mirror of
https://sourceware.org/git/glibc.git
synced 2024-12-04 19:00:09 +00:00
196 lines
5.6 KiB
C
196 lines
5.6 KiB
C
/* Copyright (C) 2012-2024 Free Software Foundation, Inc.
|
|
This file is part of the GNU C Library.
|
|
|
|
The GNU C Library is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU Lesser General Public
|
|
License as published by the Free Software Foundation; either
|
|
version 2.1 of the License, or (at your option) any later version.
|
|
|
|
The GNU C Library is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public
|
|
License along with the GNU C Library; if not, see
|
|
<https://www.gnu.org/licenses/>. */
|
|
|
|
/* Verify that correctly filter out unsafe environment variables defined
|
|
in unsecvars.h. */
|
|
|
|
#include <array_length.h>
|
|
#include <gnu/lib-names.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
|
|
#include <support/check.h>
|
|
#include <support/support.h>
|
|
#include <support/test-driver.h>
|
|
#include <support/capture_subprocess.h>
|
|
|
|
static char SETGID_CHILD[] = "setgid-child";
|
|
|
|
#define FILTERED_VALUE "some-filtered-value"
|
|
#define UNFILTERED_VALUE "some-unfiltered-value"
|
|
/* It assumes no other programs is being profile with a library with same
|
|
SONAME using the default folder. */
|
|
#ifndef PROFILE_LIB
|
|
# define PROFILE_LIB "tst-sonamemove-runmod2.so"
|
|
#endif
|
|
|
|
struct envvar_t
|
|
{
|
|
const char *env;
|
|
const char *value;
|
|
};
|
|
|
|
/* That is not an extensible list of all filtered out environment
|
|
variables. */
|
|
static const struct envvar_t filtered_envvars[] =
|
|
{
|
|
{ "GLIBC_TUNABLES", FILTERED_VALUE },
|
|
{ "LD_AUDIT", FILTERED_VALUE },
|
|
{ "LD_HWCAP_MASK", FILTERED_VALUE },
|
|
{ "LD_LIBRARY_PATH", FILTERED_VALUE },
|
|
{ "LD_PRELOAD", FILTERED_VALUE },
|
|
{ "LD_PROFILE", PROFILE_LIB },
|
|
{ "MALLOC_ARENA_MAX", FILTERED_VALUE },
|
|
{ "MALLOC_PERTURB_", FILTERED_VALUE },
|
|
{ "MALLOC_TRACE", FILTERED_VALUE },
|
|
{ "MALLOC_TRIM_THRESHOLD_", FILTERED_VALUE },
|
|
{ "RES_OPTIONS", FILTERED_VALUE },
|
|
{ "LD_DEBUG", "all" },
|
|
{ "LD_DEBUG_OUTPUT", "/tmp/some-file" },
|
|
{ "LD_WARN", FILTERED_VALUE },
|
|
{ "LD_VERBOSE", FILTERED_VALUE },
|
|
{ "LD_BIND_NOW", "0" },
|
|
{ "LD_BIND_NOT", "1" },
|
|
};
|
|
|
|
static const struct envvar_t unfiltered_envvars[] =
|
|
{
|
|
/* Non longer supported option. */
|
|
{ "LD_ASSUME_KERNEL", UNFILTERED_VALUE },
|
|
};
|
|
|
|
static int
|
|
test_child (void)
|
|
{
|
|
int ret = 0;
|
|
|
|
for (const struct envvar_t *e = filtered_envvars;
|
|
e != array_end (filtered_envvars);
|
|
e++)
|
|
{
|
|
const char *env = getenv (e->env);
|
|
if (env != NULL)
|
|
{
|
|
printf ("FAIL: filtered environment variable is not NULL: %s=%s\n",
|
|
e->env, env);
|
|
ret = 1;
|
|
}
|
|
}
|
|
|
|
for (const struct envvar_t *e = unfiltered_envvars;
|
|
e != array_end (unfiltered_envvars);
|
|
e++)
|
|
{
|
|
const char *env = getenv (e->env);
|
|
if (!(env != NULL && strcmp (env, e->value) == 0))
|
|
{
|
|
if (env == NULL)
|
|
printf ("FAIL: unfiltered environment variable %s is NULL\n",
|
|
e->env);
|
|
else
|
|
printf ("FAIL: unfiltered environment variable %s=%s != %s\n",
|
|
e->env, env, e->value);
|
|
|
|
ret = 1;
|
|
}
|
|
}
|
|
|
|
/* Also check if no profile file was created.
|
|
The parent sets LD_DEBUG_OUTPUT="/tmp/some-file"
|
|
which should be filtered. Then it falls back to "/var/tmp".
|
|
Note: LD_PROFILE is not supported for static binaries. */
|
|
{
|
|
char *profilepath = xasprintf ("/var/tmp/%s.profile", PROFILE_LIB);
|
|
if (!access (profilepath, R_OK))
|
|
{
|
|
printf ("FAIL: LD_PROFILE file at %s was created!\n", profilepath);
|
|
ret = 1;
|
|
}
|
|
free (profilepath);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int
|
|
do_test (int argc, char **argv)
|
|
{
|
|
/* For dynamic loader, the test requires --enable-hardcoded-path-in-tests so
|
|
the kernel sets the AT_SECURE on process initialization. */
|
|
if (argc >= 2 && strstr (argv[1], LD_SO) != 0)
|
|
FAIL_UNSUPPORTED ("dynamic test requires --enable-hardcoded-path-in-tests");
|
|
|
|
/* Setgid child process. */
|
|
if (argc == 2 && strcmp (argv[1], SETGID_CHILD) == 0)
|
|
{
|
|
if (getgid () == getegid ())
|
|
/* This can happen if the file system is mounted nosuid. */
|
|
FAIL_UNSUPPORTED ("SGID failed: GID and EGID match (%jd)\n",
|
|
(intmax_t) getgid ());
|
|
|
|
int ret = test_child ();
|
|
|
|
if (ret != 0)
|
|
exit (1);
|
|
|
|
/* Special return code to make sure that the child executed all the way
|
|
through. */
|
|
exit (42);
|
|
}
|
|
else
|
|
{
|
|
for (const struct envvar_t *e = filtered_envvars;
|
|
e != array_end (filtered_envvars);
|
|
e++)
|
|
setenv (e->env, e->value, 1);
|
|
|
|
for (const struct envvar_t *e = unfiltered_envvars;
|
|
e != array_end (unfiltered_envvars);
|
|
e++)
|
|
setenv (e->env, e->value, 1);
|
|
|
|
/* Ensure that the profile output does not exist from a previous run
|
|
(e.g. if test_dir, which defaults to /tmp, is mounted nosuid.)
|
|
Note: support_capture_subprogram_self_sgid creates the SGID binary
|
|
in test_dir. */
|
|
{
|
|
char *profilepath = xasprintf ("/var/tmp/%s.profile", PROFILE_LIB);
|
|
unlink (profilepath);
|
|
free (profilepath);
|
|
}
|
|
|
|
int status = support_capture_subprogram_self_sgid (SETGID_CHILD);
|
|
|
|
if (WEXITSTATUS (status) == EXIT_UNSUPPORTED)
|
|
exit (EXIT_UNSUPPORTED);
|
|
|
|
if (WEXITSTATUS (status) != 42)
|
|
{
|
|
printf (" child failed with status %d\n",
|
|
WEXITSTATUS (status));
|
|
support_record_failure ();
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
#define TEST_FUNCTION_ARGV do_test
|
|
#include <support/test-driver.c>
|