----- Original Message -----
> From: "Zeng Linggang" <[email protected]>
> To: "Jan Stancek" <[email protected]>
> Cc: "ltp-list" <[email protected]>
> Sent: Wednesday, 19 February, 2014 10:40:03 AM
> Subject: [PATCH v2 2/2] mlock/mlock02.c: add EPERM and ENOMEM errno tests
> 
> Add EPERM and ENOMEM errno tests for mlock(2).
> 
> Signed-off-by: Zeng Linggang <[email protected]>
> ---
>  testcases/kernel/syscalls/mlock/mlock02.c | 88
>  ++++++++++++++++++++++++++++---
>  1 file changed, 81 insertions(+), 7 deletions(-)

Hi,

as mentioned in part1, there are some compilation issues:
Let's pretend we are on ia64 (extra -D__ia64__ passed to gcc):
$ gcc -g -O2 -g -O2 -fno-strict-aliasing -pipe -Wall -W -D_FORTIFY_SOURCE=2 
-I/usr/src/ltp/testcases/kernel/include -I../../../../include 
-I../../../../include   -L../../../../lib  mlock02.c   -lltp -o mlock02 
-D__ia64__
mlock02.c: In function ‘setup1’:
mlock02.c:133: error: assignment of read-only location ‘*test’


> 
> diff --git a/testcases/kernel/syscalls/mlock/mlock02.c
> b/testcases/kernel/syscalls/mlock/mlock02.c
> index 1d1c853..6ccd281 100644
> --- a/testcases/kernel/syscalls/mlock/mlock02.c
> +++ b/testcases/kernel/syscalls/mlock/mlock02.c
> @@ -20,13 +20,22 @@
>   * ALGORITHM
>   *   test 1:
>   *           Call mlock with a NULL address.  ENOMEM should be returned
> + *   test 2:
> + *           The caller was not privileged and its RLIMIT_MEMLOCK soft
> + *           resource limit was 0. EPERM should be returned
> + *   test 3:
> + *           The caller was not privileged and its RLIMIT_MEMLOCK soft
> + *           resource limit was nonzero, but tried to lock more memory than
> + *           the limit permitted. ENOMEM should be returned
>   */
>  
>  #include <errno.h>
>  #include <unistd.h>
>  #include <sys/mman.h>
> +#include <pwd.h>
>  #include "test.h"
>  #include "usctest.h"
> +#include "safe_macros.h"
>  
>  char *TCID = "mlock02";
>  
> @@ -36,25 +45,32 @@ struct test_case_t {
>       void **addr;
>       int len;
>       int error;
> -     void (*setupfunc) ();
> +     int (*setupfunc) ();
> +     void (*cleanupfunc) ();

should list parameters or void

>  };
>  
>  static void *addr1;
> +static struct passwd *ltpuser;
>  static void setup(void);
>  #ifdef __ia64__
> -static void setup1(const struct test_case_t *);
> +static int setup1(const struct test_case_t *);
>  #else
> -static void setup1(void);
> +static int setup1(void);
>  #endif
> +static int setup2(void);
> +static int setup3(void);
> +static void cleanup2(void);
>  static void cleanup(void);
>  static void mlock_verify(const struct test_case_t *);
>  
>  static struct test_case_t TC[] = {
> -     {&addr1, 1024, ENOMEM, setup1},
> +     {&addr1, 1024, ENOMEM, setup1, NULL},
> +     {&addr1, 1024, EPERM, setup2, cleanup2},
> +     {&addr1+1024, 1024, ENOMEM, setup3, cleanup2},

What is at this memory location? It appears to be from heap:

(gdb) b setup3
Breakpoint 1 at 0x401b30: file mlock02.c, line 168.
(gdb) r
Starting program: /usr/src/ltp/testcases/kernel/syscalls/mlock/mlock02 
...
Breakpoint 1, setup3 () at mlock02.c:168
168     {
Missing separate debuginfos, use: debuginfo-install glibc-2.12-1.132.el6.x86_64

(gdb) p/x &addr1
$3 = 0x608728

(gdb) p/x &addr1+1024
$4 = 0x60a728

(gdb) info proc map
process 524
cmdline = '/usr/src/ltp/testcases/kernel/syscalls/mlock/mlock02'
cwd = '/usr/src/ltp/testcases/kernel/syscalls/mlock'
exe = '/usr/src/ltp/testcases/kernel/syscalls/mlock/mlock02'
Mapped address spaces:

