OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/browser/zygote_host/zygote_host_impl_linux.h" | 5 #include "content/browser/zygote_host/zygote_host_impl_linux.h" |
6 | 6 |
7 #include <sys/socket.h> | 7 #include <sys/socket.h> |
8 #include <sys/stat.h> | 8 #include <sys/stat.h> |
9 #include <sys/types.h> | 9 #include <sys/types.h> |
10 #include <unistd.h> | 10 #include <unistd.h> |
(...skipping 50 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
61 | 61 |
62 // static | 62 // static |
63 ZygoteHostImpl* ZygoteHostImpl::GetInstance() { | 63 ZygoteHostImpl* ZygoteHostImpl::GetInstance() { |
64 return Singleton<ZygoteHostImpl>::get(); | 64 return Singleton<ZygoteHostImpl>::get(); |
65 } | 65 } |
66 | 66 |
67 void ZygoteHostImpl::Init(const std::string& sandbox_cmd) { | 67 void ZygoteHostImpl::Init(const std::string& sandbox_cmd) { |
68 DCHECK(!init_); | 68 DCHECK(!init_); |
69 init_ = true; | 69 init_ = true; |
70 | 70 |
71 FilePath chrome_path; | 71 base::FilePath chrome_path; |
72 CHECK(PathService::Get(base::FILE_EXE, &chrome_path)); | 72 CHECK(PathService::Get(base::FILE_EXE, &chrome_path)); |
73 CommandLine cmd_line(chrome_path); | 73 CommandLine cmd_line(chrome_path); |
74 | 74 |
75 cmd_line.AppendSwitchASCII(switches::kProcessType, switches::kZygoteProcess); | 75 cmd_line.AppendSwitchASCII(switches::kProcessType, switches::kZygoteProcess); |
76 | 76 |
77 int fds[2]; | 77 int fds[2]; |
78 #if defined(OS_FREEBSD) || defined(OS_OPENBSD) | 78 #if defined(OS_FREEBSD) || defined(OS_OPENBSD) |
79 // The BSDs often don't support SOCK_SEQPACKET yet, so fall back to | 79 // The BSDs often don't support SOCK_SEQPACKET yet, so fall back to |
80 // SOCK_DGRAM if necessary. | 80 // SOCK_DGRAM if necessary. |
81 if (socketpair(PF_UNIX, SOCK_SEQPACKET, 0, fds) != 0) | 81 if (socketpair(PF_UNIX, SOCK_SEQPACKET, 0, fds) != 0) |
(...skipping 283 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
365 // don't want to add another library to the build as it's sure to cause | 365 // don't want to add another library to the build as it's sure to cause |
366 // problems with other, non-SELinux distros. | 366 // problems with other, non-SELinux distros. |
367 // | 367 // |
368 // So we just check for files in /selinux. This isn't foolproof, but it's not | 368 // So we just check for files in /selinux. This isn't foolproof, but it's not |
369 // bad and it's easy. | 369 // bad and it's easy. |
370 | 370 |
371 static bool selinux; | 371 static bool selinux; |
372 static bool selinux_valid = false; | 372 static bool selinux_valid = false; |
373 | 373 |
374 if (!selinux_valid) { | 374 if (!selinux_valid) { |
375 const FilePath kSelinuxPath("/selinux"); | 375 const base::FilePath kSelinuxPath("/selinux"); |
376 selinux = access(kSelinuxPath.value().c_str(), X_OK) == 0 && | 376 selinux = access(kSelinuxPath.value().c_str(), X_OK) == 0 && |
377 file_util::CountFilesCreatedAfter(kSelinuxPath, | 377 file_util::CountFilesCreatedAfter(kSelinuxPath, |
378 base::Time::UnixEpoch()) > 0; | 378 base::Time::UnixEpoch()) > 0; |
379 selinux_valid = true; | 379 selinux_valid = true; |
380 } | 380 } |
381 | 381 |
382 if (using_suid_sandbox_ && !selinux) { | 382 if (using_suid_sandbox_ && !selinux) { |
383 #if defined(USE_TCMALLOC) | 383 #if defined(USE_TCMALLOC) |
384 // If heap profiling is running, these processes are not exiting, at least | 384 // If heap profiling is running, these processes are not exiting, at least |
385 // on ChromeOS. The easiest thing to do is not launch them when profiling. | 385 // on ChromeOS. The easiest thing to do is not launch them when profiling. |
(...skipping 119 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
505 return RenderSandboxHostLinux::GetInstance()->pid(); | 505 return RenderSandboxHostLinux::GetInstance()->pid(); |
506 } | 506 } |
507 | 507 |
508 int ZygoteHostImpl::GetSandboxStatus() const { | 508 int ZygoteHostImpl::GetSandboxStatus() const { |
509 if (have_read_sandbox_status_word_) | 509 if (have_read_sandbox_status_word_) |
510 return sandbox_status_; | 510 return sandbox_status_; |
511 return 0; | 511 return 0; |
512 } | 512 } |
513 | 513 |
514 } // namespace content | 514 } // namespace content |
OLD | NEW |