xref: /aosp_15_r20/external/ltp/testcases/kernel/syscalls/access/access02.c (revision 49cdfc7efb34551c7342be41a7384b9c40d7cab7)
1*49cdfc7eSAndroid Build Coastguard Worker // SPDX-License-Identifier: GPL-2.0-or-later
2*49cdfc7eSAndroid Build Coastguard Worker /*
3*49cdfc7eSAndroid Build Coastguard Worker  * Copyright (c) International Business Machines Corp., 2001
4*49cdfc7eSAndroid Build Coastguard Worker  * Copyright (c) Guangwen Feng <[email protected]>, 2016
5*49cdfc7eSAndroid Build Coastguard Worker  * Copyright (c) Linux Test Project, 2002-2023
6*49cdfc7eSAndroid Build Coastguard Worker  * Ported to LTP: Wayne Boyer
7*49cdfc7eSAndroid Build Coastguard Worker  */
8*49cdfc7eSAndroid Build Coastguard Worker 
9*49cdfc7eSAndroid Build Coastguard Worker /*\
10*49cdfc7eSAndroid Build Coastguard Worker  * [Description]
11*49cdfc7eSAndroid Build Coastguard Worker  *
12*49cdfc7eSAndroid Build Coastguard Worker  * Test access(2) syscall
13*49cdfc7eSAndroid Build Coastguard Worker  *
14*49cdfc7eSAndroid Build Coastguard Worker  * - check the existence or read/write/execute permissions on a file (mode argument: F_OK/R_OK/W_OK/X_OK)
15*49cdfc7eSAndroid Build Coastguard Worker  * - test the accessibility of the file referred to by symbolic link if the pathname points to a symbolic link
16*49cdfc7eSAndroid Build Coastguard Worker  * - file can be stat/read/written/executed as root and nobody
17*49cdfc7eSAndroid Build Coastguard Worker  */
18*49cdfc7eSAndroid Build Coastguard Worker 
19*49cdfc7eSAndroid Build Coastguard Worker #include <sys/types.h>
20*49cdfc7eSAndroid Build Coastguard Worker #include <unistd.h>
21*49cdfc7eSAndroid Build Coastguard Worker #include <errno.h>
22*49cdfc7eSAndroid Build Coastguard Worker #include <pwd.h>
23*49cdfc7eSAndroid Build Coastguard Worker #include <stdio.h>
24*49cdfc7eSAndroid Build Coastguard Worker #include <stdlib.h>
25*49cdfc7eSAndroid Build Coastguard Worker #include <paths.h>
26*49cdfc7eSAndroid Build Coastguard Worker #include "tst_test.h"
27*49cdfc7eSAndroid Build Coastguard Worker 
28*49cdfc7eSAndroid Build Coastguard Worker #define FNAME_F	"file_f"
29*49cdfc7eSAndroid Build Coastguard Worker #define FNAME_R	"file_r"
30*49cdfc7eSAndroid Build Coastguard Worker #define FNAME_W	"file_w"
31*49cdfc7eSAndroid Build Coastguard Worker #define FNAME_X	"file_x"
32*49cdfc7eSAndroid Build Coastguard Worker #define SNAME_F	"symlink_f"
33*49cdfc7eSAndroid Build Coastguard Worker #define SNAME_R	"symlink_r"
34*49cdfc7eSAndroid Build Coastguard Worker #define SNAME_W	"symlink_w"
35*49cdfc7eSAndroid Build Coastguard Worker #define SNAME_X	"symlink_x"
36*49cdfc7eSAndroid Build Coastguard Worker 
37*49cdfc7eSAndroid Build Coastguard Worker static uid_t uid;
38*49cdfc7eSAndroid Build Coastguard Worker 
39*49cdfc7eSAndroid Build Coastguard Worker static struct tcase {
40*49cdfc7eSAndroid Build Coastguard Worker 	const char *pathname;
41*49cdfc7eSAndroid Build Coastguard Worker 	int mode;
42*49cdfc7eSAndroid Build Coastguard Worker 	char *name;
43*49cdfc7eSAndroid Build Coastguard Worker 	const char *targetname;
