Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(444)

Side by Side Diff: content/common/sandbox_seccomp_bpf_linux.cc

Issue 10843042: Create a class for seccomp-bpf sandboxing in content. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Correct typo. Created 8 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « content/common/sandbox_seccomp_bpf_linux.h ('k') | content/content_common.gypi » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "content/common/seccomp_sandbox.h"
6 #include "content/public/common/sandbox_init.h"
7
8 #if defined(__i386__) || defined(__x86_64__)
9
10 // This is an assert for GYP
11 #if !defined(OS_LINUX)
12 #error "Linux specific file compiled on non Linux OS!"
13 #endif
14
15 #include <asm/unistd.h> 5 #include <asm/unistd.h>
16 #include <dlfcn.h> 6 #include <dlfcn.h>
17 #include <errno.h> 7 #include <errno.h>
18 #include <fcntl.h> 8 #include <fcntl.h>
19 #include <linux/audit.h> 9 #include <linux/audit.h>
20 #include <linux/filter.h> 10 #include <linux/filter.h>
21 #include <signal.h> 11 #include <signal.h>
22 #include <string.h> 12 #include <string.h>
23 #include <sys/prctl.h> 13 #include <sys/prctl.h>
24 #include <sys/stat.h> 14 #include <sys/stat.h>
25 #include <sys/types.h> 15 #include <sys/types.h>
26 #include <ucontext.h> 16 #include <ucontext.h>
27 #include <unistd.h> 17 #include <unistd.h>
28 18
29 #include <vector> 19 #include <vector>
30 20
31 #include "base/command_line.h" 21 #include "base/command_line.h"
32 #include "base/file_util.h"
33 #include "base/logging.h" 22 #include "base/logging.h"
34 #include "base/time.h"
35 #include "content/common/sandbox_linux.h" 23 #include "content/common/sandbox_linux.h"
24 #include "content/common/sandbox_seccomp_bpf_linux.h"
36 #include "content/public/common/content_switches.h" 25 #include "content/public/common/content_switches.h"
26
27 // These are the only architectures supported for now.
28 #if defined(__i386__) || defined(__x86_64__)
29 #define SECCOMP_BPF_SANDBOX
30 #endif
31
32 #if defined(SECCOMP_BPF_SANDBOX)
37 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 33 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
38 34
39 // These are fairly new and not defined in all headers yet. 35 // These are fairly new and not defined in all headers yet.
40 #if defined(__x86_64__) 36 #if defined(__x86_64__)
41 37
42 #ifndef __NR_process_vm_readv 38 #ifndef __NR_process_vm_readv
43 #define __NR_process_vm_readv 310 39 #define __NR_process_vm_readv 310
44 #endif 40 #endif
45 41
46 #ifndef __NR_process_vm_writev 42 #ifndef __NR_process_vm_writev
47 #define __NR_process_vm_writev 311 43 #define __NR_process_vm_writev 311
48 #endif 44 #endif
49 45
50 #elif defined(__i386__) 46 #elif defined(__i386__)
51 47
52 #ifndef __NR_process_vm_readv 48 #ifndef __NR_process_vm_readv
53 #define __NR_process_vm_readv 347 49 #define __NR_process_vm_readv 347
54 #endif 50 #endif
55 51
56 #ifndef __NR_process_vm_writev 52 #ifndef __NR_process_vm_writev
57 #define __NR_process_vm_writev 348 53 #define __NR_process_vm_writev 348
58 #endif 54 #endif
59 55
60 #endif 56 #endif
61 57
62 namespace { 58 namespace {
63 59
64 bool IsSingleThreaded() {
65 // Possibly racy, but it's ok because this is more of a debug check to catch
66 // new threaded situations arising during development.
67 int num_threads =
68 file_util::CountFilesCreatedAfter(FilePath("/proc/self/task"),
69 base::Time::UnixEpoch());
70
71 // We pass the test if we don't know ( == 0), because the setuid sandbox
72 // will prevent /proc access in some contexts.
