plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 1 | /* |
| 2 | * proc01.c - Tests Linux /proc file reading. |
| 3 | * |
| 4 | * Copyright (C) 2001 Stephane Fillod <f4cfe@free.fr> |
subrata_modak | cf473b7 | 2009-02-05 11:15:57 +0000 | [diff] [blame] | 5 | * Copyright (c) 2008, 2009 Red Hat, Inc. |
subrata_modak | 4bb656a | 2009-02-26 12:02:09 +0000 | [diff] [blame] | 6 | * |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 7 | * This program is free software; you can redistribute it and/or modify it |
| 8 | * under the terms of version 2 of the GNU General Public License as |
| 9 | * published by the Free Software Foundation. |
subrata_modak | 4bb656a | 2009-02-26 12:02:09 +0000 | [diff] [blame] | 10 | * |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 11 | * This program is distributed in the hope that it would be useful, but |
| 12 | * WITHOUT ANY WARRANTY; without even the implied warranty of |
| 13 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. |
subrata_modak | 4bb656a | 2009-02-26 12:02:09 +0000 | [diff] [blame] | 14 | * |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 15 | * Further, this software is distributed without any warranty that it is |
| 16 | * free of the rightful claim of any third person regarding infringement |
| 17 | * or the like. Any license provided herein, whether implied or |
| 18 | * otherwise, applies only to this software file. Patent licenses, if |
| 19 | * any, provided herein do not apply to combinations of this program with |
| 20 | * other software, or any other product whatsoever. |
subrata_modak | 4bb656a | 2009-02-26 12:02:09 +0000 | [diff] [blame] | 21 | * |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 22 | * You should have received a copy of the GNU General Public License along |
Wanlong Gao | fed9641 | 2012-10-24 10:10:29 +0800 | [diff] [blame] | 23 | * with this program; if not, write the Free Software Foundation, Inc., |
| 24 | * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. |
subrata_modak | 4bb656a | 2009-02-26 12:02:09 +0000 | [diff] [blame] | 25 | * |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 26 | */ |
| 27 | |
subrata_modak | afe343d | 2009-02-05 11:20:49 +0000 | [diff] [blame] | 28 | #include "config.h" |
| 29 | |
subrata_modak | da124b9 | 2009-10-13 14:00:45 +0000 | [diff] [blame] | 30 | #include <errno.h> |
| 31 | #include <stdio.h> |
| 32 | #include <stdlib.h> |
| 33 | #include <string.h> |
| 34 | #include <limits.h> |
| 35 | #include <sys/types.h> |
| 36 | #include <sys/stat.h> |
| 37 | #include <dirent.h> |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 38 | #include <unistd.h> |
| 39 | #include <fcntl.h> |
subrata_modak | ca317e6 | 2007-11-13 09:25:05 +0000 | [diff] [blame] | 40 | #include <fnmatch.h> |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 41 | |
subrata_modak | 190c7ad | 2009-03-16 08:27:20 +0000 | [diff] [blame] | 42 | #ifdef HAVE_LIBSELINUX_DEVEL |
subrata_modak | afe343d | 2009-02-05 11:20:49 +0000 | [diff] [blame] | 43 | #include <selinux/selinux.h> |
| 44 | #endif |
| 45 | |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 46 | #include "test.h" |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 47 | |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 48 | #define MAX_BUFF_SIZE 65536 |
subrata_modak | 8a9ecb7 | 2008-05-26 06:09:19 +0000 | [diff] [blame] | 49 | #define MAX_FUNC_NAME 256 |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 50 | |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 51 | char *TCID = "proc01"; |
| 52 | int TST_TOTAL = 1; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 53 | |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 54 | static int opt_verbose; |
| 55 | static int opt_procpath; |
| 56 | static char *opt_procpathstr; |
| 57 | static int opt_buffsize; |
| 58 | static int opt_readirq; |
| 59 | static char *opt_buffsizestr; |
| 60 | static int opt_maxmbytes; |
