1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121
|
// Copyright 2012 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "sandbox/policy/mac/sandbox_mac.h"
#include <fcntl.h>
#include <sys/param.h>
#include <string>
#include "base/feature_list.h"
#include "base/files/scoped_file.h"
#include "base/logging.h"
#include "base/notreached.h"
#include "base/posix/eintr_wrapper.h"
#include "sandbox/policy/features.h"
#include "sandbox/policy/mac/audio.sb.h"
#include "sandbox/policy/mac/cdm.sb.h"
#include "sandbox/policy/mac/common.sb.h"
#include "sandbox/policy/mac/gpu.sb.h"
#include "sandbox/policy/mac/mirroring.sb.h"
#include "sandbox/policy/mac/network.sb.h"
#include "sandbox/policy/mac/on_device_model_execution.sb.h"
#include "sandbox/policy/mac/print_backend.sb.h"
#include "sandbox/policy/mac/print_compositor.sb.h"
#include "sandbox/policy/mac/renderer.sb.h"
#include "sandbox/policy/mac/screen_ai.sb.h"
#include "sandbox/policy/mac/on_device_translation.sb.h"
#include "sandbox/policy/mac/speech_recognition.sb.h"
#include "sandbox/policy/mac/utility.sb.h"
#include "sandbox/policy/mojom/sandbox.mojom.h"
namespace sandbox::policy {
base::FilePath GetCanonicalPath(const base::FilePath& path) {
base::ScopedFD fd(HANDLE_EINTR(open(path.value().c_str(), O_RDONLY)));
if (!fd.is_valid()) {
DPLOG(ERROR) << "GetCanonicalSandboxPath() failed for: " << path.value();
return path;
}
base::FilePath::CharType canonical_path[MAXPATHLEN];
if (HANDLE_EINTR(fcntl(fd.get(), F_GETPATH, canonical_path)) != 0) {
DPLOG(ERROR) << "GetCanonicalSandboxPath() failed for: " << path.value();
return path;
}
return base::FilePath(canonical_path);
}
std::string GetSandboxProfile(sandbox::mojom::Sandbox sandbox_type) {
std::string profile = std::string(kSeatbeltPolicyString_common);
switch (sandbox_type) {
case sandbox::mojom::Sandbox::kAudio:
profile += kSeatbeltPolicyString_audio;
break;
case sandbox::mojom::Sandbox::kCdm:
profile += kSeatbeltPolicyString_cdm;
break;
case sandbox::mojom::Sandbox::kGpu:
profile += kSeatbeltPolicyString_gpu;
break;
case sandbox::mojom::Sandbox::kMirroring:
profile += kSeatbeltPolicyString_mirroring;
break;
case sandbox::mojom::Sandbox::kNetwork:
profile += kSeatbeltPolicyString_network;
break;
case sandbox::mojom::Sandbox::kPrintBackend:
profile += kSeatbeltPolicyString_print_backend;
break;
case sandbox::mojom::Sandbox::kPrintCompositor:
profile += kSeatbeltPolicyString_print_compositor;
break;
case sandbox::mojom::Sandbox::kScreenAI:
profile += kSeatbeltPolicyString_screen_ai;
break;
case sandbox::mojom::Sandbox::kSpeechRecognition:
profile += kSeatbeltPolicyString_speech_recognition;
break;
case sandbox::mojom::Sandbox::kOnDeviceModelExecution:
profile += kSeatbeltPolicyString_on_device_model_execution;
break;
case sandbox::mojom::Sandbox::kOnDeviceTranslation:
profile += kSeatbeltPolicyString_on_device_translation;
break;
// kService and kUtility are the same on OS_MAC, so fallthrough.
case sandbox::mojom::Sandbox::kService:
case sandbox::mojom::Sandbox::kServiceWithJit:
case sandbox::mojom::Sandbox::kUtility:
profile += kSeatbeltPolicyString_utility;
break;
case sandbox::mojom::Sandbox::kRenderer:
profile += kSeatbeltPolicyString_renderer;
break;
case sandbox::mojom::Sandbox::kNoSandbox:
NOTREACHED();
}
return profile;
}
bool CanCacheSandboxPolicy(sandbox::mojom::Sandbox sandbox_type) {
static const bool feature_enabled =
base::FeatureList::IsEnabled(features::kCacheMacSandboxProfiles);
if (!feature_enabled)
return false;
switch (sandbox_type) {
case sandbox::mojom::Sandbox::kRenderer:
case sandbox::mojom::Sandbox::kService:
case sandbox::mojom::Sandbox::kServiceWithJit:
case sandbox::mojom::Sandbox::kUtility:
return true;
default:
return false;
}
}
} // namespace sandbox::policy
|