mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
synced 2025-01-07 22:42:04 +00:00
seccomp: Allow arch code to provide seccomp_data
populate_seccomp_data is expensive: it works by inspecting task_pt_regs and various other bits to piece together all the information, and it's does so in multiple partially redundant steps. Arch-specific code in the syscall entry path can do much better. Admittedly this adds a bit of additional room for error, but the speedup should be worth it. Signed-off-by: Andy Lutomirski <luto@amacapital.net> Signed-off-by: Kees Cook <keescook@chromium.org>
This commit is contained in:
parent
13aa72f0fd
commit
d39bd00dea
@ -39,7 +39,7 @@ static inline int secure_computing(void)
|
|||||||
#define SECCOMP_PHASE1_OK 0
|
#define SECCOMP_PHASE1_OK 0
|
||||||
#define SECCOMP_PHASE1_SKIP 1
|
#define SECCOMP_PHASE1_SKIP 1
|
||||||
|
|
||||||
extern u32 seccomp_phase1(void);
|
extern u32 seccomp_phase1(struct seccomp_data *sd);
|
||||||
int seccomp_phase2(u32 phase1_result);
|
int seccomp_phase2(u32 phase1_result);
|
||||||
#else
|
#else
|
||||||
extern void secure_computing_strict(int this_syscall);
|
extern void secure_computing_strict(int this_syscall);
|
||||||
|
@ -173,10 +173,10 @@ static int seccomp_check_filter(struct sock_filter *filter, unsigned int flen)
|
|||||||
*
|
*
|
||||||
* Returns valid seccomp BPF response codes.
|
* Returns valid seccomp BPF response codes.
|
||||||
*/
|
*/
|
||||||
static u32 seccomp_run_filters(void)
|
static u32 seccomp_run_filters(struct seccomp_data *sd)
|
||||||
{
|
{
|
||||||
struct seccomp_filter *f = ACCESS_ONCE(current->seccomp.filter);
|
struct seccomp_filter *f = ACCESS_ONCE(current->seccomp.filter);
|
||||||
struct seccomp_data sd;
|
struct seccomp_data sd_local;
|
||||||
u32 ret = SECCOMP_RET_ALLOW;
|
u32 ret = SECCOMP_RET_ALLOW;
|
||||||
|
|
||||||
/* Ensure unexpected behavior doesn't result in failing open. */
|
/* Ensure unexpected behavior doesn't result in failing open. */
|
||||||
@ -186,14 +186,17 @@ static u32 seccomp_run_filters(void)
|
|||||||
/* Make sure cross-thread synced filter points somewhere sane. */
|
/* Make sure cross-thread synced filter points somewhere sane. */
|
||||||
smp_read_barrier_depends();
|
smp_read_barrier_depends();
|
||||||
|
|
||||||
populate_seccomp_data(&sd);
|
if (!sd) {
|
||||||
|
populate_seccomp_data(&sd_local);
|
||||||
|
sd = &sd_local;
|
||||||
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* All filters in the list are evaluated and the lowest BPF return
|
* All filters in the list are evaluated and the lowest BPF return
|
||||||
* value always takes priority (ignoring the DATA).
|
* value always takes priority (ignoring the DATA).
|
||||||
*/
|
*/
|
||||||
for (; f; f = f->prev) {
|
for (; f; f = f->prev) {
|
||||||
u32 cur_ret = BPF_PROG_RUN(f->prog, (void *)&sd);
|
u32 cur_ret = BPF_PROG_RUN(f->prog, (void *)sd);
|
||||||
|
|
||||||
if ((cur_ret & SECCOMP_RET_ACTION) < (ret & SECCOMP_RET_ACTION))
|
if ((cur_ret & SECCOMP_RET_ACTION) < (ret & SECCOMP_RET_ACTION))
|
||||||
ret = cur_ret;
|
ret = cur_ret;
|
||||||
@ -599,7 +602,7 @@ void secure_computing_strict(int this_syscall)
|
|||||||
#else
|
#else
|
||||||
int __secure_computing(void)
|
int __secure_computing(void)
|
||||||
{
|
{
|
||||||
u32 phase1_result = seccomp_phase1();
|
u32 phase1_result = seccomp_phase1(NULL);
|
||||||
|
|
||||||
if (likely(phase1_result == SECCOMP_PHASE1_OK))
|
if (likely(phase1_result == SECCOMP_PHASE1_OK))
|
||||||
return 0;
|
return 0;
|
||||||
@ -610,7 +613,7 @@ int __secure_computing(void)
|
|||||||
}
|
}
|
||||||
|
|
||||||
#ifdef CONFIG_SECCOMP_FILTER
|
#ifdef CONFIG_SECCOMP_FILTER
|
||||||
static u32 __seccomp_phase1_filter(int this_syscall, struct pt_regs *regs)
|
static u32 __seccomp_phase1_filter(int this_syscall, struct seccomp_data *sd)
|
||||||
{
|
{
|
||||||
u32 filter_ret, action;
