| Index: chrome/renderer/renderer_main_platform_delegate_win.cc
|
| ===================================================================
|
| --- chrome/renderer/renderer_main_platform_delegate_win.cc (revision 81952)
|
| +++ chrome/renderer/renderer_main_platform_delegate_win.cc (working copy)
|
| @@ -1,141 +0,0 @@
|
| -// Copyright (c) 2011 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "chrome/renderer/renderer_main_platform_delegate.h"
|
| -
|
| -#include "base/command_line.h"
|
| -#include "base/logging.h"
|
| -#include "base/memory/scoped_ptr.h"
|
| -#include "chrome/common/chrome_constants.h"
|
| -#include "chrome/common/chrome_switches.h"
|
| -#include "content/common/injection_test_dll.h"
|
| -#include "sandbox/src/sandbox.h"
|
| -#include "unicode/timezone.h"
|
| -
|
| -namespace {
|
| -
|
| -// In order to have Theme support, we need to connect to the theme service.
|
| -// This needs to be done before we lock down the renderer. Officially this
|
| -// can be done with OpenThemeData() but it fails unless you pass a valid
|
| -// window at least the first time. Interestingly, the very act of creating a
|
| -// window also sets the connection to the theme service.
|
| -void EnableThemeSupportForRenderer(bool no_sandbox) {
|
| - HWINSTA current = NULL;
|
| - HWINSTA winsta0 = NULL;
|
| -
|
| - if (!no_sandbox) {
|
| - current = ::GetProcessWindowStation();
|
| - winsta0 = ::OpenWindowStationW(L"WinSta0", FALSE, GENERIC_READ);
|
| - if (!winsta0 || !::SetProcessWindowStation(winsta0)) {
|
| - // Could not set the alternate window station. There is a possibility
|
| - // that the theme wont be correctly initialized on XP.
|
| - NOTREACHED() << "Unable to switch to WinSt0";
|
| - }
|
| - }
|
| -
|
| - HWND window = ::CreateWindowExW(0, L"Static", L"", WS_POPUP | WS_DISABLED,
|
| - CW_USEDEFAULT, 0, 0, 0, HWND_MESSAGE, NULL,
|
| - ::GetModuleHandleA(NULL), NULL);
|
| - if (!window) {
|
| - DLOG(WARNING) << "failed to enable theme support";
|
| - } else {
|
| - ::DestroyWindow(window);
|
| - }
|
| -
|
| - if (!no_sandbox) {
|
| - // Revert the window station.
|
| - if (!current || !::SetProcessWindowStation(current)) {
|
| - // We failed to switch back to the secure window station. This might
|
| - // confuse the renderer enough that we should kill it now.
|
| - LOG(FATAL) << "Failed to restore alternate window station";
|
| - }
|
| -
|
| - if (!::CloseWindowStation(winsta0)) {
|
| - // We might be leaking a winsta0 handle. This is a security risk, but
|
| - // since we allow fail over to no desktop protection in low memory
|
| - // condition, this is not a big risk.
|
| - NOTREACHED();
|
| - }
|
| - }
|
| -}
|
| -
|
| -} // namespace
|
| -
|
| -RendererMainPlatformDelegate::RendererMainPlatformDelegate(
|
| - const MainFunctionParams& parameters)
|
| - : parameters_(parameters),
|
| - sandbox_test_module_(NULL) {
|
| -}
|
| -
|
| -RendererMainPlatformDelegate::~RendererMainPlatformDelegate() {
|
| -}
|
| -
|
| -void RendererMainPlatformDelegate::PlatformInitialize() {
|
| - // Be mindful of what resources you acquire here. They can be used by
|
| - // malicious code if the renderer gets compromised.
|
| - const CommandLine& command_line = parameters_.command_line_;
|
| - bool no_sandbox = command_line.HasSwitch(switches::kNoSandbox);
|
| - EnableThemeSupportForRenderer(no_sandbox);
|
| -
|
| - if (!no_sandbox) {
|
| - // ICU DateFormat class (used in base/time_format.cc) needs to get the
|
| - // Olson timezone ID by accessing the registry keys under
|
| - // HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Time Zones.
|
| - // After TimeZone::createDefault is called once here, the timezone ID is
|
| - // cached and there's no more need to access the registry. If the sandbox
|
| - // is disabled, we don't have to make this dummy call.
|
| - scoped_ptr<icu::TimeZone> zone(icu::TimeZone::createDefault());
|
| - }
|
| -}
|
| -
|
| -void RendererMainPlatformDelegate::PlatformUninitialize() {
|
| -}
|
| -
|
| -bool RendererMainPlatformDelegate::InitSandboxTests(bool no_sandbox) {
|
| - const CommandLine& command_line = parameters_.command_line_;
|
| -
|
| - DVLOG(1) << "Started renderer with " << command_line.command_line_string();
|
| -
|
| - sandbox::TargetServices* target_services =
|
| - parameters_.sandbox_info_.TargetServices();
|
| -
|
| - if (target_services && !no_sandbox) {
|
| - std::wstring test_dll_name =
|
| - command_line.GetSwitchValueNative(switches::kTestSandbox);
|
| - if (!test_dll_name.empty()) {
|
| - sandbox_test_module_ = LoadLibrary(test_dll_name.c_str());
|
| - DCHECK(sandbox_test_module_);
|
| - if (!sandbox_test_module_) {
|
| - return false;
|
| - }
|
| - }
|
| - }
|
| - return true;
|
| -}
|
| -
|
| -bool RendererMainPlatformDelegate::EnableSandbox() {
|
| - sandbox::TargetServices* target_services =
|
| - parameters_.sandbox_info_.TargetServices();
|
| -
|
| - if (target_services) {
|
| - target_services->LowerToken();
|
| - return true;
|
| - }
|
| - return false;
|
| -}
|
| -
|
| -void RendererMainPlatformDelegate::RunSandboxTests() {
|
| - if (sandbox_test_module_) {
|
| - RunRendererTests run_security_tests =
|
| - reinterpret_cast<RunRendererTests>(GetProcAddress(sandbox_test_module_,
|
| - kRenderTestCall));
|
| - DCHECK(run_security_tests);
|
| - if (run_security_tests) {
|
| - int test_count = 0;
|
| - DVLOG(1) << "Running renderer security tests";
|
| - BOOL result = run_security_tests(&test_count);
|
| - CHECK(result) << "Test number " << test_count << " has failed.";
|
| - }
|
| - }
|
| -}
|
|
|