1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #ifndef SANDBOX_MAC_BOOTSTRAP_SANDBOX_H_
6 #define SANDBOX_MAC_BOOTSTRAP_SANDBOX_H_
13 #include "base/mac/scoped_mach_port.h"
14 #include "base/memory/scoped_ptr.h"
15 #include "base/process/process_handle.h"
16 #include "base/synchronization/lock.h"
17 #include "sandbox/mac/policy.h"
18 #include "sandbox/sandbox_export.h"
22 class LaunchdInterceptionServer
;
24 // The BootstrapSandbox is a second-layer sandbox for Mac. It is used to limit
25 // the bootstrap namespace attack surface of child processes. The parent
26 // process creates an instance of this class and registers policies that it
27 // can enforce on its children.
29 // With this sandbox, the parent process must replace the bootstrap port prior
30 // to the sandboxed target's execution. This should be done by setting the
31 // base::LaunchOptions.replacement_bootstrap_name to the
32 // server_bootstrap_name() of this class. Requests from the child that would
33 // normally go to launchd are filtered based on the specified per-process
34 // policies. If a request is permitted by the policy, it is forwarded on to
35 // launchd for servicing. If it is not, then the sandbox will reply with a
36 // primitive that does not grant additional capabilities to the receiver.
38 // Clients that which to use the sandbox must inform it of the creation and
39 // death of child processes for which the sandbox should be enforced. The
40 // client of the sandbox is intended to be an unsandboxed parent process that
41 // fork()s sandboxed (and other unsandboxed) child processes.
43 // When the parent is ready to fork a new child process with this sandbox
44 // being enforced, it should use the pair of methods PrepareToForkWithPolicy()
45 // and FinishedFork(), and call fork() between them. The first method will
46 // set the policy for the new process, and the second will finialize the
47 // association between the process ID and sandbox policy ID.
49 // All methods of this class may be called from any thread, but
50 // PrepareToForkWithPolicy() and FinishedFork() must be non-nested and balanced.
51 class SANDBOX_EXPORT BootstrapSandbox
{
53 // Creates a new sandbox manager. Returns NULL on failure.
54 static scoped_ptr
<BootstrapSandbox
> Create();
58 // Registers a bootstrap policy associated it with an identifier. The
59 // |sandbox_policy_id| must be greater than 0.
60 void RegisterSandboxPolicy(int sandbox_policy_id
,
61 const BootstrapSandboxPolicy
& policy
);
63 // Called in the parent prior to fork()ing a child. The policy registered
64 // to |sandbox_policy_id| will be enforced on the new child. This must be
65 // followed by a call to FinishedFork().
66 void PrepareToForkWithPolicy(int sandbox_policy_id
);
68 // Called in the parent after fork()ing a child. It records the |handle|
69 // and associates it with the specified-above |sandbox_policy_id|.
70 // If fork() failed and a new child was not created, pass kNullProcessHandle.
71 void FinishedFork(base::ProcessHandle handle
);
73 // Called in the parent when a process has died. It cleans up the references
75 void ChildDied(base::ProcessHandle handle
);
77 // Looks up the policy for a given process ID. If no policy is associated
78 // with the |pid|, this returns NULL.
79 const BootstrapSandboxPolicy
* PolicyForProcess(pid_t pid
) const;
81 std::string
server_bootstrap_name() const { return server_bootstrap_name_
; }
82 mach_port_t
real_bootstrap_port() const { return real_bootstrap_port_
; }
87 // The name in the system bootstrap server by which the |server_|'s port
89 const std::string server_bootstrap_name_
;
91 // The original bootstrap port of the process, which is connected to the
92 // real launchd server.
93 base::mac::ScopedMachSendRight real_bootstrap_port_
;
95 // The |lock_| protects all the following variables.
96 mutable base::Lock lock_
;
98 // The sandbox_policy_id that will be enforced for the new child.
99 int effective_policy_id_
;
101 // All the policies that have been registered with this sandbox manager.
102 std::map
<int, const BootstrapSandboxPolicy
> policies_
;
104 // The association between process ID and sandbox policy ID.
105 std::map
<base::ProcessHandle
, int> sandboxed_processes_
;
107 // A Mach IPC message server that is used to intercept and filter bootstrap
109 scoped_ptr
<LaunchdInterceptionServer
> server_
;
112 } // namespace sandbox
114 #endif // SANDBOX_MAC_BOOTSTRAP_SANDBOX_H_