Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "components/nacl/loader/nonsfi/nonsfi_sandbox.h" | |
| 6 | |
| 7 #include <errno.h> | |
| 8 #include <fcntl.h> | |
| 9 #include <pthread.h> | |
| 10 #include <sched.h> | |
| 11 #include <signal.h> | |
| 12 #include <stdlib.h> | |
| 13 #include <string.h> | |
| 14 #include <sys/mman.h> | |
| 15 #include <sys/prctl.h> | |
| 16 #include <sys/ptrace.h> | |
| 17 #include <sys/socket.h> | |
| 18 #include <sys/syscall.h> | |
| 19 #include <sys/types.h> | |
| 20 #include <sys/wait.h> | |
| 21 #include <unistd.h> | |
| 22 | |
| 23 #include "base/bind.h" | |
| 24 #include "base/callback.h" | |
| 25 #include "base/compiler_specific.h" | |
| 26 #include "base/files/scoped_file.h" | |
| 27 #include "base/logging.h" | |
| 28 #include "base/posix/eintr_wrapper.h" | |
| 29 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" | |
| 30 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" | |
| 31 | |
| 32 namespace { | |
| 33 | |
| 34 void DoPipe(base::ScopedFD* fds) { | |
| 35 int tmp_fds[2]; | |
| 36 BPF_ASSERT_EQ(0, pipe(tmp_fds)); | |
| 37 fds[0].reset(tmp_fds[0]); | |
| 38 fds[1].reset(tmp_fds[1]); | |
| 39 } | |
| 40 | |
| 41 void DoSocketpair(base::ScopedFD* fds) { | |
| 42 int tmp_fds[2]; | |
| 43 BPF_ASSERT_EQ(0, socketpair(AF_UNIX, SOCK_STREAM, 0, tmp_fds)); | |
| 44 fds[0].reset(tmp_fds[0]); | |
| 45 fds[1].reset(tmp_fds[1]); | |
| 46 } | |
| 47 | |
| 48 TEST(NaClNonSfiSandboxTest, BPFIsSupported) { | |
| 49 bool seccomp_bpf_supported = false; | |
| 50 // Seccomp-BPF tests die under TSAN v2. See http://crbug.com/356588 | |
| 51 #if !defined(THREAD_SANITIZER) | |
| 52 seccomp_bpf_supported = ( | |
| 53 sandbox::SandboxBPF::SupportsSeccompSandbox(-1) == | |
| 54 sandbox::SandboxBPF::STATUS_AVAILABLE); | |
| 55 #endif | |
| 56 | |
| 57 if (!seccomp_bpf_supported) { | |
| 58 LOG(ERROR) << "Seccomp BPF is not supported, these tests " | |
| 59 << "will pass without running"; | |
| 60 } | |
| 61 } | |
| 62 | |
| 63 BPF_DEATH_TEST(NaClNonSfiSandboxTest, invalid_sysno, | |
| 64 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 65 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 66 syscall(999); | |
| 67 } | |
| 68 | |
| 69 const int kExpectedValue = 123; | |
| 70 | |
| 71 void* SetValueInThread(void* test_val_ptr) { | |
| 72 *reinterpret_cast<int*>(test_val_ptr) = kExpectedValue; | |
| 73 return NULL; | |
| 74 } | |
| 75 | |
| 76 // To make this test pass, we need to allow sched_getaffinity and | |
| 77 // mmap. We just disable this test not to complicate the sandbox. | |
| 78 BPF_TEST(NaClNonSfiSandboxTest, DISABLE_ON_ASAN(clone_by_pthread_create), | |
| 79 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 80 // clone call for thread creation is allowed. | |
| 81 pthread_t th; | |
| 82 int test_val = 42; | |
| 83 BPF_ASSERT_EQ(0, pthread_create(&th, NULL, &SetValueInThread, &test_val)); | |
| 84 BPF_ASSERT_EQ(0, pthread_join(th, NULL)); | |
| 85 BPF_ASSERT_EQ(kExpectedValue, test_val); | |
| 86 } | |
| 87 | |
| 88 int DoFork() { | |
| 89 // Call clone() to do a fork(). | |
