Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <errno.h> | 5 #include <errno.h> |
| 6 #include <pthread.h> | 6 #include <pthread.h> |
| 7 #include <sched.h> | 7 #include <sched.h> |
| 8 #include <signal.h> | 8 #include <signal.h> |
| 9 #include <sys/prctl.h> | 9 #include <sys/prctl.h> |
| 10 #include <sys/ptrace.h> | 10 #include <sys/ptrace.h> |
| (...skipping 486 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 497 } | 497 } |
| 498 | 498 |
| 499 ErrorCode GreyListedPolicy(SandboxBPF* sandbox, int sysno, int* aux) { | 499 ErrorCode GreyListedPolicy(SandboxBPF* sandbox, int sysno, int* aux) { |
| 500 // Set the global environment for unsafe traps once. | 500 // Set the global environment for unsafe traps once. |
| 501 if (sysno == MIN_SYSCALL) { | 501 if (sysno == MIN_SYSCALL) { |
| 502 EnableUnsafeTraps(); | 502 EnableUnsafeTraps(); |
| 503 } | 503 } |
| 504 | 504 |
| 505 // Some system calls must always be allowed, if our policy wants to make | 505 // Some system calls must always be allowed, if our policy wants to make |
| 506 // use of UnsafeTrap() | 506 // use of UnsafeTrap() |
| 507 if (sysno == __NR_rt_sigprocmask || sysno == __NR_rt_sigreturn | 507 if (SandboxBPF::IsRequiredForUnsafeTrap(sysno)) { |
| 508 #if defined(__NR_sigprocmask) | |
| 509 || | |
| 510 sysno == __NR_sigprocmask | |
| 511 #endif | |
| 512 #if defined(__NR_sigreturn) | |
| 513 || | |
| 514 sysno == __NR_sigreturn | |
| 515 #endif | |
| 516 ) { | |
| 517 return ErrorCode(ErrorCode::ERR_ALLOWED); | 508 return ErrorCode(ErrorCode::ERR_ALLOWED); |
| 518 } else if (sysno == __NR_getpid) { | 509 } else if (sysno == __NR_getpid) { |
| 519 // Disallow getpid() | 510 // Disallow getpid() |
| 520 return ErrorCode(EPERM); | 511 return ErrorCode(EPERM); |
| 521 } else if (SandboxBPF::IsValidSyscallNumber(sysno)) { | 512 } else if (SandboxBPF::IsValidSyscallNumber(sysno)) { |
| 522 // Allow (and count) all other system calls. | 513 // Allow (and count) all other system calls. |
| 523 return sandbox->UnsafeTrap(CountSyscalls, aux); | 514 return sandbox->UnsafeTrap(CountSyscalls, aux); |
| 524 } else { | 515 } else { |
| 525 return ErrorCode(ENOSYS); | 516 return ErrorCode(ENOSYS); |
| 526 } | 517 } |
| (...skipping 103 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 630 }; | 621 }; |
| 631 | 622 |
| 632 ErrorCode RedirectAllSyscallsPolicy::EvaluateSyscall(SandboxBPF* sandbox, | 623 ErrorCode RedirectAllSyscallsPolicy::EvaluateSyscall(SandboxBPF* sandbox, |
| 633 int sysno) const { | 624 int sysno) const { |
| 634 DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); | 625 DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); |
| 635 setenv(kSandboxDebuggingEnv, "t", 0); | 626 setenv(kSandboxDebuggingEnv, "t", 0); |
| 636 Die::SuppressInfoMessages(true); | 627 Die::SuppressInfoMessages(true); |
| 637 | 628 |
| 638 // Some system calls must always be allowed, if our policy wants to make | 629 // Some system calls must always be allowed, if our policy wants to make |
| 639 // use of UnsafeTrap() | 630 // use of UnsafeTrap() |
| 640 if (sysno == __NR_rt_sigprocmask || sysno == __NR_rt_sigreturn | 631 if (SandboxBPF::IsRequiredForUnsafeTrap(sysno)) |
| 641 #if defined(__NR_sigprocmask) | |
| 642 || | |
| 643 sysno == __NR_sigprocmask | |
| 644 #endif | |
| 645 #if defined(__NR_sigreturn) | |
| 646 || | |
| 647 sysno == __NR_sigreturn | |
| 648 #endif | |
| 649 ) { | |
| 650 return ErrorCode(ErrorCode::ERR_ALLOWED); | 632 return ErrorCode(ErrorCode::ERR_ALLOWED); |
| 651 } | |
| 652 return sandbox->UnsafeTrap(AllowRedirectedSyscall, NULL); | 633 return sandbox->UnsafeTrap(AllowRedirectedSyscall, NULL); |
| 653 } | 634 } |
| 654 | 635 |
| 655 int bus_handler_fd_ = -1; | 636 int bus_handler_fd_ = -1; |
| 656 | 637 |
| 657 void SigBusHandler(int, siginfo_t* info, void* void_context) { | 638 void SigBusHandler(int, siginfo_t* info, void* void_context) { |
