| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef SANDBOX_LINUX_BPF_DSL_POLICY_COMPILER_H_ | 5 #ifndef SANDBOX_LINUX_BPF_DSL_POLICY_COMPILER_H_ |
| 6 #define SANDBOX_LINUX_BPF_DSL_POLICY_COMPILER_H_ | 6 #define SANDBOX_LINUX_BPF_DSL_POLICY_COMPILER_H_ |
| 7 | 7 |
| 8 #include <stdint.h> | 8 #include <stdint.h> |
| 9 | 9 |
| 10 #include <map> | |
| 11 #include <set> | |
| 12 #include <vector> | 10 #include <vector> |
| 13 | 11 |
| 14 #include "base/macros.h" | 12 #include "base/macros.h" |
| 15 #include "base/memory/scoped_ptr.h" | 13 #include "base/memory/scoped_ptr.h" |
| 16 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h" | 14 #include "sandbox/linux/bpf_dsl/bpf_dsl_forward.h" |
| 17 #include "sandbox/linux/bpf_dsl/codegen.h" | 15 #include "sandbox/linux/bpf_dsl/codegen.h" |
| 18 #include "sandbox/linux/bpf_dsl/errorcode.h" | |
| 19 #include "sandbox/linux/bpf_dsl/trap_registry.h" | 16 #include "sandbox/linux/bpf_dsl/trap_registry.h" |
| 20 #include "sandbox/sandbox_export.h" | 17 #include "sandbox/sandbox_export.h" |
| 21 | 18 |
| 22 namespace sandbox { | 19 namespace sandbox { |
| 23 namespace bpf_dsl { | 20 namespace bpf_dsl { |
| 24 class Policy; | 21 class Policy; |
| 25 | 22 |
| 26 // PolicyCompiler implements the bpf_dsl compiler, allowing users to | 23 // PolicyCompiler implements the bpf_dsl compiler, allowing users to |
| 27 // transform bpf_dsl policies into BPF programs to be executed by the | 24 // transform bpf_dsl policies into BPF programs to be executed by the |
| 28 // Linux kernel. | 25 // Linux kernel. |
| (...skipping 11 matching lines...) Expand all Loading... |
| 40 // DangerousSetEscapePC sets the "escape PC" that is allowed to issue any | 37 // DangerousSetEscapePC sets the "escape PC" that is allowed to issue any |
| 41 // system calls, regardless of policy. | 38 // system calls, regardless of policy. |
| 42 void DangerousSetEscapePC(uint64_t escapepc); | 39 void DangerousSetEscapePC(uint64_t escapepc); |
| 43 | 40 |
| 44 // SetPanicFunc sets the callback function used for handling faulty | 41 // SetPanicFunc sets the callback function used for handling faulty |
| 45 // system call conditions. The default behavior is to immediately kill | 42 // system call conditions. The default behavior is to immediately kill |
| 46 // the process. | 43 // the process. |
| 47 // TODO(mdempsky): Move this into Policy? | 44 // TODO(mdempsky): Move this into Policy? |
| 48 void SetPanicFunc(PanicFunc panic_func); | 45 void SetPanicFunc(PanicFunc panic_func); |
| 49 | 46 |
| 50 // Error returns an ErrorCode to indicate the system call should fail with | |
| 51 // the specified error number. | |
| 52 ErrorCode Error(int err); | |
| 53 | |
| 54 // Trap returns an ErrorCode to indicate the system call should | |
| 55 // instead invoke a trap handler. | |
| 56 ErrorCode Trap(TrapRegistry::TrapFnc fnc, const void* aux, bool safe); | |
| 57 | |
| 58 // UnsafeTraps require some syscalls to always be allowed. | 47 // UnsafeTraps require some syscalls to always be allowed. |
| 59 // This helper function returns true for these calls. | 48 // This helper function returns true for these calls. |
| 60 static bool IsRequiredForUnsafeTrap(int sysno); | 49 static bool IsRequiredForUnsafeTrap(int sysno); |
| 61 | 50 |
| 62 // We can also use ErrorCode to request evaluation of a conditional | 51 // Functions below are meant for use within bpf_dsl itself. |
| 63 // statement based on inspection of system call parameters. | 52 |
| 64 // This method wrap an ErrorCode object around the conditional statement. | 53 // Return returns a CodeGen::Node that returns the specified seccomp |
| 54 // return value. |
| 55 CodeGen::Node Return(uint32_t ret); |
| 56 |
| 57 // Trap returns a CodeGen::Node to indicate the system call should |
| 58 // instead invoke a trap handler. |
| 59 CodeGen::Node Trap(TrapRegistry::TrapFnc fnc, const void* aux, bool safe); |
| 60 |
| 61 // MaskedEqual returns a CodeGen::Node that represents a conditional branch. |
| 65 // Argument "argno" (1..6) will be bitwise-AND'd with "mask" and compared | 62 // Argument "argno" (1..6) will be bitwise-AND'd with "mask" and compared |
