1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
5 #include "alloc-util.h"
6 #include "chase-symlinks.h"
11 #include "id128-util.h"
14 #include "path-util.h"
15 #include "random-util.h"
17 #include "stdio-util.h"
18 #include "string-util.h"
20 #include "sync-util.h"
22 #include "tmpfile-util.h"
23 #include "umask-util.h"
24 #include "user-util.h"
27 static const char *arg_test_dir
= NULL
;
29 TEST(chase_symlinks
) {
30 _cleanup_free_
char *result
= NULL
, *pwd
= NULL
;
31 _cleanup_close_
int pfd
= -EBADF
;
33 const char *top
, *p
, *pslash
, *q
, *qslash
;
37 temp
= strjoina(arg_test_dir
?: "/tmp", "/test-chase.XXXXXX");
38 assert_se(mkdtemp(temp
));
40 top
= strjoina(temp
, "/top");
41 assert_se(mkdir(top
, 0700) >= 0);
43 p
= strjoina(top
, "/dot");
44 if (symlink(".", p
) < 0) {
45 assert_se(IN_SET(errno
, EINVAL
, ENOSYS
, ENOTTY
, EPERM
));
46 log_tests_skipped_errno(errno
, "symlink() not possible");
50 p
= strjoina(top
, "/dotdot");
51 assert_se(symlink("..", p
) >= 0);
53 p
= strjoina(top
, "/dotdota");
54 assert_se(symlink("../a", p
) >= 0);
56 p
= strjoina(temp
, "/a");
57 assert_se(symlink("b", p
) >= 0);
59 p
= strjoina(temp
, "/b");
60 assert_se(symlink("/usr", p
) >= 0);
62 p
= strjoina(temp
, "/start");
63 assert_se(symlink("top/dot/dotdota", p
) >= 0);
65 /* Paths that use symlinks underneath the "root" */
67 r
= chase_symlinks(p
, NULL
, 0, &result
, NULL
);
69 assert_se(path_equal(result
, "/usr"));
70 result
= mfree(result
);
72 pslash
= strjoina(p
, "/");
73 r
= chase_symlinks(pslash
, NULL
, 0, &result
, NULL
);
75 assert_se(path_equal(result
, "/usr/"));
76 result
= mfree(result
);
78 r
= chase_symlinks(p
, temp
, 0, &result
, NULL
);
79 assert_se(r
== -ENOENT
);
81 r
= chase_symlinks(pslash
, temp
, 0, &result
, NULL
);
82 assert_se(r
== -ENOENT
);
84 q
= strjoina(temp
, "/usr");
86 r
= chase_symlinks(p
, temp
, CHASE_NONEXISTENT
, &result
, NULL
);
88 assert_se(path_equal(result
, q
));
89 result
= mfree(result
);
91 qslash
= strjoina(q
, "/");
93 r
= chase_symlinks(pslash
, temp
, CHASE_NONEXISTENT
, &result
, NULL
);
95 assert_se(path_equal(result
, qslash
));
96 result
= mfree(result
);
98 assert_se(mkdir(q
, 0700) >= 0);
100 r
= chase_symlinks(p
, temp
, 0, &result
, NULL
);
102 assert_se(path_equal(result
, q
));
103 result
= mfree(result
);
105 r
= chase_symlinks(pslash
, temp
, 0, &result
, NULL
);
107 assert_se(path_equal(result
, qslash
));
108 result
= mfree(result
);
110 p
= strjoina(temp
, "/slash");
111 assert_se(symlink("/", p
) >= 0);
113 r
= chase_symlinks(p
, NULL
, 0, &result
, NULL
);
115 assert_se(path_equal(result
, "/"));
116 result
= mfree(result
);
118 r
= chase_symlinks(p
, temp
, 0, &result
, NULL
);
120 assert_se(path_equal(result
, temp
));
121 result
= mfree(result
);
123 /* Paths that would "escape" outside of the "root" */
125 p
= strjoina(temp
, "/6dots");
126 assert_se(symlink("../../..", p
) >= 0);
128 r
= chase_symlinks(p
, temp
, 0, &result
, NULL
);
129 assert_se(r
> 0 && path_equal(result
, temp
));
130 result
= mfree(result
);
132 p
= strjoina(temp
, "/6dotsusr");
133 assert_se(symlink("../../../usr", p
) >= 0);
135 r
= chase_symlinks(p
, temp
, 0, &result
, NULL
);
136 assert_se(r
> 0 && path_equal(result
, q
));
137 result
= mfree(result
);
139 p
= strjoina(temp
, "/top/8dotsusr");
140 assert_se(symlink("../../../../usr", p
) >= 0);
142 r
= chase_symlinks(p
, temp
, 0, &result
, NULL
);
143 assert_se(r
> 0 && path_equal(result
, q
));
144 result
= mfree(result
);
146 /* Paths that contain repeated slashes */
148 p
= strjoina(temp
, "/slashslash");
149 assert_se(symlink("///usr///", p
) >= 0);
151 r
= chase_symlinks(p
, NULL
, 0, &result
, NULL
);
153 assert_se(path_equal(result
, "/usr"));
154 assert_se(streq(result
, "/usr")); /* we guarantee that we drop redundant slashes */
155 result
= mfree(result
);
157 r
= chase_symlinks(p
, temp
, 0, &result
, NULL
);
159 assert_se(path_equal(result
, q
));
160 result
= mfree(result
