OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include <errno.h> | 5 #include <errno.h> |
6 #include <fcntl.h> | 6 #include <fcntl.h> |
7 #include <pthread.h> | 7 #include <pthread.h> |
8 #include <stdio.h> | 8 #include <stdio.h> |
9 #include <sys/stat.h> | 9 #include <sys/stat.h> |
10 | 10 |
(...skipping 67 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
78 return rtn; | 78 return rtn; |
79 } | 79 } |
80 | 80 |
81 /** | 81 /** |
82 * Test for fcntl commands F_SETFD and F_GETFD. This | 82 * Test for fcntl commands F_SETFD and F_GETFD. This |
83 * is tested here rather than in the mount_node tests | 83 * is tested here rather than in the mount_node tests |
84 * since the fd flags are not stored in the kernel_handle | 84 * since the fd flags are not stored in the kernel_handle |
85 * or the filesystem node but directly in the FD mapping. | 85 * or the filesystem node but directly in the FD mapping. |
86 */ | 86 */ |
87 TEST_F(KernelProxyTest, Fcntl_GETFD) { | 87 TEST_F(KernelProxyTest, Fcntl_GETFD) { |
88 int fd = ki_open("/test", O_RDWR | O_CREAT); | 88 int fd = ki_open("/test", O_RDWR | O_CREAT, 0777); |
89 ASSERT_NE(-1, fd); | 89 ASSERT_NE(-1, fd); |
90 | 90 |
91 // FD flags should start as zero. | 91 // FD flags should start as zero. |
92 ASSERT_EQ(0, ki_fcntl_wrapper(fd, F_GETFD)); | 92 ASSERT_EQ(0, ki_fcntl_wrapper(fd, F_GETFD)); |
93 | 93 |
94 // Check that setting FD_CLOEXEC works | 94 // Check that setting FD_CLOEXEC works |
95 int flags = FD_CLOEXEC; | 95 int flags = FD_CLOEXEC; |
96 ASSERT_EQ(0, ki_fcntl_wrapper(fd, F_SETFD, flags)) | 96 ASSERT_EQ(0, ki_fcntl_wrapper(fd, F_SETFD, flags)) |
97 << "fcntl failed with: " << strerror(errno); | 97 << "fcntl failed with: " << strerror(errno); |
98 ASSERT_EQ(FD_CLOEXEC, ki_fcntl_wrapper(fd, F_GETFD)); | 98 ASSERT_EQ(FD_CLOEXEC, ki_fcntl_wrapper(fd, F_GETFD)); |
(...skipping 10 matching lines...) Expand all Loading... |
109 int garbage[buffer_size]; | 109 int garbage[buffer_size]; |
110 | 110 |
111 MemFs* filesystem = (MemFs*)kp_.RootFs(); | 111 MemFs* filesystem = (MemFs*)kp_.RootFs(); |
112 ScopedNode root; | 112 ScopedNode root; |
113 | 113 |
114 ASSERT_EQ(0, filesystem->Open(Path("/"), O_RDONLY, &root)); | 114 ASSERT_EQ(0, filesystem->Open(Path("/"), O_RDONLY, &root)); |
115 ASSERT_EQ(0, root->ChildCount()); | 115 ASSERT_EQ(0, root->ChildCount()); |
116 | 116 |
117 for (int file_num = 0; file_num < 4096; file_num++) { | 117 for (int file_num = 0; file_num < 4096; file_num++) { |
118 sprintf(filename, "/foo%i.tmp", file_num++); | 118 sprintf(filename, "/foo%i.tmp", file_num++); |
119 int fd = ki_open(filename, O_WRONLY | O_CREAT); | 119 int fd = ki_open(filename, O_WRONLY | O_CREAT, 0777); |
120 ASSERT_GT(fd, -1); | 120 ASSERT_GT(fd, -1); |
121 ASSERT_EQ(1, root->ChildCount()); | 121 ASSERT_EQ(1, root->ChildCount()); |
122 ASSERT_EQ(buffer_size, ki_write(fd, garbage, buffer_size)); | 122 ASSERT_EQ(buffer_size, ki_write(fd, garbage, buffer_size)); |
123 ki_close(fd); | 123 ki_close(fd); |
124 ASSERT_EQ(0, ki_remove(filename)); | 124 ASSERT_EQ(0, ki_remove(filename)); |
125 } | 125 } |
126 ASSERT_EQ(0, root->ChildCount()); | 126 ASSERT_EQ(0, root->ChildCount()); |
127 } | 127 } |
128 | 128 |
129 static bool g_handler_called = false; | 129 static bool g_handler_called = false; |
(...skipping 95 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
225 | 225 |
226 // Restore existing handler | 226 // Restore existing handler |
227 oldsig = ki_signal(SIGWINCH, oldsig); | 227 oldsig = ki_signal(SIGWINCH, oldsig); |