| 61 | static char *opt_maxmbytesstr; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 62 | |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 63 | static char *procpath = "/proc"; |
| 64 | static const char selfpath[] = "/proc/self"; |
| 65 | size_t buffsize = 1024; |
Jan Stancek | 37bfeec | 2012-07-31 10:33:13 +0200 | [diff] [blame] | 66 | static long long maxbytes; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 67 | |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 68 | unsigned long long total_read; |
| 69 | unsigned int total_obj; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 70 | |
subrata_modak | da124b9 | 2009-10-13 14:00:45 +0000 | [diff] [blame] | 71 | struct mapping { |
| 72 | char func[MAX_FUNC_NAME]; |
| 73 | char file[PATH_MAX]; |
| 74 | int err; |
subrata_modak | 8a9ecb7 | 2008-05-26 06:09:19 +0000 | [diff] [blame] | 75 | }; |
subrata_modak | da124b9 | 2009-10-13 14:00:45 +0000 | [diff] [blame] | 76 | |
subrata_modak | 8a9ecb7 | 2008-05-26 06:09:19 +0000 | [diff] [blame] | 77 | /* Those are known failures for 2.6.18 baremetal kernel and Xen dom0 |
| 78 | kernel on i686, x86_64, ia64, ppc64 and s390x. In addition, It looks |
| 79 | like if SELinux is disabled, the test may still fail on some other |
| 80 | entries. */ |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 81 | static const struct mapping known_issues[] = { |
| 82 | {"open", "/proc/acpi/event", EBUSY}, |
| 83 | {"open", "/proc/sal/cpe/data", EBUSY}, |
| 84 | {"open", "/proc/sal/cmc/data", EBUSY}, |
| 85 | {"open", "/proc/sal/init/data", EBUSY}, |
| 86 | {"open", "/proc/sal/mca/data", EBUSY}, |
Jan Stancek | cbf52ab | 2013-09-05 09:22:31 +0200 | [diff] [blame] | 87 | {"open", "/proc/fs/nfsd/pool_stats", ENODEV}, |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 88 | {"read", "/proc/acpi/event", EAGAIN}, |
| 89 | {"read", "/proc/kmsg", EAGAIN}, |
| 90 | {"read", "/proc/sal/cpe/event", EAGAIN}, |
| 91 | {"read", "/proc/sal/cmc/event", EAGAIN}, |
| 92 | {"read", "/proc/sal/init/event", EAGAIN}, |
| 93 | {"read", "/proc/sal/mca/event", EAGAIN}, |
Cyril Hrubis | db7f435 | 2013-04-24 16:54:22 +0200 | [diff] [blame] | 94 | {"read", "/proc/xen/privcmd", EIO}, |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 95 | {"read", "/proc/xen/privcmd", EINVAL}, |
| 96 | {"read", "/proc/self/mem", EIO}, |
| 97 | {"read", "/proc/self/task/[0-9]*/mem", EIO}, |
| 98 | {"read", "/proc/self/attr/*", EINVAL}, |
| 99 | {"read", "/proc/self/task/[0-9]*/attr/*", EINVAL}, |
| 100 | {"read", "/proc/self/ns/*", EINVAL}, |
| 101 | {"read", "/proc/self/task/[0-9]*/ns/*", EINVAL}, |
| 102 | {"read", "/proc/ppc64/rtas/error_log", EINVAL}, |
| 103 | {"read", "/proc/powerpc/rtas/error_log", EINVAL}, |
| 104 | {"read", "/proc/fs/nfsd/unlock_filesystem", EINVAL}, |
| 105 | {"read", "/proc/fs/nfsd/unlock_ip", EINVAL}, |
| 106 | {"read", "/proc/fs/nfsd/filehandle", EINVAL}, |
| 107 | {"read", "/proc/fs/nfsd/.getfs", EINVAL}, |
| 108 | {"read", "/proc/fs/nfsd/.getfd", EINVAL}, |
Jan Stancek | 80ab8bc | 2013-08-27 11:05:32 +0200 | [diff] [blame] | 109 | {"read", "/proc/self/net/rpc/use-gss-proxy", EAGAIN}, |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 110 | {"", "", 0} |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 111 | }; |
subrata_modak | 8a9ecb7 | 2008-05-26 06:09:19 +0000 | [diff] [blame] | 112 | |
subrata_modak | 190c7ad | 2009-03-16 08:27:20 +0000 | [diff] [blame] | 113 | /* |
| 114 | * If a particular LSM is enabled, it is expected that some entries can |
| 115 | * be read successfully. Otherwise, those entries will retrun some |
| 116 | * failures listed above. Here to add any LSM specific entries. |
| 117 | */ |
| 118 | |
| 119 | /* |
| 120 | * Test macro to indicate that SELinux libraries and headers are |
| 121 | * installed. |
| 122 | */ |
| 123 | #ifdef HAVE_LIBSELINUX_DEVEL |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 124 | static const char lsm_should_work[][PATH_MAX] = { |
| 125 | "/proc/self/attr/*", |
