xref: /netbsd-src/tests/fs/vfs/t_unpriv.c (revision 6ac427e31566220b87554f796ac941e77f1b461d)
1*6ac427e3Shannken /*	$NetBSD: t_unpriv.c,v 1.16 2018/11/28 10:01:28 hannken Exp $	*/
296b2d809Snjoly 
396b2d809Snjoly /*-
496b2d809Snjoly  * Copyright (c) 2011 The NetBSD Foundation, Inc.
596b2d809Snjoly  * All rights reserved.
696b2d809Snjoly  *
796b2d809Snjoly  * Redistribution and use in source and binary forms, with or without
896b2d809Snjoly  * modification, are permitted provided that the following conditions
996b2d809Snjoly  * are met:
1096b2d809Snjoly  * 1. Redistributions of source code must retain the above copyright
1196b2d809Snjoly  *    notice, this list of conditions and the following disclaimer.
1296b2d809Snjoly  * 2. Redistributions in binary form must reproduce the above copyright
1396b2d809Snjoly  *    notice, this list of conditions and the following disclaimer in the
1496b2d809Snjoly  *    documentation and/or other materials provided with the distribution.
1596b2d809Snjoly  *
1696b2d809Snjoly  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
1796b2d809Snjoly  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
1896b2d809Snjoly  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
1996b2d809Snjoly  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
2096b2d809Snjoly  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
2196b2d809Snjoly  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
2296b2d809Snjoly  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
2396b2d809Snjoly  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
2496b2d809Snjoly  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
2596b2d809Snjoly  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
2696b2d809Snjoly  * POSSIBILITY OF SUCH DAMAGE.
2796b2d809Snjoly  */
2896b2d809Snjoly 
297e04109eSnjoly #include <sys/stat.h>
30a3a0bab7Snjoly #include <sys/time.h>
31a3a0bab7Snjoly 
3296b2d809Snjoly #include <atf-c.h>
33c4210b25Snjoly #include <libgen.h>
341beb02a6Sgson #include <limits.h>
3596b2d809Snjoly #include <unistd.h>
3696b2d809Snjoly 
3796b2d809Snjoly #include <rump/rump_syscalls.h>
3896b2d809Snjoly #include <rump/rump.h>
3996b2d809Snjoly 
4096b2d809Snjoly #include "../common/h_fsmacros.h"
41c54cb811Schristos #include "h_macros.h"
4296b2d809Snjoly 
430a1fcf8fSnjoly #define USES_OWNER							 \
44dcea8cfcSnjoly 	if (FSTYPE_MSDOS(tc))						 \
4596b2d809Snjoly 	    atf_tc_skip("owner not supported by file system")
4696b2d809Snjoly 
4796b2d809Snjoly static void
owner(const atf_tc_t * tc,const char * mp)4896b2d809Snjoly owner(const atf_tc_t *tc, const char *mp)
4996b2d809Snjoly {
5096b2d809Snjoly 
