/*
* Copyright (c) 2016 Cyril Hrubis <chrubis@suse.cz>
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
/*
* This is a regression test for write race that allows unprivileged programs
* to change readonly files on the system.
*
* It has been fixed long time ago:
*
* commit 4ceb5db9757aaeadcf8fbbf97d76bd42aa4df0d6
* Author: Linus Torvalds <torvalds@g5.osdl.org>
* Date: Mon Aug 1 11:14:49 2005 -0700
*
* Fix get_user_pages() race for write access
*
* Then it reappeared and was fixed again in:
*
* commit 19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619
* Author: Linus Torvalds <torvalds@linux-foundation.org>
* Date: Thu Oct 13 20:07:36 2016 GMT
*
* mm: remove gup_flags FOLL_WRITE games from __get_user_pages()
*/
#include <sys/mman.h>
#include <fcntl.h>
#include <pthread.h>
#include <unistd.h>
#include <sys/stat.h>
#include <string.h>
#include <stdlib.h>
#include <pwd.h>
#include "tst_test.h"
#define FNAME "test"
#define STR "this is not a test\n"
static uid_t nobody_uid;
static gid_t nobody_gid;
static void setup(void)
{
struct passwd *pw;
pw = SAFE_GETPWNAM("nobody");
nobody_uid = pw->pw_uid;
nobody_gid = pw->pw_gid;
}
void dirtyc0w_test(void)
{
int i, fd, pid, fail = 0;
char c;
/* Create file */
fd = SAFE_OPEN(FNAME, O_WRONLY|O_CREAT|O_EXCL, 0444);
SAFE_WRITE(1, fd, STR, sizeof(STR)-1);
SAFE_CLOSE(fd);
pid = SAFE_FORK();
if (!pid) {
SAFE_SETGID(nobody_gid);
SAFE_SETUID(nobody_uid);
SAFE_EXECLP("dirtyc0w_child", "dirtyc0w_child", NULL);
}
TST_CHECKPOINT_WAIT(0);
for (i = 0; i < 100; i++) {
usleep(10000);
SAFE_FILE_SCANF(FNAME, "%c", &c);
if (c != 't') {
fail = 1;
break;
}
}
SAFE_KILL(pid, SIGUSR1);
tst_reap_children();
SAFE_UNLINK(FNAME);
if (fail)
tst_res(TFAIL, "Bug reproduced!");
else
tst_res(TPASS, "Bug not reproduced");
}
static struct tst_test test = {
.needs_tmpdir = 1,
.needs_checkpoints = 1,
.forks_child = 1,
.needs_root = 1,
.setup = setup,
.test_all = dirtyc0w_test,
};