| OLD | NEW |
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h" | 5 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h" |
| 6 | 6 |
| 7 #include <errno.h> | 7 #include <errno.h> |
| 8 #include <fcntl.h> | 8 #include <fcntl.h> |
| 9 #include <fcntl.h> | 9 #include <fcntl.h> |
| 10 #include <linux/futex.h> | |
| 11 #include <linux/net.h> | |
| 12 #include <sched.h> | 10 #include <sched.h> |
| 13 #include <signal.h> | 11 #include <signal.h> |
| 14 #include <sys/ioctl.h> | |
| 15 #include <sys/mman.h> | 12 #include <sys/mman.h> |
| 16 #include <sys/prctl.h> | 13 #include <sys/prctl.h> |
| 17 #include <sys/resource.h> | 14 #include <sys/resource.h> |
| 18 #include <sys/stat.h> | 15 #include <sys/stat.h> |
| 19 #include <sys/time.h> | 16 #include <sys/time.h> |
| 20 #include <sys/types.h> | 17 #include <sys/types.h> |
| 21 #include <time.h> | 18 #include <time.h> |
| 22 #include <unistd.h> | 19 #include <unistd.h> |
| 23 | 20 |
| 24 #include "base/basictypes.h" | 21 #include "base/basictypes.h" |
| 25 #include "base/logging.h" | 22 #include "base/logging.h" |
| 26 #include "base/macros.h" | 23 #include "base/macros.h" |
| 27 #include "base/time/time.h" | 24 #include "base/time/time.h" |
| 28 #include "build/build_config.h" | 25 #include "build/build_config.h" |
| 29 #include "sandbox/linux/bpf_dsl/bpf_dsl.h" | 26 #include "sandbox/linux/bpf_dsl/bpf_dsl.h" |
| 30 #include "sandbox/linux/bpf_dsl/seccomp_macros.h" | |
| 31 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" | 27 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" |
| 32 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" | 28 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" |
| 33 #include "sandbox/linux/system_headers/linux_syscalls.h" | 29 #include "sandbox/linux/system_headers/linux_syscalls.h" |
| 34 | 30 |
| 31 #if !defined(OS_NACL_NONSFI) |
| 32 // TODO |
| 33 #include <linux/futex.h> |
| 34 #include <linux/net.h> |
| 35 #include <sys/ioctl.h> |
| 36 #include "sandbox/linux/bpf_dsl/seccomp_macros.h" |
| 37 #endif |
| 38 |
| 35 #if defined(OS_ANDROID) | 39 #if defined(OS_ANDROID) |
| 36 | 40 |
| 37 #include "sandbox/linux/system_headers/android_futex.h" | 41 #include "sandbox/linux/system_headers/android_futex.h" |
| 38 | 42 |
| 39 #if !defined(F_DUPFD_CLOEXEC) | 43 #if !defined(F_DUPFD_CLOEXEC) |
| 40 #define F_DUPFD_CLOEXEC (F_LINUX_SPECIFIC_BASE + 6) | 44 #define F_DUPFD_CLOEXEC (F_LINUX_SPECIFIC_BASE + 6) |
| 41 #endif | 45 #endif |
| 42 | 46 |
| 43 // https://android.googlesource.com/platform/bionic/+/lollipop-release/libc/priv
ate/bionic_prctl.h | 47 // https://android.googlesource.com/platform/bionic/+/lollipop-release/libc/priv
ate/bionic_prctl.h |
| 44 #if !defined(PR_SET_VMA) | 48 #if !defined(PR_SET_VMA) |
| 45 #define PR_SET_VMA 0x53564d41 | 49 #define PR_SET_VMA 0x53564d41 |
| 46 #endif | 50 #endif |
| 47 | 51 |
| 48 // https://android.googlesource.com/platform/system/core/+/lollipop-release/libc
