t_o_search.c revision 1.3.2.3 1 1.3.2.2 yamt /* $NetBSD: t_o_search.c,v 1.3.2.3 2013/01/23 00:06:36 yamt Exp $ */
2 1.3.2.2 yamt
3 1.3.2.2 yamt /*-
4 1.3.2.2 yamt * Copyright (c) 2012 The NetBSD Foundation, Inc.
5 1.3.2.2 yamt * All rights reserved.
6 1.3.2.2 yamt *
7 1.3.2.2 yamt * This code is derived from software contributed to The NetBSD Foundation
8 1.3.2.2 yamt * by Emmanuel Dreyfus.
9 1.3.2.2 yamt *
10 1.3.2.2 yamt * Redistribution and use in source and binary forms, with or without
11 1.3.2.2 yamt * modification, are permitted provided that the following conditions
12 1.3.2.2 yamt * are met:
13 1.3.2.2 yamt * 1. Redistributions of source code must retain the above copyright
14 1.3.2.2 yamt * notice, this list of conditions and the following disclaimer.
15 1.3.2.2 yamt * 2. Redistributions in binary form must reproduce the above copyright
16 1.3.2.2 yamt * notice, this list of conditions and the following disclaimer in the
17 1.3.2.2 yamt * documentation and/or other materials provided with the distribution.
18 1.3.2.2 yamt *
19 1.3.2.2 yamt * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 1.3.2.2 yamt * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 1.3.2.2 yamt * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 1.3.2.2 yamt * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 1.3.2.2 yamt * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 1.3.2.2 yamt * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 1.3.2.2 yamt * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 1.3.2.2 yamt * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 1.3.2.2 yamt * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 1.3.2.2 yamt * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 1.3.2.2 yamt * POSSIBILITY OF SUCH DAMAGE.
30 1.3.2.2 yamt */
31 1.3.2.2 yamt #include <sys/cdefs.h>
32 1.3.2.2 yamt __RCSID("$NetBSD: t_o_search.c,v 1.3.2.3 2013/01/23 00:06:36 yamt Exp $");
33 1.3.2.2 yamt
34 1.3.2.2 yamt #include <atf-c.h>
35 1.3.2.2 yamt #include <errno.h>
36 1.3.2.2 yamt #include <fcntl.h>
37 1.3.2.2 yamt #include <limits.h>
38 1.3.2.2 yamt #include <paths.h>
39 1.3.2.2 yamt #include <stdio.h>
40 1.3.2.2 yamt #include <string.h>
41 1.3.2.2 yamt #include <unistd.h>
42 1.3.2.2 yamt #include <pwd.h>
43 1.3.2.2 yamt #include <sys/param.h>
44 1.3.2.2 yamt
45 1.3.2.3 yamt /*
46 1.3.2.3 yamt * dholland 20130112: disable tests that require O_SEARCH semantics
47 1.3.2.3 yamt * until a decision is reached about the semantics of O_SEARCH and a
48 1.3.2.3 yamt * non-broken implementation is available.
49 1.3.2.3 yamt */
50 1.3.2.3 yamt #if (O_MASK & O_SEARCH) != 0
51 1.3.2.3 yamt #define USE_O_SEARCH
52 1.3.2.3 yamt #endif
53 1.3.2.3 yamt
54 1.3.2.2 yamt #define DIR "dir"
55 1.3.2.2 yamt #define FILE "dir/o_search"
56 1.3.2.2 yamt #define BASEFILE "o_search"
57 1.3.2.2 yamt
58 1.3.2.3 yamt
59 1.3.2.2 yamt ATF_TC_WITH_CLEANUP(o_search_perm1);
60 1.3.2.2 yamt ATF_TC_HEAD(o_search_perm1, tc)
61 1.3.2.2 yamt {
62 1.3.2.3 yamt atf_tc_set_md_var(tc, "descr", "See that openat enforces search permission");
63 1.3.2.2 yamt atf_tc_set_md_var(tc, "require.user", "unprivileged");
64 1.3.2.2 yamt }
65 1.3.2.2 yamt
66 1.3.2.2 yamt ATF_TC_BODY(o_search_perm1, tc)
67 1.3.2.2 yamt {
68 1.3.2.2 yamt int dfd;
69 1.3.2.2 yamt int fd;
70 1.3.2.2 yamt
71 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