);
162 /* Paths underneath the "root" with different UIDs while using CHASE_SAFE */
164 if (geteuid() == 0) {
165 p
= strjoina(temp
, "/user");
166 assert_se(mkdir(p
, 0755) >= 0);
167 assert_se(chown(p
, UID_NOBODY
, GID_NOBODY
) >= 0);
169 q
= strjoina(temp
, "/user/root");
170 assert_se(mkdir(q
, 0755) >= 0);
172 p
= strjoina(q
, "/link");
173 assert_se(symlink("/", p
) >= 0);
175 /* Fail when user-owned directories contain root-owned subdirectories. */
176 r
= chase_symlinks(p
, temp
, CHASE_SAFE
, &result
, NULL
);
177 assert_se(r
== -ENOLINK
);
178 result
= mfree(result
);
180 /* Allow this when the user-owned directories are all in the "root". */
181 r
= chase_symlinks(p
, q
, CHASE_SAFE
, &result
, NULL
);
183 result
= mfree(result
);
188 r
= chase_symlinks("/etc/./.././", NULL
, 0, &result
, NULL
);
190 assert_se(path_equal(result
, "/"));
191 result
= mfree(result
);
193 r
= chase_symlinks("/etc/./.././", "/etc", 0, &result
, NULL
);
194 assert_se(r
> 0 && path_equal(result
, "/etc"));
195 result
= mfree(result
);
197 r
= chase_symlinks("/../.././//../../etc", NULL
, 0, &result
, NULL
);
199 assert_se(streq(result
, "/etc"));
200 result
= mfree(result
);
202 r
= chase_symlinks("/../.././//../../test-chase.fsldajfl", NULL
, CHASE_NONEXISTENT
, &result
, NULL
);
204 assert_se(streq(result
, "/test-chase.fsldajfl"));
205 result
= mfree(result
);
207 r
= chase_symlinks("/../.././//../../etc", "/", CHASE_PREFIX_ROOT
, &result
, NULL
);
209 assert_se(streq(result
, "/etc"));
210 result
= mfree(result
);
212 r
= chase_symlinks("/../.././//../../test-chase.fsldajfl", "/", CHASE_PREFIX_ROOT
|CHASE_NONEXISTENT
, &result
, NULL
);
214 assert_se(streq(result
, "/test-chase.fsldajfl"));
215 result
= mfree(result
);
217 r
= chase_symlinks("/etc/machine-id/foo", NULL
, 0, &result
, NULL
);
218 assert_se(IN_SET(r
, -ENOTDIR
, -ENOENT
));
219 result
= mfree(result
);
221 /* Path that loops back to self */
223 p
= strjoina(temp
, "/recursive-symlink");
224 assert_se(symlink("recursive-symlink", p
) >= 0);
225 r
= chase_symlinks(p
, NULL
, 0, &result
, NULL
);
226 assert_se(r
== -ELOOP
);
228 /* Path which doesn't exist */
230 p
= strjoina(temp
, "/idontexist");
231 r
= chase_symlinks(p
, NULL
, 0, &result
, NULL
);
232 assert_se(r
== -ENOENT
);
234 r
= chase_symlinks(p
, NULL
, CHASE_NONEXISTENT
, &result
, NULL
);
236 assert_se(path_equal(result
, p
));
237 result
= mfree(result
);
239 p
= strjoina(temp
, "/idontexist/meneither");
240 r
= chase_symlinks(p
, NULL
, 0, &result
, NULL
);
241 assert_se(r
== -ENOENT
);
243 r
= chase_symlinks(p
, NULL
, CHASE_NONEXISTENT
, &result
, NULL
);
245 assert_se(path_equal(result
, p
));
246 result
= mfree(result
);
250 assert_se(safe_getcwd(&pwd
) >= 0);
252 assert_se(chdir(temp
) >= 0);
254 p
= "this/is/a/relative/path";
255 r
= chase_symlinks(p
, NULL
, CHASE_NONEXISTENT
, &result
, NULL
);
258 p
= strjoina(temp
, "/", p
);
259 assert_se(path_equal(result
, p
));
260 result
= mfree(result
);
262 p
= "this/is/a/relative/path";
263 r
= chase_symlinks(p
, temp
, CHASE_NONEXISTENT
, &result
, NULL
);
266 p
= strjoina(temp
, "/", p
);
267 assert_se(path_equal(result
, p
));
268 result
= mfree(result
);
270 assert_se(chdir(pwd
) >= 0);
272 /* Path which doesn't exist, but contains weird stuff */
274 p
= strjoina(temp
, "/idontexist/..");
275 r
= chase_symlinks(p
, NULL
, 0, &result
, NULL
);
276 assert_se(r
== -ENOENT
);
278 r
= chase_symlinks(p
, NULL
, CHASE_NONEXISTENT
, &result
, NULL
);
279 assert_se(r
== -ENOENT
);
281 p
= strjoina(temp
, "/target");
282 q
= strjoina(temp
, "/top");
283 assert_se(symlink(q
, p
) >= 0);
284 p
= strjoina(temp
, "/target/idontexist");
285 r
= chase_symlinks(p
, NULL
, 0, &result
, NULL
);
286 assert_se(r
== -ENOENT
);
288 if (geteuid() == 0) {
289 p
= strjoina(temp
, "/priv1");
290 assert_se(mkdir(p
, 0755) >= 0);
292 q
= strjoina(p
, "/priv2");
293 assert_se(mkdir(q
, 0755) >= 0);
295 assert_se(chase_symlinks(q
, NULL
, CHASE_SAFE
