xref: /minix/lib/libutil/login_cap.c (revision 0a6a1f1d)
1 /*	$NetBSD: login_cap.c,v 1.32 2015/07/11 09:21:22 kamil Exp $	*/
2 
3 /*-
4  * Copyright (c) 1995,1997 Berkeley Software Design, Inc. All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  * 2. Redistributions in binary form must reproduce the above copyright
12  *    notice, this list of conditions and the following disclaimer in the
13  *    documentation and/or other materials provided with the distribution.
14  * 3. All advertising materials mentioning features or use of this software
15  *    must display the following acknowledgement:
16  *	This product includes software developed by Berkeley Software Design,
17  *	Inc.
18  * 4. The name of Berkeley Software Design, Inc.  may not be used to endorse
19  *    or promote products derived from this software without specific prior
20  *    written permission.
21  *
22  * THIS SOFTWARE IS PROVIDED BY BERKELEY SOFTWARE DESIGN, INC. ``AS IS'' AND
23  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25  * ARE DISCLAIMED.  IN NO EVENT SHALL BERKELEY SOFTWARE DESIGN, INC. BE LIABLE
26  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32  * SUCH DAMAGE.
33  *
34  *	BSDI login_cap.c,v 2.13 1998/02/07 03:17:05 prb Exp
35  */
36 
37 #include <sys/cdefs.h>
38 #if defined(LIBC_SCCS) && !defined(lint)
39 __RCSID("$NetBSD: login_cap.c,v 1.32 2015/07/11 09:21:22 kamil Exp $");
40 #endif /* LIBC_SCCS and not lint */
41 
42 #include <sys/types.h>
43 #include <sys/stat.h>
44 #include <sys/time.h>
45 #include <sys/resource.h>
46 #include <sys/param.h>
47 
48 #include <assert.h>
49 #include <ctype.h>
50 #include <err.h>
51 #include <errno.h>
52 #include <fcntl.h>
53 #include <limits.h>
54 #include <login_cap.h>
55 #include <paths.h>
56 #include <pwd.h>
57 #include <stdio.h>
58 #include <stdlib.h>
59 #include <string.h>
60 #include <syslog.h>
61 #include <unistd.h>
62 #include <util.h>
63 
64 static u_quad_t	multiply(u_quad_t, u_quad_t);
65 static u_quad_t	strtolimit(const char *, char **, int);
66 static u_quad_t	strtosize(const char *, char **, int);
67 static int	gsetrl(login_cap_t *, int, const char *, int type);
68 static int	isinfinite(const char *);
69 static int	envset(void *, const char *, const char *, int);
70 
71 login_cap_t *
login_getclass(const char * class)72 login_getclass(const char *class)
73 {
74 	const char *classfiles[2];
75 	login_cap_t *lc;
76 	int res;
77 
78 	/* class may be NULL */
79 
80 	if (secure_path(_PATH_LOGIN_CONF) == 0) {
81 		classfiles[0] = _PATH_LOGIN_CONF;
82 		classfiles[1] = NULL;
83 	} else {
84 		classfiles[0] = NULL;
85 	}
86 
87 	if ((lc = malloc(sizeof(login_cap_t))) == NULL) {
88 		syslog(LOG_ERR, "%s:%d malloc: %m", __FILE__, __LINE__);
89 		return (0);
90 	}
91 
92 	lc->lc_cap = 0;
93 	lc->lc_style = 0;
94 
95 	if (class == NULL || class[0] == '\0')
96 		class = LOGIN_DEFCLASS;
97 
98     	if ((lc->lc_class = strdup(class)) == NULL) {
99 		syslog(LOG_ERR, "%s:%d strdup: %m", __FILE__, __LINE__);
100 		free(lc);
101 		return (0);
102 	}
103 
104 	/*
105 	 * Not having a login.conf file is not an error condition.
106 	 * The individual routines deal reasonably with missing
107 	 * capabilities and use default values.
