1313535Sngie/* $NetBSD: t_access.c,v 2.2 2017/01/10 22:36:29 christos Exp $ */ 2272343Sngie 3272343Sngie/*- 4272343Sngie * Copyright (c) 2011 The NetBSD Foundation, Inc. 5272343Sngie * All rights reserved. 6272343Sngie * 7272343Sngie * This code is derived from software contributed to The NetBSD Foundation 8272343Sngie * by Jukka Ruohonen. 9272343Sngie * 10272343Sngie * Redistribution and use in source and binary forms, with or without 11272343Sngie * modification, are permitted provided that the following conditions 12272343Sngie * are met: 13272343Sngie * 1. Redistributions of source code must retain the above copyright 14272343Sngie * notice, this list of conditions and the following disclaimer. 15272343Sngie * 2. Redistributions in binary form must reproduce the above copyright 16272343Sngie * notice, this list of conditions and the following disclaimer in the 17272343Sngie * documentation and/or other materials provided with the distribution. 18272343Sngie * 19272343Sngie * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 20272343Sngie * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 21272343Sngie * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 22272343Sngie * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 23272343Sngie * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 24272343Sngie * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 25272343Sngie * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 26272343Sngie * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 27272343Sngie * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 28272343Sngie * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 29272343Sngie * POSSIBILITY OF SUCH DAMAGE. 30272343Sngie */ 31272343Sngie#include <sys/cdefs.h> 32313535Sngie__RCSID("$NetBSD: t_access.c,v 1.2 2017/01/10 22:36:29 christos Exp $"); 33272343Sngie 34313535Sngie#ifdef __FreeBSD__ 35313535Sngie#include <sys/param.h> /* For __FreeBSD_version */ 36313535Sngie#endif 37313535Sngie 38313535Sngie#include <atf-c.h> 39313535Sngie 40313535Sngie#include <sys/stat.h> 41313535Sngie 42272343Sngie#include <errno.h> 43272343Sngie#include <fcntl.h> 44272343Sngie#include <limits.h> 45272343Sngie#include <stdint.h> 46272343Sngie#include <stdlib.h> 47272343Sngie#include <unistd.h> 48272343Sngie 49272343Sngiestatic const char path[] = "access"; 50272343Sngiestatic const int mode[4] = { R_OK, W_OK, X_OK, F_OK }; 51272343Sngie 52272343SngieATF_TC_WITH_CLEANUP(access_access); 53272343SngieATF_TC_HEAD(access_access, tc) 54272343Sngie{ 55272343Sngie atf_tc_set_md_var(tc, "descr", "Test access(2) for EACCES"); 56272343Sngie atf_tc_set_md_var(tc, "require.user", "unprivileged"); 57272343Sngie} 58272343Sngie 59272343SngieATF_TC_BODY(access_access, tc) 60272343Sngie{ 61272343Sngie const int perm[3] = { 0200, 0400, 0000 }; 62272343Sngie size_t i; 63272343Sngie int fd; 64272343Sngie 65272343Sngie fd = open(path, O_RDONLY | O_CREAT); 66272343Sngie 67272343Sngie if (fd < 0) 68272343Sngie return; 69272343Sngie 70272343Sngie for (i = 0; i < __arraycount(mode) - 1; i++) { 71272343Sngie 72272343Sngie ATF_REQUIRE(fchmod(fd, perm[i]) == 0); 73272343Sngie 74272343Sngie errno = 0; 75272343Sngie 76272343Sngie ATF_REQUIRE(access(path, mode[i]) != 0); 77272343Sngie ATF_REQUIRE(errno == EACCES); 78272343Sngie } 79272343Sngie 80272343Sngie ATF_REQUIRE(close(fd) == 0); 81272343Sngie} 82272343Sngie 83272343SngieATF_TC_CLEANUP(access_access, tc) 84272343Sngie{ 85272343Sngie (void)unlink(path); 86272343Sngie} 87272343Sngie 88272343SngieATF_TC(access_fault); 89272343SngieATF_TC_HEAD(access_fault, tc) 90272343Sngie{ 91272343Sngie atf_tc_set_md_var(tc, "descr", "Test access(2) for EFAULT"); 92272343Sngie} 93272343Sngie 94272343SngieATF_TC_BODY(access_fault, tc) 95272343Sngie{ 96272343Sngie size_t i; 97272343Sngie 98272343Sngie for (i = 0; i < __arraycount(mode); i++) { 99272343Sngie 100272343Sngie errno = 0; 101272343Sngie 