summaryrefslogtreecommitdiff
path: root/test/sys/test_mman.rs
blob: 152fff69c24de1cd721804524c97fdc08ffa053e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
use nix::Error;
use nix::libc::{c_void, size_t};
use nix::sys::mman::{mmap, MapFlags, ProtFlags};

#[cfg(target_os = "linux")]
use nix::sys::mman::{mremap, MRemapFlags};

#[test]
fn test_mmap_anonymous() {
    let ref mut byte = unsafe {
        let ptr = mmap(std::ptr::null_mut(), 1,
                       ProtFlags::PROT_READ | ProtFlags::PROT_WRITE,
                       MapFlags::MAP_PRIVATE | MapFlags::MAP_ANONYMOUS, -1, 0)
                      .unwrap();
        *(ptr as * mut u8)
    };
    assert_eq !(*byte, 0x00u8);
    *byte = 0xffu8;
    assert_eq !(*byte, 0xffu8);
}

#[test]
#[cfg(target_os = "linux")]
fn test_mremap_grow() {
    const ONE_K : size_t = 1024;
    let slice : &mut[u8] = unsafe {
        let mem = mmap(std::ptr::null_mut(), ONE_K,
                       ProtFlags::PROT_READ | ProtFlags::PROT_WRITE,
                       MapFlags::MAP_ANONYMOUS | MapFlags::MAP_PRIVATE, -1, 0)
                      .unwrap();
        std::slice::from_raw_parts_mut(mem as * mut u8, ONE_K)
    };
    assert_eq !(slice[ONE_K - 1], 0x00);
    slice[ONE_K - 1] = 0xFF;
    assert_eq !(slice[ONE_K - 1], 0xFF);

    let slice : &mut[u8] = unsafe {
        let mem = mremap(slice.as_mut_ptr() as * mut c_void, ONE_K, 10 * ONE_K,
                         MRemapFlags::MREMAP_MAYMOVE, None)
                      .unwrap();
        std::slice::from_raw_parts_mut(mem as * mut u8, 10 * ONE_K)
    };

    // The first KB should still have the old data in it.
    assert_eq !(slice[ONE_K - 1], 0xFF);

    // The additional range should be zero-init'd and accessible.
    assert_eq !(slice[10 * ONE_K - 1], 0x00);
    slice[10 * ONE_K - 1] = 0xFF;
    assert_eq !(slice[10 * ONE_K - 1], 0xFF);
}

#[test]
#[cfg(target_os = "linux")]
fn test_mremap_shrink() {
    const ONE_K : size_t = 1024;
    let slice : &mut[u8] = unsafe {
        let mem = mmap(std::ptr::null_mut(), 10 * ONE_K,
                       ProtFlags::PROT_READ | ProtFlags::PROT_WRITE,
                       MapFlags::MAP_ANONYMOUS | MapFlags::MAP_PRIVATE, -1, 0)
                      .unwrap();
        std::slice::from_raw_parts_mut(mem as * mut u8, ONE_K)
    };
    assert_eq !(slice[ONE_K - 1], 0x00);
    slice[ONE_K - 1] = 0xFF;
    assert_eq !(slice[ONE_K - 1], 0xFF);

    let slice : &mut[u8] = unsafe {
        let mem = mremap(slice.as_mut_ptr() as * mut c_void, 10 * ONE_K, ONE_K,
                         MRemapFlags::empty(), None)
                      .unwrap();
        // Since we didn't supply MREMAP_MAYMOVE, the address should be the
        // same.
        assert_eq !(mem, slice.as_mut_ptr() as * mut c_void);
        std::slice::from_raw_parts_mut(mem as * mut u8, ONE_K)
    };

    // The first KB should still be accessible and have the old data in it.
    assert_eq !(slice[ONE_K - 1], 0xFF);
}