From: Dmitry V. Levin Date: Wed, 13 Apr 2016 22:38:17 +0000 (+0000) Subject: tests: move kernel uid overflow check to libtests X-Git-Tag: v4.12~425 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=c1f1cc1b4c03a0199de270354a09851a46a07857;p=strace tests: move kernel uid overflow check to libtests This code used in two different places, so move it to the library. * tests/overflowuid.c: New file. * tests/Makefile.am (libtests_a_SOURCES): Add it. * tests/tests.h (check_overflowuid, check_overflowgid): New prototypes. * tests/uid.c (main): Use check_overflowuid. * tests/uid16.c (main): Likewise. --- diff --git a/tests/Makefile.am b/tests/Makefile.am index 2a4feb00..c7e884d9 100644 --- a/tests/Makefile.am +++ b/tests/Makefile.am @@ -46,6 +46,7 @@ libtests_a_SOURCES = \ hexdump_strdup.c \ hexquote_strndup.c \ inode_of_sockfd.c \ + overflowuid.c \ print_quoted_string.c \ tail_alloc.c \ tests.h \ diff --git a/tests/overflowuid.c b/tests/overflowuid.c new file mode 100644 index 00000000..d9d9e371 --- /dev/null +++ b/tests/overflowuid.c @@ -0,0 +1,67 @@ +/* + * Copyright (c) 2014-2016 Dmitry V. Levin + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * 3. The name of the author may not be used to endorse or promote products + * derived from this software without specific prior written permission. + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR + * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES + * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. + * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, + * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT + * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, + * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY + * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT + * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF + * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + */ + +#include "tests.h" +#include +#include +#include +#include + +static void +check_overflow_id(const int id, const char *overflowid) +{ + int fd = open(overflowid, O_RDONLY); + if (fd < 0) { + if (ENOENT == errno) + return; + perror_msg_and_fail("open: %s", overflowid); + } + + /* we trust the kernel */ + char buf[sizeof(int)*3]; + int n = read(fd, buf, sizeof(buf) - 1); + if (n > 0) { + buf[n] = '\0'; + n = atoi(buf); + if (id == n) + error_msg_and_skip("%d matches %s", id, overflowid); + } + + close(fd); +} + +void +check_overflowuid(const int uid) +{ + check_overflow_id(uid, "/proc/sys/kernel/overflowuid"); +} + +void +check_overflowgid(const int gid) +{ + check_overflow_id(gid, "/proc/sys/kernel/overflowgid"); +} diff --git a/tests/tests.h b/tests/tests.h index 115379ee..4382fe35 100644 --- a/tests/tests.h +++ b/tests/tests.h @@ -79,7 +79,13 @@ const char *hexquote_strndup(const char *, size_t); unsigned long inode_of_sockfd(int); /* Print string in quoted form. */ -void print_quoted_string(const char *str); +void print_quoted_string(const char *); + +/* Check whether given uid matches kernel overflowuid. */ +void check_overflowuid(const int); + +/* Check whether given gid matches kernel overflowgid. */ +void check_overflowgid(const int); # define ARRAY_SIZE(arg) ((unsigned int) (sizeof(arg) / sizeof((arg)[0]))) # define LENGTH_OF(arg) ((unsigned int) sizeof(arg) - 1) diff --git a/tests/uid.c b/tests/uid.c index 5da04712..35e0b91a 100644 --- a/tests/uid.c +++ b/tests/uid.c @@ -52,20 +52,7 @@ main(void) # define __NR_getuid __NR_getxuid # endif uid = syscall(__NR_getuid); - - (void) close(0); - if (open("/proc/sys/kernel/overflowuid", O_RDONLY) == 0) { - /* we trust the kernel */ - char buf[sizeof(int)*3]; - int n = read(0, buf, sizeof(buf) - 1); - if (n) { - buf[n] = '\0'; - n = atoi(buf); - if (uid == n) - error_msg_and_skip("getuid() == overflowuid"); - } - (void) close(0); - } + check_overflowuid(uid); assert(syscall(__NR_setuid, uid) == 0); { diff --git a/tests/uid16.c b/tests/uid16.c index 04bf8a31..bc713878 100644 --- a/tests/uid16.c +++ b/tests/uid16.c @@ -66,20 +66,7 @@ main(void) int *list = 0; uid = syscall(__NR_getuid); - - (void) close(0); - if (open("/proc/sys/kernel/overflowuid", O_RDONLY) == 0) { - /* we trust the kernel */ - char buf[sizeof(int)*3]; - int n = read(0, buf, sizeof(buf) - 1); - if (n) { - buf[n] = '\0'; - n = atoi(buf); - if (uid == n) - error_msg_and_skip("getuid() == overflowuid"); - } - close(0); - } + check_overflowuid(uid); assert(syscall(__NR_setuid, uid) == 0); {