mirror of
https://github.com/google/sandboxed-api.git
synced 2024-03-22 13:11:30 +08:00
d451478e26
PiperOrigin-RevId: 424811734 Change-Id: If5ea692edc56ddc9c99fd478673df41c0246e9cc
76 lines
2.4 KiB
C++
76 lines
2.4 KiB
C++
// Copyright 2020 Google LLC
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// https://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
#include "sandboxed_api/sandbox2/fork_client.h"
|
|
|
|
#include <glog/logging.h>
|
|
#include "sandboxed_api/sandbox2/comms.h"
|
|
#include "sandboxed_api/sandbox2/forkserver.pb.h"
|
|
|
|
namespace sandbox2 {
|
|
|
|
pid_t ForkClient::SendRequest(const ForkRequest& request, int exec_fd,
|
|
int comms_fd, int user_ns_fd, pid_t* init_pid) {
|
|
// Acquire the channel ownership for this request (transaction).
|
|
absl::MutexLock l(&comms_mutex_);
|
|
|
|
if (!comms_->SendProtoBuf(request)) {
|
|
LOG(ERROR) << "Sending PB to the ForkServer failed";
|
|
return -1;
|
|
}
|
|
CHECK(comms_fd != -1) << "comms_fd was not properly set up";
|
|
if (!comms_->SendFD(comms_fd)) {
|
|
LOG(ERROR) << "Sending Comms FD (" << comms_fd
|
|
<< ") to the ForkServer failed";
|
|
return -1;
|
|
}
|
|
if (request.mode() == FORKSERVER_FORK_EXECVE ||
|
|
request.mode() == FORKSERVER_FORK_EXECVE_SANDBOX) {
|
|
CHECK(exec_fd != -1) << "exec_fd cannot be -1 in execve mode";
|
|
if (!comms_->SendFD(exec_fd)) {
|
|
LOG(ERROR) << "Sending Exec FD (" << exec_fd
|
|
<< ") to the ForkServer failed";
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
if (request.mode() == FORKSERVER_FORK_JOIN_SANDBOX_UNWIND) {
|
|
CHECK(user_ns_fd != -1) << "user_ns_fd cannot be -1 in unwind mode";
|
|
if (!comms_->SendFD(user_ns_fd)) {
|
|
LOG(ERROR) << "Sending user ns FD (" << user_ns_fd
|
|
<< ") to the ForkServer failed";
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
int32_t pid;
|
|
// Receive init process ID.
|
|
if (!comms_->RecvInt32(&pid)) {
|
|
LOG(ERROR) << "Receiving init PID from the ForkServer failed";
|
|
return -1;
|
|
}
|
|
if (init_pid) {
|
|
*init_pid = static_cast<pid_t>(pid);
|
|
}
|
|
|
|
// Receive sandboxee process ID.
|
|
if (!comms_->RecvInt32(&pid)) {
|
|
LOG(ERROR) << "Receiving sandboxee PID from the ForkServer failed";
|
|
return -1;
|
|
}
|
|
return static_cast<pid_t>(pid);
|
|
}
|
|
|
|
} // namespace sandbox2
|