utils/sched_policy.c | 52 // https://android.googlesource.com/platform/system/core/+/lollipop-release/libc
utils/sched_policy.c |
| 49 #if !defined(PR_SET_TIMERSLACK_PID) | 53 #if !defined(PR_SET_TIMERSLACK_PID) |
| 50 #define PR_SET_TIMERSLACK_PID 41 | 54 #define PR_SET_TIMERSLACK_PID 41 |
| 51 #endif | 55 #endif |
| 52 | 56 |
| 53 #endif // defined(OS_ANDROID) | 57 #endif // defined(OS_ANDROID) |
| 54 | 58 |
| 59 #if !defined(PR_SET_NAME) |
| 60 // TODO |
| 61 #define PR_SET_NAME 15 |
| 62 #endif |
| 63 |
| 55 #if defined(__arm__) && !defined(MAP_STACK) | 64 #if defined(__arm__) && !defined(MAP_STACK) |
| 56 #define MAP_STACK 0x20000 // Daisy build environment has old headers. | 65 #define MAP_STACK 0x20000 // Daisy build environment has old headers. |
| 57 #endif | 66 #endif |
| 58 | 67 |
| 59 #if defined(__mips__) && !defined(MAP_STACK) | 68 #if defined(__mips__) && !defined(MAP_STACK) |
| 60 #define MAP_STACK 0x40000 | 69 #define MAP_STACK 0x40000 |
| 61 #endif | 70 #endif |
| 62 namespace { | 71 namespace { |
| 63 | 72 |
| 64 inline bool IsArchitectureX86_64() { | 73 inline bool IsArchitectureX86_64() { |
| (...skipping 73 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 138 const Arg<int> option(0); | 147 const Arg<int> option(0); |
| 139 return Switch(option) | 148 return Switch(option) |
| 140 .CASES((PR_GET_NAME, PR_SET_NAME, PR_GET_DUMPABLE, PR_SET_DUMPABLE), | 149 .CASES((PR_GET_NAME, PR_SET_NAME, PR_GET_DUMPABLE, PR_SET_DUMPABLE), |
| 141 Allow()) | 150 Allow()) |
| 142 #if defined(OS_ANDROID) | 151 #if defined(OS_ANDROID) |
| 143 .CASES((PR_SET_VMA, PR_SET_TIMERSLACK_PID), Allow()) | 152 .CASES((PR_SET_VMA, PR_SET_TIMERSLACK_PID), Allow()) |
| 144 #endif | 153 #endif |
| 145 .Default(CrashSIGSYSPrctl()); | 154 .Default(CrashSIGSYSPrctl()); |
| 146 } | 155 } |
| 147 | 156 |
| 157 #if !defined(OS_NACL_NONSFI) |
| 148 ResultExpr RestrictIoctl() { | 158 ResultExpr RestrictIoctl() { |
| 149 const Arg<int> request(1); | 159 const Arg<int> request(1); |
| 150 return Switch(request).CASES((TCGETS, FIONREAD), Allow()).Default( | 160 return Switch(request).CASES((TCGETS, FIONREAD), Allow()).Default( |
| 151 CrashSIGSYSIoctl()); | 161 CrashSIGSYSIoctl()); |
| 152 } | 162 } |
| 153 | 163 |
| 154 ResultExpr RestrictMmapFlags() { | 164 ResultExpr RestrictMmapFlags() { |
| 155 // The flags you see are actually the allowed ones, and the variable is a | 165 // The flags you see are actually the allowed ones, and the variable is a |
| 156 // "denied" mask because of the negation operator. | 166 // "denied" mask because of the negation operator. |
| 157 // Significantly, we don't permit MAP_HUGETLB, or the newer flags such as | 167 // Significantly, we don't permit MAP_HUGETLB, or the newer flags such as |
| 158 // MAP_POPULATE. | 168 // MAP_POPULATE. |
| 159 // TODO(davidung), remove MAP_DENYWRITE with updated Tegra libraries. | 169 // TODO(davidung), remove MAP_DENYWRITE with updated Tegra libraries. |