108 	 */
109 	if (classfiles[0] == NULL)
110 		return(lc);
111 
112 	if ((res = cgetent(&lc->lc_cap, classfiles, lc->lc_class)) != 0) {
113 		lc->lc_cap = 0;
114 		switch (res) {
115 		case 1:
116 			syslog(LOG_ERR, "%s: couldn't resolve 'tc'",
117 				lc->lc_class);
118 			break;
119 		case -1:
120 			if (strcmp(lc->lc_class, LOGIN_DEFCLASS) == 0)
121 				return (lc);
122 			syslog(LOG_ERR, "%s: unknown class", lc->lc_class);
123 			break;
124 		case -2:
125 			syslog(LOG_ERR, "%s: getting class information: %m",
126 				lc->lc_class);
127 			break;
128 		case -3:
129 			syslog(LOG_ERR, "%s: 'tc' reference loop",
130 				lc->lc_class);
131 			break;
132 		default:
133 			syslog(LOG_ERR, "%s: unexpected cgetent error",
134 				lc->lc_class);
135 			break;
136 		}
137 		free(lc->lc_class);
138 		free(lc);
139 		return (0);
140 	}
141 	return (lc);
142 }
143 
144 login_cap_t *
login_getpwclass(const struct passwd * pwd)145 login_getpwclass(const struct passwd *pwd)
146 {
147 
148 	/* pwd may be NULL */
149 
150 	return login_getclass(pwd ? pwd->pw_class : NULL);
151 }
152 
153 char *
login_getcapstr(login_cap_t * lc,const char * cap,char * def,char * e)154 login_getcapstr(login_cap_t *lc, const char *cap, char *def, char *e)
155 {
156 	char *res = NULL;
157 	int status;
158 
159 	errno = 0;
160 
161 	_DIAGASSERT(cap != NULL);
162 
163 	if (!lc || !lc->lc_cap)
164 		return (def);
165 
166 	switch (status = cgetstr(lc->lc_cap, cap, &res)) {
167 	case -1:
168 		if (res)
169 			free(res);
170 		return (def);
171 	case -2:
172 		syslog(LOG_ERR, "%s: getting capability %s: %m",
173 		    lc->lc_class, cap);
174 		if (res)
175 			free(res);
176 		return (e);
177 	default:
178 		if (status >= 0)
179 			return (res);
180 		syslog(LOG_ERR, "%s: unexpected error with capability %s",
181 		    lc->lc_class, cap);
182 		if (res)
183 			free(res);
184 		return (e);
185 	}
186 }
187 
188 quad_t
login_getcaptime(login_cap_t * lc,const char * cap,quad_t def,quad_t e)189 login_getcaptime(login_cap_t *lc, const char *cap, quad_t def, quad_t e)
190 {
191 	char *ep;
192 	char *res = NULL, *sres;
193 	int status;
194 	quad_t q, r;
195 
196 	_DIAGASSERT(cap != NULL);
197 
198 	errno = 0;
199 	if (!lc || !lc->lc_cap)
200 		return (def);
201 
202 	switch (status = cgetstr(lc->lc_cap, cap, &res)) {
203 	case -1:
204 		if (res)
205 			free(res);
206 		return (def);
207 	case -2:
208 		syslog(LOG_ERR, "%s: getting capability %s: %m",
209 		    lc->lc_class, cap);
210 		errno = ERANGE;
211 		if (res)
212 			free(res);
213 		return (e);
214 	default:
215 		if (status >= 0)
216 			break;
217 		syslog(LOG_ERR, "%s: unexpected error with capability %s",
218 		    lc->lc_class, cap);
219 		errno = ERANGE;
220 		if (res)
221 			free(res);
222 		return (e);
223 	}
224 
225 	if (isinfinite(res))
226 		return (RLIM_INFINITY);
227 
228 	errno = 0;
229 
230 	q = 0;
231 	sres = res;
232 	while (*res) {
233 		r = strtoq(res, &ep, 0);
234 		if (!ep || ep == res ||
235 		    ((r == QUAD_MIN || r == QUAD_MAX) && errno == ERANGE)) {
236 invalid:
237 			syslog(LOG_ERR, "%s:%s=%s: invalid time",
238 			    lc->lc_class, cap, sres);
239 			errno = ERANGE;
240 			free(sres);
241 			return (e);
242 		}
243 		switch (*ep++) {
244 		case '\0':
245 			--ep;
246 			break;
247 		case 's': case 'S':
248 			break;
249 		case 'm': case 'M':
250 			r *= 60;
251 			break;
252 		case 'h': case 'H':
