Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #ifndef SANDBOX_MAC_LAUNCHD_INTERCEPTION_SERVER_H_ | |
| 6 #define SANDBOX_MAC_LAUNCHD_INTERCEPTION_SERVER_H_ | |
| 7 | |
| 8 #include <dispatch/dispatch.h> | |
| 9 #include <mach/mach.h> | |
| 10 | |
| 11 #include "base/mac/scoped_mach_port.h" | |
| 12 #include "sandbox/mac/os_compatibility.h" | |
| 13 | |
| 14 namespace sandbox { | |
| 15 | |
| 16 class BootstrapSandbox; | |
| 17 | |
| 18 // This class is used to run a Mach IPC message server. This server can | |
| 19 // hold the receive right for a bootstrap_port of a process, and it filters | |
| 20 // a subset of the launchd/bootstrap IPC call set for sandboxing. It permits | |
| 21 // or rejects requests based on the per-process policy specified in the | |
| 22 // BootstrapSandbox. | |
| 23 class LaunchdInterceptionServer { | |
| 24 public: | |
| 25 LaunchdInterceptionServer(const BootstrapSandbox* sandbox); | |
|
Mark Mentovai
2014/05/06 20:51:50
explicit
Robert Sesek
2014/05/08 20:58:12
Done.
| |
| 26 ~LaunchdInterceptionServer(); | |
| 27 | |
| 28 // Initializes the class and starts running the message server. | |
| 29 bool Initialize(); | |
|
Mark Mentovai
2014/05/06 20:51:50
Yeah, see, here you used Initialize instead of hav
Robert Sesek
2014/05/08 20:58:12
Yes, because this class is only instantiated by th
| |
| 30 | |
| 31 mach_port_t server_port() const { return server_port_.get(); } | |
| 32 | |
| 33 private: | |
| 34 // Event handler for the |server_source_| that reads a message from the queue | |
| 35 // and processes it. | |
| 36 void ReceiveMessage(); | |
| 37 | |
| 38 // Decodes a message header and handles it by either servicing the request | |
| 39 // itself, forwarding the message on to the real launchd, or rejecting the | |
| 40 // message with an error. | |
| 41 void DemuxMessage(mach_msg_header_t* request, mach_msg_header_t* reply); | |
| 42 | |
| 43 // Given a look_up2 request message, this looks up the appropriate sandbox | |
| 44 // policy for the service name then formulates and sends the reply message. | |
| 45 void HandleLookUp(mach_msg_header_t* request_header, | |
| 46 mach_msg_header_t* reply_header, | |
| 47 pid_t sender_pid); | |
| 48 | |
| 49 // Sends a reply message. | |
| 50 void SendReply(mach_msg_header_t* reply); | |
| 51 | |
| 52 // Forwards the original |request| on to real bootstrap server for handling. | |
| 53 void ForwardMessage(mach_msg_header_t* request, mach_msg_header_t* reply); | |
| 54 | |
| 55 // Replies to the message with the specified |error_code| as a MIG | |
| 56 // error_reply RetCode. | |
| 57 void RejectMessage(mach_msg_header_t* request, | |
| 58 mach_msg_header_t* reply, | |
| 59 int error_code); | |
| 60 | |
| 61 // The sandbox for which this message server is running. | |
| 62 const BootstrapSandbox* sandbox_; | |
| 63 | |
| 64 // The Mach port on which the server is receiving requests. | |
| 65 base::mac::ScopedMachPort server_port_; | |
| 66 | |
| 67 // The dispatch queue used to service the server_source_. | |
| 68 dispatch_queue_t server_queue_; | |
| 69 | |
| 70 // A MACH_RECV dispatch source for the server_port_. | |
| 71 dispatch_source_t server_source_; | |
| 72 | |
| 73 // The Mach port handed out in reply to denied look up requests. All denied | |
| 74 // requests share the same port, though nothing reads messages from it. | |
| 75 base::mac::ScopedMachPort sandbox_port_; | |
| 76 | |
| 77 // The compatiblity shim that handles differences in message header IDs and | |
| 78 // request/reply structures between different OS X versions. | |
| 79 const LaunchdCompatibilityShim compat_shim_; | |
| 80 }; | |
| 81 | |
| 82 } // namespace sandbox | |
| 83 | |
| 84 #endif // SANDBOX_MAC_LAUNCHD_INTERCEPTION_SERVER_H_ | |
| OLD | NEW |