• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4 
5 #ifndef SANDBOX_LINUX_SECCOMP_BPF_SYSCALL_H__
6 #define SANDBOX_LINUX_SECCOMP_BPF_SYSCALL_H__
7 
8 #include <stdint.h>
9 
10 namespace sandbox {
11 
12 // We have to make sure that we have a single "magic" return address for
13 // our system calls, which we can check from within a BPF filter. This
14 // works by writing a little bit of asm() code that a) enters the kernel, and
15 // that also b) can be invoked in a way that computes this return address.
16 // Passing "nr" as "-1" computes the "magic" return address. Passing any
17 // other value invokes the appropriate system call.
18 intptr_t SandboxSyscall(int nr,
19                         intptr_t p0,
20                         intptr_t p1,
21                         intptr_t p2,
22                         intptr_t p3,
23                         intptr_t p4,
24                         intptr_t p5);
25 
26 // System calls can take up to six parameters. Traditionally, glibc
27 // implements this property by using variadic argument lists. This works, but
28 // confuses modern tools such as valgrind, because we are nominally passing
29 // uninitialized data whenever we call through this function and pass less
30 // than the full six arguments.
31 // So, instead, we use C++'s template system to achieve a very similar
32 // effect. C++ automatically sets the unused parameters to zero for us, and
33 // it also does the correct type expansion (e.g. from 32bit to 64bit) where
34 // necessary.
35 // We have to use C-style cast operators as we want to be able to accept both
36 // integer and pointer types.
37 // We explicitly mark all functions as inline. This is not necessary in
38 // optimized builds, where the compiler automatically figures out that it
39 // can inline everything. But it makes stack traces of unoptimized builds
40 // easier to read as it hides implementation details.
41 #if __cplusplus >= 201103  // C++11
42 
43 template <class T0 = intptr_t,
44           class T1 = intptr_t,
45           class T2 = intptr_t,
46           class T3 = intptr_t,
47           class T4 = intptr_t,
48           class T5 = intptr_t>
49 inline intptr_t SandboxSyscall(int nr,
50                                T0 p0 = 0,
51                                T1 p1 = 0,
52                                T2 p2 = 0,
53                                T3 p3 = 0,
54                                T4 p4 = 0,
55                                T5 p5 = 0) __attribute__((always_inline));
56 
57 template <class T0, class T1, class T2, class T3, class T4, class T5>
58 inline intptr_t
SandboxSyscall(int nr,T0 p0,T1 p1,T2 p2,T3 p3,T4 p4,T5 p5)59 SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2, T3 p3, T4 p4, T5 p5) {
60   return SandboxSyscall(nr,
61                         (intptr_t)p0,
62                         (intptr_t)p1,
63                         (intptr_t)p2,
64                         (intptr_t)p3,
65                         (intptr_t)p4,
66                         (intptr_t)p5);
67 }
68 
69 #else  // Pre-C++11
70 
71 // TODO(markus): C++11 has a much more concise and readable solution for
72 //   expressing what we are doing here. Delete the fall-back code for older
73 //   compilers as soon as we have fully switched to C++11
74 
75 template <class T0, class T1, class T2, class T3, class T4, class T5>
76 inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2, T3 p3, T4 p4, T5 p5)
77     __attribute__((always_inline));
78 template <class T0, class T1, class T2, class T3, class T4, class T5>
79 inline intptr_t
SandboxSyscall(int nr,T0 p0,T1 p1,T2 p2,T3 p3,T4 p4,T5 p5)80 SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2, T3 p3, T4 p4, T5 p5) {
81   return SandboxSyscall(nr,
82                         (intptr_t)p0,
83                         (intptr_t)p1,
84                         (intptr_t)p2,
85                         (intptr_t)p3,
86                         (intptr_t)p4,
87                         (intptr_t)p5);
88 }
89 
90 template <class T0, class T1, class T2, class T3, class T4>
91 inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2, T3 p3, T4 p4)
92     __attribute__((always_inline));
93 template <class T0, class T1, class T2, class T3, class T4>
SandboxSyscall(int nr,T0 p0,T1 p1,T2 p2,T3 p3,T4 p4)94 inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2, T3 p3, T4 p4) {
95   return SandboxSyscall(nr, p0, p1, p2, p3, p4, 0);
96 }
97 
98 template <class T0, class T1, class T2, class T3>
99 inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2, T3 p3)
100     __attribute__((always_inline));
101 template <class T0, class T1, class T2, class T3>
SandboxSyscall(int nr,T0 p0,T1 p1,T2 p2,T3 p3)102 inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2, T3 p3) {
103   return SandboxSyscall(nr, p0, p1, p2, p3, 0, 0);
104 }
105 
106 template <class T0, class T1, class T2>
107 inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2)
108     __attribute__((always_inline));
109 template <class T0, class T1, class T2>
SandboxSyscall(int nr,T0 p0,T1 p1,T2 p2)110 inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2) {
111   return SandboxSyscall(nr, p0, p1, p2, 0, 0, 0);
112 }
113 
114 template <class T0, class T1>
115 inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1)
116     __attribute__((always_inline));
117 template <class T0, class T1>
SandboxSyscall(int nr,T0 p0,T1 p1)118 inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1) {
119   return SandboxSyscall(nr, p0, p1, 0, 0, 0, 0);
120 }
121 
122 template <class T0>
123 inline intptr_t SandboxSyscall(int nr, T0 p0) __attribute__((always_inline));
124 template <class T0>
SandboxSyscall(int nr,T0 p0)125 inline intptr_t SandboxSyscall(int nr, T0 p0) {
126   return SandboxSyscall(nr, p0, 0, 0, 0, 0, 0);
127 }
128 
129 inline intptr_t SandboxSyscall(int nr) __attribute__((always_inline));
SandboxSyscall(int nr)130 inline intptr_t SandboxSyscall(int nr) {
131   return SandboxSyscall(nr, 0, 0, 0, 0, 0, 0);
132 }
133 
134 #endif  // Pre-C++11
135 
136 }  // namespace sandbox
137 
138 #endif  // SANDBOX_LINUX_SECCOMP_BPF_SYSCALL_H__
139