OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef SANDBOX_LINUX_BPF_DSL_POLICY_COMPILER_H_ | 5 #ifndef SANDBOX_LINUX_BPF_DSL_POLICY_COMPILER_H_ |
6 #define SANDBOX_LINUX_BPF_DSL_POLICY_COMPILER_H_ | 6 #define SANDBOX_LINUX_BPF_DSL_POLICY_COMPILER_H_ |
7 | 7 |
8 #include <stdint.h> | 8 #include <stdint.h> |
9 | 9 |
10 #include <map> | |
11 #include <set> | |
12 #include <vector> | 10 #include <vector> |
13 | 11 |
14 #include "base/macros.h" | 12 #include "base/macros.h" |
15 #include "base/memory/scoped_ptr.h" | 13 #include "base/memory/scoped_ptr.h" |
16 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h" | 14 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h" |
17 #include "sandbox/linux/bpf_dsl/codegen.h" | 15 #include "sandbox/linux/bpf_dsl/codegen.h" |
18 #include "sandbox/linux/bpf_dsl/errorcode.h" | |
19 #include "sandbox/linux/bpf_dsl/trap_registry.h" | 16 #include "sandbox/linux/bpf_dsl/trap_registry.h" |
20 #include "sandbox/sandbox_export.h" | 17 #include "sandbox/sandbox_export.h" |
21 | 18 |
22 namespace sandbox { | 19 namespace sandbox { |
23 namespace bpf_dsl { | 20 namespace bpf_dsl { |
24 class Policy; | 21 class Policy; |
25 | 22 |
26 // PolicyCompiler implements the bpf_dsl compiler, allowing users to | 23 // PolicyCompiler implements the bpf_dsl compiler, allowing users to |
27 // transform bpf_dsl policies into BPF programs to be executed by the | 24 // transform bpf_dsl policies into BPF programs to be executed by the |
28 // Linux kernel. | 25 // Linux kernel. |
(...skipping 11 matching lines...) Expand all Loading... |
40 // DangerousSetEscapePC sets the "escape PC" that is allowed to issue any | 37 // DangerousSetEscapePC sets the "escape PC" that is allowed to issue any |
41 // system calls, regardless of policy. | 38 // system calls, regardless of policy. |
42 void DangerousSetEscapePC(uint64_t escapepc); | 39 void DangerousSetEscapePC(uint64_t escapepc); |
43 | 40 |
44 // SetPanicFunc sets the callback function used for handling faulty | 41 // SetPanicFunc sets the callback function used for handling faulty |
45 // system call conditions. The default behavior is to immediately kill | 42 // system call conditions. The default behavior is to immediately kill |
46 // the process. | 43 // the process. |
47 // TODO(mdempsky): Move this into Policy? | 44 // TODO(mdempsky): Move this into Policy? |
48 void SetPanicFunc(PanicFunc panic_func); | 45 void SetPanicFunc(PanicFunc panic_func); |
49 | 46 |
50 // Error returns an ErrorCode to indicate the system call should fail with | |
51 // the specified error number. | |
52 ErrorCode Error(int err); | |
53 | |
54 // Trap returns an ErrorCode to indicate the system call should | |
55 // instead invoke a trap handler. | |
56 ErrorCode Trap(TrapRegistry::TrapFnc fnc, const void* aux, bool safe); | |
57 | |
58 // UnsafeTraps require some syscalls to always be allowed. | 47 // UnsafeTraps require some syscalls to always be allowed. |
59 // This helper function returns true for these calls. | 48 // This helper function returns true for these calls. |
60 static bool IsRequiredForUnsafeTrap(int sysno); | 49 static bool IsRequiredForUnsafeTrap(int sysno); |
61 | 50 |
62 // We can also use ErrorCode to request evaluation of a conditional | 51 // Functions below are meant for use within bpf_dsl itself. |
63 // statement based on inspection of system call parameters. | 52 |
64 // This method wrap an ErrorCode object around the conditional statement. | 53 // Return returns a CodeGen::Node that returns the specified seccomp |
| 54 // return value. |
| 55 CodeGen::Node Return(uint32_t ret); |
| 56 |
| 57 // Trap returns a CodeGen::Node to indicate the system call should |
| 58 // instead invoke a trap handler. |
| 59 CodeGen::Node Trap(TrapRegistry::TrapFnc fnc, const void* aux, bool safe); |
| 60 |
| 61 // MaskedEqual returns a CodeGen::Node that represents a conditional branch. |
65 // Argument "argno" (1..6) will be bitwise-AND'd with "mask" and compared | 62 // Argument "argno" (1..6) will be bitwise-AND'd with "mask" and compared |
