| xf.li | bdd93d5 | 2023-05-12 07:10:14 -0700 | [diff] [blame] | 1 | /* Copyright (C) 2012-2016 Free Software Foundation, Inc. | 
 | 2 |    This file is part of the GNU C Library. | 
 | 3 |  | 
 | 4 |    The GNU C Library is free software; you can redistribute it and/or | 
 | 5 |    modify it under the terms of the GNU Lesser General Public | 
 | 6 |    License as published by the Free Software Foundation; either | 
 | 7 |    version 2.1 of the License, or (at your option) any later version. | 
 | 8 |  | 
 | 9 |    The GNU C Library is distributed in the hope that it will be useful, | 
 | 10 |    but WITHOUT ANY WARRANTY; without even the implied warranty of | 
 | 11 |    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU | 
 | 12 |    Lesser General Public License for more details. | 
 | 13 |  | 
 | 14 |    You should have received a copy of the GNU Lesser General Public | 
 | 15 |    License along with the GNU C Library; if not, see | 
 | 16 |    <http://www.gnu.org/licenses/>.  */ | 
 | 17 |  | 
 | 18 | /* Test that secure_getenv works by invoking the test as a SGID | 
 | 19 |    program with a group ID from the supplementary group list.  This | 
 | 20 |    test can fail spuriously if the user is not a member of a suitable | 
 | 21 |    supplementary group.  */ | 
 | 22 |  | 
 | 23 | #include <errno.h> | 
 | 24 | #include <fcntl.h> | 
 | 25 | #include <stdlib.h> | 
 | 26 | #include <stdint.h> | 
 | 27 | #include <stdio.h> | 
 | 28 | #include <string.h> | 
 | 29 | #include <sys/stat.h> | 
 | 30 | #include <sys/wait.h> | 
 | 31 | #include <unistd.h> | 
 | 32 |  | 
 | 33 | static char MAGIC_ARGUMENT[] = "run-actual-test"; | 
 | 34 | #define MAGIC_STATUS 19 | 
 | 35 |  | 
 | 36 | static const char *test_dir; | 
 | 37 |  | 
 | 38 | /* Return a GID which is not our current GID, but is present in the | 
 | 39 |    supplementary group list.  */ | 
 | 40 | static gid_t | 
 | 41 | choose_gid (void) | 
 | 42 | { | 
 | 43 |   const int count = 64; | 
 | 44 |   gid_t groups[count]; | 
 | 45 |   int ret = getgroups (count, groups); | 
 | 46 |   if (ret < 0) | 
 | 47 |     { | 
 | 48 |       printf ("getgroups: %m\n"); | 
 | 49 |       exit (1); | 
 | 50 |     } | 
 | 51 |   gid_t current = getgid (); | 
 | 52 |   for (int i = 0; i < ret; ++i) | 
 | 53 |     { | 
 | 54 |       if (groups[i] != current) | 
 | 55 | 	return groups[i]; | 
 | 56 |     } | 
 | 57 |   return 0; | 
 | 58 | } | 
 | 59 |  | 
 | 60 |  | 
 | 61 | /* Copies the executable into a restricted directory, so that we can | 
 | 62 |    safely make it SGID with the TARGET group ID.  Then runs the | 
 | 63 |    executable.  */ | 
 | 64 | static int | 
 | 65 | run_executable_sgid (gid_t target) | 
 | 66 | { | 
 | 67 |   char *dirname = 0; | 
 | 68 |   char *execname = 0; | 
 | 69 |   int infd = -1; | 
 | 70 |   int outfd = -1; | 
 | 71 |   int ret = -1; | 
 | 72 |   if (asprintf (&dirname, "%s/secure-getenv.%jd", | 