, NULL
, NULL
) >= 0);
297 assert_se(chown(q
, UID_NOBODY
, GID_NOBODY
) >= 0);
298 assert_se(chase_symlinks(q
, NULL
, CHASE_SAFE
, NULL
, NULL
) >= 0);
300 assert_se(chown(p
, UID_NOBODY
, GID_NOBODY
) >= 0);
301 assert_se(chase_symlinks(q
, NULL
, CHASE_SAFE
, NULL
, NULL
) >= 0);
303 assert_se(chown(q
, 0, 0) >= 0);
304 assert_se(chase_symlinks(q
, NULL
, CHASE_SAFE
, NULL
, NULL
) == -ENOLINK
);
306 assert_se(rmdir(q
) >= 0);
307 assert_se(symlink("/etc/passwd", q
) >= 0);
308 assert_se(chase_symlinks(q
, NULL
, CHASE_SAFE
, NULL
, NULL
) == -ENOLINK
);
310 assert_se(chown(p
, 0, 0) >= 0);
311 assert_se(chase_symlinks(q
, NULL
, CHASE_SAFE
, NULL
, NULL
) >= 0);
314 p
= strjoina(temp
, "/machine-id-test");
315 assert_se(symlink("/usr/../etc/./machine-id", p
) >= 0);
317 r
= chase_symlinks(p
, NULL
, 0, NULL
, &pfd
);
318 if (r
!= -ENOENT
&& sd_id128_get_machine(NULL
) >= 0) {
319 _cleanup_close_
int fd
= -EBADF
;
324 fd
= fd_reopen(pfd
, O_RDONLY
|O_CLOEXEC
);
328 assert_se(id128_read_fd(fd
, ID128_FORMAT_PLAIN
, &a
) >= 0);
329 assert_se(sd_id128_get_machine(&b
) >= 0);
330 assert_se(sd_id128_equal(a
, b
));
333 assert_se(lstat(p
, &st
) >= 0);
334 r
= chase_symlinks_and_unlink(p
, NULL
, 0, 0, &result
);
335 assert_se(path_equal(result
, p
));
336 result
= mfree(result
);
338 assert_se(lstat(p
, &st
) == -1 && errno
== ENOENT
);
340 /* Test CHASE_NOFOLLOW */
342 p
= strjoina(temp
, "/target");
343 q
= strjoina(temp
, "/symlink");
344 assert_se(symlink(p
, q
) >= 0);
345 r
= chase_symlinks(q
, NULL
, CHASE_NOFOLLOW
, &result
, &pfd
);
348 assert_se(path_equal(result
, q
));
349 assert_se(fstat(pfd
, &st
) >= 0);
350 assert_se(S_ISLNK(st
.st_mode
));
351 result
= mfree(result
);
352 pfd
= safe_close(pfd
);
354 /* s1 -> s2 -> nonexistent */
355 q
= strjoina(temp
, "/s1");
356 assert_se(symlink("s2", q
) >= 0);
357 p
= strjoina(temp
, "/s2");
358 assert_se(symlink("nonexistent", p
) >= 0);
359 r
= chase_symlinks(q
, NULL
, CHASE_NOFOLLOW
, &result
, &pfd
);
362 assert_se(path_equal(result
, q
));
363 assert_se(fstat(pfd
, &st
) >= 0);
364 assert_se(S_ISLNK(st
.st_mode
));
365 result
= mfree(result
);
366 pfd
= safe_close(pfd
);
368 /* Test CHASE_STEP */
370 p
= strjoina(temp
, "/start");
371 r
= chase_symlinks(p
, NULL
, CHASE_STEP
, &result
, NULL
);
373 p
= strjoina(temp
, "/top/dot/dotdota");
374 assert_se(streq(p
, result
));
375 result
= mfree(result
);
377 r
= chase_symlinks(p
, NULL
, CHASE_STEP
, &result
, NULL
);
379 p
= strjoina(temp
, "/top/dotdota");
380 assert_se(streq(p
, result
));
381 result
= mfree(result
);
383 r
= chase_symlinks(p
, NULL
, CHASE_STEP
, &result
, NULL
);
385 p
= strjoina(temp
, "/top/../a");
386 assert_se(streq(p
, result
));
387 result
= mfree(result
);
389 r
= chase_symlinks(p
, NULL
, CHASE_STEP
, &result
, NULL
);
391 p
= strjoina(temp
, "/a");
392 assert_se(streq(p
, result
));
393 result
= mfree(result
);
395 r
= chase_symlinks(p
, NULL
, CHASE_STEP
, &result
, NULL
);
397 p
= strjoina(temp
, "/b");
398 assert_se(streq(p
, result
));
399 result
= mfree(result
);
401 r
= chase_symlinks(p
, NULL
, CHASE_STEP
, &result
, NULL
);
403 assert_se(streq("/usr", result
));
404 result
= mfree(result
);
406 r
= chase_symlinks("/usr", NULL
, CHASE_STEP
, &result
, NULL
);
408 assert_se(streq("/usr", result
));
409 result
= mfree(result
);
411 /* Make sure that symlinks in the "root" path are not resolved, but those below are */
412 p
= strjoina("/etc/..", temp
, "/self");
413 assert_se(symlink(".", p
) >= 0);
414 q
= strjoina(p
, "/top/dot/dotdota");
415 r
= chase_symlinks(q
, p
, 0, &result
, NULL
);
417 assert_se(path_equal(path_startswith(result
, p
), "usr"));
418 result
= mfree(result
);
420 /* Test CHASE_PROHIBIT_SYMLINKS */
422 assert_se(chase_symlinks("top/dot", temp
, CHASE_PREFIX_ROOT
|CHASE_PROHIBIT_SYMLINKS
, NULL
, NULL
) == -EREMCHG
);
423 assert_se(chase_symlinks("top/dot", temp
, CHASE_PREFIX_ROOT
|CHASE_PROHIBIT_SYMLINKS
|CHASE_WARN
, NULL