228 | 228 |
229 // Verify the our newsig was returned as previous handler | 229 // Verify the our newsig was returned as previous handler |
230 ASSERT_EQ(oldsig, newsig); | 230 ASSERT_EQ(oldsig, newsig); |
231 } | 231 } |
232 | 232 |
233 TEST_F(KernelProxyTest, Rename) { | 233 TEST_F(KernelProxyTest, Rename) { |
234 // Create a dummy file | 234 // Create a dummy file |
235 int file1 = ki_open("/test1.txt", O_RDWR | O_CREAT); | 235 int file1 = ki_open("/test1.txt", O_RDWR | O_CREAT, 0777); |
236 ASSERT_GT(file1, -1); | 236 ASSERT_GT(file1, -1); |
237 ASSERT_EQ(0, ki_close(file1)); | 237 ASSERT_EQ(0, ki_close(file1)); |
238 | 238 |
239 // Test the renaming works | 239 // Test the renaming works |
240 ASSERT_EQ(0, ki_rename("/test1.txt", "/test2.txt")); | 240 ASSERT_EQ(0, ki_rename("/test1.txt", "/test2.txt")); |
241 | 241 |
242 // Test that renaming across mount points fails | 242 // Test that renaming across mount points fails |
243 ASSERT_EQ(0, ki_mount("", "/foo", "memfs", 0, "")); | 243 ASSERT_EQ(0, ki_mount("", "/foo", "memfs", 0, "")); |
244 ASSERT_EQ(-1, ki_rename("/test2.txt", "/foo/test2.txt")); | 244 ASSERT_EQ(-1, ki_rename("/test2.txt", "/foo/test2.txt")); |
245 ASSERT_EQ(EXDEV, errno); | 245 ASSERT_EQ(EXDEV, errno); |
(...skipping 40 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
286 TEST_F(KernelProxyTest, FDPathMapping) { | 286 TEST_F(KernelProxyTest, FDPathMapping) { |
287 char text[1024]; | 287 char text[1024]; |
288 | 288 |
289 int fd1, fd2, fd3, fd4, fd5; | 289 int fd1, fd2, fd3, fd4, fd5; |
290 | 290 |
291 EXPECT_EQ(0, ki_mkdir("/foo", S_IREAD | S_IWRITE)); | 291 EXPECT_EQ(0, ki_mkdir("/foo", S_IREAD | S_IWRITE)); |
292 EXPECT_EQ(0, ki_mkdir("/foo/bar", S_IREAD | S_IWRITE)); | 292 EXPECT_EQ(0, ki_mkdir("/foo/bar", S_IREAD | S_IWRITE)); |
293 EXPECT_EQ(0, ki_mkdir("/example", S_IREAD | S_IWRITE)); | 293 EXPECT_EQ(0, ki_mkdir("/example", S_IREAD | S_IWRITE)); |
294 ki_chdir("/foo"); | 294 ki_chdir("/foo"); |
295 | 295 |
296 fd1 = ki_open("/example", O_RDONLY); | 296 fd1 = ki_open("/example", O_RDONLY, 0); |
297 EXPECT_NE(-1, fd1); | 297 EXPECT_NE(-1, fd1); |
298 EXPECT_EQ(ki_fchdir(fd1), 0); | 298 EXPECT_EQ(ki_fchdir(fd1), 0); |
299 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); | 299 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); |
300 EXPECT_STREQ("/example", text); | 300 EXPECT_STREQ("/example", text); |
301 | 301 |
302 EXPECT_EQ(0, ki_chdir("/foo")); | 302 EXPECT_EQ(0, ki_chdir("/foo")); |
303 fd2 = ki_open("../example", O_RDONLY); | 303 fd2 = ki_open("../example", O_RDONLY, 0); |
304 EXPECT_NE(-1, fd2); | 304 EXPECT_NE(-1, fd2); |
305 EXPECT_EQ(0, ki_fchdir(fd2)); | 305 EXPECT_EQ(0, ki_fchdir(fd2)); |
306 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); | 306 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); |
307 EXPECT_STREQ("/example", text); | 307 EXPECT_STREQ("/example", text); |
308 | 308 |
309 EXPECT_EQ(0, ki_chdir("/foo")); | 309 EXPECT_EQ(0, ki_chdir("/foo")); |
310 fd3 = ki_open("../test", O_CREAT | O_RDWR); | 310 fd3 = ki_open("../test", O_CREAT | O_RDWR, 0777); |
311 EXPECT_NE(-1, fd3); | 311 EXPECT_NE(-1, fd3); |
312 EXPECT_EQ(-1, ki_fchdir(fd3)); | 312 EXPECT_EQ(-1, ki_fchdir(fd3)); |
313 EXPECT_EQ(ENOTDIR, errno); | 313 EXPECT_EQ(ENOTDIR, errno); |
314 | 314 |
315 EXPECT_EQ(0, ki_chdir("/foo")); | 315 EXPECT_EQ(0, ki_chdir("/foo")); |
316 fd4 = ki_open("bar", O_RDONLY); | 316 fd4 = ki_open("bar", O_RDONLY, 0); |
