162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci#define _GNU_SOURCE 362306a36Sopenharmony_ci#include <errno.h> 462306a36Sopenharmony_ci#include <fcntl.h> 562306a36Sopenharmony_ci#include <sched.h> 662306a36Sopenharmony_ci#include <stdbool.h> 762306a36Sopenharmony_ci#include <stdio.h> 862306a36Sopenharmony_ci#include <stdlib.h> 962306a36Sopenharmony_ci#include <string.h> 1062306a36Sopenharmony_ci#include <unistd.h> 1162306a36Sopenharmony_ci#include <asm/ioctls.h> 1262306a36Sopenharmony_ci#include <sys/mount.h> 1362306a36Sopenharmony_ci#include <sys/wait.h> 1462306a36Sopenharmony_ci#include "../kselftest.h" 1562306a36Sopenharmony_ci 1662306a36Sopenharmony_cistatic bool terminal_dup2(int duplicate, int original) 1762306a36Sopenharmony_ci{ 1862306a36Sopenharmony_ci int ret; 1962306a36Sopenharmony_ci 2062306a36Sopenharmony_ci ret = dup2(duplicate, original); 2162306a36Sopenharmony_ci if (ret < 0) 2262306a36Sopenharmony_ci return false; 2362306a36Sopenharmony_ci 2462306a36Sopenharmony_ci return true; 2562306a36Sopenharmony_ci} 2662306a36Sopenharmony_ci 2762306a36Sopenharmony_cistatic int terminal_set_stdfds(int fd) 2862306a36Sopenharmony_ci{ 2962306a36Sopenharmony_ci int i; 3062306a36Sopenharmony_ci 3162306a36Sopenharmony_ci if (fd < 0) 3262306a36Sopenharmony_ci return 0; 3362306a36Sopenharmony_ci 3462306a36Sopenharmony_ci for (i = 0; i < 3; i++) 3562306a36Sopenharmony_ci if (!terminal_dup2(fd, (int[]){STDIN_FILENO, STDOUT_FILENO, 3662306a36Sopenharmony_ci STDERR_FILENO}[i])) 3762306a36Sopenharmony_ci return -1; 3862306a36Sopenharmony_ci 3962306a36Sopenharmony_ci return 0; 4062306a36Sopenharmony_ci} 4162306a36Sopenharmony_ci 4262306a36Sopenharmony_cistatic int login_pty(int fd) 4362306a36Sopenharmony_ci{ 4462306a36Sopenharmony_ci int ret; 4562306a36Sopenharmony_ci 4662306a36Sopenharmony_ci setsid(); 4762306a36Sopenharmony_ci 4862306a36Sopenharmony_ci ret = ioctl(fd, TIOCSCTTY, NULL); 4962306a36Sopenharmony_ci if (ret < 0) 5062306a36Sopenharmony_ci return -1; 5162306a36Sopenharmony_ci 5262306a36Sopenharmony_ci ret = terminal_set_stdfds(fd); 5362306a36Sopenharmony_ci if (ret < 0) 5462306a36Sopenharmony_ci return -1; 5562306a36Sopenharmony_ci 5662306a36Sopenharmony_ci if (fd > STDERR_FILENO) 5762306a36Sopenharmony_ci close(fd); 5862306a36Sopenharmony_ci 5962306a36Sopenharmony_ci return 0; 6062306a36Sopenharmony_ci} 6162306a36Sopenharmony_ci 6262306a36Sopenharmony_cistatic int wait_for_pid(pid_t pid) 6362306a36Sopenharmony_ci{ 6462306a36Sopenharmony_ci int status, ret; 6562306a36Sopenharmony_ci 6662306a36Sopenharmony_ciagain: 6762306a36Sopenharmony_ci ret = waitpid(pid, &status, 0); 6862306a36Sopenharmony_ci if (ret == -1) { 6962306a36Sopenharmony_ci if (errno == EINTR) 7062306a36Sopenharmony_ci goto again; 7162306a36Sopenharmony_ci return -1; 