Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(223)

Side by Side Diff: chrome/browser/renderer_host/render_sandbox_host_linux.cc

Issue 359001: Revert 30938 - Add support for getting the real process id from within the su... (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Created 11 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2009 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2009 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/renderer_host/render_sandbox_host_linux.h" 5 #include "chrome/browser/renderer_host/render_sandbox_host_linux.h"
6 6
7 #include <stdint.h> 7 #include <stdint.h>
8 #include <unistd.h> 8 #include <unistd.h>
9 #include <sys/uio.h> 9 #include <sys/uio.h>
10 #include <sys/socket.h> 10 #include <sys/socket.h>
11 #include <sys/poll.h> 11 #include <sys/poll.h>
12 #include <time.h> 12 #include <time.h>
13 13
14 #include <vector>
15
16 #include "base/command_line.h"
17 #include "base/eintr_wrapper.h" 14 #include "base/eintr_wrapper.h"
18 #include "base/linux_util.h" 15 #include "base/platform_file.h"
16 #include "base/process_util.h"
17 #include "base/logging.h"
18 #include "base/message_loop.h"
19 #include "base/pickle.h" 19 #include "base/pickle.h"
20 #include "base/process_util.h"
21 #include "base/scoped_ptr.h"
22 #include "base/string_util.h" 20 #include "base/string_util.h"
23 #include "base/unix_domain_socket_posix.h" 21 #include "base/unix_domain_socket_posix.h"
24 #include "chrome/common/sandbox_methods_linux.h" 22 #include "chrome/common/sandbox_methods_linux.h"
25 #include "webkit/api/public/gtk/WebFontInfo.h" 23 #include "webkit/api/public/gtk/WebFontInfo.h"
26 24
27 #include "SkFontHost_fontconfig_direct.h" 25 #include "SkFontHost_fontconfig_direct.h"
28 #include "SkFontHost_fontconfig_ipc.h" 26 #include "SkFontHost_fontconfig_ipc.h"
29 27
30 using WebKit::WebCString; 28 using WebKit::WebCString;
31 using WebKit::WebFontInfo; 29 using WebKit::WebFontInfo;
32 using WebKit::WebUChar; 30 using WebKit::WebUChar;
33 31
34 // http://code.google.com/p/chromium/wiki/LinuxSandboxIPC 32 // http://code.google.com/p/chromium/wiki/LinuxSandboxIPC
35 33
36 // BEWARE: code in this file run across *processes* (not just threads). 34 // BEWARE: code in this file run across *processes* (not just threads).
37 35
38 // This code runs in a child process 36 // This code runs in a child process
39 class SandboxIPCProcess { 37 class SandboxIPCProcess {
40 public: 38 public:
41 // lifeline_fd: this is the read end of a pipe which the browser process 39 // lifeline_fd: this is the read end of a pipe which the browser process
42 // holds the other end of. If the browser process dies, its descriptors are 40 // holds the other end of. If the browser process dies, its descriptors are
43 // closed and we will noticed an EOF on the pipe. That's our signal to exit. 41 // closed and we will noticed an EOF on the pipe. That's our signal to exit.
44 // browser_socket: the browser's end of the sandbox IPC socketpair. From the 42 // browser_socket: the browser's end of the sandbox IPC socketpair. From the
45 // point of view of the renderer, it's talking to the browser but this 43 // point of view of the renderer, it's talking to the browser but this
46 // object actually services the requests. 44 // object actually services the requests.