253 			r *= 60 * 60;
254 			break;
255 		case 'd': case 'D':
256 			r *= 60 * 60 * 24;
257 			break;
258 		case 'w': case 'W':
259 			r *= 60 * 60 * 24 * 7;
260 			break;
261 		case 'y': case 'Y':	/* Pretty absurd */
262 			r *= 60 * 60 * 24 * 365;
263 			break;
264 		default:
265 			goto invalid;
266 		}
267 		res = ep;
268 		q += r;
269 	}
270 	free(sres);
271 	return (q);
272 }
273 
274 quad_t
login_getcapnum(login_cap_t * lc,const char * cap,quad_t def,quad_t e)275 login_getcapnum(login_cap_t *lc, const char *cap, quad_t def, quad_t e)
276 {
277 	char *ep;
278 	char *res = NULL;
279 	int status;
280 	quad_t q;
281 
282 	_DIAGASSERT(cap != NULL);
283 
284 	errno = 0;
285 	if (!lc || !lc->lc_cap)
286 		return (def);
287 
288 	switch (status = cgetstr(lc->lc_cap, cap, &res)) {
289 	case -1:
290 		if (res)
291 			free(res);
292 		return (def);
293 	case -2:
294 		syslog(LOG_ERR, "%s: getting capability %s: %m",
295 		    lc->lc_class, cap);
296 		errno = ERANGE;
297 		if (res)
298 			free(res);
299 		return (e);
300 	default:
301 		if (status >= 0)
302 			break;
303 		syslog(LOG_ERR, "%s: unexpected error with capability %s",
304 		    lc->lc_class, cap);
305 		errno = ERANGE;
306 		if (res)
307 			free(res);
308 		return (e);
309 	}
310 
311 	if (isinfinite(res))
312 		return (RLIM_INFINITY);
313 
314 	errno = 0;
315     	q = strtoq(res, &ep, 0);
316 	if (!ep || ep == res || ep[0] ||
317 	    ((q == QUAD_MIN || q == QUAD_MAX) && errno == ERANGE)) {
318 		syslog(LOG_ERR, "%s:%s=%s: invalid number",
319 		    lc->lc_class, cap, res);
320 		errno = ERANGE;
321 		free(res);
322 		return (e);
323 	}
324 	free(res);
325 	return (q);
326 }
327 
328 quad_t
login_getcapsize(login_cap_t * lc,const char * cap,quad_t def,quad_t e)329 login_getcapsize(login_cap_t *lc, const char *cap, quad_t def, quad_t e)
330 {
331 	char *ep;
332 	char *res = NULL;
333 	int status;
334 	quad_t q;
335 
336 	_DIAGASSERT(cap != NULL);
337 
338 	errno = 0;
339 
340 	if (!lc || !lc->lc_cap)
341 		return (def);
342 
343 	switch (status = cgetstr(lc->lc_cap, cap, &res)) {
344 	case -1:
345 		if (res)
346 			free(res);
347 		return (def);
348 	case -2:
349 		syslog(LOG_ERR, "%s: getting capability %s: %m",
350 		    lc->lc_class, cap);
351 		errno = ERANGE;
352 		if (res)
353 			free(res);
354 		return (e);
355 	default:
356 		if (status >= 0)
357 			break;
358 		syslog(LOG_ERR, "%s: unexpected error with capability %s",
359 		    lc->lc_class, cap);
360 		errno = ERANGE;
361 		if (res)
362 			free(res);
363 		return (e);
364 	}
365 
366 	errno = 0;
367 	q = strtolimit(res, &ep, 0);
368 	if (!ep || ep == res || (ep[0] && ep[1]) ||
369 	    ((q == QUAD_MIN || q == QUAD_MAX) && errno == ERANGE)) {
370 		syslog(LOG_ERR, "%s:%s=%s: invalid size",
371 		    lc->lc_class, cap, res);
372 		errno = ERANGE;
373 		free(res);
374 		return (e);
375 	}
376 	free(res);
377 	return (q);
378 }
379 
380 int
login_getcapbool(login_cap_t * lc,const char * cap,u_int def)381 login_getcapbool(login_cap_t *lc, const char *cap, u_int def)
382 {
383 
384 	_DIAGASSERT(cap != NULL);
385 
386 	if (!lc || !lc->lc_cap)
387 		return (def);
388 
389 	return (cgetcap(lc->lc_cap, cap, ':') != NULL);
390 }
391 
392 void
login_close(login_cap_t * lc)393 login_close(login_cap_t *lc)
394 {
395 
396 	if (lc) {
397 		if (lc->lc_class)
398 			free(lc->lc_class);
399 		if (lc->lc_cap)
