diff options
Diffstat (limited to 'tools/regression/capsicum/syscalls')
| -rw-r--r-- | tools/regression/capsicum/syscalls/Makefile | 26 | ||||
| -rw-r--r-- | tools/regression/capsicum/syscalls/cap_fcntls_limit.c | 542 | ||||
| -rw-r--r-- | tools/regression/capsicum/syscalls/cap_getmode.c | 163 | ||||
| -rw-r--r-- | tools/regression/capsicum/syscalls/cap_ioctls_limit.c | 466 | ||||
| -rw-r--r-- | tools/regression/capsicum/syscalls/misc.c | 124 | ||||
| -rw-r--r-- | tools/regression/capsicum/syscalls/misc.h | 59 | 
6 files changed, 1380 insertions, 0 deletions
diff --git a/tools/regression/capsicum/syscalls/Makefile b/tools/regression/capsicum/syscalls/Makefile new file mode 100644 index 000000000000..7f5a40752136 --- /dev/null +++ b/tools/regression/capsicum/syscalls/Makefile @@ -0,0 +1,26 @@ +SYSCALLS=	cap_fcntls_limit cap_getmode cap_ioctls_limit + +CFLAGS=		-O2 -pipe -std=gnu99 -fstack-protector +CFLAGS+=	-Wsystem-headers -Werror -Wall -Wno-format-y2k -W -Wno-unused-parameter +CFLAGS+=	-Wstrict-prototypes -Wmissing-prototypes -Wpointer-arith -Wreturn-type +CFLAGS+=	-Wcast-qual -Wwrite-strings -Wswitch -Wshadow -Wunused-parameter +CFLAGS+=	-Wcast-align -Wchar-subscripts -Wnested-externs -Wredundant-decls +CFLAGS+=	-Wold-style-definition -Wno-pointer-sign + +all:	${SYSCALLS} ${SYSCALLS:=.t} + +.for SYSCALL in ${SYSCALLS} + +${SYSCALL}:	${SYSCALL}.c misc.c +	${CC} ${CFLAGS} ${@}.c misc.c -o $@ + +${SYSCALL}.t:	${SYSCALL} +	@printf "#!/bin/sh\n\n%s/%s\n" ${.CURDIR} ${@:.t=} > $@ + +.endfor + +test:	all +	@prove -r ${.CURDIR} + +clean: +	rm -f ${SYSCALLS} ${SYSCALLS:=.t} diff --git a/tools/regression/capsicum/syscalls/cap_fcntls_limit.c b/tools/regression/capsicum/syscalls/cap_fcntls_limit.c new file mode 100644 index 000000000000..b76b120a1650 --- /dev/null +++ b/tools/regression/capsicum/syscalls/cap_fcntls_limit.c @@ -0,0 +1,542 @@ +/*- + * Copyright (c) 2012 The FreeBSD Foundation + * + * This software was developed by Pawel Jakub Dawidek under sponsorship from + * the FreeBSD Foundation. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + *    notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + *    notice, this list of conditions and the following disclaimer in the + *    documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + */ + +#include <sys/types.h> +#include <sys/capsicum.h> +#include <sys/procdesc.h> +#include <sys/socket.h> +#include <sys/wait.h> + +#include <err.h> +#include <errno.h> +#include <stdio.h> +#include <stdlib.h> +#include <unistd.h> + +#include "misc.h" + +static void +fcntl_tests_0(int fd) +{ +	uint32_t fcntlrights; + +	fcntlrights = 0; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == CAP_FCNTL_ALL); + +	CHECK(fcntl(fd, F_GETFD) == 0); +	CHECK(fcntl(fd, F_SETFD, FD_CLOEXEC) == 0); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	CHECK(fcntl(fd, F_SETFD, 0) == 0); +	CHECK(fcntl(fd, F_GETFD) == 0); + +	CHECK(fcntl(fd, F_GETFL) == O_RDWR); +	CHECK(fcntl(fd, F_SETFL, O_NONBLOCK) == 0); +	CHECK(fcntl(fd, F_GETFL) == (O_RDWR | O_NONBLOCK)); +	CHECK(fcntl(fd, F_SETFL, 0) == 0); +	CHECK(fcntl(fd, F_GETFL) == O_RDWR); + +	errno = 0; +	CHECK(cap_fcntls_limit(fd, ~CAP_FCNTL_ALL) == -1); +	CHECK(errno == EINVAL); +	CHECK(cap_fcntls_limit(fd, CAP_FCNTL_GETFL | CAP_FCNTL_SETFL) == 0); +	fcntlrights = 0; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == (CAP_FCNTL_GETFL | CAP_FCNTL_SETFL)); +	CHECK(cap_fcntls_limit(fd, CAP_FCNTL_GETFL | CAP_FCNTL_SETFL) == 0); +	fcntlrights = 0; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == (CAP_FCNTL_GETFL | CAP_FCNTL_SETFL)); + +	CHECK(fcntl(fd, F_GETFD) == 0); +	CHECK(fcntl(fd, F_SETFD, FD_CLOEXEC) == 0); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	CHECK(fcntl(fd, F_SETFD, 0) == 0); +	CHECK(fcntl(fd, F_GETFD) == 0); + +	CHECK(fcntl(fd, F_GETFL) == O_RDWR); +	CHECK(fcntl(fd, F_SETFL, O_NONBLOCK) == 0); +	CHECK(fcntl(fd, F_GETFL) == (O_RDWR | O_NONBLOCK)); +	CHECK(fcntl(fd, F_SETFL, 0) == 0); +	CHECK(fcntl(fd, F_GETFL) == O_RDWR); + +	CHECK(cap_fcntls_limit(fd, CAP_FCNTL_GETFL) == 0); +	fcntlrights = 0; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == CAP_FCNTL_GETFL); +	errno = 0; +	CHECK(cap_fcntls_limit(fd, CAP_FCNTL_GETFL | CAP_FCNTL_SETFL) == -1); +	CHECK(errno == ENOTCAPABLE); +	fcntlrights = 0; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == CAP_FCNTL_GETFL); + +	CHECK(fcntl(fd, F_GETFD) == 0); +	CHECK(fcntl(fd, F_SETFD, FD_CLOEXEC) == 0); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	