1272343Sngie/* $NetBSD: t_issetugid.c,v 1.1 2011/07/07 06:57:53 jruoho Exp $ */
2272343Sngie
3272343Sngie/*-
4272343Sngie * Copyright (c) 2011 The NetBSD Foundation, Inc.
5272343Sngie * All rights reserved.
6272343Sngie *
7272343Sngie * This code is derived from software contributed to The NetBSD Foundation
8272343Sngie * by Jukka Ruohonen.
9272343Sngie *
10272343Sngie * Redistribution and use in source and binary forms, with or without
11272343Sngie * modification, are permitted provided that the following conditions
12272343Sngie * are met:
13272343Sngie * 1. Redistributions of source code must retain the above copyright
14272343Sngie *    notice, this list of conditions and the following disclaimer.
15272343Sngie * 2. Redistributions in binary form must reproduce the above copyright
16272343Sngie *    notice, this list of conditions and the following disclaimer in the
17272343Sngie *    documentation and/or other materials provided with the distribution.
18272343Sngie *
19272343Sngie * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20272343Sngie * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21272343Sngie * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22272343Sngie * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23272343Sngie * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24272343Sngie * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25272343Sngie * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26272343Sngie * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27272343Sngie * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28272343Sngie * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29272343Sngie * POSSIBILITY OF SUCH DAMAGE.
30272343Sngie */
31272343Sngie#include <sys/cdefs.h>
32272343Sngie__RCSID("$NetBSD: t_issetugid.c,v 1.1 2011/07/07 06:57:53 jruoho Exp $");
33272343Sngie
34272343Sngie#include <sys/wait.h>
35272343Sngie
36272343Sngie#include <atf-c.h>
37272343Sngie#include <errno.h>
38272343Sngie#include <pwd.h>
39272343Sngie#include <stdlib.h>
40272343Sngie#include <unistd.h>
41272343Sngie
42272343Sngiestatic bool check(int (*fuid)(uid_t), int (*fgid)(gid_t));
43272343Sngie
44272343Sngiestatic bool
45272343Sngiecheck(int (*fuid)(uid_t), int (*fgid)(gid_t))
46272343Sngie{
47272343Sngie	struct passwd *pw;
48272343Sngie	pid_t pid;
49272343Sngie	int sta;
50272343Sngie
51272343Sngie	pw = getpwnam("nobody");
52272343Sngie
53272343Sngie	if (pw == NULL)
54272343Sngie		return false;
55272343Sngie
56272343Sngie	pid = fork();
57272343Sngie
58272343Sngie	if (pid < 0)
59272343Sngie		return false;
60272343Sngie
61272343Sngie	if (pid == 0) {
62272343Sngie
63272343Sngie		if (fuid != NULL && (*fuid)(pw->pw_uid) != 0)
64272343Sngie			_exit(EXIT_FAILURE);
65272343Sngie
66272343Sngie		if (fgid != NULL && (*fgid)(pw->pw_gid) != 0)
67272343Sngie			_exit(EXIT_FAILURE);
68272343Sngie
69272343Sngie		if (issetugid() != 1)
70272343Sngie			_exit(EXIT_FAILURE);
71272343Sngie
72272343Sngie		_exit(EXIT_SUCCESS);
73272343Sngie	}
74272343Sngie
75272343Sngie	(void)wait(&sta);
76272343Sngie
77272343Sngie	if (WIFEXITED(sta) == 0 || WEXITSTATUS(sta) != EXIT_SUCCESS)
78272343Sngie		return false;
79272343Sngie
80272343Sngie	return true;
81272343Sngie}
82272343Sngie
83272343SngieATF_TC(issetugid_egid);
84272343SngieATF_TC_HEAD(issetugid_egid, tc)
85272343Sngie{
86272343Sngie	atf_tc_set_md_var(tc, "descr", "A test of issetugid(2), eff. GID");
87272343Sngie	atf_tc_set_md_var(tc, "require.user", "root");
88272343Sngie}
89272343Sngie
90272343SngieATF_TC_BODY(issetugid_egid, tc)
91272343Sngie{
92272343Sngie
93272343Sngie	if (check(NULL, setegid) != true)
94272343Sngie		atf_tc_fail("issetugid(2) failed with effective GID");
95272343Sngie}
96272343Sngie
97272343SngieATF_TC(issetugid_euid);
98272343SngieATF_TC_HEAD(issetugid_euid, tc)
99272343Sngie{
100272343Sngie	atf_tc_set_md_var(tc, "descr", "A test of issetugid(2), eff. UID");
101272343Sngie	atf_tc_set_md_var(tc, "require.user", "root");
102272343Sngie}
103272343Sngie
104272343SngieATF_TC_BODY(issetugid_euid, tc)
105272343Sngie{
106272343Sngie
107272343Sngie	if (check(seteuid, NULL) != true)
108272343Sngie		atf_tc_fail("issetugid(2) failed with effective UID");
109272343Sngie}
110272343Sngie
111272343SngieATF_TC(issetugid_rgid);
112272343SngieATF_TC_HEAD(issetugid_rgid, tc)
113272343Sngie{
114272343Sngie	atf_tc_set_md_var(tc, "descr", "A test of issetugid(2), real GID");
115272343Sngie	atf_tc_set_md_var(tc, "require.user", "root");
116272343Sngie}
117272343Sngie
118272343SngieATF_TC_BODY(issetugid_rgid, tc)
119272343Sngie{
120272343Sngie
121272343Sngie	if (check(NULL, setgid) != true)
122272343Sngie		atf_tc_fail("issetugid(2) failed with real GID");
123272343Sngie}
124272343Sngie
125272343SngieATF_TC(issetugid_ruid);
126272343SngieATF_TC_HEAD(issetugid_ruid, tc)
127272343Sngie{
128272343Sngie	atf_tc_set_md_var(tc, "descr", "A test of issetugid(2), real UID");
129272343Sngie	atf_tc_set_md_var(tc, "require.user", "root");
130272343Sngie}
131272343Sngie
132272343SngieATF_TC_BODY(issetugid_ruid, tc)
133272343Sngie{
134272343Sngie
135272343Sngie	if (check(setuid, NULL) != true)
136272343Sngie		atf_tc_fail("issetugid(2) failed with real UID");
137272343Sngie}
138272343Sngie
139272343SngieATF_TP_ADD_TCS(tp)
140272343Sngie{
141272343Sngie
142272343Sngie	ATF_TP_ADD_TC(tp, issetugid_egid);
143272343Sngie	ATF_TP_ADD_TC(tp, issetugid_euid);
144272343Sngie	ATF_TP_ADD_TC(tp, issetugid_rgid);
145272343Sngie	ATF_TP_ADD_TC(tp, issetugid_ruid);
146272343Sngie
147272343Sngie	return atf_no_error();
148272343Sngie}
149