naiveproxy/base/process/launch_fuchsia.cc
2018-08-11 05:35:24 +00:00

308 lines
10 KiB
C++

// Copyright 2017 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/process/launch.h"
#include <fdio/limits.h>
#include <fdio/namespace.h>
#include <fdio/util.h>
#include <launchpad/launchpad.h>
#include <stdint.h>
#include <unistd.h>
#include <zircon/process.h>
#include <zircon/processargs.h>
#include "base/command_line.h"
#include "base/files/file_util.h"
#include "base/fuchsia/default_job.h"
#include "base/fuchsia/fuchsia_logging.h"
#include "base/logging.h"
#include "base/memory/ptr_util.h"
#include "base/scoped_generic.h"
namespace base {
namespace {
bool GetAppOutputInternal(const CommandLine& cmd_line,
bool include_stderr,
std::string* output,
int* exit_code) {
DCHECK(exit_code);
LaunchOptions options;
// LaunchProcess will automatically clone any stdio fd we do not explicitly
// map.
int pipe_fd[2];
if (pipe(pipe_fd) < 0)
return false;
options.fds_to_remap.emplace_back(pipe_fd[1], STDOUT_FILENO);
if (include_stderr)
options.fds_to_remap.emplace_back(pipe_fd[1], STDERR_FILENO);
Process process = LaunchProcess(cmd_line, options);
close(pipe_fd[1]);
if (!process.IsValid()) {
close(pipe_fd[0]);
return false;
}
output->clear();
for (;;) {
char buffer[256];
ssize_t bytes_read = read(pipe_fd[0], buffer, sizeof(buffer));
if (bytes_read <= 0)
break;
output->append(buffer, bytes_read);
}
close(pipe_fd[0]);
return process.WaitForExit(exit_code);
}
bool MapPathsToLaunchpad(const std::vector<FilePath>& paths_to_map,
launchpad_t* lp) {
zx_status_t status;
// Build a array of null terminated strings, which which will be used as an
// argument for launchpad_set_nametable().
std::vector<const char*> paths_c_str;
paths_c_str.reserve(paths_to_map.size());
for (size_t paths_idx = 0; paths_idx < paths_to_map.size(); ++paths_idx) {
const FilePath& next_path = paths_to_map[paths_idx];
if (!PathExists(next_path)) {
DLOG(ERROR) << "Path does not exist: " << next_path;
return false;
}
File dir(next_path, File::FLAG_OPEN | File::FLAG_READ);
ScopedPlatformFile scoped_fd(dir.TakePlatformFile());
zx_handle_t handles[FDIO_MAX_HANDLES] = {};
uint32_t types[FDIO_MAX_HANDLES] = {};
zx_status_t num_handles =
fdio_transfer_fd(scoped_fd.get(), 0, handles, types);
// fdio_transfer_fd() returns number of transferred handles, or negative
// error.
if (num_handles <= 0) {
DCHECK_LT(num_handles, 0);
ZX_LOG(ERROR, num_handles) << "fdio_transfer_fd";
return false;
}
ScopedZxHandle scoped_handle(handles[0]);
ignore_result(scoped_fd.release());
// Close the handles that we won't use.
for (int i = 1; i < num_handles; ++i) {
zx_handle_close(handles[i]);
}
if (types[0] != PA_FDIO_REMOTE) {
LOG(ERROR) << "Handle type for " << next_path.AsUTF8Unsafe()
<< " is not PA_FDIO_REMOTE: " << types[0];
return false;
}
// Add the handle to the child's nametable.
// We use the macro PA_HND(..., <index>) to relate the handle to its
// position in the nametable, which is stored as an array of path strings
// |paths_str|.
status = launchpad_add_handle(lp, scoped_handle.release(),
PA_HND(PA_NS_DIR, paths_idx));
if (status != ZX_OK) {
ZX_LOG(ERROR, status) << "launchpad_add_handle";
return false;
}
paths_c_str.push_back(next_path.value().c_str());
}
if (!paths_c_str.empty()) {
status =
launchpad_set_nametable(lp, paths_c_str.size(), paths_c_str.data());
if (status != ZX_OK) {
ZX_LOG(ERROR, status) << "launchpad_set_nametable";
return false;
}
}
return true;
}
struct LaunchpadScopedTraits {
static launchpad_t* InvalidValue() { return nullptr; }
static void Free(launchpad_t* lp) { launchpad_destroy(lp); }
};
using ScopedLaunchpad = ScopedGeneric<launchpad_t*, LaunchpadScopedTraits>;
} // namespace
Process LaunchProcess(const CommandLine& cmdline,
const LaunchOptions& options) {
return LaunchProcess(cmdline.argv(), options);
}
// TODO(768416): Investigate whether we can make LaunchProcess() create
// unprivileged processes by default (no implicit capabilities are granted).