400 			free(lc->lc_cap);
401 		if (lc->lc_style)
402 			free(lc->lc_style);
403 		free(lc);
404 	}
405 }
406 
407 #define	R_CTIME	1
408 #define	R_CSIZE	2
409 #define	R_CNUMB	3
410 
411 static struct {
412 	int	what;
413 	int	type;
414 	const char *name;
415 } r_list[] = {
416 	{ RLIMIT_CPU,		R_CTIME, "cputime", },
417 	{ RLIMIT_FSIZE,		R_CSIZE, "filesize", },
418 	{ RLIMIT_DATA,		R_CSIZE, "datasize", },
419 	{ RLIMIT_STACK,		R_CSIZE, "stacksize", },
420 	{ RLIMIT_RSS,		R_CSIZE, "memoryuse", },
421 	{ RLIMIT_MEMLOCK,	R_CSIZE, "memorylocked", },
422 	{ RLIMIT_NPROC,		R_CNUMB, "maxproc", },
423 	{ RLIMIT_NTHR,		R_CNUMB, "maxthread", },
424 	{ RLIMIT_NOFILE,	R_CNUMB, "openfiles", },
425 	{ RLIMIT_CORE,		R_CSIZE, "coredumpsize", },
426 	{ RLIMIT_SBSIZE,	R_CSIZE, "sbsize", },
427 	{ RLIMIT_AS,		R_CSIZE, "vmemoryuse", },
428 	{ -1, 0, 0 }
429 };
430 
431 static int
gsetrl(login_cap_t * lc,int what,const char * name,int type)432 gsetrl(login_cap_t *lc, int what, const char *name, int type)
433 {
434 	struct rlimit rl;
435 	struct rlimit r;
436 	char name_cur[32];
437 	char name_max[32];
438 
439 	_DIAGASSERT(name != NULL);
440 
441 	(void)snprintf(name_cur, sizeof(name_cur), "%s-cur", name);
442 	(void)snprintf(name_max, sizeof(name_max), "%s-max", name);
443 
444 	if (getrlimit(what, &r)) {
445 		syslog(LOG_ERR, "getting resource limit: %m");
446 		return (-1);
447 	}
448 
449 #define	RCUR	((quad_t)r.rlim_cur)
450 #define	RMAX	((quad_t)r.rlim_max)
451 
452 	switch (type) {
453 	case R_CTIME:
454 		r.rlim_cur = login_getcaptime(lc, name, RCUR, RCUR);
455 		r.rlim_max = login_getcaptime(lc, name, RMAX, RMAX);
456 		rl.rlim_cur = login_getcaptime(lc, name_cur, RCUR, RCUR);
457 		rl.rlim_max = login_getcaptime(lc, name_max, RMAX, RMAX);
458 		break;
459 	case R_CSIZE:
460 		r.rlim_cur = login_getcapsize(lc, name, RCUR, RCUR);
461 		r.rlim_max = login_getcapsize(lc, name, RMAX, RMAX);
462 		rl.rlim_cur = login_getcapsize(lc, name_cur, RCUR, RCUR);
463 		rl.rlim_max = login_getcapsize(lc, name_max, RMAX, RMAX);
464 		break;
465 	case R_CNUMB:
466 		r.rlim_cur = login_getcapnum(lc, name, RCUR, RCUR);
467 		r.rlim_max = login_getcapnum(lc, name, RMAX, RMAX);
468 		rl.rlim_cur = login_getcapnum(lc, name_cur, RCUR, RCUR);
469 		rl.rlim_max = login_getcapnum(lc, name_max, RMAX, RMAX);
470 		break;
471 	default:
472 		syslog(LOG_ERR, "%s: invalid type %d setting resource limit %s",
473 		    lc->lc_class, type, name);
474 		return (-1);
475 	}
476 
477 	if (setrlimit(what, &rl)) {
478 		syslog(LOG_ERR, "%s: setting resource limit %s: %m",
479 		    lc->lc_class, name);
480 		return (-1);
481 	}
482 #undef	RCUR
483 #undef	RMAX
484 	return (0);
485 }
486 
487 static int
488 /*ARGSUSED*/
envset(void * envp __unused,const char * name,const char * value,int overwrite)489 envset(void *envp __unused, const char *name, const char *value, int overwrite)
490 {
491 	return setenv(name, value, overwrite);
492 }
493 
494 int
setuserenv(login_cap_t * lc,envfunc_t senv,void * envp)495 setuserenv(login_cap_t *lc, envfunc_t senv, void *envp)
496 {
497 	const char *stop = ", \t";
498 	size_t i, count;
499 	char *ptr;
500 	char **res;
501 	char *str = login_getcapstr(lc, "setenv", NULL, NULL);
502 
503 	if (str == NULL || *str == '\0')
504 		return 0;
505 
506 	/*
507 	 * count the sub-strings, this may over-count since we don't
508 	 * account for escaped delimiters.
