blob: 4111cf5860065e1b7ccd698d84a33fd1cead6bcb [file] [log] [blame]
// Copyright 2015 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef MOJO_RUNNER_LINUX_SANDBOX_H_
#define MOJO_RUNNER_LINUX_SANDBOX_H_
#include "base/files/scoped_file.h"
#include "sandbox/linux/bpf_dsl/bpf_dsl.h"
#include "sandbox/linux/bpf_dsl/policy.h"
#include "sandbox/linux/syscall_broker/broker_process.h"
namespace mandoline {
// Encapsulates all tasks related to raising the sandbox for mandoline.
class LinuxSandbox {
public:
explicit LinuxSandbox(
const std::vector<sandbox::syscall_broker::BrokerFilePermission>&
permissions);
~LinuxSandbox();
// Grabs a file descriptor to /proc.
void Warmup();
// Puts the user in a new PID namespace.
void EngageNamespaceSandbox();
// Starts a broker process and sets up seccomp-bpf to delegate decisions to
// it.
void EngageSeccompSandbox();
// Performs the dropping of access to the outside world (drops the reference
// to /proc acquired in Warmup().
void Seal();
private:
bool warmed_up_;
base::ScopedFD proc_fd_;
scoped_ptr<sandbox::syscall_broker::BrokerProcess> broker_;
scoped_ptr<sandbox::bpf_dsl::Policy> policy_;
DISALLOW_COPY_AND_ASSIGN(LinuxSandbox);
};
} // namespace mandoline
#endif // MOJO_RUNNER_LINUX_SANDBOX_H_