blob: 0106621816a878c6988bc93e3f5e340f4c545a8f [file] [log] [blame]
/*
*
* Copyright (c) International Business Machines Corp., 2001
* 07/2001 Ported by Wayne Boyer
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
* the GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software Foundation,
* Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
*/
/*
* Test Description :
* Verify that,
* 1) readlink(2) returns -1 and sets errno to EACCES if search/write
* permission is denied in the directory where the symbolic link
* resides.
* 2) readlink(2) returns -1 and sets errno to EINVAL if the buffer size
* is not positive.
* 3) readlink(2) returns -1 and sets errno to EINVAL if the specified
* file is not a symbolic link file.
* 4) readlink(2) returns -1 and sets errno to ENAMETOOLONG if the
* pathname component of symbolic link is too long (ie, > PATH_MAX).
* 5) readlink(2) returns -1 and sets errno to ENOENT if the component of
* symbolic link points to an empty string.
* 6) readlink(2) returns -1 and sets errno to ENOTDIR if a component of
* the path prefix is not a directory.
* 7) readlink(2) returns -1 and sets errno to ELOOP if too many symbolic
* links were encountered in translating the pathname.
*/
#include <stdio.h>
#include <sys/types.h>
#include <fcntl.h>
#include <errno.h>
#include <string.h>
#include <signal.h>
#include <sys/stat.h>
#include <pwd.h>
#include "test.h"
#include "safe_macros.h"
#define MODE_RWX (S_IRWXU | S_IRWXG | S_IRWXO)
#define FILE_MODE (S_IRUSR | S_IRGRP | S_IROTH)
#define DIR_TEMP "testdir_1"
#define TEST_FILE1 "testdir_1/tfile_1"
#define SYM_FILE1 "testdir_1/sfile_1"
#define TEST_FILE2 "tfile_2"
#define SYM_FILE2 "sfile_2"
#define TEST_FILE3 "tfile_3"
#define SYM_FILE3 "tfile_3/sfile_3"
#define ELOOPFILE "/test_eloop"
#define MAX_SIZE 256
static char longpathname[PATH_MAX + 2];
static char elooppathname[sizeof(ELOOPFILE) * 43] = ".";
static struct test_case_t {
char *link;
size_t buf_size;
int exp_errno;
} test_cases[] = {
{SYM_FILE1, 1, EACCES},
/* Don't test with bufsize -1, since this cause a fortify-check-fail when
using glibc and -D_FORITY_SOURCE=2
Discussion: http://lkml.org/lkml/2008/10/23/229
Conclusion: Only test with 0 as non-positive bufsize.
{ SYM_FILE2, -1, EINVAL, NULL },
*/
{SYM_FILE2, 0, EINVAL},
{TEST_FILE2, 1, EINVAL},
{longpathname, 1, ENAMETOOLONG},
{"", 1, ENOENT},
{SYM_FILE3, 1, ENOTDIR},
{elooppathname, 1, ELOOP},
};
static void setup(void);
static void readlink_verify(struct test_case_t *);
static void cleanup(void);
char *TCID = "readlink03";
int TST_TOTAL = ARRAY_SIZE(test_cases);
int main(int ac, char **av)
{
int i, lc;
tst_parse_opts(ac, av, NULL, NULL);
setup();
for (lc = 0; TEST_LOOPING(lc); lc++) {
tst_count = 0;
for (i = 0; i < TST_TOTAL; i++)
readlink_verify(&test_cases[i]);
}
cleanup();
tst_exit();
}
void setup(void)
{
struct passwd *ltpuser;
int i;
tst_require_root();
tst_sig(NOFORK, DEF_HANDLER, cleanup);
ltpuser = SAFE_GETPWNAM(cleanup, "nobody");
SAFE_SETEUID(cleanup, ltpuser->pw_uid);
TEST_PAUSE;
tst_tmpdir();
SAFE_MKDIR(cleanup, DIR_TEMP, MODE_RWX);
SAFE_TOUCH(cleanup, TEST_FILE1, 0666, NULL);
SAFE_SYMLINK(cleanup, TEST_FILE1, SYM_FILE1);
SAFE_CHMOD(cleanup, DIR_TEMP, FILE_MODE);
SAFE_TOUCH(cleanup, TEST_FILE2, 0666, NULL);
SAFE_SYMLINK(cleanup, TEST_FILE2, SYM_FILE2);
memset(longpathname, 'a', PATH_MAX + 1);
SAFE_TOUCH(cleanup, TEST_FILE3, 0666, NULL);
/*
* NOTE: the ELOOP test is written based on that the consecutive
* symlinks limit in kernel is hardwired to 40.
*/
SAFE_MKDIR(cleanup, "test_eloop", MODE_RWX);
SAFE_SYMLINK(cleanup, "../test_eloop", "test_eloop/test_eloop");
for (i = 0; i < 43; i++)
strcat(elooppathname, ELOOPFILE);
}
void readlink_verify(struct test_case_t *tc)
{
char buffer[MAX_SIZE];
if (tc->buf_size == 1)
tc->buf_size = sizeof(buffer);
TEST(readlink(tc->link, buffer, tc->buf_size));
if (TEST_RETURN != -1) {
tst_resm(TFAIL, "readlink() returned %ld, "
"expected -1, errno:%d", TEST_RETURN,
tc->exp_errno);
return;
}
if (TEST_ERRNO == tc->exp_errno) {
tst_resm(TPASS | TTERRNO, "readlink() failed as expected");
} else {
tst_resm(TFAIL | TTERRNO,
"readlink() failed unexpectedly; expected: %d - %s",
tc->exp_errno, strerror(tc->exp_errno));
if (tc->exp_errno == ENOENT && TEST_ERRNO == EINVAL) {
tst_resm(TWARN | TTERRNO,
"It may be a Kernel Bug, see the patch:"
"http://git.kernel.org/linus/1fa1e7f6");
}
}
}
void cleanup(void)
{
if (seteuid(0) == -1)
tst_resm(TWARN | TERRNO, "seteuid(0) failed");
tst_rmdir();
}