| 126 | "/proc/self/task/[0-9]*/attr/*", |
| 127 | "" |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 128 | }; |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 129 | |
subrata_modak | 190c7ad | 2009-03-16 08:27:20 +0000 | [diff] [blame] | 130 | /* Place holder for none of LSM is detected. */ |
subrata_modak | 13a2142 | 2009-02-16 05:44:04 +0000 | [diff] [blame] | 131 | #else |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 132 | static const char lsm_should_work[][PATH_MAX] = { |
| 133 | "" |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 134 | }; |
subrata_modak | 13a2142 | 2009-02-16 05:44:04 +0000 | [diff] [blame] | 135 | #endif |
subrata_modak | afe343d | 2009-02-05 11:20:49 +0000 | [diff] [blame] | 136 | |
subrata_modak | 8a9ecb7 | 2008-05-26 06:09:19 +0000 | [diff] [blame] | 137 | /* Known files that does not honor O_NONBLOCK, so they will hang |
subrata_modak | afe343d | 2009-02-05 11:20:49 +0000 | [diff] [blame] | 138 | the test while being read. */ |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 139 | static const char error_nonblock[][PATH_MAX] = { |
| 140 | "/proc/xen/xenbus", |
| 141 | "" |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 142 | }; |
subrata_modak | 8a9ecb7 | 2008-05-26 06:09:19 +0000 | [diff] [blame] | 143 | |
Garrett Cooper | 2c28215 | 2010-12-16 00:55:50 -0800 | [diff] [blame] | 144 | /* |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 145 | * Verify expected failures, and then let the test to continue. |
| 146 | * |
| 147 | * Return 0 when a problem errno is found. |
| 148 | * Return 1 when a known issue is found. |
| 149 | * |
subrata_modak | 190c7ad | 2009-03-16 08:27:20 +0000 | [diff] [blame] | 150 | */ |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 151 | static int found_errno(const char *syscall, const char *obj, int tmperr) |
subrata_modak | 8a9ecb7 | 2008-05-26 06:09:19 +0000 | [diff] [blame] | 152 | { |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 153 | int i; |
subrata_modak | 8a9ecb7 | 2008-05-26 06:09:19 +0000 | [diff] [blame] | 154 | |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 155 | /* Should not see any error for certain entries if a LSM is enabled. */ |
| 156 | #ifdef HAVE_LIBSELINUX_DEVEL |
| 157 | if (is_selinux_enabled()) { |
| 158 | for (i = 0; lsm_should_work[i][0] != '\0'; i++) { |
| 159 | if (!strcmp(obj, lsm_should_work[i]) || |
| 160 | !fnmatch(lsm_should_work[i], obj, FNM_PATHNAME)) { |
| 161 | return 0; |
| 162 | } |
| 163 | } |
| 164 | } |
| 165 | #endif |
| 166 | for (i = 0; known_issues[i].err != 0; i++) { |
| 167 | if (tmperr == known_issues[i].err && |
| 168 | (!strcmp(obj, known_issues[i].file) || |
| 169 | !fnmatch(known_issues[i].file, obj, FNM_PATHNAME)) && |
| 170 | !strcmp(syscall, known_issues[i].func)) { |
| 171 | /* Using strcmp / fnmatch could have messed up the |
| 172 | * errno value. */ |
| 173 | errno = tmperr; |
| 174 | tst_resm(TINFO | TERRNO, "%s: known issue", obj); |
| 175 | return 1; |
| 176 | } |
| 177 | } |
Garrett Cooper | 2c28215 | 2010-12-16 00:55:50 -0800 | [diff] [blame] | 178 | return 0; |
subrata_modak | 8a9ecb7 | 2008-05-26 06:09:19 +0000 | [diff] [blame] | 179 | } |
| 180 | |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 181 | static void cleanup(void) |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 182 | { |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 183 | tst_rmdir(); |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 184 | } |
| 185 | |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 186 | static void setup(void) |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 187 | { |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 188 | tst_sig(FORK, DEF_HANDLER, cleanup); |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 189 | TEST_PAUSE; |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 190 | tst_tmpdir(); |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 191 | } |
