t_link.c revision 272343
11573Srgrimes/* $NetBSD: t_link.c,v 1.2 2014/04/21 14:39:36 martin Exp $ */ 230624Sbde 31573Srgrimes/*- 41573Srgrimes * Copyright (c) 2011 The NetBSD Foundation, Inc. 525401Sjb * All rights reserved. 61573Srgrimes * 71573Srgrimes * This code is derived from software contributed to The NetBSD Foundation 88060Sbde * by Jukka Ruohonen. 91573Srgrimes * 1025401Sjb * Redistribution and use in source and binary forms, with or without 1130447Sbde * modification, are permitted provided that the following conditions 1230624Sbde * are met: 131573Srgrimes * 1. Redistributions of source code must retain the above copyright 1430624Sbde * notice, this list of conditions and the following disclaimer. 151849Swollman * 2. Redistributions in binary form must reproduce the above copyright 1625401Sjb * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 19 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 20 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 21 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 22 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 23 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 24 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 25 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 26 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 27 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 28 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 29 * POSSIBILITY OF SUCH DAMAGE. 30 */ 31#include <sys/cdefs.h> 32__RCSID("$NetBSD: t_link.c,v 1.2 2014/04/21 14:39:36 martin Exp $"); 33 34#include <sys/param.h> 35#include <sys/stat.h> 36 37#include <atf-c.h> 38#include <errno.h> 39#include <fcntl.h> 40#include <stdio.h> 41#include <string.h> 42#include <unistd.h> 43 44static const char *getpath(void); 45static char path[] = "link"; 46static const char *pathl; 47 48static const char * 49getpath(void) 50{ 51 static char buf[LINE_MAX]; 52 53 (void)memset(buf, '\0', sizeof(buf)); 54 55 if (getcwd(buf, sizeof(buf)) == NULL) 56 return NULL; 57 58 (void)strlcat(buf, path, sizeof(buf)); 59 (void)strlcat(buf, ".link", sizeof(buf)); 60 61 return buf; 62} 63 64ATF_TC_WITH_CLEANUP(link_count); 65ATF_TC_HEAD(link_count, tc) 66{ 67 atf_tc_set_md_var(tc, "descr", "link(2) counts are incremented?"); 68} 69 70ATF_TC_BODY(link_count, tc) 71{ 72 struct stat sa, sb; 73 int fd; 74 75 (void)memset(&sa, 0, sizeof(struct stat)); 76 (void)memset(&sb, 0, sizeof(struct stat)); 77 78 pathl = getpath(); 79 fd = open(path, O_RDWR | O_CREAT, 0600); 80 81 ATF_REQUIRE(fd >= 0); 82 ATF_REQUIRE(pathl != NULL); 83 84 ATF_REQUIRE(stat(path, &sa) == 0); 85 ATF_REQUIRE(link(path, pathl) == 0); 86 ATF_REQUIRE(stat(path, &sb) == 0); 87 88 if (sa.st_nlink != sb.st_nlink - 1) 89 atf_tc_fail("incorrect link(2) count"); 90 91 ATF_REQUIRE(close(fd) == 0); 92 ATF_REQUIRE(unlink(path) == 0); 93 ATF_REQUIRE(unlink(pathl) == 0); 94} 95 96ATF_TC_CLEANUP(link_count, tc) 97{ 98 (void)unlink(path); 99 (void)unlink(pathl); 100} 101 102ATF_TC_WITH_CLEANUP(link_err); 