cleanup(void); - -int main(int ac, char **av) +#include "lapi/abisize.h" +#include "lapi/capability.h" + +static int fds[2]; +static unsigned int shift; +static struct passwd *pw; + +static struct tcase { + unsigned int setsize; + unsigned int expsize; + unsigned int root_user; + int pass_flag; + char *message; +} tcases[] = { + {0, 0, 0, 1, "set a value of below page size"}, + {0, 0, 0, 1, "set a normal value"}, + {0, 0, 1, 1, "set a value of below page size"}, + {0, 0, 1, 1, "set a normal value"}, + {0, 0, 1, 1, "set a max value"}, + {0, 0, 1, 0, "set a value beyond max"}, +}; + +static void verify_fcntl(unsigned int n) { - int lc; - int pipe_fds[2], test_fd; - int orig_pipe_size, new_pipe_size; - - - tst_parse_opts(ac, av, NULL, NULL); - - setup(); - - for (lc = 0; TEST_LOOPING(lc); lc++) { - tst_count = 0; + struct tcase *tc = &tcases[n]; - SAFE_PIPE(cleanup, pipe_fds); - test_fd = pipe_fds[1]; + tst_res(TINFO, "%s, size is %u", tc->message, tc->setsize); - TEST(fcntl(test_fd, F_GETPIPE_SZ)); - if (TEST_RETURN < 0) { - tst_brkm(TFAIL | TTERRNO, cleanup, - "fcntl get pipe size failed"); + TEST(fcntl(fds[1], F_SETPIPE_SZ, tc->setsize)); + if (tc->pass_flag) { + if (TST_RET == -1) { + tst_res(TFAIL | TTERRNO, "F_SETPIPE_SZ failed"); + return; } - - orig_pipe_size = TEST_RETURN; - new_pipe_size = orig_pipe_size * 2; - TEST(fcntl(test_fd, F_SETPIPE_SZ, new_pipe_size)); - if (TEST_RETURN < 0) { - tst_brkm(TFAIL | TTERRNO, cleanup, - "fcntl test F_SETPIPE_SZ failed"); + tst_res(TPASS, "F_SETPIPE_SZ succeed as expected"); + } else { + if (TST_RET == -1) { + if ((TST_ERR == ENOMEM && shift < 31) || + (TST_ERR == EINVAL && shift == 31)) + tst_res(TPASS | TTERRNO, "F_SETPIPE_SZ failed"); + else + tst_res(TFAIL | TTERRNO, + "F_SETPIPE_SZ failed with unexpected error"); + return; } + tst_res(TFAIL, "F_SETPIPE_SZ succeed unexpectedly"); + } - TEST(fcntl(test_fd, F_GETPIPE_SZ)); - if (TEST_RETURN < 0) { - tst_brkm(TFAIL | TTERRNO, cleanup, - "fcntl test F_GETPIPE_SZ failed"); - } - tst_resm(TINFO, "orig_pipe_size: %d new_pipe_size: %d", - orig_pipe_size, new_pipe_size); - if (TEST_RETURN >= new_pipe_size) { - tst_resm(TPASS, "fcntl test F_GETPIPE_SZ" - "and F_SETPIPE_SZ success"); - } else { - tst_resm(TFAIL, "fcntl test F_GETPIPE_SZ" - "and F_SETPIPE_SZ fail"); - } - SAFE_CLOSE(cleanup, pipe_fds[0]); - SAFE_CLOSE(cleanup, pipe_fds[1]); + TEST(fcntl(fds[1], F_GETPIPE_SZ)); + if (TST_RET == -1) { + tst_res(TFAIL | TTERRNO, "F_GETPIPE_SZ failed"); + return; } + if ((unsigned int)TST_RET == tc->expsize) + tst_res(TPASS, "F_SETPIPE_SZ %u bytes F_GETPIPE_SZ %u bytes", + tc->setsize, (unsigned int)TST_RET); + else + tst_res(TFAIL, "F_SETPIPE_SZ %u bytes but F_GETPIPE_SZ %u bytes", + tc->setsize, (unsigned int)TST_RET); +} - cleanup(); - tst_exit(); +static void do_test(unsigned int n) +{ + struct tcase *tc = &tcases[n]; + + if (!SAFE_FORK()) { + if (!tc->root_user) { + SAFE_SETUID(pw->pw_uid); + tst_res(TINFO, "under an unprivileged user"); + } else + tst_res(TINFO, "under a privileged user"); + verify_fcntl(n); + } + tst_reap_children(); } static void setup(void) { - if ((tst_kvercmp(2, 6, 35)) < 0) { - tst_brkm(TCONF, NULL, "This test can only run on kernels" - "that are 2.6.35 and higher"); + unsigned int pg_size, struct_shift, max_shift, pg_shift = 0; + + SAFE_PIPE(fds); + TEST(fcntl(fds[1], F_GETPIPE_SZ)); + if (TST_ERR == EINVAL) + tst_brk(TCONF, "kernel doesn't support F_GET/SETPIPE_SZ"); + + /* + * See kernel fs/pipe.c, the size of struct pipe buffer is 40 bytes + * (round up 2^6) on 64bit system and 24 bytes(round up 2^5). kcalloc + * mallocs a memory space range stores struct pipe buffer. kcalloc can + * malloc max space depend on KMALLOC_SHIFT_MAX macro. + * #define KMALLOC_SHIFT_MAX (MAX_ORDER + PAGE_SHIFT - 1) + * the MAX_ORDER is 11. + * For example, if page size is 4k, on 64bit system. the max pipe size + * as below: + * kcalloc space(4M): 1 << (11+12-1)= 2^22 + * space can store struct pipi buffer: 2^22/2^6= 2^16 + * max pipe size: 2^16* 2^12 = 2^28 + * it should be 256M. On 32bit system, this value is 512M. + */ +#ifdef TST_ABI64 + struct_shift = 6; +#else + struct_shift = 5; +#endif + max_shift = 10; + + pg_size = getpagesize(); + tst_res(TINFO, "page size is %d bytes", pg_size); + while (pg_size >>= 1) + pg_shift++; + + shift = max_shift - struct_shift + 2 * pg_shift; + + /* + * On 64k page size machine, this will beyond 2G and trigger EINVAL error, + * so truncate it. + */ + if (shift > 31) { + tst_res(TINFO, "pipe size truncated into 2G"); + shift = 31; } - tst_sig(NOFORK, DEF_HANDLER, cleanup); + tcases[0].setsize = (1 << pg_shift) - 1; + tcases[0].expsize = 1 << pg_shift; - TEST_PAUSE; + tcases[1].setsize = 2 << pg_shift; + tcases[1].expsize = 2 << pg_shift; + + tcases[2].setsize = (1 << pg_shift) - 1; + tcases[2].expsize = 1 << pg_shift; + + tcases[3].setsize = 2 << pg_shift; + tcases[3].expsize = 2 << pg_shift; + + tcases[4].setsize = 1 << shift; + tcases[4].expsize = 1 << shift; + + tcases[5].setsize = (1 << shift) + 1; + + pw = SAFE_GETPWNAM("nobody"); } static void cleanup(void) { + if (fds[0] > 0) + SAFE_CLOSE(fds[0]); + if (fds[1] > 0) + SAFE_CLOSE(fds[1]); } + +static struct tst_test test = { + .setup = setup, + .cleanup = cleanup, + .tcnt = ARRAY_SIZE(tcases), + .test = do_test, + .forks_child = 1, + .needs_root = 1, +};