47 // sandbox_cmd: the path of the sandbox executable 45 SandboxIPCProcess(int lifeline_fd, int browser_socket)
48 SandboxIPCProcess(int lifeline_fd, int browser_socket,
49 std::string sandbox_cmd)
50 : lifeline_fd_(lifeline_fd), 46 : lifeline_fd_(lifeline_fd),
51 browser_socket_(browser_socket), 47 browser_socket_(browser_socket),
52 font_config_(new FontConfigDirect()) { 48 font_config_(new FontConfigDirect()) {
53 base::InjectiveMultimap multimap; 49 base::InjectiveMultimap multimap;
54 multimap.push_back(base::InjectionArc(0, lifeline_fd, false)); 50 multimap.push_back(base::InjectionArc(0, lifeline_fd, false));
55 multimap.push_back(base::InjectionArc(0, browser_socket, false)); 51 multimap.push_back(base::InjectionArc(0, browser_socket, false));
56 52
57 base::CloseSuperfluousFds(multimap); 53 base::CloseSuperfluousFds(multimap);
58
59 if (!sandbox_cmd.empty()) {
60 sandbox_cmd_.push_back(sandbox_cmd);
61 sandbox_cmd_.push_back(base::kFindInodeSwitch);
62 }
63 } 54 }
64 55
65 void Run() { 56 void Run() {
66 struct pollfd pfds[2]; 57 struct pollfd pfds[2];
67 pfds[0].fd = lifeline_fd_; 58 pfds[0].fd = lifeline_fd_;
68 pfds[0].events = POLLIN; 59 pfds[0].events = POLLIN;
69 pfds[1].fd = browser_socket_; 60 pfds[1].fd = browser_socket_;
70 pfds[1].events = POLLIN; 61 pfds[1].events = POLLIN;
71 62
72 bool failed_polls = 0; 63 bool failed_polls = 0;
(...skipping 43 matching lines...) Expand 10 before | Expand all | Expand 10 after
116 goto error; 107 goto error;
117 108
118 if (kind == FontConfigIPC::METHOD_MATCH) { 109 if (kind == FontConfigIPC::METHOD_MATCH) {
119 HandleFontMatchRequest(fd, pickle, iter, fds); 110 HandleFontMatchRequest(fd, pickle, iter, fds);
120 } else if (kind == FontConfigIPC::METHOD_OPEN) { 111 } else if (kind == FontConfigIPC::METHOD_OPEN) {
121 HandleFontOpenRequest(fd, pickle, iter, fds); 112 HandleFontOpenRequest(fd, pickle, iter, fds);
122 } else if (kind == LinuxSandbox::METHOD_GET_FONT_FAMILY_FOR_CHARS) { 113 } else if (kind == LinuxSandbox::METHOD_GET_FONT_FAMILY_FOR_CHARS) {
123 HandleGetFontFamilyForChars(fd, pickle, iter, fds); 114 HandleGetFontFamilyForChars(fd, pickle, iter, fds);
124 } else if (kind == LinuxSandbox::METHOD_LOCALTIME) { 115 } else if (kind == LinuxSandbox::METHOD_LOCALTIME) {
125 HandleLocaltime(fd, pickle, iter, fds); 116 HandleLocaltime(fd, pickle, iter, fds);
126 } else if (kind == LinuxSandbox::METHOD_GET_CHILD_WITH_INODE) {
127 HandleGetChildWithInode(fd, pickle, iter, fds);
128 } 117 }
129 118
130 error: 119 error:
131 for (std::vector<int>::const_iterator 120 for (std::vector<int>::const_iterator
132 i = fds.begin(); i != fds.end(); ++i) { 121 i = fds.begin(); i != fds.end(); ++i) {
133 close(*i); 122 close(*i);
134 } 123 }
135 } 124 }
136 125
137 void HandleFontMatchRequest(int fd, const Pickle& pickle, void* iter, 126 void HandleFontMatchRequest(int fd, Pickle& pickle, void* iter,
138 std::vector<int>& fds) { 127 std::vector<int>& fds) {
139 bool fileid_valid; 128 bool fileid_valid;
140 uint32_t fileid; 129 uint32_t fileid;
141 bool is_bold, is_italic; 130 bool is_bold, is_italic;
142 std::string family; 131 std::string family;
143 132
144 if (!pickle.ReadBool(&iter, &fileid_valid)) 133 if (!pickle.ReadBool(&iter, &fileid_valid))
145 return; 134 return;
146 if (fileid_valid) { 135 if (fileid_valid) {
147 if (!pickle.ReadUInt32(&iter, &fileid)) 136 if (!pickle.ReadUInt32(&iter, &fileid))
(...skipping 18 matching lines...) Expand all
166 } else { 155 } else {
167 reply.WriteBool(true); 156 reply.WriteBool(true);