, NULL
) == -EREMCHG
);
424 assert_se(chase_symlinks("top/dotdot", temp
, CHASE_PREFIX_ROOT
|CHASE_PROHIBIT_SYMLINKS
, NULL
, NULL
) == -EREMCHG
);
425 assert_se(chase_symlinks("top/dotdot", temp
, CHASE_PREFIX_ROOT
|CHASE_PROHIBIT_SYMLINKS
|CHASE_WARN
, NULL
, NULL
) == -EREMCHG
);
426 assert_se(chase_symlinks("top/dot/dot", temp
, CHASE_PREFIX_ROOT
|CHASE_PROHIBIT_SYMLINKS
, NULL
, NULL
) == -EREMCHG
);
427 assert_se(chase_symlinks("top/dot/dot", temp
, CHASE_PREFIX_ROOT
|CHASE_PROHIBIT_SYMLINKS
|CHASE_WARN
, NULL
, NULL
) == -EREMCHG
);
430 assert_se(rm_rf(temp
, REMOVE_ROOT
|REMOVE_PHYSICAL
) >= 0);
433 TEST(unlink_noerrno
) {
437 name
= strjoina(arg_test_dir
?: "/tmp", "/test-close_nointr.XXXXXX");
438 fd
= mkostemp_safe(name
);
440 assert_se(close_nointr(fd
) >= 0);
445 assert_se(unlink_noerrno(name
) >= 0);
446 assert_se(errno
== 42);
447 assert_se(unlink_noerrno(name
) < 0);
448 assert_se(errno
== 42);
452 TEST(readlink_and_make_absolute
) {
453 const char *tempdir
, *name
, *name2
, *name_alias
;
454 _cleanup_free_
char *r1
= NULL
, *r2
= NULL
, *pwd
= NULL
;
456 tempdir
= strjoina(arg_test_dir
?: "/tmp", "/test-readlink_and_make_absolute");
457 name
= strjoina(tempdir
, "/original");
458 name2
= "test-readlink_and_make_absolute/original";
459 name_alias
= strjoina(arg_test_dir
?: "/tmp", "/test-readlink_and_make_absolute-alias");
461 assert_se(mkdir_safe(tempdir
, 0755, getuid(), getgid(), MKDIR_WARN_MODE
) >= 0);
462 assert_se(touch(name
) >= 0);
464 if (symlink(name
, name_alias
) < 0) {
465 assert_se(IN_SET(errno
, EINVAL
, ENOSYS
, ENOTTY
, EPERM
));
466 log_tests_skipped_errno(errno
, "symlink() not possible");
468 assert_se(readlink_and_make_absolute(name_alias
, &r1
) >= 0);
469 assert_se(streq(r1
, name
));
470 assert_se(unlink(name_alias
) >= 0);
472 assert_se(safe_getcwd(&pwd
) >= 0);
474 assert_se(chdir(tempdir
) >= 0);
475 assert_se(symlink(name2
, name_alias
) >= 0);
476 assert_se(readlink_and_make_absolute(name_alias
, &r2
) >= 0);
477 assert_se(streq(r2
, name
));
478 assert_se(unlink(name_alias
) >= 0);
480 assert_se(chdir(pwd
) >= 0);
483 assert_se(rm_rf(tempdir
, REMOVE_ROOT
|REMOVE_PHYSICAL
) >= 0);
486 TEST(get_files_in_directory
) {
487 _cleanup_strv_free_
char **l
= NULL
, **t
= NULL
;
489 assert_se(get_files_in_directory(arg_test_dir
?: "/tmp", &l
) >= 0);
490 assert_se(get_files_in_directory(".", &t
) >= 0);
491 assert_se(get_files_in_directory(".", NULL
) >= 0);
495 _cleanup_free_
char *tmpdir_backup
= NULL
, *temp_backup
= NULL
, *tmp_backup
= NULL
;
496 const char *tmp_dir
= NULL
, *t
;
498 t
= getenv("TMPDIR");
500 tmpdir_backup
= strdup(t
);
501 assert_se(tmpdir_backup
);
506 temp_backup
= strdup(t
);
507 assert_se(temp_backup
);
512 tmp_backup
= strdup(t
);
513 assert_se(tmp_backup
);
516 assert_se(unsetenv("TMPDIR") >= 0);
517 assert_se(unsetenv("TEMP") >= 0);
518 assert_se(unsetenv("TMP") >= 0);
520 assert_se(var_tmp_dir(&tmp_dir
) >= 0);
521 assert_se(streq(tmp_dir
, "/var/tmp"));
523 assert_se(setenv("TMPDIR", "/tmp", true) >= 0);
524 assert_se(streq(getenv("TMPDIR"), "/tmp"));
526 assert_se(var_tmp_dir(&tmp_dir
) >= 0);
527 assert_se(streq(tmp_dir
, "/tmp"));
529 assert_se(setenv("TMPDIR", "/88_does_not_exist_88", true) >= 0);
530 assert_se(streq(getenv("TMPDIR"), "/88_does_not_exist_88"));
532 assert_se(var_tmp_dir(&tmp_dir
) >= 0);
533 assert_se(streq(tmp_dir
, "/var/tmp"));
536 assert_se(setenv("TMPDIR", tmpdir_backup
, true) >= 0);
537 assert_se(streq(getenv("TMPDIR"), tmpdir_backup
));
541 assert_se(setenv("TEMP", temp_backup
, true) >= 0);
542 assert_se(streq(getenv("TEMP"), temp_backup
));
546 assert_se(setenv("TMP", tmp_backup
, true) >= 0);
547 assert_se(streq(getenv("TMP"), tmp_backup
));
551 TEST(dot_or_dot_dot
) {
552 assert_se(!dot_or_dot_dot(NULL
));
553 assert_se(!dot_or_dot_dot(""));
554 assert_se(!dot_or_dot_dot("xxx"));
555 assert_se(dot_or_dot_dot("."));
556 assert_se(dot_or_dot_dot(".."));
557 assert_se(!dot_or_dot_dot(".foo"));
