blob: 26596b6f9f65d091ff6c90c9f098f036270e90e3 [file] [log] [blame]
// Program b215283 requires privilege to execute and is a minimally adapted
// version of a test case provided by Lorenz Bauer as a reproducer for a
// problem he found and reported in:
//
// https://bugzilla.kernel.org/show_bug.cgi?id=215283
package main
import (
"fmt"
"os"
"kernel.org/pub/linux/libs/security/libcap/cap"
)
func main() {
const secbits = cap.SecbitNoRoot | cap.SecbitNoSetUIDFixup
if v, err := cap.GetProc().GetFlag(cap.Permitted, cap.SETPCAP); err != nil {
panic(fmt.Sprintf("failed to get flag value: %v", err))
os.Exit(1)
} else if !v {
fmt.Printf("test requires cap_setpcap: found %q\n", cap.GetProc())
os.Exit(1)
}
if bits := cap.GetSecbits(); bits != 0 {
fmt.Printf("test expects secbits=0 to run; found: 0%o\n", bits)
os.Exit(1)
}
fmt.Println("secbits:", cap.GetSecbits(), " caps:", cap.GetProc())
l := cap.FuncLauncher(func(interface{}) error {
return cap.NewSet().SetProc()
})
if _, err := l.Launch(nil); err != nil {
fmt.Printf("launch failed: %v\n", err)
os.Exit(1)
}
fmt.Println("secbits:", cap.GetSecbits(), " caps:", cap.GetProc())
if err := secbits.Set(); err != nil {
fmt.Printf("set securebits: %v", err.Error())
os.Exit(1)
}
}