1f08c3bdfSopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later
2f08c3bdfSopenharmony_ci/*
3f08c3bdfSopenharmony_ci * Copyright (c) International Business Machines Corp., 2001
4f08c3bdfSopenharmony_ci */
5f08c3bdfSopenharmony_ci
6f08c3bdfSopenharmony_ci/*
7f08c3bdfSopenharmony_ci * DESCRIPTION
8f08c3bdfSopenharmony_ci *	Check if setuid behaves correctly with file permissions. The test
9f08c3bdfSopenharmony_ci *	creates a file as ROOT with permissions 0644, does a setuid and then
10f08c3bdfSopenharmony_ci *	tries to open the file with RDWR permissions. The same test is done
11f08c3bdfSopenharmony_ci *	in a fork to check if new UIDs are correctly passed to the son.
12f08c3bdfSopenharmony_ci */
13f08c3bdfSopenharmony_ci
14f08c3bdfSopenharmony_ci#include <errno.h>
15f08c3bdfSopenharmony_ci#include <pwd.h>
16f08c3bdfSopenharmony_ci#include <unistd.h>
17f08c3bdfSopenharmony_ci#include <sys/types.h>
18f08c3bdfSopenharmony_ci#include <fcntl.h>
19f08c3bdfSopenharmony_ci#include "tst_test.h"
20f08c3bdfSopenharmony_ci#include "compat_tst_16.h"
21f08c3bdfSopenharmony_ci
22f08c3bdfSopenharmony_ci#define  FILENAME  "setuid04_testfile"
23f08c3bdfSopenharmony_ci
24f08c3bdfSopenharmony_cistatic void dosetuid(void);
25f08c3bdfSopenharmony_ci
26f08c3bdfSopenharmony_cistatic void verify_setuid(void)
27f08c3bdfSopenharmony_ci{
28f08c3bdfSopenharmony_ci	pid_t pid;
29f08c3bdfSopenharmony_ci
30f08c3bdfSopenharmony_ci	pid = SAFE_FORK();
31f08c3bdfSopenharmony_ci	if (!pid)
32f08c3bdfSopenharmony_ci		dosetuid();
33f08c3bdfSopenharmony_ci	else
34f08c3bdfSopenharmony_ci		dosetuid();
35f08c3bdfSopenharmony_ci}
36f08c3bdfSopenharmony_ci
37f08c3bdfSopenharmony_cistatic void dosetuid(void)
38f08c3bdfSopenharmony_ci{
39f08c3bdfSopenharmony_ci	int tst_fd;
40f08c3bdfSopenharmony_ci
41f08c3bdfSopenharmony_ci	TEST(tst_fd = open(FILENAME, O_RDWR));
42f08c3bdfSopenharmony_ci	if (TST_RET != -1) {
43f08c3bdfSopenharmony_ci		tst_res(TFAIL, "open() succeeded unexpectedly");
44f08c3bdfSopenharmony_ci		close(tst_fd);
45f08c3bdfSopenharmony_ci		return;
46f08c3bdfSopenharmony_ci	}
47f08c3bdfSopenharmony_ci
48f08c3bdfSopenharmony_ci	if (TST_ERR == EACCES)
49f08c3bdfSopenharmony_ci		tst_res(TPASS, "open() returned errno EACCES");
50f08c3bdfSopenharmony_ci	else
51f08c3bdfSopenharmony_ci		tst_res(TFAIL | TTERRNO, "open() returned unexpected errno");
52f08c3bdfSopenharmony_ci}
53f08c3bdfSopenharmony_ci
54f08c3bdfSopenharmony_cistatic void setup(void)
55f08c3bdfSopenharmony_ci{
56f08c3bdfSopenharmony_ci	struct passwd *pw;
57f08c3bdfSopenharmony_ci	uid_t uid;
58f08c3bdfSopenharmony_ci
59f08c3bdfSopenharmony_ci	pw = SAFE_GETPWNAM("nobody");
60f08c3bdfSopenharmony_ci	uid = pw->pw_uid;
61f08c3bdfSopenharmony_ci
62f08c3bdfSopenharmony_ci	UID16_CHECK(uid, setuid);
63f08c3bdfSopenharmony_ci	/* Create test file */
64f08c3bdfSopenharmony_ci	SAFE_TOUCH(FILENAME, 0644, NULL);
65f08c3bdfSopenharmony_ci
66f08c3bdfSopenharmony_ci	if (SETUID(uid) == -1) {
67f08c3bdfSopenharmony_ci		tst_brk(TBROK,
68f08c3bdfSopenharmony_ci			"setuid() failed to set the effective uid to %d", uid);
69f08c3bdfSopenharmony_ci	}
70f08c3bdfSopenharmony_ci}
71f08c3bdfSopenharmony_ci
72f08c3bdfSopenharmony_cistatic struct tst_test test = {
73f08c3bdfSopenharmony_ci	.setup = setup,
74f08c3bdfSopenharmony_ci	.needs_root = 1,
75f08c3bdfSopenharmony_ci	.test_all = verify_setuid,
76f08c3bdfSopenharmony_ci	.needs_tmpdir = 1,
77f08c3bdfSopenharmony_ci	.forks_child = 1,
78f08c3bdfSopenharmony_ci};
79