crosvm/swap/tests/main.rs
Dennis Kempin acc162000f Add conditional compilation for unix-only crates
Instead of configuring which crates to --exclude in
test_config.py, we can use conditional compilation to
exclude code that is not supported on windows.

This allows more fine-grained control and also allows
us to use plain cargo for building without complicated
configuration and exclusions.

BUG=b:265829867
TEST=cargo test --lib --bins --workspace
	--target=x86_64-pc-windows-gnu
	--features=all-mingw64

Change-Id: I8422c3f08053bc27d9896b220876a56bd25543d6
Reviewed-on: https://chromium-review.googlesource.com/c/crosvm/crosvm/+/4165868
Reviewed-by: Vikram Auradkar <auradkar@google.com>
Commit-Queue: Dennis Kempin <denniskempin@google.com>
Reviewed-by: Daniel Verkamp <dverkamp@chromium.org>
2023-01-19 21:21:59 +00:00

85 lines
2.6 KiB
Rust

// Copyright 2022 The ChromiumOS Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
//! Integration tests for vmm-swap feature
#![cfg(unix)]
mod common;
use base::pagesize;
use base::sys::wait_for_pid;
use base::AsRawDescriptor;
use base::FromRawDescriptor;
use base::IntoRawDescriptor;
use base::SafeDescriptor;
use base::Tube;
use common::*;
use swap::register_regions;
use swap::unregister_regions;
use swap::userfaultfd::Userfaultfd;
#[test]
fn register_region_skip_obsolete_process() {
let shm = create_shared_memory("test", 3 * pagesize());
let uffd = create_uffd_for_test();
let base_addr = shm.base_addr();
let regions = [base_addr..(base_addr + 3 * pagesize())];
let (tube_main, tube_child) = Tube::pair().unwrap();
let pid = unsafe { libc::fork() };
if pid == 0 {
// child process
let uffd = create_uffd_for_test();
tube_child
.send(&unsafe { SafeDescriptor::from_raw_descriptor(uffd.as_raw_descriptor()) })
.unwrap();
std::process::exit(0);
}
let uffd_descriptor = tube_main
.recv::<SafeDescriptor>()
.unwrap()
.into_raw_descriptor();
wait_for_pid(pid, 0).unwrap();
let uffd_child = unsafe { Userfaultfd::from_raw_descriptor(uffd_descriptor) };
let result = unsafe { register_regions(&regions, &[uffd, uffd_child]) };
// no error from ENOMEM
assert_eq!(result.is_ok(), true);
}
#[test]
fn unregister_region_skip_obsolete_process() {
let shm = create_shared_memory("test", 3 * pagesize());
let uffd = create_uffd_for_test();
let base_addr = shm.base_addr();
let regions = [base_addr..(base_addr + 3 * pagesize())];
let (tube_main, tube_child) = Tube::pair().unwrap();
let pid = unsafe { libc::fork() };
if pid == 0 {
// child process
let uffd = create_uffd_for_test();
tube_child
.send(&unsafe { SafeDescriptor::from_raw_descriptor(uffd.as_raw_descriptor()) })
.unwrap();
tube_child.recv::<u8>().unwrap();
std::process::exit(0);
}
let uffd_descriptor = tube_main
.recv::<SafeDescriptor>()
.unwrap()
.into_raw_descriptor();
let uffd_child = unsafe { Userfaultfd::from_raw_descriptor(uffd_descriptor) };
let uffds = [uffd, uffd_child];
unsafe { register_regions(&regions, &uffds) }.unwrap();
tube_main.send(&0_u8).unwrap();
// wait until the child process die and the uffd_child become obsolete.
wait_for_pid(pid, 0).unwrap();
let result = unregister_regions(&regions, &uffds);
// no error from ENOMEM
assert_eq!(result.is_ok(), true);
}