Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(58)

Side by Side Diff: sandbox/linux/services/syscall_wrappers.cc

Issue 831373002: Move ForkWithFlags from sandbox/ to base/ and plug it into LaunchProcess. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Respond to comments. Created 5 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "sandbox/linux/services/syscall_wrappers.h" 5 #include "sandbox/linux/services/syscall_wrappers.h"
6 6
7 #include <pthread.h> 7 #include <pthread.h>
8 #include <sched.h> 8 #include <sched.h>
9 #include <setjmp.h> 9 #include <setjmp.h>
10 #include <sys/resource.h> 10 #include <sys/resource.h>
(...skipping 11 matching lines...) Expand all
22 namespace sandbox { 22 namespace sandbox {
23 23
24 pid_t sys_getpid(void) { 24 pid_t sys_getpid(void) {
25 return syscall(__NR_getpid); 25 return syscall(__NR_getpid);
26 } 26 }
27 27
28 pid_t sys_gettid(void) { 28 pid_t sys_gettid(void) {
29 return syscall(__NR_gettid); 29 return syscall(__NR_gettid);
30 } 30 }
31 31
32 namespace { 32 long sys_clone(unsigned long flags,
33 33 decltype(nullptr) child_stack,
34 bool CloneArgumentsValid(unsigned long flags, pid_t* ptid, pid_t* ctid) { 34 pid_t* ptid,
35 pid_t* ctid,
36 decltype(nullptr) tls) {
35 const bool clone_tls_used = flags & CLONE_SETTLS; 37 const bool clone_tls_used = flags & CLONE_SETTLS;
36 const bool invalid_ctid = 38 const bool invalid_ctid =
37 (flags & (CLONE_CHILD_SETTID | CLONE_CHILD_CLEARTID)) && !ctid; 39 (flags & (CLONE_CHILD_SETTID | CLONE_CHILD_CLEARTID)) && !ctid;
38 const bool invalid_ptid = (flags & CLONE_PARENT_SETTID) && !ptid; 40 const bool invalid_ptid = (flags & CLONE_PARENT_SETTID) && !ptid;
39 41
40 // We do not support CLONE_VM. 42 // We do not support CLONE_VM.
41 const bool clone_vm_used = flags & CLONE_VM; 43 const bool clone_vm_used = flags & CLONE_VM;
42 44 if (clone_tls_used || invalid_ctid || invalid_ptid || clone_vm_used) {
43 return !(clone_tls_used || invalid_ctid || invalid_ptid || clone_vm_used);
44 }
45
46 bool IsRunningOnValgrind() {
47 return RUNNING_ON_VALGRIND;
48 }
49
50 // This function runs on the stack specified on the clone call. It uses longjmp
51 // to switch back to the original stack so the child can return from sys_clone.
52 int CloneHelper(void* arg) {
53 jmp_buf* env_ptr = reinterpret_cast<jmp_buf*>(arg);
54 longjmp(*env_ptr, 1);
55
56 // Should not be reached.
57 RAW_CHECK(false);
58 return 1;
59 }
60
61 // This function is noinline to ensure that stack_buf is below the stack pointer
62 // that is saved when setjmp is called below. This is needed because when
63 // compiled with FORTIFY_SOURCE, glibc's longjmp checks that the stack is moved
64 // upwards. See crbug.com/442912 for more details.
65 #if defined(ADDRESS_SANITIZER)
66 // Disable AddressSanitizer instrumentation for this function to make sure
67 // |stack_buf| is allocated on thread stack instead of ASan's fake stack.
68 // Under ASan longjmp() will attempt to clean up the area between the old and
69 // new stack pointers and print a warning that may confuse the user.
70 __attribute__((no_sanitize_address))
71 #endif
72 NOINLINE pid_t CloneAndLongjmpInChild(unsigned long flags,
73 pid_t* ptid,
74 pid_t* ctid,
75 jmp_buf* env) {
76 // We use the libc clone wrapper instead of making the syscall
77 // directly because making the syscall may fail to update the libc's
78 // internal pid cache. The libc interface unfortunately requires
79 // specifying a new stack, so we use setjmp/longjmp to emulate
80 // fork-like behavior.
81 char stack_buf[PTHREAD_STACK_MIN];
82 #if defined(ARCH_CPU_X86_FAMILY) || defined(ARCH_CPU_ARM_FAMILY) || \
83 defined(ARCH_CPU_MIPS64_FAMILY) || defined(ARCH_CPU_MIPS_FAMILY)
84 // The stack grows downward.
