// Copyright 2020 Google LLC // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. #include #include #include #include "sandboxed_api/util/flag.h" #include "tiff_sapi.sapi.h" ABSL_DECLARE_FLAG(string, sandbox2_danger_danger_permit_all); ABSL_DECLARE_FLAG(string, sandbox2_danger_danger_permit_all_and_log); namespace { class TiffSapiSandbox : public TiffSandbox { public: explicit TiffSapiSandbox(std::string dir = "", std::string file = "") : dir_(std::move(dir)), file_(std::move(file)) {} private: std::unique_ptr ModifyPolicy( sandbox2::PolicyBuilder*) override { auto builder = std::make_unique(); (*builder) .AllowRead() .AllowStaticStartup() .AllowWrite() .AllowOpen() .AllowExit() .AllowStat() .AllowSystemMalloc() .AllowSyscalls({ __NR_futex, __NR_close, __NR_lseek, __NR_gettid, __NR_sysinfo, __NR_mmap, __NR_munmap, }); if (!dir_.empty()) { builder->AddDirectory(dir_, /*is_ro=*/false); } if (!file_.empty()) { builder->AddFile(file_, /*is_ro=*/false); } return builder.get()->BuildOrDie(); } std::string dir_, file_; }; } // namespace