246 lines
6.4 KiB
C
246 lines
6.4 KiB
C
/*
|
|
*
|
|
* Copyright (c) International Business Machines Corp., 2001
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
|
|
* the GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
*/
|
|
|
|
/*
|
|
* NAME
|
|
* setresuid03.c
|
|
*
|
|
* DESCRIPTION
|
|
* Test that the setresuid system call sets the proper errno
|
|
* values when a non-root user attempts to change the real, effective or
|
|
* saved uid to a value other than one of the current uid, the current
|
|
* effective uid of the current saved uid. Also verify that setresuid
|
|
* fails if an invalid uid value is given.
|
|
*
|
|
* ALGORITHM
|
|
*
|
|
* Setup:
|
|
* Setup signal handling
|
|
* Get user information.
|
|
* Pause for SIGUSER1 if option specified.
|
|
*
|
|
* Setup test values.
|
|
* Loop if the proper options are given.
|
|
* For each test set execute the system call
|
|
* Check that we received the expected result.
|
|
* Verify that the uid, euid and suid values are still correct.
|
|
* Cleanup:
|
|
* Print errno log and/or timing stats if option given.
|
|
*
|
|
* USAGE: <for command-line>
|
|
* setresuid03 [-c n] [-f] [-i n] [-I x] [-P x] [-t]
|
|
* where, -c n : Run n copies concurrently.
|
|
* -e : Turn on errno logging.
|
|
* -f : Turn off functionality Testing.
|
|
* -i n : Execute test n times.
|
|
* -I x : Execute test for x seconds.
|
|
* -P x : Pause for x seconds between iterations.
|
|
* -t : Turn on syscall timing.
|
|
*
|
|
* History
|
|
* 07/2001 John George
|
|
* -Ported
|
|
*
|
|
* Restrictions
|
|
* This test must be run by root.
|
|
* nobody and bin must be a valid users.
|
|
*/
|
|
|
|
#define _GNU_SOURCE 1
|
|
#include <pwd.h>
|
|
#include <stdlib.h>
|
|
#include "test.h"
|
|
#include <errno.h>
|
|
#include <sys/wait.h>
|
|
|
|
#include <compat_16.h>
|
|
|
|
TCID_DEFINE(setresuid03);
|
|
|
|
uid_t neg_one = -1;
|
|
|
|
/* flag to tell parent if child passed or failed. */
|
|
int flag = 0;
|
|
|
|
uid_t root_pw_uid, nobody_pw_uid, bin_pw_uid;
|
|
char user1name[] = "nobody";
|
|
char user2name[] = "bin";
|
|
char rootname[] = "root";
|
|
|
|
struct passwd nobody, bin, root;
|
|
|
|
/*
|
|
* The following structure contains all test data. Each structure in the array
|
|
* is used for a separate test. The tests are executed in the for loop below.
|
|
*/
|
|
|
|
struct test_data_t {
|
|
uid_t *real_uid;
|
|
uid_t *eff_uid;
|
|
uid_t *sav_uid;
|
|
int exp_errno;
|
|
struct passwd *exp_real_usr;
|
|
struct passwd *exp_eff_usr;
|
|
struct passwd *exp_sav_usr;
|
|
char *test_msg;
|
|
} test_data[] = {
|
|
{
|
|
&nobody_pw_uid, &neg_one, &neg_one, EPERM, &root, &bin, &bin,
|
|
"After setresuid(root, -1, -1),"}, {
|
|
&neg_one, &neg_one, &nobody_pw_uid, EPERM, &root, &bin, &bin,
|
|
"After setresuid(-1, -1, bin),"}, {
|
|
&neg_one, &nobody_pw_uid, &neg_one, EPERM, &root, &bin, &bin,
|
|
"After setresuid(-1, -1, bin),"}
|
|
};
|
|
|
|
int TST_TOTAL = sizeof(test_data) / sizeof(test_data[0]);
|
|
|
|
void setup(void);
|
|
void cleanup(void);
|
|
|
|
void
|
|
uid_verify(struct passwd *ru, struct passwd *eu, struct passwd *su, char *);
|
|
|
|
int main(int ac, char **av)
|
|
{
|
|
int lc;
|
|
|
|
tst_parse_opts(ac, av, NULL, NULL);
|
|
