Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(221)

Side by Side Diff: chrome/browser/sandbox_policy.cc

Issue 212020: NaCl integration (Closed) Base URL: svn://chrome-svn/chrome/trunk/src/
Patch Set: '' Created 11 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « chrome/browser/renderer_host/resource_message_filter.cc ('k') | chrome/chrome.gyp » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2006-2009 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2006-2009 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/sandbox_policy.h" 5 #include "chrome/browser/sandbox_policy.h"
6 6
7 #include "app/win_util.h" 7 #include "app/win_util.h"
8 #include "base/command_line.h" 8 #include "base/command_line.h"
9 #include "base/debug_util.h" 9 #include "base/debug_util.h"
10 #include "base/file_util.h" 10 #include "base/file_util.h"
(...skipping 341 matching lines...) Expand 10 before | Expand all | Expand 10 after
352 base::ProcessHandle process = 0; 352 base::ProcessHandle process = 0;
353 const CommandLine& browser_command_line = *CommandLine::ForCurrentProcess(); 353 const CommandLine& browser_command_line = *CommandLine::ForCurrentProcess();
354 ChildProcessInfo::ProcessType type; 354 ChildProcessInfo::ProcessType type;
355 std::wstring type_str = cmd_line->GetSwitchValue(switches::kProcessType); 355 std::wstring type_str = cmd_line->GetSwitchValue(switches::kProcessType);
356 if (type_str == switches::kRendererProcess) { 356 if (type_str == switches::kRendererProcess) {
357 type = ChildProcessInfo::RENDER_PROCESS; 357 type = ChildProcessInfo::RENDER_PROCESS;
358 } else if (type_str == switches::kPluginProcess) { 358 } else if (type_str == switches::kPluginProcess) {
359 type = ChildProcessInfo::PLUGIN_PROCESS; 359 type = ChildProcessInfo::PLUGIN_PROCESS;
360 } else if (type_str == switches::kWorkerProcess) { 360 } else if (type_str == switches::kWorkerProcess) {
361 type = ChildProcessInfo::WORKER_PROCESS; 361 type = ChildProcessInfo::WORKER_PROCESS;
362 } else if (type_str == switches::kNaClProcess) {
363 type = ChildProcessInfo::NACL_PROCESS;
362 } else if (type_str == switches::kUtilityProcess) { 364 } else if (type_str == switches::kUtilityProcess) {
363 type = ChildProcessInfo::UTILITY_PROCESS; 365 type = ChildProcessInfo::UTILITY_PROCESS;
364 } else { 366 } else {
365 NOTREACHED(); 367 NOTREACHED();
366 return 0; 368 return 0;
367 } 369 }
368 370
369 bool in_sandbox = 371 bool in_sandbox =
370 !browser_command_line.HasSwitch(switches::kNoSandbox) && 372 !browser_command_line.HasSwitch(switches::kNoSandbox) &&
371 (type != ChildProcessInfo::PLUGIN_PROCESS || 373 (type != ChildProcessInfo::PLUGIN_PROCESS ||
372 browser_command_line.HasSwitch(switches::kSafePlugins)); 374 browser_command_line.HasSwitch(switches::kSafePlugins));
373 #if !defined (GOOGLE_CHROME_BUILD) 375 #if !defined (GOOGLE_CHROME_BUILD)
374 if (browser_command_line.HasSwitch(switches::kInProcessPlugins)) { 376 if (browser_command_line.HasSwitch(switches::kInProcessPlugins) ||
377 browser_command_line.HasSwitch(switches::kInternalNaCl)) {
375 // In process plugins won't work if the sandbox is enabled. 378 // In process plugins won't work if the sandbox is enabled.
379 // The internal NaCl plugin doesn't work in the sandbox for now.
376 in_sandbox = false; 380 in_sandbox = false;
377 } 381 }
378 #endif 382 #endif
379 383
380 bool child_needs_help = 384 bool child_needs_help =
381 DebugFlags::ProcessDebugFlags(cmd_line, type, in_sandbox); 385 DebugFlags::ProcessDebugFlags(cmd_line, type, in_sandbox);
382 386
383 if (!in_sandbox) { 387 if (!in_sandbox) {
384 base::LaunchApp(*cmd_line, false, false, &process); 388 base::LaunchApp(*cmd_line, false, false, &process);
385 return process; 389 return process;
386 } 390 }
387 391
388 // spawn the child process in the sandbox 392 // spawn the child process in the sandbox
389 sandbox::BrokerServices* broker_service = 393 sandbox::BrokerServices* broker_service =
390 g_browser_process->broker_services(); 394 g_browser_process->broker_services();
391 395
392 sandbox::ResultCode result; 396 sandbox::ResultCode result;
393 PROCESS_INFORMATION target = {0}; 397 PROCESS_INFORMATION target = {0};
394 sandbox::TargetPolicy* policy = broker_service->CreatePolicy(); 398 sandbox::TargetPolicy* policy = broker_service->CreatePolicy();
395 399
396 bool on_sandbox_desktop = false; 400 bool on_sandbox_desktop = false;
401 // TODO(gregoryd): try locked-down policy for sel_ldr after we fix IMC.
402 // TODO(gregoryd): do we need a new desktop for sel_ldr?
397 if (type == ChildProcessInfo::PLUGIN_PROCESS) { 403 if (type == ChildProcessInfo::PLUGIN_PROCESS) {
398 if (!AddPolicyForPlugin(cmd_line, policy)) 404 if (!AddPolicyForPlugin(cmd_line, policy))
399 return 0; 405 return 0;
400 } else { 406 } else {
401 AddPolicyForRenderer(policy, &on_sandbox_desktop); 407 AddPolicyForRenderer(policy, &on_sandbox_desktop);
402 } 408 }
403 409
404 if (!exposed_dir.empty()) { 410 if (!exposed_dir.empty()) {
405 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, 411 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES,
406 sandbox::TargetPolicy::FILES_ALLOW_ANY, 412 sandbox::TargetPolicy::FILES_ALLOW_ANY,
(...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after
443 449
444 // Help the process a little. It can't start the debugger by itself if 450 // Help the process a little. It can't start the debugger by itself if
445 // the process is in a sandbox. 451 // the process is in a sandbox.
446 if (child_needs_help) 452 if (child_needs_help)
447 DebugUtil::SpawnDebuggerOnProcess(target.dwProcessId); 453 DebugUtil::SpawnDebuggerOnProcess(target.dwProcessId);
448 454
449 return process; 455 return process;
450 } 456 }
451 457
452 } // namespace sandbox 458 } // namespace sandbox
OLDNEW
« no previous file with comments | « chrome/browser/renderer_host/resource_message_filter.cc ('k') | chrome/chrome.gyp » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698