1 1.6 martin /* $NetBSD: t_stat.c,v 1.6 2019/07/16 17:29:18 martin Exp $ */ 2 1.1 jruoho 3 1.1 jruoho /*- 4 1.1 jruoho * Copyright (c) 2011 The NetBSD Foundation, Inc. 5 1.1 jruoho * All rights reserved. 6 1.1 jruoho * 7 1.1 jruoho * This code is derived from software contributed to The NetBSD Foundation 8 1.1 jruoho * by Jukka Ruohonen. 9 1.1 jruoho * 10 1.1 jruoho * Redistribution and use in source and binary forms, with or without 11 1.1 jruoho * modification, are permitted provided that the following conditions 12 1.1 jruoho * are met: 13 1.1 jruoho * 1. Redistributions of source code must retain the above copyright 14 1.1 jruoho * notice, this list of conditions and the following disclaimer. 15 1.1 jruoho * 2. Redistributions in binary form must reproduce the above copyright 16 1.1 jruoho * notice, this list of conditions and the following disclaimer in the 17 1.1 jruoho * documentation and/or other materials provided with the distribution. 18 1.1 jruoho * 19 1.1 jruoho * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 20 1.1 jruoho * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 21 1.1 jruoho * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 22 1.1 jruoho * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 23 1.1 jruoho * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 24 1.1 jruoho * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 25 1.1 jruoho * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 26 1.1 jruoho * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 27 1.1 jruoho * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 28 1.1 jruoho * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 29 1.1 jruoho * POSSIBILITY OF SUCH DAMAGE. 30 1.1 jruoho */ 31 1.1 jruoho #include <sys/cdefs.h> 32 1.6 martin __RCSID("$NetBSD: t_stat.c,v 1.6 2019/07/16 17:29:18 martin Exp $"); 33 1.1 jruoho 34 1.1 jruoho #include <sys/stat.h> 35 1.3 jruoho #include <sys/socket.h> 36 1.1 jruoho #include <sys/types.h> 37 1.1 jruoho 38 1.3 jruoho #include <arpa/inet.h> 39 1.5 christos #include <netinet/in.h> 40 1.3 jruoho 41 1.1 jruoho #include <atf-c.h> 42 1.1 jruoho #include <errno.h> 43 1.1 jruoho #include <fcntl.h> 44 1.1 jruoho #include <fts.h> 45 1.1 jruoho #include <limits.h> 46 1.1 jruoho #include <string.h> 47 1.1 jruoho #include <unistd.h> 48 1.1 jruoho 49 1.1 jruoho #include <stdio.h> 50 1.1 jruoho 51 1.1 jruoho static const char *path = "stat"; 52 1.1 jruoho 53 1.1 jruoho ATF_TC_WITH_CLEANUP(stat_chflags); 54 1.1 jruoho