| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" | 5 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" |
| 6 | 6 |
| 7 // Some headers on Android are missing cdefs: crbug.com/172337. | 7 // Some headers on Android are missing cdefs: crbug.com/172337. |
| 8 // (We can't use OS_ANDROID here since build_config.h is not included). | 8 // (We can't use OS_ANDROID here since build_config.h is not included). |
| 9 #if defined(ANDROID) | 9 #if defined(ANDROID) |
| 10 #include <sys/cdefs.h> | 10 #include <sys/cdefs.h> |
| 11 #endif | 11 #endif |
| 12 | 12 |
| 13 #include <errno.h> | 13 #include <errno.h> |
| 14 #include <fcntl.h> | 14 #include <fcntl.h> |
| 15 #include <string.h> | 15 #include <string.h> |
| 16 #include <sys/prctl.h> | 16 #include <sys/prctl.h> |
| 17 #include <sys/stat.h> | 17 #include <sys/stat.h> |
| 18 #include <sys/syscall.h> | 18 #include <sys/syscall.h> |
| 19 #include <sys/types.h> | 19 #include <sys/types.h> |
| 20 #include <time.h> | 20 #include <time.h> |
| 21 #include <unistd.h> | 21 #include <unistd.h> |
| 22 | 22 |
| 23 #include "base/compiler_specific.h" | 23 #include "base/compiler_specific.h" |
| 24 #include "base/logging.h" | 24 #include "base/logging.h" |
| 25 #include "base/macros.h" |
| 25 #include "base/memory/scoped_ptr.h" | 26 #include "base/memory/scoped_ptr.h" |
| 26 #include "base/posix/eintr_wrapper.h" | 27 #include "base/posix/eintr_wrapper.h" |
| 27 #include "sandbox/linux/seccomp-bpf/codegen.h" | 28 #include "sandbox/linux/seccomp-bpf/codegen.h" |
| 28 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_compatibility_policy.h" | |
| 29 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" | 29 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" |
| 30 #include "sandbox/linux/seccomp-bpf/syscall.h" | 30 #include "sandbox/linux/seccomp-bpf/syscall.h" |
| 31 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h" | 31 #include "sandbox/linux/seccomp-bpf/syscall_iterator.h" |
| 32 #include "sandbox/linux/seccomp-bpf/verifier.h" | 32 #include "sandbox/linux/seccomp-bpf/verifier.h" |
| 33 | 33 |
| 34 namespace sandbox { | 34 namespace sandbox { |
| 35 | 35 |
| 36 namespace { | 36 namespace { |
| 37 | 37 |
| 38 const int kExpectedExitCode = 100; | 38 const int kExpectedExitCode = 100; |
| (...skipping 11 matching lines...) Expand all Loading... |
| 50 "Failed to set up stderr: "; | 50 "Failed to set up stderr: "; |
| 51 if (HANDLE_EINTR(write(out_fd, msg, sizeof(msg) - 1)) > 0 && error_string && | 51 if (HANDLE_EINTR(write(out_fd, msg, sizeof(msg) - 1)) > 0 && error_string && |
| 52 HANDLE_EINTR(write(out_fd, error_string, strlen(error_string))) > 0 && | 52 HANDLE_EINTR(write(out_fd, error_string, strlen(error_string))) > 0 && |
| 53 HANDLE_EINTR(write(out_fd, "\n", 1))) { | 53 HANDLE_EINTR(write(out_fd, "\n", 1))) { |
| 54 } | 54 } |
| 55 } | 55 } |
| 56 #endif // !defined(NDEBUG) | 56 #endif // !defined(NDEBUG) |
| 57 | 57 |
| 58 // We define a really simple sandbox policy. It is just good enough for us | 58 // We define a really simple sandbox policy. It is just good enough for us |
| 59 // to tell that the sandbox has actually been activated. | 59 // to tell that the sandbox has actually been activated. |
