c6e5874a4c
It has been reported in b2/19657449 and b2/19381040 that fchmodat AT_SYMLINK_NOFOLLOW operation on symlink can succeed. It seems to be controlled by kernel(version or configuration) or user configuration whether chmod is allowed on symlinks. Unless we can disable chmod on symlinks in bionic explicitly, we can not guarantee that the test can pass. But it seems reasonable to allow chmod on symlink if kernel allows to. So We prefer to loosen the test here, accepting both success and failure when doing chmod operation on symlinks. Bug: 19657449 Bug: 19381040 Change-Id: I780e84f0b50d0412fbac9f1c240d07e984892a28
288 lines
8.0 KiB
C++
288 lines
8.0 KiB
C++
/*
|
|
* Copyright (C) 2013 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include <gtest/gtest.h>
|
|
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
#include <stdlib.h>
|
|
#include <sys/stat.h>
|
|
|
|
#include "TemporaryFile.h"
|
|
|
|
TEST(sys_stat, futimens) {
|
|
FILE* fp = tmpfile();
|
|
ASSERT_TRUE(fp != NULL);
|
|
|
|
int fd = fileno(fp);
|
|
ASSERT_NE(fd, -1);
|
|
|
|
timespec times[2];
|
|
times[0].tv_sec = 123;
|
|
times[0].tv_nsec = 0;
|
|
times[1].tv_sec = 456;
|
|
times[1].tv_nsec = 0;
|
|
ASSERT_EQ(0, futimens(fd, times)) << strerror(errno);
|
|
|
|
struct stat sb;
|
|
ASSERT_EQ(0, fstat(fd, &sb));
|
|
ASSERT_EQ(times[0].tv_sec, static_cast<long>(sb.st_atime));
|
|
ASSERT_EQ(times[1].tv_sec, static_cast<long>(sb.st_mtime));
|
|
|
|
fclose(fp);
|
|
}
|
|
|
|
TEST(sys_stat, futimens_EBADF) {
|
|
timespec times[2];
|
|
times[0].tv_sec = 123;
|
|
times[0].tv_nsec = 0;
|
|
times[1].tv_sec = 456;
|
|
times[1].tv_nsec = 0;
|
|
ASSERT_EQ(-1, futimens(-1, times));
|
|
ASSERT_EQ(EBADF, errno);
|
|
}
|
|
|
|
TEST(sys_stat, mkfifo_failure) {
|
|
errno = 0;
|
|
ASSERT_EQ(-1, mkfifo("/", 0666));
|
|
ASSERT_EQ(EEXIST, errno);
|
|
}
|
|
|
|
TEST(sys_stat, mkfifoat_failure) {
|
|
errno = 0;
|
|
ASSERT_EQ(-1, mkfifoat(-2, "x", 0666));
|
|
ASSERT_EQ(EBADF, errno);
|
|
}
|
|
|
|
TEST(sys_stat, mkfifo) {
|
|
if (getuid() == 0) {
|
|
// Racy but probably sufficient way to get a suitable filename.
|
|
std::string path;
|
|
{
|
|
TemporaryFile tf;
|
|
path = tf.filename;
|
|
}
|
|
|
|
ASSERT_EQ(0, mkfifo(path.c_str(), 0666));
|
|
struct stat sb;
|
|
ASSERT_EQ(0, stat(path.c_str(), &sb));
|
|
ASSERT_TRUE(S_ISFIFO(sb.st_mode));
|
|
unlink(path.c_str());
|
|
} else {
|
|
// SELinux policy forbids us from creating FIFOs. http://b/17646702.
