OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include <errno.h> | 5 #include <errno.h> |
6 #include <fcntl.h> | 6 #include <fcntl.h> |
7 #include <pthread.h> | 7 #include <pthread.h> |
8 #include <stdio.h> | 8 #include <stdio.h> |
9 #include <sys/stat.h> | 9 #include <sys/stat.h> |
10 #include <sys/types.h> | 10 #include <sys/types.h> |
(...skipping 55 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
66 } | 66 } |
67 | 67 |
68 void TearDown() { ki_uninit(); } | 68 void TearDown() { ki_uninit(); } |
69 | 69 |
70 protected: | 70 protected: |
71 KernelProxyTest_KernelProxy kp_; | 71 KernelProxyTest_KernelProxy kp_; |
72 }; | 72 }; |
73 | 73 |
74 } // namespace | 74 } // namespace |
75 | 75 |
76 // Helper function for calling ki_fcntl without having | |
77 // to construct a va_list. | |
76 static int ki_fcntl_wrapper(int fd, int request, ...) { | 78 static int ki_fcntl_wrapper(int fd, int request, ...) { |
77 va_list ap; | 79 va_list ap; |
78 va_start(ap, request); | 80 va_start(ap, request); |
79 int rtn = ki_fcntl(fd, request, ap); | 81 int rtn = ki_fcntl(fd, request, ap); |
80 va_end(ap); | 82 va_end(ap); |
81 return rtn; | 83 return rtn; |
82 } | 84 } |
83 | 85 |
86 // Helper function for calling ki_ioctl without having | |
87 // to construct a va_list. | |
88 static int ki_ioctl_wrapper(int fd, int request, ...) { | |
89 va_list ap; | |
90 va_start(ap, request); | |
91 int rtn = ki_ioctl(fd, request, ap); | |
92 va_end(ap); | |
93 return rtn; | |
94 } | |
95 | |
96 static void check_dir_contents(const char* dirname, const char** expected, | |
binji
2015/01/07 19:14:59
nit: use CamelCase for functions
Sam Clegg
2015/01/08 12:59:07
Done.
| |
97 int count) { | |
98 int dir = ki_open(dirname, O_RDONLY, 0); | |
99 ASSERT_GE(dir, 0); | |
100 while (1) { | |
101 char buf[512]; | |
102 int rtn = ki_getdents(dir, buf, sizeof(buf)); | |
103 if (rtn <= 0) | |
104 break; | |
105 int offset = 0; | |
106 while (offset < rtn) { | |
107 struct dirent* entry = (struct dirent*)(buf + offset); | |
108 printf("entry: %s\n", entry->d_name); | |
109 offset += entry->d_reclen; | |
110 if (count == -1) | |
111 continue; | |
112 int i; | |
113 for (i = 0; i < count; i++) { | |
binji
2015/01/07 19:14:59
this code is untested. Best to use it or remove it
Sam Clegg
2015/01/08 12:59:08
Sorry, I meant to add a getdents tests. Done that
| |
114 if (expected[i] && strcmp(expected[i], entry->d_name) == 0) { | |
115 expected[i] = NULL; | |
binji
2015/01/07 19:14:59
This is a bit unexpected, probably should be docum
Sam Clegg
2015/01/08 12:59:07
Done.
| |
116 break; | |
117 } | |
118 } | |
119 if (i == count) { | |
120 FAIL() << "Unexpeected entry '" << entry->d_name | |
121 << "' in directory: " << dirname; | |
122 } | |
123 } | |
124 } | |
125 | |
126 ASSERT_EQ(0, ki_close(dir)); | |
127 | |
128 if (count != -1) { | |
129 for (int i = 0; i < count; i++) { | |
130 if (expected[i] != NULL) { | |
131 FAIL() << "Expected entry '" << expected[i] | |
132 << "' not found in directory: " << dirname; | |
133 } | |
134 } | |
135 } | |
136 } | |
137 | |
84 /** | 138 /** |
85 * Test for fcntl commands F_SETFD and F_GETFD. This | 139 * Test for fcntl commands F_SETFD and F_GETFD. This |
86 * is tested here rather than in the mount_node tests | 140 * is tested here rather than in the mount_node tests |
87 * since the fd flags are not stored in the kernel_handle | 141 * since the fd flags are not stored in the kernel_handle |
88 * or the filesystem node but directly in the FD mapping. | 142 * or the filesystem node but directly in the FD mapping. |
89 */ | 143 */ |
90 TEST_F(KernelProxyTest, Fcntl_GETFD) { | 144 TEST_F(KernelProxyTest, Fcntl_GETFD) { |
91 int fd = ki_open("/test", O_RDWR | O_CREAT, 0777); | 145 int fd = ki_open("/test", O_RDWR | O_CREAT, 0777); |
92 ASSERT_NE(-1, fd); | 146 ASSERT_NE(-1, fd); |
93 | 147 |
(...skipping 19 matching lines...) Expand all Loading... | |
113 | 167 |
114 MemFs* filesystem = (MemFs*)kp_.RootFs(); | 168 MemFs* filesystem = (MemFs*)kp_.RootFs(); |
