blob: f36007e1c335868d6b137e3ad81579938275d5bc [file] [log] [blame]
Elliott Hughesd0be7c82013-08-08 17:13:33 -07001/*
2 * Copyright (C) 2013 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Elliott Hughesd0be7c82013-08-08 17:13:33 -070017#include <errno.h>
Elliott Hughesdb1ea342014-01-17 18:42:49 -080018#include <fcntl.h>
Elliott Hughesd0be7c82013-08-08 17:13:33 -070019#include <stdlib.h>
20#include <sys/stat.h>
21
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -080022#include <android-base/file.h>
23#include <gtest/gtest.h>
Elliott Hughes594b1a42013-10-22 10:54:11 -070024
Elliott Hughes733cedd2020-02-21 23:21:28 -080025#if defined(__BIONIC__)
26#define HAVE_STATX
27#elif defined(__GLIBC_PREREQ)
28#if __GLIBC_PREREQ(2, 28)
29#define HAVE_STATX
30#endif
31#endif
32
Elliott Hughesd0be7c82013-08-08 17:13:33 -070033TEST(sys_stat, futimens) {
34 FILE* fp = tmpfile();
Yi Kong32bc0fc2018-08-02 17:31:13 -070035 ASSERT_TRUE(fp != nullptr);
Elliott Hughesd0be7c82013-08-08 17:13:33 -070036
37 int fd = fileno(fp);
38 ASSERT_NE(fd, -1);
39
40 timespec times[2];
41 times[0].tv_sec = 123;
42 times[0].tv_nsec = 0;
43 times[1].tv_sec = 456;
44 times[1].tv_nsec = 0;
45 ASSERT_EQ(0, futimens(fd, times)) << strerror(errno);
46
47 struct stat sb;
48 ASSERT_EQ(0, fstat(fd, &sb));
49 ASSERT_EQ(times[0].tv_sec, static_cast<long>(sb.st_atime));
50 ASSERT_EQ(times[1].tv_sec, static_cast<long>(sb.st_mtime));
51
52 fclose(fp);
53}
54
55TEST(sys_stat, futimens_EBADF) {
56 timespec times[2];
57 times[0].tv_sec = 123;
58 times[0].tv_nsec = 0;
59 times[1].tv_sec = 456;
60 times[1].tv_nsec = 0;
61 ASSERT_EQ(-1, futimens(-1, times));
62 ASSERT_EQ(EBADF, errno);
63}
Elliott Hughes594b1a42013-10-22 10:54:11 -070064
Elliott Hughesca8e84c2014-10-23 19:10:23 -070065TEST(sys_stat, mkfifo_failure) {
66 errno = 0;
67 ASSERT_EQ(-1, mkfifo("/", 0666));
68 ASSERT_EQ(EEXIST, errno);
69}
70
71TEST(sys_stat, mkfifoat_failure) {
72 errno = 0;
73 ASSERT_EQ(-1, mkfifoat(-2, "x", 0666));
74 ASSERT_EQ(EBADF, errno);
75}
76
Elliott Hughes594b1a42013-10-22 10:54:11 -070077TEST(sys_stat, mkfifo) {
Christopher Ferris528ad742014-09-24 16:01:18 -070078 if (getuid() == 0) {
79 // Racy but probably sufficient way to get a suitable filename.
80 std::string path;
81 {
82 TemporaryFile tf;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -080083 path = tf.path;
Christopher Ferris528ad742014-09-24 16:01:18 -070084 }
Elliott Hughes594b1a42013-10-22 10:54:11 -070085
Christopher Ferris528ad742014-09-24 16:01:18 -070086 ASSERT_EQ(0, mkfifo(path.c_str(), 0666));
87 struct stat sb;
88 ASSERT_EQ(0, stat(path.c_str(), &sb));
89 ASSERT_TRUE(S_ISFIFO(sb.st_mode));
90 unlink(path.c_str());
91 } else {
Elliott Hughesca8e84c2014-10-23 19:10:23 -070092 // SELinux policy forbids us from creating FIFOs. http://b/17646702.
