-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
seccomp: emulate safe privileged system calls #61
base: main
Are you sure you want to change the base?
Changes from 1 commit
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
/* Copyright © 2024 Arista Networks, Inc. All rights reserved. | ||
* | ||
* Use of this source code is governed by the MIT license that can be found | ||
* in the LICENSE file. | ||
*/ | ||
|
||
#ifndef ARCH_H_ | ||
# define ARCH_H_ | ||
|
||
# include "config.h" | ||
|
||
# define ARCH_STR_(x) #x | ||
# define ARCH_STR(x) ARCH_STR_(x) | ||
|
||
/* *INDENT-OFF* - formatters try to add spaces here */ | ||
# define ARCH_HEADER_BASE arch/ARCH | ||
/* *INDENT-ON* */ | ||
|
||
# include ARCH_STR(ARCH_HEADER_BASE/syscall.h) | ||
|
||
#endif /* !ARCH_H_ */ |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,130 @@ | ||
#!/bin/bash | ||
|
||
# This script generates the classic BPF program to intercept system calls | ||
# in x86 userspace. | ||
|
||
# From asm/unistd_64.h | ||
declare -A x86_64_syscalls=( | ||
["mknod"]="133" | ||
["mknodat"]="259" | ||
) | ||
|
||
# From asm/unistd_32.h | ||
declare -A i386_syscalls=( | ||
["mknod"]="14" | ||
["mknodat"]="297" | ||
) | ||
|
||
prelude=( | ||
# Check that we're running on x86_64 or i386 | ||
'BPF_STMT(BPF_LD | BPF_W | BPF_ABS, (offsetof(struct seccomp_data, arch)))' | ||
'BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, AUDIT_ARCH_I386, $(($i386_offset-2)), 0)' | ||
'BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, AUDIT_ARCH_X86_64, 1, 0)' | ||
'BPF_STMT(BPF_RET | BPF_K, SECCOMP_RET_KILL_PROCESS)' | ||
|
||
# The x32 ABI (not to be confused with the i386 ABI!) uses the | ||
# same system call numbers as x86_64, but set bit 30. Clear it so we share | ||
# the same table. | ||
'BPF_STMT(BPF_LD | BPF_W | BPF_ABS, (offsetof(struct seccomp_data, nr)))' | ||
'BPF_JUMP(BPF_JMP | BPF_JGE | BPF_K, X32_SYSCALL_BIT, 0, 1)' | ||
'BPF_STMT(BPF_ALU | BPF_SUB | BPF_K, X32_SYSCALL_BIT)' | ||
) | ||
|
||
syscall_jump=( | ||
'BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, $nr, 0, 1)' | ||
'BPF_STMT(BPF_RET + BPF_K, SECCOMP_RET_USER_NOTIF)' | ||
) | ||
|
||
i386_offset=$((${#prelude[@]} + ${#syscall_jump[@]}*${#x86_64_syscalls[@]} + 1)) | ||
|
||
# NOTE: indentation is done with tabs. Do not use spaces, do not remove tabs, | ||
# lest you break all HEREDOCs. | ||
|
||
gen_source() { | ||
cat <<-EOF | ||
/* THIS FILE WAS GENERATED BY arch/x86/gen-syscall.bash -- DO NOT EDIT */ | ||
|
||
#include <stddef.h> | ||
#include <linux/audit.h> | ||
#include <linux/bpf_common.h> | ||
#include <linux/filter.h> | ||
#include <linux/seccomp.h> | ||
|
||
/* For the x32 ABI, all system call numbers have bit 30 set */ | ||
#define X32_SYSCALL_BIT 0x40000000 | ||
|
||
const struct sock_filter syscall_filter[] = { | ||
EOF | ||
|
||
for stmt in "${prelude[@]}"; do | ||
eval "echo $'\t'\"$stmt\"," | ||
done | ||
|
||
for syscall in "${!x86_64_syscalls[@]}"; do | ||
nr=${x86_64_syscalls[$syscall]} | ||
for stmt in "${syscall_jump[@]}"; do | ||
eval "echo $'\t'\"$stmt\"," | ||
done | ||
done | ||
|
||
echo $'\t''BPF_STMT(BPF_RET | BPF_K, SECCOMP_RET_ALLOW),' | ||
echo $'\t''BPF_STMT(BPF_LD | BPF_W | BPF_ABS, (offsetof(struct seccomp_data, nr))),' | ||
|
||
for syscall in "${!i386_syscalls[@]}"; do | ||
nr=${i386_syscalls[$syscall]} | ||
for stmt in "${syscall_jump[@]}"; do | ||
eval "echo $'\t'\"$stmt\"," | ||
done | ||
done | ||
|
||
echo $'\t''BPF_STMT(BPF_RET | BPF_K, SECCOMP_RET_ALLOW),' | ||
|
||
cat <<-EOF | ||
}; | ||
|
||
const size_t syscall_filter_length = sizeof (syscall_filter) / sizeof (struct sock_filter); | ||
|
||
/* THIS FILE WAS GENERATED BY arch/x86/gen-syscall.bash -- DO NOT EDIT */ | ||
EOF | ||
} | ||
|
||
gen_header() { | ||
cat <<-EOF | ||
/* THIS FILE WAS GENERATED BY arch/x86/gen-syscall.bash -- DO NOT EDIT */ | ||
|
||
extern const struct sock_filter syscall_filter[]; | ||
extern const size_t syscall_filter_length; | ||
|
||
EOF | ||
|
||
for syscall in "${!x86_64_syscalls[@]}"; do | ||
echo "#define BST_NR_${syscall} ${x86_64_syscalls[$syscall]}" | ||
done | ||
|
||
for syscall in "${!i386_syscalls[@]}"; do | ||
echo "#define BST_NR_${syscall}_32 ${i386_syscalls[$syscall]}" | ||
done | ||
|
||
max=0 | ||
for syscall in "${!x86_64_syscalls[@]}"; do | ||
(( ${x86_64_syscalls[$syscall]} > max )) && max=${x86_64_syscalls[$syscall]} | ||
