{"id":2222512,"url":"http://patchwork.ozlabs.org/api/1.2/patches/2222512/?format=json","web_url":"http://patchwork.ozlabs.org/project/ltp/patch/20260412134046.31161-1-mmenashe@redhat.com/","project":{"id":59,"url":"http://patchwork.ozlabs.org/api/1.2/projects/59/?format=json","name":"Linux Test Project development","link_name":"ltp","list_id":"ltp.lists.linux.it","list_email":"ltp@lists.linux.it","web_url":"","scm_url":"","webscm_url":"","list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20260412134046.31161-1-mmenashe@redhat.com>","list_archive_url":null,"date":"2026-04-12T13:40:46","name":"futex: Add error coverage tests for wait, wake and cmp_requeue","commit_ref":null,"pull_url":null,"state":"superseded","archived":false,"hash":"bda4f13ce4411f1b118b134f08a7c184eeb9d41b","submitter":{"id":93123,"url":"http://patchwork.ozlabs.org/api/1.2/people/93123/?format=json","name":"Michael Menasherov","email":"mmenashe@redhat.com"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/ltp/patch/20260412134046.31161-1-mmenashe@redhat.com/mbox/","series":[{"id":499608,"url":"http://patchwork.ozlabs.org/api/1.2/series/499608/?format=json","web_url":"http://patchwork.ozlabs.org/project/ltp/list/?series=499608","date":"2026-04-12T13:40:46","name":"futex: Add error coverage tests for wait, wake and cmp_requeue","version":1,"mbox":"http://patchwork.ozlabs.org/series/499608/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/2222512/comments/","check":"warning","checks":"http://patchwork.ozlabs.org/api/patches/2222512/checks/","tags":{},"related":[],"headers":{"Return-Path":"<ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it>","X-Original-To":["incoming@patchwork.ozlabs.org","ltp@lists.linux.it"],"Delivered-To":["patchwork-incoming@legolas.ozlabs.org","ltp@picard.linux.it"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=lists.linux.it header.i=@lists.linux.it\n header.a=rsa-sha256 header.s=picard header.b=Jds9P9Nm;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=XeHaagsQ;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.linux.it\n (client-ip=2001:1418:10:5::2; helo=picard.linux.it;\n envelope-from=ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it;\n receiver=patchwork.ozlabs.org)"],"Received":["from picard.linux.it (picard.linux.it [IPv6:2001:1418:10:5::2])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4ftsCP313zz1yCx\n\tfor <incoming@patchwork.ozlabs.org>; Sun, 12 Apr 2026 23:41:53 +1000 (AEST)","from picard.linux.it (localhost [IPv6:::1])\n\tby picard.linux.it (Postfix) with ESMTP id D535F3E2681\n\tfor <incoming@patchwork.ozlabs.org>; Sun, 12 Apr 2026 15:41:49 +0200 (CEST)","from in-5.smtp.seeweb.it (in-5.smtp.seeweb.it\n [IPv6:2001:4b78:1:20::5])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature ECDSA (secp384r1))\n (No client certificate requested)\n by picard.linux.it (Postfix) with ESMTPS id A6D613E213C\n for <ltp@lists.linux.it>; Sun, 12 Apr 2026 15:41:44 +0200 (CEST)","from us-smtp-delivery-124.mimecast.com\n (us-smtp-delivery-124.mimecast.com [170.10.129.124])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by in-5.smtp.seeweb.it (Postfix) with ESMTPS id 7E9F260074B\n for <ltp@lists.linux.it>; Sun, 12 Apr 2026 15:41:43 +0200 (CEST)","from mail-wr1-f72.google.com (mail-wr1-f72.google.com\n [209.85.221.72]) by relay.mimecast.com with ESMTP with STARTTLS\n (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id\n us-mta-651-DUntwQX4OkSz_RD0mFx9LA-1; Sun, 12 Apr 2026 09:41:39 -0400","by mail-wr1-f72.google.com with SMTP id\n ffacd0b85a97d-43d03ae4f2aso2563822f8f.1\n for <ltp@lists.linux.it>; Sun, 12 Apr 2026 06:41:39 -0700 (PDT)","from fedora.redhat.com (46-116-192-140.bb.netvision.net.il.\n [46.116.192.140]) by smtp.gmail.com with ESMTPSA id\n ffacd0b85a97d-43d762decf6sm6090319f8f.8.2026.04.12.06.41.36\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Sun, 12 Apr 2026 06:41:36 -0700 (PDT)"],"DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/simple; d=lists.linux.it;\n i=@lists.linux.it; q=dns/txt; s=picard; t=1776001309; h=to : date :\n message-id : mime-version : subject : list-id : list-unsubscribe :\n list-archive : list-post : list-help : list-subscribe : from :\n reply-to : content-type : content-transfer-encoding : sender : from;\n bh=cNN8UMrC0Hpilmi7D9nn5hFtPaiJme+QDwEtdPTh7X8=;\n b=Jds9P9NmoF2nsRZQ/tviApDgFkIhsesYHCLcuNH+sfSkS3cae1vcAwdVqnMRmXeI7ILBf\n o2r9KT+DphfXBAjWcBHzpJ6KVtszz+OjMiOzLl8d9/tMApFrpSFjQ2XAmYlFpOWeUvm1FMy\n ZtbEqZZRSmtb6ui4RJcgq8G1IIHfSek=","v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n s=mimecast20190719; t=1776001301;\n h=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n to:to:cc:cc:mime-version:mime-version:content-type:content-type:\n content-transfer-encoding:content-transfer-encoding;\n bh=naFlAFVhA+9TkyhG4nLdXdkVbJwqb2GGgJyx+rsyqWg=;\n b=XeHaagsQODrmVhkTsAdqcwVVVgPGPzEsRSxM6GnTtOqmY3YgsJiN6463ci6MBZWVfMLwc9\n e7FQsjLInTFzS4Vl6j+0rAgFoAfmomDp401EIM3+bHUoReWWo7du+zn+Py9rqm4DjBxwWc\n 2unqn9dWDq/WuZaruYyWQ0lFMmmP/ak="],"X-MC-Unique":"DUntwQX4OkSz_RD0mFx9LA-1","X-Mimecast-MFC-AGG-ID":"DUntwQX4OkSz_RD0mFx9LA_1776001299","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776001298; x=1776606098;\n h=content-transfer-encoding:mime-version:message-id:date:subject:cc\n :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date\n :message-id:reply-to;\n bh=naFlAFVhA+9TkyhG4nLdXdkVbJwqb2GGgJyx+rsyqWg=;\n b=s162A+nIJwx9FPdyInVLQzuSealER1romk+BSptytPSVvMynbUTojHQx+Bx+PisgZC\n 5ij7Q49KBwBPrD3CLHcSWh3yu07RdzRPym7gml6CXs2K5ARG9Kgv0JXtbZxIG98j8gHK\n NGUHic5Y6jr4ce6ossDEDBO6XE/zIx5dTROySUoqb0CY5FVNLG1JBJ1n61UpntStTHh4\n fXv4pxoxDQvU2FIUJF47CjZZLnvD2K+/77AaGPg3koOLU2JuURtCRecCAEFm7T9ss4xc\n dsfhD0aTB7ocAszxpdhEHbLGJRPrsD5nHnkB4wFmrYf3+WahGDRKDcL5UBDz3wRmLKaM\n M5NA==","X-Gm-Message-State":"AOJu0YxYkvfp7olKKc6o7fD3UpDoigHv5SKpGnUhlotkuU39Ajbytnzu\n xMZfcWrWKTwe5hkFmsxCU4Ccc5Wjg/NWpqTbkSO7vqaWtbQHmxpFvDdO8R6LaUQJZG83hVmjyw/\n