Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(3)

Unified Diff: ppapi/tests/test_file_mapping.cc

Issue 69663002: PPAPI: Implement PPB_FileMapping on POSIX (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: fix missing return Created 6 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « ppapi/tests/test_file_mapping.h ('k') | ppapi/thunk/enter.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: ppapi/tests/test_file_mapping.cc
diff --git a/ppapi/tests/test_file_mapping.cc b/ppapi/tests/test_file_mapping.cc
new file mode 100644
index 0000000000000000000000000000000000000000..abb2b0294275e91dfd6ed663878b2eba1d0be589
--- /dev/null
+++ b/ppapi/tests/test_file_mapping.cc
@@ -0,0 +1,540 @@
+// Copyright (c) 2012 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "ppapi/tests/test_file_mapping.h"
+
+#include <string.h>
+
+#include <limits>
+#include <string>
+
+#include "ppapi/c/pp_errors.h"
+#include "ppapi/c/ppb_file_io.h"
+#include "ppapi/c/ppb_file_mapping.h"
+#include "ppapi/cpp/file_io.h"
+#include "ppapi/cpp/file_ref.h"
+#include "ppapi/cpp/file_system.h"
+#include "ppapi/cpp/instance.h"
+#include "ppapi/cpp/module.h"
+#include "ppapi/tests/test_utils.h"
+
+REGISTER_TEST_CASE(FileMapping);
+
+namespace {
+
+// TODO(dmichael): Move these to test_utils so we can share them?
+int32_t ReadEntireFile(PP_Instance instance,
+ pp::FileIO* file_io,
+ int32_t offset,
+ std::string* data,
+ CallbackType callback_type) {
+ TestCompletionCallback callback(instance, callback_type);
+ char buf[256];
+ int32_t read_offset = offset;
+
+ for (;;) {
+ callback.WaitForResult(
+ file_io->Read(read_offset, buf, sizeof(buf), callback.GetCallback()));
+ if (callback.result() < 0)
+ return callback.result();
+ if (callback.result() == 0)
+ break;
+ read_offset += callback.result();
+ data->append(buf, callback.result());
+ }
+
+ return PP_OK;
+}
+
+int32_t WriteEntireBuffer(PP_Instance instance,
+ pp::FileIO* file_io,
+ int32_t offset,
+ const std::string& data,
+ CallbackType callback_type) {
+ TestCompletionCallback callback(instance, callback_type);
+ int32_t write_offset = offset;
+ const char* buf = data.c_str();
+ int32_t size = data.size();
+
+ while (write_offset < offset + size) {
+ callback.WaitForResult(file_io->Write(write_offset,
+ &buf[write_offset - offset],
+ size - write_offset + offset,
+ callback.GetCallback()));
+ if (callback.result() < 0)
+ return callback.result();
+ if (callback.result() == 0)
+ return PP_ERROR_FAILED;
+ write_offset += callback.result();
+ }
+ callback.WaitForResult(file_io->Flush(callback.GetCallback()));
+ return callback.result();
+}
+
+} // namespace
+
+std::string TestFileMapping::MapAndCheckResults(uint32_t prot,
+ uint32_t flags) {
+ TestCompletionCallback callback(instance_->pp_instance(), callback_type());
+
+ pp::FileSystem file_system(instance_, PP_FILESYSTEMTYPE_LOCALTEMPORARY);
+ pp::FileRef file_ref(file_system, "/mapped_file");
+
+ callback.WaitForResult(file_system.Open(1024, callback.GetCallback()));
+ ASSERT_EQ(PP_OK, callback.result());
+
+ const int64_t page_size =
+ file_mapping_if_->GetMapPageSize(instance_->pp_instance());
+ const int64_t kNumPages = 4;
+ // Make a string that's big enough that it spans all of the first |n-1| pages,
+ // plus a little bit of the |nth| page.
