This is xnu-12377.1.9. See this file in:
/*
 * Copyright (c) 2024 Apple Computer, Inc. All rights reserved.
 *
 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
 *
 * This file contains Original Code and/or Modifications of Original Code
 * as defined in and that are subject to the Apple Public Source License
 * Version 2.0 (the 'License'). You may not use this file except in
 * compliance with the License. The rights granted to you under the License
 * may not be used to create, or enable the creation or redistribution of,
 * unlawful or unlicensed copies of an Apple operating system, or to
 * circumvent, violate, or enable the circumvention or violation of, any
 * terms of an Apple operating system software license agreement.
 *
 * Please obtain a copy of the License at
 * http://www.opensource.apple.com/apsl/ and read it before using this file.
 *
 * The Original Code and all software distributed under the License are
 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
 * Please see the License for the specific language governing rights and
 * limitations under the License.
 *
 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
 */

/* compile: xcrun -sdk macosx.internal clang -ldarwintest -o devfd_access devfd_access.c -g -Weverything */
/* sign: codesign --force --sign - --timestamp=none --entitlements devfd_access.entitlements devfd_access */

#include <darwintest.h>
#include <stdlib.h>
#include <fcntl.h>
#include <sys/param.h>

T_GLOBAL_META(
	T_META_NAMESPACE("xnu.vfs"),
	T_META_RADAR_COMPONENT_NAME("xnu"),
	T_META_RADAR_COMPONENT_VERSION("vfs"),
	T_META_ASROOT(false),
	T_META_CHECK_LEAKS(false));

static int
docheck(int fd, int perm)
{
	char path[MAXPATHLEN];

	path[0] = '\0';
	snprintf(path, sizeof(path), "/dev/fd/%d", fd);
	errno = 0;

	return access(path, perm);
}

/* The devfs_access test should not run as root */
T_DECL(devfd_access, "Calculate the allowed access based on the open-flags for fdesc vnodes")
{
	const char *path = "/dev/null";
	int fd_rdonly, fd_wronly, fd_evtonly, fd_evtonly_drw;

	if (geteuid() == 0) {
		T_SKIP("Test should NOT run as root");
	}

	T_SETUPBEGIN;

	T_ASSERT_POSIX_SUCCESS(fd_rdonly = open(path, O_RDONLY),
	    "Setup: Opening file with O_RDONLY permissions, fd_rdonly = %d",
	    fd_rdonly);

	T_ASSERT_POSIX_SUCCESS(fd_wronly = open(path, O_WRONLY),
	    "Setup: Opening file with O_WRONLY permissions, fd_wronly = %d",
	    fd_wronly);

	T_ASSERT_POSIX_SUCCESS(fd_evtonly = open(path, O_EVTONLY),
	    "Setup: Opening file with O_EVTONLY permissions, fd_evtonly = %d",
	    fd_evtonly);

	T_ASSERT_POSIX_SUCCESS(setiopolicy_np(IOPOL_TYPE_VFS_DISALLOW_RW_FOR_O_EVTONLY,
	    IOPOL_SCOPE_PROCESS,
	    IOPOL_VFS_DISALLOW_RW_FOR_O_EVTONLY_ON),
	    "Setup: Disallowing RW for O_EVTONLY");

	T_ASSERT_POSIX_SUCCESS(fd_evtonly_drw = open(path, O_EVTONLY),
	    "Setup: Opening file with O_EVTONLY permissions while RW is disabled, fd_evtonly_drw = %d",
	    fd_evtonly_drw);

	T_SETUPEND;

	T_LOG("Test rdonly-fd's access");
	T_EXPECT_POSIX_SUCCESS(docheck(fd_rdonly, R_OK), "Testing R_OK permissions");
	T_EXPECT_POSIX_FAILURE(docheck(fd_rdonly, W_OK), EACCES, "Testing W_OK permissions");
	T_EXPECT_POSIX_FAILURE(docheck(fd_rdonly, R_OK | W_OK), EACCES, "Testing R_OK | W_OK permissions");
	T_EXPECT_POSIX_FAILURE(docheck(fd_rdonly, X_OK), EACCES, "Testing X_OK permissions");

	T_LOG("Test wronly-fd's access");
	T_EXPECT_POSIX_FAILURE(docheck(fd_wronly, R_OK), EACCES, "Testing R_OK permissions");
	T_EXPECT_POSIX_SUCCESS(docheck(fd_wronly, W_OK), "Testing W_OK permissions");
	T_EXPECT_POSIX_FAILURE(docheck(fd_wronly, R_OK | W_OK), EACCES, "Testing R_OK | W_OK permissions");
	T_EXPECT_POSIX_FAILURE(docheck(fd_wronly, X_OK), EACCES, "Testing X_OK permissions");

	T_LOG("Test evtonly-fd's access");
	T_EXPECT_POSIX_SUCCESS(docheck(fd_evtonly, R_OK), "Testing R_OK permissions");
	T_EXPECT_POSIX_FAILURE(docheck(fd_evtonly, W_OK), EACCES, "Testing W_OK permissions");
	T_EXPECT_POSIX_FAILURE(docheck(fd_evtonly, R_OK | W_OK), EACCES, "Testing R_OK | W_OK permissions");
	T_EXPECT_POSIX_FAILURE(docheck(fd_evtonly, X_OK), EACCES, "Testing X_OK permissions");

	T_LOG("Test evtonly-drw-fd's access");
	T_EXPECT_POSIX_FAILURE(docheck(fd_evtonly_drw, R_OK), EACCES, "Testing R_OK permissions");
	T_EXPECT_POSIX_FAILURE(docheck(fd_evtonly_drw, W_OK), EACCES, "Testing W_OK permissions");
	T_EXPECT_POSIX_FAILURE(docheck(fd_evtonly_drw, R_OK | W_OK), EACCES, "Testing R_OK | W_OK permissions");
	T_EXPECT_POSIX_FAILURE(docheck(fd_evtonly_drw, X_OK), EACCES, "Testing X_OK permissions");

	/* Close open file descriptors */
	close(fd_rdonly);
	close(fd_wronly);
	close(fd_evtonly);
	close(fd_evtonly_drw);
}