get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/1.2/patches/2222512/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2222512,
    "url": "http://patchwork.ozlabs.org/api/1.2/patches/2222512/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/ltp/patch/20260412134046.31161-1-mmenashe@redhat.com/",
    "project": {
        "id": 59,
        "url": "http://patchwork.ozlabs.org/api/1.2/projects/59/?format=api",
        "name": "Linux Test Project development",
        "link_name": "ltp",
        "list_id": "ltp.lists.linux.it",
        "list_email": "ltp@lists.linux.it",
        "web_url": "",
        "scm_url": "",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260412134046.31161-1-mmenashe@redhat.com>",
    "list_archive_url": null,
    "date": "2026-04-12T13:40:46",
    "name": "futex: Add error coverage tests for wait, wake and cmp_requeue",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": false,
    "hash": "bda4f13ce4411f1b118b134f08a7c184eeb9d41b",
    "submitter": {
        "id": 93123,
        "url": "http://patchwork.ozlabs.org/api/1.2/people/93123/?format=api",
        "name": "Michael Menasherov",
        "email": "mmenashe@redhat.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/ltp/patch/20260412134046.31161-1-mmenashe@redhat.com/mbox/",
    "series": [
        {
            "id": 499608,
            "url": "http://patchwork.ozlabs.org/api/1.2/series/499608/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/ltp/list/?series=499608",
            "date": "2026-04-12T13:40:46",
            "name": "futex: Add error coverage tests for wait, wake and cmp_requeue",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/499608/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2222512/comments/",
    "check": "warning",
    "checks": "http://patchwork.ozlabs.org/api/patches/2222512/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it>",
        "X-Original-To": [
            "incoming@patchwork.ozlabs.org",
            "ltp@lists.linux.it"
        ],
        "Delivered-To": [
            "patchwork-incoming@legolas.ozlabs.org",
            "ltp@picard.linux.it"
        ],
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=lists.linux.it header.i=@lists.linux.it\n header.a=rsa-sha256 header.s=picard header.b=Jds9P9Nm;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=XeHaagsQ;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.linux.it\n (client-ip=2001:1418:10:5::2; helo=picard.linux.it;\n envelope-from=ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it;\n receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from picard.linux.it (picard.linux.it [IPv6:2001:1418:10:5::2])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4ftsCP313zz1yCx\n\tfor <incoming@patchwork.ozlabs.org>; Sun, 12 Apr 2026 23:41:53 +1000 (AEST)",
            "from picard.linux.it (localhost [IPv6:::1])\n\tby picard.linux.it (Postfix) with ESMTP id D535F3E2681\n\tfor <incoming@patchwork.ozlabs.org>; Sun, 12 Apr 2026 15:41:49 +0200 (CEST)",
