| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include <asm/unistd.h> | 5 #include <asm/unistd.h> |
| 6 #include <dlfcn.h> | 6 #include <dlfcn.h> |
| 7 #include <errno.h> | 7 #include <errno.h> |
| 8 #include <fcntl.h> | 8 #include <fcntl.h> |
| 9 #include <linux/net.h> | 9 #include <linux/net.h> |
| 10 #include <signal.h> | 10 #include <signal.h> |
| 11 #include <string.h> | 11 #include <string.h> |
| 12 #include <sys/ioctl.h> | 12 #include <sys/ioctl.h> |
| 13 #include <sys/mman.h> | 13 #include <sys/mman.h> |
| 14 #include <sys/prctl.h> | 14 #include <sys/prctl.h> |
| 15 #include <sys/socket.h> | 15 #include <sys/socket.h> |
| 16 #include <sys/stat.h> | 16 #include <sys/stat.h> |
| 17 #include <sys/types.h> | 17 #include <sys/types.h> |
| 18 #include <ucontext.h> | 18 #include <ucontext.h> |
| 19 #include <unistd.h> | 19 #include <unistd.h> |
| 20 | 20 |
| 21 #include <vector> | 21 #include <vector> |
| 22 | 22 |
| 23 #if defined(__arm__) && !defined(MAP_STACK) | |
| 24 #define MAP_STACK 0x20000 // Daisy build environment has old headers. | |
| 25 #endif | |
| 26 | |
| 27 #include "base/basictypes.h" | 23 #include "base/basictypes.h" |
| 28 #include "base/bind.h" | 24 #include "base/bind.h" |
| 29 #include "base/callback.h" | 25 #include "base/callback.h" |
| 30 #include "base/command_line.h" | 26 #include "base/command_line.h" |
| 31 #include "base/logging.h" | 27 #include "base/logging.h" |
| 32 #include "build/build_config.h" | 28 #include "build/build_config.h" |
| 33 #include "content/common/sandbox_linux.h" | 29 #include "content/common/sandbox_linux.h" |
| 34 #include "content/common/sandbox_seccomp_bpf_linux.h" | 30 #include "content/common/sandbox_seccomp_bpf_linux.h" |
| 35 #include "content/public/common/content_switches.h" | 31 #include "content/public/common/content_switches.h" |
| 36 #include "sandbox/linux/services/broker_process.h" | 32 #include "sandbox/linux/services/broker_process.h" |
| 37 | 33 |
| 38 // These are the only architectures supported for now. | 34 // These are the only architectures supported for now. |
| 39 #if defined(__i386__) || defined(__x86_64__) || \ | 35 #if defined(__i386__) || defined(__x86_64__) || \ |
| 40 (defined(__arm__) && (defined(__thumb__) || defined(__ARM_EABI__))) | 36 (defined(__arm__) && (defined(__thumb__) || defined(__ARM_EABI__))) |
| 41 #define SECCOMP_BPF_SANDBOX | 37 #define SECCOMP_BPF_SANDBOX |
| 42 #endif | 38 #endif |
| 43 | 39 |
| 44 #if defined(SECCOMP_BPF_SANDBOX) | 40 #if defined(SECCOMP_BPF_SANDBOX) |
| 45 #include "base/posix/eintr_wrapper.h" | 41 #include "base/posix/eintr_wrapper.h" |
| 42 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" |
| 43 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h" |
| 46 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" | 44 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" |
| 47 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" | 45 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" |
| 48 #include "sandbox/linux/services/linux_syscalls.h" | 46 #include "sandbox/linux/services/linux_syscalls.h" |
| 49 | 47 |
| 50 using playground2::arch_seccomp_data; | 48 using playground2::arch_seccomp_data; |
