11.3Schristos/* $NetBSD: t_truncate.c,v 1.3 2017/01/13 20:03:51 christos Exp $ */ 21.1Sjruoho 31.1Sjruoho/*- 41.1Sjruoho * Copyright (c) 2011 The NetBSD Foundation, Inc. 51.1Sjruoho * All rights reserved. 61.1Sjruoho * 71.1Sjruoho * This code is derived from software contributed to The NetBSD Foundation 81.1Sjruoho * by Jukka Ruohonen. 91.1Sjruoho * 101.1Sjruoho * Redistribution and use in source and binary forms, with or without 111.1Sjruoho * modification, are permitted provided that the following conditions 121.1Sjruoho * are met: 131.1Sjruoho * 1. Redistributions of source code must retain the above copyright 141.1Sjruoho * notice, this list of conditions and the following disclaimer. 151.1Sjruoho * 2. Redistributions in binary form must reproduce the above copyright 161.1Sjruoho * notice, this list of conditions and the following disclaimer in the 171.1Sjruoho * documentation and/or other materials provided with the distribution. 181.1Sjruoho * 191.1Sjruoho * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 201.1Sjruoho * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 211.1Sjruoho * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 221.1Sjruoho * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 231.1Sjruoho * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 241.1Sjruoho * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 251.1Sjruoho * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 261.1Sjruoho * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 271.1Sjruoho * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 281.1Sjruoho * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 291.1Sjruoho * POSSIBILITY OF SUCH DAMAGE. 301.1Sjruoho */ 311.1Sjruoho#include <sys/cdefs.h> 321.3Schristos__RCSID("$NetBSD: t_truncate.c,v 1.3 2017/01/13 20:03:51 christos Exp $"); 331.1Sjruoho 341.1Sjruoho#include <sys/stat.h> 351.1Sjruoho 361.1Sjruoho#include <atf-c.h> 371.1Sjruoho#include <errno.h> 381.1Sjruoho#include <fcntl.h> 391.3Schristos#include <limits.h> 401.1Sjruoho#include <stdio.h> 411.1Sjruoho#include <string.h> 421.1Sjruoho#include <unistd.h> 431.1Sjruoho 441.1Sjruohostatic const char path[] = "truncate"; 451.1Sjruohostatic const size_t sizes[] = { 8, 16, 512, 1024, 2048, 4094, 3000, 30 }; 461.1Sjruoho 471.1SjruohoATF_TC_WITH_CLEANUP(ftruncate_basic); 481.1SjruohoATF_TC_HEAD(ftruncate_basic, tc) 491.1Sjruoho{ 501.1Sjruoho atf_tc_set_md_var(tc, "descr", "A basic test of ftruncate(2)"); 511.1Sjruoho} 521.1Sjruoho 531.1SjruohoATF_TC_BODY(ftruncate_basic, tc) 541.1Sjruoho{ 551.1Sjruoho struct stat st; 561.1Sjruoho size_t i; 571.1Sjruoho int fd; 581.1Sjruoho 591.1Sjruoho fd = open(path, O_RDWR | O_CREAT, 0600); 601.1Sjruoho ATF_REQUIRE(fd >= 0); 611.1Sjruoho 621.1Sjruoho for (i = 0; i < __arraycount(sizes); i++) { 631.1Sjruoho 641.1Sjruoho (void)memset(&st, 0, sizeof(struct stat)); 651.1Sjruoho 661.1Sjruoho ATF_REQUIRE(ftruncate(fd, sizes[i]) == 0); 671.1Sjruoho ATF_REQUIRE(fstat(fd, &st) == 0); 681.1Sjruoho 691.1Sjruoho (void)fprintf(stderr, "truncating to %zu bytes\n", sizes[i]); 701.1Sjruoho 711.1Sjruoho if (sizes[i] != (size_t)st.st_size) 721.1Sjruoho atf_tc_fail("ftruncate(2) did not truncate"); 731.1Sjruoho } 741.1Sjruoho 751.1Sjruoho (void)close(fd); 761.1Sjruoho (void)unlink(path); 771.1Sjruoho} 781.1Sjruoho 