OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 // A mini-zygote specifically for Native Client. | |
6 | |
7 #include "chrome/common/nacl_helper_linux.h" | |
8 | |
9 #include <errno.h> | |
10 #include <fcntl.h> | |
11 #include <link.h> | |
12 #include <stdio.h> | |
13 #include <stdlib.h> | |
14 #include <sys/socket.h> | |
15 #include <sys/stat.h> | |
16 #include <sys/types.h> | |
17 | |
18 #include <string> | |
19 #include <vector> | |
20 | |
21 #include "base/at_exit.h" | |
22 #include "base/command_line.h" | |
23 #include "base/json/string_escape.h" | |
24 #include "base/logging.h" | |
25 #include "base/message_loop.h" | |
26 #include "base/posix/eintr_wrapper.h" | |
27 #include "base/posix/global_descriptors.h" | |
28 #include "base/posix/unix_domain_socket_linux.h" | |
29 #include "base/rand_util.h" | |
30 #include "chrome/nacl/nacl_listener.h" | |
31 #include "crypto/nss_util.h" | |
32 #include "ipc/ipc_descriptors.h" | |
33 #include "ipc/ipc_switches.h" | |
34 #include "sandbox/linux/services/libc_urandom_override.h" | |
35 | |
36 namespace { | |
37 | |
38 // The child must mimic the behavior of zygote_main_linux.cc on the child | |
39 // side of the fork. See zygote_main_linux.cc:HandleForkRequest from | |
40 // if (!child) { | |
41 // Note: this code doesn't attempt to support the SECCOMP sandbox. | |
42 void BecomeNaClLoader(const std::vector<int>& child_fds, | |
43 size_t prereserved_sandbox_size) { | |
44 VLOG(1) << "NaCl loader: setting up IPC descriptor"; | |
45 // don't need zygote FD any more | |
46 if (HANDLE_EINTR(close(kNaClZygoteDescriptor)) != 0) | |
47 LOG(ERROR) << "close(kNaClZygoteDescriptor) failed."; | |
48 base::GlobalDescriptors::GetInstance()->Set(kPrimaryIPCChannel, | |
49 child_fds[kNaClBrowserFDIndex]); | |
50 | |
51 base::MessageLoopForIO main_message_loop; | |
52 NaClListener listener; | |
53 listener.set_prereserved_sandbox_size(prereserved_sandbox_size); | |
54 listener.Listen(); | |
55 _exit(0); | |
56 } | |
57 | |
58 // Some of this code was lifted from | |
59 // content/browser/zygote_main_linux.cc:ForkWithRealPid() | |
60 void HandleForkRequest(const std::vector<int>& child_fds, | |
61 size_t prereserved_sandbox_size) { | |
62 VLOG(1) << "nacl_helper: forking"; | |
63 pid_t childpid = fork(); | |
64 if (childpid < 0) { | |
65 perror("fork"); | |
66 LOG(ERROR) << "*** HandleForkRequest failed\n"; | |
67 // fall through to parent case below | |
68 } else if (childpid == 0) { // In the child process. | |
69 bool validack = false; | |
70 const size_t kMaxReadSize = 1024; | |
71 char buffer[kMaxReadSize]; | |
72 // Wait until the parent process has discovered our PID. We | |
73 // should not fork any child processes (which the seccomp | |
74 // sandbox does) until then, because that can interfere with the | |
75 // parent's discovery of our PID. | |
76 const int nread = HANDLE_EINTR(read(child_fds[kNaClParentFDIndex], buffer, | |
77 kMaxReadSize)); | |
78 const std::string switch_prefix = std::string("--") + | |
79 switches::kProcessChannelID + std::string("="); | |
80 const size_t len = switch_prefix.length(); | |
81 | |
82 if (nread < 0) { | |
83 perror("read"); | |
84 LOG(ERROR) << "read returned " << nread; | |
85 } else if (nread > static_cast<int>(len)) { | |
86 if (switch_prefix.compare(0, len, buffer, 0, len) == 0) { | |
87 VLOG(1) << "NaCl loader is synchronised with Chrome zygote"; | |
88 CommandLine::ForCurrentProcess()->AppendSwitchASCII( | |
89 switches::kProcessChannelID, | |
90 std::string(&buffer[len], nread - len)); | |
91 validack = true; | |
92 } | |
93 } | |
94 if (HANDLE_EINTR(close(child_fds[kNaClDummyFDIndex])) != 0) | |
95 LOG(ERROR) << "close(child_fds[kNaClDummyFDIndex]) failed"; | |
96 if (HANDLE_EINTR(close(child_fds[kNaClParentFDIndex])) != 0) | |
97 LOG(ERROR) << "close(child_fds[kNaClParentFDIndex]) failed"; | |
98 if (validack) { | |
99 BecomeNaClLoader(child_fds, prereserved_sandbox_size); | |
100 } else { | |
101 LOG(ERROR) << "Failed to synch with zygote"; | |
102 } | |
103 // NOTREACHED | |
104 return; | |
105 } | |
106 // I am the parent. | |
107 // First, close the dummy_fd so the sandbox won't find me when | |
