1*49a6e16fSderaadt /* $OpenBSD: t_msgget.c,v 1.3 2021/12/13 16:56:48 deraadt Exp $ */
2a545a52cSbluhm /* $NetBSD: t_msgget.c,v 1.3 2017/10/08 08:31:05 kre Exp $ */
3a545a52cSbluhm
4a545a52cSbluhm /*-
5a545a52cSbluhm * Copyright (c) 2011 The NetBSD Foundation, Inc.
6a545a52cSbluhm * All rights reserved.
7a545a52cSbluhm *
8a545a52cSbluhm * This code is derived from software contributed to The NetBSD Foundation
9a545a52cSbluhm * by Jukka Ruohonen.
10a545a52cSbluhm *
11a545a52cSbluhm * Redistribution and use in source and binary forms, with or without
12a545a52cSbluhm * modification, are permitted provided that the following conditions
13a545a52cSbluhm * are met:
14a545a52cSbluhm * 1. Redistributions of source code must retain the above copyright
15a545a52cSbluhm * notice, this list of conditions and the following disclaimer.
16a545a52cSbluhm * 2. Redistributions in binary form must reproduce the above copyright
17a545a52cSbluhm * notice, this list of conditions and the following disclaimer in the
18a545a52cSbluhm * documentation and/or other materials provided with the distribution.
19a545a52cSbluhm *
20a545a52cSbluhm * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
21a545a52cSbluhm * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
22a545a52cSbluhm * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23a545a52cSbluhm * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
24a545a52cSbluhm * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
25a545a52cSbluhm * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
26a545a52cSbluhm * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
27a545a52cSbluhm * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
28a545a52cSbluhm * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29a545a52cSbluhm * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30a545a52cSbluhm * POSSIBILITY OF SUCH DAMAGE.
31a545a52cSbluhm */
32a545a52cSbluhm
33a545a52cSbluhm #include "macros.h"
34a545a52cSbluhm
35a545a52cSbluhm #include <sys/msg.h>
36a545a52cSbluhm #include <sys/stat.h>
37a545a52cSbluhm #include <sys/sysctl.h>
38a545a52cSbluhm #include <sys/wait.h>
39a545a52cSbluhm
40a545a52cSbluhm #include "atf-c.h"
41a545a52cSbluhm #include <errno.h>
42a545a52cSbluhm #include <pwd.h>
43a545a52cSbluhm #include <stdio.h>
44a545a52cSbluhm #include <stdlib.h>
45*49a6e16fSderaadt #include <signal.h>
46a545a52cSbluhm #include <string.h>
47a545a52cSbluhm #include <sysexits.h>
48a545a52cSbluhm #include <time.h>
49a545a52cSbluhm #include <unistd.h>
50a545a52cSbluhm
51a545a52cSbluhm #define MSG_KEY 12345689
52a545a52cSbluhm
53a545a52cSbluhm static void clean(void);
54a545a52cSbluhm
55a545a52cSbluhm static void
clean(void)56a545a52cSbluhm clean(void)
57a545a52cSbluhm {
58a545a52cSbluhm int id;
59a545a52cSbluhm
60a545a52cSbluhm if ((id = msgget(MSG_KEY, 0)) != -1)
61a545a52cSbluhm (void)msgctl(id, IPC_RMID, 0);
62a545a52cSbluhm }
63a545a52cSbluhm
64a545a52cSbluhm ATF_TC_WITH_CLEANUP(msgget_excl);
ATF_TC_HEAD(msgget_excl,tc)65a545a52cSbluhm ATF_TC_HEAD(msgget_excl, tc)
66a545a52cSbluhm {
67a545a52cSbluhm atf_tc_set_md_var(tc, "descr", "Test msgget(2) with IPC_EXCL");
68a545a52cSbluhm }
69a545a52cSbluhm
ATF_TC_BODY(msgget_excl,tc)70a545a52cSbluhm ATF_TC_BODY(msgget_excl, tc)
71a545a52cSbluhm {
72a545a52cSbluhm int id;
73a545a52cSbluhm
74a545a52cSbluhm /*
75a545a52cSbluhm * Create a message queue and re-open it with
76a545a52cSbluhm * O_CREAT and IPC_EXCL set. This should fail.