+ std::string file_contents((page_size * (kNumPages - 1)) + 128, 'a');
+
+ pp::FileIO file_io(instance_);
+ callback.WaitForResult(file_io.Open(file_ref,
+ PP_FILEOPENFLAG_CREATE |
+ PP_FILEOPENFLAG_TRUNCATE |
+ PP_FILEOPENFLAG_READ |
+ PP_FILEOPENFLAG_WRITE,
+ callback.GetCallback()));
+ ASSERT_EQ(PP_OK, callback.result());
+ ASSERT_EQ(PP_OK, WriteEntireBuffer(instance_->pp_instance(),
+ &file_io,
+ 0,
+ file_contents,
+ callback_type()));
+
+ // TODO(dmichael): Use C++ interface.
+ void* address = NULL;
+ callback.WaitForResult(
+ file_mapping_if_->Map(
+ instance_->pp_instance(),
+ file_io.pp_resource(),
+ kNumPages * page_size,
+ prot,
+ flags,
+ 0,
+ &address,
+ callback.GetCallback().pp_completion_callback()));
+ CHECK_CALLBACK_BEHAVIOR(callback);
+ ASSERT_EQ(PP_OK, callback.result());
+ ASSERT_NE(NULL, address);
+
+ if (prot & PP_FILEMAPPROTECTION_READ) {
+ // Make sure we can read.
+ std::string mapped_data(static_cast<char*>(address), file_contents.size());
+ // The initial data should match.
+ ASSERT_EQ(file_contents, mapped_data);
+
+ // Now write some data and flush it.
+ const std::string file_contents2(file_contents.size(), 'x');
+ ASSERT_EQ(PP_OK, WriteEntireBuffer(instance_->pp_instance(),
+ &file_io,
+ 0,
+ file_contents2,
+ callback_type()));
+ // If the region was mapped SHARED, it should get updated.
+ std::string mapped_data2(static_cast<char*>(address), file_contents.size());
+ if (flags & PP_FILEMAPFLAG_SHARED)
+ ASSERT_EQ(file_contents2, mapped_data2);
+ // In POSIX, it is unspecified in the PRIVATE case whether changes to the
+ // file are visible to the mapped region. So we can't really test anything
+ // here in that case.
+ // TODO(dmichael): Make sure our Pepper documentation reflects this.
+ }
+ if (prot & PP_FILEMAPPROTECTION_WRITE) {
+ std::string old_file_contents;
+ ASSERT_EQ(PP_OK, ReadEntireFile(instance_->pp_instance(),
+ &file_io,
+ 0,
+ &old_file_contents,
+ callback_type()));
+ // Write something else to the mapped region, then unmap, and see if it
+ // gets written to the file. (Note we have to Unmap to make sure that the
+ // write is committed).
+ memset(address, 'y', file_contents.size());
+ // Note, we might not have read access to the mapped region here, so we
+ // make a string with the same contents without actually reading.
+ std::string mapped_data3(file_contents.size(), 'y');
+ callback.WaitForResult(
+ file_mapping_if_->Unmap(
+ instance_->pp_instance(), address, file_contents.size(),
+ callback.GetCallback().pp_completion_callback()));
+ CHECK_CALLBACK_BEHAVIOR(callback);
+ ASSERT_EQ(PP_OK, callback.result());
+ std::string new_file_contents;
+ ASSERT_EQ(PP_OK, ReadEntireFile(instance_->pp_instance(),
+ &file_io,
+ 0,
+ &new_file_contents,
+ callback_type()));
+
+ // Sanity-check that the data we wrote isn't the same as what was already
+ // there, otherwise our test is invalid.
+ ASSERT_NE(mapped_data3, old_file_contents);
+ // If it's SHARED, the file should match what we wrote to the mapped region.
+ // Otherwise, it should not have changed.
+ if (flags & PP_FILEMAPFLAG_SHARED)
+ ASSERT_EQ(mapped_data3, new_file_contents);
+ else
+ ASSERT_EQ(old_file_contents, new_file_contents);
+ } else {
+ // We didn't do the "WRITE" test, but we still want to Unmap.
