Home | History | Annotate | Download | only in common
      1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 #include "content/common/sandbox_mac.h"
      6 
      7 #import <Cocoa/Cocoa.h>
      8 
      9 #include <CoreFoundation/CFTimeZone.h>
     10 extern "C" {
     11 #include <sandbox.h>
     12 }
     13 #include <signal.h>
     14 #include <sys/param.h>
     15 
     16 #include "base/basictypes.h"
     17 #include "base/command_line.h"
     18 #include "base/compiler_specific.h"
     19 #include "base/file_util.h"
     20 #include "base/mac/bundle_locations.h"
     21 #include "base/mac/mac_util.h"
     22 #include "base/mac/scoped_cftyperef.h"
     23 #include "base/mac/scoped_nsautorelease_pool.h"
     24 #include "base/mac/scoped_nsobject.h"
     25 #include "base/rand_util.h"
     26 #include "base/strings/string16.h"
     27 #include "base/strings/string_piece.h"
     28 #include "base/strings/string_util.h"
     29 #include "base/strings/stringprintf.h"
     30 #include "base/strings/sys_string_conversions.h"
     31 #include "base/strings/utf_string_conversions.h"
     32 #include "base/sys_info.h"
     33 #include "content/public/common/content_client.h"
     34 #include "content/public/common/content_switches.h"
     35 #include "grit/content_resources.h"
     36 #include "third_party/icu/source/common/unicode/uchar.h"
     37 #include "ui/base/layout.h"
     38 #include "ui/gl/gl_surface.h"
     39 #include "ui/gl/io_surface_support_mac.h"
     40 
     41 namespace content {
     42 namespace {
     43 
     44 // Is the sandbox currently active.
     45 bool gSandboxIsActive = false;
     46 
     47 struct SandboxTypeToResourceIDMapping {
     48   SandboxType sandbox_type;
     49   int sandbox_profile_resource_id;
     50 };
     51 
     52 // Mapping from sandbox process types to resource IDs containing the sandbox
     53 // profile for all process types known to content.
     54 SandboxTypeToResourceIDMapping kDefaultSandboxTypeToResourceIDMapping[] = {
     55   { SANDBOX_TYPE_RENDERER, IDR_RENDERER_SANDBOX_PROFILE },
     56   { SANDBOX_TYPE_WORKER,   IDR_WORKER_SANDBOX_PROFILE },
     57   { SANDBOX_TYPE_UTILITY,  IDR_UTILITY_SANDBOX_PROFILE },
     58   { SANDBOX_TYPE_GPU,      IDR_GPU_SANDBOX_PROFILE },
     59   { SANDBOX_TYPE_PPAPI,    IDR_PPAPI_SANDBOX_PROFILE },
     60 };
     61 
     62 COMPILE_ASSERT(arraysize(kDefaultSandboxTypeToResourceIDMapping) == \
     63                size_t(SANDBOX_TYPE_AFTER_LAST_TYPE), \
     64                sandbox_type_to_resource_id_mapping_incorrect);
     65 
     66 // Try to escape |c| as a "SingleEscapeCharacter" (\n, etc).  If successful,
     67 // returns true and appends the escape sequence to |dst|.
     68 bool EscapeSingleChar(char c, std::string* dst) {
     69   const char *append = NULL;
     70   switch (c) {
     71     case '\b':
     72       append = "\\b";
     73       break;
     74     case '\f':
     75       append = "\\f";
     76       break;
     77     case '\n':
     78       append = "\\n";
     79       break;
     80     case '\r':
     81       append = "\\r";
     82       break;
     83     case '\t':
     84       append = "\\t";
     85       break;
     86     case '\\':
     87       append = "\\\\";
     88       break;
     89     case '"':
     90       append = "\\\"";
     91       break;
     92   }
     93 
     94   if (!append) {
     95     return false;
     96   }
     97 
     98   dst->append(append);
     99   return true;
    100 }
    101 
    102 // Errors quoting strings for the Sandbox profile are always fatal, report them
    103 // in a central place.
    104 NOINLINE void FatalStringQuoteException(const std::string& str) {
    105   // Copy bad string to the stack so it's recorded in the crash dump.
    106   char bad_string[256] = {0};
    107   base::strlcpy(bad_string, str.c_str(), arraysize(bad_string));
    108   DLOG(FATAL) << "String quoting failed " << bad_string;
    109 }
    110 
    111 }  // namespace
    112 
    113 // static
    114 NSString* Sandbox::AllowMetadataForPath(const base::FilePath& allowed_path) {
    115   // Collect a list of all parent directories.
