1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
|
/*
* Copyright (C) 2014-2021 Firejail Authors
*
* This file is part of firejail project
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
#include "firejail.h"
#include <sys/mount.h>
#include <sys/stat.h>
#include <linux/limits.h>
#include <glob.h>
#include <dirent.h>
#include <fcntl.h>
#include <pwd.h>
void fs_trace_preload(void) {
struct stat s;
// create an empty /etc/ld.so.preload
if (stat("/etc/ld.so.preload", &s)) {
if (arg_debug)
printf("Creating an empty /etc/ld.so.preload file\n");
/* coverity[toctou] */
FILE *fp = fopen("/etc/ld.so.preload", "w");
if (!fp)
errExit("fopen");
SET_PERMS_STREAM(fp, 0, 0, S_IRUSR | S_IWRITE | S_IRGRP | S_IROTH);
fclose(fp);
fs_logger("touch /etc/ld.so.preload");
}
}
void fs_tracefile(void) {
// create a bind mounted trace logfile that the sandbox can see
if (arg_debug)
printf("Creating an empty trace log file: %s\n", arg_tracefile);
EUID_USER();
int fd = open(arg_tracefile, O_CREAT|O_WRONLY|O_CLOEXEC, S_IRUSR | S_IWRITE | S_IRGRP | S_IROTH);
if (fd == -1) {
perror("open");
fprintf(stderr, "Error: cannot open trace log file %s for writing\n", arg_tracefile);
exit(1);
}
struct stat s;
if (fstat(fd, &s) == -1)
errExit("fstat");
if (!S_ISREG(s.st_mode)) {
fprintf(stderr, "Error: cannot write trace log: %s is no regular file\n", arg_tracefile);
exit(1);
}
if (ftruncate(fd, 0) == -1)
errExit("ftruncate");
EUID_ROOT();
FILE *fp = fopen(RUN_TRACE_FILE, "w");
if (!fp)
errExit("fopen " RUN_TRACE_FILE);
fclose(fp);
fs_logger2("touch ", arg_tracefile);
// mount using the symbolic link in /proc/self/fd
if (arg_debug)
printf("Bind mount %s to %s\n", arg_tracefile, RUN_TRACE_FILE);
char *proc;
if (asprintf(&proc, "/proc/self/fd/%d", fd) == -1)
errExit("asprintf");
if (mount(proc, RUN_TRACE_FILE, NULL, MS_BIND|MS_REC, NULL) < 0)
errExit("mount bind " RUN_TRACE_FILE);
free(proc);
close(fd);
// now that RUN_TRACE_FILE is user-writable, mount it noexec
fs_remount(RUN_TRACE_FILE, MOUNT_NOEXEC, 0);
}
void fs_trace(void) {
// create the new ld.so.preload file and mount-bind it
if (arg_debug)
printf("Create the new ld.so.preload file\n");
FILE *fp = fopen(RUN_LDPRELOAD_FILE, "w");
if (!fp)
errExit("fopen");
const char *prefix = RUN_FIREJAIL_LIB_DIR;
if (arg_trace) {
fprintf(fp, "%s/libtrace.so\n", prefix);
}
else if (arg_tracelog) {
fprintf(fp, "%s/libtracelog.so\n", prefix);
fmessage("Blacklist violations are logged to syslog\n");
}
if (arg_seccomp_postexec) {
fprintf(fp, "%s/libpostexecseccomp.so\n", prefix);
fmessage("Post-exec seccomp protector enabled\n");
}
SET_PERMS_STREAM(fp, 0, 0, S_IRUSR | S_IWRITE | S_IRGRP | S_IROTH);
fclose(fp);
// mount the new preload file
if (arg_debug)
printf("Mount the new ld.so.preload file\n");
if (mount(RUN_LDPRELOAD_FILE, "/etc/ld.so.preload", NULL, MS_BIND|MS_REC, NULL) < 0)
errExit("mount bind ld.so.preload");
fs_logger("create /etc/ld.so.preload");
}
|