1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
5 #include "alloc-util.h"
6 #include "chase-symlinks.h"
11 #include "id128-util.h"
14 #include "path-util.h"
15 #include "random-util.h"
17 #include "stdio-util.h"
18 #include "string-util.h"
20 #include "sync-util.h"
22 #include "tmpfile-util.h"
23 #include "umask-util.h"
24 #include "user-util.h"
28 static const char *arg_test_dir
= NULL
;
30 static void test_chase_symlinks(void) {
31 _cleanup_free_
char *result
= NULL
;
33 const char *top
, *p
, *pslash
, *q
, *qslash
;
37 log_info("/* %s */", __func__
);
39 temp
= strjoina(arg_test_dir
?: "/tmp", "/test-chase.XXXXXX");
40 assert_se(mkdtemp(temp
));
42 top
= strjoina(temp
, "/top");
43 assert_se(mkdir(top
, 0700) >= 0);
45 p
= strjoina(top
, "/dot");
46 if (symlink(".", p
) < 0) {
47 assert_se(IN_SET(errno
, EINVAL
, ENOSYS
, ENOTTY
, EPERM
));
48 log_tests_skipped_errno(errno
, "symlink() not possible");
52 p
= strjoina(top
, "/dotdot");
53 assert_se(symlink("..", p
) >= 0);
55 p
= strjoina(top
, "/dotdota");
56 assert_se(symlink("../a", p
) >= 0);
58 p
= strjoina(temp
, "/a");
59 assert_se(symlink("b", p
) >= 0);
61 p
= strjoina(temp
, "/b");
62 assert_se(symlink("/usr", p
) >= 0);
64 p
= strjoina(temp
, "/start");
65 assert_se(symlink("top/dot/dotdota", p
) >= 0);
67 /* Paths that use symlinks underneath the "root" */
69 r
= chase_symlinks(p
, NULL
, 0, &result
, NULL
);
71 assert_se(path_equal(result
, "/usr"));
72 result
= mfree(result
);
74 pslash
= strjoina(p
, "/");
75 r
= chase_symlinks(pslash
, NULL
, 0, &result
, NULL
);
77 assert_se(path_equal(result
, "/usr/"));
78 result
= mfree(result
);
80 r
= chase_symlinks(p
, temp
, 0, &result
, NULL
);
81 assert_se(r
== -ENOENT
);
83 r
= chase_symlinks(pslash
, temp
, 0, &result
, NULL
);
84 assert_se(r
== -ENOENT
);
86 q
= strjoina(temp
, "/usr");
88 r
= chase_symlinks(p
, temp
, CHASE_NONEXISTENT
, &result
, NULL
);
90 assert_se(path_equal(result
, q
));
91 result
= mfree(result
);
93 qslash
= strjoina(q
, "/");
95 r
= chase_symlinks(pslash
, temp
, CHASE_NONEXISTENT
, &result
, NULL
);
97 assert_se(path_equal(result
, qslash
));
98 result
= mfree(result
);
100 assert_se(mkdir(q
, 0700) >= 0);
102 r
= chase_symlinks(p
, temp
, 0, &result
, NULL
);
104 assert_se(path_equal(result
, q
));
105 result
= mfree(result
);
107 r
= chase_symlinks(pslash
, temp
, 0, &result
, NULL
);
109 assert_se(path_equal(result
, qslash
));
110 result
= mfree(result
);
112 p
= strjoina(temp
, "/slash");
113 assert_se(symlink("/", p
) >= 0);
115 r
= chase_symlinks(p
, NULL
, 0, &result
, NULL
);
117 assert_se(path_equal(result
, "/"));
118 result
= mfree(result
);
120 r
= chase_symlinks(p
, temp
, 0, &result
, NULL
);
122 assert_se(path_equal(result
, temp
));
123 result
= mfree(result
);
125 /* Paths that would "escape" outside of the "root" */
127 p
= strjoina(temp
, "/6dots");
128 assert_se(symlink("../../..", p
) >= 0);
130 r
= chase_symlinks(p
, temp
, 0, &result
, NULL
);
131 assert_se(r
> 0 && path_equal(result
, temp
));
132 result
= mfree(result
);
134 p
= strjoina(temp
, "/6dotsusr");
135 assert_se(symlink("../../../usr", p
) >= 0);
137 r
= chase_symlinks(p
, temp
, 0, &result
, NULL
);
138 assert_se(r
> 0 && path_equal(result
, q
));
139 result
= mfree(result
);
141 p
= strjoina(temp
, "/top/8dotsusr");