| 51 using playground2::ErrorCode; | 49 using playground2::ErrorCode; |
| 52 using playground2::Sandbox; | 50 using playground2::Sandbox; |
| 53 using sandbox::BrokerProcess; | 51 using sandbox::BrokerProcess; |
| 54 // TODO(jln): remove once the cleanup in crbug.com/325535 is done. | 52 // TODO(jln): remove once the cleanup in crbug.com/325535 is done. |
| 55 using namespace sandbox; | 53 using namespace sandbox; |
| 56 | 54 |
| 57 namespace { | 55 namespace { |
| 58 | 56 |
| 59 void StartSandboxWithPolicy(Sandbox::EvaluateSyscall syscall_policy, | 57 void StartSandboxWithPolicy(Sandbox::EvaluateSyscall syscall_policy, |
| 60 BrokerProcess* broker_process); | 58 BrokerProcess* broker_process); |
| 61 | 59 |
| 62 inline bool RunningOnASAN() { | |
| 63 #if defined(ADDRESS_SANITIZER) | |
| 64 return true; | |
| 65 #else | |
| 66 return false; | |
| 67 #endif | |
| 68 } | |
| 69 | |
| 70 inline bool IsChromeOS() { | 60 inline bool IsChromeOS() { |
| 71 #if defined(OS_CHROMEOS) | 61 #if defined(OS_CHROMEOS) |
| 72 return true; | 62 return true; |
| 73 #else | 63 #else |
| 74 return false; | 64 return false; |
| 75 #endif | 65 #endif |
| 76 } | 66 } |
| 77 | 67 |
| 78 inline bool IsArchitectureX86_64() { | 68 inline bool IsArchitectureX86_64() { |
| 79 #if defined(__x86_64__) | 69 #if defined(__x86_64__) |
| (...skipping 20 matching lines...) Expand all Loading... |
| 100 } | 90 } |
| 101 | 91 |
| 102 inline bool IsUsingToolKitGtk() { | 92 inline bool IsUsingToolKitGtk() { |
| 103 #if defined(TOOLKIT_GTK) | 93 #if defined(TOOLKIT_GTK) |
| 104 return true; | 94 return true; |
| 105 #else | 95 #else |
| 106 return false; | 96 return false; |
| 107 #endif | 97 #endif |
| 108 } | 98 } |
| 109 | 99 |
| 110 // Write |error_message| to stderr. Similar to RawLog(), but a bit more careful | |
| 111 // about async-signal safety. |size| is the size to write and should typically | |
| 112 // not include a terminating \0. | |
| 113 void WriteToStdErr(const char* error_message, size_t size) { | |
| 114 while (size > 0) { | |
| 115 // TODO(jln): query the current policy to check if send() is available and | |
| 116 // use it to perform a non blocking write. | |
| 117 const int ret = HANDLE_EINTR(write(STDERR_FILENO, error_message, size)); | |
| 118 // We can't handle any type of error here. | |
| 119 if (ret <= 0 || static_cast<size_t>(ret) > size) break; | |
| 120 size -= ret; | |
| 121 error_message += ret; | |
| 122 } | |
| 123 } | |
| 124 | |
| 125 // Print a seccomp-bpf failure to handle |sysno| to stderr in an | |
| 126 // async-signal safe way. | |
| 127 void PrintSyscallError(uint32_t sysno) { | |
| 128 if (sysno >= 1024) | |
| 129 sysno = 0; | |
| 130 // TODO(markus): replace with async-signal safe snprintf when available. | |
| 131 const size_t kNumDigits = 4; | |
| 132 char sysno_base10[kNumDigits]; | |
| 133 uint32_t rem = sysno; | |
| 134 uint32_t mod = 0; | |
| 135 for (int i = kNumDigits - 1; i >= 0; i--) { | |
| 136 mod = rem % 10; | |
| 137 rem /= 10; | |
| 138 sysno_base10[i] = '0' + mod; | |
| 139 } | |
| 140 static const char kSeccompErrorPrefix[] = | |