CHECK(fcntl(fd, F_SETFD, 0) == 0); +	CHECK(fcntl(fd, F_GETFD) == 0); + +	CHECK(fcntl(fd, F_GETFL) == O_RDWR); +	errno = 0; +	CHECK(fcntl(fd, F_SETFL, O_NONBLOCK) == -1); +	CHECK(errno == ENOTCAPABLE); +	CHECK(fcntl(fd, F_GETFL) == O_RDWR); +	errno = 0; +	CHECK(fcntl(fd, F_SETFL, 0) == -1); +	CHECK(errno == ENOTCAPABLE); +	CHECK(fcntl(fd, F_GETFL) == O_RDWR); + +	CHECK(cap_fcntls_limit(fd, 0) == 0); +	fcntlrights = CAP_FCNTL_ALL; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == 0); +	errno = 0; +	CHECK(cap_fcntls_limit(fd, CAP_FCNTL_GETFL | CAP_FCNTL_SETFL) == -1); +	CHECK(errno == ENOTCAPABLE); +	fcntlrights = CAP_FCNTL_ALL; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == 0); +	errno = 0; +	CHECK(cap_fcntls_limit(fd, CAP_FCNTL_GETFL) == -1); +	CHECK(errno == ENOTCAPABLE); +	fcntlrights = CAP_FCNTL_ALL; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == 0); + +	CHECK(fcntl(fd, F_GETFD) == 0); +	CHECK(fcntl(fd, F_SETFD, FD_CLOEXEC) == 0); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	CHECK(fcntl(fd, F_SETFD, 0) == 0); +	CHECK(fcntl(fd, F_GETFD) == 0); + +	errno = 0; +	CHECK(fcntl(fd, F_GETFL) == -1); +	CHECK(errno == ENOTCAPABLE); +	errno = 0; +	CHECK(fcntl(fd, F_SETFL, O_NONBLOCK) == -1); +	CHECK(errno == ENOTCAPABLE); +	errno = 0; +	CHECK(fcntl(fd, F_SETFL, 0) == -1); +	CHECK(errno == ENOTCAPABLE); +	errno = 0; +	CHECK(fcntl(fd, F_GETFL) == -1); +	CHECK(errno == ENOTCAPABLE); +} + +static void +fcntl_tests_1(int fd) +{ +	uint32_t fcntlrights; +	cap_rights_t rights; + +	CHECK(cap_fcntls_limit(fd, CAP_FCNTL_GETFL) == 0); +	fcntlrights = 0; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == CAP_FCNTL_GETFL); + +	CAP_ALL(&rights); +	cap_rights_clear(&rights, CAP_FCNTL); +	CHECK(cap_rights_limit(fd, &rights) == 0); + +	fcntlrights = CAP_FCNTL_ALL; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == 0); + +	errno = 0; +	CHECK(cap_fcntls_limit(fd, CAP_FCNTL_GETFL | CAP_FCNTL_SETFL) == -1); +	CHECK(errno == ENOTCAPABLE); +	fcntlrights = CAP_FCNTL_ALL; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == 0); +	errno = 0; +	CHECK(cap_fcntls_limit(fd, CAP_FCNTL_GETFL) == -1); +	CHECK(errno == ENOTCAPABLE); +	fcntlrights = CAP_FCNTL_ALL; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == 0); + +	CHECK(fcntl(fd, F_GETFD) == 0); +	CHECK(fcntl(fd, F_SETFD, FD_CLOEXEC) == 0); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	CHECK(fcntl(fd, F_SETFD, 0) == 0); +	CHECK(fcntl(fd, F_GETFD) == 0); + +	errno = 0; +	CHECK(fcntl(fd, F_GETFL) == -1); +	CHECK(errno == ENOTCAPABLE); +	errno = 0; +	CHECK(fcntl(fd, F_SETFL, O_NONBLOCK) == -1); +	CHECK(errno == ENOTCAPABLE); +	errno = 0; +	CHECK(fcntl(fd, F_SETFL, 0) == -1); +	CHECK(errno == ENOTCAPABLE); +	errno = 0; +	CHECK(fcntl(fd, F_GETFL) == -1); +	CHECK(errno == ENOTCAPABLE); +} + +static void +fcntl_tests_2(int fd) +{ +	uint32_t fcntlrights; +	cap_rights_t rights; + +	CAP_ALL(&rights); +	cap_rights_clear(&rights, CAP_FCNTL); +	CHECK(cap_rights_limit(fd, &rights) == 0); + +	fcntlrights = CAP_FCNTL_ALL; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == 0); + +	errno = 0; +	CHECK(cap_fcntls_limit(fd, CAP_FCNTL_GETFL | CAP_FCNTL_SETFL) == -1); +	CHECK(errno == ENOTCAPABLE); +	fcntlrights = CAP_FCNTL_ALL; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == 0); +	errno = 0; +	CHECK(cap_fcntls_limit(fd, CAP_FCNTL_GETFL) == -1); +	CHECK(errno == ENOTCAPABLE); +	fcntlrights = CAP_FCNTL_ALL; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == 0); + +	CHECK(fcntl(fd, F_GETFD) == 0); +	CHECK(fcntl(fd, F_SETFD, FD_CLOEXEC) == 0); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	CHECK(fcntl(fd, F_SETFD, 0) == 0); +	CHECK(fcntl(fd, F_GETFD) == 0); + +	errno = 0; +	CHECK(fcntl(fd, F_GETFL) == -1); +	CHECK(errno == ENOTCAPABLE); +	errno = 0; +	CHECK(fcntl(fd, F_SETFL, O_NONBLOCK) == -1); +	CHECK(errno == ENOTCAPABLE); +	errno = 0; +	CHECK(fcntl(fd, F_SETFL, 0) == -1); +	CHECK(errno == ENOTCAPABLE); +	errno = 0; +	CHECK(fcntl(fd, F_GETFL) == -1); +	CHECK(errno == ENOTCAPABLE); +} + +static void +fcntl_tests_send_0(int sock) +{ +	int fd; + +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	CHECK(descriptor_send(sock, fd) == 0); +	CHECK(close(fd) == 0); + +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	CHECK(cap_fcntls_limit(fd, CAP_FCNTL_GETFL | CAP_FCNTL_SETFL) == 0); +	CHECK(descriptor_send(sock, fd) == 0); +	CHECK(close(fd) == 0); + +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	CHECK(cap_fcntls_limit(fd, CAP_FCNTL_GETFL) == 0); +	