In our FreeBSD derivative I made some changes to the kernel/t_sysv.c test
(I'm not sure where it lives in the NetBSD tree).  I've included them
below.

The changes are:
- Don't use the example msg struct name (FreeBSD erroneously defines it).
- Fix a broken call to open(2) with O_CREAT and no permission argument.
- ANSIfy function definitions.
- Improve failure messages.

-- Brooks

P.S. FreeBSD also erroneously defines union semun, but I'm working to
fix that so haven't included the change.

diff --git a/contrib/netbsd-tests/kernel/t_sysv.c 
b/contrib/netbsd-tests/kernel/t_sysv.c
index 0860d4b35c6..50fa0edcb36 100644
--- a/contrib/netbsd-tests/kernel/t_sysv.c
+++ b/contrib/netbsd-tests/kernel/t_sysv.c
@@ -72,7 +72,7 @@ void  sharer(void);
 
 #define        MESSAGE_TEXT_LEN        256
 
-struct mymsg {
+struct testmsg {
        long    mtype;
        char    mtext[MESSAGE_TEXT_LEN];
 };
@@ -174,7 +176,7 @@ key_t get_ftok(int id)
 
        /* Create the file, since ftok() requires it to exist! */
 
-       fd = open(token_key, O_RDWR | O_CREAT | O_EXCL);
+       fd = open(token_key, O_RDWR | O_CREAT | O_EXCL, 0600);
        if (fd == -1) {
                rmdir(tmpdir);
                atf_tc_fail("open() of temp file failed: %d", errno);
@@ -183,6 +185,7 @@ key_t get_ftok(int id)
                close(fd);
 
        key = ftok(token_key, id);
+       ATF_REQUIRE_MSG(key != (key_t)-1, "ftok() failed");
 
        ATF_REQUIRE_MSG(unlink(token_key) != -1, "unlink() failed: %d", errno);
        ATF_REQUIRE_MSG(rmdir(token_dir) != -1, "rmdir() failed: %d", errno);
@@ -202,7 +205,7 @@ ATF_TC_BODY(msg, tc)
 {
        struct sigaction sa;
        struct msqid_ds m_ds;
-       struct mymsg m;
+       struct testmsg m;
        sigset_t sigmask;
        int sender_msqid;
        int loop;
@@ -347,9 +350,7 @@ ATF_TC_CLEANUP(msg, tc)
 }
 
 void
-print_msqid_ds(mp, mode)
-       struct msqid_ds *mp;
-       mode_t mode;
+print_msqid_ds(struct msqid_ds *mp, mode_t mode)
 {
        uid_t uid = geteuid();
        gid_t gid = getegid();
@@ -377,13 +378,14 @@ print_msqid_ds(mp, mode)
        ATF_REQUIRE_MSG(mp->msg_perm.gid == gid && mp->msg_perm.cgid == gid,
            "gid mismatch");
 
-       ATF_REQUIRE_MSG((mp->msg_perm.mode & 0777) == mode, "mode mismatch");
+       ATF_REQUIRE_MSG((mp->msg_perm.mode & 0777) == mode,
+           "mode mismatch %o != %o", (mp->msg_perm.mode & 0777), mode);
 }
 
 void
-receiver()
+receiver(void)
 {
-       struct mymsg m;
+       struct testmsg m;
        int msqid, loop;
 
        if ((msqid = msgget(msgkey, 0)) == -1)
@@ -588,9 +590,7 @@ ATF_TC_CLEANUP(sem, tc)
 }
 
 void
-print_semid_ds(sp, mode)
-       struct semid_ds *sp;
-       mode_t mode;
+print_semid_ds(struct semid_ds *sp, mode_t mode)
 {
        uid_t uid = geteuid();
        gid_t gid = getegid();
@@ -620,7 +620,7 @@ print_semid_ds(sp, mode)
 }
 
 void
-waiter()
+waiter(void)
 {
        struct sembuf s;
        int semid;
@@ -789,9 +789,7 @@ ATF_TC_CLEANUP(shm, tc)
 }
 
 void
-print_shmid_ds(sp, mode)
-       struct shmid_ds *sp;
-       mode_t mode;
+print_shmid_ds(struct shmid_ds *sp, mode_t mode)
 {
        uid_t uid = geteuid();
        gid_t gid = getegid();
@@ -819,11 +817,12 @@ print_shmid_ds(sp, mode)
        ATF_REQUIRE_MSG(sp->shm_perm.gid == gid && sp->shm_perm.cgid == gid,
            "gid mismatch");
 
-       ATF_REQUIRE_MSG((sp->shm_perm.mode & 0777) == mode, "mode mismatch");
+       ATF_REQUIRE_MSG((sp->shm_perm.mode & 0777) == mode,
+           "mode mismatch %o != %o", (sp->shm_perm.mode & 0777), mode);
 }
 
 void
-sharer()
+sharer(void)
 {
        int shmid;
        void *shm_buf;

Attachment: signature.asc
Description: PGP signature

Reply via email to