xref: /freebsd/contrib/netbsd-tests/lib/libc/sys/t_unlink.c (revision 792bbaba989533a1fc93823df1720c8c4aaf0442)
1 /* $NetBSD: t_unlink.c,v 1.2 2014/04/21 18:05:17 martin Exp $ */
2 
3 /*-
4  * Copyright (c) 2011 The NetBSD Foundation, Inc.
5  * All rights reserved.
6  *
7  * This code is derived from software contributed to The NetBSD Foundation
8  * by Jukka Ruohonen.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  * 1. Redistributions of source code must retain the above copyright
14  *    notice, this list of conditions and the following disclaimer.
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  *
19  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29  * POSSIBILITY OF SUCH DAMAGE.
30  */
31 #include <sys/cdefs.h>
32 __RCSID("$NetBSD: t_unlink.c,v 1.2 2014/04/21 18:05:17 martin Exp $");
33 
34 #include <sys/stat.h>
35 
36 #include <atf-c.h>
37 #include <errno.h>
38 #include <fcntl.h>
39 #include <limits.h>
40 #include <string.h>
41 #include <unistd.h>
42 
43 static char	 path[] = "unlink";
44 
45 ATF_TC_WITH_CLEANUP(unlink_basic);
46 ATF_TC_HEAD(unlink_basic, tc)
47 {
48 	atf_tc_set_md_var(tc, "descr", "A basic test of unlink(2)");
49 }
50 
51 ATF_TC_BODY(unlink_basic, tc)
52 {
53 	const size_t n = 512;
54 	size_t i;
55 	int fd;
56 
57 	for (i = 0; i < n; i++) {
58 
59 		fd = open(path, O_RDWR | O_CREAT, 0666);
60 
61 		ATF_REQUIRE(fd != -1);
62 		ATF_REQUIRE(close(fd) == 0);
63 		ATF_REQUIRE(unlink(path) == 0);
64 
65 		errno = 0;
66 		ATF_REQUIRE_ERRNO(ENOENT, open(path, O_RDONLY) == -1);
67 	}
68 }
69 
70 ATF_TC_CLEANUP(unlink_basic, tc)
71 {
72 	(void)unlink(path);
73 }
74 
75 ATF_TC_WITH_CLEANUP(unlink_err);
76 ATF_TC_HEAD(unlink_err, tc)
77 {
78 	atf_tc_set_md_var(tc, "descr", "Test error conditions of unlink(2)");
79 }
80 
81 ATF_TC_BODY(unlink_err, tc)
82 {
83 	char buf[PATH_MAX + 1];
84 
85 	(void)memset(buf, 'x', sizeof(buf));
86 
87 	errno = 0;
88 #ifdef __FreeBSD__
89 	ATF_REQUIRE_ERRNO(EISDIR, unlink("/") == -1);
90 #else
91 	ATF_REQUIRE_ERRNO(EBUSY, unlink("/") == -1);
92 #endif
93 
94 	errno = 0;
95 	ATF_REQUIRE_ERRNO(ENAMETOOLONG, unlink(buf) == -1);
96 
97 	errno = 0;
98 	ATF_REQUIRE_ERRNO(ENOENT, unlink("/a/b/c/d/e/f/g/h/i/j/k/l/m") == -1);
99 }
100 
101 ATF_TC_CLEANUP(unlink_err, tc)
102 {
103 	(void)unlink(path);
104 }
105 
106 ATF_TC_WITH_CLEANUP(unlink_fifo);
107 ATF_TC_HEAD(unlink_fifo, tc)
108 {
109 	atf_tc_set_md_var(tc, "descr", "Test unlink(2) for a FIFO");
110 }
111 
112 ATF_TC_BODY(unlink_fifo, tc)
113 {
114 #ifdef	__FreeBSD__
115 	int fd;
116 
117 	ATF_REQUIRE_MSG((fd = mkfifo(path, 0666)) == 0,
118 	    "mkfifo failed: %s", strerror(errno));
119 	(void)close(fd);
120 #else
121 	ATF_REQUIRE(mkfifo(path, 0666) == 0);
122 #endif
123 	ATF_REQUIRE(unlink(path) == 0);
124 
125 	errno = 0;
126 	ATF_REQUIRE_ERRNO(ENOENT, open(path, O_RDONLY) == -1);
127 }
128 
129 ATF_TC_CLEANUP(unlink_fifo, tc)
130 {
131 	(void)unlink(path);
132 }
133 
134 ATF_TC_WITH_CLEANUP(unlink_perm);
135 ATF_TC_HEAD(unlink_perm, tc)
136 {
137 	atf_tc_set_md_var(tc, "descr", "Test permissions with unlink(2)");
138 	atf_tc_set_md_var(tc, "require.user", "unprivileged");
139 }
140 
141 ATF_TC_BODY(unlink_perm, tc)
142 {
143 	int rv;
144 
145 	errno = 0;
146 	rv = unlink("/etc");
147 	ATF_REQUIRE_MSG(rv == -1 && (errno == EACCES || errno == EPERM),
148 	    "unlinking a directory did not fail with EPERM or EACCESS; "
149 	    "unlink() returned %d, errno %d", rv, errno);
150 
151 	errno = 0;
152 	ATF_REQUIRE_ERRNO(EACCES, unlink("/root/.profile") == -1);
153 }
154 
155 ATF_TC_CLEANUP(unlink_perm, tc)
156 {
157 	(void)unlink(path);
158 }
159 
160 ATF_TP_ADD_TCS(tp)
161 {
162 
163 	ATF_TP_ADD_TC(tp, unlink_basic);
164 	ATF_TP_ADD_TC(tp, unlink_err);
165 	ATF_TP_ADD_TC(tp, unlink_fifo);
166 	ATF_TP_ADD_TC(tp, unlink_perm);
167 
168 	return atf_no_error();
169 }
170