| 66 // to "value"; if equal, then "passed" will be returned, otherwise "failed". | 63 // to "value"; if equal, then "passed" will be executed, otherwise "failed". |
| 67 // If "is32bit" is set, the argument must in the range of 0x0..(1u << 32 - 1) | 64 // If "width" is 4, the argument must in the range of 0x0..(1u << 32 - 1) |
| 68 // If it is outside this range, the sandbox treats the system call just | 65 // If it is outside this range, the sandbox treats the system call just |
| 69 // the same as any other ABI violation (i.e. it aborts with an error | 66 // the same as any other ABI violation (i.e., it panics). |
| 70 // message). | 67 CodeGen::Node MaskedEqual(int argno, |
| 71 ErrorCode CondMaskedEqual(int argno, | 68 size_t width, |
| 72 ErrorCode::ArgType is_32bit, | |
| 73 uint64_t mask, | 69 uint64_t mask, |
| 74 uint64_t value, | 70 uint64_t value, |
| 75 const ErrorCode& passed, | 71 CodeGen::Node passed, |
| 76 const ErrorCode& failed); | 72 CodeGen::Node failed); |
| 77 | |
| 78 // Returns the fatal ErrorCode that is used to indicate that somebody | |
| 79 // attempted to pass a 64bit value in a 32bit system call argument. | |
| 80 // This method is primarily needed for testing purposes. | |
| 81 ErrorCode Unexpected64bitArgument(); | |
| 82 | 73 |
| 83 private: | 74 private: |
| 84 struct Range; | 75 struct Range; |
| 85 typedef std::vector<Range> Ranges; | 76 typedef std::vector<Range> Ranges; |
| 86 typedef std::set<ErrorCode, struct ErrorCode::LessThan> Conds; | |
| 87 | 77 |
| 88 // Used by CondExpressionHalf to track which half of the argument it's | 78 // Used by MaskedEqualHalf to track which half of the argument it's |
| 89 // emitting instructions for. | 79 // emitting instructions for. |
| 90 enum ArgHalf { | 80 enum class ArgHalf { |
| 91 LowerHalf, | 81 LOWER, |
| 92 UpperHalf, | 82 UPPER, |
| 93 }; | 83 }; |
| 94 | 84 |
| 95 // Compile the configured policy into a complete instruction sequence. | 85 // Compile the configured policy into a complete instruction sequence. |
| 96 CodeGen::Node AssemblePolicy(); | 86 CodeGen::Node AssemblePolicy(); |
| 97 | 87 |
| 98 // Return an instruction sequence that checks the | 88 // Return an instruction sequence that checks the |
| 99 // arch_seccomp_data's "arch" field is valid, and then passes | 89 // arch_seccomp_data's "arch" field is valid, and then passes |
| 100 // control to |passed| if so. | 90 // control to |passed| if so. |
| 101 CodeGen::Node CheckArch(CodeGen::Node passed); | 91 CodeGen::Node CheckArch(CodeGen::Node passed); |
| 102 | 92 |
| 103 // If |has_unsafe_traps_| is true, returns an instruction sequence | 93 // If |has_unsafe_traps_| is true, returns an instruction sequence |
| 104 // that allows all system calls from |escapepc_|, and otherwise | 94 // that allows all system calls from |escapepc_|, and otherwise |
| 105 // passes control to |rest|. Otherwise, simply returns |rest|. | 95 // passes control to |rest|. Otherwise, simply returns |rest|. |
| 106 CodeGen::Node MaybeAddEscapeHatch(CodeGen::Node rest); | 96 CodeGen::Node MaybeAddEscapeHatch(CodeGen::Node rest); |
| 107 | 97 |
| 108 // Return an instruction sequence that loads and checks the system | 98 // Return an instruction sequence that loads and checks the system |
| 109 // call number, performs a binary search, and then dispatches to an | 99 // call number, performs a binary search, and then dispatches to an |
| 110 // appropriate instruction sequence compiled from the current | 100 // appropriate instruction sequence compiled from the current |
| 111 // policy. | 101 // policy. |
| 112 CodeGen::Node DispatchSyscall(); | 102 CodeGen::Node DispatchSyscall(); |
| 113 | 103 |
| 114 // Return an instruction sequence that checks the system call number | 104 // Return an instruction sequence that checks the system call number |
| 115 // (expected to be loaded in register A) and if valid, passes | 105 // (expected to be loaded in register A) and if valid, passes |
| 116 // control to |passed| (with register A still valid). | 106 // control to |passed| (with register A still valid). |
