GCC Code Coverage Report
Directory: ./ Exec Total Coverage
File: usr.sbin/chroot/chroot.c Lines: 0 53 0.0 %
Date: 2017-11-07 Branches: 0 53 0.0 %

Line Branch Exec Source
1
/*	$OpenBSD: chroot.c,v 1.14 2015/05/19 16:05:12 millert Exp $	*/
2
3
/*
4
 * Copyright (c) 1988, 1993
5
 *	The Regents of the University of California.  All rights reserved.
6
 *
7
 * Redistribution and use in source and binary forms, with or without
8
 * modification, are permitted provided that the following conditions
9
 * are met:
10
 * 1. Redistributions of source code must retain the above copyright
11
 *    notice, this list of conditions and the following disclaimer.
12
 * 2. Redistributions in binary form must reproduce the above copyright
13
 *    notice, this list of conditions and the following disclaimer in the
14
 *    documentation and/or other materials provided with the distribution.
15
 * 3. Neither the name of the University nor the names of its contributors
16
 *    may be used to endorse or promote products derived from this software
17
 *    without specific prior written permission.
18
 *
19
 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29
 * SUCH DAMAGE.
30
 */
31
32
#include <sys/types.h>
33
#include <ctype.h>
34
#include <err.h>
35
#include <errno.h>
36
#include <grp.h>
37
#include <limits.h>
38
#include <login_cap.h>
39
#include <paths.h>
40
#include <pwd.h>
41
#include <stdio.h>
42
#include <stdlib.h>
43
#include <string.h>
44
#include <unistd.h>
45
46
int		main(int, char **);
47
__dead void	usage(void);
48
49
int
50
main(int argc, char **argv)
51
{
52
	struct group	*grp;
53
	struct passwd	*pwd;
54
	login_cap_t	*lc;
55
	const char	*shell;
56
	char		*user, *group, *grouplist;
57
	gid_t		gidlist[NGROUPS_MAX];
58
	int		ch, ngids;
59
	int		flags = LOGIN_SETALL & ~(LOGIN_SETLOGIN|LOGIN_SETUSER);
60
61
	lc = NULL;
62
	ngids = 0;
63
	pwd = NULL;
64
	user = grouplist = NULL;
65
	while ((ch = getopt(argc, argv, "g:u:")) != -1) {
66
		switch(ch) {
67
		case 'u':
68
			user = optarg;
69
			if (*user == '\0')
70
				usage();
71
			break;
72
		case 'g':
73
			grouplist = optarg;
74
			if (*grouplist == '\0')
75
				usage();
76
			break;
77
		default:
78
			usage();
79
		}
80
	}
81
	argc -= optind;
82
	argv += optind;
83
84
	if (argc < 1)
85
		usage();
86
87
	if (user != NULL) {
88
		if ((pwd = getpwnam(user)) == NULL)
89
			errx(1, "no such user `%s'", user);
90
		if ((lc = login_getclass(pwd->pw_class)) == NULL)
91
			err(1, "unable to get login class for `%s'", user);
92
	}
93
94
	while ((group = strsep(&grouplist, ",")) != NULL) {
95
		if (*group == '\0')
96
			continue;
97
98
		if (ngids == NGROUPS_MAX)
99
			errx(1, "too many supplementary groups provided");
100
		if ((grp = getgrnam(group)) == NULL)
101
			errx(1, "no such group `%s'", group);
102
		gidlist[ngids++] = grp->gr_gid;
103
	}
104
105
	if (ngids != 0) {
106
		if (setgid(gidlist[0]) != 0)
107
			err(1, "setgid");
108
		if (setgroups(ngids, gidlist) != 0)
109
			err(1, "setgroups");
110
		flags &= ~LOGIN_SETGROUP;
111
	}
112
	if (lc != NULL) {
113
		if (setusercontext(lc, pwd, pwd->pw_uid, flags) == -1)
114
			err(1, "setusercontext");
115
	}
116
117
	if (chroot(argv[0]) != 0 || chdir("/") != 0)
118
		err(1, "%s", argv[0]);
119
120
	if (pwd != NULL) {
121
		/* only set login name if we are/can be a session leader */
122
		if (getsid(0) == getpid() || setsid() != -1)
123
			setlogin(pwd->pw_name);
124
		if (setuid(pwd->pw_uid) != 0)
125
			err(1, "setuid");
126
	}
127
128
	if (argv[1]) {
129
		execvp(argv[1], &argv[1]);
130
		err(1, "%s", argv[1]);
131
	}
132
133
	if ((shell = getenv("SHELL")) == NULL || *shell == '\0')
134
		shell = _PATH_BSHELL;
135
	execlp(shell, shell, "-i", (char *)NULL);
136
	err(1, "%s", shell);
137
	/* NOTREACHED */
138
}
139
140
__dead void
141
usage(void)
142
{
143
	extern char *__progname;
144
145
	(void)fprintf(stderr, "usage: %s [-g group,group,...] [-u user] "
146
	    "newroot [command]\n", __progname);
147
	exit(1);
148
}