Received: by 10.223.164.202 with SMTP id h10csp1252295wrb; Sun, 26 Nov 2017 23:21:37 -0800 (PST) X-Google-Smtp-Source: AGs4zMZqjkE8ZrnajTYd5m+TNZ4Pa+Ks+0rOC4/NgUYJ1B77N9SUOGf7JHaHcN14r04IGy+17QVU X-Received: by 10.84.136.131 with SMTP id 3mr22131555pll.430.1511767296928; Sun, 26 Nov 2017 23:21:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1511767296; cv=none; d=google.com; s=arc-20160816; b=llnuiiU0RCX6s+fbrzwHRr0BhY33zJya+6c1SeNTfb6pHMRcnET0nhK2P1kcuZFNrO kijvZ9vn1iPRp/fC1M7m+nw5VzKHIsJMb7VC2+N8tn61VYL2avlRo7YVwM+0rpoPcRsq SBLghda/lvfFUHSzPhNjUgSjnwx4R6DoLq4KiWY+3ToSmhusmJLp8L+qPoro6SlwUauD pfztRgJz1hNetaMFO6dCbEZ76WHm21rNmHKODvwwW5QOTULZEfD4ab9HM7npcn7VtVI9 4jttMqoHRj1+zsvXF+mY1phNOtinqnQTXYriVyksJeQMU2pOqnujzzu+ZtM3kNFZR3nF N08Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:references:in-reply-to:date :subject:cc:to:from:arc-authentication-results; bh=sjXWCxwzq6/o8np1iMzlIbLtdidEVeo6B8XRTAWdMPA=; b=oBXRaNd0ivfHri5gK0fA/pk3WDkViUAVN2j845ciq+SCXMY5eVMQQWBG7y7D0cKiGm Li6X8Eo7fpSmVziZ8/QnMvgQuzbPqr5tHgdp6NUIAVSF1rpaTpi2yDQ6czj8q1wKf05/ 4sk5iKtE0+guRp8scPHtP5PJuo0TcYJTZgFvNkAWbMGhhVSHQZXH4QxHlrcJcxSHbY08 cr1CZqbIGktTYG4lX+Hw8EsM7N6AVHV+qFHjEM3o0Y70Yn9jGq9bVZ8OskXpwA08o+vG S/uRjLWLeEsX7l1mqpuo5cWKchBHC4Xt0ARl5BKjuxjFK3//zOlVwZyH7Du5td32zXdI n+8g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u23si1633813pfh.265.2017.11.26.23.21.25; Sun, 26 Nov 2017 23:21:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751664AbdK0HUH (ORCPT + 78 others); Mon, 27 Nov 2017 02:20:07 -0500 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:58406 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751266AbdK0HUE (ORCPT ); Mon, 27 Nov 2017 02:20:04 -0500 Received: from pps.filterd (m0098404.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.21/8.16.0.21) with SMTP id vAR7IqLX035828 for ; Mon, 27 Nov 2017 02:20:04 -0500 Received: from e06smtp15.uk.ibm.com (e06smtp15.uk.ibm.com [195.75.94.111]) by mx0a-001b2d01.pphosted.com with ESMTP id 2egbhd6dhj-1 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT) for ; Mon, 27 Nov 2017 02:20:04 -0500 Received: from localhost by e06smtp15.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Mon, 27 Nov 2017 07:20:01 -0000 Received: from b06cxnps4074.portsmouth.uk.ibm.com (9.149.109.196) by e06smtp15.uk.ibm.com (192.168.101.145) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Mon, 27 Nov 2017 07:19:57 -0000 Received: from d06av26.portsmouth.uk.ibm.com (d06av26.portsmouth.uk.ibm.com [9.149.105.62]) by b06cxnps4074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id vAR7Ju9743319500; Mon, 27 Nov 2017 07:19:56 GMT Received: from d06av26.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 45C48AE051; Mon, 27 Nov 2017 07:13:06 +0000 (GMT) Received: from d06av26.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 2F2B8AE045; Mon, 27 Nov 2017 07:13:04 +0000 (GMT) Received: from rapoport-lnx (unknown [9.148.8.170]) by d06av26.portsmouth.uk.ibm.com (Postfix) with ESMTPS; Mon, 27 Nov 2017 07:13:04 +0000 (GMT) Received: by rapoport-lnx (sSMTP sendmail emulation); Mon, 27 Nov 2017 09:19:53 +0200 From: Mike Rapoport To: Andrew Morton , Alexander Viro Cc: linux-mm@kvack.