t_link.c revision 272343
11573Srgrimes/* $NetBSD: t_link.c,v 1.2 2014/04/21 14:39:36 martin Exp $ */
230624Sbde
31573Srgrimes/*-
41573Srgrimes * Copyright (c) 2011 The NetBSD Foundation, Inc.
525401Sjb * All rights reserved.
61573Srgrimes *
71573Srgrimes * This code is derived from software contributed to The NetBSD Foundation
88060Sbde * by Jukka Ruohonen.
91573Srgrimes *
1025401Sjb * Redistribution and use in source and binary forms, with or without
1130447Sbde * modification, are permitted provided that the following conditions
1230624Sbde * are met:
131573Srgrimes * 1. Redistributions of source code must retain the above copyright
1430624Sbde *    notice, this list of conditions and the following disclaimer.
151849Swollman * 2. Redistributions in binary form must reproduce the above copyright
1625401Sjb *    notice, this list of conditions and the following disclaimer in the
17 *    documentation and/or other materials provided with the distribution.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 * POSSIBILITY OF SUCH DAMAGE.
30 */
31#include <sys/cdefs.h>
32__RCSID("$NetBSD: t_link.c,v 1.2 2014/04/21 14:39:36 martin Exp $");
33
34#include <sys/param.h>
35#include <sys/stat.h>
36
37#include <atf-c.h>
38#include <errno.h>
39#include <fcntl.h>
40#include <stdio.h>
41#include <string.h>
42#include <unistd.h>
43
44static const char	*getpath(void);
45static char		 path[] = "link";
46static const char	*pathl;
47
48static const char *
49getpath(void)
50{
51	static char buf[LINE_MAX];
52
53	(void)memset(buf, '\0', sizeof(buf));
54
55	if (getcwd(buf, sizeof(buf)) == NULL)
56		return NULL;
57
58	(void)strlcat(buf, path, sizeof(buf));
59	(void)strlcat(buf, ".link", sizeof(buf));
60
61	return buf;
62}
63
64ATF_TC_WITH_CLEANUP(link_count);
65ATF_TC_HEAD(link_count, tc)
66{
67	atf_tc_set_md_var(tc, "descr", "link(2) counts are incremented?");
68}
69
70ATF_TC_BODY(link_count, tc)
71{
72	struct stat sa, sb;
73	int fd;
74
75	(void)memset(&sa, 0, sizeof(struct stat));
76	(void)memset(&sb, 0, sizeof(struct stat));
77
78	pathl = getpath();
79	fd = open(path, O_RDWR | O_CREAT, 0600);
80
81	ATF_REQUIRE(fd >= 0);
82	ATF_REQUIRE(pathl != NULL);
83
84	ATF_REQUIRE(stat(path, &sa) == 0);
85	ATF_REQUIRE(link(path, pathl) == 0);
86	ATF_REQUIRE(stat(path, &sb) == 0);
87
88	if (sa.st_nlink != sb.st_nlink - 1)
89		atf_tc_fail("incorrect link(2) count");
90
91	ATF_REQUIRE(close(fd) == 0);
92	ATF_REQUIRE(unlink(path) == 0);
93	ATF_REQUIRE(unlink(pathl) == 0);
94}
95
96ATF_TC_CLEANUP(link_count, tc)
97{
98	(void)unlink(path);
99	(void)unlink(pathl);
100}
101
102ATF_TC_WITH_CLEANUP(link_err);
103ATF_TC_HEAD(link_err, tc)
104{
105	atf_tc_set_md_var(tc, "descr", "Test error conditions of link(2)");
106}
107
108ATF_TC_BODY(link_err, tc)
109{
110	char buf[MAXPATHLEN + 1];
111	int fd;
112
