Index: sandbox/mac/bootstrap_sandbox.cc |
diff --git a/sandbox/mac/bootstrap_sandbox.cc b/sandbox/mac/bootstrap_sandbox.cc |
index a90f570eb47487524acecdd11e903c8e60eeeb40..e8997f9ef68f774a5a826312add6fee87f47c71a 100644 |
--- a/sandbox/mac/bootstrap_sandbox.cc |
+++ b/sandbox/mac/bootstrap_sandbox.cc |
@@ -10,18 +10,53 @@ |
#include "base/logging.h" |
#include "base/mac/foundation_util.h" |
#include "base/mac/mach_logging.h" |
+#include "base/rand_util.h" |
#include "base/strings/stringprintf.h" |
#include "sandbox/mac/launchd_interception_server.h" |
+#include "sandbox/mac/pre_exec_delegate.h" |
namespace sandbox { |
-const int kNotAPolicy = -1; |
+namespace { |
+ |
+struct SandboxCheckInRequest { |
+ mach_msg_header_t header; |
+ uint64_t token; |
+}; |
+ |
+struct SandboxCheckInReply { |
+ mach_msg_header_t header; |
+ mach_msg_body_t body; |
+ mach_msg_port_descriptor_t bootstrap_port; |
+}; |
+ |
+class ScopedCallMachMsgDestroy { |
+ public: |
+ explicit ScopedCallMachMsgDestroy(mach_msg_header_t* message) |
+ : message_(message) {} |
+ |
+ ~ScopedCallMachMsgDestroy() { |
+ if (message_) |
+ mach_msg_destroy(message_); |
+ } |
+ |
+ void Disarm() { |
+ message_ = nullptr; |
+ } |
+ |
+ private: |
+ mach_msg_header_t* message_; |
+ |
+ DISALLOW_COPY_AND_ASSIGN(ScopedCallMachMsgDestroy); |
+}; |
+ |
+} // namespace |
// static |
scoped_ptr<BootstrapSandbox> BootstrapSandbox::Create() { |
scoped_ptr<BootstrapSandbox> null; // Used for early returns. |
scoped_ptr<BootstrapSandbox> sandbox(new BootstrapSandbox()); |
- sandbox->server_.reset(new LaunchdInterceptionServer(sandbox.get())); |
+ sandbox->launchd_server_.reset(new LaunchdInterceptionServer(sandbox.get())); |
// Check in with launchd to get the receive right for the server that is |
// published in the bootstrap namespace. |
@@ -33,17 +68,67 @@ scoped_ptr<BootstrapSandbox> BootstrapSandbox::Create() { |
<< "Failed to bootstrap_check_in the sandbox server."; |
return null.Pass(); |
} |
- base::mac::ScopedMachReceiveRight scoped_port(port); |
+ sandbox->check_in_port_.reset(port); |
+ |
+ BootstrapSandbox* __block sandbox_ptr = sandbox.get(); |
+ sandbox->check_in_server_.reset(new base::DispatchSourceMach( |
+ "org.chromium.sandbox.BootstrapClientManager", |
+ sandbox->check_in_port_.get(), |
+ ^{ sandbox_ptr->HandleChildCheckIn(); })); |
+ sandbox->check_in_server_->Resume(); |
// Start the sandbox server. |
- if (sandbox->server_->Initialize(scoped_port.get())) |
- ignore_result(scoped_port.release()); // Transferred to server_. |
- else |
+ if (!sandbox->launchd_server_->Initialize(MACH_PORT_NULL)) |
return null.Pass(); |
return sandbox.Pass(); |
} |
+// Warning: This function must be safe to call in |
+// PreExecDelegate::RunAsyncSafe(). |
+// static |
+bool BootstrapSandbox::ClientCheckIn(mach_port_t sandbox_server_port, |
+ uint64_t sandbox_token, |
+ mach_port_t* new_bootstrap_port) { |
+ // Create a reply port for the check in message. |
+ mach_port_t reply_port; |
+ kern_return_t kr = mach_port_allocate(mach_task_self(), |
+ MACH_PORT_RIGHT_RECEIVE, |
+ &reply_port); |
+ if (kr != KERN_SUCCESS) { |
+ RAW_LOG(ERROR, "ClientCheckIn: mach_port_allocate failed"); |
+ return false; |
+ } |
+ base::mac::ScopedMachReceiveRight scoped_reply_port(reply_port); |
+ |
+ // Check in with the sandbox server, presenting the |sandbox_token| in |
+ // exchange for a new task bootstrap port. |
+ union { |
+ SandboxCheckInRequest request; |
+ struct { |
+ SandboxCheckInReply reply; |
