From 464c1e2dc81262c924391affc940a2e122132091 Mon Sep 17 00:00:00 2001 From: "wez@chromium.org" Date: Wed, 6 Apr 2011 11:07:13 +0000 Subject: Limit access to named IPC channels with SO_PEERCRED, not file permissions. BUG= TEST=Run Chrome & configure a service, to get the service process to start. Close Chrome and run a copy as a different user, but from the same user-data-dir. New Chrome should not be able to communicate with the service process. Review URL: http://codereview.chromium.org/6631002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@80602 0039d316-1c4b-4281-b951-d872f2087c98 --- ipc/ipc_channel_proxy.h | 1 + 1 file changed, 1 insertion(+) (limited to 'ipc/ipc_channel_proxy.h') diff --git a/ipc/ipc_channel_proxy.h b/ipc/ipc_channel_proxy.h index 950edff..0c0176f 100644 --- a/ipc/ipc_channel_proxy.h +++ b/ipc/ipc_channel_proxy.h @@ -146,6 +146,7 @@ class ChannelProxy : public Message::Sender { #if defined(OS_POSIX) // Calls through to the underlying channel's methods. int GetClientFileDescriptor() const; + bool GetClientEuid(uid_t* client_euid) const; #endif // defined(OS_POSIX) protected: -- cgit v1.1