| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "components/nacl/loader/nonsfi/nonsfi_sandbox.h" | 5 #include "components/nacl/loader/nonsfi/nonsfi_sandbox.h" |
| 6 | 6 |
| 7 #include <errno.h> | 7 #include <errno.h> |
| 8 #include <fcntl.h> | 8 #include <fcntl.h> |
| 9 #include <linux/futex.h> | 9 #include <linux/futex.h> |
| 10 #include <linux/net.h> | 10 #include <linux/net.h> |
| 11 #include <sys/mman.h> | 11 #include <sys/mman.h> |
| 12 #include <sys/prctl.h> | 12 #include <sys/prctl.h> |
| 13 #include <sys/ptrace.h> | 13 #include <sys/ptrace.h> |
| 14 #include <sys/socket.h> | 14 #include <sys/socket.h> |
| 15 #include <sys/syscall.h> | 15 #include <sys/syscall.h> |
| 16 #include <sys/time.h> | 16 #include <sys/time.h> |
| 17 | 17 |
| 18 #include "base/basictypes.h" | 18 #include "base/basictypes.h" |
| 19 #include "base/logging.h" | 19 #include "base/logging.h" |
| 20 #include "base/time/time.h" | 20 #include "base/time/time.h" |
| 21 #include "build/build_config.h" | 21 #include "build/build_config.h" |
| 22 #include "content/public/common/sandbox_init.h" | 22 #include "content/public/common/sandbox_init.h" |
| 23 #include "sandbox/linux/bpf_dsl/bpf_dsl.h" | 23 #include "sandbox/linux/bpf_dsl/bpf_dsl.h" |
| 24 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" | 24 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" |
| 25 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h" |
| 25 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" | 26 #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" |
| 26 #include "sandbox/linux/services/linux_syscalls.h" | 27 #include "sandbox/linux/services/linux_syscalls.h" |
| 27 | 28 |
| 28 #if defined(__arm__) && !defined(MAP_STACK) | 29 #if defined(__arm__) && !defined(MAP_STACK) |
| 29 // Chrome OS Daisy (ARM) build environment has old headers. | 30 // Chrome OS Daisy (ARM) build environment has old headers. |
| 30 #define MAP_STACK 0x20000 | 31 #define MAP_STACK 0x20000 |
| 31 #endif | 32 #endif |
| 32 | 33 |
| 33 #define CASES SANDBOX_BPF_DSL_CASES | 34 #define CASES SANDBOX_BPF_DSL_CASES |
| 34 | 35 |
| (...skipping 25 matching lines...) Expand all Loading... |
| 60 // 3. F_SETFL: Used by evutil_make_socket_nonblocking in | 61 // 3. F_SETFL: Used by evutil_make_socket_nonblocking in |
| 61 // libevent and SetNonBlocking. As the latter mix O_NONBLOCK to | 62 // libevent and SetNonBlocking. As the latter mix O_NONBLOCK to |
| 62 // the return value of F_GETFL, so we need to allow O_ACCMODE in | 63 // the return value of F_GETFL, so we need to allow O_ACCMODE in |
| 63 // addition to O_NONBLOCK. | 64 // addition to O_NONBLOCK. |
| 64 const unsigned long denied_mask = ~(O_ACCMODE | O_NONBLOCK); | 65 const unsigned long denied_mask = ~(O_ACCMODE | O_NONBLOCK); |
| 65 return If((cmd == F_SETFD && long_arg == FD_CLOEXEC) || cmd == F_GETFL || | 66 return If((cmd == F_SETFD && long_arg == FD_CLOEXEC) || cmd == F_GETFL || |
| 66 (cmd == F_SETFL && (long_arg & denied_mask) == 0), | 67 (cmd == F_SETFL && (long_arg & denied_mask) == 0), |
| 67 Allow()).Else(CrashSIGSYS()); | 68 Allow()).Else(CrashSIGSYS()); |
| 68 } | 69 } |
| 69 | 70 |
| 70 ResultExpr RestrictClockID() { | |
| 71 // We allow accessing only CLOCK_MONOTONIC, CLOCK_PROCESS_CPUTIME_ID, | |
| 72 // CLOCK_REALTIME, and CLOCK_THREAD_CPUTIME_ID. In particular, this disallows | |
