mirror of
https://github.com/torvalds/linux.git
synced 2024-12-27 21:33:00 +00:00
SafeSetID changes for Linux 6.0
-----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEEgvWslnM+qUy+sgVg5n2WYw6TPBAFAmLofpEACgkQ5n2WYw6T PBDnXg/9E1ZZ6c/RkGG224qc1f9K+Epl4ZjFWAzDeQ84GQpa2BdBEs++JDCH9M1c YBWBjPMzry1D980VRpxtP6Of6M2SsheMuKQCBBLlO6/uJp1EgMFxFJq/kq6FIybH cZx4VZqEsw7Yt4U05I5FDfKpkdOIncGBykMmjDgPZYbGR8S03kpc80Ou9luAlEde 31SMhXpTy17yT5WMgBeGtY5OYqO+Plf5FXmS1KEA2BUDk3L3XfYurPpM5mD+Oc3a HosxT29CeqEPDl+nr96dOliSspC+81IKbHH03Ah7UiKd/12dSjxXQuqLnpksB+vr H5LjjwuS8CphnFETPx5pb+Ceia4wxJT/FOfcQlzWGh1jI1gFDTipbO04nVyRPDPa 88oQPkqDp7Sh7hCaHsUFmPBkOTwgmG9jHvgBl0656YU14BzHXr4jNMFCL/2x+LPt jAF/gws87lyyVJ/7c0VaH+V8QWB4a/B1/Gr85yT2Qge1W1T+/lRIhgGtukX+0uBw AJhPNBVjA2SFopOiBF+WuGEfmyXoUwIpMF/9UDhsvZn5Q+fa/QuuvwuER0QoorVE FbTbE60eGSPfFdxdyLBrELrDapslZLyn89SG4C3Ec/xljhp7RR8xz2c0EPvJ4HWz pDjoLG3LbJXSsst86bFJc3B45MvOcxgqIrht9PyY12l+oUKs9mY= =ESR7 -----END PGP SIGNATURE----- Merge tag 'safesetid-6.0' of https://github.com/micah-morton/linux Pull SafeSetID updates from Micah Morton: "This contains one commit that touches common kernel code, one that adds functionality internal to the SafeSetID LSM code, and a few other commits that only modify the SafeSetID LSM selftest. The commit that touches common kernel code simply adds an LSM hook in the setgroups() syscall that mirrors what is done for the existing LSM hooks in the setuid() and setgid() syscalls. This commit combined with the SafeSetID-specific one allow the LSM to filter setgroups() calls according to configured rule sets in the same way that is already done for setuid() and setgid()" * tag 'safesetid-6.0' of https://github.com/micah-morton/linux: LSM: SafeSetID: add setgroups() testing to selftest LSM: SafeSetID: Add setgroups() security policy handling security: Add LSM hook to setgroups() syscall LSM: SafeSetID: add GID testing to selftest LSM: SafeSetID: selftest cleanup and prepare for GIDs LSM: SafeSetID: fix userns bug in selftest
This commit is contained in:
commit
87fe1adb66
@ -201,6 +201,7 @@ LSM_HOOK(int, 0, task_fix_setuid, struct cred *new, const struct cred *old,
|
||||
int flags)
|
||||
LSM_HOOK(int, 0, task_fix_setgid, struct cred *new, const struct cred * old,
|
||||
int flags)
|
||||
LSM_HOOK(int, 0, task_fix_setgroups, struct cred *new, const struct cred * old)
|
||||
LSM_HOOK(int, 0, task_setpgid, struct task_struct *p, pid_t pgid)
|
||||
LSM_HOOK(int, 0, task_getpgid, struct task_struct *p)
|
||||
LSM_HOOK(int, 0, task_getsid, struct task_struct *p)
|
||||
|
@ -702,6 +702,13 @@
|
||||
* @old is the set of credentials that are being replaced.
|
||||
* @flags contains one of the LSM_SETID_* values.
|
||||
* Return 0 on success.
|
||||
* @task_fix_setgroups:
|
||||
* Update the module's state after setting the supplementary group
|
||||
* identity attributes of the current process.
