1*b0d29bc4SBrooks Davis // Copyright 2014 The Kyua Authors.
2*b0d29bc4SBrooks Davis // All rights reserved.
3*b0d29bc4SBrooks Davis //
4*b0d29bc4SBrooks Davis // Redistribution and use in source and binary forms, with or without
5*b0d29bc4SBrooks Davis // modification, are permitted provided that the following conditions are
6*b0d29bc4SBrooks Davis // met:
7*b0d29bc4SBrooks Davis //
8*b0d29bc4SBrooks Davis // * Redistributions of source code must retain the above copyright
9*b0d29bc4SBrooks Davis // notice, this list of conditions and the following disclaimer.
10*b0d29bc4SBrooks Davis // * Redistributions in binary form must reproduce the above copyright
11*b0d29bc4SBrooks Davis // notice, this list of conditions and the following disclaimer in the
12*b0d29bc4SBrooks Davis // documentation and/or other materials provided with the distribution.
13*b0d29bc4SBrooks Davis // * Neither the name of Google Inc. nor the names of its contributors
14*b0d29bc4SBrooks Davis // may be used to endorse or promote products derived from this software
15*b0d29bc4SBrooks Davis // without specific prior written permission.
16*b0d29bc4SBrooks Davis //
17*b0d29bc4SBrooks Davis // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
18*b0d29bc4SBrooks Davis // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
19*b0d29bc4SBrooks Davis // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
20*b0d29bc4SBrooks Davis // A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
21*b0d29bc4SBrooks Davis // OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
22*b0d29bc4SBrooks Davis // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
23*b0d29bc4SBrooks Davis // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
24*b0d29bc4SBrooks Davis // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
25*b0d29bc4SBrooks Davis // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
26*b0d29bc4SBrooks Davis // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
27*b0d29bc4SBrooks Davis // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28*b0d29bc4SBrooks Davis
29*b0d29bc4SBrooks Davis #include "utils/process/isolation.hpp"
30*b0d29bc4SBrooks Davis
31*b0d29bc4SBrooks Davis extern "C" {
32*b0d29bc4SBrooks Davis #include <sys/stat.h>
33*b0d29bc4SBrooks Davis
34*b0d29bc4SBrooks Davis #include <grp.h>
35*b0d29bc4SBrooks Davis #include <signal.h>
36*b0d29bc4SBrooks Davis #include <unistd.h>
37*b0d29bc4SBrooks Davis }
38*b0d29bc4SBrooks Davis
39*b0d29bc4SBrooks Davis #include <cerrno>
40*b0d29bc4SBrooks Davis #include <cstdlib>
41*b0d29bc4SBrooks Davis #include <cstring>
42*b0d29bc4SBrooks Davis #include <iostream>
43*b0d29bc4SBrooks Davis
44*b0d29bc4SBrooks Davis #include "utils/defs.hpp"
45*b0d29bc4SBrooks Davis #include "utils/format/macros.hpp"
46*b0d29bc4SBrooks Davis #include "utils/fs/path.hpp"
47*b0d29bc4SBrooks Davis #include "utils/env.hpp"
48*b0d29bc4SBrooks Davis #include "utils/logging/macros.hpp"
49*b0d29bc4SBrooks Davis #include "utils/optional.ipp"
50*b0d29bc4SBrooks Davis #include "utils/passwd.hpp"
51*b0d29bc4SBrooks Davis #include "utils/sanity.hpp"
52*b0d29bc4SBrooks Davis #include "utils/signals/misc.hpp"
53*b0d29bc4SBrooks Davis #include "utils/stacktrace.hpp"
54*b0d29bc4SBrooks Davis
55*b0d29bc4SBrooks Davis namespace fs = utils::fs;
56*b0d29bc4SBrooks Davis namespace passwd = utils::passwd;
57*b0d29bc4SBrooks Davis namespace process = utils::process;
58*b0d29bc4SBrooks Davis namespace signals = utils::signals;
59*b0d29bc4SBrooks Davis
60*b0d29bc4SBrooks Davis using utils::optional;
61*b0d29bc4SBrooks Davis
62*b0d29bc4SBrooks Davis
63*b0d29bc4SBrooks Davis /// Magic exit code to denote an error while preparing the subprocess.
64*b0d29bc4SBrooks Davis const int process::exit_isolation_failure = 124;
65*b0d29bc4SBrooks Davis
66*b0d29bc4SBrooks Davis
67*b0d29bc4SBrooks Davis namespace {
68*b0d29bc4SBrooks Davis
69*b0d29bc4SBrooks Davis
70*b0d29bc4SBrooks Davis static void fail(const std::string&, const int) UTILS_NORETURN;
71*b0d29bc4SBrooks Davis
72*b0d29bc4SBrooks Davis
73*b0d29bc4SBrooks Davis /// Fails the process with an errno-based error message.
74*b0d29bc4SBrooks Davis ///
75*b0d29bc4SBrooks Davis /// \param message The message to print. The errno-based string will be
76*b0d29bc4SBrooks Davis /// appended to this, just like in perror(3).
