summaryrefslogtreecommitdiff
path: root/src/regress/lib/libc/sys/t_mknod.c
diff options
context:
space:
mode:
authorbluhm <>2019-11-19 19:57:04 +0000
committerbluhm <>2019-11-19 19:57:04 +0000
commit9185f840eda265016178aeb0dcdba964f8f6f3e2 (patch)
treeda100b3712514c566fe948116f7926ad7f725401 /src/regress/lib/libc/sys/t_mknod.c
parent6a6fe688152b422f3d65c970dad56e7d9d28b1ee (diff)
downloadopenbsd-9185f840eda265016178aeb0dcdba964f8f6f3e2.tar.gz
openbsd-9185f840eda265016178aeb0dcdba964f8f6f3e2.tar.bz2
openbsd-9185f840eda265016178aeb0dcdba964f8f6f3e2.zip
Import NetBSD system call regression tests. They were written with
ATF (Automated Testing Framework), so we use a small wrapper to map it to our bsd.regress.mk framework. Only half of the 80 NetBSD tests have been taken, the others need more work to adapt. Of them 34 syscall tests pass. Moritz Buhl ported the tests to OpenBSD.
Diffstat (limited to 'src/regress/lib/libc/sys/t_mknod.c')
-rw-r--r--src/regress/lib/libc/sys/t_mknod.c199
1 files changed, 199 insertions, 0 deletions
diff --git a/src/regress/lib/libc/sys/t_mknod.c b/src/regress/lib/libc/sys/t_mknod.c
new file mode 100644
index 0000000000..0a16124859
--- /dev/null
+++ b/src/regress/lib/libc/sys/t_mknod.c
@@ -0,0 +1,199 @@
1/* $OpenBSD: t_mknod.c,v 1.1.1.1 2019/11/19 19:57:03 bluhm Exp $ */
2/* $NetBSD: t_mknod.c,v 1.2 2012/03/18 07:00:52 jruoho Exp $ */
3
4/*-
5 * Copyright (c) 2011 The NetBSD Foundation, Inc.
6 * All rights reserved.
7 *
8 * This code is derived from software contributed to The NetBSD Foundation
9 * by Jukka Ruohonen.
10 *
11 * Redistribution and use in source and binary forms, with or without
12 * modification, are permitted provided that the following conditions
13 * are met:
14 * 1. Redistributions of source code must retain the above copyright
15 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
21 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
22 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
24 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
25 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
27 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
31 */
32
33#include "macros.h"
34
35#include <sys/cdefs.h>
36__RCSID("$NetBSD: t_mknod.c,v 1.2 2012/03/18 07:00:52 jruoho Exp $");
37
38#include <sys/stat.h>
39
40#include "atf-c.h"
41#include <errno.h>
42#include <fcntl.h>
43#include <limits.h>
44#include <paths.h>
45#include <stdio.h>
46#include <string.h>
47#include <unistd.h>
48
49static char path[] = "node";
50
51ATF_TC_WITH_CLEANUP(mknod_err);
52ATF_TC_HEAD(mknod_err, tc)
53{
54 atf_tc_set_md_var(tc, "descr",
55 "Test error conditions of mknod(2) (PR kern/45111)");
56 atf_tc_set_md_var(tc, "require.user", "root");
57}
58
59ATF_TC_BODY(mknod_err, tc)
60{
61 char buf[PATH_MAX + 1];
62
63 (void)memset(buf, 'x', sizeof(buf));
64
65 errno = 0;
66 ATF_REQUIRE_ERRNO(EINVAL, mknod(path, S_IFCHR, -1) == -1);
67
68 errno = 0;
