OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/browser/zygote_host/zygote_host_impl_linux.h" | 5 #include "content/browser/zygote_host/zygote_host_impl_linux.h" |
6 | 6 |
7 #include <sys/socket.h> | 7 #include <sys/socket.h> |
8 | 8 |
9 #include "base/allocator/allocator_extension.h" | 9 #include "base/allocator/allocator_extension.h" |
10 #include "base/files/file_enumerator.h" | 10 #include "base/files/file_enumerator.h" |
(...skipping 121 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
132 int ZygoteHostImpl::GetRendererSandboxStatus() const { | 132 int ZygoteHostImpl::GetRendererSandboxStatus() const { |
133 return renderer_sandbox_status_; | 133 return renderer_sandbox_status_; |
134 } | 134 } |
135 | 135 |
136 pid_t ZygoteHostImpl::LaunchZygote(base::CommandLine* cmd_line, | 136 pid_t ZygoteHostImpl::LaunchZygote(base::CommandLine* cmd_line, |
137 base::ScopedFD* control_fd) { | 137 base::ScopedFD* control_fd) { |
138 int fds[2]; | 138 int fds[2]; |
139 CHECK_EQ(0, socketpair(AF_UNIX, SOCK_SEQPACKET, 0, fds)); | 139 CHECK_EQ(0, socketpair(AF_UNIX, SOCK_SEQPACKET, 0, fds)); |
140 CHECK(base::UnixDomainSocket::EnableReceiveProcessId(fds[0])); | 140 CHECK(base::UnixDomainSocket::EnableReceiveProcessId(fds[0])); |
141 | 141 |
142 base::FileHandleMappingVector fds_to_map; | 142 base::LaunchOptions options; |
143 fds_to_map.push_back(std::make_pair(fds[1], kZygoteSocketPairFd)); | 143 options.fds_to_remap.push_back(std::make_pair(fds[1], kZygoteSocketPairFd)); |
144 | 144 |
145 // Start up the sandbox host process and get the file descriptor for the | 145 // Start up the sandbox host process and get the file descriptor for the |
146 // renderers to talk to it. | 146 // renderers to talk to it. |
147 const int sfd = RenderSandboxHostLinux::GetInstance()->GetRendererSocket(); | 147 const int sfd = RenderSandboxHostLinux::GetInstance()->GetRendererSocket(); |
148 fds_to_map.push_back(std::make_pair(sfd, GetSandboxFD())); | 148 options.fds_to_remap.push_back(std::make_pair(sfd, GetSandboxFD())); |
149 | 149 |
150 base::LaunchOptions options; | |
151 base::ScopedFD dummy_fd; | 150 base::ScopedFD dummy_fd; |
152 if (use_suid_sandbox_) { | 151 if (use_suid_sandbox_) { |
153 std::unique_ptr<sandbox::SetuidSandboxHost> sandbox_host( | 152 std::unique_ptr<sandbox::SetuidSandboxHost> sandbox_host( |
154 sandbox::SetuidSandboxHost::Create()); | 153 sandbox::SetuidSandboxHost::Create()); |
155 sandbox_host->PrependWrapper(cmd_line); | 154 sandbox_host->PrependWrapper(cmd_line); |
156 sandbox_host->SetupLaunchOptions(&options, &fds_to_map, &dummy_fd); | 155 sandbox_host->SetupLaunchOptions(&options, &dummy_fd); |
157 sandbox_host->SetupLaunchEnvironment(); | 156 sandbox_host->SetupLaunchEnvironment(); |
158 } | 157 } |
159 | 158 |
160 options.fds_to_remap = &fds_to_map; | |
161 base::Process process = | 159 base::Process process = |
162 use_namespace_sandbox_ | 160 use_namespace_sandbox_ |
163 ? sandbox::NamespaceSandbox::LaunchProcess(*cmd_line, options) | 161 ? sandbox::NamespaceSandbox::LaunchProcess(*cmd_line, options) |
164 : base::LaunchProcess(*cmd_line, options); | 162 : base::LaunchProcess(*cmd_line, options); |
165 CHECK(process.IsValid()) << "Failed to launch zygote process"; | 163 CHECK(process.IsValid()) << "Failed to launch zygote process"; |
166 | 164 |
167 dummy_fd.reset(); | 165 dummy_fd.reset(); |
168 close(fds[1]); | 166 close(fds[1]); |
169 control_fd->reset(fds[0]); | 167 control_fd->reset(fds[0]); |
170 | 168 |
(...skipping 104 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
275 options.allow_new_privs = true; | 273 options.allow_new_privs = true; |
276 | 274 |
277 base::Process sandbox_helper_process = | 275 base::Process sandbox_helper_process = |
278 base::LaunchProcess(adj_oom_score_cmdline, options); | 276 base::LaunchProcess(adj_oom_score_cmdline, options); |
279 if (sandbox_helper_process.IsValid()) | 277 if (sandbox_helper_process.IsValid()) |
280 base::EnsureProcessGetsReaped(sandbox_helper_process.Pid()); | 278 base::EnsureProcessGetsReaped(sandbox_helper_process.Pid()); |
281 } | 279 } |
282 #endif | 280 #endif |
283 | 281 |
284 } // namespace content | 282 } // namespace content |
OLD | NEW |