t_o_search.c revision 1.3.2.4 1 1.3.2.4 yamt /* $NetBSD: t_o_search.c,v 1.3.2.4 2014/05/22 11:42:20 yamt Exp $ */
2 1.3.2.2 yamt
3 1.3.2.2 yamt /*-
4 1.3.2.2 yamt * Copyright (c) 2012 The NetBSD Foundation, Inc.
5 1.3.2.2 yamt * All rights reserved.
6 1.3.2.2 yamt *
7 1.3.2.2 yamt * This code is derived from software contributed to The NetBSD Foundation
8 1.3.2.2 yamt * by Emmanuel Dreyfus.
9 1.3.2.2 yamt *
10 1.3.2.2 yamt * Redistribution and use in source and binary forms, with or without
11 1.3.2.2 yamt * modification, are permitted provided that the following conditions
12 1.3.2.2 yamt * are met:
13 1.3.2.2 yamt * 1. Redistributions of source code must retain the above copyright
14 1.3.2.2 yamt * notice, this list of conditions and the following disclaimer.
15 1.3.2.2 yamt * 2. Redistributions in binary form must reproduce the above copyright
16 1.3.2.2 yamt * notice, this list of conditions and the following disclaimer in the
17 1.3.2.2 yamt * documentation and/or other materials provided with the distribution.
18 1.3.2.2 yamt *
19 1.3.2.2 yamt * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 1.3.2.2 yamt * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 1.3.2.2 yamt * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 1.3.2.2 yamt * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 1.3.2.2 yamt * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 1.3.2.2 yamt * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 1.3.2.2 yamt * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 1.3.2.2 yamt * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 1.3.2.2 yamt * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 1.3.2.2 yamt * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 1.3.2.2 yamt * POSSIBILITY OF SUCH DAMAGE.
30 1.3.2.2 yamt */
31 1.3.2.2 yamt #include <sys/cdefs.h>
32 1.3.2.4 yamt __RCSID("$NetBSD: t_o_search.c,v 1.3.2.4 2014/05/22 11:42:20 yamt Exp $");
33 1.3.2.2 yamt
34 1.3.2.2 yamt #include <atf-c.h>
35 1.3.2.2 yamt #include <errno.h>
36 1.3.2.2 yamt #include <fcntl.h>
37 1.3.2.2 yamt #include <limits.h>
38 1.3.2.2 yamt #include <paths.h>
39 1.3.2.2 yamt #include <stdio.h>
40 1.3.2.2 yamt #include <string.h>
41 1.3.2.2 yamt #include <unistd.h>
42 1.3.2.2 yamt #include <pwd.h>
43 1.3.2.2 yamt #include <sys/param.h>
44 1.3.2.2 yamt
45 1.3.2.3 yamt /*
46 1.3.2.3 yamt * dholland 20130112: disable tests that require O_SEARCH semantics
47 1.3.2.3 yamt * until a decision is reached about the semantics of O_SEARCH and a
48 1.3.2.3 yamt * non-broken implementation is available.
49 1.3.2.3 yamt */
50 1.3.2.3 yamt #if (O_MASK & O_SEARCH) != 0
51 1.3.2.3 yamt #define USE_O_SEARCH
52 1.3.2.3 yamt #endif
53 1.3.2.3 yamt
54 1.3.2.2 yamt #define DIR "dir"
55 1.3.2.2 yamt #define FILE "dir/o_search"
56 1.3.2.2 yamt #define BASEFILE "o_search"
57 1.3.2.2 yamt
58 1.3.2.3 yamt
59 1.3.2.4 yamt ATF_TC(o_search_perm1);
60 1.3.2.2 yamt ATF_TC_HEAD(o_search_perm1, tc)
61 1.3.2.2 yamt {
62 1.3.2.3 yamt atf_tc_set_md_var(tc, "descr", "See that openat enforces search permission");
63 1.3.2.2 yamt atf_tc_set_md_var(tc, "require.user", "unprivileged");
64 1.3.2.2 yamt }
65 1.3.2.2 yamt ATF_TC_BODY(o_search_perm1, tc)
66 1.3.2.2 yamt {
67 1.3.2.2 yamt int dfd;
68 1.3.2.2 yamt int fd;
69 1.3.2.2 yamt
70 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
71 1.3.2.2 yamt ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
72 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
73 1.3.2.2 yamt
74 1.3.2.2 yamt ATF_REQUIRE((dfd = open(DIR, O_RDONLY, 0)) != -1);
75 1.3.2.2 yamt
76 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
77 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
78 1.3.2.2 yamt
79 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 644) == 0);
80 1.3.2.2 yamt
81 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) == -1);
82 1.3.2.2 yamt ATF_REQUIRE(errno == EACCES);
83 1.3.2.2 yamt
