From mboxrd@z Thu Jan 1 00:00:00 1970 From: Yang Xu Date: Fri, 1 Nov 2019 20:55:59 +0800 Subject: [LTP] [PATCH v3 5/5] syscalls/quotactl06: Add new testcase In-Reply-To: <1572612959-20577-1-git-send-email-xuyang2018.jy@cn.fujitsu.com> References: <20191031152646.GA7078@dell5510> <1572612959-20577-1-git-send-email-xuyang2018.jy@cn.fujitsu.com> Message-ID: <1572612959-20577-6-git-send-email-xuyang2018.jy@cn.fujitsu.com> List-Id: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit To: ltp@lists.linux.it Check various errnos for the quotactl(). Signed-off-by: Yang Xu --- runtest/syscalls | 1 + testcases/kernel/syscalls/quotactl/.gitignore | 1 + .../kernel/syscalls/quotactl/quotactl06.c | 183 ++++++++++++++++++ 3 files changed, 185 insertions(+) create mode 100644 testcases/kernel/syscalls/quotactl/quotactl06.c diff --git a/runtest/syscalls b/runtest/syscalls index f2c7b0daf..93b7a3f78 100644 --- a/runtest/syscalls +++ b/runtest/syscalls @@ -955,6 +955,7 @@ quotactl02 quotactl02 quotactl03 quotactl03 quotactl04 quotactl04 quotactl05 quotactl05 +quotactl06 quotactl06 read01 read01 read02 read02 diff --git a/testcases/kernel/syscalls/quotactl/.gitignore b/testcases/kernel/syscalls/quotactl/.gitignore index 9621e7717..b9a015654 100644 --- a/testcases/kernel/syscalls/quotactl/.gitignore +++ b/testcases/kernel/syscalls/quotactl/.gitignore @@ -3,4 +3,5 @@ /quotactl03 /quotactl04 /quotactl05 +/quotactl06 diff --git a/testcases/kernel/syscalls/quotactl/quotactl06.c b/testcases/kernel/syscalls/quotactl/quotactl06.c new file mode 100644 index 000000000..9c98bfde7 --- /dev/null +++ b/testcases/kernel/syscalls/quotactl/quotactl06.c @@ -0,0 +1,183 @@ +// SPDX-License-Identifier: GPL-2.0-or-later +/* + * Copyright (c) 2019 FUJITSU LIMITED. All rights reserved. + * Author: Yang Xu + * + * Tests basic error handling of the quotactl syscall. + * Description: + * 1) quotactl fails with EACCES when cmd is Q_QUOTAON and addr + * existed but not a regular file. + * 2) quotaclt fails with ENOENT when the file specified by special + * or addr does not exist. + * 3) quotactl fails with EBUSTY when cmd is Q_QUOTAON and another + * Q_QUOTAON had already been performed. + * 4) quotactl fails with EFAULT when addr or special is invalid. + * 5) quotactl fails with EINVAL when cmd or type is invalid. + * 6) quotactl fails with ENOTBLK when special is not a block device. + * 7) quotactl fails with ESRCH when no disk quota is found for the + * indicated user and quotas have not been turned on for this fs. + * 8) quotactl fails with ESRCH when cmd is Q_QUOTAON, but the quota + * format was not found. + * 9) quotactl fails with ESRCH when cmd is Q_GETNEXTQUOTA, but there + * is no ID greater than or equal to id that has an active quota. + * 10) quotactl fails with ERANGE when cmd is Q_SETQUOTA, but the + * specified limits are out of the range allowed by the quota format. + * 11) quotactl fails with EPERM when the caller lacked the required + * privilege (CAP_SYS_ADMIN) for the specified operation. + */ +#include +#include +#include "tst_test.h" +#include "lapi/quotactl.h" +#include "tst_capability.h" + +#define OPTION_INVALID 999 +#define QFMT_VFS_V0 2 +#define USRPATH MNTPOINT "/aquota.user" +#define FMTID QFMT_VFS_V0 + +#define MNTPOINT "mntpoint" +#define TESTDIR1 MNTPOINT "/testdir1" +#define TESTDIR2 MNTPOINT "/testdir2" + +static int32_t fmt_id = FMTID; +static int32_t fmt_invalid = 999; +static int test_invalid; +static int