44*49cdfc7eSAndroid Build Coastguard Worker } tcases[] = {
45*49cdfc7eSAndroid Build Coastguard Worker 	{FNAME_F, F_OK, "F_OK", FNAME_F},
46*49cdfc7eSAndroid Build Coastguard Worker 	{FNAME_R, R_OK, "R_OK", FNAME_R},
47*49cdfc7eSAndroid Build Coastguard Worker 	{FNAME_W, W_OK, "W_OK", FNAME_W},
48*49cdfc7eSAndroid Build Coastguard Worker 	{FNAME_X, X_OK, "X_OK", FNAME_X},
49*49cdfc7eSAndroid Build Coastguard Worker 	{SNAME_F, F_OK, "F_OK", FNAME_F},
50*49cdfc7eSAndroid Build Coastguard Worker 	{SNAME_R, R_OK, "R_OK", FNAME_R},
51*49cdfc7eSAndroid Build Coastguard Worker 	{SNAME_W, W_OK, "W_OK", FNAME_W},
52*49cdfc7eSAndroid Build Coastguard Worker 	{SNAME_X, X_OK, "X_OK", FNAME_X}
53*49cdfc7eSAndroid Build Coastguard Worker };
54*49cdfc7eSAndroid Build Coastguard Worker 
access_test(struct tcase * tc,const char * user)55*49cdfc7eSAndroid Build Coastguard Worker static void access_test(struct tcase *tc, const char *user)
56*49cdfc7eSAndroid Build Coastguard Worker {
57*49cdfc7eSAndroid Build Coastguard Worker 	struct stat stat_buf;
58*49cdfc7eSAndroid Build Coastguard Worker 	char command[64];
59*49cdfc7eSAndroid Build Coastguard Worker 
60*49cdfc7eSAndroid Build Coastguard Worker 	TST_EXP_PASS_SILENT(access(tc->pathname, tc->mode),
61*49cdfc7eSAndroid Build Coastguard Worker 	             "access(%s, %s) as %s", tc->pathname, tc->name, user);
62*49cdfc7eSAndroid Build Coastguard Worker 
63*49cdfc7eSAndroid Build Coastguard Worker 	if (!TST_PASS)
64*49cdfc7eSAndroid Build Coastguard Worker 		return;
65*49cdfc7eSAndroid Build Coastguard Worker 
66*49cdfc7eSAndroid Build Coastguard Worker 	switch (tc->mode) {
67*49cdfc7eSAndroid Build Coastguard Worker 	case F_OK:
68*49cdfc7eSAndroid Build Coastguard Worker 		/*
69*49cdfc7eSAndroid Build Coastguard Worker 		 * The specified file(or pointed to by symbolic link)
70*49cdfc7eSAndroid Build Coastguard Worker 		 * exists, attempt to get its status, if successful,
71*49cdfc7eSAndroid Build Coastguard Worker 		 * access() behaviour is correct.
72*49cdfc7eSAndroid Build Coastguard Worker 		 */
73*49cdfc7eSAndroid Build Coastguard Worker 		TEST(stat(tc->targetname, &stat_buf));
74*49cdfc7eSAndroid Build Coastguard Worker 
75*49cdfc7eSAndroid Build Coastguard Worker 		if (TST_RET == -1) {
76*49cdfc7eSAndroid Build Coastguard Worker 			tst_res(TFAIL | TTERRNO, "stat(%s) as %s failed",
77*49cdfc7eSAndroid Build Coastguard Worker 				tc->targetname, user);
78*49cdfc7eSAndroid Build Coastguard Worker 			return;
79*49cdfc7eSAndroid Build Coastguard Worker 		}
80*49cdfc7eSAndroid Build Coastguard Worker 
81*49cdfc7eSAndroid Build Coastguard Worker 		break;
82*49cdfc7eSAndroid Build Coastguard Worker 	case R_OK:
83*49cdfc7eSAndroid Build Coastguard Worker 		/*
84*49cdfc7eSAndroid Build Coastguard Worker 		 * The specified file(or pointed to by symbolic link)
85*49cdfc7eSAndroid Build Coastguard Worker 		 * has read access, attempt to open the file with O_RDONLY,
86*49cdfc7eSAndroid Build Coastguard Worker 		 * if we get a valid fd, access() behaviour is correct.
