Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(144)

Side by Side Diff: chrome/browser/sandbox_policy.cc

Issue 244014: Revert 27315 - First step towards NaClChrome integration:1. NaCl plugin becom... (Closed) Base URL: svn://chrome-svn/chrome/trunk/src/
Patch Set: Created 11 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « chrome/browser/renderer_host/resource_message_filter.cc ('k') | chrome/chrome.gyp » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2006-2009 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2006-2009 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/sandbox_policy.h" 5 #include "chrome/browser/sandbox_policy.h"
6 6
7 #include "app/win_util.h" 7 #include "app/win_util.h"
8 #include "base/command_line.h" 8 #include "base/command_line.h"
9 #include "base/debug_util.h" 9 #include "base/debug_util.h"
10 #include "base/file_util.h" 10 #include "base/file_util.h"
(...skipping 341 matching lines...) Expand 10 before | Expand all | Expand 10 after
352 base::ProcessHandle process = 0; 352 base::ProcessHandle process = 0;
353 const CommandLine& browser_command_line = *CommandLine::ForCurrentProcess(); 353 const CommandLine& browser_command_line = *CommandLine::ForCurrentProcess();
354 ChildProcessInfo::ProcessType type; 354 ChildProcessInfo::ProcessType type;
355 std::wstring type_str = cmd_line->GetSwitchValue(switches::kProcessType); 355 std::wstring type_str = cmd_line->GetSwitchValue(switches::kProcessType);
356 if (type_str == switches::kRendererProcess) { 356 if (type_str == switches::kRendererProcess) {
357 type = ChildProcessInfo::RENDER_PROCESS; 357 type = ChildProcessInfo::RENDER_PROCESS;
358 } else if (type_str == switches::kPluginProcess) { 358 } else if (type_str == switches::kPluginProcess) {
359 type = ChildProcessInfo::PLUGIN_PROCESS; 359 type = ChildProcessInfo::PLUGIN_PROCESS;
360 } else if (type_str == switches::kWorkerProcess) { 360 } else if (type_str == switches::kWorkerProcess) {
361 type = ChildProcessInfo::WORKER_PROCESS; 361 type = ChildProcessInfo::WORKER_PROCESS;
362 } else if (type_str == switches::kNaClProcess) {
363 type = ChildProcessInfo::NACL_PROCESS;
364 } else if (type_str == switches::kUtilityProcess) { 362 } else if (type_str == switches::kUtilityProcess) {
365 type = ChildProcessInfo::UTILITY_PROCESS; 363 type = ChildProcessInfo::UTILITY_PROCESS;
366 } else { 364 } else {
367 NOTREACHED(); 365 NOTREACHED();
368 return 0; 366 return 0;
369 } 367 }
370 368
371 bool in_sandbox = 369 bool in_sandbox =
372 !browser_command_line.HasSwitch(switches::kNoSandbox) && 370 !browser_command_line.HasSwitch(switches::kNoSandbox) &&
373 (type != ChildProcessInfo::PLUGIN_PROCESS || 371 (type != ChildProcessInfo::PLUGIN_PROCESS ||
374 browser_command_line.HasSwitch(switches::kSafePlugins)); 372 browser_command_line.HasSwitch(switches::kSafePlugins));
375 #if !defined (GOOGLE_CHROME_BUILD) 373 #if !defined (GOOGLE_CHROME_BUILD)
376 if (browser_command_line.HasSwitch(switches::kInProcessPlugins) || 374 if (browser_command_line.HasSwitch(switches::kInProcessPlugins)) {
377 browser_command_line.HasSwitch(switches::kInternalNaCl)) {
378 // In process plugins won't work if the sandbox is enabled. 375 // In process plugins won't work if the sandbox is enabled.
379 // The internal NaCl plugin doesn't work in the sandbox for now.
380 in_sandbox = false; 376 in_sandbox = false;
381 } 377 }
382 #endif 378 #endif
383 379
384 bool child_needs_help = 380 bool child_needs_help =
385 DebugFlags::ProcessDebugFlags(cmd_line, type, in_sandbox); 381 DebugFlags::ProcessDebugFlags(cmd_line, type, in_sandbox);
386 382
387 if (!in_sandbox) { 383 if (!in_sandbox) {
388 base::LaunchApp(*cmd_line, false, false, &process); 384 base::LaunchApp(*cmd_line, false, false, &process);
389 return process; 385 return process;
390 } 386 }
391 387
392 // spawn the child process in the sandbox 388 // spawn the child process in the sandbox
393 sandbox::BrokerServices* broker_service = 389 sandbox::BrokerServices* broker_service =
394 g_browser_process->broker_services(); 390 g_browser_process->broker_services();
395 391
396 sandbox::ResultCode result; 392 sandbox::ResultCode result;
397 PROCESS_INFORMATION target = {0}; 393 PROCESS_INFORMATION target = {0};
398 sandbox::TargetPolicy* policy = broker_service->CreatePolicy(); 394 sandbox::TargetPolicy* policy = broker_service->CreatePolicy();
399 395
400 bool on_sandbox_desktop = false; 396 bool on_sandbox_desktop = false;
401 // TODO(gregoryd): try locked-down policy for sel_ldr after we fix IMC.
402 // TODO(gregoryd): do we need a new desktop for sel_ldr?
403 if (type == ChildProcessInfo::PLUGIN_PROCESS) { 397 if (type == ChildProcessInfo::PLUGIN_PROCESS) {
404 if (!AddPolicyForPlugin(cmd_line, policy)) 398 if (!AddPolicyForPlugin(cmd_line, policy))
405 return 0; 399 return 0;
406 } else { 400 } else {
407 AddPolicyForRenderer(policy, &on_sandbox_desktop); 401 AddPolicyForRenderer(policy, &on_sandbox_desktop);
408 } 402 }
409 403
410 if (!exposed_dir.empty()) { 404 if (!exposed_dir.empty()) {
411 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, 405 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES,
412 sandbox::TargetPolicy::FILES_ALLOW_ANY, 406 sandbox::TargetPolicy::FILES_ALLOW_ANY,
(...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after
449 443
450 // Help the process a little. It can't start the debugger by itself if 444 // Help the process a little. It can't start the debugger by itself if
451 // the process is in a sandbox. 445 // the process is in a sandbox.
452 if (child_needs_help) 446 if (child_needs_help)
453 DebugUtil::SpawnDebuggerOnProcess(target.dwProcessId); 447 DebugUtil::SpawnDebuggerOnProcess(target.dwProcessId);
454 448
455 return process; 449 return process;
456 } 450 }
457 451
458 } // namespace sandbox 452 } // namespace sandbox
OLDNEW
« no previous file with comments | « chrome/browser/renderer_host/resource_message_filter.cc ('k') | chrome/chrome.gyp » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698