The original test didn't write memory to zram device since it uses
MAP_PRIVATE flag. This patch changes the behavior because we want to
verify device content later.
Signed-off-by: Caspar Zhang <cas...@casparzhang.com>
---
testcases/kernel/mem/zram/zram01.c | 8 ++++----
1 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/testcases/kernel/mem/zram/zram01.c b/testcases/kernel/mem/zram/zram01.c
index 0aec0d9..1dd7817 100644
--- a/testcases/kernel/mem/zram/zram01.c
+++ b/testcases/kernel/mem/zram/zram01.c
@@ -43,7 +43,7 @@ int modprobe = 0;
#define DEVICE "/dev/zram0"
static void set_disksize(void);
-static void map_device(void);
+static void write_device(void);
static void reset(void);
static void setup(void);
static void cleanup(void);
@@ -66,7 +66,7 @@ int main(int argc, char *argv[])
set_disksize();
- map_device();
+ write_device();
dump_info();
reset();
@@ -93,7 +93,7 @@ static void set_disksize(void)
close(fd);
}
-static void map_device(void)
+static void write_device(void)
{
int fd;
void *s;
@@ -102,7 +102,7 @@ static void map_device(void)
fd = open(DEVICE, O_RDWR);
if (fd == -1)
tst_brkm(TBROK|TERRNO, cleanup, "open %s", DEVICE);
- s = mmap(NULL, SIZE, PROT_READ|PROT_WRITE, MAP_PRIVATE, fd, 0);
+ s = mmap(NULL, SIZE, PROT_READ|PROT_WRITE, MAP_SHARED, fd, 0);
if (s == MAP_FAILED)
tst_brkm(TBROK|TERRNO, cleanup, "mmap");
------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure
contains a definitive record of customers, application performance,
security threats, fraudulent activity, and more. Splunk takes this
data and makes sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-novd2d
_______________________________________________
Ltp-list mailing list
Ltp-list@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ltp-list