
The methodology used to generate this CL is documented in https://crbug.com/1098010#c34. No-Try: true No-Presubmit: true Bug: 1098010 Change-Id: I8c0f009d16350271f07d8e5e561085822cc9dd27 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/3895935 Owners-Override: Avi Drissman <avi@chromium.org> Reviewed-by: Mark Mentovai <mark@chromium.org> Commit-Queue: Mark Mentovai <mark@chromium.org> Auto-Submit: Avi Drissman <avi@chromium.org> Cr-Commit-Position: refs/heads/main@{#1047456}
61 lines
2.0 KiB
C++
61 lines
2.0 KiB
C++
// Copyright 2012 The Chromium Authors
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "content/browser/sandbox_host_linux.h"
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <memory>
|
|
|
|
#include "base/no_destructor.h"
|
|
#include "base/posix/eintr_wrapper.h"
|
|
|
|
namespace content {
|
|
|
|
// Runs on the main thread at startup.
|
|
SandboxHostLinux::SandboxHostLinux() = default;
|
|
|
|
// static
|
|
SandboxHostLinux* SandboxHostLinux::GetInstance() {
|
|
static base::NoDestructor<SandboxHostLinux> instance;
|
|
return instance.get();
|
|
}
|
|
|
|
void SandboxHostLinux::Init() {
|
|
DCHECK(!initialized_);
|
|
initialized_ = true;
|
|
|
|
int fds[2];
|
|
// We use SOCK_SEQPACKET rather than SOCK_DGRAM to prevent the sandboxed
|
|
// processes from sending datagrams to other sockets on the system. The
|
|
// sandbox may prevent the sandboxed process from calling socket() to create
|
|
// new sockets, but it'll still inherit some sockets. With AF_UNIX+SOCK_DGRAM,
|
|
// it can call sendmsg to send a datagram to any (abstract) socket on the same
|
|
// system. With SOCK_SEQPACKET, this is prevented.
|
|
CHECK(socketpair(AF_UNIX, SOCK_SEQPACKET, 0, fds) == 0);
|
|
|
|
child_socket_ = fds[0];
|
|
// The SandboxIPC client is not expected to read from |child_socket_|.
|
|
// Instead, it reads from a temporary socket sent with the request.
|
|
PCHECK(0 == shutdown(child_socket_, SHUT_RD)) << "shutdown";
|
|
|
|
const int browser_socket = fds[1];
|
|
// The SandboxIPC handler is not expected to write to |browser_socket|.
|
|
// Instead, it replies on a temporary socket provided by the caller.
|
|
PCHECK(0 == shutdown(browser_socket, SHUT_WR)) << "shutdown";
|
|
|
|
int pipefds[2];
|
|
CHECK(0 == pipe(pipefds));
|
|
const int child_lifeline_fd = pipefds[0];
|
|
childs_lifeline_fd_ = pipefds[1];
|
|
|
|
ipc_handler_ =
|
|
std::make_unique<SandboxIPCHandler>(child_lifeline_fd, browser_socket);
|
|
ipc_thread_ = std::make_unique<base::DelegateSimpleThread>(
|
|
ipc_handler_.get(), "sandbox_ipc_thread");
|
|
ipc_thread_->Start();
|
|
}
|
|
|
|
} // namespace content
|