317 EXPECT_EQ(0, ki_fchdir(fd4)); | 317 EXPECT_EQ(0, ki_fchdir(fd4)); |
318 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); | 318 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); |
319 EXPECT_STREQ("/foo/bar", text); | 319 EXPECT_STREQ("/foo/bar", text); |
320 EXPECT_EQ(0, ki_chdir("/example")); | 320 EXPECT_EQ(0, ki_chdir("/example")); |
321 EXPECT_EQ(0, ki_fchdir(fd4)); | 321 EXPECT_EQ(0, ki_fchdir(fd4)); |
322 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); | 322 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); |
323 EXPECT_STREQ("/foo/bar", text); | 323 EXPECT_STREQ("/foo/bar", text); |
324 | 324 |
325 EXPECT_EQ(0, ki_chdir("/example")); | 325 EXPECT_EQ(0, ki_chdir("/example")); |
326 fd5 = ki_dup(fd4); | 326 fd5 = ki_dup(fd4); |
(...skipping 26 matching lines...) Expand all Loading... |
353 EXPECT_EQ(-1, ki_mkdir("/foo", S_IREAD | S_IWRITE)); | 353 EXPECT_EQ(-1, ki_mkdir("/foo", S_IREAD | S_IWRITE)); |
354 EXPECT_EQ(EEXIST, errno); | 354 EXPECT_EQ(EEXIST, errno); |
355 | 355 |
356 // Delete "/foo" | 356 // Delete "/foo" |
357 EXPECT_EQ(0, ki_rmdir("/foo")); | 357 EXPECT_EQ(0, ki_rmdir("/foo")); |
358 | 358 |
359 // Recreate "/foo" | 359 // Recreate "/foo" |
360 EXPECT_EQ(0, ki_mkdir("/foo", S_IREAD | S_IWRITE)); | 360 EXPECT_EQ(0, ki_mkdir("/foo", S_IREAD | S_IWRITE)); |
361 | 361 |
362 // Fail to open "/foo/bar" | 362 // Fail to open "/foo/bar" |
363 EXPECT_EQ(-1, ki_open("/foo/bar", O_RDONLY)); | 363 EXPECT_EQ(-1, ki_open("/foo/bar", O_RDONLY, 0)); |
364 EXPECT_EQ(ENOENT, errno); | 364 EXPECT_EQ(ENOENT, errno); |
365 | 365 |
366 // Create bar "/foo/bar" | 366 // Create bar "/foo/bar" |
367 fd1 = ki_open("/foo/bar", O_RDWR | O_CREAT); | 367 fd1 = ki_open("/foo/bar", O_RDWR | O_CREAT, 0777); |
368 ASSERT_NE(-1, fd1); | 368 ASSERT_NE(-1, fd1); |
369 | 369 |
370 // Open (optionally create) bar "/foo/bar" | 370 // Open (optionally create) bar "/foo/bar" |
371 fd2 = ki_open("/foo/bar", O_RDWR | O_CREAT); | 371 fd2 = ki_open("/foo/bar", O_RDWR | O_CREAT, 0777); |
372 ASSERT_NE(-1, fd2); | 372 ASSERT_NE(-1, fd2); |
373 | 373 |
374 // Fail to exclusively create bar "/foo/bar" | 374 // Fail to exclusively create bar "/foo/bar" |
375 EXPECT_EQ(-1, ki_open("/foo/bar", O_RDONLY | O_CREAT | O_EXCL)); | 375 EXPECT_EQ(-1, ki_open("/foo/bar", O_RDONLY | O_CREAT | O_EXCL, 0777)); |
376 EXPECT_EQ(EEXIST, errno); | 376 EXPECT_EQ(EEXIST, errno); |
377 | 377 |
378 // Write hello and world to same node with different descriptors | 378 // Write hello and world to same node with different descriptors |
379 // so that we overwrite each other | 379 // so that we overwrite each other |
380 EXPECT_EQ(5, ki_write(fd2, "WORLD", 5)); | 380 EXPECT_EQ(5, ki_write(fd2, "WORLD", 5)); |
381 EXPECT_EQ(5, ki_write(fd1, "HELLO", 5)); | 381 EXPECT_EQ(5, ki_write(fd1, "HELLO", 5)); |
382 | 382 |
383 fd3 = ki_open("/foo/bar", O_RDONLY); | 383 fd3 = ki_open("/foo/bar", O_RDONLY, 0); |
384 ASSERT_NE(-1, fd3); | 384 ASSERT_NE(-1, fd3); |
385 | 385 |
386 len = ki_read(fd3, text, sizeof(text)); | 386 len = ki_read(fd3, text, sizeof(text)); |
387 ASSERT_EQ(5, len); | 387 ASSERT_EQ(5, len); |
388 text[len] = 0; | 388 text[len] = 0; |
389 EXPECT_STREQ("HELLO", text); | 389 EXPECT_STREQ("HELLO", text); |
390 EXPECT_EQ(0, ki_close(fd1)); | 390 EXPECT_EQ(0, ki_close(fd1)); |
391 EXPECT_EQ(0, ki_close(fd2)); | 391 EXPECT_EQ(0, ki_close(fd2)); |
392 | 392 |
393 fd1 = ki_open("/foo/bar", O_WRONLY | O_APPEND); | 393 fd1 = ki_open("/foo/bar", O_WRONLY | O_APPEND, 0); |
