Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(96)

Side by Side Diff: sandbox/linux/bpf_dsl/policy_compiler.h

Issue 1001833005: Update from https://crrev.com/320343 (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: Supress Created 5 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « sandbox/linux/bpf_dsl/bpf_dsl_unittest.cc ('k') | sandbox/linux/bpf_dsl/policy_compiler.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef SANDBOX_LINUX_BPF_DSL_POLICY_COMPILER_H_ 5 #ifndef SANDBOX_LINUX_BPF_DSL_POLICY_COMPILER_H_
6 #define SANDBOX_LINUX_BPF_DSL_POLICY_COMPILER_H_ 6 #define SANDBOX_LINUX_BPF_DSL_POLICY_COMPILER_H_
7 7
8 #include <stdint.h> 8 #include <stdint.h>
9 9
10 #include <map> 10 #include <map>
(...skipping 14 matching lines...) Expand all
25 // PolicyCompiler implements the bpf_dsl compiler, allowing users to 25 // PolicyCompiler implements the bpf_dsl compiler, allowing users to
26 // transform bpf_dsl policies into BPF programs to be executed by the 26 // transform bpf_dsl policies into BPF programs to be executed by the
27 // Linux kernel. 27 // Linux kernel.
28 class SANDBOX_EXPORT PolicyCompiler { 28 class SANDBOX_EXPORT PolicyCompiler {
29 public: 29 public:
30 PolicyCompiler(const Policy* policy, TrapRegistry* registry); 30 PolicyCompiler(const Policy* policy, TrapRegistry* registry);
31 ~PolicyCompiler(); 31 ~PolicyCompiler();
32 32
33 // Compile registers any trap handlers needed by the policy and 33 // Compile registers any trap handlers needed by the policy and
34 // compiles the policy to a BPF program, which it returns. 34 // compiles the policy to a BPF program, which it returns.
35 scoped_ptr<CodeGen::Program> Compile(); 35 scoped_ptr<CodeGen::Program> Compile(bool verify);
36
37 // DangerousSetEscapePC sets the "escape PC" that is allowed to issue any
38 // system calls, regardless of policy.
39 void DangerousSetEscapePC(uint64_t escapepc);
36 40
37 // Error returns an ErrorCode to indicate the system call should fail with 41 // Error returns an ErrorCode to indicate the system call should fail with
38 // the specified error number. 42 // the specified error number.
39 ErrorCode Error(int err); 43 ErrorCode Error(int err);
40 44
41 // Trap returns an ErrorCode to indicate the system call should 45 // Trap returns an ErrorCode to indicate the system call should
42 // instead invoke a trap handler. 46 // instead invoke a trap handler.
43 ErrorCode Trap(TrapRegistry::TrapFnc fnc, const void* aux, bool safe); 47 ErrorCode Trap(TrapRegistry::TrapFnc fnc, const void* aux, bool safe);
44 48
45 // UnsafeTraps require some syscalls to always be allowed. 49 // UnsafeTraps require some syscalls to always be allowed.
(...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after
81 85
82 // Compile the configured policy into a complete instruction sequence. 86 // Compile the configured policy into a complete instruction sequence.
83 CodeGen::Node AssemblePolicy(); 87 CodeGen::Node AssemblePolicy();
84 88
85 // Return an instruction sequence that checks the 89 // Return an instruction sequence that checks the
86 // arch_seccomp_data's "arch" field is valid, and then passes 90 // arch_seccomp_data's "arch" field is valid, and then passes
87 // control to |passed| if so. 91 // control to |passed| if so.
88 CodeGen::Node CheckArch(CodeGen::Node passed); 92 CodeGen::Node CheckArch(CodeGen::Node passed);
89 93
90 // If |has_unsafe_traps_| is true, returns an instruction sequence 94 // If |has_unsafe_traps_| is true, returns an instruction sequence
91 // that allows all system calls from Syscall::Call(), and otherwise 95 // that allows all system calls from |escapepc_|, and otherwise
92 // passes control to |rest|. Otherwise, simply returns |rest|. 96 // passes control to |rest|. Otherwise, simply returns |rest|.
93 CodeGen::Node MaybeAddEscapeHatch(CodeGen::Node rest); 97 CodeGen::Node MaybeAddEscapeHatch(CodeGen::Node rest);
94 98
95 // Return an instruction sequence that loads and checks the system 99 // Return an instruction sequence that loads and checks the system
96 // call number, performs a binary search, and then dispatches to an 100 // call number, performs a binary search, and then dispatches to an
97 // appropriate instruction sequence compiled from the current 101 // appropriate instruction sequence compiled from the current
98 // policy. 102 // policy.
99 CodeGen::Node DispatchSyscall(); 103 CodeGen::Node DispatchSyscall();
100 104
101 // Return an instruction sequence that checks the system call number 105 // Return an instruction sequence that checks the system call number
(...skipping 31 matching lines...) Expand 10 before | Expand all | Expand 10 after
133 137
134 // Returns a BPF program that evaluates half of a conditional expression; 138 // Returns a BPF program that evaluates half of a conditional expression;
135 // it should only ever be called from CondExpression(). 139 // it should only ever be called from CondExpression().
136 CodeGen::Node CondExpressionHalf(const ErrorCode& cond, 140 CodeGen::Node CondExpressionHalf(const ErrorCode& cond,
137 ArgHalf half, 141 ArgHalf half,
138 CodeGen::Node passed, 142 CodeGen::Node passed,
139 CodeGen::Node failed); 143 CodeGen::Node failed);
140 144
141 const Policy* policy_; 145 const Policy* policy_;
142 TrapRegistry* registry_; 146 TrapRegistry* registry_;
147 uint64_t escapepc_;
143 148
144 Conds conds_; 149 Conds conds_;
145 CodeGen gen_; 150 CodeGen gen_;
146 bool has_unsafe_traps_; 151 bool has_unsafe_traps_;
147 152
148 DISALLOW_COPY_AND_ASSIGN(PolicyCompiler); 153 DISALLOW_COPY_AND_ASSIGN(PolicyCompiler);
149 }; 154 };
150 155
151 } // namespace bpf_dsl 156 } // namespace bpf_dsl
152 } // namespace sandbox 157 } // namespace sandbox
153 158
154 #endif // SANDBOX_LINUX_BPF_DSL_POLICY_COMPILER_H_ 159 #endif // SANDBOX_LINUX_BPF_DSL_POLICY_COMPILER_H_
OLDNEW
« no previous file with comments | « sandbox/linux/bpf_dsl/bpf_dsl_unittest.cc ('k') | sandbox/linux/bpf_dsl/policy_compiler.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698