[Devel] [PATCH rh7] seccomp, ptrace: Save original BPF program when setting the filer

Konstantin Khorenko khorenko at virtuozzo.com
Thu Dec 8 05:28:51 PST 2016


Andrey, i'm committing this, but please, review anyway.

--
Best regards,

Konstantin Khorenko,
Virtuozzo Linux Kernel Team

On 12/07/2016 08:29 PM, Cyrill Gorcunov wrote:
> The vanilla kernel is quite reworked in filter management, in particular
> the filters passed into sockets or seccomp are saved in the userspace form
> as struct bpf_prog::orig_prog. We can't port all the patches right now,
> lets rather do a trick for seccomp sake and simply carry a copy inside
> struct seccomp_filter. The socket filters are decoded into userspace form
> anyway so this area is safe.
>
> https://jira.sw.ru/browse/PSBM-55593
>
> CC: Andrey Vagin <avagin at openvz.org>
> Signed-off-by: Cyrill Gorcunov <gorcunov at openvz.org>
> ---
> The patch is on top of [PATCH rh7] seccomp, ptrace: Fix typo in filter fetching
>
>  kernel/seccomp.c |   25 +++++++++++++++++++++++++
>  1 file changed, 25 insertions(+)
>
> Index: linux-pcs7.git/kernel/seccomp.c
> ===================================================================
> --- linux-pcs7.git.orig/kernel/seccomp.c
> +++ linux-pcs7.git/kernel/seccomp.c
> @@ -54,6 +54,9 @@
>  struct seccomp_filter {
>  	atomic_t usage;
>  	struct seccomp_filter *prev;
> +#if CONFIG_VE
> +	struct sock_fprog orig_prog;
> +#endif
>  	unsigned short len;  /* Instruction count */
>  	struct sock_filter insns[];
>  };
> @@ -265,6 +268,16 @@ static long seccomp_attach_filter(struct
>  	if (copy_from_user(filter->insns, fprog->filter, fp_size))
>  		goto fail;
>
> +#if CONFIG_VE
> +	filter->orig_prog.len = fprog->len;
> +	filter->orig_prog.filter = kmemdup(filter->insns, fp_size,
> +					   GFP_KERNEL|__GFP_NOWARN);
> +	if (!filter->orig_prog.filter) {
> +		ret = -ENOMEM;
> +		goto fail;
> +	}
> +#endif
> +
>  	/* Check and rewrite the fprog via the skb checker */
>  	ret = sk_chk_filter(filter->insns, filter->len);
>  	if (ret)
> @@ -283,6 +296,9 @@ static long seccomp_attach_filter(struct
>  	current->seccomp.filter = filter;
>  	return 0;
>  fail:
> +#if CONFIG_VE
> +	kfree(filter->orig_prog.filter);
> +#endif
>  	kfree(filter);
>  	return ret;
>  }
> @@ -332,6 +348,9 @@ void put_seccomp_filter(struct task_stru
>  	while (orig && atomic_dec_and_test(&orig->usage)) {
>  		struct seccomp_filter *freeme = orig;
>  		orig = orig->prev;
> +#if CONFIG_VE
> +		kfree(freeme->orig_prog.filter);
> +#endif
>  		kfree(freeme);
>  	}
>  }
> @@ -566,8 +585,14 @@ long seccomp_get_filter(struct task_stru
>  	get_seccomp_filter(task);
>  	spin_unlock_irq(&task->sighand->siglock);
>
> +#if CONFIG_VE
> +	if (copy_to_user(data, filter->orig_prog.filter,
> +			 filter->orig_prog.len * sizeof(filter->orig_prog.filter[0])))
> +		ret = -EFAULT;
> +#else
>  	if (copy_to_user(data, filter->insns, filter->len * sizeof(filter->insns[0])))
>  		ret = -EFAULT;
> +#endif
>
>  	put_seccomp_filter(task);
>  	return ret;
> .
>


More information about the Devel mailing list