blob: e25a7ec7211c5c41b3737dc75930ce5f1a808505 [file] [log] [blame]
// SPDX-License-Identifier: GPL-2.0
/*
* Copyright (c) International Business Machines Corp., 2001
*
* Ported by John George
*/
/*
* Test setregid() when executed by a non-root user.
*/
#include <pwd.h>
#include "tst_test.h"
#include "compat_tst_16.h"
static int fail = -1;
static int pass;
static gid_t neg_one = -1;
struct group nobody_gr, daemon_gr, root_gr, bin_gr;
struct passwd nobody;
struct tcase {
gid_t *real_gid;
gid_t *eff_gid;
int *exp_ret;
struct group *exp_real_usr;
struct group *exp_eff_usr;
char *test_msg;
} tcases[] = {
{
&daemon_gr.gr_gid, &bin_gr.gr_gid, &pass, &daemon_gr, &bin_gr,
"After setregid(daemon, bin),"}, {
&neg_one, &daemon_gr.gr_gid, &pass, &daemon_gr, &daemon_gr,
"After setregid(-1, daemon)"}, {
&neg_one, &bin_gr.gr_gid, &pass, &daemon_gr, &bin_gr,
"After setregid(-1, bin),"}, {
&bin_gr.gr_gid, &neg_one, &pass, &bin_gr, &bin_gr,
"After setregid(bin, -1),"}, {
&neg_one, &neg_one, &pass, &bin_gr, &bin_gr,
"After setregid(-1, -1),"}, {
&neg_one, &bin_gr.gr_gid, &pass, &bin_gr, &bin_gr,
"After setregid(-1, bin),"}, {
&bin_gr.gr_gid, &neg_one, &pass, &bin_gr, &bin_gr,
"After setregid(bin, -1),"}, {
&bin_gr.gr_gid, &bin_gr.gr_gid, &pass, &bin_gr, &bin_gr,
"After setregid(bin, bin),"}, {
&daemon_gr.gr_gid, &neg_one, &fail, &bin_gr, &bin_gr,
"After setregid(daemon, -1)"}, {
&neg_one, &daemon_gr.gr_gid, &fail, &bin_gr, &bin_gr,
"After setregid(-1, daemon)"}, {
&daemon_gr.gr_gid, &daemon_gr.gr_gid, &fail, &bin_gr, &bin_gr,
"After setregid(daemon, daemon)"},};
static struct group get_group_fallback(const char *gr1, const char *gr2)
{
struct group *junk;
junk = SAFE_GETGRNAM_FALLBACK(gr1, gr2);
GID16_CHECK(junk->gr_gid, setregid);
return *junk;
}
static struct group get_group(const char *group)
{
struct group *junk;
junk = SAFE_GETGRNAM(group);
GID16_CHECK(junk->gr_gid, setregid);
return *junk;
}
static void setup(void)
{
nobody = *SAFE_GETPWNAM("nobody");
nobody_gr = get_group_fallback("nobody", "nogroup");
daemon_gr = get_group("daemon");
bin_gr = get_group("bin");
/* set the appropriate ownership values */
SAFE_SETREGID(daemon_gr.gr_gid, bin_gr.gr_gid);
SAFE_SETEUID(nobody.pw_uid);
}
static void test_success(struct tcase *tc)
{
if (TST_RET != 0)
tst_res(TFAIL | TTERRNO, "setregid(%d, %d) failed unexpectedly",
*tc->real_gid, *tc->eff_gid);
else
tst_res(TPASS, "setregid(%d, %d) succeeded as expected",
*tc->real_gid, *tc->eff_gid);
}
static void test_failure(struct tcase *tc)
{
if (TST_RET == 0)
tst_res(TFAIL, "setregid(%d, %d) succeeded unexpectedly",
*tc->real_gid, *tc->eff_gid);
else if (TST_ERR == EPERM)
tst_res(TPASS, "setregid(%d, %d) failed as expected",
*tc->real_gid, *tc->eff_gid);
else
tst_res(TFAIL | TTERRNO,
"setregid(%d, %d) did not set errno value as expected",
*tc->real_gid, *tc->eff_gid);
}
static void gid_verify(struct group *rg, struct group *eg, char *when)
{
if ((getgid() != rg->gr_gid) || (getegid() != eg->gr_gid)) {
tst_res(TFAIL, "ERROR: %s real gid = %d; effective gid = %d",
when, getgid(), getegid());
tst_res(TINFO, "Expected: real gid = %d; effective gid = %d",
rg->gr_gid, eg->gr_gid);
} else {
tst_res(TPASS,
"real or effective gid was modified as expected");
}
}
static void run(unsigned int i)
{
struct tcase *tc = &tcases[i];
/* Set the real or effective group id */
TEST(SETREGID(*tc->real_gid, *tc->eff_gid));
if (*tc->exp_ret == 0)
test_success(tc);
else
test_failure(tc);
gid_verify(tc->exp_real_usr, tc->exp_eff_usr, tc->test_msg);
}
void run_all(void)
{
unsigned int i;
if (!SAFE_FORK()) {
for (i = 0; i < ARRAY_SIZE(tcases); i++)
run(i);
}
}
static struct tst_test test = {
.needs_root = 1,
.forks_child = 1,
.test_all = run_all,
.setup = setup,
};