            "from in-5.smtp.seeweb.it (in-5.smtp.seeweb.it\n [IPv6:2001:4b78:1:20::5])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature ECDSA (secp384r1))\n (No client certificate requested)\n by picard.linux.it (Postfix) with ESMTPS id A6D613E213C\n for <ltp@lists.linux.it>; Sun, 12 Apr 2026 15:41:44 +0200 (CEST)",
            "from us-smtp-delivery-124.mimecast.com\n (us-smtp-delivery-124.mimecast.com [170.10.129.124])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by in-5.smtp.seeweb.it (Postfix) with ESMTPS id 7E9F260074B\n for <ltp@lists.linux.it>; Sun, 12 Apr 2026 15:41:43 +0200 (CEST)",
            "from mail-wr1-f72.google.com (mail-wr1-f72.google.com\n [209.85.221.72]) by relay.mimecast.com with ESMTP with STARTTLS\n (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id\n us-mta-651-DUntwQX4OkSz_RD0mFx9LA-1; Sun, 12 Apr 2026 09:41:39 -0400",
            "by mail-wr1-f72.google.com with SMTP id\n ffacd0b85a97d-43d03ae4f2aso2563822f8f.1\n for <ltp@lists.linux.it>; Sun, 12 Apr 2026 06:41:39 -0700 (PDT)",
            "from fedora.redhat.com (46-116-192-140.bb.netvision.net.il.\n [46.116.192.140]) by smtp.gmail.com with ESMTPSA id\n ffacd0b85a97d-43d762decf6sm6090319f8f.8.2026.04.12.06.41.36\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Sun, 12 Apr 2026 06:41:36 -0700 (PDT)"
        ],
        "DKIM-Signature": [
            "v=1; a=rsa-sha256; c=relaxed/simple; d=lists.linux.it;\n i=@lists.linux.it; q=dns/txt; s=picard; t=1776001309; h=to : date :\n message-id : mime-version : subject : list-id : list-unsubscribe :\n list-archive : list-post : list-help : list-subscribe : from :\n reply-to : content-type : content-transfer-encoding : sender : from;\n bh=cNN8UMrC0Hpilmi7D9nn5hFtPaiJme+QDwEtdPTh7X8=;\n b=Jds9P9NmoF2nsRZQ/tviApDgFkIhsesYHCLcuNH+sfSkS3cae1vcAwdVqnMRmXeI7ILBf\n o2r9KT+DphfXBAjWcBHzpJ6KVtszz+OjMiOzLl8d9/tMApFrpSFjQ2XAmYlFpOWeUvm1FMy\n ZtbEqZZRSmtb6ui4RJcgq8G1IIHfSek=",
            "v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n s=mimecast20190719; t=1776001301;\n h=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n to:to:cc:cc:mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding;\n bh=naFlAFVhA+9TkyhG4nLdXdkVbJwqb2GGgJyx+rsyqWg=;\n b=XeHaagsQODrmVhkTsAdqcwVVVgPGPzEsRSxM6GnTtOqmY3YgsJiN6463ci6MBZWVfMLwc9\n e7FQsjLInTFzS4Vl6j+0rAgFoAfmomDp401EIM3+bHUoReWWo7du+zn+Py9rqm4DjBxwWc\n 2unqn9dWDq/WuZaruYyWQ0lFMmmP/ak="
        ],
        "X-MC-Unique": "DUntwQX4OkSz_RD0mFx9LA-1",
        "X-Mimecast-MFC-AGG-ID": "DUntwQX4OkSz_RD0mFx9LA_1776001299",
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776001298; x=1776606098;\n h=content-transfer-encoding:mime-version:message-id:date:subject:cc\n :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date\n :message-id:reply-to;\n bh=naFlAFVhA+9TkyhG4nLdXdkVbJwqb2GGgJyx+rsyqWg=;\n b=s162A+nIJwx9FPdyInVLQzuSealER1romk+BSptytPSVvMynbUTojHQx+Bx+PisgZC\n 5ij7Q49KBwBPrD3CLHcSWh3yu07RdzRPym7gml6CXs2K5ARG9Kgv0JXtbZxIG98j8gHK\n NGUHic5Y6jr4ce6ossDEDBO6XE/zIx5dTROySUoqb0CY5FVNLG1JBJ1n61UpntStTHh4\n fXv4pxoxDQvU2FIUJF47CjZZLnvD2K+/77AaGPg3koOLU2JuURtCRecCAEFm7T9ss4xc\n dsfhD0aTB7ocAszxpdhEHbLGJRPrsD5nHnkB4wFmrYf3+WahGDRKDcL5UBDz3wRmLKaM\n M5NA==",
