]>
git.ipfire.org Git - thirdparty/systemd.git/blob - src/test/test-fs-util.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
5 #include "alloc-util.h"
8 #include "id128-util.h"
11 #include "path-util.h"
13 #include "stdio-util.h"
14 #include "string-util.h"
17 #include "tmpfile-util.h"
18 #include "user-util.h"
22 static const char *arg_test_dir
= NULL
;
24 static void test_chase_symlinks(void) {
25 _cleanup_free_
char *result
= NULL
;
27 const char *top
, *p
, *pslash
, *q
, *qslash
;
31 log_info("/* %s */", __func__
);
33 temp
= strjoina(arg_test_dir
?: "/tmp", "/test-chase.XXXXXX");
34 assert_se(mkdtemp(temp
));
36 top
= strjoina(temp
, "/top");
37 assert_se(mkdir(top
, 0700) >= 0);
39 p
= strjoina(top
, "/dot");
40 if (symlink(".", p
) < 0) {
41 assert_se(IN_SET(errno
, EINVAL
, ENOSYS
, ENOTTY
, EPERM
));
42 log_tests_skipped_errno(errno
, "symlink() not possible");
46 p
= strjoina(top
, "/dotdot");
47 assert_se(symlink("..", p
) >= 0);
49 p
= strjoina(top
, "/dotdota");
50 assert_se(symlink("../a", p
) >= 0);
52 p
= strjoina(temp
, "/a");
53 assert_se(symlink("b", p
) >= 0);
55 p
= strjoina(temp
, "/b");
56 assert_se(symlink("/usr", p
) >= 0);
58 p
= strjoina(temp
, "/start");
59 assert_se(symlink("top/dot/dotdota", p
) >= 0);
61 /* Paths that use symlinks underneath the "root" */
63 r
= chase_symlinks(p
, NULL
, 0, &result
);
65 assert_se(path_equal(result
, "/usr"));
66 result
= mfree(result
);
68 pslash
= strjoina(p
, "/");
69 r
= chase_symlinks(pslash
, NULL
, 0, &result
);
71 assert_se(path_equal(result
, "/usr/"));
72 result
= mfree(result
);
74 r
= chase_symlinks(p
, temp
, 0, &result
);
75 assert_se(r
== -ENOENT
);
77 r
= chase_symlinks(pslash
, temp
, 0, &result
);
78 assert_se(r
== -ENOENT
);
80 q
= strjoina(temp
, "/usr");
82 r
= chase_symlinks(p
, temp
, CHASE_NONEXISTENT
, &result
);
84 assert_se(path_equal(result
, q
));
85 result
= mfree(result
);
87 qslash
= strjoina(q
, "/");
89 r
= chase_symlinks(pslash
, temp
, CHASE_NONEXISTENT
, &result
);
91 assert_se(path_equal(result
, qslash
));
92 result
= mfree(result
);
94 assert_se(mkdir(q
, 0700) >= 0);
96 r
= chase_symlinks(p
, temp
, 0, &result
);
98 assert_se(path_equal(result
, q
));
99 result
= mfree(result
);
101 r
= chase_symlinks(pslash
, temp
, 0, &result
);
103 assert_se(path_equal(result
, qslash
));
104 result
= mfree(result
);
106 p
= strjoina(temp
, "/slash");
107 assert_se(symlink("/", p
) >= 0);
109 r
= chase_symlinks(p
, NULL
, 0, &result
);
111 assert_se(path_equal(result
, "/"));
112 result
= mfree(result
);
114 r
= chase_symlinks(p
, temp
, 0, &result
);
116 assert_se(path_equal(result
, temp
));
117 result
= mfree(result
);
119 /* Paths that would "escape" outside of the "root" */
121 p
= strjoina(temp
, "/6dots");
122 assert_se(symlink("../../..", p
) >= 0);
124 r
= chase_symlinks(p
, temp
, 0, &result
);
125 assert_se(r
> 0 && path_equal(result
, temp
));
126 result
= mfree(result
);
128 p
= strjoina(temp