84 1.3.2.2 yamt ATF_REQUIRE(close(dfd) == 0);
85 1.3.2.2 yamt }
86 1.3.2.2 yamt
87 1.3.2.3 yamt #ifdef USE_O_SEARCH
88 1.3.2.3 yamt
89 1.3.2.4 yamt ATF_TC(o_search_root_flag1);
90 1.3.2.2 yamt ATF_TC_HEAD(o_search_root_flag1, tc)
91 1.3.2.2 yamt {
92 1.3.2.3 yamt atf_tc_set_md_var(tc, "descr", "See that root openat honours O_SEARCH");
93 1.3.2.2 yamt atf_tc_set_md_var(tc, "require.user", "root");
94 1.3.2.2 yamt }
95 1.3.2.2 yamt ATF_TC_BODY(o_search_root_flag1, tc)
96 1.3.2.2 yamt {
97 1.3.2.2 yamt int dfd;
98 1.3.2.2 yamt int fd;
99 1.3.2.2 yamt
100 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
101 1.3.2.2 yamt ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
102 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
103 1.3.2.2 yamt
104 1.3.2.2 yamt ATF_REQUIRE((dfd = open(DIR, O_RDONLY|O_SEARCH, 0)) != -1);
105 1.3.2.2 yamt
106 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
107 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
108 1.3.2.2 yamt
109 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 644) == 0);
110 1.3.2.2 yamt
111 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
112 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
113 1.3.2.2 yamt
114 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 444) == 0);
115 1.3.2.2 yamt
116 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
117 1.3.2.2 yamt
118 1.3.2.2 yamt ATF_REQUIRE(close(dfd) == 0);
119 1.3.2.2 yamt }
120 1.3.2.2 yamt
121 1.3.2.4 yamt ATF_TC(o_search_unpriv_flag1);
122 1.3.2.2 yamt ATF_TC_HEAD(o_search_unpriv_flag1, tc)
123 1.3.2.2 yamt {
124 1.3.2.2 yamt atf_tc_set_md_var(tc, "descr", "See that openat honours O_SEARCH");
125 1.3.2.2 yamt atf_tc_set_md_var(tc, "require.user", "unprivileged");
126 1.3.2.2 yamt }
127 1.3.2.2 yamt ATF_TC_BODY(o_search_unpriv_flag1, tc)
128 1.3.2.2 yamt {
129 1.3.2.2 yamt int dfd;
130 1.3.2.2 yamt int fd;
131 1.3.2.2 yamt
132 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
133 1.3.2.2 yamt ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
134 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
135 1.3.2.2 yamt
136 1.3.2.2 yamt ATF_REQUIRE((dfd = open(DIR, O_RDONLY|O_SEARCH, 0)) != -1);
137 1.3.2.2 yamt
138 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
139 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
140 1.3.2.2 yamt
141 1.3.2.3 yamt ATF_REQUIRE(fchmod(dfd, 644) == 0);
142 1.3.2.2 yamt
143 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
144 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
145 1.3.2.2 yamt
146 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 444) == 0);
147 1.3.2.2 yamt
148 1.3.2.3 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
149 1.3.2.2 yamt
150 1.3.2.2 yamt ATF_REQUIRE(close(dfd) == 0);
151 1.3.2.2 yamt }
152 1.3.2.2 yamt
153 1.3.2.3 yamt #endif /* USE_O_SEARCH */
154 1.3.2.3 yamt
155 1.3.2.4 yamt ATF_TC(o_search_perm2);
156 1.3.2.2 yamt ATF_TC_HEAD(o_search_perm2, tc)
157 1.3.2.2 yamt {
158 1.3.2.3 yamt atf_tc_set_md_var(tc, "descr", "See that faccessat enforces search permission");
159 1.3.2.2 yamt atf_tc_set_md_var(tc, "require.user", "unprivileged");
160 1.3.2.2 yamt }
161 1.3.2.2 yamt ATF_TC_BODY(o_search_perm2, tc)
162 1.3.2.2 yamt {
163 1.3.2.2 yamt int dfd;
164 1.3.2.2 yamt int fd;
165 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
166 1.3.2.2 yamt ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
167 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
168 1.3.2.2 yamt
169 1.3.2.2 yamt ATF_REQUIRE((dfd = open(DIR, O_RDONLY, 0)) != -1);
170 1.3.2.2 yamt
171 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
172 1.3.2.2 yamt
173 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 644) == 0);
174 1.3.2.2 yamt
175 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == -1);
176 1.3.2.2 yamt ATF_REQUIRE(errno == EACCES);
177 1.3.2.2 yamt
178 1.3.2.2 yamt ATF_REQUIRE(close(dfd) == 0);
179 1.3.2.2 yamt }
180 1.3.2.2 yamt
181 1.3.2.3 yamt #ifdef USE_O_SEARCH