| 73 // access to arbitrary per-{process,thread} CPU-time clock IDs (such as those | |
| 74 // returned by {clock,pthread}_getcpuclockid), which can leak information | |
| 75 // about the state of the host OS. | |
| 76 COMPILE_ASSERT(4 == sizeof(clockid_t), clockid_is_not_32bit); | |
| 77 const Arg<clockid_t> clockid(0); | |
| 78 return If( | |
| 79 #if defined(OS_CHROMEOS) | |
| 80 // Allow the special clock for Chrome OS used by Chrome tracing. | |
| 81 clockid == base::TimeTicks::kClockSystemTrace || | |
| 82 #endif | |
| 83 clockid == CLOCK_MONOTONIC || | |
| 84 clockid == CLOCK_PROCESS_CPUTIME_ID || | |
| 85 clockid == CLOCK_REALTIME || | |
| 86 clockid == CLOCK_THREAD_CPUTIME_ID, | |
| 87 Allow()).Else(CrashSIGSYS()); | |
| 88 } | |
| 89 | |
| 90 ResultExpr RestrictClone() { | 71 ResultExpr RestrictClone() { |
| 91 // We allow clone only for new thread creation. | 72 // We allow clone only for new thread creation. |
| 92 const Arg<int> flags(0); | 73 const Arg<int> flags(0); |
| 93 return If(flags == (CLONE_VM | CLONE_FS | CLONE_FILES | CLONE_SIGHAND | | 74 return If(flags == (CLONE_VM | CLONE_FS | CLONE_FILES | CLONE_SIGHAND | |
| 94 CLONE_THREAD | CLONE_SYSVSEM | CLONE_SETTLS | | 75 CLONE_THREAD | CLONE_SYSVSEM | CLONE_SETTLS | |
| 95 CLONE_PARENT_SETTID | CLONE_CHILD_CLEARTID), | 76 CLONE_PARENT_SETTID | CLONE_CHILD_CLEARTID), |
| 96 Allow()).Else(CrashSIGSYSClone()); | 77 Allow()).Else(CrashSIGSYSClone()); |
| 97 } | 78 } |
| 98 | 79 |
| 99 ResultExpr RestrictFutexOperation() { | 80 ResultExpr RestrictFutexOperation() { |
| (...skipping 152 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 252 // See crbug.com/264856 for details. | 233 // See crbug.com/264856 for details. |
| 253 case __NR_times: | 234 case __NR_times: |
| 254 case __NR_write: | 235 case __NR_write: |
| 255 #if defined(__arm__) | 236 #if defined(__arm__) |
| 256 case __ARM_NR_cacheflush: | 237 case __ARM_NR_cacheflush: |
| 257 #endif | 238 #endif |
| 258 return Allow(); | 239 return Allow(); |
| 259 | 240 |
| 260 case __NR_clock_getres: | 241 case __NR_clock_getres: |
| 261 case __NR_clock_gettime: | 242 case __NR_clock_gettime: |
| 262 return RestrictClockID(); | 243 return sandbox::RestrictClockID(); |
| 263 | 244 |
| 264 case __NR_clone: | 245 case __NR_clone: |
| 265 return RestrictClone(); | 246 return RestrictClone(); |
| 266 | 247 |
| 267 #if defined(__x86_64__) | 248 #if defined(__x86_64__) |
| 268 case __NR_fcntl: | 249 case __NR_fcntl: |
| 269 #endif | 250 #endif |
| 270 #if defined(__i386__) || defined(__arm__) | 251 #if defined(__i386__) || defined(__arm__) |
| 271 case __NR_fcntl64: | 252 case __NR_fcntl64: |
| 272 #endif | 253 #endif |
| (...skipping 53 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 326 scoped_ptr<sandbox::SandboxBPFPolicy>( | 307 scoped_ptr<sandbox::SandboxBPFPolicy>( |
| 327 new nacl::nonsfi::NaClNonSfiBPFSandboxPolicy())); | 308 new nacl::nonsfi::NaClNonSfiBPFSandboxPolicy())); |
| 328 if (!sandbox_is_initialized) | 309 if (!sandbox_is_initialized) |
| 329 return false; | 310 return false; |
| 330 RunSandboxSanityChecks(); | 311 RunSandboxSanityChecks(); |
| 331 return true; | 312 return true; |
| 332 } | 313 } |
| 333 | 314 |
| 334 } // namespace nonsfi | 315 } // namespace nonsfi |
| 335 } // namespace nacl | 316 } // namespace nacl |
| OLD | NEW |