81 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			C
		
	
	
	
			
		
		
	
	
			81 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			C
		
	
	
	
| // SPDX-License-Identifier: GPL-2.0-or-later
 | |
| /*
 | |
|  * Copyright (c) Ulrich Drepper <drepper@redhat.com>
 | |
|  * Copyright (c) International Business Machines  Corp., 2009
 | |
|  * Copyright (c) 2020 FUJITSU LIMITED. All rights reserved.
 | |
|  *
 | |
|  * Author: Ulrich Drepper <drepper@redhat.com>
 | |
|  *
 | |
|  * History:
 | |
|  *  Created - Jan 13 2009 - Ulrich Drepper <drepper@redhat.com>
 | |
|  *  Ported to LTP - Jan 13 2009 - Subrata <subrata@linux.vnet.ibm.com>
 | |
|  *  Converted into new api - Apri 15 2020 - Yang Xu <xuyang2018.jy@cn.fujitsu.com>
 | |
|  */
 | |
| 
 | |
| #define _GNU_SOURCE
 | |
| #include <stdio.h>
 | |
| #include <unistd.h>
 | |
| #include "lapi/fcntl.h"
 | |
| #include "tst_test.h"
 | |
| 
 | |
| static int fds[2];
 | |
| 
 | |
| static struct tcase {
 | |
| 	int flags;
 | |
| 	int cmd;
 | |
| 	int check_read_end;
 | |
| 	char *message;
 | |
| } tcases[] = {
 | |
| 	{0, F_GETFD, 1, "Test pipe2 with 0 flag"},
 | |
| 	{O_CLOEXEC, F_GETFD, 1, "Test pipe2 using O_CLOEXEC flag"},
 | |
| 	/*
 | |
| 	 * It may get EINVAL error on older kernel because this flag was
 | |
| 	 * introduced since kernel 3.4. We only test flag in write end
 | |
| 	 * because this flag was used to make pipe buffer marked with the
 | |
| 	 * PIPE_BUF_FLAG_PACKET flag. In read end, kernel also checks buffer
 | |
| 	 * flag instead of O_DIRECT. So it make no sense to check this flag
 | |
| 	 * in fds[0].
 | |
| 	 */
 | |
| 	{O_DIRECT, F_GETFL, 0, "Test pipe2 using O_DIRECT flag"},
 | |
| 	{O_NONBLOCK, F_GETFL, 1, "Test pipe2 using O_NONBLOCK flag"},
 | |
| };
 | |
| 
 | |
| static void cleanup(void)
 | |
| {
 | |
| 	if (fds[0] > 0)
 | |
| 		SAFE_CLOSE(fds[0]);
 | |
| 	if (fds[1] > 1)
 | |
| 		SAFE_CLOSE(fds[1]);
 | |
| }
 | |
| 
 | |
| static void verify_pipe2(unsigned int n)
 | |
| {
 | |
| 	struct tcase *tc = &tcases[n];
 | |
| 	int get_flag = 0, i = 0;
 | |
| 
 | |
| 	tst_res(TINFO, "%s ", tc->message);
 | |
| 	if ((tc->flags ==  O_DIRECT) && (tst_kvercmp(3, 4, 0)) < 0) {
 | |
| 		tst_res(TCONF, "O_DIRECT needs Linux 3.4 or newer");
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	SAFE_PIPE2(fds, tc->flags);
 | |
| 	for (i = 0; i < 2; i++) {
 | |
| 		if (i == 0 && !tc->check_read_end)
 | |
| 			continue;
 | |
| 		get_flag = SAFE_FCNTL(fds[i], tc->cmd);
 | |
| 		if ((get_flag && tc->flags) || (tc->flags == get_flag))
 | |
| 			tst_res(TPASS, "pipe2 fds[%d] gets expected flag(%d)", i, tc->flags);
 | |
| 		else
 | |
| 			tst_res(TFAIL, "pipe2 fds[%d] doesn't get expected flag(%d), get flag(%d)",
 | |
| 					i, tc->flags, get_flag);
 | |
| 	}
 | |
| 	cleanup();
 | |
| }
 | |
| 
 | |
| static struct tst_test test = {
 | |
| 	.tcnt = ARRAY_SIZE(tcases),
 | |
| 	.test = verify_pipe2,
 | |
| 	.cleanup = cleanup,
 | |
| };
 |