test_id; +static struct dqblk set_dq = { + .dqb_bsoftlimit = 100, + .dqb_valid = QIF_BLIMITS +}; + +static struct dqblk set_dqmax = { + .dqb_bsoftlimit = 0x7fffffffffffffffLL, /* 2^63-1 */ + .dqb_valid = QIF_BLIMITS +}; + +struct tst_cap dropadmin = { + .action = TST_CAP_DROP, + .id = CAP_SYS_ADMIN, + .name = "CAP_SYS_ADMIN", +}; + +struct tst_cap needadmin = { + .action = TST_CAP_REQ, + .id = CAP_SYS_ADMIN, + .name = "CAP_SYS_ADMIN", +}; + +static struct tcase { + int cmd; + int *id; + void *addr; + int exp_err; + int on_flag; +} tcases[] = { + {QCMD(Q_QUOTAON, USRQUOTA), &fmt_id, TESTDIR1, EACCES, 0 }, + {QCMD(Q_QUOTAON, USRQUOTA), &fmt_id, TESTDIR2, ENOENT, 0}, + {QCMD(Q_QUOTAON, USRQUOTA), &fmt_id, USRPATH, EBUSY, 1}, + {QCMD(Q_SETQUOTA, USRQUOTA), &fmt_id, NULL, EFAULT, 1}, + {QCMD(OPTION_INVALID, USRQUOTA), &fmt_id, USRPATH, EINVAL, 0}, + {QCMD(Q_QUOTAON, USRQUOTA), &fmt_id, USRPATH, ENOTBLK, 0}, + {QCMD(Q_SETQUOTA, USRQUOTA), &test_id, &set_dq, ESRCH, 0}, + {QCMD(Q_QUOTAON, USRQUOTA), &fmt_invalid, USRPATH, ESRCH, 0}, + {QCMD(Q_GETNEXTQUOTA, USRQUOTA), &test_invalid, USRPATH, ESRCH, 0}, + {QCMD(Q_SETQUOTA, USRQUOTA), &test_id, &set_dqmax, ERANGE, 1}, + {QCMD(Q_QUOTAON, USRQUOTA), &fmt_id, USRPATH, EPERM, 0}, +}; + +static void verify_quotactl(unsigned int n) +{ + struct tcase *tc = &tcases[n]; + int quota_on = 0; + int drop_flag = 0; + + if (!tc->addr) + tc->addr = tst_get_bad_addr(NULL); + if (tc->on_flag) { + TEST(quotactl(QCMD(Q_QUOTAON, USRQUOTA), tst_device->dev, FMTID, USRPATH)); + if (TST_RET == -1) + tst_brk(TBROK, + "quotactl with Q_QUOTAON returned %ld", TST_RET); + quota_on = 1; + } + + if (tc->exp_err == EPERM) { + tst_cap_action(&dropadmin); + drop_flag = 1; + } + + if (tc->exp_err == ENOTBLK) + TEST(quotactl(tc->cmd, "/dev/null", *tc->id, tc->addr)); + else + TEST(quotactl(tc->cmd, tst_device->dev, *tc->id, tc->addr)); + if (TST_RET == -1) { + if (tc->exp_err == TST_ERR) { + tst_res(TPASS | TTERRNO, + "quotactl failed as expected"); + } else if (*tc->id == test_invalid && tc->exp_err == EINVAL) { + tst_res(TFAIL, + "quotactl Q_GETNEXTQUOTA option is not supported."); + } else { + tst_res(TFAIL | TTERRNO, + "quotactl failed unexpectedly; expected %s, but got", + tst_strerrno(tc->exp_err)); + } + } else { + tst_res(TFAIL, "quotactl returned wrong value: %ld", TST_RET); + } + + if (quota_on) { + TEST(quotactl(QCMD(Q_QUOTAOFF, USRQUOTA), tst_device->dev, FMTID, USRPATH)); + if (TST_RET == -1) + tst_brk(TBROK, + "quotactl with Q_QUOTAOFF returned %ld", TST_RET); + quota_on = 0; + } + + if (drop_flag) { + tst_cap_action(&needadmin); + drop_flag = 0; + } +} + +static void setup(void) +{ + const char *const cmd[] = {"quotacheck", "-uF", "vfsv0", MNTPOINT, NULL}; + int ret; + + ret = tst_run_cmd(cmd, NULL, NULL, 1); + switch (ret) { + case 0: + break; + case 255: + tst_brk(TBROK, "quotacheck binary not installed"); + break; + default: + tst_brk(TBROK, "quotacheck exited with %i", ret); + } + + if (access(USRPATH, F_OK) == -1) + tst_brk(TFAIL | TERRNO, "user quotafile didn't exist"); + + SAFE_MKDIR(TESTDIR1, 0666); + test_id = geteuid(); + test_invalid = test_id + 1; +} + +static const char *kconfigs[] = { + "CONFIG_QFMT_V2", + NULL +}; + +static struct tst_test test = { + .setup = setup, + .needs_kconfigs = kconfigs, + .tcnt = ARRAY_SIZE(tcases), + .test = verify_quotactl, + .dev_fs_type = "ext4", + .mntpoint = MNTPOINT, + .mount_device = 1, + .mnt_data = "usrquota", + .needs_root = 1, +}; -- 2.18.0