readprofile: do not close/free just before exiting
[oweals/busybox.git] / util-linux / setpriv.c
1 /* vi: set sw=4 ts=4: */
2 /*
3  * setpriv implementation for busybox based on linux-utils-ng 2.29
4  *
5  * Copyright (C) 2017 by  <assafgordon@gmail.com>
6  *
7  * Licensed under GPLv2 or later, see file LICENSE in this source tree.
8  *
9  */
10 //config:config SETPRIV
11 //config:       bool "setpriv (3.4 kb)"
12 //config:       default y
13 //config:       select PLATFORM_LINUX
14 //config:       select LONG_OPTS
15 //config:       help
16 //config:       Run a program with different Linux privilege settings.
17 //config:       Requires kernel >= 3.5
18 //config:
19 //config:config FEATURE_SETPRIV_DUMP
20 //config:       bool "Support dumping current privilege state"
21 //config:       default y
22 //config:       depends on SETPRIV
23 //config:       help
24 //config:       Enables the "--dump" switch to print out the current privilege
25 //config:       state. This is helpful for diagnosing problems.
26 //config:
27 //config:config FEATURE_SETPRIV_CAPABILITIES
28 //config:       bool "Support capabilities"
29 //config:       default y
30 //config:       depends on SETPRIV
31 //config:       help
32 //config:       Capabilities can be used to grant processes additional rights
33 //config:       without the necessity to always execute as the root user.
34 //config:       Enabling this option enables "--dump" to show information on
35 //config:       capabilities.
36 //config:
37 //config:config FEATURE_SETPRIV_CAPABILITY_NAMES
38 //config:       bool "Support capability names"
39 //config:       default y
40 //config:       depends on SETPRIV && FEATURE_SETPRIV_CAPABILITIES
41 //config:       help
42 //config:       Capabilities can be either referenced via a human-readble name,
43 //config:       e.g. "net_admin", or using their index, e.g. "cap_12". Enabling
44 //config:       this option allows using the human-readable names in addition to
45 //config:       the index-based names.
46
47 //applet:IF_SETPRIV(APPLET(setpriv, BB_DIR_BIN, BB_SUID_DROP))
48
49 //kbuild:lib-$(CONFIG_SETPRIV) += setpriv.o
50
51 //usage:#define setpriv_trivial_usage
52 //usage:        "[OPTIONS] PROG [ARGS]"
53 //usage:#define setpriv_full_usage "\n\n"
54 //usage:       "Run PROG with different privilege settings\n"
55 //usage:        IF_FEATURE_SETPRIV_DUMP(
56 //usage:     "\n-d,--dump               Show current capabilities"
57 //usage:        )
58 //usage:     "\n--nnp,--no-new-privs    Ignore setuid/setgid bits and file capabilities"
59 //usage:        IF_FEATURE_SETPRIV_CAPABILITIES(
60 //usage:     "\n--inh-caps CAP,CAP      Set inheritable capabilities"
61 //usage:     "\n--ambient-caps CAP,CAP  Set ambient capabilities"
62 //usage:        )
63
64 //setpriv from util-linux 2.28:
65 // -d, --dump               show current state (and do not exec anything)
66 // --nnp, --no-new-privs    disallow granting new privileges
67 // --inh-caps <caps,...>    set inheritable capabilities
68 // --bounding-set <caps>    set capability bounding set
69 // --ruid <uid>             set real uid
70 // --euid <uid>             set effective uid
71 // --rgid <gid>             set real gid
72 // --egid <gid>             set effective gid
73 // --reuid <uid>            set real and effective uid
74 // --regid <gid>            set real and effective gid
75 // --clear-groups           clear supplementary groups
76 // --keep-groups            keep supplementary groups
77 // --groups <group,...>     set supplementary groups
78 // --securebits <bits>      set securebits
79 // --selinux-label <label>  set SELinux label
80 // --apparmor-profile <pr>  set AppArmor profile
81
82 #if ENABLE_FEATURE_SETPRIV_CAPABILITIES
83 #include <linux/capability.h>
84 // #include <sys/capability.h>
85 // This header is in libcap, but the functions are in libc.
86 // Comment in the header says this above capset/capget:
87 /* system calls - look to libc for function to system call mapping */
88 extern int capset(cap_user_header_t header, cap_user_data_t data);
89 extern int capget(cap_user_header_t header, const cap_user_data_t data);
90 // so for bbox, let's just repeat the declarations.
91 // This way, libcap needs not be installed in build environment.
