OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "sandbox/linux/seccomp-bpf-helpers/bpf_dsl.h" | 5 #include "sandbox/linux/seccomp-bpf-helpers/bpf_dsl.h" |
6 | 6 |
7 #include <netinet/in.h> | 7 #include <netinet/in.h> |
8 #include <sys/socket.h> | 8 #include <sys/socket.h> |
9 | 9 |
10 #include "base/macros.h" | 10 #include "base/macros.h" |
11 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" | 11 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" |
12 #include "sandbox/linux/seccomp-bpf/errorcode.h" | 12 #include "sandbox/linux/seccomp-bpf/errorcode.h" |
13 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" | 13 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" |
14 | 14 |
15 namespace sandbox { | 15 namespace sandbox { |
16 | 16 |
| 17 namespace bpf_dsl { |
| 18 |
17 namespace { | 19 namespace { |
18 | 20 |
19 class BasicPolicy : public SandboxBPFPolicy { | 21 class BasicPolicy : public SandboxBPFPolicyDSL { |
20 public: | 22 public: |
21 BasicPolicy() {} | 23 BasicPolicy() {} |
22 virtual ErrorCode EvaluateSyscall(SandboxBPF* sb, int sysno) const OVERRIDE { | 24 virtual ResultExpr EvaluateSyscall(int sysno) const OVERRIDE { |
23 if (sysno == __NR_getpgid) { | 25 if (sysno == __NR_getpgid) { |
24 const Arg<pid_t> pid(0); | 26 const Arg<pid_t> pid(0); |
25 return DSL(sb) | 27 return If(pid == 0).Then( |
26 .If(pid == 0).Then( | 28 Error(EPERM) |
27 ErrorCode(EPERM) | 29 ).Else( |
28 ).Else( | 30 Error(EINVAL) |
29 ErrorCode(EINVAL) | 31 ); |
30 ); | |
31 } | 32 } |
32 return ErrorCode(ErrorCode::ERR_ALLOWED); | 33 return Allow(); |
33 } | 34 } |
34 | 35 |
35 private: | 36 private: |
36 DISALLOW_COPY_AND_ASSIGN(BasicPolicy); | 37 DISALLOW_COPY_AND_ASSIGN(BasicPolicy); |
37 }; | 38 }; |
38 | 39 |
39 BPF_TEST_C(BPFDSL, Basic, BasicPolicy) { | 40 BPF_TEST_C(BPFDSL, Basic, BasicPolicy) { |
40 BPF_ASSERT_EQ(-1, getpgid(0)); | 41 BPF_ASSERT_EQ(-1, getpgid(0)); |
41 BPF_ASSERT_EQ(EPERM, errno); | 42 BPF_ASSERT_EQ(EPERM, errno); |
42 | 43 |
43 BPF_ASSERT_EQ(-1, getpgid(1)); | 44 BPF_ASSERT_EQ(-1, getpgid(1)); |
44 BPF_ASSERT_EQ(EINVAL, errno); | 45 BPF_ASSERT_EQ(EINVAL, errno); |
45 } | 46 } |
46 | 47 |
47 class FancyPolicy : public SandboxBPFPolicy { | 48 class FancyPolicy : public SandboxBPFPolicyDSL { |
48 public: | 49 public: |
49 FancyPolicy() {} | 50 FancyPolicy() {} |
50 virtual ErrorCode EvaluateSyscall(SandboxBPF* sb, int sysno) const OVERRIDE { | 51 virtual ResultExpr EvaluateSyscall(int sysno) const OVERRIDE { |
51 if (sysno == __NR_socketpair) { | 52 if (sysno == __NR_socketpair) { |
52 const Arg<int> domain(0), type(1), protocol(2); | 53 const Arg<int> domain(0), type(1), protocol(2); |
53 return DSL(sb) | 54 return If(domain == AF_UNIX && |
54 .If(domain == AF_UNIX && | 55 (type == SOCK_STREAM || type == SOCK_DGRAM) && |
55 (type == SOCK_STREAM || type == SOCK_DGRAM) && | 56 protocol == 0).Then( |
56 protocol == 0).Then( | 57 Error(EPERM) |
57 ErrorCode(EPERM) | 58 ).Else( |
58 ).Else( | 59 Error(EINVAL) |
59 ErrorCode(EINVAL) | 60 ); |
60 ); | |
61 } | 61 } |
62 return ErrorCode(ErrorCode::ERR_ALLOWED); | 62 return Allow(); |
63 } | 63 } |
64 | 64 |
65 private: | 65 private: |
66 DISALLOW_COPY_AND_ASSIGN(FancyPolicy); | 66 DISALLOW_COPY_AND_ASSIGN(FancyPolicy); |
67 }; | 67 }; |
68 | 68 |
69 void AssertSocketPairError(int expected_errno, | 69 void AssertSocketPairError(int expected_errno, |
70 int domain, | 70 int domain, |
71 int type, | 71 int type, |
72 int protocol) { | 72 int protocol) { |
(...skipping 11 matching lines...) Loading... |
84 AssertSocketPairError(EINVAL, AF_INET, SOCK_STREAM, 0); | 84 AssertSocketPairError(EINVAL, AF_INET, SOCK_STREAM, 0); |
85 AssertSocketPairError(EINVAL, AF_UNIX, SOCK_SEQPACKET, 0); | 85 AssertSocketPairError(EINVAL, AF_UNIX, SOCK_SEQPACKET, 0); |
86 AssertSocketPairError(EINVAL, AF_UNIX, SOCK_STREAM, IPPROTO_TCP); | 86 AssertSocketPairError(EINVAL, AF_UNIX, SOCK_STREAM, IPPROTO_TCP); |
87 | 87 |
88 // Completely unacceptable combination; should also return EINVAL. | 88 // Completely unacceptable combination; should also return EINVAL. |
89 AssertSocketPairError(EINVAL, AF_INET, SOCK_SEQPACKET, IPPROTO_UDP); | 89 AssertSocketPairError(EINVAL, AF_INET, SOCK_SEQPACKET, IPPROTO_UDP); |
90 } | 90 } |
91 | 91 |
92 } // namespace | 92 } // namespace |
93 | 93 |
| 94 } // namespace bpf_dsl |
| 95 |
94 } // namespace sandbox | 96 } // namespace sandbox |
OLD | NEW |