Process LaunchProcess(const std::vector<std::string>& argv,
const LaunchOptions& options) {
std::vector<const char*> argv_cstr;
argv_cstr.reserve(argv.size() + 1);
for (const auto& arg : argv)
argv_cstr.push_back(arg.c_str());
argv_cstr.push_back(nullptr);
// Note that per launchpad.h, the intention is that launchpad_ functions are
// used in a "builder" style. From launchpad_create() to launchpad_go() the
// status is tracked in the launchpad_t object, and launchpad_go() reports on
// the final status, and cleans up |lp| (assuming it was even created).
zx_handle_t job = options.job_handle != ZX_HANDLE_INVALID ? options.job_handle
: GetDefaultJob();
DCHECK_NE(ZX_HANDLE_INVALID, job);
ScopedLaunchpad lp;
zx_status_t status;
if ((status = launchpad_create(job, argv_cstr[0], lp.receive())) != ZX_OK) {
ZX_LOG(ERROR, status) << "launchpad_create(job)";
return Process();
}
if ((status = launchpad_load_from_file(lp.get(), argv_cstr[0])) != ZX_OK) {
ZX_LOG(ERROR, status) << "launchpad_load_from_file(" << argv_cstr[0] << ")";
return Process();
}
if ((status = launchpad_set_args(lp.get(), argv.size(), argv_cstr.data())) !=
ZX_OK) {
ZX_LOG(ERROR, status) << "launchpad_set_args";
return Process();
}
uint32_t to_clone = options.clone_flags;
std::unique_ptr<char* []> new_environ;
char* const empty_environ = nullptr;
char* const* old_environ = environ;
if (options.clear_environ)
old_environ = &empty_environ;
EnvironmentMap environ_modifications = options.environ;
if (!options.current_directory.empty()) {
environ_modifications["PWD"] = options.current_directory.value();
} else {
FilePath cwd;
GetCurrentDirectory(&cwd);
environ_modifications["PWD"] = cwd.value();
}
if (to_clone & LP_CLONE_DEFAULT_JOB) {
// Override Fuchsia's built in default job cloning behavior with our own
// logic which uses |job| instead of zx_job_default().
// This logic is based on the launchpad implementation.
zx_handle_t job_duplicate = ZX_HANDLE_INVALID;
if ((status = zx_handle_duplicate(job, ZX_RIGHT_SAME_RIGHTS,
&job_duplicate)) != ZX_OK) {
ZX_LOG(ERROR, status) << "zx_handle_duplicate";
return Process();
}
launchpad_add_handle(lp.get(), job_duplicate, PA_HND(PA_JOB_DEFAULT, 0));
to_clone &= ~LP_CLONE_DEFAULT_JOB;
}
if (!environ_modifications.empty())
new_environ = AlterEnvironment(old_environ, environ_modifications);
if (!environ_modifications.empty() || options.clear_environ)
launchpad_set_environ(lp.get(), new_environ.get());
else
to_clone |= LP_CLONE_ENVIRON;
if (!options.paths_to_map.empty()) {
DCHECK(!(to_clone & LP_CLONE_FDIO_NAMESPACE));
if (!MapPathsToLaunchpad(options.paths_to_map, lp.get())) {
return Process();
}
}
launchpad_clone(lp.get(), to_clone);
// Clone the mapped file-descriptors, plus any of the stdio descriptors
// which were not explicitly specified.
bool stdio_already_mapped[3] = {false};
for (const auto& src_target : options.fds_to_remap) {
if (static_cast<size_t>(src_target.second) <
arraysize(stdio_already_mapped)) {
stdio_already_mapped[src_target.second] = true;
}
launchpad_clone_fd(lp.get(), src_target.first, src_target.second);
}
if (to_clone & LP_CLONE_FDIO_STDIO) {
for (size_t stdio_fd = 0; stdio_fd < arraysize(stdio_already_mapped);
++stdio_fd) {
if (!stdio_already_mapped[stdio_fd])
launchpad_clone_fd(lp.get(), stdio_fd, stdio_fd);
}
to_clone &= ~LP_CLONE_FDIO_STDIO;
}
for (const auto& id_and_handle : options.handles_to_transfer) {
launchpad_add_handle(lp.get(), id_and_handle.handle, id_and_handle.id);
}
zx_handle_t process_handle;
const char* errmsg;
if ((status = launchpad_go(lp.get(), &process_handle, &errmsg)) != ZX_OK) {
ZX_LOG(ERROR, status) << "launchpad_go failed: " << errmsg;
return Process();
}
ignore_result(lp.release()); // launchpad_go() took ownership.
Process process(process_handle);
if (options.wait) {
status = zx_object_wait_one(process.Handle(), ZX_TASK_TERMINATED,
ZX_TIME_INFINITE, nullptr);
DCHECK(status == ZX_OK)
<< "zx_object_wait_one: " << zx_status_get_string(status);
}
return process;
}
bool GetAppOutput(const CommandLine& cl, std::string* output) {
int exit_code;
bool result = GetAppOutputInternal(cl, false, output, &exit_code);
return result && exit_code == EXIT_SUCCESS;
}
bool GetAppOutput(const std::vector<std::string>& argv, std::string* output) {
return GetAppOutput(CommandLine(argv), output);
}
bool GetAppOutputAndError(const CommandLine& cl, std::string* output) {
int exit_code;
bool result = GetAppOutputInternal(cl, true, output, &exit_code);
return result && exit_code == EXIT_SUCCESS;
}
bool GetAppOutputAndError(const std::vector<std::string>& argv,
std::string* output) {
return GetAppOutputAndError(CommandLine(argv), output);
}
bool GetAppOutputWithExitCode(const CommandLine& cl,
std::string* output,
int* exit_code) {
// Contrary to GetAppOutput(), |true| return here means that the process was
// launched and the exit code was waited upon successfully, but not
// necessarily that the exit code was EXIT_SUCCESS.
return GetAppOutputInternal(cl, false, output, exit_code);
}
void RaiseProcessToHighPriority() {
// Fuchsia doesn't provide an API to change process priority.
}
} // namespace base