CHECK(descriptor_send(sock, fd) == 0); +	CHECK(close(fd) == 0); + +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	CHECK(cap_fcntls_limit(fd, 0) == 0); +	CHECK(descriptor_send(sock, fd) == 0); +	CHECK(close(fd) == 0); +} + +static void +fcntl_tests_recv_0(int sock) +{ +	uint32_t fcntlrights; +	int fd; + +	CHECK(descriptor_recv(sock, &fd) == 0); + +	fcntlrights = 0; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == CAP_FCNTL_ALL); + +	CHECK(fcntl(fd, F_GETFD) == 0); +	CHECK(fcntl(fd, F_SETFD, FD_CLOEXEC) == 0); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	CHECK(fcntl(fd, F_SETFD, 0) == 0); +	CHECK(fcntl(fd, F_GETFD) == 0); + +	CHECK(fcntl(fd, F_GETFL) == O_RDWR); +	CHECK(fcntl(fd, F_SETFL, O_NONBLOCK) == 0); +	CHECK(fcntl(fd, F_GETFL) == (O_RDWR | O_NONBLOCK)); +	CHECK(fcntl(fd, F_SETFL, 0) == 0); +	CHECK(fcntl(fd, F_GETFL) == O_RDWR); + +	CHECK(close(fd) == 0); + +	CHECK(descriptor_recv(sock, &fd) == 0); + +	fcntlrights = 0; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == (CAP_FCNTL_GETFL | CAP_FCNTL_SETFL)); +	CHECK(cap_fcntls_limit(fd, CAP_FCNTL_GETFL | CAP_FCNTL_SETFL) == 0); +	fcntlrights = 0; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == (CAP_FCNTL_GETFL | CAP_FCNTL_SETFL)); + +	CHECK(fcntl(fd, F_GETFD) == 0); +	CHECK(fcntl(fd, F_SETFD, FD_CLOEXEC) == 0); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	CHECK(fcntl(fd, F_SETFD, 0) == 0); +	CHECK(fcntl(fd, F_GETFD) == 0); + +	CHECK(fcntl(fd, F_GETFL) == O_RDWR); +	CHECK(fcntl(fd, F_SETFL, O_NONBLOCK) == 0); +	CHECK(fcntl(fd, F_GETFL) == (O_RDWR | O_NONBLOCK)); +	CHECK(fcntl(fd, F_SETFL, 0) == 0); +	CHECK(fcntl(fd, F_GETFL) == O_RDWR); + +	CHECK(close(fd) == 0); + +	CHECK(descriptor_recv(sock, &fd) == 0); + +	fcntlrights = 0; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == CAP_FCNTL_GETFL); +	errno = 0; +	CHECK(cap_fcntls_limit(fd, CAP_FCNTL_GETFL | CAP_FCNTL_SETFL) == -1); +	CHECK(errno == ENOTCAPABLE); +	fcntlrights = 0; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == CAP_FCNTL_GETFL); +	CHECK(cap_fcntls_limit(fd, CAP_FCNTL_GETFL) == 0); +	fcntlrights = 0; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == CAP_FCNTL_GETFL); + +	CHECK(fcntl(fd, F_GETFD) == 0); +	CHECK(fcntl(fd, F_SETFD, FD_CLOEXEC) == 0); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	CHECK(fcntl(fd, F_SETFD, 0) == 0); +	CHECK(fcntl(fd, F_GETFD) == 0); + +	CHECK(fcntl(fd, F_GETFL) == O_RDWR); +	errno = 0; +	CHECK(fcntl(fd, F_SETFL, O_NONBLOCK) == -1); +	CHECK(errno == ENOTCAPABLE); +	CHECK(fcntl(fd, F_GETFL) == O_RDWR); +	errno = 0; +	CHECK(fcntl(fd, F_SETFL, 0) == -1); +	CHECK(errno == ENOTCAPABLE); +	CHECK(fcntl(fd, F_GETFL) == O_RDWR); + +	CHECK(close(fd) == 0); + +	CHECK(descriptor_recv(sock, &fd) == 0); + +	fcntlrights = 0; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == 0); +	errno = 0; +	CHECK(cap_fcntls_limit(fd, CAP_FCNTL_GETFL | CAP_FCNTL_SETFL) == -1); +	CHECK(errno == ENOTCAPABLE); +	fcntlrights = 0; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == 0); +	errno = 0; +	CHECK(cap_fcntls_limit(fd, CAP_FCNTL_GETFL) == -1); +	CHECK(errno == ENOTCAPABLE); +	fcntlrights = 0; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == 0); +	errno = 0; +	CHECK(cap_fcntls_limit(fd, CAP_FCNTL_SETFL) == -1); +	CHECK(errno == ENOTCAPABLE); +	fcntlrights = 0; +	CHECK(cap_fcntls_get(fd, &fcntlrights) == 0); +	CHECK(fcntlrights == 0); + +	CHECK(fcntl(fd, F_GETFD) == 0); +	CHECK(fcntl(fd, F_SETFD, FD_CLOEXEC) == 0); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	CHECK(fcntl(fd, F_SETFD, 0) == 0); +	CHECK(fcntl(fd, F_GETFD) == 0); + +	errno = 0; +	CHECK(fcntl(fd, F_GETFL) == -1); +	CHECK(errno == ENOTCAPABLE); +	errno = 0; +	CHECK(fcntl(fd, F_SETFL, O_NONBLOCK) == -1); +	CHECK(errno == ENOTCAPABLE); +	errno = 0; +	CHECK(fcntl(fd, F_SETFL, 0) == -1); +	CHECK(errno == ENOTCAPABLE); +	errno = 0; +	CHECK(fcntl(fd, F_GETFL) == -1); +	CHECK(errno == ENOTCAPABLE); + +	CHECK(close(fd) == 0); +} + +int +main(void) +{ +	int fd, pfd, sp[2]; +	pid_t pid; + +	printf("1..870\n"); + +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	fcntl_tests_0(fd); +	CHECK(close(fd) == 0); + +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	fcntl_tests_1(fd); +	CHECK(close(fd) == 0); + +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	fcntl_tests_2(fd); +	CHECK(close(fd) == 0); + +	/* Child inherits descriptor and operates on it first. */ +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	CHECK((pid = fork()) >= 0); +	if (pid == 0) { +		