Do more testing for the EA/CAP removal on write bug.

Do more testing for the EA/CAP removal on write bug.
This commit is contained in:
Tim Shimmin
2004-08-18 09:29:50 +00:00
parent b1bc85cd42
commit 2120c040f0
4 changed files with 141 additions and 1 deletions
+59
View File
@@ -65,6 +65,11 @@ _testfilter()
sed -e "s#$testdir#TESTDIR#g" sed -e "s#$testdir#TESTDIR#g"
} }
_filefilter()
{
sed -e "s#$tmp##" -e "s#$file#file#"
}
# real QA test starts here # real QA test starts here
_supported_fs xfs udf _supported_fs xfs udf
_supported_os IRIX _supported_os IRIX
@@ -105,13 +110,67 @@ $tmp.append
echo "ls -P on file" echo "ls -P on file"
ls -P $file | _testfilter ls -P $file | _testfilter
echo "cat file"
echo "----"
cat $file
echo "----"
echo "append to file as user without caps" echo "append to file as user without caps"
# in particular user doesn't have FSETID or SETFCAP # in particular user doesn't have FSETID or SETFCAP
$runas -u $uid $tmp.append $runas -u $uid $tmp.append
echo "cat file"
echo "----"
cat $file
echo "----"
echo "ls -P on file"
ls -P $file | _testfilter
# try again when it doesn't have the EA
echo "append to file as user without caps a 2nd time"
$runas -u $uid $tmp.append
echo "ls -P on file" echo "ls -P on file"
ls -P $file | _testfilter ls -P $file | _testfilter
echo "cat file"
echo "----"
cat $file
echo "----"
echo "only let root write to file"
chmod 700 $file
chown root $file
echo "as non-root try to append to file"
$runas -u $uid $tmp.append 2>&1 | _filefilter
echo "restore perms on file"
chmod 777 $file
echo "set a root EA on file"
attr -R -s test -V testval $file | _filefilter
echo "list EA on file"
attr -R -l $file | _filefilter
echo "as non-root try to append to file"
$runas -u $uid $tmp.append 2>&1 | _filefilter
echo "list EA on file"
attr -R -l $file | _filefilter
chown $uid $file
chmod ugo+w $testdir
echo "as non-root call writemod"
$runas -u $uid src/writemod $file 2>&1 | _filefilter
echo "cat file"
echo "----"
cat $file
echo "----"
# success, all done # success, all done
status=0 status=0
exit exit
BIN
View File
Binary file not shown.
+1 -1
View File
@@ -37,7 +37,7 @@ TARGETS = dirstress fill fill2 getpagesize holes lstat64 \
nametest permname randholes runas truncfile usemem \ nametest permname randholes runas truncfile usemem \
mmapcat append_reader append_writer dirperf metaperf \ mmapcat append_reader append_writer dirperf metaperf \
devzero feature alloc fault fstest t_access_root \ devzero feature alloc fault fstest t_access_root \
godown resvtest godown resvtest writemod
LINUX_TARGETS = loggen xfsctl bstat t_mtab LINUX_TARGETS = loggen xfsctl bstat t_mtab
+81
View File
@@ -0,0 +1,81 @@
/*
* Copyright (c) 2004 Silicon Graphics, Inc. All Rights Reserved.
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of version 2 of the GNU General Public License as
* published by the Free Software Foundation.
*
* This program is distributed in the hope that it would be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
*
* Further, this software is distributed without any warranty that it is
* free of the rightful claim of any third person regarding infringement
* or the like. Any license provided herein, whether implied or
* otherwise, applies only to this software file. Patent licenses, if
* any, provided herein do not apply to combinations of this program with
* other software, or any other product whatsoever.
*
* You should have received a copy of the GNU General Public License along
* with this program; if not, write the Free Software Foundation, Inc., 59
* Temple Place - Suite 330, Boston MA 02111-1307, USA.
*
* Contact information: Silicon Graphics, Inc., 1600 Amphitheatre Pkwy,
* Mountain View, CA 94043, or:
*
* http://www.sgi.com
*
* For further information regarding this notice, see:
*
* http://oss.sgi.com/projects/GenInfo/SGIGPLNoticeExplan/
*/
/*
* tests out if access checking is done on write path
* 1. opens with write perms
* 2. fchmod to turn off write perms
* 3. writes to file
*/
#include <unistd.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <stdio.h>
int
main(int argc, char* argv[])
{
char *path;
int fd;
char *buf = "hi there";
ssize_t x;
int sts;
if (argc != 2) {
fprintf(stderr, "%s: requires path argument\n", argv[0]);
return 1;
}
path = argv[1];
printf("open for write \"%s\" with 777\n", path);
fd = open(path, O_RDWR, 0777);
if (fd == -1) {
perror("open");
return 1;
}
printf("remove perms on file\n");
sts = fchmod(fd, 0);
if (sts == -1) {
perror("fchmod");
return 1;
}
printf("write to the file\n");
x = write(fd, buf, strlen(buf)+1);
if (x == -1) {
perror("write");
return 1;
}
return 0;
}