| 192 | |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 193 | void help(void) |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 194 | { |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 195 | printf(" -b x read byte count\n"); |
Jan Stancek | 37bfeec | 2012-07-31 10:33:13 +0200 | [diff] [blame] | 196 | printf(" -m x max megabytes to read from single file\n"); |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 197 | printf(" -q read .../irq/... entries\n"); |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 198 | printf(" -r x proc pathname\n"); |
| 199 | printf(" -v verbose mode\n"); |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 200 | } |
| 201 | |
| 202 | /* |
| 203 | * add the -m option whose parameter is the |
| 204 | * pages that should be mapped. |
| 205 | */ |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 206 | static option_t options[] = { |
| 207 | {"b:", &opt_buffsize, &opt_buffsizestr}, |
| 208 | {"m:", &opt_maxmbytes, &opt_maxmbytesstr}, |
| 209 | {"q", &opt_readirq, NULL}, |
| 210 | {"r:", &opt_procpath, &opt_procpathstr}, |
| 211 | {"v", &opt_verbose, NULL}, |
| 212 | {NULL, NULL, NULL} |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 213 | }; |
| 214 | |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 215 | /* |
subrata_modak | 4bb656a | 2009-02-26 12:02:09 +0000 | [diff] [blame] | 216 | * NB: this function is recursive |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 217 | * returns 0 if no error encountered, otherwise number of errors (objs) |
| 218 | * |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 219 | * REM: Funny enough, while developing this function (actually replacing |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 220 | * streamed fopen by standard open), I hit a real /proc bug. |
| 221 | * On a 2.2.13-SuSE kernel, "cat /proc/tty/driver/serial" would fail |
| 222 | * with EFAULT, while "cat /proc/tty/driver/serial > somefile" wouldn't. |
| 223 | * Okay, this might be due to a slight serial misconfiguration, but still. |
| 224 | * Analysis with strace showed up the difference was on the count size |
| 225 | * of read (1024 bytes vs 4096 bytes). So I tested further.. |
subrata_modak | 4bb656a | 2009-02-26 12:02:09 +0000 | [diff] [blame] | 226 | * read count of 512 bytes adds /proc/tty/drivers to the list |
| 227 | * of broken proc files, while 64 bytes reads removes |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 228 | * /proc/tty/driver/serial from the list. Interesting, isn't it? |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 229 | * Now, there's a -b option to this test, so you can try your luck. --SF |
| 230 | * |
| 231 | * It's more fun to run this test it as root, as all the files will be accessible! |
| 232 | * (however, be careful, there might be some bufferoverflow holes..) |
| 233 | * reading proc files might be also a good kernel latency killer. |
| 234 | */ |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 235 | static long readproc(const char *obj) |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 236 | { |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 237 | DIR *dir = NULL; /* pointer to a directory */ |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 238 | struct dirent *dir_ent; /* pointer to directory entries */ |
| 239 | char dirobj[PATH_MAX]; /* object inside directory to modify */ |
| 240 | struct stat statbuf; /* used to hold stat information */ |
subrata_modak | 8a9ecb7 | 2008-05-26 06:09:19 +0000 | [diff] [blame] | 241 | int fd, tmperr, i; |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 242 | ssize_t nread; |
| 243 | static char buf[MAX_BUFF_SIZE]; /* static kills reentrancy, but we don't care about the contents */ |
Jan Stancek | 37bfeec | 2012-07-31 10:33:13 +0200 | [diff] [blame] | 244 | unsigned long long file_total_read = 0; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 245 | |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 246 | /* Determine the file type */ |
