| // Copyright 2017 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "services/service_manager/sandbox/linux/bpf_cdm_policy_linux.h" |
| |
| #include <errno.h> |
| |
| #include "build/build_config.h" |
| #include "sandbox/linux/bpf_dsl/bpf_dsl.h" |
| #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h" |
| #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" |
| #include "sandbox/linux/system_headers/linux_syscalls.h" |
| #include "services/service_manager/sandbox/linux/sandbox_linux.h" |
| |
| using sandbox::SyscallSets; |
| using sandbox::bpf_dsl::Allow; |
| using sandbox::bpf_dsl::Error; |
| using sandbox::bpf_dsl::ResultExpr; |
| |
| namespace service_manager { |
| |
| CdmProcessPolicy::CdmProcessPolicy() {} |
| CdmProcessPolicy::~CdmProcessPolicy() {} |
| |
| ResultExpr CdmProcessPolicy::EvaluateSyscall(int sysno) const { |
| switch (sysno) { |
| case __NR_ioctl: |
| return sandbox::RestrictIoctl(); |
| // Allow the system calls below. |
| case __NR_fdatasync: |
| case __NR_fsync: |
| case __NR_ftruncate: |
| #if defined(__i386__) || defined(__x86_64__) || defined(__mips__) || \ |
| defined(__aarch64__) |
| case __NR_getrlimit: |
| #endif |
| #if defined(__i386__) || defined(__arm__) |
| case __NR_ugetrlimit: |
| #endif |
| case __NR_mremap: // https://crbug.com/546204 |
| case __NR_pread64: |
| case __NR_pwrite64: |
| case __NR_sysinfo: |
| case __NR_times: |
| case __NR_uname: |
| return Allow(); |
| case __NR_sched_getaffinity: |
| return sandbox::RestrictSchedTarget(GetPolicyPid(), sysno); |
| default: |
| // Default on the content baseline policy. |
| return BPFBasePolicy::EvaluateSyscall(sysno); |
| } |
| } |
| |
| } // namespace service_manager |