Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(386)

Side by Side Diff: sandbox/linux/services/yama_unittests.cc

Issue 378793002: Revert of Disable yama on 3.2 kernels with 32bit userland and 64bit kernel. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 6 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include <errno.h> 5 #include <errno.h>
6 #include <fcntl.h> 6 #include <fcntl.h>
7 #include <sys/ptrace.h> 7 #include <sys/ptrace.h>
8 #include <sys/stat.h> 8 #include <sys/stat.h>
9 #include <sys/types.h> 9 #include <sys/types.h>
10 #include <unistd.h> 10 #include <unistd.h>
11 11
12 #include "base/bind.h" 12 #include "base/bind.h"
13 #include "base/compiler_specific.h" 13 #include "base/compiler_specific.h"
14 #include "base/posix/eintr_wrapper.h" 14 #include "base/posix/eintr_wrapper.h"
15 #include "sandbox/linux/services/scoped_process.h" 15 #include "sandbox/linux/services/scoped_process.h"
16 #include "sandbox/linux/services/yama.h" 16 #include "sandbox/linux/services/yama.h"
17 #include "sandbox/linux/tests/unit_tests.h" 17 #include "sandbox/linux/tests/unit_tests.h"
18 #include "testing/gtest/include/gtest/gtest.h" 18 #include "testing/gtest/include/gtest/gtest.h"
19 19
20 namespace sandbox { 20 namespace sandbox {
21 21
22 namespace { 22 namespace {
23 23
24 bool HasLinux32Bug() {
25 #if defined(__i386__)
26 // On 3.2 kernels, yama doesn't work for 32-bit binaries on 64-bit kernels.
27 // This is fixed in 3.4.
28 bool is_kernel_64bit =
29 base::SysInfo::OperatingSystemArchitecture() == "x86_64";
30 bool is_linux = base::SysInfo::OperatingSystemName() == "Linux";
31 bool is_3_dot_2 = StartsWithASCII(
32 base::SysInfo::OperatingSystemVersion(), "3.2", /*case_sensitive=*/false);
33 if (is_kernel_64bit && is_linux && is_3_dot_2)
34 return true;
35 #endif // defined(__i386__)
36 return false;
37 }
38
39 bool CanPtrace(pid_t pid) { 24 bool CanPtrace(pid_t pid) {
40 int ret; 25 int ret;
41 ret = ptrace(PTRACE_ATTACH, pid, NULL, NULL); 26 ret = ptrace(PTRACE_ATTACH, pid, NULL, NULL);
42 if (ret == -1) { 27 if (ret == -1) {
43 CHECK_EQ(EPERM, errno); 28 CHECK_EQ(EPERM, errno);
44 return false; 29 return false;
45 } 30 }
46 // Wait for the process to be stopped so that it can be detached. 31 // Wait for the process to be stopped so that it can be detached.
47 siginfo_t process_info; 32 siginfo_t process_info;
48 int wait_ret = HANDLE_EINTR(waitid(P_PID, pid, &process_info, WSTOPPED)); 33 int wait_ret = HANDLE_EINTR(waitid(P_PID, pid, &process_info, WSTOPPED));
(...skipping 71 matching lines...) Expand 10 before | Expand all | Expand 10 after
120 // Attempts to enable or disable Yama restrictions. 105 // Attempts to enable or disable Yama restrictions.
121 void SetYamaRestrictions(bool enable_restriction) { 106 void SetYamaRestrictions(bool enable_restriction) {
122 if (enable_restriction) { 107 if (enable_restriction) {
123 Yama::RestrictPtracersToAncestors(); 108 Yama::RestrictPtracersToAncestors();
124 } else { 109 } else {
125 Yama::DisableYamaRestrictions(); 110 Yama::DisableYamaRestrictions();
126 } 111 }
127 } 112 }
128 113
129 TEST(Yama, RestrictPtraceWorks) { 114 TEST(Yama, RestrictPtraceWorks) {
130 if (HasLinux32Bug())
131 return;
132
133 ScopedProcess process1(base::Bind(&SetYamaRestrictions, true)); 115 ScopedProcess process1(base::Bind(&SetYamaRestrictions, true));
134 ASSERT_TRUE(process1.WaitForClosureToRun()); 116 ASSERT_TRUE(process1.WaitForClosureToRun());
135 117
136 if (Yama::IsEnforcing()) { 118 if (Yama::IsEnforcing()) {
137 // A sibling process cannot ptrace process1. 119 // A sibling process cannot ptrace process1.
138 ASSERT_FALSE(CanSubProcessPtrace(process1.GetPid())); 120 ASSERT_FALSE(CanSubProcessPtrace(process1.GetPid()));
139 } 121 }
140 122
141 if (!(Yama::GetStatus() & Yama::STATUS_STRICT_ENFORCING)) { 123 if (!(Yama::GetStatus() & Yama::STATUS_STRICT_ENFORCING)) {
142 // However, parent can ptrace process1. 124 // However, parent can ptrace process1.
143 ASSERT_TRUE(CanPtrace(process1.GetPid())); 125 ASSERT_TRUE(CanPtrace(process1.GetPid()));
144 126
145 // A sibling can ptrace process2 which disables any Yama protection. 127 // A sibling can ptrace process2 which disables any Yama protection.
146 ScopedProcess process2(base::Bind(&SetYamaRestrictions, false)); 128 ScopedProcess process2(base::Bind(&SetYamaRestrictions, false));
147 ASSERT_TRUE(process2.WaitForClosureToRun()); 129 ASSERT_TRUE(process2.WaitForClosureToRun());
148 ASSERT_TRUE(CanSubProcessPtrace(process2.GetPid())); 130 ASSERT_TRUE(CanSubProcessPtrace(process2.GetPid()));
149 } 131 }
150 } 132 }
151 133
152 void DoNothing() {} 134 void DoNothing() {}
153 135
154 SANDBOX_TEST(Yama, RestrictPtraceIsDefault) { 136 SANDBOX_TEST(Yama, RestrictPtraceIsDefault) {
155 if (!Yama::IsPresent() || HasLinux32Bug()) 137 if (!Yama::IsPresent())
156 return; 138 return;
157 139
158 CHECK(Yama::DisableYamaRestrictions()); 140 CHECK(Yama::DisableYamaRestrictions());
159 ScopedProcess process1(base::Bind(&DoNothing)); 141 ScopedProcess process1(base::Bind(&DoNothing));
160 142
161 if (Yama::IsEnforcing()) { 143 if (Yama::IsEnforcing()) {
162 // Check that process1 is protected by Yama, even though it has 144 // Check that process1 is protected by Yama, even though it has
163 // been created from a process that disabled Yama. 145 // been created from a process that disabled Yama.
164 CHECK(!CanSubProcessPtrace(process1.GetPid())); 146 CHECK(!CanSubProcessPtrace(process1.GetPid()));
165 } 147 }
166 } 148 }
167 149
168 } // namespace 150 } // namespace
169 151
170 } // namespace sandbox 152 } // namespace sandbox
OLDNEW
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698