[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20110428165525.GB1927@hallyn.com>
Date: Thu, 28 Apr 2011 11:55:25 -0500
From: "Serge E. Hallyn" <serge@...lyn.com>
To: Will Drewry <wad@...omium.org>
Cc: linux-kernel@...r.kernel.org, kees.cook@...onical.com,
eparis@...hat.com, agl@...omium.org, mingo@...e.hu,
jmorris@...ei.org, rostedt@...dmis.org,
Frederic Weisbecker <fweisbec@...il.com>,
Ingo Molnar <mingo@...hat.com>,
Andrew Morton <akpm@...ux-foundation.org>,
Tejun Heo <tj@...nel.org>, Michal Marek <mmarek@...e.cz>,
Oleg Nesterov <oleg@...hat.com>,
Roland McGrath <roland@...hat.com>,
Peter Zijlstra <a.p.zijlstra@...llo.nl>,
Jiri Slaby <jslaby@...e.cz>,
David Howells <dhowells@...hat.com>
Subject: Re: [PATCH 3/7] seccomp_filter: Enable ftrace-based system call
filtering
Quoting Will Drewry (wad@...omium.org):
Thanks very much for going through with this, Will. I really hope to see
this go upstream soon.
> This change adds a new seccomp mode based on the work by
> agl@...omium.org. This mode comes with a bitmask of NR_syscalls size and
> an optional linked list of seccomp_filter objects. When in mode 2, all
> system calls are first checked against the bitmask to determine if they
> are allowed or denied. If allowed, the list of filters is checked for
> the given syscall number. If all filter predicates for the system call
> match or the system call was allowed without restriction, the process
> continues. Otherwise, it is killed and a KERN_INFO notification is
> posted.
>
> The filter language itself is provided by the ftrace filter engine.
> Related patches tweak to the perf filter trace and free allow the calls
> to be shared. Filters inherit their understanding of types and arguments
> for each system call from the CONFIG_FTRACE_SYSCALLS subsystem which
> predefines this information in syscall_metadata associated enter_event
> (and exit_event) structures.
>
> The result is that a process may reduce its available interfaces to
> the kernel through prctl() without knowing the appropriate system call
> number a priori and with the flexibility of filtering based on
> register-stored arguments. (String checks suffer from TOCTOU issues and
> should be left to LSMs to provide policy for! Don't get greedy :)
>
> A sample filterset for a process that only needs to interact over stdin
> and stdout and exit cleanly is shown below:
> sys_read: fd == 0
> sys_write: fd == 1
> sys_exit_group: 1
>
> The filters may be specified once prior to entering the reduced access
> state:
> prctl(PR_SET_SECCOMP, 2, filters);
> If prctl() is in the allowed bitmask, the process may futher reduce
> privileges by dropping system calls from the allowed set.
>
> The only other twist is that it is possible to delay enforcement by one
> system call by supplying a "on_next_syscall: 1" 'filter'. This allows
> for a launcher process to fork(), prctl(), then execve() leaving the
> launched binary in a filtered state.
>
> Implementation-wise, seccomp.c now uses seccomp_state struct which is
> managed using RCU primitives. It contains the system call bitmask and
> a linked list of seccomp_filters (which are also managed as an RCU
> list). All mutations (barring one optional bit flip) to the
> seccomp_state are always done on a duplicate of the current state value
> which is swapped on prior to use.
>
> Signed-off-by: Will Drewry <wad@...omium.org>
...
> void __secure_computing(int this_syscall)
> {
> - int mode = current->seccomp.mode;
> + int mode = -1;
> int * syscall;
> -
> + /* Do we need an RCU read lock to access current's state? */
Nope.
...