Elliott Hughesbcaa4542019-03-08 15:20:23 -080093 GTEST_SKIP() << "SELinux policy forbids non-root from creating FIFOs";
Christopher Ferris528ad742014-09-24 16:01:18 -070094 }
Elliott Hughes594b1a42013-10-22 10:54:11 -070095}
Elliott Hughesdb1ea342014-01-17 18:42:49 -080096
97TEST(sys_stat, stat64_lstat64_fstat64) {
98 struct stat64 sb;
99 ASSERT_EQ(0, stat64("/proc/version", &sb));
100 ASSERT_EQ(0, lstat64("/proc/version", &sb));
101 int fd = open("/proc/version", O_RDONLY);
102 ASSERT_EQ(0, fstat64(fd, &sb));
103 close(fd);
104}
Nick Kralevich3cbc6c62015-01-31 19:57:46 -0800105
Elliott Hughes733cedd2020-02-21 23:21:28 -0800106TEST(sys_stat, statx) {
107#if defined(HAVE_STATX)
108 struct statx sx;
109 int rc = statx(AT_FDCWD, "/proc/version", AT_STATX_SYNC_AS_STAT, STATX_ALL, &sx);
110 if (rc == -1 && errno == ENOSYS) {
111 GTEST_SKIP() << "statx returned ENOSYS";
Elliott Hughes733cedd2020-02-21 23:21:28 -0800112 }
113 ASSERT_EQ(0, rc);
114 struct stat64 sb;
115 ASSERT_EQ(0, stat64("/proc/version", &sb));
116 EXPECT_EQ(sb.st_ino, sx.stx_ino);
117 EXPECT_EQ(sb.st_mode, sx.stx_mode);
118#else
119 GTEST_SKIP() << "statx not available";
120#endif
121}
122
Elliott Hughesdb6223f2021-03-08 14:10:46 -0800123TEST(sys_stat, fchmod_EBADF) {
124 ASSERT_EQ(-1, fchmod(-1, 0751));
125 ASSERT_EQ(EBADF, errno);
126}
127
Nick Kralevich3cbc6c62015-01-31 19:57:46 -0800128TEST(sys_stat, fchmodat_EFAULT_file) {
129 ASSERT_EQ(-1, fchmodat(AT_FDCWD, (char *) 0x1, 0751, 0));
130 ASSERT_EQ(EFAULT, errno);
131}
132
133TEST(sys_stat, fchmodat_AT_SYMLINK_NOFOLLOW_EFAULT_file) {
134 ASSERT_EQ(-1, fchmodat(AT_FDCWD, (char *) 0x1, 0751, AT_SYMLINK_NOFOLLOW));
135#if defined(__BIONIC__)
136 ASSERT_EQ(EFAULT, errno);
137#else
138 // glibc 2.19 does not implement AT_SYMLINK_NOFOLLOW and always
139 // returns ENOTSUP
140 ASSERT_EQ(ENOTSUP, errno);
141#endif
142}
143
144TEST(sys_stat, fchmodat_bad_flags) {
145 ASSERT_EQ(-1, fchmodat(AT_FDCWD, "/blah", 0751, ~AT_SYMLINK_NOFOLLOW));
146 ASSERT_EQ(EINVAL, errno);
147}
148
149TEST(sys_stat, fchmodat_bad_flags_ALL) {
150 ASSERT_EQ(-1, fchmodat(AT_FDCWD, "/blah", 0751, ~0));
151 ASSERT_EQ(EINVAL, errno);
152}
153
154TEST(sys_stat, fchmodat_nonexistant_file) {
155 ASSERT_EQ(-1, fchmodat(AT_FDCWD, "/blah", 0751, 0));
156 ASSERT_EQ(ENOENT, errno);
157}
158
159TEST(sys_stat, fchmodat_AT_SYMLINK_NOFOLLOW_nonexistant_file) {
160 ASSERT_EQ(-1, fchmodat(AT_FDCWD, "/blah", 0751, AT_SYMLINK_NOFOLLOW));
161#if defined(__BIONIC__)
162 ASSERT_EQ(ENOENT, errno);
163#else
164 // glibc 2.19 does not implement AT_SYMLINK_NOFOLLOW and always
165 // returns ENOTSUP
166 ASSERT_EQ(ENOTSUP, errno);
167#endif
168}
169
Yabin Cuic6e58742015-03-09 13:55:18 -0700170static void AssertFileModeEquals(mode_t expected_mode, const char* filename) {
171 struct stat sb;
172 ASSERT_EQ(0, stat(filename, &sb));
173 mode_t mask = S_IRWXU | S_IRWXG | S_IRWXO;
174 ASSERT_EQ(expected_mode & mask, static_cast<mode_t>(sb.st_mode) & mask);
175}
176
Nick Kralevich3cbc6c62015-01-31 19:57:46 -0800177TEST(sys_stat, fchmodat_file) {
178 TemporaryFile tf;
Nick Kralevich3cbc6c62015-01-31 19:57:46 -0800179
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800180 ASSERT_EQ(0, fchmodat(AT_FDCWD, tf.path, 0751, 0));