7262306a36Sopenharmony_ci } 7362306a36Sopenharmony_ci if (ret != pid) 7462306a36Sopenharmony_ci goto again; 7562306a36Sopenharmony_ci 7662306a36Sopenharmony_ci if (!WIFEXITED(status) || WEXITSTATUS(status) != 0) 7762306a36Sopenharmony_ci return -1; 7862306a36Sopenharmony_ci 7962306a36Sopenharmony_ci return 0; 8062306a36Sopenharmony_ci} 8162306a36Sopenharmony_ci 8262306a36Sopenharmony_cistatic int resolve_procfd_symlink(int fd, char *buf, size_t buflen) 8362306a36Sopenharmony_ci{ 8462306a36Sopenharmony_ci int ret; 8562306a36Sopenharmony_ci char procfd[4096]; 8662306a36Sopenharmony_ci 8762306a36Sopenharmony_ci ret = snprintf(procfd, 4096, "/proc/self/fd/%d", fd); 8862306a36Sopenharmony_ci if (ret < 0 || ret >= 4096) 8962306a36Sopenharmony_ci return -1; 9062306a36Sopenharmony_ci 9162306a36Sopenharmony_ci ret = readlink(procfd, buf, buflen); 9262306a36Sopenharmony_ci if (ret < 0 || (size_t)ret >= buflen) 9362306a36Sopenharmony_ci return -1; 9462306a36Sopenharmony_ci 9562306a36Sopenharmony_ci buf[ret] = '\0'; 9662306a36Sopenharmony_ci 9762306a36Sopenharmony_ci return 0; 9862306a36Sopenharmony_ci} 9962306a36Sopenharmony_ci 10062306a36Sopenharmony_cistatic int do_tiocgptpeer(char *ptmx, char *expected_procfd_contents) 10162306a36Sopenharmony_ci{ 10262306a36Sopenharmony_ci int ret; 10362306a36Sopenharmony_ci int master = -1, slave = -1, fret = -1; 10462306a36Sopenharmony_ci 10562306a36Sopenharmony_ci master = open(ptmx, O_RDWR | O_NOCTTY | O_CLOEXEC); 10662306a36Sopenharmony_ci if (master < 0) { 10762306a36Sopenharmony_ci fprintf(stderr, "Failed to open \"%s\": %s\n", ptmx, 10862306a36Sopenharmony_ci strerror(errno)); 10962306a36Sopenharmony_ci return -1; 11062306a36Sopenharmony_ci } 11162306a36Sopenharmony_ci 11262306a36Sopenharmony_ci /* 11362306a36Sopenharmony_ci * grantpt() makes assumptions about /dev/pts/ so ignore it. It's also 11462306a36Sopenharmony_ci * not really needed. 11562306a36Sopenharmony_ci */ 11662306a36Sopenharmony_ci ret = unlockpt(master); 11762306a36Sopenharmony_ci if (ret < 0) { 11862306a36Sopenharmony_ci fprintf(stderr, "Failed to unlock terminal\n"); 11962306a36Sopenharmony_ci goto do_cleanup; 12062306a36Sopenharmony_ci } 12162306a36Sopenharmony_ci 12262306a36Sopenharmony_ci#ifdef TIOCGPTPEER 12362306a36Sopenharmony_ci slave = ioctl(master, TIOCGPTPEER, O_RDWR | O_NOCTTY | O_CLOEXEC); 12462306a36Sopenharmony_ci#endif 12562306a36Sopenharmony_ci if (slave < 0) { 12662306a36Sopenharmony_ci if (errno == EINVAL) { 12762306a36Sopenharmony_ci fprintf(stderr, "TIOCGPTPEER is not supported. " 12862306a36Sopenharmony_ci "Skipping test.