92 #endif
93 #include <sys/prctl.h>
94 #include "libbb.h"
95
96 #ifndef PR_CAPBSET_READ
97 #define PR_CAPBSET_READ 23
98 #endif
99
100 #ifndef PR_SET_NO_NEW_PRIVS
101 #define PR_SET_NO_NEW_PRIVS 38
102 #endif
103
104 #ifndef PR_GET_NO_NEW_PRIVS
105 #define PR_GET_NO_NEW_PRIVS 39
106 #endif
107
108 #ifndef PR_CAP_AMBIENT
109 #define PR_CAP_AMBIENT 47
110 #define PR_CAP_AMBIENT_IS_SET 1
111 #define PR_CAP_AMBIENT_RAISE 2
112 #define PR_CAP_AMBIENT_LOWER 3
113 #endif
114
115 enum {
116         IF_FEATURE_SETPRIV_DUMP(OPTBIT_DUMP,)
117         IF_FEATURE_SETPRIV_CAPABILITIES(OPTBIT_INH,)
118         IF_FEATURE_SETPRIV_CAPABILITIES(OPTBIT_AMB,)
119         OPTBIT_NNP,
120
121         IF_FEATURE_SETPRIV_DUMP(OPT_DUMP = (1 << OPTBIT_DUMP),)
122         IF_FEATURE_SETPRIV_CAPABILITIES(OPT_INH  = (1 << OPTBIT_INH),)
123         IF_FEATURE_SETPRIV_CAPABILITIES(OPT_AMB  = (1 << OPTBIT_AMB),)
124         OPT_NNP  = (1 << OPTBIT_NNP),
125 };
126
127 #if ENABLE_FEATURE_SETPRIV_CAPABILITIES
128 struct caps {
129         struct __user_cap_header_struct header;
130         cap_user_data_t data;
131         int u32s;
132 };
133
134 # if ENABLE_FEATURE_SETPRIV_CAPABILITY_NAMES
135 static const char *const capabilities[] = {
136         "chown",
137         "dac_override",
138         "dac_read_search",
139         "fowner",
140         "fsetid",
141         "kill",
142         "setgid",
143         "setuid",
144         "setpcap",
145         "linux_immutable",
146         "net_bind_service",
147         "net_broadcast",
148         "net_admin",
149         "net_raw",
150         "ipc_lock",
151         "ipc_owner",
152         "sys_module",
153         "sys_rawio",
154         "sys_chroot",
155         "sys_ptrace",
156         "sys_pacct",
157         "sys_admin",
158         "sys_boot",
159         "sys_nice",
160         "sys_resource",
161         "sys_time",
162         "sys_tty_config",
163         "mknod",
164         "lease",
165         "audit_write",
166         "audit_control",
167         "setfcap",
168         "mac_override",
169         "mac_admin",
170         "syslog",
171         "wake_alarm",
172         "block_suspend",
173         "audit_read",
174 };
175 # endif /* FEATURE_SETPRIV_CAPABILITY_NAMES */
176
177 static void getcaps(struct caps *caps)
178 {
179         static const uint8_t versions[] = {
180                 _LINUX_CAPABILITY_U32S_3, /* = 2 (fits into byte) */
181                 _LINUX_CAPABILITY_U32S_2, /* = 2 */
182                 _LINUX_CAPABILITY_U32S_1, /* = 1 */
183         };
184         int i;
185
186         caps->header.pid = 0;
187         for (i = 0; i < ARRAY_SIZE(versions); i++) {
188                 caps->header.version = versions[i];
189                 if (capget(&caps->header, NULL) == 0)
190                         goto got_it;
191         }
192         bb_simple_perror_msg_and_die("capget");
193  got_it:
194
195         switch (caps->header.version) {
196                 case _LINUX_CAPABILITY_VERSION_1:
197                         caps->u32s = _LINUX_CAPABILITY_U32S_1;
198                         break;
199                 case _LINUX_CAPABILITY_VERSION_2:
200                         caps->u32s = _LINUX_CAPABILITY_U32S_2;
201                         break;
202                 case _LINUX_CAPABILITY_VERSION_3:
203                         caps->u32s = _LINUX_CAPABILITY_U32S_3;
204                         break;
205                 default:
206                         bb_error_msg_and_die("unsupported capability version");
207         }
208
209         caps->data = xmalloc(sizeof(caps->data[0]) * caps->u32s);
210         if (capget(&caps->header, caps->data) < 0)
211                 bb_simple_perror_msg_and_die("capget");
212 }
213
214 static void parse_cap(unsigned long *index, const char *cap)
215 {
216         unsigned long i;
217
218         switch (cap[0]) {
219         case '-':
220                 break;
221         case '+':
222                 break;
223         default:
224                 bb_error_msg_and_die("invalid capability '%s'", cap);
225                 break;
226         }
227
228         cap++;
