sandboxed-api/oss-internship-2020/libpng/sandboxed.h
Wiktor Garbacz 36e4b80f9a Introduce and prefer AllowMmapWithoutExec
PiperOrigin-RevId: 593968486
Change-Id: I4f7d4d8a6f593d94c0a7e7672826074c4cefc230
2023-12-27 02:51:13 -08:00

65 lines
1.7 KiB
C++

// Copyright 2020 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// https://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#ifndef LIBPNG_SANDBOXED_H_
#define LIBPNG_SANDBOXED_H_
#include <linux/futex.h>
#include <syscall.h>
#include <string>
#include <utility>
#include <vector>
#include "libpng_sapi.sapi.h" // NOLINT(build/include)
class LibPNGSapiSandbox : public LibPNGSandbox {
public:
void AddFile(const std::string& file) { files_.push_back(file); }
private:
std::unique_ptr<sandbox2::Policy> ModifyPolicy(
sandbox2::PolicyBuilder*) override {
sandbox2::PolicyBuilder builder;
builder.AllowRead()
.AllowStaticStartup()
.AllowWrite()
.AllowOpen()
.AllowExit()
.AllowStat()
.AllowMmapWithoutExec()
.AllowSystemMalloc()
.AllowSyscalls({
__NR_futex,
__NR_close,
__NR_lseek,
__NR_gettid,
__NR_sysinfo,
__NR_munmap,
__NR_recvmsg,
__NR_fcntl,
});
for (const auto& file : files_) {
builder->AddFile(file, /*is_ro=*/false);
}
return builder.BuildOrDie();
}
std::vector<std::string> files_;
};
#endif // LIBPNG_SANDBOXED_H_