X-Git-Url: http://mj.ucw.cz/gitweb/?a=blobdiff_plain;f=src%2Fbox.c;h=d6b820dfb7b5a5e160501f6fffc15cb0de2ee150;hb=393075b14f24709ffd2bbaf7448397ed88bc4122;hp=c80fe3d5e26dec0fff906b5baa7cb4e06941e803;hpb=d9767ff852b6bae9fa3319d1da812f86a4d54b91;p=moe.git diff --git a/src/box.c b/src/box.c index c80fe3d..d6b820d 100644 --- a/src/box.c +++ b/src/box.c @@ -27,6 +27,7 @@ #define NONRET __attribute__((noreturn)) #define UNUSED __attribute__((unused)) +#define ARRAY_SIZE(a) (int)(sizeof(a)/sizeof(a[0])) static int filter_syscalls; /* 0=off, 1=liberal, 2=totalitarian */ static int timeout; /* milliseconds */ @@ -90,13 +91,13 @@ msg(char *msg, ...) va_end(args); } -static const char * const syscall_tab[] = { +static const char * const syscall_names[] = { #include "syscall-table.h" }; -#define NUM_SYSCALLS (sizeof(syscall_tab)/sizeof(syscall_tab[0])) +#define NUM_SYSCALLS ARRAY_SIZE(syscall_names) #define NUM_ACTIONS (NUM_SYSCALLS+64) -enum syscall_action { +enum action { SC_DEFAULT, // Use the default action SC_NO, // Always forbid SC_YES, // Always permit @@ -177,6 +178,7 @@ static unsigned char syscall_action[NUM_ACTIONS] = { S(sigpending) = SC_YES | SC_LIBERAL, S(getrlimit) = SC_YES | SC_LIBERAL, S(getrusage) = SC_YES | SC_LIBERAL, + S(ugetrlimit) = SC_YES | SC_LIBERAL, S(gettimeofday) = SC_YES | SC_LIBERAL, S(select) = SC_YES | SC_LIBERAL, S(readdir) = SC_YES | SC_LIBERAL, @@ -208,8 +210,8 @@ static unsigned char syscall_action[NUM_ACTIONS] = { static const char * syscall_name(unsigned int id, char *buf) { - if (id < NUM_SYSCALLS && syscall_tab[id]) - return syscall_tab[id]; + if (id < NUM_SYSCALLS && syscall_names[id]) + return syscall_names[id]; else { sprintf(buf, "#%d", id); @@ -220,8 +222,8 @@ syscall_name(unsigned int id, char *buf) static int syscall_by_name(char *name) { - for (unsigned int i=0; i= (int)NUM_ACTIONS) + if (sys >= NUM_ACTIONS) die("Syscall `%s' out of range", a); syscall_action[sys] = act; return 1; } +struct path_rule { + char *path; + enum action action; + struct path_rule *next; +}; + +static struct path_rule default_path_rules[] = { + { "/etc/", SC_YES }, + { "/lib/", SC_YES }, + { "/usr/lib/", SC_YES }, + { "/opt/lib/", SC_YES }, + { "/usr/share/zoneinfo/", SC_YES }, + { "/usr/share/locale/", SC_YES }, + { "/dev/null", SC_YES }, + { "/dev/zero", SC_YES }, + { "/proc/meminfo", SC_YES }, + { "/proc/self/stat", SC_YES }, + { "/proc/self/exe", SC_YES }, // Needed by FPC 2.0.x runtime +}; + +static enum action +match_path_rule(struct path_rule *r, char *path) +{ + char *rr = r->path; + while (*rr) + if (*rr++ != *path++) + { + if (rr[-1] == '/' && !path[-1]) + break; + return SC_DEFAULT; + } + if (rr > r->path && rr[-1] != '/' && *path) + return SC_DEFAULT; + return r->action; +} + static void valid_filename(unsigned long addr) { @@ -308,32 +346,30 @@ valid_filename(unsigned long addr) msg("[%s] ", namebuf); if (file_access >= 3) return; + + // Everything in current directory is permitted if (!strchr(namebuf, '/') && strcmp(namebuf, "..")) return; + + // ".." anywhere in the path is forbidden + enum action act = SC_DEFAULT; + if (strstr(namebuf, "..")) + act = SC_NO; + + // Scan built-in rules if (file_access >= 2) - { - if ((!strncmp(namebuf, "/etc/", 5) || - !strncmp(namebuf, "/lib/", 5) || - !strncmp(namebuf, "/usr/lib/", 9) || - !strncmp(namebuf, "/opt/lib/", 9)) - && !strstr(namebuf, "..")) - return; - if (!strcmp(namebuf, "/dev/null") || - !strcmp(namebuf, "/dev/zero") || - !strcmp(namebuf, "/proc/meminfo") || - !strcmp(namebuf, "/proc/self/stat") || - !strcmp(namebuf, "/proc/self/exe") || /* Needed by FPC 2.0.x runtime */ - !strncmp(namebuf, "/usr/share/zoneinfo/", 20)) - return; - } - die("Forbidden access to file `%s'", namebuf); + for (int i=0; iregs.orig_eax; - enum syscall_action act = (sys < NUM_ACTIONS) ? syscall_action[sys] : SC_DEFAULT; + enum action act = (sys < NUM_ACTIONS) ? syscall_action[sys] : SC_DEFAULT; if (act & SC_LIBERAL) {