        "X-Gm-Message-State": "AOJu0YxYkvfp7olKKc6o7fD3UpDoigHv5SKpGnUhlotkuU39Ajbytnzu\n xMZfcWrWKTwe5hkFmsxCU4Ccc5Wjg/NWpqTbkSO7vqaWtbQHmxpFvDdO8R6LaUQJZG83hVmjyw/\n F6gBzStvo62VpoHCpSBpIrkhhjqLfsLR1HMaIvuwo2uVhJ3bqkX4Mh9hlllKAEW7K5dbAzvRGHt\n jihr15EGAMm4B6rnae+xcCCU+eUL5T4zoDz7cS",
        "X-Gm-Gg": "AeBDietaybbCD45Xcm/K6wN781NwRYA+sp219QOVwksneddmSN/xxqhAWCl8NB6n+VS\n yvXKZ5axS+hoIgpdnWb9pNMY7Dp1py6KH87gjAqPyvu2x/7RUMMyFR0DbPqQu9mklbm7CehZaa9\n /dU11FdTUi+4uduQB1t2z7u174+jDXT1FQigxjeSeQe5QuOn1gyXNu1ZvS0d7rvazi9FQdxmiP2\n xoYjUtdfQxt+HO9pnYXo1sLRqNT4tSBMRLWAqWOtWQr8tuQ8k1Mx6o3Xygox9fwasFtlrFY6wCk\n OrFEUGwwsnyg1xf6yeDBdc3o90qVrk1cz3dHnSKhJceKkFaI+Hpd+TwGx8GQmFioW6v4V10e8mO\n 22XDmU8ZGVoJEnjgp2YM7DjstAFT8cP7nsXtEbiC/e/uaUpdnI7KG4GCpBa01HyBmSBY=",
        "X-Received": [
            "by 2002:a05:600c:4e4d:b0:485:3193:6ddb with SMTP id\n 5b1f17b1804b1-488d6808507mr136096055e9.3.1776001298102;\n Sun, 12 Apr 2026 06:41:38 -0700 (PDT)",
            "by 2002:a05:600c:4e4d:b0:485:3193:6ddb with SMTP id\n 5b1f17b1804b1-488d6808507mr136095545e9.3.1776001297484;\n Sun, 12 Apr 2026 06:41:37 -0700 (PDT)"
        ],
        "To": "ltp@lists.linux.it",
        "Date": "Sun, 12 Apr 2026 16:40:46 +0300",
        "Message-ID": "<20260412134046.31161-1-mmenashe@redhat.com>",
        "X-Mailer": "git-send-email 2.53.0",
        "MIME-Version": "1.0",
        "X-Mimecast-Spam-Score": "0",
        "X-Mimecast-MFC-PROC-ID": "5GrrKZDwKGhJytchxgdKKvY4EF01LbQQHwBd96Ely1U_1776001299",
        "X-Mimecast-Originator": "redhat.com",
        "X-Spam-Status": "No, score=0.1 required=7.0 tests=DKIM_SIGNED,DKIM_VALID,\n DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_PASS,SPF_PASS shortcircuit=no\n autolearn=disabled version=4.0.1",
        "X-Spam-Checker-Version": "SpamAssassin 4.0.1 (2024-03-25) on in-5.smtp.seeweb.it",
        "X-Virus-Scanned": "clamav-milter 1.0.9 at in-5.smtp.seeweb.it",
        "X-Virus-Status": "Clean",
        "Subject": "[LTP] [PATCH] futex: Add error coverage tests for wait,\n wake and cmp_requeue",
        "X-BeenThere": "ltp@lists.linux.it",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "Linux Test Project <ltp.lists.linux.it>",
        "List-Unsubscribe": "<https://lists.linux.it/options/ltp>,\n <mailto:ltp-request@lists.linux.it?subject=unsubscribe>",
        "List-Archive": "<http://lists.linux.it/pipermail/ltp/>",
        "List-Post": "<mailto:ltp@lists.linux.it>",
        "List-Help": "<mailto:ltp-request@lists.linux.it?subject=help>",
        "List-Subscribe": "<https://lists.linux.it/listinfo/ltp>,\n <mailto:ltp-request@lists.linux.it?subject=subscribe>",
        "From": "Michael Menasherov via ltp <ltp@lists.linux.it>",
        "Reply-To": "Michael Menasherov <mmenashe@redhat.com>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Errors-To": "ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it",
        "Sender": "\"ltp\" <ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it>"
