The original test didn't write memory to zram device since it uses
MAP_PRIVATE flag. This patch changes the behavior because we want to
verify device content later.

Signed-off-by: Caspar Zhang <cas...@casparzhang.com>
---
 testcases/kernel/mem/zram/zram01.c |    8 ++++----
 1 files changed, 4 insertions(+), 4 deletions(-)

diff --git a/testcases/kernel/mem/zram/zram01.c b/testcases/kernel/mem/zram/zram01.c
index 0aec0d9..1dd7817 100644
--- a/testcases/kernel/mem/zram/zram01.c
+++ b/testcases/kernel/mem/zram/zram01.c
@@ -43,7 +43,7 @@ int modprobe = 0;
 #define DEVICE		"/dev/zram0"
 
 static void set_disksize(void);
-static void map_device(void);
+static void write_device(void);
 static void reset(void);
 static void setup(void);
 static void cleanup(void);
@@ -66,7 +66,7 @@ int main(int argc, char *argv[])
 
 		set_disksize();
 
-		map_device();
+		write_device();
 		dump_info();
 
 		reset();
@@ -93,7 +93,7 @@ static void set_disksize(void)
 	close(fd);
 }
 
-static void map_device(void)
+static void write_device(void)
 {
 	int fd;
 	void *s;
@@ -102,7 +102,7 @@ static void map_device(void)
 	fd = open(DEVICE, O_RDWR);
 	if (fd == -1)
 		tst_brkm(TBROK|TERRNO, cleanup, "open %s", DEVICE);
-	s = mmap(NULL, SIZE, PROT_READ|PROT_WRITE, MAP_PRIVATE, fd, 0);
+	s = mmap(NULL, SIZE, PROT_READ|PROT_WRITE, MAP_SHARED, fd, 0);
 	if (s == MAP_FAILED)
 		tst_brkm(TBROK|TERRNO, cleanup, "mmap");
 
------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure 
contains a definitive record of customers, application performance, 
security threats, fraudulent activity, and more. Splunk takes this 
data and makes sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-novd2d
_______________________________________________
Ltp-list mailing list
Ltp-list@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ltp-list

Reply via email to