From: Subrata <sub...@us...> - 2009-03-23 14:46:26
|
Update of /cvsroot/ltp/ltp/testcases/kernel/syscalls/get_robust_list In directory ddv4jf1.ch3.sourceforge.com:/tmp/cvs-serv14647/ltp/testcases/kernel/syscalls/get_robust_list Modified Files: get_robust_list01.c Log Message: Coding Syle Cleanups. Signed-Off-By: <mic...@pe...>. Index: get_robust_list01.c =================================================================== RCS file: /cvsroot/ltp/ltp/testcases/kernel/syscalls/get_robust_list/get_robust_list01.c,v retrieving revision 1.4 retrieving revision 1.5 diff -C2 -d -r1.4 -r1.5 *** get_robust_list01.c 7 Nov 2008 10:15:22 -0000 1.4 --- get_robust_list01.c 23 Mar 2009 13:35:41 -0000 1.5 *************** *** 53,90 **** #include "usctest.h" ! char *TCID = "get_robust_list01"; /* test program identifier. */ ! int TST_TOTAL = 5; /* total number of tests in this file. */ #ifdef __NR_get_robust_list struct robust_list { ! struct robust_list *next; }; struct robust_list_head { ! struct robust_list list; ! long futex_offset; ! struct robust_list *list_op_pending; }; ! extern int Tst_count; /* counter for tst_xxx routines. */ ! ! int exp_enos[] = {ESRCH, EPERM, EFAULT, 0}; void setup(void); void cleanup(void); ! int ! main(int argc, char **argv) { int lc; /* loop counter */ char *msg; /* message returned from parse_opts */ ! struct robust_list_head head; ! size_t len_ptr; /* size of structure struct robust_list_head */ ! int retval; msg = parse_opts(argc, argv, (option_t *) NULL, NULL); ! if (msg != (char *) NULL) { tst_brkm(TBROK, NULL, "OPTION PARSING ERROR - %s", msg); tst_exit(); --- 53,88 ---- #include "usctest.h" ! char *TCID = "get_robust_list01"; /* test program identifier. */ ! int TST_TOTAL = 5; /* total number of tests in this file. */ #ifdef __NR_get_robust_list struct robust_list { ! struct robust_list *next; }; struct robust_list_head { ! struct robust_list list; ! long futex_offset; ! struct robust_list *list_op_pending; }; + extern int Tst_count; /* counter for tst_xxx routines. */ ! int exp_enos[] = { ESRCH, EPERM, EFAULT, 0 }; void setup(void); void cleanup(void); ! int main(int argc, char **argv) { int lc; /* loop counter */ char *msg; /* message returned from parse_opts */ ! struct robust_list_head head; ! size_t len_ptr; /* size of structure struct robust_list_head */ ! int retval; msg = parse_opts(argc, argv, (option_t *) NULL, NULL); ! if (msg != (char *)NULL) { tst_brkm(TBROK, NULL, "OPTION PARSING ERROR - %s", msg); tst_exit(); *************** *** 93,225 **** setup(); ! len_ptr = sizeof(struct robust_list_head); for (lc = 0; TEST_LOOPING(lc); ++lc) { Tst_count = 0; ! /* ! * The get_robust_list function fails with EFAULT if the size of the ! * struct robust_list_head can't be stored in the memory address space ! * specified by len_ptr argument, or the head of the robust list can't ! * be stored in the memory address space specified by the head_ptr ! * argument. ! */ ! TEST(retval = syscall(__NR_get_robust_list, 0, ! (struct robust_list_head *)&head, (size_t *)NULL)); ! if (TEST_RETURN) { ! if (TEST_ERRNO == EFAULT) ! tst_resm(TPASS, "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, -1, TEST_ERRNO, EFAULT); ! else ! tst_resm(TFAIL, "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, -1, TEST_ERRNO, EFAULT); ! } ! else { ! tst_resm(TFAIL, "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, -1, TEST_ERRNO, EFAULT); ! } ! TEST(retval = syscall(__NR_get_robust_list, 0, ! (struct robust_list_head **)NULL, &len_ptr)); ! if (TEST_RETURN) { ! if (TEST_ERRNO == EFAULT) ! tst_resm(TPASS, "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, -1, TEST_ERRNO, EFAULT); ! else ! tst_resm(TFAIL, "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, -1, TEST_ERRNO, EFAULT); ! } ! else { ! tst_resm(TFAIL, "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, -1, TEST_ERRNO, EFAULT); ! } ! /* ! * The get_robust_list function fails with ESRCH if it can't find the ! * task specified by the pid argument. The value 65535 is used as the ! * pid argument. ! */ ! TEST(retval = syscall(__NR_get_robust_list, 65535, ! (struct robust_list_head *)&head, &len_ptr)); ! if (TEST_RETURN) { ! if (TEST_ERRNO == ESRCH) ! tst_resm(TPASS, "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, -1, TEST_ERRNO, ESRCH); ! else ! tst_resm(TFAIL, "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, -1, TEST_ERRNO, ESRCH); ! } ! else { ! tst_resm(TFAIL, "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, -1, TEST_ERRNO, ESRCH); ! } ! /* ! * The get_robust_list function fails with EPERM if it has no ! * permission to access the task specified by the pid argument. ! * The current user id of the process is changed to 1 (bin), and the ! * value of 1 (init) is used as the pid