| 160 const uint64_t kAllowedMask = MAP_SHARED | MAP_PRIVATE | MAP_ANONYMOUS | | 170 const uint64_t kAllowedMask = MAP_SHARED | MAP_PRIVATE | MAP_ANONYMOUS | |
| 161 MAP_STACK | MAP_NORESERVE | MAP_FIXED | | 171 MAP_STACK | MAP_NORESERVE | MAP_FIXED | |
| 162 MAP_DENYWRITE; | 172 MAP_DENYWRITE; |
| 163 const Arg<int> flags(3); | 173 const Arg<int> flags(3); |
| 164 return If((flags & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS()); | 174 return If((flags & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS()); |
| 165 } | 175 } |
| 176 #endif |
| 166 | 177 |
| 167 ResultExpr RestrictMprotectFlags() { | 178 ResultExpr RestrictMprotectFlags() { |
| 168 // The flags you see are actually the allowed ones, and the variable is a | 179 // The flags you see are actually the allowed ones, and the variable is a |
| 169 // "denied" mask because of the negation operator. | 180 // "denied" mask because of the negation operator. |
| 170 // Significantly, we don't permit weird undocumented flags such as | 181 // Significantly, we don't permit weird undocumented flags such as |
| 171 // PROT_GROWSDOWN. | 182 // PROT_GROWSDOWN. |
| 172 const uint64_t kAllowedMask = PROT_READ | PROT_WRITE | PROT_EXEC; | 183 const uint64_t kAllowedMask = PROT_READ | PROT_WRITE | PROT_EXEC; |
| 173 const Arg<int> prot(2); | 184 const Arg<int> prot(2); |
| 174 return If((prot & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS()); | 185 return If((prot & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS()); |
| 175 } | 186 } |
| 176 | 187 |
| 188 #if !defined(OS_NACL_NONSFI) |
| 177 ResultExpr RestrictFcntlCommands() { | 189 ResultExpr RestrictFcntlCommands() { |
| 178 // We also restrict the flags in F_SETFL. We don't want to permit flags with | 190 // We also restrict the flags in F_SETFL. We don't want to permit flags with |
| 179 // a history of trouble such as O_DIRECT. The flags you see are actually the | 191 // a history of trouble such as O_DIRECT. The flags you see are actually the |
| 180 // allowed ones, and the variable is a "denied" mask because of the negation | 192 // allowed ones, and the variable is a "denied" mask because of the negation |
| 181 // operator. | 193 // operator. |
| 182 // Glibc overrides the kernel's O_LARGEFILE value. Account for this. | 194 // Glibc overrides the kernel's O_LARGEFILE value. Account for this. |
| 183 uint64_t kOLargeFileFlag = O_LARGEFILE; | 195 uint64_t kOLargeFileFlag = O_LARGEFILE; |
| 184 if (IsArchitectureX86_64() || IsArchitectureI386() || IsArchitectureMips()) | 196 if (IsArchitectureX86_64() || IsArchitectureI386() || IsArchitectureMips()) |
| 185 kOLargeFileFlag = 0100000; | 197 kOLargeFileFlag = 0100000; |
| 186 | 198 |
| 187 const Arg<int> cmd(1); | 199 const Arg<int> cmd(1); |
| 188 const Arg<long> long_arg(2); | 200 const Arg<long> long_arg(2); |
| 189 | 201 |
| 190 const uint64_t kAllowedMask = O_ACCMODE | O_APPEND | O_NONBLOCK | O_SYNC | | 202 const uint64_t kAllowedMask = O_ACCMODE | O_APPEND | O_NONBLOCK | O_SYNC | |