558 assert_se(!dot_or_dot_dot("..foo"));
562 _cleanup_(rmdir_and_freep
) char *p
= NULL
;
563 _cleanup_close_
int fd
= -EBADF
;
566 a
= strjoina(arg_test_dir
?: "/tmp", "/access-fd.XXXXXX");
567 assert_se(mkdtemp_malloc(a
, &p
) >= 0);
569 fd
= open(p
, O_RDONLY
|O_DIRECTORY
|O_CLOEXEC
);
572 assert_se(access_fd(fd
, R_OK
) >= 0);
573 assert_se(access_fd(fd
, F_OK
) >= 0);
574 assert_se(access_fd(fd
, W_OK
) >= 0);
576 assert_se(fchmod(fd
, 0000) >= 0);
578 assert_se(access_fd(fd
, F_OK
) >= 0);
580 if (geteuid() == 0) {
581 assert_se(access_fd(fd
, R_OK
) >= 0);
582 assert_se(access_fd(fd
, W_OK
) >= 0);
584 assert_se(access_fd(fd
, R_OK
) == -EACCES
);
585 assert_se(access_fd(fd
, W_OK
) == -EACCES
);
590 uid_t test_uid
, test_gid
;
591 _cleanup_(rm_rf_physical_and_freep
) char *p
= NULL
;
597 test_uid
= geteuid() == 0 ? 65534 : getuid();
598 test_gid
= geteuid() == 0 ? 65534 : getgid();
600 test_mtime
= usec_sub_unsigned(now(CLOCK_REALTIME
), USEC_PER_WEEK
);
602 a
= strjoina(arg_test_dir
?: "/dev/shm", "/touch-file-XXXXXX");
603 assert_se(mkdtemp_malloc(a
, &p
) >= 0);
605 a
= strjoina(p
, "/regular");
606 r
= touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640);
608 assert_se(IN_SET(r
, -EINVAL
, -ENOSYS
, -ENOTTY
, -EPERM
));
609 log_tests_skipped_errno(errno
, "touch_file() not possible");
613 assert_se(lstat(a
, &st
) >= 0);
614 assert_se(st
.st_uid
== test_uid
);
615 assert_se(st
.st_gid
== test_gid
);
616 assert_se(S_ISREG(st
.st_mode
));
617 assert_se((st
.st_mode
& 0777) == 0640);
618 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
620 a
= strjoina(p
, "/dir");
621 assert_se(mkdir(a
, 0775) >= 0);
622 assert_se(touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640) >= 0);
623 assert_se(lstat(a
, &st
) >= 0);
624 assert_se(st
.st_uid
== test_uid
);
625 assert_se(st
.st_gid
== test_gid
);
626 assert_se(S_ISDIR(st
.st_mode
));
627 assert_se((st
.st_mode
& 0777) == 0640);
628 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
630 a
= strjoina(p
, "/fifo");
631 assert_se(mkfifo(a
, 0775) >= 0);
632 assert_se(touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640) >= 0);
633 assert_se(lstat(a
, &st
) >= 0);
634 assert_se(st
.st_uid
== test_uid
);
635 assert_se(st
.st_gid
== test_gid
);
636 assert_se(S_ISFIFO(st
.st_mode
));
637 assert_se((st
.st_mode
& 0777) == 0640);
638 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
640 a
= strjoina(p
, "/sock");
641 assert_se(mknod(a
, 0775 | S_IFSOCK
, 0) >= 0);
642 assert_se(touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640) >= 0);
643 assert_se(lstat(a
, &st
) >= 0);
644 assert_se(st
.st_uid
== test_uid
);
645 assert_se(st
.st_gid
== test_gid
);
646 assert_se(S_ISSOCK(st
.st_mode
));
647 assert_se((st
.st_mode
& 0777) == 0640);
648 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
650 if (geteuid() == 0) {
651 a
= strjoina(p
, "/bdev");
652 r
= mknod(a
, 0775 | S_IFBLK
, makedev(0, 0));
653 if (r
< 0 && errno
== EPERM
&& detect_container() > 0) {
654 log_notice("Running in unprivileged container? Skipping remaining tests in %s", __func__
);
658 assert_se(touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640) >= 0);
659 assert_se(lstat(a
, &st
) >= 0);
660 assert_se(st
.st_uid
== test_uid
);
661 assert_se(st
.st_gid
== test_gid
);
662 assert_se(S_ISBLK(st
.st_mode
));
663 assert_se((st
.st_mode
& 0777) == 0640);
664 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
666 a
= strjoina(p
, "/cdev");
667 assert_se(mknod(a
, 0775 | S_IFCHR
, makedev(0, 0)) >= 0);
668 assert_se(touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640) >= 0);
669 assert_se(lstat(a
, &st
) >= 0);
670 assert_se(st
.st_uid
== test_uid
);
671 assert_se(st
.st_gid
== test_gid
);
672 assert_se(S_ISCHR(st
.st_mode
));
673 assert_se((st
.st_mode
& 0777) == 0640);
674 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
677 a
= strjoina(p
, "/lnk");
678 assert_se(symlink("target", a
) >= 0);