| 141 __FILE__":**CRASHING**:seccomp-bpf failure in syscall "; | |
| 142 static const char kSeccompErrorPostfix[] = "\n"; | |
| 143 WriteToStdErr(kSeccompErrorPrefix, sizeof(kSeccompErrorPrefix) - 1); | |
| 144 WriteToStdErr(sysno_base10, sizeof(sysno_base10)); | |
| 145 WriteToStdErr(kSeccompErrorPostfix, sizeof(kSeccompErrorPostfix) - 1); | |
| 146 } | |
| 147 | |
| 148 intptr_t CrashSIGSYS_Handler(const struct arch_seccomp_data& args, void* aux) { | |
| 149 uint32_t syscall = args.nr; | |
| 150 if (syscall >= 1024) | |
| 151 syscall = 0; | |
| 152 PrintSyscallError(syscall); | |
| 153 | |
| 154 // Encode 8-bits of the 1st two arguments too, so we can discern which socket | |
| 155 // type, which fcntl, ... etc., without being likely to hit a mapped | |
| 156 // address. | |
| 157 // Do not encode more bits here without thinking about increasing the | |
| 158 // likelihood of collision with mapped pages. | |
| 159 syscall |= ((args.args[0] & 0xffUL) << 12); | |
| 160 syscall |= ((args.args[1] & 0xffUL) << 20); | |
| 161 // Purposefully dereference the syscall as an address so it'll show up very | |
| 162 // clearly and easily in crash dumps. | |
| 163 volatile char* addr = reinterpret_cast<volatile char*>(syscall); | |
| 164 *addr = '\0'; | |
| 165 // In case we hit a mapped address, hit the null page with just the syscall, | |
| 166 // for paranoia. | |
| 167 syscall &= 0xfffUL; | |
| 168 addr = reinterpret_cast<volatile char*>(syscall); | |
| 169 *addr = '\0'; | |
| 170 for (;;) | |
| 171 _exit(1); | |
| 172 } | |
| 173 | |
| 174 // TODO(jln): rewrite reporting functions. | |
| 175 intptr_t SIGSYSCloneFailure(const struct arch_seccomp_data& args, void* aux) { | |
| 176 // "flags" in the first argument in the kernel's clone(). | |
| 177 // Mark as volatile to be able to find the value on the stack in a minidump. | |
| 178 #if !defined(NDEBUG) | |
| 179 RAW_LOG(ERROR, __FILE__":**CRASHING**:clone() failure\n"); | |
| 180 #endif | |
| 181 volatile uint64_t clone_flags = args.args[0]; | |
| 182 volatile char* addr; | |
| 183 if (IsArchitectureX86_64()) { | |
| 184 addr = reinterpret_cast<volatile char*>(clone_flags & 0xFFFFFF); | |
| 185 *addr = '\0'; | |
| 186 } | |
| 187 // Hit the NULL page if this fails to fault. | |
| 188 addr = reinterpret_cast<volatile char*>(clone_flags & 0xFFF); | |
| 189 *addr = '\0'; | |
| 190 for (;;) | |
| 191 _exit(1); | |
| 192 } | |
| 193 | |
| 194 // TODO(jln): rewrite reporting functions. | |
| 195 intptr_t SIGSYSPrctlFailure(const struct arch_seccomp_data& args, | |
| 196 void* /* aux */) { | |
| 197 // Mark as volatile to be able to find the value on the stack in a minidump. | |
| 198 #if !defined(NDEBUG) | |
| 199 RAW_LOG(ERROR, __FILE__":**CRASHING**:prctl() failure\n"); | |
| 200 #endif | |
| 201 volatile uint64_t option = args.args[0]; | |
| 202 volatile char* addr = | |
| 203 reinterpret_cast<volatile char*>(option & 0xFFF); | |
| 204 *addr = '\0'; | |
| 205 for (;;) | |
| 206 _exit(1); | |
| 207 } | |
| 208 | |
| 209 intptr_t SIGSYSIoctlFailure(const struct arch_seccomp_data& args, | |
| 210 void* /* aux */) { | |
| 211 // Make "request" volatile so that we can see it on the stack in a minidump. | |
