1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "chrome/nacl/nacl_main_platform_delegate.h"
7 #include "base/command_line.h"
8 #include "base/file_path.h"
9 #include "base/logging.h"
10 #include "base/native_library.h"
11 #include "chrome/common/chrome_switches.h"
12 #include "sandbox/win/src/sandbox.h"
14 NaClMainPlatformDelegate::NaClMainPlatformDelegate(
15 const content::MainFunctionParams
& parameters
)
16 : parameters_(parameters
), sandbox_test_module_(NULL
) {
19 NaClMainPlatformDelegate::~NaClMainPlatformDelegate() {
22 void NaClMainPlatformDelegate::PlatformInitialize() {
23 // Be mindful of what resources you acquire here. They can be used by
24 // malicious code if the renderer gets compromised.
27 void NaClMainPlatformDelegate::PlatformUninitialize() {
30 void NaClMainPlatformDelegate::InitSandboxTests(bool no_sandbox
) {
31 const CommandLine
& command_line
= parameters_
.command_line
;
33 DVLOG(1) << "Started NaClLdr with " << command_line
.GetCommandLineString();
35 sandbox::TargetServices
* target_services
=
36 parameters_
.sandbox_info
->target_services
;
38 if (target_services
&& !no_sandbox
) {
39 FilePath test_dll_name
=
40 command_line
.GetSwitchValuePath(switches::kTestNaClSandbox
);
41 if (!test_dll_name
.empty()) {
42 // At this point, hack on the suffix according to with bitness
43 // of your windows process.
45 DVLOG(1) << "Using 64-bit test dll\n";
46 test_dll_name
= test_dll_name
.InsertBeforeExtension(L
"64");
47 test_dll_name
= test_dll_name
.ReplaceExtension(L
"dll");
49 DVLOG(1) << "Using 32-bit test dll\n";
50 test_dll_name
= test_dll_name
.ReplaceExtension(L
"dll");
52 DVLOG(1) << "Loading test lib " << test_dll_name
.value() << "\n";
53 sandbox_test_module_
= base::LoadNativeLibrary(test_dll_name
, NULL
);
54 CHECK(sandbox_test_module_
);
55 VLOG(1) << "Testing NaCl sandbox\n";
60 void NaClMainPlatformDelegate::EnableSandbox() {
61 sandbox::TargetServices
* target_services
=
62 parameters_
.sandbox_info
->target_services
;
64 CHECK(target_services
) << "NaCl-Win EnableSandbox: No Target Services!";
65 // Cause advapi32 to load before the sandbox is turned on.
66 unsigned int dummy_rand
;
68 // Warm up language subsystems before the sandbox is turned on.
69 ::GetUserDefaultLangID();
70 ::GetUserDefaultLCID();
71 // Turn the sandbox on.
72 target_services
->LowerToken();
75 bool NaClMainPlatformDelegate::RunSandboxTests() {
76 // TODO(jvoung): Win and mac should share this code.
78 if (sandbox_test_module_
) {
79 RunNaClLoaderTests run_security_tests
=
80 reinterpret_cast<RunNaClLoaderTests
>(
81 base::GetFunctionPointerFromNativeLibrary(sandbox_test_module_
,
82 kNaClLoaderTestCall
));
83 if (run_security_tests
) {
84 DVLOG(1) << "Running NaCl Loader security tests";
85 result
= (*run_security_tests
)();
87 VLOG(1) << "Failed to get NaCl sandbox test function";
90 base::UnloadNativeLibrary(sandbox_test_module_
);
91 sandbox_test_module_
= NULL
;