679 assert_se(touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640) >= 0);
680 assert_se(lstat(a
, &st
) >= 0);
681 assert_se(st
.st_uid
== test_uid
);
682 assert_se(st
.st_gid
== test_gid
);
683 assert_se(S_ISLNK(st
.st_mode
));
684 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
687 TEST(unlinkat_deallocate
) {
688 _cleanup_free_
char *p
= NULL
;
689 _cleanup_close_
int fd
= -EBADF
;
692 assert_se(tempfn_random_child(arg_test_dir
, "unlink-deallocation", &p
) >= 0);
694 fd
= open(p
, O_WRONLY
|O_CLOEXEC
|O_CREAT
|O_EXCL
, 0600);
697 assert_se(write(fd
, "hallo\n", 6) == 6);
699 assert_se(fstat(fd
, &st
) >= 0);
700 assert_se(st
.st_size
== 6);
701 assert_se(st
.st_blocks
> 0);
702 assert_se(st
.st_nlink
== 1);
704 assert_se(unlinkat_deallocate(AT_FDCWD
, p
, UNLINK_ERASE
) >= 0);
706 assert_se(fstat(fd
, &st
) >= 0);
707 assert_se(IN_SET(st
.st_size
, 0, 6)); /* depending on whether hole punching worked the size will be 6
708 (it worked) or 0 (we had to resort to truncation) */
709 assert_se(st
.st_blocks
== 0);
710 assert_se(st
.st_nlink
== 0);
713 TEST(fsync_directory_of_file
) {
714 _cleanup_close_
int fd
= -EBADF
;
716 fd
= open_tmpfile_unlinkable(arg_test_dir
, O_RDWR
);
719 assert_se(fsync_directory_of_file(fd
) >= 0);
722 TEST(rename_noreplace
) {
723 static const char* const table
[] = {
732 _cleanup_(rm_rf_physical_and_freep
) char *z
= NULL
;
733 const char *j
= NULL
;
736 j
= strjoina(arg_test_dir
, "/testXXXXXX");
737 assert_se(mkdtemp_malloc(j
, &z
) >= 0);
739 j
= strjoina(z
, table
[0]);
740 assert_se(touch(j
) >= 0);
742 j
= strjoina(z
, table
[1]);
743 assert_se(mkdir(j
, 0777) >= 0);
745 j
= strjoina(z
, table
[2]);
746 (void) mkfifo(j
, 0777);
748 j
= strjoina(z
, table
[3]);
749 (void) mknod(j
, S_IFSOCK
| 0777, 0);
751 j
= strjoina(z
, table
[4]);
752 (void) symlink("foobar", j
);
754 STRV_FOREACH(a
, table
) {
755 _cleanup_free_
char *x
= NULL
, *y
= NULL
;
760 if (access(x
, F_OK
) < 0) {
761 assert_se(errno
== ENOENT
);
765 STRV_FOREACH(b
, table
) {
766 _cleanup_free_
char *w
= NULL
;
771 if (access(w
, F_OK
) < 0) {
772 assert_se(errno
== ENOENT
);
776 assert_se(rename_noreplace(AT_FDCWD
, x
, AT_FDCWD
, w
) == -EEXIST
);
779 y
= strjoin(z
, "/somethingelse");
782 assert_se(rename_noreplace(AT_FDCWD
, x
, AT_FDCWD
, y
) >= 0);
783 assert_se(rename_noreplace(AT_FDCWD
, y
, AT_FDCWD
, x
) >= 0);
787 TEST(chmod_and_chown
) {
788 _cleanup_(rm_rf_physical_and_freep
) char *d
= NULL
;
795 BLOCK_WITH_UMASK(0000);
797 assert_se(mkdtemp_malloc(NULL
, &d
) >= 0);
799 p
= strjoina(d
, "/reg");
800 assert_se(mknod(p
, S_IFREG
| 0123, 0) >= 0);
802 assert_se(chmod_and_chown(p
, S_IFREG
| 0321, 1, 2) >= 0);
803 assert_se(chmod_and_chown(p
, S_IFDIR
| 0555, 3, 4) == -EINVAL
);
805 assert_se(lstat(p
, &st
) >= 0);
806 assert_se(S_ISREG(st
.st_mode
));
807 assert_se((st
.st_mode
& 07777) == 0321);
809 p
= strjoina(d
, "/dir");
810 assert_se(mkdir(p
, 0123) >= 0);
812 assert_se(chmod_and_chown(p
, S_IFDIR
| 0321, 1, 2) >= 0);
813 assert_se(chmod_and_chown(p
, S_IFREG
| 0555, 3, 4) == -EINVAL
);
815 assert_se(lstat(p
, &st
) >= 0);
816 assert_se(S_ISDIR(st
.st_mode
));
817 assert_se((st
.st_mode
& 07777) == 0321);
819 p
= strjoina(d
, "/lnk");
820 assert_se(symlink("idontexist", p
) >= 0);
822 assert_se(chmod_and_chown(p
, S_IFLNK
| 0321, 1, 2) >= 0);
823 assert_se(chmod_and_chown(p
, S_IFREG
| 0555, 3, 4) == -EINVAL
);
824 assert_se(chmod_and_chown(p
, S_IFDIR
| 0555, 3, 4) == -EINVAL
);
826 assert_se(lstat(p
, &st
) >= 0);
827 assert_se(S_ISLNK(st
.st_mode
));
830 static void create_binary_file(const char *p
, const void *data
, size_t l
) {
831 _cleanup_close_
int fd
= -EBADF
;
833 fd
= open(p
, O_CREAT
|O_WRONLY
|O_EXCL
|O_CLOEXEC
, 0600);
835 assert_se(write(fd
, data
, l
) == (ssize_t
) l
);
838 TEST(conservative_rename
) {
839 _cleanup_(unlink_and_freep
) char *p
= NULL
;
840 _cleanup_free_
char *q
= NULL
;
841 size_t l
= 16*1024 + random_u64() % (32 * 1024); /* some randomly sized buffer 16k…48k */