+ mach_msg_trailer_t trailer; |
+ }; |
+ } msg = {}; |
+ msg.request.header.msgh_bits = MACH_MSGH_BITS(MACH_MSG_TYPE_COPY_SEND, |
+ MACH_MSG_TYPE_MAKE_SEND_ONCE); |
+ msg.request.header.msgh_remote_port = sandbox_server_port; |
+ msg.request.header.msgh_local_port = reply_port; |
+ msg.request.header.msgh_size = sizeof(msg); |
+ msg.request.token = sandbox_token; |
+ |
+ kr = mach_msg(&msg.request.header, MACH_SEND_MSG | MACH_RCV_MSG, |
+ sizeof(msg.request), sizeof(msg), reply_port, |
+ MACH_MSG_TIMEOUT_NONE, MACH_PORT_NULL); |
+ if (kr == KERN_SUCCESS) { |
+ *new_bootstrap_port = msg.reply.bootstrap_port.name; |
+ return true; |
+ } else { |
+ RAW_LOG(ERROR, "ClientCheckIn: mach_msg failed"); |
+ return false; |
+ } |
+} |
+ |
BootstrapSandbox::~BootstrapSandbox() { |
} |
@@ -51,48 +136,35 @@ void BootstrapSandbox::RegisterSandboxPolicy( |
int sandbox_policy_id, |
const BootstrapSandboxPolicy& policy) { |
CHECK(IsPolicyValid(policy)); |
- CHECK_GT(sandbox_policy_id, kNotAPolicy); |
base::AutoLock lock(lock_); |
DCHECK(policies_.find(sandbox_policy_id) == policies_.end()); |
policies_.insert(std::make_pair(sandbox_policy_id, policy)); |
} |
-void BootstrapSandbox::PrepareToForkWithPolicy(int sandbox_policy_id) { |
+scoped_ptr<PreExecDelegate> BootstrapSandbox::NewClient(int sandbox_policy_id) { |
base::AutoLock lock(lock_); |
- // Verify that this is a real policy. |
- CHECK(policies_.find(sandbox_policy_id) != policies_.end()); |
- CHECK_EQ(kNotAPolicy, effective_policy_id_) |
- << "Cannot nest calls to PrepareToForkWithPolicy()"; |
+ DCHECK(policies_.find(sandbox_policy_id) != policies_.end()); |
- // Store the policy for the process we're about to create. |
- effective_policy_id_ = sandbox_policy_id; |
-} |
+ uint64_t token; |
+ while (true) { |
+ token = base::RandUint64(); |
+ if (awaiting_processes_.find(token) == awaiting_processes_.end()) |
+ break; |
+ } |
-// TODO(rsesek): The |lock_| needs to be taken twice because |
-// base::LaunchProcess handles both fork+exec, and holding the lock for the |
-// duration would block servicing of other bootstrap messages. If a better |
-// LaunchProcess existed (do arbitrary work without layering violations), this |
-// could be avoided. |
+ awaiting_processes_[token] = sandbox_policy_id; |
+ return make_scoped_ptr(new PreExecDelegate(server_bootstrap_name_, token)); |
+} |
-void BootstrapSandbox::FinishedFork(base::ProcessHandle handle) { |
+void BootstrapSandbox::RevokeToken(uint64_t token) { |
base::AutoLock lock(lock_); |
- |
- CHECK_NE(kNotAPolicy, effective_policy_id_) |
- << "Must PrepareToForkWithPolicy() before FinishedFork()"; |
- |
- // Apply the policy to the new process. |
- if (handle != base::kNullProcessHandle) { |
- const auto& existing_process = sandboxed_processes_.find(handle); |
- CHECK(existing_process == sandboxed_processes_.end()); |
- sandboxed_processes_.insert(std::make_pair(handle, effective_policy_id_)); |
- VLOG(3) << "Bootstrap sandbox enforced for pid " << handle; |
- } |
- |
- effective_policy_id_ = kNotAPolicy; |
+ const auto& it = awaiting_processes_.find(token); |
+ if (it != awaiting_processes_.end()) |
+ awaiting_processes_.erase(it); |
} |
-void BootstrapSandbox::ChildDied(base::ProcessHandle handle) { |
+void BootstrapSandbox::InvalidateClient(base::ProcessHandle handle) { |
base::AutoLock lock(lock_); |
const auto& it = sandboxed_processes_.find(handle); |
if (it != sandboxed_processes_.end()) |