182 1.3.2.3 yamt
183 1.3.2.4 yamt ATF_TC(o_search_root_flag2);
184 1.3.2.2 yamt ATF_TC_HEAD(o_search_root_flag2, tc)
185 1.3.2.2 yamt {
186 1.3.2.3 yamt atf_tc_set_md_var(tc, "descr", "See that root fstatat honours O_SEARCH");
187 1.3.2.2 yamt atf_tc_set_md_var(tc, "require.user", "root");
188 1.3.2.2 yamt }
189 1.3.2.2 yamt ATF_TC_BODY(o_search_root_flag2, tc)
190 1.3.2.2 yamt {
191 1.3.2.2 yamt int dfd;
192 1.3.2.2 yamt int fd;
193 1.3.2.2 yamt
194 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
195 1.3.2.2 yamt ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
196 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
197 1.3.2.2 yamt
198 1.3.2.2 yamt ATF_REQUIRE((dfd = open(DIR, O_RDONLY|O_SEARCH, 0)) != -1);
199 1.3.2.2 yamt
200 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
201 1.3.2.2 yamt
202 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 644) == 0);
203 1.3.2.2 yamt
204 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
205 1.3.2.2 yamt
206 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 444) == 0);
207 1.3.2.2 yamt
208 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
209 1.3.2.2 yamt
210 1.3.2.2 yamt ATF_REQUIRE(close(dfd) == 0);
211 1.3.2.2 yamt }
212 1.3.2.2 yamt
213 1.3.2.4 yamt ATF_TC(o_search_unpriv_flag2);
214 1.3.2.2 yamt ATF_TC_HEAD(o_search_unpriv_flag2, tc)
215 1.3.2.2 yamt {
216 1.3.2.2 yamt atf_tc_set_md_var(tc, "descr", "See that fstatat honours O_SEARCH");
217 1.3.2.2 yamt atf_tc_set_md_var(tc, "require.user", "unprivileged");
218 1.3.2.2 yamt }
219 1.3.2.2 yamt ATF_TC_BODY(o_search_unpriv_flag2, tc)
220 1.3.2.2 yamt {
221 1.3.2.2 yamt int dfd;
222 1.3.2.2 yamt int fd;
223 1.3.2.2 yamt
224 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
225 1.3.2.2 yamt ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
226 1.3.2.2 yamt ATF_REQUIRE(close(fd) == 0);
227 1.3.2.2 yamt
228 1.3.2.2 yamt ATF_REQUIRE((dfd = open(DIR, O_RDONLY|O_SEARCH, 0)) != -1);
229 1.3.2.2 yamt
230 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
231 1.3.2.2 yamt
232 1.3.2.3 yamt ATF_REQUIRE(fchmod(dfd, 644) == 0);
233 1.3.2.2 yamt
234 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
235 1.3.2.2 yamt
236 1.3.2.2 yamt ATF_REQUIRE(fchmod(dfd, 444) == 0);
237 1.3.2.2 yamt
238 1.3.2.2 yamt ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
239 1.3.2.2 yamt
240 1.3.2.2 yamt ATF_REQUIRE(close(dfd) == 0);
241 1.3.2.2 yamt }
242 1.3.2.2 yamt
243 1.3.2.3 yamt #endif /* USE_O_SEARCH */
244 1.3.2.3 yamt
245 1.3.2.2 yamt
246 1.3.2.4 yamt ATF_TC(o_search_notdir);
247 1.3.2.2 yamt ATF_TC_HEAD(o_search_notdir, tc)
248 1.3.2.2 yamt {
249 1.3.2.2 yamt atf_tc_set_md_var(tc, "descr", "See that openat fails with non dir fd");
250 1.3.2.2 yamt }
251 1.3.2.2 yamt ATF_TC_BODY(o_search_notdir, tc)
252 1.3.2.2 yamt {
253 1.3.2.2 yamt int dfd;
254 1.3.2.2 yamt int fd;
255 1.3.2.2 yamt
256 1.3.2.2 yamt ATF_REQUIRE(mkdir(DIR, 0755) == 0);
257 1.3.2.2 yamt ATF_REQUIRE((dfd = open(FILE, O_CREAT|O_RDWR|O_SEARCH, 0644)) != -1);
258 1.3.2.2 yamt ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) == -1);
259 1.3.2.2 yamt ATF_REQUIRE(errno == ENOTDIR);
260 1.3.2.2 yamt }
261 1.3.2.2 yamt
262 1.3.2.2 yamt ATF_TP_ADD_TCS(tp)
263 1.3.2.2 yamt {
264 1.3.2.2 yamt
265 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_perm1);
266 1.3.2.3 yamt #ifdef USE_O_SEARCH
267 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_root_flag1);
268 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_unpriv_flag1);
269 1.3.2.3 yamt #endif
270 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_perm2);
271 1.3.2.3 yamt #ifdef USE_O_SEARCH
272 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_root_flag2);
273 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_unpriv_flag2);
274 1.3.2.3 yamt #endif
275 1.3.2.2 yamt ATF_TP_ADD_TC(tp, o_search_notdir);
276 1.3.2.2 yamt
277 1.3.2.2 yamt return atf_no_error();
278 1.3.2.2 yamt }
279