aboutsummaryrefslogtreecommitdiff
path: root/testcases/kernel/syscalls/faccessat2/faccessat202.c
blob: a60db2bf81426419efecb57bf08eeb02732baea2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
// SPDX-License-Identifier: GPL-2.0-or-later
/*
 * Copyright (c) 2023 FUJITSU LIMITED. All rights reserved.
 * Copyright (c) Linux Test Project, 2003-2023
 * Author: Yang Xu <xuyang2018.jy@fujitsu.com>
 */

/*\
 * [Description]
 *
 * Test basic error handling of faccessat2 syscall:
 *
 * - faccessat2() fails with EFAULT if pathname is a bad pathname point.
 * - faccessat2() fails with EINVAL if flags is -1.
 * - faccessat2() fails with EINVAL if mode is -1.
 * - faccessat2() fails with EBADF if dirfd is -1.
 * - faccessat2() fails with ENOTDIR if pathname is relative path to a
 *   file and dir_fd is file descriptor for this file.
 * - faccessat2() fails with EACCES if flags is AT_EACCESS and not using
 *   the effective user and group IDs.
 *
 * Minimum Linux version required is v5.8.
 */

#include <pwd.h>

#include "tst_test.h"
#include "lapi/syscalls.h"
#include "lapi/faccessat.h"

#define TESTUSER        "nobody"
#define TESTDIR         "faccessat2dir"
#define RELPATH         "faccessat2dir/faccessat2file"

static int fd;
static int bad_fd = -1;
static int atcwd_fd = AT_FDCWD;
static char *bad_path;
static char *rel_path;

static struct passwd *ltpuser;

static struct tcase {
	int *fd;
	char **filename;
	int mode;
	int flags;
	int exp_errno;
	const char *desc;
} tcases[] = {
	{&atcwd_fd, &bad_path, R_OK, 0, EFAULT, "invalid address"},
	{&atcwd_fd, &rel_path, R_OK, -1, EINVAL, "invalid flags"},
	{&atcwd_fd, &rel_path, -1, 0, EINVAL, "invalid mode"},
	{&bad_fd, &rel_path, R_OK, 0, EBADF, "invalid fd"},
	{&fd, &rel_path, R_OK, 0, ENOTDIR, "fd pointing to file"},
	{&atcwd_fd, &rel_path, R_OK, AT_EACCESS, EACCES,
         "AT_EACCESS and unprivileged EUID"},
};

static void verify_faccessat2(unsigned int i)
{
	struct tcase *tc = &tcases[i];

	if (tc->exp_errno == EACCES)
		SAFE_SETEUID(ltpuser->pw_uid);

	TST_EXP_FAIL(faccessat2(*tc->fd, *tc->filename, tc->mode, tc->flags),
		     tc->exp_errno, "faccessat2() with %s", tc->desc);

	if (tc->exp_errno == EACCES)
		SAFE_SETEUID(0);
}

static void setup(void)
{
	SAFE_MKDIR(TESTDIR, 0666);
	SAFE_TOUCH(RELPATH, 0444, NULL);

	fd = SAFE_OPEN(RELPATH, O_RDONLY);
	bad_path = tst_get_bad_addr(NULL);

	ltpuser = SAFE_GETPWNAM(TESTUSER);
}

static void cleanup(void)
{
	if (fd > -1)
		SAFE_CLOSE(fd);
}

static struct tst_test test = {
	.test = verify_faccessat2,
	.tcnt = ARRAY_SIZE(tcases),
	.setup = setup,
	.cleanup = cleanup,
	.bufs = (struct tst_buffers []) {
		{&rel_path, .str = RELPATH},
		{},
	},
	.needs_tmpdir = 1,
	.needs_root = 1,
};