115 ScopedNode root; | 169 ScopedNode root; |
116 | 170 |
117 ASSERT_EQ(0, filesystem->Open(Path("/"), O_RDONLY, &root)); | 171 ASSERT_EQ(0, filesystem->Open(Path("/"), O_RDONLY, &root)); |
118 ASSERT_EQ(0, root->ChildCount()); | 172 ASSERT_EQ(0, root->ChildCount()); |
119 | 173 |
120 for (int file_num = 0; file_num < 4096; file_num++) { | 174 for (int file_num = 0; file_num < 4096; file_num++) { |
121 sprintf(filename, "/foo%i.tmp", file_num++); | 175 sprintf(filename, "/foo%i.tmp", file_num++); |
122 int fd = ki_open(filename, O_WRONLY | O_CREAT, 0777); | 176 int fd = ki_open(filename, O_WRONLY | O_CREAT, 0777); |
123 ASSERT_GT(fd, -1); | 177 ASSERT_GE(fd, 0); |
124 ASSERT_EQ(1, root->ChildCount()); | 178 ASSERT_EQ(1, root->ChildCount()); |
125 ASSERT_EQ(buffer_size, ki_write(fd, garbage, buffer_size)); | 179 ASSERT_EQ(buffer_size, ki_write(fd, garbage, buffer_size)); |
126 ki_close(fd); | 180 ki_close(fd); |
127 ASSERT_EQ(0, ki_remove(filename)); | 181 ASSERT_EQ(0, ki_remove(filename)); |
128 } | 182 } |
129 ASSERT_EQ(0, root->ChildCount()); | 183 ASSERT_EQ(0, root->ChildCount()); |
130 } | 184 } |
131 | 185 |
132 static bool g_handler_called = false; | 186 static bool g_handler_called = false; |
133 static void sighandler(int) { g_handler_called = true; } | 187 static void sighandler(int) { g_handler_called = true; } |
(...skipping 95 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
229 // Restore existing handler | 283 // Restore existing handler |
230 oldsig = ki_signal(SIGWINCH, oldsig); | 284 oldsig = ki_signal(SIGWINCH, oldsig); |
231 | 285 |
232 // Verify the our newsig was returned as previous handler | 286 // Verify the our newsig was returned as previous handler |
233 ASSERT_EQ(oldsig, newsig); | 287 ASSERT_EQ(oldsig, newsig); |
234 } | 288 } |
235 | 289 |
236 TEST_F(KernelProxyTest, Rename) { | 290 TEST_F(KernelProxyTest, Rename) { |
237 // Create a dummy file | 291 // Create a dummy file |
238 int file1 = ki_open("/test1.txt", O_RDWR | O_CREAT, 0777); | 292 int file1 = ki_open("/test1.txt", O_RDWR | O_CREAT, 0777); |
239 ASSERT_GT(file1, -1); | 293 ASSERT_GE(file1, 0); |
240 ASSERT_EQ(0, ki_close(file1)); | 294 ASSERT_EQ(0, ki_close(file1)); |
241 | 295 |
242 // Test the renaming works | 296 // Test the renaming works |
243 ASSERT_EQ(0, ki_rename("/test1.txt", "/test2.txt")); | 297 ASSERT_EQ(0, ki_rename("/test1.txt", "/test2.txt")); |
244 | 298 |
245 // Test that renaming across mount points fails | 299 // Test that renaming across mount points fails |
246 ASSERT_EQ(0, ki_mount("", "/foo", "memfs", 0, "")); | 300 ASSERT_EQ(0, ki_mount("", "/foo", "memfs", 0, "")); |
247 ASSERT_EQ(-1, ki_rename("/test2.txt", "/foo/test2.txt")); | 301 ASSERT_EQ(-1, ki_rename("/test2.txt", "/foo/test2.txt")); |
248 ASSERT_EQ(EXDEV, errno); | 302 ASSERT_EQ(EXDEV, errno); |
249 } | 303 } |
(...skipping 29 matching lines...) Expand all Loading... | |
279 | 333 |
280 memset(text, 0, sizeof(text)); | 334 memset(text, 0, sizeof(text)); |
281 EXPECT_EQ(-1, ki_chdir("foo")); | 335 EXPECT_EQ(-1, ki_chdir("foo")); |
282 EXPECT_EQ(ENOENT, errno); | 336 EXPECT_EQ(ENOENT, errno); |
283 EXPECT_EQ(0, ki_chdir("..")); | 337 EXPECT_EQ(0, ki_chdir("..")); |
284 EXPECT_EQ(0, ki_chdir("/foo")); | 338 EXPECT_EQ(0, ki_chdir("/foo")); |
285 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); | 339 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); |
286 EXPECT_STREQ("/foo", text); | 340 EXPECT_STREQ("/foo", text); |
287 } | 341 } |
288 | 342 |
343 TEST_F(KernelProxyTest, Mkdir) { | |
344 ASSERT_EQ(0, ki_mkdir("/foo", S_IREAD | S_IWRITE)); | |
345 ASSERT_EQ(-1, ki_mkdir("/foo", S_IREAD | S_IWRITE)); | |
346 ASSERT_EQ(EEXIST, errno); | |
347 | |
348 // Some component of parent directory does not exist | |
349 ASSERT_EQ(-1, ki_mkdir("/does_not_exist/foo", S_IREAD | S_IWRITE)); | |
binji
2015/01/07 19:14:59
is this implemented yet?
Sam Clegg
2015/01/08 12:59:07
At least the parent must exist yes.