|
|
setup();
|
|
|
|
for (lc = 0; TEST_LOOPING(lc); lc++) {
|
|
int i, pid;
|
|
|
|
/* reset tst_count in case we are looping */
|
|
tst_count = 0;
|
|
|
|
/* set the appropriate ownership values */
|
|
if (setresuid(root_pw_uid, bin_pw_uid, bin_pw_uid)
|
|
== -1) {
|
|
tst_brkm(TFAIL, cleanup, "Initial setresuid failed");
|
|
}
|
|
|
|
if ((pid = FORK_OR_VFORK()) == -1) {
|
|
tst_brkm(TBROK, cleanup, "fork failed");
|
|
} else if (pid == 0) { /* child */
|
|
|
|
for (i = 0; i < TST_TOTAL; i++) {
|
|
|
|
/* Set the real, effective or saved user id */
|
|
TEST(SETRESUID(NULL, *test_data[i].real_uid,
|
|
*test_data[i].eff_uid,
|
|
*test_data[i].sav_uid));
|
|
|
|
if (TEST_RETURN == -1 && TEST_ERRNO ==
|
|
test_data[i].exp_errno) {
|
|
tst_resm(TPASS, "setresuid(%d, %d, %d) "
|
|
"failed as expected.",
|
|
*test_data[i].real_uid,
|
|
*test_data[i].eff_uid,
|
|
*test_data[i].sav_uid);
|
|
} else {
|
|
tst_resm(TFAIL, "setresuid(%d, %d, %d) "
|
|
"did not fail as expected.",
|
|
*test_data[i].real_uid,
|
|
*test_data[i].eff_uid,
|
|
*test_data[i].sav_uid);
|
|
flag = -1;
|
|
}
|
|
|
|
uid_verify(test_data[i].exp_real_usr,
|
|
test_data[i].exp_eff_usr,
|
|
test_data[i].exp_sav_usr,
|
|
test_data[i].test_msg);
|
|
}
|
|
exit(flag);
|
|
} else { /* parent */
|
|
tst_record_childstatus(cleanup, pid);
|
|
}
|
|
}
|
|
cleanup();
|
|
tst_exit();
|
|
}
|
|
|
|
/*
|
|
* setup()
|
|
* performs all ONE TIME setup for this test
|
|
*/
|
|
void setup(void)
|
|
{
|
|
tst_require_root();
|
|
|
|
tst_sig(FORK, DEF_HANDLER, cleanup);
|
|
|
|
if (getpwnam("nobody") == NULL) {
|
|
tst_brkm(TBROK, NULL, "nobody must be a valid user.");
|
|
}
|
|
|
|
if (getpwnam("bin") == NULL) {
|
|
tst_brkm(TBROK, NULL, "bin must be a valid user.");
|
|
}
|
|
|
|
root = *(getpwnam("root"));
|
|
UID16_CHECK((root_pw_uid = root.pw_uid), "setresuid", cleanup)
|
|
|
|
nobody = *(getpwnam("nobody"));
|
|
UID16_CHECK((nobody_pw_uid = nobody.pw_uid), "setresuid", cleanup)
|
|
|
|
bin = *(getpwnam("bin"));
|
|
UID16_CHECK((bin_pw_uid = bin.pw_uid), "setresuid", cleanup)
|
|
|
|
/* Pause if that option was specified
|
|
* TEST_PAUSE contains the code to fork the test with the -i option.
|
|
* You want to make sure you do this before you create your temporary
|
|
* directory.
|
|
*/
|
|
TEST_PAUSE;
|
|
}
|
|
|
|
/*
|
|
* cleanup()
|
|
* performs all ONE TIME cleanup for this test at
|
|
* completion or premature exit
|
|
*/
|
|
void cleanup(void)
|
|
{
|
|
|
|
}
|
|
|
|
void
|
|
uid_verify(struct passwd *ru, struct passwd *eu, struct passwd *su, char *when)
|
|
{
|
|
uid_t cur_ru, cur_eu, cur_su;
|
|
if (getresuid(&cur_ru, &cur_eu, &cur_su) != 0) {
|
|
flag = -1;
|
|
tst_brkm(TBROK, cleanup, "Set getresuid() failed");
|
|
}
|
|
if ((cur_ru != ru->pw_uid) || (cur_eu != eu->pw_uid) || (cur_su !=
|
|
su->pw_uid)) {
|
|
tst_resm(TFAIL, "ERROR: %s real uid = %d; effective uid = %d; "
|
|
"saved uid = %d", when, cur_ru, cur_eu, cur_su);
|
|
tst_resm(TINFO, "Expected: real uid = %d, effective uid = %d "
|
|
"saved uid = %d", ru->pw_uid, eu->pw_uid, su->pw_uid);
|
|
flag = -1;
|
|
} else {
|
|
tst_resm(TINFO, "real uid = %d, effective uid = %d, and "
|
|
"saved uid = %d as expected", cur_ru, cur_eu, cur_su);
|
|
}
|
|
}
|