Files
sudo/mon_systrace.h

231 lines
8.0 KiB
C

/*
* Copyright (c) 2004 Todd C. Miller <Todd.Miller@courtesan.com>
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
#define SYSTRACE_MAXENTS 1024
typedef int (*schandler_t)
__P((int, pid_t, u_int16_t, struct str_msg_ask *, int, int *, int *));
struct childinfo;
struct listhead;
static int check_execv __P((int, pid_t, u_int16_t,
struct str_msg_ask *, int, int *, int *));
static int check_execve __P((int, pid_t, u_int16_t,
struct str_msg_ask *, int, int *, int *));
static int decode_args __P((int, pid_t, struct str_msg_ask *));
static int set_policy __P((int, struct childinfo *));
static int switch_emulation __P((int, struct str_message *));
static int systrace_open __P((void));
static int systrace_read __P((int, pid_t, void *, void *, size_t));
#ifdef STRIOCINJECT
static int systrace_write __P((int, pid_t, void *, void *, size_t));
static int update_env __P((int, pid_t, u_int16_t, struct str_msg_ask *));
#endif
static schandler_t find_handler __P((pid_t, int));
static ssize_t read_string __P((int, pid_t, void *, char *, size_t));
static struct childinfo *find_child __P((pid_t));
static void catchsig __P((int));
static void detachall __P((int));
static void killall __P((int));
static void new_child __P((pid_t, pid_t));
static void rm_child __P((pid_t));
static void update_child __P((pid_t, uid_t));
static struct listhead children; /* list of children being traced */
static int initialized; /* set to true when we are inited */
static volatile sig_atomic_t dodetach; /* caught signal */
struct listhead {
void *first;
};
struct childinfo {
pid_t pid;
struct passwd *pw;
struct syscallaction *action;
struct childinfo *next;
};
/*
* Each emulation has a list of actionable syscalls.
*/
struct syscallaction {
int code;
int policy;
schandler_t handler;
};
static struct syscallaction syscalls_openbsd[] = {
{ 23, SYSTR_POLICY_ASK, NULL}, /* OPENBSD_SYS_setuid */
{ 59, SYSTR_POLICY_ASK, check_execve}, /* OPENBSD_SYS_execve */
{ 126, SYSTR_POLICY_ASK, NULL}, /* OPENBSD_SYS_setreuid */
{ 183, SYSTR_POLICY_ASK, NULL}, /* OPENBSD_SYS_seteuid */
{ 282, SYSTR_POLICY_ASK, NULL}, /* OPENBSD_SYS_setresuid */
{ -1, -1, NULL}
};
static struct syscallaction syscalls_bsdos[] = {
{ 23, SYSTR_POLICY_ASK, NULL}, /* BSDOS_SYS_setuid */
{ 59, SYSTR_POLICY_ASK, check_execve}, /* BSDOS_SYS_execve */
{ 126, SYSTR_POLICY_ASK, NULL}, /* BSDOS_SYS_setreuid */
{ 183, SYSTR_POLICY_ASK, NULL}, /* BSDOS_SYS_seteuid */
{ -1, -1, NULL}
};
static struct syscallaction syscalls_freebsd[] = {
{ 23, SYSTR_POLICY_ASK, NULL}, /* FREEBSD_SYS_setuid */
{ 59, SYSTR_POLICY_ASK, check_execve}, /* FREEBSD_SYS_execve */
{ 126, SYSTR_POLICY_ASK, NULL}, /* FREEBSD_SYS_setreuid */
{ 183, SYSTR_POLICY_ASK, NULL}, /* FREEBSD_SYS_seteuid */
{ 311, SYSTR_POLICY_ASK, NULL}, /* FREEBSD_SYS_setresuid */
{ -1, -1, NULL}
};
static struct syscallaction syscalls_netbsd[] = {
{ 23, SYSTR_POLICY_ASK, NULL}, /* NETBSD_SYS_setuid */
{ 59, SYSTR_POLICY_ASK, check_execve}, /* NETBSD_SYS_execve */
{ 126, SYSTR_POLICY_ASK, NULL}, /* NETBSD_SYS_setreuid */
{ 183, SYSTR_POLICY_ASK, NULL}, /* NETBSD_SYS_seteuid */
{ -1, -1, NULL}
};
static struct syscallaction syscalls_hpux[] = {
{ 11, SYSTR_POLICY_ASK, check_execv}, /* HPUX_SYS_execv */
{ 23, SYSTR_POLICY_ASK, NULL}, /* HPUX_SYS_setuid */
{ 59, SYSTR_POLICY_ASK, check_execve}, /* HPUX_SYS_execve */
{ 126, SYSTR_POLICY_ASK, NULL}, /* HPUX_SYS_setresuid */
{ -1, -1, NULL}
};
static struct syscallaction syscalls_ibsc2[] = {
{ 11, SYSTR_POLICY_ASK, check_execv}, /* ISCS2_SYS_execv */
{ 23, SYSTR_POLICY_ASK, NULL}, /* ISCS2_SYS_setuid */