510a1fcf8fSnjoly 	USES_OWNER;
5296b2d809Snjoly 
5396b2d809Snjoly 	FSTEST_ENTER();
5496b2d809Snjoly 
5596b2d809Snjoly 	rump_pub_lwproc_rfork(RUMP_RFCFDG);
5696b2d809Snjoly 	if (rump_sys_setuid(1) == -1)
5796b2d809Snjoly 		atf_tc_fail_errno("setuid");
5896b2d809Snjoly         if (rump_sys_chown(".", 1, -1) != -1 || errno != EPERM)
5996b2d809Snjoly 		atf_tc_fail_errno("chown");
6096b2d809Snjoly         if (rump_sys_chmod(".", 0000) != -1 || errno != EPERM)
6196b2d809Snjoly                 atf_tc_fail_errno("chmod");
6296b2d809Snjoly 	rump_pub_lwproc_releaselwp();
6396b2d809Snjoly 
6496b2d809Snjoly 	if (rump_sys_chown(".", 1, -1) == -1)
6596b2d809Snjoly 		atf_tc_fail_errno("chown");
6696b2d809Snjoly 
6796b2d809Snjoly 	rump_pub_lwproc_rfork(RUMP_RFCFDG);
6896b2d809Snjoly 	if (rump_sys_setuid(1) == -1)
6996b2d809Snjoly 		atf_tc_fail_errno("setuid");
7096b2d809Snjoly         if (rump_sys_chown(".", 1, -1) == -1)
7196b2d809Snjoly 		atf_tc_fail_errno("chown");
7296b2d809Snjoly         if (rump_sys_chmod(".", 0000) == -1)
7396b2d809Snjoly                 atf_tc_fail_errno("chmod");
7496b2d809Snjoly 	rump_pub_lwproc_releaselwp();
7596b2d809Snjoly 
7696b2d809Snjoly 	FSTEST_EXIT();
7796b2d809Snjoly }
7896b2d809Snjoly 
79c4210b25Snjoly static void
dirperms(const atf_tc_t * tc,const char * mp)80c4210b25Snjoly dirperms(const atf_tc_t *tc, const char *mp)
81c4210b25Snjoly {
82c4210b25Snjoly 	char name[] = "dir.test/file.test";
83c4210b25Snjoly 	char *dir = dirname(name);
84c4210b25Snjoly 	int fd;
85c4210b25Snjoly 
86c4210b25Snjoly 	if (FSTYPE_SYSVBFS(tc))
87c4210b25Snjoly 		atf_tc_skip("directories not supported by file system");
88c4210b25Snjoly 
89c4210b25Snjoly 	FSTEST_ENTER();
90c4210b25Snjoly 
91c4210b25Snjoly 	if (rump_sys_mkdir(dir, 0777) == -1)
92c4210b25Snjoly 		atf_tc_fail_errno("mkdir");
93c4210b25Snjoly 
94c4210b25Snjoly 	rump_pub_lwproc_rfork(RUMP_RFCFDG);
95c4210b25Snjoly 	if (rump_sys_setuid(1) == -1)
96c4210b25Snjoly 		atf_tc_fail_errno("setuid");
97c4210b25Snjoly         if (rump_sys_open(name, O_RDWR|O_CREAT, 0666) != -1 || errno != EACCES)
98c4210b25Snjoly 		atf_tc_fail_errno("open");
99c4210b25Snjoly 	rump_pub_lwproc_releaselwp();
100c4210b25Snjoly 
101c4210b25Snjoly 	if ((fd = rump_sys_open(name, O_RDWR|O_CREAT, 0666)) == -1)
102c4210b25Snjoly 		atf_tc_fail_errno("open");
103c4210b25Snjoly 	if (rump_sys_close(fd) == -1)
104c4210b25Snjoly 		atf_tc_fail_errno("close");
105c4210b25Snjoly 
106c4210b25Snjoly 	rump_pub_lwproc_rfork(RUMP_RFCFDG);
107c4210b25Snjoly 	if (rump_sys_setuid(1) == -1)
108c4210b25Snjoly 		atf_tc_fail_errno("setuid");
