Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(65)

Side by Side Diff: chrome/browser/renderer_host/render_sandbox_host_linux.cc

Issue 5519016: Add a new GetInstance() method for singleton classes used in chrome/browser files. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: . Created 10 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/renderer_host/render_sandbox_host_linux.h" 5 #include "chrome/browser/renderer_host/render_sandbox_host_linux.h"
6 6
7 #include <fcntl.h> 7 #include <fcntl.h>
8 #include <fontconfig/fontconfig.h> 8 #include <fontconfig/fontconfig.h>
9 #include <stdint.h> 9 #include <stdint.h>
10 #include <unistd.h> 10 #include <unistd.h>
(...skipping 625 matching lines...) Expand 10 before | Expand all | Expand 10 after
636 // ----------------------------------------------------------------------------- 636 // -----------------------------------------------------------------------------
637 637
638 // Runs on the main thread at startup. 638 // Runs on the main thread at startup.
639 RenderSandboxHostLinux::RenderSandboxHostLinux() 639 RenderSandboxHostLinux::RenderSandboxHostLinux()
640 : initialized_(false), 640 : initialized_(false),
641 renderer_socket_(0), 641 renderer_socket_(0),
642 childs_lifeline_fd_(0), 642 childs_lifeline_fd_(0),
643 pid_(0) { 643 pid_(0) {
644 } 644 }
645 645
646 // static
647 RenderSandboxHostLinux* RenderSandboxHostLinux::GetInstance() {
648 return Singleton<RenderSandboxHostLinux>::get();
649 }
650
646 void RenderSandboxHostLinux::Init(const std::string& sandbox_path) { 651 void RenderSandboxHostLinux::Init(const std::string& sandbox_path) {
647 DCHECK(!initialized_); 652 DCHECK(!initialized_);
648 initialized_ = true; 653 initialized_ = true;
649 654
650 int fds[2]; 655 int fds[2];
651 // We use SOCK_SEQPACKET rather than SOCK_DGRAM to prevent the renderer from 656 // We use SOCK_SEQPACKET rather than SOCK_DGRAM to prevent the renderer from
652 // sending datagrams to other sockets on the system. The sandbox may prevent 657 // sending datagrams to other sockets on the system. The sandbox may prevent
653 // the renderer from calling socket() to create new sockets, but it'll still 658 // the renderer from calling socket() to create new sockets, but it'll still
654 // inherit some sockets. With PF_UNIX+SOCK_DGRAM, it can call sendmsg to send 659 // inherit some sockets. With PF_UNIX+SOCK_DGRAM, it can call sendmsg to send
655 // a datagram to any (abstract) socket on the same system. With 660 // a datagram to any (abstract) socket on the same system. With
(...skipping 17 matching lines...) Expand all
673 } 678 }
674 679
675 RenderSandboxHostLinux::~RenderSandboxHostLinux() { 680 RenderSandboxHostLinux::~RenderSandboxHostLinux() {
676 if (initialized_) { 681 if (initialized_) {
677 if (HANDLE_EINTR(close(renderer_socket_)) < 0) 682 if (HANDLE_EINTR(close(renderer_socket_)) < 0)
678 PLOG(ERROR) << "close"; 683 PLOG(ERROR) << "close";
679 if (HANDLE_EINTR(close(childs_lifeline_fd_)) < 0) 684 if (HANDLE_EINTR(close(childs_lifeline_fd_)) < 0)
680 PLOG(ERROR) << "close"; 685 PLOG(ERROR) << "close";
681 } 686 }
682 } 687 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698