|
|
GTEST_LOG_(INFO) << "This test only performs a test when run as root.";
|
|
}
|
|
}
|
|
|
|
TEST(sys_stat, stat64_lstat64_fstat64) {
|
|
struct stat64 sb;
|
|
ASSERT_EQ(0, stat64("/proc/version", &sb));
|
|
ASSERT_EQ(0, lstat64("/proc/version", &sb));
|
|
int fd = open("/proc/version", O_RDONLY);
|
|
ASSERT_EQ(0, fstat64(fd, &sb));
|
|
close(fd);
|
|
}
|
|
|
|
TEST(sys_stat, fchmodat_EFAULT_file) {
|
|
ASSERT_EQ(-1, fchmodat(AT_FDCWD, (char *) 0x1, 0751, 0));
|
|
ASSERT_EQ(EFAULT, errno);
|
|
}
|
|
|
|
TEST(sys_stat, fchmodat_AT_SYMLINK_NOFOLLOW_EFAULT_file) {
|
|
ASSERT_EQ(-1, fchmodat(AT_FDCWD, (char *) 0x1, 0751, AT_SYMLINK_NOFOLLOW));
|
|
#if defined(__BIONIC__)
|
|
ASSERT_EQ(EFAULT, errno);
|
|
#else
|
|
// glibc 2.19 does not implement AT_SYMLINK_NOFOLLOW and always
|
|
// returns ENOTSUP
|
|
ASSERT_EQ(ENOTSUP, errno);
|
|
#endif
|
|
}
|
|
|
|
TEST(sys_stat, fchmodat_bad_flags) {
|
|
ASSERT_EQ(-1, fchmodat(AT_FDCWD, "/blah", 0751, ~AT_SYMLINK_NOFOLLOW));
|
|
ASSERT_EQ(EINVAL, errno);
|
|
}
|
|
|
|
TEST(sys_stat, fchmodat_bad_flags_ALL) {
|
|
ASSERT_EQ(-1, fchmodat(AT_FDCWD, "/blah", 0751, ~0));
|
|
ASSERT_EQ(EINVAL, errno);
|
|
}
|
|
|
|
TEST(sys_stat, fchmodat_nonexistant_file) {
|
|
ASSERT_EQ(-1, fchmodat(AT_FDCWD, "/blah", 0751, 0));
|
|
ASSERT_EQ(ENOENT, errno);
|
|
}
|
|
|
|
TEST(sys_stat, fchmodat_AT_SYMLINK_NOFOLLOW_nonexistant_file) {
|
|
ASSERT_EQ(-1, fchmodat(AT_FDCWD, "/blah", 0751, AT_SYMLINK_NOFOLLOW));
|
|
#if defined(__BIONIC__)
|
|
ASSERT_EQ(ENOENT, errno);
|
|
#else
|
|
// glibc 2.19 does not implement AT_SYMLINK_NOFOLLOW and always
|
|
// returns ENOTSUP
|
|
ASSERT_EQ(ENOTSUP, errno);
|
|
#endif
|
|
}
|
|
|
|
static void AssertFileModeEquals(mode_t expected_mode, const char* filename) {
|
|
struct stat sb;
|
|
ASSERT_EQ(0, stat(filename, &sb));
|
|
mode_t mask = S_IRWXU | S_IRWXG | S_IRWXO;
|
|
ASSERT_EQ(expected_mode & mask, static_cast<mode_t>(sb.st_mode) & mask);
|
|
}
|
|
|
|
TEST(sys_stat, fchmodat_file) {
|
|
TemporaryFile tf;
|
|
|
|
ASSERT_EQ(0, fchmodat(AT_FDCWD, tf.filename, 0751, 0));
|
|
AssertFileModeEquals(0751, tf.filename);
|
|
}
|
|
|
|
TEST(sys_stat, fchmodat_AT_SYMLINK_NOFOLLOW_file) {
|
|
TemporaryFile tf;
|
|
errno = 0;
|
|
int result = fchmodat(AT_FDCWD, tf.filename, 0751, AT_SYMLINK_NOFOLLOW);
|
|
|
|
#if defined(__BIONIC__)
|
|
ASSERT_EQ(0, result);
|
|
ASSERT_EQ(0, errno);
|
|
AssertFileModeEquals(0751, tf.filename);
|
|
#else
|
|
// glibc 2.19 does not implement AT_SYMLINK_NOFOLLOW and always
|
|
// returns ENOTSUP
|
|
ASSERT_EQ(-1, result);
|
|
ASSERT_EQ(ENOTSUP, errno);
|
|
#endif
|
|
}
|
|
|
|
TEST(sys_stat, fchmodat_symlink) {
|
|
TemporaryFile tf;
|
|
char linkname[255];
|
|
|
|
snprintf(linkname, sizeof(linkname), "%s.link", tf.filename);
|
|
|
|
ASSERT_EQ(0, symlink(tf.filename, linkname));
|
|
ASSERT_EQ(0, fchmodat(AT_FDCWD, linkname, 0751, 0));
|
|
AssertFileModeEquals(0751, tf.filename);
|
|
unlink(linkname);
|
|
}
|
|
|
|
TEST(sys_stat, fchmodat_dangling_symlink) {
|
|
TemporaryFile tf;
|
|
char linkname[255];
|
|
char target[255];
|
|
|
|
snprintf(linkname, sizeof(linkname), "%s.link", tf.filename);
|
|
snprintf(target, sizeof(target), "%s.doesnotexist", tf.filename);
|
|
|
|
ASSERT_EQ(0, symlink(target, linkname));
|
|
ASSERT_EQ(-1, fchmodat(AT_FDCWD, linkname, 0751, 0));
|
|
ASSERT_EQ(ENOENT, errno);
|
|
unlink(linkname);
|
|
}
|
|
|
|
static void AssertSymlinkModeEquals(mode_t expected_mode, const char* linkname) {
|
|
struct stat sb;
|
|
ASSERT_EQ(0, fstatat(AT_FDCWD, linkname, &sb, AT_SYMLINK_NOFOLLOW));
|
|
mode_t mask = S_IRWXU | S_IRWXG | S_IRWXO;
|
|
ASSERT_EQ(expected_mode & mask, static_cast<mode_t>(sb.st_mode) & mask);
|
|
}
|
|
|
|
TEST(sys_stat, fchmodat_AT_SYMLINK_NOFOLLOW_with_symlink) {
|
|
TemporaryFile tf;
|
|
struct stat tf_sb;
|
|
ASSERT_EQ(0, stat(tf.filename, &tf_sb));
|
|
|
|
char linkname[255];
|
|
snprintf(linkname, sizeof(linkname), "%s.link", tf.filename);
|
|
|
|
ASSERT_EQ(0, symlink(tf.filename, linkname));
|
|
int result = fchmodat(AT_FDCWD, linkname, 0751, AT_SYMLINK_NOFOLLOW);
|
|
// It depends on the kernel whether chmod operation on symlink is allowed.
