2020-07-17 19:54:20 +08:00
|
|
|
// Copyright 2020 Google LLC
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
2022-01-28 17:38:27 +08:00
|
|
|
// https://www.apache.org/licenses/LICENSE-2.0
|
2020-07-17 19:54:20 +08:00
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
#ifndef SANDBOXED_API_SANDBOX2_FORK_CLIENT_H_
|
|
|
|
#define SANDBOXED_API_SANDBOX2_FORK_CLIENT_H_
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
|
2020-10-05 20:09:47 +08:00
|
|
|
#include "absl/base/thread_annotations.h"
|
2020-07-17 19:54:20 +08:00
|
|
|
#include "absl/synchronization/mutex.h"
|
2023-03-09 00:08:35 +08:00
|
|
|
#include "sandboxed_api/util/fileops.h"
|
2020-07-17 19:54:20 +08:00
|
|
|
|
|
|
|
namespace sandbox2 {
|
|
|
|
|
|
|
|
// Envvar indicating that this process should not start the fork-server.
|
2020-10-05 20:09:47 +08:00
|
|
|
constexpr inline char kForkServerDisableEnv[] = "SANDBOX2_NOFORKSERVER";
|
2020-07-17 19:54:20 +08:00
|
|
|
|
|
|
|
class Comms;
|
|
|
|
class ForkRequest;
|
|
|
|
|
2023-02-07 18:22:02 +08:00
|
|
|
struct SandboxeeProcess {
|
|
|
|
pid_t init_pid = -1;
|
|
|
|
pid_t main_pid = -1;
|
2023-03-09 00:08:35 +08:00
|
|
|
sapi::file_util::fileops::FDCloser status_fd;
|
2023-02-07 18:22:02 +08:00
|
|
|
};
|
|
|
|
|
2020-07-17 19:54:20 +08:00
|
|
|
class ForkClient {
|
|
|
|
public:
|
2023-12-13 19:33:36 +08:00
|
|
|
ForkClient(pid_t pid, Comms* comms) : ForkClient(pid, comms, false) {}
|
2020-07-17 19:54:20 +08:00
|
|
|
ForkClient(const ForkClient&) = delete;
|
|
|
|
ForkClient& operator=(const ForkClient&) = delete;
|
2023-12-13 19:33:36 +08:00
|
|
|
~ForkClient();
|
2020-07-17 19:54:20 +08:00
|
|
|
|
|
|
|
// Sends the fork request over the supplied Comms channel.
|
2023-02-07 18:22:02 +08:00
|
|
|
SandboxeeProcess SendRequest(const ForkRequest& request, int exec_fd,
|
|
|
|
int comms_fd);
|
2020-07-17 19:54:20 +08:00
|
|
|
|
2020-11-06 00:47:34 +08:00
|
|
|
pid_t pid() { return pid_; }
|
|
|
|
|
2020-07-17 19:54:20 +08:00
|
|
|
private:
|
2023-12-13 19:33:36 +08:00
|
|
|
friend class GlobalForkClient;
|
|
|
|
|
|
|
|
ForkClient(pid_t pid, Comms* comms, bool is_global);
|
|
|
|
|
2020-11-06 00:47:34 +08:00
|
|
|
// Pid of the ForkServer.
|
|
|
|
pid_t pid_;
|
2020-07-17 19:54:20 +08:00
|
|
|
// Comms channel connecting with the ForkServer. Not owned by the object.
|
2020-10-05 20:09:47 +08:00
|
|
|
Comms* comms_ ABSL_GUARDED_BY(comms_mutex_);
|
2023-12-13 19:33:36 +08:00
|
|
|
// Is it the global forkserver
|
|
|
|
bool is_global_;
|
2020-07-17 19:54:20 +08:00
|
|
|
// Mutex locking transactions (requests) over the Comms channel.
|
|
|
|
absl::Mutex comms_mutex_;
|
|
|
|
};
|
2020-10-05 20:09:47 +08:00
|
|
|
|
2020-07-17 19:54:20 +08:00
|
|
|
} // namespace sandbox2
|
|
|
|
|
|
|
|
#endif // SANDBOXED_API_SANDBOX2_FORK_CLIENT_H_
|