Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp369753pxj; Thu, 3 Jun 2021 08:40:02 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwcY3eE/9apZ2nndw0e4UfK8vYoU7Au8Sw3bZmDBgk+siISPCvWL1pTR3EBLFcON3K41dPZ X-Received: by 2002:a17:906:ca4c:: with SMTP id jx12mr3882ejb.155.1622734801941; Thu, 03 Jun 2021 08:40:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622734801; cv=none; d=google.com; s=arc-20160816; b=vb99YcRqNa3RGhCIEVsdjOVxwNxyAFedA/B8JBveWAYQsXkRMRsvYelzAt8e7qVK9n 3+7qKHcuLoUJJppxmKskyg51UmeffNNnSB3sy/YAe/2XqraNPv4H6ovI7Y/P4D/9NRUr izjW7ITLLfLo5zkztm2VxRFRP6i6SkqOpyk5yKsPT5xYT2tNfQbJOtx07DUmyFQaMtiy WABf4tgorwbbcOMhBSoMv3u2M5JDe3knOTcK5k90hrTgbom8aLuv1jvGSKW8aIIdgoVO NSUQxBa+EuwPcHLlZBwSZniR+HZfx1e+yN244z5jXUOUQlq5dVtAGVQdyXjuTmfyi4nm yMWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=MAfOCgAL+/4c+u2cKFnHe9PJR7//GbNGS7l7MR7qaKc=; b=wSmo5IUNCdM7srkBbF3tAPh70mll16NbgSvQfQP1tSpELnb20cZA8wu7kPNHixEyoD 3vZ7o65bm3/ql9oxTE4fRdITUglAOXJu/TrBOlXmasxQg0MRc+TH9um+fLsv+1hoDf/D h9NQsLE98DNY98PcoAuxdeoCa7/FHS3aIZAXtkw+TNO6saVvgWqqB/1S5SBJMStZMMqJ Ry7rdthJ5khmHl264WqCi953s8KwiQdJbPTGiENXLrGDPWgHZ0DXhH2yWwgyT7rYk7QU ZVJKs2G0VBju5HjgKdiejtm7rMx7oJtvNB0I40H8LVQHQAq5KrlG0QFxyvP8DRRxMsyX sJgw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Heq5GbA9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v24si2500887ejc.165.2021.06.03.08.39.39; Thu, 03 Jun 2021 08:40:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Heq5GbA9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230109AbhFCPkK (ORCPT + 99 others); Thu, 3 Jun 2021 11:40:10 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:51825 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229888AbhFCPkF (ORCPT ); Thu, 3 Jun 2021 11:40:05 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1622734700; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=MAfOCgAL+/4c+u2cKFnHe9PJR7//GbNGS7l7MR7qaKc=; b=Heq5GbA9t7o3e0vkYrfC6gKYXOEXCGMzsO7VV5DE4SSh/7NPcYVjnw0g+Po/YN6ydTR78C w34N8DGLeJ/qkOHjiageYN3BthIeA9D/T8pHknwtYb5YbPQe+z7VVj2HUq6wkN/3hwTY+6 /hRX+mTnPP5aw6V5C77keO07YyvlN4M= Received: from mail-ej1-f72.google.com (mail-ej1-f72.google.com [209.85.218.72]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-587-2fzsJYenNmGCwg175qbTvw-1; Thu, 03 Jun 2021 11:38:07 -0400 X-MC-Unique: 2fzsJYenNmGCwg175qbTvw-1 Received: by mail-ej1-f72.google.com with SMTP id gs18-20020a1709072d12b02903f19777c38aso2096390ejc.9 for ; Thu, 03 Jun 2021 08:38:07 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=MAfOCgAL+/4c+u2cKFnHe9PJR7//GbNGS7l7MR7qaKc=; b=kIo8nPrkwg+ZEmt53hziQydSV6uKPZHQSHKh9tb93u3Xnbq0p4FyE/J6lnaQEOkMJj C19emRDcUth5ylPlQodNRMiJ8PRfVfwVct2lwavZHVmMdKLeUFtUY01ywH70F74LwL78 JrtjZSHthnMhuIawUmA2T1LRzunaXNIDBXA20hMrSBZFoLfUpNHAwzw4NqLYqnERT9hA vgdpQ+L6R5WgTIz3sBaASVwVCPqoyaVPKn/FScIBMW9RJCT4yMFdxU3NIfgnyzZMoOzy