Commit a4db7772 authored by isherman@chromium.org's avatar isherman@chromium.org

Revert of Remove SandboxBPF's dependency on CompatibilityPolicy...

Revert of Remove SandboxBPF's dependency on CompatibilityPolicy (https://codereview.chromium.org/290223002/)

Reason for revert:
Broke VerboseAPITesting in sandbox_linux_unittests on Linux: http://build.chromium.org/p/chromium.linux/buildstatus?builder=Linux%20Tests%20%28dbg%29%282%29%2832%29&number=13046

Original issue's description:
> Remove SandboxBPF's dependency on CompatibilityPolicy
> 
> SandboxBPF users are now required to always provide a SandboxBPFPolicy
> instead of a SyscallEvaluator.  CompatibilityPolicy can't be removed
> just yet though because it's still used by the deprecated BPF_TEST
> macros.
> 
> Committed: https://src.chromium.org/viewvc/chrome?view=rev&revision=271607

TBR=jln@chromium.org,mdempsky@chromium.org
NOTREECHECKS=true
NOTRY=true

Review URL: https://codereview.chromium.org/293993006

git-svn-id: svn://svn.chromium.org/chrome/trunk/src@271621 0039d316-1c4b-4281-b951-d872f2087c98
parent 63309812
...@@ -26,15 +26,12 @@ ...@@ -26,15 +26,12 @@
#include <time.h> #include <time.h>
#include <unistd.h> #include <unistd.h>
#include "base/macros.h"
#include "base/posix/eintr_wrapper.h" #include "base/posix/eintr_wrapper.h"
#include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
#include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
#include "sandbox/linux/services/linux_syscalls.h" #include "sandbox/linux/services/linux_syscalls.h"
using sandbox::ErrorCode; using sandbox::ErrorCode;
using sandbox::SandboxBPF; using sandbox::SandboxBPF;
using sandbox::SandboxBPFPolicy;
using sandbox::arch_seccomp_data; using sandbox::arch_seccomp_data;
#define ERR EPERM #define ERR EPERM
...@@ -240,17 +237,7 @@ intptr_t DefaultHandler(const struct arch_seccomp_data& data, void *) { ...@@ -240,17 +237,7 @@ intptr_t DefaultHandler(const struct arch_seccomp_data& data, void *) {
return -ERR; return -ERR;
} }
class DemoPolicy : public SandboxBPFPolicy { ErrorCode Evaluator(SandboxBPF* sandbox, int sysno, void *) {
public:
DemoPolicy() {}
virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox,
int sysno) const OVERRIDE;
private:
DISALLOW_COPY_AND_ASSIGN(DemoPolicy);
};
ErrorCode DemoPolicy::EvaluateSyscall(SandboxBPF* sandbox, int sysno) const {
switch (sysno) { switch (sysno) {
#if defined(__NR_accept) #if defined(__NR_accept)
case __NR_accept: case __NR_accept4: case __NR_accept: case __NR_accept4:
...@@ -433,7 +420,7 @@ int main(int argc, char *argv[]) { ...@@ -433,7 +420,7 @@ int main(int argc, char *argv[]) {
} }
SandboxBPF sandbox; SandboxBPF sandbox;
sandbox.set_proc_fd(proc_fd); sandbox.set_proc_fd(proc_fd);
sandbox.SetSandboxPolicy(new DemoPolicy()); sandbox.SetSandboxPolicyDeprecated(Evaluator, NULL);
if (!sandbox.StartSandbox(SandboxBPF::PROCESS_SINGLE_THREADED)) { if (!sandbox.StartSandbox(SandboxBPF::PROCESS_SINGLE_THREADED)) {
fprintf(stderr, "StartSandbox() failed"); fprintf(stderr, "StartSandbox() failed");
_exit(1); _exit(1);
......
