xref: /OK3568_Linux_fs/kernel/tools/testing/selftests/filesystems/devpts_pts.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun #define _GNU_SOURCE
3*4882a593Smuzhiyun #include <errno.h>
4*4882a593Smuzhiyun #include <fcntl.h>
5*4882a593Smuzhiyun #include <sched.h>
6*4882a593Smuzhiyun #include <stdbool.h>
7*4882a593Smuzhiyun #include <stdio.h>
8*4882a593Smuzhiyun #include <stdlib.h>
9*4882a593Smuzhiyun #include <string.h>
10*4882a593Smuzhiyun #include <unistd.h>
11*4882a593Smuzhiyun #include <asm/ioctls.h>
12*4882a593Smuzhiyun #include <sys/mount.h>
13*4882a593Smuzhiyun #include <sys/wait.h>
14*4882a593Smuzhiyun #include "../kselftest.h"
15*4882a593Smuzhiyun 
terminal_dup2(int duplicate,int original)16*4882a593Smuzhiyun static bool terminal_dup2(int duplicate, int original)
17*4882a593Smuzhiyun {
18*4882a593Smuzhiyun 	int ret;
19*4882a593Smuzhiyun 
20*4882a593Smuzhiyun 	ret = dup2(duplicate, original);
21*4882a593Smuzhiyun 	if (ret < 0)
22*4882a593Smuzhiyun 		return false;
23*4882a593Smuzhiyun 
24*4882a593Smuzhiyun 	return true;
25*4882a593Smuzhiyun }
26*4882a593Smuzhiyun 
terminal_set_stdfds(int fd)27*4882a593Smuzhiyun static int terminal_set_stdfds(int fd)
28*4882a593Smuzhiyun {
29*4882a593Smuzhiyun 	int i;
30*4882a593Smuzhiyun 
31*4882a593Smuzhiyun 	if (fd < 0)
32*4882a593Smuzhiyun 		return 0;
33*4882a593Smuzhiyun 
34*4882a593Smuzhiyun 	for (i = 0; i < 3; i++)
35*4882a593Smuzhiyun 		if (!terminal_dup2(fd, (int[]){STDIN_FILENO, STDOUT_FILENO,
36*4882a593Smuzhiyun 					       STDERR_FILENO}[i]))
37*4882a593Smuzhiyun 			return -1;
38*4882a593Smuzhiyun 
39*4882a593Smuzhiyun 	return 0;
40*4882a593Smuzhiyun }
41*4882a593Smuzhiyun 
login_pty(int fd)42*4882a593Smuzhiyun static int login_pty(int fd)
43*4882a593Smuzhiyun {
44*4882a593Smuzhiyun 	int ret;
45*4882a593Smuzhiyun 
46*4882a593Smuzhiyun 	setsid();
47*4882a593Smuzhiyun 
48*4882a593Smuzhiyun 	ret = ioctl(fd, TIOCSCTTY, NULL);
49*4882a593Smuzhiyun 	if (ret < 0)
50*4882a593Smuzhiyun 		return -1;
51*4882a593Smuzhiyun 
52*4882a593Smuzhiyun 	ret = terminal_set_stdfds(fd);
53*4882a593Smuzhiyun 	if (ret < 0)
54*4882a593Smuzhiyun 		return -1;
55*4882a593Smuzhiyun 
56*4882a593Smuzhiyun 	if (fd > STDERR_FILENO)
57*4882a593Smuzhiyun 		close(fd);
58*4882a593Smuzhiyun 
59*4882a593Smuzhiyun 	return 0;
60*4882a593Smuzhiyun }
61*4882a593Smuzhiyun 
wait_for_pid(pid_t pid)62*4882a593Smuzhiyun static int wait_for_pid(pid_t pid)
63*4882a593Smuzhiyun {
64*4882a593Smuzhiyun 	int status, ret;
65*4882a593Smuzhiyun 
66*4882a593Smuzhiyun again:
67*4882a593Smuzhiyun 	ret = waitpid(pid, &status, 0);
68*4882a593Smuzhiyun 	if (ret == -1) {
69*4882a593Smuzhiyun 		if (errno == EINTR)
