From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-wr1-f50.google.com (mail-wr1-f50.google.com [209.85.221.50]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D57743537F2 for ; Sat, 18 Apr 2026 11:40:04 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.50 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1776512406; cv=none; b=IB+cEHEeffFCz6Co982y8felZgDey3mrgf8z8WYs/M5hD3k/fFrjDpceeXBrHvJtGJtrk4HhcLfIFKbuXsswH5mKBcCOmrQU+rrGprGkYyoNaxeabElZQ90HgSS0YEMjEhKhaRPh2ZWbupIt+LTPR5YI5pmtXv5g3rLhKNKl0ZU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1776512406; c=relaxed/simple; bh=55fP/35MZZS/hMHZOhzJkSjUW3dUdiVhKN5RAKZ+CdM=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=PSEwd4HPvLYhlAKX8mgwYmp4hkdD/jCMNu+EVmT/bDdpl2xaOEMuPn2nzlHmoShCxXUrevjIeMRXYfvwUGQsuay824OFW5afMQlGH+WTlUiUXrvXIypDSpVHZUOMAne7DlOGK/w+JRieK6wDAQHZAA5eILBYweivUCkzO9o/vNQ= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=SUwan/TK; arc=none smtp.client-ip=209.85.221.50 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="SUwan/TK" Received: by mail-wr1-f50.google.com with SMTP id ffacd0b85a97d-43eb012ac4fso886570f8f.0 for ; Sat, 18 Apr 2026 04:40:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1776512403; x=1777117203; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=F0uV/ApidjU/+Ww0veY0spsvhyr4hvLh1zUt4FfzGYE=; b=SUwan/TKXQcdWkrqrW+68chi/b2RN1XtjRYUENeCtrAA9HeDhnIr925Os++hdE19bw wUxKYgzav9WXNToDPC4754vY+Sm/ClaOhsykSrMTBnPiNSM1gMi+pPT/KSeUcVdyb+fO vDDdGC1y45teZH+spesuA8XW0pho325ckdUQyAp4HLWA3p2imEsQtycgKztebfYtsKN0 Nb/wuytziKyJehkuFWCVxm4GWyzOqbxiS0+lJ9UOs7d1Kbmz/bdtQSiA0IFPEIS372rS E7EvAS7Vmt04TdM5WDb9zGjX4wMxHp7xmCmVkDLd0ziSrVcGpurNne4OalikqVX3f6Ac KqNQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1776512403; x=1777117203; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=F0uV/ApidjU/+Ww0veY0spsvhyr4hvLh1zUt4FfzGYE=; b=PcxfhoQnbRti1wPd5lVTOPWxLvKN18FvzHWStJ4kBFAnbShCBoMilWG00Fv4RSvvSH DuwcHAontr4+s4Gy5A5nUcfXge+meyDZMq9SwhNHiyarJStoWQp/CQ0WFosHF6JXFzUK ZIK6uszKo2QiQX5GYRl1DruBbRW4HeKU7g2RQtrQhT/7xURYU9Dv1zejJirSu8EZiHf0 81d3m40XBDAp9YL0YHrWcjDaVSak/6XhXUguL6Cl++r8JpaFTi1fsPci9hR20LFEYZ9z zPsWXTVjSVWOXz/r9ooynkKazWodZRgVjWHGMbR/YFKiqdjVT8Mt//aauy+4pXuzDtsB jglw== X-Forwarded-Encrypted: i=1; AFNElJ9puN5Hzh/8EC4sN/u5enIgUZAtpBHHRG10RZmGleSz3AgGpeuOAp2BRADwpu+IT8nOrmJRr/ckRJr5Oy8=@vger.kernel.org X-Gm-Message-State: AOJu0YwIuv/8O4Ucj50iYHfTiyIFbq0Xvh442eIvi6R751EnKJkdobW4 q83uHY1Lpp+ykSJFX5+e0bEy//g8amvrqBwhAMHjmWITqF/NxLoeP6wkTtprRw== X-Gm-Gg: AeBDiesvFzWe7Zm7FuTy+zO/Rg3+HowGqqdbLUZbmIuyIgTuVcXtVF7b28AXZTBRiyI iLdiJT2vLO6Z5W6OovUaZCiqubAFwOIxOPA7Tu5zuI52yLEDzB2um119/ACS2yrCiKoZyLsuBxo hpqxetUc1Y+Ut1CQozbMU9fHvausAQQloPkStCXHA92BtFtZGXXXNWTarGHIRiSf4e4G5xsbDzV Ic/LG4LXfRqmgIOJlETp2TOu33w4MjqUISeGnjN2aoKykWT532ifCcanV2biqbAwYeR2SkKK8f/ /+DLwNT1GI17nDAJknG9aS8LO6jm66Z10QxIUk3kJqVKfLlVC01nW06z8Hpnq5F5/FZ5X6nT7jg mNDmzA07nGtdljfKBPTqRgaNZ3zpyxl/sX+c163wM7WEHJIlbSQ6u9LAaQ+A6mnCdr1JxARVlC6 ECIbzl3RhDIZigBzYoTI1eZ6icYf5B4FOG5GN5Vl0= X-Received: by 2002:a05:6000:2013:b0:43d:c95c:4259 with SMTP id ffacd0b85a97d-43fe3e07216mr9801586f8f.30.1776512403027; Sat, 18 Apr 2026 04:40:03 -0700 (PDT) Received: from localhost ([2a01:4b00:d036:ae00:3ab1:89ce:8d93:ae6c]) by smtp.gmail.com with UTF8SMTPSA id ffacd0b85a97d-43fe4cc0d51sm12284449f8f.10.2026.04.18.04.40.