77*b0d29bc4SBrooks Davis /// \param original_errno The error code to format.
78*b0d29bc4SBrooks Davis static void
fail(const std::string & message,const int original_errno)79*b0d29bc4SBrooks Davis fail(const std::string& message, const int original_errno)
80*b0d29bc4SBrooks Davis {
81*b0d29bc4SBrooks Davis std::cerr << message << ": " << std::strerror(original_errno) << '\n';
82*b0d29bc4SBrooks Davis std::exit(process::exit_isolation_failure);
83*b0d29bc4SBrooks Davis }
84*b0d29bc4SBrooks Davis
85*b0d29bc4SBrooks Davis
86*b0d29bc4SBrooks Davis /// Changes the owner of a path.
87*b0d29bc4SBrooks Davis ///
88*b0d29bc4SBrooks Davis /// This function is intended to be called from a subprocess getting ready to
89*b0d29bc4SBrooks Davis /// invoke an external binary. Therefore, if there is any error during the
90*b0d29bc4SBrooks Davis /// setup, the new process is terminated with an error code.
91*b0d29bc4SBrooks Davis ///
92*b0d29bc4SBrooks Davis /// \param file The path to the file or directory to affect.
93*b0d29bc4SBrooks Davis /// \param uid The UID to set on the path.
94*b0d29bc4SBrooks Davis /// \param gid The GID to set on the path.
95*b0d29bc4SBrooks Davis static void
do_chown(const fs::path & file,const uid_t uid,const gid_t gid)96*b0d29bc4SBrooks Davis do_chown(const fs::path& file, const uid_t uid, const gid_t gid)
97*b0d29bc4SBrooks Davis {
98*b0d29bc4SBrooks Davis if (::chown(file.c_str(), uid, gid) == -1)
99*b0d29bc4SBrooks Davis fail(F("chown(%s, %s, %s) failed; UID is %s and GID is %s")
100*b0d29bc4SBrooks Davis % file % uid % gid % ::getuid() % ::getgid(), errno);
101*b0d29bc4SBrooks Davis }
102*b0d29bc4SBrooks Davis
103*b0d29bc4SBrooks Davis
104*b0d29bc4SBrooks Davis /// Resets the environment of the process to a known state.
105*b0d29bc4SBrooks Davis ///
106*b0d29bc4SBrooks Davis /// \param work_directory Path to the work directory being used.
107*b0d29bc4SBrooks Davis ///
108*b0d29bc4SBrooks Davis /// \throw std::runtime_error If there is a problem setting up the environment.
109*b0d29bc4SBrooks Davis static void
prepare_environment(const fs::path & work_directory)110*b0d29bc4SBrooks Davis prepare_environment(const fs::path& work_directory)
111*b0d29bc4SBrooks Davis {
112*b0d29bc4SBrooks Davis const char* to_unset[] = { "LANG", "LC_ALL", "LC_COLLATE", "LC_CTYPE",
113*b0d29bc4SBrooks Davis "LC_MESSAGES", "LC_MONETARY", "LC_NUMERIC",
114*b0d29bc4SBrooks Davis "LC_TIME", NULL };
115*b0d29bc4SBrooks Davis const char** iter;
116*b0d29bc4SBrooks Davis for (iter = to_unset; *iter != NULL; ++iter) {
117*b0d29bc4SBrooks Davis utils::unsetenv(*iter);
118*b0d29bc4SBrooks Davis }
119*b0d29bc4SBrooks Davis
120*b0d29bc4SBrooks Davis utils::setenv("HOME", work_directory.str());
121*b0d29bc4SBrooks Davis utils::setenv("TMPDIR", work_directory.str());
122*b0d29bc4SBrooks Davis utils::setenv("TZ", "UTC");
123*b0d29bc4SBrooks Davis }
124*b0d29bc4SBrooks Davis
125*b0d29bc4SBrooks Davis
126*b0d29bc4SBrooks Davis } // anonymous namespace
127*b0d29bc4SBrooks Davis
128*b0d29bc4SBrooks Davis
129*b0d29bc4SBrooks Davis /// Cleans up the container process to run a new child.
130*b0d29bc4SBrooks Davis ///
131*b0d29bc4SBrooks Davis /// If there is any error during the setup, the new process is terminated
132*b0d29bc4SBrooks Davis /// with an error code.
133*b0d29bc4SBrooks Davis ///
134*b0d29bc4SBrooks Davis /// \param unprivileged_user Unprivileged user to run the test case as.
135*b0d29bc4SBrooks Davis /// \param work_directory Path to the test case-specific work directory.
