xref: /aosp_15_r20/external/ltp/testcases/kernel/syscalls/setresuid/setresuid04.c (revision 49cdfc7efb34551c7342be41a7384b9c40d7cab7)
1*49cdfc7eSAndroid Build Coastguard Worker // SPDX-License-Identifier: GPL-2.0-or-later
2*49cdfc7eSAndroid Build Coastguard Worker /* Copyright (c) Kerlabs 2008.
3*49cdfc7eSAndroid Build Coastguard Worker  * Copyright (c) International Business Machines  Corp., 2008
4*49cdfc7eSAndroid Build Coastguard Worker  * Copyright (c) 2022 SUSE LLC Avinesh Kumar <[email protected]>
5*49cdfc7eSAndroid Build Coastguard Worker  */
6*49cdfc7eSAndroid Build Coastguard Worker 
7*49cdfc7eSAndroid Build Coastguard Worker /*\
8*49cdfc7eSAndroid Build Coastguard Worker  * [Description]
9*49cdfc7eSAndroid Build Coastguard Worker  *
10*49cdfc7eSAndroid Build Coastguard Worker  * Verify that setresuid() behaves correctly with file permissions.
11*49cdfc7eSAndroid Build Coastguard Worker  * The test creates a file as ROOT with permissions 0644, does a setresuid
12*49cdfc7eSAndroid Build Coastguard Worker  * to change euid to a non-root user and tries to open the file with RDWR
13*49cdfc7eSAndroid Build Coastguard Worker  * permissions, which should fail with EACCES errno.
14*49cdfc7eSAndroid Build Coastguard Worker  * The same test is done in a fork also to check that child process also
15*49cdfc7eSAndroid Build Coastguard Worker  * inherits new euid and open fails with EACCES.
16*49cdfc7eSAndroid Build Coastguard Worker  * Test verifies the successful open action after reverting the euid back
17*49cdfc7eSAndroid Build Coastguard Worker  * ROOT user.
18*49cdfc7eSAndroid Build Coastguard Worker  */
19*49cdfc7eSAndroid Build Coastguard Worker 
20*49cdfc7eSAndroid Build Coastguard Worker #include <sys/wait.h>
21*49cdfc7eSAndroid Build Coastguard Worker #include <pwd.h>
22*49cdfc7eSAndroid Build Coastguard Worker #include "tst_test.h"
23*49cdfc7eSAndroid Build Coastguard Worker #include "compat_tst_16.h"
24*49cdfc7eSAndroid Build Coastguard Worker 
25*49cdfc7eSAndroid Build Coastguard Worker #define TEMP_FILE	"testfile"
26*49cdfc7eSAndroid Build Coastguard Worker static char nobody_uid[] = "nobody";
27*49cdfc7eSAndroid Build Coastguard Worker static struct passwd *ltpuser;
28*49cdfc7eSAndroid Build Coastguard Worker static int fd = -1;
29*49cdfc7eSAndroid Build Coastguard Worker 
setup(void)30*49cdfc7eSAndroid Build Coastguard Worker static void setup(void)
31*49cdfc7eSAndroid Build Coastguard Worker {
32*49cdfc7eSAndroid Build Coastguard Worker 	ltpuser = SAFE_GETPWNAM(nobody_uid);
33*49cdfc7eSAndroid Build Coastguard Worker 	UID16_CHECK(ltpuser->pw_uid, "setresuid");
34*49cdfc7eSAndroid Build Coastguard Worker 
35*49cdfc7eSAndroid Build Coastguard Worker 	fd = SAFE_OPEN(TEMP_FILE, O_CREAT | O_RDWR, 0644);
36*49cdfc7eSAndroid Build Coastguard Worker }
37*49cdfc7eSAndroid Build Coastguard Worker 
run(void)38*49cdfc7eSAndroid Build Coastguard Worker static void run(void)
39*49cdfc7eSAndroid Build Coastguard Worker {
40*49cdfc7eSAndroid Build Coastguard Worker 	pid_t pid;
41*49cdfc7eSAndroid Build Coastguard Worker 	int status;
42*49cdfc7eSAndroid Build Coastguard Worker 
43*49cdfc7eSAndroid Build Coastguard Worker 	TST_EXP_PASS_SILENT(SETRESUID(-1, ltpuser->pw_uid, -1));
44*49cdfc7eSAndroid Build Coastguard Worker 	TST_EXP_FAIL2(open(TEMP_FILE, O_RDWR), EACCES);
45*49cdfc7eSAndroid Build Coastguard Worker 
46*49cdfc7eSAndroid Build Coastguard Worker 	pid = SAFE_FORK();
47*49cdfc7eSAndroid Build Coastguard Worker 	if (!pid) {
48*49cdfc7eSAndroid Build Coastguard Worker 		TST_EXP_FAIL2(open(TEMP_FILE, O_RDWR), EACCES);
49*49cdfc7eSAndroid Build Coastguard Worker 		return;
50*49cdfc7eSAndroid Build Coastguard Worker 	}
51*49cdfc7eSAndroid Build Coastguard Worker 	SAFE_WAITPID(pid, &status, 0);
52*49cdfc7eSAndroid Build Coastguard Worker 	if (WIFEXITED(status) && WEXITSTATUS(status) != 0)
53*49cdfc7eSAndroid Build Coastguard Worker 		tst_res(TFAIL, "child process exited with status: %d", status);
54*49cdfc7eSAndroid Build Coastguard Worker 
55*49cdfc7eSAndroid Build Coastguard Worker 	TST_EXP_PASS_SILENT(SETRESUID(-1, 0, -1));
56*49cdfc7eSAndroid Build Coastguard Worker 	TST_EXP_FD(open(TEMP_FILE, O_RDWR));
57*49cdfc7eSAndroid Build Coastguard Worker 	SAFE_CLOSE(TST_RET);
58*49cdfc7eSAndroid Build Coastguard Worker }
59*49cdfc7eSAndroid Build Coastguard Worker 
cleanup(void)60*49cdfc7eSAndroid Build Coastguard Worker static void cleanup(void)
61*49cdfc7eSAndroid Build Coastguard Worker {
62*49cdfc7eSAndroid Build Coastguard Worker 	if (fd > 0)
63*49cdfc7eSAndroid Build Coastguard Worker 		SAFE_CLOSE(fd);
64*49cdfc7eSAndroid Build Coastguard Worker }
65*49cdfc7eSAndroid Build Coastguard Worker 
66*49cdfc7eSAndroid Build Coastguard Worker static struct tst_test test = {
67*49cdfc7eSAndroid Build Coastguard Worker 	.setup = setup,
68*49cdfc7eSAndroid Build Coastguard Worker 	.test_all = run,
69*49cdfc7eSAndroid Build Coastguard Worker 	.cleanup = cleanup,
70*49cdfc7eSAndroid Build Coastguard Worker 	.needs_root = 1,
71*49cdfc7eSAndroid Build Coastguard Worker 	.needs_tmpdir = 1,
72*49cdfc7eSAndroid Build Coastguard Worker 	.forks_child = 1
73*49cdfc7eSAndroid Build Coastguard Worker };
74