1*068fb4f1Sjruoho /* $NetBSD: t_setuid.c,v 1.1 2011/07/07 06:57:54 jruoho Exp $ */
2*068fb4f1Sjruoho
3*068fb4f1Sjruoho /*-
4*068fb4f1Sjruoho * Copyright (c) 2011 The NetBSD Foundation, Inc.
5*068fb4f1Sjruoho * All rights reserved.
6*068fb4f1Sjruoho *
7*068fb4f1Sjruoho * This code is derived from software contributed to The NetBSD Foundation
8*068fb4f1Sjruoho * by Jukka Ruohonen.
9*068fb4f1Sjruoho *
10*068fb4f1Sjruoho * Redistribution and use in source and binary forms, with or without
11*068fb4f1Sjruoho * modification, are permitted provided that the following conditions
12*068fb4f1Sjruoho * are met:
13*068fb4f1Sjruoho * 1. Redistributions of source code must retain the above copyright
14*068fb4f1Sjruoho * notice, this list of conditions and the following disclaimer.
15*068fb4f1Sjruoho * 2. Redistributions in binary form must reproduce the above copyright
16*068fb4f1Sjruoho * notice, this list of conditions and the following disclaimer in the
17*068fb4f1Sjruoho * documentation and/or other materials provided with the distribution.
18*068fb4f1Sjruoho *
19*068fb4f1Sjruoho * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20*068fb4f1Sjruoho * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21*068fb4f1Sjruoho * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22*068fb4f1Sjruoho * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23*068fb4f1Sjruoho * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24*068fb4f1Sjruoho * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25*068fb4f1Sjruoho * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26*068fb4f1Sjruoho * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27*068fb4f1Sjruoho * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28*068fb4f1Sjruoho * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29*068fb4f1Sjruoho * POSSIBILITY OF SUCH DAMAGE.
30*068fb4f1Sjruoho */
31*068fb4f1Sjruoho #include <sys/cdefs.h>
32*068fb4f1Sjruoho __RCSID("$NetBSD: t_setuid.c,v 1.1 2011/07/07 06:57:54 jruoho Exp $");
33*068fb4f1Sjruoho
34*068fb4f1Sjruoho #include <sys/wait.h>
35*068fb4f1Sjruoho
36*068fb4f1Sjruoho #include <atf-c.h>
37*068fb4f1Sjruoho #include <errno.h>
38*068fb4f1Sjruoho #include <pwd.h>
39*068fb4f1Sjruoho #include <stdlib.h>
40*068fb4f1Sjruoho #include <unistd.h>
41*068fb4f1Sjruoho
42*068fb4f1Sjruoho ATF_TC(setuid_perm);
ATF_TC_HEAD(setuid_perm,tc)43*068fb4f1Sjruoho ATF_TC_HEAD(setuid_perm, tc)
44*068fb4f1Sjruoho {
45*068fb4f1Sjruoho atf_tc_set_md_var(tc, "descr", "Test setuid(0) as normal user");
46*068fb4f1Sjruoho atf_tc_set_md_var(tc, "require.user", "unprivileged");
47*068fb4f1Sjruoho }
48*068fb4f1Sjruoho
ATF_TC_BODY(setuid_perm,tc)49*068fb4f1Sjruoho ATF_TC_BODY(setuid_perm, tc)