| 90 const int pid = syscall(__NR_clone, SIGCHLD, NULL); | |
| 91 if (pid == 0) | |
| 92 _exit(0); | |
| 93 return pid; | |
| 94 } | |
| 95 | |
| 96 // The sanity check for DoFork without the sandbox. | |
| 97 TEST(NaClNonSfiSandboxTest, DoFork) { | |
| 98 const int pid = DoFork(); | |
| 99 ASSERT_LT(0, pid); | |
| 100 int status; | |
| 101 ASSERT_EQ(pid, HANDLE_EINTR(waitpid(pid, &status, 0))); | |
| 102 ASSERT_TRUE(WIFEXITED(status)); | |
| 103 ASSERT_EQ(0, WEXITSTATUS(status)); | |
| 104 } | |
| 105 | |
| 106 // Then, try this in the sandbox. | |
| 107 BPF_DEATH_TEST(NaClNonSfiSandboxTest, clone_for_fork, | |
| 108 DEATH_MESSAGE(sandbox::GetCloneErrorMessageContentForTests()), | |
| 109 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 110 DoFork(); | |
| 111 } | |
| 112 | |
| 113 BPF_TEST(NaClNonSfiSandboxTest, prctl_SET_NAME, | |
| 114 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 115 errno = 0; | |
| 116 BPF_ASSERT_EQ(-1, syscall(__NR_prctl, PR_SET_NAME, "foo")); | |
| 117 BPF_ASSERT_EQ(EPERM, errno); | |
| 118 } | |
| 119 | |
| 120 BPF_DEATH_TEST(NaClNonSfiSandboxTest, prctl_SET_DUMPABLE, | |
| 121 DEATH_MESSAGE(sandbox::GetPrctlErrorMessageContentForTests()), | |
| 122 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 123 syscall(__NR_prctl, PR_SET_DUMPABLE, 1UL); | |
| 124 } | |
| 125 | |
| 126 BPF_TEST(NaClNonSfiSandboxTest, socketcall_allowed, | |
| 127 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 128 base::ScopedFD fds[2]; | |
| 129 struct msghdr msg = {}; | |
| 130 struct iovec iov; | |
| 131 std::string payload("foo"); | |
| 132 iov.iov_base = &payload[0]; | |
| 133 iov.iov_len = payload.size(); | |
| 134 msg.msg_iov = &iov; | |
| 135 msg.msg_iovlen = 1; | |
| 136 DoSocketpair(fds); | |
| 137 BPF_ASSERT_EQ(static_cast<int>(payload.size()), | |
| 138 HANDLE_EINTR(sendmsg(fds[1].get(), &msg, 0))); | |
| 139 BPF_ASSERT_EQ(static_cast<int>(payload.size()), | |
| 140 HANDLE_EINTR(recvmsg(fds[0].get(), &msg, 0))); | |
| 141 BPF_ASSERT_EQ(0, shutdown(fds[0].get(), SHUT_RDWR)); | |
| 142 } | |
| 143 | |
| 144 BPF_DEATH_TEST(NaClNonSfiSandboxTest, accept, | |
| 145 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 146 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 147 accept(0, NULL, NULL); | |
| 148 } | |
| 149 | |
| 150 BPF_DEATH_TEST(NaClNonSfiSandboxTest, bind, | |
| 151 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 152 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 153 bind(0, NULL, 0); | |
| 154 } | |
| 155 | |
| 156 BPF_DEATH_TEST(NaClNonSfiSandboxTest, connect, | |
| 157 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 158 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 159 connect(0, NULL, 0); | |
| 160 } | |
| 161 | |
| 162 BPF_DEATH_TEST(NaClNonSfiSandboxTest, getpeername, | |
| 163 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 164 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 165 getpeername(0, NULL, NULL); | |
| 166 } | |
| 167 | |
| 168 BPF_DEATH_TEST(NaClNonSfiSandboxTest, getsockname, | |