509 	 */
510 	for (i = 1, ptr = str; *ptr; i++) {
511 		ptr += strcspn(ptr, stop);
512 		if (*ptr)
513 			ptr++;
514 	}
515 
516 	/* allocate ptr array and string */
517 	count = i;
518 	res = malloc(count * sizeof(*res) + strlen(str) + 1);
519 
520 	if (!res)
521 		return -1;
522 
523 	ptr = (char *)(void *)&res[count];
524 	(void)strcpy(ptr, str);
525 
526 	/* split string */
527 	for (i = 0; (res[i] = stresep(&ptr, stop, '\\')) != NULL; )
528 		if (*res[i])
529 			i++;
530 
531 	count = i;
532 
533 	for (i = 0; i < count; i++) {
534 		if ((ptr = strchr(res[i], '=')) != NULL)
535 			*ptr++ = '\0';
536 		else
537 			ptr = NULL;
538 		(void)(*senv)(envp, res[i], ptr ? ptr : "", 1);
539 	}
540 
541 	free(res);
542 	return 0;
543 }
544 
545 int
setclasscontext(const char * class,u_int flags)546 setclasscontext(const char *class, u_int flags)
547 {
548 	int ret;
549 	login_cap_t *lc;
550 
551 	flags &= LOGIN_SETRESOURCES | LOGIN_SETPRIORITY | LOGIN_SETUMASK |
552 	    LOGIN_SETPATH;
553 
554 	lc = login_getclass(class);
555 	ret = lc ? setusercontext(lc, NULL, 0, flags) : -1;
556 	login_close(lc);
557 	return (ret);
558 }
559 
560 int
setusercontext(login_cap_t * lc,struct passwd * pwd,uid_t uid,u_int flags)561 setusercontext(login_cap_t *lc, struct passwd *pwd, uid_t uid, u_int flags)
562 {
563 	char per_user_tmp[MAXPATHLEN + 1];
564 	const char *component_name;
565 	login_cap_t *flc;
566 	quad_t p;
567 	int i;
568 	ssize_t len;
569 
570 	flc = NULL;
571 
572 	if (!lc)
573 		flc = lc = login_getclass(pwd ? pwd->pw_class : NULL);
574 
575 	/*
576 	 * Without the pwd entry being passed we cannot set either
577 	 * the group or the login.  We could complain about it.
578 	 */
579 	if (pwd == NULL)
580 		flags &= ~(LOGIN_SETGROUP|LOGIN_SETLOGIN);
581 
582 #ifdef LOGIN_OSETGROUP
583 	if (pwd == NULL)
584 		flags &= ~LOGIN_OSETGROUP;
585 	if (flags & LOGIN_OSETGROUP)
586 		flags = (flags & ~LOGIN_OSETGROUP) | LOGIN_SETGROUP;
587 #endif
588 	if (flags & LOGIN_SETRESOURCES)
589 		for (i = 0; r_list[i].name; ++i)
590 			(void)gsetrl(lc, r_list[i].what, r_list[i].name,
591 			    r_list[i].type);
592 
593 	if (flags & LOGIN_SETPRIORITY) {
594 		p = login_getcapnum(lc, "priority", (quad_t)0, (quad_t)0);
595 
596 		if (setpriority(PRIO_PROCESS, 0, (int)p) == -1)
597 			syslog(LOG_ERR, "%s: setpriority: %m", lc->lc_class);
598 	}
599 
600 	if (flags & LOGIN_SETUMASK) {
601 		p = login_getcapnum(lc, "umask", (quad_t) LOGIN_DEFUMASK,
602 		    (quad_t)LOGIN_DEFUMASK);
603 		umask((mode_t)p);
604 	}
605 
606 	if (flags & LOGIN_SETGID) {
607 		if (setgid(pwd->pw_gid) == -1) {
608 			syslog(LOG_ERR, "setgid(%d): %m", pwd->pw_gid);
609 			login_close(flc);
610 			return (-1);
611 		}
612 	}
613 
614 	if (flags & LOGIN_SETGROUPS) {
615 		if (initgroups(pwd->pw_name, pwd->pw_gid) == -1) {
616 			syslog(LOG_ERR, "initgroups(%s,%d): %m",
617 			    pwd->pw_name, pwd->pw_gid);
618 			login_close(flc);
619 			return (-1);
620 		}
621 	}
622 
623 	/* Create per-user temporary directories if needed. */
