xref: /freebsd/contrib/netbsd-tests/lib/libc/sys/t_stat.c (revision 6186fd1857626de0f7cb1a9e4dff19082f9ebb11)
1 /* $NetBSD: t_stat.c,v 1.4 2012/03/17 08:37:08 jruoho Exp $ */
2 
3 /*-
4  * Copyright (c) 2011 The NetBSD Foundation, Inc.
5  * All rights reserved.
6  *
7  * This code is derived from software contributed to The NetBSD Foundation
8  * by Jukka Ruohonen.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  * 1. Redistributions of source code must retain the above copyright
14  *    notice, this list of conditions and the following disclaimer.
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  *
19  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29  * POSSIBILITY OF SUCH DAMAGE.
30  */
31 #include <sys/cdefs.h>
32 __RCSID("$NetBSD: t_stat.c,v 1.4 2012/03/17 08:37:08 jruoho Exp $");
33 
34 #include <sys/stat.h>
35 #include <sys/socket.h>
36 #include <sys/types.h>
37 
38 #include <arpa/inet.h>
39 
40 #include <atf-c.h>
41 #include <errno.h>
42 #include <fcntl.h>
43 #include <fts.h>
44 #include <limits.h>
45 #include <string.h>
46 #include <unistd.h>
47 
48 #include <stdio.h>
49 
50 static const char *path = "stat";
51 
52 ATF_TC_WITH_CLEANUP(stat_chflags);
53 ATF_TC_HEAD(stat_chflags, tc)
54 {
55 	atf_tc_set_md_var(tc, "descr", "Test chflags(2) with stat(2)");
56 }
57 
58 ATF_TC_BODY(stat_chflags, tc)
59 {
60 	struct stat sa, sb;
61 	int fd;
62 
63 	(void)memset(&sa, 0, sizeof(struct stat));
64 	(void)memset(&sb, 0, sizeof(struct stat));
65 
66 	fd = open(path, O_RDONLY | O_CREAT);
67 
68 	ATF_REQUIRE(fd != -1);
69 	ATF_REQUIRE(stat(path, &sa) == 0);
70 	ATF_REQUIRE(chflags(path, UF_NODUMP) == 0);
71 	ATF_REQUIRE(stat(path, &sb) == 0);
72 
73 	if (sa.st_flags == sb.st_flags)
74 		atf_tc_fail("stat(2) did not detect chflags(2)");
75 
76 	ATF_REQUIRE(close(fd) == 0);
77 	ATF_REQUIRE(unlink(path) == 0);
78 }
79 
80 ATF_TC_CLEANUP(stat_chflags, tc)
81 {
82 	(void)unlink(path);
83 }
84 
85 ATF_TC(stat_dir);
86 ATF_TC_HEAD(stat_dir, tc)
87 {
88 	atf_tc_set_md_var(tc, "descr", "Test stat(2) with directories");
89 }
90 
91 ATF_TC_BODY(stat_dir, tc)
92 {
93 	const short depth = 2;
94 	struct stat sa, sb;
95 	char *argv[2];
96 	FTSENT *ftse;
97 	FTS *fts;
98 	int ops;
99 
100 	argv[1] = NULL;
101 	argv[0] = __UNCONST("/");
102 
103 	ops = FTS_NOCHDIR;
104 	ops |= FTS_PHYSICAL;
105 
106 	fts = fts_open(argv, ops, NULL);
107 	ATF_REQUIRE(fts != NULL);
108 
109 	while ((ftse = fts_read(fts)) != NULL) {
110 
111 		if (ftse->fts_level < 1)
112 			continue;
113 
114 		if (ftse->fts_level > depth) {
115 			(void)fts_set(fts, ftse, FTS_SKIP);
116 			continue;
117 		}
118 
119 		switch(ftse->fts_info) {
120 
121 		case FTS_DP:
122 
123 			(void)memset(&sa, 0, sizeof(struct stat));
124 			(void)memset(&sb, 0, sizeof(struct stat));
125 
126 			ATF_REQUIRE(stat(ftse->fts_parent->fts_path,&sa) == 0);
127 			ATF_REQUIRE(chdir(ftse->fts_path) == 0);
128 			ATF_REQUIRE(stat(".", &sb) == 0);
129 
130 			/*
131 			 * The previous two stat(2) calls
132 			 * should be for the same directory.