| 169 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 170 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 171 struct sockaddr addr; | |
| 172 socklen_t addrlen = 0; | |
| 173 getsockname(0, &addr, &addrlen); | |
| 174 } | |
| 175 | |
| 176 BPF_DEATH_TEST(NaClNonSfiSandboxTest, getsockopt, | |
| 177 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 178 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 179 getsockopt(0, 0, 0, NULL, NULL); | |
| 180 } | |
| 181 | |
| 182 BPF_DEATH_TEST(NaClNonSfiSandboxTest, listen, | |
| 183 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 184 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 185 listen(0, 0); | |
| 186 } | |
| 187 | |
| 188 BPF_DEATH_TEST(NaClNonSfiSandboxTest, recv, | |
| 189 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 190 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 191 recv(0, NULL, 0, 0); | |
| 192 } | |
| 193 | |
| 194 BPF_DEATH_TEST(NaClNonSfiSandboxTest, recvfrom, | |
| 195 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 196 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 197 recvfrom(0, NULL, 0, 0, NULL, NULL); | |
| 198 } | |
| 199 | |
| 200 BPF_DEATH_TEST(NaClNonSfiSandboxTest, send, | |
| 201 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 202 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 203 send(0, NULL, 0, 0); | |
| 204 } | |
| 205 | |
| 206 BPF_DEATH_TEST(NaClNonSfiSandboxTest, sendto, | |
| 207 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 208 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 209 sendto(0, NULL, 0, 0, NULL, 0); | |
| 210 } | |
| 211 | |
| 212 BPF_DEATH_TEST(NaClNonSfiSandboxTest, setsockopt, | |
| 213 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 214 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 215 setsockopt(0, 0, 0, NULL, 0); | |
| 216 } | |
| 217 | |
| 218 BPF_DEATH_TEST(NaClNonSfiSandboxTest, socket, | |
| 219 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 220 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 221 socket(0, 0, 0); | |
| 222 } | |
| 223 | |
| 224 #if defined(__x86_64__) || defined(__arm__) | |
| 225 BPF_DEATH_TEST(NaClNonSfiSandboxTest, socketpair, | |
| 226 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 227 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 228 int fds[2]; | |
| 229 socketpair(AF_INET, SOCK_STREAM, 0, fds); | |
| 230 } | |
| 231 #endif | |
| 232 | |
| 233 BPF_TEST(NaClNonSfiSandboxTest, fcntl_SETFD_allowed, | |
| 234 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 235 base::ScopedFD fds[2]; | |
| 236 DoSocketpair(fds); | |
| 237 BPF_ASSERT_EQ(0, fcntl(fds[0].get(), F_SETFD, FD_CLOEXEC)); | |
| 238 } | |
| 239 | |
| 240 BPF_DEATH_TEST(NaClNonSfiSandboxTest, fcntl_SETFD, | |
| 241 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 242 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 243 base::ScopedFD fds[2]; | |
| 244 DoSocketpair(fds); | |
| 245 fcntl(fds[0].get(), F_SETFD, 99); | |
| 246 } | |
| 247 | |
| 248 BPF_TEST(NaClNonSfiSandboxTest, fcntl_GETFL_SETFL_allowed, | |
| 249 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 250 base::ScopedFD fds[2]; | |
