Index: sandbox/mac/launchd_interception_server.h |
diff --git a/sandbox/mac/launchd_interception_server.h b/sandbox/mac/launchd_interception_server.h |
new file mode 100644 |
index 0000000000000000000000000000000000000000..c7e2a7422c533265d7ca13ddd50bd546ad1ed494 |
--- /dev/null |
+++ b/sandbox/mac/launchd_interception_server.h |
@@ -0,0 +1,96 @@ |
+// Copyright 2014 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#ifndef SANDBOX_MAC_LAUNCHD_INTERCEPTION_SERVER_H_ |
+#define SANDBOX_MAC_LAUNCHD_INTERCEPTION_SERVER_H_ |
+ |
+#include <dispatch/dispatch.h> |
+#include <mach/mach.h> |
+ |
+#include "base/mac/scoped_mach_port.h" |
+#include "base/mac/scoped_mach_vm.h" |
+#include "sandbox/mac/os_compatibility.h" |
+ |
+namespace sandbox { |
+ |
+class BootstrapSandbox; |
+ |
+// This class is used to run a Mach IPC message server. This server can |
+// hold the receive right for a bootstrap_port of a process, and it filters |
+// a subset of the launchd/bootstrap IPC call set for sandboxing. It permits |
+// or rejects requests based on the per-process policy specified in the |
+// BootstrapSandbox. |
+class LaunchdInterceptionServer { |
+ public: |
+ explicit LaunchdInterceptionServer(const BootstrapSandbox* sandbox); |
+ ~LaunchdInterceptionServer(); |
+ |
+ // Initializes the class and starts running the message server. |
+ bool Initialize(); |
+ |
+ mach_port_t server_port() const { return server_port_.get(); } |
+ |
+ private: |
+ // Event handler for the |server_source_| that reads a message from the queue |
+ // and processes it. |
+ void ReceiveMessage(); |
+ |
+ // Decodes a message header and handles it by either servicing the request |
+ // itself, forwarding the message on to the real launchd, or rejecting the |
+ // message with an error. |
+ void DemuxMessage(mach_msg_header_t* request, mach_msg_header_t* reply); |
+ |
+ // Given a look_up2 request message, this looks up the appropriate sandbox |
+ // policy for the service name then formulates and sends the reply message. |
+ void HandleLookUp(mach_msg_header_t* request, |
+ mach_msg_header_t* reply, |
+ pid_t sender_pid); |
+ |
+ // Given a swap_integer request message, this verifies that it is safe, and |
+ // if so, forwards it on to launchd for servicing. If the request is unsafe, |
+ // it replies with an error. |
+ void HandleSwapInteger(mach_msg_header_t* request, |
+ mach_msg_header_t* reply, |
+ pid_t sender_pid); |
+ |
+ // Sends a reply message. |
+ void SendReply(mach_msg_header_t* reply); |
+ |
+ // Forwards the original |request| on to real bootstrap server for handling. |
+ void ForwardMessage(mach_msg_header_t* request, mach_msg_header_t* reply); |
+ |
+ // Replies to the message with the specified |error_code| as a MIG |
+ // error_reply RetCode. |
+ void RejectMessage(mach_msg_header_t* request, |
+ mach_msg_header_t* reply, |
+ int error_code); |
+ |
+ // The sandbox for which this message server is running. |
+ const BootstrapSandbox* sandbox_; |
+ |
+ // The Mach port on which the server is receiving requests. |
+ base::mac::ScopedMachPort server_port_; |
+ |
+ // The dispatch queue used to service the server_source_. |
+ dispatch_queue_t server_queue_; |
+ |
+ // A MACH_RECV dispatch source for the server_port_. |
+ dispatch_source_t server_source_; |
+ |
+ // Request and reply buffers used in ReceiveMessage. |
+ base::mac::ScopedMachVM request_buffer_; |
+ base::mac::ScopedMachVM reply_buffer_; |
+ |
+ // The Mach port handed out in reply to denied look up requests. All denied |
+ // requests share the same port, though nothing reads messages from it. |
+ base::mac::ScopedMachPort sandbox_port_; |
+ |
+ // The compatibility shim that handles differences in message header IDs and |
+ // request/reply structures between different OS X versions. |
+ const LaunchdCompatibilityShim compat_shim_; |
+}; |
+ |
+} // namespace sandbox |
+ |
+#endif // SANDBOX_MAC_LAUNCHD_INTERCEPTION_SERVER_H_ |