162306a36Sopenharmony_ci/* 262306a36Sopenharmony_ci * Copyright © 2019 Alexey Dobriyan <adobriyan@gmail.com> 362306a36Sopenharmony_ci * 462306a36Sopenharmony_ci * Permission to use, copy, modify, and distribute this software for any 562306a36Sopenharmony_ci * purpose with or without fee is hereby granted, provided that the above 662306a36Sopenharmony_ci * copyright notice and this permission notice appear in all copies. 762306a36Sopenharmony_ci * 862306a36Sopenharmony_ci * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 962306a36Sopenharmony_ci * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 1062306a36Sopenharmony_ci * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 1162306a36Sopenharmony_ci * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 1262306a36Sopenharmony_ci * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 1362306a36Sopenharmony_ci * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 1462306a36Sopenharmony_ci * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 1562306a36Sopenharmony_ci */ 1662306a36Sopenharmony_ci/* 1762306a36Sopenharmony_ci * Test that setns(CLONE_NEWIPC) points to new /proc/sysvipc content even 1862306a36Sopenharmony_ci * if old one is in dcache. 1962306a36Sopenharmony_ci */ 2062306a36Sopenharmony_ci#undef NDEBUG 2162306a36Sopenharmony_ci#include <assert.h> 2262306a36Sopenharmony_ci#include <errno.h> 2362306a36Sopenharmony_ci#include <stdio.h> 2462306a36Sopenharmony_ci#include <sched.h> 2562306a36Sopenharmony_ci#include <signal.h> 2662306a36Sopenharmony_ci#include <stdlib.h> 2762306a36Sopenharmony_ci#include <string.h> 2862306a36Sopenharmony_ci#include <unistd.h> 2962306a36Sopenharmony_ci#include <sys/types.h> 3062306a36Sopenharmony_ci#include <sys/stat.h> 3162306a36Sopenharmony_ci#include <fcntl.h> 3262306a36Sopenharmony_ci#include <sys/ipc.h> 3362306a36Sopenharmony_ci#include <sys/shm.h> 3462306a36Sopenharmony_ci 3562306a36Sopenharmony_cistatic pid_t pid = -1; 3662306a36Sopenharmony_ci 3762306a36Sopenharmony_cistatic void f(void) 3862306a36Sopenharmony_ci{ 3962306a36Sopenharmony_ci if (pid > 0) { 4062306a36Sopenharmony_ci kill(pid, SIGTERM); 4162306a36Sopenharmony_ci } 4262306a36Sopenharmony_ci} 4362306a36Sopenharmony_ci 4462306a36Sopenharmony_ciint main(void) 4562306a36Sopenharmony_ci{ 4662306a36Sopenharmony_ci int fd[2]; 4762306a36Sopenharmony_ci char _ = 0; 4862306a36Sopenharmony_ci int nsfd; 4962306a36Sopenharmony_ci 5062306a36Sopenharmony_ci atexit(f); 5162306a36Sopenharmony_ci 5262306a36Sopenharmony_ci /* Check for priviledges and syscall availability straight away. */ 5362306a36Sopenharmony_ci if (unshare(CLONE_NEWIPC) == -1) { 5462306a36Sopenharmony_ci if (errno == ENOSYS || errno == EPERM) { 5562306a36Sopenharmony_ci return 4; 5662306a36Sopenharmony_ci } 5762306a36Sopenharmony_ci return 1; 5862306a36Sopenharmony_ci } 5962306a36Sopenharmony_ci /* Distinguisher between two otherwise empty IPC namespaces. */ 6062306a36Sopenharmony_ci if (shmget(IPC_PRIVATE, 1, IPC_CREAT) == -1) { 