| Index: services/service_manager/runner/host/linux_sandbox.h
|
| diff --git a/services/service_manager/runner/host/linux_sandbox.h b/services/service_manager/runner/host/linux_sandbox.h
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..a9e48045f6035887b1173d72e36fb4f6c6a4051a
|
| --- /dev/null
|
| +++ b/services/service_manager/runner/host/linux_sandbox.h
|
| @@ -0,0 +1,51 @@
|
| +// Copyright 2015 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#ifndef SERVICES_SERVICE_MANAGER_RUNNER_HOST_LINUX_SANDBOX_H_
|
| +#define SERVICES_SERVICE_MANAGER_RUNNER_HOST_LINUX_SANDBOX_H_
|
| +
|
| +#include <memory>
|
| +
|
| +#include "base/files/scoped_file.h"
|
| +#include "base/macros.h"
|
| +#include "sandbox/linux/bpf_dsl/bpf_dsl.h"
|
| +#include "sandbox/linux/bpf_dsl/policy.h"
|
| +#include "sandbox/linux/syscall_broker/broker_process.h"
|
| +
|
| +namespace service_manager {
|
| +
|
| +// Encapsulates all tasks related to raising the sandbox for mojo runner.
|
| +class LinuxSandbox {
|
| + public:
|
| + explicit LinuxSandbox(
|
| + const std::vector<sandbox::syscall_broker::BrokerFilePermission>&
|
| + permissions);
|
| + ~LinuxSandbox();
|
| +
|
| + // Grabs a file descriptor to /proc.
|
| + void Warmup();
|
| +
|
| + // Puts the user in a new PID namespace.
|
| + void EngageNamespaceSandbox();
|
| +
|
| + // Starts a broker process and sets up seccomp-bpf to delegate decisions to
|
| + // it.
|
| + void EngageSeccompSandbox();
|
| +
|
| + // Performs the dropping of access to the outside world (drops the reference
|
| + // to /proc acquired in Warmup().
|
| + void Seal();
|
| +
|
| + private:
|
| + bool warmed_up_;
|
| + base::ScopedFD proc_fd_;
|
| + std::unique_ptr<sandbox::syscall_broker::BrokerProcess> broker_;
|
| + std::unique_ptr<sandbox::bpf_dsl::Policy> policy_;
|
| +
|
| + DISALLOW_COPY_AND_ASSIGN(LinuxSandbox);
|
| +};
|
| +
|
| +} // namespace service_manager
|
| +
|
| +#endif // SERVICES_SERVICE_MANAGER_RUNNER_HOST_LINUX_SANDBOX_H_
|
|
|