Swarm DEPS roll
[chromium-blink-merge.git] / chrome / nacl / nacl_main_platform_delegate_win.cc
blob5fd9b220c51a02cdff28a8c905b2c522b7cf9430
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "chrome/nacl/nacl_main_platform_delegate.h"
7 #include "base/command_line.h"
8 #include "base/file_path.h"
9 #include "base/logging.h"
10 #include "base/native_library.h"
11 #include "chrome/common/chrome_switches.h"
12 #include "sandbox/win/src/sandbox.h"
14 NaClMainPlatformDelegate::NaClMainPlatformDelegate(
15 const content::MainFunctionParams& parameters)
16 : parameters_(parameters), sandbox_test_module_(NULL) {
19 NaClMainPlatformDelegate::~NaClMainPlatformDelegate() {
22 void NaClMainPlatformDelegate::PlatformInitialize() {
23 // Be mindful of what resources you acquire here. They can be used by
24 // malicious code if the renderer gets compromised.
27 void NaClMainPlatformDelegate::PlatformUninitialize() {
30 void NaClMainPlatformDelegate::InitSandboxTests(bool no_sandbox) {
31 const CommandLine& command_line = parameters_.command_line;
33 DVLOG(1) << "Started NaClLdr with " << command_line.GetCommandLineString();
35 sandbox::TargetServices* target_services =
36 parameters_.sandbox_info->target_services;
38 if (target_services && !no_sandbox) {
39 FilePath test_dll_name =
40 command_line.GetSwitchValuePath(switches::kTestNaClSandbox);
41 if (!test_dll_name.empty()) {
42 // At this point, hack on the suffix according to with bitness
43 // of your windows process.
44 #if defined(_WIN64)
45 DVLOG(1) << "Using 64-bit test dll\n";
46 test_dll_name = test_dll_name.InsertBeforeExtension(L"64");
47 test_dll_name = test_dll_name.ReplaceExtension(L"dll");
48 #else
49 DVLOG(1) << "Using 32-bit test dll\n";
50 test_dll_name = test_dll_name.ReplaceExtension(L"dll");
51 #endif
52 DVLOG(1) << "Loading test lib " << test_dll_name.value() << "\n";
53 sandbox_test_module_ = base::LoadNativeLibrary(test_dll_name, NULL);
54 CHECK(sandbox_test_module_);
55 VLOG(1) << "Testing NaCl sandbox\n";
60 void NaClMainPlatformDelegate::EnableSandbox() {
61 sandbox::TargetServices* target_services =
62 parameters_.sandbox_info->target_services;
64 CHECK(target_services) << "NaCl-Win EnableSandbox: No Target Services!";
65 // Cause advapi32 to load before the sandbox is turned on.
66 unsigned int dummy_rand;
67 rand_s(&dummy_rand);
68 // Warm up language subsystems before the sandbox is turned on.
69 ::GetUserDefaultLangID();
70 ::GetUserDefaultLCID();
71 // Turn the sandbox on.
72 target_services->LowerToken();
75 bool NaClMainPlatformDelegate::RunSandboxTests() {
76 // TODO(jvoung): Win and mac should share this code.
77 bool result = true;
78 if (sandbox_test_module_) {
79 RunNaClLoaderTests run_security_tests =
80 reinterpret_cast<RunNaClLoaderTests>(
81 base::GetFunctionPointerFromNativeLibrary(sandbox_test_module_,
82 kNaClLoaderTestCall));
83 if (run_security_tests) {
84 DVLOG(1) << "Running NaCl Loader security tests";
85 result = (*run_security_tests)();
86 } else {
87 VLOG(1) << "Failed to get NaCl sandbox test function";
88 result = false;
90 base::UnloadNativeLibrary(sandbox_test_module_);
91 sandbox_test_module_ = NULL;
93 return result;