OLD | NEW |
1 // Copyright (c) 2006-2009 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2006-2009 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/sandbox_policy.h" | 5 #include "chrome/browser/sandbox_policy.h" |
6 | 6 |
7 #include "app/win_util.h" | 7 #include "app/win_util.h" |
8 #include "base/command_line.h" | 8 #include "base/command_line.h" |
9 #include "base/debug_util.h" | 9 #include "base/debug_util.h" |
10 #include "base/file_util.h" | 10 #include "base/file_util.h" |
(...skipping 341 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
352 base::ProcessHandle process = 0; | 352 base::ProcessHandle process = 0; |
353 const CommandLine& browser_command_line = *CommandLine::ForCurrentProcess(); | 353 const CommandLine& browser_command_line = *CommandLine::ForCurrentProcess(); |
354 ChildProcessInfo::ProcessType type; | 354 ChildProcessInfo::ProcessType type; |
355 std::wstring type_str = cmd_line->GetSwitchValue(switches::kProcessType); | 355 std::wstring type_str = cmd_line->GetSwitchValue(switches::kProcessType); |
356 if (type_str == switches::kRendererProcess) { | 356 if (type_str == switches::kRendererProcess) { |
357 type = ChildProcessInfo::RENDER_PROCESS; | 357 type = ChildProcessInfo::RENDER_PROCESS; |
358 } else if (type_str == switches::kPluginProcess) { | 358 } else if (type_str == switches::kPluginProcess) { |
359 type = ChildProcessInfo::PLUGIN_PROCESS; | 359 type = ChildProcessInfo::PLUGIN_PROCESS; |
360 } else if (type_str == switches::kWorkerProcess) { | 360 } else if (type_str == switches::kWorkerProcess) { |
361 type = ChildProcessInfo::WORKER_PROCESS; | 361 type = ChildProcessInfo::WORKER_PROCESS; |
362 } else if (type_str == switches::kNaClProcess) { | |
363 type = ChildProcessInfo::NACL_PROCESS; | |
364 } else if (type_str == switches::kUtilityProcess) { | 362 } else if (type_str == switches::kUtilityProcess) { |
365 type = ChildProcessInfo::UTILITY_PROCESS; | 363 type = ChildProcessInfo::UTILITY_PROCESS; |
366 } else { | 364 } else { |
367 NOTREACHED(); | 365 NOTREACHED(); |
368 return 0; | 366 return 0; |
369 } | 367 } |
370 | 368 |
371 bool in_sandbox = | 369 bool in_sandbox = |
372 !browser_command_line.HasSwitch(switches::kNoSandbox) && | 370 !browser_command_line.HasSwitch(switches::kNoSandbox) && |
373 (type != ChildProcessInfo::PLUGIN_PROCESS || | 371 (type != ChildProcessInfo::PLUGIN_PROCESS || |
374 browser_command_line.HasSwitch(switches::kSafePlugins)); | 372 browser_command_line.HasSwitch(switches::kSafePlugins)); |
375 #if !defined (GOOGLE_CHROME_BUILD) | 373 #if !defined (GOOGLE_CHROME_BUILD) |
376 if (browser_command_line.HasSwitch(switches::kInProcessPlugins) || | 374 if (browser_command_line.HasSwitch(switches::kInProcessPlugins)) { |
377 browser_command_line.HasSwitch(switches::kInternalNaCl)) { | |
378 // In process plugins won't work if the sandbox is enabled. | 375 // In process plugins won't work if the sandbox is enabled. |
379 // The internal NaCl plugin doesn't work in the sandbox for now. | |
380 in_sandbox = false; | 376 in_sandbox = false; |
381 } | 377 } |
382 #endif | 378 #endif |
383 | 379 |
384 bool child_needs_help = | 380 bool child_needs_help = |
385 DebugFlags::ProcessDebugFlags(cmd_line, type, in_sandbox); | 381 DebugFlags::ProcessDebugFlags(cmd_line, type, in_sandbox); |
386 | 382 |
387 if (!in_sandbox) { | 383 if (!in_sandbox) { |
388 base::LaunchApp(*cmd_line, false, false, &process); | 384 base::LaunchApp(*cmd_line, false, false, &process); |
389 return process; | 385 return process; |
390 } | 386 } |
391 | 387 |
392 // spawn the child process in the sandbox | 388 // spawn the child process in the sandbox |
393 sandbox::BrokerServices* broker_service = | 389 sandbox::BrokerServices* broker_service = |
394 g_browser_process->broker_services(); | 390 g_browser_process->broker_services(); |
395 | 391 |
396 sandbox::ResultCode result; | 392 sandbox::ResultCode result; |
397 PROCESS_INFORMATION target = {0}; | 393 PROCESS_INFORMATION target = {0}; |
398 sandbox::TargetPolicy* policy = broker_service->CreatePolicy(); | 394 sandbox::TargetPolicy* policy = broker_service->CreatePolicy(); |
399 | 395 |
400 bool on_sandbox_desktop = false; | 396 bool on_sandbox_desktop = false; |
401 // TODO(gregoryd): try locked-down policy for sel_ldr after we fix IMC. | |
402 // TODO(gregoryd): do we need a new desktop for sel_ldr? | |
403 if (type == ChildProcessInfo::PLUGIN_PROCESS) { | 397 if (type == ChildProcessInfo::PLUGIN_PROCESS) { |
404 if (!AddPolicyForPlugin(cmd_line, policy)) | 398 if (!AddPolicyForPlugin(cmd_line, policy)) |
405 return 0; | 399 return 0; |
406 } else { | 400 } else { |
407 AddPolicyForRenderer(policy, &on_sandbox_desktop); | 401 AddPolicyForRenderer(policy, &on_sandbox_desktop); |
408 } | 402 } |
409 | 403 |
410 if (!exposed_dir.empty()) { | 404 if (!exposed_dir.empty()) { |
411 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, | 405 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, |
412 sandbox::TargetPolicy::FILES_ALLOW_ANY, | 406 sandbox::TargetPolicy::FILES_ALLOW_ANY, |
(...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
449 | 443 |
450 // Help the process a little. It can't start the debugger by itself if | 444 // Help the process a little. It can't start the debugger by itself if |
451 // the process is in a sandbox. | 445 // the process is in a sandbox. |
452 if (child_needs_help) | 446 if (child_needs_help) |
453 DebugUtil::SpawnDebuggerOnProcess(target.dwProcessId); | 447 DebugUtil::SpawnDebuggerOnProcess(target.dwProcessId); |
454 | 448 |
455 return process; | 449 return process; |
456 } | 450 } |
457 | 451 |
458 } // namespace sandbox | 452 } // namespace sandbox |
OLD | NEW |