OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/zygote/zygote_linux.h" | 5 #include "content/zygote/zygote_linux.h" |
6 | 6 |
7 #include <fcntl.h> | 7 #include <fcntl.h> |
8 #include <string.h> | 8 #include <string.h> |
9 #include <sys/socket.h> | 9 #include <sys/socket.h> |
10 #include <sys/types.h> | 10 #include <sys/types.h> |
11 #include <sys/wait.h> | 11 #include <sys/wait.h> |
12 | 12 |
13 #include "base/command_line.h" | 13 #include "base/command_line.h" |
14 #include "ipc/ipc_switches.h" | 14 #include "ipc/ipc_switches.h" |
15 #include "content/public/common/sandbox_linux.h" | 15 #include "content/public/common/sandbox_linux.h" |
16 #include "base/process_util.h" | 16 #include "base/process_util.h" |
17 #include "content/public/common/result_codes.h" | 17 #include "content/public/common/result_codes.h" |
18 #include "ipc/ipc_channel.h" | 18 #include "ipc/ipc_channel.h" |
19 #include "base/debug/trace_event.h" | 19 #include "base/debug/trace_event.h" |
20 #include "base/file_util.h" | 20 #include "base/file_util.h" |
21 #include "base/linux_util.h" | 21 #include "base/linux_util.h" |
22 #include "base/eintr_wrapper.h" | 22 #include "base/eintr_wrapper.h" |
23 #include "base/global_descriptors_posix.h" | 23 #include "base/global_descriptors_posix.h" |
24 #include "base/logging.h" | 24 #include "base/logging.h" |
25 #include "base/pickle.h" | 25 #include "base/pickle.h" |
26 #include "base/posix/unix_domain_socket.h" | 26 #include "base/posix/unix_domain_socket.h" |
27 #include "content/common/set_process_title.h" | 27 #include "content/common/set_process_title.h" |
28 #include "content/common/sandbox_linux.h" | 28 #include "content/common/sandbox_methods_linux.h" |
29 #include "content/common/zygote_commands_linux.h" | 29 #include "content/common/zygote_commands_linux.h" |
30 #include "content/public/common/content_descriptors.h" | 30 #include "content/public/common/content_descriptors.h" |
31 #include "content/public/common/zygote_fork_delegate_linux.h" | 31 #include "content/public/common/zygote_fork_delegate_linux.h" |
32 | 32 |
33 #if defined(CHROMIUM_SELINUX) | 33 #if defined(CHROMIUM_SELINUX) |
34 #include <selinux/selinux.h> | 34 #include <selinux/selinux.h> |
35 #include <selinux/context.h> | 35 #include <selinux/context.h> |
36 #endif | 36 #endif |
37 | 37 |
38 // See http://code.google.com/p/chromium/wiki/LinuxZygote | 38 // See http://code.google.com/p/chromium/wiki/LinuxZygote |
(...skipping 22 matching lines...) Expand all Loading... |
61 LOG(FATAL) << "dynamic transition to type '" << type << "' failed. " | 61 LOG(FATAL) << "dynamic transition to type '" << type << "' failed. " |
62 "(this binary has been built with SELinux support, but maybe " | 62 "(this binary has been built with SELinux support, but maybe " |
63 "the policies haven't been loaded into the kernel?)"; | 63 "the policies haven't been loaded into the kernel?)"; |
64 } | 64 } |
65 } | 65 } |
66 #endif // CHROMIUM_SELINUX | 66 #endif // CHROMIUM_SELINUX |
67 | 67 |
68 } // namespace | 68 } // namespace |
69 | 69 |
70 Zygote::Zygote(int sandbox_flags, | 70 Zygote::Zygote(int sandbox_flags, |
71 ZygoteForkDelegate* helper) | 71 ZygoteForkDelegate* helper, |
| 72 int proc_fd_for_seccomp) |