50*068fb4f1Sjruoho {
51*068fb4f1Sjruoho errno = 0;
52*068fb4f1Sjruoho
53*068fb4f1Sjruoho ATF_REQUIRE(setuid(0) == -1);
54*068fb4f1Sjruoho ATF_REQUIRE(errno == EPERM);
55*068fb4f1Sjruoho }
56*068fb4f1Sjruoho
57*068fb4f1Sjruoho ATF_TC(setuid_real);
ATF_TC_HEAD(setuid_real,tc)58*068fb4f1Sjruoho ATF_TC_HEAD(setuid_real, tc)
59*068fb4f1Sjruoho {
60*068fb4f1Sjruoho atf_tc_set_md_var(tc, "descr", "Test setuid(2) with real UID");
61*068fb4f1Sjruoho }
62*068fb4f1Sjruoho
ATF_TC_BODY(setuid_real,tc)63*068fb4f1Sjruoho ATF_TC_BODY(setuid_real, tc)
64*068fb4f1Sjruoho {
65*068fb4f1Sjruoho uid_t uid = getuid();
66*068fb4f1Sjruoho
67*068fb4f1Sjruoho ATF_REQUIRE(setuid(uid) == 0);
68*068fb4f1Sjruoho
69*068fb4f1Sjruoho ATF_REQUIRE(getuid() == uid);
70*068fb4f1Sjruoho ATF_REQUIRE(geteuid() == uid);
71*068fb4f1Sjruoho }
72*068fb4f1Sjruoho
73*068fb4f1Sjruoho ATF_TC(setuid_root);
ATF_TC_HEAD(setuid_root,tc)74*068fb4f1Sjruoho ATF_TC_HEAD(setuid_root, tc)
75*068fb4f1Sjruoho {
76*068fb4f1Sjruoho atf_tc_set_md_var(tc, "descr", "A basic test of setuid(2)");
77*068fb4f1Sjruoho atf_tc_set_md_var(tc, "require.user", "root");
78*068fb4f1Sjruoho }
79*068fb4f1Sjruoho
ATF_TC_BODY(setuid_root,tc)80*068fb4f1Sjruoho ATF_TC_BODY(setuid_root, tc)
81*068fb4f1Sjruoho {
82*068fb4f1Sjruoho struct passwd *pw;
83*068fb4f1Sjruoho int rv, sta;
84*068fb4f1Sjruoho pid_t pid;
85*068fb4f1Sjruoho uid_t uid;
86*068fb4f1Sjruoho
87*068fb4f1Sjruoho while ((pw = getpwent()) != NULL) {
88*068fb4f1Sjruoho
89*068fb4f1Sjruoho pid = fork();
90*068fb4f1Sjruoho ATF_REQUIRE(pid >= 0);
91*068fb4f1Sjruoho
92*068fb4f1Sjruoho if (pid == 0) {
93*068fb4f1Sjruoho
94*068fb4f1Sjruoho rv = setuid(pw->pw_uid);
95*068fb4f1Sjruoho
96*068fb4f1Sjruoho if (rv != 0)
97*068fb4f1Sjruoho _exit(EXIT_FAILURE);
98*068fb4f1Sjruoho
99*068fb4f1Sjruoho uid = getuid();
100*068fb4f1Sjruoho
101*068fb4f1Sjruoho if (uid != pw->pw_uid)
102*068fb4f1Sjruoho _exit(EXIT_FAILURE);
103*068fb4f1Sjruoho
104*068fb4f1Sjruoho _exit(EXIT_SUCCESS);
105*068fb4f1Sjruoho }
106*068fb4f1Sjruoho
107*068fb4f1Sjruoho (void)wait(&sta);
108*068fb4f1Sjruoho
109*068fb4f1Sjruoho if (WIFEXITED(sta) == 0 || WEXITSTATUS(sta) != EXIT_SUCCESS)
110*068fb4f1Sjruoho atf_tc_fail("failed to change UID to %u", pw->pw_uid);
111*068fb4f1Sjruoho }
112*068fb4f1Sjruoho }
113*068fb4f1Sjruoho
ATF_TP_ADD_TCS(tp)114*068fb4f1Sjruoho ATF_TP_ADD_TCS(tp)
115*068fb4f1Sjruoho {
116*068fb4f1Sjruoho
117*068fb4f1Sjruoho ATF_TP_ADD_TC(tp, setuid_perm);
118*068fb4f1Sjruoho ATF_TP_ADD_TC(tp, setuid_real);
119*068fb4f1Sjruoho ATF_TP_ADD_TC(tp, setuid_root);
120*068fb4f1Sjruoho
121*068fb4f1Sjruoho return atf_no_error();
122*068fb4f1Sjruoho }
123