394 ASSERT_NE(-1, fd1); | 394 ASSERT_NE(-1, fd1); |
395 EXPECT_EQ(5, ki_write(fd1, "WORLD", 5)); | 395 EXPECT_EQ(5, ki_write(fd1, "WORLD", 5)); |
396 | 396 |
397 len = ki_read(fd3, text, sizeof(text)); | 397 len = ki_read(fd3, text, sizeof(text)); |
398 ASSERT_EQ(5, len); | 398 ASSERT_EQ(5, len); |
399 text[len] = 0; | 399 text[len] = 0; |
400 EXPECT_STREQ("WORLD", text); | 400 EXPECT_STREQ("WORLD", text); |
401 | 401 |
402 fd2 = ki_open("/foo/bar", O_RDONLY); | 402 fd2 = ki_open("/foo/bar", O_RDONLY, 0); |
403 ASSERT_NE(-1, fd2); | 403 ASSERT_NE(-1, fd2); |
404 len = ki_read(fd2, text, sizeof(text)); | 404 len = ki_read(fd2, text, sizeof(text)); |
405 if (len > 0) | 405 if (len > 0) |
406 text[len] = 0; | 406 text[len] = 0; |
407 EXPECT_EQ(10, len); | 407 EXPECT_EQ(10, len); |
408 EXPECT_STREQ("HELLOWORLD", text); | 408 EXPECT_STREQ("HELLOWORLD", text); |
409 } | 409 } |
410 | 410 |
411 TEST_F(KernelProxyTest, MemMountFTruncate) { | 411 TEST_F(KernelProxyTest, MemMountFTruncate) { |
412 char text[1024]; | 412 char text[1024]; |
413 int fd1, fd2; | 413 int fd1, fd2; |
414 | 414 |
415 // Open a file write only, write some text, then test that using a | 415 // Open a file write only, write some text, then test that using a |
416 // separate file descriptor pointing to it that it is correctly | 416 // separate file descriptor pointing to it that it is correctly |
417 // truncated at a specified number of bytes (2). | 417 // truncated at a specified number of bytes (2). |
418 fd1 = ki_open("/trunc", O_WRONLY | O_CREAT); | 418 fd1 = ki_open("/trunc", O_WRONLY | O_CREAT, 0777); |
419 ASSERT_NE(-1, fd1); | 419 ASSERT_NE(-1, fd1); |
420 fd2 = ki_open("/trunc", O_RDONLY); | 420 fd2 = ki_open("/trunc", O_RDONLY, 0); |
421 ASSERT_NE(-1, fd2); | 421 ASSERT_NE(-1, fd2); |
422 EXPECT_EQ(5, ki_write(fd1, "HELLO", 5)); | 422 EXPECT_EQ(5, ki_write(fd1, "HELLO", 5)); |
423 EXPECT_EQ(0, ki_ftruncate(fd1, 2)); | 423 EXPECT_EQ(0, ki_ftruncate(fd1, 2)); |
424 // Verify the remaining file (using fd2, opened pre-truncation) is | 424 // Verify the remaining file (using fd2, opened pre-truncation) is |
425 // only 2 bytes in length. | 425 // only 2 bytes in length. |
426 EXPECT_EQ(2, ki_read(fd2, text, sizeof(text))); | 426 EXPECT_EQ(2, ki_read(fd2, text, sizeof(text))); |
427 EXPECT_EQ(0, ki_close(fd1)); | 427 EXPECT_EQ(0, ki_close(fd1)); |
428 EXPECT_EQ(0, ki_close(fd2)); | 428 EXPECT_EQ(0, ki_close(fd2)); |
429 } | 429 } |
430 | 430 |
431 TEST_F(KernelProxyTest, MemMountTruncate) { | 431 TEST_F(KernelProxyTest, MemMountTruncate) { |
432 char text[1024]; | 432 char text[1024]; |
433 int fd1; | 433 int fd1; |
434 | 434 |
435 // Open a file write only, write some text, then test that by | 435 // Open a file write only, write some text, then test that by |
436 // referring to it by its path and truncating it we correctly truncate | 436 // referring to it by its path and truncating it we correctly truncate |
437 // it at a specified number of bytes (2). | 437 // it at a specified number of bytes (2). |
438 fd1 = ki_open("/trunc", O_WRONLY | O_CREAT); | 438 fd1 = ki_open("/trunc", O_WRONLY | O_CREAT, 0777); |
439 ASSERT_NE(-1, fd1); | 439 ASSERT_NE(-1, fd1); |
440 EXPECT_EQ(5, ki_write(fd1, "HELLO", 5)); | 440 EXPECT_EQ(5, ki_write(fd1, "HELLO", 5)); |
441 EXPECT_EQ(0, ki_close(fd1)); | 441 EXPECT_EQ(0, ki_close(fd1)); |
442 EXPECT_EQ(0, ki_truncate("/trunc", 2)); | 442 EXPECT_EQ(0, ki_truncate("/trunc", 2)); |
