unplugged-system/external/ltp/testcases/kernel/syscalls/setresuid/setresuid03.c

77 lines
1.8 KiB
C

// SPDX-License-Identifier: GPL-2.0-or-later
/*
* Copyright (c) International Business Machines Corp., 2001
* 07/2001 ported by John George
* Copyright (C) 2021 SUSE LLC <mdoucha@suse.cz>
*/
/*\
* [Description]
*
* Test that the setresuid system call sets the proper errno values when
* a non-root user attempts to change the real, effective or saved uid
* to a value other than one of the current uid, the current effective uid
* or the current saved uid.
*/
#include "tst_test.h"
#include "tst_uid.h"
#include "compat_tst_16.h"
static uid_t root_uid, main_uid, other_uid, neg_one = -1;
static struct test_data_t {
uid_t *real_uid;
uid_t *eff_uid;
uid_t *sav_uid;
int exp_errno;
uid_t *exp_real_uid;
uid_t *exp_eff_uid;
uid_t *exp_sav_uid;
char *test_msg;
} test_data[] = {
{&other_uid, &neg_one, &neg_one, EPERM, &root_uid, &main_uid,
&main_uid, "setresuid(other, -1, -1)"},
{&neg_one, &neg_one, &other_uid, EPERM, &root_uid, &main_uid,
&main_uid, "setresuid(-1, -1, other)"},
{&neg_one, &other_uid, &neg_one, EPERM, &root_uid, &main_uid,
&main_uid, "setresuid(-1, other, -1)"}
};
static void setup(void)
{
uid_t test_users[2];
root_uid = getuid();
tst_get_uids(test_users, 0, 2);
main_uid = test_users[0];
other_uid = test_users[1];
UID16_CHECK(root_uid, setresuid);
UID16_CHECK(main_uid, setresuid);
UID16_CHECK(other_uid, setresuid);
SAFE_SETRESUID(root_uid, main_uid, main_uid);
}
static void run(unsigned int n)
{
const struct test_data_t *tc = test_data + n;
TST_EXP_FAIL(SETRESUID(*tc->real_uid, *tc->eff_uid, *tc->sav_uid),
tc->exp_errno, "%s", tc->test_msg);
if (!TST_PASS)
return;
tst_check_resuid(tc->test_msg, *tc->exp_real_uid, *tc->exp_eff_uid,
*tc->exp_sav_uid);
}
static struct tst_test test = {
.test = run,
.tcnt = ARRAY_SIZE(test_data),
.setup = setup,
.needs_root = 1,
};