> +struct seccomp_state *get_seccomp_state(struct seccomp_state *orig)
> +{
> + if (!orig)
> + return NULL;
> + atomic_inc(&orig->usage);
> + return orig;
> +}
> +
> +static void __put_seccomp_state(struct seccomp_state *orig)
> +{
> + WARN_ON(atomic_read(&orig->usage));
> + seccomp_drop_all_filters(orig);
> + kfree(orig);
> +}
> +
> +/* put_seccomp_state - decrements the reference count of @orig and may free. */
> +void put_seccomp_state(struct seccomp_state *orig)
> +{
> + if (!orig)
> + return;
> +
> + if (atomic_dec_and_test(&orig->usage))
> + __put_seccomp_state(orig);
> +}
> +
> long prctl_get_seccomp(void)
> {
> - return current->seccomp.mode;
> + if (!current->seccomp.state)
> + return 0;
> + return current->seccomp.state->mode;
> }
>
> -long prctl_set_seccomp(unsigned long seccomp_mode)
> +long prctl_set_seccomp(unsigned long seccomp_mode, char *filters)
> {
> long ret;
> + struct seccomp_state *state, *orig_state;
>
> - /* can set it only once to be even more secure */
> + rcu_read_lock();
> + orig_state = get_seccomp_state(rcu_dereference(current->seccomp.state));
> + rcu_read_unlock();
> +
> + /* mode 1 can only be set once, but mode 2 may have access reduced. */
> ret = -EPERM;
> - if (unlikely(current->seccomp.mode))
> + if (orig_state && orig_state->mode != 2 && seccomp_mode != 2)
> goto out;
>
> ret = -EINVAL;
> - if (seccomp_mode && seccomp_mode <= NR_SECCOMP_MODES) {
> - current->seccomp.mode = seccomp_mode;
> - set_thread_flag(TIF_SECCOMP);
> + if (!seccomp_mode || seccomp_mode > NR_SECCOMP_MODES)
> + goto out;
> +
> + /* Prepare to modify the seccomp state by dropping the shared
> + * reference after duplicating it.
> + */
> + state = (orig_state ? seccomp_state_dup(orig_state) :
> + seccomp_state_new());
> + if (!state) {
> + ret = -ENOMEM;
> + goto out;
> + }
> +
> + ret = 0;
> + switch (seccomp_mode) {
> + case 1:
> #ifdef TIF_NOTSC
> disable_TSC();
> #endif
> + state->mode = seccomp_mode;
> + set_thread_flag(TIF_SECCOMP);
> ret = 0;
> + break;
> + case 2:
> + if (filters) {
> + ret = seccomp_parse_filters(state, filters);
> + /* No partial applications. */
> + if (ret)
> + goto free_state;
> + }
> +
> + if (!state->mode) {
> + state->mode = seccomp_mode;
> + set_thread_flag(TIF_SECCOMP);
> + }
> + break;
> + default:
> + ret = -EINVAL;
> }
>
> - out:
> + rcu_assign_pointer(current->seccomp.state, state);
> + synchronize_rcu();
> + put_seccomp_state(orig_state); /* for the get */
> +
> +out:
> + put_seccomp_state(orig_state); /* for the task */
> + return ret;
> +
> +free_state:
> + put_seccomp_state(orig_state); /* for the get */
> + put_seccomp_state(state); /* drop the dup */
> return ret;
> }
This looks exactly right. The only case where put_seccomp_state()
might actually lead to freeing the state is where the current's
state gets reassigned. So you need to synchronize_rcu() before
that (as you do). The other cases will only decrement the usage
counter, can race with a reader doing (inc; get) but not with a
final free, which can only be done here.
(Rambling above is just me pursuading myself)
> diff --git a/kernel/seccomp_filter.c b/kernel/seccomp_filter.c
Unfortunately your use of filters doesn't seem exactly right.
> +/* seccomp_copy_all_filters - copies all filters from src to dst.
> + *
> + * @dst: the list_head for seccomp_filters to populate.
> + * @src: the list_head for seccomp_filters to copy from.
> + * Returns non-zero on failure.
> + */
> +int seccomp_copy_all_filters(struct list_head *dst,
> + const struct list_head *src)
> +{
> + struct seccomp_filter *filter;
> + int ret = 0;
> + BUG_ON(!dst || !src);
> + if (list_empty(src))
> + goto done;
> + rcu_read_lock();
> + list_for_each_entry(filter, src, list) {
> + struct seccomp_filter *new_filter = copy_seccomp_filter(filter);
copy_seccomp_filter() causes kzalloc to be called. You can't do that under
rcu_read_lock().
I actually thought you were going to be more extreme about the seccomp
state than you are: I thought you were going to tie a filter list to
seccomp state. So adding or removing a filter would have required
duping the seccomp state, duping all the filters, making the change in
the copy, and then swapping the new state into place. Slow in the
hopefully rare update case, but safe.
You don't have to do that, but then I'm pretty sure you'll need to add
reference counts to each filter and use rcu cycles to a reader from
having the filter disappear mid-read.
-serge
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists