1 /* $NetBSD: t_dup.c,v 1.7 2011/10/17 17:58:43 njoly Exp $ */ 2 3 /*- 4 * Copyright (c) 2011 The NetBSD Foundation, Inc. 5 * All rights reserved. 6 * 7 * This code is derived from software contributed to The NetBSD Foundation 8 * by Jukka Ruohonen. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 19 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 20 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 21 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 22 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 23 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 24 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 25 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 26 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 27 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 28 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 29 * POSSIBILITY OF SUCH DAMAGE. 30 */ 31 #include <sys/cdefs.h> 32 __RCSID("$NetBSD: t_dup.c,v 1.7 2011/10/17 17:58:43 njoly Exp $"); 33 34 #include <sys/resource.h> 35 #include <sys/stat.h> 36 #include <sys/wait.h> 37 38 #include <atf-c.h> 39 #include <errno.h> 40 #include <fcntl.h> 41 #include <limits.h> 42 #include <stdio.h> 43 #include <stdlib.h> 44 #include <string.h> 45 #include <unistd.h> 46 #include <sysexits.h> 47 48 static char path[] = "dup"; 49 static void check_mode(bool, bool, bool); 50 51 static void 52 check_mode(bool _dup, bool _dup2, bool _dup3) 53 { 54 int mode[3] = { O_RDONLY, O_WRONLY, O_RDWR }; 55 int perm[5] = { 0700, 0400, 0600, 0444, 0666 }; 56 struct stat st, st1; 57 int fd, fd1, fd2; 58 size_t i, j; 59 60 /* 61 * Check that a duplicated descriptor 62 * retains the mode of the original file. 63 */ 64 for (i = 0; i < __arraycount(mode); i++) { 65 66 for (j = 0; j < __arraycount(perm); j++) { 67 68 fd1 = open(path, mode[i] | O_CREAT, perm[j]); 69 fd2 = open("/etc/passwd", O_RDONLY); 70 71 ATF_REQUIRE(fd1 >= 0); 72 ATF_REQUIRE(fd2 >= 0); 73 74 if (_dup != false) 75 fd = dup(fd1); 76 else if (_dup2 != false) 77 fd = dup2(fd1, fd2); 78 else if (_dup3 != false) 79 fd = dup3(fd1, fd2, O_CLOEXEC); 80 else { 81 fd = -1; 82 } 83 84 ATF_REQUIRE(fd >= 0); 85 86 (void)memset(&st, 0, sizeof(struct stat)); 87 (void)memset(&st1, 0, sizeof(struct stat)); 88 89 ATF_REQUIRE(fstat(fd, &st) == 0); 90 ATF_REQUIRE(fstat(fd1, &st1) == 0); 91 92 if (st.st_mode != st1.st_mode) 93 atf_tc_fail("invalid mode"); 94 95 (void)close(fd); 96 (void)close(fd1); 97 (void)close(fd2); 98 (void)unlink(path); 99 } 100 } 101 } 102 103 ATF_TC(dup2_basic); 104 ATF_TC_HEAD(dup2_basic, tc) 105 { 106 atf_tc_set_md_var(tc, "descr", "A basic test of dup2(2)"); 107 } 108 109 ATF_TC_BODY(dup2_basic, tc) 110 { 111 int fd, fd1, fd2; 112 113 fd1 = open("/etc/passwd", O_RDONLY); 114 fd2 = open("/etc/passwd", O_RDONLY); 115 116 ATF_REQUIRE(fd1 >= 0); 117 ATF_REQUIRE(fd2 >= 0); 118 119 fd = dup2(fd1, fd2); 120 ATF_REQUIRE(fd >= 0); 121 122 if (fd != fd2) 123 atf_tc_fail("invalid descriptor"); 124 125 (void)close(fd); 126 (void)close(fd1); 127 128 ATF_REQUIRE(close(fd2) != 0); 129 } 130 131 ATF_TC(dup2_err); 132 ATF_TC_HEAD(dup2_err, tc) 133 { 134 atf_tc_set_md_var(tc, "descr", "Test error conditions of dup2(2)"); 135 } 136 137 ATF_TC_BODY(dup2_err, tc) 138 { 139 int fd; 140 141 fd = open("/etc/passwd", O_RDONLY); 142 ATF_REQUIRE(fd >= 0); 143 144 errno = 0; 145 ATF_REQUIRE_ERRNO(EBADF, dup2(-1, -1) == -1); 146 147 errno = 0; 148 ATF_REQUIRE_ERRNO(EBADF, dup2(fd, -1) == -1); 149 150 errno = 0; 151 ATF_REQUIRE_ERRNO(EBADF, dup2(-1, fd) == -1); 152 153 /* 154 * Note that this should not fail with EINVAL. 155 */ 156 ATF_REQUIRE(dup2(fd, fd) != -1); 157 158 (void)close(fd); 159 } 160 161 ATF_TC(dup2_max); 162 ATF_TC_HEAD(dup2_max, tc) 163 { 164 atf_tc_set_md_var(tc, "descr", "Test dup2(2) against limits"); 165 } 166 167 ATF_TC_BODY(dup2_max, tc) 168 { 169 struct rlimit res; 170 171 (void)memset(&res, 0, sizeof(struct rlimit)); 172 (void)getrlimit(RLIMIT_NOFILE, &res); 173 174 errno = 0; 175 ATF_REQUIRE_ERRNO(EBADF, dup2(STDERR_FILENO, res.rlim_cur + 1) == -1); 176 } 177 178 ATF_TC_WITH_CLEANUP(dup2_mode); 179 ATF_TC_HEAD(dup2_mode, tc) 180 { 181 atf_tc_set_md_var(tc, "descr", "A basic test of dup2(2)"); 182 } 183 184 ATF_TC_BODY(dup2_mode, tc) 185 { 186 check_mode(false, true, false); 187 } 188 189 ATF_TC_CLEANUP(dup2_mode, tc) 190 { 191 (void)unlink(path); 192 } 193 194 195 ATF_TC(dup3_err); 196 ATF_TC_HEAD(dup3_err, tc) 197 { 198 atf_tc_set_md_var(tc, "descr", "Test error conditions of dup3(2)"); 199 } 200 201 ATF_TC_BODY(dup3_err, tc) 202 { 203 int fd; 204 205 fd = open("/etc/passwd", O_RDONLY); 206 ATF_REQUIRE(fd >= 0); 207 208 errno = 0; 209 ATF_REQUIRE(dup3(fd, fd, O_CLOEXEC) != -1); 210 211 errno = 0; 212 ATF_REQUIRE_ERRNO(EBADF, dup3(-1, -1, O_CLOEXEC) == -1); 213 214 errno = 0; 215 ATF_REQUIRE_ERRNO(EBADF, dup3(fd, -1, O_CLOEXEC) == -1); 216 217 errno = 0; 218 ATF_REQUIRE_ERRNO(EBADF, dup3(-1, fd, O_CLOEXEC) == -1); 219 220 /* 221 * See the closed PR lib/45148. 222 */ 223 errno = 0; 224 ATF_REQUIRE_ERRNO(EINVAL, dup3(fd, 1, O_NOFOLLOW) == -1); 225 226 (void)close(fd); 227 } 228 229 ATF_TC(dup3_max); 230 ATF_TC_HEAD(dup3_max, tc) 231 { 232 atf_tc_set_md_var(tc, "descr", "Test dup3(2) against limits"); 233 } 234 235 ATF_TC_BODY(dup3_max, tc) 236 { 237 struct rlimit res; 238 239 (void)memset(&res, 0, sizeof(struct rlimit)); 240 (void)getrlimit(RLIMIT_NOFILE, &res); 241 242 errno = 0; 243 ATF_REQUIRE_ERRNO(EBADF, dup3(STDERR_FILENO, 244 res.rlim_cur + 1, O_CLOEXEC) == -1); 245 } 246 247 ATF_TC_WITH_CLEANUP(dup3_mode); 