| 60 ErrorCode ProbeEvaluator(SandboxBPF*, int sysnum, void*) __attribute__((const)); | 60 class ProbePolicy : public SandboxBPFPolicy { |
| 61 ErrorCode ProbeEvaluator(SandboxBPF*, int sysnum, void*) { | 61 public: |
| 62 switch (sysnum) { | 62 ProbePolicy() {} |
| 63 case __NR_getpid: | 63 virtual ErrorCode EvaluateSyscall(SandboxBPF*, int sysnum) const OVERRIDE { |
| 64 // Return EPERM so that we can check that the filter actually ran. | 64 switch (sysnum) { |
| 65 return ErrorCode(EPERM); | 65 case __NR_getpid: |
| 66 case __NR_exit_group: | 66 // Return EPERM so that we can check that the filter actually ran. |
| 67 // Allow exit() with a non-default return code. | 67 return ErrorCode(EPERM); |
| 68 return ErrorCode(ErrorCode::ERR_ALLOWED); | 68 case __NR_exit_group: |
| 69 default: | 69 // Allow exit() with a non-default return code. |
| 70 // Make everything else fail in an easily recognizable way. | 70 return ErrorCode(ErrorCode::ERR_ALLOWED); |
| 71 return ErrorCode(EINVAL); | 71 default: |
| 72 // Make everything else fail in an easily recognizable way. |
| 73 return ErrorCode(EINVAL); |
| 74 } |
| 72 } | 75 } |
| 73 } | 76 |
| 77 private: |
| 78 DISALLOW_COPY_AND_ASSIGN(ProbePolicy); |
| 79 }; |
| 74 | 80 |
| 75 void ProbeProcess(void) { | 81 void ProbeProcess(void) { |
| 76 if (syscall(__NR_getpid) < 0 && errno == EPERM) { | 82 if (syscall(__NR_getpid) < 0 && errno == EPERM) { |
| 77 syscall(__NR_exit_group, static_cast<intptr_t>(kExpectedExitCode)); | 83 syscall(__NR_exit_group, static_cast<intptr_t>(kExpectedExitCode)); |
| 78 } | 84 } |
| 79 } | 85 } |
| 80 | 86 |
| 81 ErrorCode AllowAllEvaluator(SandboxBPF*, int sysnum, void*) { | 87 class AllowAllPolicy : public SandboxBPFPolicy { |
| 82 DCHECK(SandboxBPF::IsValidSyscallNumber(sysnum)); | 88 public: |
| 83 return ErrorCode(ErrorCode::ERR_ALLOWED); | 89 AllowAllPolicy() {} |
| 84 } | 90 virtual ErrorCode EvaluateSyscall(SandboxBPF*, int sysnum) const OVERRIDE { |
| 91 DCHECK(SandboxBPF::IsValidSyscallNumber(sysnum)); |
| 92 return ErrorCode(ErrorCode::ERR_ALLOWED); |
| 93 } |
| 94 |
| 95 private: |
| 96 DISALLOW_COPY_AND_ASSIGN(AllowAllPolicy); |
| 97 }; |
| 85 | 98 |
| 86 void TryVsyscallProcess(void) { | 99 void TryVsyscallProcess(void) { |
| 87 time_t current_time; | 100 time_t current_time; |
| 88 // time() is implemented as a vsyscall. With an older glibc, with | 101 // time() is implemented as a vsyscall. With an older glibc, with |
| 89 // vsyscall=emulate and some versions of the seccomp BPF patch | 102 // vsyscall=emulate and some versions of the seccomp BPF patch |
| 90 // we may get SIGKILL-ed. Detect this! | 103 // we may get SIGKILL-ed. Detect this! |
| 91 if (time(¤t_time) != static_cast<time_t>(-1)) { | 104 if (time(¤t_time) != static_cast<time_t>(-1)) { |
| 92 syscall(__NR_exit_group, static_cast<intptr_t>(kExpectedExitCode)); | 105 syscall(__NR_exit_group, static_cast<intptr_t>(kExpectedExitCode)); |
| 93 } | 106 } |
| 94 } | 107 } |
| (...skipping 137 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 232 if (conds_) { | 245 if (conds_) { |
| 233 delete conds_; | 246 delete conds_; |
| 234 } | 247 } |
| 235 } | 248 } |
| 236 | 249 |
| 237 bool SandboxBPF::IsValidSyscallNumber(int sysnum) { | 250 bool SandboxBPF::IsValidSyscallNumber(int sysnum) { |