    116   base::FilePath last_path = allowed_path;
    117   std::vector<base::FilePath> subpaths;
    118   for (base::FilePath path = allowed_path;
    119        path.value() != last_path.value();
    120        path = path.DirName()) {
    121     subpaths.push_back(path);
    122     last_path = path;
    123   }
    124 
    125   // Iterate through all parents and allow stat() on them explicitly.
    126   NSString* sandbox_command = @"(allow file-read-metadata ";
    127   for (std::vector<base::FilePath>::reverse_iterator i = subpaths.rbegin();
    128        i != subpaths.rend();
    129        ++i) {
    130     std::string subdir_escaped;
    131     if (!QuotePlainString(i->value(), &subdir_escaped)) {
    132       FatalStringQuoteException(i->value());
    133       return nil;
    134     }
    135 
    136     NSString* subdir_escaped_ns =
    137         base::SysUTF8ToNSString(subdir_escaped.c_str());
    138     sandbox_command =
    139         [sandbox_command stringByAppendingFormat:@"(literal \"%@\")",
    140             subdir_escaped_ns];
    141   }
    142 
    143   return [sandbox_command stringByAppendingString:@")"];
    144 }
    145 
    146 // static
    147 bool Sandbox::QuotePlainString(const std::string& src_utf8, std::string* dst) {
    148   dst->clear();
    149 
    150   const char* src = src_utf8.c_str();
    151   int32_t length = src_utf8.length();
    152   int32_t position = 0;
    153   while (position < length) {
    154     UChar32 c;
    155     U8_NEXT(src, position, length, c);  // Macro increments |position|.
    156     DCHECK_GE(c, 0);
    157     if (c < 0)
    158       return false;
    159 
    160     if (c < 128) {  // EscapeSingleChar only handles ASCII.
    161       char as_char = static_cast<char>(c);
    162       if (EscapeSingleChar(as_char, dst)) {
    163         continue;
    164       }
    165     }
    166 
    167     if (c < 32 || c > 126) {
    168       // Any characters that aren't printable ASCII get the \u treatment.
    169       unsigned int as_uint = static_cast<unsigned int>(c);
    170       base::StringAppendF(dst, "\\u%04X", as_uint);
    171       continue;
    172     }
    173 
    174     // If we got here we know that the character in question is strictly
    175     // in the ASCII range so there's no need to do any kind of encoding
    176     // conversion.
    177     dst->push_back(static_cast<char>(c));
    178   }
    179   return true;
    180 }
    181 
    182 // static
    183 bool Sandbox::QuoteStringForRegex(const std::string& str_utf8,
    184                                   std::string* dst) {
    185   // Characters with special meanings in sandbox profile syntax.
    186   const char regex_special_chars[] = {
    187     '\\',
    188 
    189     // Metacharacters
    190     '^',
    191     '.',
    192     '[',
    193     ']',
    194     '$',
    195     '(',
    196     ')',
    197     '|',
    198 
    199     // Quantifiers
    200     '*',
    201     '+',
    202     '?',
    203     '{',
    204     '}',
    205   };
    206 
    207   // Anchor regex at start of path.
    208   dst->assign("^");
    209 
    210   const char* src = str_utf8.c_str();
    211   int32_t length = str_utf8.length();
    212   int32_t position = 0;
    213   while (position < length) {
    214     UChar32 c;
    215     U8_NEXT(src, position, length, c);  // Macro increments |position|.
    216     DCHECK_GE(c, 0);
    217     if (c < 0)
    218       return false;
    219 
    220     // The Mac sandbox regex parser only handles printable ASCII characters.
    221     // 33 >= c <= 126
    222     if (c < 32 || c > 125) {
    223       return false;
    224     }
    225 
    226     for (size_t i = 0; i < arraysize(regex_special_chars); ++i) {
    227       if (c == regex_special_chars[i]) {
    228         dst->push_back('\\');
    229         break;
    230       }
    231     }
    232 
    233     dst->push_back(static_cast<char>(c));
    234   }
    235 
    236   // Make sure last element of path is interpreted as a directory. Leaving this
    237   // off would allow access to files if they start with the same name as the
    238   // directory.
    239   dst->append("(/|$)");
    240 
    241   return true;
    242 }
    243 
    244 // Warm up System APIs that empirically need to be accessed before the Sandbox
    245 // is turned on.