142 assert_se(symlink("../../../../usr", p
) >= 0);
144 r
= chase_symlinks(p
, temp
, 0, &result
, NULL
);
145 assert_se(r
> 0 && path_equal(result
, q
));
146 result
= mfree(result
);
148 /* Paths that contain repeated slashes */
150 p
= strjoina(temp
, "/slashslash");
151 assert_se(symlink("///usr///", p
) >= 0);
153 r
= chase_symlinks(p
, NULL
, 0, &result
, NULL
);
155 assert_se(path_equal(result
, "/usr"));
156 assert_se(streq(result
, "/usr")); /* we guarantee that we drop redundant slashes */
157 result
= mfree(result
);
159 r
= chase_symlinks(p
, temp
, 0, &result
, NULL
);
161 assert_se(path_equal(result
, q
));
162 result
= mfree(result
);
164 /* Paths underneath the "root" with different UIDs while using CHASE_SAFE */
166 if (geteuid() == 0) {
167 p
= strjoina(temp
, "/user");
168 assert_se(mkdir(p
, 0755) >= 0);
169 assert_se(chown(p
, UID_NOBODY
, GID_NOBODY
) >= 0);
171 q
= strjoina(temp
, "/user/root");
172 assert_se(mkdir(q
, 0755) >= 0);
174 p
= strjoina(q
, "/link");
175 assert_se(symlink("/", p
) >= 0);
177 /* Fail when user-owned directories contain root-owned subdirectories. */
178 r
= chase_symlinks(p
, temp
, CHASE_SAFE
, &result
, NULL
);
179 assert_se(r
== -ENOLINK
);
180 result
= mfree(result
);
182 /* Allow this when the user-owned directories are all in the "root". */
183 r
= chase_symlinks(p
, q
, CHASE_SAFE
, &result
, NULL
);
185 result
= mfree(result
);
190 r
= chase_symlinks("/etc/./.././", NULL
, 0, &result
, NULL
);
192 assert_se(path_equal(result
, "/"));
193 result
= mfree(result
);
195 r
= chase_symlinks("/etc/./.././", "/etc", 0, &result
, NULL
);
196 assert_se(r
> 0 && path_equal(result
, "/etc"));
197 result
= mfree(result
);
199 r
= chase_symlinks("/../.././//../../etc", NULL
, 0, &result
, NULL
);
201 assert_se(streq(result
, "/etc"));
202 result
= mfree(result
);
204 r
= chase_symlinks("/../.././//../../test-chase.fsldajfl", NULL
, CHASE_NONEXISTENT
, &result
, NULL
);
206 assert_se(streq(result
, "/test-chase.fsldajfl"));
207 result
= mfree(result
);
209 r
= chase_symlinks("/../.././//../../etc", "/", CHASE_PREFIX_ROOT
, &result
, NULL
);
211 assert_se(streq(result
, "/etc"));
212 result
= mfree(result
);
214 r
= chase_symlinks("/../.././//../../test-chase.fsldajfl", "/", CHASE_PREFIX_ROOT
|CHASE_NONEXISTENT
, &result
, NULL
);
216 assert_se(streq(result
, "/test-chase.fsldajfl"));
217 result
= mfree(result
);
219 r
= chase_symlinks("/etc/machine-id/foo", NULL
, 0, &result
, NULL
);
220 assert_se(r
== -ENOTDIR
);
221 result
= mfree(result
);
223 /* Path that loops back to self */
225 p
= strjoina(temp
, "/recursive-symlink");
226 assert_se(symlink("recursive-symlink", p
) >= 0);
227 r
= chase_symlinks(p
, NULL
, 0, &result
, NULL
);
228 assert_se(r
== -ELOOP
);
230 /* Path which doesn't exist */
232 p
= strjoina(temp
, "/idontexist");
233 r
= chase_symlinks(p
, NULL
, 0, &result
, NULL
);
234 assert_se(r
== -ENOENT
);
236 r
= chase_symlinks(p
, NULL
, CHASE_NONEXISTENT
, &result
, NULL
);
238 assert_se(path_equal(result
, p
));
239 result
= mfree(result
);
241 p
= strjoina(temp
, "/idontexist/meneither");
242 r
= chase_symlinks(p
, NULL
, 0, &result
, NULL
);
243 assert_se(r
== -ENOENT
);
245 r
= chase_symlinks(p
, NULL
, CHASE_NONEXISTENT
, &result
, NULL
);
247 assert_se(path_equal(result
, p
));
248 result
= mfree(result
);