+ callback.WaitForResult(
+ file_mapping_if_->Unmap(
+ instance_->pp_instance(), address, file_contents.size(),
+ callback.GetCallback().pp_completion_callback()));
+ CHECK_CALLBACK_BEHAVIOR(callback);
+ ASSERT_EQ(PP_OK, callback.result());
+ }
+ PASS();
+}
+
+bool TestFileMapping::Init() {
+ // TODO(dmichael): Use unversioned string when this goes to stable?
+ file_mapping_if_ = static_cast<const PPB_FileMapping_0_1*>(
+ pp::Module::Get()->GetBrowserInterface(PPB_FILEMAPPING_INTERFACE_0_1));
+ return !!file_mapping_if_ && CheckTestingInterface() &&
+ EnsureRunningOverHTTP();
+}
+
+void TestFileMapping::RunTests(const std::string& filter) {
+ RUN_CALLBACK_TEST(TestFileMapping, BadParameters, filter);
+ RUN_CALLBACK_TEST(TestFileMapping, Map, filter);
+ RUN_CALLBACK_TEST(TestFileMapping, PartialRegions, filter);
+}
+
+std::string TestFileMapping::TestBadParameters() {
+ TestCompletionCallback callback(instance_->pp_instance(), callback_type());
+
+ pp::FileSystem file_system(instance_, PP_FILESYSTEMTYPE_LOCALTEMPORARY);
+ pp::FileRef file_ref(file_system, "/mapped_file");
+
+ callback.WaitForResult(file_system.Open(1024, callback.GetCallback()));
+ ASSERT_EQ(PP_OK, callback.result());
+
+ const int64_t page_size =
+ file_mapping_if_->GetMapPageSize(instance_->pp_instance());
+ // const int64_t kNumPages = 4;
+ // Make a string that's big enough that it spans 3 pages, plus a little extra.
+ //std::string file_contents((page_size * (kNumPages - 1)) + 128, 'a');
+ std::string file_contents(page_size, 'a');
+
+ pp::FileIO file_io(instance_);
+ callback.WaitForResult(file_io.Open(file_ref,
+ PP_FILEOPENFLAG_CREATE |
+ PP_FILEOPENFLAG_TRUNCATE |
+ PP_FILEOPENFLAG_READ |
+ PP_FILEOPENFLAG_WRITE,
+ callback.GetCallback()));
+ ASSERT_EQ(PP_OK, callback.result());
+ ASSERT_EQ(PP_OK, WriteEntireBuffer(instance_->pp_instance(),
+ &file_io,
+ 0,
+ file_contents,
+ callback_type()));
+
+ // Bad instance.
+ void* address = NULL;
+ callback.WaitForResult(
+ file_mapping_if_->Map(
+ PP_Instance(0xbadbad),
+ file_io.pp_resource(),
+ page_size,
+ PP_FILEMAPPROTECTION_READ,
+ PP_FILEMAPFLAG_PRIVATE,
+ 0,
+ &address,
+ callback.GetCallback().pp_completion_callback()));
+ CHECK_CALLBACK_BEHAVIOR(callback);
+ ASSERT_EQ(PP_ERROR_BADARGUMENT, callback.result());
+ ASSERT_EQ(NULL, address);
+
+ // Bad resource.
+ callback.WaitForResult(
+ file_mapping_if_->Map(
+ instance_->pp_instance(),
+ PP_Resource(0xbadbad),
+ page_size,
+ PP_FILEMAPPROTECTION_READ,
+ PP_FILEMAPFLAG_PRIVATE,
+ 0,
+ &address,
+ callback.GetCallback().pp_completion_callback()));
+ CHECK_CALLBACK_BEHAVIOR(callback);
+ ASSERT_EQ(PP_ERROR_BADARGUMENT, callback.result());
+ ASSERT_EQ(NULL, address);
+
+ // Length too big.