| 238 return SyscallIterator::IsValid(sysnum); | 251 return SyscallIterator::IsValid(sysnum); |
| 239 } | 252 } |
| 240 | 253 |
| 241 bool SandboxBPF::RunFunctionInPolicy(void (*code_in_sandbox)(), | 254 bool SandboxBPF::RunFunctionInPolicy(void (*code_in_sandbox)(), |
| 242 EvaluateSyscall syscall_evaluator, | 255 scoped_ptr<SandboxBPFPolicy> policy) { |
| 243 void* aux) { | |
| 244 // Block all signals before forking a child process. This prevents an | 256 // Block all signals before forking a child process. This prevents an |
| 245 // attacker from manipulating our test by sending us an unexpected signal. | 257 // attacker from manipulating our test by sending us an unexpected signal. |
| 246 sigset_t old_mask, new_mask; | 258 sigset_t old_mask, new_mask; |
| 247 if (sigfillset(&new_mask) || sigprocmask(SIG_BLOCK, &new_mask, &old_mask)) { | 259 if (sigfillset(&new_mask) || sigprocmask(SIG_BLOCK, &new_mask, &old_mask)) { |
| 248 SANDBOX_DIE("sigprocmask() failed"); | 260 SANDBOX_DIE("sigprocmask() failed"); |
| 249 } | 261 } |
| 250 int fds[2]; | 262 int fds[2]; |
| 251 if (pipe2(fds, O_NONBLOCK | O_CLOEXEC)) { | 263 if (pipe2(fds, O_NONBLOCK | O_CLOEXEC)) { |
| 252 SANDBOX_DIE("pipe() failed"); | 264 SANDBOX_DIE("pipe() failed"); |
| 253 } | 265 } |
| (...skipping 49 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 303 } | 315 } |
| 304 if (IGNORE_EINTR(close(fds[1]))) { | 316 if (IGNORE_EINTR(close(fds[1]))) { |
| 305 // This call to close() has been failing in strange ways. See | 317 // This call to close() has been failing in strange ways. See |
| 306 // crbug.com/152530. So we only fail in debug mode now. | 318 // crbug.com/152530. So we only fail in debug mode now. |
| 307 #if !defined(NDEBUG) | 319 #if !defined(NDEBUG) |
| 308 WriteFailedStderrSetupMessage(fds[1]); | 320 WriteFailedStderrSetupMessage(fds[1]); |
| 309 SANDBOX_DIE(NULL); | 321 SANDBOX_DIE(NULL); |
| 310 #endif | 322 #endif |
| 311 } | 323 } |
| 312 | 324 |
| 313 SetSandboxPolicyDeprecated(syscall_evaluator, aux); | 325 SetSandboxPolicy(policy.release()); |
| 314 if (!StartSandbox(PROCESS_SINGLE_THREADED)) { | 326 if (!StartSandbox(PROCESS_SINGLE_THREADED)) { |
| 315 SANDBOX_DIE(NULL); | 327 SANDBOX_DIE(NULL); |
| 316 } | 328 } |
| 317 | 329 |
| 318 // Run our code in the sandbox. | 330 // Run our code in the sandbox. |
| 319 code_in_sandbox(); | 331 code_in_sandbox(); |
| 320 | 332 |
| 321 // code_in_sandbox() is not supposed to return here. | 333 // code_in_sandbox() is not supposed to return here. |
| 322 SANDBOX_DIE(NULL); | 334 SANDBOX_DIE(NULL); |
| 323 } | 335 } |
| (...skipping 28 matching lines...) Expand all Loading... |
| 352 } | 364 } |
| 353 } | 365 } |
| 354 if (IGNORE_EINTR(close(fds[0]))) { | 366 if (IGNORE_EINTR(close(fds[0]))) { |
| 355 SANDBOX_DIE("close() failed"); | 367 SANDBOX_DIE("close() failed"); |
| 356 } | 368 } |
| 357 | 369 |
| 358 return rc; | 370 return rc; |
| 359 } | 371 } |
| 360 | 372 |
| 361 bool SandboxBPF::KernelSupportSeccompBPF() { | 373 bool SandboxBPF::KernelSupportSeccompBPF() { |
| 362 return RunFunctionInPolicy(ProbeProcess, ProbeEvaluator, 0) && | 374 return RunFunctionInPolicy(ProbeProcess, |
| 363 RunFunctionInPolicy(TryVsyscallProcess, AllowAllEvaluator, 0); | 375 scoped_ptr<SandboxBPFPolicy>(new ProbePolicy())) && |