248 ATF_TC_HEAD(dup3_mode, tc) 249 { 250 atf_tc_set_md_var(tc, "descr", "A basic test of dup3(2)"); 251 } 252 253 ATF_TC_BODY(dup3_mode, tc) 254 { 255 check_mode(false, false, true); 256 } 257 258 ATF_TC_CLEANUP(dup3_mode, tc) 259 { 260 (void)unlink(path); 261 } 262 263 ATF_TC(dup_err); 264 ATF_TC_HEAD(dup_err, tc) 265 { 266 atf_tc_set_md_var(tc, "descr", "Test error conditions of dup(2)"); 267 } 268 269 ATF_TC_BODY(dup_err, tc) 270 { 271 272 errno = 0; 273 ATF_REQUIRE_ERRNO(EBADF, dup(-1) == -1); 274 } 275 276 ATF_TC_WITH_CLEANUP(dup_max); 277 ATF_TC_HEAD(dup_max, tc) 278 { 279 atf_tc_set_md_var(tc, "descr", "Test dup(2) against limits"); 280 } 281 282 ATF_TC_BODY(dup_max, tc) 283 { 284 struct rlimit res; 285 int *buf, fd, sta; 286 size_t i, n; 287 pid_t pid; 288 289 pid = fork(); 290 ATF_REQUIRE(pid >= 0); 291 292 if (pid == 0) { 293 294 /* 295 * Open a temporary file until the 296 * maximum number of open files is 297 * reached. Ater that dup(2) family 298 * should fail with EMFILE. 299 */ 300 (void)closefrom(0); 301 (void)memset(&res, 0, sizeof(struct rlimit)); 302 303 n = 10; 304 res.rlim_cur = res.rlim_max = n; 305 if (setrlimit(RLIMIT_NOFILE, &res) != 0) 306 _exit(EX_OSERR); 307 308 buf = calloc(n, sizeof(int)); 309 310 if (buf == NULL) 311 _exit(EX_OSERR); 312 313 buf[0] = mkstemp(path); 314 315 if (buf[0] < 0) 316 _exit(EX_OSERR); 317 318 for (i = 1; i < n; i++) { 319 320 buf[i] = open(path, O_RDONLY); 321 322 if (buf[i] < 0) 323 _exit(EX_OSERR); 324 } 325 326 errno = 0; 327 fd = dup(buf[0]); 328 329 if (fd != -1 || errno != EMFILE) 330 _exit(EX_DATAERR); 331 332 _exit(EXIT_SUCCESS); 333 } 334 335 (void)wait(&sta); 336 337 if (WIFEXITED(sta) == 0 || WEXITSTATUS(sta) != EXIT_SUCCESS) { 338 339 if (WEXITSTATUS(sta) == EX_OSERR) 340 atf_tc_fail("system call error"); 341 342 if (WEXITSTATUS(sta) == EX_DATAERR) 343 atf_tc_fail("dup(2) dupped more than RLIMIT_NOFILE"); 344 345 atf_tc_fail("unknown error"); 346 } 347 348 (void)unlink(path); 349 } 350 351 ATF_TC_CLEANUP(dup_max, tc) 352 { 353 (void)unlink(path); 354 } 355 356 ATF_TC_WITH_CLEANUP(dup_mode); 357 ATF_TC_HEAD(dup_mode, tc) 358 { 359 atf_tc_set_md_var(tc, "descr", "A basic test of dup(2)"); 360 } 361 362 ATF_TC_BODY(dup_mode, tc) 363 { 364 check_mode(true, false, false); 365 } 366 367 ATF_TC_CLEANUP(dup_mode, tc) 368 { 369 (void)unlink(path); 370 } 371 372 ATF_TP_ADD_TCS(tp) 373 { 374 375 ATF_TP_ADD_TC(tp, dup2_basic); 376 ATF_TP_ADD_TC(tp, dup2_err); 377 ATF_TP_ADD_TC(tp, dup2_max); 378 ATF_TP_ADD_TC(tp, dup2_mode); 379 ATF_TP_ADD_TC(tp, dup3_err); 380 ATF_TP_ADD_TC(tp, dup3_max); 381 ATF_TP_ADD_TC(tp, dup3_mode); 382 ATF_TP_ADD_TC(tp, dup_err); 383 ATF_TP_ADD_TC(tp, dup_max); 384 ATF_TP_ADD_TC(tp, dup_mode); 385 386 return atf_no_error(); 387 } 388