| 247 | if (lstat(obj, &statbuf) < 0) { |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 248 | |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 249 | /* permission denied is not considered as error */ |
| 250 | if (errno != EACCES) { |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 251 | tst_resm(TFAIL | TERRNO, "%s: lstat", obj); |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 252 | return 1; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 253 | } |
| 254 | return 0; |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 255 | |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 256 | } |
| 257 | |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 258 | /* Prevent loops, but read /proc/self. */ |
subrata_modak | ca317e6 | 2007-11-13 09:25:05 +0000 | [diff] [blame] | 259 | if (S_ISLNK(statbuf.st_mode) && strcmp(obj, selfpath)) |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 260 | return 0; |
| 261 | |
| 262 | total_obj++; |
| 263 | |
| 264 | /* Take appropriate action, depending on the file type */ |
subrata_modak | ca317e6 | 2007-11-13 09:25:05 +0000 | [diff] [blame] | 265 | if (S_ISDIR(statbuf.st_mode) || !strcmp(obj, selfpath)) { |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 266 | |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 267 | /* object is a directory */ |
| 268 | |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 269 | /* |
| 270 | * Skip over the /proc/irq directory, unless the user |
| 271 | * requested that we read the directory because it could |
| 272 | * map to a broken driver which effectively `hangs' the |
| 273 | * test. |
| 274 | */ |
yaberauneya | f0ff002 | 2009-11-24 06:37:15 +0000 | [diff] [blame] | 275 | if (!opt_readirq && !strcmp("/proc/irq", obj)) { |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 276 | return 0; |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 277 | /* Open the directory to get access to what is in it */ |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 278 | } else if ((dir = opendir(obj)) == NULL) { |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 279 | if (errno != EACCES) { |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 280 | tst_resm(TFAIL | TERRNO, "%s: opendir", obj); |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 281 | return 1; |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 282 | } |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 283 | return 0; |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 284 | } else { |
| 285 | |
| 286 | long ret_val = 0; |
| 287 | |
| 288 | /* Loop through the entries in the directory */ |
| 289 | for (dir_ent = (struct dirent *)readdir(dir); |
| 290 | dir_ent != NULL; |
| 291 | dir_ent = (struct dirent *)readdir(dir)) { |
| 292 | |
| 293 | /* Ignore ".", "..", "kcore", and |
| 294 | * "/proc/<pid>" (unless this is our |
| 295 | * starting point as directed by the |
| 296 | * user). |
| 297 | */ |
Garrett Cooper | df3eb16 | 2010-11-28 22:44:32 -0800 | [diff] [blame] | 298 | if (strcmp(dir_ent->d_name, ".") && |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 299 | strcmp(dir_ent->d_name, "..") && |
| 300 | strcmp(dir_ent->d_name, "kcore") && |
| 301 | (fnmatch("[0-9]*", dir_ent->d_name, |
| 302 | FNM_PATHNAME) || |
| 303 | strcmp(obj, procpath))) { |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 304 | |
| 305 | if (opt_verbose) { |
| 306 | fprintf(stderr, "%s\n", |
| 307 | dir_ent->d_name); |
| 308 | } |
| 309 | |
| 310 | /* Recursively call this routine to test the |
| 311 | * current entry */ |
| 312 | snprintf(dirobj, PATH_MAX, |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 313 | "%s/%s", obj, dir_ent->d_name); |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 314 | ret_val += readproc(dirobj); |
| 315 | |
| 316 | } |
| 317 | |
| 318 | } |
| 319 | |
| 320 | /* Close the directory */ |
| 321 | if (dir) |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 322 | (void)closedir(dir); |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 323 | |