| 376 RunFunctionInPolicy( |
| 377 TryVsyscallProcess, |
| 378 scoped_ptr<SandboxBPFPolicy>(new AllowAllPolicy())); |
| 364 } | 379 } |
| 365 | 380 |
| 366 SandboxBPF::SandboxStatus SandboxBPF::SupportsSeccompSandbox(int proc_fd) { | 381 SandboxBPF::SandboxStatus SandboxBPF::SupportsSeccompSandbox(int proc_fd) { |
| 367 // It the sandbox is currently active, we clearly must have support for | 382 // It the sandbox is currently active, we clearly must have support for |
| 368 // sandboxing. | 383 // sandboxing. |
| 369 if (status_ == STATUS_ENABLED) { | 384 if (status_ == STATUS_ENABLED) { |
| 370 return status_; | 385 return status_; |
| 371 } | 386 } |
| 372 | 387 |
| 373 // Even if the sandbox was previously available, something might have | 388 // Even if the sandbox was previously available, something might have |
| (...skipping 94 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 468 return true; | 483 return true; |
| 469 } | 484 } |
| 470 | 485 |
| 471 void SandboxBPF::PolicySanityChecks(SandboxBPFPolicy* policy) { | 486 void SandboxBPF::PolicySanityChecks(SandboxBPFPolicy* policy) { |
| 472 if (!IsDenied(policy->InvalidSyscall(this))) { | 487 if (!IsDenied(policy->InvalidSyscall(this))) { |
| 473 SANDBOX_DIE("Policies should deny invalid system calls."); | 488 SANDBOX_DIE("Policies should deny invalid system calls."); |
| 474 } | 489 } |
| 475 return; | 490 return; |
| 476 } | 491 } |
| 477 | 492 |
| 478 // Deprecated API, supported with a wrapper to the new API. | |
| 479 void SandboxBPF::SetSandboxPolicyDeprecated(EvaluateSyscall syscall_evaluator, | |
| 480 void* aux) { | |
| 481 if (sandbox_has_started_ || !conds_) { | |
| 482 SANDBOX_DIE("Cannot change policy after sandbox has started"); | |
| 483 } | |
| 484 SetSandboxPolicy(new CompatibilityPolicy<void>(syscall_evaluator, aux)); | |
| 485 } | |
| 486 | |
| 487 // Don't take a scoped_ptr here, polymorphism make their use awkward. | 493 // Don't take a scoped_ptr here, polymorphism make their use awkward. |
| 488 void SandboxBPF::SetSandboxPolicy(SandboxBPFPolicy* policy) { | 494 void SandboxBPF::SetSandboxPolicy(SandboxBPFPolicy* policy) { |
| 489 DCHECK(!policy_); | 495 DCHECK(!policy_); |
| 490 if (sandbox_has_started_ || !conds_) { | 496 if (sandbox_has_started_ || !conds_) { |
| 491 SANDBOX_DIE("Cannot change policy after sandbox has started"); | 497 SANDBOX_DIE("Cannot change policy after sandbox has started"); |
| 492 } | 498 } |
| 493 PolicySanityChecks(policy); | 499 PolicySanityChecks(policy); |
| 494 policy_.reset(policy); | 500 policy_.reset(policy); |
| 495 } | 501 } |
| 496 | 502 |
| (...skipping 523 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1020 &*conds_->insert(failed).first); | 1026 &*conds_->insert(failed).first); |
| 1021 } | 1027 } |
| 1022 | 1028 |
| 1023 ErrorCode SandboxBPF::Kill(const char* msg) { | 1029 ErrorCode SandboxBPF::Kill(const char* msg) { |
| 1024 return Trap(BPFFailure, const_cast<char*>(msg)); | 1030 return Trap(BPFFailure, const_cast<char*>(msg)); |
| 1025 } | 1031 } |
| 1026 | 1032 |
| 1027 SandboxBPF::SandboxStatus SandboxBPF::status_ = STATUS_UNKNOWN; | 1033 SandboxBPF::SandboxStatus SandboxBPF::status_ = STATUS_UNKNOWN; |
| 1028 | 1034 |
| 1029 } // namespace sandbox | 1035 } // namespace sandbox |
| OLD | NEW |