F6gBzStvo62VpoHCpSBpIrkhhjqLfsLR1HMaIvuwo2uVhJ3bqkX4Mh9hlllKAEW7K5dbAzvRGHt\n jihr15EGAMm4B6rnae+xcCCU+eUL5T4zoDz7cS","X-Gm-Gg":"AeBDietaybbCD45Xcm/K6wN781NwRYA+sp219QOVwksneddmSN/xxqhAWCl8NB6n+VS\n yvXKZ5axS+hoIgpdnWb9pNMY7Dp1py6KH87gjAqPyvu2x/7RUMMyFR0DbPqQu9mklbm7CehZaa9\n /dU11FdTUi+4uduQB1t2z7u174+jDXT1FQigxjeSeQe5QuOn1gyXNu1ZvS0d7rvazi9FQdxmiP2\n xoYjUtdfQxt+HO9pnYXo1sLRqNT4tSBMRLWAqWOtWQr8tuQ8k1Mx6o3Xygox9fwasFtlrFY6wCk\n OrFEUGwwsnyg1xf6yeDBdc3o90qVrk1cz3dHnSKhJceKkFaI+Hpd+TwGx8GQmFioW6v4V10e8mO\n 22XDmU8ZGVoJEnjgp2YM7DjstAFT8cP7nsXtEbiC/e/uaUpdnI7KG4GCpBa01HyBmSBY=","X-Received":["by 2002:a05:600c:4e4d:b0:485:3193:6ddb with SMTP id\n 5b1f17b1804b1-488d6808507mr136096055e9.3.1776001298102;\n Sun, 12 Apr 2026 06:41:38 -0700 (PDT)","by 2002:a05:600c:4e4d:b0:485:3193:6ddb with SMTP id\n 5b1f17b1804b1-488d6808507mr136095545e9.3.1776001297484;\n Sun, 12 Apr 2026 06:41:37 -0700 (PDT)"],"To":"ltp@lists.linux.it","Date":"Sun, 12 Apr 2026 16:40:46 +0300","Message-ID":"<20260412134046.31161-1-mmenashe@redhat.com>","X-Mailer":"git-send-email 2.53.0","MIME-Version":"1.0","X-Mimecast-Spam-Score":"0","X-Mimecast-MFC-PROC-ID":"5GrrKZDwKGhJytchxgdKKvY4EF01LbQQHwBd96Ely1U_1776001299","X-Mimecast-Originator":"redhat.com","X-Spam-Status":"No, score=0.1 required=7.0 tests=DKIM_SIGNED,DKIM_VALID,\n DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_PASS,SPF_PASS shortcircuit=no\n autolearn=disabled version=4.0.1","X-Spam-Checker-Version":"SpamAssassin 4.0.1 (2024-03-25) on in-5.smtp.seeweb.it","X-Virus-Scanned":"clamav-milter 1.0.9 at in-5.smtp.seeweb.it","X-Virus-Status":"Clean","Subject":"[LTP] [PATCH] futex: Add error coverage tests for wait,\n wake and cmp_requeue","X-BeenThere":"ltp@lists.linux.it","X-Mailman-Version":"2.1.29","Precedence":"list","List-Id":"Linux Test Project <ltp.lists.linux.it>","List-Unsubscribe":"<https://lists.linux.it/options/ltp>,\n <mailto:ltp-request@lists.linux.it?subject=unsubscribe>","List-Archive":"<http://lists.linux.it/pipermail/ltp/>","List-Post":"<mailto:ltp@lists.linux.it>","List-Help":"<mailto:ltp-request@lists.linux.it?subject=help>","List-Subscribe":"<https://lists.linux.it/listinfo/ltp>,\n <mailto:ltp-request@lists.linux.it?subject=subscribe>","From":"Michael Menasherov via ltp <ltp@lists.linux.it>","Reply-To":"Michael Menasherov <mmenashe@redhat.com>","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Errors-To":"ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it","Sender":"\"ltp\" <ltp-bounces+incoming=patchwork.ozlabs.org@lists.linux.it>"},"content":"Improve error handling coverage for futex syscalls by adding tests\nfor missing error conditions that were previously untested.\n\nfutex_wait06 verifies EFAULT is returned when uaddr or timeout\npoints to unmapped memory.\n\nfutex_wait07 verifies EINTR is returned when futex_wait() is\ninterrupted by a signal.\n\nfutex_wake05 verifies EFAULT is returned when uaddr points to\nunmapped or PROT_NONE memory.