229         if ((sscanf(cap, "cap_%lu", &i)) == 1) {
230                 if (!cap_valid(i))
231                         bb_error_msg_and_die("unsupported capability '%s'", cap);
232                 *index = i;
233                 return;
234         }
235
236 # if ENABLE_FEATURE_SETPRIV_CAPABILITY_NAMES
237         for (i = 0; i < ARRAY_SIZE(capabilities); i++) {
238                 if (strcmp(capabilities[i], cap) != 0)
239                         continue;
240
241                 if (!cap_valid(i))
242                         bb_error_msg_and_die("unsupported capability '%s'", cap);
243                 *index = i;
244                 return;
245         }
246 # endif
247
248         bb_error_msg_and_die("unknown capability '%s'", cap);
249 }
250
251 static void set_inh_caps(char *capstring)
252 {
253         struct caps caps;
254
255         getcaps(&caps);
256
257         capstring = strtok(capstring, ",");
258         while (capstring) {
259                 unsigned long cap;
260
261                 parse_cap(&cap, capstring);
262                 if (CAP_TO_INDEX(cap) >= caps.u32s)
263                         bb_error_msg_and_die("invalid capability cap");
264
265                 if (capstring[0] == '+')
266                         caps.data[CAP_TO_INDEX(cap)].inheritable |= CAP_TO_MASK(cap);
267                 else
268                         caps.data[CAP_TO_INDEX(cap)].inheritable &= ~CAP_TO_MASK(cap);
269                 capstring = strtok(NULL, ",");
270         }
271
272         if ((capset(&caps.header, caps.data)) < 0)
273                 bb_perror_msg_and_die("capset");
274
275         if (ENABLE_FEATURE_CLEAN_UP)
276                 free(caps.data);
277 }
278
279 static void set_ambient_caps(char *string)
280 {
281         char *cap;
282
283         cap = strtok(string, ",");
284         while (cap) {
285                 unsigned long index;
286
287                 parse_cap(&index, cap);
288                 if (cap[0] == '+') {
289                         if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, index, 0, 0) < 0)
290                                 bb_perror_msg("cap_ambient_raise");
291                 } else {
292                         if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_LOWER, index, 0, 0) < 0)
293                                 bb_perror_msg("cap_ambient_lower");
294                 }
295                 cap = strtok(NULL, ",");
296         }
297 }
298 #endif /* FEATURE_SETPRIV_CAPABILITIES */
299
300 #if ENABLE_FEATURE_SETPRIV_DUMP
301 # if ENABLE_FEATURE_SETPRIV_CAPABILITY_NAMES
302 static void printf_cap(const char *pfx, unsigned cap_no)
303 {
304         if (cap_no < ARRAY_SIZE(capabilities)) {
305                 printf("%s%s", pfx, capabilities[cap_no]);
306                 return;
307         }
308         printf("%scap_%u", pfx, cap_no);
309 }
310 # else
311 #  define printf_cap(pfx, cap_no) printf("%scap_%u", (pfx), (cap_no))
312 # endif
313
314 static int dump(void)
315 {
316         IF_FEATURE_SETPRIV_CAPABILITIES(struct caps caps;)
317         const char *fmt;
318         uid_t ruid, euid, suid;
319         gid_t rgid, egid, sgid;
320         gid_t *gids;
321         int i, ngids, nnp;
322
323         getresuid(&ruid, &euid, &suid); /* never fails in Linux */
324         getresgid(&rgid, &egid, &sgid); /* never fails in Linux */
325         ngids = 0;
326         gids = bb_getgroups(&ngids, NULL); /* never fails in Linux */
327
328         nnp = prctl(PR_GET_NO_NEW_PRIVS, 0, 0, 0, 0);
329         if (nnp < 0)
330                 bb_perror_msg_and_die("prctl: %s", "GET_NO_NEW_PRIVS");
331
332         printf("uid: %u\n", (unsigned)ruid);
333         printf("euid: %u\n", (unsigned)euid);
334         printf("gid: %u\n", (unsigned)rgid);
335         printf("egid: %u\n", (unsigned)egid);
336
337         printf("Supplementary groups: ");
338         if (ngids == 0) {
339                 printf("[none]");
340         } else {
341                 fmt = ",%u" + 1;
342                 for (i = 0; i < ngids; i++) {
343                         printf(fmt, (unsigned)gids[i]);
344                         fmt = ",%u";
345                 }
346         }
347         printf("\nno_new_privs: %d\n", nnp);
348
349 # if ENABLE_FEATURE_SETPRIV_CAPABILITIES
350         getcaps(&caps);
351         printf("Inheritable capabilities: ");
352         fmt = "";
353         for (i = 0; cap_valid(i); i++) {
354                 unsigned idx = CAP_TO_INDEX(i);
355                 if (idx >= caps.u32s) {
356                         printf("\nindex: %u u32s: %u capability: %u\n", idx, caps.u32s, i);
357                         bb_error_msg_and_die("unsupported capability");
358                 }
359                 if (caps.data[idx].inheritable & CAP_TO_MASK(i)) {
360                         printf_cap(fmt, i);
361                         fmt = ",";
362                 }
363         }
364         if (!fmt[0])
365                 printf("[none]");
366
367         printf("\nAmbient capabilities: ");
368         fmt = "";
369         for (i = 0; cap_valid(i); i++) {
370                 int ret = prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, (unsigned long) i, 0UL, 0UL);
371                 if (ret < 0)
372                         bb_perror_msg_and_die("prctl: %s", "CAP_AMBIENT_IS_SET");
373                 if (ret) {
374                         printf_cap(fmt, i);
375                         fmt = ",";
376                 }
377         }
378         if (i == 0)
379                 printf("[unsupported]");
380         else if (!fmt[0])
381                 printf("[none]");
382
383         printf("\nCapability bounding set: ");
384         fmt = "";
385         for (i = 0; cap_valid(i); i++) {
386                 int ret = prctl(PR_CAPBSET_READ, (unsigned long) i, 0UL, 0UL, 0UL);
387                 if (ret < 0)
388                         bb_perror_msg_and_die("prctl: %s", "CAPBSET_READ");
389                 if (ret) {
390                         printf_cap(fmt, i);
391                         fmt = ",";
392                 }
393         }
394         if (!fmt[0])
395                 printf("[none]");
396         bb_putchar('\n');
397 # endif
398
399         if (ENABLE_FEATURE_CLEAN_UP) {
400                 IF_FEATURE_SETPRIV_CAPABILITIES(free(caps.data);)
401                 free(gids);
402         }
403         return EXIT_SUCCESS;
404 }
405 #endif /* FEATURE_SETPRIV_DUMP */
406
407 int setpriv_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
408 int setpriv_main(int argc UNUSED_PARAM, char **argv)
409 {
410         static const char setpriv_longopts[] ALIGN1 =
411                 IF_FEATURE_SETPRIV_DUMP(
412                 "dump\0"         No_argument            "d"
413                 )
414                 "nnp\0"          No_argument            "\xff"
415                 "no-new-privs\0" No_argument            "\xff"
416                 IF_FEATURE_SETPRIV_CAPABILITIES(
417                 "inh-caps\0"     Required_argument      "\xfe"
418                 "ambient-caps\0" Required_argument      "\xfd"
419                 )
420                 ;
421         int opts;
422         IF_FEATURE_SETPRIV_CAPABILITIES(char *inh_caps, *ambient_caps;)
423
424         applet_long_options = setpriv_longopts;
425         opts = getopt32(argv, "+"IF_FEATURE_SETPRIV_DUMP("d")
426                         IF_FEATURE_SETPRIV_CAPABILITIES("\xfe:\xfd:", &inh_caps, &ambient_caps));
427         argv += optind;
428
429 #if ENABLE_FEATURE_SETPRIV_DUMP
430         if (opts & OPT_DUMP) {
431                 if (argv[0] || (opts - OPT_DUMP) != 0)
432                         bb_show_usage();
433                 return dump();
434         }
435 #endif
436         if (opts & OPT_NNP) {
437                 if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0))
438                         bb_perror_msg_and_die("prctl: %s", "SET_NO_NEW_PRIVS");
439         }
440
441 #if ENABLE_FEATURE_SETPRIV_CAPABILITIES
442         if (opts & OPT_INH)
443                 set_inh_caps(inh_caps);
444         if (opts & OPT_AMB)
445                 set_ambient_caps(ambient_caps);
446 #endif
447
448         if (!argv[0])
449                 bb_show_usage();
450         BB_EXECVP_or_die(argv);
451 }