From: Lennart Poettering Date: Tue, 25 Jun 2024 11:03:55 +0000 (+0200) Subject: test: beef up test case for fid-based equality checks X-Git-Tag: v257-rc1~1003^2 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=a8db162d8a06788c0aa30c863196357f5e367c61;p=thirdparty%2Fsystemd.git test: beef up test case for fid-based equality checks --- diff --git a/src/shared/mount-util.c b/src/shared/mount-util.c index a1f4bee77e1..7e18d12df45 100644 --- a/src/shared/mount-util.c +++ b/src/shared/mount-util.c @@ -1815,3 +1815,13 @@ int make_fsmount( return TAKE_FD(mnt_fd); } + +char* umount_and_unlink_and_free(char *p) { + if (!p) + return NULL; + + PROTECT_ERRNO; + (void) umount2(p, 0); + (void) unlink(p); + return mfree(p); +} diff --git a/src/shared/mount-util.h b/src/shared/mount-util.h index 26d96b27b7f..20c63e137fe 100644 --- a/src/shared/mount-util.h +++ b/src/shared/mount-util.h @@ -100,6 +100,9 @@ static inline char *umount_and_free(char *p) { } DEFINE_TRIVIAL_CLEANUP_FUNC(char*, umount_and_free); +char* umount_and_unlink_and_free(char *p); +DEFINE_TRIVIAL_CLEANUP_FUNC(char*, umount_and_unlink_and_free); + int bind_mount_in_namespace(PidRef *target, const char *propagate_path, const char *incoming_path, const char *src, const char *dest, bool read_only, bool make_file_or_directory); int mount_image_in_namespace(PidRef *target, const char *propagate_path, const char *incoming_path, const char *src, const char *dest, bool read_only, bool make_file_or_directory, const MountOptions *options, const ImagePolicy *image_policy); diff --git a/src/test/test-stat-util.c b/src/test/test-stat-util.c index 6f274c917c5..4687b561fc3 100644 --- a/src/test/test-stat-util.c +++ b/src/test/test-stat-util.c @@ -4,6 +4,7 @@ #include #include #include +#include #include #include "alloc-util.h" @@ -11,6 +12,8 @@ #include "fd-util.h" #include "fs-util.h" #include "macro.h" +#include "missing_mount.h" +#include "mount-util.h" #include "mountpoint-util.h" #include "namespace-util.h" #include "path-util.h" @@ -47,15 +50,58 @@ TEST(inode_same) { _cleanup_close_ int fd = -EBADF; _cleanup_(unlink_tempfilep) char name[] = "/tmp/test-files_same.XXXXXX"; _cleanup_(unlink_tempfilep) char name_alias[] = "/tmp/test-files_same.alias"; + int r; fd = mkostemp_safe(name); assert_se(fd >= 0); assert_se(symlink(name, name_alias) >= 0); - assert_se(inode_same(name, name, 0)); - assert_se(inode_same(name, name, AT_SYMLINK_NOFOLLOW)); - assert_se(inode_same(name, name_alias, 0)); - assert_se(!inode_same(name, name_alias, AT_SYMLINK_NOFOLLOW)); + assert_se(inode_same(name, name, 0) > 0); + assert_se(inode_same(name, name, AT_SYMLINK_NOFOLLOW) > 0); + assert_se(inode_same(name, name_alias, 0) > 0); + assert_se(inode_same(name, name_alias, AT_SYMLINK_NOFOLLOW) == 0); + + assert_se(inode_same("/proc", "/proc", 0)); + assert_se(inode_same("/proc", "/proc", AT_SYMLINK_NOFOLLOW)); + + _cleanup_close_ int fd1 = open("/dev/null", O_CLOEXEC|O_RDONLY), + fd2 = open("/dev/null", O_CLOEXEC|O_RDONLY); + + assert_se(fd1 >= 0); + assert_se(fd2 >= 0); + + assert_se(inode_same_at(fd1, NULL, fd2, NULL, AT_EMPTY_PATH) > 0); + assert_se(inode_same_at(fd2, NULL, fd1, NULL, AT_EMPTY_PATH) > 0); + assert_se(inode_same_at(fd1, NULL, fd2, NULL, AT_EMPTY_PATH|AT_SYMLINK_NOFOLLOW) > 0); + assert_se(inode_same_at(fd2, NULL, fd1, NULL, AT_EMPTY_PATH|AT_SYMLINK_NOFOLLOW) > 0); + assert_se(inode_same_at(fd1, NULL, fd1, NULL, AT_EMPTY_PATH) > 0); + assert_se(inode_same_at(fd2, NULL, fd2, NULL, AT_EMPTY_PATH|AT_SYMLINK_NOFOLLOW) > 0); + + safe_close(fd2); + fd2 = open("/dev/urandom", O_CLOEXEC|O_RDONLY); + assert_se(fd2 >= 0); + + assert_se(inode_same_at(fd1, NULL, fd2, NULL, AT_EMPTY_PATH) == 0); + assert_se(inode_same_at(fd2, NULL, fd1, NULL, AT_EMPTY_PATH) == 0); + assert_se(inode_same_at(fd1, NULL, fd2, NULL, AT_EMPTY_PATH|AT_SYMLINK_NOFOLLOW) == 0); + assert_se(inode_same_at(fd2, NULL, fd1, NULL, AT_EMPTY_PATH|AT_SYMLINK_NOFOLLOW) == 0); + + assert_se(inode_same_at(AT_FDCWD, NULL, AT_FDCWD, NULL, AT_EMPTY_PATH) > 0); + assert_se(inode_same_at(AT_FDCWD, NULL, fd1, NULL, AT_EMPTY_PATH) == 0); + assert_se(inode_same_at(fd1, NULL, AT_FDCWD, NULL, AT_EMPTY_PATH) == 0); + + _cleanup_(umount_and_unlink_and_freep) char *p = NULL; + + assert_se(tempfn_random_child(NULL, NULL, &p) >= 0); + assert_se(touch(p) >= 0); + + r = mount_nofollow_verbose(LOG_ERR, name, p, NULL, MS_BIND, NULL); + if (r < 0) + assert_se(ERRNO_IS_NEG_PRIVILEGE(r)); + else { + assert_se(inode_same(name, p, 0) > 0); + assert_se(inode_same(name, p, AT_SYMLINK_NOFOLLOW) > 0); + } } TEST(is_symlink) {