133 			 */
134 			if (sa.st_dev != sb.st_dev || sa.st_ino != sb.st_ino)
135 				atf_tc_fail("inconsistent stat(2)");
136 
137 			/*
138 			 * Check that fts(3)'s stat(2)
139 			 * call equals the manual one.
140 			 */
141 			if (sb.st_ino != ftse->fts_statp->st_ino)
142 				atf_tc_fail("stat(2) and fts(3) differ");
143 
144 			break;
145 
146 		default:
147 			break;
148 		}
149 	}
150 
151 	(void)fts_close(fts);
152 }
153 
154 ATF_TC(stat_err);
155 ATF_TC_HEAD(stat_err, tc)
156 {
157 	atf_tc_set_md_var(tc, "descr", "Test errors from the stat(2) family");
158 }
159 
160 ATF_TC_BODY(stat_err, tc)
161 {
162 	char buf[NAME_MAX + 1];
163 	struct stat st;
164 
165 	(void)memset(buf, 'x', sizeof(buf));
166 
167 	errno = 0;
168 	ATF_REQUIRE_ERRNO(EBADF, fstat(-1, &st) == -1);
169 
170 	errno = 0;
171 	ATF_REQUIRE_ERRNO(ENAMETOOLONG, stat(buf, &st) == -1);
172 
173 	errno = 0;
174 	ATF_REQUIRE_ERRNO(ENAMETOOLONG, lstat(buf, &st) == -1);
175 
176 	errno = 0;
177 	ATF_REQUIRE_ERRNO(EFAULT, stat((void *)-1, &st) == -1);
178 
179 	errno = 0;
180 	ATF_REQUIRE_ERRNO(EFAULT, lstat((void *)-1, &st) == -1);
181 
182 	errno = 0;
183 	ATF_REQUIRE_ERRNO(EFAULT, stat("/etc/passwd", (void *)-1) == -1);
184 
185 	errno = 0;
186 	ATF_REQUIRE_ERRNO(EFAULT, lstat("/etc/passwd", (void *)-1) == -1);
187 
188 	errno = 0;
189 	ATF_REQUIRE_ERRNO(ENOENT, stat("/a/b/c/d/e/f/g/h/i/j/k", &st) == -1);
190 
191 	errno = 0;
192 	ATF_REQUIRE_ERRNO(ENOENT, lstat("/a/b/c/d/e/f/g/h/i/j/k", &st) == -1);
193 }
194 
195 ATF_TC_WITH_CLEANUP(stat_mtime);
196 ATF_TC_HEAD(stat_mtime, tc)
197 {
198 	atf_tc_set_md_var(tc, "descr", "Test modification times with stat(2)");
199 }
200 
201 ATF_TC_BODY(stat_mtime, tc)
202 {
203 	struct stat sa, sb;
204 	int fd[3];
205 	size_t i;
206 
207 	for (i = 0; i < __arraycount(fd); i++) {
208 
209 		(void)memset(&sa, 0, sizeof(struct stat));
210 		(void)memset(&sb, 0, sizeof(struct stat));
211 
212 		fd[i] = open(path, O_WRONLY | O_CREAT);
213 
214 		ATF_REQUIRE(fd[i] != -1);
215 		ATF_REQUIRE(write(fd[i], "X", 1) == 1);
216 		ATF_REQUIRE(stat(path, &sa) == 0);
217 
218 		(void)sleep(1);
219 
220 		ATF_REQUIRE(write(fd[i], "X", 1) == 1);
221 		ATF_REQUIRE(stat(path, &sb) == 0);
222 
223 		ATF_REQUIRE(close(fd[i]) == 0);
224 		ATF_REQUIRE(unlink(path) == 0);
225 
226 		if (sa.st_mtime == sb.st_mtime)