113	(void)memset(buf, 'x', sizeof(buf));
114
115	pathl = getpath();
116	fd = open(path, O_RDWR | O_CREAT, 0600);
117
118	ATF_REQUIRE(fd >= 0);
119	ATF_REQUIRE(pathl != NULL);
120
121	errno = 0;
122	ATF_REQUIRE(link(path, pathl) == 0);
123	ATF_REQUIRE_ERRNO(EEXIST, link(path, pathl) == -1);
124
125	errno = 0;
126	ATF_REQUIRE_ERRNO(ENAMETOOLONG, link(buf, "xxx") == -1);
127
128	errno = 0;
129	ATF_REQUIRE_ERRNO(ENOENT, link(path, "/d/c/b/a") == -1);
130
131	errno = 0;
132	ATF_REQUIRE_ERRNO(ENOENT, link("/a/b/c/d", path) == -1);
133
134	errno = 0;
135	ATF_REQUIRE_ERRNO(ENOENT, link("/a/b/c/d", "/d/c/b/a") == -1);
136
137	errno = 0;
138	ATF_REQUIRE_ERRNO(EFAULT, link(path, (const char *)-1) == -1);
139
140	errno = 0;
141	ATF_REQUIRE_ERRNO(EFAULT, link((const char *)-1, "xxx") == -1);
142
143	ATF_REQUIRE(close(fd) == 0);
144	ATF_REQUIRE(unlink(path) == 0);
145	ATF_REQUIRE(unlink(pathl) == 0);
146}
147
148ATF_TC_CLEANUP(link_err, tc)
149{
150	(void)unlink(path);
151	(void)unlink(pathl);
152}
153
154ATF_TC(link_perm);
155ATF_TC_HEAD(link_perm, tc)
156{
157	atf_tc_set_md_var(tc, "descr", "Test permissions with link(2)");
158	atf_tc_set_md_var(tc, "require.user", "unprivileged");
159}
160
161ATF_TC_BODY(link_perm, tc)
162{
163	int rv;
164
165	errno = 0;
166	rv = link("/root", "/root.link");
167	ATF_REQUIRE_MSG(rv == -1 && (errno == EACCES || errno == EPERM),
168	    "link to a directory did not fail with EPERM or EACCESS; link() "
169	    "returned %d, errno %d", rv, errno);
170
171	errno = 0;
172	ATF_REQUIRE_ERRNO(EACCES,
173	    link("/root/.profile", "/root/.profile.link") == -1);
174}
175
176ATF_TC_WITH_CLEANUP(link_stat);
177ATF_TC_HEAD(link_stat, tc)
178{
179	atf_tc_set_md_var(tc, "descr", "Check stat(2) of a linked file");
180}
181
182ATF_TC_BODY(link_stat, tc)
183{
184	struct stat sa, sb;
185	int fd;
186
187	(void)memset(&sa, 0, sizeof(struct stat));
188	(void)memset(&sb, 0, sizeof(struct stat));
189
190	pathl = getpath();
191	fd = open(path, O_RDWR | O_CREAT, 0600);
192
193	ATF_REQUIRE(fd >= 0);
194	ATF_REQUIRE(pathl != NULL);
195
196	ATF_REQUIRE(link(path, pathl) == 0);
197	ATF_REQUIRE(stat(path, &sa) == 0);
198	ATF_REQUIRE(lstat(pathl, &sb) == 0);
199
200	if (sa.st_uid != sb.st_uid)
201		atf_tc_fail("unequal UIDs");
202
203	if (sa.st_mode != sb.st_mode)
204		atf_tc_fail("unequal modes");
205
206	if (sa.st_ino != sb.st_ino)
207		atf_tc_fail("unequal inodes");
208
209	ATF_REQUIRE(close(fd) == 0);
210	ATF_REQUIRE(unlink(path) == 0);
211	ATF_REQUIRE(unlink(pathl) == 0);
212}
213
214ATF_TC_CLEANUP(link_stat, tc)
215{
216	(void)unlink(path);
217	(void)unlink(pathl);
218}
219
220ATF_TP_ADD_TCS(tp)
221{
222
223	ATF_TP_ADD_TC(tp, link_count);
224	ATF_TP_ADD_TC(tp, link_err);
225	ATF_TP_ADD_TC(tp, link_perm);
226	ATF_TP_ADD_TC(tp, link_stat);
227
228	return atf_no_error();
229}
230