6162306a36Sopenharmony_ci return 1; 6262306a36Sopenharmony_ci } 6362306a36Sopenharmony_ci 6462306a36Sopenharmony_ci if (pipe(fd) == -1) { 6562306a36Sopenharmony_ci return 1; 6662306a36Sopenharmony_ci } 6762306a36Sopenharmony_ci 6862306a36Sopenharmony_ci pid = fork(); 6962306a36Sopenharmony_ci if (pid == -1) { 7062306a36Sopenharmony_ci return 1; 7162306a36Sopenharmony_ci } 7262306a36Sopenharmony_ci 7362306a36Sopenharmony_ci if (pid == 0) { 7462306a36Sopenharmony_ci if (unshare(CLONE_NEWIPC) == -1) { 7562306a36Sopenharmony_ci return 1; 7662306a36Sopenharmony_ci } 7762306a36Sopenharmony_ci 7862306a36Sopenharmony_ci if (write(fd[1], &_, 1) != 1) { 7962306a36Sopenharmony_ci return 1; 8062306a36Sopenharmony_ci } 8162306a36Sopenharmony_ci 8262306a36Sopenharmony_ci pause(); 8362306a36Sopenharmony_ci 8462306a36Sopenharmony_ci return 0; 8562306a36Sopenharmony_ci } 8662306a36Sopenharmony_ci 8762306a36Sopenharmony_ci if (read(fd[0], &_, 1) != 1) { 8862306a36Sopenharmony_ci return 1; 8962306a36Sopenharmony_ci } 9062306a36Sopenharmony_ci 9162306a36Sopenharmony_ci { 9262306a36Sopenharmony_ci char buf[64]; 9362306a36Sopenharmony_ci snprintf(buf, sizeof(buf), "/proc/%u/ns/ipc", pid); 9462306a36Sopenharmony_ci nsfd = open(buf, O_RDONLY); 9562306a36Sopenharmony_ci if (nsfd == -1) { 9662306a36Sopenharmony_ci return 1; 9762306a36Sopenharmony_ci } 9862306a36Sopenharmony_ci } 9962306a36Sopenharmony_ci 10062306a36Sopenharmony_ci /* Reliably pin dentry into dcache. */ 10162306a36Sopenharmony_ci (void)open("/proc/sysvipc/shm", O_RDONLY); 10262306a36Sopenharmony_ci 10362306a36Sopenharmony_ci if (setns(nsfd, CLONE_NEWIPC) == -1) { 10462306a36Sopenharmony_ci return 1; 10562306a36Sopenharmony_ci } 10662306a36Sopenharmony_ci 10762306a36Sopenharmony_ci kill(pid, SIGTERM); 10862306a36Sopenharmony_ci pid = 0; 10962306a36Sopenharmony_ci 11062306a36Sopenharmony_ci { 11162306a36Sopenharmony_ci char buf[4096]; 11262306a36Sopenharmony_ci ssize_t rv; 11362306a36Sopenharmony_ci int fd; 11462306a36Sopenharmony_ci 11562306a36Sopenharmony_ci fd = open("/proc/sysvipc/shm", O_RDONLY); 11662306a36Sopenharmony_ci if (fd == -1) { 11762306a36Sopenharmony_ci return 1; 11862306a36Sopenharmony_ci } 11962306a36Sopenharmony_ci 12062306a36Sopenharmony_ci#define S32 " key shmid perms size cpid lpid nattch uid gid cuid cgid atime dtime ctime rss swap\n" 12162306a36Sopenharmony_ci#define S64 " key shmid perms size cpid lpid nattch uid gid cuid cgid atime dtime ctime rss swap\n" 12262306a36Sopenharmony_ci rv = read(fd, buf, sizeof(buf)); 12362306a36Sopenharmony_ci if (rv == strlen(S32)) { 12462306a36Sopenharmony_ci assert(memcmp(buf, S32, strlen(S32)) == 0); 12562306a36Sopenharmony_ci } else if (rv == strlen(S64)) { 12662306a36Sopenharmony_ci assert(memcmp(buf, S64, strlen(S64)) == 0); 12762306a36Sopenharmony_ci } else { 12862306a36Sopenharmony_ci assert(0); 12962306a36Sopenharmony_ci } 13062306a36Sopenharmony_ci } 13162306a36Sopenharmony_ci 13262306a36Sopenharmony_ci return 0; 13362306a36Sopenharmony_ci} 134