From patchwork Mon Dec 12 12:33:00 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Adhemerval Zanella Netto X-Patchwork-Id: 87672 Delivered-To: patch@linaro.org Received: by 10.140.20.101 with SMTP id 92csp1613260qgi; Mon, 12 Dec 2016 04:35:06 -0800 (PST) X-Received: by 10.84.218.7 with SMTP id q7mr185959888pli.18.1481546106831; Mon, 12 Dec 2016 04:35:06 -0800 (PST) Return-Path: Received: from sourceware.org (server1.sourceware.org. [209.132.180.131]) by mx.google.com with ESMTPS id 133si43122887pgh.252.2016.12.12.04.35.06 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 12 Dec 2016 04:35:06 -0800 (PST) Received-SPF: pass (google.com: domain of libc-alpha-return-75745-patch=linaro.org@sourceware.org designates 209.132.180.131 as permitted sender) client-ip=209.132.180.131; Authentication-Results: mx.google.com; dkim=pass header.i=@sourceware.org; spf=pass (google.com: domain of libc-alpha-return-75745-patch=linaro.org@sourceware.org designates 209.132.180.131 as permitted sender) smtp.mailfrom=libc-alpha-return-75745-patch=linaro.org@sourceware.org; dmarc=fail (p=NONE dis=NONE) header.from=linaro.org DomainKey-Signature: a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:from:to:subject:date:message-id:in-reply-to :references; q=dns; s=default; b=BxSgm+tlzeRMr+k7v0aHthr+tdsS39d 2TajNSm68dCnNthGamCK9umXgtQ3kndBd6K3u39aWZyoKlqdPnbZ7E1DL7fI+YiZ mltnbarzwwMapTXdAIiIRORYB7hJsD1ySydGlEROWUBK7mQHZoDlCPFzgJmD/Pgw paCWYFmfYdWU= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:from:to:subject:date:message-id:in-reply-to :references; s=default; bh=iGWWBrd/HR6nNgZ7eg7Wx7CtKq0=; b=xyQ1C p6yJqf6kpaBeED6FbLJOBy7SCrZdbFTL61b+zhRkDi/epPz6uBk0lBkpqEqt6yBZ l5GjlS5prnhuOTz4nW9zTMFNyQueiUAlRyApu75zrkE4mp0VcopZrBWFNJGHPp2C gXcAQaEpXdxLrVjSoclisu/16O2dp+kxHeht1Y= Received: (qmail 8405 invoked by alias); 12 Dec 2016 12:33:42 -0000 Mailing-List: contact libc-alpha-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: libc-alpha-owner@sourceware.org Delivered-To: mailing list libc-alpha@sourceware.org Received: (qmail 8061 invoked by uid 89); 12 Dec 2016 12:33:39 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-1.9 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_NONE, SPF_PASS autolearn=ham version=3.3.2 spammy=extensive, 3511, sk:fasynch, PREPARE X-HELO: mail-vk0-f52.google.com X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references; bh=LgfOwlg9ssTDJihXyJskO7WVv7tIbelcg3Kj4OBixPM=; b=WOrsF722IZYUx2fecXvYo158ac8QgV2XcwHlQLfGCIc8m4gnmIjRHwdCTIfS+RCH8E iqsbnauAbl9R3f3989mBaC5SsUugvxMhz1IX7oFZog700I8GcXXrxcJ49u2oRrxGtaRd LcjSUwVL3maK6dvrx1XzjaEyXzPwEvvvHPPE1KpY/QLhC8za6scjrF1xYL0Tw+W6FMYi 7bs+bLyHZgGamheDEDjClzJxlItSSuYwtySXutcHFbB04rxSpkR0aFohOqPudp7mJbFb 2qMQ1nh6z5ubBXuxz2FvumkfAE2XGqwMHHHNJr6//5foEjlRQC6WXB+gUfHXuPmriZpb 2BVg== X-Gm-Message-State: AKaTC00DT8uIL3gSMEDUSt5HohlL0TtycrD9+iAagEKSUIc7pBr8ikLWUa30UUt/8vfeS6wV X-Received: by 10.31.176.9 with SMTP id z9mr24237584vke.9.1481546004788; Mon, 12 Dec 2016 04:33:24 -0800 (PST) From: Adhemerval Zanella To: libc-alpha@sourceware.org Subject: [PATCH 07/17] Add SYSV message queue test Date: Mon, 12 Dec 2016 10:33:00 -0200 Message-Id: <1481545990-7247-8-git-send-email-adhemerval.zanella@linaro.org> In-Reply-To: <1481545990-7247-1-git-send-email-adhemerval.zanella@linaro.org> References: <1481545990-7247-1-git-send-email-adhemerval.zanella@linaro.org> This patch adds a simple SYSV message queue test to check for correct argument passing on kernel. The idea is neither to be an extensive testing nor to check for any specific Linux test. * sysvipc/Makefile (tests): Add test-sysvmsg. * sysvipc/test-sysvmsg.c: New file. * test-skeleton.c (FAIL_UNSUPPORTED): New define. --- ChangeLog | 4 ++ support/check.h | 5 ++ sysvipc/Makefile | 2 + sysvipc/test-sysvmsg.c | 128 +++++++++++++++++++++++++++++++++++++++++++++++++ 4 files changed, 139 insertions(+) create mode 100644 sysvipc/test-sysvmsg.c -- 2.7.4 diff --git a/support/check.h b/support/check.h index ff2652c..8c04a7e 100644 --- a/support/check.h +++ b/support/check.h @@ -35,6 +35,11 @@ __BEGIN_DECLS #define