109c4210b25Snjoly         if (rump_sys_unlink(name) != -1 || errno != EACCES)
110c4210b25Snjoly 		atf_tc_fail_errno("unlink");
111c4210b25Snjoly 	rump_pub_lwproc_releaselwp();
112c4210b25Snjoly 
113c4210b25Snjoly         if (rump_sys_unlink(name) == -1)
114c4210b25Snjoly 		atf_tc_fail_errno("unlink");
115c4210b25Snjoly 
116c4210b25Snjoly 	if (rump_sys_rmdir(dir) == -1)
117c4210b25Snjoly 		atf_tc_fail_errno("rmdir");
118c4210b25Snjoly 
119c4210b25Snjoly 	FSTEST_EXIT();
120c4210b25Snjoly }
12196b2d809Snjoly 
122a3a0bab7Snjoly static void
times(const atf_tc_t * tc,const char * mp)123a3a0bab7Snjoly times(const atf_tc_t *tc, const char *mp)
124a3a0bab7Snjoly {
125a3a0bab7Snjoly 	const char *name = "file.test";
12622d3abd7Snjoly 	int fd;
1271beb02a6Sgson 	unsigned int i, j;
12816fc5c76Snjoly 	struct timeval tmv[2];
1291beb02a6Sgson 	static struct timeval tmvs[] = {
1301beb02a6Sgson 		{ QUAD_MIN, 0 },
1311beb02a6Sgson 		{ 0, 0 },
1321beb02a6Sgson 		{ QUAD_MAX, 999999 }
1331beb02a6Sgson 	};
134a3a0bab7Snjoly 
135a3a0bab7Snjoly 	FSTEST_ENTER();
136a3a0bab7Snjoly 
137a3a0bab7Snjoly 	if ((fd = rump_sys_open(name, O_RDWR|O_CREAT, 0666)) == -1)
138a3a0bab7Snjoly 		atf_tc_fail_errno("open");
139a3a0bab7Snjoly 	if (rump_sys_close(fd) == -1)
140a3a0bab7Snjoly 		atf_tc_fail_errno("close");
141a3a0bab7Snjoly 
142a3a0bab7Snjoly 	rump_pub_lwproc_rfork(RUMP_RFCFDG);
143a3a0bab7Snjoly 	if (rump_sys_setuid(1) == -1)
144a3a0bab7Snjoly 		atf_tc_fail_errno("setuid");
145a3a0bab7Snjoly 	if (rump_sys_utimes(name, NULL) != -1 || errno != EACCES)
146a3a0bab7Snjoly 		atf_tc_fail_errno("utimes");
147a3a0bab7Snjoly 	rump_pub_lwproc_releaselwp();
148a3a0bab7Snjoly 
149a3a0bab7Snjoly 	if (rump_sys_utimes(name, NULL) == -1)
150a3a0bab7Snjoly 		atf_tc_fail_errno("utimes");
151a3a0bab7Snjoly 
1521beb02a6Sgson 	for (i = 0; i < sizeof(tmvs) / sizeof(tmvs[0]); i++) {
1531beb02a6Sgson 		for (j = 0; j < sizeof(tmvs) / sizeof(tmvs[0]); j++) {
1541beb02a6Sgson 			tmv[0] = tmvs[i];
1551beb02a6Sgson 			tmv[1] = tmvs[j];
15616fc5c76Snjoly 			rump_pub_lwproc_rfork(RUMP_RFCFDG);
15716fc5c76Snjoly 			if (rump_sys_setuid(1) == -1)
15816fc5c76Snjoly 				atf_tc_fail_errno("setuid");
15922d3abd7Snjoly 			if (rump_sys_utimes(name, tmv) != -1 || errno != EPERM)
16016fc5c76Snjoly 				atf_tc_fail_errno("utimes");
16116fc5c76Snjoly 			rump_pub_lwproc_releaselwp();
16216fc5c76Snjoly 
16316fc5c76Snjoly 			if (rump_sys_utimes(name, tmv) == -1)
16416fc5c76Snjoly 				atf_tc_fail_errno("utimes");
1651beb02a6Sgson 		}
1661beb02a6Sgson 	}
16716fc5c76Snjoly 
168a3a0bab7Snjoly 	if (rump_sys_unlink(name) == -1)
169a3a0bab7Snjoly 		atf_tc_fail_errno("unlink");
170a3a0bab7Snjoly 