| 212 #if !defined(NDEBUG) | |
| 213 RAW_LOG(ERROR, __FILE__":**CRASHING**:ioctl() failure\n"); | |
| 214 #endif | |
| 215 volatile uint64_t request = args.args[1]; | |
| 216 volatile char* addr = reinterpret_cast<volatile char*>(request & 0xFFFF); | |
| 217 *addr = '\0'; | |
| 218 // Hit the NULL page if this fails. | |
| 219 addr = reinterpret_cast<volatile char*>(request & 0xFFF); | |
| 220 *addr = '\0'; | |
| 221 for (;;) | |
| 222 _exit(1); | |
| 223 } | |
| 224 | |
| 225 bool IsAcceleratedVideoDecodeEnabled() { | 100 bool IsAcceleratedVideoDecodeEnabled() { |
| 226 // Accelerated video decode is currently enabled on Chrome OS, | 101 // Accelerated video decode is currently enabled on Chrome OS, |
| 227 // but not on Linux: crbug.com/137247. | 102 // but not on Linux: crbug.com/137247. |
| 228 bool is_enabled = IsChromeOS(); | 103 bool is_enabled = IsChromeOS(); |
| 229 | 104 |
| 230 const CommandLine& command_line = *CommandLine::ForCurrentProcess(); | 105 const CommandLine& command_line = *CommandLine::ForCurrentProcess(); |
| 231 is_enabled = is_enabled && | 106 is_enabled = is_enabled && |
| 232 !command_line.HasSwitch(switches::kDisableAcceleratedVideoDecode); | 107 !command_line.HasSwitch(switches::kDisableAcceleratedVideoDecode); |
| 233 | 108 |
| 234 return is_enabled; | 109 return is_enabled; |
| (...skipping 83 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 318 #if defined(__arm__) | 193 #if defined(__arm__) |
| 319 IsArmPciConfig(sysno) || | 194 IsArmPciConfig(sysno) || |
| 320 #endif | 195 #endif |
| 321 IsTimer(sysno)) { | 196 IsTimer(sysno)) { |
| 322 return true; | 197 return true; |
| 323 } else { | 198 } else { |
| 324 return false; | 199 return false; |
| 325 } | 200 } |
| 326 } | 201 } |
| 327 | 202 |
| 328 ErrorCode RestrictMmapFlags(Sandbox* sandbox) { | |
| 329 // The flags you see are actually the allowed ones, and the variable is a | |
| 330 // "denied" mask because of the negation operator. | |
| 331 // Significantly, we don't permit MAP_HUGETLB, or the newer flags such as | |
| 332 // MAP_POPULATE. | |
| 333 // TODO(davidung), remove MAP_DENYWRITE with updated Tegra libraries. | |
| 334 uint32_t denied_mask = ~(MAP_SHARED | MAP_PRIVATE | MAP_ANONYMOUS | | |
| 335 MAP_STACK | MAP_NORESERVE | MAP_FIXED | | |
| 336 MAP_DENYWRITE); | |
| 337 return sandbox->Cond(3, ErrorCode::TP_32BIT, ErrorCode::OP_HAS_ANY_BITS, | |
| 338 denied_mask, | |
| 339 sandbox->Trap(CrashSIGSYS_Handler, NULL), | |
| 340 ErrorCode(ErrorCode::ERR_ALLOWED)); | |
| 341 } | |
| 342 | |
| 343 ErrorCode RestrictMprotectFlags(Sandbox* sandbox) { | |
| 344 // The flags you see are actually the allowed ones, and the variable is a | |
| 345 // "denied" mask because of the negation operator. | |
| 346 // Significantly, we don't permit weird undocumented flags such as | |
| 347 // PROT_GROWSDOWN. | |
| 348 uint32_t denied_mask = ~(PROT_READ | PROT_WRITE | PROT_EXEC); | |
| 349 return sandbox->Cond(2, ErrorCode::TP_32BIT, ErrorCode::OP_HAS_ANY_BITS, | |
| 350 denied_mask, | |
| 351 sandbox->Trap(CrashSIGSYS_Handler, NULL), | |
| 352 ErrorCode(ErrorCode::ERR_ALLOWED)); | |
| 353 } | |
| 354 | |