168 reply.WriteUInt32(result_fileid); 157 reply.WriteUInt32(result_fileid);
169 reply.WriteString(result_family); 158 reply.WriteString(result_family);
170 reply.WriteBool(is_bold); 159 reply.WriteBool(is_bold);
171 reply.WriteBool(is_italic); 160 reply.WriteBool(is_italic);
172 } 161 }
173 SendRendererReply(fds, reply, -1); 162 SendRendererReply(fds, reply, -1);
174 } 163 }
175 164
176 void HandleFontOpenRequest(int fd, const Pickle& pickle, void* iter, 165 void HandleFontOpenRequest(int fd, Pickle& pickle, void* iter,
177 std::vector<int>& fds) { 166 std::vector<int>& fds) {
178 uint32_t fileid; 167 uint32_t fileid;
179 if (!pickle.ReadUInt32(&iter, &fileid)) 168 if (!pickle.ReadUInt32(&iter, &fileid))
180 return; 169 return;
181 const int result_fd = font_config_->Open(fileid); 170 const int result_fd = font_config_->Open(fileid);
182 171
183 Pickle reply; 172 Pickle reply;
184 if (result_fd == -1) { 173 if (result_fd == -1) {
185 reply.WriteBool(false); 174 reply.WriteBool(false);
186 } else { 175 } else {
187 reply.WriteBool(true); 176 reply.WriteBool(true);
188 } 177 }
189 178
190 SendRendererReply(fds, reply, result_fd); 179 SendRendererReply(fds, reply, result_fd);
191 180
192 if (result_fd >= 0) 181 if (result_fd >= 0)
193 close(result_fd); 182 close(result_fd);
194 } 183 }
195 184
196 void HandleGetFontFamilyForChars(int fd, const Pickle& pickle, void* iter, 185 void HandleGetFontFamilyForChars(int fd, Pickle& pickle, void* iter,
197 std::vector<int>& fds) { 186 std::vector<int>& fds) {
198 // The other side of this call is 187 // The other side of this call is
199 // chrome/renderer/renderer_sandbox_support_linux.cc 188 // chrome/renderer/renderer_sandbox_support_linux.cc
200 189
201 int num_chars; 190 int num_chars;
202 if (!pickle.ReadInt(&iter, &num_chars)) 191 if (!pickle.ReadInt(&iter, &num_chars))
203 return; 192 return;
204 193
205 // We don't want a corrupt renderer asking too much of us, it might 194 // We don't want a corrupt renderer asking too much of us, it might
206 // overflow later in the code. 195 // overflow later in the code.
(...skipping 19 matching lines...) Expand all
226 215
227 Pickle reply; 216 Pickle reply;
228 if (family.data()) { 217 if (family.data()) {
229 reply.WriteString(family.data()); 218 reply.WriteString(family.data());
230 } else { 219 } else {
231 reply.WriteString(""); 220 reply.WriteString("");
232 } 221 }
233 SendRendererReply(fds, reply, -1); 222 SendRendererReply(fds, reply, -1);
234 } 223 }
235 224
236 void HandleLocaltime(int fd, const Pickle& pickle, void* iter, 225 void HandleLocaltime(int fd, Pickle& pickle, void* iter,
237 std::vector<int>& fds) { 226 std::vector<int>& fds) {
238 // The other side of this call is in zygote_main_linux.cc 227 // The other side of this call is in zygote_main_linux.cc
239 228
240 std::string time_string; 229 std::string time_string;
241 if (!pickle.ReadString(&iter, &time_string) || 230 if (!pickle.ReadString(&iter, &time_string) ||
242 time_string.size() != sizeof(time_t)) { 231 time_string.size() != sizeof(time_t)) {
243 return; 232 return;
244 } 233 }
245 234
246 time_t time; 235 time_t time;
247 memcpy(&time, time_string.data(), sizeof(time)); 236 memcpy(&time, time_string.data(), sizeof(time));
248 // We use localtime here because we need the tm_zone field to be filled 237 // We use localtime here because we need the tm_zone field to be filled
249 // out. Since we are a single-threaded process, this is safe. 238 // out. Since we are a single-threaded process, this is safe.