| 191 kOLargeFileFlag | O_CLOEXEC | O_NOATIME; | 203 kOLargeFileFlag | O_CLOEXEC | O_NOATIME; |
| 192 return Switch(cmd) | 204 return Switch(cmd) |
| 193 .CASES((F_GETFL, | 205 .CASES((F_GETFL, |
| 194 F_GETFD, | 206 F_GETFD, |
| 195 F_SETFD, | 207 F_SETFD, |
| 196 F_SETLK, | 208 F_SETLK, |
| 197 F_SETLKW, | 209 F_SETLKW, |
| 198 F_GETLK, | 210 F_GETLK, |
| 199 F_DUPFD, | 211 F_DUPFD, |
| 200 F_DUPFD_CLOEXEC), | 212 F_DUPFD_CLOEXEC), |
| 201 Allow()) | 213 Allow()) |
| 202 .Case(F_SETFL, | 214 .Case(F_SETFL, |
| 203 If((long_arg & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS())) | 215 If((long_arg & ~kAllowedMask) == 0, Allow()).Else(CrashSIGSYS())) |
| 204 .Default(CrashSIGSYS()); | 216 .Default(CrashSIGSYS()); |
| 205 } | 217 } |
| 218 #endif |
| 206 | 219 |
| 207 #if defined(__i386__) || defined(__mips__) | 220 #if defined(__i386__) || defined(__mips__) |
| 221 #if !defined(OS_NACL_NONSFI) |
| 208 ResultExpr RestrictSocketcallCommand() { | 222 ResultExpr RestrictSocketcallCommand() { |
| 209 // Unfortunately, we are unable to restrict the first parameter to | 223 // Unfortunately, we are unable to restrict the first parameter to |
| 210 // socketpair(2). Whilst initially sounding bad, it's noteworthy that very | 224 // socketpair(2). Whilst initially sounding bad, it's noteworthy that very |
| 211 // few protocols actually support socketpair(2). The scary call that we're | 225 // few protocols actually support socketpair(2). The scary call that we're |
| 212 // worried about, socket(2), remains blocked. | 226 // worried about, socket(2), remains blocked. |
| 213 const Arg<int> call(0); | 227 const Arg<int> call(0); |
| 214 return Switch(call) | 228 return Switch(call) |
| 215 .CASES((SYS_SOCKETPAIR, | 229 .CASES((SYS_SOCKETPAIR, |
| 216 SYS_SHUTDOWN, | 230 SYS_SHUTDOWN, |
| 217 SYS_RECV, | 231 SYS_RECV, |
| 218 SYS_SEND, | 232 SYS_SEND, |
| 219 SYS_RECVFROM, | 233 SYS_RECVFROM, |
| 220 SYS_SENDTO, | 234 SYS_SENDTO, |
| 221 SYS_RECVMSG, | 235 SYS_RECVMSG, |
| 222 SYS_SENDMSG), | 236 SYS_SENDMSG), |
| 223 Allow()) | 237 Allow()) |
| 224 .Default(Error(EPERM)); | 238 .Default(Error(EPERM)); |
| 225 } | 239 } |
| 226 #endif | 240 #endif |
| 241 #endif |
| 227 | 242 |
| 228 ResultExpr RestrictKillTarget(pid_t target_pid, int sysno) { | 243 ResultExpr RestrictKillTarget(pid_t target_pid, int sysno) { |
| 229 switch (sysno) { | 244 switch (sysno) { |
| 230 case __NR_kill: | 245 case __NR_kill: |
| 231 case __NR_tgkill: { | 246 case __NR_tgkill: { |
| 232 const Arg<pid_t> pid(0); | 247 const Arg<pid_t> pid(0); |
| 233 return If(pid == target_pid, Allow()).Else(CrashSIGSYSKill()); | 248 return If(pid == target_pid, Allow()).Else(CrashSIGSYSKill()); |
| 234 } | 249 } |
| 235 case __NR_tkill: | 250 case __NR_tkill: |
| 236 return CrashSIGSYSKill(); | 251 return CrashSIGSYSKill(); |
| 237 default: | 252 default: |
| 238 NOTREACHED(); | 253 NOTREACHED(); |
| 239 return CrashSIGSYS(); | 254 return CrashSIGSYS(); |
| 240 } | 255 } |
| 241 } | 256 } |
| 242 | 257 |
