1 1.3 martin /* $NetBSD: t_access.c,v 1.3 2019/07/16 17:29:18 martin Exp $ */ 2 1.1 jruoho 3 1.1 jruoho /*- 4 1.1 jruoho * Copyright (c) 2011 The NetBSD Foundation, Inc. 5 1.1 jruoho * All rights reserved. 6 1.1 jruoho * 7 1.1 jruoho * This code is derived from software contributed to The NetBSD Foundation 8 1.1 jruoho * by Jukka Ruohonen. 9 1.1 jruoho * 10 1.1 jruoho * Redistribution and use in source and binary forms, with or without 11 1.1 jruoho * modification, are permitted provided that the following conditions 12 1.1 jruoho * are met: 13 1.1 jruoho * 1. Redistributions of source code must retain the above copyright 14 1.1 jruoho * notice, this list of conditions and the following disclaimer. 15 1.1 jruoho * 2. Redistributions in binary form must reproduce the above copyright 16 1.1 jruoho * notice, this list of conditions and the following disclaimer in the 17 1.1 jruoho * documentation and/or other materials provided with the distribution. 18 1.1 jruoho * 19 1.1 jruoho * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 20 1.1 jruoho * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 21 1.1 jruoho * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 22 1.1 jruoho * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 23 1.1 jruoho * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 24 1.1 jruoho * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 25 1.1 jruoho * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 26 1.1 jruoho * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 27 1.1 jruoho * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 28 1.1 jruoho * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 29 1.1 jruoho * POSSIBILITY OF SUCH DAMAGE. 30 1.1 jruoho */ 31 1.1 jruoho #include <sys/cdefs.h> 32 1.3 martin __RCSID("$NetBSD: t_access.c,v 1.3 2019/07/16 17:29:18 martin Exp $"); 33 1.2 christos 34 1.2 christos #include <atf-c.h> 35 1.2 christos 36 1.2 christos #include <sys/stat.h> 37 1.1 jruoho 38 1.1 jruoho #include <errno.h> 39 1.1 jruoho #include <fcntl.h> 40 1.1 jruoho #include <limits.h> 41 1.1 jruoho #include <stdint.h> 42 1.1 jruoho #include <stdlib.h> 43 1.1 jruoho #include <unistd.h> 44 1.1 jruoho 45 1.1 jruoho static const char path[] = "access"; 46 1.1 jruoho static const int mode[4] = { R_OK, W_OK, X_OK, F_OK }; 47 1.1 jruoho 48 1.1 jruoho ATF_TC_WITH_CLEANUP(access_access); 49 1.1 jruoho ATF_TC_HEAD(access_access, tc) 50 1.1 jruoho { 51 1.1 jruoho atf_tc_set_md_var(tc, "descr", "Test access(2) for EACCES"); 52 1.1 jruoho atf_tc_set_md_var(tc, "require.user", "unprivileged"); 53 1.1 jruoho } 54 1.1 jruoho 55 1.1 jruoho ATF_TC_BODY(access_access, tc) 56 1.1 jruoho { 57 1.1 jruoho const int perm[3] = { 0200, 0400, 0000 }; 58 1.1 jruoho size_t i; 59 1.1 jruoho int fd; 60 1.1 jruoho 61 1.3 martin fd = open(path, O_RDONLY | O_CREAT, 0600); 62 1.1 jruoho 63 1.1 jruoho if (fd < 0) 64 1.1 jruoho return; 65 1.1 jruoho 66 1.1 jruoho for (i = 0; i < __arraycount(mode) - 1; i++) { 67 1.1 jruoho 68 1.1 jruoho ATF_REQUIRE(fchmod(fd, perm[i]) == 0); 69 1.1 jruoho 70 1.1 jruoho errno = 0; 71 1.1 jruoho 72 1.1 jruoho ATF_REQUIRE(access(path, mode[i]) != 0); 73 1.1 jruoho ATF_REQUIRE(errno == EACCES); 74 1.1 jruoho } 75 1.1 jruoho 76 1.1 jruoho ATF_REQUIRE(close(fd) == 0); 77 1.1 jruoho } 78 1.1 jruoho 79 1.1 jruoho ATF_TC_CLEANUP(access_access, tc) 80 1.1 jruoho { 81 1.1 jruoho (void)unlink(path); 82 1.1 jruoho } 83 1.1 jruoho 84 1.1 jruoho ATF_TC(access_fault); 85 1.1 jruoho ATF_TC_HEAD(access_fault, tc) 86 1.1 jruoho { 87 1.1 jruoho atf_tc_set_md_var(tc, "descr", "Test access(2) for EFAULT"); 88 1.1 jruoho } 89 1.1 jruoho 90 1.1 jruoho ATF_TC_BODY(access_fault, tc) 91 1.1 jruoho { 92 1.1 jruoho size_t i; 93 1.1 jruoho 94 1.1 jruoho for (i = 0; i < __arraycount(mode); i++) { 95 