From: Jan Stancek <jstancek@redhat.com>
To: ltp@lists.linux.it
Subject: [LTP] [PATCH v2 3/3] pkey: add pkey02 test
Date: Mon, 24 Jun 2019 05:57:14 -0400 (EDT) [thread overview]
Message-ID: <1232452812.29707516.1561370234695.JavaMail.zimbra@redhat.com> (raw)
In-Reply-To: <CAEemH2fn9qhKBbYviKHbkDuV40kE=sK8b36-g=X31n5ihhCwtw@mail.gmail.com>
----- Original Message -----
> On Mon, Jun 24, 2019 at 3:27 PM Li Wang <liwang@redhat.com> wrote:
>
> >
> >
> > On Mon, Jun 24, 2019 at 2:56 PM Jan Stancek <jstancek@redhat.com> wrote:
> >
> >>
> >>
> >> ----- Original Message -----
> >> > Signed-off-by: Li Wang <liwang@redhat.com>
> >> > +
> >> > +static void pkey_tests(int pkey, int prot, int flags, int fd)
> >> > +{
> >> > + char *buffer;
> >> > +
> >> > + if (fd == 0) {
> >> > + fd = SAFE_OPEN(TEST_FILE, O_RDWR | O_CREAT, 0664);
> >> > + }
> >> > +
> >> > + buffer = SAFE_MMAP(NULL, psize, prot, flags, fd, 0);
> >> > +
> >> > + if (pkey_mprotect(buffer, psize, prot, pkey) == -1)
> >> > + tst_brk(TBROK, "pkey_mprotect failed");
> >> > +
> >> > + tst_res(TPASS, "apply pkey to the buffer area success");
> >> > +
> >> > + if (fd > 0) {
> >> > + SAFE_CLOSE(fd);
> >> > + }
> >> > +
> >> > + SAFE_MUNMAP(buffer, psize);
> >> > +}
> >> > +
> >>
> >> Hi,
> >>
> >> pkey02 doesn't try to read/write as pkey01, but otherwise two tests look
> >> very similar.
> >>
> >> Could we try to read/write here as well for all combinations of map flags?
> >> Then pkey01 could be dropped since pkey02 would cover more than just 1
> >> combination.
> >> Or is there a different reason behind separate tests, that I'm missing?
> >>
> >>
> > The pkey02 is a follow new test idea(test more types of memory) after I
> > completed pkey01.
> >
> > Yes, the diffenrence bettwen them is pkey02 cover more map flags but not
> > do R/W verification. That's because I'm hoping to add {0, 0x0} to the test
> > which does not trigger SIGSEGV in pkey02, it seems a bit tricky to
> > distinguish the SIGSEGV is come from 0x0(if bug there)
> > or PKEY_DISABLE_ACCESS progress.
> >
> >
> Well, a smple way I can find is to remove the {0, 0x0} from struct tcase,
> and test the access right 0x0 in lastly.
You could also keep {0, 0x0}, but extend struct with "int fault_expected",
and set it to 0/1 depending on flags.
>
> So, what do you think about the new key02(merge key01 and old key02) in
> this attatchment?
That works too. Some comments below:
if (fd > 0) {
SAFE_CLOSE(fd);
}
0 is valid fd, brackets are not needed.
All tst_* functions that report failures should also have TERRNO.
tst_res(TFAIL, "Child unexpectedly ended") could print also exit code.
Regards,
Jan
prev parent reply other threads:[~2019-06-24 9:57 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-06-21 10:26 [LTP] [PATCH v2 3/3] pkey: add pkey02 test Li Wang
2019-06-24 6:56 ` Jan Stancek
2019-06-24 7:27 ` Li Wang
2019-06-24 8:28 ` Li Wang
2019-06-24 9:57 ` Jan Stancek [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1232452812.29707516.1561370234695.JavaMail.zimbra@redhat.com \
--to=jstancek@redhat.com \
--cc=ltp@lists.linux.it \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox