xref: /titanic_50/usr/src/cmd/ptools/ppriv/ppriv.c (revision 98157a7002f4f2cf7978f3084ca5577f0a1d72b2)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  *
25  * Program to examine or set process privileges.
26  */
27 
28 #pragma ident	"%Z%%M%	%I%	%E% SMI"
29 
30 #include <stdio.h>
31 #include <stdio_ext.h>
32 #include <stdlib.h>
33 #include <unistd.h>
34 #include <fcntl.h>
35 #include <string.h>
36 #include <limits.h>
37 #include <sys/types.h>
38 #include <libproc.h>
39 #include <priv.h>
40 #include <errno.h>
41 #include <ctype.h>
42 
43 #include <locale.h>
44 #include <langinfo.h>
45 
46 static int	look(char *);
47 static void	perr(char *);
48 static void	usage(void);
49 static void	loadprivinfo(void);
50 static int	parsespec(const char *);
51 static void	privupdate(prpriv_t *, const char *);
52 static void	privupdate_self(void);
53 static int	dumppriv(char **);
54 static void	flags2str(uint_t);
55 
56 static char		*command;
57 static char		*procname;
58 static boolean_t	verb = B_FALSE;
59 static boolean_t	set = B_FALSE;
60 static boolean_t	exec = B_FALSE;
61 static boolean_t	Don = B_FALSE;
62 static boolean_t	Doff = B_FALSE;
63 static boolean_t	list = B_FALSE;
64 static boolean_t	mac_aware = B_FALSE;
65 static int		mode = PRIV_STR_PORT;
66 
67 int
68 main(int argc, char **argv)
69 {
70 	int rc = 0;
71 	int opt;
72 	struct rlimit rlim;
73 
74 	(void) setlocale(LC_ALL, "");
75 	(void) textdomain(TEXT_DOMAIN);
76 
77 	if ((command = strrchr(argv[0], '/')) != NULL)
78 		command++;
79 	else
80 		command = argv[0];
81 
82 	while ((opt = getopt(argc, argv, "lDMNevs:S")) != EOF) {
83 		switch (opt) {
84 		case 'l':
85 			list = B_TRUE;
86 			break;
87 		case 'D':
88 			set = B_TRUE;
89 			Don = B_TRUE;
90 			break;
91 		case 'M':
92 			mac_aware = B_TRUE;
93 			break;
94 		case 'N':
95 			set = B_TRUE;
96 			Doff = B_TRUE;
97 			break;
98 		case 'e':
99 			exec = B_TRUE;
100 			break;
101 		case 'S':
102 			mode = PRIV_STR_SHORT;
103 			break;
104 		case 'v':
105 			verb = B_TRUE;
106 			mode = PRIV_STR_LIT;
107 			break;
108 		case 's':
109 			set = B_TRUE;
110 			if ((rc = parsespec(optarg)) != 0)
111 				return (rc);
112 			break;
113 		default:
114 			usage();
115 			/*NOTREACHED*/
116 		}
117 	}
118 
119 	argc -= optind;
120 	argv += optind;
121 
122 	if ((argc < 1 && !list) || Doff && Don || list && (set || exec) ||
123 	    (mac_aware && !exec))
124 		usage();
125 
126 	/*
127 	 * Make sure we'll have enough file descriptors to handle a target
128 	 * that has many many mappings.
