From patchwork Tue Nov 1 14:25:23 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Adhemerval Zanella X-Patchwork-Id: 80364 Delivered-To: patch@linaro.org Received: by 10.80.142.83 with SMTP id 19csp678383edx; Tue, 1 Nov 2016 07:27:53 -0700 (PDT) X-Received: by 10.107.157.201 with SMTP id g192mr9816797ioe.70.1478010472928; Tue, 01 Nov 2016 07:27:52 -0700 (PDT) Return-Path: Received: from sourceware.org (server1.sourceware.org. [209.132.180.131]) by mx.google.com with ESMTPS id q4si18832174pao.66.2016.11.01.07.27.52 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 01 Nov 2016 07:27:52 -0700 (PDT) Received-SPF: pass (google.com: domain of libc-alpha-return-74267-patch=linaro.org@sourceware.org designates 209.132.180.131 as permitted sender) client-ip=209.132.180.131; Authentication-Results: mx.google.com; dkim=pass header.i=@sourceware.org; spf=pass (google.com: domain of libc-alpha-return-74267-patch=linaro.org@sourceware.org designates 209.132.180.131 as permitted sender) smtp.mailfrom=libc-alpha-return-74267-patch=linaro.org@sourceware.org; dmarc=fail (p=NONE dis=NONE) header.from=linaro.org DomainKey-Signature: a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:from:to:subject:date:message-id:in-reply-to :references; q=dns; s=default; b=BWvOYw+TmUa6/gD4K/ZXCqbuCka0sPt 0ej86ozzVW0aUxh1HXu2XS1q7p39MeNP2TW1qO92tBImiidKat62mobACS/bPnMr Q4OTUAxZa4SI/4TOI4ZBInI+eoyocyb4Xsm29ZBAtDaJ0ftdjoRDyDmRCEc8J2uZ 8iSmDRLCyBqY= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:from:to:subject:date:message-id:in-reply-to :references; s=default; bh=8WZYiFC1No+G3xAVc8WgsLG80S0=; b=q3KIL xXVrNqG0pCzdHCmRk9TFb25UcIC6ghi5eyuSYeJizHdNSodY7Y/sQ7BpMJy+HpSv HkHyReVoeEkvWe+gX99Y4EV2VqNKWgyVFBZiaRRRUhhUfIcB7nwRvRQjHqksor/4 bxBBF+DgP6ifnI29nSsvHeNEVK1Y02uiTg4hjU= Received: (qmail 37990 invoked by alias); 1 Nov 2016 14:25:55 -0000 Mailing-List: contact libc-alpha-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: libc-alpha-owner@sourceware.org Delivered-To: mailing list libc-alpha@sourceware.org Received: (qmail 37912 invoked by uid 89); 1 Nov 2016 14:25:54 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-1.4 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_NONE, RCVD_IN_SORBS_SPAM, SPF_PASS autolearn=no version=3.3.2 spammy=1130 X-HELO: mail-ua0-f174.google.com X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references; bh=MAQTcZbTxUfI6mmEErsk0m+ZDXl8QRCKTG9VVhCfpfc=; b=d+goaESLIV1CWwDF0YqYxyNkiejrzVcFcNMXVuOvIMYbyq46+WCayoj3iHkzYTv+/y 5pebEoVqyIDiCzQn6R+hPqgtVk5wGEkLqU1W89etIMbSFFYMATlIBt0PC40H9nt/raYM sF0LrTVf71jYDPv3g0N4oMd1QMvXA914S5hV2AoE47tozBhhpTmo0KeiaWV00uAsCmaE C5b3neCnD8Hm8UealarB+f/+DBY/FqBg4DmZe2LZ52hEvdSabXD52kUIZqEUuUyX0sKL c9rD2sdvYbDAiKAYXXRsUysLRh7Da+C7199B52h4ahnQfBa39GY1FriVr6MUJHR09huf tBEw== X-Gm-Message-State: ABUngvdO+53U9Bee62qHyl7ExVTtGzij42A4ApwbNGluzpINmCW7pMcPL9ajwPIo6XEJ4HiG X-Received: by 10.176.69.211 with SMTP id u77mr15388008uau.0.1478010348312; Tue, 01 Nov 2016 07:25:48 -0700 (PDT) From: Adhemerval Zanella To: libc-alpha@sourceware.org Subject: [PATCH 15/15] Add SYSV shared memory test Date: Tue, 1 Nov 2016 12:25:23 -0200 Message-Id: <1478010323-13076-16-git-send-email-adhemerval.zanella@linaro.org> In-Reply-To: <1478010323-13076-1-git-send-email-adhemerval.zanella@linaro.org> References: <1478010323-13076-1-git-send-email-adhemerval.zanella@linaro.org> This patch adds a simple SYSV shared memory test to check for correct argument passing on kernel. The idea is neither to be an extensive testing nor to check for any specific Linux test. * sysvipc/Makefile (tests): Add test-sysvshm. * sysvipc/test-sysvshm.c: New file. --- ChangeLog | 3 ++ sysvipc/Makefile | 2 +- sysvipc/test-sysvshm.c | 130 +++++++++++++++++++++++++++++++++++++++++++++++++ 3 files changed, 134 insertions(+), 1 deletion(-) create mode 100644 sysvipc/test-sysvshm.c -- 2.7.4 diff --git a/sysvipc/Makefile b/sysvipc/Makefile index 