| /* |
| * Copyright (c) 2013 SUSE. All Rights Reserved. |
| * |
| * This program is free software; you can redistribute it and/or modify it |
| * under the terms of version 2 of the GNU General Public License as |
| * published by the Free Software Foundation. |
| * |
| * This program is distributed in the hope that it would be useful, but |
| * WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. |
| * |
| * Further, this software is distributed without any warranty that it is |
| * free of the rightful claim of any third person regarding infringement |
| * or the like. Any license provided herein, whether implied or |
| * otherwise, applies only to this software file. Patent licenses, if |
| * any, provided herein do not apply to combinations of this program with |
| * other software, or any other product whatsoever. |
| * |
| * You should have received a copy of the GNU General Public License along |
| * with this program; if not, write the Free Software Foundation, Inc., |
| * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. |
| * |
| * Started by Jan Kara <jack@suse.cz> |
| * |
| * DESCRIPTION |
| * Check that fanotify permission events work |
| */ |
| #include "config.h" |
| |
| #include <stdio.h> |
| #include <unistd.h> |
| #include <sys/stat.h> |
| #include <sys/types.h> |
| #include <sys/fcntl.h> |
| #include <sys/wait.h> |
| #include <errno.h> |
| #include <string.h> |
| #include <signal.h> |
| #include <sys/syscall.h> |
| #include "test.h" |
| #include "linux_syscall_numbers.h" |
| #include "fanotify.h" |
| #include "safe_macros.h" |
| |
| char *TCID = "fanotify03"; |
| int TST_TOTAL = 3; |
| |
| #if defined(HAVE_SYS_FANOTIFY_H) |
| #include <sys/fanotify.h> |
| |
| #define EVENT_MAX 1024 |
| /* size of the event structure, not counting name */ |
| #define EVENT_SIZE (sizeof (struct fanotify_event_metadata)) |
| /* reasonable guess as to size of 1024 events */ |
| #define EVENT_BUF_LEN (EVENT_MAX * EVENT_SIZE) |
| |
| static void setup(void); |
| static void cleanup(void); |
| |
| #define BUF_SIZE 256 |
| static char fname[BUF_SIZE]; |
| static char buf[BUF_SIZE]; |
| static volatile int fd_notify; |
| |
| static pid_t child_pid; |
| |
| static unsigned long long event_set[EVENT_MAX]; |
| static unsigned int event_resp[EVENT_MAX]; |
| |
| static char event_buf[EVENT_BUF_LEN]; |
| |
| static void generate_events(void) |
| { |
| int fd; |
| |
| /* |
| * generate sequence of events |
| */ |
| if ((fd = open(fname, O_RDWR | O_CREAT, 0700)) == -1) |
| exit(1); |
| if (write(fd, fname, 1) == -1) |
| exit(2); |
| |
| lseek(fd, 0, SEEK_SET); |
| if (read(fd, buf, BUF_SIZE) != -1) |
| exit(3); |
| |
| if (close(fd) == -1) |
| exit(4); |
| } |
| |
| static void child_handler(int tmp) |
| { |
| /* |
| * Close notification fd so that we cannot block while reading |
| * from it |
| */ |
| close(fd_notify); |
| fd_notify = -1; |
| } |
| |
| static void run_child(void) |
| { |
| struct sigaction child_action; |
| |
| child_action.sa_handler = child_handler; |
| sigemptyset(&child_action.sa_mask); |
| child_action.sa_flags = SA_NOCLDSTOP; |
| |
| if (sigaction(SIGCHLD, &child_action, NULL) < 0) { |
| tst_brkm(TBROK | TERRNO, cleanup, |
| "sigaction(SIGCHLD, &child_action, NULL) failed"); |
| } |
| |
| switch (child_pid = fork()) { |
| case 0: |
| /* Child will generate events now */ |
| close(fd_notify); |
| generate_events(); |
| exit(0); |
| case -1: |
| tst_brkm(TBROK | TERRNO, cleanup, "fork() failed"); |
| } |
| } |
| |
| static void check_child(void) |
| { |
| struct sigaction child_action; |
| int child_ret; |
| |
| child_action.sa_handler = SIG_IGN; |
| sigemptyset(&child_action.sa_mask); |
| child_action.sa_flags = SA_NOCLDSTOP; |
| if (sigaction(SIGCHLD, &child_action, NULL) < 0) { |
| tst_brkm(TBROK | TERRNO, cleanup, |
| "sigaction(SIGCHLD, &child_action, NULL) failed"); |
| } |
| if (waitpid(-1, &child_ret, 0) < 0) { |
| tst_brkm(TBROK | TERRNO, cleanup, |
| "waitpid(-1, &child_ret, 0) failed"); |
| } |
| |
| if (WIFSIGNALED(child_ret)) { |
| tst_resm(TFAIL, "child exited due to signal %d", |
| WTERMSIG(child_ret)); |
| } else if (WIFEXITED(child_ret)) { |
| if (WEXITSTATUS(child_ret) == 0) |
| tst_resm(TPASS, "child exited correctly"); |
| else |
| tst_resm(TFAIL, "child exited with status %d", |
| WEXITSTATUS(child_ret)); |