77a545a52cSbluhm */
78a545a52cSbluhm id = msgget(MSG_KEY, IPC_CREAT | 0600);
79a545a52cSbluhm
80a545a52cSbluhm if (id < 0)
81a545a52cSbluhm atf_tc_fail("failed to create message queue");
82a545a52cSbluhm
83a545a52cSbluhm errno = 0;
84a545a52cSbluhm
85a545a52cSbluhm if (msgget(MSG_KEY, IPC_CREAT | IPC_EXCL | 0600) != -1)
86a545a52cSbluhm atf_tc_fail("msgget(2) failed for IPC_EXCL");
87a545a52cSbluhm
88a545a52cSbluhm ATF_REQUIRE(errno == EEXIST);
89a545a52cSbluhm
90a545a52cSbluhm /*
91a545a52cSbluhm * However, the same call should succeed
92a545a52cSbluhm * when IPC_EXCL is not set in the flags.
93a545a52cSbluhm */
94a545a52cSbluhm id = msgget(MSG_KEY, IPC_CREAT | 0600);
95a545a52cSbluhm
96a545a52cSbluhm if (id < 0)
97a545a52cSbluhm atf_tc_fail("msgget(2) failed to re-open");
98a545a52cSbluhm
99a545a52cSbluhm ATF_REQUIRE(msgctl(id, IPC_RMID, 0) == 0);
100a545a52cSbluhm }
101a545a52cSbluhm
ATF_TC_CLEANUP(msgget_excl,tc)102a545a52cSbluhm ATF_TC_CLEANUP(msgget_excl, tc)
103a545a52cSbluhm {
104a545a52cSbluhm clean();
105a545a52cSbluhm }
106a545a52cSbluhm
107a545a52cSbluhm ATF_TC_WITH_CLEANUP(msgget_exit);
ATF_TC_HEAD(msgget_exit,tc)108a545a52cSbluhm ATF_TC_HEAD(msgget_exit, tc)
109a545a52cSbluhm {
110a545a52cSbluhm atf_tc_set_md_var(tc, "descr",
111a545a52cSbluhm "Test that XSI message queues are "
112a545a52cSbluhm "not removed when the process exits");
113a545a52cSbluhm }
114a545a52cSbluhm
ATF_TC_BODY(msgget_exit,tc)115a545a52cSbluhm ATF_TC_BODY(msgget_exit, tc)
116a545a52cSbluhm {
117a545a52cSbluhm int id, sta;
118a545a52cSbluhm pid_t pid;
119a545a52cSbluhm
120a545a52cSbluhm pid = fork();
121a545a52cSbluhm ATF_REQUIRE(pid >= 0);
122a545a52cSbluhm
123a545a52cSbluhm if (pid == 0) {
124a545a52cSbluhm
125a545a52cSbluhm if (msgget(MSG_KEY, IPC_CREAT | IPC_EXCL | 0600) == -1)
126a545a52cSbluhm _exit(EXIT_FAILURE);
127a545a52cSbluhm
128a545a52cSbluhm _exit(EXIT_SUCCESS);
129a545a52cSbluhm }
130a545a52cSbluhm
131a545a52cSbluhm (void)wait(&sta);
132a545a52cSbluhm
133a545a52cSbluhm if (WIFEXITED(sta) == 0 || WEXITSTATUS(sta) != EXIT_SUCCESS)
134a545a52cSbluhm atf_tc_fail("failed to create message queue");
135a545a52cSbluhm
136a545a52cSbluhm id = msgget(MSG_KEY, 0);
137a545a52cSbluhm
138a545a52cSbluhm if (id == -1)
139a545a52cSbluhm atf_tc_fail("message queue was removed on process exit");
140a545a52cSbluhm
141a545a52cSbluhm ATF_REQUIRE(msgctl(id, IPC_RMID, 0) == 0);
142a545a52cSbluhm }
143a545a52cSbluhm
ATF_TC_CLEANUP(msgget_exit,tc)144a545a52cSbluhm ATF_TC_CLEANUP(msgget_exit, tc)
145a545a52cSbluhm {
146a545a52cSbluhm clean();
147a545a52cSbluhm }
148a545a52cSbluhm
149a545a52cSbluhm ATF_TC_WITH_CLEANUP(msgget_init);
ATF_TC_HEAD(msgget_init,tc)150a545a52cSbluhm ATF_TC_HEAD(msgget_init, tc)
151a545a52cSbluhm {
152a545a52cSbluhm atf_tc_set_md_var(tc, "descr",
153a545a52cSbluhm "Test that msgget(2) initializes data structures properly");
154a545a52cSbluhm }