ATF_TC_HEAD(stat_chflags, tc) 55 1.1 jruoho { 56 1.1 jruoho atf_tc_set_md_var(tc, "descr", "Test chflags(2) with stat(2)"); 57 1.1 jruoho } 58 1.1 jruoho 59 1.1 jruoho ATF_TC_BODY(stat_chflags, tc) 60 1.1 jruoho { 61 1.1 jruoho struct stat sa, sb; 62 1.1 jruoho int fd; 63 1.1 jruoho 64 1.1 jruoho (void)memset(&sa, 0, sizeof(struct stat)); 65 1.1 jruoho (void)memset(&sb, 0, sizeof(struct stat)); 66 1.1 jruoho 67 1.6 martin fd = open(path, O_RDONLY | O_CREAT, 0600); 68 1.1 jruoho 69 1.1 jruoho ATF_REQUIRE(fd != -1); 70 1.1 jruoho ATF_REQUIRE(stat(path, &sa) == 0); 71 1.1 jruoho ATF_REQUIRE(chflags(path, UF_NODUMP) == 0); 72 1.1 jruoho ATF_REQUIRE(stat(path, &sb) == 0); 73 1.1 jruoho 74 1.1 jruoho if (sa.st_flags == sb.st_flags) 75 1.1 jruoho atf_tc_fail("stat(2) did not detect chflags(2)"); 76 1.1 jruoho 77 1.1 jruoho ATF_REQUIRE(close(fd) == 0); 78 1.1 jruoho ATF_REQUIRE(unlink(path) == 0); 79 1.1 jruoho } 80 1.1 jruoho 81 1.1 jruoho ATF_TC_CLEANUP(stat_chflags, tc) 82 1.1 jruoho { 83 1.1 jruoho (void)unlink(path); 84 1.1 jruoho } 85 1.1 jruoho 86 1.1 jruoho ATF_TC(stat_dir); 87 1.1 jruoho ATF_TC_HEAD(stat_dir, tc) 88 1.1 jruoho { 89 1.1 jruoho atf_tc_set_md_var(tc, "descr", "Test stat(2) with directories"); 90 1.1 jruoho } 91 1.1 jruoho 92 1.1 jruoho ATF_TC_BODY(stat_dir, tc) 93 1.1 jruoho { 94 1.2 jruoho const short depth = 2; 95 1.1 jruoho struct stat sa, sb; 96 1.1 jruoho char *argv[2]; 97 1.1 jruoho FTSENT *ftse; 98 1.1 jruoho FTS *fts; 99 1.1 jruoho int ops; 100 1.1 jruoho 101 1.1 jruoho argv[1] = NULL; 102 1.1 jruoho argv[0] = __UNCONST("/"); 103 1.1 jruoho 104 1.1 jruoho ops = FTS_NOCHDIR; 105 1.1 jruoho ops |= FTS_PHYSICAL; 106 1.1 jruoho 107 1.1 jruoho fts = fts_open(argv, ops, NULL); 108 1.1 jruoho ATF_REQUIRE(fts != NULL); 109 1.1 jruoho 110 1.1 jruoho while ((ftse = fts_read(fts)) != NULL) { 111 1.1 jruoho 112 1.1 jruoho if (ftse->fts_level < 1) 113 1.1 jruoho continue; 114 1.1 jruoho 115 1.1 jruoho if (ftse->fts_level > depth) { 116 1.1 jruoho (void)fts_set(fts, ftse, FTS_SKIP); 117 1.1 jruoho continue; 118 1.1 jruoho } 119 1.1 jruoho 120 1.1 jruoho switch(ftse->fts_info) { 121 1.1 jruoho 122 1.1 jruoho case FTS_DP: 123 1.1 jruoho 124 1.1 jruoho (void)memset(&sa, 0, sizeof(struct stat)); 125 1.1 jruoho (void)memset(&sb, 0, sizeof(struct stat)); 126 1.1 jruoho 127 1.1 jruoho ATF_REQUIRE(stat(ftse->fts_parent->fts_path,&sa) == 0); 128 1.1 jruoho ATF_REQUIRE(chdir(ftse->fts_path) == 0); 129 1.1 jruoho ATF_REQUIRE(stat(".", &sb) == 0); 130 1.1 jruoho 131 1.1 jruoho /* 132 1.1 jruoho * The previous two stat(2) calls 133 1.1 jruoho * should be for the same directory. 