1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style license that can be 3 // found in the LICENSE file. 4 5 #ifndef SANDBOX_LINUX_SECCOMP_BPF_ERRORCODE_H__ 6 #define SANDBOX_LINUX_SECCOMP_BPF_ERRORCODE_H__ 7 8 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" 9 #include "sandbox/linux/seccomp-bpf/trap.h" 10 11 namespace sandbox { 12 13 struct arch_seccomp_data; 14 15 // This class holds all the possible values that can be returned by a sandbox 16 // policy. 17 // We can either wrap a symbolic ErrorCode (i.e. ERR_XXX enum values), an 18 // errno value (in the range 0..4095), a pointer to a TrapFnc callback 19 // handling a SECCOMP_RET_TRAP trap, or a complex constraint. 20 // All of the commonly used values are stored in the "err_" field. So, code 21 // that is using the ErrorCode class typically operates on a single 32bit 22 // field. 23 class ErrorCode { 24 public: 25 enum { 26 // Allow this system call. The value of ERR_ALLOWED is pretty much 27 // completely arbitrary. But we want to pick it so that is is unlikely 28 // to be passed in accidentally, when the user intended to return an 29 // "errno" (see below) value instead. 30 ERR_ALLOWED = 0x04000000, 31 32 // Deny the system call with a particular "errno" value. 33 // N.B.: It is also possible to return "0" here. That would normally 34 // indicate success, but it won't actually run the system call. 35 // This is very different from return ERR_ALLOWED. 36 ERR_MIN_ERRNO = 0, 37 // TODO(markus): Android only supports errno up to 255 38 // (crbug.com/181647). 39 ERR_MAX_ERRNO = 4095, 40 }; 41 42 // While BPF filter programs always operate on 32bit quantities, the kernel 43 // always sees system call arguments as 64bit values. This statement is true 44 // no matter whether the host system is natively operating in 32bit or 64bit. 45 // The BPF compiler hides the fact that BPF instructions cannot directly 46 // access 64bit quantities. But policies are still advised to specify whether 47 // a system call expects a 32bit or a 64bit quantity. 48 enum ArgType { 49 // When passed as an argument to SandboxBPF::Cond(), TP_32BIT requests that 50 // the conditional test should operate on the 32bit part of the system call 51 // argument. 52 // On 64bit architectures, this verifies that user space did not pass 53 // a 64bit value as an argument to the system call. If it did, that will be 54 // interpreted as an attempt at breaking the sandbox and results in the 55 // program getting terminated. 56 // In other words, only perform a 32bit test, if you are sure this 57 // particular system call would never legitimately take a 64bit 58 // argument. 59 // Implementation detail: TP_32BIT does two things. 1) it restricts the 60 // conditional test to operating on the LSB only, and 2) it adds code to 61 // the BPF filter program verifying that the MSB the kernel received from 62 // user space is either 0, or 0xFFFFFFFF; the latter is acceptable, iff bit 63 // 31 was set in the system call argument. It deals with 32bit arguments 64 // having been sign extended. 65 TP_32BIT, 66 67 // When passed as an argument to SandboxBPF::Cond(), TP_64BIT requests that 68 // the conditional test should operate on the full 64bit argument. It is 69 // generally harmless to perform a 64bit test on 32bit systems, as the 70 // kernel will always see the top 32 bits of all arguments as zero'd out. 71 // This approach has the desirable property that for tests of pointer 72 // values, we can always use TP_64BIT no matter the host architecture. 73 // But of course, that also means, it is possible to write conditional 74 // policies that turn into no-ops on 32bit systems; this is by design. 75 TP_64BIT, 76 }; 77 78 enum Operation { 79 // Test whether the system call argument is equal to the operand. 80 OP_EQUAL, 81 82 // Test whether the system call argument is greater (or equal) to the 83 // operand. Please note that all tests always operate on unsigned 84 // values. You can generally emulate signed tests, if that's what you 85 // need. 86 // TODO(markus): Check whether we should automatically emulate signed 87 // operations. 