fcntl_tests_0(fd); +		CHECK(close(fd) == 0); +		exit(0); +	} else { +		CHECK(waitpid(pid, NULL, 0) == pid); +		fcntl_tests_0(fd); +	} +	CHECK(close(fd) == 0); + +	/* Child inherits descriptor, but operates on it after parent. */ +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	CHECK((pid = fork()) >= 0); +	if (pid == 0) { +		sleep(1); +		fcntl_tests_0(fd); +		CHECK(close(fd) == 0); +		exit(0); +	} else { +		fcntl_tests_0(fd); +		CHECK(waitpid(pid, NULL, 0) == pid); +	} +	CHECK(close(fd) == 0); + +	/* Child inherits descriptor and operates on it first. */ +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	CHECK((pid = pdfork(&pfd, 0)) >= 0); +	if (pid == 0) { +		fcntl_tests_1(fd); +		exit(0); +	} else { +		CHECK(pdwait(pfd) == 0); +/* +		It fails with EBADF, which I believe is a bug. +		CHECK(close(pfd) == 0); +*/ +		fcntl_tests_1(fd); +	} +	CHECK(close(fd) == 0); + +	/* Child inherits descriptor, but operates on it after parent. */ +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	CHECK((pid = pdfork(&pfd, 0)) >= 0); +	if (pid == 0) { +		sleep(1); +		fcntl_tests_1(fd); +		exit(0); +	} else { +		fcntl_tests_1(fd); +		CHECK(pdwait(pfd) == 0); +/* +		It fails with EBADF, which I believe is a bug. +		CHECK(close(pfd) == 0); +*/ +	} +	CHECK(close(fd) == 0); + +	/* Child inherits descriptor and operates on it first. */ +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	CHECK((pid = fork()) >= 0); +	if (pid == 0) { +		fcntl_tests_2(fd); +		exit(0); +	} else { +		CHECK(waitpid(pid, NULL, 0) == pid); +		fcntl_tests_2(fd); +	} +	CHECK(close(fd) == 0); + +	/* Child inherits descriptor, but operates on it after parent. */ +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	CHECK((pid = fork()) >= 0); +	if (pid == 0) { +		sleep(1); +		fcntl_tests_2(fd); +		exit(0); +	} else { +		fcntl_tests_2(fd); +		CHECK(waitpid(pid, NULL, 0) == pid); +	} +	CHECK(close(fd) == 0); + +	/* Send descriptors from parent to child. */ +	CHECK(socketpair(AF_UNIX, SOCK_STREAM, 0, sp) == 0); +	CHECK((pid = fork()) >= 0); +	if (pid == 0) { +		CHECK(close(sp[0]) == 0); +		fcntl_tests_recv_0(sp[1]); +		CHECK(close(sp[1]) == 0); +		exit(0); +	} else { +		CHECK(close(sp[1]) == 0); +		fcntl_tests_send_0(sp[0]); +		CHECK(waitpid(pid, NULL, 0) == pid); +		CHECK(close(sp[0]) == 0); +	} + +	/* Send descriptors from child to parent. */ +	CHECK(socketpair(AF_UNIX, SOCK_STREAM, 0, sp) == 0); +	CHECK((pid = fork()) >= 0); +	if (pid == 0) { +		CHECK(close(sp[0]) == 0); +		fcntl_tests_send_0(sp[1]); +		CHECK(close(sp[1]) == 0); +		exit(0); +	} else { +		CHECK(close(sp[1]) == 0); +		fcntl_tests_recv_0(sp[0]); +		CHECK(waitpid(pid, NULL, 0) == pid); +		CHECK(close(sp[0]) == 0); +	} + +	exit(0); +} diff --git a/tools/regression/capsicum/syscalls/cap_getmode.c b/tools/regression/capsicum/syscalls/cap_getmode.c new file mode 100644 index 000000000000..8d72199ab5f6 --- /dev/null +++ b/tools/regression/capsicum/syscalls/cap_getmode.c @@ -0,0 +1,163 @@ +/*- + * Copyright (c) 2012 The FreeBSD Foundation + * + * This software was developed by Pawel Jakub Dawidek under sponsorship from + * the FreeBSD Foundation. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + *    notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + *    notice, this list of conditions and the following disclaimer in the + *    documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + */ + +#include <sys/types.h> +#include <sys/capsicum.h> +#include <sys/procdesc.h> +#include <sys/wait.h> + +#include <err.h> +#include <errno.h> +#include <stdio.h> +#include <stdlib.h> +#include <unistd.h> + +#include "misc.h" + +int +main(void) +{ +	unsigned int mode; +	pid_t pid; +	int pfd; + +	printf("1..27\n"); + +	mode = 666; +	CHECK(cap_getmode(&mode) == 0); +	/* If cap_getmode() succeeded mode should be modified. */ +	CHECK(mode != 666); +	/* We are not in capability mode. */ +	CHECK(mode == 0); + +	/* Expect EFAULT. */ +	errno = 0; +	CHECK(cap_getmode(NULL) == -1); +	CHECK(errno == EFAULT); +	errno = 0; +	CHECK(cap_getmode((void *)(uintptr_t)0xdeadc0de) == -1); +	CHECK(errno == EFAULT); + +	/* If parent is not in capability mode, child after fork() also won't be. */ +	pid = fork(); +	switch (pid) { +	case -1: +		err(1, "fork() failed"); +	case 0: +		mode = 666; +		CHECK(cap_getmode(&mode) == 0); +		/* If cap_getmode() succeeded mode should be modified. */ +		CHECK(mode != 666); +		/* We are not in capability mode. */ +		CHECK(mode == 0); +		exit(0); +	default: +		if (waitpid(pid, NULL, 