OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "sandbox/linux/syscall_broker/broker_client.h" | 5 #include "sandbox/linux/syscall_broker/broker_client.h" |
6 | 6 |
7 #include <errno.h> | 7 #include <errno.h> |
8 #include <fcntl.h> | 8 #include <fcntl.h> |
9 #include <sys/stat.h> | 9 #include <sys/stat.h> |
10 #include <sys/socket.h> | 10 #include <sys/socket.h> |
(...skipping 47 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
58 pathname, flags, NULL /* file_to_open */, | 58 pathname, flags, NULL /* file_to_open */, |
59 NULL /* unlink_after_open */)) { | 59 NULL /* unlink_after_open */)) { |
60 return -broker_policy_.denied_errno(); | 60 return -broker_policy_.denied_errno(); |
61 } | 61 } |
62 if (syscall_type == COMMAND_ACCESS && | 62 if (syscall_type == COMMAND_ACCESS && |
63 !broker_policy_.GetFileNameIfAllowedToAccess(pathname, flags, NULL)) { | 63 !broker_policy_.GetFileNameIfAllowedToAccess(pathname, flags, NULL)) { |
64 return -broker_policy_.denied_errno(); | 64 return -broker_policy_.denied_errno(); |
65 } | 65 } |
66 } | 66 } |
67 | 67 |
68 Pickle write_pickle; | 68 base::Pickle write_pickle; |
69 write_pickle.WriteInt(syscall_type); | 69 write_pickle.WriteInt(syscall_type); |
70 write_pickle.WriteString(pathname); | 70 write_pickle.WriteString(pathname); |
71 write_pickle.WriteInt(flags); | 71 write_pickle.WriteInt(flags); |
72 RAW_CHECK(write_pickle.size() <= kMaxMessageLength); | 72 RAW_CHECK(write_pickle.size() <= kMaxMessageLength); |
73 | 73 |
74 int returned_fd = -1; | 74 int returned_fd = -1; |
75 uint8_t reply_buf[kMaxMessageLength]; | 75 uint8_t reply_buf[kMaxMessageLength]; |
76 | 76 |
77 // Send a request (in write_pickle) as well that will include a new | 77 // Send a request (in write_pickle) as well that will include a new |
78 // temporary socketpair (created internally by SendRecvMsg()). | 78 // temporary socketpair (created internally by SendRecvMsg()). |
79 // Then read the reply on this new socketpair in reply_buf and put an | 79 // Then read the reply on this new socketpair in reply_buf and put an |
80 // eventual attached file descriptor in |returned_fd|. | 80 // eventual attached file descriptor in |returned_fd|. |
81 ssize_t msg_len = UnixDomainSocket::SendRecvMsgWithFlags( | 81 ssize_t msg_len = UnixDomainSocket::SendRecvMsgWithFlags( |
82 ipc_channel_.get(), reply_buf, sizeof(reply_buf), recvmsg_flags, | 82 ipc_channel_.get(), reply_buf, sizeof(reply_buf), recvmsg_flags, |
83 &returned_fd, write_pickle); | 83 &returned_fd, write_pickle); |
84 if (msg_len <= 0) { | 84 if (msg_len <= 0) { |
85 if (!quiet_failures_for_tests_) | 85 if (!quiet_failures_for_tests_) |
86 RAW_LOG(ERROR, "Could not make request to broker process"); | 86 RAW_LOG(ERROR, "Could not make request to broker process"); |
87 return -ENOMEM; | 87 return -ENOMEM; |
88 } | 88 } |
89 | 89 |
90 Pickle read_pickle(reinterpret_cast<char*>(reply_buf), msg_len); | 90 base::Pickle read_pickle(reinterpret_cast<char*>(reply_buf), msg_len); |
91 PickleIterator iter(read_pickle); | 91 base::PickleIterator iter(read_pickle); |
92 int return_value = -1; | 92 int return_value = -1; |
93 // Now deserialize the return value and eventually return the file | 93 // Now deserialize the return value and eventually return the file |
94 // descriptor. | 94 // descriptor. |
95 if (iter.ReadInt(&return_value)) { | 95 if (iter.ReadInt(&return_value)) { |
96 switch (syscall_type) { | 96 switch (syscall_type) { |
97 case COMMAND_ACCESS: | 97 case COMMAND_ACCESS: |
98 // We should never have a fd to return. | 98 // We should never have a fd to return. |
99 RAW_CHECK(returned_fd == -1); | 99 RAW_CHECK(returned_fd == -1); |
100 return return_value; | 100 return return_value; |
101 case COMMAND_OPEN: | 101 case COMMAND_OPEN: |
(...skipping 33 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
135 return PathAndFlagsSyscall(COMMAND_ACCESS, pathname, mode); | 135 return PathAndFlagsSyscall(COMMAND_ACCESS, pathname, mode); |
136 } | 136 } |
137 | 137 |
138 int BrokerClient::Open(const char* pathname, int flags) const { | 138 int BrokerClient::Open(const char* pathname, int flags) const { |
139 return PathAndFlagsSyscall(COMMAND_OPEN, pathname, flags); | 139 return PathAndFlagsSyscall(COMMAND_OPEN, pathname, flags); |
140 } | 140 } |
141 | 141 |
142 } // namespace syscall_broker | 142 } // namespace syscall_broker |
143 | 143 |
144 } // namespace sandbox | 144 } // namespace sandbox |
OLD | NEW |