227 			atf_tc_fail("mtimes did not change");
228 	}
229 }
230 
231 ATF_TC_CLEANUP(stat_mtime, tc)
232 {
233 	(void)unlink(path);
234 }
235 
236 ATF_TC_WITH_CLEANUP(stat_perm);
237 ATF_TC_HEAD(stat_perm, tc)
238 {
239 	atf_tc_set_md_var(tc, "descr", "Test permissions with stat(2)");
240 	atf_tc_set_md_var(tc, "require.user", "root");
241 }
242 
243 ATF_TC_BODY(stat_perm, tc)
244 {
245 	struct stat sa, sb;
246 	gid_t gid;
247 	uid_t uid;
248 	int fd;
249 
250 	(void)memset(&sa, 0, sizeof(struct stat));
251 	(void)memset(&sb, 0, sizeof(struct stat));
252 
253 	uid = getuid();
254 	gid = getgid();
255 
256 	fd = open(path, O_RDONLY | O_CREAT);
257 
258 	ATF_REQUIRE(fd != -1);
259 	ATF_REQUIRE(fstat(fd, &sa) == 0);
260 	ATF_REQUIRE(stat(path, &sb) == 0);
261 
262 	if (gid != sa.st_gid || sa.st_gid != sb.st_gid)
263 		atf_tc_fail("invalid GID");
264 
265 	if (uid != sa.st_uid || sa.st_uid != sb.st_uid)
266 		atf_tc_fail("invalid UID");
267 
268 	ATF_REQUIRE(close(fd) == 0);
269 	ATF_REQUIRE(unlink(path) == 0);
270 }
271 
272 ATF_TC_CLEANUP(stat_perm, tc)
273 {
274 	(void)unlink(path);
275 }
276 
277 ATF_TC_WITH_CLEANUP(stat_size);
278 ATF_TC_HEAD(stat_size, tc)
279 {
280 	atf_tc_set_md_var(tc, "descr", "Test file sizes with stat(2)");
281 }
282 
283 ATF_TC_BODY(stat_size, tc)
284 {
285 	struct stat sa, sb, sc;
286 	const size_t n = 10;
287 	size_t i;
288 	int fd;
289 
290 	fd = open(path, O_WRONLY | O_CREAT);
291 	ATF_REQUIRE(fd >= 0);
292 
293 	for (i = 0; i < n; i++) {
294 
295 		(void)memset(&sa, 0, sizeof(struct stat));
296 		(void)memset(&sb, 0, sizeof(struct stat));
297 		(void)memset(&sc, 0, sizeof(struct stat));
298 
299 		ATF_REQUIRE(fstat(fd, &sa) == 0);
300 		ATF_REQUIRE(write(fd, "X", 1) == 1);
301 		ATF_REQUIRE(fstat(fd, &sb) == 0);
302 		ATF_REQUIRE(stat(path, &sc) == 0);
303 
304 		if (sa.st_size + 1 != sb.st_size)
305 			atf_tc_fail("invalid file size");
306 
307 		if (sb.st_size != sc.st_size)
308 			atf_tc_fail("stat(2) and fstat(2) mismatch");
309 	}
310 
311 	ATF_REQUIRE(close(fd) == 0);
312 	ATF_REQUIRE(unlink(path) == 0);
313 }
314 
315 ATF_TC_CLEANUP(stat_size, tc)
316 {
317 	(void)unlink(path);
318 }
319 
320 ATF_TC(stat_socket);
321 ATF_TC_HEAD(stat_socket, tc)
322 {
323 	atf_tc_set_md_var(tc, "descr", "Test fstat(2) with "
324 	    "a socket (PR kern/46077)");
325 }
326 
327 ATF_TC_BODY(stat_socket, tc)
