Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp905474ybh; Tue, 21 Jul 2020 10:41:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxk4eco7g4ThP06Paiw70ZBBXuOFZm4G9ncL+/+543/rp2EWKj5kiQDa1malrSudBLVW5In X-Received: by 2002:a17:906:3acd:: with SMTP id z13mr2076932ejd.69.1595353289118; Tue, 21 Jul 2020 10:41:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595353289; cv=none; d=google.com; s=arc-20160816; b=UUXl6vTjmdVtnz9KKaswT+y0hkx4z5VjkUSJRxxg8uwBKhDgi5KBUypwoWMLwfgg3R jCCb9ZzGZSIs3h+UPS49n9PxLgb3dTr3cvFBVSw5+Nbl9NK8hpGLWoXalnZ00F6WVIOY ueSEQMihCHP+3vQMhJT6JK1gGmign1j9YSlKwp5j7qi/Dxw/ifP+1pBpnxakKTyhmaKU J3ruU0lZPyOB6VKg6SJX4ynzpJ7/fmmu4qshCJ7vr8ajioo9EOHDBnKHn3ZnBZ0RIfVN iNtq0YmArP7T/b2nluvfMY5r89DesZ/3QWHlBS1qxMUybpSmNE68mrwGxo5cvoWbJSPv IWgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=ziXNDrsTUf/jO1e0o+ATLIms8b87+wdcIPJLc5MdA5I=; b=uOItKh/L/c+DY6h39W0/A/s3WlSNFu62xjR5y7eCVBT9nWn0odU5SLHeBVFnLcWk6L EPTmmxKAlGr3cZCtYEO4N5ZrF08+g/AVIXQuCxn1Gs/48Ke3TEJbMIAz2rtw7HJs80PP hAEYE8nlCPFOqHZal1ibzQTfIZLQDhbzHwpxCoOawjnRS9YUGhkytagHNgKQvP7GZf8j qfXnHuAj3gM19GrBoQgWbemF13WwY50yhuuBxWMWQlW+JPQBOiDK/l/OOfa6T+apjIVe RF8Ture5zOBzScS9QKFl7nIc2kUhWbrfOe3SeT23LaB3j5YYnGnhnpHlhslnPSv7zfda gAMA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@massaru-org.20150623.gappssmtp.com header.s=20150623 header.b=byMaJXbe; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t12si12573717ejr.551.2020.07.21.10.41.05; Tue, 21 Jul 2020 10:41:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@massaru-org.20150623.gappssmtp.com header.s=20150623 header.b=byMaJXbe; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730065AbgGURkn (ORCPT + 99 others); Tue, 21 Jul 2020 13:40:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56078 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729286AbgGURkm (ORCPT ); Tue, 21 Jul 2020 13:40:42 -0400 Received: from mail-qk1-x744.google.com (mail-qk1-x744.google.com [IPv6:2607:f8b0:4864:20::744]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0904BC0619DA for ; Tue, 21 Jul 2020 10:40:41 -0700 (PDT) Received: by mail-qk1-x744.google.com with SMTP id 11so10712347qkn.2 for ; Tue, 21 Jul 2020 10:40:41 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=massaru-org.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=ziXNDrsTUf/jO1e0o+ATLIms8b87+wdcIPJLc5MdA5I=; b=byMaJXbew5T06Kk8bGXuwpnPtmHxBPAZo3GtrojHEEEajDRLMyzlzyOKZPuE5jASUi CIZBmDtNOcoe6gTMoeNQmsJHcqjomo34rdGvJL+0UJr1A553/zgbVa5MHw9rpZVfK2Rp CTCJyeTZ9S0VRsOmWA3rvpCM6l8KAsbEorM1lBf2idN+LOHB7jlDsWWRwoVzUxGgNsCU cAMHrMrJIpEXwyImY/8ac1vfQxrfQ+utj1/tCkBrHNdvWnq94qXe/s0ONuZhZ+SYQpZP 51GQWHWJZGtJ1RK3xS39BcOh1xjLYIm8sOl/Jz+6x/yH8PJ5mothCrEZzXa3t61GMiPS jdaQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=ziXNDrsTUf/jO1e0o+ATLIms8b87+wdcIPJLc5MdA5I=; b=R9WquWAt8lUOMxfvufbpISg0FLPI9Dew0OOVa9kZIkRn+Yj35ZQT9fIHdmX7r7UG/n 0q/Fa0oGFAZIaIHFCazK+UxFt5AeyYMUrlMIlkSRvOBp+Aaz1+EmrCSCVHqG+4+3/g0c x+BuIi5LEf0hhjnobnmheVcsZREY590Jo78m2PJhR9O0nccs8bu4GI/4KcM5ZTSpCRhb 6csL1g3os4UP0yesDS/zLmsoOq+UNkFAia6DfcDkufFiRP6NkmavH3Hjbrj2rpaA+T9I dIr1tCJl/yCYXEeaEcQJSPHr0rp5LgICo+B7+aYHDKUvS25V062jFmq6vbytIZ6c/j0j DNkA== X-Gm-Message-State: AOAM5331yBYIoJhOKdEbLUC3GZ3BTSMfQ9/hDryeHc95I/PgHDwjs38j 21dJxxIRg/wcU8S1XL/0EuSg5Q== X-Received: by 2002:a05:620a:2282:: with SMTP id o2mr26833386qkh.402.1595353241126; Tue, 21 Jul 2020 10:40:41 -0700 (PDT) Received: from bbking.lan ([2804:14c:4a5:36c::cd2]) by smtp.gmail.com with ESMTPSA id w11sm23282781qtk.35.2020.07.21.10.40.38 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 21 Jul 2020 10:40:40 -0700 (PDT) From: Vitor Massaru Iha To: kunit-dev@googlegroups.com Cc: linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, brendanhiggins@google.com, keescook@chromium.org, davidgow@google.com, skhan@linuxfoundation.org, linux-kernel-mentees@lists.linuxfoundation.org Subject: [PATCH v3] lib: kunit: Provides a userspace memory context when tests are compiled as module Date: Tue, 21 Jul 2020 14:40:36 -0300 