\n\nfutex_cmp_requeue03 verifies EFAULT is returned when uaddr or\nuaddr2 points to unmapped memory, and EACCES or EFAULT when uaddr\npoints to memory without read permission (PROT_NONE). The EACCES\nbehavior was introduced in kernel 5.9.\n---\n runtest/syscalls                              |   4 +\n testcases/kernel/syscalls/futex/.gitignore    |   4 +\n .../syscalls/futex/futex_cmp_requeue03.c      | 102 ++++++++++++++++\n .../kernel/syscalls/futex/futex_wait06.c      |  81 +++++++++++++\n .../kernel/syscalls/futex/futex_wait07.c      | 114 ++++++++++++++++++\n .../kernel/syscalls/futex/futex_wake05.c      |  85 +++++++++++++\n 6 files changed, 390 insertions(+)\n create mode 100644 testcases/kernel/syscalls/futex/futex_cmp_requeue03.c\n create mode 100644 testcases/kernel/syscalls/futex/futex_wait06.c\n create mode 100644 testcases/kernel/syscalls/futex/futex_wait07.c\n create mode 100644 testcases/kernel/syscalls/futex/futex_wake05.c","diff":"diff --git a/runtest/syscalls b/runtest/syscalls\nindex 6ba0227a8..6c12dc225 100644\n--- a/runtest/syscalls\n+++ b/runtest/syscalls\n@@ -1859,11 +1859,14 @@ perf_event_open02 perf_event_open02\n \n futex_cmp_requeue01 futex_cmp_requeue01\n futex_cmp_requeue02 futex_cmp_requeue02\n+futex_cmp_requeue03 futex_cmp_requeue03\n futex_wait01 futex_wait01\n futex_wait02 futex_wait02\n futex_wait03 futex_wait03\n futex_wait04 futex_wait04\n futex_wait05 futex_wait05\n+futex_wait06 futex_wait06\n+futex_wait07 futex_wait07\n futex_waitv01 futex_waitv01\n futex_waitv02 futex_waitv02\n futex_waitv03 futex_waitv03\n@@ -1871,6 +1874,7 @@ futex_wake01 futex_wake01\n futex_wake02 futex_wake02\n futex_wake03 futex_wake03\n futex_wake04 futex_wake04\n+futex_wake05 futex_wake05\n futex_wait_bitset01 futex_wait_bitset01\n \n memfd_create01 memfd_create01\ndiff --git a/testcases/kernel/syscalls/futex/.gitignore b/testcases/kernel/syscalls/futex/.gitignore\nindex 9d08ba7d3..c47d39b5b 100644\n--- a/testcases/kernel/syscalls/futex/.gitignore\n+++ b/testcases/kernel/syscalls/futex/.gitignore\n@@ -1,15 +1,19 @@\n /futex_cmp_requeue01\n /futex_cmp_requeue02\n+/futex_cmp_requeue03\n /futex_wait01\n /futex_wait02\n /futex_wait03\n /futex_wait04\n /futex_wait05\n+/futex_wait06\n+/futex_wait07\n /futex_wait_bitset01\n /futex_wake01\n /futex_wake02\n /futex_wake03\n /futex_wake04\n+/futex_wake05\n /futex_waitv01\n /futex_waitv02\n /futex_waitv03\ndiff --git a/testcases/kernel/syscalls/futex/futex_cmp_requeue03.c b/testcases/kernel/syscalls/futex/futex_cmp_requeue03.c\nnew file mode 100644\nindex 000000000..66b18614d\n--- /dev/null\n+++ b/testcases/kernel/syscalls/futex/futex_cmp_requeue03.c\n@@ -0,0 +1,102 @@\n+// SPDX-License-Identifier: GPL-2.0-or-later\n+/*\n+ * Copyright (C) 2024 Red Hat, Inc.\n+ *\n+ * Check that futex(FUTEX_CMP_REQUEUE) returns EFAULT when uaddr or\n+ * uaddr2 points to unmapped memory, and EACCES when uaddr points to\n+ * memory without read permission (PROT_NONE).