+ callback.WaitForResult(
+ file_mapping_if_->Map(
+ instance_->pp_instance(),
+ file_io.pp_resource(),
+ std::numeric_limits<int64_t>::max(),
+ PP_FILEMAPPROTECTION_READ,
+ PP_FILEMAPFLAG_PRIVATE,
+ 0,
+ &address,
+ callback.GetCallback().pp_completion_callback()));
+ CHECK_CALLBACK_BEHAVIOR(callback);
+ ASSERT_EQ(PP_ERROR_NOMEMORY, callback.result());
+ ASSERT_EQ(NULL, address);
+
+ // Length too small.
+ callback.WaitForResult(
+ file_mapping_if_->Map(
+ instance_->pp_instance(),
+ file_io.pp_resource(),
+ -1,
+ PP_FILEMAPPROTECTION_READ,
+ PP_FILEMAPFLAG_PRIVATE,
+ 0,
+ &address,
+ callback.GetCallback().pp_completion_callback()));
+ CHECK_CALLBACK_BEHAVIOR(callback);
+ ASSERT_EQ(PP_ERROR_BADARGUMENT, callback.result());
+ ASSERT_EQ(NULL, address);
+ // TODO(dmichael): Check & test length that is not a multiple of page size???
+
+ // Bad protection.
+ callback.WaitForResult(
+ file_mapping_if_->Map(
+ instance_->pp_instance(),
+ file_io.pp_resource(),
+ page_size,
+ ~PP_FILEMAPPROTECTION_READ,
+ PP_FILEMAPFLAG_PRIVATE,
+ 0,
+ &address,
+ callback.GetCallback().pp_completion_callback()));
+ CHECK_CALLBACK_BEHAVIOR(callback);
+ ASSERT_EQ(PP_ERROR_BADARGUMENT, callback.result());
+ ASSERT_EQ(NULL, address);
+
+ // No flags.
+ callback.WaitForResult(
+ file_mapping_if_->Map(
+ instance_->pp_instance(),
+ file_io.pp_resource(),
+ page_size,
+ PP_FILEMAPPROTECTION_READ,
+ 0,
+ 0,
+ &address,
+ callback.GetCallback().pp_completion_callback()));
+ CHECK_CALLBACK_BEHAVIOR(callback);
+ ASSERT_EQ(PP_ERROR_BADARGUMENT, callback.result());
+ ASSERT_EQ(NULL, address);
+
+ // Both flags.
+ callback.WaitForResult(
+ file_mapping_if_->Map(
+ instance_->pp_instance(),
+ file_io.pp_resource(),
+ page_size,
+ PP_FILEMAPPROTECTION_READ,
+ PP_FILEMAPFLAG_SHARED | PP_FILEMAPFLAG_PRIVATE,
+ 0,
+ &address,
+ callback.GetCallback().pp_completion_callback()));
+ CHECK_CALLBACK_BEHAVIOR(callback);
+ ASSERT_EQ(PP_ERROR_BADARGUMENT, callback.result());
+ ASSERT_EQ(NULL, address);
+
+ // Bad flags.
+ callback.WaitForResult(
+ file_mapping_if_->Map(
+ instance_->pp_instance(),
+ file_io.pp_resource(),
+ page_size,
+ PP_FILEMAPPROTECTION_READ,
+ ~PP_FILEMAPFLAG_SHARED,
+ 0,
+ &address,
+ callback.GetCallback().pp_completion_callback()));
+ CHECK_CALLBACK_BEHAVIOR(callback);
+ ASSERT_EQ(PP_ERROR_BADARGUMENT, callback.result());
+ ASSERT_EQ(NULL, address);
+
+ // Bad offset; not a multiple of page size.
+ callback.WaitForResult(
+ file_mapping_if_->Map(
+ instance_->pp_instance(),
+ file_io.pp_resource(),
+ page_size,
+ PP_FILEMAPPROTECTION_READ,
+ ~PP_FILEMAPFLAG_SHARED,
+ 1,
+ &address,
+ callback.GetCallback().pp_completion_callback()));
+ CHECK_CALLBACK_BEHAVIOR(callback);
+ ASSERT_EQ(PP_ERROR_BADARGUMENT, callback.result());
+ ASSERT_EQ(NULL, address);
+
+ // Unmap NULL.