    },
    "content": "Improve error handling coverage for futex syscalls by adding tests\nfor missing error conditions that were previously untested.\n\nfutex_wait06 verifies EFAULT is returned when uaddr or timeout\npoints to unmapped memory.\n\nfutex_wait07 verifies EINTR is returned when futex_wait() is\ninterrupted by a signal.\n\nfutex_wake05 verifies EFAULT is returned when uaddr points to\nunmapped or PROT_NONE memory.\n\nfutex_cmp_requeue03 verifies EFAULT is returned when uaddr or\nuaddr2 points to unmapped memory, and EACCES or EFAULT when uaddr\npoints to memory without read permission (PROT_NONE). The EACCES\nbehavior was introduced in kernel 5.9.\n---\n runtest/syscalls                              |   4 +\n testcases/kernel/syscalls/futex/.gitignore    |   4 +\n .../syscalls/futex/futex_cmp_requeue03.c      | 102 ++++++++++++++++\n .../kernel/syscalls/futex/futex_wait06.c      |  81 +++++++++++++\n .../kernel/syscalls/futex/futex_wait07.c      | 114 ++++++++++++++++++\n .../kernel/syscalls/futex/futex_wake05.c      |  85 +++++++++++++\n 6 files changed, 390 insertions(+)\n create mode 100644 testcases/kernel/syscalls/futex/futex_cmp_requeue03.c\n create mode 100644 testcases/kernel/syscalls/futex/futex_wait06.c\n create mode 100644 testcases/kernel/syscalls/futex/futex_wait07.c\n create mode 100644 testcases/kernel/syscalls/futex/futex_wake05.c",
    "diff": "diff --git a/runtest/syscalls b/runtest/syscalls\nindex 6ba0227a8..6c12dc225 100644\n--- a/runtest/syscalls\n+++ b/runtest/syscalls\n@@ -1859,11 +1859,14 @@ perf_event_open02 perf_event_open02\n \n futex_cmp_requeue01 futex_cmp_requeue01\n futex_cmp_requeue02 futex_cmp_requeue02\n+futex_cmp_requeue03 futex_cmp_requeue03\n futex_wait01 futex_wait01\n futex_wait02 futex_wait02\n futex_wait03 futex_wait03\n futex_wait04 futex_wait04\n futex_wait05 futex_wait05\n+futex_wait06 futex_wait06\n+futex_wait07 futex_wait07\n futex_waitv01 futex_waitv01\n futex_waitv02 futex_waitv02\n futex_waitv03 futex_waitv03\n@@ -1871,6 +1874,7 @@ futex_wake01 futex_wake01\n futex_wake02 futex_wake02\n futex_wake03 futex_wake03\n futex_wake04 futex_wake04\n+futex_wake05 futex_wake05\n futex_wait_bitset01 futex_wait_bitset01\n \n memfd_create01 memfd_create01\ndiff --git a/testcases/kernel/syscalls/futex/.gitignore b/testcases/kernel/syscalls/futex/.gitignore\nindex 9d08ba7d3..c47d39b5b 100644\n--- a/testcases/kernel/syscalls/futex/.gitignore\n+++ b/testcases/kernel/syscalls/futex/.gitignore\n@@ -1,15 +1,19 @@\n /futex_cmp_requeue01\n /futex_cmp_requeue02\n+/futex_cmp_requeue03\n /futex_wait01\n /futex_wait02\n /futex_wait03\n /futex_wait04\n /futex_wait05\n+/futex_wait06\n+/futex_wait07\n /futex_wait_bitset01\n /futex_wake01\n /futex_wake02\n /futex_wake03\n /futex_wake04\n+/futex_wake05\n /futex_waitv01\n /futex_waitv02\n /futex_waitv03\ndiff --git a/testcases/kernel/syscalls/futex/futex_cmp_requeue03.c b/testcases/kernel/syscalls/futex/futex_cmp_requeue03.c\nnew file mode 100644\nindex 000000000..66b18614d\n--- /dev/null\n+++ b/testcases/kernel/syscalls/futex/futex_cmp_requeue03.c\n@@ -0,0 +1,102 @@\n+// SPDX-License-Identifier: GPL-2.0-or-later\n+/*\n+ * Copyright (C) 2024 Red Hat, Inc.