162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
262306a36Sopenharmony_ci#define _GNU_SOURCE
362306a36Sopenharmony_ci#include <errno.h>
462306a36Sopenharmony_ci#include <fcntl.h>
562306a36Sopenharmony_ci#include <sched.h>
662306a36Sopenharmony_ci#include <stdbool.h>
762306a36Sopenharmony_ci#include <stdio.h>
862306a36Sopenharmony_ci#include <stdlib.h>
962306a36Sopenharmony_ci#include <string.h>
1062306a36Sopenharmony_ci#include <unistd.h>
1162306a36Sopenharmony_ci#include <asm/ioctls.h>
1262306a36Sopenharmony_ci#include <sys/mount.h>
1362306a36Sopenharmony_ci#include <sys/wait.h>
1462306a36Sopenharmony_ci#include "../kselftest.h"
1562306a36Sopenharmony_ci
1662306a36Sopenharmony_cistatic bool terminal_dup2(int duplicate, int original)
1762306a36Sopenharmony_ci{
1862306a36Sopenharmony_ci	int ret;
1962306a36Sopenharmony_ci
2062306a36Sopenharmony_ci	ret = dup2(duplicate, original);
2162306a36Sopenharmony_ci	if (ret < 0)
2262306a36Sopenharmony_ci		return false;
2362306a36Sopenharmony_ci
2462306a36Sopenharmony_ci	return true;
2562306a36Sopenharmony_ci}
2662306a36Sopenharmony_ci
2762306a36Sopenharmony_cistatic int terminal_set_stdfds(int fd)
2862306a36Sopenharmony_ci{
2962306a36Sopenharmony_ci	int i;
3062306a36Sopenharmony_ci
3162306a36Sopenharmony_ci	if (fd < 0)
3262306a36Sopenharmony_ci		return 0;
3362306a36Sopenharmony_ci
3462306a36Sopenharmony_ci	for (i = 0; i < 3; i++)
3562306a36Sopenharmony_ci		if (!terminal_dup2(fd, (int[]){STDIN_FILENO, STDOUT_FILENO,
3662306a36Sopenharmony_ci					       STDERR_FILENO}[i]))
3762306a36Sopenharmony_ci			return -1;
3862306a36Sopenharmony_ci
3962306a36Sopenharmony_ci	return 0;
4062306a36Sopenharmony_ci}
4162306a36Sopenharmony_ci
4262306a36Sopenharmony_cistatic int login_pty(int fd)
4362306a36Sopenharmony_ci{
4462306a36Sopenharmony_ci	int ret;
4562306a36Sopenharmony_ci
4662306a36Sopenharmony_ci	setsid();
4762306a36Sopenharmony_ci
4862306a36Sopenharmony_ci	ret = ioctl(fd, TIOCSCTTY, NULL);
4962306a36Sopenharmony_ci	if (ret < 0)
5062306a36Sopenharmony_ci		return -1;
5162306a36Sopenharmony_ci
5262306a36Sopenharmony_ci	ret = terminal_set_stdfds(fd);
5362306a36Sopenharmony_ci	if (ret < 0)
5462306a36Sopenharmony_ci		return -1;
5562306a36Sopenharmony_ci
5662306a36Sopenharmony_ci	if (fd > STDERR_FILENO)
5762306a36Sopenharmony_ci		close(fd);
5862306a36Sopenharmony_ci
5962306a36Sopenharmony_ci	return 0;
6062306a36Sopenharmony_ci}
6162306a36Sopenharmony_ci
6262306a36Sopenharmony_cistatic int wait_for_pid(pid_t pid)
6362306a36Sopenharmony_ci{
6462306a36Sopenharmony_ci	int status, ret;
6562306a36Sopenharmony_ci
6662306a36Sopenharmony_ciagain:
6762306a36Sopenharmony_ci	ret = waitpid(pid, &status, 0);
6862306a36Sopenharmony_ci	if (ret == -1) {
6962306a36Sopenharmony_ci		if (errno == EINTR)
7062306a36Sopenharmony_ci			goto again;
7162306a36Sopenharmony_ci		return -1;
