Index: sandbox/win/src/top_level_dispatcher.cc |
diff --git a/sandbox/win/src/top_level_dispatcher.cc b/sandbox/win/src/top_level_dispatcher.cc |
deleted file mode 100644 |
index 1880c62a3221ea34dc40184636c5e1ab9b56201c..0000000000000000000000000000000000000000 |
--- a/sandbox/win/src/top_level_dispatcher.cc |
+++ /dev/null |
@@ -1,147 +0,0 @@ |
-// Copyright 2015 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "sandbox/win/src/top_level_dispatcher.h" |
- |
-#include <stdint.h> |
-#include <string.h> |
- |
-#include "base/logging.h" |
-#include "base/memory/scoped_ptr.h" |
-#include "sandbox/win/src/crosscall_server.h" |
-#include "sandbox/win/src/filesystem_dispatcher.h" |
-#include "sandbox/win/src/handle_dispatcher.h" |
-#include "sandbox/win/src/interception.h" |
-#include "sandbox/win/src/internal_types.h" |
-#include "sandbox/win/src/ipc_tags.h" |
-#include "sandbox/win/src/named_pipe_dispatcher.h" |
-#include "sandbox/win/src/process_mitigations_win32k_dispatcher.h" |
-#include "sandbox/win/src/process_thread_dispatcher.h" |
-#include "sandbox/win/src/registry_dispatcher.h" |
-#include "sandbox/win/src/sandbox_policy_base.h" |
-#include "sandbox/win/src/sync_dispatcher.h" |
- |
-namespace sandbox { |
- |
-TopLevelDispatcher::TopLevelDispatcher(PolicyBase* policy) : policy_(policy) { |
- // Initialize the IPC dispatcher array. |
- memset(ipc_targets_, 0, sizeof(ipc_targets_)); |
- Dispatcher* dispatcher; |
- |
- dispatcher = new FilesystemDispatcher(policy_); |
- ipc_targets_[IPC_NTCREATEFILE_TAG] = dispatcher; |
- ipc_targets_[IPC_NTOPENFILE_TAG] = dispatcher; |
- ipc_targets_[IPC_NTSETINFO_RENAME_TAG] = dispatcher; |
- ipc_targets_[IPC_NTQUERYATTRIBUTESFILE_TAG] = dispatcher; |
- ipc_targets_[IPC_NTQUERYFULLATTRIBUTESFILE_TAG] = dispatcher; |
- filesystem_dispatcher_.reset(dispatcher); |
- |
- dispatcher = new NamedPipeDispatcher(policy_); |
- ipc_targets_[IPC_CREATENAMEDPIPEW_TAG] = dispatcher; |
- named_pipe_dispatcher_.reset(dispatcher); |
- |
- dispatcher = new ThreadProcessDispatcher(policy_); |
- ipc_targets_[IPC_NTOPENTHREAD_TAG] = dispatcher; |
- ipc_targets_[IPC_NTOPENPROCESS_TAG] = dispatcher; |
- ipc_targets_[IPC_CREATEPROCESSW_TAG] = dispatcher; |
- ipc_targets_[IPC_NTOPENPROCESSTOKEN_TAG] = dispatcher; |
- ipc_targets_[IPC_NTOPENPROCESSTOKENEX_TAG] = dispatcher; |
- ipc_targets_[IPC_CREATETHREAD_TAG] = dispatcher; |
- thread_process_dispatcher_.reset(dispatcher); |
- |
- dispatcher = new SyncDispatcher(policy_); |
- ipc_targets_[IPC_CREATEEVENT_TAG] = dispatcher; |
- ipc_targets_[IPC_OPENEVENT_TAG] = dispatcher; |
- sync_dispatcher_.reset(dispatcher); |
- |
- dispatcher = new RegistryDispatcher(policy_); |
- ipc_targets_[IPC_NTCREATEKEY_TAG] = dispatcher; |
- ipc_targets_[IPC_NTOPENKEY_TAG] = dispatcher; |
- registry_dispatcher_.reset(dispatcher); |
- |
- dispatcher = new HandleDispatcher(policy_); |