72 : sandbox_flags_(sandbox_flags), | 73 : sandbox_flags_(sandbox_flags), |
73 helper_(helper), | 74 helper_(helper), |
| 75 #if defined(SECCOMP_SANDBOX) |
| 76 proc_fd_for_seccomp_(proc_fd_for_seccomp), |
| 77 #endif |
74 initial_uma_sample_(0), | 78 initial_uma_sample_(0), |
75 initial_uma_boundary_value_(0) { | 79 initial_uma_boundary_value_(0) { |
76 if (helper_) { | 80 if (helper_) { |
77 helper_->InitialUMA(&initial_uma_name_, | 81 helper_->InitialUMA(&initial_uma_name_, |
78 &initial_uma_sample_, | 82 &initial_uma_sample_, |
79 &initial_uma_boundary_value_); | 83 &initial_uma_boundary_value_); |
80 } | 84 } |
81 } | 85 } |
82 | 86 |
83 Zygote::~Zygote() { | 87 Zygote::~Zygote() { |
(...skipping 328 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
412 | 416 |
413 mapping.push_back(std::make_pair( | 417 mapping.push_back(std::make_pair( |
414 static_cast<uint32_t>(kSandboxIPCChannel), kMagicSandboxIPCDescriptor)); | 418 static_cast<uint32_t>(kSandboxIPCChannel), kMagicSandboxIPCDescriptor)); |
415 | 419 |
416 // Returns twice, once per process. | 420 // Returns twice, once per process. |
417 base::ProcessId child_pid = ForkWithRealPid(process_type, fds, channel_id, | 421 base::ProcessId child_pid = ForkWithRealPid(process_type, fds, channel_id, |
418 uma_name, uma_sample, | 422 uma_name, uma_sample, |
419 uma_boundary_value); | 423 uma_boundary_value); |
420 if (!child_pid) { | 424 if (!child_pid) { |
421 // This is the child process. | 425 // This is the child process. |
422 | 426 #if defined(SECCOMP_SANDBOX) |
423 // At this point, we finally know our process type. | 427 if (proc_fd_for_seccomp_ >= 0) { |
424 LinuxSandbox::GetInstance()->PreinitializeSandboxFinish(process_type); | 428 if (process_type == switches::kRendererProcess && |
| 429 SeccompSandboxEnabled()) { |
| 430 SeccompSandboxSetProcFd(proc_fd_for_seccomp_); |
| 431 } else { |
| 432 close(proc_fd_for_seccomp_); |
| 433 } |
| 434 proc_fd_for_seccomp_ = -1; |
| 435 } |
| 436 #endif |
425 | 437 |
426 close(kBrowserDescriptor); // Our socket from the browser. | 438 close(kBrowserDescriptor); // Our socket from the browser. |
427 if (UsingSUIDSandbox()) | 439 if (UsingSUIDSandbox()) |
428 close(kZygoteIdFd); // Another socket from the browser. | 440 close(kZygoteIdFd); // Another socket from the browser. |
429 base::GlobalDescriptors::GetInstance()->Reset(mapping); | 441 base::GlobalDescriptors::GetInstance()->Reset(mapping); |
430 | 442 |
431 #if defined(CHROMIUM_SELINUX) | 443 #if defined(CHROMIUM_SELINUX) |
432 SELinuxTransitionToTypeOrDie("chromium_renderer_t"); | 444 SELinuxTransitionToTypeOrDie("chromium_renderer_t"); |
433 #endif | 445 #endif |
434 | 446 |
(...skipping 56 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
491 PickleIterator iter) { | 503 PickleIterator iter) { |
492 if (HANDLE_EINTR(write(fd, &sandbox_flags_, sizeof(sandbox_flags_))) != | 504 if (HANDLE_EINTR(write(fd, &sandbox_flags_, sizeof(sandbox_flags_))) != |
493 sizeof(sandbox_flags_)) { | 505 sizeof(sandbox_flags_)) { |
494 PLOG(ERROR) << "write"; | 506 PLOG(ERROR) << "write"; |
495 } | 507 } |
496 | 508 |
497 return false; | 509 return false; |
498 } | 510 } |
499 | 511 |
500 } // namespace content | 512 } // namespace content |
OLD | NEW |