Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp19271223rwd; Wed, 28 Jun 2023 07:17:06 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7UJArOLgM57vD403Nfc2rW4mnHUKqzTnngEF0J4w9BmJ9umcNMbSGkXM6g9rmRGo+TsuZN X-Received: by 2002:aa7:d947:0:b0:51a:468c:b46c with SMTP id l7-20020aa7d947000000b0051a468cb46cmr24278673eds.30.1687961825951; Wed, 28 Jun 2023 07:17:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1687961825; cv=none; d=google.com; s=arc-20160816; b=E6/JXqh5CYdoGwEKf2PHxWCwAUjL3+qnG+xLzjha3QQcReXeKtz80X7hdduTdg9ILB S4lMI8cnPLwQcVkwbDko4iwFyOR4pGWcJOANBk9vEzA8atR75kNsJoJlnhXDFAJCAVOm hwmGbSJUsTf4Pi1p+9FSfP2liQ+Goa4O9UMk3kfQVu7RIZv21Ov1UV/ggSHIX0WqNFsS nR7AD26FfwTN6WTczrGwO3L55DTnYzTps80mwdU06GTMtcwwwVQbgkJB7Y1uOsuI+V/y 6G8c+aEgh7M5/RiKL/1345Ak4KYMP8Occ13Hmdd6dlZPjyWavDEJJJPabGANxeiO3z95 712g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:feedback-id:content-transfer-encoding :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from; bh=qDhl3Iw2UEb4qAMVy2PLkgkdWi/pvWW6GjRhyMjY44A=; fh=CABfkMhKo5yB9DuGBIJJBQ5z8vnCCyGNX8ln70ySW7c=; b=le3wZ5+GnhZWIjntmXbgQsYTKCEddR5GC9GwEe0SWzwT1cdInjImhuARkb+YYnpL3c hH2ndp50hCDMqt7qc59OA6p+6lT6GWH/y5xlnu1bAfckZdoEEZwaWwDP4eyr3ElUgsZB jzZ6lcIpl+Kr4UdNrhwbQV7E1LRVyvnc46IZhTIy+/uw3skry4PBT8IPhKAKzJ1JKBSn G3yu3k3vpkratrf9yEA1oMjd/OO5w7jeGH1a8VZmfEZW6nW/bKcvUkLJdRmfaRBjC2kN 2pPJ2ys1MghSv7l/9TUF4o2+4Wx1WVeDTiQQrikGeLLPSeQS559T7+BN9SuG7wJ8CEgT w1ew== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id v25-20020aa7cd59000000b0051dd23f57dasi593388edw.193.2023.06.28.07.16.39; Wed, 28 Jun 2023 07:17:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231221AbjF1NvW (ORCPT + 99 others); Wed, 28 Jun 2023 09:51:22 -0400 Received: from bg4.exmail.qq.com ([43.155.65.254]:15726 "EHLO bg4.exmail.qq.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232177AbjF1NvI (ORCPT ); Wed, 28 Jun 2023 09:51:08 -0400 X-QQ-mid: bizesmtp62t1687960254t1k4fnuc Received: from linux-lab-host.localdomain ( [116.30.129.193]) by bizesmtp.qq.com (ESMTP) with id ; Wed, 28 Jun 2023 21:50:52 +0800 (CST) X-QQ-SSF: 01200000000000D0V000000A0000000 X-QQ-FEAT: LE7C6P2vL8Rs71HKKnUKI/KsyIrvxJemr+QCXnBO0TehcHy+yUadv9WfiP7BO HumbA33LeCmpxXahC9MRtCsLp5durYPTvDlmaJANCO1MTNZEb96K4CiFu4Fl/voUN96haZ9 ZXcXz4lYzLkh1CGfyBVFfJpuIPMmn7i6aYGvsP138KojvBcs/6/Gnegj72JAAmfLUO2AkYr IAf+MrlyOU2tFhoCORLxP8p1gN7+1CNaExSogNRUJPXZSOMYa4w1o2+VKtn7eSCuWW3+Jn7 QbGg+iWGuMvOZIh1BQHkcnh8BLx3mRLxLqIcBeQ/8bNQkAlB1QJJaoayNC4N6eDso0yW2XO LBMnmsTl2FHwwFfqw7qGLOxkdTijLN0URhWT7t/v7RlefDPLcE= X-QQ-GoodBg: 0 X-BIZMAIL-ID: 15994507505466130744 From: Zhangjin Wu To: thomas@t-8ch.de, w@1wt.eu Cc: falcon@tinylab.org, arnd@arndb.de, david.laight@aculab.com, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-riscv@lists.infradead.org Subject: [PATCH v5 13/14] selftests/nolibc: add sbrk_0 to test current brk getting Date: Wed, 28 Jun 2023 21:46:28 +0800 Message-Id: X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-QQ-SENDSIZE: 520 Feedback-ID: bizesmtp:tinylab.org:qybglogicsvrgz:qybglogicsvrgz5a-1 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From musl 0.9.14 (to the latest version 1.2.3), both sbrk() and brk() have almost been disabled for they conflict with malloc, only sbrk(0) is still permitted as a way to get the current brk, let's support such case. EXPECT_PTRNE() is used to expect sbrk() always successfully getting the current brk. Signed-off-by: Zhangjin Wu --- tools/testing/selftests/nolibc/nolibc-test.c | 1 + 1 file changed, 1 insertion(+) diff --git a/tools/testing/selftests/nolibc/nolibc-test.c b/tools/testing/selftests/nolibc/nolibc-test.c index 34af802dadfd..80ab29e2887c 100644 --- a/tools/testing/selftests/nolibc/nolibc-test.c +++ b/tools/testing/selftests/nolibc/nolibc-test.c @@ -630,6 +630,7 @@ int run_syscall(int min, int max) CASE_TEST(kill_0); EXPECT_SYSZR(1, kill(getpid(), 0)); break; CASE_TEST(kill_CONT); EXPECT_SYSZR(1, kill(getpid(), 0)); break; CASE_TEST(kill_BADPID); EXPECT_SYSER(1, kill(INT_MAX, 0), -1, ESRCH); break; + CASE_TEST(sbrk_0); EXPECT_PTRNE(1, sbrk(0), (void *)-1); break; CASE_TEST(sbrk); if ((p1 = p2 = sbrk(4096)) != (void *)-1) p2 = sbrk(-4096); EXPECT_SYSZR(1, (p2 == (void *)-1) || p2 == p1); break; CASE_TEST(brk); EXPECT_SYSZR(1, brk(sbrk(0))); break; CASE_TEST(chdir_root); EXPECT_SYSZR(1, chdir("/")); break; -- 2.25.1