, "/6dotsusr");
129 assert_se(symlink("../../../usr", p
) >= 0);
131 r
= chase_symlinks(p
, temp
, 0, &result
);
132 assert_se(r
> 0 && path_equal(result
, q
));
133 result
= mfree(result
);
135 p
= strjoina(temp
, "/top/8dotsusr");
136 assert_se(symlink("../../../../usr", p
) >= 0);
138 r
= chase_symlinks(p
, temp
, 0, &result
);
139 assert_se(r
> 0 && path_equal(result
, q
));
140 result
= mfree(result
);
142 /* Paths that contain repeated slashes */
144 p
= strjoina(temp
, "/slashslash");
145 assert_se(symlink("///usr///", p
) >= 0);
147 r
= chase_symlinks(p
, NULL
, 0, &result
);
149 assert_se(path_equal(result
, "/usr"));
150 result
= mfree(result
);
152 r
= chase_symlinks(p
, temp
, 0, &result
);
154 assert_se(path_equal(result
, q
));
155 result
= mfree(result
);
157 /* Paths underneath the "root" with different UIDs while using CHASE_SAFE */
159 if (geteuid() == 0) {
160 p
= strjoina(temp
, "/user");
161 assert_se(mkdir(p
, 0755) >= 0);
162 assert_se(chown(p
, UID_NOBODY
, GID_NOBODY
) >= 0);
164 q
= strjoina(temp
, "/user/root");
165 assert_se(mkdir(q
, 0755) >= 0);
167 p
= strjoina(q
, "/link");
168 assert_se(symlink("/", p
) >= 0);
170 /* Fail when user-owned directories contain root-owned subdirectories. */
171 r
= chase_symlinks(p
, temp
, CHASE_SAFE
, &result
);
172 assert_se(r
== -ENOLINK
);
173 result
= mfree(result
);
175 /* Allow this when the user-owned directories are all in the "root". */
176 r
= chase_symlinks(p
, q
, CHASE_SAFE
, &result
);
178 result
= mfree(result
);
183 r
= chase_symlinks("/etc/./.././", NULL
, 0, &result
);
185 assert_se(path_equal(result
, "/"));
186 result
= mfree(result
);
188 r
= chase_symlinks("/etc/./.././", "/etc", 0, &result
);
189 assert_se(r
> 0 && path_equal(result
, "/etc"));
190 result
= mfree(result
);
192 r
= chase_symlinks("/../.././//../../etc", NULL
, 0, &result
);
194 assert_se(streq(result
, "/etc"));
195 result
= mfree(result
);
197 r
= chase_symlinks("/../.././//../../test-chase.fsldajfl", NULL
, CHASE_NONEXISTENT
, &result
);
199 assert_se(streq(result
, "/test-chase.fsldajfl"));
200 result
= mfree(result
);
202 r
= chase_symlinks("/../.././//../../etc", "/", CHASE_PREFIX_ROOT
, &result
);
204 assert_se(streq(result
, "/etc"));
205 result
= mfree(result
);
207 r
= chase_symlinks("/../.././//../../test-chase.fsldajfl", "/", CHASE_PREFIX_ROOT
|CHASE_NONEXISTENT
, &result
);
209 assert_se(streq(result
, "/test-chase.fsldajfl"));
210 result
= mfree(result
);
212 r
= chase_symlinks("/etc/machine-id/foo", NULL
, 0, &result
);
213 assert_se(r
== -ENOTDIR
);
214 result
= mfree(result
);
216 /* Path that loops back to self */
218 p
= strjoina(temp
, "/recursive-symlink");
219 assert_se(symlink("recursive-symlink", p
) >= 0);
220 r
= chase_symlinks(p
, NULL
, 0, &result
);
221 assert_se(r
== -ELOOP
);
223 /* Path which doesn't exist */
225 p
= strjoina(temp
, "/idontexist");
226 r
= chase_symlinks(p
, NULL
, 0, &result
);
227 assert_se(r