73 return num_threads == 1 || num_threads == 0;
74 }
75
76 inline bool IsChromeOS() { 60 inline bool IsChromeOS() {
77 #if defined(OS_CHROMEOS) 61 #if defined(OS_CHROMEOS)
78 return true; 62 return true;
79 #else 63 #else
80 return false; 64 return false;
81 #endif 65 #endif
82 } 66 }
83 67
84 void LogSandboxStarted(const std::string& sandbox_name, 68 void LogSandboxStarted(const std::string& sandbox_name,
85 const std::string& process_type) { 69 const std::string& process_type) {
(...skipping 350 matching lines...) Expand 10 before | Expand all | Expand 10 after
436 "/usr/lib64/va/drivers/i965_drv_video.so"; 420 "/usr/lib64/va/drivers/i965_drv_video.so";
437 dlopen(kI965DrvVideoPath_64, RTLD_NOW|RTLD_GLOBAL|RTLD_NODELETE); 421 dlopen(kI965DrvVideoPath_64, RTLD_NOW|RTLD_GLOBAL|RTLD_NODELETE);
438 } 422 }
439 } 423 }
440 #endif 424 #endif
441 } 425 }
442 426
443 // Is the sandbox fully disabled for this process? 427 // Is the sandbox fully disabled for this process?
444 bool ShouldDisableBpfSandbox(const CommandLine& command_line, 428 bool ShouldDisableBpfSandbox(const CommandLine& command_line,
445 const std::string& process_type) { 429 const std::string& process_type) {
446 if (command_line.HasSwitch(switches::kNoSandbox) ||
447 command_line.HasSwitch(switches::kDisableSeccompFilterSandbox)) {
448 return true;
449 }
450
451 if (process_type == switches::kGpuProcess) { 430 if (process_type == switches::kGpuProcess) {
452 // The GPU sandbox is disabled by default in ChromeOS, enabled by default on 431 // The GPU sandbox is disabled by default in ChromeOS, enabled by default on
453 // generic Linux. 432 // generic Linux.
454 // TODO(jorgelo): when we feel comfortable, make this a policy decision 433 // TODO(jorgelo): when we feel comfortable, make this a policy decision
455 // instead. (i.e. move this to GetProcessSyscallPolicy) and return an 434 // instead. (i.e. move this to GetProcessSyscallPolicy) and return an
456 // AllowAllPolicy for lack of "--enable-gpu-sandbox". 435 // AllowAllPolicy for lack of "--enable-gpu-sandbox".
457 bool should_disable; 436 bool should_disable;
458 if (IsChromeOS()) { 437 if (IsChromeOS()) {
459 should_disable = true; 438 should_disable = true;
460 } else { 439 } else {
(...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after
493 // This will be our default if we need one. 472 // This will be our default if we need one.
494 return AllowAllPolicy; 473 return AllowAllPolicy;
495 #else 474 #else
496 // On IA32, we only have a small blacklist at the moment. 475 // On IA32, we only have a small blacklist at the moment.
497 (void) process_type; 476 (void) process_type;
498 return BlacklistPtracePolicy; 477 return BlacklistPtracePolicy;
499 #endif // __x86_64__ 478 #endif // __x86_64__
500 } 479 }
501 480
502 // Initialize the seccomp-bpf sandbox. 481 // Initialize the seccomp-bpf sandbox.
503 bool InitializeBpfSandbox_x86(const CommandLine& command_line, 482 bool StartBpfSandbox_x86(const CommandLine& command_line,
504 const std::string& process_type) { 483 const std::string& process_type) {
505 if (ShouldDisableBpfSandbox(command_line, process_type))
506 return false;
507
508 // No matter what, InitializeSandbox() should always be called before threads
509 // are started.
510 // Note: IsSingleThreaded() will be true if /proc is not accessible!
511 if (!IsSingleThreaded()) {
512 std::string error_message = "InitializeSandbox() called with multiple "
513 "threads in process " + process_type;
514 // TODO(jln): change this into a CHECK() once we are more comfortable it
515 // does not trigger.
516 // On non-DEBUG build, we still log an error
517 LOG(ERROR) << error_message;
518 return false;
519 }
520
521 // TODO(jln): find a way for the Zygote processes under the setuid sandbox to
522 // have a /proc fd and pass it here.
523 // Passing -1 as the /proc fd since we have no special way to have it for
524 // now.