32d64dc..daede74 100644 --- a/sysvipc/Makefile +++ b/sysvipc/Makefile @@ -30,7 +30,7 @@ routines := ftok \ semop semget semctl semtimedop \ shmat shmdt shmget shmctl -tests := test-sysvmsg test-sysvsem +tests := test-sysvmsg test-sysvsem test-sysvshm include ../Rules diff --git a/sysvipc/test-sysvshm.c b/sysvipc/test-sysvshm.c new file mode 100644 index 0000000..4f3f22e --- /dev/null +++ b/sysvipc/test-sysvshm.c @@ -0,0 +1,130 @@ +/* Basic tests for SYSV shared memory functions. + Copyright (C) 2016 Free Software Foundation, Inc. + This file is part of the GNU C Library. + + The GNU C Library is free software; you can redistribute it and/or + modify it under the terms of the GNU Lesser General Public + License as published by the Free Software Foundation; either + version 2.1 of the License, or (at your option) any later version. + + The GNU C Library is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public + License along with the GNU C Library; if not, see + . */ + +#include +#include +#include +#include +#include +#include +#include + +static void do_prepare (void); +#define PREPARE(argc, argv) do_prepare () +static int do_test (void); +#define TEST_FUNCTION do_test () + +/* This defines the `main' function and some more. */ +#include + +/* These are for the temporary file we generate. */ +static char *name; +static int shmid; + +static void +remove_shm (void) +{ + /* Enforce message queue removal in case o early test failure. + Ignore error since the msgq maybe already being removed. */ + shmctl (shmid, IPC_RMID, 0); +} + +static void +do_prepare (void) +{ + int fd = create_temp_file ("tst-sysvshm.", &name); + if (fd == -1) + FAIL_EXIT1 ("cannot create temporary file (errno=%d)", errno); +} + +#define CHECK_EQ(v, k) \ + if ((v) != (k)) \ + FAIL_EXIT1("%d != %d", v, k) + +/* It is not an extensive test, but rather a functional one aimed to check + correct parameter passing on kernel. */ + +#define SHM_MODE 0666 + +static int +do_test (void) +{ + atexit (remove_shm); + + key_t key = ftok (name, 'G'); + if (key == -1) + FAIL_EXIT1 ("ftok failed"); + + long int pgsz = sysconf (_SC_PAGESIZE); + if (pgsz == -1) + FAIL_EXIT1 ("sysconf (_SC_PAGESIZE) failed (errno = %d)", errno); + + shmid = shmget(key, pgsz, IPC_CREAT | IPC_EXCL | SHM_MODE); + if (shmid == -1) + { + if (errno == ENOSYS) + FAIL_UNSUPPORTED ("msgget not supported"); + FAIL_EXIT1 ("msgget failed (errno=%d)", errno); + } + + /* Get shared memory kernel information and do some sanitiy checks. */ + struct shmid_ds shminfo; + if (shmctl (shmid, IPC_STAT, &shminfo) == -1) + FAIL_EXIT1 ("shmctl with IPC_STAT failed (errno=%d)", errno); + + if (shminfo.shm_perm.__key != key) + FAIL_EXIT1 ("msgid_ds::msg_perm::key (%d) != %d", + (int) shminfo.shm_perm.__key, (int) key); + if (shminfo.shm_perm.mode != SHM_MODE) + FAIL_EXIT1 ("msgid_ds::shm_perm::mode (%o) != %o", + shminfo.shm_perm.mode, SHM_MODE); + if (shminfo.shm_segsz != pgsz) + FAIL_EXIT1 ("msgid_ds::shm_segsz (%lu) != %lu", + (long unsigned) shminfo.shm_segsz, pgsz); + + /* Attach on shared memory and realize some operations. */ + int *shmem = shmat (shmid, NULL, 0); + if (shmem == (void*) -1) + FAIL_EXIT1 ("shmem failed (errno=%d)", errno); + + shmem[0] = 0x55555555; + shmem[32] = 0x44444444; + shmem[64] = 0x33333333; + shmem[128] = 0x22222222; + + if (shmdt (shmem) == -1) + FAIL_EXIT1 ("shmem failed (errno=%d)", errno); + + shmem = shmat (shmid, NULL, SHM_RDONLY); + if (shmem == (void*) -1) + FAIL_EXIT1 ("shmem failed (errno=%d)", errno); + + CHECK_EQ (shmem[0], 0x55555555); + CHECK_EQ (shmem[32], 0x44444444); + CHECK_EQ (shmem[64], 0x33333333); + CHECK_EQ (shmem[128], 0x22222222); + + if (shmdt (shmem) == -1) + FAIL_EXIT1 ("shmem failed (errno=%d)", errno); + + /* Finally free up the semnaphore resource. */ + if (shmctl (shmid, IPC_RMID, 0) == -1) + FAIL_EXIT1 ("semctl failed (errno=%d)", errno); + + return 0; +}