== -ENOENT
);
229 r
= chase_symlinks(p
, NULL
, CHASE_NONEXISTENT
, &result
);
231 assert_se(path_equal(result
, p
));
232 result
= mfree(result
);
234 p
= strjoina(temp
, "/idontexist/meneither");
235 r
= chase_symlinks(p
, NULL
, 0, &result
);
236 assert_se(r
== -ENOENT
);
238 r
= chase_symlinks(p
, NULL
, CHASE_NONEXISTENT
, &result
);
240 assert_se(path_equal(result
, p
));
241 result
= mfree(result
);
243 /* Path which doesn't exist, but contains weird stuff */
245 p
= strjoina(temp
, "/idontexist/..");
246 r
= chase_symlinks(p
, NULL
, 0, &result
);
247 assert_se(r
== -ENOENT
);
249 r
= chase_symlinks(p
, NULL
, CHASE_NONEXISTENT
, &result
);
250 assert_se(r
== -ENOENT
);
252 p
= strjoina(temp
, "/target");
253 q
= strjoina(temp
, "/top");
254 assert_se(symlink(q
, p
) >= 0);
255 p
= strjoina(temp
, "/target/idontexist");
256 r
= chase_symlinks(p
, NULL
, 0, &result
);
257 assert_se(r
== -ENOENT
);
259 if (geteuid() == 0) {
260 p
= strjoina(temp
, "/priv1");
261 assert_se(mkdir(p
, 0755) >= 0);
263 q
= strjoina(p
, "/priv2");
264 assert_se(mkdir(q
, 0755) >= 0);
266 assert_se(chase_symlinks(q
, NULL
, CHASE_SAFE
, NULL
) >= 0);
268 assert_se(chown(q
, UID_NOBODY
, GID_NOBODY
) >= 0);
269 assert_se(chase_symlinks(q
, NULL
, CHASE_SAFE
, NULL
) >= 0);
271 assert_se(chown(p
, UID_NOBODY
, GID_NOBODY
) >= 0);
272 assert_se(chase_symlinks(q
, NULL
, CHASE_SAFE
, NULL
) >= 0);
274 assert_se(chown(q
, 0, 0) >= 0);
275 assert_se(chase_symlinks(q
, NULL
, CHASE_SAFE
, NULL
) == -ENOLINK
);
277 assert_se(rmdir(q
) >= 0);
278 assert_se(symlink("/etc/passwd", q
) >= 0);
279 assert_se(chase_symlinks(q
, NULL
, CHASE_SAFE
, NULL
) == -ENOLINK
);
281 assert_se(chown(p
, 0, 0) >= 0);
282 assert_se(chase_symlinks(q
, NULL
, CHASE_SAFE
, NULL
) >= 0);
285 p
= strjoina(temp
, "/machine-id-test");
286 assert_se(symlink("/usr/../etc/./machine-id", p
) >= 0);
288 pfd
= chase_symlinks(p
, NULL
, CHASE_OPEN
, NULL
);
289 if (pfd
!= -ENOENT
) {
290 _cleanup_close_
int fd
= -1;
295 fd
= fd_reopen(pfd
, O_RDONLY
|O_CLOEXEC
);
299 assert_se(id128_read_fd(fd
, ID128_PLAIN
, &a
) >= 0);
300 assert_se(sd_id128_get_machine(&b
) >= 0);
301 assert_se(sd_id128_equal(a
, b
));
304 /* Test CHASE_NOFOLLOW */
306 p
= strjoina(temp
, "/target");
307 q
= strjoina(temp
, "/symlink");
308 assert_se(symlink(p
, q
) >= 0);
309 pfd
= chase_symlinks(q
, NULL
, CHASE_OPEN
|CHASE_NOFOLLOW
, &result
);
311 assert_se(path_equal(result
, q
));
312 assert_se(fstat(pfd
, &st
) >= 0);
313 assert_se(S_ISLNK(st
.st_mode
));
314 result
= mfree(result
);
316 /* s1 -> s2 -> nonexistent */
317 q
= strjoina(temp
, "/s1");
318 assert_se(symlink("s2", q
) >= 0);
319 p
= strjoina(temp
, "/s2");
320 assert_se(symlink("nonexistent", p
) >= 0);
321 pfd
= chase_symlinks(q
, NULL
, CHASE_OPEN
|CHASE_NOFOLLOW
, &result
);
323 assert_se(path_equal(result
, q
));
324 assert_se(fstat(pfd
, &st
) >= 0);
325 assert_se(S_ISLNK(st
.st_mode
));
326 result