136*b0d29bc4SBrooks Davis void
isolate_child(const optional<passwd::user> & unprivileged_user,const fs::path & work_directory)137*b0d29bc4SBrooks Davis process::isolate_child(const optional< passwd::user >& unprivileged_user,
138*b0d29bc4SBrooks Davis const fs::path& work_directory)
139*b0d29bc4SBrooks Davis {
140*b0d29bc4SBrooks Davis isolate_path(unprivileged_user, work_directory);
141*b0d29bc4SBrooks Davis if (::chdir(work_directory.c_str()) == -1)
142*b0d29bc4SBrooks Davis fail(F("chdir(%s) failed") % work_directory, errno);
143*b0d29bc4SBrooks Davis
144*b0d29bc4SBrooks Davis utils::unlimit_core_size();
145*b0d29bc4SBrooks Davis if (!signals::reset_all()) {
146*b0d29bc4SBrooks Davis LW("Failed to reset one or more signals to their default behavior");
147*b0d29bc4SBrooks Davis }
148*b0d29bc4SBrooks Davis prepare_environment(work_directory);
149*b0d29bc4SBrooks Davis (void)::umask(0022);
150*b0d29bc4SBrooks Davis
151*b0d29bc4SBrooks Davis if (unprivileged_user && passwd::current_user().is_root()) {
152*b0d29bc4SBrooks Davis const passwd::user& user = unprivileged_user.get();
153*b0d29bc4SBrooks Davis
154*b0d29bc4SBrooks Davis if (user.gid != ::getgid()) {
155*b0d29bc4SBrooks Davis if (::setgid(user.gid) == -1)
156*b0d29bc4SBrooks Davis fail(F("setgid(%s) failed; UID is %s and GID is %s")
157*b0d29bc4SBrooks Davis % user.gid % ::getuid() % ::getgid(), errno);
158*b0d29bc4SBrooks Davis if (::getuid() == 0) {
159*b0d29bc4SBrooks Davis ::gid_t groups[1];
160*b0d29bc4SBrooks Davis groups[0] = user.gid;
161*b0d29bc4SBrooks Davis if (::setgroups(1, groups) == -1)
162*b0d29bc4SBrooks Davis fail(F("setgroups(1, [%s]) failed; UID is %s and GID is %s")
163*b0d29bc4SBrooks Davis % user.gid % ::getuid() % ::getgid(), errno);
164*b0d29bc4SBrooks Davis }
165*b0d29bc4SBrooks Davis }
166*b0d29bc4SBrooks Davis if (user.uid != ::getuid()) {
167*b0d29bc4SBrooks Davis if (::setuid(user.uid) == -1)
168*b0d29bc4SBrooks Davis fail(F("setuid(%s) failed; UID is %s and GID is %s")
169*b0d29bc4SBrooks Davis % user.uid % ::getuid() % ::getgid(), errno);
170*b0d29bc4SBrooks Davis }
171*b0d29bc4SBrooks Davis }
172*b0d29bc4SBrooks Davis }
173*b0d29bc4SBrooks Davis
174*b0d29bc4SBrooks Davis
175*b0d29bc4SBrooks Davis /// Sets up a path to be writable by a child isolated with isolate_child.
176*b0d29bc4SBrooks Davis ///
177*b0d29bc4SBrooks Davis /// If there is any error during the setup, the new process is terminated
178*b0d29bc4SBrooks Davis /// with an error code.
179*b0d29bc4SBrooks Davis ///
180*b0d29bc4SBrooks Davis /// The caller should use this to prepare any directory or file that the child
181*b0d29bc4SBrooks Davis /// should be able to write to *before* invoking isolate_child(). Note that
182*b0d29bc4SBrooks Davis /// isolate_child() will use isolate_path() on the work directory though.
183*b0d29bc4SBrooks Davis ///
184*b0d29bc4SBrooks Davis /// \param unprivileged_user Unprivileged user to run the test case as.
185*b0d29bc4SBrooks Davis /// \param file Path to the file to modify.
186*b0d29bc4SBrooks Davis void
isolate_path(const optional<passwd::user> & unprivileged_user,const fs::path & file)187*b0d29bc4SBrooks Davis process::isolate_path(const optional< passwd::user >& unprivileged_user,
188*b0d29bc4SBrooks Davis const fs::path& file)
189*b0d29bc4SBrooks Davis {
190*b0d29bc4SBrooks Davis if (!unprivileged_user || !passwd::current_user().is_root())
191*b0d29bc4SBrooks Davis return;
192*b0d29bc4SBrooks Davis const passwd::user& user = unprivileged_user.get();
193*b0d29bc4SBrooks Davis
194*b0d29bc4SBrooks Davis const bool change_group = user.gid != ::getgid();
195*b0d29bc4SBrooks Davis const bool change_user = user.uid != ::getuid();
196*b0d29bc4SBrooks Davis
197*b0d29bc4SBrooks Davis if (!change_user && !change_group) {
198*b0d29bc4SBrooks Davis // Keep same permissions.
199*b0d29bc4SBrooks Davis } else if (change_user && change_group) {
200*b0d29bc4SBrooks Davis do_chown(file, user.uid, user.gid);
201*b0d29bc4SBrooks Davis } else if (!change_user && change_group) {
202*b0d29bc4SBrooks Davis do_chown(file, ::getuid(), user.gid);
203*b0d29bc4SBrooks Davis } else {
204*b0d29bc4SBrooks Davis INV(change_user && !change_group);
205*b0d29bc4SBrooks Davis do_chown(file, user.uid, ::getgid());
206*b0d29bc4SBrooks Davis }
207*b0d29bc4SBrooks Davis }
208