aboutsummaryrefslogtreecommitdiff
path: root/testcases/kernel/syscalls/capset/capset04.c
blob: 13477a4a98f2a931971fd5ee00792981ec59f692 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
// SPDX-License-Identifier: GPL-2.0-or-later
/*
 * Copyright (c) Wipro Technologies Ltd, 2002.  All Rights Reserved.
 * Copyright (c) Linux Test Project, 2020-2023
 * Author: Saji Kumar.V.R <saji.kumar@wipro.com>
 */

/*\
 * [Description]
 *
 * Test whether capset() can be used to modify the capabilities of a thread
 * other than itself. Now, most linux distributions with kernel supporting
 * VFS capabilities, this should be never permitted.
 */

#include <stdlib.h>
#include <sys/types.h>
#include <unistd.h>
#include "tst_test.h"
#include "lapi/syscalls.h"
#include <linux/capability.h>

static struct __user_cap_header_struct *header;
static struct __user_cap_data_struct *data;
static pid_t child_pid;

static void verify_capset(void)
{
	child_pid = SAFE_FORK();
	if (!child_pid)
		pause();

	tst_res(TINFO, "Test capset() for a different process");

	header->pid = child_pid;

	TST_EXP_FAIL(tst_syscall(__NR_capset, header, data), EPERM, "capset()");

	SAFE_KILL(child_pid, SIGTERM);
	SAFE_WAIT(NULL);
}

static void setup(void)
{
	header->version = 0x20080522;
	TEST(tst_syscall(__NR_capget, header, data));
	if (TST_RET == -1)
		tst_brk(TBROK | TTERRNO, "capget data failed");
}

static struct tst_test test = {
	.setup = setup,
	.test_all = verify_capset,
	.forks_child = 1,
	.bufs = (struct tst_buffers []) {
		{&header, .size = sizeof(*header)},
		{&data, .size = 2 * sizeof(*data)},
		{},
	}
};