@@ -103,26 +175,18 @@ const BootstrapSandboxPolicy* BootstrapSandbox::PolicyForProcess( |
pid_t pid) const { |
base::AutoLock lock(lock_); |
const auto& process = sandboxed_processes_.find(pid); |
- |
- // The new child could send bootstrap requests before the parent calls |
- // FinishedFork(). |
- int policy_id = effective_policy_id_; |
if (process != sandboxed_processes_.end()) { |
- policy_id = process->second; |
+ return &policies_.find(process->second)->second; |
} |
- if (policy_id == kNotAPolicy) |
- return NULL; |
- |
- return &policies_.find(policy_id)->second; |
+ return nullptr; |
} |
BootstrapSandbox::BootstrapSandbox() |
: server_bootstrap_name_( |
base::StringPrintf("%s.sandbox.%d", base::mac::BaseBundleID(), |
getpid())), |
- real_bootstrap_port_(MACH_PORT_NULL), |
- effective_policy_id_(kNotAPolicy) { |
+ real_bootstrap_port_(MACH_PORT_NULL) { |
mach_port_t port = MACH_PORT_NULL; |
kern_return_t kr = task_get_special_port( |
mach_task_self(), TASK_BOOTSTRAP_PORT, &port); |
@@ -130,4 +194,66 @@ BootstrapSandbox::BootstrapSandbox() |
real_bootstrap_port_.reset(port); |
} |
+void BootstrapSandbox::HandleChildCheckIn() { |
+ struct { |
+ SandboxCheckInRequest request; |
+ mach_msg_audit_trailer_t trailer; |
+ } msg = {}; |
+ msg.request.header.msgh_local_port = check_in_port_.get(); |
+ msg.request.header.msgh_size = sizeof(msg.request); |
+ const mach_msg_option_t kOptions = MACH_RCV_MSG | |
+ MACH_RCV_TRAILER_TYPE(MACH_MSG_TRAILER_FORMAT_0) | |
+ MACH_RCV_TRAILER_ELEMENTS(MACH_RCV_TRAILER_AUDIT); |
+ kern_return_t kr = mach_msg(&msg.request.header, kOptions, 0, |
+ sizeof(msg), check_in_port_.get(), |
+ MACH_MSG_TIMEOUT_NONE, MACH_PORT_NULL); |
+ if (kr != KERN_SUCCESS) { |
+ MACH_LOG(ERROR, kr) << "HandleChildCheckIn mach_msg MACH_RCV_MSG"; |
+ return; |
+ } |
+ |
+ // Call mach_msg_destroy to clean up the reply send-once right. |
+ ScopedCallMachMsgDestroy message_destroyer(&msg.request.header); |
+ |
+ pid_t client_pid; |
+ audit_token_to_au32(msg.trailer.msgh_audit, nullptr, nullptr, nullptr, |
+ nullptr, nullptr, &client_pid, nullptr, nullptr); |
+ |
+ { |
+ base::AutoLock lock(lock_); |
+ |
+ auto awaiting_it = awaiting_processes_.find(msg.request.token); |
+ if (awaiting_it == awaiting_processes_.end()) { |
+ LOG(ERROR) << "Received sandbox check-in message from unknown client."; |
+ return; |
+ } |
+ |
+ CHECK(sandboxed_processes_.find(client_pid) == sandboxed_processes_.end()); |
+ sandboxed_processes_[client_pid] = awaiting_it->second; |
+ awaiting_processes_.erase(awaiting_it); |
+ } |
+ |
+ SandboxCheckInReply reply = {}; |
+ reply.header.msgh_bits = MACH_MSGH_BITS_REMOTE(msg.request.header.msgh_bits) | |
+ MACH_MSGH_BITS_COMPLEX; |
+ reply.header.msgh_remote_port = msg.request.header.msgh_remote_port; |
+ reply.header.msgh_size = sizeof(reply); |
+ reply.body.msgh_descriptor_count = 1; |
+ reply.bootstrap_port.name = launchd_server_->server_port(); |
+ reply.bootstrap_port.disposition = MACH_MSG_TYPE_MAKE_SEND; |
+ reply.bootstrap_port.type = MACH_MSG_PORT_DESCRIPTOR; |
+ |
+ kr = mach_msg(&reply.header, MACH_SEND_MSG | MACH_SEND_TIMEOUT, |
+ sizeof(reply), 0, MACH_PORT_NULL, 100 /*ms*/, MACH_PORT_NULL); |
+ if (kr == KERN_SUCCESS) { |
+ message_destroyer.Disarm(); // The send-once was consumed at mach_msg(). |
+ } else { |
+ { |
+ base::AutoLock lock(lock_); |
+ sandboxed_processes_.erase(client_pid); |
+ } |
+ MACH_LOG(ERROR, kr) << "HandleChildCheckIn mach_msg MACH_SEND_MSG"; |
+ } |
+} |
+ |
} // namespace sandbox |