t_o_search.c revision 1.3.2.2 1 1.3.2.2 yamt /* $NetBSD: t_o_search.c,v 1.3.2.2 2013/01/16 05:33:59 yamt Exp $ */
2 1.3.2.2 yamt
3 1.3.2.2 yamt /*-
4 1.3.2.2 yamt * Copyright (c) 2012 The NetBSD Foundation, Inc.
5 1.3.2.2 yamt * All rights reserved.
6 1.3.2.2 yamt *
7 1.3.2.2 yamt * This code is derived from software contributed to The NetBSD Foundation
8 1.3.2.2 yamt * by Emmanuel Dreyfus.
9 1.3.2.2 yamt *
10 1.3.2.2 yamt * Redistribution and use in source and binary forms, with or without
11 1.3.2.2 yamt * modification, are permitted provided that the following conditions
12 1.3.2.2 yamt * are met:
13 1.3.2.2 yamt * 1. Redistributions of source code must retain the above copyright
14 1.3.2.2 yamt * notice, this list of conditions and the following disclaimer.
15 1.3.2.2 yamt * 2. Redistributions in binary form must reproduce the above copyright
16 1.3.2.2 yamt * notice, this list of conditions and the following disclaimer in the
17 1.3.2.2 yamt * documentation and/or other materials provided with the distribution.
18 1.3.2.2 yamt *
19 1.3.2.2 yamt * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 1.3.2.2 yamt * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 1.3.2.2 yamt * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 1.3.2.2 yamt * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 1.3.2.2 yamt * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 1.3.2.2 yamt * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 1.3.2.2 yamt * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 1.3.2.2 yamt * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 1.3.2.2 yamt * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 1.3.2.2 yamt * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 1.3.2.2 yamt * POSSIBILITY OF SUCH DAMAGE.
30 1.3.2.2 yamt */
31 1.3.2.2 yamt #include <sys/cdefs.h>
32 1.3.2.2 yamt __RCSID("$NetBSD: t_o_search.c,v 1.3.2.2 2013/01/16 05:33:59 yamt Exp $");
33 1.3.2.2 yamt
34 1.3.2.2 yamt #include <atf-c.h>
35 1.3.2.2 yamt #include <errno.h>
36 1.3.2.2 yamt #include <fcntl.h>
37 1.3.2.2 yamt #include <limits.h>
38 1.3.2.2 yamt #include <paths.h>
39 1.3.2.2 yamt #include <stdio.h>
40 1.3.2.2 yamt #include <string.h>
41 1.3.2.2 yamt #include <unistd.h>
42 1.3.2.2 yamt #include <pwd.h>
43 1.3.2.2 yamt #include <sys/param.h>
44 1.3.2.2 yamt
45 1.3.2.2 yamt #define DIR "dir"
46 1.3.2.2 yamt #define FILE "dir/o_search"
47 1.3.2.2 yamt #define BASEFILE "o_search"
48 1.3.2.2 yamt
49 1.3.2.2 yamt ATF_TC_WITH_CLEANUP(o_search_perm1);
50 1.3.2.2 yamt ATF_TC_HEAD(o_search_perm1, tc)
51 1.3.2.2 yamt {
52 1.3.2.2 yamt atf_tc_set_md_var(tc, "descr", "See that openat enforce search permission");
53 1.3.2.2 yamt atf_tc_set_md_var(tc, "require.user", "unprivileged");
54 1.3.2.2 yamt }
55 1.3.2.2 yamt
56 1.3.2.2 yamt ATF_TC_BODY(o_search_perm1, tc)
57 1.3.2.2 yamt {
58 1.3.2.2 yamt int dfd;
59 1.3.2.2 yamt int fd;
60 1.3.2.2 yamt
61 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
62 1.3.2.2 yamt ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
63 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
64 1.3.2.2 yamt
65 1.3.2.2 yamt ATF_REQUIRE((dfd = open(DIR, O_RDONLY, 0)) != -1);