    246 // This method is layed out in blocks, each one containing a separate function
    247 // that needs to be warmed up. The OS version on which we found the need to
    248 // enable the function is also noted.
    249 // This function is tested on the following OS versions:
    250 //     10.5.6, 10.6.0
    251 
    252 // static
    253 void Sandbox::SandboxWarmup(int sandbox_type) {
    254   base::mac::ScopedNSAutoreleasePool scoped_pool;
    255 
    256   { // CGColorSpaceCreateWithName(), CGBitmapContextCreate() - 10.5.6
    257     base::ScopedCFTypeRef<CGColorSpaceRef> rgb_colorspace(
    258         CGColorSpaceCreateWithName(kCGColorSpaceGenericRGB));
    259 
    260     // Allocate a 1x1 image.
    261     char data[4];
    262     base::ScopedCFTypeRef<CGContextRef> context(CGBitmapContextCreate(
    263         data,
    264         1,
    265         1,
    266         8,
    267         1 * 4,
    268         rgb_colorspace,
    269         kCGImageAlphaPremultipliedFirst | kCGBitmapByteOrder32Host));
    270 
    271     // Load in the color profiles we'll need (as a side effect).
    272     (void) base::mac::GetSRGBColorSpace();
    273     (void) base::mac::GetSystemColorSpace();
    274 
    275     // CGColorSpaceCreateSystemDefaultCMYK - 10.6
    276     base::ScopedCFTypeRef<CGColorSpaceRef> cmyk_colorspace(
    277         CGColorSpaceCreateWithName(kCGColorSpaceGenericCMYK));
    278   }
    279 
    280   { // [-NSColor colorUsingColorSpaceName] - 10.5.6
    281     NSColor* color = [NSColor controlTextColor];
    282     [color colorUsingColorSpaceName:NSCalibratedRGBColorSpace];
    283   }
    284 
    285   { // localtime() - 10.5.6
    286     time_t tv = {0};
    287     localtime(&tv);
    288   }
    289 
    290   { // Gestalt() tries to read /System/Library/CoreServices/SystemVersion.plist
    291     // on 10.5.6
    292     int32 tmp;
    293     base::SysInfo::OperatingSystemVersionNumbers(&tmp, &tmp, &tmp);
    294   }
    295 
    296   {  // CGImageSourceGetStatus() - 10.6
    297      // Create a png with just enough data to get everything warmed up...
    298     char png_header[] = {0x89, 0x50, 0x4E, 0x47, 0x0D, 0x0A, 0x1A, 0x0A};
    299     NSData* data = [NSData dataWithBytes:png_header
    300                                   length:arraysize(png_header)];
    301     base::ScopedCFTypeRef<CGImageSourceRef> img(
    302         CGImageSourceCreateWithData((CFDataRef)data, NULL));
    303     CGImageSourceGetStatus(img);
    304   }
    305 
    306   {
    307     // Allow access to /dev/urandom.
    308     base::GetUrandomFD();
    309   }
    310 
    311   { // IOSurfaceLookup() - 10.7
    312     // Needed by zero-copy texture update framework - crbug.com/323338
    313     IOSurfaceSupport* io_surface_support = IOSurfaceSupport::Initialize();
    314     if (io_surface_support) {
    315       base::ScopedCFTypeRef<CFTypeRef> io_surface(
    316           io_surface_support->IOSurfaceLookup(0));
    317     }
    318   }
    319 
    320   // Process-type dependent warm-up.
    321   if (sandbox_type == SANDBOX_TYPE_UTILITY) {
    322     // CFTimeZoneCopyZone() tries to read /etc and /private/etc/localtime - 10.8
    323     // Needed by Media Galleries API Picasa - crbug.com/151701
    324     CFTimeZoneCopySystem();
    325   }
    326 
    327   if (sandbox_type == SANDBOX_TYPE_GPU) {
    328     // Preload either the desktop GL or the osmesa so, depending on the
    329     // --use-gl flag.
    330     gfx::GLSurface::InitializeOneOff();
    331   }
    332 }
    333 
    334 // static
    335 NSString* Sandbox::BuildAllowDirectoryAccessSandboxString(
    336     const base::FilePath& allowed_dir,
    337     SandboxVariableSubstitions* substitutions) {
    338   // A whitelist is used to determine which directories can be statted
    339   // This means that in the case of an /a/b/c/d/ directory, we may be able to
    340   // stat the leaf directory, but not its parent.