= mfree(result
);
330 p
= strjoina(temp
, "/start");
331 r
= chase_symlinks(p
, NULL
, CHASE_STEP
, &result
);
333 p
= strjoina(temp
, "/top/dot/dotdota");
334 assert_se(streq(p
, result
));
335 result
= mfree(result
);
337 r
= chase_symlinks(p
, NULL
, CHASE_STEP
, &result
);
339 p
= strjoina(temp
, "/top/./dotdota");
340 assert_se(streq(p
, result
));
341 result
= mfree(result
);
343 r
= chase_symlinks(p
, NULL
, CHASE_STEP
, &result
);
345 p
= strjoina(temp
, "/top/../a");
346 assert_se(streq(p
, result
));
347 result
= mfree(result
);
349 r
= chase_symlinks(p
, NULL
, CHASE_STEP
, &result
);
351 p
= strjoina(temp
, "/a");
352 assert_se(streq(p
, result
));
353 result
= mfree(result
);
355 r
= chase_symlinks(p
, NULL
, CHASE_STEP
, &result
);
357 p
= strjoina(temp
, "/b");
358 assert_se(streq(p
, result
));
359 result
= mfree(result
);
361 r
= chase_symlinks(p
, NULL
, CHASE_STEP
, &result
);
363 assert_se(streq("/usr", result
));
364 result
= mfree(result
);
366 r
= chase_symlinks("/usr", NULL
, CHASE_STEP
, &result
);
368 assert_se(streq("/usr", result
));
369 result
= mfree(result
);
372 assert_se(rm_rf(temp
, REMOVE_ROOT
|REMOVE_PHYSICAL
) >= 0);
375 static void test_unlink_noerrno(void) {
379 log_info("/* %s */", __func__
);
381 name
= strjoina(arg_test_dir
?: "/tmp", "/test-close_nointr.XXXXXX");
382 fd
= mkostemp_safe(name
);
384 assert_se(close_nointr(fd
) >= 0);
389 assert_se(unlink_noerrno(name
) >= 0);
390 assert_se(errno
== 42);
391 assert_se(unlink_noerrno(name
) < 0);
392 assert_se(errno
== 42);
396 static void test_readlink_and_make_absolute(void) {
397 const char *tempdir
, *name
, *name2
, *name_alias
;
398 _cleanup_free_
char *r1
= NULL
, *r2
= NULL
, *pwd
= NULL
;
400 log_info("/* %s */", __func__
);
402 tempdir
= strjoina(arg_test_dir
?: "/tmp", "/test-readlink_and_make_absolute");
403 name
= strjoina(tempdir
, "/original");
404 name2
= "test-readlink_and_make_absolute/original";
405 name_alias
= strjoina(arg_test_dir
?: "/tmp", "/test-readlink_and_make_absolute-alias");
407 assert_se(mkdir_safe(tempdir
, 0755, getuid(), getgid(), MKDIR_WARN_MODE
) >= 0);
408 assert_se(touch(name
) >= 0);
410 if (symlink(name
, name_alias
) < 0) {
411 assert_se(IN_SET(errno
, EINVAL
, ENOSYS
, ENOTTY
, EPERM
));
412 log_tests_skipped_errno(errno
, "symlink() not possible");
414 assert_se(readlink_and_make_absolute(name_alias
, &r1
) >= 0);
415 assert_se(streq(r1
, name
));
416 assert_se(unlink(name_alias
) >= 0);
418 assert_se(safe_getcwd(&pwd
) >= 0);
420 assert_se(chdir(tempdir
) >= 0);
421 assert_se(symlink(name2
, name_alias
) >= 0);
422 assert_se(readlink_and_make_absolute(name_alias
, &r2
) >= 0);
423 assert_se(streq(r2
, name
));
424 assert_se(unlink(name_alias
) >= 0);
426 assert_se(chdir(pwd
) >= 0);
429 assert_se(rm_rf(tempdir
, REMOVE_ROOT
|REMOVE_PHYSICAL
) >= 0);
432 static void test_get_files_in_directory(void) {
433 _cleanup_strv_free_
char **l
= NULL
, **t
= NULL
;