129 	 */
130 	if (getrlimit(RLIMIT_NOFILE, &rlim) == 0) {
131 		rlim.rlim_cur = rlim.rlim_max;
132 		(void) setrlimit(RLIMIT_NOFILE, &rlim);
133 		(void) enable_extended_FILE_stdio(-1, -1);
134 	}
135 
136 	if (exec) {
137 		privupdate_self();
138 		rc = execvp(argv[0], &argv[0]);
139 		(void) fprintf(stderr, "%s: %s: %s\n", command, argv[0],
140 			strerror(errno));
141 	} else if (list) {
142 		rc = dumppriv(argv);
143 	} else {
144 		while (argc-- > 0)
145 			rc += look(*argv++);
146 	}
147 
148 	return (rc);
149 }
150 
151 static int
152 look(char *arg)
153 {
154 	static size_t pprivsz = sizeof (prpriv_t);
155 	static prpriv_t *ppriv;
156 
157 	struct ps_prochandle *Pr;
158 	int gcode;
159 	size_t sz;
160 	void *pdata;
161 	char *x;
162 	int i;
163 	boolean_t nodata;
164 
165 	procname = arg;		/* for perr() */
166 
167 	if ((Pr = proc_arg_grab(arg, set ? PR_ARG_PIDS : PR_ARG_ANY,
168 	    PGRAB_RETAIN | PGRAB_FORCE | (set ? 0 : PGRAB_RDONLY) |
169 	    PGRAB_NOSTOP, &gcode)) == NULL) {
170 		(void) fprintf(stderr, "%s: cannot examine %s: %s\n",
171 		    command, arg, Pgrab_error(gcode));
172 		return (1);
173 	}
174 
175 	if (ppriv == NULL)
176 		ppriv = malloc(pprivsz);
177 
178 	if (Ppriv(Pr, ppriv, pprivsz) == -1) {
179 		perr(command);
180 		Prelease(Pr, 0);
181 		return (1);
182 	}
183 
184 	sz = PRIV_PRPRIV_SIZE(ppriv);
185 
186 	/*
187 	 * The ppriv fields are unsigned and may overflow, so check them
188 	 * separately.  Size must be word aligned, so check that too.
189 	 * Make sure size is "smallish" too.
190 	 */
191 	if ((sz & 3) || ppriv->pr_nsets == 0 ||
192 	    sz / ppriv->pr_nsets < ppriv->pr_setsize ||
193 	    ppriv->pr_infosize > sz || sz > 1024 * 1024) {
194 		(void) fprintf(stderr,
195 			"%s: %s: bad PRNOTES section, size = %lx\n",
196 			command, arg, (long)sz);
197 		Prelease(Pr, 0);
198 		return (1);
199 	}
200 
201 	if (sz > pprivsz) {
202 		ppriv = realloc(ppriv, sz);
203 
204 		if (ppriv == NULL || Ppriv(Pr, ppriv, sz) != sz) {
205 			perr(command);
206 			Prelease(Pr, 0);
207 			return (1);
208 		}
209 		pprivsz = sz;
210 	}
211 
212 	if (set) {
213 		privupdate(ppriv, arg);
214 		if (Psetpriv(Pr, ppriv) != 0) {
215 			perr(command);
216 			Prelease(Pr, 0);
217 			return (1);
218 		}
219 		Prelease(Pr, 0);
220 		return (0);
221 	}
222 
223 	if (Pstate(Pr) == PS_DEAD) {
224 		(void) printf("core '%s' of %d:\t%.70s\n",
225 		    arg, (int)Ppsinfo(Pr)->pr_pid, Ppsinfo(Pr)->pr_psargs);
226 		pdata = Pprivinfo(Pr);
227 		nodata = Pstate(Pr) == PS_DEAD && pdata == NULL;
228 	} else {
229 		(void) printf("%d:\t%.70s\n",
230 		    (int)Ppsinfo(Pr)->pr_pid, Ppsinfo(Pr)->pr_psargs);
231 		pdata = NULL;
232 		nodata = B_FALSE;
233 	}
234 
235 	x = (char *)ppriv + sz - ppriv->pr_infosize;
236 	while (x < (char *)ppriv + sz) {
237 		/* LINTED: alignment */
238 		priv_info_t *pi = (priv_info_t *)x;
239 		priv_info_uint_t *pii;
240 
241 		switch (pi->priv_info_type) {
242 		case PRIV_INFO_FLAGS:
243 			/* LINTED: alignment */
244 			pii = (priv_info_uint_t *)x;
245 			(void) printf("flags =");
246 			flags2str(pii->val);
247 			(void) putchar('\n');
248 			break;
249 		default:
250 			(void) fprintf(stderr, "%s: unknown priv_info: %d\n",
251 				arg, pi->priv_info_type);
252 			break;
253 		}
254 		if (pi->priv_info_size > ppriv->pr_infosize ||
255 		    pi->priv_info_size <=  sizeof (priv_info_t) ||
