Received: by 2002:a05:6358:c692:b0:131:369:b2a3 with SMTP id fe18csp2852658rwb; Sat, 29 Jul 2023 16:08:41 -0700 (PDT) X-Google-Smtp-Source: APBJJlEHZj/5C8bnFb/EU8kp3b6CrafgwCcaUl0XKS+UolPhozMnSxwcUSuzY+Ch1NtQitTpYajn X-Received: by 2002:a05:6a20:3d8e:b0:133:1d62:dcbd with SMTP id s14-20020a056a203d8e00b001331d62dcbdmr6500276pzi.28.1690672121426; Sat, 29 Jul 2023 16:08:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1690672121; cv=none; d=google.com; s=arc-20160816; b=UmZuGkNntjIKdNsAXccVwVyCVHl8jjvAh/LLJu4FXh8uYXC4roqFCmcadBAkGOhPkR bBvPOSLjf1hEx8v7h+E1GowwyzFpopiIbFUtcZjCESAznQIQSuODwGI42N3YAKKnC5Ki HaL6db7XcwiwZE+u2DO8+q9P8faLb8nQaATtvTvU6C/0DYnUwHfAdPm/5UOtS59kuKBf aL/j5VudBughS4ectR/nRDwQ3gUehALHQfbwTTBC/arcQocFKw8IiurEqsve94l/YRJO lDNqVBUKZi9re03cutTDgbXhePS9bLDwHhqAOlha6dnT7dXzeNWhkWocWwhTaUclowL1 929w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=0YfWPyFGXyGOymIUstBoxp4kjIkOgFBCHNAi2CXqRi8=; fh=l33mWavnHGYJ2XDeKtGto0RLtWj7njx9xyMvDkqmpRA=; b=erMOHbmNilIs5YKeoOb54hk3IIuqWDHzNW8YvCsgH8AU2IoazjKMEiXwCM9MMcPjfs gyVxW7B7yeTnM19qvMPfqvUVJhrUHOuMS8jCJMF7nDayKPstc8S/X8yHL/dHi/5BaM0P Qip91dLWzB1WfCp9szKxl6koMFe87jFxZDZK2b0zA46d/qZOmCTtd0SpVjaLuH+l7tpz XxMyocHR27vkzO246HYQyTjVbXWYdQyPd+NdMWgEvWY209vOwf8soFeDNhfw0+gpjtV4 Nbgg0A0iA/GFyD37/Ibz9AHASBFWzKFW7G2yOpZY6KLMMAi4fz49nT74v8b9wSD1tW/E KMag== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@t-8ch.de header.s=mail header.b=D+rotqYI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n12-20020a63e04c000000b00563fbc0000csi5096059pgj.254.2023.07.29.16.08.29; Sat, 29 Jul 2023 16:08:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@t-8ch.de header.s=mail header.b=D+rotqYI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229638AbjG2WR2 (ORCPT + 99 others); Sat, 29 Jul 2023 18:17:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41486 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229459AbjG2WR1 (ORCPT ); Sat, 29 Jul 2023 18:17:27 -0400 Received: from todd.t-8ch.de (todd.t-8ch.de [IPv6:2a01:4f8:c010:41de::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 230292680; Sat, 29 Jul 2023 15:17:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=t-8ch.de; s=mail; t=1690669045; bh=5Md0jFhp2sJ0pGrekHfnvbdPswv4yRGYROCpxcISNyw=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=D+rotqYIOPAJoFdGZggWRqAG9l01ggLPuvwPy11NOFoJk+hXdP+fwCOb0p3cNAxX+ FA0rexChmizxYdpmH1T2YaehEleUxF/OLU6YOFr8AH9fuYb6UBmdNwa3MZ7oHRLW4o kCXkazNJeOFhBYgViHX9ygsRzCq/JdfpCfkyVuk8= Date: Sun, 30 Jul 2023 00:17:24 +0200 From: Thomas =?utf-8?Q?Wei=C3=9Fschuh?= To: Yuan Tan Cc: w@1wt.eu, falcon@tinylab.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org Subject: Re: [PATCH 2/2] selftests/nolibc: add testcase for pipe. Message-ID: <27bd9bc1-e7a5-4a81-91c9-2642feabb7ce@t-8ch.de> References: <160ddef0313e11085ee906144d6d9678b8156171.1690307717.git.tanyuan@tinylab.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <160ddef0313e11085ee906144d6d9678b8156171.1690307717.git.tanyuan@tinylab.org> X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2023-07-25 14:01:30-0400, Yuan Tan wrote: > Add a testcase of pipe that child process sends message to parent process. > > Signed-off-by: Yuan Tan > --- > tools/testing/selftests/nolibc/nolibc-test.c | 34 ++++++++++++++++++++ > 1 file changed, 34 insertions(+) > > diff --git a/tools/testing/selftests/nolibc/nolibc-test.c b/tools/testing/selftests/nolibc/nolibc-test.c > index 03b1d30f5507..43ba2884fd1e 100644 > --- a/tools/testing/selftests/nolibc/nolibc-test.c > +++ b/tools/testing/selftests/nolibc/nolibc-test.c > @@ -767,6 +767,39 @@ int test_mmap_munmap(void) > return ret; > } > > +int test_pipe(void) > +{ > + int pipefd[2]; > + char buf[32]; > + pid_t pid; > + char *msg = "hello, nolibc"; const char * const > + > + if (pipe(pipefd) == -1) > + return 1; > + > + pid = fork(); > + > + switch (pid) { > + case -1: > + return 1; > + > + case 0: > + close(pipefd[0]); > + write(pipefd[1], msg, strlen(msg)); Isn't this missing to write trailing the 0 byte? Also check the return value. > + close(pipefd[1]); Do we need to close the pipefds? The process is exiting anyways. > + exit(EXIT_SUCCESS); > + > + default: > + close(pipefd[1]); > + read(pipefd[0], buf, 32); Use sizeof(buf). Check return value == strlen(msg). > + close(pipefd[0]); > + wait(NULL); waitpid(pid, NULL, 0); > + > + if (strcmp(buf, msg)) > + return 1; > + return 0; return !!strcmp(buf, msg); > + } > +} > > /* Run syscall tests between IDs and . > * Return 0 on success, non-zero on failure. > @@ -851,6 +884,7 @@ int run_syscall(int min, int max) > CASE_TEST(mmap_munmap_good); EXPECT_SYSZR(1, test_mmap_munmap()); break; > CASE_TEST(open_tty); EXPECT_SYSNE(1, tmp = open("/dev/null", 0), -1); if (tmp != -1) close(tmp); break; > CASE_TEST(open_blah); EXPECT_SYSER(1, tmp = open("/proc/self/blah", 0), -1, ENOENT); if (tmp != -1) close(tmp); break; > + CASE_TEST(pipe); EXPECT_SYSZR(1, test_pipe()); break; > CASE_TEST(poll_null); EXPECT_SYSZR(1, poll(NULL, 0, 0)); break; > CASE_TEST(poll_stdout); EXPECT_SYSNE(1, ({ struct pollfd fds = { 1, POLLOUT, 0}; poll(&fds, 1, 0); }), -1); break; > CASE_TEST(poll_fault); EXPECT_SYSER(1, poll((void *)1, 1, 0), -1, EFAULT); break; > -- > 2.39.2 >