155a545a52cSbluhm
ATF_TC_BODY(msgget_init,tc)156a545a52cSbluhm ATF_TC_BODY(msgget_init, tc)
157a545a52cSbluhm {
158a545a52cSbluhm const uid_t uid = geteuid();
159a545a52cSbluhm const gid_t gid = getegid();
160a545a52cSbluhm struct msqid_ds msgds;
161a545a52cSbluhm time_t t;
162a545a52cSbluhm int id;
163a545a52cSbluhm
164a545a52cSbluhm (void)memset(&msgds, 0x9, sizeof(struct msqid_ds));
165a545a52cSbluhm
166a545a52cSbluhm t = time(NULL);
167a545a52cSbluhm id = msgget(MSG_KEY, IPC_CREAT | 0600);
168a545a52cSbluhm
169a545a52cSbluhm ATF_REQUIRE(id !=-1);
170a545a52cSbluhm ATF_REQUIRE(msgctl(id, IPC_STAT, &msgds) == 0);
171a545a52cSbluhm
172a545a52cSbluhm ATF_CHECK(msgds.msg_qnum == 0);
173a545a52cSbluhm ATF_CHECK(msgds.msg_lspid == 0);
174a545a52cSbluhm ATF_CHECK(msgds.msg_lrpid == 0);
175a545a52cSbluhm ATF_CHECK(msgds.msg_rtime == 0);
176a545a52cSbluhm ATF_CHECK(msgds.msg_stime == 0);
177a545a52cSbluhm ATF_CHECK(msgds.msg_perm.uid == uid);
178a545a52cSbluhm ATF_CHECK(msgds.msg_perm.gid == gid);
179a545a52cSbluhm ATF_CHECK(msgds.msg_perm.cuid == uid);
180a545a52cSbluhm ATF_CHECK(msgds.msg_perm.cgid == gid);
181a545a52cSbluhm ATF_CHECK(msgds.msg_perm.mode == 0600);
182a545a52cSbluhm
183a545a52cSbluhm if (llabs(t - msgds.msg_ctime) > 5)
184a545a52cSbluhm atf_tc_fail("msgget(2) initialized current time incorrectly");
185a545a52cSbluhm
186a545a52cSbluhm ATF_REQUIRE(msgctl(id, IPC_RMID, 0) == 0);
187a545a52cSbluhm }
188a545a52cSbluhm
ATF_TC_CLEANUP(msgget_init,tc)189a545a52cSbluhm ATF_TC_CLEANUP(msgget_init, tc)
190a545a52cSbluhm {
191a545a52cSbluhm clean();
192a545a52cSbluhm }
193a545a52cSbluhm
194a545a52cSbluhm ATF_TC(msgget_limit);
ATF_TC_HEAD(msgget_limit,tc)195a545a52cSbluhm ATF_TC_HEAD(msgget_limit, tc)
196a545a52cSbluhm {
197a545a52cSbluhm atf_tc_set_md_var(tc, "descr", "Test msgget(2) against system limits");
198a545a52cSbluhm }
199a545a52cSbluhm
ATF_TC_BODY(msgget_limit,tc)200a545a52cSbluhm ATF_TC_BODY(msgget_limit, tc)
201a545a52cSbluhm {
202a545a52cSbluhm size_t len = sizeof(int);
203a545a52cSbluhm bool fail = false;
204a545a52cSbluhm int i, lim = 0;
205a545a52cSbluhm int *buf;
206a545a52cSbluhm
207a545a52cSbluhm if (sysctlbyname("kern.ipc.msgmni", &lim, &len, NULL, 0) != 0)
208a545a52cSbluhm atf_tc_skip("failed to read kern.ipc.msgmni sysctl");
209a545a52cSbluhm
210a545a52cSbluhm buf = calloc(lim + 1, sizeof(*buf));
211a545a52cSbluhm ATF_REQUIRE(buf != NULL);
212a545a52cSbluhm
213a545a52cSbluhm for (i = 0; i < lim; i++) {
214a545a52cSbluhm
215a545a52cSbluhm buf[i] = msgget(MSG_KEY + i, IPC_CREAT | IPC_EXCL | 0600);
216a545a52cSbluhm
217a545a52cSbluhm (void)fprintf(stderr, "key[%d] = %d\n", i, buf[i]);
218a545a52cSbluhm
219a545a52cSbluhm /*
220a545a52cSbluhm * This test only works when there are zero existing
221a545a52cSbluhm * message queues. Thus, bypass the unit test when
222a545a52cSbluhm * this precondition is not met, for reason or another.
