From patchwork Wed Oct 18 05:43:57 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Wei Gao X-Patchwork-Id: 1850565 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=suse.com header.i=@suse.com header.a=rsa-sha256 header.s=susede1 header.b=rzYTZn74; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.linux.it (client-ip=2001:1418:10:5::2; helo=picard.linux.it; envelope-from=ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it; receiver=patchwork.ozlabs.org) Received: from picard.linux.it (picard.linux.it [IPv6:2001:1418:10:5::2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4S9KXr3NCPz20Pd for ; Wed, 18 Oct 2023 16:44:11 +1100 (AEDT) Received: from picard.linux.it (localhost [IPv6:::1]) by picard.linux.it (Postfix) with ESMTP id 64B0F3CD0AD for ; Wed, 18 Oct 2023 07:44:07 +0200 (CEST) X-Original-To: ltp@lists.linux.it Delivered-To: ltp@picard.linux.it Received: from in-7.smtp.seeweb.it (in-7.smtp.seeweb.it [IPv6:2001:4b78:1:20::7]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384)) (No client certificate requested) by picard.linux.it (Postfix) with ESMTPS id 852F13C84C3 for ; Wed, 18 Oct 2023 07:44:05 +0200 (CEST) Received: from smtp-out1.suse.de (smtp-out1.suse.de [IPv6:2001:67c:2178:6::1c]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by in-7.smtp.seeweb.it (Postfix) with ESMTPS id 31A98204714 for ; Wed, 18 Oct 2023 07:44:03 +0200 (CEST) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id 6785F21D1E; Wed, 18 Oct 2023 05:44:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1697607842; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=pDiNihpU/4yQfibyFm1aiKFjOZcYoNydxK4nw2UUXIk=; b=rzYTZn744+bn//StbwegN4rmDYOkWb1wwMYDdijMV5bFEfxK/qyy+aUbx7iBw42t9Hw5Yb PNfxGcwaie47rNn4y0WqyoxezEm9hgp7jfkl//eSWhZ1+ctCt2hjKqnp+SCXo+iYOL3/Vy mUjit12ZC6DKkgZAqtGfnWJ3otyGT7s= Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id C12FA138EF; Wed, 18 Oct 2023 05:44:01 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id A7LeJaFwL2X3MQAAMHmgww (envelope-from ); Wed, 18 Oct 2023 05:44:01 +0000 To: ltp@lists.linux.it Date: Wed, 18 Oct 2023 01:43:57 -0400 Message-Id: <20231018054357.29035-1-wegao@suse.com> X-Mailer: git-send-email 2.35.3 MIME-Version: 1.0 Authentication-Results: smtp-out1.suse.de; none X-Spam-Level: X-Spam-Score: 0.90 X-Spamd-Result: default: False [0.90 / 50.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; R_MISSING_CHARSET(2.50)[]; MIME_GOOD(-0.10)[text/plain]; BROKEN_CONTENT_TYPE(1.50)[]; NEURAL_HAM_LONG(-3.00)[-1.000]; DKIM_SIGNED(0.00)[suse.com:s=susede1]; NEURAL_HAM_SHORT(-1.00)[-1.000]; RCPT_COUNT_TWO(0.00)[2]; MID_CONTAINS_FROM(1.00)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[] X-Virus-Scanned: clamav-milter 1.0.1 at in-7.smtp.seeweb.it X-Virus-Status: Clean X-Spam-Status: No, score=0.1 required=7.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS shortcircuit=no autolearn=disabled version=4.0.0 X-Spam-Checker-Version: SpamAssassin 4.0.0 (2022-12-13) on in-7.smtp.seeweb.it Subject: [LTP] [PATCH v1] ioctl_fiemap01: New test for fiemap ioctl() X-BeenThere: ltp@lists.linux.it X-Mailman-Version: 2.1.29 Precedence: list List-Id: Linux Test Project List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-Patchwork-Original-From: Wei Gao via ltp From: Wei Gao Reply-To: Wei Gao Errors-To: ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it Sender: "ltp" Fix: #535 Signed-off-by: Wei Gao --- runtest/syscalls | 2 + testcases/kernel/syscalls/ioctl/.gitignore | 1 + .../kernel/syscalls/ioctl/ioctl_fiemap01.c | 107 ++++++++++++++++++ 3 files changed, 110 insertions(+) create mode 100644 testcases/kernel/syscalls/ioctl/ioctl_fiemap01.c