Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(461)

Unified Diff: components/nacl/loader/nacl_sandbox_linux.cc

Issue 250773003: NaCl Linux: create NaClSandbox class (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Address nits. Created 6 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « components/nacl/loader/nacl_sandbox_linux.h ('k') | components/nacl/loader/sandbox_linux/OWNERS » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: components/nacl/loader/nacl_sandbox_linux.cc
diff --git a/components/nacl/loader/nacl_sandbox_linux.cc b/components/nacl/loader/nacl_sandbox_linux.cc
deleted file mode 100644
index f1e4a49a4f71b1ab1efaaade862ea8a9d9f399b2..0000000000000000000000000000000000000000
--- a/components/nacl/loader/nacl_sandbox_linux.cc
+++ /dev/null
@@ -1,174 +0,0 @@
-// Copyright 2013 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include "components/nacl/loader/nacl_sandbox_linux.h"
-
-#include <errno.h>
-#include <signal.h>
-#include <sys/ptrace.h>
-
-#include "base/basictypes.h"
-#include "base/callback.h"
-#include "base/compiler_specific.h"
-#include "base/logging.h"
-#include "build/build_config.h"
-
-#if defined(USE_SECCOMP_BPF)
-#include "content/public/common/sandbox_init.h"
-#include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
-#include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
-#include "sandbox/linux/services/linux_syscalls.h"
-
-using sandbox::ErrorCode;
-using sandbox::SandboxBPF;
-using sandbox::SandboxBPFPolicy;
-
-namespace {
-
-// On ARM and x86_64, System V shared memory calls have each their own system
-// call, while on i386 they are multiplexed.
-#if defined(__x86_64__) || defined(__arm__)
-bool IsSystemVSharedMemory(int sysno) {
- switch (sysno) {
- case __NR_shmat:
- case __NR_shmctl:
- case __NR_shmdt:
- case __NR_shmget:
- return true;
- default:
- return false;
- }
-}
-#endif
-
-#if defined(__i386__)
-// Big system V multiplexing system call.
-bool IsSystemVIpc(int sysno) {
- switch (sysno) {
- case __NR_ipc:
- return true;
- default:
- return false;
- }
-}
-#endif
-
-class NaClBPFSandboxPolicy : public SandboxBPFPolicy {
- public:
- NaClBPFSandboxPolicy()
- : baseline_policy_(content::GetBPFSandboxBaselinePolicy()) {}
- virtual ~NaClBPFSandboxPolicy() {}
-
- virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
- int system_call_number) const OVERRIDE;
-
- private:
- scoped_ptr<SandboxBPFPolicy> baseline_policy_;
- DISALLOW_COPY_AND_ASSIGN(NaClBPFSandboxPolicy);
-};
-
-ErrorCode NaClBPFSandboxPolicy::EvaluateSyscall(
- sandbox::SandboxBPF* sb, int sysno) const {
- DCHECK(baseline_policy_);
- switch (sysno) {
- // TODO(jln): NaCl's GDB debug stub uses the following socket system calls,
- // see if it can be restricted a bit.
-#if defined(__x86_64__) || defined(__arm__)
- // transport_common.cc needs this.
- case __NR_accept:
- case __NR_setsockopt:
-#elif defined(__i386__)
- case __NR_socketcall:
-#endif
- // trusted/service_runtime/linux/thread_suspension.c needs sigwait() and is
- // used by NaCl's GDB debug stub.
- case __NR_rt_sigtimedwait:
-#if defined(__i386__)
- // Needed on i386 to set-up the custom segments.
- case __NR_modify_ldt:
-#endif
- // NaClAddrSpaceBeforeAlloc needs prlimit64.
- case __NR_prlimit64:
- // NaCl uses custom signal stacks.
- case __NR_sigaltstack:
- // Below is fairly similar to the policy for a Chromium renderer.
- // TODO(jln): restrict clone(), ioctl() and prctl().
- case __NR_ioctl:
-#if defined(__i386__) || defined(__x86_64__)
- case __NR_getrlimit:
-#endif
-#if defined(__i386__) || defined(__arm__)
- case __NR_ugetrlimit:
-#endif
- // NaCl runtime exposes clock_getres to untrusted code.
- case __NR_clock_getres:
- // NaCl runtime uses flock to simulate POSIX behavior for pwrite.
- case __NR_flock:
- case __NR_pread64:
- case __NR_pwrite64:
- case __NR_sched_get_priority_max:
- case __NR_sched_get_priority_min:
- case __NR_sched_getaffinity:
- case __NR_sched_getparam:
- case __NR_sched_getscheduler:
- case __NR_sched_setscheduler:
- case __NR_setpriority:
- case __NR_sysinfo:
- // __NR_times needed as clock() is called by CommandBufferHelper, which is
- // used by NaCl applications that use Pepper's 3D interfaces.
- // See crbug.com/264856 for details.
- case __NR_times:
- case __NR_uname:
- return ErrorCode(ErrorCode::ERR_ALLOWED);
- case __NR_ptrace:
- return ErrorCode(EPERM);
- default:
- // TODO(jln): look into getting rid of System V shared memory:
- // platform_qualify/linux/sysv_shm_and_mmap.c makes it a requirement, but
- // it may not be needed in all cases. Chromium renderers don't need
- // System V shared memory on Aura.
-#if defined(__x86_64__) || defined(__arm__)
- if (IsSystemVSharedMemory(sysno))
- return ErrorCode(ErrorCode::ERR_ALLOWED);
-#elif defined(__i386__)
- if (IsSystemVIpc(sysno))
- return ErrorCode(ErrorCode::ERR_ALLOWED);
-#endif
- return baseline_policy_->EvaluateSyscall(sb, sysno);
- }
- NOTREACHED();
- // GCC wants this.
- return ErrorCode(EPERM);
-}
-
-void RunSandboxSanityChecks() {
- errno = 0;
- // Make a ptrace request with an invalid PID.
- long ptrace_ret = ptrace(PTRACE_PEEKUSER, -1 /* pid */, NULL, NULL);
- CHECK_EQ(-1, ptrace_ret);
- // Without the sandbox on, this ptrace call would ESRCH instead.
- CHECK_EQ(EPERM, errno);
-}
-
-} // namespace
-
-#else
-
-#if !defined(ARCH_CPU_MIPS_FAMILY)
-#error "Seccomp-bpf disabled on supported architecture!"
-#endif
-
-#endif // defined(USE_SECCOMP_BPF)
-
-bool InitializeBPFSandbox() {
-#if defined(USE_SECCOMP_BPF)
- bool sandbox_is_initialized = content::InitializeSandbox(
- scoped_ptr<SandboxBPFPolicy>(new NaClBPFSandboxPolicy()));
- if (sandbox_is_initialized) {
- RunSandboxSanityChecks();
- return true;
- }
-#endif // defined(USE_SECCOMP_BPF)
- return false;
-}
« no previous file with comments | « components/nacl/loader/nacl_sandbox_linux.h ('k') | components/nacl/loader/sandbox_linux/OWNERS » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698