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 18 Apr 2026 04:40:02 -0700 (PDT) From: luca.boccassi@gmail.com To: kexec@lists.infradead.org Cc: linux-mm@kvack.org, graf@amazon.com, rppt@kernel.org, pasha.tatashin@soleen.com, pratyush@kernel.org, brauner@kernel.org, linux-kernel@vger.kernel.org, Luca Boccassi Subject: [PATCH v6 4/4] selftests/liveupdate: add test cases for LIVEUPDATE_SESSION_GET_NAME Date: Sat, 18 Apr 2026 12:38:41 +0100 Message-ID: <20260418113956.2146648-4-luca.boccassi@gmail.com> X-Mailer: git-send-email 2.47.3 In-Reply-To: <20260418113956.2146648-1-luca.boccassi@gmail.com> References: <20260418113956.2146648-1-luca.boccassi@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit From: Luca Boccassi Verify that the new LIVEUPDATE_SESSION_GET_NAME ioctl works as expected via new test cases in the existing liveupdate selftest. Signed-off-by: Luca Boccassi --- v5: merge with LUO_SESSION_MAGIC series as they both change the same unit test file, to avoid merge conflicts split into separate patch v6: add more test cases as suggested more verbose commit message .../testing/selftests/liveupdate/liveupdate.c | 138 ++++++++++++++++++ 1 file changed, 138 insertions(+) diff --git a/tools/testing/selftests/liveupdate/liveupdate.c b/tools/testing/selftests/liveupdate/liveupdate.c index d132b4685f76..ffbcbd465c9b 100644 --- a/tools/testing/selftests/liveupdate/liveupdate.c +++ b/tools/testing/selftests/liveupdate/liveupdate.c @@ -105,6 +105,22 @@ static int create_session(int lu_fd, const char *name) return args.fd; } +/* Helper function to get a session name via ioctl. */ +static int get_session_name(int session_fd, char *name, size_t name_len) +{ + struct liveupdate_session_get_name args = {}; + + args.size = sizeof(args); + + if (ioctl(session_fd, LIVEUPDATE_SESSION_GET_NAME, &args)) + return -errno; + + strncpy(name, (char *)args.name, name_len - 1); + name[name_len - 1] = '\0'; + + return 0; +} + /* * Test Case: Create Duplicate Session * @@ -385,4 +401,126 @@ TEST_F(liveupdate_device, session_fstat) ASSERT_EQ(close(session_fd2), 0); } +/* + * Test Case: Get Session Name + * + * Verifies that the full session name can be retrieved from a session file + * descriptor via ioctl. + */ +TEST_F(liveupdate_device, get_session_name) +{ + char name_buf[LIVEUPDATE_SESSION_NAME_LENGTH] = {}; + const char *session_name = "get-name-test-session"; + int session_fd; + + self->fd1 = open(LIVEUPDATE_DEV, O_RDWR); + if (self->fd1 < 0 && errno == ENOENT) + SKIP(return, "%s does not exist", LIVEUPDATE_DEV); + ASSERT_GE(self->fd1, 0); + + session_fd = create_session(self->fd1, session_name); + ASSERT_GE(session_fd, 0); + + ASSERT_EQ(get_session_name(session_fd, name_buf, sizeof(name_buf)), 0); + ASSERT_STREQ(name_buf, session_name); + + ASSERT_EQ(close(session_fd), 0); +} + +/* + * Test Case: Get