223a545a52cSbluhm */
224a545a52cSbluhm if (buf[i] == -1)
225a545a52cSbluhm goto out;
226a545a52cSbluhm }
227a545a52cSbluhm
228a545a52cSbluhm i++;
229a545a52cSbluhm errno = 0;
230a545a52cSbluhm
231a545a52cSbluhm buf[i] = msgget(MSG_KEY + i, IPC_CREAT | IPC_EXCL | 0600);
232a545a52cSbluhm
233a545a52cSbluhm if (buf[i] != -1 || errno != ENOSPC)
234a545a52cSbluhm fail = true;
235a545a52cSbluhm
236a545a52cSbluhm out: /* Remember to clean-up. */
237a545a52cSbluhm for (i = 0; i < lim; i++)
238a545a52cSbluhm (void)msgctl(buf[i], IPC_RMID, 0);
239a545a52cSbluhm
240a545a52cSbluhm free(buf);
241a545a52cSbluhm
242a545a52cSbluhm if (fail != false)
243a545a52cSbluhm atf_tc_fail("msgget(2) opened more than %d queues", lim);
244a545a52cSbluhm }
245a545a52cSbluhm
246a545a52cSbluhm ATF_TC_WITH_CLEANUP(msgget_mode);
ATF_TC_HEAD(msgget_mode,tc)247a545a52cSbluhm ATF_TC_HEAD(msgget_mode, tc)
248a545a52cSbluhm {
249a545a52cSbluhm atf_tc_set_md_var(tc, "descr", "Test different modes with msgget(2)");
250a545a52cSbluhm atf_tc_set_md_var(tc, "require.user", "root");
251a545a52cSbluhm }
252a545a52cSbluhm
ATF_TC_BODY(msgget_mode,tc)253a545a52cSbluhm ATF_TC_BODY(msgget_mode, tc)
254a545a52cSbluhm {
255a545a52cSbluhm static const mode_t mode[] = {
256a545a52cSbluhm S_IRWXU, S_IRUSR, S_IWUSR, S_IXUSR, S_IRWXG, S_IRGRP,
257a545a52cSbluhm S_IWGRP, S_IXGRP, S_IRWXO, S_IROTH, S_IWOTH, S_IXOTH
258a545a52cSbluhm };
259a545a52cSbluhm
260a545a52cSbluhm struct msqid_ds msgds;
261a545a52cSbluhm size_t i;
262a545a52cSbluhm int id;
263a545a52cSbluhm
264a545a52cSbluhm for (i = 0; i < __arraycount(mode); i++) {
265a545a52cSbluhm
266a545a52cSbluhm (void)fprintf(stderr, "testing mode %d\n", mode[i]);
267a545a52cSbluhm (void)memset(&msgds, 0, sizeof(struct msqid_ds));
268a545a52cSbluhm
269a545a52cSbluhm id = msgget(MSG_KEY, IPC_CREAT | IPC_EXCL | (int)mode[i]);
270a545a52cSbluhm
271a545a52cSbluhm ATF_REQUIRE(id != -1);
272a545a52cSbluhm ATF_REQUIRE(msgctl(id, IPC_STAT, &msgds) == 0);
273a545a52cSbluhm ATF_REQUIRE(msgds.msg_perm.mode == mode[i]);
274a545a52cSbluhm ATF_REQUIRE(msgctl(id, IPC_RMID, 0) == 0);
275a545a52cSbluhm }
276a545a52cSbluhm }
277a545a52cSbluhm