+ callback.WaitForResult(
+ file_mapping_if_->Unmap(
+ instance_->pp_instance(),
+ NULL,
+ page_size,
+ callback.GetCallback().pp_completion_callback()));
+ CHECK_CALLBACK_BEHAVIOR(callback);
+ ASSERT_EQ(PP_ERROR_BADARGUMENT, callback.result());
+
+ // Unmap bad address.
+ callback.WaitForResult(
+ file_mapping_if_->Unmap(
+ instance_->pp_instance(),
+ reinterpret_cast<const void*>(0xdeadbeef),
+ page_size,
+ callback.GetCallback().pp_completion_callback()));
+ CHECK_CALLBACK_BEHAVIOR(callback);
+ ASSERT_EQ(PP_ERROR_BADARGUMENT, callback.result());
+
+ PASS();
+}
+
+std::string TestFileMapping::TestMap() {
+ ASSERT_SUBTEST_SUCCESS(MapAndCheckResults(PP_FILEMAPPROTECTION_READ,
+ PP_FILEMAPFLAG_SHARED));
+ ASSERT_SUBTEST_SUCCESS(MapAndCheckResults(PP_FILEMAPPROTECTION_WRITE,
+ PP_FILEMAPFLAG_SHARED));
+ ASSERT_SUBTEST_SUCCESS(
+ MapAndCheckResults(PP_FILEMAPPROTECTION_WRITE | PP_FILEMAPPROTECTION_READ,
+ PP_FILEMAPFLAG_SHARED));
+ ASSERT_SUBTEST_SUCCESS(MapAndCheckResults(PP_FILEMAPPROTECTION_READ,
+ PP_FILEMAPFLAG_PRIVATE));
+ ASSERT_SUBTEST_SUCCESS(MapAndCheckResults(PP_FILEMAPPROTECTION_WRITE,
+ PP_FILEMAPFLAG_PRIVATE));
+ ASSERT_SUBTEST_SUCCESS(
+ MapAndCheckResults(PP_FILEMAPPROTECTION_WRITE | PP_FILEMAPPROTECTION_READ,
+ PP_FILEMAPFLAG_PRIVATE));
+ PASS();
+}
+
+std::string TestFileMapping::TestPartialRegions() {
+ TestCompletionCallback callback(instance_->pp_instance(), callback_type());
+
+ pp::FileSystem file_system(instance_, PP_FILESYSTEMTYPE_LOCALTEMPORARY);
+ pp::FileRef file_ref1(file_system, "/mapped_file1");
+ pp::FileRef file_ref2(file_system, "/mapped_file2");
+
+ callback.WaitForResult(file_system.Open(1024, callback.GetCallback()));
+ ASSERT_EQ(PP_OK, callback.result());
+
+ const int64_t page_size =
+ file_mapping_if_->GetMapPageSize(instance_->pp_instance());
+ const int64_t kNumPages = 3;
+ std::string file_contents1(kNumPages * page_size, 'a');
+
+ pp::FileIO file_io1(instance_);
+ callback.WaitForResult(file_io1.Open(file_ref1,
+ PP_FILEOPENFLAG_CREATE |
+ PP_FILEOPENFLAG_TRUNCATE |
+ PP_FILEOPENFLAG_READ |
+ PP_FILEOPENFLAG_WRITE,
+ callback.GetCallback()));
+ ASSERT_EQ(PP_OK, callback.result());
+ ASSERT_EQ(PP_OK, WriteEntireBuffer(instance_->pp_instance(),
+ &file_io1,
+ 0,
+ file_contents1,
+ callback_type()));
+
+ // TODO(dmichael): Use C++ interface.
