Add tests for the new O_EMPTYPATH flag of openat(2)/openat2(2).

Also, the current openat2 tests include a helper header file that
defines the necessary structs and constants to use openat2(2), such as
struct open_how. This may result in conflicting definitions when the
system header openat2.h is present as well.

So add openat2.h generated by 'make headers' to the uapi header
files in ./tools/include and remove the helper file definitions of
the current openat2 selftests.

Signed-off-by: Jori Koolstra <[email protected]>
---
 tools/include/uapi/linux/openat2.h            | 43 +++++++++++++++
 tools/testing/selftests/openat2/Makefile      |  4 +-
 .../selftests/openat2/emptypath_test.c        | 55 +++++++++++++++++++
 tools/testing/selftests/openat2/helpers.h     | 40 +-------------
 4 files changed, 103 insertions(+), 39 deletions(-)
 create mode 100644 tools/include/uapi/linux/openat2.h
 create mode 100644 tools/testing/selftests/openat2/emptypath_test.c

diff --git a/tools/include/uapi/linux/openat2.h 
b/tools/include/uapi/linux/openat2.h
new file mode 100644
index 000000000000..4759c471676c
--- /dev/null
+++ b/tools/include/uapi/linux/openat2.h
@@ -0,0 +1,43 @@
+/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
+#ifndef _LINUX_OPENAT2_H
+#define _LINUX_OPENAT2_H
+
+#include <linux/types.h>
+
+/*
+ * Arguments for how openat2(2) should open the target path. If only @flags and
+ * @mode are non-zero, then openat2(2) operates very similarly to openat(2).
+ *
+ * However, unlike openat(2), unknown or invalid bits in @flags result in
+ * -EINVAL rather than being silently ignored. @mode must be zero unless one of
+ * {O_CREAT, O_TMPFILE} are set.
+ *
+ * @flags: O_* flags.
+ * @mode: O_CREAT/O_TMPFILE file mode.
+ * @resolve: RESOLVE_* flags.
+ */
+struct open_how {
+       __u64 flags;
+       __u64 mode;
+       __u64 resolve;
+};
+
+/* how->resolve flags for openat2(2). */
+#define RESOLVE_NO_XDEV                0x01 /* Block mount-point crossings
+                                       (includes bind-mounts). */
+#define RESOLVE_NO_MAGICLINKS  0x02 /* Block traversal through procfs-style
+                                       "magic-links". */
+#define RESOLVE_NO_SYMLINKS    0x04 /* Block traversal through all symlinks
+                                       (implies OEXT_NO_MAGICLINKS) */
+#define RESOLVE_BENEATH                0x08 /* Block "lexical" trickery like
+                                       "..", symlinks, and absolute
+                                       paths which escape the dirfd. */
+#define RESOLVE_IN_ROOT                0x10 /* Make all jumps to "/" and ".."
+                                       be scoped inside the dirfd
+                                       (similar to chroot(2)). */
+#define RESOLVE_CACHED         0x20 /* Only complete if resolution can be
+                                       completed through cached lookup. May
+                                       return -EAGAIN if that's not
+                                       possible. */
+
+#endif /* _LINUX_OPENAT2_H */
diff --git a/tools/testing/selftests/openat2/Makefile 
b/tools/testing/selftests/openat2/Makefile
index 185dc76ebb5f..db004a527634 100644
--- a/tools/testing/selftests/openat2/Makefile
+++ b/tools/testing/selftests/openat2/Makefile
@@ -1,7 +1,7 @@
 # SPDX-License-Identifier: GPL-2.0-or-later
 
-CFLAGS += -Wall -O2 -g -fsanitize=address -fsanitize=undefined
-TEST_GEN_PROGS := openat2_test resolve_test rename_attack_test
+CFLAGS += -Wall -O2 -g -fsanitize=address -fsanitize=undefined 
$(TOOLS_INCLUDES)
+TEST_GEN_PROGS := openat2_test resolve_test rename_attack_test emptypath_test
 
