From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753529AbbJ0Dj7 (ORCPT ); Mon, 26 Oct 2015 23:39:59 -0400 Received: from mail-pa0-f41.google.com ([209.85.220.41]:34654 "EHLO mail-pa0-f41.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751572AbbJ0Dj5 (ORCPT ); Mon, 26 Oct 2015 23:39:57 -0400 Date: Mon, 26 Oct 2015 20:39:50 -0700 From: Alexei Starovoitov To: Tycho Andersen Cc: "David S. Miller" , Kees Cook , Alexei Starovoitov , Will Drewry , Oleg Nesterov , Andy Lutomirski , Pavel Emelyanov , "Serge E. Hallyn" , Daniel Borkmann , linux-kernel@vger.kernel.org, linux-api@vger.kernel.org, netdev@vger.kernel.org Subject: Re: [PATCH net-next] seccomp, ptrace: add support for dumping seccomp filters Message-ID: <20151027033949.GA26775@Alexeis-MacBook-Pro.local> References: <1445905439-25449-1-git-send-email-tycho.andersen@canonical.com> <1445905439-25449-2-git-send-email-tycho.andersen@canonical.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1445905439-25449-2-git-send-email-tycho.andersen@canonical.com> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Oct 27, 2015 at 09:23:59AM +0900, Tycho Andersen wrote: > This patch adds support for dumping a process' (classic BPF) seccomp > filters via ptrace. > > PTRACE_SECCOMP_GET_FILTER allows the tracer to dump the user's classic BPF > seccomp filters. addr should be an integer which represents the ith seccomp > filter (0 is the most recently installed filter). data should be a struct > sock_filter * with enough room for the ith filter, or NULL, in which case > the filter is not saved. The return value for this command is the number of > BPF instructions the program represents, or negative in the case of errors. > Command specific errors are ENOENT: which indicates that there is no ith > filter in this seccomp tree, and EMEDIUMTYPE, which indicates that the ith > filter was not installed as a classic BPF filter. > > A caveat with this approach is that there is no way to get explicitly at > the heirarchy of seccomp filters, and users need to memcmp() filters to > decide which are inherited. This means that a task which installs two of > the same filter can potentially confuse users of this interface. > > v2: * make save_orig const > * check that the orig_prog exists (not necessary right now, but when > grows eBPF support it will be) > * s/n/filter_off and make it an unsigned long to match ptrace > * count "down" the tree instead of "up" when passing a filter offset > > v3: * don't take the current task's lock for inspecting its seccomp mode > * use a 0x42** constant for the ptrace command value > > v4: * don't copy to userspace while holding spinlocks > > v5: * add another condition to WARN_ON > > v6: * rebase on net-next > > Signed-off-by: Tycho Andersen > Acked-by: Kees Cook > CC: Will Drewry > Reviewed-by: Oleg Nesterov > CC: Andy Lutomirski > CC: Pavel Emelyanov > CC: Serge E. Hallyn > CC: Alexei Starovoitov > CC: Daniel Borkmann Looks fine. Acked-by: Alexei Starovoitov