1*49cdfc7eSAndroid Build Coastguard Worker // SPDX-License-Identifier: GPL-2.0-or-later
2*49cdfc7eSAndroid Build Coastguard Worker /*
3*49cdfc7eSAndroid Build Coastguard Worker * Copyright (c) 2023 FUJITSU LIMITED. All rights reserved.
4*49cdfc7eSAndroid Build Coastguard Worker * Author: Yang Xu <[email protected]>
5*49cdfc7eSAndroid Build Coastguard Worker */
6*49cdfc7eSAndroid Build Coastguard Worker
7*49cdfc7eSAndroid Build Coastguard Worker /*\
8*49cdfc7eSAndroid Build Coastguard Worker * [Description]
9*49cdfc7eSAndroid Build Coastguard Worker *
10*49cdfc7eSAndroid Build Coastguard Worker * It is a basic test for MS_NOSYMFOLLOW mount option and is copied
11*49cdfc7eSAndroid Build Coastguard Worker * from kernel selftests nosymfollow-test.c.
12*49cdfc7eSAndroid Build Coastguard Worker *
13*49cdfc7eSAndroid Build Coastguard Worker * It tests to make sure that symlink traversal fails with ELOOP when
14*49cdfc7eSAndroid Build Coastguard Worker * 'nosymfollow' is set, but symbolic links can still be created, and
15*49cdfc7eSAndroid Build Coastguard Worker * readlink(2) and realpath(3) still work properly. It also verifies
16*49cdfc7eSAndroid Build Coastguard Worker * that statfs(2) correctly returns ST_NOSYMFOLLOW.
17*49cdfc7eSAndroid Build Coastguard Worker */
18*49cdfc7eSAndroid Build Coastguard Worker
19*49cdfc7eSAndroid Build Coastguard Worker #include <limits.h>
20*49cdfc7eSAndroid Build Coastguard Worker #include <stdio.h>
21*49cdfc7eSAndroid Build Coastguard Worker #include <stdlib.h>
22*49cdfc7eSAndroid Build Coastguard Worker #include <unistd.h>
23*49cdfc7eSAndroid Build Coastguard Worker #include <sys/mount.h>
24*49cdfc7eSAndroid Build Coastguard Worker #include <stdbool.h>
25*49cdfc7eSAndroid Build Coastguard Worker #include "tst_test.h"
26*49cdfc7eSAndroid Build Coastguard Worker #include "lapi/mount.h"
27*49cdfc7eSAndroid Build Coastguard Worker
28*49cdfc7eSAndroid Build Coastguard Worker #ifndef ST_NOSYMFOLLOW
29*49cdfc7eSAndroid Build Coastguard Worker # define ST_NOSYMFOLLOW 0x2000
30*49cdfc7eSAndroid Build Coastguard Worker #endif
31*49cdfc7eSAndroid Build Coastguard Worker
32*49cdfc7eSAndroid Build Coastguard Worker #define MNTPOINT "mntpoint"
33*49cdfc7eSAndroid Build Coastguard Worker
34*49cdfc7eSAndroid Build Coastguard Worker static char test_file[PATH_MAX];
35*49cdfc7eSAndroid Build Coastguard Worker static char link_file[PATH_MAX];
36*49cdfc7eSAndroid Build Coastguard Worker static char temp_link_file[PATH_MAX];
37*49cdfc7eSAndroid Build Coastguard Worker static int flag;
38*49cdfc7eSAndroid Build Coastguard Worker
setup_symlink(void)39*49cdfc7eSAndroid Build Coastguard Worker static void setup_symlink(void)
40*49cdfc7eSAndroid Build Coastguard Worker {
41*49cdfc7eSAndroid Build Coastguard Worker int fd;
42*49cdfc7eSAndroid Build Coastguard Worker
43*49cdfc7eSAndroid Build Coastguard Worker fd = SAFE_CREAT(test_file, O_RDWR);
44*49cdfc7eSAndroid Build Coastguard Worker SAFE_SYMLINK(test_file, link_file);
