libgocryptfs/internal/syscallcompat/sys_common_test.go

328 lines
7.7 KiB
Go

package syscallcompat
import (
"bytes"
"os"
"runtime"
"syscall"
"testing"
"golang.org/x/sys/unix"
)
func TestReadlinkat(t *testing.T) {
for _, targetLen := range []int{100, 500, 4000} {
target := string(bytes.Repeat([]byte("x"), targetLen))
err := syscall.Symlink(target, tmpDir+"/readlinkat")
if err != nil {
if targetLen > 1000 {
// Symlinks longer than 1024 (?) bytes are not supported on
// MacOS and XFS
t.Logf("skipping targetLen=%d: %v", targetLen, err)
continue
}
t.Fatalf("targetLen=%d: %v", targetLen, err)
}
target2, err := Readlinkat(tmpDirFd, "readlinkat")
if err != nil {
t.Fatal(err)
}
if target != target2 {
t.Errorf("target=%q != target2=%q", target, target2)
}
err = syscall.Unlink(tmpDir + "/readlinkat")
if err != nil {
t.Fatal(err)
}
}
}
func TestOpenat(t *testing.T) {
// Always pass O_NOFOLLOW to avoid this warning:
// Openat: O_NOFOLLOW missing: flags = 0x0"
_, err := Openat(tmpDirFd, "testOpenAt", syscall.O_NOFOLLOW, 0)
if err == nil {
t.Errorf("should have failed")
}
fd, err := os.Create(tmpDir + "/testOpenAt")
if err != nil {
t.Fatal(err)
}
fd.Close()
rawFd, err := Openat(tmpDirFd, "testOpenAt", syscall.O_NOFOLLOW, 0)
if err != nil {
t.Fatal(err)
}
defer syscall.Close(rawFd)
if rawFd < 0 {
t.Fatalf("rawFd=%d", rawFd)
}
// Test with absolute path
rawFd, err = Openat(-1, tmpDir+"/testOpenAt", syscall.O_NOFOLLOW, 0)
if err != nil {
t.Fatal(err)
}
defer syscall.Close(rawFd)
if rawFd < 0 {
t.Fatalf("rawFd=%d", rawFd)
}
}
func TestRenameat(t *testing.T) {
os.Mkdir(tmpDir+"/dir1", 0700)
dir1, err := os.Open(tmpDir + "/dir1")
if err != nil {
t.Fatal(err)
}
defer dir1.Close()
os.Mkdir(tmpDir+"/dir2", 0700)
dir2, err := os.Open(tmpDir + "/dir2")
if err != nil {
t.Fatal(err)
}
defer dir2.Close()
fd, err := os.Create(tmpDir + "/dir1/f1")
if err != nil {
t.Fatal(err)
}
fd.Close()
err = Renameat(int(dir1.Fd()), "f1", int(dir2.Fd()), "f2")
if err != nil {
t.Fatal(err)
}
_, err = os.Stat(tmpDir + "/dir2/f2")
if err != nil {
t.Fatal(err)
}
// Test with absolute path
err = Renameat(-1, tmpDir+"/dir2/f2", -1, tmpDir+"/dir2/f1")
if err != nil {
t.Fatal(err)
}
_, err = os.Stat(tmpDir + "/dir2/f1")
if err != nil {
t.Fatal(err)
}
}
func TestUnlinkat(t *testing.T) {
os.Mkdir(tmpDir+"/unlink1", 0700)
dirfd, err := os.Open(tmpDir + "/unlink1")
if err != nil {
t.Fatal(err)
}
defer dirfd.Close()
// Try to delete file
fd, err := os.Create(tmpDir + "/unlink1/f1")
if err != nil {
t.Fatal(err)
}
fd.Close()
err = Unlinkat(int(dirfd.Fd()), "f1", 0)
if err != nil {
t.Fatal(err)
}
_, err = os.Stat(tmpDir + "/unlink1/f1")
if err == nil {
t.Fatalf("file not deleted!")
}
// Try to delete dir
err = os.Mkdir(tmpDir+"/unlink1/d1", 0700)
if err != nil {
t.Fatal(err)
}
err = Unlinkat(int(dirfd.Fd()), "d1", 0)
if err == nil {
t.Fatalf("this should fail due to missing AT_REMOVEDIR flag")
}
err = Unlinkat(int(dirfd.Fd()), "d1", unix.AT_REMOVEDIR)
if err != nil {
t.Fatal(err)
}
_, err = os.Stat(tmpDir + "/unlink1/d1")
if err == nil {
t.Fatalf("dir not deleted!")
}
// Test with absolute path
err = os.Mkdir(tmpDir+"/unlink1/d1", 0700)
if err != nil {
t.Fatal(err)
}
err = Unlinkat(-1, tmpDir+"/unlink1/d1", unix.AT_REMOVEDIR)
if err != nil {
t.Fatal(err)
}
_, err = os.Stat(tmpDir + "/unlink1/d1")
if err == nil {
t.Fatalf("dir not deleted!")