| 355 ErrorCode RestrictFcntlCommands(Sandbox* sandbox) { | |
| 356 // We allow F_GETFL, F_SETFL, F_GETFD, F_SETFD, F_DUPFD, F_DUPFD_CLOEXEC, | |
| 357 // F_SETLK, F_SETLKW and F_GETLK. | |
| 358 // We also restrict the flags in F_SETFL. We don't want to permit flags with | |
| 359 // a history of trouble such as O_DIRECT. The flags you see are actually the | |
| 360 // allowed ones, and the variable is a "denied" mask because of the negation | |
| 361 // operator. | |
| 362 // Glibc overrides the kernel's O_LARGEFILE value. Account for this. | |
| 363 int kOLargeFileFlag = O_LARGEFILE; | |
| 364 if (IsArchitectureX86_64() || IsArchitectureI386()) | |
| 365 kOLargeFileFlag = 0100000; | |
| 366 | |
| 367 // TODO(jln): add TP_LONG/TP_SIZET types. | |
| 368 ErrorCode::ArgType mask_long_type; | |
| 369 if (sizeof(long) == 8) | |
| 370 mask_long_type = ErrorCode::TP_64BIT; | |
| 371 else if (sizeof(long) == 4) | |
| 372 mask_long_type = ErrorCode::TP_32BIT; | |
| 373 else | |
| 374 NOTREACHED(); | |
| 375 | |
| 376 unsigned long denied_mask = ~(O_ACCMODE | O_APPEND | O_NONBLOCK | O_SYNC | | |
| 377 kOLargeFileFlag | O_CLOEXEC | O_NOATIME); | |
| 378 return sandbox->Cond(1, ErrorCode::TP_32BIT, | |
| 379 ErrorCode::OP_EQUAL, F_GETFL, | |
| 380 ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 381 sandbox->Cond(1, ErrorCode::TP_32BIT, | |
| 382 ErrorCode::OP_EQUAL, F_SETFL, | |
| 383 sandbox->Cond(2, mask_long_type, | |
| 384 ErrorCode::OP_HAS_ANY_BITS, denied_mask, | |
| 385 sandbox->Trap(CrashSIGSYS_Handler, NULL), | |
| 386 ErrorCode(ErrorCode::ERR_ALLOWED)), | |
| 387 sandbox->Cond(1, ErrorCode::TP_32BIT, | |
| 388 ErrorCode::OP_EQUAL, F_GETFD, | |
| 389 ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 390 sandbox->Cond(1, ErrorCode::TP_32BIT, | |
| 391 ErrorCode::OP_EQUAL, F_SETFD, | |
| 392 ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 393 sandbox->Cond(1, ErrorCode::TP_32BIT, | |
| 394 ErrorCode::OP_EQUAL, F_DUPFD, | |
| 395 ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 396 sandbox->Cond(1, ErrorCode::TP_32BIT, | |
| 397 ErrorCode::OP_EQUAL, F_SETLK, | |
| 398 ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 399 sandbox->Cond(1, ErrorCode::TP_32BIT, | |
| 400 ErrorCode::OP_EQUAL, F_SETLKW, | |
| 401 ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 402 sandbox->Cond(1, ErrorCode::TP_32BIT, | |
| 403 ErrorCode::OP_EQUAL, F_GETLK, | |
| 404 ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 405 sandbox->Cond(1, ErrorCode::TP_32BIT, | |
| 406 ErrorCode::OP_EQUAL, F_DUPFD_CLOEXEC, | |
| 407 ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 408 sandbox->Trap(CrashSIGSYS_Handler, NULL)))))))))); | |
| 409 } | |
| 410 | |
| 411 #if defined(__i386__) | |
| 412 ErrorCode RestrictSocketcallCommand(Sandbox* sandbox) { | |
| 413 // Allow the same individual syscalls as we do on ARM or x86_64. | |
| 414 // The main difference is that we're unable to restrict the first parameter | |
| 415 // to socketpair(2). Whilst initially sounding bad, it's noteworthy that very | |
| 416 // few protocols actually support socketpair(2). The scary call that we're | |
| 417 // worried about, socket(2), remains blocked. | |