45*49cdfc7eSAndroid Build Coastguard Worker SAFE_CLOSE(fd);
46*49cdfc7eSAndroid Build Coastguard Worker flag = 1;
47*49cdfc7eSAndroid Build Coastguard Worker }
48*49cdfc7eSAndroid Build Coastguard Worker
test_link_traversal(bool nosymfollow)49*49cdfc7eSAndroid Build Coastguard Worker static void test_link_traversal(bool nosymfollow)
50*49cdfc7eSAndroid Build Coastguard Worker {
51*49cdfc7eSAndroid Build Coastguard Worker if (nosymfollow) {
52*49cdfc7eSAndroid Build Coastguard Worker TST_EXP_FAIL2(open(link_file, 0, O_RDWR), ELOOP,
53*49cdfc7eSAndroid Build Coastguard Worker "open(%s, 0, O_RDWR)", link_file);
54*49cdfc7eSAndroid Build Coastguard Worker } else {
55*49cdfc7eSAndroid Build Coastguard Worker TST_EXP_FD(open(link_file, 0, O_RDWR));
56*49cdfc7eSAndroid Build Coastguard Worker }
57*49cdfc7eSAndroid Build Coastguard Worker
58*49cdfc7eSAndroid Build Coastguard Worker if (TST_RET > 0)
59*49cdfc7eSAndroid Build Coastguard Worker SAFE_CLOSE(TST_RET);
60*49cdfc7eSAndroid Build Coastguard Worker }
61*49cdfc7eSAndroid Build Coastguard Worker
test_readlink(void)62*49cdfc7eSAndroid Build Coastguard Worker static void test_readlink(void)
63*49cdfc7eSAndroid Build Coastguard Worker {
64*49cdfc7eSAndroid Build Coastguard Worker char buf[4096];
65*49cdfc7eSAndroid Build Coastguard Worker
66*49cdfc7eSAndroid Build Coastguard Worker memset(buf, 0, 4096);
67*49cdfc7eSAndroid Build Coastguard Worker TST_EXP_POSITIVE(readlink(link_file, buf, sizeof(buf)),
68*49cdfc7eSAndroid Build Coastguard Worker "readlink(%s, buf, %ld)", link_file, sizeof(buf));
69*49cdfc7eSAndroid Build Coastguard Worker if (strcmp(buf, test_file) != 0) {
70*49cdfc7eSAndroid Build Coastguard Worker tst_res(TFAIL, "readlink strcmp failed, %s, %s",
71*49cdfc7eSAndroid Build Coastguard Worker buf, test_file);
72*49cdfc7eSAndroid Build Coastguard Worker } else {
73*49cdfc7eSAndroid Build Coastguard Worker tst_res(TPASS, "readlink strcmp succeeded");
74*49cdfc7eSAndroid Build Coastguard Worker }
75*49cdfc7eSAndroid Build Coastguard Worker }
76*49cdfc7eSAndroid Build Coastguard Worker
test_realpath(void)77*49cdfc7eSAndroid Build Coastguard Worker static void test_realpath(void)
78*49cdfc7eSAndroid Build Coastguard Worker {
79*49cdfc7eSAndroid Build Coastguard Worker TESTPTR(realpath(link_file, NULL));
80*49cdfc7eSAndroid Build Coastguard Worker
81*49cdfc7eSAndroid Build Coastguard Worker if (!TST_RET_PTR) {
82*49cdfc7eSAndroid Build Coastguard Worker tst_res(TFAIL | TERRNO, "realpath failed");
83*49cdfc7eSAndroid Build Coastguard Worker return;
84*49cdfc7eSAndroid Build Coastguard Worker }
85*49cdfc7eSAndroid Build Coastguard Worker
86*49cdfc7eSAndroid Build Coastguard Worker if (strcmp(TST_RET_PTR, test_file) != 0) {
87*49cdfc7eSAndroid Build Coastguard Worker tst_res(TFAIL, "realpath strcmp failed, %s, %s",
88*49cdfc7eSAndroid Build Coastguard Worker (char *)TST_RET_PTR, test_file);
89*49cdfc7eSAndroid Build Coastguard Worker } else {