done | ||
|
||
max32=0 | ||
for syscall in "${!i386_syscalls[@]}"; do | ||
(( ${i386_syscalls[$syscall]} > max32 )) && max32=${i386_syscalls[$syscall]} | ||
done | ||
|
||
cat <<-EOF | ||
|
||
#define BST_SECCOMP_32 1 | ||
|
||
#define BST_NR_MAX $max | ||
#define BST_NR_MAX32 $max32 | ||
|
||
/* THIS FILE WAS GENERATED BY arch/x86/gen-syscall.bash -- DO NOT EDIT */ | ||
EOF | ||
} | ||
|
||
gen_source > arch/x86/syscall.c | ||
gen_header > arch/x86/syscall.h |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
/* THIS FILE WAS GENERATED BY arch/x86/gen-syscall.bash -- DO NOT EDIT */ | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Can we avoid checking this in, given we generate it, and you've gone to the trouble of not needing anything other than bash to do so? |
||
|
||
#include <stddef.h> | ||
#include <linux/audit.h> | ||
#include <linux/bpf_common.h> | ||
#include <linux/filter.h> | ||
#include <linux/seccomp.h> | ||
|
||
/* For the x32 ABI, all system call numbers have bit 30 set */ | ||
#define X32_SYSCALL_BIT 0x40000000 | ||
|
||
const struct sock_filter syscall_filter[] = { | ||
BPF_STMT(BPF_LD | BPF_W | BPF_ABS, (offsetof(struct seccomp_data, arch))), | ||
BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, AUDIT_ARCH_I386, 10, 0), | ||
BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, AUDIT_ARCH_X86_64, 1, 0), | ||
BPF_STMT(BPF_RET | BPF_K, SECCOMP_RET_KILL_PROCESS), | ||
BPF_STMT(BPF_LD | BPF_W | BPF_ABS, (offsetof(struct seccomp_data, nr))), | ||
BPF_JUMP(BPF_JMP | BPF_JGE | BPF_K, X32_SYSCALL_BIT, 0, 1), | ||
BPF_STMT(BPF_ALU | BPF_SUB | BPF_K, X32_SYSCALL_BIT), | ||
BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 133, 0, 1), | ||
BPF_STMT(BPF_RET + BPF_K, SECCOMP_RET_USER_NOTIF), | ||
BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 259, 0, 1), | ||
BPF_STMT(BPF_RET + BPF_K, SECCOMP_RET_USER_NOTIF), | ||
BPF_STMT(BPF_RET | BPF_K, SECCOMP_RET_ALLOW), | ||
BPF_STMT(BPF_LD | BPF_W | BPF_ABS, (offsetof(struct seccomp_data, nr))), | ||
BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 14, 0, 1), | ||
BPF_STMT(BPF_RET + BPF_K, SECCOMP_RET_USER_NOTIF), | ||
BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 297, 0, 1), | ||
BPF_STMT(BPF_RET + BPF_K, SECCOMP_RET_USER_NOTIF), | ||
BPF_STMT(BPF_RET | BPF_K, SECCOMP_RET_ALLOW), | ||
}; | ||
|
||
const size_t syscall_filter_length = sizeof (syscall_filter) / sizeof (struct sock_filter); | ||
|
||
/* THIS FILE WAS GENERATED BY arch/x86/gen-syscall.bash -- DO NOT EDIT */ |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
/* THIS FILE WAS GENERATED BY arch/x86/gen-syscall.bash -- DO NOT EDIT */ | ||
|
||
extern const struct sock_filter syscall_filter[]; | ||
extern const size_t syscall_filter_length; | ||
|
||
#define BST_NR_mknod 133 | ||
#define BST_NR_mknodat 259 | ||
#define BST_NR_mknod_32 14 | ||
#define BST_NR_mknodat_32 297 | ||
|
||
#define BST_SECCOMP_32 1 | ||
|
||
#define BST_NR_MAX 259 | ||
#define BST_NR_MAX32 297 | ||
|
||
/* THIS FILE WAS GENERATED BY arch/x86/gen-syscall.bash -- DO NOT EDIT */ |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
x86 |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,31 @@ | ||
/* Copyright © 2022 Arista Networks, Inc. All rights reserved. | ||
* | ||
* Use of this source code is governed by the MIT license that can be found | ||
* in the LICENSE file. | ||
*/ | ||
|
||
#include <fcntl.h> | ||
#include <stdio.h> | ||
#include <string.h> | ||
|
||
#include "proc.h" | ||
|
||
int proc_read_status(int procfd, struct proc_status *out) | ||
{ | ||
memset(out, 0, sizeof (*out)); | ||
|
||
int statusfd = openat(procfd, "status", O_RDONLY | O_CLOEXEC); | ||
if (statusfd == -1) { | ||
return -1; | ||
} | ||
|
||
FILE *f = fdopen(statusfd, "r"); | ||
|
||
char line[4096]; | ||
while (fgets(line, sizeof (line) - 1, f)) { | ||
sscanf(line, "Umask:\t%o\n", &out->umask); | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Pedantry - that assumes that sizeof out->umask/mode_t == sizeof int. It's probably true for anything we'll ever care abut, but consider using the address of a local int, and assigning it to out->umask and using the integer conversions instead. |
||
} | ||
|
||
fclose(f); | ||
return 0; | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not sure I love bash as the tool here, but hey, I guess it's better than pulling a templating engine into the bst build!