2013-06-17 12:07:14 +02:00
|
|
|
/* Copyright (c) 2001 Matej Pfajfar.
|
|
|
|
* Copyright (c) 2001-2004, Roger Dingledine.
|
|
|
|
* Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
|
|
|
|
* Copyright (c) 2007-2013, The Tor Project, Inc. */
|
|
|
|
/* See LICENSE for licensing information */
|
|
|
|
|
|
|
|
/**
|
|
|
|
* \file sandbox.h
|
|
|
|
* \brief Header file for sandbox.c.
|
|
|
|
**/
|
|
|
|
|
|
|
|
#ifndef SANDBOX_H_
|
|
|
|
#define SANDBOX_H_
|
|
|
|
|
|
|
|
#ifndef SYS_SECCOMP
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Used by SIGSYS signal handler to check if the signal was issued due to a
|
|
|
|
* seccomp2 filter violation.
|
|
|
|
*/
|
|
|
|
#define SYS_SECCOMP 1
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2013-07-23 09:14:25 +02:00
|
|
|
#include "torint.h"
|
|
|
|
|
2013-06-17 12:07:14 +02:00
|
|
|
/**
|
|
|
|
* Linux definitions
|
|
|
|
*/
|
|
|
|
#ifdef __linux__
|
|
|
|
|
2013-07-29 15:30:39 +02:00
|
|
|
#ifndef __USE_GNU
|
2013-06-17 12:07:14 +02:00
|
|
|
#define __USE_GNU
|
2013-07-29 15:30:39 +02:00
|
|
|
#endif
|
2013-06-17 12:07:14 +02:00
|
|
|
#include <sys/ucontext.h>
|
2013-07-30 20:23:30 +02:00
|
|
|
#include <seccomp.h>
|
2013-08-19 12:56:50 +02:00
|
|
|
#include <netdb.h>
|
2013-06-17 12:07:14 +02:00
|
|
|
|
2013-07-23 09:49:56 +02:00
|
|
|
#define PARAM_PTR 0
|
|
|
|
#define PARAM_NUM 1
|
|
|
|
|
2013-08-14 23:09:07 +02:00
|
|
|
/**
|
|
|
|
* Structure used to manage a sandbox configuration.
|
|
|
|
*
|
|
|
|
* It is implemented as a linked list of parameters. Currently only controls
|
|
|
|
* parameters for open, openat, execve, stat64.
|
|
|
|
*/
|
2013-07-24 16:06:06 +02:00
|
|
|
struct pfd_elem {
|
2013-08-28 19:01:52 +02:00
|
|
|
/** syscall associated with parameter. */
|
|
|
|
int syscall;
|
2013-07-24 16:06:06 +02:00
|
|
|
|
2013-08-28 19:01:52 +02:00
|
|
|
/** parameter index. */
|
|
|
|
char pindex;
|
|
|
|
/** parameter value. */
|
|
|
|
intptr_t param;
|
2013-07-24 16:06:06 +02:00
|
|
|
|
2013-08-28 19:01:52 +02:00
|
|
|
/** parameter flag (0 = not protected, 1 = protected). */
|
|
|
|
char prot;
|
2013-07-24 16:06:06 +02:00
|
|
|
|
|
|
|
struct pfd_elem *next;
|
|
|
|
};
|
2013-08-14 23:09:07 +02:00
|
|
|
/** Typedef to structure used to manage a sandbox configuration. */
|
2013-07-25 12:25:20 +02:00
|
|
|
typedef struct pfd_elem sandbox_cfg_t;
|
2013-07-18 17:03:10 +02:00
|
|
|
|
2013-08-14 23:09:07 +02:00
|
|
|
/** Function pointer defining the prototype of a filter function.*/
|
2013-08-05 14:40:23 +02:00
|
|
|
typedef int (*sandbox_filter_func_t)(scmp_filter_ctx ctx,
|
|
|
|
sandbox_cfg_t *filter);
|
2013-07-30 20:23:30 +02:00
|
|
|
|
2013-08-14 23:09:07 +02:00
|
|
|
/** Type that will be used in step 3 in order to manage multiple sandboxes.*/
|
2013-08-05 15:01:31 +02:00
|
|
|
typedef struct {
|
2013-08-14 23:09:07 +02:00
|
|
|