|
||||
* @new is the set of credentials that will be installed. Modifications
|
||||
* should be made to this rather than to @current->cred.
|
||||
* @old is the set of credentials that are being replaced.
|
||||
* Return 0 on success.
|
||||
* @task_setpgid:
|
||||
* Check permission before setting the process group identifier of the
|
||||
* process @p to @pgid.
|
||||
|
@ -416,6 +416,7 @@ int security_task_fix_setuid(struct cred *new, const struct cred *old,
|
||||
int flags);
|
||||
int security_task_fix_setgid(struct cred *new, const struct cred *old,
|
||||
int flags);
|
||||
int security_task_fix_setgroups(struct cred *new, const struct cred *old);
|
||||
int security_task_setpgid(struct task_struct *p, pid_t pgid);
|
||||
int security_task_getpgid(struct task_struct *p);
|
||||
int security_task_getsid(struct task_struct *p);
|
||||
@ -1100,6 +1101,12 @@ static inline int security_task_fix_setgid(struct cred *new,
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline int security_task_fix_setgroups(struct cred *new,
|
||||
const struct cred *old)
|
||||
{
|
||||
return 0;
|
||||
}
|
||||
|
||||
static inline int security_task_setpgid(struct task_struct *p, pid_t pgid)
|
||||
{
|
||||
return 0;
|
||||
|
@ -134,13 +134,26 @@ EXPORT_SYMBOL(set_groups);
|
||||
int set_current_groups(struct group_info *group_info)
|
||||
{
|
||||
struct cred *new;
|
||||
const struct cred *old;
|
||||
int retval;
|
||||
|
||||
new = prepare_creds();
|
||||
if (!new)
|
||||
return -ENOMEM;
|
||||
|
||||
old = current_cred();
|
||||
|
||||
set_groups(new, group_info);
|
||||
|
||||
retval = security_task_fix_setgroups(new, old);
|
||||
if (retval < 0)
|
||||
goto error;
|
||||
|
||||
return commit_creds(new);
|
||||
|
||||
error:
|
||||
abort_creds(new);
|
||||
return retval;
|
||||
}
|
||||
|
||||
EXPORT_SYMBOL(set_current_groups);
|
||||
|
@ -97,15 +97,9 @@ static int safesetid_security_capable(const struct cred *cred,
|
||||
return 0;
|
||||
|
||||
/*
|
||||
* If CAP_SET{U/G}ID is currently used for a setid() syscall, we want to
|
||||
* let it go through here; the real security check happens later, in the
|
||||
* task_fix_set{u/g}id hook.
|
||||
*
|
||||
* NOTE:
|
||||
* Until we add support for restricting setgroups() calls, GID security
|
||||
* policies offer no meaningful security since we always return 0 here
|
||||
* when called from within the setgroups() syscall and there is no
|
||||
* additional hook later on to enforce security policies for setgroups().
|
||||
* If CAP_SET{U/G}ID is currently used for a setid or setgroups syscall, we
|
||||
* want to let it go through here; the real security check happens later, in
|
||||
* the task_fix_set{u/g}id or task_fix_setgroups hooks.
|
||||
*/
|
||||
if ((opts & CAP_OPT_INSETID) != 0)
|
||||
return 0;
|
||||
@ -241,9 +235,36 @@ static int safesetid_task_fix_setgid(struct cred *new,
|
||||
return -EACCES;
|
||||
}
|
||||
|
||||
static int safesetid_task_fix_setgroups(struct cred *new, const struct cred *old)
|
||||
{
|
||||
int i;
|
||||
|
||||
/* Do nothing if there are no setgid restrictions for our old RGID. */
|
||||
if (setid_policy_lookup((kid_t){.gid = old->gid}, INVALID_ID, GID) == SIDPOL_DEFAULT)
|
||||
return 0;
|
||||
|
||||
get_group_info(new->group_info);
|
||||
for (i = 0; i < new->group_info->ngroups; i++) {
|
||||
if (!id_permitted_for_cred(old, (kid_t){.gid = new->group_info->gid[i]}, GID)) {
|
||||
put_group_info(new->group_info);
|
||||
/*
|
||||
* Kill this process to avoid potential security vulnerabilities
|
||||
* that could arise from a missing allowlist entry preventing a
|
||||
* privileged process from dropping to a lesser-privileged one.
