blob: 2a7f8ac4c0cd164897c2785466b446867037f0b9 [file] [log] [blame]
/*
*
* Copyright (c) International Business Machines Corp., 2001
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
* the GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
*/
/*
* DESCRIPTION
* semop02 - test for E2BIG, EACCES, EFAULT, EINVAL and ERANGE errors
*
* HISTORY
* 03/2001 - Written by Wayne Boyer
*
* 10/03/2008 Renaud Lottiaux (Renaud.Lottiaux@kerlabs.com)
* - Fix concurrency issue. The second key used for this test could
* conflict with the key from another task.
*/
#define _GNU_SOURCE
#include <pwd.h>
#include "test.h"
#include "safe_macros.h"
#include "ipcsem.h"
char *TCID = "semop02";
static void semop_verify(int i);
static int exp_enos[] = { E2BIG, EACCES, EFAULT, EINVAL, ERANGE, 0 };
int sem_id_1 = -1; /* a semaphore set with read & alter permissions */
int sem_id_2 = -1; /* a semaphore set without read & alter permissions */
int bad_id = -1;
struct sembuf s_buf[PSEMS];
int badbuf = -1;
#define NSOPS 5 /* a resonable number of operations */
#define BIGOPS 1024 /* a value that is too large for the number */
/* of semop operations that are permitted */
struct test_case_t {
int *semid;
struct sembuf *t_sbuf;
unsigned t_ops;
int error;
} TC[] = {
{&sem_id_1, (struct sembuf *)&s_buf, BIGOPS, E2BIG},
{&sem_id_2, (struct sembuf *)&s_buf, NSOPS, EACCES},
{&sem_id_1, (struct sembuf *)-1, NSOPS, EFAULT},
{&sem_id_1, (struct sembuf *)&s_buf, 0, EINVAL},
{&bad_id, (struct sembuf *)&s_buf, NSOPS, EINVAL},
{&sem_id_1, (struct sembuf *)&s_buf, 1, ERANGE}
};
int TST_TOTAL = ARRAY_SIZE(TC);
int main(int ac, char **av)
{
int lc;
const char *msg;
int i;
msg = parse_opts(ac, av, NULL, NULL);
if (msg != NULL)
tst_brkm(TBROK, NULL, "OPTION PARSING ERROR - %s", msg);
setup();
for (lc = 0; TEST_LOOPING(lc); lc++) {
tst_count = 0;
for (i = 0; i < TST_TOTAL; i++)
semop_verify(i);
}
cleanup();
tst_exit();
}
void setup(void)
{
char nobody_uid[] = "nobody";
struct passwd *ltpuser;
key_t semkey2;
struct seminfo ipc_buf;
union semun arr;
tst_require_root(NULL);
ltpuser = SAFE_GETPWNAM(NULL, nobody_uid);
SAFE_SETUID(NULL, ltpuser->pw_uid);
tst_sig(NOFORK, DEF_HANDLER, cleanup);
TEST_EXP_ENOS(exp_enos);
TEST_PAUSE;
tst_tmpdir();
/* get an IPC resource key */
semkey = getipckey();
/* create a semaphore set with read and alter permissions */
sem_id_1 = semget(semkey, PSEMS, IPC_CREAT | IPC_EXCL | SEM_RA);
if (sem_id_1 == -1) {
tst_brkm(TBROK | TERRNO, cleanup,
"couldn't create semaphore in setup");
}
/* Get an new IPC resource key. */
semkey2 = getipckey();
/* create a semaphore set without read and alter permissions */
sem_id_2 = semget(semkey2, PSEMS, IPC_CREAT | IPC_EXCL);
if (sem_id_2 == -1) {
tst_brkm(TBROK | TERRNO, cleanup,
"couldn't create semaphore in setup");
}
arr.ipc_buf = &ipc_buf;
if (semctl(sem_id_1, 0, IPC_INFO, arr) == -1)
tst_brkm(TBROK | TERRNO, cleanup, "semctl() IPC_INFO failed");
/* for ERANGE errno test */
arr.val = 1;
s_buf[0].sem_op = ipc_buf.semvmx;
if (semctl(sem_id_1, 0, SETVAL, arr) == -1)
tst_brkm(TBROK | TERRNO, cleanup, "semctl() SETVAL failed");
}
static void semop_verify(int i)
{
TEST(semop(*(TC[i].semid), TC[i].t_sbuf, TC[i].t_ops));
if (TEST_RETURN != -1) {
tst_resm(TFAIL, "call succeeded unexpectedly");
return;
}
TEST_ERROR_LOG(TEST_ERRNO);
if (TEST_ERRNO == TC[i].error) {
tst_resm(TPASS | TTERRNO, "semop failed as expected");
} else {
tst_resm(TFAIL | TTERRNO,
"semop failed unexpectedly; expected: "
"%d - %s", TC[i].error, strerror(TC[i].error));
}
}
void cleanup(void)
{
/* if they exist, remove the semaphore resources */
rm_sema(sem_id_1);
rm_sema(sem_id_2);
TEST_CLEANUP;
tst_rmdir();
}