2020-01-17 21:05:03 +08:00
|
|
|
// Copyright 2019 Google LLC
|
2019-03-19 00:21:48 +08:00
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
2022-01-28 17:38:27 +08:00
|
|
|
// https://www.apache.org/licenses/LICENSE-2.0
|
2019-03-19 00:21:48 +08:00
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
#include "sandboxed_api/sandbox2/forkingclient.h"
|
|
|
|
|
|
|
|
#include <unistd.h>
|
|
|
|
|
2022-10-12 20:22:51 +08:00
|
|
|
#include <memory>
|
|
|
|
|
2022-10-20 21:48:06 +08:00
|
|
|
#include "absl/log/check.h"
|
2019-03-19 00:21:48 +08:00
|
|
|
#include "sandboxed_api/sandbox2/sanitizer.h"
|
|
|
|
|
|
|
|
namespace sandbox2 {
|
|
|
|
|
|
|
|
pid_t ForkingClient::WaitAndFork() {
|
|
|
|
// We don't instantiate the Fork-Server until the first Fork() call takes
|
|
|
|
// place (in order to conserve resources, and avoid calling Fork-Server
|
|
|
|
// initialization routines).
|
|
|
|
if (!fork_server_worker_) {
|
2022-01-20 20:39:48 +08:00
|
|
|
sanitizer::WaitForSanitizer();
|
2019-03-19 00:21:48 +08:00
|
|
|
// Perform that check once only, because it's quite CPU-expensive.
|
|
|
|
int n = sanitizer::GetNumberOfThreads(getpid());
|
|
|
|
CHECK_NE(n, -1) << "sanitizer::GetNumberOfThreads failed";
|
|
|
|
CHECK_EQ(n, 1) << "Too many threads (" << n
|
|
|
|
<< ") during sandbox2::Client::WaitAndFork()";
|
2022-10-12 20:22:51 +08:00
|
|
|
fork_server_worker_ = std::make_unique<ForkServer>(comms_);
|
2019-03-19 00:21:48 +08:00
|
|
|
}
|
|
|
|
return fork_server_worker_->ServeRequest();
|
|
|
|
}
|
|
|
|
|
|
|
|
} // namespace sandbox2
|