fixed read only mode

This commit is contained in:
valoq 2018-02-20 12:19:07 +01:00
parent 739a18540a
commit c0bdd41630
No known key found for this signature in database
GPG Key ID: 19F09A0FB865CBD8

View File

@ -397,7 +397,7 @@ int seccomp_enable_strict_filter(void){
ALLOW_RULE (bind); ALLOW_RULE (bind);
ALLOW_RULE (brk); ALLOW_RULE (brk);
ALLOW_RULE (clock_getres); ALLOW_RULE (clock_getres);
ALLOW_RULE (clone); ALLOW_RULE (clone); /* TODO: investigate */
ALLOW_RULE (close); ALLOW_RULE (close);
/* ALLOW_RULE (connect); */ /* ALLOW_RULE (connect); */
ALLOW_RULE (eventfd2); ALLOW_RULE (eventfd2);
@ -435,8 +435,8 @@ int seccomp_enable_strict_filter(void){
ALLOW_RULE (mprotect); ALLOW_RULE (mprotect);
ALLOW_RULE (mremap); ALLOW_RULE (mremap);
ALLOW_RULE (munmap); ALLOW_RULE (munmap);
ALLOW_RULE (open); /* (zathura needs to open for writing) TODO: avoid needing this somehow */ //ALLOW_RULE (open); /* (zathura needs to open for writing) TODO: avoid needing this somehow */
ALLOW_RULE (openat); //ALLOW_RULE (openat);
ALLOW_RULE (pipe); ALLOW_RULE (pipe);
ALLOW_RULE (poll); ALLOW_RULE (poll);
ALLOW_RULE (pwrite64); /* TODO: build detailed filter */ ALLOW_RULE (pwrite64); /* TODO: build detailed filter */
@ -493,6 +493,33 @@ int seccomp_enable_strict_filter(void){
goto out; goto out;
/* special restrictions for open, prevent opening files for writing */
if (seccomp_rule_add (ctx, SCMP_ACT_ALLOW, SCMP_SYS(open), 1,
SCMP_CMP(1, SCMP_CMP_MASKED_EQ, O_WRONLY | O_RDWR, 0)) < 0)
goto out;
if (seccomp_rule_add (ctx, SCMP_ACT_ERRNO (EACCES), SCMP_SYS(open), 1,
SCMP_CMP(1, SCMP_CMP_MASKED_EQ, O_WRONLY, O_WRONLY)) < 0)
goto out;
if (seccomp_rule_add (ctx, SCMP_ACT_ERRNO (EACCES), SCMP_SYS(open), 1,
SCMP_CMP(1, SCMP_CMP_MASKED_EQ, O_RDWR, O_RDWR)) < 0)
goto out;
/* special restrictions for openat, prevent opening files for writing */
if (seccomp_rule_add (ctx, SCMP_ACT_ALLOW, SCMP_SYS(openat), 1,
SCMP_CMP(1, SCMP_CMP_MASKED_EQ, O_WRONLY | O_RDWR, 0)) < 0)
goto out;
if (seccomp_rule_add (ctx, SCMP_ACT_ERRNO (EACCES), SCMP_SYS(openat), 1,
SCMP_CMP(1, SCMP_CMP_MASKED_EQ, O_WRONLY, O_WRONLY)) < 0)
goto out;
if (seccomp_rule_add (ctx, SCMP_ACT_ERRNO (EACCES), SCMP_SYS(openat), 1,
SCMP_CMP(1, SCMP_CMP_MASKED_EQ, O_RDWR, O_RDWR)) < 0)
goto out;
/* allowed for debugging: */ /* allowed for debugging: */
/* ALLOW_RULE (prctl); */ /* ALLOW_RULE (prctl); */