t_o_search.c revision 1.9 1 1.9 martin /* $NetBSD: t_o_search.c,v 1.9 2020/02/06 12:18:06 martin Exp $ */
2 1.1 manu
3 1.1 manu /*-
4 1.1 manu * Copyright (c) 2012 The NetBSD Foundation, Inc.
5 1.1 manu * All rights reserved.
6 1.1 manu *
7 1.1 manu * This code is derived from software contributed to The NetBSD Foundation
8 1.1 manu * by Emmanuel Dreyfus.
9 1.1 manu *
10 1.1 manu * Redistribution and use in source and binary forms, with or without
11 1.1 manu * modification, are permitted provided that the following conditions
12 1.1 manu * are met:
13 1.1 manu * 1. Redistributions of source code must retain the above copyright
14 1.1 manu * notice, this list of conditions and the following disclaimer.
15 1.1 manu * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 manu * notice, this list of conditions and the following disclaimer in the
17 1.1 manu * documentation and/or other materials provided with the distribution.
18 1.1 manu *
19 1.1 manu * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 1.1 manu * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 1.1 manu * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 1.1 manu * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 1.1 manu * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 1.1 manu * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 1.1 manu * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 1.1 manu * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 1.1 manu * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 1.1 manu * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 1.1 manu * POSSIBILITY OF SUCH DAMAGE.
30 1.1 manu */
31 1.1 manu #include <sys/cdefs.h>
32 1.9 martin __RCSID("$NetBSD: t_o_search.c,v 1.9 2020/02/06 12:18:06 martin Exp $");
33 1.1 manu
34 1.1 manu #include <atf-c.h>
35 1.5 christos
36 1.9 martin #include <sys/types.h>
37 1.5 christos #include <sys/stat.h>
38 1.5 christos
39 1.9 martin #include <dirent.h>
40 1.1 manu #include <errno.h>
41 1.1 manu #include <fcntl.h>
42 1.1 manu #include <limits.h>
43 1.1 manu #include <paths.h>
44 1.1 manu #include <stdio.h>
45 1.1 manu #include <string.h>
46 1.1 manu #include <unistd.h>
47 1.1 manu #include <pwd.h>
48 1.1 manu
49 1.3 dholland /*
50 1.3 dholland * dholland 20130112: disable tests that require O_SEARCH semantics
51 1.3 dholland * until a decision is reached about the semantics of O_SEARCH and a
52 1.3 dholland * non-broken implementation is available.
53 1.3 dholland */
54 1.9 martin #if defined(__FreeBSD__) || (O_MASK & O_SEARCH) != 0
55 1.3 dholland #define USE_O_SEARCH
56 1.3 dholland #endif
57 1.3 dholland
58 1.1 manu #define DIR "dir"
59 1.1 manu #define FILE "dir/o_search"
60 1.1 manu #define BASEFILE "o_search"
61 1.1 manu
62 1.3 dholland
63 1.4 jmmv ATF_TC(o_search_perm1);
64 1.1 manu ATF_TC_HEAD(o_search_perm1, tc)
65 1.1 manu {
66 1.3 dholland atf_tc_set_md_var(tc, "descr", "See that openat enforces search permission");
67 1.1 manu atf_tc_set_md_var(tc, "require.user", "unprivileged");
68 1.1 manu }
69 1.1 manu ATF_TC_BODY(o_search_perm1, tc)
70 1.1 manu {
71 1.1 manu int dfd;
72 1.1 manu int fd;
73 1.1 manu
74 1.1 manu ATF_REQUIRE(mkdir(DIR, 0755) == 0);
75 1.1 manu ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
76 1.1 manu ATF_REQUIRE(close(fd) == 0);
77 1.1 manu
78 1.1 manu ATF_REQUIRE((dfd = open(DIR, O_RDONLY, 0)) != -1);
79 1.1 manu
