summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorCristian Toader <cristian.matei.toader@gmail.com>2013-07-24 17:06:06 +0300
committerCristian Toader <cristian.matei.toader@gmail.com>2013-07-24 17:06:06 +0300
commit962d814e52beb8d3ca8c73f3ab48d8566778dcc5 (patch)
treec0bc5ef5567eeddd851ac630b579823178b4e34e
parente1410f20d749e3e76a28b7db0e99f51b863100ef (diff)
downloadtor-962d814e52beb8d3ca8c73f3ab48d8566778dcc5.tar.gz
tor-962d814e52beb8d3ca8c73f3ab48d8566778dcc5.zip
dynamic parameter filter (prototype, not tested)
-rw-r--r--src/common/sandbox.c144
-rw-r--r--src/common/sandbox.h15
2 files changed, 114 insertions, 45 deletions
diff --git a/src/common/sandbox.c b/src/common/sandbox.c
index 377ac062f3..2657cbaaf2 100644
--- a/src/common/sandbox.c
+++ b/src/common/sandbox.c
@@ -33,7 +33,9 @@
#include <signal.h>
#include <unistd.h>
-static ParFilter param_filter[] = {
+ParFilterDynamic *filter_dynamic = NULL;
+
+static ParFilterStatic filter_static[] = {
// Example entries
{SCMP_SYS(execve), PARAM_PTR, 0, (intptr_t)("/usr/local/bin/tor"), 0},
{SCMP_SYS(rt_sigaction), PARAM_NUM, 0, (intptr_t)(SIGINT), 0},
@@ -79,7 +81,7 @@ static ParFilter param_filter[] = {
/** Variable used for storing all syscall numbers that will be allowed with the
* stage 1 general Tor sandbox.
*/
-static int general_filter[] = {
+static int filter_nopar_gen[] = {
SCMP_SYS(access),
SCMP_SYS(brk),
SCMP_SYS(clock_gettime),
@@ -194,16 +196,16 @@ get_prot_param(char *param)
if (param == NULL)
return NULL;
- if (param_filter == NULL) {
+ if (filter_static == NULL) {
filter_size = 0;
} else {
- filter_size = sizeof(param_filter) / sizeof(param_filter[0]);
+ filter_size = sizeof(filter_static) / sizeof(filter_static[0]);
}
for (i = 0; i < filter_size; i++) {
- if (param_filter[i].prot && param_filter[i].ptype == PARAM_PTR
- && !strncmp(param, (char*)(param_filter[i].param), MAX_PARAM_LEN)) {
- return (char*)(param_filter[i].param);
+ if (filter_static[i].prot && filter_static[i].ptype == PARAM_PTR
+ && !strncmp(param, (char*)(filter_static[i].param), MAX_PARAM_LEN)) {
+ return (char*)(filter_static[i].param);
}
}
@@ -211,49 +213,103 @@ get_prot_param(char *param)
return param;
}
+static char*
+prot_strdup(char* str)
+{
+ int param_size = 0;
+ char *res = NULL;
+
+ if (str == NULL)
+ goto out;
+
+ // allocating protected memory region for parameter
+ param_size = 1 + strnlen(str, MAX_PARAM_LEN);
+ if (param_size == MAX_PARAM_LEN) {
+ log_warn(LD_BUG, "(Sandbox) Parameter length too large!");
+ }
+
+ res = (char*) mmap(NULL, param_size, PROT_READ | PROT_WRITE, MAP_PRIVATE |
+ MAP_ANON, -1, 0);
+ if (!res) {
+ log_err(LD_BUG,"(Sandbox) failed allocate protected memory!");
+ goto out;
+ }
+
+ // copying from non protected to protected + pointer reassign
+ memcpy(res, str, param_size);
+
+ // protecting from writes
+ if (mprotect(res, param_size, PROT_READ)) {
+ log_err(LD_BUG,"(Sandbox) failed to protect memory!");
+ return NULL;
+ }
+
+ out:
+ return res;
+}
+
+int
+add_dynamic_param_filter(char *syscall, char ptype, char pindex, intptr_t val)
+{
+ ParFilterDynamic **elem;
+
+ for (elem = &filter_dynamic; *elem != NULL; elem = &(*elem)->next);
+
+ *elem = (ParFilterDynamic*) malloc(sizeof(ParFilterDynamic));
+ (*elem)->next = NULL;
+ (*elem)->pindex = pindex;
+ (*elem)->ptype = ptype;
+
+ switch (ptype) {
+ case PARAM_PTR:
+ (*elem)->param = (intptr_t) prot_strdup((char*) val);
+ (*elem)->prot = 1;
+ break;
+
+ case PARAM_NUM:
+ (*elem)->param = val;
+ (*elem)->prot = 0;
+ break;
+ }