\n+ */\n+\n+#include <errno.h>\n+#include <sys/mman.h>\n+\n+#include \"futextest.h\"\n+\n+static futex_t futex = FUTEX_INITIALIZER;\n+static void *unmapped_addr;\n+static void *prot_none_addr;\n+\n+static struct futex_test_variants variants[] = {\n+#if (__NR_futex != __LTP__NR_INVALID_SYSCALL)\n+\t{ .fntype = FUTEX_FN_FUTEX, .desc = \"syscall with old kernel spec\"},\n+#endif\n+\n+#if (__NR_futex_time64 != __LTP__NR_INVALID_SYSCALL)\n+\t{ .fntype = FUTEX_FN_FUTEX64, .desc = \"syscall time64 with kernel spec\"},\n+#endif\n+};\n+\n+static struct testcase {\n+\tconst char *desc;\n+\t/* 1 = uaddr is bad, 0 = uaddr2 is bad */\n+\tint bad_uaddr;\n+\t/* 1 = PROT_NONE address, 0 = unmapped address */\n+\tint use_prot_none;\n+} testcases[] = {\n+\t{ \"uaddr unmapped\", 1, 0 },\n+\t{ \"uaddr2 unmapped\", 0, 0 },\n+\t{ \"uaddr PROT_NONE\", 1, 1 },\n+};\n+\n+static void run(unsigned int n)\n+{\n+\tstruct futex_test_variants *tv = &variants[tst_variant];\n+\tstruct testcase *tc = &testcases[n];\n+\tfutex_t *bad;\n+\tfutex_t *uaddr, *uaddr2;\n+\tint res;\n+\n+\tif (tc->use_prot_none)\n+\t\tbad = (futex_t *)prot_none_addr;\n+\telse\n+\t\tbad = (futex_t *)unmapped_addr;\n+\n+\t/* Assign bad address to uaddr or uaddr2, keep the other valid. */\n+\tif (tc->bad_uaddr) {\n+\t\tuaddr = bad;\n+\t\tuaddr2 = &futex;\n+\t} else {\n+\t\tuaddr = &futex;\n+\t\tuaddr2 = bad;\n+\t}\n+\n+\tres = futex_cmp_requeue(tv->fntype, uaddr, futex, uaddr2, 1, 1, 0);\n+\tif (res != -1) {\n+\t\ttst_res(TFAIL, \"futex_cmp_requeue() succeeded unexpectedly for '%s'\", tc->desc);\n+\t\treturn;\n+\t}\n+\tif (errno != EFAULT && errno != EACCES) {\n+\t\ttst_res(TFAIL | TERRNO, \"futex_cmp_requeue() failed with unexpected error for '%s', expected EFAULT or EACCES\",tc->desc);\n+\t\treturn;\n+\t}\n+\ttst_res(TPASS | TERRNO, \"futex_cmp_requeue() failed as expected for '%s'\", tc->desc);\n+}\n+\n+static void setup(void)\n+{\n+\tstruct futex_test_variants *tv = &variants[tst_variant];\n+\tsize_t pagesize = getpagesize();\n+\n+\ttst_res(TINFO, \"Testing variant: %s\", tv->desc);\n+\tfutex_supported_by_kernel(tv->fntype);\n+\n+\tunmapped_addr = SAFE_MMAP(NULL, pagesize, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);\n+\tSAFE_MUNMAP(unmapped_addr, pagesize);\n+\t/* PROT_NONE = mapped but no read permission, triggers EACCES or EFAULT */\n+\tprot_none_addr = SAFE_MMAP(NULL, pagesize, PROT_NONE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);\n+}\n+\n+static void cleanup(void)\n+{\n+\tif (prot_none_addr) {\n+\t\tSAFE_MUNMAP(prot_none_addr, getpagesize());\n+\t}\n+}\n+\n+static struct tst_test test = {\n+\t.setup = setup,\n+\t.cleanup = cleanup,\n+\t.test = run,\n+\t.tcnt = ARRAY_SIZE(testcases),\n+\t.test_variants = ARRAY_SIZE(variants),\n+};\ndiff --git a/testcases/kernel/syscalls/futex/futex_wait06.c b/testcases/kernel/syscalls/futex/futex_wait06.c\nnew file mode 100644\nindex 000000000..1b9db0241\n--- /dev/null\n+++ b/testcases/kernel/syscalls/futex/futex_wait06.c\n@@ -0,0 +1,81 @@\n+// SPDX-License-Identifier: GPL-2.0-or-later\n+/*\n+ * Copyright (C) 2024 Red Hat, Inc.