1 /* $NetBSD: t_o_search.c,v 1.3 2013/01/13 08:15:03 dholland Exp $ */ 2 3 /*- 4 * Copyright (c) 2012 The NetBSD Foundation, Inc. 5 * All rights reserved. 6 * 7 * This code is derived from software contributed to The NetBSD Foundation 8 * by Emmanuel Dreyfus. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 19 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 20 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 21 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 22 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 23 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 24 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 25 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 26 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 27 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 28 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 29 * POSSIBILITY OF SUCH DAMAGE. 30 */ 31 #include <sys/cdefs.h> 32 __RCSID("$NetBSD: t_o_search.c,v 1.3 2013/01/13 08:15:03 dholland Exp $"); 33 34 #include <atf-c.h> 35 #include <errno.h> 36 #include <fcntl.h> 37 #include <limits.h> 38 #include <paths.h> 39 #include <stdio.h> 40 #include <string.h> 41 #include <unistd.h> 42 #include <pwd.h> 43 #include <sys/param.h> 44 45 /* 46 * dholland 20130112: disable tests that require O_SEARCH semantics 47 * until a decision is reached about the semantics of O_SEARCH and a 48 * non-broken implementation is available. 49 */ 50 #if (O_MASK & O_SEARCH) != 0 51 #define USE_O_SEARCH 52 #endif 53 54 #define DIR "dir" 55 #define FILE "dir/o_search" 56 #define BASEFILE "o_search" 57 58 59 ATF_TC_WITH_CLEANUP(o_search_perm1); 60 ATF_TC_HEAD(o_search_perm1, tc) 61 { 62 atf_tc_set_md_var(tc, "descr", "See that openat enforces search permission"); 63 atf_tc_set_md_var(tc, "require.user", "unprivileged"); 64 } 65 66 ATF_TC_BODY(o_search_perm1, tc) 67 { 68 int dfd; 69 int fd; 70 71 ATF_REQUIRE(mkdir(DIR, 0755) == 0); 72 ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1); 73 ATF_REQUIRE(close(fd) == 0); 74 75 ATF_REQUIRE((dfd = open(DIR, O_RDONLY, 0)) != -1); 76 77 ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1); 78 ATF_REQUIRE(close(fd) == 0); 79 80 ATF_REQUIRE(fchmod(dfd, 644) == 0); 81 82 ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) == -1); 83 ATF_REQUIRE(errno == EACCES); 84 85 ATF_REQUIRE(close(dfd) == 0); 86 } 87 88 ATF_TC_CLEANUP(o_search_perm1, tc) 89 { 90 (void)unlink(FILE); 91 (void)rmdir(DIR); 92 } 93 94 95 #ifdef USE_O_SEARCH 96 97 ATF_TC_WITH_CLEANUP(o_search_root_flag1); 98 ATF_TC_HEAD(o_search_root_flag1, tc) 99 { 100 atf_tc_set_md_var(tc, "descr", "See that root openat honours O_SEARCH"); 101 atf_tc_set_md_var(tc, "require.user", "root"); 102 } 103 104 ATF_TC_BODY(o_search_root_flag1, tc) 105 { 106 int dfd; 107 int fd; 108 109 ATF_REQUIRE(mkdir(DIR, 0755) == 0); 110 ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1); 111 ATF_REQUIRE(close(fd) == 0); 112 113 ATF_REQUIRE((dfd = open(DIR, O_RDONLY|O_SEARCH, 0)) != -1); 114 115 ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1); 116 ATF_REQUIRE(close(fd) == 0); 117 118 ATF_REQUIRE(fchmod(dfd, 644) == 0); 119 120 ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1); 121 ATF_REQUIRE(close(fd) == 0); 122 123 ATF_REQUIRE(fchmod(dfd, 444) == 0); 124 125 ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1); 126 127 ATF_REQUIRE(close(dfd) == 0); 128 } 129 130 ATF_TC_CLEANUP(o_search_root_flag1, tc) 131 { 132 (void)unlink(FILE); 133 (void)rmdir(DIR); 134 } 135 136 137 ATF_TC_WITH_CLEANUP(o_search_unpriv_flag1); 138 ATF_TC_HEAD(o_search_unpriv_flag1, tc) 139 { 140 atf_tc_set_md_var(tc, "descr", "See that openat honours O_SEARCH"); 141 atf_tc_set_md_var(tc, "require.user", "unprivileged"); 142 } 143 144 ATF_TC_BODY(o_search_unpriv_flag1, tc) 145 { 146 int dfd; 147 int fd; 148 149 ATF_REQUIRE(mkdir(DIR, 0755) == 0); 150 ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1); 151 ATF_REQUIRE(close(fd) == 0); 152 153 ATF_REQUIRE((dfd = open(DIR, O_RDONLY|O_SEARCH, 0)) != -1); 154 155 ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1); 156 ATF_REQUIRE(close(fd) == 0); 157 158 ATF_REQUIRE(fchmod(dfd, 644) == 0); 159 160 ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1); 