80 1.1 manu ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
81 1.1 manu ATF_REQUIRE(close(fd) == 0);
82 1.1 manu
83 1.6 martin ATF_REQUIRE(fchmod(dfd, 0644) == 0);
84 1.1 manu
85 1.1 manu ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) == -1);
86 1.1 manu ATF_REQUIRE(errno == EACCES);
87 1.1 manu
88 1.1 manu ATF_REQUIRE(close(dfd) == 0);
89 1.1 manu }
90 1.1 manu
91 1.3 dholland #ifdef USE_O_SEARCH
92 1.3 dholland
93 1.4 jmmv ATF_TC(o_search_root_flag1);
94 1.2 martin ATF_TC_HEAD(o_search_root_flag1, tc)
95 1.1 manu {
96 1.3 dholland atf_tc_set_md_var(tc, "descr", "See that root openat honours O_SEARCH");
97 1.2 martin atf_tc_set_md_var(tc, "require.user", "root");
98 1.1 manu }
99 1.2 martin ATF_TC_BODY(o_search_root_flag1, tc)
100 1.1 manu {
101 1.1 manu int dfd;
102 1.1 manu int fd;
103 1.1 manu
104 1.1 manu ATF_REQUIRE(mkdir(DIR, 0755) == 0);
105 1.1 manu ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
106 1.1 manu ATF_REQUIRE(close(fd) == 0);
107 1.1 manu
108 1.1 manu ATF_REQUIRE((dfd = open(DIR, O_RDONLY|O_SEARCH, 0)) != -1);
109 1.1 manu
110 1.1 manu ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
111 1.1 manu ATF_REQUIRE(close(fd) == 0);
112 1.1 manu
113 1.6 martin ATF_REQUIRE(fchmod(dfd, 0644) == 0);
114 1.1 manu
115 1.1 manu ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
116 1.1 manu ATF_REQUIRE(close(fd) == 0);
117 1.1 manu
118 1.6 martin ATF_REQUIRE(fchmod(dfd, 0444) == 0);
119 1.1 manu
120 1.1 manu ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
121 1.1 manu
122 1.1 manu ATF_REQUIRE(close(dfd) == 0);
123 1.1 manu }
124 1.1 manu
125 1.4 jmmv ATF_TC(o_search_unpriv_flag1);
126 1.2 martin ATF_TC_HEAD(o_search_unpriv_flag1, tc)
127 1.2 martin {
128 1.2 martin atf_tc_set_md_var(tc, "descr", "See that openat honours O_SEARCH");
129 1.2 martin atf_tc_set_md_var(tc, "require.user", "unprivileged");
130 1.2 martin }
131 1.2 martin ATF_TC_BODY(o_search_unpriv_flag1, tc)
132 1.2 martin {
133 1.2 martin int dfd;
134 1.2 martin int fd;
135 1.2 martin
136 1.2 martin ATF_REQUIRE(mkdir(DIR, 0755) == 0);
137 1.2 martin ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
138 1.2 martin ATF_REQUIRE(close(fd) == 0);
139 1.2 martin
140 1.2 martin ATF_REQUIRE((dfd = open(DIR, O_RDONLY|O_SEARCH, 0)) != -1);
141 1.2 martin
142 1.2 martin ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
143 1.2 martin ATF_REQUIRE(close(fd) == 0);
144 1.2 martin
145 1.6 martin ATF_REQUIRE(fchmod(dfd, 0644) == 0);
146 1.2 martin
147 1.2 martin ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
148 1.2 martin ATF_REQUIRE(close(fd) == 0);
149 1.2 martin
150 1.6 martin ATF_REQUIRE(fchmod(dfd, 0444) == 0);
151 1.2 martin
152 1.3 dholland ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1);
153 1.2 martin
154 1.2 martin ATF_REQUIRE(close(dfd) == 0);
155 1.2 martin }
156 1.2 martin
157 1.3 dholland #endif /* USE_O_SEARCH */
158 1.3 dholland
159 1.4 jmmv ATF_TC(o_search_perm2);
160 1.1 manu ATF_TC_HEAD(o_search_perm2, tc)
161 1.1 manu {
162 1.3 dholland atf_tc_set_md_var(tc, "descr", "See that faccessat enforces search permission");
163 1.1 manu atf_tc_set_md_var(tc, "require.user", "unprivileged");
164 1.1 manu }
165 1.1 manu ATF_TC_BODY(o_search_perm2, tc)
166 1.1 manu {
167 1.1 manu int dfd;
168 1.1 manu int fd;
169 1.1 manu ATF_REQUIRE(mkdir(DIR, 0755) == 0);
170 1.1 manu ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
171 1.1 manu ATF_REQUIRE(close(fd) == 0);