\n+ *\n+ * Check that futex(FUTEX_WAIT) returns EFAULT when:\n+ * 1) uaddr points to unmapped memory\n+ * 2) timeout points to unmapped memory\n+ */\n+#include <errno.h>\n+#include <sys/mman.h>\n+\n+#include \"futextest.h\"\n+\n+static futex_t futex = FUTEX_INITIALIZER;\n+static void *bad_addr;\n+\n+static struct futex_test_variants variants[] = {\n+#if (__NR_futex != __LTP__NR_INVALID_SYSCALL)\n+\t{ .fntype = FUTEX_FN_FUTEX, .tstype = TST_KERN_OLD_TIMESPEC, .desc = \"syscall with old kernel spec\"},\n+#endif\n+\n+#if (__NR_futex_time64 != __LTP__NR_INVALID_SYSCALL)\n+\t{ .fntype = FUTEX_FN_FUTEX64, .tstype = TST_KERN_TIMESPEC, .desc = \"syscall time64 with kernel spec\"},\n+#endif\n+};\n+\n+static struct testcase {\n+\tconst char *desc;\n+} testcases[] = {\n+\t{ \"uaddr points to unmapped memory\" },\n+\t{ \"timeout points to unmapped memory\" },\n+};\n+\n+static void run(unsigned int n)\n+{\n+\tstruct futex_test_variants *tv = &variants[tst_variant];\n+\tstruct testcase *tc = &testcases[n];\n+\tint res;\n+\n+\tif (n == 0) {\n+\t\tres = futex_syscall(tv->fntype, (futex_t *)bad_addr, FUTEX_WAIT, 0, NULL, NULL, 0, 0);\n+\t} else if (n == 1) {\n+\t\tres = futex_syscall(tv->fntype, &futex, FUTEX_WAIT, futex, bad_addr, NULL, 0, 0);\n+\t} else {\n+\t\ttst_brk(TBROK, \"Invalid test case %u\", n);\n+\t\treturn;\n+\t}\n+\n+\tif (res != -1) {\n+\t\ttst_res(TFAIL, \"futex_wait() succeeded unexpectedly for '%s'\", tc->desc);\n+\t\treturn;\n+\t}\n+\n+\tif (errno != EFAULT) {\n+\t\ttst_res(TFAIL | TERRNO, \"futex_wait() expected EFAULT for '%s', got\", tc->desc);\n+\t\treturn;\n+\t}\n+\n+\ttst_res(TPASS | TERRNO, \"futex_wait() failed as expected for '%s'\", tc->desc);\n+}\n+\n+static void setup(void)\n+{\n+\tstruct futex_test_variants *tv = &variants[tst_variant];\n+\n+\ttst_res(TINFO, \"Testing variant: %s\", tv->desc);\n+\tfutex_supported_by_kernel(tv->fntype);\n+\tbad_addr = mmap(NULL, getpagesize(), PROT_NONE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);\n+\n+\tif (bad_addr == MAP_FAILED) {\n+\t\ttst_brk(TBROK | TERRNO, \"mmap() failed\");\n+\t}\n+\tSAFE_MUNMAP(bad_addr, getpagesize());\n+}\n+\n+static struct tst_test test = {\n+\t.setup = setup,\n+\t.test = run,\n+\t.tcnt = ARRAY_SIZE(testcases),\n+\t.test_variants = ARRAY_SIZE(variants),\n+};\ndiff --git a/testcases/kernel/syscalls/futex/futex_wait07.c b/testcases/kernel/syscalls/futex/futex_wait07.c\nnew file mode 100644\nindex 000000000..bfaacd03b\n--- /dev/null\n+++ b/testcases/kernel/syscalls/futex/futex_wait07.c\n@@ -0,0 +1,114 @@\n+// SPDX-License-Identifier: GPL-2.0-or-later\n+/*\n+ * Copyright (C) 2024 Red Hat, Inc.\n+ * Check that futex(FUTEX_WAIT) returns EINTR when interrupted by a signal.\n+ * A child process blocks on futex_wait() with a long timeout. The parent\n+ * waits for the child to enter sleep state, then sends SIGUSR1 to it.