103ATF_TC_HEAD(link_err, tc) 104{ 105 atf_tc_set_md_var(tc, "descr", "Test error conditions of link(2)"); 106} 107 108ATF_TC_BODY(link_err, tc) 109{ 110 char buf[MAXPATHLEN + 1]; 111 int fd; 112 113 (void)memset(buf, 'x', sizeof(buf)); 114 115 pathl = getpath(); 116 fd = open(path, O_RDWR | O_CREAT, 0600); 117 118 ATF_REQUIRE(fd >= 0); 119 ATF_REQUIRE(pathl != NULL); 120 121 errno = 0; 122 ATF_REQUIRE(link(path, pathl) == 0); 123 ATF_REQUIRE_ERRNO(EEXIST, link(path, pathl) == -1); 124 125 errno = 0; 126 ATF_REQUIRE_ERRNO(ENAMETOOLONG, link(buf, "xxx") == -1); 127 128 errno = 0; 129 ATF_REQUIRE_ERRNO(ENOENT, link(path, "/d/c/b/a") == -1); 130 131 errno = 0; 132 ATF_REQUIRE_ERRNO(ENOENT, link("/a/b/c/d", path) == -1); 133 134 errno = 0; 135 ATF_REQUIRE_ERRNO(ENOENT, link("/a/b/c/d", "/d/c/b/a") == -1); 136 137 errno = 0; 138 ATF_REQUIRE_ERRNO(EFAULT, link(path, (const char *)-1) == -1); 139 140 errno = 0; 141 ATF_REQUIRE_ERRNO(EFAULT, link((const char *)-1, "xxx") == -1); 142 143 ATF_REQUIRE(close(fd) == 0); 144 ATF_REQUIRE(unlink(path) == 0); 145 ATF_REQUIRE(unlink(pathl) == 0); 146} 147 148ATF_TC_CLEANUP(link_err, tc) 149{ 150 (void)unlink(path); 151 (void)unlink(pathl); 152} 153 154ATF_TC(link_perm); 155ATF_TC_HEAD(link_perm, tc) 156{ 157 atf_tc_set_md_var(tc, "descr", "Test permissions with link(2)"); 158 atf_tc_set_md_var(tc, "require.user", "unprivileged"); 159} 160 161ATF_TC_BODY(link_perm, tc) 162{ 163 int rv; 164 165 errno = 0; 166 rv = link("/root", "/root.link"); 167 ATF_REQUIRE_MSG(rv == -1 && (errno == EACCES || errno == EPERM), 168 "link to a directory did not fail with EPERM or EACCESS; link() " 169 "returned %d, errno %d", rv, errno); 170 171 errno = 0; 172 ATF_REQUIRE_ERRNO(EACCES, 173 link("/root/.profile", "/root/.profile.link") == -1); 174} 175 176ATF_TC_WITH_CLEANUP(link_stat); 177ATF_TC_HEAD(link_stat, tc) 178{ 179 atf_tc_set_md_var(tc, "descr", "Check stat(2) of a linked file"); 180} 181 182ATF_TC_BODY(link_stat, tc) 183{ 184 struct stat sa, sb; 185 int fd; 186 187 (void)memset(&sa, 0, sizeof(struct stat)); 188 (void)memset(&sb, 0, sizeof(struct stat)); 189 190 pathl = getpath(); 191 fd = open(path, O_RDWR | O_CREAT, 0600); 192 193 ATF_REQUIRE(fd >= 0); 194 ATF_REQUIRE(pathl != NULL); 195 196 ATF_REQUIRE(link(path, pathl) == 0); 197 ATF_REQUIRE(stat(path, &sa) == 0); 198 ATF_REQUIRE(lstat(pathl, &sb) == 0); 199 200 if (sa.st_uid != sb.st_uid) 201 atf_tc_fail("unequal UIDs"); 202 203 if (sa.st_mode != sb.st_mode) 204 atf_tc_fail("unequal modes"); 205 206 if (sa.st_ino != sb.st_ino) 207 atf_tc_fail("unequal inodes"); 208 209 ATF_REQUIRE(close(fd) == 0); 210 ATF_REQUIRE(unlink(path) == 0); 211 ATF_REQUIRE(unlink(pathl) == 0); 212} 213 214ATF_TC_CLEANUP(link_stat, tc) 215{ 216 (void)unlink(path); 217 (void)unlink(pathl); 218} 219 220ATF_TP_ADD_TCS(tp) 221{ 222 223 ATF_TP_ADD_TC(tp, link_count); 224 ATF_TP_ADD_TC(tp, link_err); 225 ATF_TP_ADD_TC(tp, link_perm); 226 ATF_TP_ADD_TC(tp, link_stat); 227 228 return atf_no_error(); 229} 230