summaryrefslogtreecommitdiffstats
path: root/content/zygote
diff options
context:
space:
mode:
authorjln@chromium.org <jln@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-05-23 00:54:14 +0000
committerjln@chromium.org <jln@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-05-23 00:54:14 +0000
commit4cbc5788c39d5761b808116d58cb2e2f2048decb (patch)
tree9ba39432018a31c66618598c09d22e0af68b5a95 /content/zygote
parent7b56f187c5553a38ceb4741ed8daa05a179034aa (diff)
downloadchromium_src-4cbc5788c39d5761b808116d58cb2e2f2048decb.zip
chromium_src-4cbc5788c39d5761b808116d58cb2e2f2048decb.tar.gz
chromium_src-4cbc5788c39d5761b808116d58cb2e2f2048decb.tar.bz2
Have Zygote fork a init-like process if required
When we use the setuid sandbox, Zygote may get launched in a new PID namespace, with pid == 1. In that case we need to act as a init process and reap zombies. BUG=125821,109944 TEST= NOTRY=true Review URL: https://chromiumcodereview.appspot.com/10417019 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@138409 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'content/zygote')
-rw-r--r--content/zygote/zygote_main_linux.cc83
1 files changed, 83 insertions, 0 deletions
diff --git a/content/zygote/zygote_main_linux.cc b/content/zygote/zygote_main_linux.cc
index f907364..21c09c4 100644
--- a/content/zygote/zygote_main_linux.cc
+++ b/content/zygote/zygote_main_linux.cc
@@ -31,6 +31,7 @@
#include "content/common/sandbox_methods_linux.h"
#include "content/common/seccomp_sandbox.h"
#include "content/common/unix_domain_socket_posix.h"
+#include "content/common/zygote_commands_linux.h"
#include "content/public/common/content_switches.h"
#include "content/public/common/main_function_params.h"
#include "content/public/common/sandbox_linux.h"
@@ -441,6 +442,79 @@ static void PreSandboxInit() {
}
#if !defined(CHROMIUM_SELINUX)
+// Do nothing here
+static void SIGCHLDHandler(int signal) {
+}
+
+// The current process will become a process reaper like init.
+// We fork a child that will continue normally, when it dies, we can safely
+// exit.
+// We need to be careful we close the magic kZygoteIdFd properly in the parent
+// before this function returns.
+static bool CreateInitProcessReaper() {
+ int sync_fds[2];
+ // We want to use send, so we can't use a pipe
+ if (socketpair(AF_UNIX, SOCK_STREAM, 0, sync_fds)) {
+ LOG(ERROR) << "Failed to create socketpair";
+ return false;
+ }
+
+ // We use normal fork, not the ForkDelegate in this case since we are not a
+ // true Zygote yet.
+ pid_t child_pid = fork();
+ if (child_pid == -1) {
+ (void) HANDLE_EINTR(close(sync_fds[0]));
+ (void) HANDLE_EINTR(close(sync_fds[1]));
+ return false;
+ }
+ if (child_pid) {
+ // We are the parent, assuming the role of an init process.
+ // The disposition for SIGCHLD cannot be SIG_IGN or wait() will only return
+ // once all of our childs are dead. Since we're init we need to reap childs
+ // as they come.
+ struct sigaction action;
+ memset(&action, 0, sizeof(action));
+ action.sa_handler = &SIGCHLDHandler;
+ CHECK(sigaction(SIGCHLD, &action, NULL) == 0);
+
+ (void) HANDLE_EINTR(close(sync_fds[0]));
+ shutdown(sync_fds[1], SHUT_RD);
+ // This "magic" socket must only appear in one process.
+ (void) HANDLE_EINTR(close(content::kZygoteIdFd));
+ // Tell the child to continue
+ CHECK(HANDLE_EINTR(send(sync_fds[1], "C", 1, MSG_NOSIGNAL)) == 1);
+
+ for (;;) {
+ // Loop until we have reaped our one natural child
+ siginfo_t reaped_child_info;
+ pid_t reaped_child =
+ HANDLE_EINTR(waitid(P_ALL, 0, &reaped_child_info, WEXITED));
+ if (reaped_child == -1)
+ _exit(1);
+ if (reaped_child_info.si_pid == child_pid) {
+ int exit_code = 0;
+ // We're done waiting
+ if (reaped_child_info.si_code == CLD_EXITED) {
+ exit_code = reaped_child_info.si_status;
+ }
+ // Exit with the same exit code as our parent. This is most likely
+ // useless. _exit with 0 if we got signaled.
+ _exit(exit_code);
+ }
+ }
+ } else {
+ // The child needs to wait for the parent to close kZygoteIdFd to avoid a
+ // race condition
+ (void) HANDLE_EINTR(close(sync_fds[1]));
+ shutdown(sync_fds[0], SHUT_WR);
+ char should_continue;
+ if (HANDLE_EINTR(read(sync_fds[0], &should_continue, 1)) == 1)
+ return true;
+ else
+ return false;
+ }
+}
+
// This will set the *using_suid_sandbox variable to true if the SUID sandbox
// is enabled. This does not necessarily exclude other types of sandboxing.
static bool EnterSandbox(bool* using_suid_sandbox) {
@@ -484,6 +558,15 @@ static bool EnterSandbox(bool* using_suid_sandbox) {
return false;
}
+ if (getpid() == 1) {
+ // The setuid sandbox has created a new PID namespace and we need
+ // to assume the role of init.
+ if (!CreateInitProcessReaper()) {
+ LOG(ERROR) << "Error creating an init process to reap zombies";
+ return false;
+ }
+ }
+
#if !defined(OS_OPENBSD)
// Previously, we required that the binary be non-readable. This causes the
// kernel to mark the process as non-dumpable at startup. The thinking was