\n+ *\n+ * Check that futex(FUTEX_CMP_REQUEUE) returns EFAULT when uaddr or\n+ * uaddr2 points to unmapped memory, and EACCES when uaddr points to\n+ * memory without read permission (PROT_NONE).\n+ */\n+\n+#include <errno.h>\n+#include <sys/mman.h>\n+\n+#include \"futextest.h\"\n+\n+static futex_t futex = FUTEX_INITIALIZER;\n+static void *unmapped_addr;\n+static void *prot_none_addr;\n+\n+static struct futex_test_variants variants[] = {\n+#if (__NR_futex != __LTP__NR_INVALID_SYSCALL)\n+\t{ .fntype = FUTEX_FN_FUTEX, .desc = \"syscall with old kernel spec\"},\n+#endif\n+\n+#if (__NR_futex_time64 != __LTP__NR_INVALID_SYSCALL)\n+\t{ .fntype = FUTEX_FN_FUTEX64, .desc = \"syscall time64 with kernel spec\"},\n+#endif\n+};\n+\n+static struct testcase {\n+\tconst char *desc;\n+\t/* 1 = uaddr is bad, 0 = uaddr2 is bad */\n+\tint bad_uaddr;\n+\t/* 1 = PROT_NONE address, 0 = unmapped address */\n+\tint use_prot_none;\n+} testcases[] = {\n+\t{ \"uaddr unmapped\", 1, 0 },\n+\t{ \"uaddr2 unmapped\", 0, 0 },\n+\t{ \"uaddr PROT_NONE\", 1, 1 },\n+};\n+\n+static void run(unsigned int n)\n+{\n+\tstruct futex_test_variants *tv = &variants[tst_variant];\n+\tstruct testcase *tc = &testcases[n];\n+\tfutex_t *bad;\n+\tfutex_t *uaddr, *uaddr2;\n+\tint res;\n+\n+\tif (tc->use_prot_none)\n+\t\tbad = (futex_t *)prot_none_addr;\n+\telse\n+\t\tbad = (futex_t *)unmapped_addr;\n+\n+\t/* Assign bad address to uaddr or uaddr2, keep the other valid. */\n+\tif (tc->bad_uaddr) {\n+\t\tuaddr = bad;\n+\t\tuaddr2 = &futex;\n+\t} else {\n+\t\tuaddr = &futex;\n+\t\tuaddr2 = bad;\n+\t}\n+\n+\tres = futex_cmp_requeue(tv->fntype, uaddr, futex, uaddr2, 1, 1, 0);\n+\tif (res != -1) {\n+\t\ttst_res(TFAIL, \"futex_cmp_requeue() succeeded unexpectedly for '%s'\", tc->desc);\n+\t\treturn;\n+\t}\n+\tif (errno != EFAULT && errno != EACCES) {\n+\t\ttst_res(TFAIL | TERRNO, \"futex_cmp_requeue() failed with unexpected error for '%s', expected EFAULT or EACCES\",tc->desc);\n+\t\treturn;\n+\t}\n+\ttst_res(TPASS | TERRNO, \"futex_cmp_requeue() failed as expected for '%s'\", tc->desc);\n+}\n+\n+static void setup(void)\n+{\n+\tstruct futex_test_variants *tv = &variants[tst_variant];\n+\tsize_t pagesize = getpagesize();\n+\n+\ttst_res(TINFO, \"Testing variant: %s\", tv->desc);\n+\tfutex_supported_by_kernel(tv->fntype);\n+\n+\tunmapped_addr = SAFE_MMAP(NULL, pagesize, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);\n+\tSAFE_MUNMAP(unmapped_addr, pagesize);\n+\t/* PROT_NONE = mapped but no read permission, triggers EACCES or EFAULT */\n+\tprot_none_addr = SAFE_MMAP(NULL, pagesize, PROT_NONE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);\n+}\n+\n+static void cleanup(void)\n+{\n+\tif (prot_none_addr) {\n+\t\tSAFE_MUNMAP(prot_none_addr, getpagesize());\n+\t}\n+}\n+\n+static struct tst_test test = {\n+\t.setup = setup,\n+\t.cleanup = cleanup,\n+\t.test = run,\n+\t.tcnt = ARRAY_SIZE(testcases),\n+\t.test_variants = ARRAY_SIZE(variants),\n+};\ndiff --git a/testcases/kernel/syscalls/futex/futex_wait06.c b/testcases/kernel/syscalls/futex/futex_wait06.c\nnew file mode 100644\nindex 000000000..1b9db0241\n--- /dev/null\n+++ b/testcases/kernel/syscalls/futex/futex_wait06.c\n@@ -0,0 +1,81 @@\n+// SPDX-License-Identifier: GPL-2.0-or-later\n+/*\n+ * Copyright (C) 2024 Red Hat, Inc.