s4-lib/socket: Return the original EMSGSIZE when sendto() and setsockopt() both fail
[Samba/id10ts.git] / lib / tdb / test / run-corrupt.c
blob1a3c769183243aad665e77784c1fb129d5b4ffe3
1 #include "../common/tdb_private.h"
2 #include "../common/io.c"
3 #include "../common/tdb.c"
4 #include "../common/lock.c"
5 #include "../common/freelist.c"
6 #include "../common/traverse.c"
7 #include "../common/transaction.c"
8 #include "../common/error.c"
9 #include "../common/open.c"
10 #include "../common/check.c"
11 #include "../common/hash.c"
12 #include "tap-interface.h"
13 #include <stdlib.h>
14 #include "logging.h"
16 static int check(TDB_DATA key, TDB_DATA data, void *private)
18 unsigned int *sizes = private;
20 if (key.dsize > strlen("hello"))
21 return -1;
22 if (memcmp(key.dptr, "hello", key.dsize) != 0)
23 return -1;
25 if (data.dsize != strlen("world"))
26 return -1;
27 if (memcmp(data.dptr, "world", data.dsize) != 0)
28 return -1;
30 sizes[0] += key.dsize;
31 sizes[1] += data.dsize;
32 return 0;
35 static void tdb_flip_bit(struct tdb_context *tdb, unsigned int bit)
37 unsigned int off = bit / CHAR_BIT;
38 unsigned char mask = (1 << (bit % CHAR_BIT));
40 if (tdb->map_ptr)
41 ((unsigned char *)tdb->map_ptr)[off] ^= mask;
42 else {
43 unsigned char c;
44 if (pread(tdb->fd, &c, 1, off) != 1) {
45 fprintf(stderr, "pread: %s\n", strerror(errno));
46 exit(1);
48 c ^= mask;
49 if (pwrite(tdb->fd, &c, 1, off) != 1) {
50 fprintf(stderr, "pwrite: %s\n", strerror(errno));
51 exit(1);
56 static void check_test(struct tdb_context *tdb)
58 TDB_DATA key, data;
59 unsigned int i, verifiable, corrupt, sizes[2], dsize, ksize;
61 ok1(tdb_check(tdb, NULL, NULL) == 0);
63 key.dptr = (void *)"hello";
64 data.dsize = strlen("world");
65 data.dptr = (void *)"world";
67 /* Key and data size respectively. */
68 dsize = ksize = 0;
70 /* 5 keys in hash size 2 means we'll have multichains. */
71 for (key.dsize = 1; key.dsize <= 5; key.dsize++) {
72 ksize += key.dsize;
73 dsize += data.dsize;
74 if (tdb_store(tdb, key, data, TDB_INSERT) != 0)
75 abort();
78 /* This is how many bytes we expect to be verifiable. */
79 /* From the file header. */
80 verifiable = strlen(TDB_MAGIC_FOOD) + 1
81 + 2 * sizeof(uint32_t) + 2 * sizeof(tdb_off_t)
82 + 2 * sizeof(uint32_t);
83 /* From the free list chain and hash chains. */
84 verifiable += 3 * sizeof(tdb_off_t);
85 /* From the record headers & tailer */
86 verifiable += 5 * (sizeof(struct tdb_record) + sizeof(uint32_t));
87 /* The free block: we ignore datalen, keylen, full_hash. */
88 verifiable += sizeof(struct tdb_record) - 3*sizeof(uint32_t) +
89 sizeof(uint32_t);
90 /* Our check function verifies the key and data. */
91 verifiable += ksize + dsize;
93 /* Flip one bit at a time, make sure it detects verifiable bytes. */
94 for (i = 0, corrupt = 0; i < tdb->map_size * CHAR_BIT; i++) {
95 tdb_flip_bit(tdb, i);
96 memset(sizes, 0, sizeof(sizes));
97 if (tdb_check(tdb, check, sizes) != 0)
98 corrupt++;
99 else if (sizes[0] != ksize || sizes[1] != dsize)
100 corrupt++;
101 tdb_flip_bit(tdb, i);
103 ok(corrupt == verifiable * CHAR_BIT, "corrupt %u should be %u",
104 corrupt, verifiable * CHAR_BIT);
107 int main(int argc, char *argv[])
109 struct tdb_context *tdb;
111 plan_tests(4);
112 /* This should use mmap. */
113 tdb = tdb_open_ex("run-corrupt.tdb", 2, TDB_CLEAR_IF_FIRST,
114 O_CREAT|O_TRUNC|O_RDWR, 0600, &taplogctx, NULL);
116 if (!tdb)
117 abort();
118 check_test(tdb);
119 tdb_close(tdb);
121 /* This should not. */
122 tdb = tdb_open_ex("run-corrupt.tdb", 2, TDB_CLEAR_IF_FIRST|TDB_NOMMAP,
123 O_CREAT|O_TRUNC|O_RDWR, 0600, &taplogctx, NULL);
125 if (!tdb)
126 abort();
127 check_test(tdb);
128 tdb_close(tdb);
130 return exit_status();