...@@ -22,10 +22,10 @@ ...@@ -22,10 +22,10 @@
#include "base/compiler_specific.h" #include "base/compiler_specific.h"
#include "base/logging.h" #include "base/logging.h"
#include "base/macros.h"
#include "base/memory/scoped_ptr.h" #include "base/memory/scoped_ptr.h"
#include "base/posix/eintr_wrapper.h" #include "base/posix/eintr_wrapper.h"
#include "sandbox/linux/seccomp-bpf/codegen.h" #include "sandbox/linux/seccomp-bpf/codegen.h"
#include "sandbox/linux/seccomp-bpf/sandbox_bpf_compatibility_policy.h"
#include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" #include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h"
#include "sandbox/linux/seccomp-bpf/syscall.h" #include "sandbox/linux/seccomp-bpf/syscall.h"
#include "sandbox/linux/seccomp-bpf/syscall_iterator.h" #include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
...@@ -57,10 +57,8 @@ void WriteFailedStderrSetupMessage(int out_fd) { ...@@ -57,10 +57,8 @@ void WriteFailedStderrSetupMessage(int out_fd) {
// We define a really simple sandbox policy. It is just good enough for us // We define a really simple sandbox policy. It is just good enough for us
// to tell that the sandbox has actually been activated. // to tell that the sandbox has actually been activated.
class ProbePolicy : public SandboxBPFPolicy { ErrorCode ProbeEvaluator(SandboxBPF*, int sysnum, void*) __attribute__((const));
public: ErrorCode ProbeEvaluator(SandboxBPF*, int sysnum, void*) {
ProbePolicy() {}
virtual ErrorCode EvaluateSyscall(SandboxBPF*, int sysnum) const OVERRIDE {
switch (sysnum) { switch (sysnum) {
case __NR_getpid: case __NR_getpid:
// Return EPERM so that we can check that the filter actually ran. // Return EPERM so that we can check that the filter actually ran.
...@@ -72,11 +70,7 @@ class ProbePolicy : public SandboxBPFPolicy { ...@@ -72,11 +70,7 @@ class ProbePolicy : public SandboxBPFPolicy {
// Make everything else fail in an easily recognizable way. // Make everything else fail in an easily recognizable way.
return ErrorCode(EINVAL); return ErrorCode(EINVAL);
} }
} }
private:
DISALLOW_COPY_AND_ASSIGN(ProbePolicy);
};
void ProbeProcess(void) { void ProbeProcess(void) {
if (syscall(__NR_getpid) < 0 && errno == EPERM) { if (syscall(__NR_getpid) < 0 && errno == EPERM) {
...@@ -84,17 +78,10 @@ void ProbeProcess(void) { ...@@ -84,17 +78,10 @@ void ProbeProcess(void) {
} }
} }
class AllowAllPolicy : public SandboxBPFPolicy { ErrorCode AllowAllEvaluator(SandboxBPF*, int sysnum, void*) {
public:
AllowAllPolicy() {}
virtual ErrorCode EvaluateSyscall(SandboxBPF*, int sysnum) const OVERRIDE {
DCHECK(SandboxBPF::IsValidSyscallNumber(sysnum)); DCHECK(SandboxBPF::IsValidSyscallNumber(sysnum));
return ErrorCode(ErrorCode::ERR_ALLOWED); return ErrorCode(ErrorCode::ERR_ALLOWED);
} }
private:
DISALLOW_COPY_AND_ASSIGN(AllowAllPolicy);
};
void TryVsyscallProcess(void) { void TryVsyscallProcess(void) {
time_t current_time; time_t current_time;
...@@ -252,7 +239,8 @@ bool SandboxBPF::IsValidSyscallNumber(int sysnum) { ...@@ -252,7 +239,8 @@ bool SandboxBPF::IsValidSyscallNumber(int sysnum) {
} }
bool SandboxBPF::RunFunctionInPolicy(void (*code_in_sandbox)(), bool SandboxBPF::RunFunctionInPolicy(void (*code_in_sandbox)(),
scoped_ptr<SandboxBPFPolicy> policy) { EvaluateSyscall syscall_evaluator,
void* aux) {
// Block all signals before forking a child process. This prevents an // Block all signals before forking a child process. This prevents an
// attacker from manipulating our test by sending us an unexpected signal. // attacker from manipulating our test by sending us an unexpected signal.
