/* * * Copyright (c) International Business Machines Corp., 2001 * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See * the GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ /* * NAME * shmctl02.c * * DESCRIPTION * shmctl02 - check for EACCES, EFAULT and EINVAL errors * * ALGORITHM * create a shared memory segment without read or write permissions * create a shared memory segment with read & write permissions * loop if that option was specified * call shmctl() using five different invalid cases * check the errno value * issue a PASS message if we get EACCES, EFAULT or EINVAL * otherwise, the tests fails * issue a FAIL message * call cleanup * * USAGE: * shmctl02 [-c n] [-e] [-i n] [-I x] [-P x] [-t] * where, -c n : Run n copies concurrently. * -e : Turn on errno logging. * -i n : Execute test n times. * -I x : Execute test for x seconds. * -P x : Pause for x seconds between iterations. * -t : Turn on syscall timing. * * HISTORY * 03/2001 - Written by Wayne Boyer * * RESTRICTIONS * none */ #include "ipcshm.h" #include char *TCID = "shmctl02"; extern int Tst_count; char nobody_uid[] = "nobody"; struct passwd *ltpuser; int exp_enos[] = {EPERM, EACCES, EFAULT, EINVAL, 0}; /* 0 terminated list */ /* of expected errnos */ int shm_id_1 = -1; int shm_id_2 = -1; int shm_id_3 = -1; struct shmid_ds buf; struct test_case_t { int *shmid; int cmd; struct shmid_ds *sbuf; int error; } TC[] = { /* EACCES - segment has no read or write permissions */ {&shm_id_1, IPC_STAT, &buf, EACCES}, /* EFAULT - IPC_SET & buf isn't valid */ {&shm_id_2, IPC_SET, (struct shmid_ds *)-1, EFAULT}, /* EFAULT - IPC_STAT & buf isn't valid */ {&shm_id_2, IPC_STAT, (struct shmid_ds *)-1, EFAULT}, /* EINVAL - the shmid is not valid */ {&shm_id_3, IPC_STAT, &buf, EINVAL}, /* EINVAL - the command is not valid */ {&shm_id_2, -1, &buf, EINVAL}, }; int TST_TOTAL = (sizeof(TC) / sizeof(*TC)); int main(int ac, char **av) { int lc; /* loop counter */ char *msg; /* message returned from parse_opts */ int i; /* parse standard options */ if ((msg = parse_opts(ac, av, (option_t *)NULL, NULL)) != (char *)NULL){ tst_brkm(TBROK, cleanup, "OPTION PARSING ERROR - %s", msg); } setup(); /* global setup */ /* The following loop checks looping state if -i option given */ for (lc = 0; TEST_LOOPING(lc); lc++) { /* reset Tst_count in case we are looping */ Tst_count = 0; /* loop through the test cases */ for (i=0; i= 5) tst_resm(TCONF,"shmctl() did not fail for non-root user." "This may be okay for your distribution."); else tst_resm(TFAIL, "call failed with an " "unexpected error - %d : %s", TEST_ERRNO, strerror(TEST_ERRNO)); } } } cleanup(); /*NOTREACHED*/ return(0); } /* * setup() - performs all the ONE TIME setup for this test. */ void setup(void) { /* Switch to nobody user for correct error code collection */ if (geteuid() != 0) { tst_brkm(TBROK, tst_exit, "Test must be run as root"); } /* capture signals */ tst_sig(NOFORK, DEF_HANDLER, cleanup); /* Set up the expected error numbers for -e option */ TEST_EXP_ENOS(exp_enos); /* Pause if that option was specified */ TEST_PAUSE; /* * Create a temporary directory and cd into it. * This helps to ensure that a unique msgkey is created. * See ../lib/libipc.c for more information. */ tst_tmpdir(); ltpuser = getpwnam(nobody_uid); if (seteuid(ltpuser->pw_uid) == -1) { tst_resm(TINFO, "setuid failed to " "to set the effective uid to %d", ltpuser->pw_uid); perror("seteuid"); } /* get an IPC resource key */ shmkey = getipckey(); /* create a shared memory segment without read or write permissions */ if ((shm_id_1 = shmget(shmkey, SHM_SIZE, IPC_CREAT | IPC_EXCL)) == -1) { tst_brkm(TBROK, cleanup, "couldn't create shared memory " "segment #1 in setup()"); } /* create a shared memory segment with read and write permissions */ if ((shm_id_2 = shmget(shmkey + 1, SHM_SIZE, IPC_CREAT | IPC_EXCL | SHM_RW)) == -1) { tst_brkm(TBROK, cleanup, "couldn't create shared memory " "segment #2 in setup()"); } } /* * cleanup() - performs all the ONE TIME cleanup for this test at completion * or premature exit. */ void cleanup(void) { /* if they exist, remove the shared memory resources */ rm_shm(shm_id_1); rm_shm(shm_id_2); if (seteuid(0) == -1) { tst_resm(TINFO, "setuid failed to " "to set the effective uid to %d", ltpuser->pw_uid); perror("seteuid"); } /* Remove the temporary directory */ tst_rmdir(); /* * print timing stats if that option was specified. * print errno log if that option was specified. */ TEST_CLEANUP; /* exit with return code appropriate for results */ tst_exit(); }