svn commit: r306361 - user/pho/stress2/misc
Peter Holm
pho at FreeBSD.org
Tue Sep 27 07:29:16 UTC 2016
Author: pho
Date: Tue Sep 27 07:29:15 2016
New Revision: 306361
URL: https://svnweb.freebsd.org/changeset/base/306361
Log:
Added test scenario which triggers M_CRED leaks.
Sponsored by: Dell EMC Isilon
Added:
user/pho/stress2/misc/credleak.sh (contents, props changed)
Added: user/pho/stress2/misc/credleak.sh
==============================================================================
--- /dev/null 00:00:00 1970 (empty, because file is newly added)
+++ user/pho/stress2/misc/credleak.sh Tue Sep 27 07:29:15 2016 (r306361)
@@ -0,0 +1,162 @@
+#!/bin/sh
+
+#
+# Copyright (c) 2016 Dell EMC
+# All rights reserved.
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions
+# are met:
+# 1. Redistributions of source code must retain the above copyright
+# notice, this list of conditions and the following disclaimer.
+# 2. Redistributions in binary form must reproduce the above copyright
+# notice, this list of conditions and the following disclaimer in the
+# documentation and/or other materials provided with the distribution.
+#
+# THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
+# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+# ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
+# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+# OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+# OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+# SUCH DAMAGE.
+#
+# $FreeBSD$
+#
+
+# Demonstrate that vfs_export() leaks M_CRED when mountd(8) is started:
+# "M_CRED leaked 160".
+
+[ `id -u ` -ne 0 ] && echo "Must be root!" && exit 1
+
+. ../default.cfg
+
+pgrep -q mountd || echo "Note: mountd(8) must run for this test to fail"
+here=`pwd`
+cd /tmp
+sed '1,/^EOF/d' < $here/$0 > credleak.c
+mycc -o credleak -Wall -Wextra -O2 -g credleak.c || exit 1
+rm -f credleak.c
+
+mount | grep -q "on $mntpoint " && umount -f $mntpoint
+mount -t tmpfs tmpfs $mntpoint
+chmod 777 $mntpoint
+
+old=`vmstat -m | grep -w cred | awk '{print $2}'`
+su $testuser -c "/tmp/credleak $mntpoint" &
+
+while kill -0 $! 2>/dev/null; do
+ umount -f $mntpoint &&
+ mount -t tmpfs tmpfs $mntpoint
+ chmod 777 $mntpoint
+ sleep .1
+done
+pkill -9 swap
+wait
+
+while pkill -9 swap; do
+ :
+done > /dev/null 2>&1
+while mount | grep $mntpoint | grep -q tmpfs; do
+ umount $mntpoint || sleep 1
+done
+[ -n "`ls $mntpoint`" ] && find $mntpoint/* -delete
+rm -f /tmp/credleak
+
+s=0
+leak=$((`vmstat -m | grep -w cred | awk '{print $2}'` - old))
+[ $leak -gt 10 ] && { echo "M_CRED leaked $leak"; s=1; }
+exit $s
+EOF
+#include <sys/param.h>
+#include <sys/stat.h>
+#include <sys/wait.h>
+
+#include <err.h>
+#include <errno.h>
+#include <fcntl.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <unistd.h>
+
+#define LOOPS 160
+#define PARALLEL 16
+
+int nbc, nbd;
+char *dir;
+
+void
+tmkdir(void)
+{
+ int i, j;
+ char d[MAXPATHLEN + 1], name[MAXPATHLEN + 1];
+
+ setproctitle(__func__);
+
+ i = 0;
+ snprintf(name, sizeof(name), "%s/d1.%05d", dir, getpid());
+ if (mkdir(name, 0755) == -1) {
+ if (errno != ENAMETOOLONG && errno != ENOENT &&
+ errno != EBUSY && errno != EACCES && errno != EPERM)
+ warn("mkdir(%s)", name);
+ _exit(0);
+ }
+ for (;;) {
+ snprintf(d, sizeof(d), "/%d", i++);
+ strncat(name, d, sizeof(name) - 1);
+ if (mkdir(name, 0755) == -1) {
+ if (errno != ENAMETOOLONG && errno != ENOENT &&
+ errno != EBUSY && errno != EACCES && errno != EPERM)
+ warn("mkdir(%s)", name);
+ i--;
+ break;
+ }
+ nbc++;
+ }
+
+ while (i >= 0) {
+ snprintf(name, sizeof(name), "%s/d1.%05d", dir, getpid());
+ for (j = 0; j < i; j++) {
+ snprintf(d, sizeof(d), "/%d", j);
+ strncat(name, d, sizeof(name) - 1);
+ }
+ if (rmdir(name) == -1) {
+ if (errno != ENOTEMPTY && errno != ENOENT && errno !=
+ EBUSY)
+ warn("rmdir(%s)", name);
+ } else
+ nbd++;
+ i--;
+ }
+#if defined(TEST)
+ if (nbc == 0)
+ fprintf(stderr, "FAIL nbc = %d, nbd = %d\n", nbc, nbd);
+#endif
+ _exit(0);
+}
+
+int
+main(int argc, char **argv)
+{
+ int i, j;
+
+ if (argc != 2)
+ errx(1, "Usage: %s <fill path to dir>", argv[0]);
+ dir = argv[1];
+
+ for (j = 0; j < LOOPS; j++) {
+ for (i = 0; i < PARALLEL; i++) {
+ if (fork() == 0)
+ tmkdir();
+ }
+ for (i = 0; i < PARALLEL; i++)
+ wait(NULL);
+ }
+
+ return(0);
+}
More information about the svn-src-user
mailing list