| |
350 ASSERT_EQ(ENOENT, errno); | |
351 | |
352 int fd = ki_open("/filename", O_CREAT | O_RDWR, 0777); | |
353 ASSERT_GE(fd, 0); | |
354 | |
355 // Some component of parent directory is not actually a directory | |
356 ASSERT_EQ(-1, ki_mkdir("/filename/foo", S_IREAD | S_IWRITE)); | |
357 ASSERT_EQ(ENOTDIR, errno); | |
358 } | |
359 | |
360 TEST_F(KernelProxyTest, Rmdir) { | |
361 ASSERT_EQ(-1, ki_rmdir("/dev/fs")); | |
362 ASSERT_EQ(EPERM, errno); | |
363 | |
364 ASSERT_EQ(-1, ki_rmdir("/foo")); | |
365 ASSERT_EQ(ENOENT, errno); | |
366 } | |
367 | |
289 TEST_F(KernelProxyTest, FDPathMapping) { | 368 TEST_F(KernelProxyTest, FDPathMapping) { |
290 char text[1024]; | 369 char text[1024]; |
291 | 370 |
292 int fd1, fd2, fd3, fd4, fd5; | 371 int fd1, fd2, fd3, fd4, fd5; |
293 | 372 |
294 EXPECT_EQ(0, ki_mkdir("/foo", S_IREAD | S_IWRITE)); | 373 EXPECT_EQ(0, ki_mkdir("/foo", S_IREAD | S_IWRITE)); |
295 EXPECT_EQ(0, ki_mkdir("/foo/bar", S_IREAD | S_IWRITE)); | 374 EXPECT_EQ(0, ki_mkdir("/foo/bar", S_IREAD | S_IWRITE)); |
296 EXPECT_EQ(0, ki_mkdir("/example", S_IREAD | S_IWRITE)); | 375 EXPECT_EQ(0, ki_mkdir("/example", S_IREAD | S_IWRITE)); |
297 ki_chdir("/foo"); | 376 ki_chdir("/foo"); |
298 | 377 |
299 fd1 = ki_open("/example", O_RDONLY, 0); | 378 fd1 = ki_open("/example", O_RDONLY, 0); |
300 EXPECT_NE(-1, fd1); | 379 ASSERT_GT(fd1, 0); |
301 EXPECT_EQ(ki_fchdir(fd1), 0); | 380 EXPECT_EQ(ki_fchdir(fd1), 0); |
302 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); | 381 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); |
303 EXPECT_STREQ("/example", text); | 382 EXPECT_STREQ("/example", text); |
304 | 383 |
305 EXPECT_EQ(0, ki_chdir("/foo")); | 384 EXPECT_EQ(0, ki_chdir("/foo")); |
306 fd2 = ki_open("../example", O_RDONLY, 0); | 385 fd2 = ki_open("../example", O_RDONLY, 0); |
307 EXPECT_NE(-1, fd2); | 386 ASSERT_GE(fd2, 0); |
308 EXPECT_EQ(0, ki_fchdir(fd2)); | 387 EXPECT_EQ(0, ki_fchdir(fd2)); |
309 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); | 388 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); |
310 EXPECT_STREQ("/example", text); | 389 EXPECT_STREQ("/example", text); |
311 | 390 |
312 EXPECT_EQ(0, ki_chdir("/foo")); | 391 EXPECT_EQ(0, ki_chdir("/foo")); |
313 fd3 = ki_open("../test", O_CREAT | O_RDWR, 0777); | 392 fd3 = ki_open("../test", O_CREAT | O_RDWR, 0777); |
314 EXPECT_NE(-1, fd3); | 393 ASSERT_GE(fd3, 0); |
315 EXPECT_EQ(-1, ki_fchdir(fd3)); | 394 EXPECT_EQ(-1, ki_fchdir(fd3)); |
316 EXPECT_EQ(ENOTDIR, errno); | 395 EXPECT_EQ(ENOTDIR, errno); |
317 | 396 |
318 EXPECT_EQ(0, ki_chdir("/foo")); | 397 EXPECT_EQ(0, ki_chdir("/foo")); |
319 fd4 = ki_open("bar", O_RDONLY, 0); | 398 fd4 = ki_open("bar", O_RDONLY, 0); |
399 ASSERT_GE(fd4, 0); | |
320 EXPECT_EQ(0, ki_fchdir(fd4)); | 400 EXPECT_EQ(0, ki_fchdir(fd4)); |
321 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); | 401 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); |
322 EXPECT_STREQ("/foo/bar", text); | 402 EXPECT_STREQ("/foo/bar", text); |
323 EXPECT_EQ(0, ki_chdir("/example")); | 403 EXPECT_EQ(0, ki_chdir("/example")); |
324 EXPECT_EQ(0, ki_fchdir(fd4)); | 404 EXPECT_EQ(0, ki_fchdir(fd4)); |
325 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); | 405 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); |
326 EXPECT_STREQ("/foo/bar", text); | 406 EXPECT_STREQ("/foo/bar", text); |
327 | 407 |
328 EXPECT_EQ(0, ki_chdir("/example")); | 408 EXPECT_EQ(0, ki_chdir("/example")); |
329 fd5 = ki_dup(fd4); | 409 fd5 = ki_dup(fd4); |
330 ASSERT_GT(fd5, -1); | 410 ASSERT_GE(fd5, 0); |
331 ASSERT_NE(fd4, fd5); | 411 ASSERT_NE(fd4, fd5); |
332 EXPECT_EQ(0, ki_fchdir(fd5)); | 412 EXPECT_EQ(0, ki_fchdir(fd5)); |
333 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); | 413 EXPECT_EQ(text, ki_getcwd(text, sizeof(text))); |
334 EXPECT_STREQ("/foo/bar", text); | 414 EXPECT_STREQ("/foo/bar", text); |
335 | 415 |
336 fd5 = 123; | 416 fd5 = 123; |
337 | 417 |
338 EXPECT_EQ(0, ki_chdir("/example")); | 418 EXPECT_EQ(0, ki_chdir("/example")); |
339 EXPECT_EQ(fd5, ki_dup2(fd4, fd5)); | 419 EXPECT_EQ(fd5, ki_dup2(fd4, fd5)); |
340 EXPECT_EQ(0, ki_fchdir(fd5)); | 420 EXPECT_EQ(0, ki_fchdir(fd5)); |
(...skipping 116 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
