Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(320)

Side by Side Diff: sandbox/mac/bootstrap_sandbox.h

Issue 347783002: Alter the design of the bootstrap sandbox to only take over the bootstrap port of children when nec… (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Address comments Created 6 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « content/public/common/sandbox_type_mac.h ('k') | sandbox/mac/bootstrap_sandbox.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef SANDBOX_MAC_BOOTSTRAP_SANDBOX_H_ 5 #ifndef SANDBOX_MAC_BOOTSTRAP_SANDBOX_H_
6 #define SANDBOX_MAC_BOOTSTRAP_SANDBOX_H_ 6 #define SANDBOX_MAC_BOOTSTRAP_SANDBOX_H_
7 7
8 #include <mach/mach.h> 8 #include <mach/mach.h>
9 9
10 #include <map> 10 #include <map>
11 #include <string> 11 #include <string>
12 12
13 #include "base/mac/scoped_mach_port.h" 13 #include "base/mac/scoped_mach_port.h"
14 #include "base/memory/scoped_ptr.h" 14 #include "base/memory/scoped_ptr.h"
15 #include "base/process/process_handle.h" 15 #include "base/process/process_handle.h"
16 #include "base/synchronization/lock.h" 16 #include "base/synchronization/lock.h"
17 #include "sandbox/mac/policy.h" 17 #include "sandbox/mac/policy.h"
18 #include "sandbox/sandbox_export.h" 18 #include "sandbox/sandbox_export.h"
19 19
20 namespace sandbox { 20 namespace sandbox {
21 21
22 class LaunchdInterceptionServer; 22 class LaunchdInterceptionServer;
23 23
24 // The BootstrapSandbox is a second-layer sandbox for Mac. It is used to limit 24 // The BootstrapSandbox is a second-layer sandbox for Mac. It is used to limit
25 // the bootstrap namespace attack surface of child processes. The parent 25 // the bootstrap namespace attack surface of child processes. The parent
26 // process creates an instance of this class and registers policies that it 26 // process creates an instance of this class and registers policies that it
27 // can enforce on its children. 27 // can enforce on its children.
28 // 28 //
29 // With this sandbox, the bootstrap port of the parent process is replaced, so 29 // With this sandbox, the parent process must replace the bootstrap port prior
30 // that child processes is taken over by the sandbox. Bootstrap messages from 30 // to the sandboxed target's execution. This should be done by setting the
31 // the parent are forwarded to launchd. Requests from the child that would 31 // base::LaunchOptions.replacement_bootstrap_name to the
32 // server_bootstrap_name() of this class. Requests from the child that would
32 // normally go to launchd are filtered based on the specified per-process 33 // normally go to launchd are filtered based on the specified per-process
33 // policies. If a request is permitted by the policy, it is forwarded on to 34 // policies. If a request is permitted by the policy, it is forwarded on to
34 // launchd for servicing. If it is not, then the sandbox will reply with a 35 // launchd for servicing. If it is not, then the sandbox will reply with a
35 // primitive that does not grant additional capabilities to the receiver. 36 // primitive that does not grant additional capabilities to the receiver.
36 // 37 //
37 // Clients that which to use the sandbox must inform it of the creation and 38 // Clients that which to use the sandbox must inform it of the creation and
38 // death of child processes for which the sandbox should be enforced. The 39 // death of child processes for which the sandbox should be enforced. The
39 // client of the sandbox is intended to be an unsandboxed parent process that 40 // client of the sandbox is intended to be an unsandboxed parent process that
40 // fork()s sandboxed (and other unsandboxed) child processes. 41 // fork()s sandboxed (and other unsandboxed) child processes.
41 // 42 //
(...skipping 28 matching lines...) Expand all
70 void FinishedFork(base::ProcessHandle handle); 71 void FinishedFork(base::ProcessHandle handle);
71 72
72 // Called in the parent when a process has died. It cleans up the references 73 // Called in the parent when a process has died. It cleans up the references
73 // to the process. 74 // to the process.
74 void ChildDied(base::ProcessHandle handle); 75 void ChildDied(base::ProcessHandle handle);
75 76
76 // Looks up the policy for a given process ID. If no policy is associated 77 // Looks up the policy for a given process ID. If no policy is associated
77 // with the |pid|, this returns NULL. 78 // with the |pid|, this returns NULL.
78 const BootstrapSandboxPolicy* PolicyForProcess(pid_t pid) const; 79 const BootstrapSandboxPolicy* PolicyForProcess(pid_t pid) const;
79 80
81 std::string server_bootstrap_name() const { return server_bootstrap_name_; }
80 mach_port_t real_bootstrap_port() const { return real_bootstrap_port_; } 82 mach_port_t real_bootstrap_port() const { return real_bootstrap_port_; }
81 83
82 private: 84 private:
83 BootstrapSandbox(); 85 BootstrapSandbox();
84 86
85 // A Mach IPC message server that is used to intercept and filter bootstrap 87 // A Mach IPC message server that is used to intercept and filter bootstrap
86 // requests. 88 // requests.
87 scoped_ptr<LaunchdInterceptionServer> server_; 89 scoped_ptr<LaunchdInterceptionServer> server_;
88 90
91 // The name in the system bootstrap server by which the |server_|'s port
92 // is known.
93 const std::string server_bootstrap_name_;
94
89 // The original bootstrap port of the process, which is connected to the 95 // The original bootstrap port of the process, which is connected to the
90 // real launchd server. 96 // real launchd server.
91 base::mac::ScopedMachSendRight real_bootstrap_port_; 97 base::mac::ScopedMachSendRight real_bootstrap_port_;
92 98
93 // The |lock_| protects all the following variables. 99 // The |lock_| protects all the following variables.
94 mutable base::Lock lock_; 100 mutable base::Lock lock_;
95 101
96 // The sandbox_policy_id that will be enforced for the new child. 102 // The sandbox_policy_id that will be enforced for the new child.
97 int effective_policy_id_; 103 int effective_policy_id_;
98 104
99 // All the policies that have been registered with this sandbox manager. 105 // All the policies that have been registered with this sandbox manager.
100 std::map<int, const BootstrapSandboxPolicy> policies_; 106 std::map<int, const BootstrapSandboxPolicy> policies_;
101 107
102 // The association between process ID and sandbox policy ID. 108 // The association between process ID and sandbox policy ID.
103 std::map<base::ProcessHandle, int> sandboxed_processes_; 109 std::map<base::ProcessHandle, int> sandboxed_processes_;
104 }; 110 };
105 111
106 } // namespace sandbox 112 } // namespace sandbox
107 113
108 #endif // SANDBOX_MAC_BOOTSTRAP_SANDBOX_H_ 114 #endif // SANDBOX_MAC_BOOTSTRAP_SANDBOX_H_
OLDNEW
« no previous file with comments | « content/public/common/sandbox_type_mac.h ('k') | sandbox/mac/bootstrap_sandbox.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698