 | 73 | 		test_dir, (intmax_t) getpid ()) < 0) | 
 | 74 |     { | 
 | 75 |       printf ("asprintf: %m\n"); | 
 | 76 |       goto err; | 
 | 77 |     } | 
 | 78 |   if (mkdir (dirname, 0700) < 0) | 
 | 79 |     { | 
 | 80 |       printf ("mkdir: %m\n"); | 
 | 81 |       goto err; | 
 | 82 |     } | 
 | 83 |   if (asprintf (&execname, "%s/bin", dirname) < 0) | 
 | 84 |     { | 
 | 85 |       printf ("asprintf: %m\n"); | 
 | 86 |       goto err; | 
 | 87 |     } | 
 | 88 |   infd = open ("/proc/self/exe", O_RDONLY); | 
 | 89 |   if (infd < 0) | 
 | 90 |     { | 
 | 91 |       printf ("open (/proc/self/exe): %m\n"); | 
 | 92 |       goto err; | 
 | 93 |     } | 
 | 94 |   outfd = open (execname, O_WRONLY | O_CREAT | O_EXCL, 0700); | 
 | 95 |   if (outfd < 0) | 
 | 96 |     { | 
 | 97 |       printf ("open (%s): %m\n", execname); | 
 | 98 |       goto err; | 
 | 99 |     } | 
 | 100 |   char buf[4096]; | 
 | 101 |   for (;;) | 
 | 102 |     { | 
 | 103 |       ssize_t rdcount = read (infd, buf, sizeof (buf)); | 
 | 104 |       if (rdcount < 0) | 
 | 105 | 	{ | 
 | 106 | 	  printf ("read: %m\n"); | 
 | 107 | 	  goto err; | 
 | 108 | 	} | 
 | 109 |       if (rdcount == 0) | 
 | 110 | 	break; | 
 | 111 |       char *p = buf; | 
 | 112 |       char *end = buf + rdcount; | 
 | 113 |       while (p != end) | 
 | 114 | 	{ | 
 | 115 | 	  ssize_t wrcount = write (outfd, buf, end - p); | 
 | 116 | 	  if (wrcount == 0) | 
 | 117 | 	    errno = ENOSPC; | 
 | 118 | 	  if (wrcount <= 0) | 
 | 119 | 	    { | 
 | 120 | 	      printf ("write: %m\n"); | 
 | 121 | 	      goto err; | 
 | 122 | 	    } | 
 | 123 | 	  p += wrcount; | 
 | 124 | 	} | 
 | 125 |     } | 
 | 126 |   if (fchown (outfd, getuid (), target) < 0) | 
 | 127 |     { | 
 | 128 |       printf ("fchown (%s): %m\n", execname); | 
 | 129 |       goto err; | 
 | 130 |     } | 
 | 131 |   if (fchmod (outfd, 02750) < 0) | 
 | 132 |     { | 
 | 133 |       printf ("fchmod (%s): %m\n", execname); | 
 | 134 |       goto err; | 
 | 135 |     } | 
 | 136 |   if (close (outfd) < 0) | 
 | 137 |     { | 
 | 138 |       printf ("close (outfd): %m\n"); | 
 | 139 |       goto err; | 
 | 140 |     } | 
 | 141 |   if (close (infd) < 0) | 
 | 142 |     { | 
 | 143 |       printf ("close (infd): %m\n"); | 
 | 144 |       goto err; | 
 | 145 |     } | 
 | 146 |  | 
 | 147 |   int kid = fork (); | 
 | 148 |   if (kid < 0) | 
 | 149 |     { | 
 | 150 |       printf ("fork: %m\n"); | 
 | 151 |       goto err; | 
 | 152 |     } | 
 | 153 |   if (kid == 0) | 
 | 154 |     { | 
 | 155 |       /* Child process.  */ | 
 | 156 |       char *args[] = { execname, MAGIC_ARGUMENT, NULL }; | 
 | 157 |       execve (execname, args, environ); | 
 | 158 |       printf ("execve (%s): %m\n", execname); | 
 | 159 |       _exit (1); | 
 | 160 |     } | 
 | 161 |   int status; | 
 | 162 |   if (waitpid (kid, &status, 0) < 0) | 
 | 163 |     { | 