181 AssertFileModeEquals(0751, tf.path);
Nick Kralevich3cbc6c62015-01-31 19:57:46 -0800182}
183
184TEST(sys_stat, fchmodat_AT_SYMLINK_NOFOLLOW_file) {
185 TemporaryFile tf;
186 errno = 0;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800187 int result = fchmodat(AT_FDCWD, tf.path, 0751, AT_SYMLINK_NOFOLLOW);
Nick Kralevich3cbc6c62015-01-31 19:57:46 -0800188
189#if defined(__BIONIC__)
Nick Kralevich3cbc6c62015-01-31 19:57:46 -0800190 ASSERT_EQ(0, result);
191 ASSERT_EQ(0, errno);
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800192 AssertFileModeEquals(0751, tf.path);
Nick Kralevich3cbc6c62015-01-31 19:57:46 -0800193#else
194 // glibc 2.19 does not implement AT_SYMLINK_NOFOLLOW and always
195 // returns ENOTSUP
196 ASSERT_EQ(-1, result);
197 ASSERT_EQ(ENOTSUP, errno);
198#endif
199}
200
201TEST(sys_stat, fchmodat_symlink) {
202 TemporaryFile tf;
203 char linkname[255];
Nick Kralevich3cbc6c62015-01-31 19:57:46 -0800204
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800205 snprintf(linkname, sizeof(linkname), "%s.link", tf.path);
Nick Kralevich3cbc6c62015-01-31 19:57:46 -0800206
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800207 ASSERT_EQ(0, symlink(tf.path, linkname));
Nick Kralevich3cbc6c62015-01-31 19:57:46 -0800208 ASSERT_EQ(0, fchmodat(AT_FDCWD, linkname, 0751, 0));
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800209 AssertFileModeEquals(0751, tf.path);
Nick Kralevich3cbc6c62015-01-31 19:57:46 -0800210 unlink(linkname);
211}
212
213TEST(sys_stat, fchmodat_dangling_symlink) {
214 TemporaryFile tf;
215 char linkname[255];
216 char target[255];
217
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800218 snprintf(linkname, sizeof(linkname), "%s.link", tf.path);
219 snprintf(target, sizeof(target), "%s.doesnotexist", tf.path);
Nick Kralevich3cbc6c62015-01-31 19:57:46 -0800220
221 ASSERT_EQ(0, symlink(target, linkname));
222 ASSERT_EQ(-1, fchmodat(AT_FDCWD, linkname, 0751, 0));
223 ASSERT_EQ(ENOENT, errno);
224 unlink(linkname);
225}
226
Yabin Cuic6e58742015-03-09 13:55:18 -0700227static void AssertSymlinkModeEquals(mode_t expected_mode, const char* linkname) {
228 struct stat sb;
229 ASSERT_EQ(0, fstatat(AT_FDCWD, linkname, &sb, AT_SYMLINK_NOFOLLOW));
230 mode_t mask = S_IRWXU | S_IRWXG | S_IRWXO;
231 ASSERT_EQ(expected_mode & mask, static_cast<mode_t>(sb.st_mode) & mask);
232}
233
Nick Kralevich3cbc6c62015-01-31 19:57:46 -0800234TEST(sys_stat, fchmodat_AT_SYMLINK_NOFOLLOW_with_symlink) {
235 TemporaryFile tf;
Yabin Cuic6e58742015-03-09 13:55:18 -0700236 struct stat tf_sb;
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800237 ASSERT_EQ(0, stat(tf.path, &tf_sb));
Nick Kralevich3cbc6c62015-01-31 19:57:46 -0800238
Yabin Cuic6e58742015-03-09 13:55:18 -0700239 char linkname[255];
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800240 snprintf(linkname, sizeof(linkname), "%s.link", tf.path);
Nick Kralevich3cbc6c62015-01-31 19:57:46 -0800241
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800242 ASSERT_EQ(0, symlink(tf.path, linkname));
Yabin Cuic6e58742015-03-09 13:55:18 -0700243 int result = fchmodat(AT_FDCWD, linkname, 0751, AT_SYMLINK_NOFOLLOW);
244 // It depends on the kernel whether chmod operation on symlink is allowed.
