Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(992)

Issue 2732883003: OOPIF: Prevent process swap when not sharing the StoragePartition. (Closed)

Created:
3 years, 9 months ago by arthursonzogni
Modified:
3 years, 9 months ago
Reviewers:
Charlie Reis, nasko
CC:
chromium-reviews, jam, nasko+codewatch_chromium.org, darin-cc_chromium.org, creis+watch_chromium.org, Charlie Reis, lazyboy, clamy, site-isolation-reviews_chromium.org, alexmos
Target Ref:
refs/pending/heads/master
Project:
chromium
Visibility:
Public.

Description

OOPIF: Prevent process swap when not sharing the StoragePartition. Even if the url should warrant a process swap, check if the newly created SiteInstance would use the same storage partition as its parent. If that's not the case, the subframe should not swap processes, as there is not support for having an OOPIF that does not share the storage partition of its parent. This patch was taken out of @clamy's CL in: https://codereview.chromium.org/2727633005/ BUG=685074, 612711, 615585 CQ_INCLUDE_TRYBOTS=master.tryserver.chromium.linux:linux_site_isolation

Patch Set 1 #

Total comments: 1
Unified diffs Side-by-side diffs Delta from patch set Stats (+15 lines, -0 lines) Patch
M content/browser/frame_host/render_frame_host_manager.cc View 2 chunks +15 lines, -0 lines 1 comment Download

Messages

Total messages: 12 (8 generated)
arthursonzogni
Hi Nasko, Please could you take a look? You already have started reviewing it from ...
3 years, 9 months ago (2017-03-06 14:09:11 UTC) #7
nasko
Adding creis@, to ensure we are all on the same page. I think it is ...
3 years, 9 months ago (2017-03-06 18:12:07 UTC) #9
Charlie Reis
This approach seems like it could force very sensitive URLs to stay in a possibly ...
3 years, 9 months ago (2017-03-06 20:46:40 UTC) #10
nasko
3 years, 9 months ago (2017-03-06 23:06:18 UTC) #11
On 2017/03/06 20:46:40, Charlie Reis (OOO til Mar 6) wrote:
> This approach seems like it could force very sensitive URLs to stay in a
> possibly compromised process, even if the other process model logic would say
a
> swap is required.  I don't think that's the outcome we want.  :)
> 
> The goal seems like it should be to either (1) make it an error to load a
> subframe in a different StoragePartition and ensure that no Chrome code ever
> tries to, or (2) decide that we should support it and make sure that it works
in
> all cases.  I'm assuming we want to do (1) for now, since (2) seems like a
> larger project.
> 
> We were chatting last week about alternatives here, and Alex mentioned a few
> options: we could leave the old page in place and cancel the load (as we do
> today, with some extra magic making the outcome unclear to the parent), or we
> could put an empty data URL or blank page into the parent's process for the
CSP
> blocking case.  These would be just for the time being, while we work out what
> the best way to handle errors is.  Maybe one of those could unblock the PlzNav
> CSP work?
> 
> Nasko, Alex, and I will try to chat about it this afternoon.

We did discuss this and we came up with a solution - keep error pages resulting
from ERR_BLOCKED_BY_CLIENT in the same process as the document that initiated
the navigation. As such, this CL is a NOT LGTM and should be closed.

Powered by Google App Engine
This is Rietveld 408576698