See the previous commit, about content sandbox level 6, for details; this is basically the same (except with one more ioctl allowlisted, and controlled by a different pref). This patch also adds some plumbing to get the socket sandbox level into the code that constructs the policy, modeled on how it works for content processes. (Previously the only levels of the socket process sandbox were "on" and "off" so that wasn't necessary until now.) Differential Revision: https://phabricator.services.mozilla.com/D249018
65 lines
2.0 KiB
C++
65 lines
2.0 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
|
|
* You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "Sandbox.h"
|
|
|
|
#include "mozilla/Preferences.h"
|
|
#include "mozilla/SandboxSettings.h"
|
|
#include "mozilla/dom/ContentChild.h"
|
|
#include "mozilla/dom/ContentParent.h" // for FILE_REMOTE_TYPE
|
|
|
|
namespace mozilla {
|
|
|
|
/* static */ ContentProcessSandboxParams
|
|
ContentProcessSandboxParams::ForThisProcess(
|
|
const Maybe<ipc::FileDescriptor>& aBroker) {
|
|
ContentProcessSandboxParams params;
|
|
params.mLevel = GetEffectiveContentSandboxLevel();
|
|
|
|
if (aBroker.isSome()) {
|
|
auto fd = aBroker.value().ClonePlatformHandle();
|
|
params.mBrokerFd = fd.release();
|
|
// brokerFd < 0 means to allow direct filesystem access, so
|
|
// make absolutely sure that doesn't happen if the parent
|
|
// didn't intend it.
|
|
MOZ_RELEASE_ASSERT(params.mBrokerFd >= 0);
|
|
}
|
|
// (Otherwise, mBrokerFd will remain -1 from the default ctor.)
|
|
|
|
auto* cc = dom::ContentChild::GetSingleton();
|
|
params.mFileProcess = cc->GetRemoteType() == FILE_REMOTE_TYPE;
|
|
|
|
nsAutoCString extraSyscalls;
|
|
nsresult rv = Preferences::GetCString(
|
|
"security.sandbox.content.syscall_whitelist", extraSyscalls);
|
|
if (NS_SUCCEEDED(rv)) {
|
|
for (const nsACString& callNrString : extraSyscalls.Split(',')) {
|
|
int callNr = PromiseFlatCString(callNrString).ToInteger(&rv);
|
|
if (NS_SUCCEEDED(rv)) {
|
|
params.mSyscallWhitelist.push_back(callNr);
|
|
}
|
|
}
|
|
}
|
|
|
|
return params;
|
|
}
|
|
|
|
/* static */ SocketProcessSandboxParams
|
|
SocketProcessSandboxParams::ForThisProcess(
|
|
const Maybe<ipc::FileDescriptor>& aBroker) {
|
|
SocketProcessSandboxParams self;
|
|
|
|
if (aBroker.isSome()) {
|
|
self.mBroker = aBroker->ClonePlatformHandle();
|
|
MOZ_RELEASE_ASSERT(self.mBroker);
|
|
}
|
|
|
|
self.mLevel = GetEffectiveSocketProcessSandboxLevel();
|
|
return self;
|
|
}
|
|
|
|
} // namespace mozilla
|