]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/test/test-unaligned.c
Merge pull request #16080 from YmrDtnJu/9p
[thirdparty/systemd.git] / src / test / test-unaligned.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2
3 #include "memory-util.h"
4 #include "sparse-endian.h"
5 #include "unaligned.h"
6
7 static uint8_t data[] = {
8 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
9 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
10 };
11
12 static void test_be(void) {
13 uint8_t scratch[16];
14
15 assert_se(unaligned_read_be16(&data[0]) == 0x0001);
16 assert_se(unaligned_read_be16(&data[1]) == 0x0102);
17
18 assert_se(unaligned_read_be32(&data[0]) == 0x00010203);
19 assert_se(unaligned_read_be32(&data[1]) == 0x01020304);
20 assert_se(unaligned_read_be32(&data[2]) == 0x02030405);
21 assert_se(unaligned_read_be32(&data[3]) == 0x03040506);
22
23 assert_se(unaligned_read_be64(&data[0]) == 0x0001020304050607);
24 assert_se(unaligned_read_be64(&data[1]) == 0x0102030405060708);
25 assert_se(unaligned_read_be64(&data[2]) == 0x0203040506070809);
26 assert_se(unaligned_read_be64(&data[3]) == 0x030405060708090a);
27 assert_se(unaligned_read_be64(&data[4]) == 0x0405060708090a0b);
28 assert_se(unaligned_read_be64(&data[5]) == 0x05060708090a0b0c);
29 assert_se(unaligned_read_be64(&data[6]) == 0x060708090a0b0c0d);
30 assert_se(unaligned_read_be64(&data[7]) == 0x0708090a0b0c0d0e);
31
32 zero(scratch);
33 unaligned_write_be16(&scratch[0], 0x0001);
34 assert_se(memcmp(&scratch[0], &data[0], sizeof(uint16_t)) == 0);
35 zero(scratch);
36 unaligned_write_be16(&scratch[1], 0x0102);
37 assert_se(memcmp(&scratch[1], &data[1], sizeof(uint16_t)) == 0);
38
39 zero(scratch);
40 unaligned_write_be32(&scratch[0], 0x00010203);
41 assert_se(memcmp(&scratch[0], &data[0], sizeof(uint32_t)) == 0);
42 zero(scratch);
43 unaligned_write_be32(&scratch[1], 0x01020304);
44 assert_se(memcmp(&scratch[1], &data[1], sizeof(uint32_t)) == 0);
45 zero(scratch);
46 unaligned_write_be32(&scratch[2], 0x02030405);
47 assert_se(memcmp(&scratch[2], &data[2], sizeof(uint32_t)) == 0);
48 zero(scratch);
49 unaligned_write_be32(&scratch[3], 0x03040506);
50 assert_se(memcmp(&scratch[3], &data[3], sizeof(uint32_t)) == 0);
51
52 zero(scratch);
53 unaligned_write_be64(&scratch[0], 0x0001020304050607);
54 assert_se(memcmp(&scratch[0], &data[0], sizeof(uint64_t)) == 0);
55 zero(scratch);
56 unaligned_write_be64(&scratch[1], 0x0102030405060708);
57 assert_se(memcmp(&scratch[1], &data[1], sizeof(uint64_t)) == 0);
58 zero(scratch);
59 unaligned_write_be64(&scratch[2], 0x0203040506070809);
60 assert_se(memcmp(&scratch[2], &data[2], sizeof(uint64_t)) == 0);
61 zero(scratch);
62 unaligned_write_be64(&scratch[3], 0x030405060708090a);
63 assert_se(memcmp(&scratch[3], &data[3], sizeof(uint64_t)) == 0);
64 zero(scratch);
65 unaligned_write_be64(&scratch[4], 0x0405060708090a0b);
66 assert_se(memcmp(&scratch[4], &data[4], sizeof(uint64_t)) == 0);
67 zero(scratch);
68 unaligned_write_be64(&scratch[5], 0x05060708090a0b0c);
69 assert_se(memcmp(&scratch[5], &data[5], sizeof(uint64_t)) == 0);
70 zero(scratch);
71 unaligned_write_be64(&scratch[6], 0x060708090a0b0c0d);
72 assert_se(memcmp(&scratch[6], &data[6], sizeof(uint64_t)) == 0);
73 zero(scratch);
74 unaligned_write_be64(&scratch[7], 0x0708090a0b0c0d0e);
75 assert_se(memcmp(&scratch[7], &data[7], sizeof(uint64_t)) == 0);
76 }
77
78 static void test_le(void) {
79 uint8_t scratch[16];
80
81 assert_se(unaligned_read_le16(&data[0]) == 0x0100);
82 assert_se(unaligned_read_le16(&data[1]) == 0x0201);
83
84 assert_se(unaligned_read_le32(&data[0]) == 0x03020100);
