OLD | NEW |
| (Empty) |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "base/containers/hash_tables.h" | |
6 #include "base/files/file.h" | |
7 #include "base/lazy_instance.h" | |
8 #include "base/logging.h" | |
9 #include "base/posix/eintr_wrapper.h" | |
10 #include "base/synchronization/lock.h" | |
11 | |
12 // These hooks provided for base::File perform additional sanity checks when | |
13 // files are closed. These extra checks are hard to understand and maintain, | |
14 // hence they are temporary. TODO(pasko): Remove these extra checks as soon as | |
15 // crbug.com/424562 is fixed. | |
16 // | |
17 // Background: | |
18 // 1. The browser process crashes if a call to close() provided by the C | |
19 // library (i.e. close(3)) fails. This is done for security purposes. See | |
20 // base/files/scoped_file.cc. When a crash like this happens, there is not | |
21 // enough context in the minidump to triage the problem. | |
22 // 2. base::File provides a good abstraction to prevent closing incorrect | |
23 // file descriptors or double-closing. Closing non-owned file descriptors | |
24 // would more likely happen from outside base::File and base::ScopedFD. | |
25 // | |
26 // These hooks intercept base::File operations to 'protect' file handles / | |
27 // descriptors from accidental close(3) by other portions of the code being | |
28 // linked into the browser. Also, this file provides an interceptor for the | |
29 // close(3) itself, and requires to be linked with cooperation of | |
30 // --Wl,--wrap=close (i.e. linker wrapping). | |
31 // | |
32 // Wrapping close(3) on all libraries can lead to confusion, particularly for | |
33 // the libraries that do not use ::base (I am also looking at you, | |
34 // crazy_linker). Instead two hooks are added to base::File, which are | |
35 // implemented as no-op by default. This file should be linked into the Chrome | |
36 // native binary(-ies) for a whitelist of targets where "file descriptor | |
37 // protection" is useful. | |
38 | |
39 // With compilers other than GCC/Clang the wrapper is trivial. This is to avoid | |
40 // overexercising mechanisms for overriding weak symbols. | |
41 #if !defined(COMPILER_GCC) | |
42 extern "C" { | |
43 | |
44 int __real_close(int fd); | |
45 | |
46 BASE_EXPORT int __wrap_close(int fd) { | |
47 return __real_close(fd); | |
48 } | |
49 | |
50 } // extern "C" | |
51 | |
52 #else // defined(COMPILER_GCC) | |
53 | |
54 namespace { | |
55 | |
56 // Protects the |g_protected_fd_set|. | |
57 base::LazyInstance<base::Lock>::Leaky g_lock = LAZY_INSTANCE_INITIALIZER; | |
58 | |
59 // Holds the set of all 'protected' file descriptors. | |
60 base::LazyInstance<base::hash_set<int> >::Leaky g_protected_fd_set = | |
61 LAZY_INSTANCE_INITIALIZER; | |
62 | |
63 bool IsFileDescriptorProtected(int fd) { | |
64 base::AutoLock lock(*g_lock.Pointer()); | |
65 return g_protected_fd_set.Get().count(fd) != 0; | |
66 } | |
67 | |
68 } // namespace | |
69 | |
70 namespace base { | |
71 | |
72 BASE_EXPORT void ProtectFileDescriptor(int fd) { | |
73 base::AutoLock lock(g_lock.Get()); | |
74 CHECK(!g_protected_fd_set.Get().count(fd)) << "fd: " << fd; | |
75 g_protected_fd_set.Get().insert(fd); | |
76 } | |
77 | |
78 BASE_EXPORT void UnprotectFileDescriptor(int fd) { | |
79 base::AutoLock lock(*g_lock.Pointer()); | |
80 CHECK(g_protected_fd_set.Get().erase(fd)) << "fd: " << fd; | |
81 } | |
82 | |
83 } // namespace base | |
84 | |
85 extern "C" { | |
86 | |
87 int __real_close(int fd); | |
88 | |
89 BASE_EXPORT int __wrap_close(int fd) { | |
90 // The crash happens here if a protected file descriptor was attempted to be | |
91 // closed without first being unprotected. Unprotection happens only in | |
92 // base::File. In other words this is an "early crash" as compared to the one | |
93 // happening in scoped_file.cc. | |
94 // | |
95 // Getting an earlier crash provides a more useful stack trace (minidump) | |
96 // allowing to debug deeper into the thread that freed the wrong resource. | |
97 CHECK(!IsFileDescriptorProtected(fd)) << "fd: " << fd; | |
98 | |
99 // Crash by the same reason as in scoped_file.cc. | |
100 PCHECK(0 == IGNORE_EINTR(__real_close(fd))); | |
101 return 0; | |
102 } | |
103 | |
104 } // extern "C" | |
105 | |
106 #endif // defined(COMPILER_GCC) | |
OLD | NEW |