| 117 CodeGen::Node CheckSyscallNumber(CodeGen::Node passed); | 107 CodeGen::Node CheckSyscallNumber(CodeGen::Node passed); |
| 118 | 108 |
| 119 // Finds all the ranges of system calls that need to be handled. Ranges are | 109 // Finds all the ranges of system calls that need to be handled. Ranges are |
| 120 // sorted in ascending order of system call numbers. There are no gaps in the | 110 // sorted in ascending order of system call numbers. There are no gaps in the |
| 121 // ranges. System calls with identical ErrorCodes are coalesced into a single | 111 // ranges. System calls with identical CodeGen::Nodes are coalesced into a |
| 112 // single |
| 122 // range. | 113 // range. |
| 123 void FindRanges(Ranges* ranges); | 114 void FindRanges(Ranges* ranges); |
| 124 | 115 |
| 125 // Returns a BPF program snippet that implements a jump table for the | 116 // Returns a BPF program snippet that implements a jump table for the |
| 126 // given range of system call numbers. This function runs recursively. | 117 // given range of system call numbers. This function runs recursively. |
| 127 CodeGen::Node AssembleJumpTable(Ranges::const_iterator start, | 118 CodeGen::Node AssembleJumpTable(Ranges::const_iterator start, |
| 128 Ranges::const_iterator stop); | 119 Ranges::const_iterator stop); |
| 129 | 120 |
| 130 // CompileResult compiles an individual result expression into a | 121 // CompileResult compiles an individual result expression into a |
| 131 // CodeGen node. | 122 // CodeGen node. |
| 132 CodeGen::Node CompileResult(const ResultExpr& res); | 123 CodeGen::Node CompileResult(const ResultExpr& res); |
| 133 | 124 |
| 134 // Returns a BPF program snippet that makes the BPF filter program exit | |
| 135 // with the given ErrorCode "err". N.B. the ErrorCode may very well be a | |
| 136 // conditional expression; if so, this function will recursively call | |
| 137 // CondExpression() and possibly RetExpression() to build a complex set of | |
| 138 // instructions. | |
| 139 CodeGen::Node RetExpression(const ErrorCode& err); | |
| 140 | |
| 141 // Returns a BPF program that evaluates the conditional expression in | |
| 142 // "cond" and returns the appropriate value from the BPF filter program. | |
| 143 // This function recursively calls RetExpression(); it should only ever be | |
| 144 // called from RetExpression(). | |
| 145 CodeGen::Node CondExpression(const ErrorCode& cond); | |
| 146 | |
| 147 // Returns a BPF program that evaluates half of a conditional expression; | 125 // Returns a BPF program that evaluates half of a conditional expression; |
| 148 // it should only ever be called from CondExpression(). | 126 // it should only ever be called from CondExpression(). |
| 149 CodeGen::Node CondExpressionHalf(const ErrorCode& cond, | 127 CodeGen::Node MaskedEqualHalf(int argno, |
| 150 ArgHalf half, | 128 size_t width, |
| 151 CodeGen::Node passed, | 129 uint64_t full_mask, |
| 152 CodeGen::Node failed); | 130 uint64_t full_value, |
| 131 ArgHalf half, |
| 132 CodeGen::Node passed, |
| 133 CodeGen::Node failed); |
| 134 |
| 135 // Returns the fatal CodeGen::Node that is used to indicate that somebody |
| 136 // attempted to pass a 64bit value in a 32bit system call argument. |
| 137 CodeGen::Node Unexpected64bitArgument(); |
| 153 | 138 |
| 154 const Policy* policy_; | 139 const Policy* policy_; |
| 155 TrapRegistry* registry_; | 140 TrapRegistry* registry_; |
| 156 uint64_t escapepc_; | 141 uint64_t escapepc_; |
| 157 PanicFunc panic_func_; | 142 PanicFunc panic_func_; |
| 158 | 143 |
| 159 Conds conds_; | |
| 160 CodeGen gen_; | 144 CodeGen gen_; |
| 161 bool has_unsafe_traps_; | 145 bool has_unsafe_traps_; |
| 162 | 146 |
| 163 DISALLOW_COPY_AND_ASSIGN(PolicyCompiler); | 147 DISALLOW_COPY_AND_ASSIGN(PolicyCompiler); |
| 164 }; | 148 }; |
| 165 | 149 |
| 166 } // namespace bpf_dsl | 150 } // namespace bpf_dsl |
| 167 } // namespace sandbox | 151 } // namespace sandbox |
| 168 | 152 |
| 169 #endif // SANDBOX_LINUX_BPF_DSL_POLICY_COMPILER_H_ | 153 #endif // SANDBOX_LINUX_BPF_DSL_POLICY_COMPILER_H_ |
| OLD | NEW |