/* * * Copyright (c) International Business Machines Corp., 2001 * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See * the GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA */ /* * NAME * shmctl02.c * * DESCRIPTION * shmctl02 - check for EACCES, EFAULT and EINVAL errors * * ALGORITHM * create a shared memory segment without read or write permissions * create a shared memory segment with read & write permissions * loop if that option was specified * call shmctl() using five different invalid cases * check the errno value * issue a PASS message if we get EACCES, EFAULT or EINVAL * otherwise, the tests fails * issue a FAIL message * call cleanup * * USAGE: * shmctl02 [-c n] [-e] [-i n] [-I x] [-P x] [-t] * where, -c n : Run n copies concurrently. * -e : Turn on errno logging. * -i n : Execute test n times. * -I x : Execute test for x seconds. * -P x : Pause for x seconds between iterations. * -t : Turn on syscall timing. * * HISTORY * 03/2001 - Written by Wayne Boyer * * 06/03/2008 Renaud Lottiaux (Renaud.Lottiaux@kerlabs.com) * - Fix concurrency issue. The second key used for this test could * conflict with the key from another task. * * RESTRICTIONS * none */ #include "ipcshm.h" #include char *TCID = "shmctl02"; char nobody_uid[] = "nobody"; struct passwd *ltpuser; int shm_id_1 = -1; int shm_id_2 = -1; int shm_id_3 = -1; struct shmid_ds buf; struct test_case_t { int *shmid; int cmd; struct shmid_ds *sbuf; int error; } TC[] = { /* EACCES - segment has no read or write permissions */ { &shm_id_1, IPC_STAT, &buf, EACCES}, /* EFAULT - IPC_SET & buf isn't valid */ { &shm_id_2, IPC_SET, (struct shmid_ds *)-1, EFAULT}, /* EFAULT - IPC_STAT & buf isn't valid */ { &shm_id_2, IPC_STAT, (struct shmid_ds *)-1, EFAULT}, /* EINVAL - the shmid is not valid */ { &shm_id_3, IPC_STAT, &buf, EINVAL}, /* EINVAL - the command is not valid */ { &shm_id_2, -1, &buf, EINVAL}, /* EPERM - the command is only valid for the super-user */ { &shm_id_2, SHM_LOCK, &buf, EPERM}, /* EPERM - the command is only valid for the super-user */ { &shm_id_2, SHM_UNLOCK, &buf, EPERM} }; int TST_TOTAL = ARRAY_SIZE(TC); int main(int ac, char **av) { int lc; int i; tst_parse_opts(ac, av, NULL, NULL); setup(); /* global setup */ /* The following loop checks looping state if -i option given */ for (lc = 0; TEST_LOOPING(lc); lc++) { /* reset tst_count in case we are looping */ tst_count = 0; /* loop through the test cases */ for (i = 0; i < TST_TOTAL; i++) { /* * use the TEST() macro to make the call */ TEST(shmctl(*(TC[i].shmid), TC[i].cmd, TC[i].sbuf)); if ((TEST_RETURN != -1) && (i < 5)) { tst_resm(TFAIL, "call succeeded unexpectedly"); continue; } if (TEST_ERRNO == TC[i].error) { tst_resm(TPASS, "expected failure - errno = " "%d : %s", TEST_ERRNO, strerror(TEST_ERRNO)); } else { if (i >= 5) tst_resm(TCONF, "shmctl() did not fail for non-root user." "This may be okay for your distribution."); else tst_resm(TFAIL, "call failed with an " "unexpected error - %d : %s", TEST_ERRNO, strerror(TEST_ERRNO)); } } } cleanup(); tst_exit(); } /* * setup() - performs all the ONE TIME setup for this test. */ void setup(void) { key_t shmkey2; tst_require_root(); /* Switch to nobody user for correct error code collection */ ltpuser = getpwnam(nobody_uid); if (setuid(ltpuser->pw_uid) == -1) { tst_resm(TINFO, "setuid failed to " "to set the effective uid to %d", ltpuser->pw_uid); perror("setuid"); } tst_sig(NOFORK, DEF_HANDLER, cleanup); TEST_PAUSE; /* * Create a temporary directory and cd into it. * This helps to ensure that a unique msgkey is created. * See ../lib/libipc.c for more information. */ tst_tmpdir(); /* get an IPC resource key */ shmkey = getipckey(); /* create a shared memory segment without read or write permissions */ if ((shm_id_1 = shmget(shmkey, SHM_SIZE, IPC_CREAT | IPC_EXCL)) == -1) { tst_brkm(TBROK, cleanup, "couldn't create shared memory " "segment #1 in setup()"); } /* Get an new IPC resource key. */ shmkey2 = getipckey(); /* create a shared memory segment with read and write permissions */ if ((shm_id_2 = shmget(shmkey2, SHM_SIZE, IPC_CREAT | IPC_EXCL | SHM_RW)) == -1) { tst_brkm(TBROK, cleanup, "couldn't create shared memory " "segment #2 in setup()"); } } /* * cleanup() - performs all the ONE TIME cleanup for this test at completion * or premature exit. */ void cleanup(void) { /* if they exist, remove the shared memory resources */ rm_shm(shm_id_1); rm_shm(shm_id_2); tst_rmdir(); }