Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(163)

Issue 939943002: bpf_dsl: decouple PolicyCompiler from Syscall (Closed)

Created:
5 years, 10 months ago by mdempsky
Modified:
5 years, 10 months ago
CC:
chromium-reviews, rickyz+watch_chromium.org, jln+watch_chromium.org
Base URL:
https://chromium.googlesource.com/chromium/src.git@master
Target Ref:
refs/pending/heads/master
Project:
chromium
Visibility:
Public.

Description

bpf_dsl: decouple PolicyCompiler from Syscall Logically, the "escape hatch PC" is now like a compiler flag, that the user can set appropriately. In the case of SandboxBPF, it will set the PC to Syscall::Call(-1), as before. This isn't a very satisfying way to resolve this cyclic dependency, but it's the simplest and least intrusive I could think of. BUG=449357 Committed: https://crrev.com/242ad8711d9f0d58fb45b134468ad68b0835fad2 Cr-Commit-Position: refs/heads/master@{#317237}

Patch Set 1 #

Total comments: 2

Patch Set 2 : Respond to jln feedback #

Patch Set 3 : clang-format #

Unified diffs Side-by-side diffs Delta from patch set Stats (+40 lines, -46 lines) Patch
M sandbox/linux/bpf_dsl/policy_compiler.h View 1 3 chunks +6 lines, -1 line 0 comments Download
M sandbox/linux/bpf_dsl/policy_compiler.cc View 1 2 6 chunks +16 lines, -14 lines 0 comments Download
M sandbox/linux/integration_tests/bpf_dsl_seccomp_unittest.cc View 1 1 chunk +3 lines, -3 lines 0 comments Download
M sandbox/linux/seccomp-bpf/sandbox_bpf.cc View 1 2 chunks +11 lines, -0 lines 0 comments Download
M sandbox/linux/seccomp-bpf/trap.h View 1 2 chunks +3 lines, -19 lines 0 comments Download
M sandbox/linux/seccomp-bpf/trap.cc View 1 2 chunks +1 line, -9 lines 0 comments Download

Messages

Total messages: 10 (2 generated)
mdempsky
5 years, 10 months ago (2015-02-19 10:19:41 UTC) #2
jln (very slow on Chromium)
This is a good cleanup! I'm only worried about "burying" the backdoor a little too ...
5 years, 10 months ago (2015-02-19 19:49:14 UTC) #3
mdempsky
https://codereview.chromium.org/939943002/diff/1/sandbox/linux/bpf_dsl/policy_compiler.h File sandbox/linux/bpf_dsl/policy_compiler.h (right): https://codereview.chromium.org/939943002/diff/1/sandbox/linux/bpf_dsl/policy_compiler.h#newcode32 sandbox/linux/bpf_dsl/policy_compiler.h:32: uint64_t escapepc = 0); On 2015/02/19 19:49:14, jln wrote: ...
5 years, 10 months ago (2015-02-20 03:20:32 UTC) #4
jln (very slow on Chromium)
lgtm You could also replace reading has_unsafe_trap_ with HasUnsafeTraps() which would return the former with ...
5 years, 10 months ago (2015-02-20 03:28:24 UTC) #5
commit-bot: I haz the power
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/patch-status/939943002/40001
5 years, 10 months ago (2015-02-20 03:35:29 UTC) #7
commit-bot: I haz the power
Committed patchset #3 (id:40001)
5 years, 10 months ago (2015-02-20 04:11:30 UTC) #8
commit-bot: I haz the power
Patchset 3 (id:??) landed as https://crrev.com/242ad8711d9f0d58fb45b134468ad68b0835fad2 Cr-Commit-Position: refs/heads/master@{#317237}
5 years, 10 months ago (2015-02-20 04:11:52 UTC) #9
kaliamoorthi
5 years, 10 months ago (2015-02-20 11:06:03 UTC) #10
Message was sent while issue was closed.
A revert of this CL (patchset #3 id:40001) has been created in
https://codereview.chromium.org/937303005/ by kaliamoorthi@chromium.org.

The reason for reverting is: This CL seem to increase nacl_helper size and
results in Linux_x64 failure..

Powered by Google App Engine
This is Rietveld 408576698