android13/external/ltp/testcases/kernel/syscalls/statx/statx05.c

143 lines
3.3 KiB
C

// SPDX-License-Identifier: GPL-2.0-or-later
/*
* Copyright (c) Zilogic Systems Pvt. Ltd., 2018
* Email: code@zilogic.com
*/
/*
* Test statx
*
* 1) STATX_ATTR_ENCRYPTED - A key is required for the file to be encrypted by
* the filesystem.
*
* e4crypt is used to set the encrypt flag (currently supported only by ext4).
*
* Two directories are tested.
* First directory has all flags set.
* Second directory has no flags set.
*
* Minimum kernel version required is 4.11.
* Minimum e2fsprogs version required is 1.43.
*/
#define _GNU_SOURCE
#include <stdlib.h>
#include <stdio.h>
#include <sys/types.h>
#include <sys/wait.h>
#include "tst_safe_stdio.h"
#include "tst_test.h"
#include "lapi/fs.h"
#include "lapi/stat.h"
#define MNTPOINT "mnt_point"
#define TESTDIR_FLAGGED MNTPOINT"/test_dir1"
#define TESTDIR_UNFLAGGED MNTPOINT"/test_dir2"
static int mount_flag;
static void test_flagged(void)
{
struct statx buf;
TEST(statx(AT_FDCWD, TESTDIR_FLAGGED, 0, 0, &buf));
if (TST_RET == 0)
tst_res(TPASS,
"sys_statx(AT_FDCWD, %s, 0, 0, &buf)", TESTDIR_FLAGGED);
else
tst_brk(TFAIL | TTERRNO,
"sys_statx(AT_FDCWD, %s, 0, 0, &buf)", TESTDIR_FLAGGED);
if (buf.stx_attributes & STATX_ATTR_ENCRYPTED)
tst_res(TPASS, "STATX_ATTR_ENCRYPTED flag is set");
else
tst_res(TFAIL, "STATX_ATTR_ENCRYPTED flag is not set");
}
static void test_unflagged(void)
{
struct statx buf;
TEST(statx(AT_FDCWD, TESTDIR_UNFLAGGED, 0, 0, &buf));
if (TST_RET == 0)
tst_res(TPASS,
"sys_statx(AT_FDCWD, %s, 0, 0, &buf)",
TESTDIR_UNFLAGGED);
else
tst_brk(TFAIL | TTERRNO,
"sys_statx(AT_FDCWD, %s, 0, 0, &buf)",
TESTDIR_UNFLAGGED);
if ((buf.stx_attributes & STATX_ATTR_ENCRYPTED) == 0)
tst_res(TPASS, "STATX_ATTR_ENCRYPTED flag is not set");
else
tst_res(TFAIL, "STATX_ATTR_ENCRYPTED flag is set");
}
struct test_cases {
void (*tfunc)(void);
} tcases[] = {
{&test_flagged},
{&test_unflagged},
};
static void run(unsigned int i)
{
tcases[i].tfunc();
}
static void setup(void)
{
FILE *f;
char opt_bsize[32];
const char *const fs_opts[] = {"-O encrypt", opt_bsize, NULL};
int ret, rc, major, minor, patch;
f = SAFE_POPEN("mkfs.ext4 -V 2>&1", "r");
rc = fscanf(f, "mke2fs %d.%d.%d", &major, &minor, &patch);
if (rc != 3)
tst_res(TWARN, "Unable parse version number");
else if (major * 10000 + minor * 100 + patch < 14300)
tst_brk(TCONF, "Test needs mkfs.ext4 >= 1.43 for encrypt option, test skipped");
pclose(f);
snprintf(opt_bsize, sizeof(opt_bsize), "-b %i", getpagesize());
SAFE_MKFS(tst_device->dev, tst_device->fs_type, fs_opts, NULL);
SAFE_MOUNT(tst_device->dev, MNTPOINT, tst_device->fs_type, 0, 0);
mount_flag = 1;
SAFE_MKDIR(TESTDIR_FLAGGED, 0777);
SAFE_MKDIR(TESTDIR_UNFLAGGED, 0777);
ret = tst_system("echo qwery | e4crypt add_key "TESTDIR_FLAGGED);
if (WEXITSTATUS(ret) == 127)
tst_brk(TCONF, "e4crypt not installed!");
if (WEXITSTATUS(ret))
tst_brk(TCONF, "e4crypt failed (CONFIG_EXT4_ENCRYPTION not set?)");
}
static void cleanup(void)
{
if (mount_flag)
tst_umount(MNTPOINT);
}
static struct tst_test test = {
.test = run,
.tcnt = ARRAY_SIZE(tcases),
.setup = setup,
.cleanup = cleanup,
.min_kver = "4.11",
.needs_root = 1,
.needs_device = 1,
.mntpoint = MNTPOINT,
.dev_fs_type = "ext4",
.needs_cmds = (const char *[]) {
"mkfs.ext4",
NULL
}
};