250 /* Path which doesn't exist, but contains weird stuff */
252 p
= strjoina(temp
, "/idontexist/..");
253 r
= chase_symlinks(p
, NULL
, 0, &result
, NULL
);
254 assert_se(r
== -ENOENT
);
256 r
= chase_symlinks(p
, NULL
, CHASE_NONEXISTENT
, &result
, NULL
);
257 assert_se(r
== -ENOENT
);
259 p
= strjoina(temp
, "/target");
260 q
= strjoina(temp
, "/top");
261 assert_se(symlink(q
, p
) >= 0);
262 p
= strjoina(temp
, "/target/idontexist");
263 r
= chase_symlinks(p
, NULL
, 0, &result
, NULL
);
264 assert_se(r
== -ENOENT
);
266 if (geteuid() == 0) {
267 p
= strjoina(temp
, "/priv1");
268 assert_se(mkdir(p
, 0755) >= 0);
270 q
= strjoina(p
, "/priv2");
271 assert_se(mkdir(q
, 0755) >= 0);
273 assert_se(chase_symlinks(q
, NULL
, CHASE_SAFE
, NULL
, NULL
) >= 0);
275 assert_se(chown(q
, UID_NOBODY
, GID_NOBODY
) >= 0);
276 assert_se(chase_symlinks(q
, NULL
, CHASE_SAFE
, NULL
, NULL
) >= 0);
278 assert_se(chown(p
, UID_NOBODY
, GID_NOBODY
) >= 0);
279 assert_se(chase_symlinks(q
, NULL
, CHASE_SAFE
, NULL
, NULL
) >= 0);
281 assert_se(chown(q
, 0, 0) >= 0);
282 assert_se(chase_symlinks(q
, NULL
, CHASE_SAFE
, NULL
, NULL
) == -ENOLINK
);
284 assert_se(rmdir(q
) >= 0);
285 assert_se(symlink("/etc/passwd", q
) >= 0);
286 assert_se(chase_symlinks(q
, NULL
, CHASE_SAFE
, NULL
, NULL
) == -ENOLINK
);
288 assert_se(chown(p
, 0, 0) >= 0);
289 assert_se(chase_symlinks(q
, NULL
, CHASE_SAFE
, NULL
, NULL
) >= 0);
292 p
= strjoina(temp
, "/machine-id-test");
293 assert_se(symlink("/usr/../etc/./machine-id", p
) >= 0);
295 r
= chase_symlinks(p
, NULL
, 0, NULL
, &pfd
);
297 _cleanup_close_
int fd
= -1;
302 fd
= fd_reopen(pfd
, O_RDONLY
|O_CLOEXEC
);
306 assert_se(id128_read_fd(fd
, ID128_PLAIN
, &a
) >= 0);
307 assert_se(sd_id128_get_machine(&b
) >= 0);
308 assert_se(sd_id128_equal(a
, b
));
311 /* Test CHASE_NOFOLLOW */
313 p
= strjoina(temp
, "/target");
314 q
= strjoina(temp
, "/symlink");
315 assert_se(symlink(p
, q
) >= 0);
316 r
= chase_symlinks(q
, NULL
, CHASE_NOFOLLOW
, &result
, &pfd
);
319 assert_se(path_equal(result
, q
));
320 assert_se(fstat(pfd
, &st
) >= 0);
321 assert_se(S_ISLNK(st
.st_mode
));
322 result
= mfree(result
);
324 /* s1 -> s2 -> nonexistent */
325 q
= strjoina(temp
, "/s1");
326 assert_se(symlink("s2", q
) >= 0);
327 p
= strjoina(temp
, "/s2");
328 assert_se(symlink("nonexistent", p
) >= 0);
329 r
= chase_symlinks(q
, NULL
, CHASE_NOFOLLOW
, &result
, &pfd
);
332 assert_se(path_equal(result
, q
));
333 assert_se(fstat(pfd
, &st
) >= 0);
334 assert_se(S_ISLNK(st
.st_mode
));
335 result
= mfree(result
);
337 /* Test CHASE_STEP */
339 p
= strjoina(temp
, "/start");
340 r
= chase_symlinks(p
, NULL
, CHASE_STEP
, &result
, NULL
);
342 p
= strjoina(temp
, "/top/dot/dotdota");
343 assert_se(streq(p
, result
));
344 result
= mfree(result
);
346 r
= chase_symlinks(p
, NULL
, CHASE_STEP
, &result
, NULL
);
348 p
= strjoina(temp
, "/top/dotdota");
349 assert_se(streq(p
, result
));
350 result
= mfree(result
);
352 r
= chase_symlinks(p
, NULL
, CHASE_STEP
, &result
, NULL
);
354 p
= strjoina(temp
, "/top/../a");
355 assert_se(streq(p
, result
));
356 result
= mfree(result
);
358 r
= chase_symlinks(p
, NULL
, CHASE_STEP
, &result
, NULL
);
360 p
= strjoina(temp
, "/a");
361 assert_se(streq(p
, result
));
362 result
= mfree(result
);
364 r
= chase_symlinks(p
, NULL
