135cfc322SEnji Cooper /* $NetBSD: t_access.c,v 2.2 2017/01/10 22:36:29 christos Exp $ */
257718be8SEnji Cooper
357718be8SEnji Cooper /*-
457718be8SEnji Cooper * Copyright (c) 2011 The NetBSD Foundation, Inc.
557718be8SEnji Cooper * All rights reserved.
657718be8SEnji Cooper *
757718be8SEnji Cooper * This code is derived from software contributed to The NetBSD Foundation
857718be8SEnji Cooper * by Jukka Ruohonen.
957718be8SEnji Cooper *
1057718be8SEnji Cooper * Redistribution and use in source and binary forms, with or without
1157718be8SEnji Cooper * modification, are permitted provided that the following conditions
1257718be8SEnji Cooper * are met:
1357718be8SEnji Cooper * 1. Redistributions of source code must retain the above copyright
1457718be8SEnji Cooper * notice, this list of conditions and the following disclaimer.
1557718be8SEnji Cooper * 2. Redistributions in binary form must reproduce the above copyright
1657718be8SEnji Cooper * notice, this list of conditions and the following disclaimer in the
1757718be8SEnji Cooper * documentation and/or other materials provided with the distribution.
1857718be8SEnji Cooper *
1957718be8SEnji Cooper * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
2057718be8SEnji Cooper * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
2157718be8SEnji Cooper * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
2257718be8SEnji Cooper * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
2357718be8SEnji Cooper * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
2457718be8SEnji Cooper * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
2557718be8SEnji Cooper * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
2657718be8SEnji Cooper * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
2757718be8SEnji Cooper * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
2857718be8SEnji Cooper * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
2957718be8SEnji Cooper * POSSIBILITY OF SUCH DAMAGE.
3057718be8SEnji Cooper */
3157718be8SEnji Cooper #include <sys/cdefs.h>
32ddba0402SEnji Cooper __RCSID("$NetBSD: t_access.c,v 1.2 2017/01/10 22:36:29 christos Exp $");
33ddba0402SEnji Cooper
3435cfc322SEnji Cooper #ifdef __FreeBSD__
3535cfc322SEnji Cooper #include <sys/param.h> /* For __FreeBSD_version */
3635cfc322SEnji Cooper #endif
3735cfc322SEnji Cooper
38ddba0402SEnji Cooper #include <atf-c.h>
39ddba0402SEnji Cooper
40ddba0402SEnji Cooper #include <sys/stat.h>
41*4ff291ebSMark Johnston #include <sys/sysctl.h>
4257718be8SEnji Cooper
4357718be8SEnji Cooper #include <errno.h>
4457718be8SEnji Cooper #include <fcntl.h>
4557718be8SEnji Cooper #include <limits.h>
4657718be8SEnji Cooper #include <stdint.h>
47*4ff291ebSMark Johnston #include <stdio.h>
4857718be8SEnji Cooper #include <stdlib.h>
4957718be8SEnji Cooper #include <unistd.h>
5057718be8SEnji Cooper
5157718be8SEnji Cooper static const char path[] = "access";
5257718be8SEnji Cooper static const int mode[4] = { R_OK, W_OK, X_OK, F_OK };
5357718be8SEnji Cooper
