Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1)

Side by Side Diff: mandoline/app/desktop/linux_sandbox.h

Issue 1264463005: mandoline sandbox: prewarm libraries before we raise the sandbox. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Add security checks to LinuxSandbox::Warmup() Created 5 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « mandoline/app/desktop/BUILD.gn ('k') | mandoline/app/desktop/linux_sandbox.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #ifndef MANDOLINE_APP_DESKTOP_LINUX_SANDBOX_H_
6 #define MANDOLINE_APP_DESKTOP_LINUX_SANDBOX_H_
7
8 #include "base/files/scoped_file.h"
9 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
10 #include "sandbox/linux/bpf_dsl/policy.h"
11 #include "sandbox/linux/syscall_broker/broker_process.h"
12
13 namespace mandoline {
14
15 // Encapsulates all tasks related to raising the sandbox for mandoline.
16 class LinuxSandbox {
17 public:
18 explicit LinuxSandbox(
19 const std::vector<sandbox::syscall_broker::BrokerFilePermission>&
20 permissions);
21 ~LinuxSandbox();
22
23 // Returns a vector of file permissions needed to load libraries.
24 static std::vector<sandbox::syscall_broker::BrokerFilePermission>
25 GetPermissions();
26
27 // Grabs a file descriptor to /proc.
28 void Warmup();
29
30 // Puts the user in a new PID namespace.
31 void EngageNamespaceSandbox();
32
33 // Starts a broker process and sets up seccomp-bpf to delegate decisions to
34 // it.
35 void EngageSeccompSandbox();
36
37 // Performs the dropping of access to the outside world (drops the reference
38 // to /proc acquired in Warmup().
39 void Seal();
40
41 private:
42 bool warmed_up_;
43 base::ScopedFD proc_fd_;
44 scoped_ptr<sandbox::syscall_broker::BrokerProcess> broker_;
45 scoped_ptr<sandbox::bpf_dsl::Policy> policy_;
46
47 DISALLOW_COPY_AND_ASSIGN(LinuxSandbox);
48 };
49
50 } // namespace mandoline
51
52 #endif // MANDOLINE_APP_DESKTOP_LINUX_SANDBOX_H_
OLDNEW
« no previous file with comments | « mandoline/app/desktop/BUILD.gn ('k') | mandoline/app/desktop/linux_sandbox.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698