70*4882a593Smuzhiyun 			goto again;
71*4882a593Smuzhiyun 		return -1;
72*4882a593Smuzhiyun 	}
73*4882a593Smuzhiyun 	if (ret != pid)
74*4882a593Smuzhiyun 		goto again;
75*4882a593Smuzhiyun 
76*4882a593Smuzhiyun 	if (!WIFEXITED(status) || WEXITSTATUS(status) != 0)
77*4882a593Smuzhiyun 		return -1;
78*4882a593Smuzhiyun 
79*4882a593Smuzhiyun 	return 0;
80*4882a593Smuzhiyun }
81*4882a593Smuzhiyun 
resolve_procfd_symlink(int fd,char * buf,size_t buflen)82*4882a593Smuzhiyun static int resolve_procfd_symlink(int fd, char *buf, size_t buflen)
83*4882a593Smuzhiyun {
84*4882a593Smuzhiyun 	int ret;
85*4882a593Smuzhiyun 	char procfd[4096];
86*4882a593Smuzhiyun 
87*4882a593Smuzhiyun 	ret = snprintf(procfd, 4096, "/proc/self/fd/%d", fd);
88*4882a593Smuzhiyun 	if (ret < 0 || ret >= 4096)
89*4882a593Smuzhiyun 		return -1;
90*4882a593Smuzhiyun 
91*4882a593Smuzhiyun 	ret = readlink(procfd, buf, buflen);
92*4882a593Smuzhiyun 	if (ret < 0 || (size_t)ret >= buflen)
93*4882a593Smuzhiyun 		return -1;
94*4882a593Smuzhiyun 
95*4882a593Smuzhiyun 	buf[ret] = '\0';
96*4882a593Smuzhiyun 
97*4882a593Smuzhiyun 	return 0;
98*4882a593Smuzhiyun }
99*4882a593Smuzhiyun 
do_tiocgptpeer(char * ptmx,char * expected_procfd_contents)100*4882a593Smuzhiyun static int do_tiocgptpeer(char *ptmx, char *expected_procfd_contents)
101*4882a593Smuzhiyun {
102*4882a593Smuzhiyun 	int ret;
103*4882a593Smuzhiyun 	int master = -1, slave = -1, fret = -1;
104*4882a593Smuzhiyun 
105*4882a593Smuzhiyun 	master = open(ptmx, O_RDWR | O_NOCTTY | O_CLOEXEC);
106*4882a593Smuzhiyun 	if (master < 0) {
107*4882a593Smuzhiyun 		fprintf(stderr, "Failed to open \"%s\": %s\n", ptmx,
108*4882a593Smuzhiyun 			strerror(errno));
109*4882a593Smuzhiyun 		return -1;
110*4882a593Smuzhiyun 	}
111*4882a593Smuzhiyun 
112*4882a593Smuzhiyun 	/*
113*4882a593Smuzhiyun 	 * grantpt() makes assumptions about /dev/pts/ so ignore it. It's also
114*4882a593Smuzhiyun 	 * not really needed.
115*4882a593Smuzhiyun 	 */
116*4882a593Smuzhiyun 	ret = unlockpt(master);
117*4882a593Smuzhiyun 	if (ret < 0) {
118*4882a593Smuzhiyun 		fprintf(stderr, "Failed to unlock terminal\n");
119*4882a593Smuzhiyun 		goto do_cleanup;
120*4882a593Smuzhiyun 	}
121*4882a593Smuzhiyun 
122*4882a593Smuzhiyun #ifdef TIOCGPTPEER
123*4882a593Smuzhiyun 	slave = ioctl(master, TIOCGPTPEER, O_RDWR | O_NOCTTY | O_CLOEXEC);
124*4882a593Smuzhiyun #endif
125*4882a593Smuzhiyun 	if (slave < 0) {
126*4882a593Smuzhiyun 		if (errno == EINVAL) {
127*4882a593Smuzhiyun 			fprintf(stderr, "TIOCGPTPEER is not supported. "
128*4882a593Smuzhiyun 					"Skipping test.\n");
129*4882a593Smuzhiyun 			fret = KSFT_SKIP;
130*4882a593Smuzhiyun 		} else {
131*4882a593Smuzhiyun 			fprintf(stderr,