844 random_bytes(buffer
, l
);
846 assert_se(tempfn_random_child(NULL
, NULL
, &p
) >= 0);
847 create_binary_file(p
, buffer
, l
);
849 assert_se(tempfn_random_child(NULL
, NULL
, &q
) >= 0);
851 /* Check that the hardlinked "copy" is detected */
852 assert_se(link(p
, q
) >= 0);
853 assert_se(conservative_renameat(AT_FDCWD
, q
, AT_FDCWD
, p
) == 0);
854 assert_se(access(q
, F_OK
) < 0 && errno
== ENOENT
);
856 /* Check that a manual copy is detected */
857 assert_se(copy_file(p
, q
, 0, MODE_INVALID
, 0, 0, COPY_REFLINK
) >= 0);
858 assert_se(conservative_renameat(AT_FDCWD
, q
, AT_FDCWD
, p
) == 0);
859 assert_se(access(q
, F_OK
) < 0 && errno
== ENOENT
);
861 /* Check that a manual new writeout is also detected */
862 create_binary_file(q
, buffer
, l
);
863 assert_se(conservative_renameat(AT_FDCWD
, q
, AT_FDCWD
, p
) == 0);
864 assert_se(access(q
, F_OK
) < 0 && errno
== ENOENT
);
866 /* Check that a minimally changed version is detected */
867 buffer
[47] = ~buffer
[47];
868 create_binary_file(q
, buffer
, l
);
869 assert_se(conservative_renameat(AT_FDCWD
, q
, AT_FDCWD
, p
) > 0);
870 assert_se(access(q
, F_OK
) < 0 && errno
== ENOENT
);
872 /* Check that this really is new updated version */
873 create_binary_file(q
, buffer
, l
);
874 assert_se(conservative_renameat(AT_FDCWD
, q
, AT_FDCWD
, p
) == 0);
875 assert_se(access(q
, F_OK
) < 0 && errno
== ENOENT
);
877 /* Make sure we detect extended files */
879 create_binary_file(q
, buffer
, l
);
880 assert_se(conservative_renameat(AT_FDCWD
, q
, AT_FDCWD
, p
) > 0);
881 assert_se(access(q
, F_OK
) < 0 && errno
== ENOENT
);
883 /* Make sure we detect truncated files */
885 create_binary_file(q
, buffer
, l
);
886 assert_se(conservative_renameat(AT_FDCWD
, q
, AT_FDCWD
, p
) > 0);
887 assert_se(access(q
, F_OK
) < 0 && errno
== ENOENT
);
890 static void test_rmdir_parents_one(
895 const char *test_exist
,
896 const char *test_nonexist_subdir
) {
900 log_debug("/* %s(%s, %s) */", __func__
, path
, stop
);
902 p
= strjoina(prefix
, path
);
903 s
= strjoina(prefix
, stop
);
906 assert_se(mkdir_parents(p
, 0700) >= 0);
908 assert_se(rmdir_parents(p
, s
) == expected
);
913 e
= strjoina(prefix
, test_exist
);
914 f
= strjoina(e
, test_nonexist_subdir
);
916 assert_se(access(e
, F_OK
) >= 0);
917 assert_se(access(f
, F_OK
) < 0);
921 TEST(rmdir_parents
) {
924 temp
= strjoina(arg_test_dir
?: "/tmp", "/test-rmdir.XXXXXX");
925 assert_se(mkdtemp(temp
));
927 test_rmdir_parents_one(temp
, "/aaa/../hoge/foo", "/hoge/foo", -EINVAL
, NULL
, NULL
);
928 test_rmdir_parents_one(temp
, "/aaa/bbb/ccc", "/hoge/../aaa", -EINVAL
, NULL
, NULL
);
930 test_rmdir_parents_one(temp
, "/aaa/bbb/ccc/ddd/eee", "/aaa/bbb/ccc/ddd", 0, "/aaa/bbb/ccc/ddd", "/eee");
931 test_rmdir_parents_one(temp
, "/aaa/bbb/ccc/ddd/eee", "/aaa/bbb/ccc", 0, "/aaa/bbb/ccc", "/ddd");
932 test_rmdir_parents_one(temp
, "/aaa/bbb/ccc/ddd/eee", "/aaa/bbb", 0, "/aaa/bbb", "/ccc");
933 test_rmdir_parents_one(temp
, "/aaa/bbb/ccc/ddd/eee", "/aaa", 0, "/aaa", "/bbb");
934 test_rmdir_parents_one(temp
, "/aaa/bbb/ccc/ddd/eee", "/", 0, "/", "/aaa");
936 test_rmdir_parents_one(temp
, "/aaa/bbb/ccc/ddd/eee", "/aaa/hoge/foo", 0, "/aaa", "/bbb");
937 test_rmdir_parents_one(temp
, "/aaa////bbb/.//ccc//ddd/eee///./.", "///././aaa/.", 0, "/aaa", "/bbb");
939 assert_se(rm_rf(temp
, REMOVE_ROOT
|REMOVE_PHYSICAL
) >= 0);
942 static void test_parse_cifs_service_one(const char *f
, const char *h
, const char *s
, const char *d
, int ret
) {
943 _cleanup_free_
char *a
= NULL
, *b
= NULL
, *c
= NULL
;
945 assert_se(parse_cifs_service(f
, &a
, &b
, &c
) == ret
);
946 assert_se(streq_ptr(a
, h
));
947 assert_se(streq_ptr(b
, s
));
948 assert_se(streq_ptr(c
, d
));
951 TEST(parse_cifs_service
) {
952 test_parse_cifs_service_one("//foo/bar/baz", "foo", "bar", "baz", 0);
953 test_parse_cifs_service_one("\\\\foo\\bar\\baz", "foo", "bar", "baz", 0);
954 test_parse_cifs_service_one("//foo/bar", "foo", "bar", NULL
