blob: ed0f66323ec7af70d5b26edf982a7a53549f8ab0 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
|
// SPDX-License-Identifier: GPL-2.0-or-later
/*
* Copyright (C) Bull S.A. 2001
* Copyright (c) International Business Machines Corp., 2001
*
* 04/2002 Ported by Jacky Malcles
*/
/*\
* [Description]
*
* Testcase to check that chroot sets errno to EACCES.
*
* As a non-root user attempt to perform chroot() to a directory that the user
* does not have a search permission for. The chroot() call should fail with
* EACESS.
*/
#include <stdio.h>
#include <pwd.h>
#include "tst_test.h"
#define TEST_TMPDIR "chroot04_tmpdir"
static void verify_chroot(void)
{
TST_EXP_FAIL(chroot(TEST_TMPDIR), EACCES, "no search permission chroot()");
}
static void setup(void)
{
struct passwd *ltpuser;
SAFE_MKDIR(TEST_TMPDIR, 0222);
ltpuser = SAFE_GETPWNAM("nobody");
SAFE_SETEUID(ltpuser->pw_uid);
}
static struct tst_test test = {
.setup = setup,
.test_all = verify_chroot,
.needs_root = 1,
.needs_tmpdir = 1,
};
|