| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "sandbox/linux/services/syscall_wrappers.h" | 5 #include "sandbox/linux/services/syscall_wrappers.h" |
| 6 | 6 |
| 7 #include <pthread.h> | 7 #include <pthread.h> |
| 8 #include <sched.h> | 8 #include <sched.h> |
| 9 #include <setjmp.h> | 9 #include <setjmp.h> |
| 10 #include <sys/resource.h> | 10 #include <sys/resource.h> |
| (...skipping 44 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 55 | 55 |
| 56 // Should not be reached. | 56 // Should not be reached. |
| 57 RAW_CHECK(false); | 57 RAW_CHECK(false); |
| 58 return 1; | 58 return 1; |
| 59 } | 59 } |
| 60 | 60 |
| 61 // This function is noinline to ensure that stack_buf is below the stack pointer | 61 // This function is noinline to ensure that stack_buf is below the stack pointer |
| 62 // that is saved when setjmp is called below. This is needed because when | 62 // that is saved when setjmp is called below. This is needed because when |
| 63 // compiled with FORTIFY_SOURCE, glibc's longjmp checks that the stack is moved | 63 // compiled with FORTIFY_SOURCE, glibc's longjmp checks that the stack is moved |
| 64 // upwards. See crbug.com/442912 for more details. | 64 // upwards. See crbug.com/442912 for more details. |
| 65 #if defined(ADDRESS_SANITIZER) |
| 66 // Disable AddressSanitizer instrumentation for this function to make sure |
| 67 // |stack_buf| is allocated on thread stack instead of ASan's fake stack. |
| 68 // Under ASan longjmp() will attempt to clean up the area between the old and |
| 69 // new stack pointers and print a warning that may confuse the user. |
| 70 __attribute__((no_sanitize_address)) |
| 71 #endif |
| 65 NOINLINE pid_t CloneAndLongjmpInChild(unsigned long flags, | 72 NOINLINE pid_t CloneAndLongjmpInChild(unsigned long flags, |
| 66 pid_t* ptid, | 73 pid_t* ptid, |
| 67 pid_t* ctid, | 74 pid_t* ctid, |
| 68 jmp_buf* env) { | 75 jmp_buf* env) { |
| 69 // We use the libc clone wrapper instead of making the syscall | 76 // We use the libc clone wrapper instead of making the syscall |
| 70 // directly because making the syscall may fail to update the libc's | 77 // directly because making the syscall may fail to update the libc's |
| 71 // internal pid cache. The libc interface unfortunately requires | 78 // internal pid cache. The libc interface unfortunately requires |
| 72 // specifying a new stack, so we use setjmp/longjmp to emulate | 79 // specifying a new stack, so we use setjmp/longjmp to emulate |
| 73 // fork-like behavior. | 80 // fork-like behavior. |
| 74 char stack_buf[PTHREAD_STACK_MIN]; | 81 char stack_buf[PTHREAD_STACK_MIN]; |
| (...skipping 66 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 141 } | 148 } |
| 142 | 149 |
| 143 int sys_prlimit64(pid_t pid, | 150 int sys_prlimit64(pid_t pid, |
| 144 int resource, | 151 int resource, |
| 145 const struct rlimit64* new_limit, | 152 const struct rlimit64* new_limit, |
| 146 struct rlimit64* old_limit) { | 153 struct rlimit64* old_limit) { |
| 147 return syscall(__NR_prlimit64, pid, resource, new_limit, old_limit); | 154 return syscall(__NR_prlimit64, pid, resource, new_limit, old_limit); |
| 148 } | 155 } |
| 149 | 156 |
| 150 } // namespace sandbox | 157 } // namespace sandbox |
| OLD | NEW |