, CHASE_STEP
, &result
, NULL
);
366 p
= strjoina(temp
, "/b");
367 assert_se(streq(p
, result
));
368 result
= mfree(result
);
370 r
= chase_symlinks(p
, NULL
, CHASE_STEP
, &result
, NULL
);
372 assert_se(streq("/usr", result
));
373 result
= mfree(result
);
375 r
= chase_symlinks("/usr", NULL
, CHASE_STEP
, &result
, NULL
);
377 assert_se(streq("/usr", result
));
378 result
= mfree(result
);
380 /* Make sure that symlinks in the "root" path are not resolved, but those below are */
381 p
= strjoina("/etc/..", temp
, "/self");
382 assert_se(symlink(".", p
) >= 0);
383 q
= strjoina(p
, "/top/dot/dotdota");
384 r
= chase_symlinks(q
, p
, 0, &result
, NULL
);
386 assert_se(path_equal(path_startswith(result
, p
), "usr"));
387 result
= mfree(result
);
390 assert_se(rm_rf(temp
, REMOVE_ROOT
|REMOVE_PHYSICAL
) >= 0);
393 static void test_unlink_noerrno(void) {
397 log_info("/* %s */", __func__
);
399 name
= strjoina(arg_test_dir
?: "/tmp", "/test-close_nointr.XXXXXX");
400 fd
= mkostemp_safe(name
);
402 assert_se(close_nointr(fd
) >= 0);
407 assert_se(unlink_noerrno(name
) >= 0);
408 assert_se(errno
== 42);
409 assert_se(unlink_noerrno(name
) < 0);
410 assert_se(errno
== 42);
414 static void test_readlink_and_make_absolute(void) {
415 const char *tempdir
, *name
, *name2
, *name_alias
;
416 _cleanup_free_
char *r1
= NULL
, *r2
= NULL
, *pwd
= NULL
;
418 log_info("/* %s */", __func__
);
420 tempdir
= strjoina(arg_test_dir
?: "/tmp", "/test-readlink_and_make_absolute");
421 name
= strjoina(tempdir
, "/original");
422 name2
= "test-readlink_and_make_absolute/original";
423 name_alias
= strjoina(arg_test_dir
?: "/tmp", "/test-readlink_and_make_absolute-alias");
425 assert_se(mkdir_safe(tempdir
, 0755, getuid(), getgid(), MKDIR_WARN_MODE
) >= 0);
426 assert_se(touch(name
) >= 0);
428 if (symlink(name
, name_alias
) < 0) {
429 assert_se(IN_SET(errno
, EINVAL
, ENOSYS
, ENOTTY
, EPERM
));
430 log_tests_skipped_errno(errno
, "symlink() not possible");
432 assert_se(readlink_and_make_absolute(name_alias
, &r1
) >= 0);
433 assert_se(streq(r1
, name
));
434 assert_se(unlink(name_alias
) >= 0);
436 assert_se(safe_getcwd(&pwd
) >= 0);
438 assert_se(chdir(tempdir
) >= 0);
439 assert_se(symlink(name2
, name_alias
) >= 0);
440 assert_se(readlink_and_make_absolute(name_alias
, &r2
) >= 0);
441 assert_se(streq(r2
, name
));
442 assert_se(unlink(name_alias
) >= 0);
444 assert_se(chdir(pwd
) >= 0);
447 assert_se(rm_rf(tempdir
, REMOVE_ROOT
|REMOVE_PHYSICAL
) >= 0);
450 static void test_get_files_in_directory(void) {
451 _cleanup_strv_free_
char **l
= NULL
, **t
= NULL
;
453 assert_se(get_files_in_directory(arg_test_dir
?: "/tmp", &l
) >= 0);
454 assert_se(get_files_in_directory(".", &t
) >= 0);
455 assert_se(get_files_in_directory(".", NULL
) >= 0);
458 static void test_var_tmp(void) {
459 _cleanup_free_
char *tmpdir_backup
= NULL
, *temp_backup
= NULL
, *tmp_backup
= NULL
;
460 const char *tmp_dir
= NULL
, *t
;
462 log_info("/* %s */", __func__
);
464 t
= getenv("TMPDIR");
466 tmpdir_backup
= strdup(t
);
467 assert_se(tmpdir_backup
);
472 temp_backup
= strdup(t
);
473 assert_se(temp_backup
);
478 tmp_backup
= strdup(t
);
479 assert_se(tmp_backup
);
482 assert_se(unsetenv("TMPDIR") >= 0);
483 assert_se(unsetenv("TEMP") >= 0);
484 assert_se(unsetenv("TMP") >= 0);
486 assert_se(var_tmp_dir(&tmp_dir