87*49cdfc7eSAndroid Build Coastguard Worker 		 */
88*49cdfc7eSAndroid Build Coastguard Worker 		TEST(open(tc->targetname, O_RDONLY));
89*49cdfc7eSAndroid Build Coastguard Worker 
90*49cdfc7eSAndroid Build Coastguard Worker 		if (TST_RET == -1) {
91*49cdfc7eSAndroid Build Coastguard Worker 			tst_res(TFAIL | TTERRNO,
92*49cdfc7eSAndroid Build Coastguard Worker 				"open %s with O_RDONLY as %s failed",
93*49cdfc7eSAndroid Build Coastguard Worker 				tc->targetname, user);
94*49cdfc7eSAndroid Build Coastguard Worker 			return;
95*49cdfc7eSAndroid Build Coastguard Worker 		}
96*49cdfc7eSAndroid Build Coastguard Worker 
97*49cdfc7eSAndroid Build Coastguard Worker 		SAFE_CLOSE(TST_RET);
98*49cdfc7eSAndroid Build Coastguard Worker 
99*49cdfc7eSAndroid Build Coastguard Worker 		break;
100*49cdfc7eSAndroid Build Coastguard Worker 	case W_OK:
101*49cdfc7eSAndroid Build Coastguard Worker 		/*
102*49cdfc7eSAndroid Build Coastguard Worker 		 * The specified file(or pointed to by symbolic link)
103*49cdfc7eSAndroid Build Coastguard Worker 		 * has write access, attempt to open the file with O_WRONLY,
104*49cdfc7eSAndroid Build Coastguard Worker 		 * if we get a valid fd, access() behaviour is correct.
105*49cdfc7eSAndroid Build Coastguard Worker 		 */
106*49cdfc7eSAndroid Build Coastguard Worker 		TEST(open(tc->targetname, O_WRONLY));
107*49cdfc7eSAndroid Build Coastguard Worker 
108*49cdfc7eSAndroid Build Coastguard Worker 		if (TST_RET == -1) {
109*49cdfc7eSAndroid Build Coastguard Worker 			tst_res(TFAIL | TTERRNO,
110*49cdfc7eSAndroid Build Coastguard Worker 				"open %s with O_WRONLY as %s failed",
111*49cdfc7eSAndroid Build Coastguard Worker 				tc->targetname, user);
112*49cdfc7eSAndroid Build Coastguard Worker 			return;
113*49cdfc7eSAndroid Build Coastguard Worker 		}
114*49cdfc7eSAndroid Build Coastguard Worker 
115*49cdfc7eSAndroid Build Coastguard Worker 		SAFE_CLOSE(TST_RET);
116*49cdfc7eSAndroid Build Coastguard Worker 
117*49cdfc7eSAndroid Build Coastguard Worker 		break;
118*49cdfc7eSAndroid Build Coastguard Worker 	case X_OK:
119*49cdfc7eSAndroid Build Coastguard Worker 		/*
120*49cdfc7eSAndroid Build Coastguard Worker 		 * The specified file(or pointed to by symbolic link)
121*49cdfc7eSAndroid Build Coastguard Worker 		 * has execute access, attempt to execute the executable
122*49cdfc7eSAndroid Build Coastguard Worker 		 * file, if successful, access() behaviour is correct.
123*49cdfc7eSAndroid Build Coastguard Worker 		 */
124*49cdfc7eSAndroid Build Coastguard Worker 		sprintf(command, "./%s", tc->targetname);
125*49cdfc7eSAndroid Build Coastguard Worker 
126*49cdfc7eSAndroid Build Coastguard Worker 		TEST(system(command));
127*49cdfc7eSAndroid Build Coastguard Worker 
128*49cdfc7eSAndroid Build Coastguard Worker 		if (TST_RET != 0) {
129*49cdfc7eSAndroid Build Coastguard Worker 			tst_res(TFAIL | TTERRNO, "execute %s as %s failed",
130*49cdfc7eSAndroid Build Coastguard Worker 				tc->targetname, user);
131*49cdfc7eSAndroid Build Coastguard Worker 			return;
132*49cdfc7eSAndroid Build Coastguard Worker 		}
133*49cdfc7eSAndroid Build Coastguard Worker 
134*49cdfc7eSAndroid Build Coastguard Worker 		break;
135*49cdfc7eSAndroid Build Coastguard Worker 	default:
136*49cdfc7eSAndroid Build Coastguard Worker 		break;
137*49cdfc7eSAndroid Build Coastguard Worker 	}