457 EXPECT_EQ(0, ki_close(fd1)); | 537 EXPECT_EQ(0, ki_close(fd1)); |
458 | 538 |
459 // Truncate should fail if the file is not writable. | 539 // Truncate should fail if the file is not writable. |
460 EXPECT_EQ(0, ki_chmod("/trunc", 0444)); | 540 EXPECT_EQ(0, ki_chmod("/trunc", 0444)); |
461 EXPECT_EQ(-1, ki_truncate("/trunc", 0)); | 541 EXPECT_EQ(-1, ki_truncate("/trunc", 0)); |
462 EXPECT_EQ(EACCES, errno); | 542 EXPECT_EQ(EACCES, errno); |
463 } | 543 } |
464 | 544 |
465 TEST_F(KernelProxyTest, Lseek) { | 545 TEST_F(KernelProxyTest, Lseek) { |
466 int fd = ki_open("/foo", O_CREAT | O_RDWR, 0777); | 546 int fd = ki_open("/foo", O_CREAT | O_RDWR, 0777); |
467 ASSERT_GT(fd, -1); | 547 ASSERT_GE(fd, 0); |
468 ASSERT_EQ(9, ki_write(fd, "Some text", 9)); | 548 ASSERT_EQ(9, ki_write(fd, "Some text", 9)); |
469 | 549 |
470 ASSERT_EQ(9, ki_lseek(fd, 0, SEEK_CUR)); | 550 ASSERT_EQ(9, ki_lseek(fd, 0, SEEK_CUR)); |
471 ASSERT_EQ(9, ki_lseek(fd, 0, SEEK_END)); | 551 ASSERT_EQ(9, ki_lseek(fd, 0, SEEK_END)); |
472 ASSERT_EQ(-1, ki_lseek(fd, -1, SEEK_SET)); | 552 ASSERT_EQ(-1, ki_lseek(fd, -1, SEEK_SET)); |
473 ASSERT_EQ(EINVAL, errno); | 553 ASSERT_EQ(EINVAL, errno); |
474 | 554 |
475 // Seek past end of file. | 555 // Seek past end of file. |
476 ASSERT_EQ(13, ki_lseek(fd, 13, SEEK_SET)); | 556 ASSERT_EQ(13, ki_lseek(fd, 13, SEEK_SET)); |
477 char buffer[4]; | 557 char buffer[4]; |
478 memset(&buffer[0], 0xfe, 4); | 558 memset(&buffer[0], 0xfe, 4); |
479 ASSERT_EQ(9, ki_lseek(fd, -4, SEEK_END)); | 559 ASSERT_EQ(9, ki_lseek(fd, -4, SEEK_END)); |
480 ASSERT_EQ(9, ki_lseek(fd, 0, SEEK_CUR)); | 560 ASSERT_EQ(9, ki_lseek(fd, 0, SEEK_CUR)); |
481 ASSERT_EQ(4, ki_read(fd, &buffer[0], 4)); | 561 ASSERT_EQ(4, ki_read(fd, &buffer[0], 4)); |
482 ASSERT_EQ(0, memcmp("\0\0\0\0", buffer, 4)); | 562 ASSERT_EQ(0, memcmp("\0\0\0\0", buffer, 4)); |
483 } | 563 } |
484 | 564 |
485 TEST_F(KernelProxyTest, CloseTwice) { | 565 TEST_F(KernelProxyTest, CloseTwice) { |
486 int fd = ki_open("/foo", O_CREAT | O_RDWR, 0777); | 566 int fd = ki_open("/foo", O_CREAT | O_RDWR, 0777); |
487 ASSERT_GT(fd, -1); | 567 ASSERT_GE(fd, 0); |
488 | 568 |
489 EXPECT_EQ(9, ki_write(fd, "Some text", 9)); | 569 EXPECT_EQ(9, ki_write(fd, "Some text", 9)); |
490 | 570 |
491 int fd2 = ki_dup(fd); | 571 int fd2 = ki_dup(fd); |
492 ASSERT_GT(fd2, -1); | 572 ASSERT_GE(fd2, 0); |
493 | 573 |
494 EXPECT_EQ(0, ki_close(fd)); | 574 EXPECT_EQ(0, ki_close(fd)); |
495 EXPECT_EQ(0, ki_close(fd2)); | 575 EXPECT_EQ(0, ki_close(fd2)); |
496 } | 576 } |
497 | 577 |
498 TEST_F(KernelProxyTest, Dup) { | 578 TEST_F(KernelProxyTest, Dup) { |
499 int fd = ki_open("/foo", O_CREAT | O_RDWR, 0777); | 579 int fd = ki_open("/foo", O_CREAT | O_RDWR, 0777); |
500 ASSERT_GT(fd, -1); | 580 ASSERT_GE(fd, 0); |
501 | 581 |
502 int dup_fd = ki_dup(fd); | 582 int dup_fd = ki_dup(fd); |
503 ASSERT_NE(-1, dup_fd); | 583 ASSERT_NE(-1, dup_fd); |
504 | 584 |
505 ASSERT_EQ(9, ki_write(fd, "Some text", 9)); | 585 ASSERT_EQ(9, ki_write(fd, "Some text", 9)); |
506 ASSERT_EQ(9, ki_lseek(fd, 0, SEEK_CUR)); | 586 ASSERT_EQ(9, ki_lseek(fd, 0, SEEK_CUR)); |
507 ASSERT_EQ(9, ki_lseek(dup_fd, 0, SEEK_CUR)); | 587 ASSERT_EQ(9, ki_lseek(dup_fd, 0, SEEK_CUR)); |
508 | 588 |
509 int dup2_fd = 123; | 589 int dup2_fd = 123; |
510 ASSERT_EQ(dup2_fd, ki_dup2(fd, dup2_fd)); | 590 ASSERT_EQ(dup2_fd, ki_dup2(fd, dup2_fd)); |
(...skipping 17 matching lines...) Expand all Loading... | |
528 } | 608 } |
529 | 609 |
530 TEST_F(KernelProxyTest, DescriptorAllocationConsistency) { | 610 TEST_F(KernelProxyTest, DescriptorAllocationConsistency) { |
531 // Check that the descriptor free list returns the expected ones, | 611 // Check that the descriptor free list returns the expected ones, |
532 // as the order is mandated by POSIX. | 612 // as the order is mandated by POSIX. |
533 | 613 |
534 // Open a file to a get a descriptor to copy for this test. | 614 // Open a file to a get a descriptor to copy for this test. |
535 // The test makes the assumption at all descriptors | 615 // The test makes the assumption at all descriptors |
536 // open by default are contiguous starting from zero. | 616 // open by default are contiguous starting from zero. |
537 int fd = ki_open("/foo", O_CREAT | O_RDWR, 0777); | 617 int fd = ki_open("/foo", O_CREAT | O_RDWR, 0777); |
