1 1.4 kre /* $NetBSD: t_msgsnd.c,v 1.4 2017/10/08 08:31:05 kre Exp $ */ 2 1.1 jruoho 3 1.1 jruoho /*- 4 1.1 jruoho * Copyright (c) 2011 The NetBSD Foundation, Inc. 5 1.1 jruoho * All rights reserved. 6 1.1 jruoho * 7 1.1 jruoho * This code is derived from software contributed to The NetBSD Foundation 8 1.1 jruoho * by Jukka Ruohonen. 9 1.1 jruoho * 10 1.1 jruoho * Redistribution and use in source and binary forms, with or without 11 1.1 jruoho * modification, are permitted provided that the following conditions 12 1.1 jruoho * are met: 13 1.1 jruoho * 1. Redistributions of source code must retain the above copyright 14 1.1 jruoho * notice, this list of conditions and the following disclaimer. 15 1.1 jruoho * 2. Redistributions in binary form must reproduce the above copyright 16 1.1 jruoho * notice, this list of conditions and the following disclaimer in the 17 1.1 jruoho * documentation and/or other materials provided with the distribution. 18 1.1 jruoho * 19 1.1 jruoho * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 20 1.1 jruoho * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 21 1.1 jruoho * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 22 1.1 jruoho * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 23 1.1 jruoho * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 24 1.1 jruoho * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 25 1.1 jruoho * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 26 1.1 jruoho * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 27 1.1 jruoho * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 28 1.1 jruoho * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 29 1.1 jruoho * POSSIBILITY OF SUCH DAMAGE. 30 1.1 jruoho */ 31 1.1 jruoho #include <sys/cdefs.h> 32 1.4 kre __RCSID("$NetBSD: t_msgsnd.c,v 1.4 2017/10/08 08:31:05 kre Exp $"); 33 1.1 jruoho 34 1.1 jruoho #include <sys/msg.h> 35 1.1 jruoho #include <sys/stat.h> 36 1.1 jruoho #include <sys/sysctl.h> 37 1.1 jruoho #include <sys/wait.h> 38 1.1 jruoho 39 1.1 jruoho #include <atf-c.h> 40 1.1 jruoho #include <errno.h> 41 1.3 christos #include <limits.h> 42 1.1 jruoho #include <pwd.h> 43 1.1 jruoho #include <signal.h> 44 1.1 jruoho #include <stdio.h> 45 1.1 jruoho #include <stdlib.h> 46 1.1 jruoho #include <string.h> 47 1.1 jruoho #include <sysexits.h> 48 1.1 jruoho #include <time.h> 49 1.1 jruoho #include <unistd.h> 50 1.1 jruoho 51 1.1 jruoho #define MSG_KEY 1234 52 1.1 jruoho #define MSG_MTYPE_1 0x41 53 1.1 jruoho #define MSG_MTYPE_2 0x42 54 1.1 jruoho #define MSG_MTYPE_3 0x43 55 1.1 