256 		    (pi->priv_info_size & 3) != 0) {
257 			(void) fprintf(stderr, "%s: bad priv_info_size: %u\n",
258 				arg, pi->priv_info_size);
259 			break;
260 		}
261 		x += pi->priv_info_size;
262 	}
263 
264 	for (i = 0; i < ppriv->pr_nsets; i++) {
265 		extern const char *__priv_getsetbynum(const void *, int);
266 		const char *setnm = pdata ? __priv_getsetbynum(pdata, i)
267 					    : priv_getsetbynum(i);
268 		priv_chunk_t *pc = (priv_chunk_t *)
269 				    &ppriv->pr_sets[ppriv->pr_setsize * i];
270 
271 
272 		(void) printf("\t%c: ", setnm && !nodata ? *setnm : '?');
273 		if (!nodata) {
274 			extern char *__priv_set_to_str(void *,
275 					const priv_set_t *, char, int);
276 			priv_set_t *pset = (priv_set_t *)pc;
277 
278 			char *s;
279 
280 			if (pdata)
281 				s = __priv_set_to_str(pdata, pset, ',', mode);
282 			else
283 				s = priv_set_to_str(pset, ',', mode);
284 			(void) puts(s);
285 			free(s);
286 		} else {
287 			int j;
288 			for (j = 0; j < ppriv->pr_setsize; j++)
289 				(void) printf("%08x", pc[j]);
290 			(void) putchar('\n');
291 		}
292 	}
293 	Prelease(Pr, 0);
294 	return (0);
295 }
296 
297 static void
298 fatal(const char *s)
299 {
300 	(void) fprintf(stderr, "%s: %s: %s\n", command, s, strerror(errno));
301 	exit(3);
302 }
303 
304 static void
305 perr(char *s)
306 {
307 	int err = errno;
308 
309 	if (s != NULL)
310 		(void) fprintf(stderr, "%s: ", procname);
311 	else
312 		s = procname;
313 
314 	errno = err;
315 	perror(s);
316 }
317 
318 static void
319 usage(void)
320 {
321 	(void) fprintf(stderr,
322 	    "usage:\t%s [-v] [-S] [-D|-N] [-s spec] { pid | core } ...\n"
323 	    "\t%s -e [-D|-N] [-M] [-s spec] cmd [args ...]\n"
324 	    "\t%s -l [-v] [privilege ...]\n"
325 	    "  (report, set or list process privileges)\n", command,
326 	    command, command);
327 	exit(2);
328 	/*NOTREACHED*/
329 }
330 
331 /*
332  * Parse the privilege bits to add and/or remove from
333  * a privilege set.
334  *
335  * [EPIL][+-=]priv,priv,priv
336  */
337 
338 static int
339 strindex(char c, const char *str)
340 {
341 	const char *s;
342 
343 	if (islower(c))
344 		c = toupper(c);
345 
346 	s = strchr(str, c);
347 
348 	if (s == NULL)
349 		return (-1);
350 	else
351 		return (s - str);
352 }
353 
354 static void
355 badspec(const char *spec)
356 {
357 	(void) fprintf(stderr, "%s: bad privilege specification: \"%s\"\n",
358 				command, spec);
359 	exit(3);
360 	/*NOTREACHED*/
361 }
362 
363 /*
364  * For each set, you can set either add and/or
365  * remove or you can set assign.
366  */
367 static priv_set_t **rem, **add, **assign;
368 static const priv_impl_info_t *pri = NULL;
369 static char *sets;
370 
371 static void
372 loadprivinfo(void)
373 {
374 	int i;
375 
376 	if (pri != NULL)
377 		return;
378 
379 	pri = getprivimplinfo();
380 
381 	if (pri == NULL)
382 		fatal("getprivimplinfo");
383 
384 	sets = malloc(pri->priv_nsets + 1);
385 	if (sets == NULL)
386 		fatal("malloc");
387 
388 	for (i = 0; i < pri->priv_nsets; i++) {
389 		sets[i] = *priv_getsetbynum(i);
390 		if (islower(sets[i]))
391 			sets[i] = toupper(sets[i]);
392 	}
393 
394 	sets[pri->priv_nsets] = '\0';
395 
396 	rem = calloc(pri->priv_nsets, sizeof (priv_set_t *));
397 	add = calloc(pri->priv_nsets, sizeof (priv_set_t *));
398 	assign = calloc(pri->priv_nsets, sizeof (priv_set_t *));