|
||||
*/
|
||||
force_sig(SIGKILL);
|
||||
return -EACCES;
|
||||
}
|
||||
}
|
||||
|
||||
put_group_info(new->group_info);
|
||||
return 0;
|
||||
}
|
||||
|
||||
static struct security_hook_list safesetid_security_hooks[] = {
|
||||
LSM_HOOK_INIT(task_fix_setuid, safesetid_task_fix_setuid),
|
||||
LSM_HOOK_INIT(task_fix_setgid, safesetid_task_fix_setgid),
|
||||
LSM_HOOK_INIT(task_fix_setgroups, safesetid_task_fix_setgroups),
|
||||
LSM_HOOK_INIT(capable, safesetid_security_capable)
|
||||
};
|
||||
|
||||
|
@ -1804,6 +1804,11 @@ int security_task_fix_setgid(struct cred *new, const struct cred *old,
|
||||
return call_int_hook(task_fix_setgid, 0, new, old, flags);
|
||||
}
|
||||
|
||||
int security_task_fix_setgroups(struct cred *new, const struct cred *old)
|
||||
{
|
||||
return call_int_hook(task_fix_setgroups, 0, new, old);
|
||||
}
|
||||
|
||||
int security_task_setpgid(struct task_struct *p, pid_t pgid)
|
||||
{
|
||||
return call_int_hook(task_setpgid, 0, p, pgid);
|
||||
|
@ -1,5 +1,5 @@
|
||||
# SPDX-License-Identifier: GPL-2.0
|
||||
# Makefile for mount selftests.
|
||||
# Makefile for SafeSetID selftest.
|
||||
CFLAGS = -Wall -O2
|
||||
LDLIBS = -lcap
|
||||
|
||||
|
@ -3,6 +3,7 @@
|
||||
#include <stdio.h>
|
||||
#include <errno.h>
|
||||
#include <pwd.h>
|
||||
#include <grp.h>
|
||||
#include <string.h>
|
||||
#include <syscall.h>
|
||||
#include <sys/capability.h>
|
||||
@ -16,17 +17,28 @@
|
||||
#include <stdbool.h>
|
||||
#include <stdarg.h>
|
||||
|
||||
/*
|
||||
* NOTES about this test:
|
||||
* - requries libcap-dev to be installed on test system
|
||||
* - requires securityfs to me mounted at /sys/kernel/security, e.g.:
|
||||
* mount -n -t securityfs -o nodev,noexec,nosuid securityfs /sys/kernel/security
|
||||
* - needs CONFIG_SECURITYFS and CONFIG_SAFESETID to be enabled
|
||||
*/
|
||||
|
||||
#ifndef CLONE_NEWUSER
|
||||
# define CLONE_NEWUSER 0x10000000
|
||||
#endif
|
||||
|
||||
#define ROOT_USER 0
|
||||
#define RESTRICTED_PARENT 1
|
||||
#define ALLOWED_CHILD1 2
|
||||
#define ALLOWED_CHILD2 3
|
||||
#define NO_POLICY_USER 4
|
||||
#define ROOT_UGID 0
|
||||
#define RESTRICTED_PARENT_UGID 1
|
||||
#define ALLOWED_CHILD1_UGID 2
|
||||
#define ALLOWED_CHILD2_UGID 3
|
||||
#define NO_POLICY_UGID 4
|
||||
|
||||
char* add_whitelist_policy_file = "/sys/kernel/security/safesetid/add_whitelist_policy";
|
||||
#define UGID_POLICY_STRING "1:2\n1:3\n2:2\n3:3\n"
|
||||
|
||||
char* add_uid_whitelist_policy_file = "/sys/kernel/security/safesetid/uid_allowlist_policy";
|
||||
char* add_gid_whitelist_policy_file = "/sys/kernel/security/safesetid/gid_allowlist_policy";
|
||||
|
||||
static void die(char *fmt, ...)
