1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
|
/**
* Enhanced Seccomp x86 Specific Code
*
* Copyright (c) 2012 Red Hat <pmoore@redhat.com>
* Author: Paul Moore <pmoore@redhat.com>
*/
/*
* This library is free software; you can redistribute it and/or modify it
* under the terms of version 2.1 of the GNU Lesser General Public License as
* published by the Free Software Foundation.
*
* This library is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License
* for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with this library; if not, see <http://www.gnu.org/licenses>.
*/
#include <stdlib.h>
#include <errno.h>
#include <linux/audit.h>
#include "arch.h"
#include "arch-x86.h"
/* x86 syscall numbers */
#define __x86_NR_socketcall 102
#define __x86_NR_ipc 117
const struct arch_def arch_def_x86 = {
.token = SCMP_ARCH_X86,
.token_bpf = AUDIT_ARCH_I386,
.size = ARCH_SIZE_32,
.endian = ARCH_ENDIAN_LITTLE,
};
/**
* Rewrite a syscall value to match the architecture
* @param arch the architecture definition
* @param syscall the syscall number
*
* Syscalls can vary across different architectures so this function rewrites
* the syscall into the correct value for the specified architecture. Returns
* zero on success, negative values on failure.
*
*/
int x86_syscall_rewrite(const struct arch_def *arch, int *syscall)
{
int sys = *syscall;
if (sys <= -100 && sys >= -117)
*syscall = __x86_NR_socketcall;
else if (sys <= -200 && sys >= -211)
*syscall = __x86_NR_ipc;
else if (sys < 0)
return -EDOM;
return 0;
}
/**
* Rewrite a filter rule to match the architecture specifics
* @param arch the architecture definition
* @param strict strict flag
* @param rule the filter rule
*
* Syscalls can vary across different architectures so this function handles
* the necessary seccomp rule rewrites to ensure the right thing is done
* regardless of the rule or architecture. If @strict is true then the
* function will fail if the entire filter can not be preservered, however,
* if @strict is false the function will do a "best effort" rewrite and not
* fail. Returns zero on success, negative values on failure.
*
*/
int x86_filter_rewrite(const struct arch_def *arch, bool strict,
struct db_api_rule_list *rule)
{
int arg_max;
unsigned int iter;
int sys = rule->syscall;
arg_max = arch_arg_count_max(arch);
if (arg_max < 0)
return arg_max;
if (sys <= -100 && sys >= -117) {
for (iter = 0; iter < arg_max; iter++) {
if ((rule->args[iter].valid != 0) && (strict))
return -EINVAL;
}
rule->args[0].arg = 0;
rule->args[0].op = SCMP_CMP_EQ;
rule->args[0].mask = DATUM_MAX;
rule->args[0].datum = abs(sys) % 100;
rule->args[0].valid = 1;
rule->syscall = __x86_NR_socketcall;
} else if (sys <= -200 && sys >= -211) {
for (iter = 0; iter < arg_max; iter++) {
if ((rule->args[iter].valid != 0) && (strict))
return -EINVAL;
}
rule->args[0].arg = 0;
rule->args[0].op = SCMP_CMP_EQ;
rule->args[0].mask = DATUM_MAX;
rule->args[0].datum = abs(sys) % 200;
rule->args[0].valid = 1;
rule->syscall = __x86_NR_ipc;
} else if (sys < 0)
return -EDOM;
return 0;
}
|