summaryrefslogtreecommitdiffstats
path: root/components/nacl/browser/nacl_process_host.cc
diff options
context:
space:
mode:
authoraberent@chromium.org <aberent@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2014-03-13 11:35:15 +0000
committeraberent@chromium.org <aberent@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2014-03-13 11:35:15 +0000
commit121e6138b0b543c38ec66cf0033af96dc75b49a0 (patch)
treed0a17305b9fb96bf52cef7b87feae4737cc02e97 /components/nacl/browser/nacl_process_host.cc
parent33fcc33ec9ef57d98a20911a6cd6f64f91a5d375 (diff)
downloadchromium_src-121e6138b0b543c38ec66cf0033af96dc75b49a0.zip
chromium_src-121e6138b0b543c38ec66cf0033af96dc75b49a0.tar.gz
chromium_src-121e6138b0b543c38ec66cf0033af96dc75b49a0.tar.bz2
Refactor configuration of sandboxes - first steps
See https://docs.google.com/document/d/1H-hCsIcMsAEP0fWHimbuiNA-Hc9eXEmR94eb-2RQAhA/edit?usp=sharing for background. This moves all process type dependent decisions on how to create Linux processes (not how to sandbox them once created, not Android) into the launch delegates and makes the arguments to the ChildProcessLauncher constructor and BrowserChildProcessHostImpl::Launch OS independent. BUG=none Review URL: https://codereview.chromium.org/177863002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@256802 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'components/nacl/browser/nacl_process_host.cc')
-rw-r--r--components/nacl/browser/nacl_process_host.cc39
1 files changed, 26 insertions, 13 deletions
diff --git a/components/nacl/browser/nacl_process_host.cc b/components/nacl/browser/nacl_process_host.cc
index b16b6d8..23a76b5 100644
--- a/components/nacl/browser/nacl_process_host.cc
+++ b/components/nacl/browser/nacl_process_host.cc
@@ -40,6 +40,7 @@
#include "content/public/common/child_process_host.h"
#include "content/public/common/content_switches.h"
#include "content/public/common/process_type.h"
+#include "content/public/common/sandboxed_process_launcher_delegate.h"
#include "ipc/ipc_channel.h"
#include "ipc/ipc_switches.h"
#include "native_client/src/shared/imc/nacl_imc_c.h"
@@ -63,7 +64,6 @@
#include "components/nacl/browser/nacl_broker_service_win.h"
#include "components/nacl/common/nacl_debug_exception_handler_win.h"
#include "content/public/common/sandbox_init.h"
-#include "content/public/common/sandboxed_process_launcher_delegate.h"
#endif
using content::BrowserThread;
@@ -144,14 +144,21 @@ bool RunningOnWOW64() {
return (base::win::OSInfo::GetInstance()->wow64_status() ==
base::win::OSInfo::WOW64_ENABLED);
}
+#endif
// NOTE: changes to this class need to be reviewed by the security team.
class NaClSandboxedProcessLauncherDelegate
: public content::SandboxedProcessLauncherDelegate {
public:
- NaClSandboxedProcessLauncherDelegate() {}
+ NaClSandboxedProcessLauncherDelegate(ChildProcessHost* host)
+#if defined(OS_POSIX)
+ : ipc_fd_(host->TakeClientFileDescriptor())
+#endif
+ {}
+
virtual ~NaClSandboxedProcessLauncherDelegate() {}
+#if defined(OS_WIN)
virtual void PostSpawnTarget(base::ProcessHandle process) {
// For Native Client sel_ldr processes on 32-bit Windows, reserve 1 GB of
// address space to prevent later failure due to address space fragmentation
@@ -164,10 +171,21 @@ class NaClSandboxedProcessLauncherDelegate
DLOG(WARNING) << "Failed to reserve address space for Native Client";
}
}
-};
-
+#elif defined(OS_POSIX)
+ virtual bool ShouldUseZygote() OVERRIDE {
+ return true;
+ }
+ virtual int GetIpcFd() OVERRIDE {
+ return ipc_fd_;
+ }
#endif // OS_WIN
+ private:
+#if defined(OS_POSIX)
+ int ipc_fd_;
+#endif // OS_POSIX
+};
+
void SetCloseOnExec(NaClHandle fd) {
#if defined(OS_POSIX)
int flags = fcntl(fd, F_GETFD);
@@ -577,17 +595,12 @@ bool NaClProcessHost::LaunchSelLdr() {
SendErrorToRenderer("broker service did not launch process");
return false;
}
- } else {
- process_->Launch(new NaClSandboxedProcessLauncherDelegate,
- false,
- cmd_line.release());
+ return true;
}
-#elif defined(OS_POSIX)
- process_->Launch(true, // use_zygote
- base::EnvironmentMap(),
- cmd_line.release());
#endif
-
+ process_->Launch(
+ new NaClSandboxedProcessLauncherDelegate(process_->GetHost()),
+ cmd_line.release());
return true;
}