791.1SjruohoATF_TC_CLEANUP(ftruncate_basic, tc) 801.1Sjruoho{ 811.1Sjruoho (void)unlink(path); 821.1Sjruoho} 831.1Sjruoho 841.1SjruohoATF_TC(ftruncate_err); 851.1SjruohoATF_TC_HEAD(ftruncate_err, tc) 861.1Sjruoho{ 871.1Sjruoho atf_tc_set_md_var(tc, "descr", "Test errors from ftruncate(2)"); 881.1Sjruoho atf_tc_set_md_var(tc, "require.user", "unprivileged"); 891.1Sjruoho} 901.1Sjruoho 911.1SjruohoATF_TC_BODY(ftruncate_err, tc) 921.1Sjruoho{ 931.1Sjruoho int fd; 941.1Sjruoho 951.1Sjruoho fd = open("/etc/passwd", O_RDONLY, 0400); 961.1Sjruoho ATF_REQUIRE(fd >= 0); 971.1Sjruoho 981.1Sjruoho errno = 0; 991.1Sjruoho ATF_REQUIRE_ERRNO(EBADF, ftruncate(-1, 999) == -1); 1001.1Sjruoho 1011.1Sjruoho errno = 0; 1021.1Sjruoho ATF_REQUIRE_ERRNO(EINVAL, ftruncate(fd, 999) == -1); 1031.1Sjruoho 1041.1Sjruoho (void)close(fd); 1051.1Sjruoho} 1061.1Sjruoho 1071.1SjruohoATF_TC_WITH_CLEANUP(truncate_basic); 1081.1SjruohoATF_TC_HEAD(truncate_basic, tc) 1091.1Sjruoho{ 1101.1Sjruoho atf_tc_set_md_var(tc, "descr", "A basic test of truncate(2)"); 1111.1Sjruoho} 1121.1Sjruoho 1131.1SjruohoATF_TC_BODY(truncate_basic, tc) 1141.1Sjruoho{ 1151.1Sjruoho struct stat st; 1161.1Sjruoho size_t i; 1171.1Sjruoho int fd; 1181.1Sjruoho 1191.1Sjruoho fd = open(path, O_RDWR | O_CREAT, 0600); 1201.1Sjruoho ATF_REQUIRE(fd >= 0); 1211.1Sjruoho 1221.1Sjruoho for (i = 0; i < __arraycount(sizes); i++) { 1231.1Sjruoho 1241.1Sjruoho (void)memset(&st, 0, sizeof(struct stat)); 1251.1Sjruoho 1261.1Sjruoho ATF_REQUIRE(truncate(path, sizes[i]) == 0); 1271.1Sjruoho ATF_REQUIRE(fstat(fd, &st) == 0); 1281.1Sjruoho 1291.1Sjruoho (void)fprintf(stderr, "truncating to %zu bytes\n", sizes[i]); 1301.1Sjruoho 1311.1Sjruoho if (sizes[i] != (size_t)st.st_size) 1321.1Sjruoho atf_tc_fail("truncate(2) did not truncate"); 1331.1Sjruoho } 1341.1Sjruoho 1351.1Sjruoho (void)close(fd); 1361.1Sjruoho (void)unlink(path); 1371.1Sjruoho} 1381.1Sjruoho 1391.1SjruohoATF_TC_CLEANUP(truncate_basic, tc) 1401.1Sjruoho{ 1411.1Sjruoho (void)unlink(path); 1421.1Sjruoho} 1431.1Sjruoho 1441.1SjruohoATF_TC(truncate_err); 1451.1SjruohoATF_TC_HEAD(truncate_err, tc) 1461.1Sjruoho{ 1471.1Sjruoho atf_tc_set_md_var(tc, "descr", "Test errors from truncate(2)"); 1481.1Sjruoho atf_tc_set_md_var(tc, "require.user", "unprivileged"); 1491.1Sjruoho} 1501.1Sjruoho 1511.1SjruohoATF_TC_BODY(truncate_err, tc) 1521.1Sjruoho{ 1531.3Schristos char buf[PATH_MAX]; 1541.1Sjruoho 1551.1Sjruoho errno = 0; 1561.1Sjruoho ATF_REQUIRE_ERRNO(EFAULT, truncate((void *)-1, 999) == -1); 1571.1Sjruoho 1581.1Sjruoho errno = 0; 1591.1Sjruoho ATF_REQUIRE_ERRNO(EISDIR, truncate("/etc", 999) == -1); 1601.1Sjruoho 1611.1Sjruoho errno = 0; 1621.1Sjruoho ATF_REQUIRE_ERRNO(ENOENT, truncate("/a/b/c/d/e/f/g", 999) == -1); 1631.1Sjruoho 1641.1Sjruoho errno = 0; 1651.3Schristos snprintf(buf, sizeof(buf), "%s/truncate_test.root_owned", 1661.3Schristos atf_tc_get_config_var(tc, "srcdir")); 1671.3Schristos ATF_REQUIRE_ERRNO(EACCES, truncate(buf, 999) == -1); 1681.1Sjruoho} 1691.1Sjruoho 1701.1SjruohoATF_TP_ADD_TCS(tp) 1711.1Sjruoho{ 1721.1Sjruoho 1731.1Sjruoho ATF_TP_ADD_TC(tp, ftruncate_basic); 1741.1Sjruoho ATF_TP_ADD_TC(tp, ftruncate_err); 1751.1Sjruoho ATF_TP_ADD_TC(tp, truncate_basic); 1761.1Sjruoho ATF_TP_ADD_TC(tp, truncate_err); 1771.1Sjruoho 1781.1Sjruoho return atf_no_error(); 1791.1Sjruoho} 180