538 ASSERT_GT(fd, -1); | 618 ASSERT_GE(fd, 0); |
539 | 619 |
540 // The next descriptor allocated should follow the first. | 620 // The next descriptor allocated should follow the first. |
541 int dup_fd = ki_dup(fd); | 621 int dup_fd = ki_dup(fd); |
542 ASSERT_EQ(fd + 1, dup_fd); | 622 ASSERT_EQ(fd + 1, dup_fd); |
543 | 623 |
544 // Allocate a high descriptor number. | 624 // Allocate a high descriptor number. |
545 ASSERT_EQ(100, ki_dup2(fd, 100)); | 625 ASSERT_EQ(100, ki_dup2(fd, 100)); |
546 | 626 |
547 // The next descriptor allocate should still come 2 places | 627 // The next descriptor allocate should still come 2 places |
548 // after the first. | 628 // after the first. |
549 int dup_fd2 = ki_dup(fd); | 629 int dup_fd2 = ki_dup(fd); |
550 ASSERT_EQ(fd + 2, dup_fd2); | 630 ASSERT_EQ(fd + 2, dup_fd2); |
551 } | 631 } |
552 | 632 |
553 TEST_F(KernelProxyTest, Lstat) { | 633 TEST_F(KernelProxyTest, Lstat) { |
554 int fd = ki_open("/foo", O_CREAT | O_RDWR, 0777); | 634 int fd = ki_open("/foo", O_CREAT | O_RDWR, 0777); |
555 ASSERT_GT(fd, -1); | 635 ASSERT_GE(fd, 0); |
556 ASSERT_EQ(0, ki_mkdir("/bar", S_IREAD | S_IWRITE)); | 636 ASSERT_EQ(0, ki_mkdir("/bar", S_IREAD | S_IWRITE)); |
557 | 637 |
558 struct stat buf; | 638 struct stat buf; |
559 EXPECT_EQ(0, ki_lstat("/foo", &buf)); | 639 EXPECT_EQ(0, ki_lstat("/foo", &buf)); |
560 EXPECT_EQ(0, buf.st_size); | 640 EXPECT_EQ(0, buf.st_size); |
561 EXPECT_TRUE(S_ISREG(buf.st_mode)); | 641 EXPECT_TRUE(S_ISREG(buf.st_mode)); |
562 | 642 |
563 EXPECT_EQ(0, ki_lstat("/bar", &buf)); | 643 EXPECT_EQ(0, ki_lstat("/bar", &buf)); |
564 EXPECT_EQ(0, buf.st_size); | 644 EXPECT_EQ(0, buf.st_size); |
565 EXPECT_TRUE(S_ISDIR(buf.st_mode)); | 645 EXPECT_TRUE(S_ISDIR(buf.st_mode)); |
(...skipping 45 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
611 // is ignored. | 691 // is ignored. |
612 ASSERT_EQ(0, ki_fchmod(fd, S_IFBLK | 0222)); | 692 ASSERT_EQ(0, ki_fchmod(fd, S_IFBLK | 0222)); |
613 ASSERT_EQ(0, ki_stat("/foo", &buf)); | 693 ASSERT_EQ(0, ki_stat("/foo", &buf)); |
614 EXPECT_TRUE(S_ISREG(buf.st_mode)); | 694 EXPECT_TRUE(S_ISREG(buf.st_mode)); |
615 ASSERT_EQ(0222, buf.st_mode & 0777); | 695 ASSERT_EQ(0222, buf.st_mode & 0777); |
616 } | 696 } |
617 | 697 |
618 TEST_F(KernelProxyTest, OpenDirectory) { | 698 TEST_F(KernelProxyTest, OpenDirectory) { |
619 // Opening a directory for read should succeed. | 699 // Opening a directory for read should succeed. |
620 int fd = ki_open("/", O_RDONLY, 0); | 700 int fd = ki_open("/", O_RDONLY, 0); |
621 ASSERT_GT(fd, -1); | 701 ASSERT_GE(fd, 0); |
622 | 702 |
623 // Opening a directory for write should fail. | 703 // Opening a directory for write should fail. |
624 EXPECT_EQ(-1, ki_open("/", O_RDWR, 0)); | 704 EXPECT_EQ(-1, ki_open("/", O_RDWR, 0)); |
625 EXPECT_EQ(errno, EISDIR); | 705 EXPECT_EQ(errno, EISDIR); |
626 EXPECT_EQ(-1, ki_open("/", O_WRONLY, 0)); | 706 EXPECT_EQ(-1, ki_open("/", O_WRONLY, 0)); |
627 EXPECT_EQ(errno, EISDIR); | 707 EXPECT_EQ(errno, EISDIR); |
628 } | 708 } |
629 | 709 |
630 TEST_F(KernelProxyTest, OpenWithMode) { | 710 TEST_F(KernelProxyTest, OpenWithMode) { |
631 int fd = ki_open("/foo", O_CREAT | O_RDWR, 0723); | 711 int fd = ki_open("/foo", O_CREAT | O_RDWR, 0723); |
632 ASSERT_GT(fd, -1); | 712 ASSERT_GE(fd, 0); |
633 | 713 |
634 struct stat buf; | 714 struct stat buf; |
635 EXPECT_EQ(0, ki_lstat("/foo", &buf)); | 715 EXPECT_EQ(0, ki_lstat("/foo", &buf)); |
636 EXPECT_EQ(0723, buf.st_mode & 0777); | 716 EXPECT_EQ(0723, buf.st_mode & 0777); |
637 } | 717 } |
638 | 718 |
639 TEST_F(KernelProxyTest, CreateWronlyWithReadOnlyMode) { | 719 TEST_F(KernelProxyTest, CreateWronlyWithReadOnlyMode) { |
640 int fd = ki_open("/foo", O_CREAT | O_WRONLY, 0444); | 720 int fd = ki_open("/foo", O_CREAT | O_WRONLY, 0444); |
641 ASSERT_GT(fd, -1); | 721 ASSERT_GE(fd, 0); |
642 } | 722 } |
643 | 723 |
644 TEST_F(KernelProxyTest, UseAfterClose) { | 724 TEST_F(KernelProxyTest, UseAfterClose) { |
645 int fd = ki_open("/dummy", O_CREAT | O_WRONLY, 0777); | 725 int fd = ki_open("/dummy", O_CREAT | O_WRONLY, 0777); |
646 ASSERT_GT(fd, -1); | 726 ASSERT_GE(fd, 0); |
647 EXPECT_EQ(5, ki_write(fd, "hello", 5)); | 727 EXPECT_EQ(5, ki_write(fd, "hello", 5)); |
