Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(11)

Side by Side Diff: content/common/sandbox_win.cc

Issue 1113013003: Allow sanitizer coverage to create *.sancov files when sandboxed (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 5 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "content/common/sandbox_win.h" 5 #include "content/common/sandbox_win.h"
6 6
7 #include <string> 7 #include <string>
8 8
9 #include "base/base_switches.h" 9 #include "base/base_switches.h"
10 #include "base/command_line.h" 10 #include "base/command_line.h"
11 #include "base/debug/profiler.h" 11 #include "base/debug/profiler.h"
12 #include "base/environment.h"
12 #include "base/files/file_util.h" 13 #include "base/files/file_util.h"
13 #include "base/hash.h" 14 #include "base/hash.h"
14 #include "base/metrics/sparse_histogram.h" 15 #include "base/metrics/sparse_histogram.h"
15 #include "base/path_service.h" 16 #include "base/path_service.h"
16 #include "base/process/launch.h" 17 #include "base/process/launch.h"
17 #include "base/strings/string_util.h" 18 #include "base/strings/string_util.h"
18 #include "base/strings/stringprintf.h" 19 #include "base/strings/stringprintf.h"
20 #include "base/strings/utf_string_conversions.h"
19 #include "base/trace_event/trace_event.h" 21 #include "base/trace_event/trace_event.h"
20 #include "base/win/iat_patch_function.h" 22 #include "base/win/iat_patch_function.h"
21 #include "base/win/scoped_handle.h" 23 #include "base/win/scoped_handle.h"
22 #include "base/win/scoped_process_information.h" 24 #include "base/win/scoped_process_information.h"
23 #include "base/win/windows_version.h" 25 #include "base/win/windows_version.h"
24 #include "content/common/content_switches_internal.h" 26 #include "content/common/content_switches_internal.h"
25 #include "content/public/common/content_client.h" 27 #include "content/public/common/content_client.h"
26 #include "content/public/common/content_switches.h" 28 #include "content/public/common/content_switches.h"
27 #include "content/public/common/sandbox_init.h" 29 #include "content/public/common/sandbox_init.h"
28 #include "content/public/common/sandboxed_process_launcher_delegate.h" 30 #include "content/public/common/sandboxed_process_launcher_delegate.h"
(...skipping 320 matching lines...) Expand 10 before | Expand all | Expand 10 after
349 if (!PathService::Get(base::FILE_EXE, &exe)) 351 if (!PathService::Get(base::FILE_EXE, &exe))
350 return false; 352 return false;
351 base::FilePath pdb_path = exe.DirName().Append(L"*.pdb"); 353 base::FilePath pdb_path = exe.DirName().Append(L"*.pdb");
352 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES, 354 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES,
353 sandbox::TargetPolicy::FILES_ALLOW_READONLY, 355 sandbox::TargetPolicy::FILES_ALLOW_READONLY,
354 pdb_path.value().c_str()); 356 pdb_path.value().c_str());
355 if (result != sandbox::SBOX_ALL_OK) 357 if (result != sandbox::SBOX_ALL_OK)
356 return false; 358 return false;
357 #endif 359 #endif
358 360
361 #if defined(SANITIZER_COVERAGE)
362 scoped_ptr<base::Environment> env(base::Environment::Create());
363 std::string coverage_dir;
364 if (!env->GetVar("SANITIZER_COVERAGE_DIR", &coverage_dir)) {
365 LOG(WARNING) << "SANITIZER_COVERAGE_DIR was not set, coverage won't work.";
366 } else {
367 base::FilePath sancov_path =
368 base::FilePath(base::UTF16ToWide(base::ASCIIToUTF16(coverage_dir)))
369 .Append(L"*.sancov");
cpu_(ooo_6.6-7.5) 2015/05/01 17:18:58 use the native environment function so you don't h
370 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_FILES,
371 sandbox::TargetPolicy::FILES_ALLOW_ANY,
372 sancov_path.value().c_str());
373 if (result != sandbox::SBOX_ALL_OK)
374 return false;
375 }
376 #endif
377
359 AddGenericDllEvictionPolicy(policy); 378 AddGenericDllEvictionPolicy(policy);
360 return true; 379 return true;
361 } 380 }
362 381
363 bool AddPolicyForSandboxedProcess(sandbox::TargetPolicy* policy) { 382 bool AddPolicyForSandboxedProcess(sandbox::TargetPolicy* policy) {
364 sandbox::ResultCode result; 383 sandbox::ResultCode result;
365 // Renderers need to share events with plugins. 384 // Renderers need to share events with plugins.
366 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_HANDLES, 385 result = policy->AddRule(sandbox::TargetPolicy::SUBSYS_HANDLES,
367 sandbox::TargetPolicy::HANDLES_DUP_ANY, 386 sandbox::TargetPolicy::HANDLES_DUP_ANY,
368 L"Event"); 387 L"Event");
(...skipping 424 matching lines...) Expand 10 before | Expand all | Expand 10 after
793 } 812 }
794 813
795 return false; 814 return false;
796 } 815 }
797 816
798 bool BrokerAddTargetPeer(HANDLE peer_process) { 817 bool BrokerAddTargetPeer(HANDLE peer_process) {
799 return g_broker_services->AddTargetPeer(peer_process) == sandbox::SBOX_ALL_OK; 818 return g_broker_services->AddTargetPeer(peer_process) == sandbox::SBOX_ALL_OK;
800 } 819 }
801 820
802 } // namespace content 821 } // namespace content
OLDNEW
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698