250 const struct tm* expanded_time = localtime(&time); 239 const struct tm* expanded_time = localtime(&time);
251 240
252 const std::string result_string( 241 const std::string result_string(
253 reinterpret_cast<const char*>(expanded_time), sizeof(struct tm)); 242 reinterpret_cast<const char*>(expanded_time), sizeof(struct tm));
254 243
255 Pickle reply; 244 Pickle reply;
256 reply.WriteString(result_string); 245 reply.WriteString(result_string);
257 reply.WriteString(expanded_time->tm_zone); 246 reply.WriteString(expanded_time->tm_zone);
258 SendRendererReply(fds, reply, -1); 247 SendRendererReply(fds, reply, -1);
259 } 248 }
260 249
261 void HandleGetChildWithInode(int fd, const Pickle& pickle, void* iter,
262 std::vector<int>& fds) {
263 // The other side of this call is in zygote_main_linux.cc
264 if (sandbox_cmd_.empty()) {
265 LOG(ERROR) << "Not in the sandbox, this should not be called";
266 return;
267 }
268
269 uint64_t inode;
270 if (!pickle.ReadUInt64(&iter, &inode))
271 return;
272
273 base::ProcessId pid = 0;
274 std::string inode_output;
275
276 std::vector<std::string> sandbox_cmd = sandbox_cmd_;
277 sandbox_cmd.push_back(IntToString(inode));
278 CommandLine get_inode_cmd(sandbox_cmd);
279 if (base::GetAppOutput(get_inode_cmd, &inode_output))
280 StringToInt(inode_output, &pid);
281
282 if (!pid) {
283 LOG(ERROR) << "Could not get pid";
284 return;
285 }
286
287 Pickle reply;
288 reply.WriteInt(pid);
289 SendRendererReply(fds, reply, -1);
290 }
291
292 void SendRendererReply(const std::vector<int>& fds, const Pickle& reply, 250 void SendRendererReply(const std::vector<int>& fds, const Pickle& reply,
293 int reply_fd) { 251 int reply_fd) {
294 struct msghdr msg; 252 struct msghdr msg;
295 memset(&msg, 0, sizeof(msg)); 253 memset(&msg, 0, sizeof(msg));
296 struct iovec iov = {const_cast<void*>(reply.data()), reply.size()}; 254 struct iovec iov = {const_cast<void*>(reply.data()), reply.size()};
297 msg.msg_iov = &iov; 255 msg.msg_iov = &iov;
298 msg.msg_iovlen = 1; 256 msg.msg_iovlen = 1;
299 257
300 char control_buffer[CMSG_SPACE(sizeof(int))]; 258 char control_buffer[CMSG_SPACE(sizeof(int))];
301 259
302 if (reply_fd != -1) { 260 if (reply_fd != -1) {
303 struct cmsghdr *cmsg; 261 struct cmsghdr *cmsg;
304 262
305 msg.msg_control = control_buffer; 263 msg.msg_control = control_buffer;
306 msg.msg_controllen = sizeof(control_buffer); 264 msg.msg_controllen = sizeof(control_buffer);
307 cmsg = CMSG_FIRSTHDR(&msg); 265 cmsg = CMSG_FIRSTHDR(&msg);
308 cmsg->cmsg_level = SOL_SOCKET; 266 cmsg->cmsg_level = SOL_SOCKET;
309 cmsg->cmsg_type = SCM_RIGHTS; 267 cmsg->cmsg_type = SCM_RIGHTS;
310 cmsg->cmsg_len = CMSG_LEN(sizeof(int)); 268 cmsg->cmsg_len = CMSG_LEN(sizeof(int));
311 memcpy(CMSG_DATA(cmsg), &reply_fd, sizeof(reply_fd)); 269 memcpy(CMSG_DATA(cmsg), &reply_fd, sizeof(int));
312 msg.msg_controllen = cmsg->cmsg_len; 270 msg.msg_controllen = cmsg->cmsg_len;
313 } 271 }
314 272
315 HANDLE_EINTR(sendmsg(fds[0], &msg, MSG_DONTWAIT)); 273 HANDLE_EINTR(sendmsg(fds[0], &msg, MSG_DONTWAIT));
316 } 274 }
317 275
318 // --------------------------------------------------------------------------- 276 // ---------------------------------------------------------------------------
319 277
320 const int lifeline_fd_; 278 const int lifeline_fd_;
321 const int browser_socket_; 279 const int browser_socket_;
322 FontConfigDirect* const font_config_; 280 FontConfigDirect* const font_config_;
323 std::vector<std::string> sandbox_cmd_;
324 }; 281 };
325 282
326 // ----------------------------------------------------------------------------- 283 // -----------------------------------------------------------------------------
327 284
328 // Runs on the main thread at startup. 285 // Runs on the main thread at startup.