|
|
if (result == 0) {
|
|
AssertSymlinkModeEquals(0751, linkname);
|
|
} else {
|
|
ASSERT_EQ(-1, result);
|
|
ASSERT_EQ(ENOTSUP, errno);
|
|
}
|
|
|
|
// Target file mode shouldn't be modified.
|
|
AssertFileModeEquals(tf_sb.st_mode, tf.filename);
|
|
unlink(linkname);
|
|
}
|
|
|
|
TEST(sys_stat, fchmodat_AT_SYMLINK_NOFOLLOW_with_dangling_symlink) {
|
|
TemporaryFile tf;
|
|
|
|
char linkname[255];
|
|
char target[255];
|
|
snprintf(linkname, sizeof(linkname), "%s.link", tf.filename);
|
|
snprintf(target, sizeof(target), "%s.doesnotexist", tf.filename);
|
|
|
|
ASSERT_EQ(0, symlink(target, linkname));
|
|
int result = fchmodat(AT_FDCWD, linkname, 0751, AT_SYMLINK_NOFOLLOW);
|
|
// It depends on the kernel whether chmod operation on symlink is allowed.
|
|
if (result == 0) {
|
|
AssertSymlinkModeEquals(0751, linkname);
|
|
} else {
|
|
ASSERT_EQ(-1, result);
|
|
ASSERT_EQ(ENOTSUP, errno);
|
|
}
|
|
|
|
unlink(linkname);
|
|
}
|
|
|
|
TEST(sys_stat, faccessat_EINVAL) {
|
|
ASSERT_EQ(-1, faccessat(AT_FDCWD, "/dev/null", F_OK, ~AT_SYMLINK_NOFOLLOW));
|
|
ASSERT_EQ(EINVAL, errno);
|
|
#if defined(__BIONIC__)
|
|
ASSERT_EQ(-1, faccessat(AT_FDCWD, "/dev/null", ~(R_OK | W_OK | X_OK), 0));
|
|
ASSERT_EQ(EINVAL, errno);
|
|
#else
|
|
ASSERT_EQ(0, faccessat(AT_FDCWD, "/dev/null", ~(R_OK | W_OK | X_OK), AT_SYMLINK_NOFOLLOW));
|
|
ASSERT_EQ(-1, faccessat(AT_FDCWD, "/dev/null", ~(R_OK | W_OK | X_OK), 0));
|
|
ASSERT_EQ(EINVAL, errno);
|
|
#endif
|
|
}
|
|
|
|
TEST(sys_stat, faccessat_AT_SYMLINK_NOFOLLOW_EINVAL) {
|
|
#if defined(__BIONIC__)
|
|
// Android doesn't support AT_SYMLINK_NOFOLLOW
|
|
ASSERT_EQ(-1, faccessat(AT_FDCWD, "/dev/null", F_OK, AT_SYMLINK_NOFOLLOW));
|
|
ASSERT_EQ(EINVAL, errno);
|
|
#else
|
|
ASSERT_EQ(0, faccessat(AT_FDCWD, "/dev/null", F_OK, AT_SYMLINK_NOFOLLOW));
|
|
#endif
|
|
}
|
|
|
|
TEST(sys_stat, faccessat_dev_null) {
|
|
ASSERT_EQ(0, faccessat(AT_FDCWD, "/dev/null", F_OK, 0));
|
|
ASSERT_EQ(0, faccessat(AT_FDCWD, "/dev/null", R_OK, 0));
|
|
ASSERT_EQ(0, faccessat(AT_FDCWD, "/dev/null", W_OK, 0));
|
|
ASSERT_EQ(0, faccessat(AT_FDCWD, "/dev/null", R_OK|W_OK, 0));
|
|
}
|
|
|
|
TEST(sys_stat, faccessat_nonexistant) {
|
|
ASSERT_EQ(-1, faccessat(AT_FDCWD, "/blah", F_OK, AT_SYMLINK_NOFOLLOW));
|
|
#if defined(__BIONIC__)
|
|
// Android doesn't support AT_SYMLINK_NOFOLLOW
|
|
ASSERT_EQ(EINVAL, errno);
|
|
#else
|
|
ASSERT_EQ(ENOENT, errno);
|
|
#endif
|
|
}
|