1 /* $NetBSD: t_truncate.c,v 1.2 2011/08/18 19:48:03 dholland Exp $ */ 2 3 /*- 4 * Copyright (c) 2011 The NetBSD Foundation, Inc. 5 * All rights reserved. 6 * 7 * This code is derived from software contributed to The NetBSD Foundation 8 * by Jukka Ruohonen. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 19 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 20 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 21 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 22 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 23 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 24 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 25 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 26 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 27 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 28 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 29 * POSSIBILITY OF SUCH DAMAGE. 30 */ 31 #include <sys/cdefs.h> 32 __RCSID("$NetBSD: t_truncate.c,v 1.2 2011/08/18 19:48:03 dholland Exp $"); 33 34 #include <sys/stat.h> 35 36 #include <atf-c.h> 37 #include <errno.h> 38 #include <fcntl.h> 39 #include <stdio.h> 40 #include <string.h> 41 #include <unistd.h> 42 43 static const char path[] = "truncate"; 44 static const size_t sizes[] = { 8, 16, 512, 1024, 2048, 4094, 3000, 30 }; 45 46 ATF_TC_WITH_CLEANUP(ftruncate_basic); 47 ATF_TC_HEAD(ftruncate_basic, tc) 48 { 49 atf_tc_set_md_var(tc, "descr", "A basic test of ftruncate(2)"); 50 } 51 52 ATF_TC_BODY(ftruncate_basic, tc) 53 { 54 struct stat st; 55 size_t i; 56 int fd; 57 58 fd = open(path, O_RDWR | O_CREAT, 0600); 59 ATF_REQUIRE(fd >= 0); 60 61 for (i = 0; i < __arraycount(sizes); i++) { 62 63 (void)memset(&st, 0, sizeof(struct stat)); 64 65 ATF_REQUIRE(ftruncate(fd, sizes[i]) == 0); 66 ATF_REQUIRE(fstat(fd, &st) == 0); 67 68 (void)fprintf(stderr, "truncating to %zu bytes\n", sizes[i]); 69 70 if (sizes[i] != (size_t)st.st_size) 71 atf_tc_fail("ftruncate(2) did not truncate"); 72 } 73 74 (void)close(fd); 75 (void)unlink(path); 76 } 77 78 ATF_TC_CLEANUP(ftruncate_basic, tc) 79 { 80 (void)unlink(path); 81 } 82 83 ATF_TC(ftruncate_err); 84 ATF_TC_HEAD(ftruncate_err, tc) 85 { 86 atf_tc_set_md_var(tc, "descr", "Test errors from ftruncate(2)"); 87 atf_tc_set_md_var(tc, "require.user", "unprivileged"); 88 } 89 90 ATF_TC_BODY(ftruncate_err, tc) 91 { 92 int fd; 93 94 fd = open("/etc/passwd", O_RDONLY, 0400); 95 ATF_REQUIRE(fd >= 0); 96 97 errno = 0; 98 ATF_REQUIRE_ERRNO(EBADF, ftruncate(-1, 999) == -1); 99 100 errno = 0; 101 ATF_REQUIRE_ERRNO(EINVAL, ftruncate(fd, 999) == -1); 102 103 (void)close(fd); 104 } 105 106 ATF_TC_WITH_CLEANUP(truncate_basic); 107 ATF_TC_HEAD(truncate_basic, tc) 108 { 109 atf_tc_set_md_var(tc, "descr", "A basic test of truncate(2)"); 110 } 111 112 ATF_TC_BODY(truncate_basic, tc) 113 { 114 struct stat st; 115 size_t i; 116 int fd; 117 118 fd = open(path, O_RDWR | O_CREAT, 0600); 119 ATF_REQUIRE(fd >= 0); 120 121 for (i = 0; i < __arraycount(sizes); i++) { 122 123 (void)memset(&st, 0, sizeof(struct stat)); 124 125 ATF_REQUIRE(truncate(path, sizes[i]) == 0); 126 ATF_REQUIRE(fstat(fd, &st) == 0); 127 128 (void)fprintf(stderr, "truncating to %zu bytes\n", sizes[i]); 129 130 if (sizes[i] != (size_t)st.st_size) 131 atf_tc_fail("truncate(2) did not truncate"); 132 } 133 134 (void)close(fd); 135 (void)unlink(path); 136 } 137 138 ATF_TC_CLEANUP(truncate_basic, tc) 139 { 140 (void)unlink(path); 141 } 142 143 ATF_TC(truncate_err); 144 ATF_TC_HEAD(truncate_err, tc) 145 { 146 atf_tc_set_md_var(tc, "descr", "Test errors from truncate(2)"); 147 atf_tc_set_md_var(tc, "require.user", "unprivileged"); 148 } 149 150 ATF_TC_BODY(truncate_err, tc) 151 { 152 153 errno = 0; 154 ATF_REQUIRE_ERRNO(EFAULT, truncate((void *)-1, 999) == -1); 155 156 errno = 0; 157 ATF_REQUIRE_ERRNO(EISDIR, truncate("/etc", 999) == -1); 158 159 errno = 0; 160 ATF_REQUIRE_ERRNO(ENOENT, truncate("/a/b/c/d/e/f/g", 999) == -1); 161 162 errno = 0; 163 ATF_REQUIRE_ERRNO(EACCES, truncate("/usr/bin/fpr", 999) == -1); 164 } 165 166 ATF_TP_ADD_TCS(tp) 167 { 168 169 ATF_TP_ADD_TC(tp, ftruncate_basic); 170 ATF_TP_ADD_TC(tp, ftruncate_err); 171 ATF_TP_ADD_TC(tp, truncate_basic); 172 ATF_TP_ADD_TC(tp, truncate_err); 173 174 return atf_no_error(); 175 } 176