| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef SANDBOX_MAC_BOOTSTRAP_SANDBOX_H_ | 5 #ifndef SANDBOX_MAC_BOOTSTRAP_SANDBOX_H_ |
| 6 #define SANDBOX_MAC_BOOTSTRAP_SANDBOX_H_ | 6 #define SANDBOX_MAC_BOOTSTRAP_SANDBOX_H_ |
| 7 | 7 |
| 8 #include <mach/mach.h> | 8 #include <mach/mach.h> |
| 9 | 9 |
| 10 #include <map> | 10 #include <map> |
| 11 #include <string> | 11 #include <string> |
| 12 | 12 |
| 13 #include "base/mac/scoped_mach_port.h" | 13 #include "base/mac/scoped_mach_port.h" |
| 14 #include "base/memory/scoped_ptr.h" | 14 #include "base/memory/scoped_ptr.h" |
| 15 #include "base/process/process_handle.h" | 15 #include "base/process/process_handle.h" |
| 16 #include "base/synchronization/lock.h" | 16 #include "base/synchronization/lock.h" |
| 17 #include "sandbox/mac/policy.h" | 17 #include "sandbox/mac/policy.h" |
| 18 #include "sandbox/sandbox_export.h" | 18 #include "sandbox/sandbox_export.h" |
| 19 | 19 |
| 20 namespace sandbox { | 20 namespace sandbox { |
| 21 | 21 |
| 22 class LaunchdInterceptionServer; | 22 class LaunchdInterceptionServer; |
| 23 | 23 |
| 24 // The BootstrapSandbox is a second-layer sandbox for Mac. It is used to limit | 24 // The BootstrapSandbox is a second-layer sandbox for Mac. It is used to limit |
| 25 // the bootstrap namespace attack surface of child processes. The parent | 25 // the bootstrap namespace attack surface of child processes. The parent |
| 26 // process creates an instance of this class and registers policies that it | 26 // process creates an instance of this class and registers policies that it |
| 27 // can enforce on its children. | 27 // can enforce on its children. |
| 28 // | 28 // |
| 29 // With this sandbox, the bootstrap port of the parent process is replaced, so | 29 // With this sandbox, the parent process must replace the bootstrap port prior |
| 30 // that child processes is taken over by the sandbox. Bootstrap messages from | 30 // to the sandboxed target's execution. This should be done by setting the |
| 31 // the parent are forwarded to launchd. Requests from the child that would | 31 // base::LaunchOptions.replacement_bootstrap_name to the |
| 32 // server_bootstrap_name() of this class. Requests from the child that would |
| 32 // normally go to launchd are filtered based on the specified per-process | 33 // normally go to launchd are filtered based on the specified per-process |
| 33 // policies. If a request is permitted by the policy, it is forwarded on to | 34 // policies. If a request is permitted by the policy, it is forwarded on to |
| 34 // launchd for servicing. If it is not, then the sandbox will reply with a | 35 // launchd for servicing. If it is not, then the sandbox will reply with a |
| 35 // primitive that does not grant additional capabilities to the receiver. | 36 // primitive that does not grant additional capabilities to the receiver. |
| 36 // | 37 // |
| 37 // Clients that which to use the sandbox must inform it of the creation and | 38 // Clients that which to use the sandbox must inform it of the creation and |
| 38 // death of child processes for which the sandbox should be enforced. The | 39 // death of child processes for which the sandbox should be enforced. The |
| 39 // client of the sandbox is intended to be an unsandboxed parent process that | 40 // client of the sandbox is intended to be an unsandboxed parent process that |
| 40 // fork()s sandboxed (and other unsandboxed) child processes. | 41 // fork()s sandboxed (and other unsandboxed) child processes. |
| 41 // | 42 // |
| (...skipping 28 matching lines...) Expand all Loading... |
| 70 void FinishedFork(base::ProcessHandle handle); | 71 void FinishedFork(base::ProcessHandle handle); |
| 71 | 72 |
| 72 // Called in the parent when a process has died. It cleans up the references | 73 // Called in the parent when a process has died. It cleans up the references |
| 73 // to the process. | 74 // to the process. |
| 74 void ChildDied(base::ProcessHandle handle); | 75 void ChildDied(base::ProcessHandle handle); |
| 75 | 76 |
| 76 // Looks up the policy for a given process ID. If no policy is associated | 77 // Looks up the policy for a given process ID. If no policy is associated |
| 77 // with the |pid|, this returns NULL. | 78 // with the |pid|, this returns NULL. |
| 78 const BootstrapSandboxPolicy* PolicyForProcess(pid_t pid) const; | 79 const BootstrapSandboxPolicy* PolicyForProcess(pid_t pid) const; |
| 79 | 80 |
| 81 std::string server_bootstrap_name() const { return server_bootstrap_name_; } |
| 80 mach_port_t real_bootstrap_port() const { return real_bootstrap_port_; } | 82 mach_port_t real_bootstrap_port() const { return real_bootstrap_port_; } |
| 81 | 83 |
| 82 private: | 84 private: |
| 83 BootstrapSandbox(); | 85 BootstrapSandbox(); |
| 84 | 86 |
| 85 // A Mach IPC message server that is used to intercept and filter bootstrap | 87 // A Mach IPC message server that is used to intercept and filter bootstrap |
| 86 // requests. | 88 // requests. |
| 87 scoped_ptr<LaunchdInterceptionServer> server_; | 89 scoped_ptr<LaunchdInterceptionServer> server_; |
| 88 | 90 |
| 91 // The name in the system bootstrap server by which the |server_|'s port |
| 92 // is known. |
| 93 const std::string server_bootstrap_name_; |
| 94 |
| 89 // The original bootstrap port of the process, which is connected to the | 95 // The original bootstrap port of the process, which is connected to the |
| 90 // real launchd server. | 96 // real launchd server. |
| 91 base::mac::ScopedMachSendRight real_bootstrap_port_; | 97 base::mac::ScopedMachSendRight real_bootstrap_port_; |
| 92 | 98 |
| 93 // The |lock_| protects all the following variables. | 99 // The |lock_| protects all the following variables. |
| 94 mutable base::Lock lock_; | 100 mutable base::Lock lock_; |
| 95 | 101 |
| 96 // The sandbox_policy_id that will be enforced for the new child. | 102 // The sandbox_policy_id that will be enforced for the new child. |
| 97 int effective_policy_id_; | 103 int effective_policy_id_; |
| 98 | 104 |
| 99 // All the policies that have been registered with this sandbox manager. | 105 // All the policies that have been registered with this sandbox manager. |
| 100 std::map<int, const BootstrapSandboxPolicy> policies_; | 106 std::map<int, const BootstrapSandboxPolicy> policies_; |
| 101 | 107 |
| 102 // The association between process ID and sandbox policy ID. | 108 // The association between process ID and sandbox policy ID. |
| 103 std::map<base::ProcessHandle, int> sandboxed_processes_; | 109 std::map<base::ProcessHandle, int> sandboxed_processes_; |
| 104 }; | 110 }; |
| 105 | 111 |
| 106 } // namespace sandbox | 112 } // namespace sandbox |
| 107 | 113 |
| 108 #endif // SANDBOX_MAC_BOOTSTRAP_SANDBOX_H_ | 114 #endif // SANDBOX_MAC_BOOTSTRAP_SANDBOX_H_ |
| OLD | NEW |