android13/external/ltp/testcases/kernel/syscalls/ipc/shmctl/shmctl02.c

127 lines
3.0 KiB
C

// SPDX-License-Identifier: GPL-2.0-or-later
/*
* Copyright (c) International Business Machines Corp., 2001
* 03/2001 - Written by Wayne Boyer
*
* Copyright (c) 2008 Renaud Lottiaux (Renaud.Lottiaux@kerlabs.com)
*
* Copyright (C) 2020 Cyril Hrubis <chrubis@suse.cz>
*/
/*\
* [Description]
*
* Test for EACCES, EFAULT and EINVAL errors.
*
* * EACCES - segment has no read or write permissions
* * EFAULT - IPC_SET & buf isn't valid
* * EFAULT - IPC_STAT & buf isn't valid
* * EINVAL - the command is not valid
* * EINVAL - the shmid is not valid
* * EINVAL - the shmid belongs to removed shm
*
* * EACCES - attempt to stat root-owned shm
* * EPERM - attempt to delete root-owned shm
* * EPERM - attempt to change root-owned shm
* * EPERM - attempt to lock root-owned shm
* * EPERM - attempt to unlock root-owned shm
*/
#include <pwd.h>
#include "tst_test.h"
#include "tst_safe_sysv_ipc.h"
#include "libnewipc.h"
#define SHM_SIZE 2048
static int shm_id1 = -1;
static int shm_id2 = -1;
static int shm_id3 = -1;
static int shm_bad = -1;
static int shm_rem;
static struct shmid_ds buf;
static struct tcase {
int *shm_id;
int cmd;
struct shmid_ds *buf;
int error;
} tc[] = {
{&shm_id1, IPC_STAT, &buf, EACCES},
{&shm_id2, IPC_SET, (struct shmid_ds *)-1, EFAULT},
{&shm_id2, IPC_STAT, (struct shmid_ds *)-1, EFAULT},
{&shm_id2, -1, &buf, EINVAL},
{&shm_bad, IPC_STAT, &buf, EINVAL},
{&shm_rem, IPC_STAT, &buf, EINVAL},
/* Operations on root-owned shm */
{&shm_id3, IPC_STAT, &buf, EACCES},
{&shm_id3, IPC_RMID, NULL, EPERM},
{&shm_id3, IPC_SET, &buf, EPERM},
{&shm_id3, SHM_LOCK, &buf, EPERM},
{&shm_id3, SHM_UNLOCK, &buf, EPERM}
};
static void verify_shmctl(unsigned int i)
{
TEST(shmctl(*(tc[i].shm_id), tc[i].cmd, tc[i].buf));
if (TST_RET != -1) {
tst_res(TFAIL, "shmctl() returned %li", TST_RET);
return;
}
if (TST_ERR == tc[i].error) {
tst_res(TPASS | TTERRNO, "shmctl(%i, %i, %p)",
*tc[i].shm_id, tc[i].cmd, tc[i].buf);
return;
}
tst_res(TFAIL | TTERRNO, "shmctl(%i, %i, %p) expected %s",
*tc[i].shm_id, tc[i].cmd, tc[i].buf, tst_strerrno(tc[i].error));
}
static void setup(void)
{
key_t shmkey1, shmkey2;
struct passwd *ltpuser;
int tmp;
shm_id3 = SAFE_SHMGET(IPC_PRIVATE, SHM_SIZE, IPC_CREAT | SHM_RW);
ltpuser = SAFE_GETPWNAM("nobody");
SAFE_SETEUID(ltpuser->pw_uid);
shmkey1 = GETIPCKEY();
shmkey2 = GETIPCKEY();
shm_id1 = SAFE_SHMGET(shmkey1, SHM_SIZE, IPC_CREAT | IPC_EXCL);
shm_id2 = SAFE_SHMGET(shmkey2, SHM_SIZE, IPC_CREAT | IPC_EXCL | SHM_RW);
tmp = shm_rem = SAFE_SHMGET(IPC_PRIVATE, SHM_SIZE, IPC_CREAT | SHM_RW);
SAFE_SHMCTL(tmp, IPC_RMID, NULL);
}
static void cleanup(void)
{
if (shm_id1 >= 0)
SAFE_SHMCTL(shm_id1, IPC_RMID, NULL);
if (shm_id2 >= 0)
SAFE_SHMCTL(shm_id2, IPC_RMID, NULL);
if (shm_id3 >= 0) {
SAFE_SETEUID(0);
SAFE_SHMCTL(shm_id3, IPC_RMID, NULL);
}
}
static struct tst_test test = {
.setup = setup,
.cleanup = cleanup,
.test = verify_shmctl,
.tcnt = ARRAY_SIZE(tc),
.needs_root = 1,
};