443 // Verify the text is only 2 bytes long with new file descriptor. | 443 // Verify the text is only 2 bytes long with new file descriptor. |
444 fd1 = ki_open("/trunc", O_RDONLY); | 444 fd1 = ki_open("/trunc", O_RDONLY, 0); |
445 ASSERT_NE(-1, fd1); | 445 ASSERT_NE(-1, fd1); |
446 EXPECT_EQ(2, ki_read(fd1, text, sizeof(text))); | 446 EXPECT_EQ(2, ki_read(fd1, text, sizeof(text))); |
447 EXPECT_EQ(0, ki_close(fd1)); | 447 EXPECT_EQ(0, ki_close(fd1)); |
448 } | 448 } |
449 | 449 |
450 TEST_F(KernelProxyTest, MemMountLseek) { | 450 TEST_F(KernelProxyTest, MemMountLseek) { |
451 int fd = ki_open("/foo", O_CREAT | O_RDWR); | 451 int fd = ki_open("/foo", O_CREAT | O_RDWR, 0777); |
452 ASSERT_GT(fd, -1); | 452 ASSERT_GT(fd, -1); |
453 ASSERT_EQ(9, ki_write(fd, "Some text", 9)); | 453 ASSERT_EQ(9, ki_write(fd, "Some text", 9)); |
454 | 454 |
455 ASSERT_EQ(9, ki_lseek(fd, 0, SEEK_CUR)); | 455 ASSERT_EQ(9, ki_lseek(fd, 0, SEEK_CUR)); |
456 ASSERT_EQ(9, ki_lseek(fd, 0, SEEK_END)); | 456 ASSERT_EQ(9, ki_lseek(fd, 0, SEEK_END)); |
457 ASSERT_EQ(-1, ki_lseek(fd, -1, SEEK_SET)); | 457 ASSERT_EQ(-1, ki_lseek(fd, -1, SEEK_SET)); |
458 ASSERT_EQ(EINVAL, errno); | 458 ASSERT_EQ(EINVAL, errno); |
459 | 459 |
460 // Seek past end of file. | 460 // Seek past end of file. |
461 ASSERT_EQ(13, ki_lseek(fd, 13, SEEK_SET)); | 461 ASSERT_EQ(13, ki_lseek(fd, 13, SEEK_SET)); |
462 char buffer[4]; | 462 char buffer[4]; |
463 memset(&buffer[0], 0xfe, 4); | 463 memset(&buffer[0], 0xfe, 4); |
464 ASSERT_EQ(9, ki_lseek(fd, -4, SEEK_END)); | 464 ASSERT_EQ(9, ki_lseek(fd, -4, SEEK_END)); |
465 ASSERT_EQ(9, ki_lseek(fd, 0, SEEK_CUR)); | 465 ASSERT_EQ(9, ki_lseek(fd, 0, SEEK_CUR)); |
466 ASSERT_EQ(4, ki_read(fd, &buffer[0], 4)); | 466 ASSERT_EQ(4, ki_read(fd, &buffer[0], 4)); |
467 ASSERT_EQ(0, memcmp("\0\0\0\0", buffer, 4)); | 467 ASSERT_EQ(0, memcmp("\0\0\0\0", buffer, 4)); |
468 } | 468 } |
469 | 469 |
470 TEST_F(KernelProxyTest, CloseTwice) { | 470 TEST_F(KernelProxyTest, CloseTwice) { |
471 int fd = ki_open("/foo", O_CREAT | O_RDWR); | 471 int fd = ki_open("/foo", O_CREAT | O_RDWR, 0777); |
472 ASSERT_GT(fd, -1); | 472 ASSERT_GT(fd, -1); |
473 | 473 |
474 EXPECT_EQ(9, ki_write(fd, "Some text", 9)); | 474 EXPECT_EQ(9, ki_write(fd, "Some text", 9)); |
475 | 475 |
476 int fd2 = ki_dup(fd); | 476 int fd2 = ki_dup(fd); |
477 ASSERT_GT(fd2, -1); | 477 ASSERT_GT(fd2, -1); |
478 | 478 |
479 EXPECT_EQ(0, ki_close(fd)); | 479 EXPECT_EQ(0, ki_close(fd)); |
480 EXPECT_EQ(0, ki_close(fd2)); | 480 EXPECT_EQ(0, ki_close(fd2)); |
481 } | 481 } |
482 | 482 |
483 TEST_F(KernelProxyTest, MemMountDup) { | 483 TEST_F(KernelProxyTest, MemMountDup) { |
484 int fd = ki_open("/foo", O_CREAT | O_RDWR); | 484 int fd = ki_open("/foo", O_CREAT | O_RDWR, 0777); |
485 ASSERT_GT(fd, -1); | 485 ASSERT_GT(fd, -1); |
486 | 486 |
487 int dup_fd = ki_dup(fd); | 487 int dup_fd = ki_dup(fd); |
488 ASSERT_NE(-1, dup_fd); | 488 ASSERT_NE(-1, dup_fd); |
489 | 489 |
490 ASSERT_EQ(9, ki_write(fd, "Some text", 9)); | 490 ASSERT_EQ(9, ki_write(fd, "Some text", 9)); |
491 ASSERT_EQ(9, ki_lseek(fd, 0, SEEK_CUR)); | 491 ASSERT_EQ(9, ki_lseek(fd, 0, SEEK_CUR)); |
492 ASSERT_EQ(9, ki_lseek(dup_fd, 0, SEEK_CUR)); | 492 ASSERT_EQ(9, ki_lseek(dup_fd, 0, SEEK_CUR)); |
493 | 493 |
494 int dup2_fd = 123; | 494 int dup2_fd = 123; |
495 ASSERT_EQ(dup2_fd, ki_dup2(fd, dup2_fd)); | 495 ASSERT_EQ(dup2_fd, ki_dup2(fd, dup2_fd)); |
496 ASSERT_EQ(9, ki_lseek(dup2_fd, 0, SEEK_CUR)); | 496 ASSERT_EQ(9, ki_lseek(dup2_fd, 0, SEEK_CUR)); |
497 | 497 |