\n+ * The child verifies it received EINTR and exits accordingly.\n+ */\n+\n+#include <errno.h>\n+#include <signal.h>\n+#include <sys/wait.h>\n+\n+#include \"futextest.h\"\n+\n+static futex_t *futex;\n+\n+static struct futex_test_variants variants[] = {\n+#if (__NR_futex != __LTP__NR_INVALID_SYSCALL)\n+\t{ .fntype = FUTEX_FN_FUTEX, .tstype = TST_KERN_OLD_TIMESPEC, .desc = \"syscall with old kernel spec\"},\n+#endif\n+\n+#if (__NR_futex_time64 != __LTP__NR_INVALID_SYSCALL)\n+\t{ .fntype = FUTEX_FN_FUTEX64, .tstype = TST_KERN_TIMESPEC, .desc = \"syscall time64 with kernel spec\"},\n+#endif\n+};\n+\n+/* We need a handler so SIGUSR1 is caught instead of killing the process.\n+ * The empty body is needed, just receiving the signal is enough to\n+ * interrupt futex_wait() and make it return into EINTR -1 status.\n+ */\n+static void sigusr1_handler(int sig LTP_ATTRIBUTE_UNUSED)\n+{\n+}\n+\n+static void do_child(void)\n+{\n+\tstruct futex_test_variants *tv = &variants[tst_variant];\n+\tstruct sigaction sa;\n+\tstruct tst_ts timeout;\n+\tint res;\n+\n+\t/* Set up the signal handler for SIGUSR1 */\n+\tsa.sa_handler = sigusr1_handler;\n+\tsa.sa_flags = 0;\n+\tSAFE_SIGEMPTYSET(&sa.sa_mask);\n+\tSAFE_SIGACTION(SIGUSR1, &sa, NULL);\n+\n+\t/* Create a timeout for 5 sec for this variant.\n+\t * if no one wakes the child before 5 sec, futex_wait() will return\n+\t * on its own with ETIMEDOUT and will not wait any longer\n+\t */\n+\ttimeout = tst_ts_from_ms(tv->tstype, 5000);\n+\tres = futex_wait(tv->fntype, futex, *futex, &timeout, 0);\n+\n+\tif (res != -1) {\n+\t\ttst_res(TFAIL, \"futex_wait() should have failed with EINTR but returned success instead\");\n+\t\texit(1);\n+\t}\n+\tif (errno != EINTR) {\n+\t\ttst_res(TFAIL | TERRNO, \"futex_wait() expected EINTR but got something else, errno\");\n+\t\texit(1);\n+\t}\n+\ttst_res(TPASS | TERRNO, \"futex_wait() returned EINTR as expected\");\n+\texit(0);\n+}\n+\n+static void run(void)\n+{\n+\tpid_t child;\n+\tint status;\n+\n+\tchild = SAFE_FORK();\n+\n+\tif (child == 0) {\n+\t\tdo_child();\n+\t}\n+\t/* Wait until child is sleeping before sending signal */\n+\tTST_PROCESS_STATE_WAIT(child, 'S', 0);\n+\t/* Wake up the child so it will return EINTR -1 status */\n+\tSAFE_KILL(child, SIGUSR1);\n+\tSAFE_WAITPID(child, &status, 0);\n+\t/* Check if the child finished everything as it should */\n+\tif (!WIFEXITED(status) || WEXITSTATUS(status) != 0) {\n+\t\ttst_res(TFAIL, \"child exited abnormally\");\n+\t}\n+}\n+\n+static void setup(void)\n+{\n+\tstruct futex_test_variants *tv = &variants[tst_variant];\n+\n+\ttst_res(TINFO, \"Testing variant: %s\", tv->desc);\n+\tfutex_supported_by_kernel(tv->fntype);\n+\n+\t/* Futex needs to be in a shared memory so the parent and the child can access into it */\n+\tfutex = SAFE_MMAP(NULL, sizeof(*futex), PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_SHARED, -1, 0);\n+\t*futex = FUTEX_INITIALIZER;\n+}\n+\n+static void cleanup(void)\n+{\n+\tif (futex) {\n+\t\tSAFE_MUNMAP((void *)futex, sizeof(*futex));\n+\t}\n+}\n+\n+static struct tst_test test = {\n+\t.setup = setup,\n+\t.cleanup = cleanup,\n+\t.test_all = run,\n+\t.test_variants = ARRAY_SIZE(variants),\n+\t.forks_child = 1,\n+};\ndiff --git a/testcases/kernel/syscalls/futex/futex_wake05.c b/testcases/kernel/syscalls/futex/futex_wake05.c\nnew file mode 100644\nindex 000000000..891beb347\n--- /dev/null\n+++ b/testcases/kernel/syscalls/futex/futex_wake05.c\n@@ -0,0 +1,85 @@\n+// SPDX-License-Identifier: GPL-2.0-or-later\n+/*\n+ * Copyright (C) 2024 Red Hat, Inc.\n+ *\n+ * Check that futex(FUTEX_WAKE) returns EFAULT when:\n+ * 1) uaddr points to unmapped memory\n+ * 2) uaddr points to memory without read permission (PROT_NONE)\n+ */\n+\n+#include <errno.h>\n+#include <sys/mman.h>\n+#include \"futextest.h\"\n+\n+static void *unmapped_addr;\n+static void *prot_none_addr;\n+\n+static struct futex_test_variants variants[] = {\n+#if (__NR_futex != __LTP__NR_INVALID_SYSCALL)\n+\t{ .fntype = FUTEX_FN_FUTEX, .desc = \"syscall with old kernel spec\"},\n+#endif\n+\n+#if (__NR_futex_time64 != __LTP__NR_INVALID_SYSCALL)\n+\t{ .fntype = FUTEX_FN_FUTEX64, .desc = \"syscall time64 with kernel spec\"},\n+#endif\n+};\n+\n+static struct testcase {\n+\tconst char *desc;\n+\tint opflags;\n+\tint exp_errno;\n+} testcases[] = {\n+\t{ \"uaddr unmapped\", 0, EFAULT },\n+\t{ \"uaddr PROT_NONE\", 0, EFAULT },\n+};\n+\n+static void run(unsigned int n)\n+{\n+\tstruct futex_test_variants *tv = &variants[tst_variant];\n+\tstruct testcase *tc = &testcases[n];\n+\tfutex_t *addr;\n+\tint res;\n+\n+\tif (n == 0)\n+\t\taddr = (futex_t *)unmapped_addr;\n+\telse\n+\t\taddr = (futex_t *)prot_none_addr;\n+\tres = futex_wake(tv->fntype, addr, 1, tc->opflags);\n+\tif (res != -1) {\n+\t\ttst_res(TFAIL, \"futex_wake() succeeded unexpectedly for '%s'\", tc->desc);\n+\t\treturn;\n+\t}\n+\tif (errno != tc->exp_errno) {\n+\t\ttst_res(TFAIL | TERRNO, \"futex_wake() failed with unexpected error for '%s', we expected: %s\", tc->desc, tst_strerrno(tc->exp_errno));\n+\t\treturn;\n+\t}\n+\ttst_res(TPASS | TERRNO, \"futex_wake() failed as expected for '%s'\", tc->desc);\n+}\n+\n+static void setup(void)\n+{\n+\tstruct futex_test_variants *tv = &variants[tst_variant];\n+\tsize_t pagesize = getpagesize();\n+\n+\ttst_res(TINFO, \"Testing variant: %s\", tv->desc);\n+\tfutex_supported_by_kernel(tv->fntype);\n+\n+\tunmapped_addr = SAFE_MMAP(NULL, pagesize, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);\n+\tSAFE_MUNMAP(unmapped_addr, pagesize);\n+\tprot_none_addr = SAFE_MMAP(NULL, pagesize, PROT_NONE, MAP_PRIVATE| MAP_ANONYMOUS, -1, 0);\n+}\n+\n+static void cleanup(void)\n+{\n+\tif (prot_none_addr) {\n+\t\tSAFE_MUNMAP(prot_none_addr, getpagesize());\n+\t}\n+}\n+\n+static struct tst_test test = {\n+\t.setup = setup,\n+\t.cleanup = cleanup,\n+\t.test = run,\n+\t.tcnt = ARRAY_SIZE(testcases),\n+\t.test_variants = ARRAY_SIZE(variants),\n+};\n","prefixes":[]}