) >= 0);
487 assert_se(streq(tmp_dir
, "/var/tmp"));
489 assert_se(setenv("TMPDIR", "/tmp", true) >= 0);
490 assert_se(streq(getenv("TMPDIR"), "/tmp"));
492 assert_se(var_tmp_dir(&tmp_dir
) >= 0);
493 assert_se(streq(tmp_dir
, "/tmp"));
495 assert_se(setenv("TMPDIR", "/88_does_not_exist_88", true) >= 0);
496 assert_se(streq(getenv("TMPDIR"), "/88_does_not_exist_88"));
498 assert_se(var_tmp_dir(&tmp_dir
) >= 0);
499 assert_se(streq(tmp_dir
, "/var/tmp"));
502 assert_se(setenv("TMPDIR", tmpdir_backup
, true) >= 0);
503 assert_se(streq(getenv("TMPDIR"), tmpdir_backup
));
507 assert_se(setenv("TEMP", temp_backup
, true) >= 0);
508 assert_se(streq(getenv("TEMP"), temp_backup
));
512 assert_se(setenv("TMP", tmp_backup
, true) >= 0);
513 assert_se(streq(getenv("TMP"), tmp_backup
));
517 static void test_dot_or_dot_dot(void) {
518 log_info("/* %s */", __func__
);
520 assert_se(!dot_or_dot_dot(NULL
));
521 assert_se(!dot_or_dot_dot(""));
522 assert_se(!dot_or_dot_dot("xxx"));
523 assert_se(dot_or_dot_dot("."));
524 assert_se(dot_or_dot_dot(".."));
525 assert_se(!dot_or_dot_dot(".foo"));
526 assert_se(!dot_or_dot_dot("..foo"));
529 static void test_access_fd(void) {
530 _cleanup_(rmdir_and_freep
) char *p
= NULL
;
531 _cleanup_close_
int fd
= -1;
534 log_info("/* %s */", __func__
);
536 a
= strjoina(arg_test_dir
?: "/tmp", "/access-fd.XXXXXX");
537 assert_se(mkdtemp_malloc(a
, &p
) >= 0);
539 fd
= open(p
, O_RDONLY
|O_DIRECTORY
|O_CLOEXEC
);
542 assert_se(access_fd(fd
, R_OK
) >= 0);
543 assert_se(access_fd(fd
, F_OK
) >= 0);
544 assert_se(access_fd(fd
, W_OK
) >= 0);
546 assert_se(fchmod(fd
, 0000) >= 0);
548 assert_se(access_fd(fd
, F_OK
) >= 0);
550 if (geteuid() == 0) {
551 assert_se(access_fd(fd
, R_OK
) >= 0);
552 assert_se(access_fd(fd
, W_OK
) >= 0);
554 assert_se(access_fd(fd
, R_OK
) == -EACCES
);
555 assert_se(access_fd(fd
, W_OK
) == -EACCES
);
559 static void test_touch_file(void) {
560 uid_t test_uid
, test_gid
;
561 _cleanup_(rm_rf_physical_and_freep
) char *p
= NULL
;
567 log_info("/* %s */", __func__
);
569 test_uid
= geteuid() == 0 ? 65534 : getuid();
570 test_gid
= geteuid() == 0 ? 65534 : getgid();
572 test_mtime
= usec_sub_unsigned(now(CLOCK_REALTIME
), USEC_PER_WEEK
);
574 a
= strjoina(arg_test_dir
?: "/dev/shm", "/touch-file-XXXXXX");
575 assert_se(mkdtemp_malloc(a
, &p
) >= 0);
577 a
= strjoina(p
, "/regular");
578 r
= touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640);
580 assert_se(IN_SET(r
, -EINVAL
, -ENOSYS
, -ENOTTY
, -EPERM
));
581 log_tests_skipped_errno(errno
, "touch_file() not possible");
585 assert_se(lstat(a
, &st
) >= 0);
586 assert_se(st
.st_uid
== test_uid
);
587 assert_se(st
.st_gid
== test_gid
);
588 assert_se(S_ISREG(st
.st_mode
));
589 assert_se((st
.st_mode
& 0777) == 0640);
590 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
592 a
= strjoina(p
, "/dir");
593 assert_se(mkdir(a
, 0775) >= 0);
594 assert_se(touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640) >= 0);
595 assert_se(lstat(a
, &st
) >= 0);
596 assert_se(st
.st_uid
== test_uid
);
597 assert_se(st
.st_gid
== test_gid
);
598 assert_se(S_ISDIR(st
.st_mode
));
599 assert_se((st
.st_mode
& 0777) == 0640);
600 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
602 a
= strjoina(p
, "/fifo");
603 assert_se(mkfifo(a
, 0775) >= 0);