| 251 DoPipe(fds); | |
| 252 const int fd = fds[0].get(); | |
| 253 BPF_ASSERT_EQ(0, fcntl(fd, F_GETFL)); | |
| 254 BPF_ASSERT_EQ(0, fcntl(fd, F_SETFL, O_RDWR | O_NONBLOCK)); | |
| 255 BPF_ASSERT_EQ(O_NONBLOCK, fcntl(fd, F_GETFL)); | |
| 256 } | |
| 257 | |
| 258 BPF_DEATH_TEST(NaClNonSfiSandboxTest, fcntl_GETFL_SETFL, | |
| 259 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 260 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 261 base::ScopedFD fds[2]; | |
| 262 DoSocketpair(fds); | |
| 263 fcntl(fds[0].get(), F_SETFL, O_APPEND); | |
| 264 } | |
| 265 | |
| 266 BPF_DEATH_TEST(NaClNonSfiSandboxTest, fcntl_DUPFD, | |
| 267 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 268 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 269 fcntl(0, F_DUPFD); | |
| 270 } | |
| 271 | |
| 272 BPF_DEATH_TEST(NaClNonSfiSandboxTest, fcntl_DUPFD_CLOEXEC, | |
| 273 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 274 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 275 fcntl(0, F_DUPFD_CLOEXEC); | |
| 276 } | |
| 277 | |
| 278 void* DoAllowedAnonymousMmap() { | |
| 279 return mmap(NULL, getpagesize(), PROT_READ | PROT_WRITE, | |
| 280 MAP_ANONYMOUS | MAP_SHARED, -1, 0); | |
| 281 } | |
| 282 | |
| 283 BPF_TEST(NaClNonSfiSandboxTest, mmap_allowed, | |
| 284 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 285 void* ptr = DoAllowedAnonymousMmap(); | |
| 286 BPF_ASSERT_NE(MAP_FAILED, ptr); | |
| 287 BPF_ASSERT_EQ(0, munmap(ptr, getpagesize())); | |
| 288 } | |
| 289 | |
| 290 BPF_DEATH_TEST(NaClNonSfiSandboxTest, mmap_unallowed_flag, | |
| 291 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 292 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 293 mmap(NULL, getpagesize(), PROT_READ | PROT_WRITE, | |
| 294 MAP_ANONYMOUS | MAP_POPULATE, -1, 0); | |
| 295 } | |
| 296 | |
| 297 BPF_DEATH_TEST(NaClNonSfiSandboxTest, mmap_unallowed_prot, | |
| 298 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 299 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 300 mmap(NULL, getpagesize(), PROT_READ | PROT_GROWSDOWN, | |
| 301 MAP_ANONYMOUS, -1, 0); | |
| 302 } | |
| 303 | |
| 304 // TODO(hamaji): Disallow RWX mmap. | |
| 305 #if 0 | |
| 306 BPF_DEATH_TEST(NaClNonSfiSandboxTest, mmap_rwx, | |
| 307 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 308 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 309 mmap(NULL, getpagesize(), PROT_READ | PROT_WRITE | PROT_EXEC, | |
| 310 MAP_ANONYMOUS, -1, 0); | |
| 311 } | |
| 312 #endif | |
| 313 | |
| 314 BPF_TEST(NaClNonSfiSandboxTest, mprotect_allowed, | |
| 315 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 316 void* ptr = DoAllowedAnonymousMmap(); | |
| 317 BPF_ASSERT_NE(MAP_FAILED, ptr); | |
| 318 BPF_ASSERT_EQ(0, mprotect(ptr, getpagesize(), PROT_READ)); | |
| 319 BPF_ASSERT_EQ(0, munmap(ptr, getpagesize())); | |
| 320 } | |
| 321 | |
| 322 BPF_DEATH_TEST(NaClNonSfiSandboxTest, mprotect_unallowed_prot, | |
| 323 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 324 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 325 // We have tested DoAllowedAnonymousMmap is allowed in | |