\n+ *\n+ * Check that futex(FUTEX_WAIT) returns EFAULT when:\n+ * 1) uaddr points to unmapped memory\n+ * 2) timeout points to unmapped memory\n+ */\n+#include <errno.h>\n+#include <sys/mman.h>\n+\n+#include \"futextest.h\"\n+\n+static futex_t futex = FUTEX_INITIALIZER;\n+static void *bad_addr;\n+\n+static struct futex_test_variants variants[] = {\n+#if (__NR_futex != __LTP__NR_INVALID_SYSCALL)\n+\t{ .fntype = FUTEX_FN_FUTEX, .tstype = TST_KERN_OLD_TIMESPEC, .desc = \"syscall with old kernel spec\"},\n+#endif\n+\n+#if (__NR_futex_time64 != __LTP__NR_INVALID_SYSCALL)\n+\t{ .fntype = FUTEX_FN_FUTEX64, .tstype = TST_KERN_TIMESPEC, .desc = \"syscall time64 with kernel spec\"},\n+#endif\n+};\n+\n+static struct testcase {\n+\tconst char *desc;\n+} testcases[] = {\n+\t{ \"uaddr points to unmapped memory\" },\n+\t{ \"timeout points to unmapped memory\" },\n+};\n+\n+static void run(unsigned int n)\n+{\n+\tstruct futex_test_variants *tv = &variants[tst_variant];\n+\tstruct testcase *tc = &testcases[n];\n+\tint res;\n+\n+\tif (n == 0) {\n+\t\tres = futex_syscall(tv->fntype, (futex_t *)bad_addr, FUTEX_WAIT, 0, NULL, NULL, 0, 0);\n+\t} else if (n == 1) {\n+\t\tres = futex_syscall(tv->fntype, &futex, FUTEX_WAIT, futex, bad_addr, NULL, 0, 0);\n+\t} else {\n+\t\ttst_brk(TBROK, \"Invalid test case %u\", n);\n+\t\treturn;\n+\t}\n+\n+\tif (res != -1) {\n+\t\ttst_res(TFAIL, \"futex_wait() succeeded unexpectedly for '%s'\", tc->desc);\n+\t\treturn;\n+\t}\n+\n+\tif (errno != EFAULT) {\n+\t\ttst_res(TFAIL | TERRNO, \"futex_wait() expected EFAULT for '%s', got\", tc->desc);\n+\t\treturn;\n+\t}\n+\n+\ttst_res(TPASS | TERRNO, \"futex_wait() failed as expected for '%s'\", tc->desc);\n+}\n+\n+static void setup(void)\n+{\n+\tstruct futex_test_variants *tv = &variants[tst_variant];\n+\n+\ttst_res(TINFO, \"Testing variant: %s\", tv->desc);\n+\tfutex_supported_by_kernel(tv->fntype);\n+\tbad_addr = mmap(NULL, getpagesize(), PROT_NONE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);\n+\n+\tif (bad_addr == MAP_FAILED) {\n+\t\ttst_brk(TBROK | TERRNO, \"mmap() failed\");\n+\t}\n+\tSAFE_MUNMAP(bad_addr, getpagesize());\n+}\n+\n+static struct tst_test test = {\n+\t.setup = setup,\n+\t.test = run,\n+\t.tcnt = ARRAY_SIZE(testcases),\n+\t.test_variants = ARRAY_SIZE(variants),\n+};\ndiff --git a/testcases/kernel/syscalls/futex/futex_wait07.c b/testcases/kernel/syscalls/futex/futex_wait07.c\nnew file mode 100644\nindex 000000000..bfaacd03b\n--- /dev/null\n+++ b/testcases/kernel/syscalls/futex/futex_wait07.c\n@@ -0,0 +1,114 @@\n+// SPDX-License-Identifier: GPL-2.0-or-later\n+/*\n+ * Copyright (C) 2024 Red Hat, Inc.\n+ * Check that futex(FUTEX_WAIT) returns EINTR when interrupted by a signal.