498 int new_fd = ki_open("/bar", O_CREAT | O_RDWR); | 498 int new_fd = ki_open("/bar", O_CREAT | O_RDWR, 0777); |
499 | 499 |
500 ASSERT_EQ(fd, ki_dup2(new_fd, fd)); | 500 ASSERT_EQ(fd, ki_dup2(new_fd, fd)); |
501 // fd, new_fd -> "/bar" | 501 // fd, new_fd -> "/bar" |
502 // dup_fd, dup2_fd -> "/foo" | 502 // dup_fd, dup2_fd -> "/foo" |
503 | 503 |
504 // We should still be able to write to dup_fd (i.e. it should not be closed). | 504 // We should still be able to write to dup_fd (i.e. it should not be closed). |
505 ASSERT_EQ(4, ki_write(dup_fd, "more", 4)); | 505 ASSERT_EQ(4, ki_write(dup_fd, "more", 4)); |
506 | 506 |
507 ASSERT_EQ(0, ki_close(dup2_fd)); | 507 ASSERT_EQ(0, ki_close(dup2_fd)); |
508 // fd, new_fd -> "/bar" | 508 // fd, new_fd -> "/bar" |
509 // dup_fd -> "/foo" | 509 // dup_fd -> "/foo" |
510 | 510 |
511 ASSERT_EQ(dup_fd, ki_dup2(fd, dup_fd)); | 511 ASSERT_EQ(dup_fd, ki_dup2(fd, dup_fd)); |
512 // fd, new_fd, dup_fd -> "/bar" | 512 // fd, new_fd, dup_fd -> "/bar" |
513 } | 513 } |
514 | 514 |
515 TEST_F(KernelProxyTest, Lstat) { | 515 TEST_F(KernelProxyTest, Lstat) { |
516 int fd = ki_open("/foo", O_CREAT | O_RDWR); | 516 int fd = ki_open("/foo", O_CREAT | O_RDWR, 0777); |
517 ASSERT_GT(fd, -1); | 517 ASSERT_GT(fd, -1); |
518 ASSERT_EQ(0, ki_mkdir("/bar", S_IREAD | S_IWRITE)); | 518 ASSERT_EQ(0, ki_mkdir("/bar", S_IREAD | S_IWRITE)); |
519 | 519 |
520 struct stat buf; | 520 struct stat buf; |
521 EXPECT_EQ(0, ki_lstat("/foo", &buf)); | 521 EXPECT_EQ(0, ki_lstat("/foo", &buf)); |
522 EXPECT_EQ(0, buf.st_size); | 522 EXPECT_EQ(0, buf.st_size); |
523 EXPECT_TRUE(S_ISREG(buf.st_mode)); | 523 EXPECT_TRUE(S_ISREG(buf.st_mode)); |
524 | 524 |
525 EXPECT_EQ(0, ki_lstat("/bar", &buf)); | 525 EXPECT_EQ(0, ki_lstat("/bar", &buf)); |
526 EXPECT_EQ(0, buf.st_size); | 526 EXPECT_EQ(0, buf.st_size); |
527 EXPECT_TRUE(S_ISDIR(buf.st_mode)); | 527 EXPECT_TRUE(S_ISDIR(buf.st_mode)); |
528 | 528 |
529 EXPECT_EQ(-1, ki_lstat("/no-such-file", &buf)); | 529 EXPECT_EQ(-1, ki_lstat("/no-such-file", &buf)); |
530 EXPECT_EQ(ENOENT, errno); | 530 EXPECT_EQ(ENOENT, errno); |
531 } | 531 } |
532 | 532 |
| 533 TEST_F(KernelProxyTest, OpenWithMode) { |
| 534 int fd = ki_open("/foo", O_CREAT | O_RDWR, 0723); |
| 535 ASSERT_GT(fd, -1); |
| 536 |
| 537 struct stat buf; |
| 538 EXPECT_EQ(0, ki_lstat("/foo", &buf)); |
| 539 EXPECT_EQ(0723, buf.st_mode & ~S_IFMT); |
| 540 } |
| 541 |
533 TEST_F(KernelProxyTest, UseAfterClose) { | 542 TEST_F(KernelProxyTest, UseAfterClose) { |
534 int fd = ki_open("/dummy", O_CREAT | O_WRONLY); | 543 int fd = ki_open("/dummy", O_CREAT | O_WRONLY, 0777); |
535 ASSERT_GT(fd, -1); | 544 ASSERT_GT(fd, -1); |
536 EXPECT_EQ(5, ki_write(fd, "hello", 5)); | 545 EXPECT_EQ(5, ki_write(fd, "hello", 5)); |
537 EXPECT_EQ(0, ki_close(fd)); | 546 EXPECT_EQ(0, ki_close(fd)); |
538 EXPECT_EQ(-1, ki_write(fd, "hello", 5)); | 547 EXPECT_EQ(-1, ki_write(fd, "hello", 5)); |
539 EXPECT_EQ(EBADF, errno); | 548 EXPECT_EQ(EBADF, errno); |
540 } | 549 } |
541 | 550 |
542 namespace { | 551 namespace { |
543 | 552 |
544 StringMap_t g_string_map; | 553 StringMap_t g_string_map; |
(...skipping 75 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
620 EXPECT_EQ("y", g_string_map["x"]); | 629 EXPECT_EQ("y", g_string_map["x"]); |
621 } | 630 } |
622 | 631 |
623 TEST_F(KernelProxyMountTest, MountAndIoctl) { | 632 TEST_F(KernelProxyMountTest, MountAndIoctl) { |
624 ASSERT_EQ(0, ki_mount("/", "/mnt1", "initfs", 0, "")); | 633 ASSERT_EQ(0, ki_mount("/", "/mnt1", "initfs", 0, "")); |
