1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
|
/*
* Copyright (C) 2014-2021 Firejail Authors
*
* This file is part of firejail project
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
#include "faudit.h"
void pid_test(void) {
static char *kern_proc[] = {
"kthreadd",
"ksoftirqd",
"kworker",
"rcu_sched",
"rcu_bh",
NULL // NULL terminated list
};
int i;
// look at the first 10 processes
int not_visible = 1;
for (i = 1; i <= 10; i++) {
struct stat s;
char *fname;
if (asprintf(&fname, "/proc/%d/comm", i) == -1)
errExit("asprintf");
if (stat(fname, &s) == -1) {
free(fname);
continue;
}
// open file
/* coverity[toctou] */
FILE *fp = fopen(fname, "r");
if (!fp) {
free(fname);
continue;
}
// read file
char buf[100];
if (fgets(buf, 10, fp) == NULL) {
fclose(fp);
free(fname);
continue;
}
not_visible = 0;
// clean /n
char *ptr;
if ((ptr = strchr(buf, '\n')) != NULL)
*ptr = '\0';
// check process name against the kernel list
int j = 0;
while (kern_proc[j] != NULL) {
if (strncmp(buf, kern_proc[j], strlen(kern_proc[j])) == 0) {
fclose(fp);
free(fname);
printf("BAD: Process %d is not running in a PID namespace. ", getpid());
printf("Are you sure you're running in a sandbox?\n");
return;
}
j++;
}
fclose(fp);
free(fname);
}
pid_t pid = getpid();
if (not_visible && pid > 100)
printf("BAD: Process %d is not running in a PID namespace.\n", pid);
else
printf("GOOD: process %d is running in a PID namespace.\n", pid);
// try to guess the type of container/sandbox
char *str = getenv("container");
if (str)
printf("INFO: container/sandbox %s.\n", str);
else {
str = getenv("SNAP");
if (str)
printf("INFO: this is a snap package\n");
}
}
|