jruoho 56 1.1 jruoho struct msg { 57 1.1 jruoho long mtype; 58 1.1 jruoho char buf[3]; 59 1.1 jruoho }; 60 1.1 jruoho 61 1.1 jruoho static void clean(void); 62 1.1 jruoho 63 1.1 jruoho static void 64 1.1 jruoho clean(void) 65 1.1 jruoho { 66 1.1 jruoho int id; 67 1.1 jruoho 68 1.1 jruoho if ((id = msgget(MSG_KEY, 0)) != -1) 69 1.1 jruoho (void)msgctl(id, IPC_RMID, 0); 70 1.1 jruoho } 71 1.1 jruoho 72 1.1 jruoho ATF_TC_WITH_CLEANUP(msgsnd_block); 73 1.1 jruoho ATF_TC_HEAD(msgsnd_block, tc) 74 1.1 jruoho { 75 1.2 jruoho atf_tc_set_md_var(tc, "descr", "Test that msgsnd(2) blocks"); 76 1.1 jruoho atf_tc_set_md_var(tc, "timeout", "10"); 77 1.1 jruoho } 78 1.1 jruoho 79 1.1 jruoho ATF_TC_BODY(msgsnd_block, tc) 80 1.1 jruoho { 81 1.1 jruoho struct msg msg = { MSG_MTYPE_1, { 'a', 'b', 'c' } }; 82 1.1 jruoho int id, sta; 83 1.1 jruoho pid_t pid; 84 1.1 jruoho 85 1.1 jruoho id = msgget(MSG_KEY, IPC_CREAT | 0600); 86 1.1 jruoho ATF_REQUIRE(id != -1); 87 1.1 jruoho 88 1.1 jruoho pid = fork(); 89 1.1 jruoho ATF_REQUIRE(pid >= 0); 90 1.1 jruoho 91 1.1 jruoho if (pid == 0) { 92 1.1 jruoho 93 1.1 jruoho /* 94 1.1 jruoho * Enqueue messages until some limit (e.g. the maximum 95 1.1 jruoho * number of messages in the queue or the maximum number 96 1.1 jruoho * of bytes in the queue) is reached. After this the call 97 1.1 jruoho * should block when the IPC_NOWAIT is not set. 98 1.1 jruoho */ 99 1.1 jruoho for (;;) { 100 1.1 jruoho 101 1.1 jruoho if (msgsnd(id, &msg, sizeof(struct msg), 0) < 0) 102 1.1 jruoho _exit(EXIT_FAILURE); 103 1.1 jruoho } 104 1.1 jruoho } 105 1.1 jruoho 106 1.1 jruoho (void)sleep(2); 107 1.1 jruoho (void)kill(pid, SIGKILL); 108 1.1 jruoho (void)wait(&sta); 109 1.1 jruoho 110 1.1 jruoho if (WIFEXITED(sta) != 0 || WIFSIGNALED(sta) == 0) 111 1.1 jruoho atf_tc_fail("msgsnd(2) did not block"); 112 1.1 jruoho 113 1.1 jruoho ATF_REQUIRE(msgctl(id, IPC_RMID, 0) == 0); 114 1.1 jruoho } 115 1.1 jruoho 116 1.1 jruoho ATF_TC_CLEANUP(msgsnd_block, tc) 117 1.1 jruoho { 118 1.1 jruoho clean(); 119 1.1 jruoho } 120 1.1 jruoho 121 1.1 jruoho ATF_TC_WITH_CLEANUP(msgsnd_count); 122 1.1 jruoho ATF_TC_HEAD(msgsnd_count, tc) 123 1.1 jruoho { 124 1.1 jruoho atf_tc_set_md_var(tc, "descr", 125 1.1 jruoho "Test that msgsnd(2) increments the amount of " 126 1.1 jruoho "message in the queue, as given by msgctl(2)"); 127 1.1 jruoho atf_tc_set_md_var(tc, "timeout", "10"); 128 1.1 jruoho } 129 1.1 jruoho 130 1.1 jruoho ATF_TC_BODY(msgsnd_count, tc) 131 1.1 jruoho { 132 1.1 jruoho struct msg msg = { MSG_MTYPE_1, { 'a', 'b', 'c' } }; 133 1.1 