}
}
func TestFchmodatNofollow(t *testing.T) {
regular := "TestFchmodat_Regular"
f, err := os.OpenFile(tmpDir+"/"+regular, os.O_CREATE|os.O_WRONLY, 0000)
if err != nil {
t.Fatal(err)
}
f.Close()
symlink := "TestFchmodat_Symlink"
err = syscall.Symlink(regular, tmpDir+"/"+symlink)
if err != nil {
t.Fatal(err)
}
dirfd, err := syscall.Open(tmpDir, syscall.O_RDONLY, 0)
if err != nil {
t.Fatal(err)
}
defer syscall.Close(dirfd)
// Check that chmod on a regular file works ok
err = FchmodatNofollow(dirfd, regular, 0111)
if err != nil {
t.Fatal(err)
}
var st syscall.Stat_t
syscall.Lstat(tmpDir+"/"+regular, &st)
st.Mode &= 0777
if st.Mode != 0111 {
t.Errorf("wrong mode: %#0o", st.Mode)
}
err = FchmodatNofollow(dirfd, regular, 0000)
if err != nil {
t.Error(err)
}
syscall.Lstat(tmpDir+"/"+regular, &st)
st.Mode &= 0777
if st.Mode != 0000 {
t.Errorf("wrong mode: %#0o", st.Mode)
}
// Check what happens on a symlink
err = FchmodatNofollow(dirfd, symlink, 0333)
// On Darwin, permissions on symlinks are significant and can be changed. On
// Linux they are ignored, and FchmodatNofollow rejects attempts to change
// them.
if err == nil && runtime.GOOS == "linux" {
syscall.Lstat(tmpDir+"/"+symlink, &st)
st.Mode &= 0777
t.Errorf("chmod on symlink should have failed, but did not. New mode=%#0o", st.Mode)
}
syscall.Lstat(tmpDir+"/"+regular, &st)
st.Mode &= 0777
if st.Mode != 0000 {
t.Errorf("chmod on symlink affected symlink target: New mode=%#0o", st.Mode)
}
}
// symlinkCheckMode looks if the mode bits in "st" say that this is a symlink.
// Calls t.Fatal() if not.
func symlinkCheckMode(t *testing.T, st syscall.Stat_t) {
if runtime.GOOS == "darwin" {
// On MacOS, symlinks don't carry their own permissions, so
// only check the file type.
if st.Mode&syscall.S_IFMT != syscall.S_IFLNK {
t.Fatalf("This is not a symlink: mode = 0%o", st.Mode)
}
return
}
if st.Mode != 0120777 {
t.Fatalf("Wrong mode, have 0%o, want 0120777", st.Mode)
}
}
// We used to have our own wrapper for Symlinkat. The wrapper is gone but the test
// is still useful.
func TestSymlinkat(t *testing.T) {
err := unix.Symlinkat("/foo/bar/baz", tmpDirFd, "symlink1")
if err != nil {
t.Fatal(err)
}
var st syscall.Stat_t
err = syscall.Lstat(tmpDir+"/symlink1", &st)
if err != nil {
t.Fatal(err)
}
symlinkCheckMode(t, st)
// Test with absolute path
err = unix.Symlinkat("/foo/bar/baz", -1, tmpDir+"/symlink2")
if err != nil {
t.Fatal(err)
}
err = syscall.Lstat(tmpDir+"/symlink2", &st)
if err != nil {
t.Fatal(err)
}
symlinkCheckMode(t, st)
}
// We used to have our own wrapper for Mkdirat. The wrapper is gone but the test
// is still useful.
func TestMkdirat(t *testing.T) {
err := unix.Mkdirat(tmpDirFd, "mkdirat", 0700)
if err != nil {
t.Fatal(err)
}
fi, err := os.Stat(tmpDir + "/mkdirat")
if err != nil {
t.Fatal(err)
}
if !fi.IsDir() {
t.Fatalf("mkdirat did not create a directory")
}
// Test with absolute path
err = unix.Mkdirat(-1, tmpDir+"/mkdirat2", 0700)
if err != nil {
t.Fatal(err)
}
fi, err = os.Stat(tmpDir + "/mkdirat2")
if err != nil {
t.Fatal(err)
}
if !fi.IsDir() {
t.Fatalf("mkdirat did not create a directory")
}
}
func TestFstatat(t *testing.T) {
var st unix.Stat_t
// stat a normal file (size 3)
f, err := os.Create(tmpDir + "/fstatat")
if err != nil {
t.Fatal(err)
}
_, err = f.Write([]byte("foo"))
if err != nil {
t.Fatal(err)
}
f.Close()
err = Fstatat(tmpDirFd, "fstatat", &st, unix.AT_SYMLINK_NOFOLLOW)
if err != nil {
t.Fatal(err)
}
if st.Size != 3 {
t.Errorf("wrong file size: %d", st.Size)
}
// stat a symlink and check that the size matches the length of the
// symlink target. This proves that we have stat'ed the symlink itself.
err = os.Symlink(tmpDir+"/fstatat", tmpDir+"/fstatatSymlink")
if err != nil {
t.Fatal(err)
}
err = Fstatat(tmpDirFd, "fstatatSymlink", &st, unix.AT_SYMLINK_NOFOLLOW)
if err != nil {
t.Fatal(err)
}
expectedSize := int64(len(tmpDir + "/fstatat"))
if st.Size != expectedSize {
t.Errorf("symlink size: expected=%d, got=%d", expectedSize, st.Size)
}
}
// BenchmarkLgetxattr benchmarks Lgetxattr. Lgetxattr is very hot as the kernel
// queries security.capabilities for every file access.
func BenchmarkLgetxattr(b *testing.B) {
for i := 0; i < b.N; i++ {
Lgetxattr("/", "user.this.attr.does.not.exist")
}
}