blob: 10f3fea0b6b2ab2e074619fa1f61eb431d014bed [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/browser/renderer_host/render_sandbox_host_linux.h"
#include <sys/socket.h>
#include "base/memory/singleton.h"
#include "base/posix/eintr_wrapper.h"
namespace content {
// Runs on the main thread at startup.
RenderSandboxHostLinux::RenderSandboxHostLinux()
: initialized_(false), renderer_socket_(0), childs_lifeline_fd_(0) {
}
// static
RenderSandboxHostLinux* RenderSandboxHostLinux::GetInstance() {
return Singleton<RenderSandboxHostLinux>::get();
}
void RenderSandboxHostLinux::Init() {
DCHECK(!initialized_);
initialized_ = true;
int fds[2];
// We use SOCK_SEQPACKET rather than SOCK_DGRAM to prevent the renderer from
// sending datagrams to other sockets on the system. The sandbox may prevent
// the renderer from calling socket() to create new sockets, but it'll still
// inherit some sockets. With AF_UNIX+SOCK_DGRAM, it can call sendmsg to send
// a datagram to any (abstract) socket on the same system. With
// SOCK_SEQPACKET, this is prevented.
CHECK(socketpair(AF_UNIX, SOCK_SEQPACKET, 0, fds) == 0);
renderer_socket_ = fds[0];
// The SandboxIPC client is not expected to read from |renderer_socket_|.
// Instead, it reads from a temporary socket sent with the request.
PCHECK(0 == shutdown(renderer_socket_, SHUT_RD)) << "shutdown";
const int browser_socket = fds[1];
// The SandboxIPC handler is not expected to write to |browser_socket|.
// Instead, it replies on a temporary socket provided by the caller.
PCHECK(0 == shutdown(browser_socket, SHUT_WR)) << "shutdown";
int pipefds[2];
CHECK(0 == pipe(pipefds));
const int child_lifeline_fd = pipefds[0];
childs_lifeline_fd_ = pipefds[1];
ipc_handler_.reset(
new SandboxIPCHandler(child_lifeline_fd, browser_socket));
ipc_thread_.reset(
new base::DelegateSimpleThread(ipc_handler_.get(), "sandbox_ipc_thread"));
ipc_thread_->Start();
}
bool RenderSandboxHostLinux::ShutdownIPCChannel() {
return IGNORE_EINTR(close(childs_lifeline_fd_)) == 0;
}
RenderSandboxHostLinux::~RenderSandboxHostLinux() {
if (initialized_) {
if (!ShutdownIPCChannel())
LOG(ERROR) << "ShutdownIPCChannel failed";
if (IGNORE_EINTR(close(renderer_socket_)) < 0)
PLOG(ERROR) << "close";
ipc_thread_->Join();
}
}
} // namespace content