171a3a0bab7Snjoly 	FSTEST_EXIT();
172a3a0bab7Snjoly }
173a3a0bab7Snjoly 
1747e04109eSnjoly static void
flags(const atf_tc_t * tc,const char * mp)1757e04109eSnjoly flags(const atf_tc_t *tc, const char *mp)
1767e04109eSnjoly {
1777e04109eSnjoly 	const char *name = "file.test";
1787e04109eSnjoly 	int fd, fflags;
1797e04109eSnjoly 	struct stat st;
1807e04109eSnjoly 
1817e04109eSnjoly 	FSTEST_ENTER();
1827e04109eSnjoly 
1837e04109eSnjoly 	if ((fd = rump_sys_open(name, O_RDWR|O_CREAT, 0666)) == -1)
1847e04109eSnjoly 		atf_tc_fail_errno("open");
1857e04109eSnjoly 	if (rump_sys_close(fd) == -1)
1867e04109eSnjoly 		atf_tc_fail_errno("close");
1877e04109eSnjoly 
1887e04109eSnjoly 	if (rump_sys_stat(name, &st) == -1)
1897e04109eSnjoly 		atf_tc_fail_errno("stat");
1907e04109eSnjoly 	if (rump_sys_chflags(name, st.st_flags) == -1) {
1917e04109eSnjoly 		if (errno == EOPNOTSUPP)
1927e04109eSnjoly 			atf_tc_skip("file flags not supported by file system");
1937e04109eSnjoly 		atf_tc_fail_errno("chflags");
1947e04109eSnjoly 	}
1957e04109eSnjoly 
196*6ac427e3Shannken 	fflags = st.st_flags | UF_NODUMP;
1977e04109eSnjoly 
1987e04109eSnjoly 	rump_pub_lwproc_rfork(RUMP_RFCFDG);
1997e04109eSnjoly 	if (rump_sys_setuid(1) == -1)
2007e04109eSnjoly 		atf_tc_fail_errno("setuid");
201*6ac427e3Shannken 	fflags |= UF_NODUMP;
2027e04109eSnjoly 	if (rump_sys_chflags(name, fflags) != -1 || errno != EPERM)
2037e04109eSnjoly 		atf_tc_fail_errno("chflags");
2047e04109eSnjoly 	rump_pub_lwproc_releaselwp();
2057e04109eSnjoly 
2067e04109eSnjoly 	if (rump_sys_chflags(name, fflags) == -1)
2077e04109eSnjoly 		atf_tc_fail_errno("chflags");
2087e04109eSnjoly 
209*6ac427e3Shannken 	fflags &= ~UF_NODUMP;
2107e04109eSnjoly 	if (rump_sys_chflags(name, fflags) == -1)
2117e04109eSnjoly 		atf_tc_fail_errno("chflags");
2127e04109eSnjoly 
2137e04109eSnjoly 	if (rump_sys_unlink(name) == -1)
2147e04109eSnjoly 		atf_tc_fail_errno("unlink");
2157e04109eSnjoly 
2167e04109eSnjoly 	FSTEST_EXIT();
2177e04109eSnjoly }
2187e04109eSnjoly 
21996b2d809Snjoly ATF_TC_FSAPPLY(owner, "owner unprivileged checks");
220c4210b25Snjoly ATF_TC_FSAPPLY(dirperms, "directory permission checks");
221a3a0bab7Snjoly ATF_TC_FSAPPLY(times, "time set checks");
2227e04109eSnjoly ATF_TC_FSAPPLY(flags, "file flags checks");
22396b2d809Snjoly 
ATF_TP_ADD_TCS(tp)22496b2d809Snjoly ATF_TP_ADD_TCS(tp)
22596b2d809Snjoly {
22696b2d809Snjoly 
22796b2d809Snjoly 	ATF_TP_FSAPPLY(owner);
228c4210b25Snjoly 	ATF_TP_FSAPPLY(dirperms);
229a3a0bab7Snjoly 	ATF_TP_FSAPPLY(times);
2307e04109eSnjoly 	ATF_TP_FSAPPLY(flags);
23196b2d809Snjoly 
23296b2d809Snjoly 	return atf_no_error();
23396b2d809Snjoly }
234