jruoho struct msqid_ds ds; 134 1.1 jruoho size_t i = 0; 135 1.1 jruoho int id, rv; 136 1.1 jruoho 137 1.1 jruoho id = msgget(MSG_KEY, IPC_CREAT | 0600); 138 1.1 jruoho ATF_REQUIRE(id != -1); 139 1.1 jruoho 140 1.1 jruoho for (;;) { 141 1.1 jruoho 142 1.1 jruoho errno = 0; 143 1.1 jruoho rv = msgsnd(id, &msg, sizeof(struct msg), IPC_NOWAIT); 144 1.1 jruoho 145 1.1 jruoho if (rv == 0) { 146 1.1 jruoho i++; 147 1.1 jruoho continue; 148 1.1 jruoho } 149 1.1 jruoho 150 1.1 jruoho if (rv == -1 && errno == EAGAIN) 151 1.1 jruoho break; 152 1.1 jruoho 153 1.1 jruoho atf_tc_fail("failed to enqueue a message"); 154 1.1 jruoho } 155 1.1 jruoho 156 1.1 jruoho (void)memset(&ds, 0, sizeof(struct msqid_ds)); 157 1.1 jruoho (void)msgctl(id, IPC_STAT, &ds); 158 1.1 jruoho 159 1.1 jruoho if (ds.msg_qnum != i) 160 1.1 jruoho atf_tc_fail("incorrect message count"); 161 1.1 jruoho 162 1.1 jruoho ATF_REQUIRE(msgctl(id, IPC_RMID, 0) == 0); 163 1.1 jruoho } 164 1.1 jruoho 165 1.1 jruoho ATF_TC_CLEANUP(msgsnd_count, tc) 166 1.1 jruoho { 167 1.1 jruoho clean(); 168 1.1 jruoho } 169 1.1 jruoho 170 1.1 jruoho ATF_TC_WITH_CLEANUP(msgsnd_err); 171 1.1 jruoho ATF_TC_HEAD(msgsnd_err, tc) 172 1.1 jruoho { 173 1.1 jruoho atf_tc_set_md_var(tc, "descr", "Test errors from msgsnd(2)"); 174 1.1 jruoho } 175 1.1 jruoho 176 1.1 jruoho ATF_TC_BODY(msgsnd_err, tc) 177 1.1 jruoho { 178 1.1 jruoho struct msg msg = { MSG_MTYPE_1, { 'a', 'b', 'c' } }; 179 1.1 jruoho int id; 180 1.1 jruoho 181 1.1 jruoho id = msgget(MSG_KEY, IPC_CREAT | 0600); 182 1.1 jruoho ATF_REQUIRE(id != -1); 183 1.1 jruoho 184 1.1 jruoho errno = 0; 185 1.1 jruoho 186 1.1 jruoho ATF_REQUIRE_ERRNO(EFAULT, msgsnd(id, (void *)-1, 187 1.1 jruoho sizeof(struct msg), IPC_NOWAIT) == -1); 188 1.1 jruoho 189 1.1 jruoho errno = 0; 190 1.1 jruoho 191 1.1 jruoho ATF_REQUIRE_ERRNO(EINVAL, msgsnd(-1, &msg, 192 1.1 jruoho sizeof(struct msg), IPC_NOWAIT) == -1); 193 1.1 jruoho 194 1.1 jruoho errno = 0; 195 1.1 jruoho 196 1.1 jruoho ATF_REQUIRE_ERRNO(EINVAL, msgsnd(-1, &msg, 197 1.1 jruoho SSIZE_MAX, IPC_NOWAIT) == -1); 198 1.1 jruoho 199 1.1 jruoho errno = 0; 200 1.1 jruoho msg.mtype = 0; 201 1.1 jruoho 202 1.1 jruoho ATF_REQUIRE_ERRNO(EINVAL, msgsnd(id, &msg, 203 1.1 jruoho sizeof(struct msg), IPC_NOWAIT) == -1); 204 1.1 jruoho 205 1.1 jruoho ATF_REQUIRE(msgctl(id, IPC_RMID, 0) == 0); 206 1.1 jruoho } 207 1.1 jruoho 208 1.1 jruoho ATF_TC_CLEANUP(msgsnd_err, tc) 209 1.1 jruoho { 210 1.1 jruoho clean(); 211 1.1 jruoho } 212 1.1 jruoho 213 1.1 jruoho ATF_TC_WITH_CLEANUP(msgsnd_nonblock); 214 1.1 jruoho