90*49cdfc7eSAndroid Build Coastguard Worker tst_res(TPASS, "realpath strcmp succeeded");
91*49cdfc7eSAndroid Build Coastguard Worker }
92*49cdfc7eSAndroid Build Coastguard Worker }
93*49cdfc7eSAndroid Build Coastguard Worker
test_cycle_link(void)94*49cdfc7eSAndroid Build Coastguard Worker static void test_cycle_link(void)
95*49cdfc7eSAndroid Build Coastguard Worker {
96*49cdfc7eSAndroid Build Coastguard Worker TST_EXP_PASS(symlink(test_file, temp_link_file), "symlink(%s, %s)",
97*49cdfc7eSAndroid Build Coastguard Worker test_file, temp_link_file);
98*49cdfc7eSAndroid Build Coastguard Worker TST_EXP_PASS(unlink(temp_link_file));
99*49cdfc7eSAndroid Build Coastguard Worker }
100*49cdfc7eSAndroid Build Coastguard Worker
test_statfs(bool nosymfollow)101*49cdfc7eSAndroid Build Coastguard Worker static void test_statfs(bool nosymfollow)
102*49cdfc7eSAndroid Build Coastguard Worker {
103*49cdfc7eSAndroid Build Coastguard Worker struct statfs buf;
104*49cdfc7eSAndroid Build Coastguard Worker
105*49cdfc7eSAndroid Build Coastguard Worker SAFE_STATFS(MNTPOINT, &buf);
106*49cdfc7eSAndroid Build Coastguard Worker if (buf.f_flags & ST_NOSYMFOLLOW) {
107*49cdfc7eSAndroid Build Coastguard Worker tst_res(nosymfollow ? TPASS : TFAIL, "ST_NOSYMFOLLOW set on %s",
108*49cdfc7eSAndroid Build Coastguard Worker MNTPOINT);
109*49cdfc7eSAndroid Build Coastguard Worker } else {
110*49cdfc7eSAndroid Build Coastguard Worker tst_res(nosymfollow ? TFAIL : TPASS, "ST_NOSYMFOLLOW not set on %s",
111*49cdfc7eSAndroid Build Coastguard Worker MNTPOINT);
112*49cdfc7eSAndroid Build Coastguard Worker }
113*49cdfc7eSAndroid Build Coastguard Worker }
114*49cdfc7eSAndroid Build Coastguard Worker
setup(void)115*49cdfc7eSAndroid Build Coastguard Worker static void setup(void)
116*49cdfc7eSAndroid Build Coastguard Worker {
117*49cdfc7eSAndroid Build Coastguard Worker char *tmpdir = tst_get_tmpdir();
118*49cdfc7eSAndroid Build Coastguard Worker
119*49cdfc7eSAndroid Build Coastguard Worker snprintf(test_file, PATH_MAX, "%s/%s/test_file", tst_get_tmpdir(),
120*49cdfc7eSAndroid Build Coastguard Worker MNTPOINT);
121*49cdfc7eSAndroid Build Coastguard Worker snprintf(link_file, PATH_MAX, "%s/%s/link_file", tst_get_tmpdir(),
122*49cdfc7eSAndroid Build Coastguard Worker MNTPOINT);
123*49cdfc7eSAndroid Build Coastguard Worker snprintf(temp_link_file, PATH_MAX, "%s/%s/temp_link_file",
124*49cdfc7eSAndroid Build Coastguard Worker tst_get_tmpdir(), MNTPOINT);
125*49cdfc7eSAndroid Build Coastguard Worker free(tmpdir);
126*49cdfc7eSAndroid Build Coastguard Worker }
127*49cdfc7eSAndroid Build Coastguard Worker
cleanup(void)128*49cdfc7eSAndroid Build Coastguard Worker static void cleanup(void)
129*49cdfc7eSAndroid Build Coastguard Worker {
130*49cdfc7eSAndroid Build Coastguard Worker if (tst_is_mounted(MNTPOINT))
131*49cdfc7eSAndroid Build Coastguard Worker SAFE_UMOUNT(MNTPOINT);
132*49cdfc7eSAndroid Build Coastguard Worker }
133*49cdfc7eSAndroid Build Coastguard Worker