132*4882a593Smuzhiyun 				"Failed to perform TIOCGPTPEER ioctl\n");
133*4882a593Smuzhiyun 			fret = EXIT_FAILURE;
134*4882a593Smuzhiyun 		}
135*4882a593Smuzhiyun 		goto do_cleanup;
136*4882a593Smuzhiyun 	}
137*4882a593Smuzhiyun 
138*4882a593Smuzhiyun 	pid_t pid = fork();
139*4882a593Smuzhiyun 	if (pid < 0)
140*4882a593Smuzhiyun 		goto do_cleanup;
141*4882a593Smuzhiyun 
142*4882a593Smuzhiyun 	if (pid == 0) {
143*4882a593Smuzhiyun 		char buf[4096];
144*4882a593Smuzhiyun 
145*4882a593Smuzhiyun 		ret = login_pty(slave);
146*4882a593Smuzhiyun 		if (ret < 0) {
147*4882a593Smuzhiyun 			fprintf(stderr, "Failed to setup terminal\n");
148*4882a593Smuzhiyun 			_exit(EXIT_FAILURE);
149*4882a593Smuzhiyun 		}
150*4882a593Smuzhiyun 
151*4882a593Smuzhiyun 		ret = resolve_procfd_symlink(STDIN_FILENO, buf, sizeof(buf));
152*4882a593Smuzhiyun 		if (ret < 0) {
153*4882a593Smuzhiyun 			fprintf(stderr, "Failed to retrieve pathname of pts "
154*4882a593Smuzhiyun 					"slave file descriptor\n");
155*4882a593Smuzhiyun 			_exit(EXIT_FAILURE);
156*4882a593Smuzhiyun 		}
157*4882a593Smuzhiyun 
158*4882a593Smuzhiyun 		if (strncmp(expected_procfd_contents, buf,
159*4882a593Smuzhiyun 			    strlen(expected_procfd_contents)) != 0) {
160*4882a593Smuzhiyun 			fprintf(stderr, "Received invalid contents for "
161*4882a593Smuzhiyun 					"\"/proc/<pid>/fd/%d\" symlink: %s\n",
162*4882a593Smuzhiyun 					STDIN_FILENO, buf);
163*4882a593Smuzhiyun 			_exit(-1);
164*4882a593Smuzhiyun 		}
165*4882a593Smuzhiyun 
166*4882a593Smuzhiyun 		fprintf(stderr, "Contents of \"/proc/<pid>/fd/%d\" "
167*4882a593Smuzhiyun 				"symlink are valid: %s\n", STDIN_FILENO, buf);
168*4882a593Smuzhiyun 
169*4882a593Smuzhiyun 		_exit(EXIT_SUCCESS);
170*4882a593Smuzhiyun 	}
171*4882a593Smuzhiyun 
172*4882a593Smuzhiyun 	ret = wait_for_pid(pid);
173*4882a593Smuzhiyun 	if (ret < 0)
174*4882a593Smuzhiyun 		goto do_cleanup;
175*4882a593Smuzhiyun 
176*4882a593Smuzhiyun 	fret = EXIT_SUCCESS;
177*4882a593Smuzhiyun 
178*4882a593Smuzhiyun do_cleanup:
179*4882a593Smuzhiyun 	if (master >= 0)
180*4882a593Smuzhiyun 		close(master);
181*4882a593Smuzhiyun 	if (slave >= 0)
182*4882a593Smuzhiyun 		close(slave);
183*4882a593Smuzhiyun 
184*4882a593Smuzhiyun 	return fret;
185*4882a593Smuzhiyun }
186*4882a593Smuzhiyun 
verify_non_standard_devpts_mount(void)187*4882a593Smuzhiyun static int verify_non_standard_devpts_mount(void)
188*4882a593Smuzhiyun {
189*4882a593Smuzhiyun 	char *mntpoint;
190*4882a593Smuzhiyun 	int ret = -1;
191*4882a593Smuzhiyun 	char devpts[] = P_tmpdir "/devpts_fs_XXXXXX";
192*4882a593Smuzhiyun 	char ptmx[] = P_tmpdir "/devpts_fs_XXXXXX/ptmx";
193*4882a593Smuzhiyun 
194*4882a593Smuzhiyun 	ret = umount("/dev/pts");
195*4882a593Smuzhiyun 	if (ret < 0) {
196*4882a593Smuzhiyun 		fprintf(stderr, "Failed to unmount \"/dev/pts\": %s\n",
197*4882a593Smuzhiyun 				strerror(errno));
198*4882a593Smuzhiyun 		return -1;
199*4882a593Smuzhiyun 	}
200*4882a593Smuzhiyun 
201*4882a593Smuzhiyun 	(void)umount("/dev/ptmx");
202*4882a593Smuzhiyun 
203*4882a593Smuzhiyun 	mntpoint = mkdtemp(devpts);
204*4882a593Smuzhiyun 	if (!mntpoint) {
205*4882a593Smuzhiyun 		fprintf(stderr, "Failed to create temporary mountpoint: %s\n",
206*4882a593Smuzhiyun 				 strerror(errno));
207*4882a593Smuzhiyun 		return -1;
208*4882a593Smuzhiyun 	}
209*4882a593Smuzhiyun 
210*4882a593Smuzhiyun 	ret = mount("devpts", mntpoint, "devpts", MS_NOSUID | MS_NOEXEC,
211*4882a593Smuzhiyun 		    "newinstance,ptmxmode=0666,mode=0620,gid=5");
212*4882a593Smuzhiyun 	if (ret < 0) {
213*4882a593Smuzhiyun 		fprintf(stderr, "Failed to mount devpts fs to \"%s\" in new "
214*4882a593Smuzhiyun 				"mount namespace: %s\n", mntpoint,
215*4882a593Smuzhiyun 				strerror(errno));
216*4882a593Smuzhiyun 		unlink(mntpoint);
217*4882a593Smuzhiyun 		return -1;
218*4882a593Smuzhiyun 	}
219*4882a593Smuzhiyun 
220*4882a593Smuzhiyun 	ret = snprintf(ptmx, sizeof(ptmx), "%s/ptmx", devpts);
221*4882a593Smuzhiyun 	if (ret < 0 || (size_t)ret >= sizeof(ptmx)) {
222*4882a593Smuzhiyun 		unlink(mntpoint);
223*4882a593Smuzhiyun 		return -1;
224*4882a593Smuzhiyun 	}
225*4882a593Smuzhiyun 
226*4882a593Smuzhiyun 	ret = do_tiocgptpeer(ptmx, mntpoint);
227*4882a593Smuzhiyun 	unlink(mntpoint);
228*4882a593Smuzhiyun 	if (ret < 0)
229*4882a593Smuzhiyun 		return -1;
230*4882a593Smuzhiyun 
231*4882a593Smuzhiyun 	return 0;
232*4882a593Smuzhiyun }
233*4882a593Smuzhiyun 
verify_ptmx_bind_mount(void)234*4882a593Smuzhiyun static int verify_ptmx_bind_mount(void)
235*4882a593Smuzhiyun {
236*4882a593Smuzhiyun 	int ret;
237*4882a593Smuzhiyun 
238*4882a593Smuzhiyun 	ret = mount("/dev/pts/ptmx", "/dev/ptmx", NULL, MS_BIND, NULL);
239*4882a593Smuzhiyun 	if (ret < 0) {
240*4882a593Smuzhiyun 		fprintf(stderr, "Failed to bind mount \"/dev/pts/ptmx\" to "
241*4882a593Smuzhiyun 				"\"/dev/ptmx\" mount namespace\n");
242*4882a593Smuzhiyun 		return -1;
243*4882a593Smuzhiyun 	}
244*4882a593Smuzhiyun 
245*4882a593Smuzhiyun 	ret = do_tiocgptpeer("/dev/ptmx", "/dev/pts/");
246*4882a593Smuzhiyun 	if (ret < 0)
247*4882a593Smuzhiyun 		return -1;
248*4882a593Smuzhiyun 
249*4882a593Smuzhiyun 	return 0;
250*4882a593Smuzhiyun }
251*4882a593Smuzhiyun 
verify_invalid_ptmx_bind_mount(void)252*4882a593Smuzhiyun static int verify_invalid_ptmx_bind_mount(void)
253*4882a593Smuzhiyun {
254*4882a593Smuzhiyun 	int ret;