0) == -1) +			err(1, "waitpid() failed"); +	} + +	/* If parent is not in capability mode, child after pdfork() also won't be. */ +	pid = pdfork(&pfd, 0); +	switch (pid) { +	case -1: +		err(1, "pdfork() failed"); +	case 0: +		mode = 666; +		CHECK(cap_getmode(&mode) == 0); +		/* If cap_getmode() succeeded mode should be modified. */ +		CHECK(mode != 666); +		/* We are not in capability mode. */ +		CHECK(mode == 0); +		exit(0); +	default: +		if (pdwait(pfd) == -1) +			err(1, "pdwait() failed"); +		close(pfd); +	} + +	/* In capability mode... */ + +	CHECK(cap_enter() == 0); + +	mode = 666; +	CHECK(cap_getmode(&mode) == 0); +	/* If cap_getmode() succeeded mode should be modified. */ +	CHECK(mode != 666); +	/* We are in capability mode. */ +	CHECK(mode == 1); + +	/* Expect EFAULT. */ +	errno = 0; +	CHECK(cap_getmode(NULL) == -1); +	CHECK(errno == EFAULT); +	errno = 0; +	CHECK(cap_getmode((void *)(uintptr_t)0xdeadc0de) == -1); +	CHECK(errno == EFAULT); + +	/* If parent is in capability mode, child after fork() also will be. */ +	pid = fork(); +	switch (pid) { +	case -1: +		err(1, "fork() failed"); +	case 0: +		mode = 666; +		CHECK(cap_getmode(&mode) == 0); +		/* If cap_getmode() succeeded mode should be modified. */ +		CHECK(mode != 666); +		/* We are in capability mode. */ +		CHECK(mode == 1); +		exit(0); +	default: +		/* +		 * wait(2) and friends are not permitted in the capability mode, +		 * so we can only just wait for a while. +		 */ +		sleep(1); +	} + +	/* If parent is in capability mode, child after pdfork() also will be. */ +	pid = pdfork(&pfd, 0); +	switch (pid) { +	case -1: +		err(1, "pdfork() failed"); +	case 0: +		mode = 666; +		CHECK(cap_getmode(&mode) == 0); +		/* If cap_getmode() succeeded mode should be modified. */ +		CHECK(mode != 666); +		/* We are in capability mode. */ +		CHECK(mode == 1); +		exit(0); +	default: +		if (pdwait(pfd) == -1) +			err(1, "pdwait() failed"); +		close(pfd); +	} + +	exit(0); +} diff --git a/tools/regression/capsicum/syscalls/cap_ioctls_limit.c b/tools/regression/capsicum/syscalls/cap_ioctls_limit.c new file mode 100644 index 000000000000..c8cf03207e57 --- /dev/null +++ b/tools/regression/capsicum/syscalls/cap_ioctls_limit.c @@ -0,0 +1,466 @@ +/*- + * Copyright (c) 2012 The FreeBSD Foundation + * + * This software was developed by Pawel Jakub Dawidek under sponsorship from + * the FreeBSD Foundation. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + *    notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + *    notice, this list of conditions and the following disclaimer in the + *    documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + */ + +#include <sys/param.h> +#include <sys/capsicum.h> +#include <sys/ioctl.h> +#include <sys/procdesc.h> +#include <sys/socket.h> +#include <sys/wait.h> + +#include <err.h> +#include <errno.h> +#include <limits.h> +#include <stdio.h> +#include <stdlib.h> +#include <unistd.h> + +#include "misc.h" + +static void +ioctl_tests_0(int fd) +{ +	unsigned long cmds[2]; + +	CHECK(cap_ioctls_get(fd, NULL, 0) == CAP_IOCTLS_ALL); + +	CHECK(fcntl(fd, F_GETFD) == 0); +	CHECK(ioctl(fd, FIOCLEX) == 0); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	CHECK(ioctl(fd, FIONCLEX) == 0); +	CHECK(fcntl(fd, F_GETFD) == 0); + +	cmds[0] = FIOCLEX; +	cmds[1] = FIONCLEX; +	CHECK(cap_ioctls_limit(fd, cmds, nitems(cmds)) == 0); +	cmds[0] = cmds[1] = 0; +	CHECK(cap_ioctls_get(fd, cmds, nitems(cmds)) == nitems(cmds)); +	CHECK((cmds[0] == FIOCLEX && cmds[1] == FIONCLEX) || +	    (cmds[0] == FIONCLEX && cmds[1] == FIOCLEX)); +	cmds[0] = FIOCLEX; +	cmds[1] = FIONCLEX; +	CHECK(cap_ioctls_limit(fd, cmds, nitems(cmds)) == 0); +	cmds[0] = cmds[1] = 0; +	CHECK(cap_ioctls_get(fd, cmds, 1) == nitems(cmds)); +	CHECK(cmds[0] == FIOCLEX || cmds[0] == FIONCLEX); +	CHECK(cmds[1] == 0); + +	CHECK(fcntl(fd, F_GETFD) == 0); +	CHECK(ioctl(fd, FIOCLEX) == 0); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	CHECK(ioctl(fd, FIONCLEX) == 0); +	CHECK(fcntl(fd, F_GETFD) == 0); + +	cmds[0] = FIOCLEX; +	CHECK(cap_ioctls_limit(fd, cmds, 1) == 0); +	cmds[0] = cmds[1] = 0; +	CHECK(cap_ioctls_get(fd, cmds, nitems(cmds)) == 1); +	CHECK(cmds[0] == FIOCLEX); +	cmds[0] = FIOCLEX; +	cmds[1] = FIONCLEX; +	errno = 0; +	CHECK(cap_ioctls_limit(fd, cmds, nitems(cmds)) == -1); +	CHECK(errno == ENOTCAPABLE); +	cmds[0] = cmds[1] = 0; +	CHECK(cap_ioctls_get(fd, cmds, nitems(cmds)) == 1); +	CHECK(cmds[0] == FIOCLEX); + +	CHECK(fcntl(fd, F_GETFD) == 0); +	CHECK(ioctl(fd, FIOCLEX) == 0); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	errno = 0; +	CHECK(ioctl(fd, FIONCLEX) == -1); +	CHECK(errno == ENOTCAPABLE); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	CHECK(fcntl(fd, F_SETFD, 0) == 0); +	CHECK(fcntl(fd, F_GETFD) == 0); + +	CHECK(cap_ioctls_limit(fd, NULL, 0) == 0); +	CHECK(cap_ioctls_get(fd, cmds, nitems(cmds)) == 0); +	cmds[0] = FIOCLEX; +	errno = 0; +	CHECK(cap_ioctls_limit(fd, cmds, 1) == -1); +	CHECK(errno == ENOTCAPABLE); +	CHECK(cap_ioctls_get(fd, cmds, nitems(cmds)) == 0); + +	CHECK(fcntl(fd, F_GETFD) == 0); +	errno = 0; +	CHECK(ioctl(fd, FIOCLEX) == -1); +	CHECK(errno == ENOTCAPABLE); +	CHECK(fcntl(fd, F_GETFD) == 0); +	CHECK(fcntl(fd, F_SETFD, FD_CLOEXEC) == 0); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	errno = 0; +	CHECK(ioctl(fd, FIONCLEX) == -1); +	CHECK(errno == ENOTCAPABLE); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	CHECK(fcntl(fd, F_SETFD, 0) == 0); +	CHECK(fcntl(fd, F_GETFD) == 0); +} + +static void +ioctl_tests_1(int fd) +{ +	unsigned long cmds[2]; +	cap_rights_t rights; + +	cmds[0] = FIOCLEX; +	CHECK(cap_ioctls_limit(fd, cmds, 1) == 0); +	cmds[0] = cmds[1] = 0; +	CHECK(cap_ioctls_get(fd, cmds, nitems(cmds)) == 1); +	CHECK(cmds[0] == FIOCLEX); +	CHECK(cmds[1] == 0); + +	CAP_ALL(&rights); +	cap_rights_clear(&rights, CAP_IOCTL); + +	CHECK(cap_rights_limit(fd, &rights) == 0); +	CHECK(cap_ioctls_get(fd, cmds, nitems(cmds)) == 0); + +	cmds[0] = FIOCLEX; +	cmds[1] = FIONCLEX; +	errno = 0; +	CHECK(cap_ioctls_limit(fd, cmds, nitems(cmds)) == -1); +	CHECK(errno == ENOTCAPABLE); +	CHECK(cap_ioctls_get(fd, cmds, nitems(cmds)) == 0); +	cmds[0] = FIOCLEX; +	errno = 0; +	CHECK(cap_ioctls_limit(fd, cmds, 1) == -1); +	CHECK(errno == ENOTCAPABLE); +	CHECK(cap_ioctls_get(fd, cmds, nitems(cmds)) == 0); + +	CHECK(fcntl(fd, F_GETFD) == 0); +	errno = 0; +	CHECK(ioctl(fd, FIOCLEX) == -1); +	CHECK(errno == ENOTCAPABLE); +	CHECK(fcntl(fd, F_GETFD) == 0); +	CHECK(fcntl(fd, F_SETFD, FD_CLOEXEC) == 0); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	errno = 0; +	CHECK(ioctl(fd, FIONCLEX) == -1); +	CHECK(errno == ENOTCAPABLE); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	CHECK(fcntl(fd, F_SETFD, 0) == 0); +	CHECK(fcntl(fd, F_GETFD) == 0); +} + +static void +ioctl_tests_2(int fd) +{ +	unsigned long cmds[2]; +	cap_rights_t rights; + +	CAP_ALL(&rights); +	cap_rights_clear(&rights, CAP_IOCTL); + +	CHECK(cap_rights_limit(fd, &rights) == 0); +	CHECK(cap_ioctls_get(fd, cmds, nitems(cmds)) == 0); + +	cmds[0] = FIOCLEX; +	cmds[1] = FIONCLEX; +	errno = 0; +	CHECK(cap_ioctls_limit(fd, cmds, nitems(cmds)) == -1); +	CHECK(errno == ENOTCAPABLE); +	CHECK(cap_ioctls_get(fd, cmds, nitems(cmds)) == 0); +	cmds[0] = FIOCLEX; +	errno = 0; +	CHECK(cap_ioctls_limit(fd, cmds, 1) == -1); +	CHECK(errno == ENOTCAPABLE); +	CHECK(cap_ioctls_get(fd, cmds, nitems(cmds)) == 0); + +	CHECK(fcntl(fd, F_GETFD) == 0); +	errno = 0; +	CHECK(ioctl(fd, FIOCLEX) == -1); +	CHECK(errno == ENOTCAPABLE); +	CHECK(fcntl(fd, F_GETFD) == 0); +	CHECK(fcntl(fd, F_SETFD, FD_CLOEXEC) == 0); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	errno = 0; +	CHECK(ioctl(fd, FIONCLEX) == -1); +	CHECK(errno == ENOTCAPABLE); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	CHECK(fcntl(fd, F_SETFD, 0) == 0); +	CHECK(fcntl(fd, F_GETFD) == 0); +} + +static void +ioctl_tests_send_0(int sock) +{ +	unsigned long cmds[2]; +	int fd; + +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	CHECK(descriptor_send(sock, fd) == 0); +	CHECK(close(fd) == 0); + +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	cmds[0] = FIOCLEX; +	cmds[1] = FIONCLEX; +	CHECK(cap_ioctls_limit(fd, cmds, nitems(cmds)) == 0); +	CHECK(descriptor_send(sock, fd) == 0); +	CHECK(close(fd) == 0); + +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	cmds[0] = FIOCLEX; +	CHECK(cap_ioctls_limit(fd, cmds, 1) == 0); +	CHECK(descriptor_send(sock, fd) == 0); +	CHECK(close(fd) == 0); + +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	CHECK(cap_ioctls_limit(fd, NULL, 0) == 0); +	CHECK(descriptor_send(sock, fd) == 0); +	CHECK(close(fd) == 0); +} + +static void +ioctl_tests_recv_0(int sock) +{ +	unsigned long cmds[2]; +	int fd; + +	CHECK(descriptor_recv(sock, &fd) == 0); + +	CHECK(cap_ioctls_get(fd, NULL, 0) == CAP_IOCTLS_ALL); + +	CHECK(fcntl(fd, F_GETFD) == 0); +	CHECK(ioctl(fd, FIOCLEX) == 0); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	CHECK(ioctl(fd, FIONCLEX) == 0); +	CHECK(fcntl(fd, F_GETFD) == 0); + +	CHECK(close(fd) == 0); + +	