- Fix seccomp GET_METADATA to deal with field sizes correctly (Tycho Andersen)
- Add selftest to make sure GET_METADATA doesn't regress (Tycho Andersen) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 Comment: Kees Cook <kees@outflux.net> iQIcBAABCgAGBQJajhgGAAoJEIly9N/cbcAmG0QP/As52uMMTdLcCNFLrBB3CoKY OZOhxpP3TdZ7sBvEnSJKSCLiT5gfyUkMOm+q8us6SbjFyelmcbliZ8n25tSMis8A QkLBAlOx/goSZyKuv4Cp2uLcq51g8G5uI4vXyHtic6rsxT7qhyQgs+ByMEhXBOj/ T2+b6UJiENNw58FhrPnnDBLj5enzsxJx2zbZeuz82WsWGaJr6yWI8VoLWz3i0JAK mr4tQXkjn6J9hHmfDHs/aTwx8wFUVETs/F5gmTcRwVo/fA4/sD7csKmpIH/pGi4h uOJuwnjAq5rDhWzTu96hbSLglSwZ6ONJiS+3c1lOL86q7ZDOwzZxU7ltSc2wVsF0 j5sKD6vVVS/bJkdoNIWDvETxNc2eRY2UQPTdiCsPCYkxLRwerGu+nmeiYxBmbo86 fJc65Opcy8srEG68qTUYxI36A2TqhLocqwcPBL/NLdI0EjZevvXMbuu+ymOZPcRN suvyfNzi7feDuifpDLE5NfLTTdtcMF0XwiRPQtDyLonFcG+lDCA5umEcZysg5mI3 pEl9BFbGdz83rdLCIj5LZ3P6OZZQG2oCxigKm7V7/X9VpHv6/5KOBpwXoVWllLc+ h3K+1weJ9PgRBMEI4oT7CaZRRHZwst1BbY/ZFfCVibOX3eiNSTWgWkTV1cECmNPG K0yqDL0171z3vTjCSpSR =JPlU -----END PGP SIGNATURE----- Merge tag 'seccomp-v4.16-rc3' of https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux into fixes-v4.16-rc3 - Fix seccomp GET_METADATA to deal with field sizes correctly (Tycho Andersen) - Add selftest to make sure GET_METADATA doesn't regress (Tycho Andersen)
This commit is contained in:
commit
645ae5c51e
|
@ -69,8 +69,8 @@ struct ptrace_peeksiginfo_args {
|
||||||
#define PTRACE_SECCOMP_GET_METADATA 0x420d
|
#define PTRACE_SECCOMP_GET_METADATA 0x420d
|
||||||
|
|
||||||
struct seccomp_metadata {
|
struct seccomp_metadata {
|
||||||
unsigned long filter_off; /* Input: which filter */
|
__u64 filter_off; /* Input: which filter */
|
||||||
unsigned int flags; /* Output: filter's flags */
|
__u64 flags; /* Output: filter's flags */
|
||||||
};
|
};
|
||||||
|
|
||||||
/* Read signals from a shared (process wide) queue */
|
/* Read signals from a shared (process wide) queue */
|
||||||
|
|
|
@ -1076,14 +1076,16 @@ long seccomp_get_metadata(struct task_struct *task,
|
||||||
|
|
||||||
size = min_t(unsigned long, size, sizeof(kmd));
|
size = min_t(unsigned long, size, sizeof(kmd));
|
||||||
|
|
||||||
if (copy_from_user(&kmd, data, size))
|
if (size < sizeof(kmd.filter_off))
|
||||||
|
return -EINVAL;
|
||||||
|
|
||||||
|
if (copy_from_user(&kmd.filter_off, data, sizeof(kmd.filter_off)))
|
||||||
return -EFAULT;
|
return -EFAULT;
|
||||||
|
|
||||||
filter = get_nth_filter(task, kmd.filter_off);
|
filter = get_nth_filter(task, kmd.filter_off);
|
||||||
if (IS_ERR(filter))
|
if (IS_ERR(filter))
|
||||||
return PTR_ERR(filter);
|
return PTR_ERR(filter);
|
||||||
|
|
||||||
memset(&kmd, 0, sizeof(kmd));
|
|
||||||
if (filter->log)
|
if (filter->log)
|
||||||
kmd.flags |= SECCOMP_FILTER_FLAG_LOG;
|