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-api@vger.kernel.org, criu@openvz.org, Arnd Bergmann , Pavel Emelyanov , Michael Kerrisk , Thomas Gleixner , Josh Triplett , Jann Horn , Greg KH , Andrei Vagin , Mike Rapoport Subject: [PATCH v4 4/4] test: add a test for the process_vmsplice syscall Date: Mon, 27 Nov 2017 09:19:41 +0200 X-Mailer: git-send-email 2.7.4 In-Reply-To: <1511767181-22793-1-git-send-email-rppt@linux.vnet.ibm.com> References: <1511767181-22793-1-git-send-email-rppt@linux.vnet.ibm.com> X-TM-AS-GCONF: 00 x-cbid: 17112707-0020-0000-0000-000003D0D626 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 17112707-0021-0000-0000-0000426636B6 Message-Id: <1511767181-22793-5-git-send-email-rppt@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2017-11-27_04:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1711270102 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Andrei Vagin This test checks that process_vmsplice() can splice pages from a remote process and returns EFAULT, if process_vmsplice() tries to splice pages by an unaccessiable address. Signed-off-by: Andrei Vagin Signed-off-by: Mike Rapoport --- tools/testing/selftests/process_vmsplice/Makefile | 5 + .../process_vmsplice/process_vmsplice_test.c | 196 +++++++++++++++++++++ 2 files changed, 201 insertions(+) create mode 100644 tools/testing/selftests/process_vmsplice/Makefile create mode 100644 tools/testing/selftests/process_vmsplice/process_vmsplice_test.c diff --git a/tools/testing/selftests/process_vmsplice/Makefile b/tools/testing/selftests/process_vmsplice/Makefile new file mode 100644 index 0000000..246d5a7 --- /dev/null +++ b/tools/testing/selftests/process_vmsplice/Makefile @@ -0,0 +1,5 @@ +CFLAGS += -I../../../../usr/include/ + +TEST_GEN_PROGS := process_vmsplice_test + +include ../lib.mk diff --git a/tools/testing/selftests/process_vmsplice/process_vmsplice_test.c b/tools/testing/selftests/process_vmsplice/process_vmsplice_test.c new file mode 100644 index 0000000..1682bdb --- /dev/null +++ b/tools/testing/selftests/process_vmsplice/process_vmsplice_test.c @@ -0,0 +1,196 @@ +#define _GNU_SOURCE +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#include "../kselftest.h" + +#ifndef __NR_process_vmsplice +#define __NR_process_vmsplice 333 +#endif + +#define pr_err(fmt, ...) \ + ({ \ + fprintf(stderr, "%s:%d:" fmt, \ + __func__, __LINE__, ##__VA_ARGS__); \ + KSFT_FAIL; \ + }) +#define pr_perror(fmt, ...) pr_err(fmt ": %m\n", ##__VA_ARGS__) +#define fail(fmt, ...) pr_err("FAIL:" fmt, ##__VA_ARGS__) + +static ssize_t process_vmsplice(pid_t pid, int fd, const struct iovec *iov, + unsigned long nr_segs, unsigned int flags) +{ + return syscall(__NR_process_vmsplice, pid, fd, iov, nr_segs, flags); + +} + +#define MEM_SIZE (4096 * 100) +#define MEM_WRONLY_SIZE (4096 * 10) + +int main(int argc, char **argv) +{ + char *addr, *addr_wronly; + int p[2]; + struct iovec iov[2]; + char buf[4096]; + int status, ret; + pid_t pid; + + ksft_print_header(); + + if (process_vmsplice(0, 0, 0, 0, 0)) { + if (errno == ENOSYS) { + ksft_exit_skip("process_vmsplice is not supported\n"); + return 0; + } + return pr_perror("Zero-length process_vmsplice failed"); + } + + addr = mmap(0, MEM_SIZE, PROT_READ | PROT_WRITE, + MAP_ANONYMOUS | MAP_PRIVATE, -1, 0); + if (addr == MAP_FAILED) + return pr_perror("Unable to create a mapping"); + + addr_wronly = mmap(0, MEM_WRONLY_SIZE, PROT_WRITE, + MAP_ANONYMOUS | MAP_PRIVATE, -1, 0); + if (addr_wronly == MAP_FAILED) + return pr_perror("Unable to create a write-only mapping"); + + if (pipe(p)) + return pr_perror("Unable to create a pipe"); + + pid = fork(); + if (pid < 0) + return pr_perror("Unable to fork"); + + if (pid == 0) { + addr[0] = 'C'; + addr[4096 + 128] = 'A'; + addr[4096 + 128 + 4096 - 1] = 'B'; + + if (prctl(PR_SET_PDEATHSIG, SIGKILL)) + return pr_perror("Unable to set PR_SET_PDEATHSIG"); + if (write(p[1], "c", 1) != 1) + return pr_perror("Unable to write data into pipe"); + + while (1) + sleep(1); + return 1; + } + if (read(p[0], buf, 1) != 1) { + pr_perror("Unable to read data from pipe"); + kill(pid, SIGKILL); + wait(&status); + return 1; + } + + munmap(addr, MEM_SIZE); + munmap(addr_wronly, MEM_WRONLY_SIZE); + + iov[0].iov_base = addr; + iov[0].iov_len = 1; + + iov[1].iov_base = addr + 4096 + 128; + iov[1].iov_len = 4096; + + /* check one iovec */ + if (process_vmsplice(pid, p[1], iov, 1, SPLICE_F_GIFT) != 1) + return pr_perror("Unable to splice pages"); + + if (read(p[0], buf, 1) != 1) + return pr_perror("Unable to read from pipe"); + + if (buf[0] != 'C') + ksft_test_result_fail("Get wrong data\n"); + else + ksft_test_result_pass("Check process_vmsplice with one vec\n"); + + /* check two iovec-s */ + if (process_vmsplice(pid, p[1], iov, 2, SPLICE_F_GIFT) != 4097) + return pr_perror("Unable to spice pages\n"); + + if (read(p[0], buf, 1) != 1) + return pr_perror("Unable to read from pipe\n"); + + if (buf[0] != 'C') + ksft_test_result_fail("Get wrong data\n"); + + if (read(p[0], buf, 4096) != 4096) + return pr_perror("Unable to read from pipe\n"); + + if (buf[0] != 'A' || buf[4095] != 'B') + ksft_test_result_fail("Get wrong data\n"); + else + ksft_test_result_pass("check process_vmsplice with two vecs\n"); + + /* check how an unreadable region in a second vec is handled */ + iov[0].iov_base = addr; + iov[0].iov_len = 1; + + iov[1].iov_base = addr_wronly + 5; + iov[1].iov_len = 1; + + if (process_vmsplice(pid, p[1], iov, 2, SPLICE_F_GIFT) != 1) + return pr_perror("Unable to splice data"); + + if (read(p[0], buf, 1) != 1) + return pr_perror("Unable to read form pipe"); + + if (buf[0] != 'C') + ksft_test_result_fail("Get wrong data\n"); + else + ksft_test_result_pass("unreadable region in a second vec\n"); + + /* check how an unreadable region in a first vec is handled */ + errno = 0; + if (process_vmsplice(pid, p[1], iov + 1, 1, SPLICE_F_GIFT) != -1 || + errno != EFAULT) + ksft_test_result_fail("Got anexpected errno %d\n", errno); + else + ksft_test_result_pass("splice as much as possible\n"); + + iov[0].iov_base = addr; + iov[0].iov_len = 1; + + iov[1].iov_base = addr; + iov[1].iov_len = MEM_SIZE; + + /* splice as much as possible */ + ret = process_vmsplice(pid, p[1], iov, 2, + SPLICE_F_GIFT | SPLICE_F_NONBLOCK); + if (ret != 4096 * 15 + 1) /* by default a pipe can fit 16 pages */ + return pr_perror("Unable to splice pages"); + + while (ret > 0) { + int len; + + len = read(p[0], buf, 4096); + if (len < 0) + return pr_perror("Unable to read data"); + if (len > ret) + return pr_err("Read more than expected\n"); + ret -= len; + } + ksft_test_result_pass("splice as much as possible\n"); + + if (kill(pid, SIGTERM)) + return pr_perror("Unable to kill a child process"); + status = -1; + if (wait(&status) < 0) + return pr_perror("Unable to wait a child process"); + if (!WIFSIGNALED(status) || WTERMSIG(status) != SIGTERM) + return pr_err("The child exited with an unexpected code %d\n", + status); + + if (ksft_get_fail_cnt()) + return ksft_exit_fail(); + return ksft_exit_pass(); +} -- 2.7.4 From 1598906137503339877@xxx Fri Apr 27 13:28:37 +0000 2018 X-GM-THRID: 1584862043636462130 X-Gmail-Labels: Inbox,Category Forums,Downloaded_2018-04