|
u32 filter_ret, action;
|
||||||
int data;
|
int data;
|
||||||
@ -621,20 +624,20 @@ static u32 __seccomp_phase1_filter(int this_syscall, struct pt_regs *regs)
|
|||||||
*/
|
*/
|
||||||
rmb();
|
rmb();
|
||||||
|
|
||||||
filter_ret = seccomp_run_filters();
|
filter_ret = seccomp_run_filters(sd);
|
||||||
data = filter_ret & SECCOMP_RET_DATA;
|
data = filter_ret & SECCOMP_RET_DATA;
|
||||||
action = filter_ret & SECCOMP_RET_ACTION;
|
action = filter_ret & SECCOMP_RET_ACTION;
|
||||||
|
|
||||||
switch (action) {
|
switch (action) {
|
||||||
case SECCOMP_RET_ERRNO:
|
case SECCOMP_RET_ERRNO:
|
||||||
/* Set the low-order 16-bits as a errno. */
|
/* Set the low-order 16-bits as a errno. */
|
||||||
syscall_set_return_value(current, regs,
|
syscall_set_return_value(current, task_pt_regs(current),
|
||||||
-data, 0);
|
-data, 0);
|
||||||
goto skip;
|
goto skip;
|
||||||
|
|
||||||
case SECCOMP_RET_TRAP:
|
case SECCOMP_RET_TRAP:
|
||||||
/* Show the handler the original registers. */
|
/* Show the handler the original registers. */
|
||||||
syscall_rollback(current, regs);
|
syscall_rollback(current, task_pt_regs(current));
|
||||||
/* Let the filter pass back 16 bits of data. */
|
/* Let the filter pass back 16 bits of data. */
|
||||||
seccomp_send_sigsys(this_syscall, data);
|
seccomp_send_sigsys(this_syscall, data);
|
||||||
goto skip;
|
goto skip;
|
||||||
@ -661,11 +664,14 @@ static u32 __seccomp_phase1_filter(int this_syscall, struct pt_regs *regs)
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* seccomp_phase1() - run fast path seccomp checks on the current syscall
|
* seccomp_phase1() - run fast path seccomp checks on the current syscall
|
||||||
|
* @arg sd: The seccomp_data or NULL
|
||||||
*
|
*
|
||||||
* This only reads pt_regs via the syscall_xyz helpers. The only change
|
* This only reads pt_regs via the syscall_xyz helpers. The only change
|
||||||
* it will make to pt_regs is via syscall_set_return_value, and it will
|
* it will make to pt_regs is via syscall_set_return_value, and it will
|
||||||
* only do that if it returns SECCOMP_PHASE1_SKIP.
|
* only do that if it returns SECCOMP_PHASE1_SKIP.
|
||||||
*
|
*
|
||||||
|
* If sd is provided, it will not read pt_regs at all.
|
||||||
|
*
|
||||||
* It may also call do_exit or force a signal; these actions must be
|
* It may also call do_exit or force a signal; these actions must be
|
||||||
* safe.
|
* safe.
|
||||||
*
|
*
|
||||||
@ -679,11 +685,11 @@ static u32 __seccomp_phase1_filter(int this_syscall, struct pt_regs *regs)
|
|||||||
* If it returns anything else, then the return value should be passed
|
* If it returns anything else, then the return value should be passed
|
||||||
* to seccomp_phase2 from a context in which ptrace hooks are safe.
|
* to seccomp_phase2 from a context in which ptrace hooks are safe.
|
||||||
*/
|
*/
|
||||||
u32 seccomp_phase1(void)
|
u32 seccomp_phase1(struct seccomp_data *sd)
|
||||||
{
|
{
|
||||||
int mode = current->seccomp.mode;
|
int mode = current->seccomp.mode;
|
||||||
struct pt_regs *regs = task_pt_regs(current);
|
int this_syscall = sd ? sd->nr :
|
||||||
int this_syscall = syscall_get_nr(current, regs);
|
syscall_get_nr(current, task_pt_regs(current));
|
||||||
|
|
||||||
switch (mode) {
|
switch (mode) {
|
||||||
case SECCOMP_MODE_STRICT:
|
case SECCOMP_MODE_STRICT:
|
||||||
@ -691,7 +697,7 @@ u32 seccomp_phase1(void)
|
|||||||
return SECCOMP_PHASE1_OK;
|
return SECCOMP_PHASE1_OK;
|
||||||
#ifdef CONFIG_SECCOMP_FILTER
|
#ifdef CONFIG_SECCOMP_FILTER
|
||||||
case SECCOMP_MODE_FILTER:
|
case SECCOMP_MODE_FILTER:
|
||||||
return __seccomp_phase1_filter(this_syscall, regs);
|
return __seccomp_phase1_filter(this_syscall, sd);
|
||||||
#endif
|
#endif
|
||||||
default:
|
default:
|
||||||
BUG();
|
BUG();
|
||||||
|
Loading…
Reference in New Issue
Block a user