7262306a36Sopenharmony_ci	}
7362306a36Sopenharmony_ci	if (ret != pid)
7462306a36Sopenharmony_ci		goto again;
7562306a36Sopenharmony_ci
7662306a36Sopenharmony_ci	if (!WIFEXITED(status) || WEXITSTATUS(status) != 0)
7762306a36Sopenharmony_ci		return -1;
7862306a36Sopenharmony_ci
7962306a36Sopenharmony_ci	return 0;
8062306a36Sopenharmony_ci}
8162306a36Sopenharmony_ci
8262306a36Sopenharmony_cistatic int resolve_procfd_symlink(int fd, char *buf, size_t buflen)
8362306a36Sopenharmony_ci{
8462306a36Sopenharmony_ci	int ret;
8562306a36Sopenharmony_ci	char procfd[4096];
8662306a36Sopenharmony_ci
8762306a36Sopenharmony_ci	ret = snprintf(procfd, 4096, "/proc/self/fd/%d", fd);
8862306a36Sopenharmony_ci	if (ret < 0 || ret >= 4096)
8962306a36Sopenharmony_ci		return -1;
9062306a36Sopenharmony_ci
9162306a36Sopenharmony_ci	ret = readlink(procfd, buf, buflen);
9262306a36Sopenharmony_ci	if (ret < 0 || (size_t)ret >= buflen)
9362306a36Sopenharmony_ci		return -1;
9462306a36Sopenharmony_ci
9562306a36Sopenharmony_ci	buf[ret] = '\0';
9662306a36Sopenharmony_ci
9762306a36Sopenharmony_ci	return 0;
9862306a36Sopenharmony_ci}
9962306a36Sopenharmony_ci
10062306a36Sopenharmony_cistatic int do_tiocgptpeer(char *ptmx, char *expected_procfd_contents)
10162306a36Sopenharmony_ci{
10262306a36Sopenharmony_ci	int ret;
10362306a36Sopenharmony_ci	int master = -1, slave = -1, fret = -1;
10462306a36Sopenharmony_ci
10562306a36Sopenharmony_ci	master = open(ptmx, O_RDWR | O_NOCTTY | O_CLOEXEC);
10662306a36Sopenharmony_ci	if (master < 0) {
10762306a36Sopenharmony_ci		fprintf(stderr, "Failed to open \"%s\": %s\n", ptmx,
10862306a36Sopenharmony_ci			strerror(errno));
10962306a36Sopenharmony_ci		return -1;
11062306a36Sopenharmony_ci	}
11162306a36Sopenharmony_ci
11262306a36Sopenharmony_ci	/*
11362306a36Sopenharmony_ci	 * grantpt() makes assumptions about /dev/pts/ so ignore it. It's also
11462306a36Sopenharmony_ci	 * not really needed.
11562306a36Sopenharmony_ci	 */
11662306a36Sopenharmony_ci	ret = unlockpt(master);
11762306a36Sopenharmony_ci	if (ret < 0) {
11862306a36Sopenharmony_ci		fprintf(stderr, "Failed to unlock terminal\n");
11962306a36Sopenharmony_ci		goto do_cleanup;
12062306a36Sopenharmony_ci	}
12162306a36Sopenharmony_ci
12262306a36Sopenharmony_ci#ifdef TIOCGPTPEER
12362306a36Sopenharmony_ci	slave = ioctl(master, TIOCGPTPEER, O_RDWR | O_NOCTTY | O_CLOEXEC);
12462306a36Sopenharmony_ci#endif
12562306a36Sopenharmony_ci	if (slave < 0) {
12662306a36Sopenharmony_ci		if (errno == EINVAL) {
12762306a36Sopenharmony_ci			fprintf(stderr, "TIOCGPTPEER is not supported. "
12862306a36Sopenharmony_ci					"Skipping test.\n");
12962306a36Sopenharmony_ci			fret = KSFT_SKIP;
13062306a36Sopenharmony_ci		} else {
13162306a36Sopenharmony_ci			fprintf(stderr,
13262306a36Sopenharmony_ci				"Failed to perform TIOCGPTPEER ioctl\n");