134 1.1 jruoho */ 135 1.1 jruoho if (sa.st_dev != sb.st_dev || sa.st_ino != sb.st_ino) 136 1.1 jruoho atf_tc_fail("inconsistent stat(2)"); 137 1.1 jruoho 138 1.1 jruoho /* 139 1.1 jruoho * Check that fts(3)'s stat(2) 140 1.1 jruoho * call equals the manual one. 141 1.1 jruoho */ 142 1.1 jruoho if (sb.st_ino != ftse->fts_statp->st_ino) 143 1.1 jruoho atf_tc_fail("stat(2) and fts(3) differ"); 144 1.1 jruoho 145 1.1 jruoho break; 146 1.1 jruoho 147 1.1 jruoho default: 148 1.1 jruoho break; 149 1.1 jruoho } 150 1.1 jruoho } 151 1.1 jruoho 152 1.1 jruoho (void)fts_close(fts); 153 1.1 jruoho } 154 1.1 jruoho 155 1.1 jruoho ATF_TC(stat_err); 156 1.1 jruoho ATF_TC_HEAD(stat_err, tc) 157 1.1 jruoho { 158 1.1 jruoho atf_tc_set_md_var(tc, "descr", "Test errors from the stat(2) family"); 159 1.1 jruoho } 160 1.1 jruoho 161 1.1 jruoho ATF_TC_BODY(stat_err, tc) 162 1.1 jruoho { 163 1.1 jruoho char buf[NAME_MAX + 1]; 164 1.1 jruoho struct stat st; 165 1.1 jruoho 166 1.1 jruoho (void)memset(buf, 'x', sizeof(buf)); 167 1.1 jruoho 168 1.1 jruoho errno = 0; 169 1.1 jruoho ATF_REQUIRE_ERRNO(EBADF, fstat(-1, &st) == -1); 170 1.1 jruoho 171 1.1 jruoho errno = 0; 172 1.1 jruoho ATF_REQUIRE_ERRNO(ENAMETOOLONG, stat(buf, &st) == -1); 173 1.1 jruoho 174 1.1 jruoho errno = 0; 175 1.1 jruoho ATF_REQUIRE_ERRNO(ENAMETOOLONG, lstat(buf, &st) == -1); 176 1.1 jruoho 177 1.1 jruoho errno = 0; 178 1.1 jruoho ATF_REQUIRE_ERRNO(EFAULT, stat((void *)-1, &st) == -1); 179 1.1 jruoho 180 1.1 jruoho errno = 0; 181 1.1 jruoho ATF_REQUIRE_ERRNO(EFAULT, lstat((void *)-1, &st) == -1); 182 1.1 jruoho 183 1.1 jruoho errno = 0; 184 1.1 jruoho ATF_REQUIRE_ERRNO(EFAULT, stat("/etc/passwd", (void *)-1) == -1); 185 1.1 jruoho 186 1.1 jruoho errno = 0; 187 1.1 jruoho ATF_REQUIRE_ERRNO(EFAULT, lstat("/etc/passwd", (void *)-1) == -1); 188 1.1 jruoho 189 1.1 jruoho errno = 0; 190 1.1 jruoho ATF_REQUIRE_ERRNO(ENOENT, stat("/a/b/c/d/e/f/g/h/i/j/k", &st) == -1); 191 1.1 jruoho 192 1.1 jruoho errno = 0; 193 1.1 jruoho ATF_REQUIRE_ERRNO(ENOENT, lstat("/a/b/c/d/e/f/g/h/i/j/k", &st) == -1); 194 1.1 jruoho } 195 1.1 jruoho 196 1.1 jruoho ATF_TC_WITH_CLEANUP(stat_mtime); 197 1.1 jruoho ATF_TC_HEAD(stat_mtime, tc) 198 1.1 jruoho { 199 1.1 jruoho atf_tc_set_md_var(tc, "descr", "Test modification times with stat(2)"); 200 1.1 jruoho } 201 1.1 jruoho 202 1.1 jruoho ATF_TC_BODY(stat_mtime, tc) 203 1.1 jruoho { 204 1.1 jruoho struct