| 258 #if !defined(OS_NACL_NONSFI) |
| 259 // TODO |
| 243 ResultExpr RestrictFutex() { | 260 ResultExpr RestrictFutex() { |
| 244 const uint64_t kAllowedFutexFlags = FUTEX_PRIVATE_FLAG | FUTEX_CLOCK_REALTIME; | 261 const uint64_t kAllowedFutexFlags = FUTEX_PRIVATE_FLAG | FUTEX_CLOCK_REALTIME; |
| 245 const Arg<int> op(1); | 262 const Arg<int> op(1); |
| 246 return Switch(op & ~kAllowedFutexFlags) | 263 return Switch(op & ~kAllowedFutexFlags) |
| 247 .CASES((FUTEX_WAIT, | 264 .CASES((FUTEX_WAIT, |
| 248 FUTEX_WAKE, | 265 FUTEX_WAKE, |
| 249 FUTEX_REQUEUE, | 266 FUTEX_REQUEUE, |
| 250 FUTEX_CMP_REQUEUE, | 267 FUTEX_CMP_REQUEUE, |
| 251 FUTEX_WAKE_OP, | 268 FUTEX_WAKE_OP, |
| 252 FUTEX_WAIT_BITSET, | 269 FUTEX_WAIT_BITSET, |
| 253 FUTEX_WAKE_BITSET), | 270 FUTEX_WAKE_BITSET), |
| 254 Allow()) | 271 Allow()) |
| 255 .Default(CrashSIGSYSFutex()); | 272 .Default(CrashSIGSYSFutex()); |
| 256 } | 273 } |
| 274 #endif |
| 257 | 275 |
| 276 #if !defined(OS_NACL_NONSFI) |
| 258 ResultExpr RestrictGetSetpriority(pid_t target_pid) { | 277 ResultExpr RestrictGetSetpriority(pid_t target_pid) { |
| 259 const Arg<int> which(0); | 278 const Arg<int> which(0); |
| 260 const Arg<int> who(1); | 279 const Arg<int> who(1); |
| 261 return If(which == PRIO_PROCESS, | 280 return If(which == PRIO_PROCESS, |
| 262 If(who == 0 || who == target_pid, Allow()).Else(Error(EPERM))) | 281 If(who == 0 || who == target_pid, Allow()).Else(Error(EPERM))) |
| 263 .Else(CrashSIGSYS()); | 282 .Else(CrashSIGSYS()); |
| 264 } | 283 } |
| 284 #endif |
| 265 | 285 |
| 266 ResultExpr RestrictClockID() { | 286 ResultExpr RestrictClockID() { |
| 267 static_assert(4 == sizeof(clockid_t), "clockid_t is not 32bit"); | 287 static_assert(4 == sizeof(clockid_t), "clockid_t is not 32bit"); |
| 268 const Arg<clockid_t> clockid(0); | 288 const Arg<clockid_t> clockid(0); |
| 269 return If( | 289 return If( |
| 270 #if defined(OS_CHROMEOS) | 290 #if defined(OS_CHROMEOS) |
| 271 // Allow the special clock for Chrome OS used by Chrome tracing. | 291 // Allow the special clock for Chrome OS used by Chrome tracing. |
| 272 clockid == base::TimeTicks::kClockSystemTrace || | 292 clockid == base::TimeTicks::kClockSystemTrace || |
| 273 #endif | 293 #endif |
| 274 clockid == CLOCK_MONOTONIC || | 294 clockid == CLOCK_MONOTONIC || |
| (...skipping 28 matching lines...) Expand all Loading... |
| 303 const Arg<pid_t> pid(0); | 323 const Arg<pid_t> pid(0); |
| 304 return If(pid == 0 || pid == target_pid, Allow()).Else(CrashSIGSYS()); | 324 return If(pid == 0 || pid == target_pid, Allow()).Else(CrashSIGSYS()); |
| 305 } | 325 } |
| 306 | 326 |
| 307 ResultExpr RestrictGetrusage() { | 327 ResultExpr RestrictGetrusage() { |
| 308 const Arg<int> who(0); | 328 const Arg<int> who(0); |
| 309 return If(who == RUSAGE_SELF, Allow()).Else(CrashSIGSYS()); | 329 return If(who == RUSAGE_SELF, Allow()).Else(CrashSIGSYS()); |
| 310 } | 330 } |
| 311 | 331 |
| 312 } // namespace sandbox. | 332 } // namespace sandbox. |
| OLD | NEW |