\n"); 12962306a36Sopenharmony_ci fret = KSFT_SKIP; 13062306a36Sopenharmony_ci } else { 13162306a36Sopenharmony_ci fprintf(stderr, 13262306a36Sopenharmony_ci "Failed to perform TIOCGPTPEER ioctl\n"); 13362306a36Sopenharmony_ci fret = EXIT_FAILURE; 13462306a36Sopenharmony_ci } 13562306a36Sopenharmony_ci goto do_cleanup; 13662306a36Sopenharmony_ci } 13762306a36Sopenharmony_ci 13862306a36Sopenharmony_ci pid_t pid = fork(); 13962306a36Sopenharmony_ci if (pid < 0) 14062306a36Sopenharmony_ci goto do_cleanup; 14162306a36Sopenharmony_ci 14262306a36Sopenharmony_ci if (pid == 0) { 14362306a36Sopenharmony_ci char buf[4096]; 14462306a36Sopenharmony_ci 14562306a36Sopenharmony_ci ret = login_pty(slave); 14662306a36Sopenharmony_ci if (ret < 0) { 14762306a36Sopenharmony_ci fprintf(stderr, "Failed to setup terminal\n"); 14862306a36Sopenharmony_ci _exit(EXIT_FAILURE); 14962306a36Sopenharmony_ci } 15062306a36Sopenharmony_ci 15162306a36Sopenharmony_ci ret = resolve_procfd_symlink(STDIN_FILENO, buf, sizeof(buf)); 15262306a36Sopenharmony_ci if (ret < 0) { 15362306a36Sopenharmony_ci fprintf(stderr, "Failed to retrieve pathname of pts " 15462306a36Sopenharmony_ci "slave file descriptor\n"); 15562306a36Sopenharmony_ci _exit(EXIT_FAILURE); 15662306a36Sopenharmony_ci } 15762306a36Sopenharmony_ci 15862306a36Sopenharmony_ci if (strncmp(expected_procfd_contents, buf, 15962306a36Sopenharmony_ci strlen(expected_procfd_contents)) != 0) { 16062306a36Sopenharmony_ci fprintf(stderr, "Received invalid contents for " 16162306a36Sopenharmony_ci "\"/proc/<pid>/fd/%d\" symlink: %s\n", 16262306a36Sopenharmony_ci STDIN_FILENO, buf); 16362306a36Sopenharmony_ci _exit(-1); 16462306a36Sopenharmony_ci } 16562306a36Sopenharmony_ci 16662306a36Sopenharmony_ci fprintf(stderr, "Contents of \"/proc/<pid>/fd/%d\" " 16762306a36Sopenharmony_ci "symlink are valid: %s\n", STDIN_FILENO, buf); 16862306a36Sopenharmony_ci 16962306a36Sopenharmony_ci _exit(EXIT_SUCCESS); 17062306a36Sopenharmony_ci } 17162306a36Sopenharmony_ci 17262306a36Sopenharmony_ci ret = wait_for_pid(pid); 17362306a36Sopenharmony_ci if (ret < 0) 17462306a36Sopenharmony_ci goto do_cleanup; 17562306a36Sopenharmony_ci 17662306a36Sopenharmony_ci fret = EXIT_SUCCESS; 17762306a36Sopenharmony_ci 17862306a36Sopenharmony_cido_cleanup: 17962306a36Sopenharmony_ci if (master >= 0) 18062306a36Sopenharmony_ci close(master); 18162306a36Sopenharmony_ci if (slave >= 0) 18262306a36Sopenharmony_ci close(slave); 18362306a36Sopenharmony_ci 18462306a36Sopenharmony_ci return fret; 18562306a36Sopenharmony_ci} 18662306a36Sopenharmony_ci 18762306a36Sopenharmony_cistatic int verify_non_standard_devpts_mount(void) 18862306a36Sopenharmony_ci{ 18962306a36Sopenharmony_ci char *mntpoint; 19062306a36Sopenharmony_ci int ret = -1; 19162306a36Sopenharmony_ci char devpts[] = P_tmpdir "/devpts_fs_XXXXXX"; 19262306a36Sopenharmony_ci char ptmx[] = P_tmpdir "/devpts_fs_XXXXXX/ptmx"; 19362306a36Sopenharmony_ci 19462306a36Sopenharmony_ci ret = umount("/dev/pts"); 19562306a36Sopenharmony_ci if (ret < 0) { 