525 if (playground2::Sandbox::supportsSeccompSandbox(-1) !=
526 playground2::Sandbox::STATUS_AVAILABLE) {
527 return false;
528 }
529
530 playground2::Sandbox::EvaluateSyscall SyscallPolicy = 484 playground2::Sandbox::EvaluateSyscall SyscallPolicy =
531 GetProcessSyscallPolicy(command_line, process_type); 485 GetProcessSyscallPolicy(command_line, process_type);
532 486
533 // Warms up resources needed by the policy we're about to enable. 487 // Warms up resources needed by the policy we're about to enable.
534 WarmupPolicy(SyscallPolicy); 488 WarmupPolicy(SyscallPolicy);
535 489
536 playground2::Sandbox::setSandboxPolicy(SyscallPolicy, NULL); 490 playground2::Sandbox::setSandboxPolicy(SyscallPolicy, NULL);
537 playground2::Sandbox::startSandbox(); 491 playground2::Sandbox::startSandbox();
538 492
539 return true; 493 return true;
540 } 494 }
541 495
542 } // anonymous namespace 496 } // namespace
543 497
544 #endif // defined(__i386__) || defined(__x86_64__) 498 #endif // SECCOMP_BPF_SANDBOX
545 499
546 namespace content { 500 namespace content {
547 501
548 void InitializeSandbox() { 502 // Is seccomp BPF globally enabled?
549 #if defined(__i386__) || defined(__x86_64__) 503 bool SandboxSeccompBpf::IsSeccompBpfDesired() {
550 const CommandLine& command_line = *CommandLine::ForCurrentProcess(); 504 const CommandLine& command_line = *CommandLine::ForCurrentProcess();
551 const std::string process_type = 505 if (!command_line.HasSwitch(switches::kNoSandbox) &&
552 command_line.GetSwitchValueASCII(switches::kProcessType); 506 !command_line.HasSwitch(switches::kDisableSeccompFilterSandbox)) {
553 bool seccomp_legacy_started = false; 507 return true;
554 bool seccomp_bpf_started = false; 508 } else {
509 return false;
510 }
511 }
555 512
556 // First, try to enable seccomp-legacy. 513 bool SandboxSeccompBpf::SupportsSandbox() {
557 seccomp_legacy_started = 514 #if defined(SECCOMP_BPF_SANDBOX)
558 LinuxSandbox::GetInstance()->StartSeccompLegacy(process_type); 515 // TODO(jln): pass the savec proc_fd_ from the LinuxSandbox singleton
Jorge Lucangeli Obes 2012/08/02 21:04:12 saved
jln (very slow on Chromium) 2012/08/02 21:06:57 Done.
559 if (seccomp_legacy_started) 516 // here.
560 LogSandboxStarted("seccomp-legacy", process_type); 517 if (playground2::Sandbox::supportsSeccompSandbox(-1) ==
518 playground2::Sandbox::STATUS_AVAILABLE) {
519 return true;
520 }
521 #endif
522 return false;
523 }
561 524
562 // Then, try to enable seccomp-bpf. 525 bool SandboxSeccompBpf::StartSandbox(const std::string& process_type) {
563 // If seccomp-legacy is enabled, seccomp-bpf initialization will crash 526 #if defined(SECCOMP_BPF_SANDBOX)
564 // instead of failing gracefully. 527 const CommandLine& command_line = *CommandLine::ForCurrentProcess();
565 // TODO(markus): fix this (crbug.com/139872). 528
566 if (!seccomp_legacy_started) { 529 if (IsSeccompBpfDesired() && // Global switches policy.
567 seccomp_bpf_started = 530 // Process-specific policy.
568 InitializeBpfSandbox_x86(command_line, process_type); 531 !ShouldDisableBpfSandbox(command_line, process_type) &&
532 SupportsSandbox()) {
533 return StartBpfSandbox_x86(command_line, process_type);
569 } 534 }
570 if (seccomp_bpf_started)
571 LogSandboxStarted("seccomp-bpf", process_type);
572 #endif 535 #endif
536 return false;
573 } 537 }
574 538
575 } // namespace content 539 } // namespace content
OLDNEW
« no previous file with comments | « content/common/sandbox_seccomp_bpf_linux.h ('k') | content/content_common.gypi » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698