328 {
329 	struct sockaddr_in addr;
330 	struct stat st;
331 	uint32_t iaddr;
332 	int fd, flags;
333 
334 	(void)memset(&st, 0, sizeof(struct stat));
335 	(void)memset(&addr, 0, sizeof(struct sockaddr_in));
336 
337 	fd = socket(AF_INET, SOCK_STREAM, 0);
338 	ATF_REQUIRE(fd >= 0);
339 
340 	flags = fcntl(fd, F_GETFL);
341 
342 	ATF_REQUIRE(flags != -1);
343 	ATF_REQUIRE(fcntl(fd, F_SETFL, flags | O_NONBLOCK) != -1);
344 	ATF_REQUIRE(inet_pton(AF_INET, "127.0.0.1", &iaddr) == 1);
345 
346 	addr.sin_port = htons(42);
347 	addr.sin_family = AF_INET;
348 	addr.sin_addr.s_addr = iaddr;
349 
350 	errno = 0;
351 
352 	ATF_REQUIRE_ERRNO(EINPROGRESS,
353 	    connect(fd, (struct sockaddr *)&addr,
354 		sizeof(struct sockaddr_in)) == -1);
355 
356 	errno = 0;
357 
358 	if (fstat(fd, &st) != 0 || errno != 0)
359 		atf_tc_fail("fstat(2) failed for a EINPROGRESS socket");
360 
361 	(void)close(fd);
362 }
363 
364 ATF_TC_WITH_CLEANUP(stat_symlink);
365 ATF_TC_HEAD(stat_symlink, tc)
366 {
367 	atf_tc_set_md_var(tc, "descr", "Test symbolic links with stat(2)");
368 }
369 
370 ATF_TC_BODY(stat_symlink, tc)
371 {
372 	const char *pathlink = "pathlink";
373 	struct stat sa, sb;
374 	int fd;
375 
376 	(void)memset(&sa, 0, sizeof(struct stat));
377 	(void)memset(&sb, 0, sizeof(struct stat));
378 
379 	fd = open(path, O_WRONLY | O_CREAT);
380 
381 	ATF_REQUIRE(fd >= 0);
382 	ATF_REQUIRE(symlink(path, pathlink) == 0);
383 	ATF_REQUIRE(stat(pathlink, &sa) == 0);
384 	ATF_REQUIRE(lstat(pathlink, &sb) == 0);
385 
386 	if (S_ISLNK(sa.st_mode) != 0)
387 		atf_tc_fail("stat(2) detected symbolic link");
388 
389 	if (S_ISLNK(sb.st_mode) == 0)
390 		atf_tc_fail("lstat(2) did not detect symbolic link");
391 
392 	if (sa.st_mode == sb.st_mode)
393 		atf_tc_fail("inconsistencies between stat(2) and lstat(2)");
394 
395 	ATF_REQUIRE(unlink(path) == 0);
396 	ATF_REQUIRE(unlink(pathlink) == 0);
397 }
398 
399 ATF_TC_CLEANUP(stat_symlink, tc)
400 {
401 	(void)unlink(path);
402 }
403 
404 ATF_TP_ADD_TCS(tp)
405 {
406 
407 	ATF_TP_ADD_TC(tp, stat_chflags);
408 	ATF_TP_ADD_TC(tp, stat_dir);
409 	ATF_TP_ADD_TC(tp, stat_err);
410 	ATF_TP_ADD_TC(tp, stat_mtime);
411 	ATF_TP_ADD_TC(tp, stat_perm);
412 	ATF_TP_ADD_TC(tp, stat_size);
413 	ATF_TP_ADD_TC(tp, stat_socket);
414 	ATF_TP_ADD_TC(tp, stat_symlink);
415 
416 	return atf_no_error();
417 }
418