19662306a36Sopenharmony_ci fprintf(stderr, "Failed to unmount \"/dev/pts\": %s\n", 19762306a36Sopenharmony_ci strerror(errno)); 19862306a36Sopenharmony_ci return -1; 19962306a36Sopenharmony_ci } 20062306a36Sopenharmony_ci 20162306a36Sopenharmony_ci (void)umount("/dev/ptmx"); 20262306a36Sopenharmony_ci 20362306a36Sopenharmony_ci mntpoint = mkdtemp(devpts); 20462306a36Sopenharmony_ci if (!mntpoint) { 20562306a36Sopenharmony_ci fprintf(stderr, "Failed to create temporary mountpoint: %s\n", 20662306a36Sopenharmony_ci strerror(errno)); 20762306a36Sopenharmony_ci return -1; 20862306a36Sopenharmony_ci } 20962306a36Sopenharmony_ci 21062306a36Sopenharmony_ci ret = mount("devpts", mntpoint, "devpts", MS_NOSUID | MS_NOEXEC, 21162306a36Sopenharmony_ci "newinstance,ptmxmode=0666,mode=0620,gid=5"); 21262306a36Sopenharmony_ci if (ret < 0) { 21362306a36Sopenharmony_ci fprintf(stderr, "Failed to mount devpts fs to \"%s\" in new " 21462306a36Sopenharmony_ci "mount namespace: %s\n", mntpoint, 21562306a36Sopenharmony_ci strerror(errno)); 21662306a36Sopenharmony_ci unlink(mntpoint); 21762306a36Sopenharmony_ci return -1; 21862306a36Sopenharmony_ci } 21962306a36Sopenharmony_ci 22062306a36Sopenharmony_ci ret = snprintf(ptmx, sizeof(ptmx), "%s/ptmx", devpts); 22162306a36Sopenharmony_ci if (ret < 0 || (size_t)ret >= sizeof(ptmx)) { 22262306a36Sopenharmony_ci unlink(mntpoint); 22362306a36Sopenharmony_ci return -1; 22462306a36Sopenharmony_ci } 22562306a36Sopenharmony_ci 22662306a36Sopenharmony_ci ret = do_tiocgptpeer(ptmx, mntpoint); 22762306a36Sopenharmony_ci unlink(mntpoint); 22862306a36Sopenharmony_ci if (ret < 0) 22962306a36Sopenharmony_ci return -1; 23062306a36Sopenharmony_ci 23162306a36Sopenharmony_ci return 0; 23262306a36Sopenharmony_ci} 23362306a36Sopenharmony_ci 23462306a36Sopenharmony_cistatic int verify_ptmx_bind_mount(void) 23562306a36Sopenharmony_ci{ 23662306a36Sopenharmony_ci int ret; 23762306a36Sopenharmony_ci 23862306a36Sopenharmony_ci ret = mount("/dev/pts/ptmx", "/dev/ptmx", NULL, MS_BIND, NULL); 23962306a36Sopenharmony_ci if (ret < 0) { 24062306a36Sopenharmony_ci fprintf(stderr, "Failed to bind mount \"/dev/pts/ptmx\" to " 24162306a36Sopenharmony_ci "\"/dev/ptmx\" mount namespace\n"); 24262306a36Sopenharmony_ci return -1; 24362306a36Sopenharmony_ci } 24462306a36Sopenharmony_ci 24562306a36Sopenharmony_ci ret = do_tiocgptpeer("/dev/ptmx", "/dev/pts/"); 24662306a36Sopenharmony_ci if (ret < 0) 24762306a36Sopenharmony_ci return -1; 24862306a36Sopenharmony_ci 24962306a36Sopenharmony_ci return 0; 25062306a36Sopenharmony_ci} 25162306a36Sopenharmony_ci 25262306a36Sopenharmony_cistatic int verify_invalid_ptmx_bind_mount(void) 25362306a36Sopenharmony_ci{ 25462306a36Sopenharmony_ci int ret; 25562306a36Sopenharmony_ci char mntpoint_fd; 25662306a36Sopenharmony_ci char