1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3 * Copyright (c) Linux Test Project, 2020
4 * Copyright (c) Wipro Technologies Ltd, 2002
5 */
6
7 /*
8 * This is an error test for iopl(2) system call.
9 *
10 * Verify that
11 * 1) iopl(2) returns -1 and sets errno to EINVAL for privilege
12 * level greater than 3.
13 * 2) iopl(2) returns -1 and sets errno to EPERM if the current
14 * user is not the super-user.
15 *
16 * Author: Subhab Biswas <subhabrata.biswas@wipro.com>
17 */
18
19 #include <errno.h>
20 #include <unistd.h>
21 #include <pwd.h>
22 #include "tst_test.h"
23 #include "tst_safe_macros.h"
24
25 #if defined __i386__ || defined(__x86_64__)
26 #include <sys/io.h>
27
28 static struct tcase {
29 int level;
30 char *desc;
31 int exp_errno;
32 } tcases[] = {
33 {4, "Invalid privilege level", EINVAL},
34 {1, "Non super-user", EPERM}
35 };
36
verify_iopl(unsigned int i)37 static void verify_iopl(unsigned int i)
38 {
39 TEST(iopl(tcases[i].level));
40
41 if ((TST_RET == -1) && (TST_ERR == tcases[i].exp_errno)) {
42 tst_res(TPASS | TTERRNO,
43 "Expected failure for %s, errno: %d",
44 tcases[i].desc, TST_ERR);
45 } else {
46 tst_res(TFAIL | TTERRNO,
47 "%s returned %ld expected -1, expected %s got ",
48 tcases[i].desc, TST_RET, tst_strerrno(tcases[i].exp_errno));
49 }
50 }
51
setup(void)52 static void setup(void)
53 {
54 struct passwd *pw;
55
56 pw = SAFE_GETPWNAM("nobody");
57 SAFE_SETEUID(pw->pw_uid);
58 }
59
cleanup(void)60 static void cleanup(void)
61 {
62 SAFE_SETEUID(0);
63 }
64
65 static struct tst_test test = {
66 .tcnt = ARRAY_SIZE(tcases),
67 .test = verify_iopl,
68 .needs_root = 1,
69 /* iopl() is restricted under kernel lockdown. */
70 .skip_in_lockdown = 1,
71 .setup = setup,
72 .cleanup = cleanup,
73 };
74
75 #else
76 TST_TEST_TCONF("LSB v1.3 does not specify iopl() for this architecture. (only for i386 or x86_64)");
77 #endif /* __i386_, __x86_64__*/
78