[LTP] [PATCH] thp01: Find largest arguments size
Richard Palethorpe
rpalethorpe@suse.com
Thu Aug 31 10:34:07 CEST 2017
Because of kernel commit da029c11e6b1 the arguments size for exec has been
reduced considerably. This causes exec to fail with E2BIG, so we call it
repeatedly with a decreasing number of arguments until it is successful.
As far as I know, there is no other reliable and easy way to determine the
maximum argument length.
Signed-off-by: Richard Palethorpe <rpalethorpe@suse.com>
---
testcases/kernel/mem/thp/thp01.c | 83 ++++++++++++++++++++++++----------------
1 file changed, 50 insertions(+), 33 deletions(-)
diff --git a/testcases/kernel/mem/thp/thp01.c b/testcases/kernel/mem/thp/thp01.c
index 101a9b5c8..b90b9b637 100644
--- a/testcases/kernel/mem/thp/thp01.c
+++ b/testcases/kernel/mem/thp/thp01.c
@@ -30,6 +30,7 @@
* ....
*/
+#include <errno.h>
#include <sys/types.h>
#include <sys/resource.h>
#include <sys/wait.h>
@@ -38,56 +39,72 @@
#include <stdlib.h>
#include <unistd.h>
#include "mem.h"
+#include "tst_minmax.h"
+#include "tst_safe_sysv_ipc.h"
-#define ARRAY_SZ 256
+#define ARGS_SZ 256
-static int ps;
-static long length;
-static char *array[ARRAY_SZ];
+static int shm_id;
+static char *args[ARGS_SZ];
static char *arg;
-static struct rlimit rl = {
- .rlim_cur = RLIM_INFINITY,
- .rlim_max = RLIM_INFINITY,
-};
+static long *arg_count;
static void thp_test(void)
{
- int i;
- pid_t pid;
-
- switch (pid = SAFE_FORK()) {
- case 0:
- memset(arg, 'c', length - 1);
- arg[length - 1] = '\0';
- array[0] = "true";
- for (i = 1; i < ARRAY_SZ - 1; i++)
- array[i] = arg;
- array[ARRAY_SZ - 1] = NULL;
- if (setrlimit(RLIMIT_STACK, &rl) == -1) {
- perror("setrlimit");
- exit(1);
- }
- if (execvp("true", array) == -1) {
- perror("execvp");
- exit(1);
- }
- default:
- tst_reap_children();
+ pid_t pid = SAFE_FORK();
+
+ if (!arg_count)
+ tst_brk(TBROK, "No shared memory");
+
+ if (!pid) {
+ args[*arg_count] = NULL;
+
+ do {
+ TEST(execvp("true", args));
+ args[--(*arg_count)] = NULL;
+ } while (*arg_count > 0 && TEST_ERRNO == E2BIG);
+
+ tst_brk(TBROK | TTERRNO, "execvp(\"true\", ...)");
}
+ tst_reap_children();
tst_res(TPASS, "system didn't crash, pass.");
}
static void setup(void)
{
- ps = sysconf(_SC_PAGESIZE);
- length = 32 * ps;
- arg = SAFE_MALLOC(length);
+ struct rlimit rl = {
+ .rlim_cur = RLIM_INFINITY,
+ .rlim_max = RLIM_INFINITY,
+ };
+ int i;
+ long arg_len;
+
+ shm_id = SAFE_SHMGET(IPC_PRIVATE, sizeof(long),
+ IPC_CREAT | IPC_EXCL);
+ arg_count = SAFE_SHMAT(shm_id, NULL, 0);
+
+ arg_len = 32 * sysconf(_SC_PAGESIZE);
+ arg = SAFE_MALLOC(arg_len);
+ memset(arg, 'c', arg_len - 1);
+ arg[arg_len - 1] = '\0';
+
+ args[0] = "true";
+ *arg_count = ARGS_SZ - 1;
+ for (i = 1; i < *arg_count; i++)
+ args[i] = arg;
+
+ SAFE_SETRLIMIT(RLIMIT_STACK, &rl);
}
static void cleanup(void)
{
- free(arg);
+ if (arg)
+ free(arg);
+ if (arg_count)
+ SAFE_SHMDT(arg_count);
+ if (shm_id)
+ SAFE_SHMCTL(shm_id, IPC_RMID, NULL);
}
static struct tst_test test = {
--
2.14.1
More information about the ltp
mailing list