72 1.3.2.2 yamt ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
73 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
74 1.3.2.2 yamt
75 1.3.2.2 yamt ATF_REQUIRE((dfd = open(DIR, O_RDONLY, 0)) != -1);
76 1.3.2.2 yamt
77 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
78 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
79 1.3.2.2 yamt
80 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 644) == 0);
81 1.3.2.2 yamt
82 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) == -1);
83 1.3.2.2 yamt ATF_REQUIRE(errno == EACCES);
84 1.3.2.2 yamt
85 1.3.2.2 yamt ATF_REQUIRE(close(dfd) == 0);
86 1.3.2.2 yamt }
87 1.3.2.2 yamt
88 1.3.2.2 yamt ATF_TC_CLEANUP(o_search_perm1, tc)
89 1.3.2.2 yamt {
90 1.3.2.2 yamt (void)unlink(FILE);
91 1.3.2.2 yamt (void)rmdir(DIR);
92 1.3.2.2 yamt }
93 1.3.2.2 yamt
94 1.3.2.3 yamt
95 1.3.2.3 yamt #ifdef USE_O_SEARCH
96 1.3.2.3 yamt
97 1.3.2.2 yamt ATF_TC_WITH_CLEANUP(o_search_root_flag1);
98 1.3.2.2 yamt ATF_TC_HEAD(o_search_root_flag1, tc)
99 1.3.2.2 yamt {
100 1.3.2.3 yamt atf_tc_set_md_var(tc, "descr", "See that root openat honours O_SEARCH");
101 1.3.2.2 yamt atf_tc_set_md_var(tc, "require.user", "root");
102 1.3.2.2 yamt }
103 1.3.2.2 yamt
104 1.3.2.2 yamt ATF_TC_BODY(o_search_root_flag1, tc)
105 1.3.2.2 yamt {
106 1.3.2.2 yamt int dfd;
107 1.3.2.2 yamt int fd;
108 1.3.2.2 yamt
109 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
110 1.3.2.2 yamt ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
111 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
112 1.3.2.2 yamt
113 1.3.2.2 yamt ATF_REQUIRE((dfd = open(DIR, O_RDONLY|O_SEARCH, 0)) != -1);
114 1.3.2.2 yamt
115 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
116 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
117 1.3.2.2 yamt
118 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 644) == 0);
119 1.3.2.2 yamt
120 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
121 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
122 1.3.2.2 yamt
123 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 444) == 0);
124 1.3.2.2 yamt
125 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
126 1.3.2.2 yamt
127 1.3.2.2 yamt ATF_REQUIRE(close(dfd) == 0);
128 1.3.2.2 yamt }
129 1.3.2.2 yamt
130 1.3.2.2 yamt ATF_TC_CLEANUP(o_search_root_flag1, tc)
131 1.3.2.2 yamt {
132 1.3.2.2 yamt (void)unlink(FILE);
133 1.3.2.2 yamt (void)rmdir(DIR);
134 1.3.2.2 yamt }
135 1.3.2.2 yamt
136 1.3.2.3 yamt
137 1.3.2.2 yamt ATF_TC_WITH_CLEANUP(o_search_unpriv_flag1);
138 1.3.2.2 yamt ATF_TC_HEAD(o_search_unpriv_flag1, tc)
139 1.3.2.2 yamt {
140 1.3.2.2 yamt atf_tc_set_md_var(tc, "descr", "See that openat honours O_SEARCH");
141 1.3.2.2 yamt atf_tc_set_md_var(tc, "require.user", "unprivileged");
142 1.3.2.2 yamt }
143 1.3.2.2 yamt
144 1.3.2.2 yamt ATF_TC_BODY(o_search_unpriv_flag1, tc)
145 1.3.2.2 yamt {
146 1.3.2.2 yamt int dfd;
147 1.3.2.2 yamt int fd;
148 1.3.2.2 yamt
149 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
150 1.3.2.2 yamt ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
151 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
152 1.3.2.2 yamt
153 1.3.2.2 yamt ATF_REQUIRE((dfd = open(DIR, O_RDONLY|O_SEARCH, 0)) != -1);
154 1.3.2.2 yamt
155 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
156 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
