aboutsummaryrefslogtreecommitdiff
path: root/testcases/kernel/syscalls/ipc/semctl/semctl04.c
blob: 8bbb721fec0b91c23c5febce95dd1c009f442c46 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
// SPDX-License-Identifier: GPL-2.0-or-later
/*
 * Copyright (c) International Business Machines  Corp., 2001
 *
 * HISTORY
 *	03/2001 - Written by Wayne Boyer
 */
/*\
 * [DESCRIPTION]
 *
 * Test for semctl() EPERM error
 *
 * Runs IPC_SET and IPC_RMID from unprivileged child process.
 *
\*/

#include <pwd.h>
#include <sys/wait.h>
#include "tst_safe_sysv_ipc.h"
#include "tst_test.h"
#include "lapi/sem.h"
#include "libnewipc.h"

static uid_t ltp_uid;
static int sem_id = -1;

static int tcases[] = { IPC_SET, IPC_RMID };

static void do_child(void)
{
	int i;
	union semun arg;
	struct semid_ds perm;

	for (i = 0; i < 2; i++) {
		if (tcases[i] == IPC_SET) {
			arg.buf = &perm;
			memset(&perm, 0, sizeof(perm));
			perm.sem_perm.uid = getuid() + 1;
			perm.sem_perm.gid = getgid() + 1;
			perm.sem_perm.mode = 0666;
		}

		TST_EXP_FAIL(semctl(sem_id, 0, tcases[i], arg), EPERM,
			     "semctl() with nobody user in child");
	}
}

static void verify_semctl(void)
{
	pid_t pid;

	pid = SAFE_FORK();

	if (pid == 0) {
		SAFE_SETEUID(ltp_uid);
		do_child();
	} else {
		SAFE_WAITPID(pid, NULL, 0);
	}
}

static void setup(void)
{
	static key_t semkey;

	semkey = GETIPCKEY();

	sem_id = SAFE_SEMGET(semkey, PSEMS, IPC_CREAT | IPC_EXCL);

	struct passwd *ltpuser = SAFE_GETPWNAM("nobody");
	ltp_uid = ltpuser->pw_uid;
}

static void cleanup(void)
{
	if (sem_id != -1)
		SAFE_SEMCTL(sem_id, 0, IPC_RMID);
}

static struct tst_test test = {
	.setup = setup,
	.cleanup = cleanup,
	.forks_child = 1,
	.needs_root = 1,
	.test_all = verify_semctl,
};