{ 59, SYSTR_POLICY_ASK, check_execve}, /* ISCS2_SYS_execve */
{ -1, -1, NULL}
};
static struct syscallaction syscalls_linux[] = {
{ 11, SYSTR_POLICY_ASK, check_execve}, /* LINUX_SYS_execve */
{ 23, SYSTR_POLICY_ASK, NULL}, /* LINUX_SYS_setuid16 */
{ 70, SYSTR_POLICY_ASK, NULL}, /* LINUX_SYS_setreuid16 */
{ 138, SYSTR_POLICY_ASK, NULL}, /* LINUX_SYS_setfsuid16 */
{ 164, SYSTR_POLICY_ASK, NULL}, /* LINUX_SYS_setresuid16 */
{ 203, SYSTR_POLICY_ASK, NULL}, /* LINUX_SYS_setreuid */
{ 208, SYSTR_POLICY_ASK, NULL}, /* LINUX_SYS_setresuid */
{ 213, SYSTR_POLICY_ASK, NULL}, /* LINUX_SYS_setuid */
{ 215, SYSTR_POLICY_ASK, NULL}, /* LINUX_SYS_setfsuid */
{ -1, -1, NULL}
};
static struct syscallaction syscalls_osf1[] = {
{ 23, SYSTR_POLICY_ASK, NULL}, /* OSF1_SYS_setuid */
{ 59, SYSTR_POLICY_ASK, check_execve}, /* OSF1_SYS_execve */
{ 126, SYSTR_POLICY_ASK, NULL}, /* OSF1_SYS_setreuid */
{ -1, -1, NULL}
};
static struct syscallaction syscalls_sunos[] = {
{ 11, SYSTR_POLICY_ASK, check_execv}, /* SUNOS_SYS_execv */
{ 23, SYSTR_POLICY_ASK, NULL}, /* SUNOS_SYS_setuid */
{ 59, SYSTR_POLICY_ASK, check_execve}, /* SUNOS_SYS_execve */
{ 126, SYSTR_POLICY_ASK, NULL}, /* SUNOS_SYS_setreuid */
{ -1, -1, NULL}
};
static struct syscallaction syscalls_svr4[] = {
{ 11, SYSTR_POLICY_ASK, check_execv}, /* SVR4_SYS_execv */
{ 23, SYSTR_POLICY_ASK, NULL}, /* SVR4_SYS_setuid */
{ 59, SYSTR_POLICY_ASK, check_execve}, /* SVR4_SYS_execve */
{ 141, SYSTR_POLICY_ASK, NULL}, /* SVR4_SYS_seteuid */
{ 202, SYSTR_POLICY_ASK, NULL}, /* SVR4_SYS_setreuid */
{ -1, -1, NULL}
};
static struct syscallaction syscalls_ultrix[] = {
{ 11, SYSTR_POLICY_ASK, check_execv}, /* ULTRIX_SYS_execv */
{ 23, SYSTR_POLICY_ASK, NULL}, /* ULTRIX_SYS_setuid */
{ 59, SYSTR_POLICY_ASK, check_execve}, /* ULTRIX_SYS_execve */
{ 126, SYSTR_POLICY_ASK, NULL}, /* ULTRIX_SYS_setreuid */
{ -1, -1, NULL}
};
static struct syscallaction syscalls_irix[] = {
{ 11, SYSTR_POLICY_ASK, check_execv}, /* IRIX_SYS_execv */
{ 23, SYSTR_POLICY_ASK, NULL}, /* IRIX_SYS_setuid */
{ 59, SYSTR_POLICY_ASK, check_execve}, /* IRIX_SYS_execve */
{ 124, SYSTR_POLICY_ASK, NULL}, /* IRIX_SYS_setreuid */
{ -1, -1, NULL}
};
static struct syscallaction syscalls_darwin[] = {
{ 23, SYSTR_POLICY_ASK, NULL}, /* DARWIN_SYS_setuid */
{ 59, SYSTR_POLICY_ASK, check_execve}, /* DARWIN_SYS_execve */
{ 126, SYSTR_POLICY_ASK, NULL}, /* DARWIN_SYS_setreuid */
{ 183, SYSTR_POLICY_ASK, NULL}, /* DARWIN_SYS_seteuid */
{ -1, -1, NULL}
};
/*
* List of emulations we support. Not all OSes support all emulations but
* they are all listed here to make things simpler.
* Attempts to run programs with unknown emulations will be rejected.
*/
static struct emulation {
const char *name;
struct syscallaction *action;
} emulations[] = {
{ "bsdos", syscalls_bsdos },
#if defined(__darwin__) || defined(__APPLE__)
{ "native", syscalls_darwin },
#else
{ "darwin", syscalls_darwin },
#endif
#ifdef __FreeBSD__
{ "native", syscalls_freebsd },
#else
{ "freebsd", syscalls_freebsd },
#endif
{ "hpux", syscalls_hpux },
{ "ibsc2", syscalls_ibsc2 },
{ "irix", syscalls_irix },
#if defined(__linux__)
{ "native", syscalls_linux },
#else
{ "linux", syscalls_linux },
#endif
#ifdef __NetBSD__
{ "native", syscalls_netbsd },
#else
{ "netbsd", syscalls_netbsd },
#endif
{ "netbsd32", syscalls_netbsd },
#ifdef __OpenBSD__
{ "native", syscalls_openbsd },
#else
{ "openbsd", syscalls_openbsd },
#endif
{ "osf1", syscalls_osf1 },
{ "pecoff", syscalls_netbsd },
{ "sunos", syscalls_sunos },
{ "sunos32", syscalls_sunos },
{ "svr4", syscalls_svr4 },
{ "svr4_32", syscalls_svr4 },
{ "ultrix", syscalls_ultrix },
{ NULL, NULL }
};