From owner-svn-src-user@freebsd.org Tue Sep 27 07:29:16 2016 Return-Path: Delivered-To: svn-src-user@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id BE934BEB3AD for ; Tue, 27 Sep 2016 07:29:16 +0000 (UTC) (envelope-from pho@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 7BC61124; Tue, 27 Sep 2016 07:29:16 +0000 (UTC) (envelope-from pho@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id u8R7TFwY081888; Tue, 27 Sep 2016 07:29:15 GMT (envelope-from pho@FreeBSD.org) Received: (from pho@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id u8R7TFQk081887; Tue, 27 Sep 2016 07:29:15 GMT (envelope-from pho@FreeBSD.org) Message-Id: <201609270729.u8R7TFQk081887@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: pho set sender to pho@FreeBSD.org using -f From: Peter Holm Date: Tue, 27 Sep 2016 07:29:15 +0000 (UTC) To: src-committers@freebsd.org, svn-src-user@freebsd.org Subject: svn commit: r306361 - user/pho/stress2/misc X-SVN-Group: user MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-src-user@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "SVN commit messages for the experimental " user" src tree" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 27 Sep 2016 07:29:16 -0000 Author: pho Date: Tue Sep 27 07:29:15 2016 New Revision: 306361 URL: https://svnweb.freebsd.org/changeset/base/306361 Log: Added test scenario which triggers M_CRED leaks. Sponsored by: Dell EMC Isilon Added: user/pho/stress2/misc/credleak.sh (contents, props changed) Added: user/pho/stress2/misc/credleak.sh ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ user/pho/stress2/misc/credleak.sh Tue Sep 27 07:29:15 2016 (r306361) @@ -0,0 +1,162 @@ +#!/bin/sh + +# +# Copyright (c) 2016 Dell EMC +# All rights reserved. +# +# Redistribution and use in source and binary forms, with or without +# modification, are permitted provided that the following conditions +# are met: +# 1. Redistributions of source code must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# 2. Redistributions in binary form must reproduce the above copyright +# notice, this list of conditions and the following disclaimer in the +# documentation and/or other materials provided with the distribution. +# +# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND +# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE +# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +# SUCH DAMAGE. +# +# $FreeBSD$ +# + +# Demonstrate that vfs_export() leaks M_CRED when mountd(8) is started: +# "M_CRED leaked 160". + +[ `id -u ` -ne 0 ] && echo "Must be root!" && exit 1 + +. ../default.cfg + +pgrep -q mountd || echo "Note: mountd(8) must run for this test to fail" +here=`pwd` +cd /tmp +sed '1,/^EOF/d' < $here/$0 > credleak.c +mycc -o credleak -Wall -Wextra -O2 -g credleak.c || exit 1 +rm -f credleak.c + +mount | grep -q "on $mntpoint " && umount -f $mntpoint +mount -t tmpfs tmpfs $mntpoint +chmod 777 $mntpoint + +old=`vmstat -m | grep -w cred | awk '{print $2}'` +su $testuser -c "/tmp/credleak $mntpoint" & + +while kill -0 $! 2>/dev/null; do + umount -f $mntpoint && + mount -t tmpfs tmpfs $mntpoint + chmod 777 $mntpoint + sleep .1 +done +pkill -9 swap +wait + +while pkill -9 swap; do + : +done > /dev/null 2>&1 +while mount | grep $mntpoint | grep -q tmpfs; do + umount $mntpoint || sleep 1 +done +[ -n "`ls $mntpoint`" ] && find $mntpoint/* -delete +rm -f /tmp/credleak + +s=0 +leak=$((`vmstat -m | grep -w cred | awk '{print $2}'` - old)) +[ $leak -gt 10 ] && { echo "M_CRED leaked $leak"; s=1; } +exit $s +EOF +#include +#include +#include + +#include +#include +#include +#include +#include +#include +#include + +#define LOOPS 160 +#define PARALLEL 16 + +int nbc, nbd; +char *dir; + +void +tmkdir(void) +{ + int i, j; + char d[MAXPATHLEN + 1], name[MAXPATHLEN + 1]; + + setproctitle(__func__); + + i = 0; + snprintf(name, sizeof(name), "%s/d1.%05d", dir, getpid()); + if (mkdir(name, 0755) == -1) { + if (errno != ENAMETOOLONG && errno != ENOENT && + errno != EBUSY && errno != EACCES && errno != EPERM) + warn("mkdir(%s)", name); + _exit(0); + } + for (;;) { + snprintf(d, sizeof(d), "/%d", i++); + strncat(name, d, sizeof(name) - 1); + if (mkdir(name, 0755) == -1) { + if (errno != ENAMETOOLONG && errno != ENOENT && + errno != EBUSY && errno != EACCES && errno != EPERM) + warn("mkdir(%s)", name); + i--; + break; + } + nbc++; + } + + while (i >= 0) { + snprintf(name, sizeof(name), "%s/d1.%05d", dir, getpid()); + for (j = 0; j < i; j++) { + snprintf(d, sizeof(d), "/%d", j); + strncat(name, d, sizeof(name) - 1); + } + if (rmdir(name) == -1) { + if (errno != ENOTEMPTY && errno != ENOENT && errno != + EBUSY) + warn("rmdir(%s)", name); + } else + nbd++; + i--; + } +#if defined(TEST) + if (nbc == 0) + fprintf(stderr, "FAIL nbc = %d, nbd = %d\n", nbc, nbd); +#endif + _exit(0); +} + +int +main(int argc, char **argv) +{ + int i, j; + + if (argc != 2) + errx(1, "Usage: %s ", argv[0]); + dir = argv[1]; + + for (j = 0; j < LOOPS; j++) { + for (i = 0; i < PARALLEL; i++) { + if (fork() == 0) + tmkdir(); + } + for (i = 0; i < PARALLEL; i++) + wait(NULL); + } + + return(0); +}