|
||||
{
|
||||
@ -106,9 +118,10 @@ static void ensure_user_exists(uid_t uid)
|
||||
die("couldn't open file\n");
|
||||
if (fseek(fd, 0, SEEK_END))
|
||||
die("couldn't fseek\n");
|
||||
snprintf(name_str, 10, "%d", uid);
|
||||
snprintf(name_str, 10, "user %d", uid);
|
||||
p.pw_name=name_str;
|
||||
p.pw_uid=uid;
|
||||
p.pw_gid=uid;
|
||||
p.pw_gecos="Test account";
|
||||
p.pw_dir="/dev/null";
|
||||
p.pw_shell="/bin/false";
|
||||
@ -120,9 +133,36 @@ static void ensure_user_exists(uid_t uid)
|
||||
}
|
||||
}
|
||||
|
||||
static void ensure_group_exists(gid_t gid)
|
||||
{
|
||||
struct group g;
|
||||
|
||||
FILE *fd;
|
||||
char name_str[10];
|
||||
|
||||
if (getgrgid(gid) == NULL) {
|
||||
memset(&g,0x00,sizeof(g));
|
||||
fd=fopen("/etc/group","a");
|
||||
if (fd == NULL)
|
||||
die("couldn't open group file\n");
|
||||
if (fseek(fd, 0, SEEK_END))
|
||||
die("couldn't fseek group file\n");
|
||||
snprintf(name_str, 10, "group %d", gid);
|
||||
g.gr_name=name_str;
|
||||
g.gr_gid=gid;
|
||||
g.gr_passwd=NULL;
|
||||
g.gr_mem=NULL;
|
||||
int value = putgrent(&g,fd);
|
||||
if (value != 0)
|
||||
die("putgrent failed\n");
|
||||
if (fclose(fd))
|
||||
die("fclose failed\n");
|
||||
}
|
||||
}
|
||||
|
||||
static void ensure_securityfs_mounted(void)
|
||||
{
|
||||
int fd = open(add_whitelist_policy_file, O_WRONLY);
|
||||
int fd = open(add_uid_whitelist_policy_file, O_WRONLY);
|
||||
if (fd < 0) {
|
||||
if (errno == ENOENT) {
|
||||
// Need to mount securityfs
|
||||
@ -135,39 +175,60 @@ static void ensure_securityfs_mounted(void)
|
||||
} else {
|
||||
if (close(fd) != 0) {
|
||||
die("close of %s failed: %s\n",
|
||||
add_whitelist_policy_file, strerror(errno));
|
||||
add_uid_whitelist_policy_file, strerror(errno));
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
static void write_policies(void)
|
||||
static void write_uid_policies()
|
||||
{
|
||||
static char *policy_str =
|
||||
"1:2\n"
|
||||
"1:3\n"
|
||||
"2:2\n"
|
||||
"3:3\n";
|
||||
static char *policy_str = UGID_POLICY_STRING;
|
||||
ssize_t written;
|
||||
int fd;
|
||||
|
||||
fd = open(add_whitelist_policy_file, O_WRONLY);
|
||||
fd = open(add_uid_whitelist_policy_file, O_WRONLY);
|
||||
if (fd < 0)
|
||||
die("can't open add_whitelist_policy file\n");
|
||||
die("can't open add_uid_whitelist_policy file\n");
|
||||
written = write(fd, policy_str, strlen(policy_str));
|
||||
if (written != strlen(policy_str)) {
|
||||
if (written >= 0) {
|
||||
die("short write to %s\n", add_whitelist_policy_file);
|
||||
die("short write to %s\n", add_uid_whitelist_policy_file);
|
||||
} else {
|
||||
die("write to %s failed: %s\n",
|
||||
add_whitelist_policy_file, strerror(errno));
|
||||
add_uid_whitelist_policy_file, strerror(errno));
|
||||
}
|
||||
}
|
||||
if (close(fd) != 0) {
|
||||
die("close of %s failed: %s\n",
|
||||
add_whitelist_policy_file, strerror(errno));
|
||||
add_uid_whitelist_policy_file, strerror(errno));
|
||||
}
|
||||
}
|
||||
|
||||
static void write_gid_policies()
|
||||
{
|
||||
static char *policy_str = UGID_POLICY_STRING;
|
||||
ssize_t written;
|
||||
int fd;
|
||||
|
||||
fd = open(add_gid_whitelist_policy_file, O_WRONLY);