13362306a36Sopenharmony_ci			fret = EXIT_FAILURE;
13462306a36Sopenharmony_ci		}
13562306a36Sopenharmony_ci		goto do_cleanup;
13662306a36Sopenharmony_ci	}
13762306a36Sopenharmony_ci
13862306a36Sopenharmony_ci	pid_t pid = fork();
13962306a36Sopenharmony_ci	if (pid < 0)
14062306a36Sopenharmony_ci		goto do_cleanup;
14162306a36Sopenharmony_ci
14262306a36Sopenharmony_ci	if (pid == 0) {
14362306a36Sopenharmony_ci		char buf[4096];
14462306a36Sopenharmony_ci
14562306a36Sopenharmony_ci		ret = login_pty(slave);
14662306a36Sopenharmony_ci		if (ret < 0) {
14762306a36Sopenharmony_ci			fprintf(stderr, "Failed to setup terminal\n");
14862306a36Sopenharmony_ci			_exit(EXIT_FAILURE);
14962306a36Sopenharmony_ci		}
15062306a36Sopenharmony_ci
15162306a36Sopenharmony_ci		ret = resolve_procfd_symlink(STDIN_FILENO, buf, sizeof(buf));
15262306a36Sopenharmony_ci		if (ret < 0) {
15362306a36Sopenharmony_ci			fprintf(stderr, "Failed to retrieve pathname of pts "
15462306a36Sopenharmony_ci					"slave file descriptor\n");
15562306a36Sopenharmony_ci			_exit(EXIT_FAILURE);
15662306a36Sopenharmony_ci		}
15762306a36Sopenharmony_ci
15862306a36Sopenharmony_ci		if (strncmp(expected_procfd_contents, buf,
15962306a36Sopenharmony_ci			    strlen(expected_procfd_contents)) != 0) {
16062306a36Sopenharmony_ci			fprintf(stderr, "Received invalid contents for "
16162306a36Sopenharmony_ci					"\"/proc/<pid>/fd/%d\" symlink: %s\n",
16262306a36Sopenharmony_ci					STDIN_FILENO, buf);
16362306a36Sopenharmony_ci			_exit(-1);
16462306a36Sopenharmony_ci		}
16562306a36Sopenharmony_ci
16662306a36Sopenharmony_ci		fprintf(stderr, "Contents of \"/proc/<pid>/fd/%d\" "
16762306a36Sopenharmony_ci				"symlink are valid: %s\n", STDIN_FILENO, buf);
16862306a36Sopenharmony_ci
16962306a36Sopenharmony_ci		_exit(EXIT_SUCCESS);
17062306a36Sopenharmony_ci	}
17162306a36Sopenharmony_ci
17262306a36Sopenharmony_ci	ret = wait_for_pid(pid);
17362306a36Sopenharmony_ci	if (ret < 0)
17462306a36Sopenharmony_ci		goto do_cleanup;
17562306a36Sopenharmony_ci
17662306a36Sopenharmony_ci	fret = EXIT_SUCCESS;
17762306a36Sopenharmony_ci
17862306a36Sopenharmony_cido_cleanup:
17962306a36Sopenharmony_ci	if (master >= 0)
18062306a36Sopenharmony_ci		close(master);
18162306a36Sopenharmony_ci	if (slave >= 0)
18262306a36Sopenharmony_ci		close(slave);
18362306a36Sopenharmony_ci
18462306a36Sopenharmony_ci	return fret;
18562306a36Sopenharmony_ci}
18662306a36Sopenharmony_ci
18762306a36Sopenharmony_cistatic int verify_non_standard_devpts_mount(void)
18862306a36Sopenharmony_ci{
18962306a36Sopenharmony_ci	char *mntpoint;
19062306a36Sopenharmony_ci	int ret = -1;
19162306a36Sopenharmony_ci	char devpts[] = P_tmpdir "/devpts_fs_XXXXXX";
19262306a36Sopenharmony_ci	char ptmx[] = P_tmpdir "/devpts_fs_XXXXXX/ptmx";
19362306a36Sopenharmony_ci
19462306a36Sopenharmony_ci	ret = umount("/dev/pts");
19562306a36Sopenharmony_ci	if (ret < 0) {
