-
Notifications
You must be signed in to change notification settings - Fork 12
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
seccomp: add syscall emulation for safe syscalls, like mknod of /dev/…
…null devices.
- Loading branch information
Showing
14 changed files
with
791 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
/* Copyright © 2024 Arista Networks, Inc. All rights reserved. | ||
* | ||
* Use of this source code is governed by the MIT license that can be found | ||
* in the LICENSE file. | ||
*/ | ||
|
||
#ifndef ARCH_H_ | ||
# define ARCH_H_ | ||
|
||
# include "config.h" | ||
|
||
# define ARCH_STR_(x) #x | ||
# define ARCH_STR(x) ARCH_STR_(x) | ||
|
||
/* *INDENT-OFF* - formatters try to add spaces here */ | ||
# define ARCH_HEADER_BASE arch/ARCH | ||
/* *INDENT-ON* */ | ||
|
||
# include ARCH_STR(ARCH_HEADER_BASE/syscall.h) | ||
|
||
#endif /* !ARCH_H_ */ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,130 @@ | ||
#!/bin/bash | ||
|
||
# This script generates the classic BPF program to intercept system calls | ||
# in x86 userspace. | ||
|
||
# From asm/unistd_64.h | ||
declare -A x86_64_syscalls=( | ||
["mknod"]="133" | ||
["mknodat"]="259" | ||
) | ||
|
||
# From asm/unistd_32.h | ||
declare -A i386_syscalls=( | ||
["mknod"]="14" | ||
["mknodat"]="297" | ||
) | ||
|
||
prelude=( | ||
# Check that we're running on x86_64 or i386 | ||
'BPF_STMT(BPF_LD | BPF_W | BPF_ABS, (offsetof(struct seccomp_data, arch)))' | ||
'BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, AUDIT_ARCH_I386, $(($i386_offset-2)), 0)' | ||
'BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, AUDIT_ARCH_X86_64, 1, 0)' | ||
'BPF_STMT(BPF_RET | BPF_K, SECCOMP_RET_KILL_PROCESS)' | ||
|
||
# The x32 ABI (not to be confused with the i386 ABI!) uses the | ||
# same system call numbers as x86_64, but set bit 30. Clear it so we share | ||
# the same table. | ||
'BPF_STMT(BPF_LD | BPF_W | BPF_ABS, (offsetof(struct seccomp_data, nr)))' | ||
'BPF_JUMP(BPF_JMP | BPF_JGE | BPF_K, X32_SYSCALL_BIT, 0, 1)' | ||
'BPF_STMT(BPF_ALU | BPF_SUB | BPF_K, X32_SYSCALL_BIT)' | ||
) | ||
|
||
syscall_jump=( | ||
'BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, $nr, 0, 1)' | ||
'BPF_STMT(BPF_RET + BPF_K, SECCOMP_RET_USER_NOTIF)' | ||
) | ||
|
||
i386_offset=$((${#prelude[@]} + ${#syscall_jump[@]}*${#x86_64_syscalls[@]} + 1)) | ||
|
||
# NOTE: indentation is done with tabs. Do not use spaces, do not remove tabs, | ||
# lest you break all HEREDOCs. | ||
|
||
gen_source() { | ||
cat <<-EOF | ||
/* THIS FILE WAS GENERATED BY arch/x86/gen-syscall.bash -- DO NOT EDIT */ | ||
#include <stddef.h> | ||
#include <linux/audit.h> | ||
#include <linux/bpf_common.h> | ||
#include <linux/filter.h> | ||
#include <linux/seccomp.h> | ||
/* For the x32 ABI, all system call numbers have bit 30 set */ | ||
#define X32_SYSCALL_BIT 0x40000000 | ||
const struct sock_filter syscall_filter[] = { | ||
EOF | ||
|
||
for stmt in "${prelude[@]}"; do | ||
eval "echo $'\t'\"$stmt\"," | ||
done | ||
|
||
for syscall in "${!x86_64_syscalls[@]}"; do | ||
nr=${x86_64_syscalls[$syscall]} | ||
for stmt in "${syscall_jump[@]}"; do | ||
eval "echo $'\t'\"$stmt\"," | ||
done | ||
done | ||
|
||
echo $'\t''BPF_STMT(BPF_RET | BPF_K, SECCOMP_RET_ALLOW),' | ||
echo $'\t''BPF_STMT(BPF_LD | BPF_W | BPF_ABS, (offsetof(struct seccomp_data, nr))),' | ||
|
||
for syscall in "${!i386_syscalls[@]}"; do | ||
nr=${i386_syscalls[$syscall]} | ||
for stmt in "${syscall_jump[@]}"; do | ||
eval "echo $'\t'\"$stmt\"," | ||
done | ||
done | ||
|
||
echo $'\t''BPF_STMT(BPF_RET | BPF_K, SECCOMP_RET_ALLOW),' | ||
|
||
cat <<-EOF | ||
}; | ||
const size_t syscall_filter_length = sizeof (syscall_filter) / sizeof (struct sock_filter); | ||
/* THIS FILE WAS GENERATED BY arch/x86/gen-syscall.bash -- DO NOT EDIT */ | ||
EOF | ||
} | ||
|
||
gen_header() { | ||
cat <<-EOF | ||
/* THIS FILE WAS GENERATED BY arch/x86/gen-syscall.bash -- DO NOT EDIT */ | ||
extern const struct sock_filter syscall_filter[]; | ||
extern const size_t syscall_filter_length; | ||
EOF | ||
|
||
for syscall in "${!x86_64_syscalls[@]}"; do | ||
