NetBSD/bin/systrace/intercept.c

756 lines
17 KiB
C

/* $NetBSD: intercept.c,v 1.4 2002/07/30 16:29:30 itojun Exp $ */
/* $OpenBSD: intercept.c,v 1.20 2002/07/30 16:09:48 itojun Exp $ */
/*
* Copyright 2002 Niels Provos <provos@citi.umich.edu>
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by Niels Provos.
* 4. The name of the author may not be used to endorse or promote products
* derived from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include <sys/cdefs.h>
__RCSID("$NetBSD: intercept.c,v 1.4 2002/07/30 16:29:30 itojun Exp $");
#include <sys/types.h>
#include <sys/param.h>
#include <sys/tree.h>
#include <sys/wait.h>
#include <sys/stat.h>
#include <signal.h>
#include <stdlib.h>
#include <string.h>
#include <poll.h>
#include <fcntl.h>
#include <stdio.h>
#include <unistd.h>
#include <errno.h>
#include <err.h>
#include <libgen.h>
#include "intercept.h"
void simplify_path(char *);
struct intercept_syscall {
SPLAY_ENTRY(intercept_syscall) node;
char name[64];
char emulation[16];
short (*cb)(int, pid_t, int, const char *, int, const char *, void *,
int, struct intercept_tlq *, void *);
void *cb_arg;
struct intercept_tlq tls;
};
static int sccompare(struct intercept_syscall *, struct intercept_syscall *);
static int pidcompare(struct intercept_pid *, struct intercept_pid *);
static struct intercept_syscall *intercept_sccb_find(const char *,
const char *);
static void sigusr1_handler(int);
static SPLAY_HEAD(pidtree, intercept_pid) pids;
static SPLAY_HEAD(sctree, intercept_syscall) scroot;
/* Generic callback functions */
void (*intercept_newimagecb)(int, pid_t, int, const char *, const char *, void *) = NULL;
void *intercept_newimagecbarg = NULL;
short (*intercept_gencb)(int, pid_t, int, const char *, int, const char *, void *, int, void *) = NULL;
void *intercept_gencbarg = NULL;
int
sccompare(struct intercept_syscall *a, struct intercept_syscall *b)
{
int diff;
diff = strcmp(a->emulation, b->emulation);
if (diff)
return (diff);
return (strcmp(a->name, b->name));
}
int
pidcompare(struct intercept_pid *a, struct intercept_pid *b)
{
int diff = a->pid - b->pid;
if (diff == 0)
return (0);
if (diff > 0)
return (1);
return (-1);
}
SPLAY_PROTOTYPE(sctree, intercept_syscall, node, sccompare);
SPLAY_GENERATE(sctree, intercept_syscall, node, sccompare);
SPLAY_PROTOTYPE(pidtree, intercept_pid, next, pidcompare);
SPLAY_GENERATE(pidtree, intercept_pid, next, pidcompare);
extern struct intercept_system intercept;
int
intercept_init(void)
{
SPLAY_INIT(&pids);
SPLAY_INIT(&scroot);
intercept_newimagecb = NULL;
intercept_gencb = NULL;
return (intercept.init());
}
struct intercept_syscall *
intercept_sccb_find(const char *emulation, const char *name)
{
struct intercept_syscall tmp;
strlcpy(tmp.name, name, sizeof(tmp.name));
strlcpy(tmp.emulation, emulation, sizeof(tmp.emulation));
return (SPLAY_FIND(sctree, &scroot, &tmp));
}
struct intercept_translate *
intercept_register_translation(char *emulation, char *name, int offset,
struct intercept_translate *tl)
{
struct intercept_syscall *tmp;
struct intercept_translate *tlnew;
if (offset >= INTERCEPT_MAXSYSCALLARGS)
errx(1, "%s: %s-%s: offset too large",
__func__, emulation, name);
tmp = intercept_sccb_find(emulation, name);
if (tmp == NULL)
errx(1, "%s: %s-%s: can't find call back",
__func__, emulation, name);
tlnew = malloc(sizeof(struct intercept_translate));
if (tlnew == NULL)
err(1, "%s: %s-%s: malloc",
__func__, emulation, name);
memcpy(tlnew, tl, sizeof(struct intercept_translate));
tlnew->off = offset;
TAILQ_INSERT_TAIL(&tmp->tls, tlnew, next);
return (tlnew);
}
void *
intercept_sccb_cbarg(char *emulation, char *name)
