Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp6622593rwd; Mon, 19 Jun 2023 09:44:55 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5cYyN0ru2qCvpiTYvFOhUAelMD6m92zS9G46edF9UeP8AEf8hD1fAZiFaG0ntufvuV9FUD X-Received: by 2002:a05:6a20:7f8c:b0:11a:f632:78fb with SMTP id d12-20020a056a207f8c00b0011af63278fbmr12777810pzj.19.1687193095302; Mon, 19 Jun 2023 09:44:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1687193095; cv=none; d=google.com; s=arc-20160816; b=ZQxekGiNTLS687PiDP6u2RRn66R6yet+frGUyn/2OxThZNVbmkXRQHvVGxv32D3EQL IfczUxgvNCHJeKSCRVNAHxKWlJJvs7NPVQ2RldkRLECbHnCXRpLGgtdczH8Ui7NxPyTW COwAf17qA5K/9gZHjVE7tHNzsnilUZbzzKdJXOTcxgwoz3UbPpAHJkOUMU0uk8X+5YRU 6P+EM9kCXQLHWhgR7FgJduLg+c9B9OxzRyN9KlQTcOw3P8pMfuAfC5JdQ079XMeZbL3s JicZuth3hUMAnBqhPSenx5q1nmqFHam+xGjl6sVdgTyXGbran+ggohyfgABgl3W5PDPB hGSQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:feedback-id:content-transfer-encoding :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from; bh=qDhl3Iw2UEb4qAMVy2PLkgkdWi/pvWW6GjRhyMjY44A=; b=vL6mAofAMV9r6p675pkaMcFmJQFyCCip7UZZxJa0/fkc+6kIk6tjlqbgEv+peTJvEY kW7Iy5Ql5T5mxoc3eq53k2tWj6oM+4+WplfBumjvcAqS4ikQ8qopnNsyp91PepkMrE+v evDOVy5dQwP6Ae+wbCU1yjixHljLp+evwjQCdNmP1sn2adt2EZI09o8OU7b873BjEFa2 2E+FzA3IgfVQJLvffENS8KAJqq4urrVzpR+gKX2pLcZzbZYE8r5j4YSjkHh+nTtJcetm B63BFtK4RpiKhXTrVB29Wf6c3bjG5b2c4SpfjIcy4gKJrKfJji61jPPBODsykBXYvVyU j7aw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h6-20020a056a00000600b00666b8536d8asi5163612pfk.305.2023.06.19.09.44.42; Mon, 19 Jun 2023 09:44:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229481AbjFSPzB (ORCPT + 99 others); Mon, 19 Jun 2023 11:55:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54130 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232107AbjFSPyx (ORCPT ); Mon, 19 Jun 2023 11:54:53 -0400 Received: from bg4.exmail.qq.com (bg4.exmail.qq.com [43.154.54.12]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 87E79188; Mon, 19 Jun 2023 08:54:52 -0700 (PDT) X-QQ-mid: bizesmtp88t1687190077tbbjb744 Received: from linux-lab-host.localdomain ( [116.30.126.60]) by bizesmtp.qq.com (ESMTP) with id ; Mon, 19 Jun 2023 23:54:36 +0800 (CST) X-QQ-SSF: 01200000000000D0V000000A0000000 X-QQ-FEAT: 7jw2iSiCazrClih7lQSw1lHt5a5sEA2WAD1UMQ9RMYxH4lPlMP9RlLSFyxJtv j+1aODH0kfVvVUG+Hy8dMmNAmWCFvsk7cZphwRrkAIZmNzeRcqbsnR/b9YWp4mLgpZYF8ld 1Z2z/0qDH1rmprRPceUvjzkuQXRO5Dnej7ew6HFEXPKN76cwi5AkJzV4Piq3D1EF4ZqlAgb J0QjvClC5shv0UDB2arUdlC8rfhsKGMNY9guCj6qdEvcw1uJFuz9xx6PEb4iLKZBwtyNtiA 9QJE/Iu05lxs6gtg6Q0YYXvOdh+oKy6Jy6Ckk5ArTaEIK5YorKlbnR/0/zKNqR5/pxE+LAy 83PDzWkqpozLdwmYpDUci7RfDcCowkFAAhvNqPTgaagQ0fEoys/YTJD6UYrAA== X-QQ-GoodBg: 0 X-BIZMAIL-ID: 2291941404729433177 From: Zhangjin Wu To: w@1wt.eu Cc: david.laight@aculab.com, arnd@arndb.de, falcon@tinylab.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-riscv@lists.infradead.org, thomas@t-8ch.de Subject: [PATCH v4 09/10] selftests/nolibc: add sbrk_0 to test current brk getting Date: Mon, 19 Jun 2023 23:54:15 +0800 Message-Id: <105b488a94953ec8e7b4555bbc89c8e5a17e2c8f.1687187451.git.falcon@tinylab.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-QQ-SENDSIZE: 520 Feedback-ID: bizesmtp:tinylab.org:qybglogicsvrsz:qybglogicsvrsz3a-3 X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,RCVD_IN_MSPIKE_H2, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From musl 0.9.14 (to the latest version 1.2.3), both sbrk() and brk() have almost been disabled for they conflict with malloc, only sbrk(0) is still permitted as a way to get the current brk, let's support such case. EXPECT_PTRNE() is used to expect sbrk() always successfully getting the current brk. Signed-off-by: Zhangjin Wu --- tools/testing/selftests/nolibc/nolibc-test.c | 1 + 1 file changed, 1 insertion(+) diff --git a/tools/testing/selftests/nolibc/nolibc-test.c b/tools/testing/selftests/nolibc/nolibc-test.c index 34af802dadfd..80ab29e2887c 100644 --- a/tools/testing/selftests/nolibc/nolibc-test.c +++ b/tools/testing/selftests/nolibc/nolibc-test.c @@ -630,6 +630,7 @@ int run_syscall(int min, int max) CASE_TEST(kill_0); EXPECT_SYSZR(1, kill(getpid(), 0)); break; CASE_TEST(kill_CONT); EXPECT_SYSZR(1, kill(getpid(), 0)); break; CASE_TEST(kill_BADPID); EXPECT_SYSER(1, kill(INT_MAX, 0), -1, ESRCH); break; + CASE_TEST(sbrk_0); EXPECT_PTRNE(1, sbrk(0), (void *)-1); break; CASE_TEST(sbrk); if ((p1 = p2 = sbrk(4096)) != (void *)-1) p2 = sbrk(-4096); EXPECT_SYSZR(1, (p2 == (void *)-1) || p2 == p1); break; CASE_TEST(brk); EXPECT_SYSZR(1, brk(sbrk(0))); break; CASE_TEST(chdir_root); EXPECT_SYSZR(1, chdir("/")); break; -- 2.25.1