\n+ * A child process blocks on futex_wait() with a long timeout. The parent\n+ * waits for the child to enter sleep state, then sends SIGUSR1 to it.\n+ * The child verifies it received EINTR and exits accordingly.\n+ */\n+\n+#include <errno.h>\n+#include <signal.h>\n+#include <sys/wait.h>\n+\n+#include \"futextest.h\"\n+\n+static futex_t *futex;\n+\n+static struct futex_test_variants variants[] = {\n+#if (__NR_futex != __LTP__NR_INVALID_SYSCALL)\n+\t{ .fntype = FUTEX_FN_FUTEX, .tstype = TST_KERN_OLD_TIMESPEC, .desc = \"syscall with old kernel spec\"},\n+#endif\n+\n+#if (__NR_futex_time64 != __LTP__NR_INVALID_SYSCALL)\n+\t{ .fntype = FUTEX_FN_FUTEX64, .tstype = TST_KERN_TIMESPEC, .desc = \"syscall time64 with kernel spec\"},\n+#endif\n+};\n+\n+/* We need a handler so SIGUSR1 is caught instead of killing the process.\n+ * The empty body is needed, just receiving the signal is enough to\n+ * interrupt futex_wait() and make it return into EINTR -1 status.\n+ */\n+static void sigusr1_handler(int sig LTP_ATTRIBUTE_UNUSED)\n+{\n+}\n+\n+static void do_child(void)\n+{\n+\tstruct futex_test_variants *tv = &variants[tst_variant];\n+\tstruct sigaction sa;\n+\tstruct tst_ts timeout;\n+\tint res;\n+\n+\t/* Set up the signal handler for SIGUSR1 */\n+\tsa.sa_handler = sigusr1_handler;\n+\tsa.sa_flags = 0;\n+\tSAFE_SIGEMPTYSET(&sa.sa_mask);\n+\tSAFE_SIGACTION(SIGUSR1, &sa, NULL);\n+\n+\t/* Create a timeout for 5 sec for this variant.\n+\t * if no one wakes the child before 5 sec, futex_wait() will return\n+\t * on its own with ETIMEDOUT and will not wait any longer\n+\t */\n+\ttimeout = tst_ts_from_ms(tv->tstype, 5000);\n+\tres = futex_wait(tv->fntype, futex, *futex, &timeout, 0);\n+\n+\tif (res != -1) {\n+\t\ttst_res(TFAIL, \"futex_wait() should have failed with EINTR but returned success instead\");\n+\t\texit(1);\n+\t}\n+\tif (errno != EINTR) {\n+\t\ttst_res(TFAIL | TERRNO, \"futex_wait() expected EINTR but got something else, errno\");\n+\t\texit(1);\n+\t}\n+\ttst_res(TPASS | TERRNO, \"futex_wait() returned EINTR as expected\");\n+\texit(0);\n+}\n+\n+static void run(void)\n+{\n+\tpid_t child;\n+\tint status;\n+\n+\tchild = SAFE_FORK();\n+\n+\tif (child == 0) {\n+\t\tdo_child();\n+\t}\n+\t/* Wait until child is sleeping before sending signal */\n+\tTST_PROCESS_STATE_WAIT(child, 'S', 0);\n+\t/* Wake up the child so it will return EINTR -1 status */\n+\tSAFE_KILL(child, SIGUSR1);\n+\tSAFE_WAITPID(child, &status, 0);\n+\t/* Check if the child finished everything as it should */\n+\tif (!WIFEXITED(status) || WEXITSTATUS(status) != 0) {\n+\t\ttst_res(TFAIL, \"child exited abnormally\");\n+\t}\n+}\n+\n+static void setup(void)\n+{\n+\tstruct futex_test_variants *tv = &variants[tst_variant];\n+\n+\ttst_res(TINFO, \"Testing variant: %s\", tv->desc);\n+\tfutex_supported_by_kernel(tv->fntype);\n+\n+\t/* Futex needs to be in a shared memory so the parent and the child can access into it */\n+\tfutex = SAFE_MMAP(NULL, sizeof(*futex), PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_SHARED, -1, 