* Tests communication over shared memory segments (shm)
  with identical keys between two separate IPC namespaces

Signed-off-by: Matus Marhefka <mmarh...@redhat.com>
---
 runtest/containers                             |   1 +
 testcases/kernel/containers/sysvipc/.gitignore |   1 +
 testcases/kernel/containers/sysvipc/shm_comm.c | 184 +++++++++++++++++++++++++
 3 files changed, 186 insertions(+)
 create mode 100644 testcases/kernel/containers/sysvipc/shm_comm.c

diff --git a/runtest/containers b/runtest/containers
index fc61ada..84ae736 100644
--- a/runtest/containers
+++ b/runtest/containers
@@ -39,6 +39,7 @@ shmnstest_unshare shmnstest unshare
 shmem_2nstest_none shmem_2nstest none
 shmem_2nstest_clone shmem_2nstest clone
 shmem_2nstest_unshare shmem_2nstest unshare
+shm_comm shm_comm
 mesgq_nstest_none mesgq_nstest none
 mesgq_nstest_clone mesgq_nstest clone
 mesgq_nstest_unshare mesgq_nstest unshare
diff --git a/testcases/kernel/containers/sysvipc/.gitignore 
b/testcases/kernel/containers/sysvipc/.gitignore
index 58cfbee..b5a4cbd 100644
--- a/testcases/kernel/containers/sysvipc/.gitignore
+++ b/testcases/kernel/containers/sysvipc/.gitignore
@@ -3,3 +3,4 @@
 /semtest_2ns
 /shmem_2nstest
 /shmnstest
+/shm_comm
diff --git a/testcases/kernel/containers/sysvipc/shm_comm.c 
b/testcases/kernel/containers/sysvipc/shm_comm.c
new file mode 100644
index 0000000..6475155
--- /dev/null
+++ b/testcases/kernel/containers/sysvipc/shm_comm.c
@@ -0,0 +1,184 @@
+/* Copyright (c) 2014 Red Hat, Inc.
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of version 2 the GNU General Public License as
+ * published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program.  If not, see <http://www.gnu.org/licenses/>.
+ ***********************************************************************
+ * File: shm_comm.c
+ *
+ * Description:
+ * 1. Clones two child processes with CLONE_NEWIPC flag, each child
+ *    allocates System V shared memory segment (shm) with the _identical_
+ *    key and attaches that segment into its address space.
+ * 2. Child1 writes into the shared memory segment.
+ * 3. Child2 writes into the shared memory segment.
+ * 4. Writes to the shared memory segment with the identical key but from
+ *    two different IPC namespaces should not interfere with each other
+ *    and so child1 checks whether its shared segment wasn't changed
+ *    by child2, if it wasn't test passes, otherwise test fails.
+ */
+
+#define _GNU_SOURCE
+#include <sys/ipc.h>
+#include <sys/shm.h>
+#include <sys/types.h>
+#include <sys/wait.h>
+#include <stdio.h>
+#include <errno.h>
+#include "usctest.h"
+#include "test.h"
+#include "safe_macros.h"
+#include "libclone.h"
+#include "ipcns_helper.h"
+
+
+#define TESTKEY 124426L
+#define SHMSIZE 50
+char *TCID     = "shm_comm";
+int TST_TOTAL  = 1;
+struct tst_checkpoint checkpoint1;
+struct tst_checkpoint checkpoint2;
+
+
+static void cleanup(void)
+{
+       tst_rmdir();
+}
+
+static void setup(void)
+{
+       tst_require_root(NULL);
+       check_newipc();
+       tst_tmpdir();
+       TST_CHECKPOINT_INIT(&checkpoint1);
+       TST_CHECKPOINT_INIT(&checkpoint2);
+}
+
+int chld1_shm(void *arg)
+{
+       int id, rval = 0;
+       char *shmem;
+
+       id = shmget(TESTKEY, SHMSIZE, IPC_CREAT);
+       if (id == -1) {
+               perror("shmget");
+               return 2;
+       }
+
+       if ((shmem = shmat(id, NULL, 0)) == (char *) -1) {
+               perror("shmat");
+               shmctl(id, IPC_RMID, NULL);
+               return 2;
+       }
+
+       *shmem = 'A';
+
+       /* tell child2 to continue */
+       TST_CHECKPOINT_SIGNAL_CHILD(NULL, &checkpoint1);
+
+       /* wait for child2 */
+       TST_CHECKPOINT_CHILD_WAIT(&checkpoint2);
+
+       /* if child1 shared segment has changed (by child2) report fail */
+       if (*shmem != 'A')
+               rval = 1;
+
+       /* tell child2 to continue */
+       TST_CHECKPOINT_SIGNAL_CHILD(NULL, &checkpoint1);
+
+       shmdt(shmem);
+       shmctl(id, IPC_RMID, NULL);
+       return rval;
+}
+
+int chld2_shm(void *arg)
+{
+       int id;
+       char *shmem;
+
+       id = shmget(TESTKEY, SHMSIZE, IPC_CREAT);
+       if (id == -1) {
+               perror("shmget");
+               return 2;
+       }
+
+       if ((shmem = shmat(id, NULL, 0)) == (char *) -1) {
+               perror("shmat");
+               shmctl(id, IPC_RMID, NULL);
+               return 2;
+       }
+
+       /* wait for child1 to write to his segment */
+       TST_CHECKPOINT_CHILD_WAIT(&checkpoint1);
+
+       *shmem = 'B';
+
+       /* tell child1 to continue */
+       TST_CHECKPOINT_SIGNAL_CHILD(NULL, &checkpoint2);
+
+       /* wait for child1 */
+       TST_CHECKPOINT_CHILD_WAIT(&checkpoint1);
+
+       shmdt(shmem);
+       shmctl(id, IPC_RMID, NULL);
+       return 0;
+}
+
+static void test(void)
+{
+       int status, ret = 0;
+
+       ret = do_clone_unshare_test(T_CLONE, CLONE_NEWIPC, chld1_shm, NULL);
+       if (ret == -1)
+               tst_brkm(TBROK | TERRNO, cleanup, "clone failed");
+
+       ret = do_clone_unshare_test(T_CLONE, CLONE_NEWIPC, chld2_shm, NULL);
+       if (ret == -1)
+               tst_brkm(TBROK | TERRNO, cleanup, "clone failed");
+
+
+       while (wait(&status) > 0) {
+               if (WIFEXITED(status) && WEXITSTATUS(status) == 1)
+                       ret = 1;
+               if (WIFEXITED(status) && WEXITSTATUS(status) == 2)
+                       tst_brkm(TBROK | TERRNO, cleanup, "error in child");
+               if (WIFSIGNALED(status)) {
+                       tst_resm(TFAIL, "child was killed with signal %s",
+                                       tst_strsig(WTERMSIG(status)));
+                       return;
+               }
+       }
+
+       if (ret)
+               tst_resm(TFAIL, "SysV shm: communication with identical keys"
+                               " between namespaces");
+       else
+               tst_resm(TPASS, "SysV shm: communication with identical keys"
+                               " between namespaces");
+}
+
+int main(int argc, char *argv[])
+{
+       const char *msg;
+       int lc;
+
+       msg = parse_opts(argc, argv, NULL, NULL);
+       if (msg != NULL)
+               tst_brkm(TBROK, NULL, "OPTION PARSING ERROR - %s", msg);
+
+       setup();
+
+       for (lc = 0; TEST_LOOPING(lc); lc++)
+               test();
+
+       cleanup();
+       tst_exit();
+}
-- 
1.8.3.1


------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
Ltp-list mailing list
Ltp-list@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ltp-list

Reply via email to