19662306a36Sopenharmony_ci		fprintf(stderr, "Failed to unmount \"/dev/pts\": %s\n",
19762306a36Sopenharmony_ci				strerror(errno));
19862306a36Sopenharmony_ci		return -1;
19962306a36Sopenharmony_ci	}
20062306a36Sopenharmony_ci
20162306a36Sopenharmony_ci	(void)umount("/dev/ptmx");
20262306a36Sopenharmony_ci
20362306a36Sopenharmony_ci	mntpoint = mkdtemp(devpts);
20462306a36Sopenharmony_ci	if (!mntpoint) {
20562306a36Sopenharmony_ci		fprintf(stderr, "Failed to create temporary mountpoint: %s\n",
20662306a36Sopenharmony_ci				 strerror(errno));
20762306a36Sopenharmony_ci		return -1;
20862306a36Sopenharmony_ci	}
20962306a36Sopenharmony_ci
21062306a36Sopenharmony_ci	ret = mount("devpts", mntpoint, "devpts", MS_NOSUID | MS_NOEXEC,
21162306a36Sopenharmony_ci		    "newinstance,ptmxmode=0666,mode=0620,gid=5");
21262306a36Sopenharmony_ci	if (ret < 0) {
21362306a36Sopenharmony_ci		fprintf(stderr, "Failed to mount devpts fs to \"%s\" in new "
21462306a36Sopenharmony_ci				"mount namespace: %s\n", mntpoint,
21562306a36Sopenharmony_ci				strerror(errno));
21662306a36Sopenharmony_ci		unlink(mntpoint);
21762306a36Sopenharmony_ci		return -1;
21862306a36Sopenharmony_ci	}
21962306a36Sopenharmony_ci
22062306a36Sopenharmony_ci	ret = snprintf(ptmx, sizeof(ptmx), "%s/ptmx", devpts);
22162306a36Sopenharmony_ci	if (ret < 0 || (size_t)ret >= sizeof(ptmx)) {
22262306a36Sopenharmony_ci		unlink(mntpoint);
22362306a36Sopenharmony_ci		return -1;
22462306a36Sopenharmony_ci	}
22562306a36Sopenharmony_ci
22662306a36Sopenharmony_ci	ret = do_tiocgptpeer(ptmx, mntpoint);
22762306a36Sopenharmony_ci	unlink(mntpoint);
22862306a36Sopenharmony_ci	if (ret < 0)
22962306a36Sopenharmony_ci		return -1;
23062306a36Sopenharmony_ci
23162306a36Sopenharmony_ci	return 0;
23262306a36Sopenharmony_ci}
23362306a36Sopenharmony_ci
23462306a36Sopenharmony_cistatic int verify_ptmx_bind_mount(void)
23562306a36Sopenharmony_ci{
23662306a36Sopenharmony_ci	int ret;
23762306a36Sopenharmony_ci
23862306a36Sopenharmony_ci	ret = mount("/dev/pts/ptmx", "/dev/ptmx", NULL, MS_BIND, NULL);
23962306a36Sopenharmony_ci	if (ret < 0) {
24062306a36Sopenharmony_ci		fprintf(stderr, "Failed to bind mount \"/dev/pts/ptmx\" to "
24162306a36Sopenharmony_ci				"\"/dev/ptmx\" mount namespace\n");
24262306a36Sopenharmony_ci		return -1;
24362306a36Sopenharmony_ci	}
24462306a36Sopenharmony_ci
24562306a36Sopenharmony_ci	ret = do_tiocgptpeer("/dev/ptmx", "/dev/pts/");
24662306a36Sopenharmony_ci	if (ret < 0)
24762306a36Sopenharmony_ci		return -1;
24862306a36Sopenharmony_ci
24962306a36Sopenharmony_ci	return 0;
25062306a36Sopenharmony_ci}
25162306a36Sopenharmony_ci
25262306a36Sopenharmony_cistatic int verify_invalid_ptmx_bind_mount(void)
25362306a36Sopenharmony_ci{
25462306a36Sopenharmony_ci	int ret;
25562306a36Sopenharmony_ci	char mntpoint_fd;
