186 lines
		
	
	
		
			4.1 KiB
		
	
	
	
		
			C
		
	
	
	
			
		
		
	
	
			186 lines
		
	
	
		
			4.1 KiB
		
	
	
	
		
			C
		
	
	
	
| // SPDX-License-Identifier: GPL-2.0-or-later
 | |
| /*
 | |
|  * Copyright (c) 2018 FUJITSU LIMITED. All rights reserved.
 | |
|  * Author: Xiao Yang <yangx.jy@cn.fujitsu.com>
 | |
|  */
 | |
| 
 | |
| /*
 | |
|  * Description:
 | |
|  * 1) Witout a user namespace, getxattr(2) should get same data when
 | |
|  *    acquiring the value of system.posix_acl_access twice.
 | |
|  * 2) With/Without mapped root UID in a user namespaces, getxattr(2) should
 | |
|  *    get same data when acquiring the value of system.posix_acl_access twice.
 | |
|  *
 | |
|  * This issue included by getxattr05 has been fixed in kernel:
 | |
|  * '82c9a927bc5d ("getxattr: use correct xattr length")'
 | |
|  */
 | |
| 
 | |
| #define _GNU_SOURCE
 | |
| #include "config.h"
 | |
| #include <errno.h>
 | |
| #include <unistd.h>
 | |
| #include <sys/types.h>
 | |
| #include <sched.h>
 | |
| #include <stdlib.h>
 | |
| 
 | |
| #ifdef HAVE_SYS_XATTR_H
 | |
| # include <sys/xattr.h>
 | |
| #endif
 | |
| 
 | |
| #ifdef HAVE_LIBACL
 | |
| # include <sys/acl.h>
 | |
| #endif
 | |
| 
 | |
| #include "tst_test.h"
 | |
| #include "lapi/namespaces_constants.h"
 | |
| 
 | |
| #if defined(HAVE_SYS_XATTR_H) && defined(HAVE_LIBACL)
 | |
| 
 | |
| #define TEST_FILE	"testfile"
 | |
| #define SELF_USERNS	"/proc/self/ns/user"
 | |
| #define MAX_USERNS	"/proc/sys/user/max_user_namespaces"
 | |
| #define UID_MAP	"/proc/self/uid_map"
 | |
| 
 | |
| static acl_t acl;
 | |
| static int orig_max_userns = -1;
 | |
| static int user_ns_supported = 1;
 | |
| 
 | |
| static struct tcase {
 | |
| 	/* 0: without userns, 1: with userns */
 | |
| 	int set_userns;
 | |
| 	/* 0: don't map root UID in userns, 1: map root UID in userns */
 | |
| 	int map_root;
 | |
| } tcases[] = {
 | |
| 	{0, 0},
 | |
| 	{1, 0},
 | |
| 	{1, 1},
 | |
| };
 | |
| 
 | |
| static void verify_getxattr(void)
 | |
| {
 | |
| 	ssize_t i, res1, res2;
 | |
| 	char buf1[128], buf2[132];
 | |
| 
 | |
| 	res1 = SAFE_GETXATTR(TEST_FILE, "system.posix_acl_access",
 | |
| 			     buf1, sizeof(buf1));
 | |
| 	res2 = SAFE_GETXATTR(TEST_FILE, "system.posix_acl_access",
 | |
| 			     buf2, sizeof(buf2));
 | |
| 
 | |
| 	if (res1 != res2) {
 | |
| 		tst_res(TFAIL, "Return different sizes when acquiring "
 | |
| 			"the value of system.posix_acl_access twice");
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	for (i = 0; i < res1; i++) {
 | |
| 		if (buf1[i] != buf2[i])
 | |
| 			break;
 | |
| 	}
 | |
| 
 | |
| 	if (i < res1) {
 | |
| 		tst_res(TFAIL, "Got different data(%02x != %02x) at %ld",
 | |
| 			buf1[i], buf2[i], i);
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	tst_res(TPASS, "Got same data when acquiring the value of "