625 ASSERT_NE(-1, g_fs_dev); | 634 ASSERT_NE(-1, g_fs_dev); |
626 | 635 |
627 char path[100]; | 636 char path[100]; |
628 snprintf(path, 100, "dev/fs/%d", g_fs_dev); | 637 snprintf(path, 100, "dev/fs/%d", g_fs_dev); |
629 | 638 |
630 int fd = ki_open(path, O_RDONLY); | 639 int fd = ki_open(path, O_RDONLY, 0); |
631 ASSERT_GT(fd, -1); | 640 ASSERT_GT(fd, -1); |
632 | 641 |
633 EXPECT_EQ(0, ki_ioctl_wrapper(fd, 0xdeadbeef)); | 642 EXPECT_EQ(0, ki_ioctl_wrapper(fd, 0xdeadbeef)); |
634 EXPECT_EQ(true, g_fs_ioctl_called); | 643 EXPECT_EQ(true, g_fs_ioctl_called); |
635 } | 644 } |
636 | 645 |
637 static void mount_callback(const char* source, | 646 static void mount_callback(const char* source, |
638 const char* target, | 647 const char* target, |
639 const char* filesystemtype, | 648 const char* filesystemtype, |
640 unsigned long mountflags, | 649 unsigned long mountflags, |
(...skipping 53 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
694 | 703 |
695 return 0; | 704 return 0; |
696 } | 705 } |
697 | 706 |
698 private: | 707 private: |
699 int node_mmap_count_; | 708 int node_mmap_count_; |
700 }; | 709 }; |
701 | 710 |
702 class KernelProxyMMapTest_Filesystem : public Filesystem { | 711 class KernelProxyMMapTest_Filesystem : public Filesystem { |
703 public: | 712 public: |
704 virtual Error Open(const Path& path, int mode, ScopedNode* out_node) { | 713 virtual Error OpenWithMode(const Path& path, int open_flags, |
| 714 mode_t mode, ScopedNode* out_node) { |
705 out_node->reset(new KernelProxyMMapTest_Node(this)); | 715 out_node->reset(new KernelProxyMMapTest_Node(this)); |
706 return 0; | 716 return 0; |
707 } | 717 } |
708 | 718 |
709 virtual Error OpenResource(const Path& path, ScopedNode* out_node) { | 719 virtual Error OpenResource(const Path& path, ScopedNode* out_node) { |
710 out_node->reset(NULL); | 720 out_node->reset(NULL); |
711 return ENOSYS; | 721 return ENOSYS; |
712 } | 722 } |
713 virtual Error Unlink(const Path& path) { return ENOSYS; } | 723 virtual Error Unlink(const Path& path) { return ENOSYS; } |
714 virtual Error Mkdir(const Path& path, int permissions) { return ENOSYS; } | 724 virtual Error Mkdir(const Path& path, int permissions) { return ENOSYS; } |
(...skipping 25 matching lines...) Expand all Loading... |
740 | 750 |
741 private: | 751 private: |
742 KernelProxyMMapTest_KernelProxy kp_; | 752 KernelProxyMMapTest_KernelProxy kp_; |
743 }; | 753 }; |
744 | 754 |
745 } // namespace | 755 } // namespace |
746 | 756 |
747 TEST_F(KernelProxyMMapTest, MMap) { | 757 TEST_F(KernelProxyMMapTest, MMap) { |
748 ASSERT_EQ(0, ki_umount("/")); | 758 ASSERT_EQ(0, ki_umount("/")); |
749 ASSERT_EQ(0, ki_mount("", "/", "mmapfs", 0, NULL)); | 759 ASSERT_EQ(0, ki_mount("", "/", "mmapfs", 0, NULL)); |
750 int fd = ki_open("/file", O_RDWR | O_CREAT); | 760 int fd = ki_open("/file", O_RDWR | O_CREAT, 0777); |
751 ASSERT_NE(-1, fd); | 761 ASSERT_NE(-1, fd); |
752 | 762 |
753 void* addr1 = ki_mmap(NULL, 0x800, PROT_READ, MAP_PRIVATE, fd, 0); | 763 void* addr1 = ki_mmap(NULL, 0x800, PROT_READ, MAP_PRIVATE, fd, 0); |
754 ASSERT_EQ(reinterpret_cast<void*>(0x1000), addr1); | 764 ASSERT_EQ(reinterpret_cast<void*>(0x1000), addr1); |
755 ASSERT_EQ(1, g_MMapCount); | 765 ASSERT_EQ(1, g_MMapCount); |
756 | 766 |
757 void* addr2 = ki_mmap(NULL, 0x800, PROT_READ, MAP_PRIVATE, fd, 0); | 767 void* addr2 = ki_mmap(NULL, 0x800, PROT_READ, MAP_PRIVATE, fd, 0); |
758 ASSERT_EQ(reinterpret_cast<void*>(0x2000), addr2); | 768 ASSERT_EQ(reinterpret_cast<void*>(0x2000), addr2); |