|
||||
if (fd < 0)
|
||||
die("can't open add_gid_whitelist_policy file\n");
|
||||
written = write(fd, policy_str, strlen(policy_str));
|
||||
if (written != strlen(policy_str)) {
|
||||
if (written >= 0) {
|
||||
die("short write to %s\n", add_gid_whitelist_policy_file);
|
||||
} else {
|
||||
die("write to %s failed: %s\n",
|
||||
add_gid_whitelist_policy_file, strerror(errno));
|
||||
}
|
||||
}
|
||||
if (close(fd) != 0) {
|
||||
die("close of %s failed: %s\n",
|
||||
add_gid_whitelist_policy_file, strerror(errno));
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
static bool test_userns(bool expect_success)
|
||||
{
|
||||
uid_t uid;
|
||||
@ -194,7 +255,7 @@ static bool test_userns(bool expect_success)
|
||||
printf("preparing file name string failed");
|
||||
return false;
|
||||
}
|
||||
success = write_file(map_file_name, "0 0 1", uid);
|
||||
success = write_file(map_file_name, "0 %d 1", uid);
|
||||
return success == expect_success;
|
||||
}
|
||||
|
||||
@ -258,13 +319,144 @@ static void test_setuid(uid_t child_uid, bool expect_success)
|
||||
die("should not reach here\n");
|
||||
}
|
||||
|
||||
static void test_setgid(gid_t child_gid, bool expect_success)
|
||||
{
|
||||
pid_t cpid, w;
|
||||
int wstatus;
|
||||
|
||||
cpid = fork();
|
||||
if (cpid == -1) {
|
||||
die("fork\n");
|
||||
}
|
||||
|
||||
if (cpid == 0) { /* Code executed by child */
|
||||
if (setgid(child_gid) < 0)
|
||||
exit(EXIT_FAILURE);
|
||||
if (getgid() == child_gid)
|
||||
exit(EXIT_SUCCESS);
|
||||
else
|
||||
exit(EXIT_FAILURE);
|
||||
} else { /* Code executed by parent */
|
||||
do {
|
||||
w = waitpid(cpid, &wstatus, WUNTRACED | WCONTINUED);
|
||||
if (w == -1) {
|
||||
die("waitpid\n");
|
||||
}
|
||||
|
||||
if (WIFEXITED(wstatus)) {
|
||||
if (WEXITSTATUS(wstatus) == EXIT_SUCCESS) {
|
||||
if (expect_success) {
|
||||
return;
|
||||
} else {
|
||||
die("unexpected success\n");
|
||||
}
|
||||
} else {
|
||||
if (expect_success) {
|
||||
die("unexpected failure\n");
|
||||
} else {
|
||||
return;
|
||||
}
|
||||
}
|
||||
} else if (WIFSIGNALED(wstatus)) {
|
||||
if (WTERMSIG(wstatus) == 9) {
|
||||
if (expect_success)
|
||||
die("killed unexpectedly\n");
|
||||
else
|
||||
return;
|
||||
} else {
|
||||
die("unexpected signal: %d\n", wstatus);
|
||||
}
|
||||
} else {
|
||||
die("unexpected status: %d\n", wstatus);
|
||||
}
|
||||
} while (!WIFEXITED(wstatus) && !WIFSIGNALED(wstatus));
|
||||
}
|
||||
|
||||
die("should not reach here\n");
|
||||
}
|
||||
|
||||
static void test_setgroups(gid_t* child_groups, size_t len, bool expect_success)
|
||||
{
|
||||
pid_t cpid, w;
|
||||
int wstatus;
|
||||
gid_t groupset[len];
|
||||
int i, j;
|
||||
|
||||
cpid = fork();
|
||||
if (cpid == -1) {
|
||||
die("fork\n");
|
||||
}
|
||||
|
||||
if (cpid == 0) { /* Code executed by child */
|
||||
if (setgroups(len, child_groups) != 0)
|
||||
exit(EXIT_FAILURE);
|
||||
if (getgroups(len, groupset) != len)
|
||||
exit(EXIT_FAILURE);
|
||||
for (i = 0; i < len; i++) {
|
||||
for (j = 0; j < len; j++) {
|
||||
if (child_groups[i] == groupset[j])
|
||||
break;
|
||||
if (j == len - 1)
|
||||
exit(EXIT_FAILURE);