5457718be8SEnji Cooper ATF_TC_WITH_CLEANUP(access_access);
ATF_TC_HEAD(access_access,tc)5557718be8SEnji Cooper ATF_TC_HEAD(access_access, tc)
5657718be8SEnji Cooper {
5757718be8SEnji Cooper atf_tc_set_md_var(tc, "descr", "Test access(2) for EACCES");
5857718be8SEnji Cooper atf_tc_set_md_var(tc, "require.user", "unprivileged");
5957718be8SEnji Cooper }
6057718be8SEnji Cooper
ATF_TC_BODY(access_access,tc)6157718be8SEnji Cooper ATF_TC_BODY(access_access, tc)
6257718be8SEnji Cooper {
6357718be8SEnji Cooper const int perm[3] = { 0200, 0400, 0000 };
6457718be8SEnji Cooper size_t i;
6557718be8SEnji Cooper int fd;
6657718be8SEnji Cooper
671575a795SBrooks Davis fd = open(path, O_RDONLY | O_CREAT, 0600);
6857718be8SEnji Cooper
6957718be8SEnji Cooper if (fd < 0)
7057718be8SEnji Cooper return;
7157718be8SEnji Cooper
7257718be8SEnji Cooper for (i = 0; i < __arraycount(mode) - 1; i++) {
7357718be8SEnji Cooper
7457718be8SEnji Cooper ATF_REQUIRE(fchmod(fd, perm[i]) == 0);
7557718be8SEnji Cooper
7657718be8SEnji Cooper errno = 0;
7757718be8SEnji Cooper
7857718be8SEnji Cooper ATF_REQUIRE(access(path, mode[i]) != 0);
7957718be8SEnji Cooper ATF_REQUIRE(errno == EACCES);
8057718be8SEnji Cooper }
8157718be8SEnji Cooper
8257718be8SEnji Cooper ATF_REQUIRE(close(fd) == 0);
8357718be8SEnji Cooper }
8457718be8SEnji Cooper
ATF_TC_CLEANUP(access_access,tc)8557718be8SEnji Cooper ATF_TC_CLEANUP(access_access, tc)
8657718be8SEnji Cooper {
8757718be8SEnji Cooper (void)unlink(path);
8857718be8SEnji Cooper }
8957718be8SEnji Cooper
9057718be8SEnji Cooper ATF_TC(access_fault);
ATF_TC_HEAD(access_fault,tc)9157718be8SEnji Cooper ATF_TC_HEAD(access_fault, tc)
9257718be8SEnji Cooper {
9357718be8SEnji Cooper atf_tc_set_md_var(tc, "descr", "Test access(2) for EFAULT");
9457718be8SEnji Cooper }
9557718be8SEnji Cooper
ATF_TC_BODY(access_fault,tc)9657718be8SEnji Cooper ATF_TC_BODY(access_fault, tc)
9757718be8SEnji Cooper {
9857718be8SEnji Cooper size_t i;
9957718be8SEnji Cooper
10057718be8SEnji Cooper for (i = 0; i < __arraycount(mode); i++) {
10157718be8SEnji Cooper
10257718be8SEnji Cooper errno = 0;
10357718be8SEnji Cooper
10457718be8SEnji Cooper ATF_REQUIRE(access(NULL, mode[i]) != 0);
10557718be8SEnji Cooper ATF_REQUIRE(errno == EFAULT);
10657718be8SEnji Cooper
10757718be8SEnji Cooper errno = 0;
10857718be8SEnji Cooper
10957718be8SEnji Cooper ATF_REQUIRE(access((char *)-1, mode[i]) != 0);
11057718be8SEnji Cooper ATF_REQUIRE(errno == EFAULT);
11157718be8SEnji Cooper }
11257718be8SEnji Cooper }
11357718be8SEnji Cooper
11457718be8SEnji Cooper ATF_TC(access_inval);
ATF_TC_HEAD(access_inval,tc)11557718be8SEnji Cooper ATF_TC_HEAD(access_inval, tc)
11657718be8SEnji Cooper {
11757718be8SEnji Cooper atf_tc_set_md_var(tc, "descr", "Test access(2) for EINVAL");
11857718be8SEnji Cooper }
11957718be8SEnji Cooper
ATF_TC_BODY(access_inval,tc)12057718be8SEnji Cooper ATF_TC_BODY(access_inval, tc)
12157718be8SEnji Cooper {
12257718be8SEnji Cooper
1233e4930b0SEnji Cooper #if defined(__FreeBSD__) && __FreeBSD_version < 1100033
