185 lines
4.7 KiB
C
185 lines
4.7 KiB
C
/*
|
|
*
|
|
* Copyright (c) International Business Machines Corp., 2001
|
|
* 07/2001 Ported by Wayne Boyer
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
|
|
* the GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software Foundation,
|
|
* Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
*/
|
|
|
|
/*
|
|
*
|
|
* Test Description:
|
|
* Verify that,
|
|
* 1) mknod(2) returns -1 and sets errno to EPERM if the process id of
|
|
* the caller is not super-user.
|
|
* 2) mknod(2) returns -1 and sets errno to EACCES if parent directory
|
|
* does not allow write permission to the process.
|
|
* 3) mknod(2) returns -1 and sets errno to EROFS if pathname refers to
|
|
* a file on a read-only file system.
|
|
* 4) mknod(2) returns -1 and sets errno to ELOOP if too many symbolic
|
|
* links were encountered in resolving pathname.
|
|
*
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <unistd.h>
|
|
#include <errno.h>
|
|
#include <string.h>
|
|
#include <signal.h>
|
|
#include <pwd.h>
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/mount.h>
|
|
#include <sys/sysmacros.h>
|
|
|
|
#include "test.h"
|
|
#include "safe_macros.h"
|
|
|
|
#define DIR_TEMP "testdir_1"
|
|
#define DIR_TEMP_MODE (S_IRUSR | S_IXUSR)
|
|
#define DIR_MODE (S_IRUSR|S_IWUSR|S_IXUSR|S_IRGRP| \
|
|
S_IXGRP|S_IROTH|S_IXOTH)
|
|
#define MNT_POINT "mntpoint"
|
|
|
|
#define FIFO_MODE (S_IFIFO | S_IRUSR | S_IRGRP | S_IROTH)
|
|
#define SOCKET_MODE (S_IFSOCK | S_IRWXU | S_IRWXG | S_IRWXO)
|
|
#define CHR_MODE (S_IFCHR | S_IRUSR | S_IWUSR)
|
|
#define BLK_MODE (S_IFBLK | S_IRUSR | S_IWUSR)
|
|
|
|
#define ELOPFILE "/test_eloop"
|
|
|
|
static char elooppathname[sizeof(ELOPFILE) * 43] = ".";
|
|
|
|
static const char *device;
|
|
static int mount_flag;
|
|
|
|
static struct test_case_t {
|
|
char *pathname;
|
|
int mode;
|
|
int exp_errno;
|
|
int major, minor;
|
|
} test_cases[] = {
|
|
{ "testdir_1/tnode_1", SOCKET_MODE, EACCES, 0, 0 },
|
|
{ "testdir_1/tnode_2", FIFO_MODE, EACCES, 0, 0 },
|
|
{ "tnode_3", CHR_MODE, EPERM, 1, 3 },
|
|
{ "tnode_4", BLK_MODE, EPERM, 0, 0 },
|
|
{ "mntpoint/tnode_5", SOCKET_MODE, EROFS, 0, 0 },
|
|
{ elooppathname, FIFO_MODE, ELOOP, 0, 0 },
|
|
};
|
|
|
|
char *TCID = "mknod07";
|
|
int TST_TOTAL = ARRAY_SIZE(test_cases);
|
|
|
|
static void setup(void);
|
|
static void mknod_verify(const struct test_case_t *test_case);
|
|
static void cleanup(void);
|
|
|
|
int main(int ac, char **av)
|
|
{
|
|
int lc;
|
|
int i;
|
|
|
|
tst_parse_opts(ac, av, NULL, NULL);
|
|
|
|
setup();
|
|
|
|
for (lc = 0; TEST_LOOPING(lc); lc++) {
|
|
tst_count = 0;
|
|
|
|
for (i = 0; i < TST_TOTAL; i++)
|
|
mknod_verify(&test_cases[i]);
|
|
}
|
|
|
|
cleanup();
|
|
tst_exit();
|
|
}
|
|
|
|
static void setup(void)
|
|
{
|
|
int i;
|
|
struct passwd *ltpuser;
|
|
const char *fs_type;
|
|
|
|
tst_require_root();
|
|
|
|
tst_sig(NOFORK, DEF_HANDLER, cleanup);
|
|
|
|
tst_tmpdir();
|
|
|
|
fs_type = tst_dev_fs_type();
|
|
device = tst_acquire_device(cleanup);
|
|
|
|
if (!device)
|
|
tst_brkm(TCONF, cleanup, "Failed to acquire device");
|
|
|
|
tst_mkfs(cleanup, device, fs_type, NULL, NULL);
|
|
|
|
TEST_PAUSE;
|
|
|
|
/* mount a read-only file system for EROFS test */
|
|
SAFE_MKDIR(cleanup, MNT_POINT, DIR_MODE);
|
|
SAFE_MOUNT(cleanup, device, MNT_POINT, fs_type, MS_RDONLY, NULL);
|
|
mount_flag = 1;
|
|
|
|
ltpuser = SAFE_GETPWNAM(cleanup, "nobody");
|
|
SAFE_SETEUID(cleanup, ltpuser->pw_uid);
|
|
|
|
SAFE_MKDIR(cleanup, DIR_TEMP, DIR_TEMP_MODE);
|
|
|
|
/*
|
|
* NOTE: the ELOOP test is written based on that the consecutive
|
|
* symlinks limits in kernel is hardwired to 40.
|
|
*/
|
|
SAFE_MKDIR(cleanup, "test_eloop", DIR_MODE);
|
|
SAFE_SYMLINK(cleanup, "../test_eloop", "test_eloop/test_eloop");
|
|
for (i = 0; i < 43; i++)
|
|
strcat(elooppathname, ELOPFILE);
|
|
}
|
|
|
|
static void mknod_verify(const struct test_case_t *test_case)
|
|
{
|
|
TEST(mknod(test_case->pathname, test_case->mode,
|
|
makedev(test_case->major, test_case->minor)));
|
|
|
|
if (TEST_RETURN != -1) {
|
|
tst_resm(TFAIL, "mknod succeeded unexpectedly");
|
|
return;
|
|
}
|
|
|
|
if (TEST_ERRNO == test_case->exp_errno) {
|
|
tst_resm(TPASS | TTERRNO, "mknod failed as expected");
|
|
} else {
|
|
tst_resm(TFAIL | TTERRNO,
|
|
"mknod failed unexpectedly; expected: "
|
|
"%d - %s", test_case->exp_errno,
|
|
strerror(test_case->exp_errno));
|
|
}
|
|
}
|
|
|
|
static void cleanup(void)
|
|
{
|
|
if (seteuid(0) == -1)
|
|
tst_resm(TWARN | TERRNO, "seteuid(0) failed");
|
|
|
|
if (mount_flag && tst_umount(MNT_POINT) < 0)
|
|
tst_resm(TWARN | TERRNO, "umount device:%s failed", device);
|
|
|
|
if (device)
|
|
tst_release_device(device);
|
|
|
|
tst_rmdir();
|
|
}
|