102272343Sngie ATF_REQUIRE(access(NULL, mode[i]) != 0); 103272343Sngie ATF_REQUIRE(errno == EFAULT); 104272343Sngie 105272343Sngie errno = 0; 106272343Sngie 107272343Sngie ATF_REQUIRE(access((char *)-1, mode[i]) != 0); 108272343Sngie ATF_REQUIRE(errno == EFAULT); 109272343Sngie } 110272343Sngie} 111272343Sngie 112272343SngieATF_TC(access_inval); 113272343SngieATF_TC_HEAD(access_inval, tc) 114272343Sngie{ 115272343Sngie atf_tc_set_md_var(tc, "descr", "Test access(2) for EINVAL"); 116272343Sngie} 117272343Sngie 118272343SngieATF_TC_BODY(access_inval, tc) 119272343Sngie{ 120272343Sngie 121276478Sngie#if defined(__FreeBSD__) && __FreeBSD_version < 1100033 122276478Sngie atf_tc_expect_fail("arguments to access aren't validated; see " 123276478Sngie "bug # 181155 for more details"); 124276478Sngie#endif 125272343Sngie errno = 0; 126272343Sngie 127272343Sngie ATF_REQUIRE(access("/usr", -1) != 0); 128272343Sngie ATF_REQUIRE(errno == EINVAL); 129272343Sngie} 130272343Sngie 131272343SngieATF_TC(access_notdir); 132272343SngieATF_TC_HEAD(access_notdir, tc) 133272343Sngie{ 134272343Sngie atf_tc_set_md_var(tc, "descr", "Test access(2) for ENOTDIR"); 135272343Sngie} 136272343Sngie 137272343SngieATF_TC_BODY(access_notdir, tc) 138272343Sngie{ 139272343Sngie size_t i; 140272343Sngie 141272343Sngie for (i = 0; i < __arraycount(mode); i++) { 142272343Sngie 143272343Sngie errno = 0; 144272343Sngie 145272343Sngie /* 146272343Sngie * IEEE Std 1003.1-2008 about ENOTDIR: 147272343Sngie * 148272343Sngie * "A component of the path prefix is not a directory, 149272343Sngie * or the path argument contains at least one non-<slash> 150272343Sngie * character and ends with one or more trailing <slash> 151272343Sngie * characters and the last pathname component names an 152272343Sngie * existing file that is neither a directory nor a symbolic 153272343Sngie * link to a directory." 154272343Sngie */ 155272343Sngie ATF_REQUIRE(access("/etc/passwd//", mode[i]) != 0); 156272343Sngie ATF_REQUIRE(errno == ENOTDIR); 157272343Sngie } 158272343Sngie} 159272343Sngie 160272343SngieATF_TC(access_notexist); 161272343SngieATF_TC_HEAD(access_notexist, tc) 162272343Sngie{ 163272343Sngie atf_tc_set_md_var(tc, "descr", "Test access(2) for ENOENT"); 164272343Sngie} 165272343Sngie 166272343SngieATF_TC_BODY(access_notexist, tc) 167272343Sngie{ 168272343Sngie size_t i; 169272343Sngie 170272343Sngie for (i = 0; i < __arraycount(mode); i++) { 171272343Sngie 172272343Sngie errno = 0; 173272343Sngie 174272343Sngie ATF_REQUIRE(access("", mode[i]) != 0); 175272343Sngie ATF_REQUIRE(errno == ENOENT); 176272343Sngie } 177272343Sngie} 178272343Sngie 179272343SngieATF_TC(access_toolong); 180272343SngieATF_TC_HEAD(access_toolong, tc) 181272343Sngie{ 182272343Sngie atf_tc_set_md_var(tc, "descr", "Test access(2) for ENAMETOOLONG"); 183272343Sngie} 184272343Sngie 185272343SngieATF_TC_BODY(access_toolong, tc) 186272343Sngie{ 187272343Sngie char *buf; 188272343Sngie size_t i; 189272343Sngie 190272343Sngie buf = malloc(PATH_MAX); 191272343Sngie 192272343Sngie if (buf == NULL) 193272343Sngie return; 194272343Sngie 195272343Sngie for (i = 0; i < PATH_MAX; i++) 196272343Sngie buf[i] = 'x'; 197272343Sngie 198272343Sngie for (i = 0; i < __arraycount(mode); i++) { 199272343Sngie 200272343Sngie errno = 0; 201272343Sngie 202272343Sngie ATF_REQUIRE(access(buf, mode[i]) != 0); 203272343Sngie ATF_REQUIRE(errno == ENAMETOOLONG); 204272343Sngie } 205272343Sngie 206272343Sngie free(buf); 207272343Sngie} 208272343Sngie 209272343SngieATF_TP_ADD_TCS(tp) 210272343Sngie{ 211272343Sngie 212272343Sngie ATF_TP_ADD_TC(tp, access_access); 213272343Sngie ATF_TP_ADD_TC(tp, access_fault); 214272343Sngie ATF_TP_ADD_TC(tp, access_inval); 215272343Sngie ATF_TP_ADD_TC(tp, access_notdir); 216272343Sngie ATF_TP_ADD_TC(tp, access_notexist); 217272343Sngie ATF_TP_ADD_TC(tp, access_toolong); 218272343Sngie 219272343Sngie return atf_no_error(); 220272343Sngie} 221