604 assert_se(touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640) >= 0);
605 assert_se(lstat(a
, &st
) >= 0);
606 assert_se(st
.st_uid
== test_uid
);
607 assert_se(st
.st_gid
== test_gid
);
608 assert_se(S_ISFIFO(st
.st_mode
));
609 assert_se((st
.st_mode
& 0777) == 0640);
610 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
612 a
= strjoina(p
, "/sock");
613 assert_se(mknod(a
, 0775 | S_IFSOCK
, 0) >= 0);
614 assert_se(touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640) >= 0);
615 assert_se(lstat(a
, &st
) >= 0);
616 assert_se(st
.st_uid
== test_uid
);
617 assert_se(st
.st_gid
== test_gid
);
618 assert_se(S_ISSOCK(st
.st_mode
));
619 assert_se((st
.st_mode
& 0777) == 0640);
620 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
622 if (geteuid() == 0) {
623 a
= strjoina(p
, "/bdev");
624 r
= mknod(a
, 0775 | S_IFBLK
, makedev(0, 0));
625 if (r
< 0 && errno
== EPERM
&& detect_container() > 0) {
626 log_notice("Running in unprivileged container? Skipping remaining tests in %s", __func__
);
630 assert_se(touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640) >= 0);
631 assert_se(lstat(a
, &st
) >= 0);
632 assert_se(st
.st_uid
== test_uid
);
633 assert_se(st
.st_gid
== test_gid
);
634 assert_se(S_ISBLK(st
.st_mode
));
635 assert_se((st
.st_mode
& 0777) == 0640);
636 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
638 a
= strjoina(p
, "/cdev");
639 assert_se(mknod(a
, 0775 | S_IFCHR
, makedev(0, 0)) >= 0);
640 assert_se(touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640) >= 0);
641 assert_se(lstat(a
, &st
) >= 0);
642 assert_se(st
.st_uid
== test_uid
);
643 assert_se(st
.st_gid
== test_gid
);
644 assert_se(S_ISCHR(st
.st_mode
));
645 assert_se((st
.st_mode
& 0777) == 0640);
646 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
649 a
= strjoina(p
, "/lnk");
650 assert_se(symlink("target", a
) >= 0);
651 assert_se(touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640) >= 0);
652 assert_se(lstat(a
, &st
) >= 0);
653 assert_se(st
.st_uid
== test_uid
);
654 assert_se(st
.st_gid
== test_gid
);
655 assert_se(S_ISLNK(st
.st_mode
));
656 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
659 static void test_unlinkat_deallocate(void) {
660 _cleanup_free_
char *p
= NULL
;
661 _cleanup_close_
int fd
= -1;
664 log_info("/* %s */", __func__
);
666 assert_se(tempfn_random_child(arg_test_dir
, "unlink-deallocation", &p
) >= 0);
668 fd
= open(p
, O_WRONLY
|O_CLOEXEC
|O_CREAT
|O_EXCL
, 0600);
671 assert_se(write(fd
, "hallo\n", 6) == 6);
673 assert_se(fstat(fd
, &st
) >= 0);
674 assert_se(st
.st_size
== 6);
675 assert_se(st
.st_blocks
> 0);
676 assert_se(st
.st_nlink
== 1);
678 assert_se(unlinkat_deallocate(AT_FDCWD
, p
, UNLINK_ERASE
) >= 0);
680 assert_se(fstat(fd
, &st
) >= 0);
681 assert_se(IN_SET(st
.st_size
, 0, 6)); /* depending on whether hole punching worked the size will be 6
682 (it worked) or 0 (we had to resort to truncation) */
683 assert_se(st
.st_blocks
== 0);
684 assert_se(st
.st_nlink
== 0);
687 static void test_fsync_directory_of_file(void) {
688 _cleanup_close_
int fd
= -1;
690 log_info("/* %s */", __func__
);
692 fd
= open_tmpfile_unlinkable(arg_test_dir
, O_RDWR
);
695 assert_se(fsync_directory_of_file(fd
) >= 0);
698 static void test_rename_noreplace(void) {
699 static const char* const table
[] = {
708 _cleanup_(rm_rf_physical_and_freep