diff --git a/runtest/syscalls b/runtest/syscalls index 4152e1e5f..c7a0b2301 100644 --- a/runtest/syscalls +++ b/runtest/syscalls @@ -588,6 +588,8 @@ ioctl_ns07 ioctl_ns07 ioctl_sg01 ioctl_sg01 +ioctl_fiemap01 ioctl_fiemap01 + inotify_init1_01 inotify_init1_01 inotify_init1_02 inotify_init1_02 diff --git a/testcases/kernel/syscalls/ioctl/.gitignore b/testcases/kernel/syscalls/ioctl/.gitignore index 5fff7a61d..64adcdfe6 100644 --- a/testcases/kernel/syscalls/ioctl/.gitignore +++ b/testcases/kernel/syscalls/ioctl/.gitignore @@ -22,3 +22,4 @@ /ioctl_ns06 /ioctl_ns07 /ioctl_sg01 +/ioctl_fiemap01 diff --git a/testcases/kernel/syscalls/ioctl/ioctl_fiemap01.c b/testcases/kernel/syscalls/ioctl/ioctl_fiemap01.c new file mode 100644 index 000000000..e0511667e --- /dev/null +++ b/testcases/kernel/syscalls/ioctl/ioctl_fiemap01.c @@ -0,0 +1,107 @@ +// SPDX-License-Identifier: GPL-2.0-only +/* + * Copyright (c) 2023 Wei Gao + */ + +/*\ + * [Description] + * + * Verify basic fiemap ioctl + * + */ + +#include +#include +#include + +#include "tst_test.h" + +#define TESTFILE "testfile" +#define NUM_EXTENT 2 +#define FILE_OFFSET ((rand() % 8 + 2) * getpagesize()) + +static char *buf; + +static void print_extens(struct fiemap *fiemap) +{ + + tst_res(TINFO, "File extent count: %u", fiemap->fm_mapped_extents); + for (unsigned int i = 0; i < fiemap->fm_mapped_extents; ++i) { + tst_res(TINFO, "Extent %u: Logical offset: %llu, Physical offset: %llu, flags: %u, Length: %llu", + i + 1, + fiemap->fm_extents[i].fe_logical, + fiemap->fm_extents[i].fe_physical, + fiemap->fm_extents[i].fe_flags, + fiemap->fm_extents[i].fe_length); + } +} + +static void verify_ioctl(void) +{ + int fd; + struct fiemap *fiemap; + + fd = SAFE_OPEN(TESTFILE, O_RDWR | O_CREAT, 0644); + + fiemap = SAFE_MALLOC(sizeof(struct fiemap) + sizeof(struct fiemap_extent) * NUM_EXTENT); + fiemap->fm_start = 0; + fiemap->fm_length = ~0ULL; + fiemap->fm_extent_count = 1; + + fiemap->fm_flags = -1; + TST_EXP_FAIL(ioctl(fd, FS_IOC_FIEMAP, fiemap), EBADR); + + fiemap->fm_flags = 0; + SAFE_IOCTL(fd, FS_IOC_FIEMAP, fiemap); + print_extens(fiemap); + if (fiemap->fm_mapped_extents == 0) + tst_res(TPASS, "Check fiemap iotct step1 pass"); + + SAFE_WRITE(SAFE_WRITE_ANY, fd, buf, getpagesize()); + SAFE_IOCTL(fd, FS_IOC_FIEMAP, fiemap); + print_extens(fiemap); + if ((fiemap->fm_mapped_extents == 1) && (fiemap->fm_extents[0].fe_physical == 0)) + tst_res(TPASS, "Check fiemap iotct step2 pass"); + + fiemap->fm_flags = FIEMAP_FLAG_SYNC; + SAFE_IOCTL(fd, FS_IOC_FIEMAP, fiemap); + print_extens(fiemap); + if ((fiemap->fm_extent_count == 1) && + (fiemap->fm_extents[0].fe_flags == FIEMAP_EXTENT_LAST) && + (fiemap->fm_extents[0].fe_physical > 0) && + (fiemap->fm_extents[0].fe_length == (__u64)getpagesize())) + tst_res(TPASS, "Check fiemap iotct step3 pass"); + + fiemap->fm_extent_count = NUM_EXTENT; + srand(time(NULL)); + SAFE_LSEEK(fd, FILE_OFFSET, SEEK_SET); + SAFE_WRITE(SAFE_WRITE_ALL, fd, buf, getpagesize()); + SAFE_IOCTL(fd, FS_IOC_FIEMAP, fiemap); + print_extens(fiemap); + if ((fiemap->fm_extent_count == NUM_EXTENT) && + (fiemap->fm_extents[NUM_EXTENT - 1].fe_flags == FIEMAP_EXTENT_LAST) && + (fiemap->fm_extents[NUM_EXTENT - 1].fe_physical > 0) && + (fiemap->fm_extents[NUM_EXTENT - 1].fe_length == (__u64)getpagesize())) + tst_res(TPASS, "Check fiemap iotct step4 pass"); + + free(fiemap); + close(fd); +} + +static void setup(void) +{ + buf = SAFE_MALLOC(getpagesize()); +} + +static void cleanup(void) +{ + free(buf); +} + +static struct tst_test test = { + .setup = setup, + .cleanup = cleanup, + .test_all = verify_ioctl, + .needs_root = 1, + .needs_tmpdir = 1, +};