2 * Copyright (C) 2014 The Android Open Source Project
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
23 #include <sys/types.h>
26 #include "TemporaryFile.h"
28 #include <android-base/stringprintf.h>
29 #include <gtest/gtest.h>
31 static void MakeTree(const char* root) {
34 snprintf(path, sizeof(path), "%s/dir", root);
35 ASSERT_EQ(0, mkdir(path, 0755)) << path;
36 snprintf(path, sizeof(path), "%s/dir/sub", root);
37 ASSERT_EQ(0, mkdir(path, 0555)) << path;
38 snprintf(path, sizeof(path), "%s/unreadable-dir", root);
39 ASSERT_EQ(0, mkdir(path, 0000)) << path;
41 snprintf(path, sizeof(path), "%s/dangler", root);
42 ASSERT_EQ(0, symlink("/does-not-exist", path));
43 snprintf(path, sizeof(path), "%s/symlink", root);
44 ASSERT_EQ(0, symlink("dir/sub", path));
47 snprintf(path, sizeof(path), "%s/regular", root);
48 ASSERT_NE(-1, fd = open(path, O_CREAT|O_TRUNC, 0666));
49 ASSERT_EQ(0, close(fd));
52 void sanity_check_ftw(const char* fpath, const struct stat* sb, int tflag) {
53 ASSERT_TRUE(fpath != NULL);
54 ASSERT_TRUE(sb != NULL);
56 // Was it a case where the struct stat we're given is meaningless?
57 if (tflag == FTW_NS || tflag == FTW_SLN) {
58 // If so, double-check that we really can't stat.
60 EXPECT_EQ(-1, stat(fpath, &sb));
64 // Otherwise check that the struct stat matches the type flag.
65 if (S_ISDIR(sb->st_mode)) {
66 if (access(fpath, R_OK) == 0) {
67 EXPECT_TRUE(tflag == FTW_D || tflag == FTW_DP) << fpath << ' ' << tflag;
69 EXPECT_EQ(FTW_DNR, tflag) << fpath;
71 } else if (S_ISLNK(sb->st_mode)) {
72 EXPECT_EQ(FTW_SL, tflag) << fpath;
74 EXPECT_EQ(FTW_F, tflag) << fpath;
78 void sanity_check_nftw(const char* fpath, const struct stat* sb, int tflag, FTW* ftwbuf) {
79 sanity_check_ftw(fpath, sb, tflag);
80 ASSERT_EQ('/', fpath[ftwbuf->base - 1]) << fpath;
83 int check_ftw(const char* fpath, const struct stat* sb, int tflag) {
84 sanity_check_ftw(fpath, sb, tflag);
88 int check_ftw64(const char* fpath, const struct stat64* sb, int tflag) {
89 sanity_check_ftw(fpath, reinterpret_cast<const struct stat*>(sb), tflag);
93 int check_nftw(const char* fpath, const struct stat* sb, int tflag, FTW* ftwbuf) {
94 sanity_check_nftw(fpath, sb, tflag, ftwbuf);
98 int check_nftw64(const char* fpath, const struct stat64* sb, int tflag, FTW* ftwbuf) {
99 sanity_check_nftw(fpath, reinterpret_cast<const struct stat*>(sb), tflag, ftwbuf);
105 MakeTree(root.dirname);
106 ASSERT_EQ(0, ftw(root.dirname, check_ftw, 128));
111 MakeTree(root.dirname);
112 ASSERT_EQ(0, ftw64(root.dirname, check_ftw64, 128));
117 MakeTree(root.dirname);
118 ASSERT_EQ(0, nftw(root.dirname, check_nftw, 128, 0));
123 MakeTree(root.dirname);
124 ASSERT_EQ(0, nftw64(root.dirname, check_nftw64, 128, 0));
127 template <typename StatT>
128 static int bug_28197840_ftw(const char* path, const StatT*, int flag) {
129 EXPECT_EQ(strstr(path, "unreadable") != nullptr ? FTW_DNR : FTW_D, flag) << path;
133 template <typename StatT>
134 static int bug_28197840_nftw(const char* path, const StatT* sb, int flag, FTW*) {
135 return bug_28197840_ftw(path, sb, flag);
138 TEST(ftw, bug_28197840) {
139 // Drop root for this test, because root can still read directories even if
140 // permissions would imply otherwise.
142 passwd* pwd = getpwnam("shell");
143 ASSERT_EQ(0, setuid(pwd->pw_uid));
148 std::string path = android::base::StringPrintf("%s/unreadable-directory", root.dirname);
149 ASSERT_EQ(0, mkdir(path.c_str(), 0000)) << path;
151 ASSERT_EQ(0, ftw(root.dirname, bug_28197840_ftw<struct stat>, 128));
152 ASSERT_EQ(0, ftw64(root.dirname, bug_28197840_ftw<struct stat64>, 128));
153 ASSERT_EQ(0, nftw(root.dirname, bug_28197840_nftw<struct stat>, 128, FTW_PHYS));
154 ASSERT_EQ(0, nftw64(root.dirname, bug_28197840_nftw<struct stat64>, 128, FTW_PHYS));