25662306a36Sopenharmony_ci	char ptmx[] = P_tmpdir "/devpts_ptmx_XXXXXX";
25762306a36Sopenharmony_ci
25862306a36Sopenharmony_ci	mntpoint_fd = mkstemp(ptmx);
25962306a36Sopenharmony_ci	if (mntpoint_fd < 0) {
26062306a36Sopenharmony_ci		fprintf(stderr, "Failed to create temporary directory: %s\n",
26162306a36Sopenharmony_ci				 strerror(errno));
26262306a36Sopenharmony_ci		return -1;
26362306a36Sopenharmony_ci	}
26462306a36Sopenharmony_ci
26562306a36Sopenharmony_ci	ret = mount("/dev/pts/ptmx", ptmx, NULL, MS_BIND, NULL);
26662306a36Sopenharmony_ci	close(mntpoint_fd);
26762306a36Sopenharmony_ci	if (ret < 0) {
26862306a36Sopenharmony_ci		fprintf(stderr, "Failed to bind mount \"/dev/pts/ptmx\" to "
26962306a36Sopenharmony_ci				"\"%s\" mount namespace\n", ptmx);
27062306a36Sopenharmony_ci		return -1;
27162306a36Sopenharmony_ci	}
27262306a36Sopenharmony_ci
27362306a36Sopenharmony_ci	ret = do_tiocgptpeer(ptmx, "/dev/pts/");
27462306a36Sopenharmony_ci	if (ret == 0)
27562306a36Sopenharmony_ci		return -1;
27662306a36Sopenharmony_ci
27762306a36Sopenharmony_ci	return 0;
27862306a36Sopenharmony_ci}
27962306a36Sopenharmony_ci
28062306a36Sopenharmony_ciint main(int argc, char *argv[])
28162306a36Sopenharmony_ci{
28262306a36Sopenharmony_ci	int ret;
28362306a36Sopenharmony_ci
28462306a36Sopenharmony_ci	if (!isatty(STDIN_FILENO)) {
28562306a36Sopenharmony_ci		fprintf(stderr, "Standard input file descriptor is not attached "
28662306a36Sopenharmony_ci				"to a terminal. Skipping test\n");
28762306a36Sopenharmony_ci		exit(KSFT_SKIP);
28862306a36Sopenharmony_ci	}
28962306a36Sopenharmony_ci
29062306a36Sopenharmony_ci	ret = unshare(CLONE_NEWNS);
29162306a36Sopenharmony_ci	if (ret < 0) {
29262306a36Sopenharmony_ci		fprintf(stderr, "Failed to unshare mount namespace\n");
29362306a36Sopenharmony_ci		exit(EXIT_FAILURE);
29462306a36Sopenharmony_ci	}
29562306a36Sopenharmony_ci
29662306a36Sopenharmony_ci	ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0);
29762306a36Sopenharmony_ci	if (ret < 0) {
29862306a36Sopenharmony_ci		fprintf(stderr, "Failed to make \"/\" MS_PRIVATE in new mount "
29962306a36Sopenharmony_ci				"namespace\n");
30062306a36Sopenharmony_ci		exit(EXIT_FAILURE);
30162306a36Sopenharmony_ci	}
30262306a36Sopenharmony_ci
30362306a36Sopenharmony_ci	ret = verify_ptmx_bind_mount();
30462306a36Sopenharmony_ci	if (ret < 0)
30562306a36Sopenharmony_ci		exit(EXIT_FAILURE);
30662306a36Sopenharmony_ci
30762306a36Sopenharmony_ci	ret = verify_invalid_ptmx_bind_mount();
30862306a36Sopenharmony_ci	if (ret < 0)
30962306a36Sopenharmony_ci		exit(EXIT_FAILURE);
31062306a36Sopenharmony_ci
31162306a36Sopenharmony_ci	ret = verify_non_standard_devpts_mount();
31262306a36Sopenharmony_ci	if (ret < 0)
31362306a36Sopenharmony_ci		exit(EXIT_FAILURE);
31462306a36Sopenharmony_ci
31562306a36Sopenharmony_ci	exit(EXIT_SUCCESS);
31662306a36Sopenharmony_ci}
317