t_truncate.c revision 314817
1/* $NetBSD: t_truncate.c,v 1.3 2017/01/13 20:03:51 christos Exp $ */ 2 3/*- 4 * Copyright (c) 2011 The NetBSD Foundation, Inc. 5 * All rights reserved. 6 * 7 * This code is derived from software contributed to The NetBSD Foundation 8 * by Jukka Ruohonen. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 19 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 20 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 21 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 22 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 23 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 24 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 25 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 26 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 27 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 28 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 29 * POSSIBILITY OF SUCH DAMAGE. 30 */ 31#include <sys/cdefs.h> 32__RCSID("$NetBSD: t_truncate.c,v 1.3 2017/01/13 20:03:51 christos Exp $"); 33 34#include <sys/stat.h> 35 36#include <atf-c.h> 37#include <errno.h> 38#include <fcntl.h> 39#include <limits.h> 40#include <stdio.h> 41#include <string.h> 42#include <unistd.h> 43 44static const char path[] = "truncate"; 45static const size_t sizes[] = { 8, 16, 512, 1024, 2048, 4094, 3000, 30 }; 46 47ATF_TC_WITH_CLEANUP(ftruncate_basic); 48ATF_TC_HEAD(ftruncate_basic, tc) 49{ 50 atf_tc_set_md_var(tc, "descr", "A basic test of ftruncate(2)"); 51} 52 53ATF_TC_BODY(ftruncate_basic, tc) 54{ 55 struct stat st; 56 size_t i; 57 int fd; 58 59 fd = open(path, O_RDWR | O_CREAT, 0600); 60 ATF_REQUIRE(fd >= 0); 61 62 for (i = 0; i < __arraycount(sizes); i++) { 63 64 (void)memset(&st, 0, sizeof(struct stat)); 65 66 ATF_REQUIRE(ftruncate(fd, sizes[i]) == 0); 67 ATF_REQUIRE(fstat(fd, &st) == 0); 68 69 (void)fprintf(stderr, "truncating to %zu bytes\n", sizes[i]); 70 71 if (sizes[i] != (size_t)st.st_size) 72 atf_tc_fail("ftruncate(2) did not truncate"); 73 } 74 75 (void)close(fd); 76 (void)unlink(path); 77} 78 79ATF_TC_CLEANUP(ftruncate_basic, tc) 80{ 81 (void)unlink(path); 82} 83 84ATF_TC(ftruncate_err); 85ATF_TC_HEAD(ftruncate_err, tc) 86{ 87 atf_tc_set_md_var(tc, "descr", "Test errors from ftruncate(2)"); 88 atf_tc_set_md_var(tc, "require.user", "unprivileged"); 89} 90 91ATF_TC_BODY(ftruncate_err, tc) 92{ 93 int fd; 94 95 fd = open("/etc/passwd", O_RDONLY, 0400); 96 ATF_REQUIRE(fd >= 0); 97 98 errno = 0; 99 ATF_REQUIRE_ERRNO(EBADF, ftruncate(-1, 999) == -1); 100 101 errno = 0; 102 ATF_REQUIRE_ERRNO(EINVAL, ftruncate(fd, 999) == -1); 103 104 (void)close(fd); 105} 106 107ATF_TC_WITH_CLEANUP(truncate_basic); 108ATF_TC_HEAD(truncate_basic, tc) 109{ 110 atf_tc_set_md_var(tc, "descr", "A basic test of truncate(2)"); 111} 112 113ATF_TC_BODY(truncate_basic, tc) 114{ 115 struct stat st; 116 size_t i; 117 int fd; 118 119 fd = open(path, O_RDWR | O_CREAT, 0600); 120 ATF_REQUIRE(fd >= 0); 121 122 for (i = 0; i < __arraycount(sizes); i++) { 123 124 (void)memset(&st, 0, sizeof(struct stat)); 125 126 ATF_REQUIRE(truncate(path, sizes[i]) == 0); 127 ATF_REQUIRE(fstat(fd, &st) == 0); 128 129 (void)fprintf(stderr, "truncating to %zu bytes\n", sizes[i]); 130 131 if (sizes[i] != (size_t)st.st_size) 132 atf_tc_fail("truncate(2) did not truncate"); 133 } 134 135 (void)close(fd); 136 (void)unlink(path); 137} 138 139ATF_TC_CLEANUP(truncate_basic, tc) 140{ 141 (void)unlink(path); 142} 143 144ATF_TC(truncate_err); 145ATF_TC_HEAD(truncate_err, tc) 146{ 147 atf_tc_set_md_var(tc, "descr", "Test errors from truncate(2)"); 148 atf_tc_set_md_var(tc, "require.user", "unprivileged"); 149} 150 151ATF_TC_BODY(truncate_err, tc) 152{ 153 char buf[PATH_MAX]; 154 155 errno = 0; 156 ATF_REQUIRE_ERRNO(EFAULT, truncate((void *)-1, 999) == -1); 157 158 errno = 0; 159 ATF_REQUIRE_ERRNO(EISDIR, truncate("/etc", 999) == -1); 160 161 errno = 0; 162 ATF_REQUIRE_ERRNO(ENOENT, truncate("/a/b/c/d/e/f/g", 999) == -1); 163 164 errno = 0; 165 snprintf(buf, sizeof(buf), "%s/truncate_test.root_owned", 166 atf_tc_get_config_var(tc, "srcdir")); 167 ATF_REQUIRE_ERRNO(EACCES, truncate(buf, 999) == -1); 168} 169 170ATF_TP_ADD_TCS(tp) 171{ 172 173 ATF_TP_ADD_TC(tp, ftruncate_basic); 174 ATF_TP_ADD_TC(tp, ftruncate_err); 175 ATF_TP_ADD_TC(tp, truncate_basic); 176 ATF_TP_ADD_TC(tp, truncate_err); 177 178 return atf_no_error(); 179} 180