kmd.flags |= SECCOMP_FILTER_FLAG_LOG;
|
||||||
|
|
||||||
|
|
|
@ -141,6 +141,15 @@ struct seccomp_data {
|
||||||
#define SECCOMP_FILTER_FLAG_LOG 2
|
#define SECCOMP_FILTER_FLAG_LOG 2
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#ifndef PTRACE_SECCOMP_GET_METADATA
|
||||||
|
#define PTRACE_SECCOMP_GET_METADATA 0x420d
|
||||||
|
|
||||||
|
struct seccomp_metadata {
|
||||||
|
__u64 filter_off; /* Input: which filter */
|
||||||
|
__u64 flags; /* Output: filter's flags */
|
||||||
|
};
|
||||||
|
#endif
|
||||||
|
|
||||||
#ifndef seccomp
|
#ifndef seccomp
|
||||||
int seccomp(unsigned int op, unsigned int flags, void *args)
|
int seccomp(unsigned int op, unsigned int flags, void *args)
|
||||||
{
|
{
|
||||||
|
@ -2845,6 +2854,58 @@ TEST(get_action_avail)
|
||||||
EXPECT_EQ(errno, EOPNOTSUPP);
|
EXPECT_EQ(errno, EOPNOTSUPP);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
TEST(get_metadata)
|
||||||
|
{
|
||||||
|
pid_t pid;
|
||||||
|
int pipefd[2];
|
||||||
|
char buf;
|
||||||
|
struct seccomp_metadata md;
|
||||||
|
|
||||||
|
ASSERT_EQ(0, pipe(pipefd));
|
||||||
|
|
||||||
|
pid = fork();
|
||||||
|
ASSERT_GE(pid, 0);
|
||||||
|
if (pid == 0) {
|
||||||
|
struct sock_filter filter[] = {
|
||||||
|
BPF_STMT(BPF_RET|BPF_K, SECCOMP_RET_ALLOW),
|
||||||
|
};
|
||||||
|
struct sock_fprog prog = {
|
||||||
|
.len = (unsigned short)ARRAY_SIZE(filter),
|
||||||
|
.filter = filter,
|
||||||
|
};
|
||||||
|
|
||||||
|
/* one with log, one without */
|
||||||
|
ASSERT_EQ(0, seccomp(SECCOMP_SET_MODE_FILTER,
|
||||||
|
SECCOMP_FILTER_FLAG_LOG, &prog));
|
||||||
|
ASSERT_EQ(0, seccomp(SECCOMP_SET_MODE_FILTER, 0, &prog));
|
||||||
|
|
||||||
|
ASSERT_EQ(0, close(pipefd[0]));
|
||||||
|
ASSERT_EQ(1, write(pipefd[1], "1", 1));
|
||||||
|
ASSERT_EQ(0, close(pipefd[1]));
|
||||||
|
|
||||||
|
while (1)
|
||||||
|
sleep(100);
|
||||||
|
}
|
||||||
|
|
||||||
|
ASSERT_EQ(0, close(pipefd[1]));
|
||||||
|
ASSERT_EQ(1, read(pipefd[0], &buf, 1));
|
||||||
|
|
||||||
|
ASSERT_EQ(0, ptrace(PTRACE_ATTACH, pid));
|
||||||
|
ASSERT_EQ(pid, waitpid(pid, NULL, 0));
|
||||||
|
|
||||||
|
md.filter_off = 0;
|
||||||
|
ASSERT_EQ(sizeof(md), ptrace(PTRACE_SECCOMP_GET_METADATA, pid, sizeof(md), &md));
|
||||||
|
EXPECT_EQ(md.flags, SECCOMP_FILTER_FLAG_LOG);
|
||||||
|
EXPECT_EQ(md.filter_off, 0);
|
||||||
|
|
||||||
|
md.filter_off = 1;
|
||||||
|
ASSERT_EQ(sizeof(md), ptrace(PTRACE_SECCOMP_GET_METADATA, pid, sizeof(md), &md));
|
||||||
|
EXPECT_EQ(md.flags, 0);
|
||||||
|
EXPECT_EQ(md.filter_off, 1);
|
||||||
|
|
||||||
|
ASSERT_EQ(0, kill(pid, SIGKILL));
|
||||||
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* TODO:
|
* TODO:
|
||||||
* - add microbenchmarks
|
* - add microbenchmarks
|
||||||
|
|
Loading…
Reference in New Issue