| 418 return sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, | |
| 419 SYS_SOCKETPAIR, ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 420 sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, | |
| 421 SYS_SEND, ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 422 sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, | |
| 423 SYS_RECV, ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 424 sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, | |
| 425 SYS_SENDTO, ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 426 sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, | |
| 427 SYS_RECVFROM, ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 428 sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, | |
| 429 SYS_SHUTDOWN, ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 430 sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, | |
| 431 SYS_SENDMSG, ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 432 sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, | |
| 433 SYS_RECVMSG, ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 434 ErrorCode(EPERM))))))))); | |
| 435 } | |
| 436 #endif | |
| 437 | |
| 438 const int kFSDeniedErrno = EPERM; | 203 const int kFSDeniedErrno = EPERM; |
| 439 | 204 |
| 440 ErrorCode BaselinePolicy(Sandbox* sandbox, int sysno) { | 205 ErrorCode BaselinePolicy(Sandbox* sandbox, int sysno) { |
| 441 if (IsBaselinePolicyAllowed(sysno)) { | 206 if (IsBaselinePolicyAllowed(sysno)) { |
| 442 return ErrorCode(ErrorCode::ERR_ALLOWED); | 207 return ErrorCode(ErrorCode::ERR_ALLOWED); |
| 443 } | 208 } |
| 444 | 209 |
| 445 #if defined(__x86_64__) || defined(__arm__) | 210 #if defined(__x86_64__) || defined(__arm__) |
| 446 if (sysno == __NR_socketpair) { | 211 if (sysno == __NR_socketpair) { |
| 447 // Only allow AF_UNIX, PF_UNIX. Crash if anything else is seen. | 212 // Only allow AF_UNIX, PF_UNIX. Crash if anything else is seen. |
| (...skipping 163 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 611 switch (sysno) { | 376 switch (sysno) { |
| 612 case __NR_access: | 377 case __NR_access: |
| 613 case __NR_open: | 378 case __NR_open: |
| 614 case __NR_openat: | 379 case __NR_openat: |
| 615 return ErrorCode(ErrorCode::ERR_ALLOWED); | 380 return ErrorCode(ErrorCode::ERR_ALLOWED); |
| 616 default: | 381 default: |
| 617 return ArmGpuProcessPolicy(sandbox, sysno, aux); | 382 return ArmGpuProcessPolicy(sandbox, sysno, aux); |
| 618 } | 383 } |
| 619 } | 384 } |
| 620 | 385 |
| 621 // Allow clone(2) for threads. | |
| 622 // Reject fork(2) attempts with EPERM. | |
| 623 // Crash if anything else is attempted. | |
| 624 // Don't restrict on ASAN. | |
| 625 ErrorCode RestrictCloneToThreadsAndEPERMFork(Sandbox* sandbox) { | |
| 626 // Glibc's pthread. | |
| 627 if (!RunningOnASAN()) { | |
| 628 return sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, | |
| 629 CLONE_VM | CLONE_FS | CLONE_FILES | CLONE_SIGHAND | | |
| 630 CLONE_THREAD | CLONE_SYSVSEM | CLONE_SETTLS | | |
| 631 CLONE_PARENT_SETTID | CLONE_CHILD_CLEARTID, | |
| 632 ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 633 sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, | |