172 1.1 manu
173 1.1 manu ATF_REQUIRE((dfd = open(DIR, O_RDONLY, 0)) != -1);
174 1.1 manu
175 1.1 manu ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
176 1.1 manu
177 1.6 martin ATF_REQUIRE(fchmod(dfd, 0644) == 0);
178 1.1 manu
179 1.1 manu ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == -1);
180 1.1 manu ATF_REQUIRE(errno == EACCES);
181 1.1 manu
182 1.1 manu ATF_REQUIRE(close(dfd) == 0);
183 1.1 manu }
184 1.1 manu
185 1.3 dholland #ifdef USE_O_SEARCH
186 1.3 dholland
187 1.4 jmmv ATF_TC(o_search_root_flag2);
188 1.2 martin ATF_TC_HEAD(o_search_root_flag2, tc)
189 1.1 manu {
190 1.3 dholland atf_tc_set_md_var(tc, "descr", "See that root fstatat honours O_SEARCH");
191 1.2 martin atf_tc_set_md_var(tc, "require.user", "root");
192 1.1 manu }
193 1.2 martin ATF_TC_BODY(o_search_root_flag2, tc)
194 1.1 manu {
195 1.1 manu int dfd;
196 1.1 manu int fd;
197 1.1 manu
198 1.1 manu ATF_REQUIRE(mkdir(DIR, 0755) == 0);
199 1.1 manu ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
200 1.1 manu ATF_REQUIRE(close(fd) == 0);
201 1.1 manu
202 1.1 manu ATF_REQUIRE((dfd = open(DIR, O_RDONLY|O_SEARCH, 0)) != -1);
203 1.1 manu
204 1.1 manu ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
205 1.1 manu
206 1.6 martin ATF_REQUIRE(fchmod(dfd, 0644) == 0);
207 1.1 manu
208 1.1 manu ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
209 1.1 manu
210 1.6 martin ATF_REQUIRE(fchmod(dfd, 0444) == 0);
211 1.1 manu
212 1.1 manu ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
213 1.1 manu
214 1.1 manu ATF_REQUIRE(close(dfd) == 0);
215 1.1 manu }
216 1.1 manu
217 1.4 jmmv ATF_TC(o_search_unpriv_flag2);
218 1.2 martin ATF_TC_HEAD(o_search_unpriv_flag2, tc)
219 1.2 martin {
220 1.2 martin atf_tc_set_md_var(tc, "descr", "See that fstatat honours O_SEARCH");
221 1.2 martin atf_tc_set_md_var(tc, "require.user", "unprivileged");
222 1.2 martin }
223 1.2 martin ATF_TC_BODY(o_search_unpriv_flag2, tc)
224 1.2 martin {
225 1.2 martin int dfd;
226 1.2 martin int fd;
227 1.2 martin
228 1.2 martin ATF_REQUIRE(mkdir(DIR, 0755) == 0);
229 1.2 martin ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
230 1.2 martin ATF_REQUIRE(close(fd) == 0);
231 1.2 martin
232 1.2 martin ATF_REQUIRE((dfd = open(DIR, O_RDONLY|O_SEARCH, 0)) != -1);
233 1.2 martin
234 1.2 martin ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
235 1.2 martin
236 1.6 martin ATF_REQUIRE(fchmod(dfd, 0644) == 0);
237 1.2 martin
238 1.2 martin ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
239 1.2 martin
240 1.6 martin ATF_REQUIRE(fchmod(dfd, 0444) == 0);
241 1.2 martin
242 1.2 martin ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0);
243 1.2 martin
244 1.2 martin ATF_REQUIRE(close(dfd) == 0);
245 1.2 martin }
246 1.2 martin
247 1.3 dholland #endif /* USE_O_SEARCH */
248 1.3 dholland
249 1.1 manu
250 1.4 jmmv ATF_TC(o_search_notdir);
251 1.1 manu ATF_TC_HEAD(o_search_notdir, tc)
252 1.1 manu {
253 1.1 manu atf_tc_set_md_var(tc, "descr", "See that openat fails with non dir fd");
254 1.1 manu }
255 1.1 manu ATF_TC_BODY(o_search_notdir, tc)
256 1.1 manu {
257 1.1 manu int dfd;
258 1.1 manu int fd;
259 1.1 manu
260 1.1 manu ATF_REQUIRE(mkdir(DIR, 0755) == 0);
261 1.8 martin ATF_REQUIRE((dfd = open(FILE, O_CREAT|O_SEARCH, 0644)) != -1);
262 1.1 manu ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) == -1);
263 1.1 manu ATF_REQUIRE(errno == ENOTDIR);
264 1.7 martin ATF_REQUIRE(close(dfd) == 0);
