blob: f21e32f48db331f1539954d9c83e5185bb1ca1c5 [file] [log] [blame]
// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "components/nacl/broker/nacl_broker_listener.h"
#include "base/base_switches.h"
#include "base/bind.h"
#include "base/command_line.h"
#include "base/message_loop/message_loop.h"
#include "base/path_service.h"
#include "base/process/launch.h"
#include "base/process/process.h"
#include "base/process/process_handle.h"
#include "base/threading/thread_task_runner_handle.h"
#include "components/nacl/common/nacl_cmd_line.h"
#include "components/nacl/common/nacl_debug_exception_handler_win.h"
#include "components/nacl/common/nacl_messages.h"
#include "components/nacl/common/nacl_switches.h"
#include "content/public/common/content_switches.h"
#include "content/public/common/sandbox_init.h"
#include "ipc/attachment_broker_unprivileged.h"
#include "ipc/ipc_channel.h"
#include "ipc/ipc_switches.h"
#include "sandbox/win/src/sandbox_policy.h"
namespace {
void SendReply(IPC::Channel* channel, int32_t pid, bool result) {
channel->Send(new NaClProcessMsg_DebugExceptionHandlerLaunched(pid, result));
}
} // namespace
NaClBrokerListener::NaClBrokerListener() {
IPC::AttachmentBrokerUnprivileged::CreateBrokerIfNeeded();
}
NaClBrokerListener::~NaClBrokerListener() {
IPC::AttachmentBroker* broker = IPC::AttachmentBroker::GetGlobal();
if (broker && !broker->IsPrivilegedBroker() && channel_)
broker->DeregisterBrokerCommunicationChannel(channel_.get());
}
void NaClBrokerListener::Listen() {
std::string channel_name =
base::CommandLine::ForCurrentProcess()->GetSwitchValueASCII(
switches::kProcessChannelID);
channel_ = IPC::Channel::CreateClient(channel_name, this);
IPC::AttachmentBroker* broker = IPC::AttachmentBroker::GetGlobal();
if (broker && !broker->IsPrivilegedBroker())
broker->RegisterBrokerCommunicationChannel(channel_.get());
CHECK(channel_->Connect());
base::MessageLoop::current()->Run();
}
// NOTE: changes to this method need to be reviewed by the security team.
bool NaClBrokerListener::PreSpawnTarget(sandbox::TargetPolicy* policy) {
// This code is duplicated in chrome_content_browser_client.cc.
// Allow the server side of a pipe restricted to the "chrome.nacl."
// namespace so that it cannot impersonate other system or other chrome
// service pipes.
sandbox::ResultCode result = policy->AddRule(
sandbox::TargetPolicy::SUBSYS_NAMED_PIPES,
sandbox::TargetPolicy::NAMEDPIPES_ALLOW_ANY,
L"\\\\.\\pipe\\chrome.nacl.*");
return result == sandbox::SBOX_ALL_OK;
}
void NaClBrokerListener::OnChannelConnected(int32_t peer_pid) {
browser_process_ = base::Process::OpenWithExtraPrivileges(peer_pid);
CHECK(browser_process_.IsValid());
}
bool NaClBrokerListener::OnMessageReceived(const IPC::Message& msg) {
bool handled = true;
IPC_BEGIN_MESSAGE_MAP(NaClBrokerListener, msg)
IPC_MESSAGE_HANDLER(NaClProcessMsg_LaunchLoaderThroughBroker,
OnLaunchLoaderThroughBroker)
IPC_MESSAGE_HANDLER(NaClProcessMsg_LaunchDebugExceptionHandler,
OnLaunchDebugExceptionHandler)
IPC_MESSAGE_HANDLER(NaClProcessMsg_StopBroker, OnStopBroker)
IPC_MESSAGE_UNHANDLED(handled = false)
IPC_END_MESSAGE_MAP()
return handled;
}
void NaClBrokerListener::OnChannelError() {
// The browser died unexpectedly, quit to avoid a zombie process.
base::MessageLoop::current()->QuitWhenIdle();
}
void NaClBrokerListener::OnLaunchLoaderThroughBroker(
const std::string& loader_channel_id) {
base::ProcessHandle loader_handle_in_browser = 0;
// Create the path to the nacl broker/loader executable - it's the executable
// this code is running in.
base::FilePath exe_path;
PathService::Get(base::FILE_EXE, &exe_path);
if (!exe_path.empty()) {
base::CommandLine* cmd_line = new base::CommandLine(exe_path);
nacl::CopyNaClCommandLineArguments(cmd_line);
cmd_line->AppendSwitchASCII(switches::kProcessType,
switches::kNaClLoaderProcess);
cmd_line->AppendSwitchASCII(switches::kProcessChannelID,
loader_channel_id);
base::Process loader_process;
sandbox::ResultCode result = content::StartSandboxedProcess(
this, cmd_line, base::HandlesToInheritVector(), &loader_process);
if (result == sandbox::SBOX_ALL_OK) {
// Note: PROCESS_DUP_HANDLE is necessary here, because:
// 1) The current process is the broker, which is the loader's parent.
// 2) The browser is not the loader's parent, and so only gets the
// access rights we confer here.
// 3) The browser calls DuplicateHandle to set up communications with
// the loader.
// 4) The target process handle to DuplicateHandle needs to have
// PROCESS_DUP_HANDLE access rights.
DuplicateHandle(
::GetCurrentProcess(), loader_process.Handle(),
browser_process_.Handle(), &loader_handle_in_browser,
PROCESS_DUP_HANDLE | PROCESS_QUERY_INFORMATION | PROCESS_TERMINATE,
FALSE, 0);
}
}
channel_->Send(new NaClProcessMsg_LoaderLaunched(loader_channel_id,
loader_handle_in_browser));
}
void NaClBrokerListener::OnLaunchDebugExceptionHandler(
int32_t pid,
base::ProcessHandle process_handle,
const std::string& startup_info) {
NaClStartDebugExceptionHandlerThread(
base::Process(process_handle), startup_info,
base::ThreadTaskRunnerHandle::Get(),
base::Bind(SendReply, channel_.get(), pid));
}
void NaClBrokerListener::OnStopBroker() {
base::MessageLoop::current()->QuitWhenIdle();
}