648 EXPECT_EQ(0, ki_close(fd)); | 728 EXPECT_EQ(0, ki_close(fd)); |
649 EXPECT_EQ(-1, ki_write(fd, "hello", 5)); | 729 EXPECT_EQ(-1, ki_write(fd, "hello", 5)); |
650 EXPECT_EQ(EBADF, errno); | 730 EXPECT_EQ(EBADF, errno); |
651 } | 731 } |
652 | 732 |
653 TEST_F(KernelProxyTest, Utimes) { | 733 TEST_F(KernelProxyTest, Utimes) { |
654 struct timeval times[2]; | 734 struct timeval times[2]; |
655 times[0].tv_sec = 1000; | 735 times[0].tv_sec = 1000; |
656 times[0].tv_usec = 2000; | 736 times[0].tv_usec = 2000; |
657 times[1].tv_sec = 3000; | 737 times[1].tv_sec = 3000; |
658 times[1].tv_usec = 4000; | 738 times[1].tv_usec = 4000; |
659 | 739 |
660 int fd = ki_open("/dummy", O_CREAT | O_WRONLY, 0222); | 740 int fd = ki_open("/dummy", O_CREAT | O_WRONLY, 0222); |
661 ASSERT_GT(fd, -1); | 741 ASSERT_GE(fd, 0); |
662 EXPECT_EQ(0, ki_close(fd)); | 742 EXPECT_EQ(0, ki_close(fd)); |
663 | 743 |
664 // utime should work if the file is write-only. | 744 // utime should work if the file is write-only. |
665 EXPECT_EQ(0, ki_utimes("/dummy", times)); | 745 EXPECT_EQ(0, ki_utimes("/dummy", times)); |
666 | 746 |
667 // utime should work on directories (which can never be opened for write) | 747 // utime should work on directories (which can never be opened for write) |
668 EXPECT_EQ(0, ki_utimes("/", times)); | 748 EXPECT_EQ(0, ki_utimes("/", times)); |
669 | 749 |
670 // or if the file is read-only. | 750 // or if the file is read-only. |
671 EXPECT_EQ(0, ki_chmod("/dummy", 0444)); | 751 EXPECT_EQ(0, ki_chmod("/dummy", 0444)); |
(...skipping 18 matching lines...) Expand all Loading... | |
690 buf.st_mtime > tm.tv_sec || | 770 buf.st_mtime > tm.tv_sec || |
691 (buf.st_mtime == tm.tv_sec && buf.st_mtimensec >= tm.tv_usec * 1000)); | 771 (buf.st_mtime == tm.tv_sec && buf.st_mtimensec >= tm.tv_usec * 1000)); |
692 } | 772 } |
693 | 773 |
694 TEST_F(KernelProxyTest, Utime) { | 774 TEST_F(KernelProxyTest, Utime) { |
695 struct utimbuf times; | 775 struct utimbuf times; |
696 times.actime = 1000; | 776 times.actime = 1000; |
697 times.modtime = 2000; | 777 times.modtime = 2000; |
698 | 778 |
699 int fd = ki_open("/dummy", O_CREAT | O_WRONLY, 0222); | 779 int fd = ki_open("/dummy", O_CREAT | O_WRONLY, 0222); |
700 ASSERT_GT(fd, -1); | 780 ASSERT_GE(fd, 0); |
701 EXPECT_EQ(0, ki_close(fd)); | 781 EXPECT_EQ(0, ki_close(fd)); |
702 | 782 |
703 // utime should work if the file is write-only. | 783 // utime should work if the file is write-only. |
704 EXPECT_EQ(0, ki_utime("/dummy", ×)); | 784 EXPECT_EQ(0, ki_utime("/dummy", ×)); |
705 | 785 |
706 // or if the file is read-only. | 786 // or if the file is read-only. |
707 EXPECT_EQ(0, ki_chmod("/dummy", 0444)); | 787 EXPECT_EQ(0, ki_chmod("/dummy", 0444)); |
708 EXPECT_EQ(0, ki_utime("/dummy", ×)); | 788 EXPECT_EQ(0, ki_utime("/dummy", ×)); |
709 | 789 |
710 // times can be NULL. In that case the access/mod times will be set to the | 790 // times can be NULL. In that case the access/mod times will be set to the |
(...skipping 14 matching lines...) Expand all Loading... | |
725 EXPECT_TRUE( | 805 EXPECT_TRUE( |
726 buf.st_mtime > tm.tv_sec || | 806 buf.st_mtime > tm.tv_sec || |
727 (buf.st_mtime == tm.tv_sec && buf.st_mtimensec >= tm.tv_usec * 1000)); | 807 (buf.st_mtime == tm.tv_sec && buf.st_mtimensec >= tm.tv_usec * 1000)); |
728 } | 808 } |
729 | 809 |
730 TEST_F(KernelProxyTest, Umask) { | 810 TEST_F(KernelProxyTest, Umask) { |
731 mode_t oldmask = ki_umask(0222); | 811 mode_t oldmask = ki_umask(0222); |
732 EXPECT_EQ(0, oldmask); | 812 EXPECT_EQ(0, oldmask); |
733 | 813 |
734 int fd = ki_open("/foo", O_CREAT | O_RDONLY, 0666); | 814 int fd = ki_open("/foo", O_CREAT | O_RDONLY, 0666); |
735 ASSERT_GT(fd, -1); | 815 ASSERT_GE(fd, 0); |
736 ki_close(fd); | 816 ki_close(fd); |
737 | 817 |
738 EXPECT_EQ(0, ki_mkdir("/dir", 0777)); | 818 EXPECT_EQ(0, ki_mkdir("/dir", 0777)); |
739 | 819 |
740 struct stat buf; | 820 struct stat buf; |
741 EXPECT_EQ(0, ki_stat("/foo", &buf)); | 821 EXPECT_EQ(0, ki_stat("/foo", &buf)); |
742 EXPECT_EQ(0444, buf.st_mode & 0777); | 822 EXPECT_EQ(0444, buf.st_mode & 0777); |
743 | 823 |
744 EXPECT_EQ(0, ki_stat("/dir", &buf)); | 824 EXPECT_EQ(0, ki_stat("/dir", &buf)); |