1243e4930b0SEnji Cooper atf_tc_expect_fail("arguments to access aren't validated; see "
1253e4930b0SEnji Cooper "bug # 181155 for more details");
1263e4930b0SEnji Cooper #endif
12757718be8SEnji Cooper errno = 0;
12857718be8SEnji Cooper
12957718be8SEnji Cooper ATF_REQUIRE(access("/usr", -1) != 0);
13057718be8SEnji Cooper ATF_REQUIRE(errno == EINVAL);
13157718be8SEnji Cooper }
13257718be8SEnji Cooper
13357718be8SEnji Cooper ATF_TC(access_notdir);
ATF_TC_HEAD(access_notdir,tc)13457718be8SEnji Cooper ATF_TC_HEAD(access_notdir, tc)
13557718be8SEnji Cooper {
13657718be8SEnji Cooper atf_tc_set_md_var(tc, "descr", "Test access(2) for ENOTDIR");
13757718be8SEnji Cooper }
13857718be8SEnji Cooper
ATF_TC_BODY(access_notdir,tc)13957718be8SEnji Cooper ATF_TC_BODY(access_notdir, tc)
14057718be8SEnji Cooper {
14157718be8SEnji Cooper size_t i;
14257718be8SEnji Cooper
14357718be8SEnji Cooper for (i = 0; i < __arraycount(mode); i++) {
14457718be8SEnji Cooper
14557718be8SEnji Cooper errno = 0;
14657718be8SEnji Cooper
14757718be8SEnji Cooper /*
14857718be8SEnji Cooper * IEEE Std 1003.1-2008 about ENOTDIR:
14957718be8SEnji Cooper *
15057718be8SEnji Cooper * "A component of the path prefix is not a directory,
15157718be8SEnji Cooper * or the path argument contains at least one non-<slash>
15257718be8SEnji Cooper * character and ends with one or more trailing <slash>
15357718be8SEnji Cooper * characters and the last pathname component names an
15457718be8SEnji Cooper * existing file that is neither a directory nor a symbolic
15557718be8SEnji Cooper * link to a directory."
15657718be8SEnji Cooper */
15757718be8SEnji Cooper ATF_REQUIRE(access("/etc/passwd//", mode[i]) != 0);
15857718be8SEnji Cooper ATF_REQUIRE(errno == ENOTDIR);
15957718be8SEnji Cooper }
16057718be8SEnji Cooper }
16157718be8SEnji Cooper
16257718be8SEnji Cooper ATF_TC(access_notexist);
ATF_TC_HEAD(access_notexist,tc)16357718be8SEnji Cooper ATF_TC_HEAD(access_notexist, tc)
16457718be8SEnji Cooper {
16557718be8SEnji Cooper atf_tc_set_md_var(tc, "descr", "Test access(2) for ENOENT");
16657718be8SEnji Cooper }
16757718be8SEnji Cooper
ATF_TC_BODY(access_notexist,tc)16857718be8SEnji Cooper ATF_TC_BODY(access_notexist, tc)
16957718be8SEnji Cooper {
17057718be8SEnji Cooper size_t i;
17157718be8SEnji Cooper
17257718be8SEnji Cooper for (i = 0; i < __arraycount(mode); i++) {
17357718be8SEnji Cooper
17457718be8SEnji Cooper errno = 0;
17557718be8SEnji Cooper
17657718be8SEnji Cooper ATF_REQUIRE(access("", mode[i]) != 0);
17757718be8SEnji Cooper ATF_REQUIRE(errno == ENOENT);
17857718be8SEnji Cooper }
17957718be8SEnji Cooper }
18057718be8SEnji Cooper
181*4ff291ebSMark Johnston ATF_TC(access_text);
ATF_TC_HEAD(access_text,tc)182*4ff291ebSMark Johnston ATF_TC_HEAD(access_text, tc)
183*4ff291ebSMark Johnston {
184*4ff291ebSMark Johnston atf_tc_set_md_var(tc, "descr", "Test access(2) for ETXTBSY");
185*4ff291ebSMark Johnston }
186*4ff291ebSMark Johnston
