1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
|
/*
* Copyright (C) 2014-2017 Firejail Authors
*
* This file is part of firejail project
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
#include "faudit.h"
#include <sys/ptrace.h>
#include <sys/swap.h>
#if defined(__i386__) || defined(__x86_64__)
#include <sys/io.h>
#endif
#include <sys/wait.h>
extern int init_module(void *module_image, unsigned long len,
const char *param_values);
extern int finit_module(int fd, const char *param_values,
int flags);
extern int delete_module(const char *name, int flags);
extern int pivot_root(const char *new_root, const char *put_old);
void syscall_helper(int argc, char **argv) {
(void) argc;
if (strcmp(argv[2], "mount") == 0) {
int rv = mount(NULL, NULL, NULL, 0, NULL);
(void) rv;
printf("\nUGLY: mount syscall permitted.\n");
}
else if (strcmp(argv[2], "umount2") == 0) {
umount2(NULL, 0);
printf("\nUGLY: umount2 syscall permitted.\n");
}
else if (strcmp(argv[2], "ptrace") == 0) {
ptrace(0, 0, NULL, NULL);
printf("\nUGLY: ptrace syscall permitted.\n");
}
else if (strcmp(argv[2], "swapon") == 0) {
swapon(NULL, 0);
printf("\nUGLY: swapon syscall permitted.\n");
}
else if (strcmp(argv[2], "swapoff") == 0) {
swapoff(NULL);
printf("\nUGLY: swapoff syscall permitted.\n");
}
else if (strcmp(argv[2], "init_module") == 0) {
init_module(NULL, 0, NULL);
printf("\nUGLY: init_module syscall permitted.\n");
}
else if (strcmp(argv[2], "delete_module") == 0) {
delete_module(NULL, 0);
printf("\nUGLY: delete_module syscall permitted.\n");
}
else if (strcmp(argv[2], "chroot") == 0) {
int rv = chroot("/blablabla-57281292");
(void) rv;
printf("\nUGLY: chroot syscall permitted.\n");
}
else if (strcmp(argv[2], "pivot_root") == 0) {
pivot_root(NULL, NULL);
printf("\nUGLY: pivot_root syscall permitted.\n");
}
#if defined(__i386__) || defined(__x86_64__)
else if (strcmp(argv[2], "iopl") == 0) {
iopl(0L);
printf("\nUGLY: iopl syscall permitted.\n");
}
else if (strcmp(argv[2], "ioperm") == 0) {
ioperm(0, 0, 0);
printf("\nUGLY: ioperm syscall permitted.\n");
}
#endif
exit(0);
}
void syscall_run(const char *name) {
assert(prog);
pid_t child = fork();
if (child < 0)
errExit("fork");
if (child == 0) {
execl(prog, prog, "syscall", name, NULL);
perror("execl");
_exit(1);
}
// wait for the child to finish
waitpid(child, NULL, 0);
}
|