Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(186)

Unified Diff: components/nacl/loader/nonsfi/nonsfi_sandbox.cc

Issue 549653002: NonSFI sandbox: restrict futex(2) operations. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Rebase Created 6 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | components/nacl/loader/nonsfi/nonsfi_sandbox_unittest.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: components/nacl/loader/nonsfi/nonsfi_sandbox.cc
diff --git a/components/nacl/loader/nonsfi/nonsfi_sandbox.cc b/components/nacl/loader/nonsfi/nonsfi_sandbox.cc
index b5fe899746c3bc7a70b62193ccc693766e917216..5dc73b6002404c677c173886b03ea7cf9ff2fab8 100644
--- a/components/nacl/loader/nonsfi/nonsfi_sandbox.cc
+++ b/components/nacl/loader/nonsfi/nonsfi_sandbox.cc
@@ -6,12 +6,14 @@
#include <errno.h>
#include <fcntl.h>
+#include <linux/futex.h>
#include <linux/net.h>
+#include <sys/mman.h>
#include <sys/prctl.h>
#include <sys/ptrace.h>
-#include <sys/mman.h>
#include <sys/socket.h>
#include <sys/syscall.h>
+#include <sys/time.h>
#include "base/basictypes.h"
#include "base/logging.h"
@@ -28,11 +30,15 @@
#define MAP_STACK 0x20000
#endif
+#define CASES SANDBOX_BPF_DSL_CASES
+
using sandbox::CrashSIGSYS;
using sandbox::CrashSIGSYSClone;
+using sandbox::CrashSIGSYSFutex;
using sandbox::CrashSIGSYSPrctl;
using sandbox::bpf_dsl::Allow;
using sandbox::bpf_dsl::Arg;
+using sandbox::bpf_dsl::BoolExpr;
using sandbox::bpf_dsl::Error;
using sandbox::bpf_dsl::If;
using sandbox::bpf_dsl::ResultExpr;
@@ -95,6 +101,23 @@ ResultExpr RestrictClone() {
Allow()).Else(CrashSIGSYSClone());
}
+ResultExpr RestrictFutexOperation() {
+ // TODO(hamaji): Allow only FUTEX_PRIVATE_FLAG futexes.
+ const int kAllowedFutexFlags = FUTEX_PRIVATE_FLAG | FUTEX_CLOCK_REALTIME;
+ const int kOperationMask = ~kAllowedFutexFlags;
+ const Arg<int> op(1);
+ return Switch(op & kOperationMask)
+ .CASES((FUTEX_WAIT,
+ FUTEX_WAKE,
+ FUTEX_REQUEUE,
+ FUTEX_CMP_REQUEUE,
+ FUTEX_WAKE_OP,
+ FUTEX_WAIT_BITSET,
+ FUTEX_WAKE_BITSET),
+ Allow())
+ .Default(CrashSIGSYSFutex());
+}
+
ResultExpr RestrictPrctl() {
// base::PlatformThread::SetName() uses PR_SET_NAME so we return
// EPERM for it. Otherwise, we will raise SIGSYS.
@@ -214,8 +237,6 @@ ResultExpr NaClNonSfiBPFSandboxPolicy::EvaluateSyscall(int sysno) const {
#elif defined(__x86_64__)
case __NR_fstat:
#endif
- // TODO(hamaji): Allow only FUTEX_PRIVATE_FLAG.
- case __NR_futex:
// TODO(hamaji): Remove the need of gettid. Currently, this is
// called from PlatformThread::CurrentId().
case __NR_gettid:
@@ -256,6 +277,9 @@ ResultExpr NaClNonSfiBPFSandboxPolicy::EvaluateSyscall(int sysno) const {
#endif
return RestrictFcntlCommands();
+ case __NR_futex:
+ return RestrictFutexOperation();
+
#if defined(__x86_64__)
case __NR_mmap:
#endif
« no previous file with comments | « no previous file | components/nacl/loader/nonsfi/nonsfi_sandbox_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698