 | |
| 		"system.posix_acl_access twice");
 | |
| }
 | |
| 
 | |
| static void do_unshare(int map_root)
 | |
| {
 | |
| 	int res;
 | |
| 
 | |
| 	/* unshare() should support CLONE_NEWUSER flag since Linux 3.8 */
 | |
| 	res = unshare(CLONE_NEWUSER);
 | |
| 	if (res == -1)
 | |
| 		tst_brk(TFAIL | TERRNO, "unshare(CLONE_NEWUSER) failed");
 | |
| 
 | |
| 	if (map_root) {
 | |
| 		/* uid_map file should exist since Linux 3.8 because
 | |
| 		 * it is available on Linux 3.5
 | |
| 		 */
 | |
| 		if (access(UID_MAP, F_OK))
 | |
| 			tst_brk(TBROK, "file %s didn't exist", UID_MAP);
 | |
| 
 | |
| 		SAFE_FILE_PRINTF(UID_MAP, "%d %d %d", 0, 0, 1);
 | |
| 	}
 | |
| }
 | |
| 
 | |
| static void do_getxattr(unsigned int n)
 | |
| {
 | |
| 	struct tcase *tc = &tcases[n];
 | |
| 	pid_t pid;
 | |
| 
 | |
| 	if (tc->set_userns && !user_ns_supported) {
 | |
| 		tst_res(TCONF, "user namespace not available");
 | |
| 		return;
 | |
| 	}
 | |
| 
 | |
| 	pid = SAFE_FORK();
 | |
| 	if (!pid) {
 | |
| 		if (tc->set_userns)
 | |
| 			do_unshare(tc->map_root);
 | |
| 
 | |
| 		verify_getxattr();
 | |
| 		exit(0);
 | |
| 	}
 | |
| 
 | |
| 	tst_reap_children();
 | |
| }
 | |
| 
 | |
| static void setup(void)
 | |
| {
 | |
| 	const char *acl_text = "u::rw-,u:root:rwx,g::r--,o::r--,m::rwx";
 | |
| 	int res;
 | |
| 
 | |
| 	SAFE_TOUCH(TEST_FILE, 0644, NULL);
 | |
| 
 | |
| 	acl = acl_from_text(acl_text);
 | |
| 	if (!acl)
 | |
| 		tst_brk(TBROK | TERRNO, "acl_from_text() failed");
 | |
| 
 | |
| 	res = acl_set_file(TEST_FILE, ACL_TYPE_ACCESS, acl);
 | |
| 	if (res == -1) {
 | |
| 		if (errno == EOPNOTSUPP)
 | |
| 			tst_brk(TCONF | TERRNO, "acl_set_file()");
 | |
| 
 | |
| 		tst_brk(TBROK | TERRNO, "acl_set_file(%s) failed", TEST_FILE);
 | |
| 	}
 | |
| 
 | |
| 	/* The default value of max_user_namespaces is set to 0 on some distros,
 | |
| 	 * We need to change the default value to call unshare().
 | |
| 	 */
 | |
| 	if (access(SELF_USERNS, F_OK) != 0) {
 | |
| 		user_ns_supported = 0;
 | |
| 	} else if (!access(MAX_USERNS, F_OK)) {
 | |
| 		SAFE_FILE_SCANF(MAX_USERNS, "%d", &orig_max_userns);
 | |
| 		SAFE_FILE_PRINTF(MAX_USERNS, "%d", 10);
 | |
| 	}
 | |
| 
 | |
| }
 | |
| 
 | |
| static void cleanup(void)
 | |
| {
 | |
| 	if (orig_max_userns != -1)
 | |
| 		SAFE_FILE_PRINTF(MAX_USERNS, "%d", orig_max_userns);
 | |
| 
 | |
| 	if (acl)
 | |
| 		acl_free(acl);
 | |
| }
 | |
| 
 | |
| static struct tst_test test = {
 | |
| 	.needs_tmpdir = 1,
 | |
| 	.needs_root = 1,
 | |
| 	.forks_child = 1,
 | |
| 	.setup = setup,
 | |
| 	.cleanup = cleanup,
 | |
| 	.tcnt = ARRAY_SIZE(tcases),
 | |
| 	.test = do_getxattr,
 | |
| 	.min_kver = "3.8",
 | |
| };
 | |
| 
 | |
| #else /* HAVE_SYS_XATTR_H && HAVE_LIBACL*/
 | |
| 	TST_TEST_TCONF("<sys/xattr.h> or <sys/acl.h> does not exist.");
 | |
| #endif
 |