624 	if ((len = readlink("/tmp", per_user_tmp,
625 	    sizeof(per_user_tmp) - 6)) != -1) {
626 
627 		static const char atuid[] = "/@ruid";
628 		char *lp;
629 
630 		/* readlink does not nul-terminate the string */
631 		per_user_tmp[len] = '\0';
632 
633 		/* Check if it's magic symlink. */
634 		lp = strstr(per_user_tmp, atuid);
635 		if (lp != NULL && *(lp + (sizeof(atuid) - 1)) == '\0') {
636 			lp++;
637 
638 			if (snprintf(lp, 11, "/%u", pwd->pw_uid) > 10) {
639 				syslog(LOG_ERR, "real temporary path too long");
640 				login_close(flc);
641 				return (-1);
642 			}
643 			if (mkdir(per_user_tmp, S_IRWXU) != -1) {
644 				if (chown(per_user_tmp, pwd->pw_uid,
645 				    pwd->pw_gid)) {
646 					component_name = "chown";
647 					goto out;
648 				}
649 
650 				/*
651 			 	 * Must set sticky bit for tmp directory, some
652 			 	 * programs rely on this.
653 			 	 */
654 				if(chmod(per_user_tmp, S_IRWXU | S_ISVTX)) {
655 					component_name = "chmod";
656 					goto out;
657 				}
658 			} else {
659 				if (errno != EEXIST) {
660 					component_name = "mkdir";
661 					goto out;
662 				} else {
663 					/*
664 					 * We must ensure that we own the
665 					 * directory and that is has the correct
666 					 * permissions, otherwise a DOS attack
667 					 * is possible.
668 					 */
669 					struct stat sb;
670 					if (stat(per_user_tmp, &sb) == -1) {
671 						component_name = "stat";
672 						goto out;
673 					}
674 
675 					if (sb.st_uid != pwd->pw_uid) {
676 						if (chown(per_user_tmp,
677 						    pwd->pw_uid, pwd->pw_gid)) {
678 							component_name = "chown";
679 							goto out;
680 						}
681 					}
682 
683 					if (sb.st_mode != (S_IRWXU | S_ISVTX)) {
684 						if (chmod(per_user_tmp,
685 						    S_IRWXU | S_ISVTX)) {
686 							component_name = "chmod";
687 							goto out;
688 						}
689 					}
690 				}
691 			}
692 		}
693 	}
694 	errno = 0;
695 
696 #if !defined(__minix)
697 	if (flags & LOGIN_SETLOGIN)
698 		if (setlogin(pwd->pw_name) == -1) {
699 			syslog(LOG_ERR, "setlogin(%s) failure: %m",
700 			    pwd->pw_name);
701 			login_close(flc);
702 			return (-1);
703 		}
704 #endif /* !defined(__minix) */
705 
706 	if (flags & LOGIN_SETUSER)
707 		if (setuid(uid) == -1) {
708 			syslog(LOG_ERR, "setuid(%d): %m", uid);
709 			login_close(flc);
710 			return (-1);
711 		}
712 
713 	if (flags & LOGIN_SETENV)
714 		setuserenv(lc, envset, NULL);
715 
716 	if (flags & LOGIN_SETPATH)
717 		setuserpath(lc, pwd ? pwd->pw_dir : "", envset, NULL);
718 
719 	login_close(flc);
720 	return (0);
721 
722 out:
723 	if (component_name != NULL) {
724 		syslog(LOG_ERR, "%s %s: %m", component_name, per_user_tmp);
725 		login_close(flc);
726 		return (-1);
727 	} else {
728 		syslog(LOG_ERR, "%s: %m", per_user_tmp);
729 		login_close(flc);
730 		return (-1);
731 	}
732 }
733 
734 void
setuserpath(login_cap_t * lc,const char * home,envfunc_t senv,void * envp)735 setuserpath(login_cap_t *lc, const char *home, envfunc_t senv, void *envp)
736 {
737 	size_t hlen, plen;