| 324 | return ret_val; |
| 325 | |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 326 | } |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 327 | |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 328 | } else { /* if it's not a dir, read it! */ |
| 329 | |
| 330 | if (!S_ISREG(statbuf.st_mode)) |
| 331 | return 0; |
| 332 | |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 333 | #ifdef DEBUG |
| 334 | fprintf(stderr, "%s", obj); |
| 335 | #endif |
subrata_modak | 8a9ecb7 | 2008-05-26 06:09:19 +0000 | [diff] [blame] | 336 | |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 337 | /* is O_NONBLOCK enough to escape from FIFO's ? */ |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 338 | fd = open(obj, O_RDONLY | O_NONBLOCK); |
| 339 | if (fd < 0) { |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 340 | tmperr = errno; |
| 341 | |
| 342 | if (!found_errno("open", obj, tmperr)) { |
| 343 | |
| 344 | errno = tmperr; |
| 345 | |
| 346 | if (errno != EACCES) { |
| 347 | tst_resm(TFAIL | TERRNO, |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 348 | "%s: open failed", obj); |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 349 | return 1; |
| 350 | } |
| 351 | |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 352 | } |
| 353 | return 0; |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 354 | |
| 355 | } |
| 356 | |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 357 | /* Skip write-only files. */ |
| 358 | if ((statbuf.st_mode & S_IRUSR) == 0 && |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 359 | (statbuf.st_mode & S_IWUSR) != 0) { |
| 360 | tst_resm(TINFO, "%s: is write-only.", obj); |
| 361 | return 0; |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 362 | } |
| 363 | |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 364 | /* Skip files does not honor O_NONBLOCK. */ |
| 365 | for (i = 0; error_nonblock[i][0] != '\0'; i++) { |
| 366 | if (!strcmp(obj, error_nonblock[i])) { |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 367 | tst_resm(TWARN, "%s: does not honor " |
| 368 | "O_NONBLOCK", obj); |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 369 | return 0; |
| 370 | } |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 371 | } |
| 372 | |
Jan Stancek | 37bfeec | 2012-07-31 10:33:13 +0200 | [diff] [blame] | 373 | file_total_read = 0; |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 374 | do { |
| 375 | |
| 376 | nread = read(fd, buf, buffsize); |
| 377 | |
| 378 | if (nread < 0) { |
| 379 | |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 380 | tmperr = errno; |
| 381 | (void)close(fd); |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 382 | |
| 383 | /* ignore no perm (not root) and no |
| 384 | * process (terminated) errors */ |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 385 | if (!found_errno("read", obj, tmperr)) { |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 386 | |
| 387 | errno = tmperr; |
| 388 | |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 389 | if (errno != EACCES && errno != ESRCH) { |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 390 | tst_resm(TFAIL | TERRNO, |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 391 | "read failed: " |
| 392 | "%s", obj); |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 393 | return 1; |
| 394 | } |
| 395 | return 0; |
| 396 | |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 397 | } |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 398 | |
Jan Stancek | 37bfeec | 2012-07-31 10:33:13 +0200 | [diff] [blame] | 399 | } else |
| 400 | file_total_read += nread; |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 401 | |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 402 | if (opt_verbose) { |
| 403 | #ifdef DEBUG |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 404 | fprintf(stderr, "%ld", nread); |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 405 | #endif |
