/* * Copyright (c) 2024 Apple Computer, Inc. All rights reserved. * * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ * * This file contains Original Code and/or Modifications of Original Code * as defined in and that are subject to the Apple Public Source License * Version 2.0 (the 'License'). You may not use this file except in * compliance with the License. The rights granted to you under the License * may not be used to create, or enable the creation or redistribution of, * unlawful or unlicensed copies of an Apple operating system, or to * circumvent, violate, or enable the circumvention or violation of, any * terms of an Apple operating system software license agreement. * * Please obtain a copy of the License at * http://www.opensource.apple.com/apsl/ and read it before using this file. * * The Original Code and all software distributed under the License are * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. * Please see the License for the specific language governing rights and * limitations under the License. * * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ */ /* compile: xcrun -sdk macosx.internal clang -ldarwintest -lsandbox -o sandbox_appledouble_write sandbox_appledouble_write.c -g -Weverything */ #include #include #include #include #include #define RUN_TEST TARGET_OS_OSX #define FILE "file" #define FILE_AD "._file" #define TMP_FILE_AD "._tmpfile" #define FILE2 "f" #define FILE2_AD "._f" #define TMP_FILE2_AD "._g" static char template[MAXPATHLEN]; static char *testdir = NULL; static char file[PATH_MAX], file2[PATH_MAX]; static sandbox_params_t params = NULL; static sandbox_profile_t profile = NULL; T_GLOBAL_META( T_META_NAMESPACE("xnu.vfs"), T_META_RADAR_COMPONENT_NAME("xnu"), T_META_RADAR_COMPONENT_VERSION("vfs"), T_META_ASROOT(true), T_META_ENABLED(RUN_TEST), T_META_CHECK_LEAKS(false)); static void cleanup(void) { if (profile) { sandbox_free_profile(profile); } if (params) { sandbox_free_params(params); } if (file[0] != '\0') { unlink(file); } if (file2[0] != '\0') { unlink(file2); } if (testdir) { unmount(testdir, MNT_FORCE); rmdir(testdir); } } static void create_profile_string(char *buff, size_t size) { snprintf(buff, size, "(version 1) \n\ (allow default) \n\ (import \"system.sb\") \n\ (deny file-write-xattr (path \"%s\")) \n\ (deny file-write-xattr (path \"%s\")) \n", file, file2); } T_DECL(sandbox_appledouble_write, "Verify that the 'file-write-xattr' permission is enforced for apple-double files") { int testdirfd, fd; char *sberror = NULL; char profile_string[1000]; char testdir_path[MAXPATHLEN]; char mount_tmpfs_cmd[1000]; file[0] = file2[0] = '\0'; #if (!RUN_TEST) T_SKIP("Not macOS"); #endif if (geteuid() != 0) { T_SKIP("Test should run as root"); } T_ATEND(cleanup); T_SETUPBEGIN; /* Create test root dir */ snprintf(template, sizeof(template), "%s/sandbox_appledouble_write-XXXXXX", dt_tmpdir()); T_ASSERT_POSIX_NOTNULL((testdir = mkdtemp(template)), "Creating test root dir"); T_ASSERT_POSIX_SUCCESS((fd = open(testdir, O_SEARCH, 0777)), "Opening test root directory %s", testdir); T_ASSERT_POSIX_SUCCESS(fcntl(fd, F_GETPATH, testdir_path), "Calling fcntl() to get the path"); close(fd); /* mount tmpfs */ snprintf(mount_tmpfs_cmd, sizeof(mount_tmpfs_cmd), "/sbin/mount_tmpfs -s 50m %s", testdir_path); T_ASSERT_POSIX_SUCCESS(system(mount_tmpfs_cmd), "Mounting tmpfs mount -> Should PASS"); T_EXPECT_POSIX_SUCCESS((testdirfd = open(testdir_path, O_SEARCH, 0777)), "Opening test root directory"); /* Setup