738 	int cnt = 0;
739 	char *path;
740 	const char *cpath;
741 	char *p, *q;
742 
743 	_DIAGASSERT(home != NULL);
744 
745 	hlen = strlen(home);
746 
747 	p = path = login_getcapstr(lc, "path", NULL, NULL);
748 	if (p) {
749 		while (*p)
750 			if (*p++ == '~')
751 				++cnt;
752 		plen = (p - path) + cnt * (hlen + 1) + 1;
753 		p = path;
754 		q = path = malloc(plen);
755 		if (q) {
756 			while (*p) {
757 				p += strspn(p, " \t");
758 				if (*p == '\0')
759 					break;
760 				plen = strcspn(p, " \t");
761 				if (hlen == 0 && *p == '~') {
762 					p += plen;
763 					continue;
764 				}
765 				if (q != path)
766 					*q++ = ':';
767 				if (*p == '~') {
768 					strcpy(q, home);
769 					q += hlen;
770 					++p;
771 					--plen;
772 				}
773 				memcpy(q, p, plen);
774 				p += plen;
775 				q += plen;
776 			}
777 			*q = '\0';
778 			cpath = path;
779 		} else
780 			cpath = _PATH_DEFPATH;
781 	} else
782 		cpath = _PATH_DEFPATH;
783 	if ((*senv)(envp, "PATH", cpath, 1))
784 		warn("could not set PATH");
785 }
786 
787 /*
788  * Convert an expression of the following forms
789  * 	1) A number.
790  *	2) A number followed by a b (mult by 512).
791  *	3) A number followed by a k (mult by 1024).
792  *	5) A number followed by a m (mult by 1024 * 1024).
793  *	6) A number followed by a g (mult by 1024 * 1024 * 1024).
794  *	7) A number followed by a t (mult by 1024 * 1024 * 1024 * 1024).
795  *	8) Two or more numbers (with/without k,b,m,g, or t).
796  *	   separated by x (also * for backwards compatibility), specifying
797  *	   the product of the indicated values.
798  */
799 static u_quad_t
strtosize(const char * str,char ** endptr,int radix)800 strtosize(const char *str, char **endptr, int radix)
801 {
802 	u_quad_t num, num2;
803 	char *expr, *expr2;
804 
805 	_DIAGASSERT(str != NULL);
806 	/* endptr may be NULL */
807 
808 	errno = 0;
809 	num = strtouq(str, &expr, radix);
810 	if (errno || expr == str) {
811 		if (endptr)
812 			*endptr = expr;
813 		return (num);
814 	}
815 
816 	switch(*expr) {
817 	case 'b': case 'B':
818 		num = multiply(num, (u_quad_t)512);
819 		++expr;
820 		break;
821 	case 'k': case 'K':
822 		num = multiply(num, (u_quad_t)1024);
823 		++expr;
824 		break;
825 	case 'm': case 'M':
826 		num = multiply(num, (u_quad_t)1024 * 1024);
827 		++expr;
828 		break;
829 	case 'g': case 'G':
830 		num = multiply(num, (u_quad_t)1024 * 1024 * 1024);
831 		++expr;
832 		break;
833 	case 't': case 'T':
834 		num = multiply(num, (u_quad_t)1024 * 1024);
835 		num = multiply(num, (u_quad_t)1024 * 1024);
836 		++expr;
837 		break;
838 	}
839 
840 	if (errno)
841 		goto erange;
842 
843 	switch(*expr) {
844 	case '*':			/* Backward compatible. */
845 	case 'x':
846 		num2 = strtosize(expr+1, &expr2, radix);
847 		if (errno) {
848 			expr = expr2;
849 			goto erange;
850 		}
851 
852 		if (expr2 == expr + 1) {
853 			if (endptr)
854 				*endptr = expr;
855 			return (num);
856 		}
857 		expr = expr2;
858 		num = multiply(num, num2);
859 		if (errno)
860 			goto erange;