 | 164 |       printf ("waitpid: %m\n"); | 
 | 165 |       goto err; | 
 | 166 |     } | 
 | 167 |   if (!WIFEXITED (status) || WEXITSTATUS (status) != MAGIC_STATUS) | 
 | 168 |     { | 
 | 169 |       printf ("Unexpected exit status %d from child process\n", | 
 | 170 | 	      status); | 
 | 171 |       goto err; | 
 | 172 |     } | 
 | 173 |   ret = 0; | 
 | 174 |  | 
 | 175 | err: | 
 | 176 |   if (outfd >= 0) | 
 | 177 |     close (outfd); | 
 | 178 |   if (infd >= 0) | 
 | 179 |     close (infd); | 
 | 180 |   if (execname) | 
 | 181 |     { | 
 | 182 |       unlink (execname); | 
 | 183 |       free (execname); | 
 | 184 |     } | 
 | 185 |   if (dirname) | 
 | 186 |     { | 
 | 187 |       rmdir (dirname); | 
 | 188 |       free (dirname); | 
 | 189 |     } | 
 | 190 |   return ret; | 
 | 191 | } | 
 | 192 |  | 
 | 193 | static int | 
 | 194 | do_test (void) | 
 | 195 | { | 
 | 196 |   if (getenv ("PATH") == NULL) | 
 | 197 |     { | 
 | 198 |       printf ("PATH not set\n"); | 
 | 199 |       exit (1); | 
 | 200 |     } | 
 | 201 |   if (secure_getenv ("PATH") == NULL) | 
 | 202 |     { | 
 | 203 |       printf ("PATH not set according to secure_getenv\n"); | 
 | 204 |       exit (1); | 
 | 205 |     } | 
 | 206 |   if (strcmp (getenv ("PATH"), secure_getenv ("PATH")) != 0) | 
 | 207 |     { | 
 | 208 |       printf ("PATH mismatch (%s, %s)\n", | 
 | 209 | 	      getenv ("PATH"), secure_getenv ("PATH")); | 
 | 210 |       exit (1); | 
 | 211 |     } | 
 | 212 |  | 
 | 213 |   gid_t target = choose_gid (); | 
 | 214 |   if (target == 0) | 
 | 215 |     { | 
 | 216 |       fprintf (stderr, | 
 | 217 | 	       "Could not find a suitable GID for user %jd, skipping test\n", | 
 | 218 | 	       (intmax_t) getuid ()); | 
 | 219 |       exit (0); | 
 | 220 |     } | 
 | 221 |   return run_executable_sgid (target); | 
 | 222 | } | 
 | 223 |  | 
 | 224 | static void | 
 | 225 | alternative_main (int argc, char **argv) | 
 | 226 | { | 
 | 227 |   if (argc == 2 && strcmp (argv[1], MAGIC_ARGUMENT) == 0) | 
 | 228 |     { | 
 | 229 |       if (getgid () == getegid ()) | 
 | 230 | 	{ | 
 | 231 | 	  /* This can happen if the file system is mounted nosuid.  */ | 
 | 232 | 	  fprintf (stderr, "SGID failed: GID and EGID match (%jd)\n", | 
 | 233 | 		  (intmax_t) getgid ()); | 
 | 234 | 	  exit (MAGIC_STATUS); | 
 | 235 | 	} | 
 | 236 |       if (getenv ("PATH") == NULL) | 
 | 237 | 	{ | 
 | 238 | 	  printf ("PATH variable not present\n"); | 
 | 239 | 	  exit (3); | 
 | 240 | 	} | 
 | 241 |       if (secure_getenv ("PATH") != NULL) | 
 | 242 | 	{ | 
 | 243 | 	  printf ("PATH variable not filtered out\n"); | 
 | 244 | 	  exit (4); | 
 | 245 | 	} | 
 | 246 |       exit (MAGIC_STATUS); | 
 | 247 |     } | 
 | 248 | } | 
 | 249 |  | 
 | 250 | #define PREPARE(argc, argv) alternative_main(argc, argv) | 
 | 251 | #define TEST_FUNCTION do_test () | 
 | 252 | #include "../test-skeleton.c" |