* Tests communication over semaphore sets with identical keys between two separate IPC namespaces
Signed-off-by: Matus Marhefka <mmarh...@redhat.com> --- runtest/containers | 1 + testcases/kernel/containers/sysvipc/.gitignore | 1 + testcases/kernel/containers/sysvipc/sem_comm.c | 206 +++++++++++++++++++++++++ 3 files changed, 208 insertions(+) create mode 100644 testcases/kernel/containers/sysvipc/sem_comm.c diff --git a/runtest/containers b/runtest/containers index 7dbf049..6535628 100644 --- a/runtest/containers +++ b/runtest/containers @@ -50,6 +50,7 @@ sem_nstest_unshare sem_nstest unshare semtest_2ns_none semtest_2ns none semtest_2ns_clone semtest_2ns clone semtest_2ns_unshare semtest_2ns unshare +sem_comm sem_comm utstest_unshare_1 utstest unshare 1 utstest_unshare_2 utstest unshare 2 diff --git a/testcases/kernel/containers/sysvipc/.gitignore b/testcases/kernel/containers/sysvipc/.gitignore index 68f18bf..815a717 100644 --- a/testcases/kernel/containers/sysvipc/.gitignore +++ b/testcases/kernel/containers/sysvipc/.gitignore @@ -5,3 +5,4 @@ /shmnstest /shm_comm /msg_comm +/sem_comm diff --git a/testcases/kernel/containers/sysvipc/sem_comm.c b/testcases/kernel/containers/sysvipc/sem_comm.c new file mode 100644 index 0000000..d4c9393 --- /dev/null +++ b/testcases/kernel/containers/sysvipc/sem_comm.c @@ -0,0 +1,206 @@ +/* Copyright (c) 2014 Red Hat, Inc. + * + * This program is free software: you can redistribute it and/or modify + * it under the terms of version 2 the GNU General Public License as + * published by the Free Software Foundation. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see <http://www.gnu.org/licenses/>. + *********************************************************************** + * File: sem_comm.c + * + * Description: + * 1. Clones two child processes with CLONE_NEWIPC flag, each child + * creates System V semaphore (sem) with the _identical_ key. + * 2. Child1 locks the semaphore. + * 3. Child2 locks the semaphore. + * 4. Locking the semaphore with the identical key but from two different + * IPC namespaces should not interfere with each other, so if child2 + * is able to lock the semaphore (after child1 locked it), test passes, + * otherwise test fails. + */ + +#define _GNU_SOURCE +#include <sys/ipc.h> +#include <sys/sem.h> +#include <sys/types.h> +#include <sys/wait.h> +#include <stdio.h> +#include <errno.h> +#include "usctest.h" +#include "test.h" +#include "safe_macros.h" +#include "libclone.h" +#include "ipcns_helper.h" + + +#define TESTKEY 124426L +char *TCID = "sem_comm"; +int TST_TOTAL = 1; +struct tst_checkpoint checkpoint1; +struct tst_checkpoint checkpoint2; + + +static void cleanup(void) +{ + tst_rmdir(); +} + +static void setup(void) +{ + tst_require_root(NULL); + check_newipc(); + tst_tmpdir(); + TST_CHECKPOINT_INIT(&checkpoint1); + TST_CHECKPOINT_INIT(&checkpoint2); +} + +int chld1_sem(void *arg) +{ + int id; + struct sembuf sm; + + id = semget(TESTKEY, 1, IPC_CREAT); + if (id == -1) { + perror("semget"); + return 2; + } + + if (semctl(id, 0, SETVAL, 1) == -1) { + perror("semctl"); + semctl(id, 0, IPC_RMID); + return 2; + } + + /* tell child2 to continue */ + TST_CHECKPOINT_SIGNAL_CHILD(NULL, &checkpoint1); + + /* wait for child2 to create the semaphore */ + TST_CHECKPOINT_CHILD_WAIT(&checkpoint2); + + sm.sem_num = 0; + sm.sem_op = -1; + sm.sem_flg = IPC_NOWAIT; + if (semop(id, &sm, 1) == -1) { + perror("semop"); + semctl(id, 0, IPC_RMID); + return 2; + } + + /* tell child2 to continue */ + TST_CHECKPOINT_SIGNAL_CHILD(NULL, &checkpoint1); + + /* wait for child2 to lock the semaphore */ + TST_CHECKPOINT_CHILD_WAIT(&checkpoint2); + + sm.sem_op = 1; + semop(id, &sm, 1); + + semctl(id, 0, IPC_RMID); + return 0; +} + +int chld2_sem(void *arg) +{ + int id, rval = 0; + struct sembuf sm; + + /* wait for child1 to create the semaphore */ + TST_CHECKPOINT_CHILD_WAIT(&checkpoint1); + + id = semget(TESTKEY, 1, IPC_CREAT); + if (id == -1) { + perror("semget"); + return 2; + } + + if (semctl(id, 0, SETVAL, 1) == -1) { + perror("semctl"); + semctl(id, 0, IPC_RMID); + return 2; + } + + /* tell child1 to continue */ + TST_CHECKPOINT_SIGNAL_CHILD(NULL, &checkpoint2); + + /* wait for child1 to lock the semaphore */ + TST_CHECKPOINT_CHILD_WAIT(&checkpoint1); + + sm.sem_num = 0; + sm.sem_op = -1; + sm.sem_flg = IPC_NOWAIT; + if (semop(id, &sm, 1) == -1) { + if (errno == EAGAIN) { + rval = 1; + } else { + perror("semop"); + semctl(id, 0, IPC_RMID); + return 2; + } + } + + /* tell child1 to continue */ + TST_CHECKPOINT_SIGNAL_CHILD(NULL, &checkpoint2); + + sm.sem_op = 1; + semop(id, &sm, 1); + + semctl(id, 0, IPC_RMID); + return rval; +} + +static void test(void) +{ + int status, ret = 0; + + ret = do_clone_unshare_test(T_CLONE, CLONE_NEWIPC, chld1_sem, NULL); + if (ret == -1) + tst_brkm(TBROK | TERRNO, cleanup, "clone failed"); + + ret = do_clone_unshare_test(T_CLONE, CLONE_NEWIPC, chld2_sem, NULL); + if (ret == -1) + tst_brkm(TBROK | TERRNO, cleanup, "clone failed"); + + + while (wait(&status) > 0) { + if (WIFEXITED(status) && WEXITSTATUS(status) == 1) + ret = 1; + if (WIFEXITED(status) && WEXITSTATUS(status) == 2) + tst_brkm(TBROK | TERRNO, cleanup, "error in child"); + if (WIFSIGNALED(status)) { + tst_resm(TFAIL, "child was killed with signal %s", + tst_strsig(WTERMSIG(status))); + return; + } + } + + if (ret) + tst_resm(TFAIL, "SysV sem: communication with identical keys" + " between namespaces"); + else + tst_resm(TPASS, "SysV sem: communication with identical keys" + " between namespaces"); +} + +int main(int argc, char *argv[]) +{ + const char *msg; + int lc; + + msg = parse_opts(argc, argv, NULL, NULL); + if (msg != NULL) + tst_brkm(TBROK, NULL, "OPTION PARSING ERROR - %s", msg); + + setup(); + + for (lc = 0; TEST_LOOPING(lc); lc++) + test(); + + cleanup(); + tst_exit(); +} -- 1.8.3.1 ------------------------------------------------------------------------------ Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk _______________________________________________ Ltp-list mailing list Ltp-list@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ltp-list