| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "content/common/sandbox_init_wrapper.h" | |
| 6 | |
| 7 #include "base/command_line.h" | |
| 8 #include "base/file_path.h" | |
| 9 #include "base/logging.h" | |
| 10 #include "content/common/sandbox_mac.h" | |
| 11 #include "content/public/common/content_switches.h" | |
| 12 | |
| 13 bool SandboxInitWrapper::InitializeSandbox(const CommandLine& command_line, | |
| 14 const std::string& process_type) { | |
| 15 using sandbox::Sandbox; | |
| 16 | |
| 17 if (command_line.HasSwitch(switches::kNoSandbox)) | |
| 18 return true; | |
| 19 | |
| 20 Sandbox::SandboxProcessType sandbox_process_type; | |
| 21 FilePath allowed_dir; // Empty by default. | |
| 22 | |
| 23 if (process_type.empty()) { | |
| 24 // Browser process isn't sandboxed. | |
| 25 return true; | |
| 26 } else if (process_type == switches::kRendererProcess) { | |
| 27 if (!command_line.HasSwitch(switches::kDisable3DAPIs) && | |
| 28 !command_line.HasSwitch(switches::kDisableExperimentalWebGL) && | |
| 29 command_line.HasSwitch(switches::kInProcessWebGL)) { | |
| 30 // TODO(kbr): this check seems to be necessary only on this | |
| 31 // platform because the sandbox is initialized later. Remove | |
| 32 // this once this flag is removed. | |
| 33 return true; | |
| 34 } else { | |
| 35 sandbox_process_type = Sandbox::SANDBOX_TYPE_RENDERER; | |
| 36 } | |
| 37 } else if (process_type == switches::kUtilityProcess) { | |
| 38 // Utility process sandbox. | |
| 39 sandbox_process_type = Sandbox::SANDBOX_TYPE_UTILITY; | |
| 40 allowed_dir = | |
| 41 command_line.GetSwitchValuePath(switches::kUtilityProcessAllowedDir); | |
| 42 } else if (process_type == switches::kWorkerProcess) { | |
| 43 // Worker process sandbox. | |
| 44 sandbox_process_type = Sandbox::SANDBOX_TYPE_WORKER; | |
| 45 } else if (process_type == switches::kNaClLoaderProcess) { | |
| 46 // Native Client sel_ldr (user untrusted code) sandbox. | |
| 47 sandbox_process_type = Sandbox::SANDBOX_TYPE_NACL_LOADER; | |
| 48 } else if (process_type == switches::kGpuProcess) { | |
| 49 sandbox_process_type = Sandbox::SANDBOX_TYPE_GPU; | |
| 50 } else if ((process_type == switches::kPluginProcess) || | |
| 51 (process_type == switches::kServiceProcess)) { | |
| 52 return true; | |
| 53 } else if (process_type == switches::kPpapiPluginProcess) { | |
| 54 sandbox_process_type = Sandbox::SANDBOX_TYPE_PPAPI; | |
| 55 } else { | |
| 56 // Failsafe: If you hit an unreached here, is your new process type in need | |
| 57 // of sandboxing? | |
| 58 NOTREACHED() << "Unknown process type " << process_type; | |
| 59 return true; | |
| 60 } | |
| 61 | |
| 62 // Warm up APIs before turning on the sandbox. | |
| 63 Sandbox::SandboxWarmup(sandbox_process_type); | |
| 64 | |
| 65 // Actually sandbox the process. | |
| 66 return Sandbox::EnableSandbox(sandbox_process_type, allowed_dir); | |
| 67 } | |
| OLD | NEW |