Home | History | Annotate | Download | only in suid
      1 // Copyright (c) 2009 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 // The following is duplicated from base/linux_utils.cc.
      6 // We shouldn't link against C++ code in a setuid binary.
      7 
      8 // Needed for O_DIRECTORY, must be defined before fcntl.h is included
      9 // (and it can be included earlier than the explicit #include below
     10 // in some versions of glibc).
     11 #define _GNU_SOURCE
     12 
     13 #include "sandbox/linux/suid/linux_util.h"
     14 
     15 #include <dirent.h>
     16 #include <errno.h>
     17 #include <fcntl.h>
     18 #include <limits.h>
     19 #include <stdio.h>
     20 #include <stdlib.h>
     21 #include <string.h>
     22 #include <sys/stat.h>
     23 #include <sys/types.h>
     24 #include <unistd.h>
     25 
     26 // expected prefix of the target of the /proc/self/fd/%d link for a socket
     27 static const char kSocketLinkPrefix[] = "socket:[";
     28 
     29 // Parse a symlink in /proc/pid/fd/$x and return the inode number of the
     30 // socket.
     31 //   inode_out: (output) set to the inode number on success
     32 //   path: e.g. /proc/1234/fd/5 (must be a UNIX domain socket descriptor)
     33 static bool ProcPathGetInodeAt(ino_t* inode_out,
     34                                int base_dir_fd,
     35                                const char* path) {
     36   // We also check that the path is relative.
     37   if (!inode_out || !path || *path == '/')
     38     return false;
     39   char buf[256];
     40   const ssize_t n = readlinkat(base_dir_fd, path, buf, sizeof(buf) - 1);
     41   if (n < 0)
     42     return false;
     43   buf[n] = 0;
     44 
     45   if (memcmp(kSocketLinkPrefix, buf, sizeof(kSocketLinkPrefix) - 1))
     46     return false;
     47 
     48   char* endptr = NULL;
     49   errno = 0;
     50   const unsigned long long int inode_ull =
     51       strtoull(buf + sizeof(kSocketLinkPrefix) - 1, &endptr, 10);
     52   if (inode_ull == ULLONG_MAX || !endptr || *endptr != ']' || errno != 0)
     53     return false;
     54 
     55   *inode_out = inode_ull;
     56   return true;
     57 }
     58 
     59 static DIR* opendirat(int base_dir_fd, const char* name) {
     60   // Also check that |name| is relative.
     61   if (base_dir_fd < 0 || !name || *name == '/')
     62     return NULL;
     63   int new_dir_fd = openat(base_dir_fd, name, O_RDONLY | O_DIRECTORY);
     64   if (new_dir_fd < 0)
     65     return NULL;
     66 
     67   return fdopendir(new_dir_fd);
     68 }
     69 
     70 bool FindProcessHoldingSocket(pid_t* pid_out, ino_t socket_inode) {
     71   bool already_found = false;
     72 
     73   DIR* proc = opendir("/proc");
     74   if (!proc)
     75     return false;
     76 
     77   const uid_t uid = getuid();
     78   struct dirent* dent;
     79   while ((dent = readdir(proc))) {
     80     char* endptr = NULL;
     81     errno = 0;
     82     const unsigned long int pid_ul = strtoul(dent->d_name, &endptr, 10);
     83     if (pid_ul == ULONG_MAX || !endptr || *endptr || errno != 0)
     84       continue;
     85 
     86     // We have this setuid code here because the zygote and its children have
     87     // /proc/$pid/fd owned by root. While scanning through /proc, we add this
     88     // extra check so users cannot accidentally gain information about other
     89     // users' processes. To determine process ownership, we use the property
     90     // that if user foo owns process N, then /proc/N is owned by foo.
     91     int proc_pid_fd = -1;
     92     {
     93       char buf[256];
     94       struct stat statbuf;
     95       snprintf(buf, sizeof(buf), "/proc/%lu", pid_ul);
     96       proc_pid_fd = open(buf, O_RDONLY | O_DIRECTORY);
     97       if (proc_pid_fd < 0)
     98         continue;
     99       if (fstat(proc_pid_fd, &statbuf) < 0 || uid != statbuf.st_uid) {
    100         close(proc_pid_fd);
    101         continue;
    102       }
    103     }
    104 
    105     DIR* fd = opendirat(proc_pid_fd, "fd");
    106     if (!fd) {
    107       close(proc_pid_fd);
    108       continue;
    109     }
    110 
    111     while ((dent = readdir(fd))) {
    112       char buf[256];
    113       int printed = snprintf(buf, sizeof(buf), "fd/%s", dent->d_name);
    114       if (printed < 0 || printed >= (int)(sizeof(buf) - 1)) {
    115         continue;
    116       }
    117 
    118       ino_t fd_inode;
    119       if (ProcPathGetInodeAt(&fd_inode, proc_pid_fd, buf)) {
    120         if (fd_inode == socket_inode) {
    121           if (already_found) {
    122             closedir(fd);
    123             close(proc_pid_fd);
    124             closedir(proc);
    125             return false;
    126           }
    127 
    128           already_found = true;
    129           *pid_out = pid_ul;
    130           break;
    131         }
    132       }
    133     }
    134     closedir(fd);
    135     close(proc_pid_fd);
    136   }
    137   closedir(proc);
    138 
    139   return already_found;
    140 }
    141