265 1.1 manu }
266 1.1 manu
267 1.9 martin #ifdef USE_O_SEARCH
268 1.9 martin ATF_TC(o_search_nord);
269 1.9 martin ATF_TC_HEAD(o_search_nord, tc)
270 1.9 martin {
271 1.9 martin atf_tc_set_md_var(tc, "descr", "See that openat succeeds with no read permission");
272 1.9 martin atf_tc_set_md_var(tc, "require.user", "unprivileged");
273 1.9 martin }
274 1.9 martin ATF_TC_BODY(o_search_nord, tc)
275 1.9 martin {
276 1.9 martin int dfd, fd;
277 1.9 martin
278 1.9 martin ATF_REQUIRE(mkdir(DIR, 0755) == 0);
279 1.9 martin ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
280 1.9 martin ATF_REQUIRE(close(fd) == 0);
281 1.9 martin
282 1.9 martin ATF_REQUIRE(chmod(DIR, 0100) == 0);
283 1.9 martin ATF_REQUIRE((dfd = open(DIR, O_SEARCH, 0)) != -1);
284 1.9 martin
285 1.9 martin ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) != -1);
286 1.9 martin
287 1.9 martin ATF_REQUIRE(close(dfd) == 0);
288 1.9 martin }
289 1.9 martin
290 1.9 martin ATF_TC(o_search_getdents);
291 1.9 martin ATF_TC_HEAD(o_search_getdents, tc)
292 1.9 martin {
293 1.9 martin atf_tc_set_md_var(tc, "descr", "See that O_SEARCH forbids getdents");
294 1.9 martin }
295 1.9 martin ATF_TC_BODY(o_search_getdents, tc)
296 1.9 martin {
297 1.9 martin char buf[1024];
298 1.9 martin int dfd;
299 1.9 martin
300 1.9 martin ATF_REQUIRE(mkdir(DIR, 0755) == 0);
301 1.9 martin ATF_REQUIRE((dfd = open(DIR, O_SEARCH, 0)) != -1);
302 1.9 martin ATF_REQUIRE(getdents(dfd, buf, sizeof(buf)) < 0);
303 1.9 martin ATF_REQUIRE(close(dfd) == 0);
304 1.9 martin }
305 1.9 martin
306 1.9 martin ATF_TC(o_search_revokex);
307 1.9 martin ATF_TC_HEAD(o_search_revokex, tc)
308 1.9 martin {
309 1.9 martin atf_tc_set_md_var(tc, "descr", "See that *at behaves after chmod -x");
310 1.9 martin atf_tc_set_md_var(tc, "require.user", "unprivileged");
311 1.9 martin }
312 1.9 martin ATF_TC_BODY(o_search_revokex, tc)
313 1.9 martin {
314 1.9 martin int dfd, fd;
315 1.9 martin struct stat sb;
316 1.9 martin
317 1.9 martin ATF_REQUIRE(mkdir(DIR, 0755) == 0);
318 1.9 martin ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1);
319 1.9 martin ATF_REQUIRE(close(fd) == 0);
320 1.9 martin
321 1.9 martin ATF_REQUIRE((dfd = open(DIR, O_SEARCH, 0)) != -1);
322 1.9 martin
323 1.9 martin /* Drop permissions. The kernel must still not check the exec bit. */
324 1.9 martin ATF_REQUIRE(chmod(DIR, 0000) == 0);
325 1.9 martin ATF_REQUIRE(fstatat(dfd, BASEFILE, &sb, 0) == 0);
326 1.9 martin
327 1.9 martin ATF_REQUIRE(close(dfd) == 0);
328 1.9 martin }
329 1.9 martin #endif /* USE_O_SEARCH */
330 1.9 martin
331 1.1 manu ATF_TP_ADD_TCS(tp)
332 1.1 manu {
333 1.1 manu
334 1.1 manu ATF_TP_ADD_TC(tp, o_search_perm1);
335 1.3 dholland #ifdef USE_O_SEARCH
336 1.2 martin ATF_TP_ADD_TC(tp, o_search_root_flag1);
337 1.2 martin ATF_TP_ADD_TC(tp, o_search_unpriv_flag1);
338 1.3 dholland #endif
339 1.1 manu ATF_TP_ADD_TC(tp, o_search_perm2);
340 1.3 dholland #ifdef USE_O_SEARCH
341 1.2 martin ATF_TP_ADD_TC(tp, o_search_root_flag2);
342 1.2 martin ATF_TP_ADD_TC(tp, o_search_unpriv_flag2);
343 1.3 dholland #endif
344 1.1 manu ATF_TP_ADD_TC(tp, o_search_notdir);
345 1.9 martin #ifdef USE_O_SEARCH
346 1.9 martin ATF_TP_ADD_TC(tp, o_search_nord);
347 1.9 martin ATF_TP_ADD_TC(tp, o_search_getdents);
348 1.9 martin ATF_TP_ADD_TC(tp, o_search_revokex);
349 1.9 martin #endif
350 1.1 manu
351 1.1 manu return atf_no_error();
352 1.1 manu }
353