| 634 CLONE_PARENT_SETTID | SIGCHLD, | |
| 635 ErrorCode(EPERM), | |
| 636 // ARM | |
| 637 sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, | |
| 638 CLONE_CHILD_SETTID | CLONE_CHILD_CLEARTID | SIGCHLD, | |
| 639 ErrorCode(EPERM), | |
| 640 sandbox->Trap(SIGSYSCloneFailure, NULL)))); | |
| 641 } else { | |
| 642 return ErrorCode(ErrorCode::ERR_ALLOWED); | |
| 643 } | |
| 644 } | |
| 645 | |
| 646 ErrorCode RestrictPrctl(Sandbox* sandbox) { | |
| 647 // Allow PR_SET_NAME, PR_SET_DUMPABLE, PR_GET_DUMPABLE. Will need to add | |
| 648 // seccomp compositing in the future. | |
| 649 // PR_SET_PTRACER is used by breakpad but not needed anymore. | |
| 650 return sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, | |
| 651 PR_SET_NAME, ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 652 sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, | |
| 653 PR_SET_DUMPABLE, ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 654 sandbox->Cond(0, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, | |
| 655 PR_GET_DUMPABLE, ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 656 sandbox->Trap(SIGSYSPrctlFailure, NULL)))); | |
| 657 } | |
| 658 | |
| 659 ErrorCode RestrictIoctl(Sandbox* sandbox) { | |
| 660 // Allow TCGETS and FIONREAD, trap to SIGSYSIoctlFailure otherwise. | |
| 661 return sandbox->Cond(1, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, TCGETS, | |
| 662 ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 663 sandbox->Cond(1, ErrorCode::TP_32BIT, ErrorCode::OP_EQUAL, FIONREAD, | |
| 664 ErrorCode(ErrorCode::ERR_ALLOWED), | |
| 665 sandbox->Trap(SIGSYSIoctlFailure, NULL))); | |
| 666 } | |
| 667 | |
| 668 ErrorCode RendererOrWorkerProcessPolicy(Sandbox* sandbox, int sysno, void*) { | 386 ErrorCode RendererOrWorkerProcessPolicy(Sandbox* sandbox, int sysno, void*) { |
| 669 switch (sysno) { | 387 switch (sysno) { |
| 670 case __NR_clone: | 388 case __NR_clone: |
| 671 return RestrictCloneToThreadsAndEPERMFork(sandbox); | 389 return RestrictCloneToThreadsAndEPERMFork(sandbox); |
| 672 case __NR_ioctl: | 390 case __NR_ioctl: |
| 673 return RestrictIoctl(sandbox); | 391 return RestrictIoctl(sandbox); |
| 674 case __NR_prctl: | 392 case __NR_prctl: |
| 675 return RestrictPrctl(sandbox); | 393 return RestrictPrctl(sandbox); |
| 676 // Allow the system calls below. | 394 // Allow the system calls below. |
| 677 case __NR_fdatasync: | 395 case __NR_fdatasync: |
| (...skipping 433 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1111 return false; | 829 return false; |
| 1112 } | 830 } |
| 1113 | 831 |
| 1114 #if defined(SECCOMP_BPF_SANDBOX) | 832 #if defined(SECCOMP_BPF_SANDBOX) |
| 1115 playground2::BpfSandboxPolicyCallback SandboxSeccompBpf::GetBaselinePolicy() { | 833 playground2::BpfSandboxPolicyCallback SandboxSeccompBpf::GetBaselinePolicy() { |
| 1116 return base::Bind(&BaselinePolicyWithAux); | 834 return base::Bind(&BaselinePolicyWithAux); |
| 1117 } | 835 } |
| 1118 #endif // defined(SECCOMP_BPF_SANDBOX) | 836 #endif // defined(SECCOMP_BPF_SANDBOX) |
| 1119 | 837 |
| 1120 } // namespace content | 838 } // namespace content |
| OLD | NEW |