ATF_TC_CLEANUP(msgget_mode,tc)278a545a52cSbluhm ATF_TC_CLEANUP(msgget_mode, tc)
279a545a52cSbluhm {
280a545a52cSbluhm clean();
281a545a52cSbluhm }
282a545a52cSbluhm
283a545a52cSbluhm static volatile int sig_caught;
284a545a52cSbluhm
285a545a52cSbluhm static void
sigsys_handler(int signum)286a545a52cSbluhm sigsys_handler(int signum)
287a545a52cSbluhm {
288a545a52cSbluhm
289a545a52cSbluhm sig_caught = signum;
290a545a52cSbluhm }
291a545a52cSbluhm
292a545a52cSbluhm static int
no_kernel_sysvmsg(void)293a545a52cSbluhm no_kernel_sysvmsg(void)
294a545a52cSbluhm {
295a545a52cSbluhm int id;
296a545a52cSbluhm void (*osig)(int);
297a545a52cSbluhm
298a545a52cSbluhm sig_caught = 0;
299a545a52cSbluhm osig = signal(SIGSYS, sigsys_handler);
300a545a52cSbluhm id = msgget(MSG_KEY, IPC_CREAT | 0600);
301a545a52cSbluhm if (sig_caught || id == -1)
302a545a52cSbluhm return 1;
303a545a52cSbluhm
304a545a52cSbluhm (void)msgctl(id, IPC_RMID, 0);
305a545a52cSbluhm (void)signal(SIGSYS, osig);
306a545a52cSbluhm
307a545a52cSbluhm return 0;
308a545a52cSbluhm }
309a545a52cSbluhm
310a545a52cSbluhm ATF_TC(msgget_query);
ATF_TC_HEAD(msgget_query,tc)311a545a52cSbluhm ATF_TC_HEAD(msgget_query, tc)
312a545a52cSbluhm {
313a545a52cSbluhm atf_tc_set_md_var(tc, "descr", "Skip msgget_* tests - no SYSVMSG");
314a545a52cSbluhm }
ATF_TC_BODY(msgget_query,tc)315a545a52cSbluhm ATF_TC_BODY(msgget_query, tc)
316a545a52cSbluhm {
317a545a52cSbluhm atf_tc_skip("No SYSVMSG in kernel");
318a545a52cSbluhm }
319a545a52cSbluhm
ATF_TP_ADD_TCS(tp)320a545a52cSbluhm ATF_TP_ADD_TCS(tp)
321a545a52cSbluhm {
322a545a52cSbluhm
323a545a52cSbluhm if (no_kernel_sysvmsg()) {
324a545a52cSbluhm ATF_TP_ADD_TC(tp, msgget_query);
325a545a52cSbluhm } else {
326a545a52cSbluhm ATF_TP_ADD_TC(tp, msgget_excl);
327a545a52cSbluhm ATF_TP_ADD_TC(tp, msgget_exit);
328a545a52cSbluhm ATF_TP_ADD_TC(tp, msgget_init);
3297496d4e5Sbluhm #ifndef __OpenBSD__
3307496d4e5Sbluhm /* sysctl kern.ipc.msgmni not available */
3317496d4e5Sbluhm ATF_TP_ADD_TC(tp, msgget_limit);
3327496d4e5Sbluhm #endif
333a545a52cSbluhm ATF_TP_ADD_TC(tp, msgget_mode);
334a545a52cSbluhm }
335a545a52cSbluhm
336a545a52cSbluhm return atf_no_error();
337a545a52cSbluhm }
338