329 RenderSandboxHostLinux::RenderSandboxHostLinux() 286 RenderSandboxHostLinux::RenderSandboxHostLinux() {
330 : init_(false) {
331 }
332
333 void RenderSandboxHostLinux::Init(const std::string& sandbox_path) {
334 DCHECK(!init_);
335 init_ = true;
336
337 int fds[2]; 287 int fds[2];
338 // We use SOCK_SEQPACKET rather than SOCK_DGRAM to prevent the renderer from 288 // We use SOCK_SEQPACKET rather than SOCK_DGRAM to prevent the renderer from
339 // sending datagrams to other sockets on the system. The sandbox may prevent 289 // sending datagrams to other sockets on the system. The sandbox may prevent
340 // the renderer from calling socket() to create new sockets, but it'll still 290 // the renderer from calling socket() to create new sockets, but it'll still
341 // inherit some sockets. With PF_UNIX+SOCK_DGRAM, it can call sendmsg to send 291 // inherit some sockets. With PF_UNIX+SOCK_DGRAM, it can call sendmsg to send
342 // a datagram to any (abstract) socket on the same system. With 292 // a datagram to any (abstract) socket on the same system. With
343 // SOCK_SEQPACKET, this is prevented. 293 // SOCK_SEQPACKET, this is prevented.
344 CHECK(socketpair(AF_UNIX, SOCK_SEQPACKET, 0, fds) == 0); 294 CHECK(socketpair(AF_UNIX, SOCK_SEQPACKET, 0, fds) == 0);
345 295
346 renderer_socket_ = fds[0]; 296 renderer_socket_ = fds[0];
347 const int browser_socket = fds[1]; 297 const int browser_socket = fds[1];
348 298
349 int pipefds[2]; 299 int pipefds[2];
350 CHECK(0 == pipe(pipefds)); 300 CHECK(0 == pipe(pipefds));
351 const int child_lifeline_fd = pipefds[0]; 301 const int child_lifeline_fd = pipefds[0];
352 childs_lifeline_fd_ = pipefds[1]; 302 childs_lifeline_fd_ = pipefds[1];
353 303
354 pid_ = fork(); 304 pid_ = fork();
355 if (pid_ == 0) { 305 if (pid_ == 0) {
356 SandboxIPCProcess handler(child_lifeline_fd, browser_socket, sandbox_path); 306 SandboxIPCProcess handler(child_lifeline_fd, browser_socket);
357 handler.Run(); 307 handler.Run();
358 _exit(0); 308 _exit(0);
359 } 309 }
360 } 310 }
361 311
362 RenderSandboxHostLinux::~RenderSandboxHostLinux() { 312 RenderSandboxHostLinux::~RenderSandboxHostLinux() {
363 if (init_) { 313 HANDLE_EINTR(close(renderer_socket_));
364 HANDLE_EINTR(close(renderer_socket_)); 314 HANDLE_EINTR(close(childs_lifeline_fd_));
365 HANDLE_EINTR(close(childs_lifeline_fd_));
366 }
367 } 315 }
OLDNEW
« no previous file with comments | « chrome/browser/renderer_host/render_sandbox_host_linux.h ('k') | chrome/browser/zygote_host_linux.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698