138*49cdfc7eSAndroid Build Coastguard Worker 
139*49cdfc7eSAndroid Build Coastguard Worker 	tst_res(TPASS, "access(%s, %s) as %s behaviour is correct.",
140*49cdfc7eSAndroid Build Coastguard Worker 		tc->pathname, tc->name, user);
141*49cdfc7eSAndroid Build Coastguard Worker }
142*49cdfc7eSAndroid Build Coastguard Worker 
verify_access(unsigned int n)143*49cdfc7eSAndroid Build Coastguard Worker static void verify_access(unsigned int n)
144*49cdfc7eSAndroid Build Coastguard Worker {
145*49cdfc7eSAndroid Build Coastguard Worker 	struct tcase *tc = &tcases[n];
146*49cdfc7eSAndroid Build Coastguard Worker 	pid_t pid;
147*49cdfc7eSAndroid Build Coastguard Worker 
148*49cdfc7eSAndroid Build Coastguard Worker 	/* test as root */
149*49cdfc7eSAndroid Build Coastguard Worker 	access_test(tc, "root");
150*49cdfc7eSAndroid Build Coastguard Worker 
151*49cdfc7eSAndroid Build Coastguard Worker 	/* test as nobody */
152*49cdfc7eSAndroid Build Coastguard Worker 	pid = SAFE_FORK();
153*49cdfc7eSAndroid Build Coastguard Worker 	if (pid) {
154*49cdfc7eSAndroid Build Coastguard Worker 		SAFE_WAITPID(pid, NULL, 0);
155*49cdfc7eSAndroid Build Coastguard Worker 	} else {
156*49cdfc7eSAndroid Build Coastguard Worker 		SAFE_SETUID(uid);
157*49cdfc7eSAndroid Build Coastguard Worker 		access_test(tc, "nobody");
158*49cdfc7eSAndroid Build Coastguard Worker 	}
159*49cdfc7eSAndroid Build Coastguard Worker }
160*49cdfc7eSAndroid Build Coastguard Worker 
setup(void)161*49cdfc7eSAndroid Build Coastguard Worker static void setup(void)
162*49cdfc7eSAndroid Build Coastguard Worker {
163*49cdfc7eSAndroid Build Coastguard Worker 	struct passwd *pw;
164*49cdfc7eSAndroid Build Coastguard Worker 
165*49cdfc7eSAndroid Build Coastguard Worker 	pw = SAFE_GETPWNAM("nobody");
166*49cdfc7eSAndroid Build Coastguard Worker 
167*49cdfc7eSAndroid Build Coastguard Worker 	uid = pw->pw_uid;
168*49cdfc7eSAndroid Build Coastguard Worker 
169*49cdfc7eSAndroid Build Coastguard Worker 	SAFE_TOUCH(FNAME_F, 0000, NULL);
170*49cdfc7eSAndroid Build Coastguard Worker 	SAFE_TOUCH(FNAME_R, 0444, NULL);
171*49cdfc7eSAndroid Build Coastguard Worker 	SAFE_TOUCH(FNAME_W, 0222, NULL);
172*49cdfc7eSAndroid Build Coastguard Worker 	SAFE_TOUCH(FNAME_X, 0555, NULL);
173*49cdfc7eSAndroid Build Coastguard Worker 	SAFE_FILE_PRINTF(FNAME_X, "#!%s\n", _PATH_BSHELL);
174*49cdfc7eSAndroid Build Coastguard Worker 
175*49cdfc7eSAndroid Build Coastguard Worker 	SAFE_SYMLINK(FNAME_F, SNAME_F);
176*49cdfc7eSAndroid Build Coastguard Worker 	SAFE_SYMLINK(FNAME_R, SNAME_R);
177*49cdfc7eSAndroid Build Coastguard Worker 	SAFE_SYMLINK(FNAME_W, SNAME_W);
178*49cdfc7eSAndroid Build Coastguard Worker 	SAFE_SYMLINK(FNAME_X, SNAME_X);
179*49cdfc7eSAndroid Build Coastguard Worker }
180*49cdfc7eSAndroid Build Coastguard Worker 
181*49cdfc7eSAndroid Build Coastguard Worker static struct tst_test test = {
182*49cdfc7eSAndroid Build Coastguard Worker 	.tcnt = ARRAY_SIZE(tcases),
183*49cdfc7eSAndroid Build Coastguard Worker 	.needs_tmpdir = 1,
184*49cdfc7eSAndroid Build Coastguard Worker 	.needs_root = 1,
185*49cdfc7eSAndroid Build Coastguard Worker 	.forks_child = 1,
186*49cdfc7eSAndroid Build Coastguard Worker 	.setup = setup,
187*49cdfc7eSAndroid Build Coastguard Worker 	.test = verify_access,
188*49cdfc7eSAndroid Build Coastguard Worker };
189