108 // looking for the child's pid in /proc. Also close other fds. | |
109 for (size_t i = 0; i < child_fds.size(); i++) { | |
110 if (HANDLE_EINTR(close(child_fds[i])) != 0) | |
111 LOG(ERROR) << "close(child_fds[i]) failed"; | |
112 } | |
113 VLOG(1) << "nacl_helper: childpid is " << childpid; | |
114 // Now tell childpid to the Chrome zygote. | |
115 if (HANDLE_EINTR(send(kNaClZygoteDescriptor, | |
116 &childpid, sizeof(childpid), MSG_EOR)) | |
117 != sizeof(childpid)) { | |
118 LOG(ERROR) << "*** send() to zygote failed"; | |
119 } | |
120 } | |
121 | |
122 // This is a poor man's check on whether we are sandboxed. | |
123 bool IsSandboxed() { | |
124 int proc_fd = open("/proc/self/exe", O_RDONLY); | |
125 if (proc_fd >= 0) { | |
126 HANDLE_EINTR(close(proc_fd)); | |
127 return false; | |
128 } | |
129 return true; | |
130 } | |
131 | |
132 } // namespace | |
133 | |
134 static const char kNaClHelperReservedAtZero[] = "reserved_at_zero"; | |
135 static const char kNaClHelperRDebug[] = "r_debug"; | |
136 | |
137 // Since we were started by nacl_helper_bootstrap rather than in the | |
138 // usual way, the debugger cannot figure out where our executable | |
139 // or the dynamic linker or the shared libraries are in memory, | |
140 // so it won't find any symbols. But we can fake it out to find us. | |
141 // | |
142 // The zygote passes --r_debug=0xXXXXXXXXXXXXXXXX. | |
143 // nacl_helper_bootstrap replaces the Xs with the address of its _r_debug | |
144 // structure. The debugger will look for that symbol by name to | |
145 // discover the addresses of key dynamic linker data structures. | |
146 // Since all it knows about is the original main executable, which | |
147 // is the bootstrap program, it finds the symbol defined there. The | |
148 // dynamic linker's structure is somewhere else, but it is filled in | |
149 // after initialization. The parts that really matter to the | |
150 // debugger never change. So we just copy the contents of the | |
151 // dynamic linker's structure into the address provided by the option. | |
152 // Hereafter, if someone attaches a debugger (or examines a core dump), | |
153 // the debugger will find all the symbols in the normal way. | |
154 static void CheckRDebug(char* argv0) { | |
155 std::string r_debug_switch_value = | |
156 CommandLine::ForCurrentProcess()->GetSwitchValueASCII(kNaClHelperRDebug); | |
157 if (!r_debug_switch_value.empty()) { | |
158 char* endp; | |
159 uintptr_t r_debug_addr = strtoul(r_debug_switch_value.c_str(), &endp, 0); | |
160 if (r_debug_addr != 0 && *endp == '\0') { | |
161 r_debug* bootstrap_r_debug = reinterpret_cast<r_debug*>(r_debug_addr); | |
162 *bootstrap_r_debug = _r_debug; | |
163 | |
164 // Since the main executable (the bootstrap program) does not | |
165 // have a dynamic section, the debugger will not skip the | |
166 // first element of the link_map list as it usually would for | |
167 // an executable or PIE that was loaded normally. But the | |
168 // dynamic linker has set l_name for the PIE to "" as is | |
169 // normal for the main executable. So the debugger doesn't | |
170 // know which file it is. Fill in the actual file name, which | |
171 // came in as our argv[0]. | |
172 link_map* l = _r_debug.r_map; | |
173 if (l->l_name[0] == '\0') | |
174 l->l_name = argv0; | |
175 } | |
176 } | |
177 } | |
178 | |
179 // The zygote passes --reserved_at_zero=0xXXXXXXXXXXXXXXXX. | |
180 // nacl_helper_bootstrap replaces the Xs with the amount of prereserved | |
181 // sandbox memory. | |
182 // | |
183 // CheckReservedAtZero parses the value of the argument reserved_at_zero | |
184 // and returns the amount of prereserved sandbox memory. | |
185 static size_t CheckReservedAtZero() { | |
186 size_t prereserved_sandbox_size = 0; | |
187 std::string reserved_at_zero_switch_value = | |
188 CommandLine::ForCurrentProcess()->GetSwitchValueASCII( | |
189 kNaClHelperReservedAtZero); | |
190 if (!reserved_at_zero_switch_value.empty()) { | |
191 char* endp; | |
192 prereserved_sandbox_size = | |
193 strtoul(reserved_at_zero_switch_value.c_str(), &endp, 0); | |
194 if (*endp != '\0') | |
195 LOG(ERROR) << "Could not parse reserved_at_zero argument value of " | |
196 << reserved_at_zero_switch_value; | |
197 } | |
198 return prereserved_sandbox_size; | |
199 } | |
200 | |
201 #if defined(ADDRESS_SANITIZER) | |
202 // Do not install the SIGSEGV handler in ASan. This should make the NaCl | |
203 // platform qualification test pass. | |
204 static const char kAsanDefaultOptionsNaCl[] = "handle_segv=0"; | |
205 | |
206 // Override the default ASan options for the NaCl helper. | |
207 // __asan_default_options should not be instrumented, because it is called | |
208 // before ASan is initialized. | |
209 extern "C" | |
210 __attribute__((no_address_safety_analysis)) | |
211 const char* __asan_default_options() { | |
212 return kAsanDefaultOptionsNaCl; | |
213 } | |
214 #endif | |
215 | |
216 int main(int argc, char* argv[]) { | |
217 CommandLine::Init(argc, argv); | |
218 base::AtExitManager exit_manager; | |
219 base::RandUint64(); // acquire /dev/urandom fd before sandbox is raised | |
220 // Allows NSS to fopen() /dev/urandom. | |
221 sandbox::InitLibcUrandomOverrides(); | |
222 #if defined(USE_NSS) | |
223 // Configure NSS for use inside the NaCl process. | |
224 // The fork check has not caused problems for NaCl, but this appears to be | |
225 // best practice (see other places LoadNSSLibraries is called.) | |
226 crypto::DisableNSSForkCheck(); | |
227 // Without this line on Linux, HMAC::Init will instantiate a singleton that | |
228 // in turn attempts to open a file. Disabling this behavior avoids a ~70 ms | |
229 // stall the first time HMAC is used. | |
230 crypto::ForceNSSNoDBInit(); | |
231 // Load shared libraries before sandbox is raised. | |
232 // NSS is needed to perform hashing for validation caching. | |
233 crypto::LoadNSSLibraries(); | |
234 #endif | |
235 std::vector<int> empty; // for SendMsg() calls | |
236 size_t prereserved_sandbox_size = CheckReservedAtZero(); | |
237 | |
238 CheckRDebug(argv[0]); | |
239 | |
240 // Check that IsSandboxed() works. We should not be sandboxed at this point. | |
241 CHECK(!IsSandboxed()) << "Unexpectedly sandboxed!"; | |
242 | |
243 // Send the zygote a message to let it know we are ready to help | |
244 if (!UnixDomainSocket::SendMsg(kNaClZygoteDescriptor, | |
245 kNaClHelperStartupAck, | |
246 sizeof(kNaClHelperStartupAck), empty)) { | |
247 LOG(ERROR) << "*** send() to zygote failed"; | |
248 } | |
249 | |
250 while (true) { | |
251 int badpid = -1; | |
252 std::vector<int> fds; | |
253 static const unsigned kMaxMessageLength = 2048; | |
254 char buf[kMaxMessageLength]; | |
255 const ssize_t msglen = UnixDomainSocket::RecvMsg(kNaClZygoteDescriptor, | |
256 &buf, sizeof(buf), &fds); | |
257 // If the Zygote has started handling requests, we should be sandboxed via | |
258 // the setuid sandbox. | |
259 if (!IsSandboxed()) { | |
260 LOG(ERROR) << "NaCl helper process running without a sandbox!\n" | |
261 << "Most likely you need to configure your SUID sandbox " | |
262 << "correctly"; | |
263 } | |
264 if (msglen == 0 || (msglen == -1 && errno == ECONNRESET)) { | |
265 // EOF from the browser. Goodbye! | |
266 _exit(0); | |
267 } else if (msglen < 0) { | |
268 LOG(ERROR) << "nacl_helper: receive from zygote failed, errno = " | |
269 << errno; | |
270 } else if (msglen == sizeof(kNaClForkRequest) - 1 && | |
271 memcmp(buf, kNaClForkRequest, msglen) == 0) { | |
272 if (kNaClParentFDIndex + 1 == fds.size()) { | |
273 HandleForkRequest(fds, prereserved_sandbox_size); | |
274 continue; // fork succeeded. Note: child does not return | |
275 } else { | |
276 LOG(ERROR) << "nacl_helper: unexpected number of fds, got " | |
277 << fds.size(); | |
278 } | |
279 } else { | |
280 LOG(ERROR) << "nacl_helper unrecognized request: " | |
281 << base::GetDoubleQuotedJson(std::string(buf, buf + msglen)); | |
282 _exit(-1); | |
283 } | |
284 // if fork fails, send PID=-1 to zygote | |
285 if (!UnixDomainSocket::SendMsg(kNaClZygoteDescriptor, &badpid, | |
286 sizeof(badpid), empty)) { | |
287 LOG(ERROR) << "*** send() to zygote failed"; | |
288 } | |
289 } | |
290 CHECK(false); // This routine must not return | |
291 } | |
OLD | NEW |