+ void* address = NULL;
+ callback.WaitForResult(
+ file_mapping_if_->Map(
+ instance_->pp_instance(),
+ file_io1.pp_resource(),
+ kNumPages * page_size,
+ PP_FILEMAPPROTECTION_WRITE | PP_FILEMAPPROTECTION_READ,
+ PP_FILEMAPFLAG_SHARED,
+ 0,
+ &address,
+ callback.GetCallback().pp_completion_callback()));
+ CHECK_CALLBACK_BEHAVIOR(callback);
+ ASSERT_EQ(PP_OK, callback.result());
+ ASSERT_NE(NULL, address);
+
+ // Unmap only the middle page.
+ void* address_of_middle_page =
+ reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(address) + page_size);
+ callback.WaitForResult(
+ file_mapping_if_->Unmap(
+ instance_->pp_instance(),
+ address_of_middle_page,
+ page_size,
+ callback.GetCallback().pp_completion_callback()));
+ CHECK_CALLBACK_BEHAVIOR(callback);
+ ASSERT_EQ(PP_OK, callback.result());
+
+ // Write another file, map it in to the middle hole that was left above.
+ pp::FileIO file_io2(instance_);
+ callback.WaitForResult(file_io2.Open(file_ref2,
+ PP_FILEOPENFLAG_CREATE |
+ PP_FILEOPENFLAG_TRUNCATE |
+ PP_FILEOPENFLAG_READ |
+ PP_FILEOPENFLAG_WRITE,
+ callback.GetCallback()));
+ ASSERT_EQ(PP_OK, callback.result());
+ // This second file will have 1 page worth of data.
+ std::string file_contents2(page_size, 'b');
+ ASSERT_EQ(PP_OK, WriteEntireBuffer(instance_->pp_instance(),
+ &file_io2,
+ 0,
+ file_contents2,
+ callback_type()));
+ callback.WaitForResult(
+ file_mapping_if_->Map(
+ instance_->pp_instance(),
+ file_io2.pp_resource(),
+ page_size,
+ PP_FILEMAPPROTECTION_WRITE | PP_FILEMAPPROTECTION_READ,
+ PP_FILEMAPFLAG_SHARED | PP_FILEMAPFLAG_FIXED,
+ 0,
+ &address_of_middle_page,
+ callback.GetCallback().pp_completion_callback()));
+ CHECK_CALLBACK_BEHAVIOR(callback);
+ ASSERT_EQ(PP_OK, callback.result());
+ PASS();
+
+ // Write something else to the mapped region, then unmap, and see if it
+ // gets written to both files. (Note we have to Unmap to make sure that the
+ // write is committed).
+ memset(address, 'c', kNumPages * page_size);
+ callback.WaitForResult(
+ file_mapping_if_->Unmap(
+ instance_->pp_instance(), address, kNumPages * page_size,
+ callback.GetCallback().pp_completion_callback()));
+ CHECK_CALLBACK_BEHAVIOR(callback);
+ ASSERT_EQ(PP_OK, callback.result());
+ // The first and third page should have been written with 'c', but the
+ // second page should be untouched.
+ std::string expected_file_contents1 = std::string(page_size, 'c') +
+ std::string(page_size, 'a') +
+ std::string(page_size, 'c');
+ std::string new_file_contents1;
+ ASSERT_EQ(PP_OK, ReadEntireFile(instance_->pp_instance(),
+ &file_io1,
+ 0,
+ &new_file_contents1,
+ callback_type()));
+ ASSERT_EQ(expected_file_contents1, new_file_contents1);
+
+ // The second file should have been entirely over-written.
+ std::string expected_file_contents2 = std::string(page_size, 'c');
+ std::string new_file_contents2;
+ ASSERT_EQ(PP_OK, ReadEntireFile(instance_->pp_instance(),
+ &file_io2,
+ 0,
+ &new_file_contents2,
+ callback_type()));
+ ASSERT_EQ(expected_file_contents2, new_file_contents2);
+
+ // TODO(dmichael): Test non-zero offset
+
+ PASS();
+}
+
« no previous file with comments | « ppapi/tests/test_file_mapping.h ('k') | ppapi/thunk/enter.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698