114 lines
		
	
	
		
			2.1 KiB
		
	
	
	
		
			C
		
	
	
	
			
		
		
	
	
			114 lines
		
	
	
		
			2.1 KiB
		
	
	
	
		
			C
		
	
	
	
| // SPDX-License-Identifier: GPL-2.0-or-later
 | |
| /*
 | |
|  * Copyright (c) International Business Machines  Corp., 2001
 | |
|  *
 | |
|  * Test case to check that kill() fails when passed a pid owned by another user.
 | |
|  *
 | |
|  * HISTORY
 | |
|  *	07/2001 Ported by Wayne Boyer
 | |
|  *
 | |
|  *      26/02/2008 Renaud Lottiaux (Renaud.Lottiaux@kerlabs.com)
 | |
|  *      - Fix wrong return value check on shmat system call (leading to
 | |
|  *        segfault in case of error with this syscall).
 | |
|  *      - Fix deletion of IPC memory segment. Segment was not correctly
 | |
|  *        deleted due to the change of uid during the test.
 | |
|  *
 | |
|  * RESTRICTIONS
 | |
|  *	This test must be run as root.
 | |
|  */
 | |
| 
 | |
| #include <sys/wait.h>
 | |
| #include <pwd.h>
 | |
| #include <stdlib.h>
 | |
| #include "tst_test.h"
 | |
| #include "libnewipc.h"
 | |
| #include "tst_safe_sysv_ipc.h"
 | |
| #include "tst_safe_macros.h"
 | |
| 
 | |
| static uid_t nobody_uid, bin_uid;
 | |
| static int *flag;
 | |
| static int shm_id = -1;
 | |
| static key_t shm_key;
 | |
| 
 | |
| static void wait_for_flag(int value)
 | |
| {
 | |
| 	while (1) {
 | |
| 		if (*flag == value)
 | |
| 			break;
 | |
| 		else
 | |
| 			usleep(100);
 | |
| 	}
 | |
| }
 | |
| 
 | |
| static void do_master_child(void)
 | |
| {
 | |
| 	pid_t pid1;
 | |
| 
 | |
| 	*flag = 0;
 | |
| 	pid1 = SAFE_FORK();
 | |
| 	if (pid1 == 0) {
 | |
| 		SAFE_SETREUID(nobody_uid, nobody_uid);
 | |
| 		*flag = 1;
 | |
| 		wait_for_flag(2);
 | |
| 
 | |
| 		exit(0);
 | |
| 	}
 | |
| 
 | |
| 	SAFE_SETREUID(bin_uid, bin_uid);
 | |
| 	wait_for_flag(1);
 | |
| 	TEST(kill(pid1, SIGKILL));
 | |
| 
 | |
| 	*flag = 2;
 | |
| 	SAFE_WAITPID(pid1, NULL, 0);
 | |
| 
 | |
| 	if (TST_RET == 0)
 | |
| 		tst_brk(TFAIL, "kill succeeded unexpectedly");
 | |
| 
 | |
| 	if (TST_ERR == EPERM)
 | |
| 		tst_res(TPASS, "kill failed with EPERM");
 | |
| 	else
 | |
| 		tst_res(TFAIL | TTERRNO, "kill failed expected EPERM, but got");
 | |
| }
 | |
| 
 | |
| static void verify_kill(void)
 | |
| {
 | |
| 	pid_t pid;
 | |
| 
 | |
| 	pid = SAFE_FORK();
 | |
| 	if (pid == 0) {
 | |
| 		do_master_child();
 | |
| 		exit(0);
 | |
| 	}
 | |
| 
 | |
| 	tst_reap_children();
 | |
| }
 | |
| 
 | |
| static void setup(void)
 | |
| {
 | |
| 	struct passwd *pw;
 | |
| 
 | |
| 	shm_key = GETIPCKEY();
 | |
| 	shm_id = SAFE_SHMGET(shm_key, getpagesize(), 0666 | IPC_CREAT);
 | |
| 	flag = SAFE_SHMAT(shm_id, 0, 0);
 | |
| 
 | |
| 	pw = SAFE_GETPWNAM("nobody");
 | |
| 	nobody_uid = pw->pw_uid;
 | |
| 
 | |
| 	pw = SAFE_GETPWNAM("bin");
 | |
| 	bin_uid = pw->pw_uid;
 | |
| }
 | |
| 
 | |
| static void cleanup(void)
 | |
| {
 | |
| 	if (shm_id != -1)
 | |
| 		SAFE_SHMCTL(shm_id, IPC_RMID, NULL);
 | |
| }
 | |
| 
 | |
| static struct tst_test test = {
 | |
| 	.setup = setup,
 | |
| 	.cleanup = cleanup,
 | |
| 	.test_all = verify_kill,
 | |
| 	.needs_root = 1,
 | |
| 	.forks_child = 1,
 | |
| };
 |