| 326 // mmap_allowed, so we can make sure the following mprotect call | |
| 327 // kills the process. | |
| 328 void* ptr = DoAllowedAnonymousMmap(); | |
| 329 BPF_ASSERT_NE(MAP_FAILED, ptr); | |
| 330 mprotect(ptr, getpagesize(), PROT_READ | PROT_GROWSDOWN); | |
| 331 } | |
| 332 | |
| 333 BPF_TEST(NaClNonSfiSandboxTest, brk, | |
| 334 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 335 char* next_brk = static_cast<char*>(sbrk(0)) + getpagesize(); | |
| 336 // The kernel interface must return zero for brk. | |
| 337 BPF_ASSERT_EQ(0, syscall(__NR_brk, next_brk)); | |
| 338 // The libc wrapper translates it to ENOMEM. | |
| 339 errno = 0; | |
| 340 BPF_ASSERT_EQ(-1, brk(next_brk)); | |
| 341 BPF_ASSERT_EQ(ENOMEM, errno); | |
| 342 } | |
| 343 | |
| 344 #if defined(__i386__) || defined(__arm__) | |
| 345 BPF_TEST(NaClNonSfiSandboxTest, getegid32_EPERM, | |
| 346 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 347 errno = 0; | |
| 348 BPF_ASSERT_EQ(-1, syscall(__NR_getegid32)); | |
| 349 BPF_ASSERT_EQ(EPERM, errno); | |
| 350 } | |
| 351 | |
| 352 BPF_TEST(NaClNonSfiSandboxTest, geteuid32_EPERM, | |
| 353 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 354 errno = 0; | |
| 355 BPF_ASSERT_EQ(-1, syscall(__NR_geteuid32)); | |
| 356 BPF_ASSERT_EQ(EPERM, errno); | |
| 357 } | |
| 358 | |
| 359 BPF_TEST(NaClNonSfiSandboxTest, getgid32_EPERM, | |
| 360 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 361 errno = 0; | |
| 362 BPF_ASSERT_EQ(-1, syscall(__NR_getgid32)); | |
| 363 BPF_ASSERT_EQ(EPERM, errno); | |
| 364 } | |
| 365 | |
| 366 BPF_TEST(NaClNonSfiSandboxTest, getuid32_EPERM, | |
| 367 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 368 errno = 0; | |
| 369 BPF_ASSERT_EQ(-1, syscall(__NR_getuid32)); | |
| 370 BPF_ASSERT_EQ(EPERM, errno); | |
| 371 } | |
| 372 | |
| 373 BPF_DEATH_TEST(NaClNonSfiSandboxTest, getegid_SIGSYS, | |
| 374 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 375 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 376 syscall(__NR_getegid); | |
| 377 } | |
| 378 | |
| 379 BPF_DEATH_TEST(NaClNonSfiSandboxTest, geteuid_SIGSYS, | |
| 380 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 381 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 382 syscall(__NR_geteuid); | |
| 383 } | |
| 384 | |
| 385 BPF_DEATH_TEST(NaClNonSfiSandboxTest, getgid_SIGSYS, | |
| 386 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 387 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 388 syscall(__NR_getgid); | |
| 389 } | |
| 390 | |
| 391 BPF_DEATH_TEST(NaClNonSfiSandboxTest, getuid_SIGSYS, | |
| 392 DEATH_MESSAGE(sandbox::GetErrorMessageContentForTests()), | |
| 393 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 394 syscall(__NR_getuid); | |
| 395 } | |
| 396 #endif | |
| 397 | |
| 398 #if defined(__x86_64__) | |
| 399 BPF_TEST(NaClNonSfiSandboxTest, getegid_EPERM, | |
|
hamaji
2014/04/17 19:13:43
I feel we might want to move these EPERM only test
| |
| 400 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 401 errno = 0; | |