435 assert_se(get_files_in_directory(arg_test_dir
?: "/tmp", &l
) >= 0);
436 assert_se(get_files_in_directory(".", &t
) >= 0);
437 assert_se(get_files_in_directory(".", NULL
) >= 0);
440 static void test_var_tmp(void) {
441 _cleanup_free_
char *tmpdir_backup
= NULL
, *temp_backup
= NULL
, *tmp_backup
= NULL
;
442 const char *tmp_dir
= NULL
, *t
;
444 log_info("/* %s */", __func__
);
446 t
= getenv("TMPDIR");
448 tmpdir_backup
= strdup(t
);
449 assert_se(tmpdir_backup
);
454 temp_backup
= strdup(t
);
455 assert_se(temp_backup
);
460 tmp_backup
= strdup(t
);
461 assert_se(tmp_backup
);
464 assert_se(unsetenv("TMPDIR") >= 0);
465 assert_se(unsetenv("TEMP") >= 0);
466 assert_se(unsetenv("TMP") >= 0);
468 assert_se(var_tmp_dir(&tmp_dir
) >= 0);
469 assert_se(streq(tmp_dir
, "/var/tmp"));
471 assert_se(setenv("TMPDIR", "/tmp", true) >= 0);
472 assert_se(streq(getenv("TMPDIR"), "/tmp"));
474 assert_se(var_tmp_dir(&tmp_dir
) >= 0);
475 assert_se(streq(tmp_dir
, "/tmp"));
477 assert_se(setenv("TMPDIR", "/88_does_not_exist_88", true) >= 0);
478 assert_se(streq(getenv("TMPDIR"), "/88_does_not_exist_88"));
480 assert_se(var_tmp_dir(&tmp_dir
) >= 0);
481 assert_se(streq(tmp_dir
, "/var/tmp"));
484 assert_se(setenv("TMPDIR", tmpdir_backup
, true) >= 0);
485 assert_se(streq(getenv("TMPDIR"), tmpdir_backup
));
489 assert_se(setenv("TEMP", temp_backup
, true) >= 0);
490 assert_se(streq(getenv("TEMP"), temp_backup
));
494 assert_se(setenv("TMP", tmp_backup
, true) >= 0);
495 assert_se(streq(getenv("TMP"), tmp_backup
));
499 static void test_dot_or_dot_dot(void) {
500 log_info("/* %s */", __func__
);
502 assert_se(!dot_or_dot_dot(NULL
));
503 assert_se(!dot_or_dot_dot(""));
504 assert_se(!dot_or_dot_dot("xxx"));
505 assert_se(dot_or_dot_dot("."));
506 assert_se(dot_or_dot_dot(".."));
507 assert_se(!dot_or_dot_dot(".foo"));
508 assert_se(!dot_or_dot_dot("..foo"));
511 static void test_access_fd(void) {
512 _cleanup_(rmdir_and_freep
) char *p
= NULL
;
513 _cleanup_close_
int fd
= -1;
516 log_info("/* %s */", __func__
);
518 a
= strjoina(arg_test_dir
?: "/tmp", "/access-fd.XXXXXX");
519 assert_se(mkdtemp_malloc(a
, &p
) >= 0);
521 fd
= open(p
, O_RDONLY
|O_DIRECTORY
|O_CLOEXEC
);
524 assert_se(access_fd(fd
, R_OK
) >= 0);
525 assert_se(access_fd(fd
, F_OK
) >= 0);
526 assert_se(access_fd(fd
, W_OK
) >= 0);
528 assert_se(fchmod(fd
, 0000) >= 0);
530 assert_se(access_fd(fd
, F_OK
) >= 0);
532 if (geteuid() == 0) {
533 assert_se(access_fd(fd
, R_OK
) >= 0);
534 assert_se(access_fd(fd
, W_OK
) >= 0);
536 assert_se(access_fd(fd
, R_OK
) == -EACCES
);
537 assert_se(access_fd(fd
, W_OK
) == -EACCES
);
541 static void test_touch_file(void) {
542 uid_t test_uid
, test_gid
;
543 _cleanup_(rm_rf_physical_and_freep
) char *p
= NULL
;
549 log_info("/* %s */", __func__
);
551 test_uid
= geteuid() == 0 ? 65534 : getuid();
552 test_gid
= geteuid() == 0 ? 65534 : getgid();
554 test_mtime
= usec_sub_unsigned(now(CLOCK_REALTIME
), USEC_PER_WEEK
);