| 658 BPF_ASSERT(write(bus_handler_fd_, "\x55", 1) == 1); | 639 BPF_ASSERT(write(bus_handler_fd_, "\x55", 1) == 1); |
| 659 } | 640 } |
| 660 | 641 |
| 661 BPF_TEST_C(SandboxBPF, SigBus, RedirectAllSyscallsPolicy) { | 642 BPF_TEST_C(SandboxBPF, SigBus, RedirectAllSyscallsPolicy) { |
| (...skipping 1592 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 2254 #if !defined(THREAD_SANITIZER) | 2235 #if !defined(THREAD_SANITIZER) |
| 2255 SANDBOX_DEATH_TEST(SandboxBPF, StartSingleThreadedAsMultiThreaded, | 2236 SANDBOX_DEATH_TEST(SandboxBPF, StartSingleThreadedAsMultiThreaded, |
| 2256 DEATH_MESSAGE("Cannot start sandbox; process may be single-threaded when " | 2237 DEATH_MESSAGE("Cannot start sandbox; process may be single-threaded when " |
| 2257 "reported as not")) { | 2238 "reported as not")) { |
| 2258 SandboxBPF sandbox; | 2239 SandboxBPF sandbox; |
| 2259 sandbox.SetSandboxPolicy(new AllowAllPolicy()); | 2240 sandbox.SetSandboxPolicy(new AllowAllPolicy()); |
| 2260 BPF_ASSERT(!sandbox.StartSandbox(SandboxBPF::PROCESS_MULTI_THREADED)); | 2241 BPF_ASSERT(!sandbox.StartSandbox(SandboxBPF::PROCESS_MULTI_THREADED)); |
| 2261 } | 2242 } |
| 2262 #endif // !defined(THREAD_SANITIZER) | 2243 #endif // !defined(THREAD_SANITIZER) |
| 2263 | 2244 |
| 2245 // A stub handler for the UnsafeTrap. Never called. | |
| 2246 intptr_t NoOpHandler(const struct arch_seccomp_data& args, void*) { | |
| 2247 return -1; | |
| 2248 } | |
| 2249 | |
| 2250 class UnsafeTrapWithCondPolicy : public SandboxBPFPolicy { | |
| 2251 public: | |
| 2252 UnsafeTrapWithCondPolicy() {} | |
| 2253 virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox, | |
| 2254 int sysno) const OVERRIDE { | |
| 2255 DCHECK(SandboxBPF::IsValidSyscallNumber(sysno)); | |
| 2256 setenv(kSandboxDebuggingEnv, "t", 0); | |
| 2257 Die::SuppressInfoMessages(true); | |
| 2258 | |
| 2259 if (SandboxBPF::IsRequiredForUnsafeTrap(sysno)) | |
| 2260 return ErrorCode(ErrorCode::ERR_ALLOWED); | |
| 2261 | |
| 2262 switch (sysno) { | |
| 2263 case __NR_close: | |
| 2264 return sandbox->Cond(0, | |
| 2265 ErrorCode::TP_32BIT, | |
| 2266 ErrorCode::OP_EQUAL, | |
| 2267 100, | |
| 2268 ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 2269 ErrorCode(EPERM)); | |
| 2270 case __NR_setgid: | |
| 2271 return sandbox->Cond(0, | |
| 2272 ErrorCode::TP_32BIT, | |
| 2273 ErrorCode::OP_EQUAL, | |
| 2274 100, | |
| 2275 ErrorCode(ErrorCode(ENOMEM)), | |
| 2276 sandbox->Cond(0, | |
| 2277 ErrorCode::TP_32BIT, | |
| 2278 ErrorCode::OP_EQUAL, | |
| 2279 200, | |
| 2280 ErrorCode(ENOSYS), | |
| 2281 ErrorCode(EPERM))); | |
| 2282 case __NR_write: | |
| 2283 case __NR_exit_group: | |
| 2284 return ErrorCode(ErrorCode::ERR_ALLOWED); | |
| 2285 case __NR_getppid: | |
| 2286 return sandbox->UnsafeTrap(NoOpHandler, NULL); | |
| 2287 default: | |
| 2288 return ErrorCode(EPERM); | |
| 2289 } | |
| 2290 } | |
| 2291 | |
| 2292 private: | |
| 2293 DISALLOW_COPY_AND_ASSIGN(UnsafeTrapWithCondPolicy); | |
| 2294 }; | |
| 2295 | |
| 2296 BPF_TEST_C(SandboxBPF, UnsafeTrapWithCond, UnsafeTrapWithCondPolicy) { | |
| 2297 BPF_ASSERT_EQ(-1, syscall(__NR_close, 100)); | |
|
jln (very slow on Chromium)
2014/09/02 18:41:54
In general it's not a good idea to add strong assu
leecam
2014/09/02 19:00:12
I agree, I was trying to think of a syscall that t
| |
| 2298 BPF_ASSERT_EQ(EBADF, errno); | |
| 2299 | |
| 2300 BPF_ASSERT_EQ(-1, syscall(__NR_close, 101)); | |
| 2301 BPF_ASSERT_EQ(EPERM, errno); | |
| 2302 | |
| 2303 BPF_ASSERT_EQ(-1, syscall(__NR_setgid, 100)); | |
| 2304 BPF_ASSERT_EQ(ENOMEM, errno); | |
| 2305 | |
| 2306 BPF_ASSERT_EQ(-1, syscall(__NR_setgid, 200)); | |
| 2307 BPF_ASSERT_EQ(ENOSYS, errno); | |
| 2308 | |
| 2309 BPF_ASSERT_EQ(-1, syscall(__NR_setgid, 300)); | |
| 2310 BPF_ASSERT_EQ(EPERM, errno); | |
| 2311 } | |
| 2312 | |
| 2264 } // namespace | 2313 } // namespace |
| 2265 | 2314 |
| 2266 } // namespace sandbox | 2315 } // namespace sandbox |
| OLD | NEW |