echo "#define BST_NR_${syscall} ${x86_64_syscalls[$syscall]}" | ||
done | ||
|
||
for syscall in "${!i386_syscalls[@]}"; do | ||
echo "#define BST_NR_${syscall}_32 ${i386_syscalls[$syscall]}" | ||
done | ||
|
||
max=0 | ||
for syscall in "${!x86_64_syscalls[@]}"; do | ||
(( ${x86_64_syscalls[$syscall]} > max )) && max=${x86_64_syscalls[$syscall]} | ||
done | ||
|
||
max32=0 | ||
for syscall in "${!i386_syscalls[@]}"; do | ||
(( ${i386_syscalls[$syscall]} > max32 )) && max32=${i386_syscalls[$syscall]} | ||
done | ||
|
||
cat <<-EOF | ||
#define BST_SECCOMP_32 1 | ||
#define BST_NR_MAX $max | ||
#define BST_NR_MAX32 $max32 | ||
/* THIS FILE WAS GENERATED BY arch/x86/gen-syscall.bash -- DO NOT EDIT */ | ||
EOF | ||
} | ||
|
||
gen_source > arch/x86/syscall.c | ||
gen_header > arch/x86/syscall.h |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
/* THIS FILE WAS GENERATED BY arch/x86/gen-syscall.bash -- DO NOT EDIT */ | ||
|
||
#include <stddef.h> | ||
#include <linux/audit.h> | ||
#include <linux/bpf_common.h> | ||
#include <linux/filter.h> | ||
#include <linux/seccomp.h> | ||
|
||
/* For the x32 ABI, all system call numbers have bit 30 set */ | ||
#define X32_SYSCALL_BIT 0x40000000 | ||
|
||
const struct sock_filter syscall_filter[] = { | ||
BPF_STMT(BPF_LD | BPF_W | BPF_ABS, (offsetof(struct seccomp_data, arch))), | ||
BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, AUDIT_ARCH_I386, 10, 0), | ||
BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, AUDIT_ARCH_X86_64, 1, 0), | ||
BPF_STMT(BPF_RET | BPF_K, SECCOMP_RET_KILL_PROCESS), | ||
BPF_STMT(BPF_LD | BPF_W | BPF_ABS, (offsetof(struct seccomp_data, nr))), | ||
BPF_JUMP(BPF_JMP | BPF_JGE | BPF_K, X32_SYSCALL_BIT, 0, 1), | ||
BPF_STMT(BPF_ALU | BPF_SUB | BPF_K, X32_SYSCALL_BIT), | ||
BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 133, 0, 1), | ||
BPF_STMT(BPF_RET + BPF_K, SECCOMP_RET_USER_NOTIF), | ||
BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 259, 0, 1), | ||
BPF_STMT(BPF_RET + BPF_K, SECCOMP_RET_USER_NOTIF), | ||
BPF_STMT(BPF_RET | BPF_K, SECCOMP_RET_ALLOW), | ||
BPF_STMT(BPF_LD | BPF_W | BPF_ABS, (offsetof(struct seccomp_data, nr))), | ||
BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 14, 0, 1), | ||
BPF_STMT(BPF_RET + BPF_K, SECCOMP_RET_USER_NOTIF), | ||
BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 297, 0, 1), | ||
BPF_STMT(BPF_RET + BPF_K, SECCOMP_RET_USER_NOTIF), | ||
BPF_STMT(BPF_RET | BPF_K, SECCOMP_RET_ALLOW), | ||
}; | ||
|
||
const size_t syscall_filter_length = sizeof (syscall_filter) / sizeof (struct sock_filter); | ||
|
||
/* THIS FILE WAS GENERATED BY arch/x86/gen-syscall.bash -- DO NOT EDIT */ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
/* THIS FILE WAS GENERATED BY arch/x86/gen-syscall.bash -- DO NOT EDIT */ | ||
|
||
extern const struct sock_filter syscall_filter[]; | ||
extern const size_t syscall_filter_length; | ||
|
||
#define BST_NR_mknod 133 | ||
#define BST_NR_mknodat 259 | ||
#define BST_NR_mknod_32 14 | ||
#define BST_NR_mknodat_32 297 | ||
|
||
#define BST_SECCOMP_32 1 | ||
|
||
#define BST_NR_MAX 259 | ||
#define BST_NR_MAX32 297 | ||
|
||
/* THIS FILE WAS GENERATED BY arch/x86/gen-syscall.bash -- DO NOT EDIT */ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
x86 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,31 @@ | ||
/* Copyright © 2022 Arista Networks, Inc. All rights reserved. | ||
* | ||
* Use of this source code is governed by the MIT license that can be found | ||
* in the LICENSE file. | ||
*/ | ||
|
||
#include <fcntl.h> | ||
#include <stdio.h> | ||
#include <string.h> | ||
|
||
#include "proc.h" | ||
|
||
int proc_read_status(int procfd, struct proc_status *out) | ||
{ | ||
memset(out, 0, sizeof (*out)); | ||
|
||
int statusfd = openat(procfd, "status", O_RDONLY | O_CLOEXEC); | ||
if (statusfd == -1) { | ||
return -1; | ||
} | ||
|
||
FILE *f = fdopen(statusfd, "r"); | ||
|
||
char line[4096]; | ||
while (fgets(line, sizeof (line) - 1, f)) { | ||
sscanf(line, "Umask:\t%o\n", &out->umask); | ||
} | ||
|
||
fclose(f); | ||
return 0; | ||
} |
Oops, something went wrong.