{
struct intercept_syscall *tmp;
if ((tmp = intercept_sccb_find(emulation, name)) == NULL)
return (NULL);
return (tmp->cb_arg);
}
int
intercept_register_sccb(char *emulation, char *name,
short (*cb)(int, pid_t, int, const char *, int, const char *, void *, int,
struct intercept_tlq *, void *),
void *cbarg)
{
struct intercept_syscall *tmp;
if (intercept_sccb_find(emulation, name))
return (-1);
if (intercept.getsyscallnumber(emulation, name) == -1) {
warnx("%s: %d: unknown syscall: %s-%s", __func__, __LINE__,
emulation, name);
return (-1);
}
if ((tmp = calloc(1, sizeof(struct intercept_syscall))) == NULL) {
warn("%s:%d: malloc", __func__, __LINE__);
return (-1);
}
TAILQ_INIT(&tmp->tls);
strlcpy(tmp->name, name, sizeof(tmp->name));
strlcpy(tmp->emulation, emulation, sizeof(tmp->emulation));
tmp->cb = cb;
tmp->cb_arg = cbarg;
SPLAY_INSERT(sctree, &scroot, tmp);
return (0);
}
int
intercept_register_gencb(short (*cb)(int, pid_t, int, const char *, int, const char *, void *, int, void *), void *arg)
{
intercept_gencb = cb;
intercept_gencbarg = arg;
return (0);
}
int
intercept_register_execcb(void (*cb)(int, pid_t, int, const char *, const char *, void *), void *arg)
{
intercept_newimagecb = cb;
intercept_newimagecbarg = arg;
return (0);
}
static void
sigusr1_handler(int signum)
{
/* all we need to do is pretend to handle it */
}
pid_t
intercept_run(int bg, int fd, char *path, char *const argv[])
{
struct intercept_pid *icpid;
sigset_t none, set, oset;
sig_t ohandler;
pid_t pid, cpid;
int status;
/* Block signals so that timeing on signal delivery does not matter */
sigemptyset(&none);
sigemptyset(&set);
sigaddset(&set, SIGUSR1);
if (sigprocmask(SIG_BLOCK, &set, &oset) == -1)
err(1, "sigprocmask");
ohandler = signal(SIGUSR1, sigusr1_handler);
if (ohandler == SIG_ERR)
err(1, "signal");
pid = getpid();
cpid = fork();
if (cpid == -1)
return (-1);
/*
* If the systrace process should be in the background and we're
* the parent, or vice versa.
*/
if ((!bg && cpid == 0) || (bg && cpid != 0)) {
/* Needs to be closed */
close(fd);
if (bg) {
/* Wait for child to "detach" */
cpid = wait(&status);
if (cpid == -1)
err(1, "wait");
if (status != 0)
errx(1, "wait: child gave up");
}
/* Sleep */
sigsuspend(&none);
/*
* Woken up, restore signal handling state.
*
* Note that there is either no child or we have no idea
* what pid it might have at this point. If we fail.
*/
if (signal(SIGUSR1, ohandler) == SIG_ERR)
err(1, "signal");
if (sigprocmask(SIG_SETMASK, &oset, NULL) == -1)
err(1, "sigprocmask");
execvp(path, argv);
/* Error */
err(1, "execvp");
}
/* Choose the pid of the systraced process */
pid = bg ? pid : cpid;
if ((icpid = intercept_getpid(pid)) == NULL)
err(1, "intercept_getpid");
/* Set uid and gid information */
icpid->uid = getuid();
icpid->gid = getgid();
icpid->flags |= ICFLAGS_UIDKNOWN | ICFLAGS_GIDKNOWN;
/* Setup done, restore signal handling state */
if (signal(SIGUSR1, ohandler) == SIG_ERR) {
kill(pid, SIGKILL);
err(1, "signal");
}
if (sigprocmask(SIG_SETMASK, &oset, NULL) == -1) {
kill(pid, SIGKILL);
err(1, "sigprocmask");
}
if (bg) {
if (daemon(0, 1) == -1) {
kill(pid, SIGKILL);
err(1, "daemon");
}
}
return (pid);
}
int
intercept_existpids(void)
{
return (SPLAY_ROOT(&pids) != NULL);
}
void
intercept_freepid(pid_t pidnr)
{
struct intercept_pid *pid, tmp2;
tmp2.pid = pidnr;
pid = SPLAY_FIND(pidtree, &pids, &tmp2);
if (pid == NULL)
return;
intercept.freepid(pid);
SPLAY_REMOVE(pidtree, &pids, pid);
if (pid->name)
free(pid->name);
if (pid->newname)
free(pid->newname);
free(pid);
}
struct intercept_pid *
intercept_getpid(pid_t pid)
{
struct intercept_pid *tmp, tmp2;