    341   // The extension code in Chrome calls realpath() which fails if it can't call
    342   // stat() on one of the parent directories in the path.
    343   // The solution to this is to allow statting the parent directories themselves
    344   // but not their contents.  We need to add a separate rule for each parent
    345   // directory.
    346 
    347   // The sandbox only understands "real" paths.  This resolving step is
    348   // needed so the caller doesn't need to worry about things like /var
    349   // being a link to /private/var (like in the paths CreateNewTempDirectory()
    350   // returns).
    351   base::FilePath allowed_dir_canonical = GetCanonicalSandboxPath(allowed_dir);
    352 
    353   NSString* sandbox_command = AllowMetadataForPath(allowed_dir_canonical);
    354   sandbox_command = [sandbox_command
    355       substringToIndex:[sandbox_command length] - 1];  // strip trailing ')'
    356 
    357   // Finally append the leaf directory.  Unlike its parents (for which only
    358   // stat() should be allowed), the leaf directory needs full access.
    359   (*substitutions)["ALLOWED_DIR"] =
    360       SandboxSubstring(allowed_dir_canonical.value(),
    361                        SandboxSubstring::REGEX);
    362   sandbox_command =
    363       [sandbox_command
    364           stringByAppendingString:@") (allow file-read* file-write*"
    365                                    " (regex #\"@ALLOWED_DIR@\") )"];
    366   return sandbox_command;
    367 }
    368 
    369 // Load the appropriate template for the given sandbox type.
    370 // Returns the template as an NSString or nil on error.
    371 NSString* LoadSandboxTemplate(int sandbox_type) {
    372   // We use a custom sandbox definition to lock things down as tightly as
    373   // possible.
    374   int sandbox_profile_resource_id = -1;
    375 
    376   // Find resource id for sandbox profile to use for the specific sandbox type.
    377   for (size_t i = 0;
    378        i < arraysize(kDefaultSandboxTypeToResourceIDMapping);
    379        ++i) {
    380     if (kDefaultSandboxTypeToResourceIDMapping[i].sandbox_type ==
    381         sandbox_type) {
    382       sandbox_profile_resource_id =
    383           kDefaultSandboxTypeToResourceIDMapping[i].sandbox_profile_resource_id;
    384       break;
    385     }
    386   }
    387   if (sandbox_profile_resource_id == -1) {
    388     // Check if the embedder knows about this sandbox process type.
    389     bool sandbox_type_found =
    390         GetContentClient()->GetSandboxProfileForSandboxType(
    391             sandbox_type, &sandbox_profile_resource_id);
    392     CHECK(sandbox_type_found) << "Unknown sandbox type " << sandbox_type;
    393   }
    394 
    395   base::StringPiece sandbox_definition =
    396       GetContentClient()->GetDataResource(
    397           sandbox_profile_resource_id, ui::SCALE_FACTOR_NONE);
    398   if (sandbox_definition.empty()) {
    399     LOG(FATAL) << "Failed to load the sandbox profile (resource id "
    400                << sandbox_profile_resource_id << ")";
    401     return nil;
    402   }
    403 
    404   base::StringPiece common_sandbox_definition =
    405       GetContentClient()->GetDataResource(
    406           IDR_COMMON_SANDBOX_PROFILE, ui::SCALE_FACTOR_NONE);
    407   if (common_sandbox_definition.empty()) {
    408     LOG(FATAL) << "Failed to load the common sandbox profile";
    409     return nil;
    410   }
    411 
    412   base::scoped_nsobject<NSString> common_sandbox_prefix_data(
    413       [[NSString alloc] initWithBytes:common_sandbox_definition.data()
    414                                length:common_sandbox_definition.length()
    415                              encoding:NSUTF8StringEncoding]);
    416 
    417   base::scoped_nsobject<NSString> sandbox_data(
    418       [[NSString alloc] initWithBytes:sandbox_definition.data()
    419                                length:sandbox_definition.length()
    420                              encoding:NSUTF8StringEncoding]);
    421 
    422   // Prefix sandbox_data with common_sandbox_prefix_data.