sigset_t old_mask, new_mask; sigset_t old_mask, new_mask;
...@@ -322,7 +310,7 @@ bool SandboxBPF::RunFunctionInPolicy(void (*code_in_sandbox)(), ...@@ -322,7 +310,7 @@ bool SandboxBPF::RunFunctionInPolicy(void (*code_in_sandbox)(),
#endif #endif
} }
SetSandboxPolicy(policy.release()); SetSandboxPolicyDeprecated(syscall_evaluator, aux);
if (!StartSandbox(PROCESS_SINGLE_THREADED)) { if (!StartSandbox(PROCESS_SINGLE_THREADED)) {
SANDBOX_DIE(NULL); SANDBOX_DIE(NULL);
} }
...@@ -371,11 +359,8 @@ bool SandboxBPF::RunFunctionInPolicy(void (*code_in_sandbox)(), ...@@ -371,11 +359,8 @@ bool SandboxBPF::RunFunctionInPolicy(void (*code_in_sandbox)(),
} }
bool SandboxBPF::KernelSupportSeccompBPF() { bool SandboxBPF::KernelSupportSeccompBPF() {
return RunFunctionInPolicy(ProbeProcess, return RunFunctionInPolicy(ProbeProcess, ProbeEvaluator, 0) &&
scoped_ptr<SandboxBPFPolicy>(new ProbePolicy())) && RunFunctionInPolicy(TryVsyscallProcess, AllowAllEvaluator, 0);
RunFunctionInPolicy(
TryVsyscallProcess,
scoped_ptr<SandboxBPFPolicy>(new AllowAllPolicy()));
} }
SandboxBPF::SandboxStatus SandboxBPF::SupportsSeccompSandbox(int proc_fd) { SandboxBPF::SandboxStatus SandboxBPF::SupportsSeccompSandbox(int proc_fd) {
...@@ -490,6 +475,15 @@ void SandboxBPF::PolicySanityChecks(SandboxBPFPolicy* policy) { ...@@ -490,6 +475,15 @@ void SandboxBPF::PolicySanityChecks(SandboxBPFPolicy* policy) {
return; return;
} }
// Deprecated API, supported with a wrapper to the new API.
void SandboxBPF::SetSandboxPolicyDeprecated(EvaluateSyscall syscall_evaluator,
void* aux) {
if (sandbox_has_started_ || !conds_) {
SANDBOX_DIE("Cannot change policy after sandbox has started");
}
SetSandboxPolicy(new CompatibilityPolicy<void>(syscall_evaluator, aux));
}
// Don't take a scoped_ptr here, polymorphism make their use awkward. // Don't take a scoped_ptr here, polymorphism make their use awkward.
void SandboxBPF::SetSandboxPolicy(SandboxBPFPolicy* policy) { void SandboxBPF::SetSandboxPolicy(SandboxBPFPolicy* policy) {
DCHECK(!policy_); DCHECK(!policy_);
......
...@@ -65,6 +65,14 @@ class SANDBOX_EXPORT SandboxBPF { ...@@ -65,6 +65,14 @@ class SANDBOX_EXPORT SandboxBPF {
PROCESS_MULTI_THREADED, // The program may be multi-threaded. PROCESS_MULTI_THREADED, // The program may be multi-threaded.
}; };
// When calling setSandboxPolicy(), the caller can provide an arbitrary
// pointer in |aux|. This pointer will then be forwarded to the sandbox
// policy each time a call is made through an EvaluateSyscall function
// pointer. One common use case would be to pass the "aux" pointer as an
// argument to Trap() functions.
typedef ErrorCode (*EvaluateSyscall)(SandboxBPF* sandbox_compiler,
int system_call_number,
void* aux);
// A vector of BPF instructions that need to be installed as a filter // A vector of BPF instructions that need to be installed as a filter
// program in the kernel. // program in the kernel.
typedef std::vector<struct sock_filter> Program; typedef std::vector<struct sock_filter> Program;
...@@ -101,6 +109,20 @@ class SANDBOX_EXPORT SandboxBPF { ...@@ -101,6 +109,20 @@ class SANDBOX_EXPORT SandboxBPF {
// eventually close it when "StartSandbox()" executes. // eventually close it when "StartSandbox()" executes.
void set_proc_fd(int proc_fd); void set_proc_fd(int proc_fd);
// The system call evaluator function is called with the system
// call number. It can decide to allow the system call unconditionally
// by returning ERR_ALLOWED; it can deny the system call unconditionally by
// returning an appropriate "errno" value; or it can request inspection
// of system call argument(s) by returning a suitable ErrorCode.
// The "aux" parameter can be used to pass optional data to the system call
// evaluator. There are different possible uses for this data, but one of the
// use cases would be for the policy to then forward this pointer to a Trap()
// handler. In this case, of course, the data that is pointed to must remain
// valid for the entire time that Trap() handlers can be called; typically,
// this would be the lifetime of the program.