, 0);
955 test_parse_cifs_service_one("\\\\foo\\bar", "foo", "bar", NULL
, 0);
956 test_parse_cifs_service_one("//foo/bar/baz/uuu", "foo", "bar", "baz/uuu", 0);
957 test_parse_cifs_service_one("\\\\foo\\bar\\baz\\uuu", "foo", "bar", "baz/uuu", 0);
959 test_parse_cifs_service_one(NULL
, NULL
, NULL
, NULL
, -EINVAL
);
960 test_parse_cifs_service_one("", NULL
, NULL
, NULL
, -EINVAL
);
961 test_parse_cifs_service_one("abc", NULL
, NULL
, NULL
, -EINVAL
);
962 test_parse_cifs_service_one("abc/cde/efg", NULL
, NULL
, NULL
, -EINVAL
);
963 test_parse_cifs_service_one("//foo/bar/baz/..", NULL
, NULL
, NULL
, -EINVAL
);
964 test_parse_cifs_service_one("//foo///", NULL
, NULL
, NULL
, -EINVAL
);
965 test_parse_cifs_service_one("//foo/.", NULL
, NULL
, NULL
, -EINVAL
);
966 test_parse_cifs_service_one("//foo/a/.", NULL
, NULL
, NULL
, -EINVAL
);
967 test_parse_cifs_service_one("//./a", NULL
, NULL
, NULL
, -EINVAL
);
970 TEST(open_mkdir_at
) {
971 _cleanup_close_
int fd
= -EBADF
, subdir_fd
= -EBADF
, subsubdir_fd
= -EBADF
;
972 _cleanup_(rm_rf_physical_and_freep
) char *t
= NULL
;
974 assert_se(open_mkdir_at(AT_FDCWD
, "/proc", O_EXCL
|O_CLOEXEC
, 0) == -EEXIST
);
976 fd
= open_mkdir_at(AT_FDCWD
, "/proc", O_CLOEXEC
, 0);
980 assert_se(open_mkdir_at(AT_FDCWD
, "/bin/sh", O_EXCL
|O_CLOEXEC
, 0) == -EEXIST
);
981 assert_se(open_mkdir_at(AT_FDCWD
, "/bin/sh", O_CLOEXEC
, 0) == -EEXIST
);
983 assert_se(mkdtemp_malloc(NULL
, &t
) >= 0);
985 assert_se(open_mkdir_at(AT_FDCWD
, t
, O_EXCL
|O_CLOEXEC
, 0) == -EEXIST
);
986 assert_se(open_mkdir_at(AT_FDCWD
, t
, O_PATH
|O_EXCL
|O_CLOEXEC
, 0) == -EEXIST
);
988 fd
= open_mkdir_at(AT_FDCWD
, t
, O_CLOEXEC
, 0000);
992 fd
= open_mkdir_at(AT_FDCWD
, t
, O_PATH
|O_CLOEXEC
, 0000);
995 subdir_fd
= open_mkdir_at(fd
, "xxx", O_PATH
|O_EXCL
|O_CLOEXEC
, 0700);
996 assert_se(subdir_fd
>= 0);
998 assert_se(open_mkdir_at(fd
, "xxx", O_PATH
|O_EXCL
|O_CLOEXEC
, 0) == -EEXIST
);
1000 subsubdir_fd
= open_mkdir_at(subdir_fd
, "yyy", O_EXCL
|O_CLOEXEC
, 0700);
1001 assert_se(subsubdir_fd
>= 0);
1002 subsubdir_fd
= safe_close(subsubdir_fd
);
1004 assert_se(open_mkdir_at(subdir_fd
, "yyy", O_EXCL
|O_CLOEXEC
, 0) == -EEXIST
);
1006 assert_se(open_mkdir_at(fd
, "xxx/yyy", O_EXCL
|O_CLOEXEC
, 0) == -EEXIST
);
1008 subsubdir_fd
= open_mkdir_at(fd
, "xxx/yyy", O_CLOEXEC
, 0700);
1009 assert_se(subsubdir_fd
>= 0);
1012 TEST(openat_report_new
) {
1013 _cleanup_free_
char *j
= NULL
;
1014 _cleanup_(rm_rf_physical_and_freep
) char *d
= NULL
;
1015 _cleanup_close_
int fd
= -EBADF
;
1018 assert_se(mkdtemp_malloc(NULL
, &d
) >= 0);
1020 j
= path_join(d
, "test");
1023 fd
= openat_report_new(AT_FDCWD
, j
, O_RDWR
|O_CREAT
, 0666, &b
);
1025 fd
= safe_close(fd
);
1028 fd
= openat_report_new(AT_FDCWD
, j
, O_RDWR
|O_CREAT
, 0666, &b
);
1030 fd
= safe_close(fd
);
1033 fd
= openat_report_new(AT_FDCWD
, j
, O_RDWR
|O_CREAT
, 0666, &b
);
1035 fd
= safe_close(fd
);
1038 assert_se(unlink(j
) >= 0);
1040 fd
= openat_report_new(AT_FDCWD
, j
, O_RDWR
|O_CREAT
, 0666, &b
);
1042 fd
= safe_close(fd
);
1045 fd
= openat_report_new(AT_FDCWD
, j
, O_RDWR
|O_CREAT
, 0666, &b
);
1047 fd
= safe_close(fd
);
1050 assert_se(unlink(j
) >= 0);
1052 fd
= openat_report_new(AT_FDCWD
, j
, O_RDWR
|O_CREAT
, 0666, NULL
);
1054 fd
= safe_close(fd
);
1056 fd
= openat_report_new(AT_FDCWD
, j
, O_RDWR
|O_CREAT
, 0666, &b
);
1058 fd
= safe_close(fd
);
1061 fd
= openat_report_new(AT_FDCWD
, j
, O_RDWR
, 0666, &b
);
1063 fd
= safe_close(fd
);
1066 fd
= openat_report_new(AT_FDCWD
, j
, O_RDWR
|O_CREAT
|O_EXCL
, 0666, &b
);
1067 assert_se(fd
== -EEXIST
);
1069 assert_se(unlink(j
) >= 0);
1071 fd
= openat_report_new(AT_FDCWD
, j
, O_RDWR
, 0666, &b
);
1072 assert_se(fd
== -ENOENT
);
1074 fd
= openat_report_new(AT_FDCWD
, j
, O_RDWR
|O_CREAT
|O_EXCL
, 0666, &b
);
1076 fd
= safe_close(fd
);
1080 static int intro(void) {
1081 arg_test_dir
= saved_argv
[1];
1082 return EXIT_SUCCESS
;
1085 DEFINE_TEST_MAIN_WITH_INTRO(LOG_INFO
, intro
);