    423   return [common_sandbox_prefix_data stringByAppendingString:sandbox_data];
    424 }
    425 
    426 // static
    427 bool Sandbox::PostProcessSandboxProfile(
    428         NSString* sandbox_template,
    429         NSArray* comments_to_remove,
    430         SandboxVariableSubstitions& substitutions,
    431         std::string *final_sandbox_profile_str) {
    432   NSString* sandbox_data = [[sandbox_template copy] autorelease];
    433 
    434   // Remove comments, e.g. ;10.7_OR_ABOVE .
    435   for (NSString* to_remove in comments_to_remove) {
    436     sandbox_data = [sandbox_data stringByReplacingOccurrencesOfString:to_remove
    437                                                            withString:@""];
    438   }
    439 
    440   // Split string on "@" characters.
    441   std::vector<std::string> raw_sandbox_pieces;
    442   if (Tokenize([sandbox_data UTF8String], "@", &raw_sandbox_pieces) == 0) {
    443     DLOG(FATAL) << "Bad Sandbox profile, should contain at least one token ("
    444                 << [sandbox_data UTF8String]
    445                 << ")";
    446     return false;
    447   }
    448 
    449   // Iterate over string pieces and substitute variables, escaping as necessary.
    450   size_t output_string_length = 0;
    451   std::vector<std::string> processed_sandbox_pieces(raw_sandbox_pieces.size());
    452   for (std::vector<std::string>::iterator it = raw_sandbox_pieces.begin();
    453        it != raw_sandbox_pieces.end();
    454        ++it) {
    455     std::string new_piece;
    456     SandboxVariableSubstitions::iterator replacement_it =
    457         substitutions.find(*it);
    458     if (replacement_it == substitutions.end()) {
    459       new_piece = *it;
    460     } else {
    461       // Found something to substitute.
    462       SandboxSubstring& replacement = replacement_it->second;
    463       switch (replacement.type()) {
    464         case SandboxSubstring::PLAIN:
    465           new_piece = replacement.value();
    466           break;
    467 
    468         case SandboxSubstring::LITERAL:
    469           if (!QuotePlainString(replacement.value(), &new_piece))
    470             FatalStringQuoteException(replacement.value());
    471           break;
    472 
    473         case SandboxSubstring::REGEX:
    474           if (!QuoteStringForRegex(replacement.value(), &new_piece))
    475             FatalStringQuoteException(replacement.value());
    476           break;
    477       }
    478     }
    479     output_string_length += new_piece.size();
    480     processed_sandbox_pieces.push_back(new_piece);
    481   }
    482 
    483   // Build final output string.
    484   final_sandbox_profile_str->reserve(output_string_length);
    485 
    486   for (std::vector<std::string>::iterator it = processed_sandbox_pieces.begin();
    487        it != processed_sandbox_pieces.end();
    488        ++it) {
    489     final_sandbox_profile_str->append(*it);
    490   }
    491   return true;
    492 }
    493 
    494 
    495 // Turns on the OS X sandbox for this process.
    496 
    497 // static
    498 bool Sandbox::EnableSandbox(int sandbox_type,
    499                             const base::FilePath& allowed_dir) {
    500   // Sanity - currently only SANDBOX_TYPE_UTILITY supports a directory being
    501   // passed in.
    502   if (sandbox_type < SANDBOX_TYPE_AFTER_LAST_TYPE &&
    503       sandbox_type != SANDBOX_TYPE_UTILITY) {
    504     DCHECK(allowed_dir.empty())
    505         << "Only SANDBOX_TYPE_UTILITY allows a custom directory parameter.";
    506   }
    507 
    508   NSString* sandbox_data = LoadSandboxTemplate(sandbox_type);
    509   if (!sandbox_data) {
    510     return false;
    511   }
    512 
    513   SandboxVariableSubstitions substitutions;
    514   if (!allowed_dir.empty()) {
    515     // Add the sandbox commands necessary to access the given directory.
    516     // Note: this function must be called before PostProcessSandboxProfile()
    517     // since the string it inserts contains variables that need substitution.
    518     NSString* allowed_dir_sandbox_command =
    519         BuildAllowDirectoryAccessSandboxString(allowed_dir, &substitutions);
    520 
    521     if (allowed_dir_sandbox_command) {  // May be nil if function fails.
    522       sandbox_data = [sandbox_data
    523           stringByReplacingOccurrencesOfString:@";ENABLE_DIRECTORY_ACCESS"
    524                                     withString:allowed_dir_sandbox_command];
    525     }
    526   }
    527 
    528   NSMutableArray* tokens_to_remove = [NSMutableArray array];
    529 
    530   // Enable verbose logging if enabled on the command line. (See common.sb
    531   // for details).