- ipc_targets_[IPC_DUPLICATEHANDLEPROXY_TAG] = dispatcher; |
- handle_dispatcher_.reset(dispatcher); |
- |
- dispatcher = new ProcessMitigationsWin32KDispatcher(policy_); |
- ipc_targets_[IPC_GDI_GDIDLLINITIALIZE_TAG] = dispatcher; |
- ipc_targets_[IPC_GDI_GETSTOCKOBJECT_TAG] = dispatcher; |
- ipc_targets_[IPC_USER_REGISTERCLASSW_TAG] = dispatcher; |
- process_mitigations_win32k_dispatcher_.reset(dispatcher); |
-} |
- |
-TopLevelDispatcher::~TopLevelDispatcher() {} |
- |
-// When an IPC is ready in any of the targets we get called. We manage an array |
-// of IPC dispatchers which are keyed on the IPC tag so we normally delegate |
-// to the appropriate dispatcher unless we can handle the IPC call ourselves. |
-Dispatcher* TopLevelDispatcher::OnMessageReady(IPCParams* ipc, |
- CallbackGeneric* callback) { |
- DCHECK(callback); |
- static const IPCParams ping1 = {IPC_PING1_TAG, {UINT32_TYPE}}; |
- static const IPCParams ping2 = {IPC_PING2_TAG, {INOUTPTR_TYPE}}; |
- |
- if (ping1.Matches(ipc) || ping2.Matches(ipc)) { |
- *callback = reinterpret_cast<CallbackGeneric>( |
- static_cast<Callback1>(&TopLevelDispatcher::Ping)); |
- return this; |
- } |
- |
- Dispatcher* dispatcher = GetDispatcher(ipc->ipc_tag); |
- if (!dispatcher) { |
- NOTREACHED(); |
- return NULL; |
- } |
- return dispatcher->OnMessageReady(ipc, callback); |
-} |
- |
-// Delegate to the appropriate dispatcher. |
-bool TopLevelDispatcher::SetupService(InterceptionManager* manager, |
- int service) { |
- if (IPC_PING1_TAG == service || IPC_PING2_TAG == service) |
- return true; |
- |
- Dispatcher* dispatcher = GetDispatcher(service); |
- if (!dispatcher) { |
- NOTREACHED(); |
- return false; |
- } |
- return dispatcher->SetupService(manager, service); |
-} |
- |
-// We service IPC_PING_TAG message which is a way to test a round trip of the |
-// IPC subsystem. We receive a integer cookie and we are expected to return the |
-// cookie times two (or three) and the current tick count. |
-bool TopLevelDispatcher::Ping(IPCInfo* ipc, void* arg1) { |
- switch (ipc->ipc_tag) { |
- case IPC_PING1_TAG: { |
- IPCInt ipc_int(arg1); |
- uint32_t cookie = ipc_int.As32Bit(); |
- ipc->return_info.extended_count = 2; |
- ipc->return_info.extended[0].unsigned_int = ::GetTickCount(); |
- ipc->return_info.extended[1].unsigned_int = 2 * cookie; |
- return true; |
- } |
- case IPC_PING2_TAG: { |
- CountedBuffer* io_buffer = reinterpret_cast<CountedBuffer*>(arg1); |
- if (sizeof(uint32_t) != io_buffer->Size()) |
- return false; |
- |
- uint32_t* cookie = reinterpret_cast<uint32_t*>(io_buffer->Buffer()); |
- *cookie = (*cookie) * 3; |
- return true; |
- } |
- default: |
- return false; |
- } |
-} |
- |
-Dispatcher* TopLevelDispatcher::GetDispatcher(int ipc_tag) { |
- if (ipc_tag >= IPC_LAST_TAG || ipc_tag <= IPC_UNUSED_TAG) |
- return NULL; |
- |
- return ipc_targets_[ipc_tag]; |
-} |
- |
-} // namespace sandbox |