) char *z
= NULL
;
709 const char *j
= NULL
;
712 log_info("/* %s */", __func__
);
715 j
= strjoina(arg_test_dir
, "/testXXXXXX");
716 assert_se(mkdtemp_malloc(j
, &z
) >= 0);
718 j
= strjoina(z
, table
[0]);
719 assert_se(touch(j
) >= 0);
721 j
= strjoina(z
, table
[1]);
722 assert_se(mkdir(j
, 0777) >= 0);
724 j
= strjoina(z
, table
[2]);
725 (void) mkfifo(j
, 0777);
727 j
= strjoina(z
, table
[3]);
728 (void) mknod(j
, S_IFSOCK
| 0777, 0);
730 j
= strjoina(z
, table
[4]);
731 (void) symlink("foobar", j
);
733 STRV_FOREACH(a
, (char**) table
) {
734 _cleanup_free_
char *x
= NULL
, *y
= NULL
;
739 if (access(x
, F_OK
) < 0) {
740 assert_se(errno
== ENOENT
);
744 STRV_FOREACH(b
, (char**) table
) {
745 _cleanup_free_
char *w
= NULL
;
750 if (access(w
, F_OK
) < 0) {
751 assert_se(errno
== ENOENT
);
755 assert_se(rename_noreplace(AT_FDCWD
, x
, AT_FDCWD
, w
) == -EEXIST
);
758 y
= strjoin(z
, "/somethingelse");
761 assert_se(rename_noreplace(AT_FDCWD
, x
, AT_FDCWD
, y
) >= 0);
762 assert_se(rename_noreplace(AT_FDCWD
, y
, AT_FDCWD
, x
) >= 0);
766 static void test_chmod_and_chown(void) {
767 _cleanup_(rm_rf_physical_and_freep
) char *d
= NULL
;
768 _unused_ _cleanup_umask_ mode_t u
= umask(0000);
775 log_info("/* %s */", __func__
);
777 assert_se(mkdtemp_malloc(NULL
, &d
) >= 0);
779 p
= strjoina(d
, "/reg");
780 assert_se(mknod(p
, S_IFREG
| 0123, 0) >= 0);
782 assert_se(chmod_and_chown(p
, S_IFREG
| 0321, 1, 2) >= 0);
783 assert_se(chmod_and_chown(p
, S_IFDIR
| 0555, 3, 4) == -EINVAL
);
785 assert_se(lstat(p
, &st
) >= 0);
786 assert_se(S_ISREG(st
.st_mode
));
787 assert_se((st
.st_mode
& 07777) == 0321);
789 p
= strjoina(d
, "/dir");
790 assert_se(mkdir(p
, 0123) >= 0);
792 assert_se(chmod_and_chown(p
, S_IFDIR
| 0321, 1, 2) >= 0);
793 assert_se(chmod_and_chown(p
, S_IFREG
| 0555, 3, 4) == -EINVAL
);
795 assert_se(lstat(p
, &st
) >= 0);
796 assert_se(S_ISDIR(st
.st_mode
));
797 assert_se((st
.st_mode
& 07777) == 0321);
799 p
= strjoina(d
, "/lnk");
800 assert_se(symlink("idontexist", p
) >= 0);
802 assert_se(chmod_and_chown(p
, S_IFLNK
| 0321, 1, 2) >= 0);
803 assert_se(chmod_and_chown(p
, S_IFREG
| 0555, 3, 4) == -EINVAL
);
804 assert_se(chmod_and_chown(p
, S_IFDIR
| 0555, 3, 4) == -EINVAL
);
806 assert_se(lstat(p
, &st
) >= 0);
807 assert_se(S_ISLNK(st
.st_mode
));
810 static void create_binary_file(const char *p
, const void *data
, size_t l
) {
811 _cleanup_close_
int fd
= -1;
813 fd
= open(p
, O_CREAT
|O_WRONLY
|O_EXCL
|O_CLOEXEC
, 0600);
815 assert_se(write(fd
, data
, l
) == (ssize_t
) l
);
818 static void test_conservative_rename(void) {
819 _cleanup_(unlink_and_freep
) char *p
= NULL
;
820 _cleanup_free_
char *q
= NULL
;
821 size_t l
= 16*1024 + random_u64() % (32 * 1024); /* some randomly sized buffer 16k…48k */
824 random_bytes(buffer
, l
);
826 assert_se(tempfn_random_child(NULL
, NULL
, &p
) >= 0);
827 create_binary_file(p
, buffer
, l
);
829 assert_se(tempfn_random_child(NULL
, NULL
, &q
) >= 0);
831 /* Check that the hardlinked "copy" is detected */
832 assert_se(link(p
, q
) >= 0);
833 assert_se(conservative_renameat(AT_FDCWD
, q
, AT_FDCWD
, p
) == 0);
834 assert_se(access(q
, F_OK
) < 0 && errno
== ENOENT
);
836 /* Check that a manual copy is detected */
837 assert_se(copy_file(p
, q
, 0, MODE_INVALID
, 0, 0, COPY_REFLINK
) >= 0);