argument. ! */ ! /* ! * Temporarily drop root privleges. ! */ ! seteuid(1); ! TEST(retval = syscall(__NR_get_robust_list, 1, ! (struct robust_list_head *)&head, &len_ptr)); ! if (TEST_RETURN) { ! if (TEST_ERRNO == EPERM) ! tst_resm(TPASS, "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, -1, TEST_ERRNO, EPERM); ! else ! tst_resm(TFAIL, "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, -1, TEST_ERRNO, EPERM); ! } ! else { ! tst_resm(TFAIL, "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, -1, TEST_ERRNO, EPERM); ! } ! /* ! * Regain root privileges. ! */ ! seteuid(0); ! /* ! * This call to get_robust_list function should be sucessful. ! */ ! TEST(retval = syscall(__NR_get_robust_list, 0, ! (struct robust_list_head **)&head, &len_ptr)); ! if (TEST_RETURN == 0) { ! tst_resm(TPASS, "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, 0, TEST_ERRNO, 0); ! } ! else { ! tst_resm(TFAIL, "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, 0, TEST_ERRNO, 0); ! } } --- 91,237 ---- setup(); ! len_ptr = sizeof(struct robust_list_head); for (lc = 0; TEST_LOOPING(lc); ++lc) { Tst_count = 0; ! /* ! * The get_robust_list function fails with EFAULT if the size of the ! * struct robust_list_head can't be stored in the memory address space ! * specified by len_ptr argument, or the head of the robust list can't ! * be stored in the memory address space specified by the head_ptr ! * argument. ! */ ! TEST(retval = syscall(__NR_get_robust_list, 0, ! (struct robust_list_head *)&head, ! (size_t *) NULL)); ! if (TEST_RETURN) { ! if (TEST_ERRNO == EFAULT) ! tst_resm(TPASS, ! "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, -1, TEST_ERRNO, EFAULT); ! else ! tst_resm(TFAIL, ! "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, -1, TEST_ERRNO, EFAULT); ! } else { ! tst_resm(TFAIL, ! "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", TEST_RETURN, -1, ! TEST_ERRNO, EFAULT); ! } ! TEST(retval = syscall(__NR_get_robust_list, 0, ! (struct robust_list_head **)NULL, ! &len_ptr)); ! if (TEST_RETURN) { ! if (TEST_ERRNO == EFAULT) ! tst_resm(TPASS, ! "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, -1, TEST_ERRNO, EFAULT); ! else ! tst_resm(TFAIL, ! "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, -1, TEST_ERRNO, EFAULT); ! } else { ! tst_resm(TFAIL, ! "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", TEST_RETURN, -1, ! TEST_ERRNO, EFAULT); ! } ! /* ! * The get_robust_list function fails with ESRCH if it can't find the ! * task specified by the pid argument. The value 65535 is used as the ! * pid argument. ! */ ! TEST(retval = syscall(__NR_get_robust_list, 65535, ! (struct robust_list_head *)&head, ! &len_ptr)); ! if (TEST_RETURN) { ! if (TEST_ERRNO == ESRCH) ! tst_resm(TPASS, ! "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, -1, TEST_ERRNO, ESRCH); ! else ! tst_resm(TFAIL, ! "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, -1, TEST_ERRNO, ESRCH); ! } else { ! tst_resm(TFAIL, ! "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", TEST_RETURN, -1, ! TEST_ERRNO, ESRCH); ! } ! /* ! * The get_robust_list function fails with EPERM if it has no ! * permission to access the task specified by the pid argument. ! * The current user id of the process is changed to 1 (bin), and the ! * value of 1 (init) is used as the pid argument. ! */ ! /* ! * Temporarily drop root privleges. ! */ ! seteuid(1); ! TEST(retval = syscall(__NR_get_robust_list, 1, ! (struct robust_list_head *)&head, ! &len_ptr)); ! if (TEST_RETURN) { ! if (TEST_ERRNO == EPERM) ! tst_resm(TPASS, ! "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, -1, TEST_ERRNO, EPERM); ! else ! tst_resm(TFAIL, ! "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", ! TEST_RETURN, -1, TEST_ERRNO, EPERM); ! } else { ! tst_resm(TFAIL, ! "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", TEST_RETURN, -1, ! TEST_ERRNO, EPERM); ! } ! /* ! * Regain root privileges. ! */ ! seteuid(0); ! /* ! * This call to get_robust_list function should be sucessful. ! */ ! TEST(retval = syscall(__NR_get_robust_list, 0, ! (struct robust_list_head **)&head, ! &len_ptr)); ! if (TEST_RETURN == 0) { ! tst_resm(TPASS, ! "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", TEST_RETURN, 0, ! TEST_ERRNO, 0); ! } else { ! tst_resm(TFAIL, ! "get_robust_list: retval = %d (expected %d), " ! "errno = %d (expected %d)", TEST_RETURN, 0, ! TEST_ERRNO, 0); ! } } *************** *** 227,247 **** cleanup(); ! exit(EXIT_SUCCESS); } ! void ! setup(void) { TEST_EXP_ENOS(exp_enos); ! TEST_PAUSE; } ! void ! cleanup(void) { ! TEST_CLEANUP; ! tst_exit(); } --- 239,257 ---- cleanup(); ! exit(EXIT_SUCCESS); } ! void setup(void) { TEST_EXP_ENOS(exp_enos); ! TEST_PAUSE; } ! void cleanup(void) { ! TEST_CLEANUP; ! tst_exit(); } |