1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
|
/*
** The following test program tries the pathconf(2) routine. It should
** be run in a non-NFS-mounted directory (e.g., /tmp) and on remote (NFS)
** mounted directories running both NFS-v2 and NFS-v3 from systems that
** both do and do not permit file giveaway.
*/
#include <sys/types.h>
#include <errno.h>
#include <fcntl.h>
#include <stdio.h>
#include <unistd.h>
#ifdef EX_OK
# undef EX_OK /* unistd.h may have another use for this */
#endif /* EX_OK */
#include <sysexits.h>
#ifndef lint
static char id[] = "@(#)$Sendmail: t_pathconf.c,v 8.5 1999/08/28 00:25:28 gshapiro Exp $";
#endif /* ! lint */
int
main(argc, argv)
int argc;
char **argv;
{
int fd;
int i;
char tbuf[100];
extern int errno;
if (geteuid() == 0)
{
printf("*** Run me as a non-root user! ***\n");
exit(EX_USAGE);
}
strcpy(tbuf, "TXXXXXX");
fd = mkstemp(tbuf);
if (fd < 0)
{
printf("*** Could not create test file %s\n", tbuf);
exit(EX_CANTCREAT);
}
errno = 0;
i = pathconf(".", _PC_CHOWN_RESTRICTED);
printf("pathconf(.) returns %2d, errno = %d\n", i, errno);
errno = 0;
i = pathconf(tbuf, _PC_CHOWN_RESTRICTED);
printf("pathconf(%s) returns %2d, errno = %d\n", tbuf, i, errno);
errno = 0;
i = fpathconf(fd, _PC_CHOWN_RESTRICTED);
printf("fpathconf(%s) returns %2d, errno = %d\n", tbuf, i, errno);
if (errno == 0 && i >= 0)
{
/* so it claims that it doesn't work -- try anyhow */
printf(" fpathconf claims that chown is safe ");
if (fchown(fd, 1, 1) >= 0)
printf("*** but fchown works anyhow! ***\n");
else
printf("and fchown agrees\n");
}
else
{
/* well, let's see what really happens */
printf(" fpathconf claims that chown is not safe ");
if (fchown(fd, 1, 1) >= 0)
printf("as indeed it is not\n");
else
printf("*** but in fact it is safe ***\n");
}
(void) unlink(tbuf);
exit(EX_OK);
}
|