1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3 * Copyright (c) International Business Machines Corp., 2001
4 * 03/2001 - Written by Wayne Boyer
5 * Copyright (c) 2018 Cyril Hrubis <chrubis@suse.cz>
6 */
7
8 /*
9 * Test that IPC_STAT command succeeds and the the buffer is filled with
10 * correct data.
11 */
12 #include <errno.h>
13
14 #include "tst_test.h"
15 #include "tst_safe_sysv_ipc.h"
16 #include "libnewipc.h"
17
18 static int msg_id = -1;
19 static time_t creat_time;
20 static key_t msgkey;
21 static uid_t uid;
22 static gid_t gid;
23 unsigned short mode = 0660;
24
verify_msgctl(void)25 static void verify_msgctl(void)
26 {
27 struct msqid_ds buf;
28
29 memset(&buf, 'a', sizeof(buf));
30 TEST(msgctl(msg_id, IPC_STAT, &buf));
31
32 if (TST_RET != 0) {
33 tst_res(TFAIL | TTERRNO, "msgctl() returned %li", TST_RET);
34 return;
35 }
36
37 tst_res(TPASS, "msgctl(IPC_STAT)");
38
39 if (buf.msg_stime == 0)
40 tst_res(TPASS, "msg_stime = 0");
41 else
42 tst_res(TFAIL, "msg_stime = %lu", (unsigned long)buf.msg_stime);
43
44 if (buf.msg_rtime == 0)
45 tst_res(TPASS, "msg_rtime = 0");
46 else
47 tst_res(TFAIL, "msg_rtime = %lu", (unsigned long)buf.msg_rtime);
48
49 if (buf.msg_ctime <= creat_time && buf.msg_ctime >= creat_time - 2) {
50 tst_res(TPASS, "msg_ctime = %lu, expected %lu",
51 (unsigned long)buf.msg_ctime, (unsigned long)creat_time);
52 } else {
53 tst_res(TFAIL, "msg_ctime = %lu, expected %lu",
54 (unsigned long)buf.msg_ctime, (unsigned long)creat_time);
55 }
56
57 if (buf.msg_qnum == 0)
58 tst_res(TPASS, "msg_qnum = 0");
59 else
60 tst_res(TFAIL, "msg_qnum = %li", (long)buf.msg_qnum);
61
62 if (buf.msg_qbytes > 0)
63 tst_res(TPASS, "msg_qbytes = %li", (long)buf.msg_qbytes);
64 else
65 tst_res(TFAIL, "msg_qbytes = %li", (long)buf.msg_qbytes);
66
67 if (buf.msg_lspid == 0)
68 tst_res(TPASS, "msg_lspid = 0");
69 else
70 tst_res(TFAIL, "msg_lspid = %u", (unsigned)buf.msg_lspid);
71
72 if (buf.msg_lrpid == 0)
73 tst_res(TPASS, "msg_lrpid = 0");
74 else
75 tst_res(TFAIL, "msg_lrpid = %u", (unsigned)buf.msg_lrpid);
76
77 if (buf.msg_perm.__key == msgkey) {
78 tst_res(TPASS, "msg_perm.__key == %u", (unsigned)msgkey);
79 } else {
80 tst_res(TFAIL, "msg_perm.__key == %u, expected %u",
81 (unsigned)buf.msg_perm.__key, (unsigned)msgkey);
82 }
83
84 if (buf.msg_perm.uid == uid) {
85 tst_res(TPASS, "msg_perm.uid = %u", (unsigned)uid);
86 } else {
87 tst_res(TFAIL, "msg_perm.uid = %u, expected %u",
88 (unsigned)buf.msg_perm.uid, (unsigned)uid);
89 }
90
91 if (buf.msg_perm.gid == gid) {
92 tst_res(TPASS, "msg_perm.gid = %u", (unsigned)gid);
93 } else {
94 tst_res(TFAIL, "msg_perm.gid = %u, expected %u",
95 (unsigned)buf.msg_perm.gid, (unsigned)gid);
96 }
97
98 if (buf.msg_perm.cuid == uid) {
99 tst_res(TPASS, "msg_perm.cuid = %u", (unsigned)uid);
100 } else {
101 tst_res(TFAIL, "msg_perm.cuid = %u, expected %u",
102 (unsigned)buf.msg_perm.cuid, (unsigned)uid);
103 }
104
105 if (buf.msg_perm.cgid == gid) {
106 tst_res(TPASS, "msg_perm.cgid = %u", (unsigned)gid);
107 } else {
108 tst_res(TFAIL, "msg_perm.cgid = %u, expected %u",
109 (unsigned)buf.msg_perm.cgid, (unsigned)gid);
110 }
111
112 if ((buf.msg_perm.mode & MODE_MASK) == (mode & MODE_MASK)) {
113 tst_res(TPASS, "msg_perm.mode = 0%ho", mode & MODE_MASK);
114 } else {
115 tst_res(TFAIL, "msg_perm.mode = 0%ho, expected %hx",
116 buf.msg_perm.mode, (mode & MODE_MASK));
117 }
118 }
119
setup(void)120 static void setup(void)
121 {
122 msgkey = GETIPCKEY();
123
124 msg_id = SAFE_MSGGET(msgkey, IPC_CREAT | IPC_EXCL | MSG_RW | mode);
125 time(&creat_time);
126
127 uid = geteuid();
128 gid = getegid();
129 }
130
cleanup(void)131 static void cleanup(void)
132 {
133 if (msg_id >= 0)
134 SAFE_MSGCTL(msg_id, IPC_RMID, NULL);
135 }
136
137 static struct tst_test test = {
138 .setup = setup,
139 .cleanup = cleanup,
140 .test_all = verify_msgctl,
141 .needs_tmpdir = 1
142 };
143