| Index: sandbox/mac/bootstrap_sandbox.cc
|
| diff --git a/sandbox/mac/bootstrap_sandbox.cc b/sandbox/mac/bootstrap_sandbox.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..158cfe52c7a336ded13633d1653a0cf6776f826b
|
| --- /dev/null
|
| +++ b/sandbox/mac/bootstrap_sandbox.cc
|
| @@ -0,0 +1,111 @@
|
| +// Copyright 2014 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "sandbox/mac/bootstrap_sandbox.h"
|
| +
|
| +#include "base/logging.h"
|
| +#include "base/mac/mach_logging.h"
|
| +
|
| +#include "sandbox/mac/launchd_interception_server.h"
|
| +
|
| +namespace sandbox {
|
| +
|
| +const int kNotAPolicy = -1;
|
| +
|
| +// static
|
| +scoped_ptr<BootstrapSandbox> BootstrapSandbox::Create() {
|
| + scoped_ptr<BootstrapSandbox> sandbox(new BootstrapSandbox());
|
| + sandbox->server_.reset(new LaunchdInterceptionServer(sandbox.get()));
|
| +
|
| + if (!sandbox->server_->Initialize()) {
|
| + sandbox.reset();
|
| + } else {
|
| + kern_return_t kr = task_set_special_port(mach_task_self(),
|
| + TASK_BOOTSTRAP_PORT, sandbox->server_->server_port());
|
| + if (kr != KERN_SUCCESS)
|
| + sandbox.reset();
|
| + }
|
| +
|
| + return sandbox.Pass();
|
| +}
|
| +
|
| +BootstrapSandbox::~BootstrapSandbox() {
|
| + kern_return_t kr = task_set_special_port(mach_task_self(),
|
| + TASK_BOOTSTRAP_PORT, real_bootstrap_port_);
|
| + MACH_CHECK(kr == KERN_SUCCESS, kr);
|
| +}
|
| +
|
| +void BootstrapSandbox::RegisterSandboxPolicy(
|
| + int sandbox_policy_id,
|
| + const BootstrapSandboxPolicy& policy) {
|
| + CHECK(IsPolicyValid(policy));
|
| + CHECK_GT(sandbox_policy_id, 0);
|
| + base::AutoLock lock(lock_);
|
| + DCHECK(policies_.find(sandbox_policy_id) == policies_.end());
|
| + policies_.insert(std::make_pair(sandbox_policy_id, policy));
|
| +}
|
| +
|
| +void BootstrapSandbox::PrepareToForkWithPolicy(int sandbox_policy_id) {
|
| + base::AutoLock lock(lock_);
|
| +
|
| + CHECK(policies_.find(sandbox_policy_id) != policies_.end());
|
| + CHECK_EQ(kNotAPolicy, effective_policy_id_)
|
| + << "Cannot nest calls to PrepareToForkWithPolicy()";
|
| +
|
| + // Store the policy for the process we're about to create.
|
| + effective_policy_id_ = sandbox_policy_id;
|
| +}
|
| +
|
| +void BootstrapSandbox::FinishedFork(base::ProcessHandle handle) {
|
| + base::AutoLock lock(lock_);
|
| +
|
| + CHECK_NE(kNotAPolicy, effective_policy_id_)
|
| + << "Must PrepareToForkWithPolicy() before FinishedFork()";
|
| +
|
| + if (handle != base::kNullProcessHandle) {
|
| + const auto& existing_process = sandboxed_processes_.find(handle);
|
| + CHECK(existing_process == sandboxed_processes_.end());
|
| + sandboxed_processes_.insert(std::make_pair(handle, effective_policy_id_));
|
| + VLOG(3) << "Bootstrap sandbox enforced for pid " << handle;
|
| + }
|
| +
|
| + effective_policy_id_ = kNotAPolicy;
|
| +}
|
| +
|
| +void BootstrapSandbox::ChildDied(base::ProcessHandle handle) {
|
| + base::AutoLock lock(lock_);
|
| + const auto& it = sandboxed_processes_.find(handle);
|
| + CHECK(it != sandboxed_processes_.end());
|
| + sandboxed_processes_.erase(it);
|
| +}
|
| +
|
| +const BootstrapSandboxPolicy* BootstrapSandbox::PolicyForProcess(
|
| + pid_t pid) const {
|
| + base::AutoLock lock(lock_);
|
| + const auto& process = sandboxed_processes_.find(pid);
|
| +
|
| + // The new child could send bootstrap requests before the parent calls
|
| + // FinishedFork().
|
| + int policy_id = effective_policy_id_;
|
| + if (process != sandboxed_processes_.end()) {
|
| + policy_id = process->second;
|
| + }
|
| +
|
| + if (policy_id == kNotAPolicy)
|
| + return NULL;
|
| +
|
| + return &policies_.find(policy_id)->second;
|
| +}
|
| +
|
| +BootstrapSandbox::BootstrapSandbox()
|
| + : real_bootstrap_port_(MACH_PORT_NULL),
|
| + effective_policy_id_(kNotAPolicy) {
|
| + mach_port_t port = MACH_PORT_NULL;
|
| + kern_return_t kr = task_get_special_port(
|
| + mach_task_self(), TASK_BOOTSTRAP_PORT, &port);
|
| + MACH_CHECK(kr == KERN_SUCCESS, kr);
|
| + real_bootstrap_port_.reset(port);
|
| +}
|
| +
|
| +} // namespace sandbox
|
|
|