88 OP_GREATER_UNSIGNED, 89 OP_GREATER_EQUAL_UNSIGNED, 90 91 // Tests a system call argument against a bit mask. 92 // The "ALL_BITS" variant performs this test: "arg & mask == mask" 93 // This implies that a mask of zero always results in a passing test. 94 // The "ANY_BITS" variant performs this test: "arg & mask != 0" 95 // This implies that a mask of zero always results in a failing test. 96 OP_HAS_ALL_BITS, 97 OP_HAS_ANY_BITS, 98 99 // Total number of operations. 100 OP_NUM_OPS, 101 }; 102 103 enum ErrorType { 104 ET_INVALID, 105 ET_SIMPLE, 106 ET_TRAP, 107 ET_COND, 108 }; 109 110 // We allow the default constructor, as it makes the ErrorCode class 111 // much easier to use. But if we ever encounter an invalid ErrorCode 112 // when compiling a BPF filter, we deliberately generate an invalid 113 // program that will get flagged both by our Verifier class and by 114 // the Linux kernel. 115 ErrorCode() : error_type_(ET_INVALID), err_(SECCOMP_RET_INVALID) {} 116 explicit ErrorCode(int err); 117 118 // For all practical purposes, ErrorCodes are treated as if they were 119 // structs. The copy constructor and assignment operator are trivial and 120 // we do not need to explicitly specify them. 121 // Most notably, it is in fact perfectly OK to directly copy the passed_ and 122 // failed_ field. They only ever get set by our private constructor, and the 123 // callers handle life-cycle management for these objects. 124 125 // Destructor 126 ~ErrorCode() {} 127 128 bool Equals(const ErrorCode& err) const; 129 bool LessThan(const ErrorCode& err) const; 130 131 uint32_t err() const { return err_; } 132 ErrorType error_type() const { return error_type_; } 133 134 bool safe() const { return safe_; } 135 136 uint64_t value() const { return value_; } 137 int argno() const { return argno_; } 138 ArgType width() const { return width_; } 139 Operation op() const { return op_; } 140 const ErrorCode* passed() const { return passed_; } 141 const ErrorCode* failed() const { return failed_; } 142 143 struct LessThan { 144 bool operator()(const ErrorCode& a, const ErrorCode& b) const { 145 return a.LessThan(b); 146 } 147 }; 148 149 private: 150 friend class CodeGen; 151 friend class SandboxBPF; 152 friend class Trap; 153 154 // If we are wrapping a callback, we must assign a unique id. This id is 155 // how the kernel tells us which one of our different SECCOMP_RET_TRAP 156 // cases has been triggered. 157 ErrorCode(Trap::TrapFnc fnc, const void* aux, bool safe, uint16_t id); 158 159 // Some system calls require inspection of arguments. This constructor 160 // allows us to specify additional constraints. 161 ErrorCode(int argno, 162 ArgType width, 163 Operation op, 164 uint64_t value, 165 const ErrorCode* passed, 166 const ErrorCode* failed); 167 168 ErrorType error_type_; 169 170 union { 171 // Fields needed for SECCOMP_RET_TRAP callbacks 172 struct { 173 Trap::TrapFnc fnc_; // Callback function and arg, if trap was 174 void* aux_; // triggered by the kernel's BPF filter. 175 bool safe_; // Keep sandbox active while calling fnc_() 176 }; 177 178 // Fields needed when inspecting additional arguments. 179 struct { 180 uint64_t value_; // Value that we are comparing with. 181 int argno_; // Syscall arg number that we are inspecting. 182 ArgType width_; // Whether we are looking at a 32/64bit value. 183 Operation op_; // Comparison operation. 184 const ErrorCode* passed_; // Value to be returned if comparison passed, 185 const ErrorCode* failed_; // or if it failed. 186 }; 187 }; 188 189 // 32bit field used for all possible types of ErrorCode values. This is 190 // the value that uniquely identifies any ErrorCode and it (typically) can 191 // be emitted directly into a BPF filter program. 192 uint32_t err_; 193 }; 194 195 } // namespace sandbox 196 197 #endif // SANDBOX_LINUX_SECCOMP_BPF_ERRORCODE_H__ 198