69 ATF_REQUIRE_ERRNO(ENAMETOOLONG, mknod(buf, S_IFCHR, 0) == -1);
70
71 errno = 0;
72 ATF_REQUIRE_ERRNO(EFAULT, mknod((char *)-1, S_IFCHR, 0) == -1);
73
74 errno = 0;
75 ATF_REQUIRE_ERRNO(ENOENT, mknod("/a/b/c/d/e/f/g", S_IFCHR, 0) == -1);
76}
77
78ATF_TC_CLEANUP(mknod_err, tc)
79{
80 (void)unlink(path);
81}
82
83ATF_TC_WITH_CLEANUP(mknod_exist);
84ATF_TC_HEAD(mknod_exist, tc)
85{
86 atf_tc_set_md_var(tc, "descr", "Test EEXIST from mknod(2)");
87 atf_tc_set_md_var(tc, "require.user", "root");
88}
89
90ATF_TC_BODY(mknod_exist, tc)
91{
92 int fd;
93
94 fd = open("/etc/passwd", O_RDONLY);
95
96 if (fd >= 0) {
97
98 (void)close(fd);
99
100 errno = 0;
101 ATF_REQUIRE_ERRNO(EEXIST,
102 mknod("/etc/passwd", S_IFCHR, 0) == -1);
103 }
104
105 ATF_REQUIRE(mknod(path, S_IFCHR, 0) == 0);
106
107 errno = 0;
108 ATF_REQUIRE_ERRNO(EEXIST, mknod(path, S_IFCHR, 0) == -1);
109
110 ATF_REQUIRE(unlink(path) == 0);
111}
112
113ATF_TC_CLEANUP(mknod_exist, tc)
114{
115 (void)unlink(path);
116}
117
118ATF_TC_WITH_CLEANUP(mknod_perm);
119ATF_TC_HEAD(mknod_perm, tc)
120{
121 atf_tc_set_md_var(tc, "descr", "Test permissions of mknod(2)");
122 atf_tc_set_md_var(tc, "require.user", "unprivileged");
123}
124
125ATF_TC_BODY(mknod_perm, tc)
126{
127
128 errno = 0;
129 ATF_REQUIRE_ERRNO(EPERM, mknod(path, S_IFCHR, 0) == -1);
130
131 errno = 0;
132 ATF_REQUIRE_ERRNO(EPERM, mknod(path, S_IFBLK, 0) == -1);
133}
134
135ATF_TC_CLEANUP(mknod_perm, tc)
136{
137 (void)unlink(path);
138}
139
140ATF_TC_WITH_CLEANUP(mknod_stat);
141ATF_TC_HEAD(mknod_stat, tc)
142{
143 atf_tc_set_md_var(tc, "descr", "A basic test of mknod(2)");
144 atf_tc_set_md_var(tc, "require.user", "root");
145}
146
147ATF_TC_BODY(mknod_stat, tc)
148{
149 struct stat st;
150
151 (void)memset(&st, 0, sizeof(struct stat));
152
153 ATF_REQUIRE(mknod(path, S_IFCHR, 0) == 0);
154 ATF_REQUIRE(stat(path, &st) == 0);
155
156 if (S_ISCHR(st.st_mode) == 0)
157 atf_tc_fail_nonfatal("invalid mode from mknod(2) (S_IFCHR)");
158
159 ATF_REQUIRE(unlink(path) == 0);
160
161 (void)memset(&st, 0, sizeof(struct stat));
162
163 ATF_REQUIRE(mknod(path, S_IFBLK, 0) == 0);
164 ATF_REQUIRE(stat(path, &st) == 0);
165
166 if (S_ISBLK(st.st_mode) == 0)
167 atf_tc_fail_nonfatal("invalid mode from mknod(2) (S_IFBLK)");
168
169 ATF_REQUIRE(unlink(path) == 0);
170
171 (void)memset(&st, 0, sizeof(struct stat));
172
173 /*
174 * Adjusted for OpenBSD, only supports FIFO and device special files
175 * ATF_REQUIRE(mknod(path, S_IFREG, 0) == 0);
176 * ATF_REQUIRE(stat(path, &st) == 0);
177 *
178 * if (S_ISREG(st.st_mode) == 0)
179 * atf_tc_fail_nonfatal("invalid mode from mknod(2) (S_IFREG)");
180 *
181 * ATF_REQUIRE(unlink(path) == 0);
182 */
183}
184
185ATF_TC_CLEANUP(mknod_stat, tc)
186{
187 (void)unlink(path);
188}
189
190ATF_TP_ADD_TCS(tp)
191{
192
193 ATF_TP_ADD_TC(tp, mknod_err);
194 ATF_TP_ADD_TC(tp, mknod_exist);
195 ATF_TP_ADD_TC(tp, mknod_perm);
196 ATF_TP_ADD_TC(tp, mknod_stat);
197
198 return atf_no_error();
199}