Index: base/files/protect_file_posix.cc |
diff --git a/base/files/protect_file_posix.cc b/base/files/protect_file_posix.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..e4753c4019f2e40e466c9b66ca09f4b1aa8fe282 |
--- /dev/null |
+++ b/base/files/protect_file_posix.cc |
@@ -0,0 +1,106 @@ |
+// Copyright 2014 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "base/containers/hash_tables.h" |
+#include "base/files/file.h" |
+#include "base/lazy_instance.h" |
+#include "base/logging.h" |
+#include "base/posix/eintr_wrapper.h" |
+#include "base/synchronization/lock.h" |
+ |
+// These hooks provided for base::File perform additional sanity checks when |
+// files are closed. These extra checks are hard to understand and maintain, |
+// hence they are temporary. TODO(pasko): Remove these extra checks as soon as |
+// crbug.com/424562 is fixed. |
+// |
+// Background: |
+// 1. The browser process crashes if a call to close() provided by the C |
+// library (i.e. close(3)) fails. This is done for security purposes. See |
+// base/files/scoped_file.cc. When a crash like this happens, there is not |
+// enough context in the minidump to triage the problem. |
+// 2. base::File provides a good abstraction to prevent closing incorrect |
+// file descriptors or double-closing. Closing non-owned file descriptors |
+// would more likely happen from outside base::File and base::ScopedFD. |
+// |
+// These hooks intercept base::File operations to 'protect' file handles / |
+// descriptors from accidental close(3) by other portions of the code being |
+// linked into the browser. Also, this file provides an interceptor for the |
+// close(3) itself, and requires to be linked with cooperation of |
+// --Wl,--wrap=close (i.e. linker wrapping). |
+// |
+// Wrapping close(3) on all libraries can lead to confusion, particularly for |
+// the libraries that do not use ::base (I am also looking at you, |
+// crazy_linker). Instead two hooks are added to base::File, which are |
+// implemented as no-op by default. This file should be linked into the Chrome |
+// native binary(-ies) for a whitelist of targets where "file descriptor |
+// protection" is useful. |
+ |
+// With compilers other than GCC/Clang the wrapper is trivial. This is to avoid |
+// overexercising mechanisms for overriding weak symbols. |
+#if !defined(COMPILER_GCC) |
+extern "C" { |
+ |
+int __real_close(int fd); |
+ |
+BASE_EXPORT int __wrap_close(int fd) { |
+ return __real_close(fd); |
+} |
+ |
+} // extern "C" |
+ |
+#else // defined(COMPILER_GCC) |
+ |
+namespace { |
+ |
+// Protects the |g_protected_fd_set|. |
+base::LazyInstance<base::Lock>::Leaky g_lock = LAZY_INSTANCE_INITIALIZER; |
+ |
+// Holds the set of all 'protected' file descriptors. |
+base::LazyInstance<base::hash_set<int> >::Leaky g_protected_fd_set = |
+ LAZY_INSTANCE_INITIALIZER; |
+ |
+bool IsFileDescriptorProtected(int fd) { |
+ base::AutoLock lock(*g_lock.Pointer()); |
+ return g_protected_fd_set.Get().count(fd) != 0; |
+} |
+ |
+} // namespace |
+ |
+namespace base { |
+ |
+BASE_EXPORT void ProtectFileDescriptor(int fd) { |
+ base::AutoLock lock(g_lock.Get()); |
+ CHECK(!g_protected_fd_set.Get().count(fd)) << "fd: " << fd; |
+ g_protected_fd_set.Get().insert(fd); |
+} |
+ |
+BASE_EXPORT void UnprotectFileDescriptor(int fd) { |
+ base::AutoLock lock(*g_lock.Pointer()); |
+ CHECK(g_protected_fd_set.Get().erase(fd)) << "fd: " << fd; |
+} |
+ |
+} // namespace base |
+ |
+extern "C" { |
+ |
+int __real_close(int fd); |
+ |
+BASE_EXPORT int __wrap_close(int fd) { |
+ // The crash happens here if a protected file descriptor was attempted to be |
+ // closed without first being unprotected. Unprotection happens only in |
+ // base::File. In other words this is an "early crash" as compared to the one |
+ // happening in scoped_file.cc. |
+ // |
+ // Getting an earlier crash provides a more useful stack trace (minidump) |
+ // allowing to debug deeper into the thread that freed the wrong resource. |
+ CHECK(!IsFileDescriptorProtected(fd)) << "fd: " << fd; |
+ |
+ // Crash by the same reason as in scoped_file.cc. |
+ PCHECK(0 == IGNORE_EINTR(__real_close(fd))); |
+ return 0; |
+} |
+ |
+} // extern "C" |
+ |
+#endif // defined(COMPILER_GCC) |