tmp2.pid = pid;
tmp = SPLAY_FIND(pidtree, &pids, &tmp2);
if (tmp)
return (tmp);
if ((tmp = malloc(sizeof(struct intercept_pid))) == NULL)
err(1, "%s: malloc", __func__);
memset(tmp, 0, sizeof(struct intercept_pid));
tmp->pid = pid;
SPLAY_INSERT(pidtree, &pids, tmp);
return (tmp);
}
int
intercept_open(void)
{
int fd;
if ((fd = intercept.open()) == -1)
return (-1);
if (fcntl(fd, F_SETFL, O_NONBLOCK) == -1)
warn("fcntl(O_NONBLOCK)");
return (fd);
}
int
intercept_attach(int fd, pid_t pid)
{
return (intercept.attach(fd, pid));
}
int
intercept_attachpid(int fd, pid_t pid, char *name)
{
struct intercept_pid *icpid;
int res;
res = intercept.attach(fd, pid);
if (res == -1)
return (-1);
if ((icpid = intercept_getpid(pid)) == NULL)
return (-1);
if ((icpid->newname = strdup(name)) == NULL)
err(1, "strdup");
if (intercept.report(fd, pid) == -1)
return (-1);
/* Indicates a running attach */
icpid->execve_code = -1;
return (0);
}
int
intercept_detach(int fd, pid_t pid)
{
int res;
res = intercept.detach(fd, pid);
if (res != -1)
intercept_freepid(pid);
return (res);
}
int
intercept_read(int fd)
{
struct pollfd pollfd;
int n;
pollfd.fd = fd;
pollfd.events = POLLIN;
do {
n = poll(&pollfd, 1, -1);
if (n == -1) {
if (errno != EINTR && errno != EAGAIN)
return (-1);
}
} while (n <= 0);
if (!(pollfd.revents & (POLLIN|POLLRDNORM)))
return (-1);
return (intercept.read(fd));
}
int
intercept_replace_init(struct intercept_replace *repl)
{
memset(repl, 0, sizeof(struct intercept_replace));
return (0);
}
int
intercept_replace_add(struct intercept_replace *repl, int off,
u_char *addr, size_t len)
{
int ind = repl->num;
if (ind >= INTERCEPT_MAXSYSCALLARGS)
return (-1);
repl->ind[ind] = off;
repl->address[ind] = addr;
repl->len[ind] = len;
repl->num++;
return (0);
}
int
intercept_replace(int fd, pid_t pid, struct intercept_replace *repl)
{
if (repl->num == 0)
return (0);
return (intercept.replace(fd, pid, repl));
}
char *
intercept_get_string(int fd, pid_t pid, void *addr)
{
static char name[MAXPATHLEN];
int off = 0, done = 0;
do {
if (intercept.io(fd, pid, INTERCEPT_READ, (char *)addr + off,
&name[off], 4) == -1) {
warn("%s: ioctl", __func__);
return (NULL);
}
off += 4;
name[off] = '\0';
if (strlen(name) < off)
done = 1;
} while (!done && off + 5 < sizeof(name));
if (!done) {
warnx("%s: string too long", __func__);
return (NULL);
}
return (name);
}
char *
intercept_filename(int fd, pid_t pid, void *addr, int userp)
{
static char cwd[2*MAXPATHLEN];
char *name;
name = intercept_get_string(fd, pid, addr);
if (name == NULL)
err(1, "%s: getstring", __func__);
if (intercept.getcwd(fd, pid, cwd, sizeof(cwd)) == NULL)
if (name[0] != '/')
err(1, "%s: getcwd", __func__);
if (name[0] != '/') {
if (strlcat(cwd, "/", sizeof(cwd)) >= sizeof(cwd))
goto error;
if (strlcat(cwd, name, sizeof(cwd)) >= sizeof(cwd))
goto error;
} else {
if (strlcpy(cwd, name, sizeof(cwd)) >= sizeof(cwd))
goto error;
}
if (userp) {
static char rcwd[2*MAXPATHLEN];
int failed = 0;
/* If realpath fails then the filename does not exist */
if (realpath(cwd, rcwd) == NULL) {
char *dir, *file;
struct stat st;
if (errno != EACCES) {
failed = 1;
goto out;
}
/* Component of path could not be entered */
if (strlcpy(rcwd, cwd, sizeof(rcwd)) >= sizeof(rcwd))
goto error;
if ((file = basename(rcwd)) == NULL)
goto error;
if ((dir = dirname(rcwd)) == NULL)
goto error;
/* So, try again */
if (realpath(dir, rcwd) == NULL) {
failed = 1;
goto out;
}
if (strlcat(rcwd, "/", sizeof(rcwd)) >= sizeof(rcwd))
goto error;
if (strlcat(rcwd, file, sizeof(rcwd)) >= sizeof(rcwd))
goto error;
/*
* At this point, filename has to exist and has to
* be a directory.
