zygote_fork_delegate_linux.h revision 0529e5d033099cbfc42635f6f6183833b09dff6e
1// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#ifndef CONTENT_PUBLIC_COMMON_ZYGOTE_FORK_DELEGATE_LINUX_H_
6#define CONTENT_PUBLIC_COMMON_ZYGOTE_FORK_DELEGATE_LINUX_H_
7
8#include <unistd.h>
9
10#include <string>
11#include <vector>
12
13// TODO(jln) base::TerminationStatus should be forward declared when switching
14// to C++11.
15#include "base/process/kill.h"
16
17namespace content {
18
19// The ZygoteForkDelegate allows the Chrome Linux zygote to delegate
20// fork operations to another class that knows how to do some
21// specialized version of fork.
22class ZygoteForkDelegate {
23 public:
24  // A ZygoteForkDelegate is created during Chrome linux zygote
25  // initialization, and provides "fork()" functionality as an
26  // alternative to forking the zygote.  A new delegate is passed in
27  // as an argument to ZygoteMain().
28  virtual ~ZygoteForkDelegate() {}
29
30  // Initialization happens in the zygote after it has been
31  // started by ZygoteMain.
32  // If |enable_layer1_sandbox| is true, the delegate must enable a
33  // layer-1 sandbox such as the setuid sandbox.
34  virtual void Init(int sandboxdesc, bool enable_layer1_sandbox) = 0;
35
36  // After Init, supply a UMA_HISTOGRAM_ENUMERATION the delegate
37  // would like to supply on the first fork.
38  virtual void InitialUMA(std::string* uma_name,
39                          int* uma_sample,
40                          int* uma_boundary_value) = 0;
41
42  // Returns 'true' if the delegate would like to handle a given fork
43  // request.  Otherwise returns false.  Optionally, fills in uma_name et al
44  // with a report the helper wants to make via UMA_HISTOGRAM_ENUMERATION.
45  virtual bool CanHelp(const std::string& process_type, std::string* uma_name,
46                       int* uma_sample, int* uma_boundary_value) = 0;
47
48  // Indexes of FDs in the vector passed to Fork().
49  enum {
50    // Used to pass in the descriptor for talking to the Browser
51    kBrowserFDIndex,
52    // The next two are used in the protocol for discovering the
53    // child processes real PID from within the SUID sandbox. See
54    // http://code.google.com/p/chromium/wiki/LinuxZygote
55    kDummyFDIndex,
56    kParentFDIndex,
57    kNumPassedFDs  // Number of FDs in the vector passed to Fork().
58  };
59
60  // Delegate forks, returning a -1 on failure. Outside the
61  // suid sandbox, Fork() returns the Linux process ID.
62  // This method is not aware of any potential pid namespaces, so it'll
63  // return a raw pid just like fork() would.
64  // Delegate is responsible for communicating the channel ID to the
65  // newly created child process.
66  virtual pid_t Fork(const std::string& process_type,
67                     const std::vector<int>& fds,
68                     const std::string& channel_id) = 0;
69
70  // The fork delegate must also assume the role of waiting for its children
71  // since the caller will not be their parents and cannot do it. |pid| here
72  // should be a pid that has been returned by the Fork() method. i.e. This
73  // method is completely unaware of eventual PID namespaces due to sandboxing.
74  // |known_dead| indicates that the process is already dead and that a
75  // blocking wait() should be performed. In this case, GetTerminationStatus()
76  // will send a SIGKILL to the target process first.
77  virtual bool GetTerminationStatus(pid_t pid, bool known_dead,
78                                    base::TerminationStatus* status,
79                                    int* exit_code) = 0;
80};
81
82}  // namespace content
83
84#endif  // CONTENT_PUBLIC_COMMON_ZYGOTE_FORK_DELEGATE_LINUX_H_
85