OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // A mini-zygote specifically for Native Client. | 5 // A mini-zygote specifically for Native Client. |
6 | 6 |
7 #include "chrome/common/nacl_helper_linux.h" | 7 #include "chrome/common/nacl_helper_linux.h" |
8 | 8 |
9 #include <errno.h> | 9 #include <errno.h> |
10 #include <link.h> | 10 #include <link.h> |
(...skipping 180 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
191 char *endp; | 191 char *endp; |
192 prereserved_sandbox_size = | 192 prereserved_sandbox_size = |
193 strtoul(reserved_at_zero_switch_value.c_str(), &endp, 0); | 193 strtoul(reserved_at_zero_switch_value.c_str(), &endp, 0); |
194 if (*endp != '\0') | 194 if (*endp != '\0') |
195 LOG(ERROR) << "Could not parse reserved_at_zero argument value of " | 195 LOG(ERROR) << "Could not parse reserved_at_zero argument value of " |
196 << reserved_at_zero_switch_value; | 196 << reserved_at_zero_switch_value; |
197 } | 197 } |
198 return prereserved_sandbox_size; | 198 return prereserved_sandbox_size; |
199 } | 199 } |
200 | 200 |
| 201 #if defined(ADDRESS_SANITIZER) |
| 202 // Do not install the SIGSEGV handler in ASan. This should make the NaCl |
| 203 // platform qualification test pass. |
| 204 static const char kAsanDefaultOptionsNaCl[] = "handle_segv=0"; |
| 205 |
| 206 // Override the default ASan options for the NaCl helper. |
| 207 // __asan_default_options should not be instrumented, because it is called |
| 208 // before ASan is initialized. |
| 209 extern "C" |
| 210 __attribute__((no_address_safety_analysis)) |
| 211 const char *__asan_default_options() { |
| 212 return kAsanDefaultOptionsNaCl; |
| 213 } |
| 214 #endif |
| 215 |
201 int main(int argc, char *argv[]) { | 216 int main(int argc, char *argv[]) { |
202 CommandLine::Init(argc, argv); | 217 CommandLine::Init(argc, argv); |
203 base::AtExitManager exit_manager; | 218 base::AtExitManager exit_manager; |
204 base::RandUint64(); // acquire /dev/urandom fd before sandbox is raised | 219 base::RandUint64(); // acquire /dev/urandom fd before sandbox is raised |
205 #if !defined(CHROMIUM_SELINUX) | 220 #if !defined(CHROMIUM_SELINUX) |
206 // Allows NSS to fopen() /dev/urandom. | 221 // Allows NSS to fopen() /dev/urandom. |
207 sandbox::InitLibcUrandomOverrides(); | 222 sandbox::InitLibcUrandomOverrides(); |
208 #endif | 223 #endif |
209 #if defined(USE_NSS) | 224 #if defined(USE_NSS) |
210 // Configure NSS for use inside the NaCl process. | 225 // Configure NSS for use inside the NaCl process. |
(...skipping 48 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
259 _exit(-1); | 274 _exit(-1); |
260 } | 275 } |
261 // if fork fails, send PID=-1 to zygote | 276 // if fork fails, send PID=-1 to zygote |
262 if (!UnixDomainSocket::SendMsg(kNaClZygoteDescriptor, &badpid, | 277 if (!UnixDomainSocket::SendMsg(kNaClZygoteDescriptor, &badpid, |
263 sizeof(badpid), empty)) { | 278 sizeof(badpid), empty)) { |
264 LOG(ERROR) << "*** send() to zygote failed"; | 279 LOG(ERROR) << "*** send() to zygote failed"; |
265 } | 280 } |
266 } | 281 } |
267 CHECK(false); // This routine must not return | 282 CHECK(false); // This routine must not return |
268 } | 283 } |
OLD | NEW |