diff options
author | Ting-Yu Wang <anivia@google.com> | 2021-01-15 12:48:58 -0800 |
---|---|---|
committer | gVisor bot <gvisor-bot@google.com> | 2021-01-15 12:51:08 -0800 |
commit | f1420cf48418c01694eaf3110ac411915b217d36 (patch) | |
tree | 0c1bfcef59170f85100c4f4c4a0e2a602d699064 /test/syscalls | |
parent | f7f66c8c6cb5284afe11f4571568866e3c605466 (diff) |
Add sanity check on return values from Write
io.Writer.Write requires err to be non-nil if n < len(v).
We could allow this but it will be irreversible if users depend on this
behavior.
Ported the test that discovered this.
PiperOrigin-RevId: 352065946
Diffstat (limited to 'test/syscalls')
-rw-r--r-- | test/syscalls/linux/BUILD | 2 | ||||
-rw-r--r-- | test/syscalls/linux/socket_generic_stress.cc | 71 |
2 files changed, 73 insertions, 0 deletions
diff --git a/test/syscalls/linux/BUILD b/test/syscalls/linux/BUILD index 017f997de..d184712e3 100644 --- a/test/syscalls/linux/BUILD +++ b/test/syscalls/linux/BUILD @@ -2304,9 +2304,11 @@ cc_binary( deps = [ ":ip_socket_test_util", ":socket_test_util", + "@com_google_absl//absl/strings", gtest, "//test/util:test_main", "//test/util:test_util", + "//test/util:thread_util", ], ) diff --git a/test/syscalls/linux/socket_generic_stress.cc b/test/syscalls/linux/socket_generic_stress.cc index 6cd67123d..679586530 100644 --- a/test/syscalls/linux/socket_generic_stress.cc +++ b/test/syscalls/linux/socket_generic_stress.cc @@ -18,10 +18,15 @@ #include <sys/socket.h> #include <sys/un.h> +#include <array> +#include <string> + #include "gtest/gtest.h" +#include "absl/strings/string_view.h" #include "test/syscalls/linux/ip_socket_test_util.h" #include "test/syscalls/linux/socket_test_util.h" #include "test/util/test_util.h" +#include "test/util/thread_util.h" namespace gvisor { namespace testing { @@ -138,5 +143,71 @@ INSTANTIATE_TEST_SUITE_P( SetSockOpt(SOL_SOCKET, SO_REUSEADDR, &kSockOptOn)( DualStackTCPAcceptBindPersistentListenerSocketPair(0)))); +using DataTransferStressTest = SocketPairTest; + +TEST_P(DataTransferStressTest, BigDataTransfer) { + // TODO(b/165912341): These are too slow on KVM platform with nested virt. + SKIP_IF(GvisorPlatform() == Platform::kKVM); + + auto sockets = ASSERT_NO_ERRNO_AND_VALUE(NewSocketPair()); + int client_fd = sockets->first_fd(); + int server_fd = sockets->second_fd(); + + ScopedThread echo([server_fd]() { + std::array<uint8_t, 1024> buf; + for (;;) { + ssize_t r = read(server_fd, buf.data(), buf.size()); + ASSERT_THAT(r, SyscallSucceeds()); + if (r == 0) { + break; + } + for (size_t i = 0; i < r;) { + ssize_t w = write(server_fd, buf.data() + i, r - i); + ASSERT_GE(w, 0); + i += w; + } + } + ASSERT_THAT(shutdown(server_fd, SHUT_WR), SyscallSucceeds()); + }); + + const std::string chunk = "Though this upload be but little, it is fierce."; + std::string big_string; + while (big_string.size() < 31 << 20) { + big_string += chunk; + } + absl::string_view data = big_string; + + ScopedThread writer([client_fd, data]() { + absl::string_view view = data; + while (!view.empty()) { + ssize_t n = write(client_fd, view.data(), view.size()); + ASSERT_GE(n, 0); + view = view.substr(n); + } + ASSERT_THAT(shutdown(client_fd, SHUT_WR), SyscallSucceeds()); + }); + + std::string buf; + buf.resize(1 << 20); + while (!data.empty()) { + ssize_t n = read(client_fd, buf.data(), buf.size()); + ASSERT_GE(n, 0); + for (size_t i = 0; i < n; i += chunk.size()) { + size_t c = std::min(chunk.size(), n - i); + ASSERT_EQ(buf.substr(i, c), data.substr(i, c)) << "offset " << i; + } + data = data.substr(n); + } + // Should read EOF now. + ASSERT_THAT(read(client_fd, buf.data(), buf.size()), + SyscallSucceedsWithValue(0)); +} + +INSTANTIATE_TEST_SUITE_P( + AllConnectedSockets, DataTransferStressTest, + ::testing::Values(IPv6TCPAcceptBindPersistentListenerSocketPair(0), + IPv4TCPAcceptBindPersistentListenerSocketPair(0), + DualStackTCPAcceptBindPersistentListenerSocketPair(0))); + } // namespace testing } // namespace gvisor |