subrata_modak | 2f4de1d | 2008-05-26 06:10:16 +0000 | [diff] [blame] | 406 | fprintf(stderr, "."); |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 407 | } |
| 408 | |
Jan Stancek | 37bfeec | 2012-07-31 10:33:13 +0200 | [diff] [blame] | 409 | if ((maxbytes > 0) && (file_total_read > maxbytes)) { |
| 410 | tst_resm(TINFO, "%s: reached maxmbytes (-m)", |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 411 | obj); |
Jan Stancek | 37bfeec | 2012-07-31 10:33:13 +0200 | [diff] [blame] | 412 | break; |
| 413 | } |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 414 | } while (0 < nread); |
Jan Stancek | 37bfeec | 2012-07-31 10:33:13 +0200 | [diff] [blame] | 415 | total_read += file_total_read; |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 416 | |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 417 | if (opt_verbose) |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 418 | fprintf(stderr, "\n"); |
| 419 | |
| 420 | if (0 <= fd) |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 421 | (void)close(fd); |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 422 | |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 423 | } |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 424 | |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 425 | /* It's better to assume success by default rather than failure. */ |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 426 | return 0; |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 427 | |
plars | 865695b | 2001-08-27 22:15:12 +0000 | [diff] [blame] | 428 | } |
| 429 | |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 430 | int main(int argc, char *argv[]) |
| 431 | { |
Cyril Hrubis | 0b9589f | 2014-05-27 17:40:33 +0200 | [diff] [blame] | 432 | const char *msg; |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 433 | int lc; |
| 434 | |
Wanlong Gao | 14259b0 | 2012-11-12 14:02:46 +0800 | [diff] [blame] | 435 | msg = parse_opts(argc, argv, options, help); |
| 436 | if (msg != NULL) |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 437 | tst_brkm(TBROK, cleanup, "OPTION PARSING ERROR - %s", msg); |
| 438 | |
| 439 | if (opt_buffsize) { |
| 440 | size_t bs; |
| 441 | bs = atoi(opt_buffsizestr); |
| 442 | if (bs <= MAX_BUFF_SIZE) |
| 443 | buffsize = bs; |
| 444 | else |
| 445 | tst_brkm(TBROK, cleanup, |
| 446 | "Invalid arg for -b (max: %u): %s", |
| 447 | MAX_BUFF_SIZE, opt_buffsizestr); |
| 448 | } |
Jan Stancek | 37bfeec | 2012-07-31 10:33:13 +0200 | [diff] [blame] | 449 | if (opt_maxmbytes) |
| 450 | maxbytes = atoi(opt_maxmbytesstr) * 1024 * 1024; |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 451 | |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 452 | if (opt_procpath) |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 453 | procpath = opt_procpathstr; |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 454 | |
| 455 | setup(); |
| 456 | |
| 457 | for (lc = 0; TEST_LOOPING(lc); lc++) { |
Caspar Zhang | d59a659 | 2013-03-07 14:59:12 +0800 | [diff] [blame] | 458 | tst_count = 0; |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 459 | |
| 460 | TEST(readproc(procpath)); |
| 461 | |
| 462 | if (TEST_RETURN != 0) { |
subrata_modak | da124b9 | 2009-10-13 14:00:45 +0000 | [diff] [blame] | 463 | tst_resm(TFAIL, "readproc() failed with %ld errors.", |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 464 | TEST_RETURN); |
| 465 | } else { |
| 466 | tst_resm(TPASS, "readproc() completed successfully, " |
yaberauneya | da96356 | 2009-11-15 08:21:45 +0000 | [diff] [blame] | 467 | "total read: %llu bytes, %u objs", total_read, |
vapier | 10fe5d8 | 2006-08-21 07:16:54 +0000 | [diff] [blame] | 468 | total_obj); |
| 469 | } |
| 470 | } |
| 471 | |
| 472 | cleanup(); |
Garrett Cooper | 2c28215 | 2010-12-16 00:55:50 -0800 | [diff] [blame] | 473 | tst_exit(); |
Jan Stancek | 37bfeec | 2012-07-31 10:33:13 +0200 | [diff] [blame] | 474 | } |