[LTP] [PATCH v2 1/1] brk02: Add test for removing more than one VMA
Liam Howlett
liam.howlett@oracle.com
Fri Feb 26 19:55:24 CET 2021
Hello Petr,
* Petr Vorel <pvorel@suse.cz> [210225 14:02]:
> Hi Liam,
>
> > When brk expands, it attempts to expand a VMA. This expansion will
> > succeed depending on the anonymous VMA chain and if the vma flags are
> > compatible. This test expands brk() then calls mprotect to ensure the
> > next brk call will create a new VMA, then it calls brk a final time to
> > restore the first brk address. The test is the final brk call which
> > will remove more than an entire VMA from the vm area.
>
> > Signed-off-by: Liam R. Howlett <Liam.Howlett@Oracle.com>
> > ---
> > testcases/kernel/syscalls/brk/brk02.c | 54 +++++++++++++++++++++++++++
> > 1 file changed, 54 insertions(+)
> > create mode 100644 testcases/kernel/syscalls/brk/brk02.c
>
> > diff --git a/testcases/kernel/syscalls/brk/brk02.c b/testcases/kernel/syscalls/brk/brk02.c
> > new file mode 100644
> > index 000000000..ef84fb440
> > --- /dev/null
> > +++ b/testcases/kernel/syscalls/brk/brk02.c
> > @@ -0,0 +1,54 @@
> > +// SPDX-License-Identifier: GPL-2.0-or-later
> > +/*
> > + * Copyright (c) 2021 Liam R. Howlett <liam.howlett@oracle.com>
> > + *
> > + * Expand the brk by at least 2 pages to ensure there is a newly created VMA
> > + * and not expanding the original due to multiple anon pages. mprotect that
> > + * new VMA then brk back to the original address therefore causing a munmap of
> > + * at least one full VMA.
> I'll put this as a docparse formatting (will show in our documentation):
Thanks
>
> /*\
> * [DESCRIPTION]
> * Expand brk() by at least 2 pages to ensure there is a newly created VMA
> * and not expanding the original due to multiple anon pages. mprotect() that
> * new VMA then brk() back to the original address therefore causing a munmap of
> * at least one full VMA.
> \*/
>
> > + */
> > +
> > +#include <unistd.h>
> > +#include <sys/mman.h>
> > +#include "tst_test.h"
> > +
> > +void brk_down_vmas(void)
> > +{
> > + void *brk_addr = sbrk(0);
>
> Shouldn't there be a check?
>
> if (brk_addr == (void *) -1)
> tst_brk(TBROK, "sbrk() failed");
Yes, you are correct. And -1 is the correct thing to check.
>
> > + unsigned long page_size = getpagesize();
> > + void *addr = brk_addr + page_size;
> > +
> > + if (brk(addr)) {
> > + tst_res(TFAIL, "Cannot expand brk by page size.");
> nit: remove dot at the end.
Sounds good
> > + return;
> > + }
> > +
> > + addr += page_size;
> > + if (brk(addr)) {
> > + tst_res(TFAIL, "Cannot expand brk by 2x page size.");
> > + return;
> > + }
> > +
> > + if (mprotect(addr - page_size, page_size,
> > + PROT_READ|PROT_WRITE|PROT_EXEC)) {
> > + tst_res(TFAIL, "Cannot mprotect new VMA.");
> > + return;
> > + }
> > +
> > + addr += page_size;
> > + if (brk(addr)) {
> > + tst_res(TFAIL, "Cannot expand brk after mprotect.");
> > + return;
> > + }
> > +
> > + if (brk(brk_addr)) {
> > + tst_res(TFAIL, "Cannot restore brk to start address.");
> > + return;
> > + }
> > +
> > + tst_res(TPASS, "munmap at least two VMAs of brk() passed.");
> > +}
> > +
> > +static struct tst_test test = {
> > + .test_all = brk_down_vmas,
> > +};
>
> No need to repost if you agree with these changes below.
>
> Kind regards,
> Petr
The changes below look good.
Thanks,
Liam
>
> diff --git testcases/kernel/syscalls/brk/brk02.c testcases/kernel/syscalls/brk/brk02.c
> index ef84fb440..2e604eb5d 100644
> --- testcases/kernel/syscalls/brk/brk02.c
> +++ testcases/kernel/syscalls/brk/brk02.c
> @@ -1,13 +1,16 @@
> // SPDX-License-Identifier: GPL-2.0-or-later
> /*
> * Copyright (c) 2021 Liam R. Howlett <liam.howlett@oracle.com>
> - *
> - * Expand the brk by at least 2 pages to ensure there is a newly created VMA
> - * and not expanding the original due to multiple anon pages. mprotect that
> - * new VMA then brk back to the original address therefore causing a munmap of
> - * at least one full VMA.
> */
>
> +/*\
> + * [DESCRIPTION]
> + * Expand brk() by at least 2 pages to ensure there is a newly created VMA
> + * and not expanding the original due to multiple anon pages. mprotect() that
> + * new VMA then brk() back to the original address therefore causing a munmap of
> + * at least one full VMA.
> +\*/
> +
> #include <unistd.h>
> #include <sys/mman.h>
> #include "tst_test.h"
> @@ -15,38 +18,42 @@
> void brk_down_vmas(void)
> {
> void *brk_addr = sbrk(0);
> +
> + if (brk_addr == (void *) -1)
> + tst_brk(TBROK, "sbrk() failed");
> +
> unsigned long page_size = getpagesize();
> void *addr = brk_addr + page_size;
>
> if (brk(addr)) {
> - tst_res(TFAIL, "Cannot expand brk by page size.");
> + tst_res(TFAIL, "Cannot expand brk() by page size");
> return;
> }
>
> addr += page_size;
> if (brk(addr)) {
> - tst_res(TFAIL, "Cannot expand brk by 2x page size.");
> + tst_res(TFAIL, "Cannot expand brk() by 2x page size");
> return;
> }
>
> if (mprotect(addr - page_size, page_size,
> PROT_READ|PROT_WRITE|PROT_EXEC)) {
> - tst_res(TFAIL, "Cannot mprotect new VMA.");
> + tst_res(TFAIL, "Cannot mprotect new VMA");
> return;
> }
>
> addr += page_size;
> if (brk(addr)) {
> - tst_res(TFAIL, "Cannot expand brk after mprotect.");
> + tst_res(TFAIL, "Cannot expand brk() after mprotect");
> return;
> }
>
> if (brk(brk_addr)) {
> - tst_res(TFAIL, "Cannot restore brk to start address.");
> + tst_res(TFAIL, "Cannot restore brk() to start address");
> return;
> }
>
> - tst_res(TPASS, "munmap at least two VMAs of brk() passed.");
> + tst_res(TPASS, "munmap at least two VMAs of brk() passed");
> }
>
> static struct tst_test test = {
More information about the ltp
mailing list