OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef SANDBOX_MAC_LAUNCHD_INTERCEPTION_SERVER_H_ | 5 #ifndef SANDBOX_MAC_LAUNCHD_INTERCEPTION_SERVER_H_ |
6 #define SANDBOX_MAC_LAUNCHD_INTERCEPTION_SERVER_H_ | 6 #define SANDBOX_MAC_LAUNCHD_INTERCEPTION_SERVER_H_ |
7 | 7 |
8 #include <dispatch/dispatch.h> | 8 #include <dispatch/dispatch.h> |
9 #include <mach/mach.h> | 9 #include <mach/mach.h> |
10 | 10 |
11 #include "base/mac/scoped_mach_port.h" | 11 #include "base/mac/scoped_mach_port.h" |
12 #include "base/memory/scoped_ptr.h" | 12 #include "base/memory/scoped_ptr.h" |
13 #include "sandbox/mac/mach_message_server.h" | 13 #include "sandbox/mac/mach_message_server.h" |
14 #include "sandbox/mac/os_compatibility.h" | 14 #include "sandbox/mac/os_compatibility.h" |
15 | 15 |
16 namespace sandbox { | 16 namespace sandbox { |
17 | 17 |
18 class BootstrapSandbox; | 18 class BootstrapSandbox; |
| 19 struct BootstrapSandboxPolicy; |
19 | 20 |
20 // This class is used to run a Mach IPC message server. This server can | 21 // This class is used to run a Mach IPC message server. This server can |
21 // hold the receive right for a bootstrap_port of a process, and it filters | 22 // hold the receive right for a bootstrap_port of a process, and it filters |
22 // a subset of the launchd/bootstrap IPC call set for sandboxing. It permits | 23 // a subset of the launchd/bootstrap IPC call set for sandboxing. It permits |
23 // or rejects requests based on the per-process policy specified in the | 24 // or rejects requests based on the per-process policy specified in the |
24 // BootstrapSandbox. | 25 // BootstrapSandbox. |
25 class LaunchdInterceptionServer : public MessageDemuxer { | 26 class LaunchdInterceptionServer : public MessageDemuxer { |
26 public: | 27 public: |
27 explicit LaunchdInterceptionServer(const BootstrapSandbox* sandbox); | 28 explicit LaunchdInterceptionServer(const BootstrapSandbox* sandbox); |
28 virtual ~LaunchdInterceptionServer(); | 29 virtual ~LaunchdInterceptionServer(); |
29 | 30 |
30 // Initializes the class and starts running the message server. | 31 // Initializes the class and starts running the message server. |
31 bool Initialize(); | 32 bool Initialize(); |
32 | 33 |
33 // MessageDemuxer: | 34 // MessageDemuxer: |
34 virtual void DemuxMessage(mach_msg_header_t* request, | 35 virtual void DemuxMessage(mach_msg_header_t* request, |
35 mach_msg_header_t* reply) OVERRIDE; | 36 mach_msg_header_t* reply) OVERRIDE; |
36 | 37 |
37 mach_port_t server_port() const { return message_server_->server_port(); } | 38 mach_port_t server_port() const { return message_server_->server_port(); } |
38 | 39 |
39 private: | 40 private: |
40 // Given a look_up2 request message, this looks up the appropriate sandbox | 41 // Given a look_up2 request message, this looks up the appropriate sandbox |
41 // policy for the service name then formulates and sends the reply message. | 42 // policy for the service name then formulates and sends the reply message. |
42 void HandleLookUp(mach_msg_header_t* request, | 43 void HandleLookUp(mach_msg_header_t* request, |
43 mach_msg_header_t* reply, | 44 mach_msg_header_t* reply, |
44 pid_t sender_pid); | 45 const BootstrapSandboxPolicy* policy); |
45 | 46 |
46 // Given a swap_integer request message, this verifies that it is safe, and | 47 // Given a swap_integer request message, this verifies that it is safe, and |
47 // if so, forwards it on to launchd for servicing. If the request is unsafe, | 48 // if so, forwards it on to launchd for servicing. If the request is unsafe, |
48 // it replies with an error. | 49 // it replies with an error. |
49 void HandleSwapInteger(mach_msg_header_t* request, | 50 void HandleSwapInteger(mach_msg_header_t* request, |
50 mach_msg_header_t* reply, | 51 mach_msg_header_t* reply); |
51 pid_t sender_pid); | |
52 | 52 |
53 // Forwards the original |request| on to real bootstrap server for handling. | 53 // Forwards the original |request| on to real bootstrap server for handling. |
54 void ForwardMessage(mach_msg_header_t* request); | 54 void ForwardMessage(mach_msg_header_t* request); |
55 | 55 |
56 // The sandbox for which this message server is running. | 56 // The sandbox for which this message server is running. |
57 const BootstrapSandbox* sandbox_; | 57 const BootstrapSandbox* sandbox_; |
58 | 58 |
59 // The Mach IPC server. | 59 // The Mach IPC server. |
60 scoped_ptr<MachMessageServer> message_server_; | 60 scoped_ptr<MachMessageServer> message_server_; |
61 | 61 |
62 // The Mach port handed out in reply to denied look up requests. All denied | 62 // The Mach port handed out in reply to denied look up requests. All denied |
63 // requests share the same port, though nothing reads messages from it. | 63 // requests share the same port, though nothing reads messages from it. |
64 base::mac::ScopedMachReceiveRight sandbox_port_; | 64 base::mac::ScopedMachReceiveRight sandbox_port_; |
65 // The send right for the above |sandbox_port_|, used with | 65 // The send right for the above |sandbox_port_|, used with |
66 // MACH_MSG_TYPE_COPY_SEND when handing out references to the dummy port. | 66 // MACH_MSG_TYPE_COPY_SEND when handing out references to the dummy port. |
67 base::mac::ScopedMachSendRight sandbox_send_port_; | 67 base::mac::ScopedMachSendRight sandbox_send_port_; |
68 | 68 |
69 // The compatibility shim that handles differences in message header IDs and | 69 // The compatibility shim that handles differences in message header IDs and |
70 // request/reply structures between different OS X versions. | 70 // request/reply structures between different OS X versions. |
71 const LaunchdCompatibilityShim compat_shim_; | 71 const LaunchdCompatibilityShim compat_shim_; |
72 }; | 72 }; |
73 | 73 |
74 } // namespace sandbox | 74 } // namespace sandbox |
75 | 75 |
76 #endif // SANDBOX_MAC_LAUNCHD_INTERCEPTION_SERVER_H_ | 76 #endif // SANDBOX_MAC_LAUNCHD_INTERCEPTION_SERVER_H_ |
OLD | NEW |