157 1.3.2.2 yamt
158 1.3.2.3 yamt ATF_REQUIRE(fchmod(dfd, 644) == 0);
159 1.3.2.2 yamt
160 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
161 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
162 1.3.2.2 yamt
163 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 444) == 0);
164 1.3.2.2 yamt
165 1.3.2.3 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
166 1.3.2.2 yamt
167 1.3.2.2 yamt ATF_REQUIRE(close(dfd) == 0);
168 1.3.2.2 yamt }
169 1.3.2.2 yamt
170 1.3.2.2 yamt ATF_TC_CLEANUP(o_search_unpriv_flag1, tc)
171 1.3.2.2 yamt {
172 1.3.2.2 yamt (void)unlink(FILE);
173 1.3.2.2 yamt (void)rmdir(DIR);
174 1.3.2.2 yamt }
175 1.3.2.2 yamt
176 1.3.2.3 yamt #endif /* USE_O_SEARCH */
177 1.3.2.3 yamt
178 1.3.2.3 yamt
179 1.3.2.2 yamt ATF_TC_WITH_CLEANUP(o_search_perm2);
180 1.3.2.2 yamt ATF_TC_HEAD(o_search_perm2, tc)
181 1.3.2.2 yamt {
182 1.3.2.3 yamt atf_tc_set_md_var(tc, "descr", "See that faccessat enforces search permission");
183 1.3.2.2 yamt atf_tc_set_md_var(tc, "require.user", "unprivileged");
184 1.3.2.2 yamt }
185 1.3.2.2 yamt
186 1.3.2.2 yamt ATF_TC_BODY(o_search_perm2, tc)
187 1.3.2.2 yamt {
188 1.3.2.2 yamt int dfd;
189 1.3.2.2 yamt int fd;
190 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
191 1.3.2.2 yamt ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
192 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
193 1.3.2.2 yamt
194 1.3.2.2 yamt ATF_REQUIRE((dfd = open(DIR, O_RDONLY, 0)) != -1);
195 1.3.2.2 yamt
196 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
197 1.3.2.2 yamt
198 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 644) == 0);
199 1.3.2.2 yamt
200 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == -1);
201 1.3.2.2 yamt ATF_REQUIRE(errno == EACCES);
202 1.3.2.2 yamt
203 1.3.2.2 yamt ATF_REQUIRE(close(dfd) == 0);
204 1.3.2.2 yamt }
205 1.3.2.2 yamt
206 1.3.2.2 yamt ATF_TC_CLEANUP(o_search_perm2, tc)
207 1.3.2.2 yamt {
208 1.3.2.2 yamt (void)unlink(FILE);
209 1.3.2.2 yamt (void)rmdir(DIR);
210 1.3.2.2 yamt }
211 1.3.2.2 yamt
212 1.3.2.3 yamt
213 1.3.2.3 yamt #ifdef USE_O_SEARCH
214 1.3.2.3 yamt
215 1.3.2.2 yamt ATF_TC_WITH_CLEANUP(o_search_root_flag2);
216 1.3.2.2 yamt ATF_TC_HEAD(o_search_root_flag2, tc)
217 1.3.2.2 yamt {
218 1.3.2.3 yamt atf_tc_set_md_var(tc, "descr", "See that root fstatat honours O_SEARCH");
219 1.3.2.2 yamt atf_tc_set_md_var(tc, "require.user", "root");
220 1.3.2.2 yamt }
221 1.3.2.2 yamt
222 1.3.2.2 yamt ATF_TC_BODY(o_search_root_flag2, tc)
223 1.3.2.2 yamt {
224 1.3.2.2 yamt int dfd;
225 1.3.2.2 yamt int fd;
226 1.3.2.2 yamt
227 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
228 1.3.2.2 yamt ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
229 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
230 1.3.2.2 yamt
231 1.3.2.2 yamt ATF_REQUIRE((dfd = open(DIR, O_RDONLY|O_SEARCH, 0)) != -1);
232 1.3.2.2 yamt
233 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
234 1.3.2.2 yamt
235 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 644) == 0);
236 1.3.2.2 yamt
237 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
238 1.3.2.2 yamt
239 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 444) == 0);
240 1.3.2.2 yamt
241 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
242 1.3.2.2 yamt
243 1.3.2.2 yamt ATF_REQUIRE(close(dfd) == 0);
244 1.3.2.2 yamt }
245 1.3.2.2 yamt