861 		break;
862 	}
863 	if (endptr)
864 		*endptr = expr;
865 	return (num);
866 erange:
867 	if (endptr)
868 		*endptr = expr;
869 	errno = ERANGE;
870 	return (UQUAD_MAX);
871 }
872 
873 static u_quad_t
strtolimit(const char * str,char ** endptr,int radix)874 strtolimit(const char *str, char **endptr, int radix)
875 {
876 
877 	_DIAGASSERT(str != NULL);
878 	/* endptr may be NULL */
879 
880 	if (isinfinite(str)) {
881 		if (endptr)
882 			*endptr = (char *)__UNCONST(str) + strlen(str);
883 		return ((u_quad_t)RLIM_INFINITY);
884 	}
885 	return (strtosize(str, endptr, radix));
886 }
887 
888 static int
isinfinite(const char * s)889 isinfinite(const char *s)
890 {
891 	static const char *infs[] = {
892 		"infinity",
893 		"inf",
894 		"unlimited",
895 		"unlimit",
896 		NULL
897 	};
898 	const char **i;
899 
900 	_DIAGASSERT(s != NULL);
901 
902 	for (i = infs; *i; i++) {
903 		if (!strcasecmp(s, *i))
904 			return 1;
905 	}
906 	return 0;
907 }
908 
909 static u_quad_t
multiply(u_quad_t n1,u_quad_t n2)910 multiply(u_quad_t n1, u_quad_t n2)
911 {
912 	static int bpw = 0;
913 	u_quad_t m;
914 	u_quad_t r;
915 	int b1, b2;
916 
917 	/*
918 	 * Get rid of the simple cases
919 	 */
920 	if (n1 == 0 || n2 == 0)
921 		return (0);
922 	if (n1 == 1)
923 		return (n2);
924 	if (n2 == 1)
925 		return (n1);
926 
927 	/*
928 	 * sizeof() returns number of bytes needed for storage.
929 	 * This may be different from the actual number of useful bits.
930 	 */
931 	if (!bpw) {
932 		bpw = sizeof(u_quad_t) * 8;
933 		while (((u_quad_t)1 << (bpw-1)) == 0)
934 			--bpw;
935 	}
936 
937 	/*
938 	 * First check the magnitude of each number.  If the sum of the
939 	 * magnatude is way to high, reject the number.  (If this test
940 	 * is not done then the first multiply below may overflow.)
941 	 */
942 	for (b1 = bpw; (((u_quad_t)1 << (b1-1)) & n1) == 0; --b1)
943 		;
944 	for (b2 = bpw; (((u_quad_t)1 << (b2-1)) & n2) == 0; --b2)
945 		;
946 	if (b1 + b2 - 2 > bpw) {
947 		errno = ERANGE;
948 		return (UQUAD_MAX);
949 	}
950 
951 	/*
952 	 * Decompose the multiplication to be:
953 	 * h1 = n1 & ~1
954 	 * h2 = n2 & ~1
955 	 * l1 = n1 & 1
956 	 * l2 = n2 & 1
957 	 * (h1 + l1) * (h2 + l2)
958 	 * (h1 * h2) + (h1 * l2) + (l1 * h2) + (l1 * l2)
959 	 *
960 	 * Since h1 && h2 do not have the low bit set, we can then say:
961 	 *
962 	 * (h1>>1 * h2>>1 * 4) + ...
963 	 *
964 	 * So if (h1>>1 * h2>>1) > (1<<(bpw - 2)) then the result will
965 	 * overflow.
966 	 *
967 	 * Finally, if MAX - ((h1 * l2) + (l1 * h2) + (l1 * l2)) < (h1*h2)
968 	 * then adding in residual amout will cause an overflow.
969 	 */
970 
971 	m = (n1 >> 1) * (n2 >> 1);
972 
973 	if (m >= ((u_quad_t)1 << (bpw-2))) {
974 		errno = ERANGE;
975 		return (UQUAD_MAX);
976 	}
977 
978 	m *= 4;
979 
980 	r = (n1 & n2 & 1)
981 	  + (n2 & 1) * (n1 & ~(u_quad_t)1)
982 	  + (n1 & 1) * (n2 & ~(u_quad_t)1);
983 
984 	if ((u_quad_t)(m + r) < m) {
985 		errno = ERANGE;
986 		return (UQUAD_MAX);
987 	}
988 	m += r;
989 
990 	return (m);
991 }
992