66 1.3.2.2 yamt
67 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
68 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
69 1.3.2.2 yamt
70 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 644) == 0);
71 1.3.2.2 yamt
72 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) == -1);
73 1.3.2.2 yamt ATF_REQUIRE(errno == EACCES);
74 1.3.2.2 yamt
75 1.3.2.2 yamt ATF_REQUIRE(close(dfd) == 0);
76 1.3.2.2 yamt }
77 1.3.2.2 yamt
78 1.3.2.2 yamt ATF_TC_CLEANUP(o_search_perm1, tc)
79 1.3.2.2 yamt {
80 1.3.2.2 yamt (void)unlink(FILE);
81 1.3.2.2 yamt (void)rmdir(DIR);
82 1.3.2.2 yamt }
83 1.3.2.2 yamt
84 1.3.2.2 yamt ATF_TC_WITH_CLEANUP(o_search_root_flag1);
85 1.3.2.2 yamt ATF_TC_HEAD(o_search_root_flag1, tc)
86 1.3.2.2 yamt {
87 1.3.2.2 yamt atf_tc_set_md_var(tc, "descr", "See that openat honours O_SEARCH");
88 1.3.2.2 yamt atf_tc_set_md_var(tc, "require.user", "root");
89 1.3.2.2 yamt }
90 1.3.2.2 yamt
91 1.3.2.2 yamt ATF_TC_BODY(o_search_root_flag1, tc)
92 1.3.2.2 yamt {
93 1.3.2.2 yamt int dfd;
94 1.3.2.2 yamt int fd;
95 1.3.2.2 yamt
96 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
97 1.3.2.2 yamt ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
98 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
99 1.3.2.2 yamt
100 1.3.2.2 yamt ATF_REQUIRE((dfd = open(DIR, O_RDONLY|O_SEARCH, 0)) != -1);
101 1.3.2.2 yamt
102 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
103 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
104 1.3.2.2 yamt
105 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 644) == 0);
106 1.3.2.2 yamt
107 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
108 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
109 1.3.2.2 yamt
110 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 444) == 0);
111 1.3.2.2 yamt
112 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
113 1.3.2.2 yamt
114 1.3.2.2 yamt ATF_REQUIRE(close(dfd) == 0);
115 1.3.2.2 yamt }
116 1.3.2.2 yamt
117 1.3.2.2 yamt ATF_TC_CLEANUP(o_search_root_flag1, tc)
118 1.3.2.2 yamt {
119 1.3.2.2 yamt (void)unlink(FILE);
120 1.3.2.2 yamt (void)rmdir(DIR);
121 1.3.2.2 yamt }
122 1.3.2.2 yamt
123 1.3.2.2 yamt ATF_TC_WITH_CLEANUP(o_search_unpriv_flag1);
124 1.3.2.2 yamt ATF_TC_HEAD(o_search_unpriv_flag1, tc)
125 1.3.2.2 yamt {
126 1.3.2.2 yamt atf_tc_set_md_var(tc, "descr", "See that openat honours O_SEARCH");
127 1.3.2.2 yamt atf_tc_set_md_var(tc, "require.user", "unprivileged");
128 1.3.2.2 yamt }
129 1.3.2.2 yamt
130 1.3.2.2 yamt ATF_TC_BODY(o_search_unpriv_flag1, tc)
131 1.3.2.2 yamt {
132 1.3.2.2 yamt int dfd;
133 1.3.2.2 yamt int fd;
134 1.3.2.2 yamt
135 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
136 1.3.2.2 yamt ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
137 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
138 1.3.2.2 yamt
139 1.3.2.2 yamt ATF_REQUIRE((dfd = open(DIR, O_RDONLY|O_SEARCH, 0)) != -1);
140 1.3.2.2 yamt
141 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
142 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
143 1.3.2.2 yamt
144 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 744) == 0);
145 1.3.2.2 yamt
146 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
147 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
148 1.3.2.2 yamt
149 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 444) == 0);
150 1.3.2.2 yamt
151 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) == -1);
152 1.3.2.2 yamt
153 1.3.2.2 yamt ATF_REQUIRE(close(dfd) == 0);
154 1.3.2.2 yamt }
155 1.3.2.2 yamt
156 1.3.2.2 yamt ATF_TC_CLEANUP(o_search_unpriv_flag1, tc)
157 1.3.2.2 yamt {
158 1.3.2.2 yamt (void)unlink(FILE);
159 1.3.2.2 yamt (void)rmdir(DIR);
160 1.3.2.2 yamt }
161 1.3.2.2 yamt
162 1.3.2.2 yamt ATF_TC_WITH_CLEANUP(o_search_perm2);
163 1.3.2.2 yamt ATF_TC_HEAD(o_search_perm2, tc)
164 1.3.2.2 yamt {
165 1.3.2.2 yamt atf_tc_set_md_var(tc, "descr", "See that fstatat enforce search permission");
166 1.3.2.2 yamt atf_tc_set_md_var(tc, "require.user", "unprivileged");
167 1.3.2.2 yamt }
168 1.3.2.2 yamt
169 1.3.2.2 yamt ATF_TC_BODY(o_search_perm2, tc)
170 1.3.2.2 yamt {
171 1.3.2.2 yamt int dfd;
172 1.3.2.2 yamt int fd;
173 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
174 1.3.2.2 yamt ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
175 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
176 1.3.2.2 yamt
177 1.3.2.2 yamt ATF_REQUIRE((dfd = open(DIR, O_RDONLY, 0)) != -1);
178 1.3.2.2 yamt
179 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
180 1.3.2.2 yamt
181 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 644) == 0);
182 1.3.2.2 yamt
183 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == -1);
184 1.3.2.2 yamt ATF_REQUIRE(errno == EACCES);
185 1.3.2.2 yamt
186 1.3.2.2 yamt ATF_REQUIRE(close(dfd) == 0);
187 1.3.2.2 yamt }
188 1.3.2.2 yamt
189 1.3.2.2 yamt ATF_TC_CLEANUP(o_search_perm2, tc)
190 1.3.2.2 yamt {
191 1.3.2.2 yamt (void)unlink(FILE);
192 1.3.2.2 yamt (void)rmdir(DIR);
193 1.3.2.2 yamt }
194 1.3.2.2 yamt
195 1.3.2.2 yamt ATF_TC_WITH_CLEANUP(o_search_root_flag2);
196 1.3.2.2 yamt ATF_TC_HEAD(o_search_root_flag2, tc)
197 1.3.2.2 yamt {
198 1.3.2.2 yamt atf_tc_set_md_var(tc, "descr", "See that fstatat honours O_SEARCH");
199 1.3.2.2 yamt atf_tc_set_md_var(tc, "require.user", "root");
200 1.3.2.2 yamt }
201 1.3.2.2 yamt
202 1.3.2.2 yamt ATF_TC_BODY(o_search_root_flag2, tc)
203 1.3.2.2 yamt {
204 1.3.2.2 yamt int dfd;
205 1.3.2.2 yamt int fd;
206 1.3.2.2 yamt
207 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
208 1.3.2.2 yamt ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
209 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
210 1.3.2.2 yamt
211 1.3.2.2 yamt ATF_REQUIRE((dfd = open(DIR, O_RDONLY|O_SEARCH, 0)) != -1);
212 1.3.2.2 yamt
213 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
214 1.3.2.2 yamt
215 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 644) == 0);
216 1.3.2.2 yamt
217 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
218 1.3.2.2 yamt
219 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 444) == 0);
220 1.3.2.2 yamt
221 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
222 1.3.2.2 yamt
223 1.3.2.2 yamt ATF_REQUIRE(close(dfd) == 0);
224 1.3.2.2 yamt }
225 1.3.2.2 yamt