556 a
= strjoina(arg_test_dir
?: "/dev/shm", "/touch-file-XXXXXX");
557 assert_se(mkdtemp_malloc(a
, &p
) >= 0);
559 a
= strjoina(p
, "/regular");
560 r
= touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640);
562 assert_se(IN_SET(r
, -EINVAL
, -ENOSYS
, -ENOTTY
, -EPERM
));
563 log_tests_skipped_errno(errno
, "touch_file() not possible");
567 assert_se(lstat(a
, &st
) >= 0);
568 assert_se(st
.st_uid
== test_uid
);
569 assert_se(st
.st_gid
== test_gid
);
570 assert_se(S_ISREG(st
.st_mode
));
571 assert_se((st
.st_mode
& 0777) == 0640);
572 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
574 a
= strjoina(p
, "/dir");
575 assert_se(mkdir(a
, 0775) >= 0);
576 assert_se(touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640) >= 0);
577 assert_se(lstat(a
, &st
) >= 0);
578 assert_se(st
.st_uid
== test_uid
);
579 assert_se(st
.st_gid
== test_gid
);
580 assert_se(S_ISDIR(st
.st_mode
));
581 assert_se((st
.st_mode
& 0777) == 0640);
582 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
584 a
= strjoina(p
, "/fifo");
585 assert_se(mkfifo(a
, 0775) >= 0);
586 assert_se(touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640) >= 0);
587 assert_se(lstat(a
, &st
) >= 0);
588 assert_se(st
.st_uid
== test_uid
);
589 assert_se(st
.st_gid
== test_gid
);
590 assert_se(S_ISFIFO(st
.st_mode
));
591 assert_se((st
.st_mode
& 0777) == 0640);
592 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
594 a
= strjoina(p
, "/sock");
595 assert_se(mknod(a
, 0775 | S_IFSOCK
, 0) >= 0);
596 assert_se(touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640) >= 0);
597 assert_se(lstat(a
, &st
) >= 0);
598 assert_se(st
.st_uid
== test_uid
);
599 assert_se(st
.st_gid
== test_gid
);
600 assert_se(S_ISSOCK(st
.st_mode
));
601 assert_se((st
.st_mode
& 0777) == 0640);
602 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
604 if (geteuid() == 0) {
605 a
= strjoina(p
, "/cdev");
606 r
= mknod(a
, 0775 | S_IFCHR
, makedev(0, 0));
607 if (r
< 0 && errno
== EPERM
&& detect_container() > 0) {
608 log_notice("Running in unprivileged container? Skipping remaining tests in %s", __func__
);
612 assert_se(touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640) >= 0);
613 assert_se(lstat(a
, &st
) >= 0);
614 assert_se(st
.st_uid
== test_uid
);
615 assert_se(st
.st_gid
== test_gid
);
616 assert_se(S_ISCHR(st
.st_mode
));
617 assert_se((st
.st_mode
& 0777) == 0640);
618 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
620 a
= strjoina(p
, "/bdev");
621 assert_se(mknod(a
, 0775 | S_IFBLK
, makedev(0, 0)) >= 0);
622 assert_se(touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640) >= 0);
623 assert_se(lstat(a
, &st
) >= 0);
624 assert_se(st
.st_uid
== test_uid
);
625 assert_se(st
.st_gid
== test_gid
);
626 assert_se(S_ISBLK(st
.st_mode
));
627 assert_se((st
.st_mode
& 0777) == 0640);
628 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
631 a
= strjoina(p
, "/lnk");
632 assert_se(symlink("target", a