246 1.3.2.2 yamt ATF_TC_CLEANUP(o_search_root_flag2, tc)
247 1.3.2.2 yamt {
248 1.3.2.2 yamt (void)unlink(FILE);
249 1.3.2.2 yamt (void)rmdir(DIR);
250 1.3.2.2 yamt }
251 1.3.2.2 yamt
252 1.3.2.3 yamt
253 1.3.2.2 yamt ATF_TC_WITH_CLEANUP(o_search_unpriv_flag2);
254 1.3.2.2 yamt ATF_TC_HEAD(o_search_unpriv_flag2, tc)
255 1.3.2.2 yamt {
256 1.3.2.2 yamt atf_tc_set_md_var(tc, "descr", "See that fstatat honours O_SEARCH");
257 1.3.2.2 yamt atf_tc_set_md_var(tc, "require.user", "unprivileged");
258 1.3.2.2 yamt }
259 1.3.2.2 yamt
260 1.3.2.2 yamt ATF_TC_BODY(o_search_unpriv_flag2, tc)
261 1.3.2.2 yamt {
262 1.3.2.2 yamt int dfd;
263 1.3.2.2 yamt int fd;
264 1.3.2.2 yamt
265 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
266 1.3.2.2 yamt ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
267 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
268 1.3.2.2 yamt
269 1.3.2.2 yamt ATF_REQUIRE((dfd = open(DIR, O_RDONLY|O_SEARCH, 0)) != -1);
270 1.3.2.2 yamt
271 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
272 1.3.2.2 yamt
273 1.3.2.3 yamt ATF_REQUIRE(fchmod(dfd, 644) == 0);
274 1.3.2.2 yamt
275 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
276 1.3.2.2 yamt
277 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 444) == 0);
278 1.3.2.2 yamt
279 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
280 1.3.2.2 yamt
281 1.3.2.2 yamt ATF_REQUIRE(close(dfd) == 0);
282 1.3.2.2 yamt }
283 1.3.2.2 yamt
284 1.3.2.2 yamt ATF_TC_CLEANUP(o_search_unpriv_flag2, tc)
285 1.3.2.2 yamt {
286 1.3.2.2 yamt (void)unlink(FILE);
287 1.3.2.2 yamt (void)rmdir(DIR);
288 1.3.2.3 yamt }
289 1.3.2.3 yamt
290 1.3.2.3 yamt #endif /* USE_O_SEARCH */
291 1.3.2.3 yamt
292 1.3.2.2 yamt
293 1.3.2.2 yamt ATF_TC_WITH_CLEANUP(o_search_notdir);
294 1.3.2.2 yamt ATF_TC_HEAD(o_search_notdir, tc)
295 1.3.2.2 yamt {
296 1.3.2.2 yamt atf_tc_set_md_var(tc, "descr", "See that openat fails with non dir fd");
297 1.3.2.2 yamt }
298 1.3.2.2 yamt
299 1.3.2.2 yamt ATF_TC_BODY(o_search_notdir, tc)
300 1.3.2.2 yamt {
301 1.3.2.2 yamt int dfd;
302 1.3.2.2 yamt int fd;
303 1.3.2.2 yamt
304 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
305 1.3.2.2 yamt ATF_REQUIRE((dfd = open(FILE, O_CREAT|O_RDWR|O_SEARCH, 0644)) != -1);
306 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) == -1);
307 1.3.2.2 yamt ATF_REQUIRE(errno == ENOTDIR);
308 1.3.2.2 yamt }
309 1.3.2.2 yamt
310 1.3.2.2 yamt ATF_TC_CLEANUP(o_search_notdir, tc)
311 1.3.2.2 yamt {
312 1.3.2.2 yamt (void)unlink(FILE);
313 1.3.2.2 yamt (void)rmdir(DIR);
314 1.3.2.2 yamt }
315 1.3.2.2 yamt
316 1.3.2.2 yamt
317 1.3.2.2 yamt
318 1.3.2.2 yamt ATF_TP_ADD_TCS(tp)
319 1.3.2.2 yamt {
320 1.3.2.2 yamt
321 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_perm1);
322 1.3.2.3 yamt #ifdef USE_O_SEARCH
323 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_root_flag1);
324 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_unpriv_flag1);
325 1.3.2.3 yamt #endif
326 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_perm2);
327 1.3.2.3 yamt #ifdef USE_O_SEARCH
328 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_root_flag2);
329 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_unpriv_flag2);
330 1.3.2.3 yamt #endif
331 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_notdir);
332 1.3.2.2 yamt
333 1.3.2.2 yamt return atf_no_error();
334 1.3.2.2 yamt }
335