[LTP] [PATCH 1/2] syscalls: Add test for splicing from /dev/zero and /dev/full
Cyril Hrubis
chrubis@suse.cz
Wed Mar 20 10:59:26 CET 2024
Both of these devices produce zeroes when read.
Signed-off-by: Cyril Hrubis <chrubis@suse.cz>
---
runtest/syscalls | 1 +
testcases/kernel/syscalls/splice/.gitignore | 1 +
testcases/kernel/syscalls/splice/splice08.c | 88 +++++++++++++++++++++
3 files changed, 90 insertions(+)
create mode 100644 testcases/kernel/syscalls/splice/splice08.c
diff --git a/runtest/syscalls b/runtest/syscalls
index 4ed2b5602..0889f58a1 100644
--- a/runtest/syscalls
+++ b/runtest/syscalls
@@ -1517,6 +1517,7 @@ splice04 splice04
splice05 splice05
splice06 splice06
splice07 splice07
+splice08 splice08
tee01 tee01
tee02 tee02
diff --git a/testcases/kernel/syscalls/splice/.gitignore b/testcases/kernel/syscalls/splice/.gitignore
index 88a8dff78..9453cf93a 100644
--- a/testcases/kernel/syscalls/splice/.gitignore
+++ b/testcases/kernel/syscalls/splice/.gitignore
@@ -5,3 +5,4 @@
/splice05
/splice06
/splice07
+/splice08
diff --git a/testcases/kernel/syscalls/splice/splice08.c b/testcases/kernel/syscalls/splice/splice08.c
new file mode 100644
index 000000000..cdd51b66c
--- /dev/null
+++ b/testcases/kernel/syscalls/splice/splice08.c
@@ -0,0 +1,88 @@
+// SPDX-License-Identifier: GPL-2.0-or-later
+/*
+ * Copyright (C) 2024 Cyril Hrubis <chrubis@suse.cz>
+ */
+
+/*\
+ * [Description]
+ *
+ * Test for splicing from /dev/zero and /dev/full.
+ *
+ * The support for splicing from /dev/zero and /dev/full was removed in:
+ * c6585011bc1d ("splice: Remove generic_file_splice_read()")
+ *
+ * And added back in:
+ * 1b057bd800c3 ("drivers/char/mem: implement splice() for /dev/zero, /dev/full")
+ */
+
+#define _GNU_SOURCE
+#include "tst_test.h"
+
+static int fd_zero;
+static int fd_full;
+
+static void test_splice(unsigned int bytes, int dev_fd)
+{
+ int pipefd[2];
+ char buf[bytes];
+ size_t i;
+ int fail = 0;
+
+ memset(buf, 0xff, sizeof(buf));
+
+ SAFE_PIPE(pipefd);
+
+ TST_EXP_POSITIVE(splice(dev_fd, NULL, pipefd[1], NULL, sizeof(buf), 0));
+
+ if (!TST_PASS)
+ goto ret;
+
+ SAFE_READ(1, pipefd[0], buf, sizeof(buf));
+
+ for (i = 0; i < sizeof(buf); i++) {
+ if (buf[i])
+ fail++;
+ }
+
+ if (fail)
+ tst_res(TFAIL, "Non-zero bytes spliced from /dev/zero");
+ else
+ tst_res(TPASS, "All bytes spliced from /dev/zero are zeroed");
+
+ret:
+ SAFE_CLOSE(pipefd[0]);
+ SAFE_CLOSE(pipefd[1]);
+}
+
+static void verify_splice(unsigned int n)
+{
+ unsigned int bytes = 1009 * n;
+
+ tst_res(TINFO, "Splicing %u bytes from /dev/zero", bytes);
+ test_splice(bytes, fd_zero);
+ tst_res(TINFO, "Splicing %u bytes from /dev/full", bytes);
+ test_splice(bytes, fd_full);
+}
+
+static void setup(void)
+{
+ fd_zero = SAFE_OPEN("/dev/zero", O_RDONLY);
+ fd_full = SAFE_OPEN("/dev/full", O_RDONLY);
+}
+
+static void cleanup(void)
+{
+ if (fd_zero > 0)
+ SAFE_CLOSE(fd_zero);
+
+ if (fd_full > 0)
+ SAFE_CLOSE(fd_full);
+}
+
+static struct tst_test test = {
+ .test = verify_splice,
+ .tcnt = 9,
+ .setup = setup,
+ .cleanup = cleanup,
+ .min_kver = "6.7",
+};
--
2.43.2
More information about the ltp
mailing list