Skip to content

Commit

Permalink
syscalls/mmap02: Rewrite the test using new LTP API
Browse files Browse the repository at this point in the history
Signed-off-by: Avinesh Kumar <[email protected]>
  • Loading branch information
Avinesh committed Sep 1, 2023
1 parent 401f58d commit 5eda61e
Showing 1 changed file with 41 additions and 163 deletions.
204 changes: 41 additions & 163 deletions testcases/kernel/syscalls/mmap/mmap02.c
Original file line number Diff line number Diff line change
@@ -1,186 +1,64 @@
// SPDX-License-Identifier: GPL-2.0-or-later
/*
* Copyright (c) International Business Machines Corp., 2001
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
* the GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
* 07/2001 Ported by Wayne Boyer
* Copyright (c) 2023 SUSE LLC Avinesh Kumar <[email protected]>
*/

/*
* Test Description:
* Call mmap() with prot parameter set to PROT_READ and with the file
* descriptor being open for read, to map a file creating mapped memory
* with read access. The minimum file permissions should be 0444.
*
* The call should succeed to create the mapped region with required
* attributes.
/*\
* [Description]
*
* Expected Result:
* mmap() should succeed returning the address of the mapped region,
* the mapped region should contain the contents of the mapped file.
*
* HISTORY
* 07/2001 Ported by Wayne Boyer
* Verify that, mmap() call with PROT_READ and a file descriptor which is
* open for read only, succeeds to map a file creating mapped memory with
* read access.
*/
#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#include <errno.h>
#include <unistd.h>
#include <fcntl.h>
#include <string.h>
#include <signal.h>
#include <sys/stat.h>
#include <sys/mman.h>

#include "test.h"

#define TEMPFILE "mmapfile"

char *TCID = "mmap02";
int TST_TOTAL = 1;
#include <stdlib.h>
#include "tst_test.h"

#define TEMPFILE "mmapfile"
static ssize_t page_sz;
static int fd;
static char *addr;
static char *dummy;
static size_t page_sz;
static int fildes;

static void setup(void);
static void cleanup(void);

int main(int ac, char **av)
{
int lc;

tst_parse_opts(ac, av, NULL, NULL);

setup();

for (lc = 0; TEST_LOOPING(lc); lc++) {

tst_count = 0;

/*
* Call mmap to map the temporary file 'TEMPFILE'
* with read access.
*/
errno = 0;
addr = mmap(0, page_sz, PROT_READ,
MAP_FILE | MAP_SHARED, fildes, 0);

/* Check for the return value of mmap() */
if (addr == MAP_FAILED) {
tst_resm(TFAIL | TERRNO, "mmap of %s failed", TEMPFILE);
continue;
}

/*
* Read the file contents into the dummy
* string.
*/
if (read(fildes, dummy, page_sz) < 0) {
tst_brkm(TFAIL | TERRNO, cleanup,
"reading %s failed", TEMPFILE);
}

/*
* Check whether mapped memory region has
* the file contents.
*/
if (memcmp(dummy, addr, page_sz)) {
tst_resm(TFAIL, "mapped memory area contains "
"invalid data");
} else {
tst_resm(TPASS,
"Functionality of mmap() successful");
}

/* Clean up things in case we are looping */
/* Unmap the mapped memory */
if (munmap(addr, page_sz) != 0) {
tst_brkm(TFAIL | TERRNO, cleanup, "munmapping failed");
}
}

cleanup();
tst_exit();
}
static char *buf;

static void setup(void)
{
char *tst_buff;

tst_sig(FORK, DEF_HANDLER, cleanup);

TEST_PAUSE;

page_sz = getpagesize();
buf = SAFE_MALLOC(page_sz);
memset(buf, 'A', page_sz);

/* Allocate space for the test buffer */
if ((tst_buff = calloc(page_sz, sizeof(char))) == NULL) {
tst_brkm(TFAIL, NULL, "calloc failed (tst_buff)");
}

/* Fill the test buffer with the known data */
memset(tst_buff, 'A', page_sz);
fd = SAFE_OPEN(TEMPFILE, O_RDWR | O_CREAT, 0666);
SAFE_WRITE(SAFE_WRITE_ALL, fd, buf, page_sz);

tst_tmpdir();

/* Creat a temporary file used for mapping */
if ((fildes = open(TEMPFILE, O_RDWR | O_CREAT, 0666)) < 0) {
free(tst_buff);
tst_brkm(TFAIL | TERRNO, cleanup, "opening %s failed",
TEMPFILE);
}

/* Write test buffer contents into temporary file */
if (write(fildes, tst_buff, page_sz) < (int)page_sz) {
free(tst_buff);
tst_brkm(TFAIL | TERRNO, cleanup,
"writing to %s failed", TEMPFILE);
}

/* Free the memory allocated for test buffer */
free(tst_buff);

/* Change Mode permissions on Temporary file */
if (fchmod(fildes, 0444) < 0) {
tst_brkm(TFAIL | TERRNO, cleanup, "fchmod(%s, 0444) failed",
TEMPFILE);
}

/* Close the temporary file */
if (close(fildes) < 0) {
tst_brkm(TFAIL | TERRNO, cleanup, "closing %s failed",
TEMPFILE);
}
SAFE_FCHMOD(fd, 0444);
SAFE_CLOSE(fd);
fd = SAFE_OPEN(TEMPFILE, O_RDONLY);
}

/* Open the temporary file again, - Readonly mode */
if ((fildes = open(TEMPFILE, O_RDONLY)) < 0) {
tst_brkm(TFAIL, cleanup, "reopening %s readonly failed",
TEMPFILE);
}
static void run(void)
{
addr = SAFE_MMAP(NULL, page_sz, PROT_READ, MAP_FILE | MAP_SHARED, fd, 0);

/* Allocate and initialize dummy string of system page size bytes */
if ((dummy = calloc(page_sz, sizeof(char))) == NULL) {
tst_brkm(TFAIL, cleanup, "calloc failed (dummy)");
}
if (memcmp(buf, addr, page_sz) == 0)
tst_res(TPASS, "mmap() functionality successful");
else
tst_res(TFAIL, "mapped memory area contains invalid data");

SAFE_MUNMAP(addr, page_sz);
}

static void cleanup(void)
{
close(fildes);
free(dummy);
tst_rmdir();
if (fd > 0)
SAFE_CLOSE(fd);

free(buf);
}

static struct tst_test test = {
.setup = setup,
.cleanup = cleanup,
.test_all = run,
.needs_tmpdir = 1
};

0 comments on commit 5eda61e

Please sign in to comment.