Message-Id: <20200721174036.71072-1-vitor@massaru.org> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org KUnit test cases run on kthreads, and kthreads don't have an adddress space (current->mm is NULL), but processes have mm. The purpose of this patch is to allow to borrow mm to KUnit kthread after userspace is brought up, because we know that there are processes running, at least the process that loaded the module to borrow mm. This allows, for example, tests such as user_copy_kunit, which uses vm_mmap, which needs current->mm. Signed-off-by: Vitor Massaru Iha --- v2: * splitted patch in 3: - Allows to install and load modules in root filesystem; - Provides an userspace memory context when tests are compiled as module; - Convert test_user_copy to KUnit test; * added documentation; * added more explanation; * added a missed test pointer; * released mm with mmput(); v3: * rebased with last kunit branch * Please apply this commit from kunit-fixes: 3f37d14b8a3152441f36b6bc74000996679f0998 Documentation/dev-tools/kunit/usage.rst | 14 ++++++++++++++ include/kunit/test.h | 12 ++++++++++++ lib/kunit/try-catch.c | 15 ++++++++++++++- 3 files changed, 40 insertions(+), 1 deletion(-) --- diff --git a/Documentation/dev-tools/kunit/usage.rst b/Documentation/dev-tools/kunit/usage.rst index 3c3fe8b5fecc..9f909157be34 100644 --- a/Documentation/dev-tools/kunit/usage.rst +++ b/Documentation/dev-tools/kunit/usage.rst @@ -448,6 +448,20 @@ We can now use it to test ``struct eeprom_buffer``: .. _kunit-on-non-uml: +User-space context +------------------ + +I case you need a user-space context, for now this is only possible through +tests compiled as a module. And it will be necessary to use a root filesystem +and uml_utilities. + +Example: + +.. code-block:: bash + + ./tools/testing/kunit/kunit.py run --timeout=60 --uml_rootfs_dir=.uml_rootfs + + KUnit on non-UML architectures ============================== diff --git a/include/kunit/test.h b/include/kunit/test.h index 59f3144f009a..ae3337139c65 100644 --- a/include/kunit/test.h +++ b/include/kunit/test.h @@ -222,6 +222,18 @@ struct kunit { * protect it with some type of lock. */ struct list_head resources; /* Protected by lock. */ + /* + * KUnit test cases run on kthreads, and kthreads don't have an + * adddress space (current->mm is NULL), but processes have mm. + * + * The purpose of this mm_struct is to allow to borrow mm to KUnit kthread + * after userspace is brought up, because we know that there are processes + * running, at least the process that loaded the module to borrow mm. + * + * This allows, for example, tests such as user_copy_kunit, which uses + * vm_mmap, which needs current->mm. + */ + struct mm_struct *mm; }; void kunit_init_test(struct kunit *test, const char *name, char *log); diff --git a/lib/kunit/try-catch.c b/lib/kunit/try-catch.c index 0dd434e40487..d03e2093985b 100644 --- a/lib/kunit/try-catch.c +++ b/lib/kunit/try-catch.c @@ -11,7 +11,8 @@ #include #include #include - +#include +#include #include "try-catch-impl.h" void __noreturn kunit_try_catch_throw(struct kunit_try_catch *try_catch) @@ -24,8 +25,17 @@ EXPORT_SYMBOL_GPL(kunit_try_catch_throw); static int kunit_generic_run_threadfn_adapter(void *data) { struct kunit_try_catch *try_catch = data; + struct kunit *test = try_catch->test; + + if (test != NULL && test->mm != NULL) + kthread_use_mm(test->mm); try_catch->try(try_catch->context); + if (test != NULL && test->mm != NULL) { + kthread_unuse_mm(test->mm); + mmput(test->mm); + test->mm = NULL; + } complete_and_exit(try_catch->try_completion, 0); } @@ -65,6 +75,9 @@ void kunit_try_catch_run(struct kunit_try_catch *try_catch, void *context) try_catch->context = context; try_catch->try_completion = &try_completion; try_catch->try_result = 0; + + test->mm = get_task_mm(current); + task_struct = kthread_run(kunit_generic_run_threadfn_adapter, try_catch, "kunit_try_catch_thread"); base-commit: d43c7fb05765152d4d4a39a8ef957c4ea14d8847 -- 2.26.2