* Tests communication over semaphore sets with identical
  keys between two separate IPC namespaces

Signed-off-by: Matus Marhefka <mmarh...@redhat.com>
---
 runtest/containers                             |   1 +
 testcases/kernel/containers/sysvipc/.gitignore |   1 +
 testcases/kernel/containers/sysvipc/sem_comm.c | 206 +++++++++++++++++++++++++
 3 files changed, 208 insertions(+)
 create mode 100644 testcases/kernel/containers/sysvipc/sem_comm.c

diff --git a/runtest/containers b/runtest/containers
index 7dbf049..6535628 100644
--- a/runtest/containers
+++ b/runtest/containers
@@ -50,6 +50,7 @@ sem_nstest_unshare sem_nstest unshare
 semtest_2ns_none semtest_2ns none
 semtest_2ns_clone semtest_2ns clone
 semtest_2ns_unshare semtest_2ns unshare
+sem_comm sem_comm
 
 utstest_unshare_1 utstest unshare 1
 utstest_unshare_2 utstest unshare 2
diff --git a/testcases/kernel/containers/sysvipc/.gitignore 
b/testcases/kernel/containers/sysvipc/.gitignore
index 68f18bf..815a717 100644
--- a/testcases/kernel/containers/sysvipc/.gitignore
+++ b/testcases/kernel/containers/sysvipc/.gitignore
@@ -5,3 +5,4 @@
 /shmnstest
 /shm_comm
 /msg_comm
+/sem_comm
diff --git a/testcases/kernel/containers/sysvipc/sem_comm.c 
b/testcases/kernel/containers/sysvipc/sem_comm.c
new file mode 100644
index 0000000..d4c9393
--- /dev/null
+++ b/testcases/kernel/containers/sysvipc/sem_comm.c
@@ -0,0 +1,206 @@
+/* Copyright (c) 2014 Red Hat, Inc.
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of version 2 the GNU General Public License as
+ * published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program.  If not, see <http://www.gnu.org/licenses/>.
+ ***********************************************************************
+ * File: sem_comm.c
+ *
+ * Description:
+ * 1. Clones two child processes with CLONE_NEWIPC flag, each child
+ *    creates System V semaphore (sem) with the _identical_ key.
+ * 2. Child1 locks the semaphore.
+ * 3. Child2 locks the semaphore.
+ * 4. Locking the semaphore with the identical key but from two different
+ *    IPC namespaces should not interfere with each other, so if child2
+ *    is able to lock the semaphore (after child1 locked it), test passes,
+ *    otherwise test fails.
+ */
+
+#define _GNU_SOURCE
+#include <sys/ipc.h>
+#include <sys/sem.h>
+#include <sys/types.h>
+#include <sys/wait.h>
+#include <stdio.h>
+#include <errno.h>
+#include "usctest.h"
+#include "test.h"
+#include "safe_macros.h"
+#include "libclone.h"
+#include "ipcns_helper.h"
+
+
+#define TESTKEY 124426L
+char *TCID     = "sem_comm";
+int TST_TOTAL  = 1;
+struct tst_checkpoint checkpoint1;
+struct tst_checkpoint checkpoint2;
+
+
+static void cleanup(void)
+{
+       tst_rmdir();
+}
+
+static void setup(void)
+{
+       tst_require_root(NULL);
+       check_newipc();
+       tst_tmpdir();
+       TST_CHECKPOINT_INIT(&checkpoint1);
+       TST_CHECKPOINT_INIT(&checkpoint2);
+}
+
+int chld1_sem(void *arg)
+{
+       int id;
+       struct sembuf sm;
+
+       id = semget(TESTKEY, 1, IPC_CREAT);
+       if (id == -1) {
+               perror("semget");
+               return 2;
+       }
+
+       if (semctl(id, 0, SETVAL, 1) == -1) {
+               perror("semctl");
+               semctl(id, 0, IPC_RMID);
+               return 2;
+       }
+
+       /* tell child2 to continue */
+       TST_CHECKPOINT_SIGNAL_CHILD(NULL, &checkpoint1);
+
+       /* wait for child2 to create the semaphore */
+       TST_CHECKPOINT_CHILD_WAIT(&checkpoint2);
+
+       sm.sem_num = 0;
+       sm.sem_op = -1;