// DEPRECATED: use the policy interface below.
void SetSandboxPolicyDeprecated(EvaluateSyscall syscallEvaluator, void* aux);
// Set the BPF policy as |policy|. Ownership of |policy| is transfered here // Set the BPF policy as |policy|. Ownership of |policy| is transfered here
// to the sandbox object. // to the sandbox object.
void SetSandboxPolicy(SandboxBPFPolicy* policy); void SetSandboxPolicy(SandboxBPFPolicy* policy);
...@@ -207,7 +229,8 @@ class SANDBOX_EXPORT SandboxBPF { ...@@ -207,7 +229,8 @@ class SANDBOX_EXPORT SandboxBPF {
// policy. The caller has to make sure that "this" has not yet been // policy. The caller has to make sure that "this" has not yet been
// initialized with any other policies. // initialized with any other policies.
bool RunFunctionInPolicy(void (*code_in_sandbox)(), bool RunFunctionInPolicy(void (*code_in_sandbox)(),
scoped_ptr<SandboxBPFPolicy> policy); EvaluateSyscall syscall_evaluator,
void* aux);
// Performs a couple of sanity checks to verify that the kernel supports the // Performs a couple of sanity checks to verify that the kernel supports the
// features that we need for successful sandboxing. // features that we need for successful sandboxing.
......
...@@ -22,7 +22,6 @@ ...@@ -22,7 +22,6 @@
#include "base/bind.h" #include "base/bind.h"
#include "base/logging.h" #include "base/logging.h"
#include "base/macros.h"
#include "base/memory/scoped_ptr.h" #include "base/memory/scoped_ptr.h"
#include "build/build_config.h" #include "build/build_config.h"
#include "sandbox/linux/seccomp-bpf/bpf_tests.h" #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
...@@ -85,38 +84,29 @@ intptr_t FakeGetPid(const struct arch_seccomp_data& args, void* aux) { ...@@ -85,38 +84,29 @@ intptr_t FakeGetPid(const struct arch_seccomp_data& args, void* aux) {
return (*pid_ptr)++; return (*pid_ptr)++;
} }
class VerboseAPITestingPolicy : public SandboxBPFPolicy { ErrorCode VerboseAPITestingPolicy(SandboxBPF* sandbox, int sysno, void* aux) {
public: if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
VerboseAPITestingPolicy(pid_t* pid_ptr) : pid_ptr_(pid_ptr) {} return ErrorCode(ENOSYS);
} else if (sysno == __NR_getpid) {
virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox, return sandbox->Trap(FakeGetPid, aux);
int sysno) const OVERRIDE { } else {
DCHECK(SandboxBPF::IsValidSyscallNumber(sysno));
if (sysno == __NR_getpid) {
return sandbox->Trap(FakeGetPid, pid_ptr_);
}
return ErrorCode(ErrorCode::ERR_ALLOWED); return ErrorCode(ErrorCode::ERR_ALLOWED);
} }
}
private:
pid_t* pid_ptr_;
DISALLOW_COPY_AND_ASSIGN(VerboseAPITestingPolicy);
};
SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(VerboseAPITesting)) { SANDBOX_TEST(SandboxBPF, DISABLE_ON_TSAN(VerboseAPITesting)) {
if (SandboxBPF::SupportsSeccompSandbox(-1) == if (SandboxBPF::SupportsSeccompSandbox(-1) ==
sandbox::SandboxBPF::STATUS_AVAILABLE) { sandbox::SandboxBPF::STATUS_AVAILABLE) {
pid_t pid; pid_t test_var = 0;
SandboxBPF sandbox; SandboxBPF sandbox;
sandbox.SetSandboxPolicy(new VerboseAPITestingPolicy(&pid)); sandbox.SetSandboxPolicyDeprecated(VerboseAPITestingPolicy, &test_var);
BPF_ASSERT(sandbox.StartSandbox(SandboxBPF::PROCESS_SINGLE_THREADED)); BPF_ASSERT(sandbox.StartSandbox(SandboxBPF::PROCESS_SINGLE_THREADED));
BPF_ASSERT_EQ(0, pid); BPF_ASSERT(test_var == 0);
BPF_ASSERT_EQ(0, syscall(__NR_getpid)); BPF_ASSERT(syscall(__NR_getpid) == 0);
BPF_ASSERT_EQ(1, pid); BPF_ASSERT(test_var == 1);
BPF_ASSERT_EQ(1, syscall(__NR_getpid)); BPF_ASSERT(syscall(__NR_getpid) == 1);
BPF_ASSERT_EQ(2, pid); BPF_ASSERT(test_var == 2);
// N.B.: Any future call to getpid() would corrupt the stack. // N.B.: Any future call to getpid() would corrupt the stack.
