summaryrefslogtreecommitdiffstats
path: root/mojo/runner/linux_sandbox.h
blob: 4111cf5860065e1b7ccd698d84a33fd1cead6bcb (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
// Copyright 2015 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#ifndef MOJO_RUNNER_LINUX_SANDBOX_H_
#define MOJO_RUNNER_LINUX_SANDBOX_H_

#include "base/files/scoped_file.h"
#include "sandbox/linux/bpf_dsl/bpf_dsl.h"
#include "sandbox/linux/bpf_dsl/policy.h"
#include "sandbox/linux/syscall_broker/broker_process.h"

namespace mandoline {

// Encapsulates all tasks related to raising the sandbox for mandoline.
class LinuxSandbox {
 public:
  explicit LinuxSandbox(
      const std::vector<sandbox::syscall_broker::BrokerFilePermission>&
          permissions);
  ~LinuxSandbox();

  // Grabs a file descriptor to /proc.
  void Warmup();

  // Puts the user in a new PID namespace.
  void EngageNamespaceSandbox();

  // Starts a broker process and sets up seccomp-bpf to delegate decisions to
  // it.
  void EngageSeccompSandbox();

  // Performs the dropping of access to the outside world (drops the reference
  // to /proc acquired in Warmup().
  void Seal();

 private:
  bool warmed_up_;
  base::ScopedFD proc_fd_;
  scoped_ptr<sandbox::syscall_broker::BrokerProcess> broker_;
  scoped_ptr<sandbox::bpf_dsl::Policy> policy_;

  DISALLOW_COPY_AND_ASSIGN(LinuxSandbox);
};

}  // namespace mandoline

#endif  // MOJO_RUNNER_LINUX_SANDBOX_H_