1.1 jruoho 96 1.1 jruoho errno = 0; 97 1.1 jruoho 98 1.1 jruoho ATF_REQUIRE(access(NULL, mode[i]) != 0); 99 1.1 jruoho ATF_REQUIRE(errno == EFAULT); 100 1.1 jruoho 101 1.1 jruoho errno = 0; 102 1.1 jruoho 103 1.1 jruoho ATF_REQUIRE(access((char *)-1, mode[i]) != 0); 104 1.1 jruoho ATF_REQUIRE(errno == EFAULT); 105 1.1 jruoho } 106 1.1 jruoho } 107 1.1 jruoho 108 1.1 jruoho ATF_TC(access_inval); 109 1.1 jruoho ATF_TC_HEAD(access_inval, tc) 110 1.1 jruoho { 111 1.1 jruoho atf_tc_set_md_var(tc, "descr", "Test access(2) for EINVAL"); 112 1.1 jruoho } 113 1.1 jruoho 114 1.1 jruoho ATF_TC_BODY(access_inval, tc) 115 1.1 jruoho { 116 1.1 jruoho 117 1.1 jruoho errno = 0; 118 1.1 jruoho 119 1.1 jruoho ATF_REQUIRE(access("/usr", -1) != 0); 120 1.1 jruoho ATF_REQUIRE(errno == EINVAL); 121 1.1 jruoho } 122 1.1 jruoho 123 1.1 jruoho ATF_TC(access_notdir); 124 1.1 jruoho ATF_TC_HEAD(access_notdir, tc) 125 1.1 jruoho { 126 1.1 jruoho atf_tc_set_md_var(tc, "descr", "Test access(2) for ENOTDIR"); 127 1.1 jruoho } 128 1.1 jruoho 129 1.1 jruoho ATF_TC_BODY(access_notdir, tc) 130 1.1 jruoho { 131 1.1 jruoho size_t i; 132 1.1 jruoho 133 1.1 jruoho for (i = 0; i < __arraycount(mode); i++) { 134 1.1 jruoho 135 1.1 jruoho errno = 0; 136 1.1 jruoho 137 1.1 jruoho /* 138 1.1 jruoho * IEEE Std 1003.1-2008 about ENOTDIR: 139 1.1 jruoho * 140 1.1 jruoho * "A component of the path prefix is not a directory, 141 1.1 jruoho * or the path argument contains at least one non-<slash> 142 1.1 jruoho * character and ends with one or more trailing <slash> 143 1.1 jruoho * characters and the last pathname component names an 144 1.1 jruoho * existing file that is neither a directory nor a symbolic 145 1.1 jruoho * link to a directory." 146 1.1 jruoho */ 147 1.1 jruoho ATF_REQUIRE(access("/etc/passwd//", mode[i]) != 0); 148 1.1 jruoho ATF_REQUIRE(errno == ENOTDIR); 149 1.1 jruoho } 150 1.1 jruoho } 151 1.1 jruoho 152 1.1 jruoho ATF_TC(access_notexist); 153 1.1 jruoho ATF_TC_HEAD(access_notexist, tc) 154 1.1 jruoho { 155 1.1 jruoho atf_tc_set_md_var(tc, "descr", "Test access(2) for ENOENT"); 156 1.1 jruoho } 157 1.1 jruoho 158 1.1 jruoho ATF_TC_BODY(access_notexist, tc) 159 1.1 jruoho { 160 1.1 jruoho size_t i; 161 1.1 jruoho 162 1.1 jruoho for (i = 0; i < __arraycount(mode); i++) { 163 1.1 jruoho 164 1.1 jruoho errno = 0; 165 1.1 jruoho 166 1.1 jruoho ATF_REQUIRE(access("", mode[i]) != 0); 167 1.1 jruoho ATF_REQUIRE(errno == ENOENT); 168 1.1 jruoho } 169 1.1 jruoho } 170 1.1 jruoho 171 1.1 jruoho ATF_TC(access_toolong); 172 1.1 jruoho ATF_TC_HEAD(access_toolong, tc) 173 1.1 jruoho { 174 1.1 jruoho atf_tc_set_md_var(tc, "descr", "Test access(2) for ENAMETOOLONG"); 175 1.1 jruoho } 176 1.1 jruoho 177 1.1 jruoho ATF_TC_BODY(access_toolong, tc) 178 1.1 jruoho { 179 1.1 jruoho char *buf; 180 1.1 jruoho size_t i; 181 1.1 jruoho 182 1.1 jruoho buf = malloc(PATH_MAX); 183 1.1 jruoho 184 1.1 jruoho if (buf == NULL) 185 1.1 jruoho return; 186 1.1 jruoho 187 1.1 jruoho for (i = 0; i < PATH_MAX; i++) 188 1.1 jruoho buf[i] = 'x'; 189 1.1 jruoho 190 1.1 jruoho for (i = 0; i < __arraycount(mode); i++) { 191 1.1 jruoho 192 1.1 jruoho errno = 0; 193 1.1 jruoho 194 1.1 jruoho ATF_REQUIRE(access(buf, mode[i]) != 0); 195 1.1 jruoho ATF_REQUIRE(errno == ENAMETOOLONG); 196 1.1 jruoho } 197 1.1 jruoho 198 1.1 jruoho free(buf); 199 1.1 jruoho } 200 1.1 jruoho 201 1.1 jruoho ATF_TP_ADD_TCS(tp) 202 1.1 jruoho { 203 1.1 jruoho 204 1.1 jruoho ATF_TP_ADD_TC(tp, access_access); 205 1.1 jruoho ATF_TP_ADD_TC(tp, access_fault); 206 1.1 jruoho ATF_TP_ADD_TC(tp, access_inval); 207 1.1 jruoho ATF_TP_ADD_TC(tp, access_notdir); 208 1.1 jruoho ATF_TP_ADD_TC(tp, access_notexist); 209 1.1 jruoho ATF_TP_ADD_TC(tp, access_toolong); 210 1.1 jruoho 211 1.1 jruoho return atf_no_error(); 212 1.1 jruoho } 213