226 1.3.2.2 yamt ATF_TC_CLEANUP(o_search_root_flag2, tc)
227 1.3.2.2 yamt {
228 1.3.2.2 yamt (void)unlink(FILE);
229 1.3.2.2 yamt (void)rmdir(DIR);
230 1.3.2.2 yamt }
231 1.3.2.2 yamt
232 1.3.2.2 yamt ATF_TC_WITH_CLEANUP(o_search_unpriv_flag2);
233 1.3.2.2 yamt ATF_TC_HEAD(o_search_unpriv_flag2, tc)
234 1.3.2.2 yamt {
235 1.3.2.2 yamt atf_tc_set_md_var(tc, "descr", "See that fstatat honours O_SEARCH");
236 1.3.2.2 yamt atf_tc_set_md_var(tc, "require.user", "unprivileged");
237 1.3.2.2 yamt }
238 1.3.2.2 yamt
239 1.3.2.2 yamt ATF_TC_BODY(o_search_unpriv_flag2, tc)
240 1.3.2.2 yamt {
241 1.3.2.2 yamt int dfd;
242 1.3.2.2 yamt int fd;
243 1.3.2.2 yamt
244 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
245 1.3.2.2 yamt ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
246 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
247 1.3.2.2 yamt
248 1.3.2.2 yamt ATF_REQUIRE((dfd = open(DIR, O_RDONLY|O_SEARCH, 0)) != -1);
249 1.3.2.2 yamt
250 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
251 1.3.2.2 yamt
252 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 744) == 0);
253 1.3.2.2 yamt
254 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
255 1.3.2.2 yamt
256 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 444) == 0);
257 1.3.2.2 yamt
258 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
259 1.3.2.2 yamt
260 1.3.2.2 yamt ATF_REQUIRE(close(dfd) == 0);
261 1.3.2.2 yamt }
262 1.3.2.2 yamt
263 1.3.2.2 yamt ATF_TC_CLEANUP(o_search_unpriv_flag2, tc)
264 1.3.2.2 yamt {
265 1.3.2.2 yamt (void)unlink(FILE);
266 1.3.2.2 yamt (void)rmdir(DIR);
267 1.3.2.2 yamt }
268 1.3.2.2 yamt
269 1.3.2.2 yamt ATF_TC_WITH_CLEANUP(o_search_notdir);
270 1.3.2.2 yamt ATF_TC_HEAD(o_search_notdir, tc)
271 1.3.2.2 yamt {
272 1.3.2.2 yamt atf_tc_set_md_var(tc, "descr", "See that openat fails with non dir fd");
273 1.3.2.2 yamt }
274 1.3.2.2 yamt
275 1.3.2.2 yamt ATF_TC_BODY(o_search_notdir, tc)
276 1.3.2.2 yamt {
277 1.3.2.2 yamt int dfd;
278 1.3.2.2 yamt int fd;
279 1.3.2.2 yamt
280 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
281 1.3.2.2 yamt ATF_REQUIRE((dfd = open(FILE, O_CREAT|O_RDWR|O_SEARCH, 0644)) != -1);
282 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) == -1);
283 1.3.2.2 yamt ATF_REQUIRE(errno == ENOTDIR);
284 1.3.2.2 yamt }
285 1.3.2.2 yamt
286 1.3.2.2 yamt ATF_TC_CLEANUP(o_search_notdir, tc)
287 1.3.2.2 yamt {
288 1.3.2.2 yamt (void)unlink(FILE);
289 1.3.2.2 yamt (void)rmdir(DIR);
290 1.3.2.2 yamt }
291 1.3.2.2 yamt
292 1.3.2.2 yamt
293 1.3.2.2 yamt
294 1.3.2.2 yamt ATF_TP_ADD_TCS(tp)
295 1.3.2.2 yamt {
296 1.3.2.2 yamt
297 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_perm1);
298 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_root_flag1);
299 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_unpriv_flag1);
300 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_perm2);
301 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_root_flag2);
302 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_unpriv_flag2);
303 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_notdir);
304 1.3.2.2 yamt
305 1.3.2.2 yamt return atf_no_error();
306 1.3.2.2 yamt }
307