66 // to "value"; if equal, then "passed" will be returned, otherwise "failed". | 63 // to "value"; if equal, then "passed" will be executed, otherwise "failed". |
67 // If "is32bit" is set, the argument must in the range of 0x0..(1u << 32 - 1) | 64 // If "width" is 4, the argument must in the range of 0x0..(1u << 32 - 1) |
68 // If it is outside this range, the sandbox treats the system call just | 65 // If it is outside this range, the sandbox treats the system call just |
69 // the same as any other ABI violation (i.e. it aborts with an error | 66 // the same as any other ABI violation (i.e., it panics). |
70 // message). | 67 CodeGen::Node MaskedEqual(int argno, |
71 ErrorCode CondMaskedEqual(int argno, | 68 size_t width, |
72 ErrorCode::ArgType is_32bit, | |
73 uint64_t mask, | 69 uint64_t mask, |
74 uint64_t value, | 70 uint64_t value, |
75 const ErrorCode& passed, | 71 CodeGen::Node passed, |
76 const ErrorCode& failed); | 72 CodeGen::Node failed); |
77 | |
78 // Returns the fatal ErrorCode that is used to indicate that somebody | |
79 // attempted to pass a 64bit value in a 32bit system call argument. | |
80 // This method is primarily needed for testing purposes. | |
81 ErrorCode Unexpected64bitArgument(); | |
82 | 73 |
83 private: | 74 private: |
84 struct Range; | 75 struct Range; |
85 typedef std::vector<Range> Ranges; | 76 typedef std::vector<Range> Ranges; |
86 typedef std::set<ErrorCode, struct ErrorCode::LessThan> Conds; | |
87 | 77 |
88 // Used by CondExpressionHalf to track which half of the argument it's | 78 // Used by MaskedEqualHalf to track which half of the argument it's |
89 // emitting instructions for. | 79 // emitting instructions for. |
90 enum ArgHalf { | 80 enum class ArgHalf { |
91 LowerHalf, | 81 LOWER, |
92 UpperHalf, | 82 UPPER, |
93 }; | 83 }; |
94 | 84 |
95 // Compile the configured policy into a complete instruction sequence. | 85 // Compile the configured policy into a complete instruction sequence. |
96 CodeGen::Node AssemblePolicy(); | 86 CodeGen::Node AssemblePolicy(); |
97 | 87 |
98 // Return an instruction sequence that checks the | 88 // Return an instruction sequence that checks the |
99 // arch_seccomp_data's "arch" field is valid, and then passes | 89 // arch_seccomp_data's "arch" field is valid, and then passes |
100 // control to |passed| if so. | 90 // control to |passed| if so. |
101 CodeGen::Node CheckArch(CodeGen::Node passed); | 91 CodeGen::Node CheckArch(CodeGen::Node passed); |
102 | 92 |
103 // If |has_unsafe_traps_| is true, returns an instruction sequence | 93 // If |has_unsafe_traps_| is true, returns an instruction sequence |
104 // that allows all system calls from |escapepc_|, and otherwise | 94 // that allows all system calls from |escapepc_|, and otherwise |
105 // passes control to |rest|. Otherwise, simply returns |rest|. | 95 // passes control to |rest|. Otherwise, simply returns |rest|. |
106 CodeGen::Node MaybeAddEscapeHatch(CodeGen::Node rest); | 96 CodeGen::Node MaybeAddEscapeHatch(CodeGen::Node rest); |
107 | 97 |
108 // Return an instruction sequence that loads and checks the system | 98 // Return an instruction sequence that loads and checks the system |
109 // call number, performs a binary search, and then dispatches to an | 99 // call number, performs a binary search, and then dispatches to an |
110 // appropriate instruction sequence compiled from the current | 100 // appropriate instruction sequence compiled from the current |
111 // policy. | 101 // policy. |
112 CodeGen::Node DispatchSyscall(); | 102 CodeGen::Node DispatchSyscall(); |
113 | 103 |
114 // Return an instruction sequence that checks the system call number | 104 // Return an instruction sequence that checks the system call number |
115 // (expected to be loaded in register A) and if valid, passes | 105 // (expected to be loaded in register A) and if valid, passes |
116 // control to |passed| (with register A still valid). | 106 // control to |passed| (with register A still valid). |