745 EXPECT_EQ(0555, buf.st_mode & 0777); | 825 EXPECT_EQ(0555, buf.st_mode & 0777); |
(...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
797 | 877 |
798 void TearDown() { | 878 void TearDown() { |
799 g_string_map.clear(); | 879 g_string_map.clear(); |
800 ki_uninit(); | 880 ki_uninit(); |
801 } | 881 } |
802 | 882 |
803 protected: | 883 protected: |
804 KernelProxyMountTest_KernelProxy kp_; | 884 KernelProxyMountTest_KernelProxy kp_; |
805 }; | 885 }; |
806 | 886 |
807 // Helper function for calling ki_ioctl without having | |
808 // to construct a va_list. | |
809 int ki_ioctl_wrapper(int fd, int request, ...) { | |
810 va_list ap; | |
811 va_start(ap, request); | |
812 int rtn = ki_ioctl(fd, request, ap); | |
813 va_end(ap); | |
814 return rtn; | |
815 } | |
816 | |
817 } // namespace | 887 } // namespace |
818 | 888 |
819 TEST_F(KernelProxyMountTest, MountInit) { | 889 TEST_F(KernelProxyMountTest, MountInit) { |
820 int res1 = ki_mount("/", "/mnt1", "initfs", 0, "false,foo=bar"); | 890 ASSERT_EQ(0, ki_mkdir("/mnt1", 0777)); |
891 int res1 = ki_mount("", "/mnt1", "initfs", 0, "false,foo=bar"); | |
821 | 892 |
822 EXPECT_EQ("bar", g_string_map["foo"]); | 893 EXPECT_EQ("bar", g_string_map["foo"]); |
823 EXPECT_EQ(-1, res1); | 894 EXPECT_EQ(-1, res1); |
824 EXPECT_EQ(EINVAL, errno); | 895 EXPECT_EQ(EINVAL, errno); |
825 | 896 |
826 int res2 = ki_mount("/", "/mnt2", "initfs", 0, "true,bar=foo,x=y"); | 897 ASSERT_EQ(0, ki_mkdir("/mnt2", 0777)); |
898 int res2 = ki_mount("", "/mnt2", "initfs", 0, "true,bar=foo,x=y"); | |
827 EXPECT_NE(-1, res2); | 899 EXPECT_NE(-1, res2); |
828 EXPECT_EQ("y", g_string_map["x"]); | 900 EXPECT_EQ("y", g_string_map["x"]); |
901 | |
902 } | |
903 | |
904 TEST_F(KernelProxyMountTest, Passthroughfs) { | |
905 ASSERT_EQ(0, ki_mkdir("/passthrough", 0777)); | |
906 int res1 = ki_mount("", "/passthrough", "passthroughfs", 0, ""); | |
907 EXPECT_NE(-1, res1); | |
908 check_dir_contents("/passthrough", NULL, -1); | |
binji
2015/01/07 19:14:59
This is a manual test only?
Sam Clegg
2015/01/08 12:59:07
It verified that the directory can be read, nothin
| |
829 } | 909 } |
830 | 910 |
831 TEST_F(KernelProxyMountTest, MountAndIoctl) { | 911 TEST_F(KernelProxyMountTest, MountAndIoctl) { |
832 ASSERT_EQ(0, ki_mount("/", "/mnt1", "initfs", 0, "")); | 912 ASSERT_EQ(0, ki_mkdir("/mnt1", 0777)); |
913 ASSERT_EQ(0, ki_mount("", "/mnt1", "initfs", 0, "")); | |
833 ASSERT_NE(-1, g_fs_dev); | 914 ASSERT_NE(-1, g_fs_dev); |
834 | 915 |
835 char path[100]; | 916 char path[100]; |
836 snprintf(path, 100, "dev/fs/%d", g_fs_dev); | 917 snprintf(path, 100, "/dev/fs/%d", g_fs_dev); |
837 | 918 |
838 int fd = ki_open(path, O_RDONLY, 0); | 919 int fd = ki_open(path, O_RDONLY, 0); |
839 ASSERT_GT(fd, -1); | 920 ASSERT_GE(fd, 0); |
840 | 921 |
841 EXPECT_EQ(0, ki_ioctl_wrapper(fd, 0xdeadbeef)); | 922 EXPECT_EQ(0, ki_ioctl_wrapper(fd, 0xdeadbeef)); |
842 EXPECT_EQ(true, g_fs_ioctl_called); | 923 EXPECT_EQ(true, g_fs_ioctl_called); |
843 } | 924 } |
844 | 925 |
845 static void mount_callback(const char* source, | 926 static void mount_callback(const char* source, |
846 const char* target, | 927 const char* target, |
847 const char* filesystemtype, | 928 const char* filesystemtype, |
848 unsigned long mountflags, | 929 unsigned long mountflags, |
849 const void* data, | 930 const void* data, |
850 dev_t dev, | 931 dev_t dev, |
851 void* user_data) { | 932 void* user_data) { |
852 EXPECT_STREQ("/", source); | 933 EXPECT_STREQ("dummy", source); |
853 EXPECT_STREQ("/mnt1", target); | 934 EXPECT_STREQ("/mnt1", target); |
854 EXPECT_STREQ("initfs", filesystemtype); | 935 EXPECT_STREQ("initfs", filesystemtype); |
855 EXPECT_EQ(0, mountflags); | 936 EXPECT_EQ(0, mountflags); |
856 EXPECT_STREQ("", (const char*) data); | 937 EXPECT_STREQ("", (const char*) data); |
857 EXPECT_EQ(g_fs_dev, dev); | 938 EXPECT_EQ(g_fs_dev, dev); |
858 | 939 |
859 bool* callback_called = static_cast<bool*>(user_data); | 940 bool* callback_called = static_cast<bool*>(user_data); |
860 *callback_called = true; | 941 *callback_called = true; |
861 } | 942 } |
862 | 943 |
863 TEST_F(KernelProxyMountTest, MountCallback) { | 944 TEST_F(KernelProxyMountTest, MountCallback) { |
864 bool callback_called = false; | 945 bool callback_called = false; |
