Index: src/platform/minijail/options.h |
diff --git a/src/platform/minijail/options.h b/src/platform/minijail/options.h |
new file mode 100644 |
index 0000000000000000000000000000000000000000..68e36e992b9301cf7cde72db827b664dc5ec6f0c |
--- /dev/null |
+++ b/src/platform/minijail/options.h |
@@ -0,0 +1,184 @@ |
+// Copyright (c) 2009 The Chromium OS Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+// Some portions Copyright (c) 2009 The Chromium Authors. |
+// |
+// Options abstract class for minijails. |
+#ifndef __CHROMEOS_MINIJAIL_OPTIONS_H |
+#define __CHROMEOS_MINIJAIL_OPTIONS_H |
+ |
+#include <base/basictypes.h> |
+#include <base/logging.h> |
+#include <base/scoped_ptr.h> |
+ |
+#include "minijail/env.h" |
+ |
+namespace chromeos { |
+namespace minijail { |
+ |
+class Options { |
+ public: |
+ Options() : env_(new Env), |
+ executable_path_(NULL), |
+ argument_count_(0), |
+ arguments_(NULL), |
+ environment_(NULL), |
+ add_readonly_mounts_(false), |
+ change_gid_(false), |
+ change_uid_(false), |
+ disable_tracing_(false), |
+ enforce_syscalls_benchmark_(false), |
+ enforce_syscalls_by_source_(false), |
+ gid_(0), |
+ namespace_vfs_(false), |
+ namespace_pid_(false), |
+ sanitize_environment_(false), |
+ uid_(0), |
+ use_capabilities_(false) { } |
+ |
+ virtual ~Options() { } |
+ |
+ // Takes ownership of an Env pointer |
+ virtual const Env *env() const { return env_.get(); } |
+ virtual void set_env(Env *env) { env_.reset(env); } |
+ |
+ //// Methods for configuring the binary to be run. |
+ |
+ // Sets the path to the executable when Run() is called in the jail. |
+ // Pointer ownership is not taken. |
+ virtual void set_executable_path(const char *exe) { executable_path_ = exe; } |
+ virtual const char *executable_path() const { return executable_path_; } |
+ // Sets an array of arguments to use for running the executable. |
+ // Pointer ownership is not taken. |
+ virtual void set_arguments(char * const *argv, int count) |
+ { arguments_ = argv; argument_count_ = count; } |
+ virtual char * const *arguments() const { return arguments_; } |
+ virtual int argument_count() const { return argument_count_; } |
+ // Sets the baseline environment for the executable. |
+ // Pointer ownership is not taken. |
+ virtual void set_environment(char * const *envp) { environment_ = envp; } |
+ virtual char * const *environment() const { return environment_; } |
+ |
+ //// Methods for configuring the jail. |
+ |
+ // Determines if a read-only /proc will be mounted. |
+ // This option requires namespace_vfs_ = true. |
+ // If enabled, this option forcibly enables namespace_vfs_. |
+ virtual void set_add_readonly_mounts(bool val) { add_readonly_mounts_ = val; } |
+ virtual bool add_readonly_mounts() const { return add_readonly_mounts_; } |
+ // Disables cross-process tracing and core dumps. This may cause problems |
+ // when generating crash dumps. Options around that are TBD. |
+ virtual void set_disable_tracing(bool val) { disable_tracing_ = val; } |
+ virtual bool disable_tracing() const { return disable_tracing_; } |
+ // Enable no-op syscall filtering for raw benchmarking. |
+ virtual void set_enforce_syscalls_benchmark(bool val) |
+ { enforce_syscalls_benchmark_ = val; } |
+ virtual bool enforce_syscalls_benchmark() const |
+ { return enforce_syscalls_benchmark_; } |
+ // Enable kernel enforcement that all system calls originate from |
+ // read-only memory areas. |
+ virtual void set_enforce_syscalls_by_source(bool val) |
+ { enforce_syscalls_by_source_ = val; } |
+ virtual bool enforce_syscalls_by_source() const |
+ { return enforce_syscalls_by_source_; } |
+ // The value passed with this is numeric GID to transition to. |
+ // Calling this implies a gid change will be attempted. |
+ // TODO(wad) All supplementary groups are dropped. |
+ virtual void set_gid(gid_t val) { gid_ = val; change_gid_ = true; } |
+ virtual gid_t gid() const { return gid_; } |
+ // Sets VFS namespacing. This is needed to have a custom |
+ // filesystem view (read-only mounts, etc). |
+ virtual void set_namespace_vfs(bool val) { namespace_vfs_ = val; } |
+ virtual bool namespace_vfs() const { return namespace_vfs_; } |
+ // Enable PID namespacing. This will result in the process being |
+ // executed to be PID 1 in their own process tree. The process will |
+ // not have visibility into other running processes (except via |
+ // /proc if not remounted). |
+ // TODO(wad) add init-like functionality and start the first process as pid 2. |
+ virtual void set_namespace_pid(bool val) { namespace_pid_ = val; } |
+ virtual bool namespace_pid() const { return namespace_pid_; } |
+ // Enables environment variable scrubbing. |
+ virtual void set_sanitize_environment(bool val) |
+ { sanitize_environment_ = val; } |
+ virtual bool sanitize_environment() const |
+ { return sanitize_environment_; } |
+ // The value passed with this is the numeric UID to transition to. |
+ virtual void set_uid(uid_t val) { uid_ = val; change_uid_ = true; } |
+ virtual uid_t uid() const { return uid_; } |
+ // Enables the use and sanitization of POSIX capabilities. |
+ // Without kKeepCapabilities, all capabilities save CAP_SETPCAP are |
+ // removed from the effective, inherited, permitted and bounding sets. |
+ virtual void set_use_capabilities(bool val) { use_capabilities_ = val; } |
+ virtual bool use_capabilities() const { return use_capabilities_; } |
+ |
+#if 0 |
+ TODO(wad): additional functionality: |
+ virtual void set_cgroup_dir(const string& val) { cgroup_dir_ = val; } |
+ virtual const string& cgroup_dir() const { return cgroup_dir_; } |
+ |
+ virtual void set_supplemental_groups(std::vector<std::string>& val) |
+ { supplemental_groups_ = val; } |
+ virtual const std::vector<std::string> *supplemental_groups() const |
+ { return supplemental_groups_; } |
+ |
+ virtual void set_bounding_set(uint64 val) { bounding_set_ = val; } |
+ virtual uint64 bounding_set() const { return bounding_set_; } |
+ |
+ virtual void set_use_delayed_chroot(bool val) { use_delayed_chroot_ = val; } |
+ virtual bool use_delayed_chroot() const { return use_delayed_chroot_; } |
+ |
+ virtual void set_memory_limit(int64 val) { memory_limit_ = val; } |
+ virtual int64 memory_limit() const { return memory_limit_; } |
+ |
+ virtual void set_cpu_limit(int64 val) { cpu_limit_ = val; } |
+ virtual int64 cpu_limit() const { return cpu_limit_; } |
+ |
+ virtual void set_open_file_limit(int32 val) { open_file_limit_ = val; } |
+ virtual int32 open_file_limit() const { return open_file_limit_; } |
+ |
+ TODO(wad) other rlimits |
+ |
+ virtual void set_chroot(const std::string val) { chroot_ = val; } |
+ virtual const std::string chroot() const { return chroot_; } |
+ |
+ virtual void set_install_device_shims(bool val) |
+ { install_device_shims_ = val; } |
+ virtual bool install_device_shims() const { return install_device_shims_; } |
+#endif |
+ |
+ //// Helper methods |
+ // Indicate if the uid was set. |
+ virtual bool change_uid() const { return change_uid_; } |
+ // Indicate if the gid was set. |
+ virtual bool change_gid() const { return change_uid_; } |
+ // Ensures that all inter-dependent options are properly set. |
+ virtual bool FixUpDependencies(); |
+ |
+ |
+ private: |
+ scoped_ptr<Env> env_; |
+ const char *executable_path_; |
+ int argument_count_; |
+ char * const *arguments_; |
+ char * const *environment_; |
+ |
+ bool add_readonly_mounts_; |
+ bool change_gid_; |
+ bool change_uid_; |
+ bool disable_tracing_; |
+ bool enforce_syscalls_benchmark_; |
+ bool enforce_syscalls_by_source_; |
+ gid_t gid_; |
+ bool namespace_vfs_; |
+ bool namespace_pid_; |
+ bool sanitize_environment_; |
+ uid_t uid_; |
+ bool use_capabilities_; |
+ |
+ DISALLOW_COPY_AND_ASSIGN(Options); |
+}; |
+ |
+} // namespace minijail |
+} // namespace chromeos |
+ |
+#endif // __CHROMEOS_MINIJAIL_OPTIONS_H |