Session Name at Maximum Length + * + * Verifies that a session name using the full LIVEUPDATE_SESSION_NAME_LENGTH + * (minus the null terminator) can be correctly retrieved. + */ +TEST_F(liveupdate_device, get_session_name_max_length) +{ + char name_buf[LIVEUPDATE_SESSION_NAME_LENGTH] = {}; + char long_name[LIVEUPDATE_SESSION_NAME_LENGTH]; + int session_fd; + + memset(long_name, 'A', sizeof(long_name) - 1); + long_name[sizeof(long_name) - 1] = '\0'; + + self->fd1 = open(LIVEUPDATE_DEV, O_RDWR); + if (self->fd1 < 0 && errno == ENOENT) + SKIP(return, "%s does not exist", LIVEUPDATE_DEV); + ASSERT_GE(self->fd1, 0); + + session_fd = create_session(self->fd1, long_name); + ASSERT_GE(session_fd, 0); + + ASSERT_EQ(get_session_name(session_fd, name_buf, sizeof(name_buf)), 0); + ASSERT_STREQ(name_buf, long_name); + + ASSERT_EQ(close(session_fd), 0); +} + +/* + * Test Case: Create Session with No Null Termination + * + * Verifies that filling the entire 64-byte name field with non-null characters + * (no '\0' terminator) is handled safely by the kernel. The kernel's strscpy + * truncates to 63 characters, which we verify via get_session_name. + */ +TEST_F(liveupdate_device, create_session_no_null_termination) +{ + struct liveupdate_ioctl_create_session args = {}; + char expected_name[LIVEUPDATE_SESSION_NAME_LENGTH]; + char name_buf[LIVEUPDATE_SESSION_NAME_LENGTH] = {}; + int session_fd; + + self->fd1 = open(LIVEUPDATE_DEV, O_RDWR); + if (self->fd1 < 0 && errno == ENOENT) + SKIP(return, "%s does not exist", LIVEUPDATE_DEV); + ASSERT_GE(self->fd1, 0); + + /* Fill entire name field with 'X', no null terminator */ + args.size = sizeof(args); + memset(args.name, 'X', sizeof(args.name)); + + ASSERT_EQ(ioctl(self->fd1, LIVEUPDATE_IOCTL_CREATE_SESSION, &args), 0); + session_fd = args.fd; + ASSERT_GE(session_fd, 0); + + /* Kernel should have truncated to 63 chars + '\0' */ + memset(expected_name, 'X', sizeof(expected_name) - 1); + expected_name[sizeof(expected_name) - 1] = '\0'; + + ASSERT_EQ(get_session_name(session_fd, name_buf, sizeof(name_buf)), 0); + ASSERT_STREQ(name_buf, expected_name); + + ASSERT_EQ(close(session_fd), 0); +} + +/* + * Test Case: Create Session with Empty Name + * + * Verifies that creating a session with an empty string name succeeds, + * and that creating a second session with the same empty name fails + * with EEXIST. + */ +TEST_F(liveupdate_device, create_session_empty_name) +{ + char name_buf[LIVEUPDATE_SESSION_NAME_LENGTH] = {}; + int session_fd1, session_fd2; + + self->fd1 = open(LIVEUPDATE_DEV, O_RDWR); + if (self->fd1 < 0 && errno == ENOENT) + SKIP(return, "%s does not exist", LIVEUPDATE_DEV); + ASSERT_GE(self->fd1, 0); + + session_fd1 = create_session(self->fd1, ""); + ASSERT_GE(session_fd1, 0); + + ASSERT_EQ(get_session_name(session_fd1, name_buf, sizeof(name_buf)), 0); + ASSERT_STREQ(name_buf, ""); + + /* A second empty-name session must fail as duplicate */ + session_fd2 = create_session(self->fd1, ""); + EXPECT_EQ(session_fd2, -EEXIST); + + ASSERT_EQ(close(session_fd1), 0); +} + TEST_HARNESS_MAIN -- 2.47.3