+
+ return 0;
+}
+
static int
add_param_filter(scmp_filter_ctx ctx)
{
- int i, filter_size, param_size, rc = 0;
- void *map = NULL;
+ int i, filter_size, rc = 0;
+ ParFilterDynamic *elem;
- if (param_filter != NULL) {
- filter_size = sizeof(param_filter) / sizeof(param_filter[0]);
+ if (filter_static != NULL) {
+ filter_size = sizeof(filter_static) / sizeof(filter_static[0]);
} else {
filter_size = 0;
}
- // for each parameter filter
+ // for each dynamic parameter filters
+ for (elem = filter_dynamic; elem != NULL; elem = elem->next) {
+ rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, elem->syscall, 1,
+ SCMP_CMP(elem->pindex, SCMP_CMP_EQ, elem->param));
+ if (rc != 0) {
+ log_err(LD_BUG,"(Sandbox) failed to add syscall, received libseccomp "
+ "error %d", rc);
+ return rc;
+ }
+ }
+
+ // for each static parameter filter
for (i = 0; i < filter_size; i++) {
- if (!param_filter[i].prot && param_filter[i].ptype == PARAM_PTR) {
- // allocating protected memory region for parameter
- param_size = 1 + strnlen((char*) param_filter[i].param, MAX_PARAM_LEN);
- if (param_size == MAX_PARAM_LEN) {
- log_warn(LD_BUG, "(Sandbox) Parameter %i length too large!", i);
- }
-
- map = mmap(NULL, param_size, PROT_READ | PROT_WRITE, MAP_PRIVATE |
- MAP_ANON, -1, 0);
- if (!map) {
- log_err(LD_BUG,"(Sandbox) failed allocate protected memory!");
- return -1;
- }
-
- // copying from non protected to protected + pointer reassign
- memcpy(map, (char*) (param_filter[i].param), param_size);
- param_filter[i].param = (intptr_t) map;
-
- // protecting from writes
- if (mprotect((char*) param_filter[i].param, param_size, PROT_READ)) {
- log_err(LD_BUG,"(Sandbox) failed to protect memory!");
- return -1;
- }
- } // if not protected
-
- param_filter[i].prot = 1;
-
- rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, param_filter[i].syscall, 1,
- SCMP_CMP(param_filter[i].pindex, SCMP_CMP_EQ, param_filter[i].param));
+ if (!filter_static[i].prot && filter_static[i].ptype == PARAM_PTR) {
+ filter_static[i].param = (intptr_t) prot_strdup(
+ (char*) (filter_static[i].param));
+ }
+
+ filter_static[i].prot = 1;
+
+ rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, filter_static[i].syscall, 1,
+ SCMP_CMP(filter_static[i].pindex, SCMP_CMP_EQ,
+ filter_static[i].param));
if (rc != 0) {
log_err(LD_BUG,"(Sandbox) failed to add syscall index %d, "
"received libseccomp error %d", i, rc);
@@ -269,15 +325,15 @@ add_noparam_filter(scmp_filter_ctx ctx)
{
int i, filter_size, rc = 0;
- if (general_filter != NULL) {
- filter_size = sizeof(general_filter) / sizeof(general_filter[0]);
+ if (filter_nopar_gen != NULL) {
+ filter_size = sizeof(filter_nopar_gen) / sizeof(filter_nopar_gen[0]);
} else {
filter_size = 0;
}
// add general filters
for (i = 0; i < filter_size; i++) {
- rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, general_filter[i], 0);
+ rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, filter_nopar_gen[i], 0);
if (rc != 0) {
log_err(LD_BUG,"(Sandbox) failed to add syscall index %d, "
"received libseccomp error %d", i, rc);
diff --git a/src/common/sandbox.h b/src/common/sandbox.h
index b80c19808e..b75161d93b 100644
--- a/src/common/sandbox.h
+++ b/src/common/sandbox.h
@@ -45,7 +45,20 @@ typedef struct {
intptr_t param;
char prot;
-} ParFilter;
+} ParFilterStatic;
+
+struct pfd_elem {
+ int syscall;
+
+ char ptype;
+ char pindex;
+ intptr_t param;
+
+ char prot;
+
+ struct pfd_elem *next;
+};
+typedef struct pfd_elem ParFilterDynamic;
/**
* Linux 32 bit definitions