) >= 0);
633 assert_se(touch_file(a
, false, test_mtime
, test_uid
, test_gid
, 0640) >= 0);
634 assert_se(lstat(a
, &st
) >= 0);
635 assert_se(st
.st_uid
== test_uid
);
636 assert_se(st
.st_gid
== test_gid
);
637 assert_se(S_ISLNK(st
.st_mode
));
638 assert_se((st
.st_mode
& 0777) == 0640);
639 assert_se(timespec_load(&st
.st_mtim
) == test_mtime
);
642 static void test_unlinkat_deallocate(void) {
643 _cleanup_free_
char *p
= NULL
;
644 _cleanup_close_
int fd
= -1;
647 log_info("/* %s */", __func__
);
649 assert_se(tempfn_random_child(arg_test_dir
, "unlink-deallocation", &p
) >= 0);
651 fd
= open(p
, O_WRONLY
|O_CLOEXEC
|O_CREAT
|O_EXCL
, 0600);
654 assert_se(write(fd
, "hallo\n", 6) == 6);
656 assert_se(fstat(fd
, &st
) >= 0);
657 assert_se(st
.st_size
== 6);
658 assert_se(st
.st_blocks
> 0);
659 assert_se(st
.st_nlink
== 1);
661 assert_se(unlinkat_deallocate(AT_FDCWD
, p
, 0) >= 0);
663 assert_se(fstat(fd
, &st
) >= 0);
664 assert_se(IN_SET(st
.st_size
, 0, 6)); /* depending on whether hole punching worked the size will be 6
665 (it worked) or 0 (we had to resort to truncation) */
666 assert_se(st
.st_blocks
== 0);
667 assert_se(st
.st_nlink
== 0);
670 static void test_fsync_directory_of_file(void) {
671 _cleanup_close_
int fd
= -1;
673 log_info("/* %s */", __func__
);
675 fd
= open_tmpfile_unlinkable(arg_test_dir
, O_RDWR
);
678 assert_se(fsync_directory_of_file(fd
) >= 0);
681 static void test_rename_noreplace(void) {
682 static const char* const table
[] = {
691 _cleanup_(rm_rf_physical_and_freep
) char *z
= NULL
;
692 const char *j
= NULL
;
695 log_info("/* %s */", __func__
);
698 j
= strjoina(arg_test_dir
, "/testXXXXXX");
699 assert_se(mkdtemp_malloc(j
, &z
) >= 0);
701 j
= strjoina(z
, table
[0]);
702 assert_se(touch(j
) >= 0);
704 j
= strjoina(z
, table
[1]);
705 assert_se(mkdir(j
, 0777) >= 0);
707 j
= strjoina(z
, table
[2]);
708 (void) mkfifo(j
, 0777);
710 j
= strjoina(z
, table
[3]);
711 (void) mknod(j
, S_IFSOCK
| 0777, 0);
713 j
= strjoina(z
, table
[4]);
714 (void) symlink("foobar", j
);
716 STRV_FOREACH(a
, (char**) table
) {
717 _cleanup_free_
char *x
= NULL
, *y
= NULL
;
722 if (access(x
, F_OK
) < 0) {
723 assert_se(errno
== ENOENT
);
727 STRV_FOREACH(b
, (char**) table
) {
728 _cleanup_free_
char *w
= NULL
;
733 if (access(w
, F_OK
) < 0) {
734 assert_se(errno
== ENOENT
);
738 assert_se(rename_noreplace(AT_FDCWD
, w
, AT_FDCWD
, y
) == -EEXIST
);
741 y
= strjoin(z
, "/somethingelse");
744 assert_se(rename_noreplace(AT_FDCWD
, x
, AT_FDCWD
, y
) >= 0);
745 assert_se(rename_noreplace(AT_FDCWD
, y
, AT_FDCWD
, x
) >= 0);
749 int main(int argc
, char *argv
[]) {
750 test_setup_logging(LOG_INFO
);
752 arg_test_dir
= argv
[1];
754 test_unlink_noerrno();
755 test_get_files_in_directory();
756 test_readlink_and_make_absolute();
758 test_chase_symlinks();
759 test_dot_or_dot_dot();
762 test_unlinkat_deallocate();
763 test_fsync_directory_of_file();
764 test_rename_noreplace();