ATF_TC_BODY(access_text,tc)187*4ff291ebSMark Johnston ATF_TC_BODY(access_text, tc)
188*4ff291ebSMark Johnston {
189*4ff291ebSMark Johnston char path[PATH_MAX];
190*4ff291ebSMark Johnston size_t sz;
191*4ff291ebSMark Johnston int fd, name[4];
192*4ff291ebSMark Johnston
193*4ff291ebSMark Johnston name[0] = CTL_KERN;
194*4ff291ebSMark Johnston name[1] = KERN_PROC;
195*4ff291ebSMark Johnston name[2] = KERN_PROC_PATHNAME;
196*4ff291ebSMark Johnston name[3] = -1;
197*4ff291ebSMark Johnston
198*4ff291ebSMark Johnston sz = sizeof(path);
199*4ff291ebSMark Johnston ATF_REQUIRE(sysctl(name, 4, path, &sz, NULL, 0) == 0);
200*4ff291ebSMark Johnston
201*4ff291ebSMark Johnston fd = open(path, O_RDONLY);
202*4ff291ebSMark Johnston ATF_REQUIRE(fd >= 0);
203*4ff291ebSMark Johnston
204*4ff291ebSMark Johnston ATF_REQUIRE(access(path, W_OK) != 0);
205*4ff291ebSMark Johnston ATF_REQUIRE(errno == ETXTBSY);
206*4ff291ebSMark Johnston
207*4ff291ebSMark Johnston ATF_REQUIRE(faccessat(AT_FDCWD, path, W_OK, 0) != 0);
208*4ff291ebSMark Johnston ATF_REQUIRE(errno == ETXTBSY);
209*4ff291ebSMark Johnston
210*4ff291ebSMark Johnston ATF_REQUIRE(close(fd) == 0);
211*4ff291ebSMark Johnston }
212*4ff291ebSMark Johnston
21357718be8SEnji Cooper ATF_TC(access_toolong);
ATF_TC_HEAD(access_toolong,tc)21457718be8SEnji Cooper ATF_TC_HEAD(access_toolong, tc)
21557718be8SEnji Cooper {
21657718be8SEnji Cooper atf_tc_set_md_var(tc, "descr", "Test access(2) for ENAMETOOLONG");
21757718be8SEnji Cooper }
21857718be8SEnji Cooper
ATF_TC_BODY(access_toolong,tc)21957718be8SEnji Cooper ATF_TC_BODY(access_toolong, tc)
22057718be8SEnji Cooper {
22157718be8SEnji Cooper char *buf;
22257718be8SEnji Cooper size_t i;
22357718be8SEnji Cooper
22457718be8SEnji Cooper buf = malloc(PATH_MAX);
22557718be8SEnji Cooper
22657718be8SEnji Cooper if (buf == NULL)
22757718be8SEnji Cooper return;
22857718be8SEnji Cooper
22957718be8SEnji Cooper for (i = 0; i < PATH_MAX; i++)
23057718be8SEnji Cooper buf[i] = 'x';
23157718be8SEnji Cooper
23257718be8SEnji Cooper for (i = 0; i < __arraycount(mode); i++) {
23357718be8SEnji Cooper
23457718be8SEnji Cooper errno = 0;
23557718be8SEnji Cooper
23657718be8SEnji Cooper ATF_REQUIRE(access(buf, mode[i]) != 0);
23757718be8SEnji Cooper ATF_REQUIRE(errno == ENAMETOOLONG);
23857718be8SEnji Cooper }
23957718be8SEnji Cooper
24057718be8SEnji Cooper free(buf);
24157718be8SEnji Cooper }
24257718be8SEnji Cooper
ATF_TP_ADD_TCS(tp)24357718be8SEnji Cooper ATF_TP_ADD_TCS(tp)
24457718be8SEnji Cooper {
24557718be8SEnji Cooper
24657718be8SEnji Cooper ATF_TP_ADD_TC(tp, access_access);
24757718be8SEnji Cooper ATF_TP_ADD_TC(tp, access_fault);
24857718be8SEnji Cooper ATF_TP_ADD_TC(tp, access_inval);
24957718be8SEnji Cooper ATF_TP_ADD_TC(tp, access_notdir);
25057718be8SEnji Cooper ATF_TP_ADD_TC(tp, access_notexist);
251*4ff291ebSMark Johnston ATF_TP_ADD_TC(tp, access_text);
25257718be8SEnji Cooper ATF_TP_ADD_TC(tp, access_toolong);
25357718be8SEnji Cooper
25457718be8SEnji Cooper return atf_no_error();
25557718be8SEnji Cooper }
256