stat sa, sb; 205 1.1 jruoho int fd[3]; 206 1.1 jruoho size_t i; 207 1.1 jruoho 208 1.1 jruoho for (i = 0; i < __arraycount(fd); i++) { 209 1.1 jruoho 210 1.1 jruoho (void)memset(&sa, 0, sizeof(struct stat)); 211 1.1 jruoho (void)memset(&sb, 0, sizeof(struct stat)); 212 1.1 jruoho 213 1.6 martin fd[i] = open(path, O_WRONLY | O_CREAT, 0600); 214 1.1 jruoho 215 1.1 jruoho ATF_REQUIRE(fd[i] != -1); 216 1.1 jruoho ATF_REQUIRE(write(fd[i], "X", 1) == 1); 217 1.1 jruoho ATF_REQUIRE(stat(path, &sa) == 0); 218 1.1 jruoho 219 1.1 jruoho (void)sleep(1); 220 1.1 jruoho 221 1.1 jruoho ATF_REQUIRE(write(fd[i], "X", 1) == 1); 222 1.1 jruoho ATF_REQUIRE(stat(path, &sb) == 0); 223 1.1 jruoho 224 1.1 jruoho ATF_REQUIRE(close(fd[i]) == 0); 225 1.1 jruoho ATF_REQUIRE(unlink(path) == 0); 226 1.1 jruoho 227 1.1 jruoho if (sa.st_mtime == sb.st_mtime) 228 1.1 jruoho atf_tc_fail("mtimes did not change"); 229 1.1 jruoho } 230 1.1 jruoho } 231 1.1 jruoho 232 1.1 jruoho ATF_TC_CLEANUP(stat_mtime, tc) 233 1.1 jruoho { 234 1.1 jruoho (void)unlink(path); 235 1.1 jruoho } 236 1.1 jruoho 237 1.1 jruoho ATF_TC_WITH_CLEANUP(stat_perm); 238 1.1 jruoho ATF_TC_HEAD(stat_perm, tc) 239 1.1 jruoho { 240 1.1 jruoho atf_tc_set_md_var(tc, "descr", "Test permissions with stat(2)"); 241 1.1 jruoho atf_tc_set_md_var(tc, "require.user", "root"); 242 1.1 jruoho } 243 1.1 jruoho 244 1.1 jruoho ATF_TC_BODY(stat_perm, tc) 245 1.1 jruoho { 246 1.1 jruoho struct stat sa, sb; 247 1.1 jruoho gid_t gid; 248 1.1 jruoho uid_t uid; 249 1.1 jruoho int fd; 250 1.1 jruoho 251 1.1 jruoho (void)memset(&sa, 0, sizeof(struct stat)); 252 1.1 jruoho (void)memset(&sb, 0, sizeof(struct stat)); 253 1.1 jruoho 254 1.1 jruoho uid = getuid(); 255 1.1 jruoho gid = getgid(); 256 1.1 jruoho 257 1.6 martin fd = open(path, O_RDONLY | O_CREAT, 0600); 258 1.1 jruoho 259 1.1 jruoho ATF_REQUIRE(fd != -1); 260 1.1 jruoho ATF_REQUIRE(fstat(fd, &sa) == 0); 261 1.1 jruoho ATF_REQUIRE(stat(path, &sb) == 0); 262 1.1 jruoho 263 1.1 jruoho if (gid != sa.st_gid || sa.st_gid != sb.st_gid) 264 1.1 jruoho atf_tc_fail("invalid GID"); 265 1.1 jruoho 266 1.1 jruoho if (uid != sa.st_uid || sa.st_uid != sb.st_uid) 267 1.1 jruoho atf_tc_fail("invalid UID"); 268 1.1 jruoho 269 1.1 jruoho ATF_REQUIRE(close(fd) == 0); 270 1.1 jruoho ATF_REQUIRE(unlink(path) == 0); 271 1.1 jruoho } 272 1.1 jruoho 273 1.1 jruoho ATF_TC_CLEANUP(stat_perm, tc) 274 1.1 jruoho { 275 1.1 jruoho (void)unlink(path); 276 1.1 jruoho } 277 1.1 jruoho 278 1.1 jruoho ATF_TC_WITH_CLEANUP(stat_size); 