*/
if (lstat(rcwd, &st) == -1 || !(st.st_mode & S_IFDIR))
failed = 1;
}
out:
if (failed)
snprintf(rcwd, sizeof(rcwd),
"/<non-existent filename>: %s", cwd);
name = rcwd;
} else {
simplify_path(cwd);
name = cwd;
}
/* Restore working directory and change root space after realpath */
if (intercept.restcwd(fd) == -1)
err(1, "%s: restcwd", __func__);
return (name);
error:
errx(1, "%s: filename too long", __func__);
}
void
intercept_syscall(int fd, pid_t pid, u_int16_t seqnr, int policynr,
const char *name, int code, const char *emulation, void *args, int argsize)
{
short action, flags = 0;
struct intercept_syscall *sc;
int error = 0;
action = ICPOLICY_PERMIT;
flags = 0;
/* Special handling for the exec call */
if (!strcmp(name, "execve")) {
struct intercept_pid *icpid;
void *addr;
if ((icpid = intercept_getpid(pid)) == NULL)
err(1, "intercept_getpid");
icpid->execve_code = code;
icpid->policynr = policynr;
if (icpid->newname)
free(icpid->newname);
intercept.getarg(0, args, argsize, &addr);
icpid->newname = strdup(intercept_filename(fd, pid, addr, 0));
if (icpid->newname == NULL)
err(1, "%s:%d: strdup", __func__, __LINE__);
/* We need to know the result from this system call */
flags = ICFLAGS_RESULT;
} else if (!strcmp(name, "setuid") || !strcmp(name, "setgid")) {
flags = ICFLAGS_RESULT;
}
sc = intercept_sccb_find(emulation, name);
if (sc != NULL) {
struct intercept_translate *tl;
TAILQ_FOREACH(tl, &sc->tls, next) {
if (intercept_translate(tl, fd, pid, tl->off,
args, argsize) == -1)
break;
}
action = (*sc->cb)(fd, pid, policynr, name, code, emulation,
args, argsize, &sc->tls, sc->cb_arg);
} else if (intercept_gencb != NULL)
action = (*intercept_gencb)(fd, pid, policynr, name, code,
emulation, args, argsize, intercept_gencbarg);
if (action > 0) {
error = action;
action = ICPOLICY_NEVER;
}
/* Resume execution of the process */
intercept.answer(fd, pid, seqnr, action, error, flags);
}
void
intercept_syscall_result(int fd, pid_t pid, u_int16_t seqnr, int policynr,
const char *name, int code, const char *emulation, void *args, int argsize,
int result, void *rval)
{
struct intercept_pid *icpid;
if (result > 0)
goto out;
icpid = intercept_getpid(pid);
if (!strcmp("execve", name)) {
/* Commit the name of the new image */
if (icpid->name)
free(icpid->name);
icpid->name = icpid->newname;
icpid->newname = NULL;
if (intercept_newimagecb != NULL)
(*intercept_newimagecb)(fd, pid, policynr, emulation,
icpid->name, intercept_newimagecbarg);
} else if (!strcmp("setuid", name)) {
intercept.getarg(0, args, argsize, (void **)&icpid->uid);
icpid->flags |= ICFLAGS_UIDKNOWN;
} else if (!strcmp("setgid", name)) {
intercept.getarg(0, args, argsize, (void **)&icpid->gid);
icpid->flags |= ICFLAGS_GIDKNOWN;
}
out:
/* Resume execution of the process */
intercept.answer(fd, pid, seqnr, 0, 0, 0);
}
int
intercept_newpolicy(int fd)
{
int policynr;
policynr = intercept.newpolicy(fd);
return (policynr);
}
int
intercept_assignpolicy(int fd, pid_t pid, int policynr)
{
return (intercept.assignpolicy(fd, pid, policynr));
}
int
intercept_modifypolicy(int fd, int policynr, const char *emulation,
const char *name, short policy)
{
int code;
code = intercept.getsyscallnumber(emulation, name);
if (code == -1)
return (-1);
return (intercept.policy(fd, policynr, code, policy));
}
void
intercept_child_info(pid_t opid, pid_t npid)
{
struct intercept_pid *ipid, *inpid, tmp;
/* A child just died on us */
if (npid == -1) {
intercept_freepid(opid);
return;
}
tmp.pid = opid;
ipid = SPLAY_FIND(pidtree, &pids, &tmp);
if (ipid == NULL)
return;
inpid = intercept_getpid(npid);
inpid->policynr = ipid->policynr;
if (ipid->name != NULL) {
inpid->name = strdup(ipid->name);
if (inpid->name == NULL)
err(1, "%s:%d: strdup", __func__, __LINE__);
}
/* Copy some information */
inpid->flags = ipid->flags;
inpid->uid = ipid->uid;
inpid->gid = ipid->gid;
/* XXX - keeps track of emulation */
intercept.clonepid(ipid, inpid);
}