          Start Addr           End Addr       Size     Offset objfile
            0x400000           0x409000     0x9000          0                   
          /usr/src/ltp/testcases/kernel/syscalls/mlock/mlock02
            0x608000           0x609000     0x1000     0x8000                   
          /usr/src/ltp/testcases/kernel/syscalls/mlock/mlock02
            0x609000           0x62e000    0x25000          0                   
                [heap]


>  };
>  
>  int TST_TOTAL = ARRAY_SIZE(TC);
> -static int exp_enos[] = { ENOMEM, 0 };
> +static int exp_enos[] = { ENOMEM, EPERM, 0 };
>  
>  int main(int ac, char **av)
>  {
> @@ -83,6 +99,8 @@ static void setup(void)
>       tst_sig(NOFORK, DEF_HANDLER, cleanup);
>  
>       TEST_PAUSE;
> +
> +     ltpuser = SAFE_GETPWNAM(cleanup, "nobody");
>  }
>  
>  static void mlock_verify(const struct test_case_t *test)
> @@ -92,6 +110,9 @@ static void mlock_verify(const struct test_case_t *test)
>  
>       TEST(mlock(*(test->addr), test->len));
>  
> +     if (test->cleanupfunc != NULL)
> +             test->cleanupfunc();
> +
>       if (TEST_RETURN != -1) {
>               tst_resm(TFAIL, "mlock succeeded unexpectedly");
>               return;
> @@ -107,17 +128,70 @@ static void mlock_verify(const struct test_case_t
> *test)
>  }
>  
>  #ifdef __ia64__
> -static void setup1(const struct test_case_t *test)
> +static int setup1(const struct test_case_t *test)
>  {
>       test->len = getpagesize() + 1;
> +     return 0;
>  }
>  #else
> -static void setup1(void)
> +static int setup1(void)
>  {
>       addr1 = NULL;
> +     return 0;
>  }
>  #endif
>  
> +static int setup2(void)
> +{
> +     struct rlimit rl;
> +
> +     if (geteuid() != 0) {
> +             tst_resm(TWARN, "Test needs to be run as root");
> +             return -1;
> +     }

If you add tst_require_root(NULL); to setup() that will break with TCONF and 
you can remove this.

> +
> +     rl.rlim_max = 0;
> +     rl.rlim_cur = 0;
> +     if (setrlimit(RLIMIT_MEMLOCK, &rl) != 0) {
> +             tst_resm(TWARN,
> +                      "setrlimit failed to set the resource for "
> +                      "RLIMIT_MEMLOCK to check for mlock()");

I'd expect TBROK here.

> +             return -1;
> +     }
> +
> +     SAFE_SETEUID(cleanup, ltpuser->pw_uid);
> +
> +     return 0;
> +}
> +
> +static int setup3(void)
> +{
> +     struct rlimit rl;
> +
> +     if (geteuid() != 0) {
> +             tst_resm(TWARN, "Test needs to be run as root");
> +             return -1;
> +     }

same as in setup2, can be removed if you add tst_require_root(NULL); to setup()

> +
> +     rl.rlim_max = 1;
> +     rl.rlim_cur = 1;
> +     if (setrlimit(RLIMIT_MEMLOCK, &rl) != 0) {
> +             tst_resm(TWARN,
> +                      "setrlimit failed to set the resource for "
> +                      "RLIMIT_MEMLOCK to check for mlock()");

I'd expect TBROK here as well.

> +             return -1;
> +     }
> +
> +     SAFE_SETEUID(cleanup, ltpuser->pw_uid);
> +
> +     return 0;
> +}

For setup2 and setup3 I'd suggest to set *addr to some reasonable value,
so that when mlock returns ENOMEM we know it wasn't because *addr was NULL.

Regards,
Jan

> +
> +static void cleanup2(void)
> +{
> +     SAFE_SETEUID(cleanup, 0);
> +}
> +
>  static void cleanup(void)
>  {
>       TEST_CLEANUP;
> --
> 1.8.4.2
> 
> 
> 
> 

------------------------------------------------------------------------------
Managing the Performance of Cloud-Based Applications
Take advantage of what the Cloud has to offer - Avoid Common Pitfalls.
Read the Whitepaper.
http://pubads.g.doubleclick.net/gampad/clk?id=121054471&iu=/4140/ostg.clktrk
_______________________________________________
Ltp-list mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/ltp-list

Reply via email to