122 lines
3.0 KiB
C
122 lines
3.0 KiB
C
// SPDX-License-Identifier: GPL-2.0-or-later
|
|
/*
|
|
* Copyright (c) International Business Machines Corp., 2001
|
|
* 07/2001 Ported by Wayne Boyer
|
|
* 06/2019 Ported to new library: Christian Amann <camann@suse.com>
|
|
*/
|
|
/*
|
|
* This test verifies that:
|
|
*
|
|
* 1) lstat(2) returns -1 and sets errno to EACCES if search permission is
|
|
* denied on a component of the path prefix.
|
|
* 2) lstat(2) returns -1 and sets errno to ENOENT if the specified file
|
|
* does not exists or empty string.
|
|
* 3) lstat(2) returns -1 and sets errno to EFAULT if pathname points
|
|
* outside user's accessible address space.
|
|
* 4) lstat(2) returns -1 and sets errno to ENAMETOOLONG if the pathname
|
|
* component is too long.
|
|
* 5) lstat(2) returns -1 and sets errno to ENOTDIR if the directory
|
|
* component in pathname is not a directory.
|
|
* 6) lstat(2) returns -1 and sets errno to ELOOP if the pathname has too
|
|
* many symbolic links encountered while traversing.
|
|
*/
|
|
|
|
#include <errno.h>
|
|
#include <pwd.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include "tst_test.h"
|
|
|
|
#define MODE_RWX 0777
|
|
#define MODE_RW0 0666
|
|
#define TEST_DIR "test_dir"
|
|
#define TEST_FILE "test_file"
|
|
|
|
#define TEST_ELOOP "/test_eloop"
|
|
#define TEST_ENOENT ""
|
|
#define TEST_EACCES TEST_DIR"/test_eacces"
|
|
#define TEST_ENOTDIR TEST_FILE"/test_enotdir"
|
|
|
|
static char longpathname[PATH_MAX + 2];
|
|
static char elooppathname[sizeof(TEST_ELOOP) * 43];
|
|
static struct stat stat_buf;
|
|
|
|
static struct test_case_t {
|
|
char *pathname;
|
|
int exp_errno;
|
|
} test_cases[] = {
|
|
{TEST_EACCES, EACCES},
|
|
{TEST_ENOENT, ENOENT},
|
|
{NULL, EFAULT},
|
|
{longpathname, ENAMETOOLONG},
|
|
{TEST_ENOTDIR, ENOTDIR},
|
|
{elooppathname, ELOOP},
|
|
};
|
|
|
|
static void run(unsigned int n)
|
|
{
|
|
struct test_case_t *tc = &test_cases[n];
|
|
|
|
TEST(lstat(tc->pathname, &stat_buf));
|
|
|
|
if (TST_RET != -1) {
|
|
tst_res(TFAIL | TTERRNO, "lstat() returned %ld, expected -1",
|
|
TST_RET);
|
|
return;
|
|
}
|
|
|
|
if (tc->exp_errno == TST_ERR) {
|
|
tst_res(TPASS | TTERRNO, "lstat() failed as expected");
|
|
} else {
|
|
tst_res(TFAIL | TTERRNO,
|
|
"lstat() failed unexpectedly; expected: %s - got",
|
|
tst_strerrno(tc->exp_errno));
|
|
}
|
|
}
|
|
|
|
static void setup(void)
|
|
{
|
|
int i;
|
|
struct passwd *ltpuser;
|
|
|
|
/* Drop privileges for EACCES test */
|
|
if (geteuid() == 0) {
|
|
ltpuser = SAFE_GETPWNAM("nobody");
|
|
SAFE_SETEUID(ltpuser->pw_uid);
|
|
}
|
|
|
|
memset(longpathname, 'a', PATH_MAX+1);
|
|
longpathname[PATH_MAX+1] = '\0';
|
|
|
|
SAFE_MKDIR(TEST_DIR, MODE_RWX);
|
|
SAFE_TOUCH(TEST_EACCES, MODE_RWX, NULL);
|
|
SAFE_TOUCH(TEST_FILE, MODE_RWX, NULL);
|
|
SAFE_CHMOD(TEST_DIR, MODE_RW0);
|
|
|
|
SAFE_MKDIR("test_eloop", MODE_RWX);
|
|
SAFE_SYMLINK("../test_eloop", "test_eloop/test_eloop");
|
|
/*
|
|
* NOTE: The ELOOP test is written based on the fact that the
|
|
* consecutive symlinks limit in the kernel is hardwired to 40.
|
|
*/
|
|
elooppathname[0] = '.';
|
|
for (i = 0; i < 43; i++)
|
|
strcat(elooppathname, TEST_ELOOP);
|
|
}
|
|
|
|
static void cleanup(void)
|
|
{
|
|
SAFE_CHMOD(TEST_DIR, MODE_RWX);
|
|
}
|
|
|
|
static struct tst_test test = {
|
|
.test = run,
|
|
.tcnt = ARRAY_SIZE(test_cases),
|
|
.setup = setup,
|
|
.cleanup = cleanup,
|
|
.needs_tmpdir = 1,
|
|
};
|