ATF_TC_HEAD(msgsnd_nonblock, tc) 215 1.1 jruoho { 216 1.1 jruoho atf_tc_set_md_var(tc, "descr", "Test msgsnd(2) with IPC_NOWAIT"); 217 1.1 jruoho atf_tc_set_md_var(tc, "timeout", "10"); 218 1.1 jruoho } 219 1.1 jruoho 220 1.1 jruoho ATF_TC_BODY(msgsnd_nonblock, tc) 221 1.1 jruoho { 222 1.1 jruoho struct msg msg = { MSG_MTYPE_1, { 'a', 'b', 'c' } }; 223 1.1 jruoho int id, rv, sta; 224 1.1 jruoho pid_t pid; 225 1.1 jruoho 226 1.1 jruoho id = msgget(MSG_KEY, IPC_CREAT | 0600); 227 1.1 jruoho ATF_REQUIRE(id != -1); 228 1.1 jruoho 229 1.1 jruoho pid = fork(); 230 1.1 jruoho ATF_REQUIRE(pid >= 0); 231 1.1 jruoho 232 1.1 jruoho if (pid == 0) { 233 1.1 jruoho 234 1.1 jruoho for (;;) { 235 1.1 jruoho 236 1.1 jruoho errno = 0; 237 1.1 jruoho rv = msgsnd(id, &msg, sizeof(struct msg), IPC_NOWAIT); 238 1.1 jruoho 239 1.1 jruoho if (rv == -1 && errno == EAGAIN) 240 1.1 jruoho _exit(EXIT_SUCCESS); 241 1.1 jruoho } 242 1.1 jruoho } 243 1.1 jruoho 244 1.1 jruoho (void)sleep(2); 245 1.1 jruoho (void)kill(pid, SIGKILL); 246 1.1 jruoho (void)wait(&sta); 247 1.1 jruoho 248 1.1 jruoho if (WIFEXITED(sta) == 0 || WIFSIGNALED(sta) != 0) 249 1.1 jruoho atf_tc_fail("msgsnd(2) blocked with IPC_NOWAIT"); 250 1.1 jruoho 251 1.1 jruoho ATF_REQUIRE(msgctl(id, IPC_RMID, 0) == 0); 252 1.1 jruoho } 253 1.1 jruoho 254 1.1 jruoho ATF_TC_CLEANUP(msgsnd_nonblock, tc) 255 1.1 jruoho { 256 1.1 jruoho clean(); 257 1.1 jruoho } 258 1.1 jruoho 259 1.1 jruoho ATF_TC_WITH_CLEANUP(msgsnd_perm); 260 1.1 jruoho ATF_TC_HEAD(msgsnd_perm, tc) 261 1.1 jruoho { 262 1.1 jruoho atf_tc_set_md_var(tc, "descr", "Test permissions with msgsnd(2)"); 263 1.1 jruoho atf_tc_set_md_var(tc, "require.user", "root"); 264 1.1 jruoho } 265 1.1 jruoho 266 1.1 jruoho ATF_TC_BODY(msgsnd_perm, tc) 267 1.1 jruoho { 268 1.1 jruoho struct msg msg = { MSG_MTYPE_1, { 'a', 'b', 'c' } }; 269 1.1 jruoho struct passwd *pw; 270 1.1 jruoho int id, sta; 271 1.1 jruoho pid_t pid; 272 1.1 jruoho uid_t uid; 273 1.1 jruoho 274 1.1 jruoho pw = getpwnam("nobody"); 275 1.1 jruoho id = msgget(MSG_KEY, IPC_CREAT | 0600); 276 1.1 jruoho 277 1.1 jruoho ATF_REQUIRE(id != -1); 278 1.1 jruoho ATF_REQUIRE(pw != NULL); 279 1.1 jruoho 280 1.1 jruoho uid = pw->pw_uid; 281 1.1 jruoho ATF_REQUIRE(uid != 0); 282 1.1 jruoho 283 1.1 jruoho pid = fork(); 284 1.1 jruoho ATF_REQUIRE(pid >= 0); 285 1.1 jruoho 286 1.1 jruoho if (pid == 0) { 287 1.1 jruoho 288 1.1 jruoho /* 289 1.1 jruoho * Try to enqueue a message to the queue 290 1.1 jruoho * created by root as RW for owner only. 291 1.1 jruoho */ 292 1.1 jruoho if (setuid(uid) != 