CHECK(descriptor_recv(sock, &fd) == 0); + +	cmds[0] = cmds[1] = 0; +	CHECK(cap_ioctls_get(fd, cmds, nitems(cmds)) == nitems(cmds)); +	CHECK((cmds[0] == FIOCLEX && cmds[1] == FIONCLEX) || +	    (cmds[0] == FIONCLEX && cmds[1] == FIOCLEX)); + +	CHECK(fcntl(fd, F_GETFD) == 0); +	CHECK(ioctl(fd, FIOCLEX) == 0); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	CHECK(ioctl(fd, FIONCLEX) == 0); +	CHECK(fcntl(fd, F_GETFD) == 0); + +	CHECK(close(fd) == 0); + +	CHECK(descriptor_recv(sock, &fd) == 0); + +	cmds[0] = cmds[1] = 0; +	CHECK(cap_ioctls_get(fd, cmds, nitems(cmds)) == 1); +	CHECK(cmds[0] == FIOCLEX); + +	CHECK(fcntl(fd, F_GETFD) == 0); +	CHECK(ioctl(fd, FIOCLEX) == 0); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	errno = 0; +	CHECK(ioctl(fd, FIONCLEX) == -1); +	CHECK(errno == ENOTCAPABLE); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	CHECK(fcntl(fd, F_SETFD, 0) == 0); +	CHECK(fcntl(fd, F_GETFD) == 0); + +	CHECK(close(fd) == 0); + +	CHECK(descriptor_recv(sock, &fd) == 0); + +	CHECK(cap_ioctls_get(fd, cmds, nitems(cmds)) == 0); + +	CHECK(fcntl(fd, F_GETFD) == 0); +	errno = 0; +	CHECK(ioctl(fd, FIOCLEX) == -1); +	CHECK(errno == ENOTCAPABLE); +	CHECK(fcntl(fd, F_GETFD) == 0); +	CHECK(fcntl(fd, F_SETFD, FD_CLOEXEC) == 0); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	errno = 0; +	CHECK(ioctl(fd, FIONCLEX) == -1); +	CHECK(errno == ENOTCAPABLE); +	CHECK(fcntl(fd, F_GETFD) == FD_CLOEXEC); +	CHECK(fcntl(fd, F_SETFD, 0) == 0); +	CHECK(fcntl(fd, F_GETFD) == 0); + +	CHECK(close(fd) == 0); +} + +int +main(void) +{ +	int fd, pfd, sp[2]; +	pid_t pid; + +	printf("1..607\n"); + +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	ioctl_tests_0(fd); +	CHECK(close(fd) == 0); + +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	ioctl_tests_1(fd); +	CHECK(close(fd) == 0); + +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	ioctl_tests_2(fd); +	CHECK(close(fd) == 0); + +	/* Child inherits descriptor and operates on it first. */ +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	pid = fork(); +	switch (pid) { +	case -1: +		err(1, "fork() failed"); +	case 0: +		ioctl_tests_0(fd); +		CHECK(close(fd) == 0); +		exit(0); +	default: +		if (waitpid(pid, NULL, 0) == -1) +			err(1, "waitpid() failed"); +		ioctl_tests_0(fd); +	} +	CHECK(close(fd) == 0); + +	/* Child inherits descriptor, but operates on it after parent. */ +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	pid = fork(); +	switch (pid) { +	case -1: +		err(1, "fork() failed"); +	case 0: +		sleep(1); +		ioctl_tests_0(fd); +		CHECK(close(fd) == 0); +		exit(0); +	default: +		ioctl_tests_0(fd); +		if (waitpid(pid, NULL, 0) == -1) +			err(1, "waitpid() failed"); +	} +	CHECK(close(fd) == 0); + +	/* Child inherits descriptor and operates on it first. */ +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	pid = pdfork(&pfd, 0); +	switch (pid) { +	case -1: +		err(1, "pdfork() failed"); +	case 0: +		ioctl_tests_1(fd); +		exit(0); +	default: +		if (pdwait(pfd) == -1) +			err(1, "pdwait() failed"); +		close(pfd); +		ioctl_tests_1(fd); +	} +	CHECK(close(fd) == 0); + +	/* Child inherits descriptor, but operates on it after parent. */ +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	pid = pdfork(&pfd, 0); +	switch (pid) { +	case -1: +		err(1, "pdfork() failed"); +	case 0: +		sleep(1); +		ioctl_tests_1(fd); +		exit(0); +	default: +		ioctl_tests_1(fd); +		if (pdwait(pfd) == -1) +			err(1, "pdwait() failed"); +		close(pfd); +	} +	CHECK(close(fd) == 0); + +	/* Child inherits descriptor and operates on it first. */ +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	pid = fork(); +	switch (pid) { +	case -1: +		err(1, "fork() failed"); +	case 0: +		ioctl_tests_2(fd); +		exit(0); +	default: +		if (waitpid(pid, NULL, 0) == -1) +			err(1, "waitpid() failed"); +		ioctl_tests_2(fd); +	} +	CHECK(close(fd) == 0); + +	/* Child inherits descriptor, but operates on it after parent. */ +	CHECK((fd = socket(AF_UNIX, SOCK_STREAM, 0)) >= 0); +	pid = fork(); +	switch (pid) { +	case -1: +		err(1, "fork() failed"); +	case 0: +		sleep(1); +		ioctl_tests_2(fd); +		exit(0); +	default: +		ioctl_tests_2(fd); +		if (waitpid(pid, NULL, 0) == -1) +			err(1, "waitpid() failed"); +	} +	CHECK(close(fd) == 0); + +	/* Send descriptors from parent to child. */ +	CHECK(socketpair(AF_UNIX, SOCK_STREAM, 0, sp) == 0); +	CHECK((pid = fork()) >= 0); +	if (pid == 0) { +		CHECK(close(sp[0]) == 0); +		ioctl_tests_recv_0(sp[1]); +		CHECK(close(sp[1]) == 0); +		exit(0); +	} else { +		CHECK(close(sp[1]) == 