|
||||
}
|
||||
}
|
||||
exit(EXIT_SUCCESS);
|
||||
} else { /* Code executed by parent */
|
||||
do {
|
||||
w = waitpid(cpid, &wstatus, WUNTRACED | WCONTINUED);
|
||||
if (w == -1) {
|
||||
die("waitpid\n");
|
||||
}
|
||||
|
||||
if (WIFEXITED(wstatus)) {
|
||||
if (WEXITSTATUS(wstatus) == EXIT_SUCCESS) {
|
||||
if (expect_success) {
|
||||
return;
|
||||
} else {
|
||||
die("unexpected success\n");
|
||||
}
|
||||
} else {
|
||||
if (expect_success) {
|
||||
die("unexpected failure\n");
|
||||
} else {
|
||||
return;
|
||||
}
|
||||
}
|
||||
} else if (WIFSIGNALED(wstatus)) {
|
||||
if (WTERMSIG(wstatus) == 9) {
|
||||
if (expect_success)
|
||||
die("killed unexpectedly\n");
|
||||
else
|
||||
return;
|
||||
} else {
|
||||
die("unexpected signal: %d\n", wstatus);
|
||||
}
|
||||
} else {
|
||||
die("unexpected status: %d\n", wstatus);
|
||||
}
|
||||
} while (!WIFEXITED(wstatus) && !WIFSIGNALED(wstatus));
|
||||
}
|
||||
|
||||
die("should not reach here\n");
|
||||
}
|
||||
|
||||
|
||||
static void ensure_users_exist(void)
|
||||
{
|
||||
ensure_user_exists(ROOT_USER);
|
||||
ensure_user_exists(RESTRICTED_PARENT);
|
||||
ensure_user_exists(ALLOWED_CHILD1);
|
||||
ensure_user_exists(ALLOWED_CHILD2);
|
||||
ensure_user_exists(NO_POLICY_USER);
|
||||
ensure_user_exists(ROOT_UGID);
|
||||
ensure_user_exists(RESTRICTED_PARENT_UGID);
|
||||
ensure_user_exists(ALLOWED_CHILD1_UGID);
|
||||
ensure_user_exists(ALLOWED_CHILD2_UGID);
|
||||
ensure_user_exists(NO_POLICY_UGID);
|
||||
}
|
||||
|
||||
static void ensure_groups_exist(void)
|
||||
{
|
||||
ensure_group_exists(ROOT_UGID);
|
||||
ensure_group_exists(RESTRICTED_PARENT_UGID);
|
||||
ensure_group_exists(ALLOWED_CHILD1_UGID);
|
||||
ensure_group_exists(ALLOWED_CHILD2_UGID);
|
||||
ensure_group_exists(NO_POLICY_UGID);
|
||||
}
|
||||
|
||||
static void drop_caps(bool setid_retained)
|
||||
@ -283,41 +475,52 @@ static void drop_caps(bool setid_retained)
|
||||
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
ensure_groups_exist();
|
||||
ensure_users_exist();
|
||||
ensure_securityfs_mounted();
|
||||
write_policies();
|
||||
write_uid_policies();
|
||||
write_gid_policies();
|
||||
|
||||
if (prctl(PR_SET_KEEPCAPS, 1L))
|
||||
die("Error with set keepcaps\n");
|
||||
|
||||
// First test to make sure we can write userns mappings from a user
|
||||
// that doesn't have any restrictions (as long as it has CAP_SETUID);
|
||||
if (setuid(NO_POLICY_USER) < 0)
|
||||
die("Error with set uid(%d)\n", NO_POLICY_USER);
|
||||
if (setgid(NO_POLICY_USER) < 0)
|
||||
die("Error with set gid(%d)\n", NO_POLICY_USER);
|
||||
|
||||
// First test to make sure we can write userns mappings from a non-root
|
||||
// user that doesn't have any restrictions (as long as it has
|
||||
// CAP_SETUID);
|
||||
if (setgid(NO_POLICY_UGID) < 0)
|
||||
die("Error with set gid(%d)\n", NO_POLICY_UGID);
|
||||
if (setuid(NO_POLICY_UGID) < 0)
|
||||
die("Error with set uid(%d)\n", NO_POLICY_UGID);
|
||||
// Take away all but setid caps
|
||||
drop_caps(true);
|
||||
|
||||
// Need PR_SET_DUMPABLE flag set so we can write /proc/[pid]/uid_map
|
||||
// from non-root parent process.
