// Copyright 2019 Google LLC // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // https://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // A proto for the sandbox2::Forkserver class syntax = "proto3"; package sandbox2; import "sandboxed_api/sandbox2/mount_tree.proto"; enum Mode { // Default value FORKSERVER_FORK_UNSPECIFIED = 0; // Fork, execve and sandbox FORKSERVER_FORK_EXECVE_SANDBOX = 1; // Fork and execve, but no sandboxing FORKSERVER_FORK_EXECVE = 2; // Just fork FORKSERVER_FORK = 3; reserved 4; } enum MonitorType { // Default value FORKSERVER_MONITOR_UNSPECIFIED = 0; // Ptrace based monitor FORKSERVER_MONITOR_PTRACE = 1; // Seccomp_unotify based monitor FORKSERVER_MONITOR_UNOTIFY = 2; } // Enum representing the net_ns mode, used by policybuilder, forkserver, and // executor. enum NetNsMode { NETNS_MODE_UNSPECIFIED = 0; // Create a new netns for each sandbox (default). NETNS_MODE_PER_SANDBOXEE = 1; // Do not create a netns. // This will disable the network namespace isolation // from the host and expose its network interfaces to the sandboxee (generally // granting internet access). // Networking syscalls must be allowed in the policy in order to use the // network. NETNS_MODE_NONE = 2; // Create a netns shared by all sandboxees started by a forkserver. NETNS_MODE_SHARED_PER_FORKSERVER = 3; } message ForkRequest { // List of arguments, starting with argv[0] repeated bytes args = 1; // List of environment variables which will be passed to the child repeated bytes envs = 2; // How to interpret the request optional Mode mode = 3; // Clone flags for the new process optional int32 clone_flags = 4; reserved 5; // The mount tree used for namespace initialization optional MountTree mount_tree = 6; // Hostname in the network namespace optional bytes hostname = 7; // Changes mount propagation from MS_PRIVATE to MS_SLAVE if set optional bool allow_mount_propagation = 8; // Monitor type used by the sandbox optional MonitorType monitor_type = 9; // Whether to allow speculative execution inside the sandboxee optional bool allow_speculation = 10; // Net namespace mode optional NetNsMode netns_mode = 11; }