399 	if (rem == NULL || add == NULL || assign == NULL)
400 		fatal("calloc");
401 }
402 
403 static int
404 parsespec(const char *spec)
405 {
406 	char *p;
407 	const char *q;
408 	int count;
409 	priv_set_t ***toupd;
410 	priv_set_t *upd;
411 	int i;
412 	boolean_t freeupd = B_TRUE;
413 
414 	if (pri == NULL)
415 		loadprivinfo();
416 
417 	p = strpbrk(spec, "+-=");
418 
419 	if (p == NULL || p - spec > pri->priv_nsets)
420 		badspec(spec);
421 
422 	if (p[1] == '\0' || (upd = priv_str_to_set(p + 1, ",", NULL)) == NULL)
423 		badspec(p + 1);
424 
425 	count = p - spec;
426 	switch (*p) {
427 	case '+':
428 		toupd = &add;
429 		break;
430 	case '-':
431 		toupd = &rem;
432 		priv_inverse(upd);
433 		break;
434 	case '=':
435 		toupd = &assign;
436 		break;
437 	}
438 
439 	/* Update all sets? */
440 	if (count == 0 || *spec == 'a' || *spec == 'A') {
441 		count = pri->priv_nsets;
442 		q = sets;
443 	} else
444 		q = spec;
445 
446 	for (i = 0; i < count; i++) {
447 		int ind = strindex(q[i], sets);
448 
449 		if (ind == -1)
450 			badspec(spec);
451 
452 		/* Assign is mutually exclusive with add/remove and itself */
453 		if (((toupd == &rem || toupd == &add) && assign[ind] != NULL) ||
454 		    (toupd == &assign && (assign[ind] != NULL ||
455 			    rem[ind] != NULL || add[ind] != NULL))) {
456 			(void) fprintf(stderr, "%s: conflicting spec: %s\n",
457 					command, spec);
458 			exit(1);
459 		}
460 		if ((*toupd)[ind] != NULL) {
461 			if (*p == '-')
462 				priv_intersect(upd, (*toupd)[ind]);
463 			else
464 				priv_union(upd, (*toupd)[ind]);
465 		} else {
466 			(*toupd)[ind] = upd;
467 			freeupd = B_FALSE;
468 		}
469 	}
470 	if (freeupd)
471 		priv_freeset(upd);
472 	return (0);
473 }
474 
475 static void
476 privupdate(prpriv_t *pr, const char *arg)
477 {
478 	int i;
479 
480 	if (sets != NULL) {
481 		for (i = 0; i < pri->priv_nsets; i++) {
482 			priv_set_t *target =
483 				(priv_set_t *)&pr->pr_sets[pr->pr_setsize * i];
484 			if (rem[i] != NULL)
485 				priv_intersect(rem[i], target);
486 			if (add[i] != NULL)
487 				priv_union(add[i], target);
488 			if (assign[i] != NULL)
489 				priv_copyset(assign[i], target);
490 		}
491 	}
492 
493 	if (Doff || Don) {
494 		priv_info_uint_t *pii;
495 		int sz = PRIV_PRPRIV_SIZE(pr);
496 		char *x = (char *)pr + PRIV_PRPRIV_INFO_OFFSET(pr);
497 		uint32_t fl = 0;
498 
499 		while (x < (char *)pr + sz) {
500 			/* LINTED: alignment */
501 			priv_info_t *pi = (priv_info_t *)x;
502 
503 			if (pi->priv_info_type == PRIV_INFO_FLAGS) {
504 				/* LINTED: alignment */
505 				pii = (priv_info_uint_t *)x;
506 				fl = pii->val;
507 				goto done;
508 			}
509 			if (pi->priv_info_size > pr->pr_infosize ||
510 			    pi->priv_info_size <=  sizeof (priv_info_t) ||
511 			    (pi->priv_info_size & 3) != 0)
512 				break;
513 			x += pi->priv_info_size;
514 		}
515 		(void) fprintf(stderr,
516 			"%s: cannot find privilege flags to set\n", arg);
517 		pr->pr_infosize = 0;
518 		return;
519 done:
520 
521 		pr->pr_infosize = sizeof (priv_info_uint_t);
522 		/* LINTED: alignment */
523 		pii = (priv_info_uint_t *)
524 			    ((char *)pr + PRIV_PRPRIV_INFO_OFFSET(pr));
525 
526 		if (Don)
527 			fl |= PRIV_DEBUG;
528 		else
529 			fl &= ~PRIV_DEBUG;
530 
531 		pii->info.priv_info_size = sizeof (*pii);
532 		pii->info.priv_info_type = PRIV_INFO_FLAGS;