// This is OK. The SANDBOX_TEST() macro is guaranteed to // This is OK. The SANDBOX_TEST() macro is guaranteed to
...@@ -294,12 +284,11 @@ BPF_TEST(SandboxBPF, ErrnoTest, ErrnoTestPolicy) { ...@@ -294,12 +284,11 @@ BPF_TEST(SandboxBPF, ErrnoTest, ErrnoTestPolicy) {
// Testing the stacking of two sandboxes // Testing the stacking of two sandboxes
class StackingPolicyPartOne : public SandboxBPFPolicy { ErrorCode StackingPolicyPartOne(SandboxBPF* sandbox, int sysno, void*) {
public: if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
StackingPolicyPartOne() {} return ErrorCode(ENOSYS);
virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox, }
int sysno) const OVERRIDE {
DCHECK(SandboxBPF::IsValidSyscallNumber(sysno));
switch (sysno) { switch (sysno) {
case __NR_getppid: case __NR_getppid:
return sandbox->Cond(0, return sandbox->Cond(0,
...@@ -311,18 +300,13 @@ class StackingPolicyPartOne : public SandboxBPFPolicy { ...@@ -311,18 +300,13 @@ class StackingPolicyPartOne : public SandboxBPFPolicy {
default: default:
return ErrorCode(ErrorCode::ERR_ALLOWED); return ErrorCode(ErrorCode::ERR_ALLOWED);
} }
} }
private: ErrorCode StackingPolicyPartTwo(SandboxBPF* sandbox, int sysno, void*) {
DISALLOW_COPY_AND_ASSIGN(StackingPolicyPartOne); if (!SandboxBPF::IsValidSyscallNumber(sysno)) {
}; return ErrorCode(ENOSYS);
}
class StackingPolicyPartTwo : public SandboxBPFPolicy {
public:
StackingPolicyPartTwo() {}
virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox,
int sysno) const OVERRIDE {
DCHECK(SandboxBPF::IsValidSyscallNumber(sysno));
switch (sysno) { switch (sysno) {
case __NR_getppid: case __NR_getppid:
return sandbox->Cond(0, return sandbox->Cond(0,
...@@ -334,13 +318,9 @@ class StackingPolicyPartTwo : public SandboxBPFPolicy { ...@@ -334,13 +318,9 @@ class StackingPolicyPartTwo : public SandboxBPFPolicy {
default: default:
return ErrorCode(ErrorCode::ERR_ALLOWED); return ErrorCode(ErrorCode::ERR_ALLOWED);
} }
} }
private:
DISALLOW_COPY_AND_ASSIGN(StackingPolicyPartTwo);
};
BPF_TEST_C(SandboxBPF, StackingPolicy, StackingPolicyPartOne) { BPF_TEST(SandboxBPF, StackingPolicy, StackingPolicyPartOne) {
errno = 0; errno = 0;
BPF_ASSERT(syscall(__NR_getppid, 0) > 0); BPF_ASSERT(syscall(__NR_getppid, 0) > 0);
BPF_ASSERT(errno == 0); BPF_ASSERT(errno == 0);
...@@ -351,7 +331,7 @@ BPF_TEST_C(SandboxBPF, StackingPolicy, StackingPolicyPartOne) { ...@@ -351,7 +331,7 @@ BPF_TEST_C(SandboxBPF, StackingPolicy, StackingPolicyPartOne) {
// Stack a second sandbox with its own policy. Verify that we can further // Stack a second sandbox with its own policy. Verify that we can further
// restrict filters, but we cannot relax existing filters. // restrict filters, but we cannot relax existing filters.
SandboxBPF sandbox; SandboxBPF sandbox;
sandbox.SetSandboxPolicy(new StackingPolicyPartTwo()); sandbox.SetSandboxPolicyDeprecated(StackingPolicyPartTwo, NULL);
BPF_ASSERT(sandbox.StartSandbox(SandboxBPF::PROCESS_SINGLE_THREADED)); BPF_ASSERT(sandbox.StartSandbox(SandboxBPF::PROCESS_SINGLE_THREADED));
errno = 0; errno = 0;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment