/* * * Copyright (c) International Business Machines Corp., 2001 * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See * the GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ /* * NAME * shmctl03.c * * DESCRIPTION * shmctl03 - check for EACCES, and EPERM errors * * ALGORITHM * create a shared memory segment with root only read & write permissions * fork a child process * if child * set the ID of the child process to that of "ltpuser1" * call do_child() * loop if that option was specified * call shmctl() using three different invalid cases * check the errno value * issue a PASS message if we get EACCES or EPERM * otherwise, the tests fails * issue a FAIL message * call cleanup * if parent * wait for child to exit * remove the shared memory segment * * USAGE: * shmctl03 [-c n] [-e] [-i n] [-I x] [-P x] [-t] * where, -c n : Run n copies concurrently. * -e : Turn on errno logging. * -i n : Execute test n times. * -I x : Execute test for x seconds. * -P x : Pause for x seconds between iterations. * -t : Turn on syscall timing. * * HISTORY * 03/2001 - Written by Wayne Boyer * * RESTRICTIONS * test must be run as root */ #include "ipcshm.h" #include #include char *TCID = "shmctl03"; extern int Tst_count; int exp_enos[] = {EACCES, EPERM, 0}; /* 0 terminated list of */ /* expected errnos */ int shm_id_1 = -1; uid_t ltp_uid; char *ltp_user = "nobody"; struct shmid_ds buf; struct test_case_t { int *shmid; int cmd; struct shmid_ds *sbuf; int error; } TC[] = { /* EACCES - child has no read permission for segment */ {&shm_id_1, IPC_STAT, &buf, EACCES}, /* EPERM - IPC_SET - child doesn't have permission to change segment */ {&shm_id_1, IPC_SET, &buf, EPERM}, /* EPERM - IPC_RMID - child can not remove the segment */ {&shm_id_1, IPC_RMID, &buf, EPERM}, }; int TST_TOTAL = (sizeof(TC) / sizeof(*TC)); int main(int ac, char **av) { char *msg; /* message returned from parse_opts */ int pid; void do_child(void); /* parse standard options */ if ((msg = parse_opts(ac, av, (option_t *)NULL, NULL)) != (char *)NULL){ tst_brkm(TBROK, cleanup, "OPTION PARSING ERROR - %s", msg); } setup(); /* global setup */ if ((pid = FORK_OR_VFORK()) == -1) { tst_brkm(TBROK, cleanup, "could not fork"); } if (pid == 0) { /* child */ /* set the user ID of the child to the non root user */ if (setuid(ltp_uid) == -1) { tst_resm(TBROK, "setuid() failed"); exit(1); } do_child(); } else { /* wait for the child to return */ if (waitpid(pid, NULL, 0) == -1) { tst_brkm(TBROK, cleanup, "waitpid failed"); } /* if it exists, remove the shared memory resource */ rm_shm(shm_id_1); /* Remove the temporary directory */ tst_rmdir(); } cleanup (); return(0); } /* * do_child - make the call as the child process */ void do_child(void) { int i, lc; /* The following loop checks looping state if -i option given */ for (lc = 0; TEST_LOOPING(lc); lc++) { /* reset Tst_count in case we are looping */ Tst_count = 0; /* loop through the test cases */ for (i=0; i