0); +		ioctl_tests_send_0(sp[0]); +		CHECK(waitpid(pid, NULL, 0) == pid); +		CHECK(close(sp[0]) == 0); +	} + +	/* Send descriptors from child to parent. */ +	CHECK(socketpair(AF_UNIX, SOCK_STREAM, 0, sp) == 0); +	CHECK((pid = fork()) >= 0); +	if (pid == 0) { +		CHECK(close(sp[0]) == 0); +		ioctl_tests_send_0(sp[1]); +		CHECK(close(sp[1]) == 0); +		exit(0); +	} else { +		CHECK(close(sp[1]) == 0); +		ioctl_tests_recv_0(sp[0]); +		CHECK(waitpid(pid, NULL, 0) == pid); +		CHECK(close(sp[0]) == 0); +	} + +	exit(0); +} diff --git a/tools/regression/capsicum/syscalls/misc.c b/tools/regression/capsicum/syscalls/misc.c new file mode 100644 index 000000000000..3549c1b3bf3c --- /dev/null +++ b/tools/regression/capsicum/syscalls/misc.c @@ -0,0 +1,124 @@ +/*- + * Copyright (c) 2012 The FreeBSD Foundation + * + * This software was developed by Pawel Jakub Dawidek under sponsorship from + * the FreeBSD Foundation. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + *    notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + *    notice, this list of conditions and the following disclaimer in the + *    documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + */ + +#include <sys/types.h> +#include <sys/select.h> +#include <sys/socket.h> + +#include <assert.h> +#include <errno.h> +#include <stdlib.h> +#include <strings.h> + +#include "misc.h" + +int +pdwait(int pfd) +{ +	fd_set fdset; + +	FD_ZERO(&fdset); +	FD_SET(pfd, &fdset); + +	return (select(pfd + 1, NULL, &fdset, NULL, NULL) == -1 ? -1 : 0); +} + +int +descriptor_send(int sock, int fd) +{ +	unsigned char ctrl[CMSG_SPACE(sizeof(fd))]; +	struct msghdr msg; +	struct cmsghdr *cmsg; + +	assert(sock >= 0); +	assert(fd >= 0); + +	bzero(&msg, sizeof(msg)); +	bzero(&ctrl, sizeof(ctrl)); + +	msg.msg_iov = NULL; +	msg.msg_iovlen = 0; +	msg.msg_control = ctrl; +	msg.msg_controllen = sizeof(ctrl); + +	cmsg = CMSG_FIRSTHDR(&msg); +	cmsg->cmsg_level = SOL_SOCKET; +	cmsg->cmsg_type = SCM_RIGHTS; +	cmsg->cmsg_len = CMSG_LEN(sizeof(fd)); +	bcopy(&fd, CMSG_DATA(cmsg), sizeof(fd)); + +	if (sendmsg(sock, &msg, 0) == -1) +		return (errno); + +	return (0); +} + +int +descriptor_recv(int sock, int *fdp) +{ +	unsigned char ctrl[CMSG_SPACE(sizeof(*fdp))]; +	struct msghdr msg; +	struct cmsghdr *cmsg; +	struct iovec iov; +	int val; + +	assert(sock >= 0); +	assert(fdp != NULL); + +	bzero(&msg, sizeof(msg)); +	bzero(&ctrl, sizeof(ctrl)); + +#if 1 +	/* +	 * This doesn't really make sense, as we don't plan to receive any +	 * data, but if no buffer is provided and recv(2) returns 0 without +	 * control message. Must be kernel bug. +	 */ +	iov.iov_base = &val; +	iov.iov_len = sizeof(val); +	msg.msg_iov = &iov; +	msg.msg_iovlen = 1; +#else +	msg.msg_iov = NULL; +	msg.msg_iovlen = 0; +#endif +	msg.msg_control = ctrl; +	msg.msg_controllen = sizeof(ctrl); + +	if (recvmsg(sock, &msg, 0) == -1) +		return (errno); + +	cmsg = CMSG_FIRSTHDR(&msg); +	if (cmsg == NULL || cmsg->cmsg_level != SOL_SOCKET || +	    cmsg->cmsg_type != SCM_RIGHTS) { +		return (EINVAL); +	} +	bcopy(CMSG_DATA(cmsg), fdp, sizeof(*fdp)); + +	return (0); +} diff --git a/tools/regression/capsicum/syscalls/misc.h b/tools/regression/capsicum/syscalls/misc.h new file mode 100644 index 000000000000..22a0ab8094db --- /dev/null +++ b/tools/regression/capsicum/syscalls/misc.h @@ -0,0 +1,59 @@ +/*- + * Copyright (c) 2012 The FreeBSD Foundation + * + * This software was developed by Pawel Jakub Dawidek under sponsorship from + * the FreeBSD Foundation. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + *    notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + *    notice, this list of conditions and the following disclaimer in the + *    documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHORS AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + */ + +#ifndef _MISC_H_ +#define	_MISC_H_ + +#define	OK()	do {							\ +	int _serrno = errno;						\ +	printf("ok # line %u\n", __LINE__);				\ +	fflush(stdout);							\ +	errno = _serrno;						\ +} while (0) +#define	NOK()	do {							\ +	int _serrno = errno;						\ +	printf("not ok # line %u\n", __LINE__);				\ +	fflush(stdout);							\ +	errno = _serrno;						\ +} while (0) +#define	CHECK(cond)	do {						\ +	if ((cond))							\ +		OK();							\ +	else								\ +		NOK();							\ +} while (0) + +/* + * This can be removed once pdwait4(2) is implemented. + */ +int pdwait(int pfd); + +int descriptor_send(int sock, int fd); +int descriptor_recv(int sock, int *fdp); + +#endif	/* !_MISC_H_ */  | 
