Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(177)

Unified Diff: components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc

Issue 670603002: Linux sandbox: Tighten up the NaCl sandbox policy. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Rebase Created 6 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « components/nacl/loader/DEPS ('k') | components/nacl/zygote/nacl_fork_delegate_linux.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc
diff --git a/components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc b/components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc
index 9bd807e473bdfc252cb56ef15538ed5620be6451..b7dbe64aab238b9ed64d035997a8ec63a88d41f4 100644
--- a/components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc
+++ b/components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc
@@ -11,15 +11,20 @@
#include <errno.h>
#include <signal.h>
#include <sys/ptrace.h>
+#include <sys/types.h>
+#include <unistd.h>
#include "base/basictypes.h"
#include "base/callback.h"
+#include "base/command_line.h"
#include "base/compiler_specific.h"
#include "base/logging.h"
+#include "components/nacl/common/nacl_switches.h"
#include "content/public/common/sandbox_init.h"
#include "sandbox/linux/bpf_dsl/bpf_dsl.h"
#include "sandbox/linux/bpf_dsl/policy.h"
+#include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
#include "sandbox/linux/services/linux_syscalls.h"
#endif // defined(USE_SECCOMP_BPF)
@@ -37,7 +42,12 @@ using sandbox::bpf_dsl::ResultExpr;
class NaClBPFSandboxPolicy : public sandbox::bpf_dsl::Policy {
public:
NaClBPFSandboxPolicy()
- : baseline_policy_(content::GetBPFSandboxBaselinePolicy()) {}
+ : baseline_policy_(content::GetBPFSandboxBaselinePolicy()),
+ policy_pid_(getpid()) {
+ const base::CommandLine* command_line =
+ base::CommandLine::ForCurrentProcess();
+ enable_nacl_debug_ = command_line->HasSwitch(switches::kEnableNaClDebug);
Mark Seaborn 2014/10/28 00:30:14 Maybe add a comment like: // nacl_process_host.cc
rickyz (no longer on Chrome) 2014/10/29 21:07:36 Done.
+ }
virtual ~NaClBPFSandboxPolicy() {}
virtual ResultExpr EvaluateSyscall(int system_call_number) const override;
@@ -47,24 +57,35 @@ class NaClBPFSandboxPolicy : public sandbox::bpf_dsl::Policy {
private:
scoped_ptr<sandbox::bpf_dsl::Policy> baseline_policy_;
+ bool enable_nacl_debug_;
+ pid_t policy_pid_;
jln (very slow on Chromium) 2014/10/29 18:44:45 const
rickyz (no longer on Chrome) 2014/10/29 21:07:36 Done.
DISALLOW_COPY_AND_ASSIGN(NaClBPFSandboxPolicy);
};
ResultExpr NaClBPFSandboxPolicy::EvaluateSyscall(int sysno) const {
DCHECK(baseline_policy_);
- switch (sysno) {
- // TODO(jln): NaCl's GDB debug stub uses the following socket system calls,
- // see if it can be restricted a bit.
+
+ // NaCl's GDB debug stub uses the following socket system calls. We only
+ // allow then when --enable-nacl-debug is specified.
Mark Seaborn 2014/10/28 00:30:14 "then" -> "them"
+ if (enable_nacl_debug_) {
+ switch (sysno) {
#if defined(__x86_64__) || defined(__arm__) || defined(__mips__)
- // transport_common.cc needs this.
- case __NR_accept:
- case __NR_setsockopt:
+ // transport_common.cc needs this.
+ case __NR_accept:
+ case __NR_setsockopt:
+ return Allow();
#elif defined(__i386__)
- case __NR_socketcall:
+ case __NR_socketcall:
+ return Allow();
#endif
- // trusted/service_runtime/linux/thread_suspension.c needs sigwait() and is
- // used by NaCl's GDB debug stub.
Mark Seaborn 2014/10/28 00:30:14 I think it would be worth keeping this comment and
rickyz (no longer on Chrome) 2014/10/29 21:07:36 Ah, OK - moved it into the list of syscalls only a
+ default:
+ break;
+ }
+ }
+
+ switch (sysno) {
+ // trusted/service_runtime/linux/thread_suspension.c needs sigwait()
case __NR_rt_sigtimedwait:
#if defined(__i386__) || defined(__mips__)
// Needed on i386 to set-up the custom segments.
@@ -89,10 +110,6 @@ ResultExpr NaClBPFSandboxPolicy::EvaluateSyscall(int sysno) const {
case __NR_pwrite64:
case __NR_sched_get_priority_max:
case __NR_sched_get_priority_min:
- case __NR_sched_getaffinity:
- case __NR_sched_getparam:
- case __NR_sched_getscheduler:
- case __NR_sched_setscheduler:
case __NR_sysinfo:
// __NR_times needed as clock() is called by CommandBufferHelper, which is
// used by NaCl applications that use Pepper's 3D interfaces.
@@ -103,6 +120,11 @@ ResultExpr NaClBPFSandboxPolicy::EvaluateSyscall(int sysno) const {
case __NR_ioctl:
case __NR_ptrace:
return Error(EPERM);
+ case __NR_sched_getaffinity:
+ case __NR_sched_getparam:
+ case __NR_sched_getscheduler:
+ case __NR_sched_setscheduler:
+ return sandbox::RestrictSchedTarget(policy_pid_, sysno);
Mark Seaborn 2014/10/28 00:30:14 Why not call getpid() here? I'm not sure why you'
jln (very slow on Chromium) 2014/10/29 18:40:16 I actually requested that (see previous comments).
rickyz (no longer on Chrome) 2014/10/29 21:07:36 I added a CHECK in EvaluateSyscall - hopefully tha
default:
return baseline_policy_->EvaluateSyscall(sysno);
}
« no previous file with comments | « components/nacl/loader/DEPS ('k') | components/nacl/zygote/nacl_fork_delegate_linux.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698