+       sm.sem_flg = IPC_NOWAIT;
+       if (semop(id, &sm, 1) == -1) {
+               perror("semop");
+               semctl(id, 0, IPC_RMID);
+               return 2;
+       }
+
+       /* tell child2 to continue */
+       TST_CHECKPOINT_SIGNAL_CHILD(NULL, &checkpoint1);
+
+       /* wait for child2 to lock the semaphore */
+       TST_CHECKPOINT_CHILD_WAIT(&checkpoint2);
+
+       sm.sem_op = 1;
+       semop(id, &sm, 1);
+
+       semctl(id, 0, IPC_RMID);
+       return 0;
+}
+
+int chld2_sem(void *arg)
+{
+       int id, rval = 0;
+       struct sembuf sm;
+
+       /* wait for child1 to create the semaphore */
+       TST_CHECKPOINT_CHILD_WAIT(&checkpoint1);
+
+       id = semget(TESTKEY, 1, IPC_CREAT);
+       if (id == -1) {
+               perror("semget");
+               return 2;
+       }
+
+       if (semctl(id, 0, SETVAL, 1) == -1) {
+               perror("semctl");
+               semctl(id, 0, IPC_RMID);
+               return 2;
+       }
+
+       /* tell child1 to continue */
+       TST_CHECKPOINT_SIGNAL_CHILD(NULL, &checkpoint2);
+
+       /* wait for child1 to lock the semaphore */
+       TST_CHECKPOINT_CHILD_WAIT(&checkpoint1);
+
+       sm.sem_num = 0;
+       sm.sem_op = -1;
+       sm.sem_flg = IPC_NOWAIT;
+       if (semop(id, &sm, 1) == -1) {
+               if (errno == EAGAIN) {
+                       rval = 1;
+               } else {
+                       perror("semop");
+                       semctl(id, 0, IPC_RMID);
+                       return 2;
+               }
+       }
+
+       /* tell child1 to continue */
+       TST_CHECKPOINT_SIGNAL_CHILD(NULL, &checkpoint2);
+
+       sm.sem_op = 1;
+       semop(id, &sm, 1);
+
+       semctl(id, 0, IPC_RMID);
+       return rval;
+}
+
+static void test(void)
+{
+       int status, ret = 0;
+
+       ret = do_clone_unshare_test(T_CLONE, CLONE_NEWIPC, chld1_sem, NULL);
+       if (ret == -1)
+               tst_brkm(TBROK | TERRNO, cleanup, "clone failed");
+
+       ret = do_clone_unshare_test(T_CLONE, CLONE_NEWIPC, chld2_sem, NULL);
+       if (ret == -1)
+               tst_brkm(TBROK | TERRNO, cleanup, "clone failed");
+
+
+       while (wait(&status) > 0) {
+               if (WIFEXITED(status) && WEXITSTATUS(status) == 1)
+                       ret = 1;
+               if (WIFEXITED(status) && WEXITSTATUS(status) == 2)
+                       tst_brkm(TBROK | TERRNO, cleanup, "error in child");
+               if (WIFSIGNALED(status)) {
+                       tst_resm(TFAIL, "child was killed with signal %s",
+                                       tst_strsig(WTERMSIG(status)));
+                       return;
+               }
+       }
+
+       if (ret)
+               tst_resm(TFAIL, "SysV sem: communication with identical keys"
+                               " between namespaces");
+       else
+               tst_resm(TPASS, "SysV sem: communication with identical keys"
+                               " between namespaces");
+}
+
+int main(int argc, char *argv[])
+{
+       const char *msg;
+       int lc;
+
+       msg = parse_opts(argc, argv, NULL, NULL);
+       if (msg != NULL)
+               tst_brkm(TBROK, NULL, "OPTION PARSING ERROR - %s", msg);
+
+       setup();
+
+       for (lc = 0; TEST_LOOPING(lc); lc++)
+               test();
+
+       cleanup();
+       tst_exit();
+}
-- 
1.8.3.1


------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
Ltp-list mailing list
Ltp-list@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ltp-list

Reply via email to