    532   const CommandLine* command_line = CommandLine::ForCurrentProcess();
    533   bool enable_logging =
    534       command_line->HasSwitch(switches::kEnableSandboxLogging);;
    535   if (enable_logging) {
    536     [tokens_to_remove addObject:@";ENABLE_LOGGING"];
    537   }
    538 
    539   bool lion_or_later = base::mac::IsOSLionOrLater();
    540 
    541   // Without this, the sandbox will print a message to the system log every
    542   // time it denies a request.  This floods the console with useless spew.
    543   if (!enable_logging) {
    544     substitutions["DISABLE_SANDBOX_DENIAL_LOGGING"] =
    545         SandboxSubstring("(with no-log)");
    546   } else {
    547     substitutions["DISABLE_SANDBOX_DENIAL_LOGGING"] = SandboxSubstring("");
    548   }
    549 
    550   // Splice the path of the user's home directory into the sandbox profile
    551   // (see renderer.sb for details).
    552   std::string home_dir = [NSHomeDirectory() fileSystemRepresentation];
    553 
    554   base::FilePath home_dir_canonical =
    555       GetCanonicalSandboxPath(base::FilePath(home_dir));
    556 
    557   substitutions["USER_HOMEDIR_AS_LITERAL"] =
    558       SandboxSubstring(home_dir_canonical.value(),
    559           SandboxSubstring::LITERAL);
    560 
    561   if (lion_or_later) {
    562     // >=10.7 Sandbox rules.
    563     [tokens_to_remove addObject:@";10.7_OR_ABOVE"];
    564   }
    565 
    566   substitutions["COMPONENT_BUILD_WORKAROUND"] = SandboxSubstring("");
    567 #if defined(COMPONENT_BUILD)
    568   // dlopen() fails without file-read-metadata access if the executable image
    569   // contains LC_RPATH load commands. The components build uses those.
    570   // See http://crbug.com/127465
    571   if (base::mac::IsOSSnowLeopard()) {
    572     base::FilePath bundle_executable = base::mac::NSStringToFilePath(
    573         [base::mac::MainBundle() executablePath]);
    574     NSString* sandbox_command = AllowMetadataForPath(
    575         GetCanonicalSandboxPath(bundle_executable));
    576     substitutions["COMPONENT_BUILD_WORKAROUND"] =
    577         SandboxSubstring(base::SysNSStringToUTF8(sandbox_command));
    578   }
    579 #endif
    580 
    581   // All information needed to assemble the final profile has been collected.
    582   // Merge it all together.
    583   std::string final_sandbox_profile_str;
    584   if (!PostProcessSandboxProfile(sandbox_data, tokens_to_remove, substitutions,
    585                                  &final_sandbox_profile_str)) {
    586     return false;
    587   }
    588 
    589   // Initialize sandbox.
    590   char* error_buff = NULL;
    591   int error = sandbox_init(final_sandbox_profile_str.c_str(), 0, &error_buff);
    592   bool success = (error == 0 && error_buff == NULL);
    593   DLOG_IF(FATAL, !success) << "Failed to initialize sandbox: "
    594                            << error
    595                            << " "
    596                            << error_buff;
    597   sandbox_free_error(error_buff);
    598   gSandboxIsActive = success;
    599   return success;
    600 }
    601 
    602 // static
    603 bool Sandbox::SandboxIsCurrentlyActive() {
    604   return gSandboxIsActive;
    605 }
    606 
    607 // static
    608 base::FilePath Sandbox::GetCanonicalSandboxPath(const base::FilePath& path) {
    609   int fd = HANDLE_EINTR(open(path.value().c_str(), O_RDONLY));
    610   if (fd < 0) {
    611     DPLOG(FATAL) << "GetCanonicalSandboxPath() failed for: "
    612                  << path.value();
    613     return path;
    614   }
    615   file_util::ScopedFD file_closer(&fd);
    616 
    617   base::FilePath::CharType canonical_path[MAXPATHLEN];
    618   if (HANDLE_EINTR(fcntl(fd, F_GETPATH, canonical_path)) != 0) {
    619     DPLOG(FATAL) << "GetCanonicalSandboxPath() failed for: "
    620                  << path.value();
    621     return path;
    622   }
    623 
    624   return base::FilePath(canonical_path);
    625 }
    626 
    627 }  // namespace content
    628