ZV5K1gfdYJGWK6eGMTr/SAu1AWVMvqp6kfPOGfBe60FnYJWrg+SZ3EQE5vZVChe7h/LO Sdag== X-Gm-Message-State: AOAM531x/NmHCZ2pdGGQ6y7xTvDLGioED/et/Mz7LiTPUB+I+3j+pGRr 6WZHosQjcEH/lAcPDJvD1sAX4nq/Et742t1HYjx+8adYC313Z8crQ6vsScG4qmNyr4smSdIOd3U mtTHhKVYndvceo8yxBZpsjP3L X-Received: by 2002:a05:6402:b1a:: with SMTP id bm26mr61515edb.387.1622734686331; Thu, 03 Jun 2021 08:38:06 -0700 (PDT) X-Received: by 2002:a05:6402:b1a:: with SMTP id bm26mr61493edb.387.1622734686165; Thu, 03 Jun 2021 08:38:06 -0700 (PDT) Received: from steredhat ([5.170.129.82]) by smtp.gmail.com with ESMTPSA id z20sm1641999ejd.18.2021.06.03.08.38.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 03 Jun 2021 08:38:05 -0700 (PDT) Date: Thu, 3 Jun 2021 17:38:01 +0200 From: Stefano Garzarella To: Arseny Krasnov Cc: Stefan Hajnoczi , "Michael S. Tsirkin" , Jason Wang , "David S. Miller" , Jakub Kicinski , Jorgen Hansen , Colin Ian King , Norbert Slusarek , Andra Paraschiv , kvm@vger.kernel.org, virtualization@lists.linux-foundation.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, oxffffaa@gmail.com Subject: Re: [PATCH v10 17/18] vsock_test: add SOCK_SEQPACKET tests Message-ID: <20210603153801.xyew6p5d4x4orwka@steredhat> References: <20210520191357.1270473-1-arseny.krasnov@kaspersky.com> <20210520191953.1272798-1-arseny.krasnov@kaspersky.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <20210520191953.1272798-1-arseny.krasnov@kaspersky.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 20, 2021 at 10:19:50PM +0300, Arseny Krasnov wrote: >Implement two tests of SOCK_SEQPACKET socket: first sends data by >several 'write()'s and checks that number of 'read()' were same. >Second test checks MSG_TRUNC flag. Cases for connect(), bind(), >etc. are not tested, because it is same as for stream socket. > >Signed-off-by: Arseny Krasnov >--- > v9 -> v10: > 1) Commit message updated. > 2) Add second test for message bounds. This patch LGTM, but I'll review better with the next version, running also the test suite on my VMs. Thanks, Stefano > > tools/testing/vsock/util.c | 32 +++++++-- > tools/testing/vsock/util.h | 3 + > tools/testing/vsock/vsock_test.c | 116 +++++++++++++++++++++++++++++++ > 3 files changed, 146 insertions(+), 5 deletions(-) > >diff --git a/tools/testing/vsock/util.c b/tools/testing/vsock/util.c >index 93cbd6f603f9..2acbb7703c6a 100644 >--- a/tools/testing/vsock/util.c >+++ b/tools/testing/vsock/util.c >@@ -84,7 +84,7 @@ void vsock_wait_remote_close(int fd) > } > > /* Connect to and return the file descriptor. */ >-int vsock_stream_connect(unsigned int cid, unsigned int port) >+static int vsock_connect(unsigned int cid, unsigned int port, int type) > { > union { > struct sockaddr sa; >@@ -101,7 +101,7 @@ int vsock_stream_connect(unsigned int cid, unsigned int port) > > control_expectln("LISTENING"); > >- fd = socket(AF_VSOCK, SOCK_STREAM, 0); >+ fd = socket(AF_VSOCK, type, 0); > > timeout_begin(TIMEOUT); > do { >@@ -120,11 +120,21 @@ int vsock_stream_connect(unsigned int cid, unsigned int port) > return fd; > } > >+int vsock_stream_connect(unsigned int cid, unsigned int port) >+{ >+ return vsock_connect(cid, port, SOCK_STREAM); >+} >+ >+int vsock_seqpacket_connect(unsigned int cid, unsigned int port) >+{ >+ return vsock_connect(cid, port, SOCK_SEQPACKET); >+} >+ > /* Listen on and return the first incoming connection. The remote > * address is stored to clientaddrp. clientaddrp may be NULL. > */ >-int vsock_stream_accept(unsigned int cid, unsigned int port, >- struct sockaddr_vm *clientaddrp) >+static int vsock_accept(unsigned int cid, unsigned int port, >+ struct sockaddr_vm *clientaddrp, int type) > { > union { > struct sockaddr sa; >@@ -145,7 +155,7 @@ int vsock_stream_accept(unsigned int cid, unsigned int port, > int client_fd; > int old_errno; > >- fd = socket(AF_VSOCK, SOCK_STREAM, 0); >+ fd = socket(AF_VSOCK, type, 0); > > if (bind(fd, &addr.sa, sizeof(addr.svm)) < 0) { > perror("bind"); >@@ -189,6 +199,18 @@ int vsock_stream_accept(unsigned int cid, unsigned int port, > return client_fd; > } > >+int vsock_stream_accept(unsigned int cid, unsigned int port, >+ struct sockaddr_vm *clientaddrp) >+{ >+ return vsock_accept(cid, port, clientaddrp, SOCK_STREAM); >+} >+ >+int vsock_seqpacket_accept(unsigned int cid, unsigned int port, >+ struct sockaddr_vm *clientaddrp) >+{ >+ return vsock_accept(cid, port, clientaddrp, SOCK_SEQPACKET); >+} >+ > /* Transmit one byte and check the return value. > * > * expected_ret: >diff --git a/tools/testing/vsock/util.h b/tools/testing/vsock/util.h >index e53dd09d26d9..a3375ad2fb7f 100644 >--- a/tools/testing/vsock/util.h >+++ b/tools/testing/vsock/util.h >@@ -36,8 +36,11 @@ struct test_case { > void init_signals(void); > unsigned int parse_cid(const char *str); > int vsock_stream_connect(unsigned int cid, unsigned int port); >+int vsock_seqpacket_connect(unsigned int cid, unsigned int port); > int vsock_stream_accept(unsigned int cid, unsigned int port, > struct sockaddr_vm *clientaddrp); >+int vsock_seqpacket_accept(unsigned int cid, unsigned int port, >+ struct sockaddr_vm *clientaddrp); > void vsock_wait_remote_close(int fd); > void send_byte(int fd, int expected_ret, int flags); > void recv_byte(int fd, int expected_ret, int flags); >diff --git a/tools/testing/vsock/vsock_test.c b/tools/testing/vsock/vsock_test.c >index 5a4fb80fa832..67766bfe176f 100644 >--- a/tools/testing/vsock/vsock_test.c >+++ b/tools/testing/vsock/vsock_test.c >@@ -14,6 +14,8 @@ > #include > #include > #include >+#include >+#include > > #include "timeout.h" > #include "control.h" >@@ -279,6 +281,110 @@ static void test_stream_msg_peek_server(const struct test_opts *opts) > close(fd); > } > >+#define MESSAGES_CNT 7 >+static void test_seqpacket_msg_bounds_client(const struct test_opts *opts) >+{ >+ int fd; >+ >+ fd = vsock_seqpacket_connect(opts->peer_cid, 1234); >+ if (fd < 0) { >+ perror("connect"); >+ exit(EXIT_FAILURE); >+ } >+ >+ /* Send several messages, one with MSG_EOR flag */ >+ for (int i = 0; i < MESSAGES_CNT; i++) >+ send_byte(fd, 1, 0); >+ >+ control_writeln("SENDDONE"); >+ close(fd); >+} >+ >+static void test_seqpacket_msg_bounds_server(const struct test_opts *opts) >+{ >+ int fd; >+ char buf[16]; >+ struct msghdr msg = {0}; >+ struct iovec iov = {0}; >+ >+ fd = vsock_seqpacket_accept(VMADDR_CID_ANY, 1234, NULL); >+ if (fd < 0) { >+ perror("accept"); >+ exit(EXIT_FAILURE); >+ } >+ >+ control_expectln("SENDDONE"); >+ iov.iov_base = buf; >+ iov.iov_len = sizeof(buf); >+ msg.msg_iov = &iov; >+ msg.msg_iovlen = 1; >+ >+ for (int i = 0; i < MESSAGES_CNT; i++) { >+ if (recvmsg(fd, &msg, 0) != 1) { >+ perror("message bound violated"); >+ exit(EXIT_FAILURE); >+ } >+ } >+ >+ close(fd); >+} >+ >+#define MESSAGE_TRUNC_SZ 32 >+static void test_seqpacket_msg_trunc_client(const struct test_opts *opts) >+{ >+ int fd; >+ char buf[MESSAGE_TRUNC_SZ]; >+ >+ fd = vsock_seqpacket_connect(opts->peer_cid, 1234); >+ if (fd < 0) { >+ perror("connect"); >+ exit(EXIT_FAILURE); >+ } >+ >+ if (send(fd, buf, sizeof(buf), 0) != sizeof(buf)) { >+ perror("send failed"); >+ exit(EXIT_FAILURE); >+ } >+ >+ control_writeln("SENDDONE"); >+ close(fd); >+} >+ >+static void test_seqpacket_msg_trunc_server(const struct test_opts *opts) >+{ >+ int fd; >+ char buf[MESSAGE_TRUNC_SZ / 2]; >+ struct msghdr msg = {0}; >+ struct iovec iov = {0}; >+ >+ fd = vsock_seqpacket_accept(VMADDR_CID_ANY, 1234, NULL); >+ if (fd < 0) { >+ perror("accept"); >+ exit(EXIT_FAILURE); >+ } >+ >+ control_expectln("SENDDONE"); >+ iov.iov_base = buf; >+ iov.iov_len = sizeof(buf); >+ msg.msg_iov = &iov; >+ msg.msg_iovlen = 1; >+ >+ ssize_t ret = recvmsg(fd, &msg, MSG_TRUNC); >+ >+ if (ret != MESSAGE_TRUNC_SZ) { >+ printf("%zi\n", ret); >+ perror("MSG_TRUNC doesn't work"); >+ exit(EXIT_FAILURE); >+ } >+ >+ if (!(msg.msg_flags & MSG_TRUNC)) { >+ fprintf(stderr, "MSG_TRUNC expected\n"); >+ exit(EXIT_FAILURE); >+ } >+ >+ close(fd); >+} >+ > static struct test_case test_cases[] = { > { > .name = "SOCK_STREAM connection reset", >@@ -309,6 +415,16 @@ static struct test_case test_cases[] = { > .run_client = test_stream_msg_peek_client, > .run_server = test_stream_msg_peek_server, > }, >+ { >+ .name = "SOCK_SEQPACKET msg bounds", >+ .run_client = test_seqpacket_msg_bounds_client, >+ .run_server = test_seqpacket_msg_bounds_server, >+ }, >+ { >+ .name = "SOCK_SEQPACKET MSG_TRUNC flag", >+ .run_client = test_seqpacket_msg_trunc_client, >+ .run_server = test_seqpacket_msg_trunc_server, >+ }, > {}, > }; > >-- >2.25.1 >