file names */ snprintf(file, sizeof(file), "%s/%s", testdir_path, FILE); snprintf(file2, sizeof(file2), "%s/%s", testdir_path, FILE2); /* Create the test files */ T_ASSERT_POSIX_SUCCESS((fd = openat(testdirfd, FILE, O_CREAT | O_RDWR, 0777)), "Creating %s", FILE); close(fd); T_ASSERT_POSIX_SUCCESS((fd = openat(testdirfd, FILE_AD, O_CREAT | O_RDWR, 0777)), "Creating %s", FILE_AD); close(fd); T_ASSERT_POSIX_SUCCESS((fd = openat(testdirfd, FILE2, O_CREAT | O_RDWR, 0777)), "Creating %s", FILE2); close(fd); T_ASSERT_POSIX_SUCCESS((fd = openat(testdirfd, FILE2_AD, O_CREAT | O_RDWR, 0777)), "Creating %s", FILE2_AD); close(fd); /* Create sandbox variables */ T_ASSERT_POSIX_NOTNULL(params = sandbox_create_params(), "Creating Sandbox params object"); create_profile_string(profile_string, sizeof(profile_string)); T_ASSERT_POSIX_NOTNULL(profile = sandbox_compile_string(profile_string, params, &sberror), "Creating Sandbox profile object"); T_SETUPEND; /* Validate SUCCESS for rename */ T_EXPECT_POSIX_SUCCESS(renameat(testdirfd, FILE_AD, testdirfd, TMP_FILE_AD), "Verifying that rename() of '%s' -> '%s' succeeded", FILE_AD, TMP_FILE_AD); T_EXPECT_POSIX_SUCCESS(renameat(testdirfd, TMP_FILE_AD, testdirfd, FILE_AD), "Verifying that rename() of '%s' -> '%s' succeeded", TMP_FILE_AD, FILE_AD); T_EXPECT_POSIX_SUCCESS(renameat(testdirfd, FILE2_AD, testdirfd, TMP_FILE2_AD), "Verifying that rename() of '%s' -> '%s' succeeded", FILE2_AD, TMP_FILE2_AD); T_EXPECT_POSIX_SUCCESS(renameat(testdirfd, TMP_FILE2_AD, testdirfd, FILE2_AD), "Verifying that rename() of '%s' -> '%s' succeeded", TMP_FILE2_AD, FILE2_AD); /* Validate SUCCESS for unlink */ T_EXPECT_POSIX_SUCCESS(unlinkat(testdirfd, FILE_AD, 0), "Verifying that unlink() of '%s' succeeded", FILE_AD); T_EXPECT_POSIX_SUCCESS(unlinkat(testdirfd, FILE2_AD, 0), "Verifying that unlink() of '%s' succeeded", FILE2_AD); /* Validate SUCCESS for open/create */ T_EXPECT_POSIX_SUCCESS((fd = openat(testdirfd, FILE_AD, O_CREAT | O_WRONLY, 0777)), "Verifying that open() with O_WRONLY of '%s' succeeded ", FILE_AD); if (fd >= 0) { close(fd); } T_EXPECT_POSIX_SUCCESS((fd = openat(testdirfd, FILE2_AD, O_CREAT | O_TRUNC, 0777)), "Verifying that open() with O_TRUNC of '%s' succeeded", FILE2_AD); if (fd >= 0) { close(fd); } /* Apply sandbox profile */ T_ASSERT_POSIX_SUCCESS(sandbox_apply(profile), "Applying Sandbox profile"); /* Validate EPERM for rename */ T_EXPECT_POSIX_FAILURE(renameat(testdirfd, FILE_AD, testdirfd, TMP_FILE_AD), EPERM, "Verifying that rename() of '%s' -> '%s' fails with EPERM", FILE_AD, TMP_FILE_AD); T_EXPECT_POSIX_FAILURE(renameat(testdirfd, FILE2_AD, testdirfd, TMP_FILE2_AD), EPERM, "Verifying that rename() of '%s' -> '%s' fails with EPERM", FILE2_AD, TMP_FILE2_AD); /* Validate EPERM for unlink */ T_EXPECT_POSIX_FAILURE(unlinkat(testdirfd, FILE_AD, 0), EPERM, "Verifying that unlink() of '%s' fails with EPERM", FILE_AD); T_EXPECT_POSIX_FAILURE(unlinkat(testdirfd, FILE2_AD, 0), EPERM, "Verifying that unlink() of '%s' fails with EPERM", FILE2_AD); /* Validate EPERM for open */ T_EXPECT_POSIX_FAILURE((fd = openat(testdirfd, FILE_AD, O_WRONLY, 0777)), EPERM, "Verifying that open() with O_WRONLY of '%s' fails with EPERM", FILE_AD); if (fd >= 0) { close(fd); } T_EXPECT_POSIX_FAILURE((fd = openat(testdirfd, FILE2_AD, O_TRUNC, 0777)), EPERM, "Verifying that open() with O_TRUNC of '%s' fails with EPERM", FILE2_AD); if (fd >= 0) { close(fd); } T_ASSERT_POSIX_SUCCESS(close(testdirfd), "Closing %s", testdir_path); }