0) 293 1.1 jruoho _exit(EX_OSERR); 294 1.1 jruoho 295 1.1 jruoho id = msgget(MSG_KEY, 0); 296 1.1 jruoho 297 1.1 jruoho if (id == -1) 298 1.1 jruoho _exit(EX_OSERR); 299 1.1 jruoho 300 1.1 jruoho errno = 0; 301 1.1 jruoho 302 1.1 jruoho if (msgsnd(id, &msg, sizeof(struct msg), IPC_NOWAIT) == 0) 303 1.1 jruoho _exit(EXIT_FAILURE); 304 1.1 jruoho 305 1.1 jruoho if (errno != EACCES) 306 1.1 jruoho _exit(EXIT_FAILURE); 307 1.1 jruoho 308 1.1 jruoho _exit(EXIT_SUCCESS); 309 1.1 jruoho } 310 1.1 jruoho 311 1.1 jruoho (void)wait(&sta); 312 1.1 jruoho 313 1.1 jruoho if (WIFEXITED(sta) == 0 || WEXITSTATUS(sta) != EXIT_SUCCESS) { 314 1.1 jruoho 315 1.1 jruoho if (errno == EX_OSERR) 316 1.1 jruoho atf_tc_fail("system call failed"); 317 1.1 jruoho 318 1.1 jruoho atf_tc_fail("UID %u enqueued message to root's queue", uid); 319 1.1 jruoho } 320 1.1 jruoho 321 1.1 jruoho ATF_REQUIRE(msgctl(id, IPC_RMID, 0) == 0); 322 1.1 jruoho } 323 1.1 jruoho 324 1.1 jruoho ATF_TC_CLEANUP(msgsnd_perm, tc) 325 1.1 jruoho { 326 1.1 jruoho clean(); 327 1.1 jruoho } 328 1.1 jruoho 329 1.4 kre static volatile int sig_caught; 330 1.4 kre 331 1.4 kre static void 332 1.4 kre sigsys_handler(int signum) 333 1.4 kre { 334 1.4 kre 335 1.4 kre sig_caught = signum; 336 1.4 kre } 337 1.4 kre 338 1.4 kre static int 339 1.4 kre no_kernel_sysvmsg(void) 340 1.4 kre { 341 1.4 kre int id; 342 1.4 kre void (*osig)(int); 343 1.4 kre 344 1.4 kre sig_caught = 0; 345 1.4 kre osig = signal(SIGSYS, sigsys_handler); 346 1.4 kre id = msgget(MSG_KEY, IPC_CREAT | 0600); 347 1.4 kre if (sig_caught || id == -1) 348 1.4 kre return 1; 349 1.4 kre 350 1.4 kre (void)msgctl(id, IPC_RMID, 0); 351 1.4 kre (void)signal(SIGSYS, osig); 352 1.4 kre 353 1.4 kre return 0; 354 1.4 kre } 355 1.4 kre 356 1.4 kre ATF_TC(msgsnd_query); 357 1.4 kre ATF_TC_HEAD(msgsnd_query, tc) 358 1.4 kre { 359 1.4 kre atf_tc_set_md_var(tc, "descr", "Skip msgsnd_* tests - no SYSVMSG"); 360 1.4 kre } 361 1.4 kre ATF_TC_BODY(msgsnd_query, tc) 362 1.4 kre { 363 1.4 kre atf_tc_skip("No SYSVMSG in kernel"); 364 1.4 kre } 365 1.4 kre 366 1.1 jruoho ATF_TP_ADD_TCS(tp) 367 1.1 jruoho { 368 1.1 jruoho 369 1.4 kre if (no_kernel_sysvmsg()) { 370 1.4 kre ATF_TP_ADD_TC(tp, msgsnd_query); 371 1.4 kre } else { 372 1.4 kre ATF_TP_ADD_TC(tp, msgsnd_block); 373 1.4 kre ATF_TP_ADD_TC(tp, msgsnd_count); 374 1.4 kre ATF_TP_ADD_TC(tp, msgsnd_err); 375 1.4 kre ATF_TP_ADD_TC(tp, msgsnd_nonblock); 376 1.4 kre ATF_TP_ADD_TC(tp, msgsnd_perm); 377 1.4 kre } 378 1.1 jruoho 379 1.1 jruoho return atf_no_error(); 380 1.1 jruoho } 381