android13/external/ltp/testcases/kernel/syscalls/ipc/semop/semop02.c

178 lines
5.1 KiB
C

// SPDX-License-Identifier: GPL-2.0-or-later
/*
* E2BIG - nsops is greater than max number of operations allowed per syscall
* EACCESS - calling process does not have permission to alter semaphore
* EFAULT - invalid address passed for sops
* EINVAL - nonpositive nsops
* EINVAL - negative semid
* ERANGE - semop + semval > semvmx a maximal semaphore value
* EFBIG - sem_num less than zero
* EFBIG - sem_num > number of semaphores in a set
* EAGAIN - semop = 0 for non-zero semaphore and IPC_NOWAIT passed in flags
* EAGAIN - semop = -1 for zero semaphore and IPC_NOWAIT passed in flags
* EAGAIN - semop = 0 and timeout happens
* EAGAIN - semop = -1 and timeout happens
* EFAULT - invalid timeout pointer
*
* Copyright (c) International Business Machines Corp., 2001
* 03/2001 - Written by Wayne Boyer
* 10/03/2008 Renaud Lottiaux (Renaud.Lottiaux@kerlabs.com)
*/
#define _GNU_SOURCE
#include <pwd.h>
#include <sys/ipc.h>
#include "tst_test.h"
#include "libnewipc.h"
#include "lapi/sem.h"
#include "semop.h"
static int valid_sem_id = -1;
static int noperm_sem_id = -1;
static int bad_sem_id = -1;
static short sem_op_max, sem_op_1 = 1, sem_op_negative = -1, sem_op_zero = 0;
static struct sembuf *faulty_buf;
static struct tst_ts timeout;
static struct tst_ts *valid_to = &timeout, *invalid_to;
#define NSOPS 1
#define BIGOPS 1024
static struct test_case_t {
int semtimedop_only;
int *semid;
struct sembuf **buf;
short *sem_op;
unsigned short ctl_sem_num;
unsigned short sem_num;
short sem_flg;
unsigned t_ops;
int arr_val;
struct tst_ts **to;
int error;
} tc[] = {
{0, &valid_sem_id, NULL, &sem_op_1, 0, 0, 0, BIGOPS, 1, &valid_to, E2BIG},
{0, &noperm_sem_id, NULL, &sem_op_1, 0, 0, 0, NSOPS, 1, &valid_to, EACCES},
{0, &valid_sem_id, &faulty_buf, &sem_op_1, 0, 0, 0, NSOPS, 1, &valid_to, EFAULT},
{0, &valid_sem_id, NULL, &sem_op_1, 0, 0, 0, 0, 1, &valid_to, EINVAL},
{0, &bad_sem_id, NULL, &sem_op_1, 0, 0, 0, NSOPS, 1, &valid_to, EINVAL},
{0, &valid_sem_id, NULL, &sem_op_max, 0, 0, 0, 1, 1, &valid_to, ERANGE},
{0, &valid_sem_id, NULL, &sem_op_1, 0, -1, SEM_UNDO, 1, 1, &valid_to, EFBIG},
{0, &valid_sem_id, NULL, &sem_op_1, 0, PSEMS + 1, SEM_UNDO, 1, 1, &valid_to, EFBIG},
{0, &valid_sem_id, NULL, &sem_op_zero, 2, 2, IPC_NOWAIT, 1, 1, &valid_to, EAGAIN},
{0, &valid_sem_id, NULL, &sem_op_negative, 2, 2, IPC_NOWAIT, 1, 0, &valid_to, EAGAIN},
{1, &valid_sem_id, NULL, &sem_op_zero, 0, 0, SEM_UNDO, 1, 1, &valid_to, EAGAIN},
{1, &valid_sem_id, NULL, &sem_op_negative, 0, 0, SEM_UNDO, 1, 0, &valid_to, EAGAIN},
{1, &valid_sem_id, NULL, &sem_op_zero, 0, 0, SEM_UNDO, 1, 1, &invalid_to, EFAULT},
};
static void setup(void)
{
struct time64_variants *tv = &variants[tst_variant];
struct passwd *ltpuser;
key_t semkey;
union semun arr;
struct seminfo ipc_buf;
void *faulty_address;
tst_res(TINFO, "Testing variant: %s", tv->desc);
semop_supported_by_kernel(tv);
timeout.type = tv->ts_type;
tst_ts_set_sec(&timeout, 0);
tst_ts_set_nsec(&timeout, 10000);
ltpuser = SAFE_GETPWNAM("nobody");
SAFE_SETUID(ltpuser->pw_uid);
semkey = GETIPCKEY();
valid_sem_id = semget(semkey, PSEMS, IPC_CREAT | IPC_EXCL | SEM_RA);
if (valid_sem_id == -1)
tst_brk(TBROK | TERRNO, "couldn't create semaphore in setup");
semkey = GETIPCKEY();
noperm_sem_id = semget(semkey, PSEMS, IPC_CREAT | IPC_EXCL);
if (noperm_sem_id == -1)
tst_brk(TBROK | TERRNO, "couldn't create semaphore in setup");
arr.__buf = &ipc_buf;
if (semctl(valid_sem_id, 0, IPC_INFO, arr) == -1)
tst_brk(TBROK | TERRNO, "semctl() IPC_INFO failed");
sem_op_max = ipc_buf.semvmx;
faulty_address = tst_get_bad_addr(NULL);
invalid_to = faulty_address;
faulty_buf = faulty_address;
}
static void run(unsigned int i)
{
struct time64_variants *tv = &variants[tst_variant];
union semun arr = {.val = tc[i].arr_val};
struct sembuf buf = {
.sem_op = *tc[i].sem_op,
.sem_flg = tc[i].sem_flg,
.sem_num = tc[i].sem_num,
};
struct sembuf *ptr = &buf;
void *to;
if (tc[i].semtimedop_only && tv->semop) {
tst_res(TCONF, "Test not supported for variant");
return;
}
if (*tc[i].semid == valid_sem_id) {
if (semctl(valid_sem_id, tc[i].ctl_sem_num, SETVAL, arr) == -1)
tst_brk(TBROK | TERRNO, "semctl() SETVAL failed");
}
if (tc[i].buf)
ptr = *tc[i].buf;
if (*tc[i].to == invalid_to)
to = invalid_to;
else
to = tst_ts_get(*tc[i].to);
TEST(call_semop(tv, *(tc[i].semid), ptr, tc[i].t_ops, to));
if (TST_RET != -1) {
tst_res(TFAIL | TTERRNO, "call succeeded unexpectedly");
return;
}
if (TST_ERR == tc[i].error) {
tst_res(TPASS | TTERRNO, "semop failed as expected");
} else {
tst_res(TFAIL | TTERRNO,
"semop failed unexpectedly; expected: %s",
tst_strerrno(tc[i].error));
}
}
static void cleanup(void)
{
if (valid_sem_id != -1) {
if (semctl(valid_sem_id, 0, IPC_RMID) == -1)
tst_res(TWARN, "semaphore deletion failed.");
}
if (noperm_sem_id != -1) {
if (semctl(noperm_sem_id, 0, IPC_RMID) == -1)
tst_res(TWARN, "semaphore deletion failed.");
}
}
static struct tst_test test = {
.test = run,
.tcnt = ARRAY_SIZE(tc),
.test_variants = ARRAY_SIZE(variants),
.setup = setup,
.cleanup = cleanup,
.needs_tmpdir = 1,
.needs_root = 1,
};