]> git.ipfire.org Git - thirdparty/linux.git/commitdiff
net: tls, add test to capture error on large splice
authorJohn Fastabend <john.fastabend@gmail.com>
Sat, 13 Jan 2024 00:32:58 +0000 (16:32 -0800)
committerDavid S. Miller <davem@davemloft.net>
Sun, 14 Jan 2024 12:17:14 +0000 (12:17 +0000)
syzbot found an error with how splice() is handled with a msg greater
than 32. This was fixed in previous patch, but lets add a test for
it to ensure it continues to work.

Signed-off-by: John Fastabend <john.fastabend@gmail.com>
Reviewed-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
tools/testing/selftests/net/tls.c

index 464853a7f98290ec3a7c6bf69786cf8c12e1f789..7799e042a9719cda33ea7d004d2ae4a2ec608a4f 100644 (file)
@@ -707,6 +707,20 @@ TEST_F(tls, splice_from_pipe)
        EXPECT_EQ(memcmp(mem_send, mem_recv, send_len), 0);
 }
 
+TEST_F(tls, splice_more)
+{
+       unsigned int f = SPLICE_F_NONBLOCK | SPLICE_F_MORE | SPLICE_F_GIFT;
+       int send_len = TLS_PAYLOAD_MAX_LEN;
+       char mem_send[TLS_PAYLOAD_MAX_LEN];
+       int i, send_pipe = 1;
+       int p[2];
+
+       ASSERT_GE(pipe(p), 0);
+       EXPECT_GE(write(p[1], mem_send, send_len), 0);
+       for (i = 0; i < 32; i++)
+               EXPECT_EQ(splice(p[0], NULL, self->fd, NULL, send_pipe, f), 1);
+}
+
 TEST_F(tls, splice_from_pipe2)
 {
        int send_len = 16000;