diff options
author | aberent@chromium.org <aberent@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-03-13 11:35:15 +0000 |
---|---|---|
committer | aberent@chromium.org <aberent@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-03-13 11:35:15 +0000 |
commit | 121e6138b0b543c38ec66cf0033af96dc75b49a0 (patch) | |
tree | d0a17305b9fb96bf52cef7b87feae4737cc02e97 /components/nacl/browser/nacl_process_host.cc | |
parent | 33fcc33ec9ef57d98a20911a6cd6f64f91a5d375 (diff) | |
download | chromium_src-121e6138b0b543c38ec66cf0033af96dc75b49a0.zip chromium_src-121e6138b0b543c38ec66cf0033af96dc75b49a0.tar.gz chromium_src-121e6138b0b543c38ec66cf0033af96dc75b49a0.tar.bz2 |
Refactor configuration of sandboxes - first steps
See
https://docs.google.com/document/d/1H-hCsIcMsAEP0fWHimbuiNA-Hc9eXEmR94eb-2RQAhA/edit?usp=sharing
for background.
This moves all process type dependent decisions on how to create
Linux processes (not how to sandbox them once created, not Android)
into the launch delegates and makes the arguments to the
ChildProcessLauncher constructor and
BrowserChildProcessHostImpl::Launch OS independent.
BUG=none
Review URL: https://codereview.chromium.org/177863002
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@256802 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'components/nacl/browser/nacl_process_host.cc')
-rw-r--r-- | components/nacl/browser/nacl_process_host.cc | 39 |
1 files changed, 26 insertions, 13 deletions
diff --git a/components/nacl/browser/nacl_process_host.cc b/components/nacl/browser/nacl_process_host.cc index b16b6d8..23a76b5 100644 --- a/components/nacl/browser/nacl_process_host.cc +++ b/components/nacl/browser/nacl_process_host.cc @@ -40,6 +40,7 @@ #include "content/public/common/child_process_host.h" #include "content/public/common/content_switches.h" #include "content/public/common/process_type.h" +#include "content/public/common/sandboxed_process_launcher_delegate.h" #include "ipc/ipc_channel.h" #include "ipc/ipc_switches.h" #include "native_client/src/shared/imc/nacl_imc_c.h" @@ -63,7 +64,6 @@ #include "components/nacl/browser/nacl_broker_service_win.h" #include "components/nacl/common/nacl_debug_exception_handler_win.h" #include "content/public/common/sandbox_init.h" -#include "content/public/common/sandboxed_process_launcher_delegate.h" #endif using content::BrowserThread; @@ -144,14 +144,21 @@ bool RunningOnWOW64() { return (base::win::OSInfo::GetInstance()->wow64_status() == base::win::OSInfo::WOW64_ENABLED); } +#endif // NOTE: changes to this class need to be reviewed by the security team. class NaClSandboxedProcessLauncherDelegate : public content::SandboxedProcessLauncherDelegate { public: - NaClSandboxedProcessLauncherDelegate() {} + NaClSandboxedProcessLauncherDelegate(ChildProcessHost* host) +#if defined(OS_POSIX) + : ipc_fd_(host->TakeClientFileDescriptor()) +#endif + {} + virtual ~NaClSandboxedProcessLauncherDelegate() {} +#if defined(OS_WIN) virtual void PostSpawnTarget(base::ProcessHandle process) { // For Native Client sel_ldr processes on 32-bit Windows, reserve 1 GB of // address space to prevent later failure due to address space fragmentation @@ -164,10 +171,21 @@ class NaClSandboxedProcessLauncherDelegate DLOG(WARNING) << "Failed to reserve address space for Native Client"; } } -}; - +#elif defined(OS_POSIX) + virtual bool ShouldUseZygote() OVERRIDE { + return true; + } + virtual int GetIpcFd() OVERRIDE { + return ipc_fd_; + } #endif // OS_WIN + private: +#if defined(OS_POSIX) + int ipc_fd_; +#endif // OS_POSIX +}; + void SetCloseOnExec(NaClHandle fd) { #if defined(OS_POSIX) int flags = fcntl(fd, F_GETFD); @@ -577,17 +595,12 @@ bool NaClProcessHost::LaunchSelLdr() { SendErrorToRenderer("broker service did not launch process"); return false; } - } else { - process_->Launch(new NaClSandboxedProcessLauncherDelegate, - false, - cmd_line.release()); + return true; } -#elif defined(OS_POSIX) - process_->Launch(true, // use_zygote - base::EnvironmentMap(), - cmd_line.release()); #endif - + process_->Launch( + new NaClSandboxedProcessLauncherDelegate(process_->GetHost()), + cmd_line.release()); return true; } |