 # gcc requires -static-libasan in order to ensure that Address Sanitizer's
 # library is the first one loaded. However, clang already statically links the
diff --git a/tools/testing/selftests/openat2/emptypath_test.c 
b/tools/testing/selftests/openat2/emptypath_test.c
new file mode 100644
index 000000000000..3d861ecd0c05
--- /dev/null
+++ b/tools/testing/selftests/openat2/emptypath_test.c
@@ -0,0 +1,55 @@
+// SPDX-License-Identifier: GPL-2.0-or-later
+
+#define __SANE_USERSPACE_TYPES__
+#include <fcntl.h>
+#include <unistd.h>
+#include <errno.h>
+
+#include "kselftest.h"
+
+#ifndef O_EMPTYPATH
+#define O_EMPTYPATH    040000000
+#endif
+
+int main(void)
+{
+       int opath_fd, reopen_fd;
+       const char *path = "/tmp/emptypath_test";
+
+       ksft_print_header();
+       ksft_set_plan(2);
+
+       opath_fd = open(path, O_CREAT | O_WRONLY, S_IRWXU);
+       if (opath_fd < 0)
+               ksft_exit_fail_msg("create %s: %m\n", path);
+       close(opath_fd);
+
+       opath_fd = open(path, O_PATH);
+       if (opath_fd < 0)
+               ksft_exit_fail_msg("open %s O_PATH: %m\n", path);
+
+       reopen_fd = openat(opath_fd, "", O_RDONLY);
+       if (reopen_fd < 0 && errno == ENOENT)
+               ksft_test_result_pass("empty path without O_EMPTYPATH returns 
ENOENT\n");
+       else if (reopen_fd >= 0) {
+               ksft_test_result_fail("empty path without O_EMPTYPATH 
unexpectedly succeeded\n");
+               close(reopen_fd);
+       } else {
+               ksft_test_result_fail("empty path without O_EMPTYPATH: expected 
ENOENT, got %m\n");
+       }
+
+       reopen_fd = openat(opath_fd, "", O_RDONLY | O_EMPTYPATH);
+
+       if (reopen_fd < 0 && errno == EINVAL)
+               ksft_exit_skip("O_EMPTYPATH not supported\n");
+
+       if (reopen_fd >= 0) {
+               ksft_test_result_pass("O_EMPTYPATH reopens O_PATH fd\n");
+               close(reopen_fd);
+       } else {
+               ksft_test_result_fail("O_EMPTYPATH failed: %m\n");
+       }
+
+       unlink(path);
+       ksft_finished();
+}
diff --git a/tools/testing/selftests/openat2/helpers.h 
b/tools/testing/selftests/openat2/helpers.h
index 510e60602511..0f600df91d2a 100644
--- a/tools/testing/selftests/openat2/helpers.h
+++ b/tools/testing/selftests/openat2/helpers.h
@@ -14,6 +14,9 @@
 #include <linux/types.h>
 #include "kselftest.h"
 
+#define OPEN_HOW_SIZE_VER0     24
+#define OPEN_HOW_SIZE_LATEST   OPEN_HOW_SIZE_VER0
+
 #define ARRAY_LEN(X) (sizeof (X) / sizeof (*(X)))
 #define BUILD_BUG_ON(e) ((void)(sizeof(struct { int:(-!!(e)); })))
 
@@ -24,45 +27,8 @@
 #define SYS_openat2 __NR_openat2
 #endif /* SYS_openat2 */
 
-/*
- * Arguments for how openat2(2) should open the target path. If @resolve is
- * zero, then openat2(2) operates very similarly to openat(2).
- *
- * However, unlike openat(2), unknown bits in @flags result in -EINVAL rather
- * than being silently ignored. @mode must be zero unless one of {O_CREAT,
- * O_TMPFILE} are set.
- *
- * @flags: O_* flags.
- * @mode: O_CREAT/O_TMPFILE file mode.
- * @resolve: RESOLVE_* flags.
- */
-struct open_how {
-       __u64 flags;
-       __u64 mode;
-       __u64 resolve;
-};
-
-#define OPEN_HOW_SIZE_VER0     24 /* sizeof first published struct */
-#define OPEN_HOW_SIZE_LATEST   OPEN_HOW_SIZE_VER0
-
 bool needs_openat2(const struct open_how *how);
 
-#ifndef RESOLVE_IN_ROOT
-/* how->resolve flags for openat2(2). */
-#define RESOLVE_NO_XDEV                0x01 /* Block mount-point crossings
-                                       (includes bind-mounts). */
-#define RESOLVE_NO_MAGICLINKS  0x02 /* Block traversal through procfs-style
-                                       "magic-links". */
-#define RESOLVE_NO_SYMLINKS    0x04 /* Block traversal through all symlinks
-                                       (implies OEXT_NO_MAGICLINKS) */
-#define RESOLVE_BENEATH                0x08 /* Block "lexical" trickery like
-                                       "..", symlinks, and absolute
-                                       paths which escape the dirfd. */
-#define RESOLVE_IN_ROOT                0x10 /* Make all jumps to "/" and ".."
-                                       be scoped inside the dirfd
-                                       (similar to chroot(2)). */
-#endif /* RESOLVE_IN_ROOT */
-
 #define E_func(func, ...)                                                    \
        do {                                                                  \
                errno = 0;                                                    \
-- 
2.53.0


Reply via email to