279 1.1 jruoho ATF_TC_HEAD(stat_size, tc) 280 1.1 jruoho { 281 1.1 jruoho atf_tc_set_md_var(tc, "descr", "Test file sizes with stat(2)"); 282 1.1 jruoho } 283 1.1 jruoho 284 1.1 jruoho ATF_TC_BODY(stat_size, tc) 285 1.1 jruoho { 286 1.1 jruoho struct stat sa, sb, sc; 287 1.1 jruoho const size_t n = 10; 288 1.1 jruoho size_t i; 289 1.1 jruoho int fd; 290 1.1 jruoho 291 1.6 martin fd = open(path, O_WRONLY | O_CREAT, 0600); 292 1.1 jruoho ATF_REQUIRE(fd >= 0); 293 1.1 jruoho 294 1.1 jruoho for (i = 0; i < n; i++) { 295 1.1 jruoho 296 1.1 jruoho (void)memset(&sa, 0, sizeof(struct stat)); 297 1.1 jruoho (void)memset(&sb, 0, sizeof(struct stat)); 298 1.1 jruoho (void)memset(&sc, 0, sizeof(struct stat)); 299 1.1 jruoho 300 1.1 jruoho ATF_REQUIRE(fstat(fd, &sa) == 0); 301 1.1 jruoho ATF_REQUIRE(write(fd, "X", 1) == 1); 302 1.1 jruoho ATF_REQUIRE(fstat(fd, &sb) == 0); 303 1.1 jruoho ATF_REQUIRE(stat(path, &sc) == 0); 304 1.1 jruoho 305 1.1 jruoho if (sa.st_size + 1 != sb.st_size) 306 1.1 jruoho atf_tc_fail("invalid file size"); 307 1.1 jruoho 308 1.1 jruoho if (sb.st_size != sc.st_size) 309 1.1 jruoho atf_tc_fail("stat(2) and fstat(2) mismatch"); 310 1.1 jruoho } 311 1.1 jruoho 312 1.1 jruoho ATF_REQUIRE(close(fd) == 0); 313 1.1 jruoho ATF_REQUIRE(unlink(path) == 0); 314 1.1 jruoho } 315 1.1 jruoho 316 1.1 jruoho ATF_TC_CLEANUP(stat_size, tc) 317 1.1 jruoho { 318 1.1 jruoho (void)unlink(path); 319 1.1 jruoho } 320 1.1 jruoho 321 1.3 jruoho ATF_TC(stat_socket); 322 1.3 jruoho ATF_TC_HEAD(stat_socket, tc) 323 1.3 jruoho { 324 1.4 jruoho atf_tc_set_md_var(tc, "descr", "Test fstat(2) with " 325 1.4 jruoho "a socket (PR kern/46077)"); 326 1.3 jruoho } 327 1.3 jruoho 328 1.3 jruoho ATF_TC_BODY(stat_socket, tc) 329 1.3 jruoho { 330 1.3 jruoho struct sockaddr_in addr; 331 1.3 jruoho struct stat st; 332 1.3 jruoho uint32_t iaddr; 333 1.3 jruoho int fd, flags; 334 1.3 jruoho 335 1.3 jruoho (void)memset(&st, 0, sizeof(struct stat)); 336 1.3 jruoho (void)memset(&addr, 0, sizeof(struct sockaddr_in)); 337 1.3 jruoho 338 1.3 jruoho fd = socket(AF_INET, SOCK_STREAM, 0); 339 1.3 jruoho ATF_REQUIRE(fd >= 0); 340 1.3 jruoho 341 1.3 jruoho flags = fcntl(fd, F_GETFL); 342 1.3 jruoho 343 1.3 jruoho ATF_REQUIRE(flags != -1); 344 1.3 jruoho ATF_REQUIRE(fcntl(fd, F_SETFL, flags | O_NONBLOCK) != -1); 345 1.3 jruoho ATF_REQUIRE(inet_pton(AF_INET, "127.0.0.1", &iaddr) == 1); 346 1.3 jruoho 347 1.3 jruoho addr.sin_port = htons(42); 348 1.3 jruoho addr.sin_family = AF_INET; 349 1.3 jruoho addr.sin_addr.s_addr = iaddr; 350 1.3 jruoho 351 1.3 jruoho errno = 0; 352 1.3 jruoho 353 1.3 jruoho ATF_REQUIRE_ERRNO(EINPROGRESS, 354 1.3 jruoho connect(fd, (struct sockaddr *)&addr, 355 1.3 jruoho sizeof(struct sockaddr_in)) == -1); 356 1.3 jruoho 357 1.3 jruoho errno = 0; 358 1.3 jruoho 359 1.3 jruoho if (fstat(fd, &st) != 0 || errno != 0) 360 1.3 jruoho atf_tc_fail("fstat(2) failed for a EINPROGRESS socket"); 361 1.3 jruoho 362 1.3 jruoho (void)close(fd); 363 1.3 jruoho } 364 1.3 jruoho 365 1.1 jruoho ATF_TC_WITH_CLEANUP(stat_symlink); 366 1.1 jruoho ATF_TC_HEAD(stat_symlink, tc) 367 1.1 jruoho { 368 1.1 jruoho atf_tc_set_md_var(tc, "descr", "Test symbolic links with stat(2)"); 369 1.1 jruoho } 370 1.1 jruoho 371 1.1 jruoho ATF_TC_BODY(stat_symlink, tc) 372 1.1 jruoho { 373 1.1 jruoho const char *pathlink = "pathlink"; 374 1.1 jruoho struct stat sa, sb; 375 1.1 jruoho int fd; 376 1.1 jruoho 377 1.1 jruoho (void)memset(&sa, 0, sizeof(struct stat)); 378 1.1 jruoho (void)memset(&sb, 0, sizeof(struct stat)); 379 1.1 jruoho 380 1.6 martin fd = open(path, O_WRONLY | O_CREAT, 0600); 381 1.1 jruoho 382 1.1 jruoho ATF_REQUIRE(fd >= 0); 383 1.1 jruoho ATF_REQUIRE(symlink(path, pathlink) == 0); 384 1.1 jruoho ATF_REQUIRE(stat(pathlink, &sa) == 0); 385 1.1 jruoho ATF_REQUIRE(lstat(pathlink, &sb) == 0); 386 1.1 jruoho 387 1.1 jruoho if (S_ISLNK(sa.st_mode) != 0) 388 1.1 jruoho atf_tc_fail("stat(2) detected symbolic link"); 389 1.1 jruoho 390 1.1 jruoho if (S_ISLNK(sb.st_mode) == 0) 391 1.1 jruoho atf_tc_fail("lstat(2) did not detect symbolic link"); 392 1.1 jruoho 393 1.1 jruoho if (sa.st_mode == sb.st_mode) 394 1.1 jruoho atf_tc_fail("inconsistencies between stat(2) and lstat(2)"); 395 1.1 jruoho 396 1.5 christos (void)close(fd); 397 1.1 jruoho ATF_REQUIRE(unlink(path) == 0); 398 1.1 jruoho ATF_REQUIRE(unlink(pathlink) == 0); 399 1.1 jruoho } 400 1.1 jruoho 401 1.1 jruoho ATF_TC_CLEANUP(stat_symlink, tc) 402 1.1 jruoho { 403 1.1 jruoho (void)unlink(path); 404 1.1 jruoho } 405 1.1 jruoho 406 1.1 jruoho ATF_TP_ADD_TCS(tp) 407 1.1 jruoho { 408 1.1 jruoho 409 1.1 jruoho ATF_TP_ADD_TC(tp, stat_chflags); 410 1.1 jruoho ATF_TP_ADD_TC(tp, stat_dir); 411 1.1 jruoho ATF_TP_ADD_TC(tp, stat_err); 412 1.1 jruoho ATF_TP_ADD_TC(tp, stat_mtime); 413 1.1 jruoho ATF_TP_ADD_TC(tp, stat_perm); 414 1.1 jruoho ATF_TP_ADD_TC(tp, stat_size); 415 1.3 jruoho ATF_TP_ADD_TC(tp, stat_socket); 416 1.1 jruoho ATF_TP_ADD_TC(tp, stat_symlink); 417 1.1 jruoho 418 1.1 jruoho return atf_no_error(); 419 1.1 jruoho } 420