// function pointers associated with the filter
|
2013-08-05 15:01:31 +02:00
|
|
|
sandbox_filter_func_t *filter_func;
|
|
|
|
|
|
|
|
// filter function pointer parameters
|
|
|
|
sandbox_cfg_t *filter_dynamic;
|
|
|
|
} sandbox_t;
|
|
|
|
|
2013-06-17 12:07:14 +02:00
|
|
|
/**
|
|
|
|
* Linux 32 bit definitions
|
|
|
|
*/
|
|
|
|
#if defined(__i386__)
|
|
|
|
|
|
|
|
#define REG_SYSCALL REG_EAX
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Linux 64 bit definitions
|
|
|
|
*/
|
|
|
|
#elif defined(__x86_64__)
|
|
|
|
|
|
|
|
#define REG_SYSCALL REG_RAX
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#endif // __linux__
|
|
|
|
|
2013-08-19 12:56:50 +02:00
|
|
|
/** Replacement for getaddrinfo(), using pre-recorded results. */
|
|
|
|
int sandbox_getaddrinfo(const char *name, struct addrinfo **res);
|
|
|
|
|
2013-08-14 23:09:07 +02:00
|
|
|
/** Use <b>fd</b> to log non-survivable sandbox violations. */
|
2013-06-17 12:07:14 +02:00
|
|
|
void sandbox_set_debugging_fd(int fd);
|
2013-08-14 23:09:07 +02:00
|
|
|
|
|
|
|
/** Returns a registered protected string used with the sandbox, given that
|
|
|
|
* it matches the parameter.
|
|
|
|
*/
|
2013-07-29 15:30:39 +02:00
|
|
|
const char* sandbox_intern_string(const char *param);
|
2013-07-25 13:08:02 +02:00
|
|
|
|
2013-08-14 23:09:07 +02:00
|
|
|
/** Creates an empty sandbox configuration file.*/
|
2013-08-28 19:01:52 +02:00
|
|
|
sandbox_cfg_t * sandbox_cfg_new(void);
|
2013-08-10 17:04:48 +02:00
|
|
|
|
2013-08-14 23:09:07 +02:00
|
|
|
/**
|
|
|
|
* Function used to add a open allowed filename to a supplied configuration.
|
|
|
|
* The (char*) specifies the path to the allowed file, fr = 1 tells the
|
|
|
|
* function that the char* needs to be free-ed, 0 means the pointer does not
|
|
|
|
* need to be free-ed.
|
|
|
|
*/
|
2013-08-10 17:04:48 +02:00
|
|
|
int sandbox_cfg_allow_open_filename(sandbox_cfg_t **cfg, char *file,
|
|
|
|
char fr);
|
2013-08-14 23:09:07 +02:00
|
|
|
|
|
|
|
/** Function used to add a series of open allowed filenames to a supplied
|
|
|
|
* configuration.
|
|
|
|
* @param cfg sandbox configuration.
|
|
|
|
* @param num number of files.
|
|
|
|
* @param ... all future parameters are specified as pairs of <(char*), 1 / 0>
|
|
|
|
* the char* specifies the path to the allowed file, 1 tells the function
|
|
|
|
* that the char* needs to be free-ed, 0 means the pointer does not need to
|
|
|
|
* be free-ed.
|
|
|
|
*/
|
2013-08-10 17:04:48 +02:00
|
|
|
int sandbox_cfg_allow_open_filename_array(sandbox_cfg_t **cfg, int num, ...);
|
|
|
|
|
2013-08-14 23:09:07 +02:00
|
|
|
/**
|
|
|
|
* Function used to add a openat allowed filename to a supplied configuration.
|
|
|
|
* The (char*) specifies the path to the allowed file, fr = 1 tells the
|
|
|
|
* function that the char* needs to be free-ed, 0 means the pointer does not
|
|
|
|
* need to be free-ed.
