1f08c3bdfSopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 2f08c3bdfSopenharmony_ci/* 3f08c3bdfSopenharmony_ci * Copyright (c) International Business Machines Corp., 2001 4f08c3bdfSopenharmony_ci */ 5f08c3bdfSopenharmony_ci 6f08c3bdfSopenharmony_ci/* 7f08c3bdfSopenharmony_ci * DESCRIPTION 8f08c3bdfSopenharmony_ci * Check if setuid behaves correctly with file permissions. The test 9f08c3bdfSopenharmony_ci * creates a file as ROOT with permissions 0644, does a setuid and then 10f08c3bdfSopenharmony_ci * tries to open the file with RDWR permissions. The same test is done 11f08c3bdfSopenharmony_ci * in a fork to check if new UIDs are correctly passed to the son. 12f08c3bdfSopenharmony_ci */ 13f08c3bdfSopenharmony_ci 14f08c3bdfSopenharmony_ci#include <errno.h> 15f08c3bdfSopenharmony_ci#include <pwd.h> 16f08c3bdfSopenharmony_ci#include <unistd.h> 17f08c3bdfSopenharmony_ci#include <sys/types.h> 18f08c3bdfSopenharmony_ci#include <fcntl.h> 19f08c3bdfSopenharmony_ci#include "tst_test.h" 20f08c3bdfSopenharmony_ci#include "compat_tst_16.h" 21f08c3bdfSopenharmony_ci 22f08c3bdfSopenharmony_ci#define FILENAME "setuid04_testfile" 23f08c3bdfSopenharmony_ci 24f08c3bdfSopenharmony_cistatic void dosetuid(void); 25f08c3bdfSopenharmony_ci 26f08c3bdfSopenharmony_cistatic void verify_setuid(void) 27f08c3bdfSopenharmony_ci{ 28f08c3bdfSopenharmony_ci pid_t pid; 29f08c3bdfSopenharmony_ci 30f08c3bdfSopenharmony_ci pid = SAFE_FORK(); 31f08c3bdfSopenharmony_ci if (!pid) 32f08c3bdfSopenharmony_ci dosetuid(); 33f08c3bdfSopenharmony_ci else 34f08c3bdfSopenharmony_ci dosetuid(); 35f08c3bdfSopenharmony_ci} 36f08c3bdfSopenharmony_ci 37f08c3bdfSopenharmony_cistatic void dosetuid(void) 38f08c3bdfSopenharmony_ci{ 39f08c3bdfSopenharmony_ci int tst_fd; 40f08c3bdfSopenharmony_ci 41f08c3bdfSopenharmony_ci TEST(tst_fd = open(FILENAME, O_RDWR)); 42f08c3bdfSopenharmony_ci if (TST_RET != -1) { 43f08c3bdfSopenharmony_ci tst_res(TFAIL, "open() succeeded unexpectedly"); 44f08c3bdfSopenharmony_ci close(tst_fd); 45f08c3bdfSopenharmony_ci return; 46f08c3bdfSopenharmony_ci } 47f08c3bdfSopenharmony_ci 48f08c3bdfSopenharmony_ci if (TST_ERR == EACCES) 49f08c3bdfSopenharmony_ci tst_res(TPASS, "open() returned errno EACCES"); 50f08c3bdfSopenharmony_ci else 51f08c3bdfSopenharmony_ci tst_res(TFAIL | TTERRNO, "open() returned unexpected errno"); 52f08c3bdfSopenharmony_ci} 53f08c3bdfSopenharmony_ci 54f08c3bdfSopenharmony_cistatic void setup(void) 55f08c3bdfSopenharmony_ci{ 56f08c3bdfSopenharmony_ci struct passwd *pw; 57f08c3bdfSopenharmony_ci uid_t uid; 58f08c3bdfSopenharmony_ci 59f08c3bdfSopenharmony_ci pw = SAFE_GETPWNAM("nobody"); 60f08c3bdfSopenharmony_ci uid = pw->pw_uid; 61f08c3bdfSopenharmony_ci 62f08c3bdfSopenharmony_ci UID16_CHECK(uid, setuid); 63f08c3bdfSopenharmony_ci /* Create test file */ 64f08c3bdfSopenharmony_ci SAFE_TOUCH(FILENAME, 0644, NULL); 65f08c3bdfSopenharmony_ci 66f08c3bdfSopenharmony_ci if (SETUID(uid) == -1) { 67f08c3bdfSopenharmony_ci tst_brk(TBROK, 68f08c3bdfSopenharmony_ci "setuid() failed to set the effective uid to %d", uid); 69f08c3bdfSopenharmony_ci } 70f08c3bdfSopenharmony_ci} 71f08c3bdfSopenharmony_ci 72f08c3bdfSopenharmony_cistatic struct tst_test test = { 73f08c3bdfSopenharmony_ci .setup = setup, 74f08c3bdfSopenharmony_ci .needs_root = 1, 75f08c3bdfSopenharmony_ci .test_all = verify_setuid, 76f08c3bdfSopenharmony_ci .needs_tmpdir = 1, 77f08c3bdfSopenharmony_ci .forks_child = 1, 78f08c3bdfSopenharmony_ci}; 79