759 ASSERT_EQ(2, g_MMapCount); | 769 ASSERT_EQ(2, g_MMapCount); |
760 | 770 |
(...skipping 61 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
822 | 832 |
823 private: | 833 private: |
824 KernelProxyErrorTest_KernelProxy kp_; | 834 KernelProxyErrorTest_KernelProxy kp_; |
825 }; | 835 }; |
826 | 836 |
827 } // namespace | 837 } // namespace |
828 | 838 |
829 TEST_F(KernelProxyErrorTest, WriteError) { | 839 TEST_F(KernelProxyErrorTest, WriteError) { |
830 ScopedRef<MockFs> mock_fs(fs()); | 840 ScopedRef<MockFs> mock_fs(fs()); |
831 ScopedRef<MockNode> mock_node(new MockNode(&*mock_fs)); | 841 ScopedRef<MockNode> mock_node(new MockNode(&*mock_fs)); |
832 EXPECT_CALL(*mock_fs, Open(_, _, _)) | 842 EXPECT_CALL(*mock_fs, OpenWithMode(_, _, _, _)) |
833 .WillOnce(DoAll(SetArgPointee<2>(mock_node), Return(0))); | 843 .WillOnce(DoAll(SetArgPointee<3>(mock_node), Return(0))); |
834 | 844 |
835 EXPECT_CALL(*mock_node, Write(_, _, _, _)) | 845 EXPECT_CALL(*mock_node, Write(_, _, _, _)) |
836 .WillOnce(DoAll(SetArgPointee<3>(0), // Wrote 0 bytes. | 846 .WillOnce(DoAll(SetArgPointee<3>(0), // Wrote 0 bytes. |
837 Return(1234))); // Returned error 1234. | 847 Return(1234))); // Returned error 1234. |
838 | 848 |
839 EXPECT_CALL(*mock_node, Destroy()).Times(1); | 849 EXPECT_CALL(*mock_node, Destroy()).Times(1); |
840 | 850 |
841 int fd = ki_open("/dummy", O_WRONLY); | 851 int fd = ki_open("/dummy", O_WRONLY, 0); |
842 EXPECT_NE(0, fd); | 852 EXPECT_NE(0, fd); |
843 | 853 |
844 char buf[20]; | 854 char buf[20]; |
845 EXPECT_EQ(-1, ki_write(fd, &buf[0], 20)); | 855 EXPECT_EQ(-1, ki_write(fd, &buf[0], 20)); |
846 // The Filesystem should be able to return whatever error it wants and have it | 856 // The Filesystem should be able to return whatever error it wants and have it |
847 // propagate through. | 857 // propagate through. |
848 EXPECT_EQ(1234, errno); | 858 EXPECT_EQ(1234, errno); |
849 } | 859 } |
850 | 860 |
851 TEST_F(KernelProxyErrorTest, ReadError) { | 861 TEST_F(KernelProxyErrorTest, ReadError) { |
852 ScopedRef<MockFs> mock_fs(fs()); | 862 ScopedRef<MockFs> mock_fs(fs()); |
853 ScopedRef<MockNode> mock_node(new MockNode(&*mock_fs)); | 863 ScopedRef<MockNode> mock_node(new MockNode(&*mock_fs)); |
854 EXPECT_CALL(*mock_fs, Open(_, _, _)) | 864 EXPECT_CALL(*mock_fs, OpenWithMode(_, _, _, _)) |
855 .WillOnce(DoAll(SetArgPointee<2>(mock_node), Return(0))); | 865 .WillOnce(DoAll(SetArgPointee<3>(mock_node), Return(0))); |
856 | 866 |
857 EXPECT_CALL(*mock_node, Read(_, _, _, _)) | 867 EXPECT_CALL(*mock_node, Read(_, _, _, _)) |
858 .WillOnce(DoAll(SetArgPointee<3>(0), // Read 0 bytes. | 868 .WillOnce(DoAll(SetArgPointee<3>(0), // Read 0 bytes. |
859 Return(1234))); // Returned error 1234. | 869 Return(1234))); // Returned error 1234. |
860 | 870 |
861 EXPECT_CALL(*mock_node, Destroy()).Times(1); | 871 EXPECT_CALL(*mock_node, Destroy()).Times(1); |
862 | 872 |
863 int fd = ki_open("/dummy", O_RDONLY); | 873 int fd = ki_open("/dummy", O_RDONLY, 0); |
864 EXPECT_NE(0, fd); | 874 EXPECT_NE(0, fd); |
865 | 875 |
866 char buf[20]; | 876 char buf[20]; |
867 EXPECT_EQ(-1, ki_read(fd, &buf[0], 20)); | 877 EXPECT_EQ(-1, ki_read(fd, &buf[0], 20)); |
868 // The Filesystem should be able to return whatever error it wants and have it | 878 // The Filesystem should be able to return whatever error it wants and have it |
869 // propagate through. | 879 // propagate through. |
870 EXPECT_EQ(1234, errno); | 880 EXPECT_EQ(1234, errno); |
871 } | 881 } |
OLD | NEW |