0);\n+\t*futex = FUTEX_INITIALIZER;\n+}\n+\n+static void cleanup(void)\n+{\n+\tif (futex) {\n+\t\tSAFE_MUNMAP((void *)futex, sizeof(*futex));\n+\t}\n+}\n+\n+static struct tst_test test = {\n+\t.setup = setup,\n+\t.cleanup = cleanup,\n+\t.test_all = run,\n+\t.test_variants = ARRAY_SIZE(variants),\n+\t.forks_child = 1,\n+};\ndiff --git a/testcases/kernel/syscalls/futex/futex_wake05.c b/testcases/kernel/syscalls/futex/futex_wake05.c\nnew file mode 100644\nindex 000000000..891beb347\n--- /dev/null\n+++ b/testcases/kernel/syscalls/futex/futex_wake05.c\n@@ -0,0 +1,85 @@\n+// SPDX-License-Identifier: GPL-2.0-or-later\n+/*\n+ * Copyright (C) 2024 Red Hat, Inc.\n+ *\n+ * Check that futex(FUTEX_WAKE) returns EFAULT when:\n+ * 1) uaddr points to unmapped memory\n+ * 2) uaddr points to memory without read permission (PROT_NONE)\n+ */\n+\n+#include <errno.h>\n+#include <sys/mman.h>\n+#include \"futextest.h\"\n+\n+static void *unmapped_addr;\n+static void *prot_none_addr;\n+\n+static struct futex_test_variants variants[] = {\n+#if (__NR_futex != __LTP__NR_INVALID_SYSCALL)\n+\t{ .fntype = FUTEX_FN_FUTEX, .desc = \"syscall with old kernel spec\"},\n+#endif\n+\n+#if (__NR_futex_time64 != __LTP__NR_INVALID_SYSCALL)\n+\t{ .fntype = FUTEX_FN_FUTEX64, .desc = \"syscall time64 with kernel spec\"},\n+#endif\n+};\n+\n+static struct testcase {\n+\tconst char *desc;\n+\tint opflags;\n+\tint exp_errno;\n+} testcases[] = {\n+\t{ \"uaddr unmapped\", 0, EFAULT },\n+\t{ \"uaddr PROT_NONE\", 0, EFAULT },\n+};\n+\n+static void run(unsigned int n)\n+{\n+\tstruct futex_test_variants *tv = &variants[tst_variant];\n+\tstruct testcase *tc = &testcases[n];\n+\tfutex_t *addr;\n+\tint res;\n+\n+\tif (n == 0)\n+\t\taddr = (futex_t *)unmapped_addr;\n+\telse\n+\t\taddr = (futex_t *)prot_none_addr;\n+\tres = futex_wake(tv->fntype, addr, 1, tc->opflags);\n+\tif (res != -1) {\n+\t\ttst_res(TFAIL, \"futex_wake() succeeded unexpectedly for '%s'\", tc->desc);\n+\t\treturn;\n+\t}\n+\tif (errno != tc->exp_errno) {\n+\t\ttst_res(TFAIL | TERRNO, \"futex_wake() failed with unexpected error for '%s', we expected: %s\", tc->desc, tst_strerrno(tc->exp_errno));\n+\t\treturn;\n+\t}\n+\ttst_res(TPASS | TERRNO, \"futex_wake() failed as expected for '%s'\", tc->desc);\n+}\n+\n+static void setup(void)\n+{\n+\tstruct futex_test_variants *tv = &variants[tst_variant];\n+\tsize_t pagesize = getpagesize();\n+\n+\ttst_res(TINFO, \"Testing variant: %s\", tv->desc);\n+\tfutex_supported_by_kernel(tv->fntype);\n+\n+\tunmapped_addr = SAFE_MMAP(NULL, pagesize, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);\n+\tSAFE_MUNMAP(unmapped_addr, pagesize);\n+\tprot_none_addr = SAFE_MMAP(NULL, pagesize, PROT_NONE, MAP_PRIVATE| MAP_ANONYMOUS, -1, 0);\n+}\n+\n+static void cleanup(void)\n+{\n+\tif (prot_none_addr) {\n+\t\tSAFE_MUNMAP(prot_none_addr, getpagesize());\n+\t}\n+}\n+\n+static struct tst_test test = {\n+\t.setup = setup,\n+\t.cleanup = cleanup,\n+\t.test = run,\n+\t.tcnt = ARRAY_SIZE(testcases),\n+\t.test_variants = ARRAY_SIZE(variants),\n+};\n",
    "prefixes": []
}