| } else { |
| tst_resm(TFAIL, "child exited for unknown reason (status %d)", |
| child_ret); |
| } |
| } |
| |
| int main(int ac, char **av) |
| { |
| int lc; |
| const char *msg; |
| int fd_notify_backup = -1; |
| |
| if ((msg = parse_opts(ac, av, NULL, NULL)) != NULL) |
| tst_brkm(TBROK, NULL, "OPTION PARSING ERROR - %s", msg); |
| |
| setup(); |
| |
| for (lc = 0; TEST_LOOPING(lc); lc++) { |
| int ret, len = 0, i = 0, test_num = 0; |
| |
| if (fd_notify_backup == -1) { |
| fd_notify_backup = dup(fd_notify); |
| if (fd_notify_backup < 0) |
| tst_brkm(TBROK | TERRNO, cleanup, |
| "dup(%d) failed", fd_notify); |
| } |
| run_child(); |
| |
| tst_count = 0; |
| |
| event_set[tst_count] = FAN_OPEN_PERM; |
| event_resp[tst_count++] = FAN_ALLOW; |
| event_set[tst_count] = FAN_ACCESS_PERM; |
| event_resp[tst_count++] = FAN_DENY; |
| |
| /* tst_count + 1 is for checking child return value */ |
| if (TST_TOTAL != tst_count + 1) { |
| tst_brkm(TBROK, cleanup, |
| "TST_TOTAL and tst_count do not match"); |
| } |
| tst_count = 0; |
| |
| /* |
| * check events |
| */ |
| while (test_num < TST_TOTAL && fd_notify != -1) { |
| struct fanotify_event_metadata *event; |
| |
| if (i == len) { |
| /* Get more events */ |
| ret = read(fd_notify, event_buf + len, |
| EVENT_BUF_LEN - len); |
| if (fd_notify == -1) |
| break; |
| if (ret < 0) { |
| tst_brkm(TBROK, cleanup, |
| "read(%d, buf, %zu) failed", |
| fd_notify, EVENT_BUF_LEN); |
| } |
| len += ret; |
| } |
| |
| event = (struct fanotify_event_metadata *)&event_buf[i]; |
| if (!(event->mask & event_set[test_num])) { |
| tst_resm(TFAIL, |
| "get event: mask=%llx (expected %llx) " |
| "pid=%u fd=%u", |
| (unsigned long long)event->mask, |
| event_set[test_num], |
| (unsigned)event->pid, event->fd); |
| } else if (event->pid != child_pid) { |
| tst_resm(TFAIL, |
| "get event: mask=%llx pid=%u " |
| "(expected %u) fd=%u", |
| (unsigned long long)event->mask, |
| (unsigned)event->pid, |
| (unsigned)child_pid, |
| event->fd); |
| } else { |
| tst_resm(TPASS, |
| "get event: mask=%llx pid=%u fd=%u", |
| (unsigned long long)event->mask, |
| (unsigned)event->pid, event->fd); |
| } |
| /* Write response to permission event */ |
| if (event_set[test_num] & FAN_ALL_PERM_EVENTS) { |
| struct fanotify_response resp; |
| |
| resp.fd = event->fd; |
| resp.response = event_resp[test_num]; |
| SAFE_WRITE(cleanup, 1, fd_notify, &resp, |
| sizeof(resp)); |
| } |
| event->mask &= ~event_set[test_num]; |
| /* No events left in current mask? Go for next event */ |
| if (event->mask == 0) { |
| i += event->event_len; |
| close(event->fd); |
| } |
| test_num++; |
| } |
| for (; test_num < TST_TOTAL - 1; test_num++) { |
| tst_resm(TFAIL, "didn't get event: mask=%llx", |
| event_set[test_num]); |
| |
| } |
| check_child(); |
| /* We got SIGCHLD while running, resetup fd_notify */ |
| if (fd_notify == -1) { |
| fd_notify = fd_notify_backup; |
| fd_notify_backup = -1; |
| } |
| } |
| |
| cleanup(); |
| tst_exit(); |
| } |
| |
| static void setup(void) |
| { |
| int fd; |
| |
| tst_sig(FORK, DEF_HANDLER, cleanup); |
| |
| TEST_PAUSE; |
| |
| tst_tmpdir(); |
| sprintf(fname, "fname_%d", getpid()); |
| fd = SAFE_OPEN(cleanup, fname, O_CREAT | O_RDWR, 0644); |
| SAFE_WRITE(cleanup, 1, fd, fname, 1); |
| SAFE_CLOSE(cleanup, fd); |
| |
| if ((fd_notify = fanotify_init(FAN_CLASS_CONTENT, O_RDONLY)) < 0) { |
| if (errno == ENOSYS) { |
| tst_brkm(TCONF, cleanup, |
| "fanotify is not configured in this kernel."); |
| } else { |
| tst_brkm(TBROK | TERRNO, cleanup, |
| "fanotify_init failed"); |
| } |
| } |
| |
| if (fanotify_mark(fd_notify, FAN_MARK_ADD, FAN_ACCESS_PERM | |
| FAN_OPEN_PERM, AT_FDCWD, fname) < 0) { |
| if (errno == EINVAL) { |
| tst_brkm(TCONF | TERRNO, cleanup, |
| "CONFIG_FANOTIFY_ACCESS_PERMISSIONS not " |
| "configured in kernel?"); |
| } else { |
| tst_brkm(TBROK | TERRNO, cleanup, |
| "fanotify_mark (%d, FAN_MARK_ADD, FAN_ACCESS_PERM | " |
| "FAN_OPEN_PERM, AT_FDCWD, %s) failed.", fd_notify, fname); |
| } |
| } |
| |
| } |
| |
| static void cleanup(void) |
| { |
| if (fd_notify != -1 && close(fd_notify) == -1) |
| tst_resm(TWARN, "close(%d) failed", fd_notify); |
| |
| tst_rmdir(); |
| } |
| |
| #else |
| |
| int main(void) |
| { |
| tst_brkm(TCONF, NULL, "system doesn't have required fanotify support"); |
| } |
| |
| #endif |