FAIL_EXIT1(...) \ support_exit_failure_impl (1, __FILE__, __LINE__, __VA_ARGS__) +/* Print failure message and terminate with as unsupported test (exit + status of 77). */ +#define FAIL_UNSUPPORTED(...) \ + support_exit_failure_impl (77, __FILE__, __LINE__, __VA_ARGS__) + int support_print_failure_impl (const char *file, int line, const char *format, ...) __attribute__ ((nonnull (1), format (printf, 3, 4))); diff --git a/sysvipc/Makefile b/sysvipc/Makefile index 5f3479e..73bb9cf 100644 --- a/sysvipc/Makefile +++ b/sysvipc/Makefile @@ -30,6 +30,8 @@ routines := ftok \ semop semget semctl semtimedop \ shmat shmdt shmget shmctl +tests := test-sysvmsg + include ../Rules CFLAGS-msgrcv.c = -fexceptions -fasynchronous-unwind-tables diff --git a/sysvipc/test-sysvmsg.c b/sysvipc/test-sysvmsg.c new file mode 100644 index 0000000..75cfebf --- /dev/null +++ b/sysvipc/test-sysvmsg.c @@ -0,0 +1,128 @@ +/* Basic tests for SYSV message queue functions. + Copyright (C) 2016 Free Software Foundation, Inc. + This file is part of the GNU C Library. + + The GNU C Library is free software; you can redistribute it and/or + modify it under the terms of the GNU Lesser General Public + License as published by the Free Software Foundation; either + version 2.1 of the License, or (at your option) any later version. + + The GNU C Library is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public + License along with the GNU C Library; if not, see + . */ + +#include +#include +#include +#include +#include +#include +#include + +#include +#include +#include + +#define TEXTSIZE 32 +struct msgbuf_t +{ +#ifdef _GNU_SOURCE + __syscall_slong_t type; +#else + long type; +#endif + char buf[TEXTSIZE]; +}; + +#define MSGTYPE 0x01020304 +#define MSGDATA "0123456789" + +/* These are for the temporary file we generate. */ +static char *name; +static int msqid; + +static void +remove_msq (void) +{ + /* Enforce message queue removal in case of early test failure. + Ignore error since the msgq may already have being removed. */ + msgctl (msqid, IPC_RMID, NULL); +} + +static void +do_prepare (int argc, char *argv[]) +{ + int fd = create_temp_file ("tst-sysvmsg.", &name); + if (fd == -1) + FAIL_EXIT1 ("cannot create temporary file (errno=%d)", errno); +} + +#define PREPARE do_prepare + +/* It is not an extensive test, but rather a functional one aimed to check + correct parameter passing on kernel. */ + +#define MSGQ_MODE 0644 + +static int +do_test (void) +{ + atexit (remove_msq); + + key_t key = ftok (name, 'G'); + if (key == -1) + FAIL_EXIT1 ("ftok failed"); + + msqid = msgget (key, MSGQ_MODE | IPC_CREAT); + if (msqid == -1) + { + if (errno == ENOSYS) + FAIL_UNSUPPORTED ("msgget not supported"); + FAIL_EXIT1 ("msgget failed (errno=%d)", errno); + } + + /* Get message queue kernel information and do some sanity checks. */ + struct msqid_ds msginfo; + if (msgctl (msqid, IPC_STAT, &msginfo) == -1) + FAIL_EXIT1 ("msgctl with IPC_STAT failed (errno=%d)", errno); + + if (msginfo.msg_perm.__key != key) + FAIL_EXIT1 ("msgid_ds::msg_perm::key (%d) != %d", + (int) msginfo.msg_perm.__key, (int) key); + if (msginfo.msg_perm.mode != MSGQ_MODE) + FAIL_EXIT1 ("msgid_ds::msg_perm::mode (%o) != %o", + msginfo.msg_perm.mode, MSGQ_MODE); + if (msginfo.msg_qnum != 0) + FAIL_EXIT1 ("msgid_ds::msg_qnum (%lu) != 0", + (long unsigned) msginfo.msg_qnum); + + /* Check if last argument (IPC_NOWAIT) is correctly handled. */ + struct msgbuf_t msg2rcv = { 0 }; + if (msgrcv (msqid, &msg2rcv, sizeof (msg2rcv.buf), MSGTYPE, + IPC_NOWAIT) == -1 + && errno != ENOMSG) + FAIL_EXIT1 ("msgrcv failed (errno=%d)", errno); + + struct msgbuf_t msg2snd = { MSGTYPE, MSGDATA }; + if (msgsnd (msqid, &msg2snd, sizeof (msg2snd.buf), 0) == -1) + FAIL_EXIT1 ("msgsnd failed (errno=%d)", errno); + + if (msgrcv (msqid, &msg2rcv, sizeof (msg2rcv.buf), MSGTYPE, 0) == -1) + FAIL_EXIT1 ("msgrcv failed (errno=%d)", errno); + + int ret = 0; + if (strncmp (msg2snd.buf, msg2rcv.buf, TEXTSIZE) != 0) + ret = 1; + + if (msgctl (msqid, IPC_RMID, NULL) == -1) + FAIL_EXIT1 ("msgctl failed"); + + return ret; +} + +#include