245 if (result == 0) {
246 AssertSymlinkModeEquals(0751, linkname);
247 } else {
248 ASSERT_EQ(-1, result);
249 ASSERT_EQ(ENOTSUP, errno);
250 }
251
252 // Target file mode shouldn't be modified.
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800253 AssertFileModeEquals(tf_sb.st_mode, tf.path);
Nick Kralevich3cbc6c62015-01-31 19:57:46 -0800254 unlink(linkname);
255}
256
257TEST(sys_stat, fchmodat_AT_SYMLINK_NOFOLLOW_with_dangling_symlink) {
258 TemporaryFile tf;
Yabin Cuic6e58742015-03-09 13:55:18 -0700259
Nick Kralevich3cbc6c62015-01-31 19:57:46 -0800260 char linkname[255];
261 char target[255];
Mark Salyzyn68a3bcc2018-11-13 07:35:21 -0800262 snprintf(linkname, sizeof(linkname), "%s.link", tf.path);
263 snprintf(target, sizeof(target), "%s.doesnotexist", tf.path);
Nick Kralevich3cbc6c62015-01-31 19:57:46 -0800264
265 ASSERT_EQ(0, symlink(target, linkname));
Yabin Cuic6e58742015-03-09 13:55:18 -0700266 int result = fchmodat(AT_FDCWD, linkname, 0751, AT_SYMLINK_NOFOLLOW);
267 // It depends on the kernel whether chmod operation on symlink is allowed.
268 if (result == 0) {
269 AssertSymlinkModeEquals(0751, linkname);
270 } else {
271 ASSERT_EQ(-1, result);
272 ASSERT_EQ(ENOTSUP, errno);
273 }
274
Nick Kralevich3cbc6c62015-01-31 19:57:46 -0800275 unlink(linkname);
276}
Nick Kralevich35778252015-02-24 13:40:43 -0800277
278TEST(sys_stat, faccessat_EINVAL) {
279 ASSERT_EQ(-1, faccessat(AT_FDCWD, "/dev/null", F_OK, ~AT_SYMLINK_NOFOLLOW));
280 ASSERT_EQ(EINVAL, errno);
281#if defined(__BIONIC__)
282 ASSERT_EQ(-1, faccessat(AT_FDCWD, "/dev/null", ~(R_OK | W_OK | X_OK), 0));
283 ASSERT_EQ(EINVAL, errno);
284#else
285 ASSERT_EQ(0, faccessat(AT_FDCWD, "/dev/null", ~(R_OK | W_OK | X_OK), AT_SYMLINK_NOFOLLOW));
286 ASSERT_EQ(-1, faccessat(AT_FDCWD, "/dev/null", ~(R_OK | W_OK | X_OK), 0));
287 ASSERT_EQ(EINVAL, errno);
288#endif
289}
290
291TEST(sys_stat, faccessat_AT_SYMLINK_NOFOLLOW_EINVAL) {
292#if defined(__BIONIC__)
293 // Android doesn't support AT_SYMLINK_NOFOLLOW
294 ASSERT_EQ(-1, faccessat(AT_FDCWD, "/dev/null", F_OK, AT_SYMLINK_NOFOLLOW));
295 ASSERT_EQ(EINVAL, errno);
296#else
297 ASSERT_EQ(0, faccessat(AT_FDCWD, "/dev/null", F_OK, AT_SYMLINK_NOFOLLOW));
298#endif
299}
300
301TEST(sys_stat, faccessat_dev_null) {
302 ASSERT_EQ(0, faccessat(AT_FDCWD, "/dev/null", F_OK, 0));
303 ASSERT_EQ(0, faccessat(AT_FDCWD, "/dev/null", R_OK, 0));
304 ASSERT_EQ(0, faccessat(AT_FDCWD, "/dev/null", W_OK, 0));
305 ASSERT_EQ(0, faccessat(AT_FDCWD, "/dev/null", R_OK|W_OK, 0));
306}
307
308TEST(sys_stat, faccessat_nonexistant) {
309 ASSERT_EQ(-1, faccessat(AT_FDCWD, "/blah", F_OK, AT_SYMLINK_NOFOLLOW));
310#if defined(__BIONIC__)
311 // Android doesn't support AT_SYMLINK_NOFOLLOW
312 ASSERT_EQ(EINVAL, errno);
313#else
314 ASSERT_EQ(ENOENT, errno);
315#endif
316}