OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/browser/zygote_host_linux.h" | 5 #include "content/browser/zygote_host_linux.h" |
6 | 6 |
7 #include <dlfcn.h> | 7 #include <dlfcn.h> |
8 #include <fcntl.h> | 8 #include <fcntl.h> |
9 #include <pthread.h> | 9 #include <pthread.h> |
10 #include <sys/socket.h> | 10 #include <sys/socket.h> |
(...skipping 13 matching lines...) Expand all Loading... |
24 #include "base/memory/scoped_ptr.h" | 24 #include "base/memory/scoped_ptr.h" |
25 #include "base/pickle.h" | 25 #include "base/pickle.h" |
26 #include "base/process_util.h" | 26 #include "base/process_util.h" |
27 #include "base/rand_util.h" | 27 #include "base/rand_util.h" |
28 #include "base/sys_info.h" | 28 #include "base/sys_info.h" |
29 #include "build/build_config.h" | 29 #include "build/build_config.h" |
30 #include "crypto/nss_util.h" | 30 #include "crypto/nss_util.h" |
31 #include "content/common/chrome_descriptors.h" | 31 #include "content/common/chrome_descriptors.h" |
32 #include "content/common/font_config_ipc_linux.h" | 32 #include "content/common/font_config_ipc_linux.h" |
33 #include "content/common/pepper_plugin_registry.h" | 33 #include "content/common/pepper_plugin_registry.h" |
34 #include "content/common/process_watcher.h" | |
35 #include "content/common/sandbox_methods_linux.h" | 34 #include "content/common/sandbox_methods_linux.h" |
36 #include "content/common/seccomp_sandbox.h" | 35 #include "content/common/seccomp_sandbox.h" |
37 #include "content/common/set_process_title.h" | 36 #include "content/common/set_process_title.h" |
38 #include "content/common/unix_domain_socket_posix.h" | 37 #include "content/common/unix_domain_socket_posix.h" |
39 #include "content/public/common/content_switches.h" | 38 #include "content/public/common/content_switches.h" |
40 #include "content/public/common/main_function_params.h" | 39 #include "content/public/common/main_function_params.h" |
41 #include "content/public/common/result_codes.h" | 40 #include "content/public/common/result_codes.h" |
42 #include "content/public/common/zygote_fork_delegate_linux.h" | 41 #include "content/public/common/zygote_fork_delegate_linux.h" |
43 #include "skia/ext/SkFontHost_fontconfig_control.h" | 42 #include "skia/ext/SkFontHost_fontconfig_control.h" |
44 #include "unicode/timezone.h" | 43 #include "unicode/timezone.h" |
(...skipping 168 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
213 | 212 |
214 if (g_suid_sandbox_active) { | 213 if (g_suid_sandbox_active) { |
215 actual_child = real_pids_to_sandbox_pids[child]; | 214 actual_child = real_pids_to_sandbox_pids[child]; |
216 if (!actual_child) | 215 if (!actual_child) |
217 return; | 216 return; |
218 real_pids_to_sandbox_pids.erase(child); | 217 real_pids_to_sandbox_pids.erase(child); |
219 } else { | 218 } else { |
220 actual_child = child; | 219 actual_child = child; |
221 } | 220 } |
222 | 221 |
223 ProcessWatcher::EnsureProcessTerminated(actual_child); | 222 base::EnsureProcessTerminated(actual_child); |
224 } | 223 } |
225 | 224 |
226 void HandleGetTerminationStatus(int fd, const Pickle& pickle, void* iter) { | 225 void HandleGetTerminationStatus(int fd, const Pickle& pickle, void* iter) { |
227 base::ProcessHandle child; | 226 base::ProcessHandle child; |
228 | 227 |
229 if (!pickle.ReadInt(&iter, &child)) { | 228 if (!pickle.ReadInt(&iter, &child)) { |
230 LOG(WARNING) << "Error parsing GetTerminationStatus request " | 229 LOG(WARNING) << "Error parsing GetTerminationStatus request " |
231 << "from browser"; | 230 << "from browser"; |
232 return; | 231 return; |
233 } | 232 } |
(...skipping 633 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
867 VLOG(1) << "Enabling experimental Seccomp sandbox."; | 866 VLOG(1) << "Enabling experimental Seccomp sandbox."; |
868 sandbox_flags |= ZygoteHost::kSandboxSeccomp; | 867 sandbox_flags |= ZygoteHost::kSandboxSeccomp; |
869 } | 868 } |
870 } | 869 } |
871 #endif // SECCOMP_SANDBOX | 870 #endif // SECCOMP_SANDBOX |
872 | 871 |
873 Zygote zygote(sandbox_flags, forkdelegate); | 872 Zygote zygote(sandbox_flags, forkdelegate); |
874 // This function call can return multiple times, once per fork(). | 873 // This function call can return multiple times, once per fork(). |
875 return zygote.ProcessRequests(); | 874 return zygote.ProcessRequests(); |
876 } | 875 } |
OLD | NEW |