161 ATF_REQUIRE(close(fd) == 0); 162 163 ATF_REQUIRE(fchmod(dfd, 444) == 0); 164 165 ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) != -1); 166 167 ATF_REQUIRE(close(dfd) == 0); 168 } 169 170 ATF_TC_CLEANUP(o_search_unpriv_flag1, tc) 171 { 172 (void)unlink(FILE); 173 (void)rmdir(DIR); 174 } 175 176 #endif /* USE_O_SEARCH */ 177 178 179 ATF_TC_WITH_CLEANUP(o_search_perm2); 180 ATF_TC_HEAD(o_search_perm2, tc) 181 { 182 atf_tc_set_md_var(tc, "descr", "See that faccessat enforces search permission"); 183 atf_tc_set_md_var(tc, "require.user", "unprivileged"); 184 } 185 186 ATF_TC_BODY(o_search_perm2, tc) 187 { 188 int dfd; 189 int fd; 190 ATF_REQUIRE(mkdir(DIR, 0755) == 0); 191 ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1); 192 ATF_REQUIRE(close(fd) == 0); 193 194 ATF_REQUIRE((dfd = open(DIR, O_RDONLY, 0)) != -1); 195 196 ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0); 197 198 ATF_REQUIRE(fchmod(dfd, 644) == 0); 199 200 ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == -1); 201 ATF_REQUIRE(errno == EACCES); 202 203 ATF_REQUIRE(close(dfd) == 0); 204 } 205 206 ATF_TC_CLEANUP(o_search_perm2, tc) 207 { 208 (void)unlink(FILE); 209 (void)rmdir(DIR); 210 } 211 212 213 #ifdef USE_O_SEARCH 214 215 ATF_TC_WITH_CLEANUP(o_search_root_flag2); 216 ATF_TC_HEAD(o_search_root_flag2, tc) 217 { 218 atf_tc_set_md_var(tc, "descr", "See that root fstatat honours O_SEARCH"); 219 atf_tc_set_md_var(tc, "require.user", "root"); 220 } 221 222 ATF_TC_BODY(o_search_root_flag2, tc) 223 { 224 int dfd; 225 int fd; 226 227 ATF_REQUIRE(mkdir(DIR, 0755) == 0); 228 ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1); 229 ATF_REQUIRE(close(fd) == 0); 230 231 ATF_REQUIRE((dfd = open(DIR, O_RDONLY|O_SEARCH, 0)) != -1); 232 233 ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0); 234 235 ATF_REQUIRE(fchmod(dfd, 644) == 0); 236 237 ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0); 238 239 ATF_REQUIRE(fchmod(dfd, 444) == 0); 240 241 ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0); 242 243 ATF_REQUIRE(close(dfd) == 0); 244 } 245 246 ATF_TC_CLEANUP(o_search_root_flag2, tc) 247 { 248 (void)unlink(FILE); 249 (void)rmdir(DIR); 250 } 251 252 253 ATF_TC_WITH_CLEANUP(o_search_unpriv_flag2); 254 ATF_TC_HEAD(o_search_unpriv_flag2, tc) 255 { 256 atf_tc_set_md_var(tc, "descr", "See that fstatat honours O_SEARCH"); 257 atf_tc_set_md_var(tc, "require.user", "unprivileged"); 258 } 259 260 ATF_TC_BODY(o_search_unpriv_flag2, tc) 261 { 262 int dfd; 263 int fd; 264 265 ATF_REQUIRE(mkdir(DIR, 0755) == 0); 266 ATF_REQUIRE((fd = open(FILE, O_CREAT|O_RDWR, 0644)) != -1); 267 ATF_REQUIRE(close(fd) == 0); 268 269 ATF_REQUIRE((dfd = open(DIR, O_RDONLY|O_SEARCH, 0)) != -1); 270 271 ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0); 272 273 ATF_REQUIRE(fchmod(dfd, 644) == 0); 274 275 ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0); 276 277 ATF_REQUIRE(fchmod(dfd, 444) == 0); 278 279 ATF_REQUIRE(faccessat(dfd, BASEFILE, W_OK, 0) == 0); 280 281 ATF_REQUIRE(close(dfd) == 0); 282 } 283 284 ATF_TC_CLEANUP(o_search_unpriv_flag2, tc) 285 { 286 (void)unlink(FILE); 287 (void)rmdir(DIR); 288 } 289 290 #endif /* USE_O_SEARCH */ 291 292 293 ATF_TC_WITH_CLEANUP(o_search_notdir); 294 ATF_TC_HEAD(o_search_notdir, tc) 295 { 296 atf_tc_set_md_var(tc, "descr", "See that openat fails with non dir fd"); 297 } 298 299 ATF_TC_BODY(o_search_notdir, tc) 300 { 301 int dfd; 302 int fd; 303 304 ATF_REQUIRE(mkdir(DIR, 0755) == 0); 305 ATF_REQUIRE((dfd = open(FILE, O_CREAT|O_RDWR|O_SEARCH, 0644)) != -1); 306 ATF_REQUIRE((fd = openat(dfd, BASEFILE, O_RDWR, 0)) == -1); 307 ATF_REQUIRE(errno == ENOTDIR); 308 } 309 310 ATF_TC_CLEANUP(o_search_notdir, tc) 311 { 312 (void)unlink(FILE); 313 (void)rmdir(DIR); 314 } 315 316 317 318 ATF_TP_ADD_TCS(tp) 319 { 320 321 ATF_TP_ADD_TC(tp, o_search_perm1); 322 #ifdef USE_O_SEARCH 323 ATF_TP_ADD_TC(tp, o_search_root_flag1); 324 ATF_TP_ADD_TC(tp, o_search_unpriv_flag1); 325 #endif 326 ATF_TP_ADD_TC(tp, o_search_perm2); 327 #ifdef USE_O_SEARCH 328 ATF_TP_ADD_TC(tp, o_search_root_flag2); 329 ATF_TP_ADD_TC(tp, o_search_unpriv_flag2); 330 #endif 331 ATF_TP_ADD_TC(tp, o_search_notdir); 332 333 return atf_no_error(); 334 } 335