838 assert_se(conservative_renameat(AT_FDCWD
, q
, AT_FDCWD
, p
) == 0);
839 assert_se(access(q
, F_OK
) < 0 && errno
== ENOENT
);
841 /* Check that a manual new writeout is also detected */
842 create_binary_file(q
, buffer
, l
);
843 assert_se(conservative_renameat(AT_FDCWD
, q
, AT_FDCWD
, p
) == 0);
844 assert_se(access(q
, F_OK
) < 0 && errno
== ENOENT
);
846 /* Check that a minimally changed version is detected */
847 buffer
[47] = ~buffer
[47];
848 create_binary_file(q
, buffer
, l
);
849 assert_se(conservative_renameat(AT_FDCWD
, q
, AT_FDCWD
, p
) > 0);
850 assert_se(access(q
, F_OK
) < 0 && errno
== ENOENT
);
852 /* Check that this really is new updated version */
853 create_binary_file(q
, buffer
, l
);
854 assert_se(conservative_renameat(AT_FDCWD
, q
, AT_FDCWD
, p
) == 0);
855 assert_se(access(q
, F_OK
) < 0 && errno
== ENOENT
);
857 /* Make sure we detect extended files */
859 create_binary_file(q
, buffer
, l
);
860 assert_se(conservative_renameat(AT_FDCWD
, q
, AT_FDCWD
, p
) > 0);
861 assert_se(access(q
, F_OK
) < 0 && errno
== ENOENT
);
863 /* Make sure we detect truncated files */
865 create_binary_file(q
, buffer
, l
);
866 assert_se(conservative_renameat(AT_FDCWD
, q
, AT_FDCWD
, p
) > 0);
867 assert_se(access(q
, F_OK
) < 0 && errno
== ENOENT
);
870 static void test_rmdir_parents_one(
875 const char *test_exist
,
876 const char *test_nonexist_subdir
) {
880 log_debug("/* %s(%s, %s) */", __func__
, path
, stop
);
882 p
= strjoina(prefix
, path
);
883 s
= strjoina(prefix
, stop
);
886 assert_se(mkdir_parents(p
, 0700) >= 0);
888 assert_se(rmdir_parents(p
, s
) == expected
);
893 e
= strjoina(prefix
, test_exist
);
894 f
= strjoina(e
, test_nonexist_subdir
);
896 assert_se(access(e
, F_OK
) >= 0);
897 assert_se(access(f
, F_OK
) < 0);
901 static void test_rmdir_parents(void) {
904 log_info("/* %s */", __func__
);
906 temp
= strjoina(arg_test_dir
?: "/tmp", "/test-rmdir.XXXXXX");
907 assert_se(mkdtemp(temp
));
909 test_rmdir_parents_one(temp
, "/aaa/../hoge/foo", "/hoge/foo", -EINVAL
, NULL
, NULL
);
910 test_rmdir_parents_one(temp
, "/aaa/bbb/ccc", "/hoge/../aaa", -EINVAL
, NULL
, NULL
);
912 test_rmdir_parents_one(temp
, "/aaa/bbb/ccc/ddd/eee", "/aaa/bbb/ccc/ddd", 0, "/aaa/bbb/ccc/ddd", "/eee");
913 test_rmdir_parents_one(temp
, "/aaa/bbb/ccc/ddd/eee", "/aaa/bbb/ccc", 0, "/aaa/bbb/ccc", "/ddd");
914 test_rmdir_parents_one(temp
, "/aaa/bbb/ccc/ddd/eee", "/aaa/bbb", 0, "/aaa/bbb", "/ccc");
915 test_rmdir_parents_one(temp
, "/aaa/bbb/ccc/ddd/eee", "/aaa", 0, "/aaa", "/bbb");
916 test_rmdir_parents_one(temp
, "/aaa/bbb/ccc/ddd/eee", "/", 0, "/", "/aaa");
918 test_rmdir_parents_one(temp
, "/aaa/bbb/ccc/ddd/eee", "/aaa/hoge/foo", 0, "/aaa", "/bbb");
919 test_rmdir_parents_one(temp
, "/aaa////bbb/.//ccc//ddd/eee///./.", "///././aaa/.", 0, "/aaa", "/bbb");
921 assert_se(rm_rf(temp
, REMOVE_ROOT
|REMOVE_PHYSICAL
) >= 0);
924 int main(int argc
, char *argv
[]) {
925 test_setup_logging(LOG_INFO
);
927 arg_test_dir
= argv
[1];
929 test_chase_symlinks();
930 test_unlink_noerrno();
931 test_readlink_and_make_absolute();
932 test_get_files_in_directory();
934 test_dot_or_dot_dot();
937 test_unlinkat_deallocate();
938 test_fsync_directory_of_file();
939 test_rename_noreplace();
940 test_chmod_and_chown();
941 test_conservative_rename();
942 test_rmdir_parents();