| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
|
|
| |
compat/common/compat_util.c to dev/systrace.c, the one place they
are used, and remove the remaining kernel references to compat/*.
ok visa@
|
|
|
|
| |
of <sys/param.h>
|
|
|
|
| |
ok millert guenther
|
|
|
|
| |
ok deraadt@, sthen@, jasper@
|
|
|
|
|
|
|
|
|
| |
the traced process when the syscall is attempted. This is more useful and
safer for unsupervised sandboxing than returning EPERM (which is the
behaviour of SYSTR_POLICY_NEVER), as this could cause dangerous misbehaviour
in applications that don't expect it.
"I like it" deraadt@ markus@
|
|
|
|
|
|
|
| |
fork(), i worry about it a lot but cannot prove yet that sleeping there
is bad. Anyways, this change makes us never sleep in that area -- the
memory needed is allocated ealier like the ptrace state. tested by many
developers.
|
|
|
|
| |
Security; ok deraadt
|
| |
|
|
|
|
|
|
|
| |
the stackgap. this in turn allows for argument replacement with indirection.
for example replacing an entire envp or struct pollfd.
ok provos@ millert@
|
|
|
|
|
|
|
|
|
| |
the argv[0] would be normalized, and hence break scripts
that depend on how they were called.
this fixes an issue in the ports builds.
ok provos@ deraadt@; lots of testing during hackathon sturm@ naddy@
|
|
|
|
|
|
|
|
|
|
|
|
| |
- add an exec message so that whenever a set-uid/gid process
exec's a new image which we may control, the exec does not
go by unnoticed.
- take special care to check for P_SUGIDEXEC as well as
P_SUGID, corresponding to the same changes that were made in
the ptrace code a while ago
ok niels@, sturm@; thanks to naddy for testing
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
itojun@ ok
fix a race condition between path resolution in userland
and the subsequent namei(): inform the kernel portion of
valid filenames and then disallow symlink lookups for
those filenames by means of a hook in namei().
with suggestions from provos@
also, add (currently unused) seqnr field to struct
systrace_replace, from provos@
|
|
|
|
|
| |
- escape fixes for special characters
markus, sturm ok. from provos
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
with privilege elevation no suid or sgid binaries are necessary any
longer. Applications can be executed completely
unprivileged. Systrace raises the privileges for a single system call
depending on the configured policy.
Idea from discussions with Perry Metzger, Dug Song and Marcus Watts.
from provos
|
|
|
|
| |
from provos
|
| |
|
|
|
|
| |
avoids problems where tsleep has been interrupted by a signal.
|
| |
|
| |
|
|
|
|
| |
attaching to a running process
|
| |
|
| |
|
|
okay deraadt@
|