android13/external/ltp/testcases/kernel/mem/hugetlb/hugeshmctl/hugeshmctl03.c

139 lines
3.1 KiB
C

// SPDX-License-Identifier: GPL-2.0-or-later
/*
* Copyright (c) International Business Machines Corp., 2004
* Copyright (c) Linux Test Project, 2004-2017
*/
/*
* DESCRIPTION
* hugeshmctl03 - check for EACCES, and EPERM errors
*
* ALGORITHM
* create a large shared memory segment with root only read & write
* permissions fork a child process
* if child
* set the ID of the child process to that of "ltpuser1"
* call do_child()
* loop if that option was specified
* call shmctl() using three different invalid cases
* check the errno value
* issue a PASS message if we get EACCES or EPERM
* otherwise, the tests fails
* issue a FAIL message
* call cleanup
* if parent
* wait for child to exit
* remove the large shared memory segment
*
* HISTORY
* 03/2001 - Written by Wayne Boyer
* 04/2004 - Updated by Robbie Williamson
*
* RESTRICTIONS
* test must be run as root
*/
#include <sys/types.h>
#include <sys/wait.h>
#include <limits.h>
#include "hugetlb.h"
static size_t shm_size;
static int shm_id_1 = -1;
static struct shmid_ds buf;
static uid_t ltp_uid;
static char *ltp_user = "nobody";
struct tcase {
int *shmid;
int cmd;
struct shmid_ds *sbuf;
int error;
} tcases[] = {
/* EACCES - child has no read permission for segment */
{&shm_id_1, IPC_STAT, &buf, EACCES},
/* EPERM - IPC_SET - child doesn't have permission to change segment */
{&shm_id_1, IPC_SET, &buf, EPERM},
/* EPERM - IPC_RMID - child can not remove the segment */
{&shm_id_1, IPC_RMID, &buf, EPERM},
};
static void do_child(void);
static void test_hugeshmctl(void)
{
pid_t pid;
int status;
switch (pid = SAFE_FORK()) {
case 0:
/* set the user ID of the child to the non root user */
SAFE_SETUID(ltp_uid);
do_child();
exit(0);
default:
SAFE_WAITPID(pid, &status, 0);
}
}
static void do_child(void)
{
unsigned int i;
for (i = 0; i < ARRAY_SIZE(tcases); i++) {
TEST(shmctl(*(tcases[i].shmid), tcases[i].cmd, tcases[i].sbuf));
if (TST_RET != -1) {
tst_res(TFAIL, "shmctl succeeded "
"unexpectedly");
continue;
}
if (TST_ERR == tcases[i].error)
tst_res(TPASS | TTERRNO, "shmctl failed "
"as expected");
else
tst_res(TFAIL | TTERRNO, "shmctl failed "
"unexpectedly - expect errno = "
"%d, got", tcases[i].error);
}
}
void setup(void)
{
long hpage_size;
if (tst_hugepages == 0)
tst_brk(TCONF, "No enough hugepages for testing.");
hpage_size = SAFE_READ_MEMINFO("Hugepagesize:") * 1024;
shm_size = hpage_size * tst_hugepages / 2;
update_shm_size(&shm_size);
shmkey = getipckey();
shm_id_1 = shmget(shmkey, shm_size,
SHM_HUGETLB | IPC_CREAT | IPC_EXCL | SHM_RW);
if (shm_id_1 == -1)
tst_brk(TBROK | TERRNO, "shmget");
/* get the userid for a non root user */
ltp_uid = getuserid(ltp_user);
}
void cleanup(void)
{
rm_shm(shm_id_1);
}
static struct tst_test test = {
.needs_root = 1,
.forks_child = 1,
.needs_tmpdir = 1,
.options = (struct tst_option[]) {
{"s:", &nr_opt, "-s num Set the number of the been allocated hugepages"},
{}
},
.setup = setup,
.cleanup = cleanup,
.test_all = test_hugeshmctl,
.request_hugepages = 128,
};