| 402 BPF_ASSERT_EQ(-1, syscall(__NR_getegid)); | |
| 403 BPF_ASSERT_EQ(EPERM, errno); | |
| 404 } | |
| 405 | |
| 406 BPF_TEST(NaClNonSfiSandboxTest, geteuid_EPERM, | |
| 407 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 408 errno = 0; | |
| 409 BPF_ASSERT_EQ(-1, syscall(__NR_geteuid)); | |
| 410 BPF_ASSERT_EQ(EPERM, errno); | |
| 411 } | |
| 412 | |
| 413 BPF_TEST(NaClNonSfiSandboxTest, getgid_EPERM, | |
| 414 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 415 errno = 0; | |
| 416 BPF_ASSERT_EQ(-1, syscall(__NR_getgid)); | |
| 417 BPF_ASSERT_EQ(EPERM, errno); | |
| 418 } | |
| 419 | |
| 420 BPF_TEST(NaClNonSfiSandboxTest, getuid_EPERM, | |
| 421 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 422 errno = 0; | |
| 423 BPF_ASSERT_EQ(-1, syscall(__NR_getuid)); | |
| 424 BPF_ASSERT_EQ(EPERM, errno); | |
| 425 } | |
| 426 #endif | |
| 427 | |
| 428 BPF_TEST(NaClNonSfiSandboxTest, getpid_EPERM, | |
| 429 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 430 errno = 0; | |
| 431 BPF_ASSERT_EQ(-1, syscall(__NR_getpid)); | |
| 432 BPF_ASSERT_EQ(EPERM, errno); | |
| 433 } | |
| 434 | |
| 435 BPF_TEST(NaClNonSfiSandboxTest, ioctl_EPERM, | |
| 436 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 437 errno = 0; | |
| 438 BPF_ASSERT_EQ(-1, syscall(__NR_ioctl)); | |
| 439 BPF_ASSERT_EQ(EPERM, errno); | |
| 440 } | |
| 441 | |
| 442 BPF_TEST(NaClNonSfiSandboxTest, raedlink_EPERM, | |
|
Mark Seaborn
2014/04/17 19:36:57
Typo: "readlink"
hamaji
2014/04/17 19:42:07
Done.
| |
| 443 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 444 errno = 0; | |
| 445 BPF_ASSERT_EQ(-1, syscall(__NR_readlink)); | |
| 446 BPF_ASSERT_EQ(EPERM, errno); | |
| 447 } | |
| 448 | |
| 449 BPF_TEST(NaClNonSfiSandboxTest, madvise_EPERM, | |
| 450 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 451 errno = 0; | |
| 452 BPF_ASSERT_EQ(-1, syscall(__NR_madvise)); | |
| 453 BPF_ASSERT_EQ(EPERM, errno); | |
| 454 } | |
| 455 | |
| 456 BPF_TEST(NaClNonSfiSandboxTest, open_EPERM, | |
| 457 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 458 errno = 0; | |
| 459 BPF_ASSERT_EQ(-1, syscall(__NR_open)); | |
| 460 BPF_ASSERT_EQ(EPERM, errno); | |
| 461 } | |
| 462 | |
| 463 BPF_TEST(NaClNonSfiSandboxTest, ptrace_EPERM, | |
| 464 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 465 errno = 0; | |
| 466 BPF_ASSERT_EQ(-1, syscall(__NR_ptrace)); | |
| 467 BPF_ASSERT_EQ(EPERM, errno); | |
| 468 } | |
| 469 | |
| 470 BPF_TEST(NaClNonSfiSandboxTest, set_robust_list_EPERM, | |
| 471 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 472 errno = 0; | |
| 473 BPF_ASSERT_EQ(-1, syscall(__NR_set_robust_list)); | |
| 474 BPF_ASSERT_EQ(EPERM, errno); | |
| 475 } | |
| 476 | |
| 477 #if defined(__i386__) || defined(__x86_64__) | |
| 478 BPF_TEST(NaClNonSfiSandboxTest, time_EPERM, | |
| 479 nacl::nonsfi::NaClNonSfiBPFSandboxPolicy::EvaluateSyscallImpl) { | |
| 480 errno = 0; | |
| 481 BPF_ASSERT_EQ(-1, syscall(__NR_time)); | |
| 482 BPF_ASSERT_EQ(EPERM, errno); | |
| 483 } | |
| 484 #endif | |
| 485 | |
| 486 } // namespace | |
| OLD | NEW |