117 CodeGen::Node CheckSyscallNumber(CodeGen::Node passed); | 107 CodeGen::Node CheckSyscallNumber(CodeGen::Node passed); |
118 | 108 |
119 // Finds all the ranges of system calls that need to be handled. Ranges are | 109 // Finds all the ranges of system calls that need to be handled. Ranges are |
120 // sorted in ascending order of system call numbers. There are no gaps in the | 110 // sorted in ascending order of system call numbers. There are no gaps in the |
121 // ranges. System calls with identical ErrorCodes are coalesced into a single | 111 // ranges. System calls with identical CodeGen::Nodes are coalesced into a |
| 112 // single |
122 // range. | 113 // range. |
123 void FindRanges(Ranges* ranges); | 114 void FindRanges(Ranges* ranges); |
124 | 115 |
125 // Returns a BPF program snippet that implements a jump table for the | 116 // Returns a BPF program snippet that implements a jump table for the |
126 // given range of system call numbers. This function runs recursively. | 117 // given range of system call numbers. This function runs recursively. |
127 CodeGen::Node AssembleJumpTable(Ranges::const_iterator start, | 118 CodeGen::Node AssembleJumpTable(Ranges::const_iterator start, |
128 Ranges::const_iterator stop); | 119 Ranges::const_iterator stop); |
129 | 120 |
130 // CompileResult compiles an individual result expression into a | 121 // CompileResult compiles an individual result expression into a |
131 // CodeGen node. | 122 // CodeGen node. |
132 CodeGen::Node CompileResult(const ResultExpr& res); | 123 CodeGen::Node CompileResult(const ResultExpr& res); |
133 | 124 |
134 // Returns a BPF program snippet that makes the BPF filter program exit | |
135 // with the given ErrorCode "err". N.B. the ErrorCode may very well be a | |
136 // conditional expression; if so, this function will recursively call | |
137 // CondExpression() and possibly RetExpression() to build a complex set of | |
138 // instructions. | |
139 CodeGen::Node RetExpression(const ErrorCode& err); | |
140 | |
141 // Returns a BPF program that evaluates the conditional expression in | |
142 // "cond" and returns the appropriate value from the BPF filter program. | |
143 // This function recursively calls RetExpression(); it should only ever be | |
144 // called from RetExpression(). | |
145 CodeGen::Node CondExpression(const ErrorCode& cond); | |
146 | |
147 // Returns a BPF program that evaluates half of a conditional expression; | 125 // Returns a BPF program that evaluates half of a conditional expression; |
148 // it should only ever be called from CondExpression(). | 126 // it should only ever be called from CondExpression(). |
149 CodeGen::Node CondExpressionHalf(const ErrorCode& cond, | 127 CodeGen::Node MaskedEqualHalf(int argno, |
150 ArgHalf half, | 128 size_t width, |
151 CodeGen::Node passed, | 129 uint64_t full_mask, |
152 CodeGen::Node failed); | 130 uint64_t full_value, |
| 131 ArgHalf half, |
| 132 CodeGen::Node passed, |
| 133 CodeGen::Node failed); |
| 134 |
| 135 // Returns the fatal CodeGen::Node that is used to indicate that somebody |
| 136 // attempted to pass a 64bit value in a 32bit system call argument. |
| 137 CodeGen::Node Unexpected64bitArgument(); |
153 | 138 |
154 const Policy* policy_; | 139 const Policy* policy_; |
155 TrapRegistry* registry_; | 140 TrapRegistry* registry_; |
156 uint64_t escapepc_; | 141 uint64_t escapepc_; |
157 PanicFunc panic_func_; | 142 PanicFunc panic_func_; |
158 | 143 |
159 Conds conds_; | |
160 CodeGen gen_; | 144 CodeGen gen_; |
161 bool has_unsafe_traps_; | 145 bool has_unsafe_traps_; |
162 | 146 |
163 DISALLOW_COPY_AND_ASSIGN(PolicyCompiler); | 147 DISALLOW_COPY_AND_ASSIGN(PolicyCompiler); |
164 }; | 148 }; |
165 | 149 |
166 } // namespace bpf_dsl | 150 } // namespace bpf_dsl |
167 } // namespace sandbox | 151 } // namespace sandbox |
168 | 152 |
169 #endif // SANDBOX_LINUX_BPF_DSL_POLICY_COMPILER_H_ | 153 #endif // SANDBOX_LINUX_BPF_DSL_POLICY_COMPILER_H_ |
OLD | NEW |