85 assert_se(unaligned_read_le32(&data[1]) == 0x04030201);
86 assert_se(unaligned_read_le32(&data[2]) == 0x05040302);
87 assert_se(unaligned_read_le32(&data[3]) == 0x06050403);
88
89 assert_se(unaligned_read_le64(&data[0]) == 0x0706050403020100);
90 assert_se(unaligned_read_le64(&data[1]) == 0x0807060504030201);
91 assert_se(unaligned_read_le64(&data[2]) == 0x0908070605040302);
92 assert_se(unaligned_read_le64(&data[3]) == 0x0a09080706050403);
93 assert_se(unaligned_read_le64(&data[4]) == 0x0b0a090807060504);
94 assert_se(unaligned_read_le64(&data[5]) == 0x0c0b0a0908070605);
95 assert_se(unaligned_read_le64(&data[6]) == 0x0d0c0b0a09080706);
96 assert_se(unaligned_read_le64(&data[7]) == 0x0e0d0c0b0a090807);
97
98 zero(scratch);
99 unaligned_write_le16(&scratch[0], 0x0100);
100 assert_se(memcmp(&scratch[0], &data[0], sizeof(uint16_t)) == 0);
101 zero(scratch);
102 unaligned_write_le16(&scratch[1], 0x0201);
103 assert_se(memcmp(&scratch[1], &data[1], sizeof(uint16_t)) == 0);
104
105 zero(scratch);
106 unaligned_write_le32(&scratch[0], 0x03020100);
107
108 assert_se(memcmp(&scratch[0], &data[0], sizeof(uint32_t)) == 0);
109 zero(scratch);
110 unaligned_write_le32(&scratch[1], 0x04030201);
111 assert_se(memcmp(&scratch[1], &data[1], sizeof(uint32_t)) == 0);
112 zero(scratch);
113 unaligned_write_le32(&scratch[2], 0x05040302);
114 assert_se(memcmp(&scratch[2], &data[2], sizeof(uint32_t)) == 0);
115 zero(scratch);
116 unaligned_write_le32(&scratch[3], 0x06050403);
117 assert_se(memcmp(&scratch[3], &data[3], sizeof(uint32_t)) == 0);
118
119 zero(scratch);
120 unaligned_write_le64(&scratch[0], 0x0706050403020100);
121 assert_se(memcmp(&scratch[0], &data[0], sizeof(uint64_t)) == 0);
122 zero(scratch);
123 unaligned_write_le64(&scratch[1], 0x0807060504030201);
124 assert_se(memcmp(&scratch[1], &data[1], sizeof(uint64_t)) == 0);
125 zero(scratch);
126 unaligned_write_le64(&scratch[2], 0x0908070605040302);
127 assert_se(memcmp(&scratch[2], &data[2], sizeof(uint64_t)) == 0);
128 zero(scratch);
129 unaligned_write_le64(&scratch[3], 0x0a09080706050403);
130 assert_se(memcmp(&scratch[3], &data[3], sizeof(uint64_t)) == 0);
131 zero(scratch);
132 unaligned_write_le64(&scratch[4], 0x0B0A090807060504);
133 assert_se(memcmp(&scratch[4], &data[4], sizeof(uint64_t)) == 0);
134 zero(scratch);
135 unaligned_write_le64(&scratch[5], 0x0c0b0a0908070605);
136 assert_se(memcmp(&scratch[5], &data[5], sizeof(uint64_t)) == 0);
137 zero(scratch);
138 unaligned_write_le64(&scratch[6], 0x0d0c0b0a09080706);
139 assert_se(memcmp(&scratch[6], &data[6], sizeof(uint64_t)) == 0);
140 zero(scratch);
141 unaligned_write_le64(&scratch[7], 0x0e0d0c0b0a090807);
142 assert_se(memcmp(&scratch[7], &data[7], sizeof(uint64_t)) == 0);
143 }
144
145 static void test_ne(void) {
146 uint16_t x = 4711;
147 uint32_t y = 123456;
148 uint64_t z = 9876543210;
149
150 /* Note that we don't bother actually testing alignment issues in this function, after all the _ne() functions
151 * are just aliases for the _le() or _be() implementations, which we test extensively above. Hence, in this
152 * function, just ensure that they map to the right version on the local architecture. */
153
154 assert_se(unaligned_read_ne16(&x) == 4711);
155 assert_se(unaligned_read_ne32(&y) == 123456);
156 assert_se(unaligned_read_ne64(&z) == 9876543210);
157
158 unaligned_write_ne16(&x, 1);
159 unaligned_write_ne32(&y, 2);
160 unaligned_write_ne64(&z, 3);
161
162 assert_se(x == 1);
163 assert_se(y == 2);
164 assert_se(z == 3);
165 }
166
167 int main(int argc, const char *argv[]) {
168 test_be();
169 test_le();
170 test_ne();
171 return 0;
172 }