865 kp_.SetMountCallback(&mount_callback, &callback_called); | 946 kp_.SetMountCallback(&mount_callback, &callback_called); |
866 ASSERT_EQ(0, ki_mount("/", "/mnt1", "initfs", 0, "")); | 947 ASSERT_EQ(0, ki_mkdir("/mnt1", 0777)); |
948 ASSERT_EQ(0, ki_mount("dummy", "/mnt1", "initfs", 0, "")); | |
867 ASSERT_NE(-1, g_fs_dev); | 949 ASSERT_NE(-1, g_fs_dev); |
868 EXPECT_EQ(true, callback_called); | 950 EXPECT_EQ(true, callback_called); |
869 } | 951 } |
870 | 952 |
871 namespace { | 953 namespace { |
872 | 954 |
873 int g_MMapCount = 0; | 955 int g_MMapCount = 0; |
874 | 956 |
875 class KernelProxyMMapTest_Node : public Node { | 957 class KernelProxyMMapTest_Node : public Node { |
876 public: | 958 public: |
(...skipping 70 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
947 | 1029 |
948 void TearDown() { ki_uninit(); } | 1030 void TearDown() { ki_uninit(); } |
949 | 1031 |
950 private: | 1032 private: |
951 KernelProxyMMapTest_KernelProxy kp_; | 1033 KernelProxyMMapTest_KernelProxy kp_; |
952 }; | 1034 }; |
953 | 1035 |
954 } // namespace | 1036 } // namespace |
955 | 1037 |
956 TEST_F(KernelProxyMMapTest, MMap) { | 1038 TEST_F(KernelProxyMMapTest, MMap) { |
957 ASSERT_EQ(0, ki_umount("/")); | 1039 ASSERT_EQ(0, ki_mkdir("/mmap", 0777)); |
958 ASSERT_EQ(0, ki_mount("", "/", "mmapfs", 0, NULL)); | 1040 ASSERT_EQ(0, ki_mount("", "/mmap", "mmapfs", 0, NULL)); |
959 int fd = ki_open("/file", O_RDWR | O_CREAT, 0777); | 1041 int fd = ki_open("/mmap/file", O_RDWR | O_CREAT, 0777); |
960 ASSERT_NE(-1, fd); | 1042 ASSERT_NE(-1, fd); |
961 | 1043 |
962 void* addr1 = ki_mmap(NULL, 0x800, PROT_READ, MAP_PRIVATE, fd, 0); | 1044 void* addr1 = ki_mmap(NULL, 0x800, PROT_READ, MAP_PRIVATE, fd, 0); |
963 ASSERT_EQ(reinterpret_cast<void*>(0x1000), addr1); | 1045 ASSERT_EQ(reinterpret_cast<void*>(0x1000), addr1); |
964 ASSERT_EQ(1, g_MMapCount); | 1046 ASSERT_EQ(1, g_MMapCount); |
965 | 1047 |
966 void* addr2 = ki_mmap(NULL, 0x800, PROT_READ, MAP_PRIVATE, fd, 0); | 1048 void* addr2 = ki_mmap(NULL, 0x800, PROT_READ, MAP_PRIVATE, fd, 0); |
967 ASSERT_EQ(reinterpret_cast<void*>(0x2000), addr2); | 1049 ASSERT_EQ(reinterpret_cast<void*>(0x2000), addr2); |
968 ASSERT_EQ(2, g_MMapCount); | 1050 ASSERT_EQ(2, g_MMapCount); |
969 | 1051 |
(...skipping 43 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
1013 ScopedRef<MockFs> fs_; | 1095 ScopedRef<MockFs> fs_; |
1014 }; | 1096 }; |
1015 | 1097 |
1016 class KernelProxyErrorTest : public ::testing::Test { | 1098 class KernelProxyErrorTest : public ::testing::Test { |
1017 public: | 1099 public: |
1018 KernelProxyErrorTest() {} | 1100 KernelProxyErrorTest() {} |
1019 | 1101 |
1020 void SetUp() { | 1102 void SetUp() { |
1021 ASSERT_EQ(0, ki_push_state_for_testing()); | 1103 ASSERT_EQ(0, ki_push_state_for_testing()); |
1022 ASSERT_EQ(0, ki_init(&kp_)); | 1104 ASSERT_EQ(0, ki_init(&kp_)); |
1023 // Unmount the passthrough FS and mount a testfs. | 1105 // Unmount root fs and mount a testfs. |
1024 EXPECT_EQ(0, kp_.umount("/")); | 1106 EXPECT_EQ(0, kp_.umount("/")); |
1025 EXPECT_EQ(0, kp_.mount("", "/", "testfs", 0, NULL)); | 1107 EXPECT_EQ(0, kp_.mount("", "/", "testfs", 0, NULL)); |
1026 } | 1108 } |
1027 | 1109 |
1028 void TearDown() { ki_uninit(); } | 1110 void TearDown() { ki_uninit(); } |
1029 | 1111 |
1030 ScopedRef<MockFs> fs() { return kp_.fs(); } | 1112 ScopedRef<MockFs> fs() { return kp_.fs(); } |
1031 | 1113 |
1032 private: | 1114 private: |
1033 KernelProxyErrorTest_KernelProxy kp_; | 1115 KernelProxyErrorTest_KernelProxy kp_; |
(...skipping 37 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
1071 | 1153 |
1072 int fd = ki_open("/dummy", O_RDONLY, 0); | 1154 int fd = ki_open("/dummy", O_RDONLY, 0); |
1073 EXPECT_NE(0, fd); | 1155 EXPECT_NE(0, fd); |
1074 | 1156 |
1075 char buf[20]; | 1157 char buf[20]; |
1076 EXPECT_EQ(-1, ki_read(fd, &buf[0], 20)); | 1158 EXPECT_EQ(-1, ki_read(fd, &buf[0], 20)); |
1077 // The Filesystem should be able to return whatever error it wants and have it | 1159 // The Filesystem should be able to return whatever error it wants and have it |
1078 // propagate through. | 1160 // propagate through. |
1079 EXPECT_EQ(1234, errno); | 1161 EXPECT_EQ(1234, errno); |
1080 } | 1162 } |
OLD | NEW |