Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(585)

Unified Diff: services/service_manager/runner/host/linux_sandbox.h

Issue 2566663004: Revert of Build services as standalone executables (Closed)
Patch Set: Created 4 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: services/service_manager/runner/host/linux_sandbox.h
diff --git a/services/service_manager/runner/host/linux_sandbox.h b/services/service_manager/runner/host/linux_sandbox.h
new file mode 100644
index 0000000000000000000000000000000000000000..a9e48045f6035887b1173d72e36fb4f6c6a4051a
--- /dev/null
+++ b/services/service_manager/runner/host/linux_sandbox.h
@@ -0,0 +1,51 @@
+// Copyright 2015 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef SERVICES_SERVICE_MANAGER_RUNNER_HOST_LINUX_SANDBOX_H_
+#define SERVICES_SERVICE_MANAGER_RUNNER_HOST_LINUX_SANDBOX_H_
+
+#include <memory>
+
+#include "base/files/scoped_file.h"
+#include "base/macros.h"
+#include "sandbox/linux/bpf_dsl/bpf_dsl.h"
+#include "sandbox/linux/bpf_dsl/policy.h"
+#include "sandbox/linux/syscall_broker/broker_process.h"
+
+namespace service_manager {
+
+// Encapsulates all tasks related to raising the sandbox for mojo runner.
+class LinuxSandbox {
+ public:
+ explicit LinuxSandbox(
+ const std::vector<sandbox::syscall_broker::BrokerFilePermission>&
+ permissions);
+ ~LinuxSandbox();
+
+ // Grabs a file descriptor to /proc.
+ void Warmup();
+
+ // Puts the user in a new PID namespace.
+ void EngageNamespaceSandbox();
+
+ // Starts a broker process and sets up seccomp-bpf to delegate decisions to
+ // it.
+ void EngageSeccompSandbox();
+
+ // Performs the dropping of access to the outside world (drops the reference
+ // to /proc acquired in Warmup().
+ void Seal();
+
+ private:
+ bool warmed_up_;
+ base::ScopedFD proc_fd_;
+ std::unique_ptr<sandbox::syscall_broker::BrokerProcess> broker_;
+ std::unique_ptr<sandbox::bpf_dsl::Policy> policy_;
+
+ DISALLOW_COPY_AND_ASSIGN(LinuxSandbox);
+};
+
+} // namespace service_manager
+
+#endif // SERVICES_SERVICE_MANAGER_RUNNER_HOST_LINUX_SANDBOX_H_

Powered by Google App Engine
This is Rietveld 408576698