85 void* stack = stack_buf + sizeof(stack_buf);
86 #else
87 #error "Unsupported architecture"
88 #endif
89 return clone(&CloneHelper, stack, flags, env, ptid, nullptr, ctid);
90 }
91
92 } // namespace
93
94 long sys_clone(unsigned long flags,
95 decltype(nullptr) child_stack,
96 pid_t* ptid,
97 pid_t* ctid,
98 decltype(nullptr) tls) {
99
100 if (!CloneArgumentsValid(flags, ptid, ctid)) {
101 RAW_LOG(FATAL, "Invalid usage of sys_clone"); 45 RAW_LOG(FATAL, "Invalid usage of sys_clone");
102 } 46 }
103 47
104 // See kernel/fork.c in Linux. There is different ordering of sys_clone 48 // See kernel/fork.c in Linux. There is different ordering of sys_clone
105 // parameters depending on CONFIG_CLONE_BACKWARDS* configuration options. 49 // parameters depending on CONFIG_CLONE_BACKWARDS* configuration options.
106 #if defined(ARCH_CPU_X86_64) 50 #if defined(ARCH_CPU_X86_64)
107 return syscall(__NR_clone, flags, child_stack, ptid, ctid, tls); 51 return syscall(__NR_clone, flags, child_stack, ptid, ctid, tls);
108 #elif defined(ARCH_CPU_X86) || defined(ARCH_CPU_ARM_FAMILY) || \ 52 #elif defined(ARCH_CPU_X86) || defined(ARCH_CPU_ARM_FAMILY) || \
109 defined(ARCH_CPU_MIPS_FAMILY) || defined(ARCH_CPU_MIPS64_FAMILY) 53 defined(ARCH_CPU_MIPS_FAMILY) || defined(ARCH_CPU_MIPS64_FAMILY)
110 // CONFIG_CLONE_BACKWARDS defined. 54 // CONFIG_CLONE_BACKWARDS defined.
111 return syscall(__NR_clone, flags, child_stack, ptid, tls, ctid); 55 return syscall(__NR_clone, flags, child_stack, ptid, tls, ctid);
112 #endif 56 #endif
113 } 57 }
114 58
115 long sys_clone(unsigned long flags) { 59 long sys_clone(unsigned long flags) {
116 return sys_clone(flags, nullptr, nullptr, nullptr, nullptr); 60 return sys_clone(flags, nullptr, nullptr, nullptr, nullptr);
117 } 61 }
118 62
119 pid_t ForkWithFlags(unsigned long flags, pid_t* ptid, pid_t* ctid) {
120 if (!CloneArgumentsValid(flags, ptid, ctid)) {
121 RAW_LOG(FATAL, "Invalid usage of ForkWithFlags");
122 }
123
124 // Valgrind's clone implementation does not support specifiying a child_stack
125 // without CLONE_VM, so we cannot use libc's clone wrapper when running under
126 // Valgrind. As a result, the libc pid cache may be incorrect under Valgrind.
127 // See crbug.com/442817 for more details.
128 if (IsRunningOnValgrind()) {
129 return sys_clone(flags, nullptr, ptid, ctid, nullptr);
130 }
131
132 jmp_buf env;
133 if (setjmp(env) == 0) {
134 return CloneAndLongjmpInChild(flags, ptid, ctid, &env);
135 }
136
137 return 0;
138 }
139
140 void sys_exit_group(int status) { 63 void sys_exit_group(int status) {
141 syscall(__NR_exit_group, status); 64 syscall(__NR_exit_group, status);
142 } 65 }
143 66
144 int sys_seccomp(unsigned int operation, 67 int sys_seccomp(unsigned int operation,
145 unsigned int flags, 68 unsigned int flags,
146 const struct sock_fprog* args) { 69 const struct sock_fprog* args) {
147 return syscall(__NR_seccomp, operation, flags, args); 70 return syscall(__NR_seccomp, operation, flags, args);
148 } 71 }
149 72
150 int sys_prlimit64(pid_t pid, 73 int sys_prlimit64(pid_t pid,
151 int resource, 74 int resource,
152 const struct rlimit64* new_limit, 75 const struct rlimit64* new_limit,
153 struct rlimit64* old_limit) { 76 struct rlimit64* old_limit) {
154 return syscall(__NR_prlimit64, pid, resource, new_limit, old_limit); 77 return syscall(__NR_prlimit64, pid, resource, new_limit, old_limit);
155 } 78 }
156 79
157 } // namespace sandbox 80 } // namespace sandbox
OLDNEW
« no previous file with comments | « sandbox/linux/services/syscall_wrappers.h ('k') | sandbox/linux/services/syscall_wrappers_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698