533 		pii->val = fl;
534 	} else {
535 		pr->pr_infosize = 0;
536 	}
537 }
538 
539 static void
540 privupdate_self(void)
541 {
542 	int set;
543 
544 	if (mac_aware) {
545 		if (setpflags(NET_MAC_AWARE, 1) != 0)
546 			fatal("setpflags(NET_MAC_AWARE)");
547 		if (setpflags(NET_MAC_AWARE_INHERIT, 1) != 0)
548 			fatal("setpflags(NET_MAC_AWARE_INHERIT)");
549 	}
550 
551 	if (sets != NULL) {
552 		priv_set_t *target = priv_allocset();
553 
554 		if (target == NULL)
555 			fatal("priv_allocet");
556 
557 		set = priv_getsetbyname(PRIV_INHERITABLE);
558 		if (rem[set] != NULL || add[set] != NULL ||
559 		    assign[set] != NULL) {
560 			(void) getppriv(PRIV_INHERITABLE, target);
561 			if (rem[set] != NULL)
562 				priv_intersect(rem[set], target);
563 			if (add[set] != NULL)
564 				priv_union(add[set], target);
565 			if (assign[set] != NULL)
566 				priv_copyset(assign[set], target);
567 			if (setppriv(PRIV_SET, PRIV_INHERITABLE, target) != 0)
568 				fatal("setppriv(Inheritable)");
569 		}
570 		set = priv_getsetbyname(PRIV_LIMIT);
571 		if (rem[set] != NULL || add[set] != NULL ||
572 		    assign[set] != NULL) {
573 			(void) getppriv(PRIV_LIMIT, target);
574 			if (rem[set] != NULL)
575 				priv_intersect(rem[set], target);
576 			if (add[set] != NULL)
577 				priv_union(add[set], target);
578 			if (assign[set] != NULL)
579 				priv_copyset(assign[set], target);
580 			if (setppriv(PRIV_SET, PRIV_LIMIT, target) != 0)
581 				fatal("setppriv(Limit)");
582 		}
583 		priv_freeset(target);
584 	}
585 
586 	if (Doff || Don)
587 		(void) setpflags(PRIV_DEBUG, Don ? 1 : 0);
588 }
589 
590 static int
591 dopriv(const char *p)
592 {
593 	(void) puts(p);
594 	if (verb) {
595 		char *text = priv_gettext(p);
596 		char *p, *q;
597 		if (text == NULL)
598 			return (1);
599 		for (p = text; q = strchr(p, '\n'); p = q + 1) {
600 			*q = '\0';
601 			(void) printf("\t%s\n", p);
602 		}
603 		free(text);
604 	}
605 	return (0);
606 }
607 
608 static int
609 dumppriv(char **argv)
610 {
611 	int rc = 0;
612 	const char *pname;
613 	int i;
614 
615 	if (argv[0] == NULL) {
616 		for (i = 0; ((pname = priv_getbynum(i++)) != NULL); )
617 			rc += dopriv(pname);
618 	} else {
619 		for (; *argv; argv++) {
620 			priv_set_t *pset = priv_str_to_set(*argv, ",", NULL);
621 
622 			if (pset == NULL) {
623 				(void) fprintf(stderr, "%s: %s: bad privilege"
624 				    " list\n", command, *argv);
625 				rc++;
626 				continue;
627 			}
628 			for (i = 0; ((pname = priv_getbynum(i++)) != NULL); )
629 				if (priv_ismember(pset, pname))
630 					rc += dopriv(pname);
631 		}
632 	}
633 	return (rc);
634 }
635 
636 static struct {
637 	int flag;
638 	char *name;
639 } flags[] = {
640 	{ PRIV_DEBUG, "PRIV_DEBUG" },
641 	{ PRIV_AWARE, "PRIV_AWARE" },
642 	{ PRIV_AWARE_INHERIT, "PRIV_AWARE_INHERIT" },
643 };
644 
645 /*
646  * Print flags preceeded by a space.
647  */
648 static void
649 flags2str(uint_t pflags)
650 {
651 	char c = ' ';
652 	int i;
653 
654 	if (pflags == 0) {
655 		(void) fputs(" <none>", stdout);
656 		return;
657 	}
658 	for (i = 0; i < sizeof (flags)/sizeof (flags[0]) && pflags != 0; i++) {
659 		if ((pflags & flags[i].flag) != 0) {
660 			(void) printf("%c%s", c, flags[i].name);
661 			pflags &= ~flags[i].flag;
662 			c = '|';
663 		}
664 	}
665 	if (pflags != 0)
666 		(void) printf("%c<0x%x>", c, pflags);
667 }
668