android13/external/ltp/testcases/kernel/syscalls/ipc/semctl/semctl09.c

230 lines
5.1 KiB
C

// SPDX-License-Identifier: GPL-2.0-or-later
/*
* Copyright (c) 2020 FUJITSU LIMITED. All rights reserved.
* Author: Feiyu Zhu <zhufy.jy@cn.fujitsu.com>
*/
/*\
* [Description]
*
* Call semctl() with SEM_INFO flag and check that:
*
* * The returned index points to a valid SEM by calling SEM_STAT_ANY
* * Also count that valid indexes < returned max index sums up to semusz
* * And the data are consistent with /proc/sysvipc/sem
*
* There is a possible race between the call to the semctl() and read from the
* proc file so this test cannot be run in parallel with any IPC testcases that
* adds or removes semaphore set.
*
* Note what we create a semaphore set in the test setup to make sure
* that there is at least one during the testrun.
*
* Also note that for SEM_INFO the members of the seminfo structure have
* completely different meaning than their names seems to suggest.
*
* We also calling semctl() directly by syscall(), because of a glibc bug:
*
* semctl SEM_STAT_ANY fails to pass the buffer specified by the caller
* to the kernel.
*
* https://sourceware.org/bugzilla/show_bug.cgi?id=26637
*/
/*
* The glibc bug was fixed in:
*
* * commit 574500a108be1d2a6a0dc97a075c9e0a98371aba
* * Author: Dmitry V. Levin <ldv@altlinux.org>
* * Date: Tue, 29 Sep 2020 17:10:20 +0000 (14:10 -0300)
*/
#include <stdio.h>
#include <pwd.h>
#include "tst_test.h"
#include "tst_safe_sysv_ipc.h"
#include "libnewipc.h"
#include "lapi/sem.h"
#include "lapi/syscalls.h"
static int sem_id = -1;
static uid_t nobody_uid, root_uid;
static union semun un;
/*
* Note: semctl man-pages may have wrong description. We should use sem_ds
* struct(un.buf) instead of seminfo struct(un.__buf).
*/
static inline int do_semctl(int semid, int semnum, int cmd)
{
struct semid_ds info;
un.buf = &info;
switch (tst_variant) {
case 0:
return tst_syscall(__NR_semctl, semid, semnum, cmd, un);
case 1:
return semctl(semid, semnum, cmd, un);
}
return -1;
}
static void test_info(void)
{
switch (tst_variant) {
case 0:
tst_res(TINFO, "Test SYS_semctl syscall");
break;
case 1:
tst_res(TINFO, "Test libc semctl()");
break;
}
}
static struct tcases {
uid_t *uid;
char *desc;
} tests[] = {
{&nobody_uid, "with nobody user",},
{&root_uid, "with root user",},
};
static void parse_proc_sysvipc(struct seminfo *info)
{
FILE *f = fopen("/proc/sysvipc/sem", "r");
int semset_cnt = 0;
int sem_cnt = 0;
/* Eat header */
for (;;) {
int c = fgetc(f);
if (c == '\n' || c == EOF)
break;
}
int nsems;
/*
* Sum sem set, nsems for all elements listed, which should equal
* the data returned in the seminfo structure.
*/
while (fscanf(f, "%*i %*i %*i %i %*i %*i %*i %*i %*i %*i",
&nsems) > 0){
semset_cnt++;
sem_cnt += nsems;
}
if (info->semusz != semset_cnt) {
tst_res(TFAIL, "semusz = %i, expected %i",
info->semusz, semset_cnt);
} else {
tst_res(TPASS, "semset_cnt = %i", semset_cnt);
}
if (info->semaem != sem_cnt) {
tst_res(TFAIL, "semaem = %i, expected %i",
info->semaem, sem_cnt);
} else {
tst_res(TPASS, "sen_cnt = %i", sem_cnt);
}
fclose(f);
}
static void verify_semctl(unsigned int n)
{
struct tcases *tc = &tests[n];
int i, semid, cnt = 0;
struct seminfo info;
union semun arg;
tst_res(TINFO, "Test SEM_STAT_ANY %s", tc->desc);
SAFE_SETEUID(*tc->uid);
arg.__buf = &info;
TEST(semctl(sem_id, 0, SEM_INFO, arg));
if (TST_RET == -1) {
tst_res(TFAIL | TTERRNO, "semctl(sem_id, 0, SEM_INFO, ...)");
return;
}
semid = do_semctl(TST_RET, 0, SEM_STAT_ANY);
if (errno == EFAULT) {
tst_res(TFAIL, "SEM_STAT_ANY doesn't pass the buffer "
"specified by the caller to kernel");
return;
} else if (semid == -1) {
tst_res(TFAIL | TERRNO, "SEM_INFO haven't returned a valid index");
} else {
tst_res(TPASS, "SEM_INFO returned valid index %li to semid %i",
TST_RET, semid);
}
for (i = 0; i <= TST_RET; i++) {
if ((do_semctl(i, 0, SEM_STAT_ANY)) != -1)
cnt++;
}
if (cnt == info.semusz) {
tst_res(TPASS, "Counted used = %i", cnt);
} else {
tst_res(TFAIL, "Counted used = %i, semuse = %i",
cnt, info.semusz);
}
parse_proc_sysvipc(&info);
}
static void setup(void)
{
struct passwd *ltpuser = SAFE_GETPWNAM("nobody");
nobody_uid = ltpuser->pw_uid;
root_uid = 0;
test_info();
#if !HAVE_DECL_SEM_STAT_ANY
if (tst_variant == 1)
tst_brk(TCONF, "libc does not support semctl(SEM_STAT_ANY)");
#endif
sem_id = SAFE_SEMGET(IPC_PRIVATE, 2, IPC_CREAT | 0600);
TEST(do_semctl(sem_id, 0, SEM_STAT_ANY));
if (TST_RET == -1) {
if (TST_ERR == EFAULT)
tst_brk(TFAIL,
"SEM_STAT_ANY doesn't pass the buffer specified by the caller to kernel");
if (TST_ERR == EINVAL)
tst_brk(TCONF, "kernel doesn't support SEM_STAT_ANY");
else
tst_brk(TBROK | TTERRNO,
"Current environment doesn't permit SEM_STAT_ANY");
}
}
static void cleanup(void)
{
SAFE_SETEUID(root_uid);
if (sem_id >= 0)
SAFE_SEMCTL(sem_id, 0, IPC_RMID);
}
static struct tst_test test = {
.setup = setup,
.cleanup = cleanup,
.test = verify_semctl,
.tcnt = ARRAY_SIZE(tests),
.test_variants = 2,
.needs_root = 1,
.tags = (const struct tst_tag[]) {
{"glibc-git", "574500a108be"},
{}
}
};