Date: Tue, 27 Sep 2016 07:29:15 +0000 (UTC) From: Peter Holm <pho@FreeBSD.org> To: src-committers@freebsd.org, svn-src-user@freebsd.org Subject: svn commit: r306361 - user/pho/stress2/misc Message-ID: <201609270729.u8R7TFQk081887@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: pho Date: Tue Sep 27 07:29:15 2016 New Revision: 306361 URL: https://svnweb.freebsd.org/changeset/base/306361 Log: Added test scenario which triggers M_CRED leaks. Sponsored by: Dell EMC Isilon Added: user/pho/stress2/misc/credleak.sh (contents, props changed) Added: user/pho/stress2/misc/credleak.sh ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ user/pho/stress2/misc/credleak.sh Tue Sep 27 07:29:15 2016 (r306361) @@ -0,0 +1,162 @@ +#!/bin/sh + +# +# Copyright (c) 2016 Dell EMC +# All rights reserved. +# +# Redistribution and use in source and binary forms, with or without +# modification, are permitted provided that the following conditions +# are met: +# 1. Redistributions of source code must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# 2. Redistributions in binary form must reproduce the above copyright +# notice, this list of conditions and the following disclaimer in the +# documentation and/or other materials provided with the distribution. +# +# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND +# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE +# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE +# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS +# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) +# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT +# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY +# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF +# SUCH DAMAGE. +# +# $FreeBSD$ +# + +# Demonstrate that vfs_export() leaks M_CRED when mountd(8) is started: +# "M_CRED leaked 160". + +[ `id -u ` -ne 0 ] && echo "Must be root!" && exit 1 + +. ../default.cfg + +pgrep -q mountd || echo "Note: mountd(8) must run for this test to fail" +here=`pwd` +cd /tmp +sed '1,/^EOF/d' < $here/$0 > credleak.c +mycc -o credleak -Wall -Wextra -O2 -g credleak.c || exit 1 +rm -f credleak.c + +mount | grep -q "on $mntpoint " && umount -f $mntpoint +mount -t tmpfs tmpfs $mntpoint +chmod 777 $mntpoint + +old=`vmstat -m | grep -w cred | awk '{print $2}'` +su $testuser -c "/tmp/credleak $mntpoint" & + +while kill -0 $! 2>/dev/null; do + umount -f $mntpoint && + mount -t tmpfs tmpfs $mntpoint + chmod 777 $mntpoint + sleep .1 +done +pkill -9 swap +wait + +while pkill -9 swap; do + : +done > /dev/null 2>&1 +while mount | grep $mntpoint | grep -q tmpfs; do + umount $mntpoint || sleep 1 +done +[ -n "`ls $mntpoint`" ] && find $mntpoint/* -delete +rm -f /tmp/credleak + +s=0 +leak=$((`vmstat -m | grep -w cred | awk '{print $2}'` - old)) +[ $leak -gt 10 ] && { echo "M_CRED leaked $leak"; s=1; } +exit $s +EOF +#include <sys/param.h> +#include <sys/stat.h> +#include <sys/wait.h> + +#include <err.h> +#include <errno.h> +#include <fcntl.h> +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <unistd.h> + +#define LOOPS 160 +#define PARALLEL 16 + +int nbc, nbd; +char *dir; + +void +tmkdir(void) +{ + int i, j; + char d[MAXPATHLEN + 1], name[MAXPATHLEN + 1]; + + setproctitle(__func__); + + i = 0; + snprintf(name, sizeof(name), "%s/d1.%05d", dir, getpid()); + if (mkdir(name, 0755) == -1) { + if (errno != ENAMETOOLONG && errno != ENOENT && + errno != EBUSY && errno != EACCES && errno != EPERM) + warn("mkdir(%s)", name); + _exit(0); + } + for (;;) { + snprintf(d, sizeof(d), "/%d", i++); + strncat(name, d, sizeof(name) - 1); + if (mkdir(name, 0755) == -1) { + if (errno != ENAMETOOLONG && errno != ENOENT && + errno != EBUSY && errno != EACCES && errno != EPERM) + warn("mkdir(%s)", name); + i--; + break; + } + nbc++; + } + + while (i >= 0) { + snprintf(name, sizeof(name), "%s/d1.%05d", dir, getpid()); + for (j = 0; j < i; j++) { + snprintf(d, sizeof(d), "/%d", j); + strncat(name, d, sizeof(name) - 1); + } + if (rmdir(name) == -1) { + if (errno != ENOTEMPTY && errno != ENOENT && errno != + EBUSY) + warn("rmdir(%s)", name); + } else + nbd++; + i--; + } +#if defined(TEST) + if (nbc == 0) + fprintf(stderr, "FAIL nbc = %d, nbd = %d\n", nbc, nbd); +#endif + _exit(0); +} + +int +main(int argc, char **argv) +{ + int i, j; + + if (argc != 2) + errx(1, "Usage: %s <fill path to dir>", argv[0]); + dir = argv[1]; + + for (j = 0; j < LOOPS; j++) { + for (i = 0; i < PARALLEL; i++) { + if (fork() == 0) + tmkdir(); + } + for (i = 0; i < PARALLEL; i++) + wait(NULL); + } + + return(0); +}
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201609270729.u8R7TFQk081887>