| /* |
| * Copyright (c) International Business Machines Corp., 2001 |
| * 07/2001 Ported by Wayne Boyer |
| * |
| * This program is free software; you can redistribute it and/or modify |
| * it under the terms of the GNU General Public License as published by |
| * the Free Software Foundation; either version 2 of the License, or |
| * (at your option) any later version. |
| * |
| * This program is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| * the GNU General Public License for more details. |
| * |
| * You should have received a copy of the GNU General Public License |
| * along with this program; if not, write to the Free Software Foundation, |
| * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA |
| */ |
| /* |
| * Test Description: |
| * Verify that, |
| * 1) lstat(2) returns -1 and sets errno to EACCES if search permission is |
| * denied on a component of the path prefix. |
| * 2) lstat(2) returns -1 and sets errno to ENOENT if the specified file |
| * does not exists or empty string. |
| * 3) lstat(2) returns -1 and sets errno to EFAULT if pathname points |
| * outside user's accessible address space. |
| * 4) lstat(2) returns -1 and sets errno to ENAMETOOLONG if the pathname |
| * component is too long. |
| * 5) lstat(2) returns -1 and sets errno to ENOTDIR if the directory |
| * component in pathname is not a directory. |
| * 6) lstat(2) returns -1 and sets errno to ELOOP if the pathname has too |
| * many symbolic links encountered while traversing. |
| */ |
| |
| #include <stdio.h> |
| #include <stdlib.h> |
| #include <unistd.h> |
| #include <fcntl.h> |
| #include <errno.h> |
| #include <string.h> |
| #include <signal.h> |
| #include <sys/types.h> |
| #include <sys/stat.h> |
| #include <sys/mman.h> |
| #include <pwd.h> |
| |
| #include "test.h" |
| #include "safe_macros.h" |
| |
| #define MODE_RWX S_IRWXU | S_IRWXG | S_IRWXO |
| #define FILE_MODE S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH |
| #define TEST_DIR "test_dir" |
| #define TEST_EACCES TEST_DIR"/test_eacces" |
| #define TEST_ENOENT "" |
| #define TEST_ENOTDIR "test_file/test_enotdir" |
| #define TEST_ELOOP "/test_eloop" |
| |
| static char longpathname[PATH_MAX + 2]; |
| static char elooppathname[sizeof(TEST_ELOOP) * 43] = "."; |
| |
| static void setup(void); |
| static void lstat_verify(int); |
| static void cleanup(void); |
| static void bad_addr_setup(int); |
| |
| static struct test_case_t { |
| char *pathname; |
| int exp_errno; |
| void (*setup) (); |
| } test_cases[] = { |
| {TEST_EACCES, EACCES, NULL}, |
| {TEST_ENOENT, ENOENT, NULL}, |
| {NULL, EFAULT, bad_addr_setup}, |
| {longpathname, ENAMETOOLONG, NULL}, |
| {TEST_ENOTDIR, ENOTDIR, NULL}, |
| {elooppathname, ELOOP, NULL}, |
| }; |
| |
| char *TCID = "lstat02"; |
| int TST_TOTAL = ARRAY_SIZE(test_cases); |
| |
| int main(int ac, char **av) |
| { |
| int lc; |
| int i; |
| |
| tst_parse_opts(ac, av, NULL, NULL); |
| |
| setup(); |
| |
| for (lc = 0; TEST_LOOPING(lc); lc++) { |
| tst_count = 0; |
| for (i = 0; i < TST_TOTAL; i++) |
| lstat_verify(i); |
| } |
| |
| cleanup(); |
| tst_exit(); |
| } |
| |
| static void setup(void) |
| { |
| int i; |
| struct passwd *ltpuser; |
| |
| tst_require_root(); |
| |
| tst_sig(NOFORK, DEF_HANDLER, cleanup); |
| |
| ltpuser = SAFE_GETPWNAM(cleanup, "nobody"); |
| SAFE_SETEUID(cleanup, ltpuser->pw_uid); |
| |
| TEST_PAUSE; |
| |
| tst_tmpdir(); |
| |
| SAFE_MKDIR(cleanup, TEST_DIR, MODE_RWX); |
| SAFE_TOUCH(cleanup, TEST_EACCES, 0666, NULL); |
| SAFE_CHMOD(cleanup, TEST_DIR, FILE_MODE); |
| |
| SAFE_TOUCH(cleanup, "test_file", MODE_RWX, NULL); |
| |
| memset(longpathname, 'a', PATH_MAX+1); |
| |
| SAFE_MKDIR(cleanup, "test_eloop", MODE_RWX); |
| SAFE_SYMLINK(cleanup, "../test_eloop", "test_eloop/test_eloop"); |
| /* |
| * NOTE: the ELOOP test is written based on that the consecutive |
| * symlinks limits in kernel is hardwired to 40. |
| */ |
| for (i = 0; i < 43; i++) |
| strcat(elooppathname, TEST_ELOOP); |
| |
| for (i = 0; i < TST_TOTAL; i++) { |
| if (test_cases[i].setup) |
| test_cases[i].setup(i); |
| } |
| } |
| |
| static void bad_addr_setup(int i) |
| { |
| test_cases[i].pathname = tst_get_bad_addr(cleanup); |
| } |
| |
| static void lstat_verify(int i) |
| { |
| struct stat stat_buf; |
| |
| TEST(lstat(test_cases[i].pathname, &stat_buf)); |
| |
| if (TEST_RETURN != -1) { |
| tst_resm(TFAIL, "lstat() returned %ld, expected -1, errno=%d", |
| TEST_RETURN, test_cases[i].exp_errno); |
| return; |
| } |
| |
| if (TEST_ERRNO == test_cases[i].exp_errno) { |
| tst_resm(TPASS | TTERRNO, "lstat() failed as expected"); |
| } else { |
| tst_resm(TFAIL | TTERRNO, |
| "lstat() failed unexpectedly; expected: %d - %s", |
| test_cases[i].exp_errno, |
| strerror(test_cases[i].exp_errno)); |
| } |
| } |
| |
| static void cleanup(void) |
| { |
| if (seteuid(0)) |
| tst_resm(TINFO | TERRNO, "Failet to seteuid(0) before cleanup"); |
| |
| tst_rmdir(); |
| } |