255*4882a593Smuzhiyun 	char mntpoint_fd;
256*4882a593Smuzhiyun 	char ptmx[] = P_tmpdir "/devpts_ptmx_XXXXXX";
257*4882a593Smuzhiyun 
258*4882a593Smuzhiyun 	mntpoint_fd = mkstemp(ptmx);
259*4882a593Smuzhiyun 	if (mntpoint_fd < 0) {
260*4882a593Smuzhiyun 		fprintf(stderr, "Failed to create temporary directory: %s\n",
261*4882a593Smuzhiyun 				 strerror(errno));
262*4882a593Smuzhiyun 		return -1;
263*4882a593Smuzhiyun 	}
264*4882a593Smuzhiyun 
265*4882a593Smuzhiyun 	ret = mount("/dev/pts/ptmx", ptmx, NULL, MS_BIND, NULL);
266*4882a593Smuzhiyun 	close(mntpoint_fd);
267*4882a593Smuzhiyun 	if (ret < 0) {
268*4882a593Smuzhiyun 		fprintf(stderr, "Failed to bind mount \"/dev/pts/ptmx\" to "
269*4882a593Smuzhiyun 				"\"%s\" mount namespace\n", ptmx);
270*4882a593Smuzhiyun 		return -1;
271*4882a593Smuzhiyun 	}
272*4882a593Smuzhiyun 
273*4882a593Smuzhiyun 	ret = do_tiocgptpeer(ptmx, "/dev/pts/");
274*4882a593Smuzhiyun 	if (ret == 0)
275*4882a593Smuzhiyun 		return -1;
276*4882a593Smuzhiyun 
277*4882a593Smuzhiyun 	return 0;
278*4882a593Smuzhiyun }
279*4882a593Smuzhiyun 
main(int argc,char * argv[])280*4882a593Smuzhiyun int main(int argc, char *argv[])
281*4882a593Smuzhiyun {
282*4882a593Smuzhiyun 	int ret;
283*4882a593Smuzhiyun 
284*4882a593Smuzhiyun 	if (!isatty(STDIN_FILENO)) {
285*4882a593Smuzhiyun 		fprintf(stderr, "Standard input file descriptor is not attached "
286*4882a593Smuzhiyun 				"to a terminal. Skipping test\n");
287*4882a593Smuzhiyun 		exit(KSFT_SKIP);
288*4882a593Smuzhiyun 	}
289*4882a593Smuzhiyun 
290*4882a593Smuzhiyun 	ret = unshare(CLONE_NEWNS);
291*4882a593Smuzhiyun 	if (ret < 0) {
292*4882a593Smuzhiyun 		fprintf(stderr, "Failed to unshare mount namespace\n");
293*4882a593Smuzhiyun 		exit(EXIT_FAILURE);
294*4882a593Smuzhiyun 	}
295*4882a593Smuzhiyun 
296*4882a593Smuzhiyun 	ret = mount("", "/", NULL, MS_PRIVATE | MS_REC, 0);
297*4882a593Smuzhiyun 	if (ret < 0) {
298*4882a593Smuzhiyun 		fprintf(stderr, "Failed to make \"/\" MS_PRIVATE in new mount "
299*4882a593Smuzhiyun 				"namespace\n");
300*4882a593Smuzhiyun 		exit(EXIT_FAILURE);
301*4882a593Smuzhiyun 	}
302*4882a593Smuzhiyun 
303*4882a593Smuzhiyun 	ret = verify_ptmx_bind_mount();
304*4882a593Smuzhiyun 	if (ret < 0)
305*4882a593Smuzhiyun 		exit(EXIT_FAILURE);
306*4882a593Smuzhiyun 
307*4882a593Smuzhiyun 	ret = verify_invalid_ptmx_bind_mount();
308*4882a593Smuzhiyun 	if (ret < 0)
309*4882a593Smuzhiyun 		exit(EXIT_FAILURE);
310*4882a593Smuzhiyun 
311*4882a593Smuzhiyun 	ret = verify_non_standard_devpts_mount();
312*4882a593Smuzhiyun 	if (ret < 0)
313*4882a593Smuzhiyun 		exit(EXIT_FAILURE);
314*4882a593Smuzhiyun 
315*4882a593Smuzhiyun 	exit(EXIT_SUCCESS);
316*4882a593Smuzhiyun }
317