|
||||
if (prctl(PR_SET_DUMPABLE, 1, 0, 0, 0))
|
||||
die("Error with set dumpable\n");
|
||||
|
||||
if (!test_userns(true)) {
|
||||
die("test_userns failed when it should work\n");
|
||||
}
|
||||
|
||||
if (setuid(RESTRICTED_PARENT) < 0)
|
||||
die("Error with set uid(%d)\n", RESTRICTED_PARENT);
|
||||
if (setgid(RESTRICTED_PARENT) < 0)
|
||||
die("Error with set gid(%d)\n", RESTRICTED_PARENT);
|
||||
// Now switch to a user/group with restrictions
|
||||
if (setgid(RESTRICTED_PARENT_UGID) < 0)
|
||||
die("Error with set gid(%d)\n", RESTRICTED_PARENT_UGID);
|
||||
if (setuid(RESTRICTED_PARENT_UGID) < 0)
|
||||
die("Error with set uid(%d)\n", RESTRICTED_PARENT_UGID);
|
||||
|
||||
test_setuid(ROOT_USER, false);
|
||||
test_setuid(ALLOWED_CHILD1, true);
|
||||
test_setuid(ALLOWED_CHILD2, true);
|
||||
test_setuid(NO_POLICY_USER, false);
|
||||
test_setuid(ROOT_UGID, false);
|
||||
test_setuid(ALLOWED_CHILD1_UGID, true);
|
||||
test_setuid(ALLOWED_CHILD2_UGID, true);
|
||||
test_setuid(NO_POLICY_UGID, false);
|
||||
|
||||
test_setgid(ROOT_UGID, false);
|
||||
test_setgid(ALLOWED_CHILD1_UGID, true);
|
||||
test_setgid(ALLOWED_CHILD2_UGID, true);
|
||||
test_setgid(NO_POLICY_UGID, false);
|
||||
|
||||
gid_t allowed_supp_groups[2] = {ALLOWED_CHILD1_UGID, ALLOWED_CHILD2_UGID};
|
||||
gid_t disallowed_supp_groups[2] = {ROOT_UGID, NO_POLICY_UGID};
|
||||
test_setgroups(allowed_supp_groups, 2, true);
|
||||
test_setgroups(disallowed_supp_groups, 2, false);
|
||||
|
||||
if (!test_userns(false)) {
|
||||
die("test_userns worked when it should fail\n");
|
||||
@ -328,8 +531,12 @@ int main(int argc, char **argv)
|
||||
test_setuid(2, false);
|
||||
test_setuid(3, false);
|
||||
test_setuid(4, false);
|
||||
test_setgid(2, false);
|
||||
test_setgid(3, false);
|
||||
test_setgid(4, false);
|
||||
|
||||
// NOTE: this test doesn't clean up users that were created in
|
||||
// /etc/passwd or flush policies that were added to the LSM.
|
||||
printf("test successful!\n");
|
||||
return EXIT_SUCCESS;
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user