run_tests(bool nosymfollow)134*49cdfc7eSAndroid Build Coastguard Worker static void run_tests(bool nosymfollow)
135*49cdfc7eSAndroid Build Coastguard Worker {
136*49cdfc7eSAndroid Build Coastguard Worker test_link_traversal(nosymfollow);
137*49cdfc7eSAndroid Build Coastguard Worker test_readlink();
138*49cdfc7eSAndroid Build Coastguard Worker test_realpath();
139*49cdfc7eSAndroid Build Coastguard Worker test_cycle_link();
140*49cdfc7eSAndroid Build Coastguard Worker test_statfs(nosymfollow);
141*49cdfc7eSAndroid Build Coastguard Worker }
142*49cdfc7eSAndroid Build Coastguard Worker
run(void)143*49cdfc7eSAndroid Build Coastguard Worker static void run(void)
144*49cdfc7eSAndroid Build Coastguard Worker {
145*49cdfc7eSAndroid Build Coastguard Worker tst_res(TINFO, "Testing behaviour when not setting MS_NOSYMFOLLOW");
146*49cdfc7eSAndroid Build Coastguard Worker
147*49cdfc7eSAndroid Build Coastguard Worker TST_EXP_PASS_SILENT(mount(tst_device->dev, MNTPOINT, tst_device->fs_type,
148*49cdfc7eSAndroid Build Coastguard Worker 0, NULL));
149*49cdfc7eSAndroid Build Coastguard Worker if (!flag || !strcmp(tst_device->fs_type, "tmpfs"))
150*49cdfc7eSAndroid Build Coastguard Worker setup_symlink();
151*49cdfc7eSAndroid Build Coastguard Worker run_tests(false);
152*49cdfc7eSAndroid Build Coastguard Worker
153*49cdfc7eSAndroid Build Coastguard Worker tst_res(TINFO, "Testing behaviour when setting MS_NOSYMFOLLOW");
154*49cdfc7eSAndroid Build Coastguard Worker TST_EXP_PASS_SILENT(mount(tst_device->dev, MNTPOINT, tst_device->fs_type,
155*49cdfc7eSAndroid Build Coastguard Worker MS_REMOUNT | MS_NOSYMFOLLOW, NULL));
156*49cdfc7eSAndroid Build Coastguard Worker run_tests(true);
157*49cdfc7eSAndroid Build Coastguard Worker
158*49cdfc7eSAndroid Build Coastguard Worker SAFE_UMOUNT(MNTPOINT);
159*49cdfc7eSAndroid Build Coastguard Worker }
160*49cdfc7eSAndroid Build Coastguard Worker
161*49cdfc7eSAndroid Build Coastguard Worker static struct tst_test test = {
162*49cdfc7eSAndroid Build Coastguard Worker .test_all = run,
163*49cdfc7eSAndroid Build Coastguard Worker .setup = setup,
164*49cdfc7eSAndroid Build Coastguard Worker .cleanup = cleanup,
165*49cdfc7eSAndroid Build Coastguard Worker .forks_child = 1,
166*49cdfc7eSAndroid Build Coastguard Worker .needs_root = 1,
167*49cdfc7eSAndroid Build Coastguard Worker .min_kver = "5.10",
168*49cdfc7eSAndroid Build Coastguard Worker .format_device = 1,
169*49cdfc7eSAndroid Build Coastguard Worker .mntpoint = MNTPOINT,
170*49cdfc7eSAndroid Build Coastguard Worker .all_filesystems = 1,
171*49cdfc7eSAndroid Build Coastguard Worker .skip_filesystems = (const char *const []){
172*49cdfc7eSAndroid Build Coastguard Worker "exfat",
173*49cdfc7eSAndroid Build Coastguard Worker "vfat",
174*49cdfc7eSAndroid Build Coastguard Worker "ntfs",
175*49cdfc7eSAndroid Build Coastguard Worker NULL
176*49cdfc7eSAndroid Build Coastguard Worker },
177*49cdfc7eSAndroid Build Coastguard Worker };
178