ptmx[] = P_tmpdir "/devpts_ptmx_XXXXXX"; 25762306a36Sopenharmony_ci 25862306a36Sopenharmony_ci mntpoint_fd = mkstemp(ptmx); 25962306a36Sopenharmony_ci if (mntpoint_fd < 0) { 26062306a36Sopenharmony_ci fprintf(stderr, "Failed to create temporary directory: %s\n", 26162306a36Sopenharmony_ci strerror(errno)); 26262306a36Sopenharmony_ci return -1; 26362306a36Sopenharmony_ci } 26462306a36Sopenharmony_ci 26562306a36Sopenharmony_ci ret = mount("/dev/pts/ptmx", ptmx, NULL, MS_BIND, NULL); 26662306a36Sopenharmony_ci close(mntpoint_fd); 26762306a36Sopenharmony_ci if (ret < 0) { 26862306a36Sopenharmony_ci fprintf(stderr, "Failed to bind mount \"/dev/pts/ptmx\" to " 26962306a36Sopenharmony_ci "\"%s\" mount namespace\n", ptmx); 27062306a36Sopenharmony_ci return -1; 27162306a36Sopenharmony_ci } 27262306a36Sopenharmony_ci 27362306a36Sopenharmony_ci ret = do_tiocgptpeer(ptmx, "/dev/pts/"); 27462306a36Sopenharmony_ci if (ret == 0) 27562306a36Sopenharmony_ci return -1; 27662306a36Sopenharmony_ci 27762306a36Sopenharmony_ci return 0; 27862306a36Sopenharmony_ci} 27962306a36Sopenharmony_ci 28062306a36Sopenharmony_ciint main(int argc, char *argv[]) 28162306a36Sopenharmony_ci{ 28262306a36Sopenharmony_ci int ret; 28362306a36Sopenharmony_ci 28462306a36Sopenharmony_ci if (!isatty(STDIN_FILENO)) { 28562306a36Sopenharmony_ci fprintf(stderr, "Standard input file descriptor is not attached " 28662306a36Sopenharmony_ci "to a terminal. Skipping test\n"); 28762306a36Sopenharmony_ci exit(KSFT_SKIP); 28862306a36Sopenharmony_ci } 28962306a36Sopenharmony_ci 29062306a36Sopenharmony_ci ret = unshare(CLONE_NEWNS); 29162306a36Sopenharmony_ci if (ret < 0) { 29262306a36Sopenharmony_ci fprintf(stderr, "Failed to unshare mount namespace\n"); 29362306a36Sopenharmony_ci exit(EXIT_FAILURE); 29462306a36Sopenharmony_ci } 29562306a36Sopenharmony_ci 29662306a36Sopenharmony_ci ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0); 29762306a36Sopenharmony_ci if (ret < 0) { 29862306a36Sopenharmony_ci fprintf(stderr, "Failed to make \"/\" MS_PRIVATE in new mount " 29962306a36Sopenharmony_ci "namespace\n"); 30062306a36Sopenharmony_ci exit(EXIT_FAILURE); 30162306a36Sopenharmony_ci } 30262306a36Sopenharmony_ci 30362306a36Sopenharmony_ci ret = verify_ptmx_bind_mount(); 30462306a36Sopenharmony_ci if (ret < 0) 30562306a36Sopenharmony_ci exit(EXIT_FAILURE); 30662306a36Sopenharmony_ci 30762306a36Sopenharmony_ci ret = verify_invalid_ptmx_bind_mount(); 30862306a36Sopenharmony_ci if (ret < 0) 30962306a36Sopenharmony_ci exit(EXIT_FAILURE); 31062306a36Sopenharmony_ci 31162306a36Sopenharmony_ci ret = verify_non_standard_devpts_mount(); 31262306a36Sopenharmony_ci if (ret < 0) 31362306a36Sopenharmony_ci exit(EXIT_FAILURE); 31462306a36Sopenharmony_ci 31562306a36Sopenharmony_ci exit(EXIT_SUCCESS); 31662306a36Sopenharmony_ci} 317