|
|
|
|
*/
|
2013-08-10 17:04:48 +02:00
|
|
|
int sandbox_cfg_allow_openat_filename(sandbox_cfg_t **cfg, char *file,
|
|
|
|
char fr);
|
2013-08-14 23:09:07 +02:00
|
|
|
|
|
|
|
/** Function used to add a series of openat allowed filenames to a supplied
|
|
|
|
* configuration.
|
|
|
|
* @param cfg sandbox configuration.
|
|
|
|
* @param num number of files.
|
|
|
|
* @param ... all future parameters are specified as pairs of <(char*), 1 / 0>
|
|
|
|
* the char* specifies the path to the allowed file, 1 tells the function
|
|
|
|
* that the char* needs to be free-ed, 0 means the pointer does not need to
|
|
|
|
* be free-ed.
|
|
|
|
*/
|
2013-08-10 17:04:48 +02:00
|
|
|
int sandbox_cfg_allow_openat_filename_array(sandbox_cfg_t **cfg, int num, ...);
|
|
|
|
|
2013-08-14 23:09:07 +02:00
|
|
|
/**
|
|
|
|
* Function used to add a execve allowed filename to a supplied configuration.
|
|
|
|
* The (char*) specifies the path to the allowed file, fr = 1 tells the
|
|
|
|
* function that the char* needs to be free-ed, 0 means the pointer does not
|
|
|
|
* need to be free-ed.
|
|
|
|
*/
|
2013-08-05 14:40:23 +02:00
|
|
|
int sandbox_cfg_allow_execve(sandbox_cfg_t **cfg, char *com);
|
2013-08-14 23:09:07 +02:00
|
|
|
|
|
|
|
/** Function used to add a series of execve allowed filenames to a supplied
|
|
|
|
* configuration.
|
|
|
|
* @param cfg sandbox configuration.
|
|
|
|
* @param num number of files.
|
|
|
|
* @param ... all future parameters are specified as pairs of <(char*), 1 / 0>
|
|
|
|
* the char* specifies the path to the allowed file, 1 tells the function
|
|
|
|
* that the char* needs to be free-ed, 0 means the pointer does not need to
|
|
|
|
* be free-ed.
|
|
|
|
*/
|
2013-08-10 17:04:48 +02:00
|
|
|
int sandbox_cfg_allow_execve_array(sandbox_cfg_t **cfg, int num, ...);
|
|
|
|
|
2013-08-14 23:09:07 +02:00
|
|
|
/**
|
|
|
|
* Function used to add a stat64 allowed filename to a supplied configuration.
|
|
|
|
* The (char*) specifies the path to the allowed file, fr = 1 tells the
|
|
|
|
* function that the char* needs to be free-ed, 0 means the pointer does not
|
|
|
|
* need to be free-ed.
|
|
|
|
*/
|
2013-08-12 20:14:43 +02:00
|
|
|
int sandbox_cfg_allow_stat64_filename(sandbox_cfg_t **cfg, char *file,
|
|
|
|
char fr);
|
2013-08-14 23:09:07 +02:00
|
|
|
|
|
|
|
/** Function used to add a series of stat64 allowed filenames to a supplied
|
|
|
|
* configuration.
|
|
|
|
* @param cfg sandbox configuration.
|
|
|
|
* @param num number of files.
|
|
|
|
* @param ... all future parameters are specified as pairs of <(char*), 1 / 0>
|
|
|
|
* the char* specifies the path to the allowed file, 1 tells the function
|
|
|
|
* that the char* needs to be free-ed, 0 means the pointer does not need to
|
|
|
|
* be free-ed.
|
|
|
|
*/
|
2013-08-12 20:14:43 +02:00
|
|
|
int sandbox_cfg_allow_stat64_filename_array(sandbox_cfg_t **cfg,
|
|
|
|
int num, ...);
|
|
|
|
|
2013-08-14 23:09:07 +02:00
|
|
|
/** Function used to initialise a sandbox configuration.*/
|
2013-07-25 13:08:02 +02:00
|
|
|
int sandbox_init(sandbox_cfg_t* cfg);
|
2013-06-17 12:07:14 +02:00
|
|
|
|
|
|
|
#endif /* SANDBOX_H_ */
|
|
|
|
|