| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "remoting/host/win/launch_process_with_token.h" | 5 #include "remoting/host/win/launch_process_with_token.h" |
| 6 | 6 |
| 7 #include <windows.h> | 7 #include <windows.h> |
| 8 #include <winternl.h> | 8 #include <winternl.h> |
| 9 | 9 |
| 10 #include <limits> | 10 #include <limits> |
| (...skipping 269 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 280 } | 280 } |
| 281 | 281 |
| 282 *process_information_out = response.process_information; | 282 *process_information_out = response.process_information; |
| 283 return true; | 283 return true; |
| 284 } | 284 } |
| 285 | 285 |
| 286 // Sends a remote process create request to the execution server. | 286 // Sends a remote process create request to the execution server. |
| 287 bool SendCreateProcessRequest( | 287 bool SendCreateProcessRequest( |
| 288 HANDLE pipe, | 288 HANDLE pipe, |
| 289 const base::FilePath::StringType& application_name, | 289 const base::FilePath::StringType& application_name, |
| 290 const CommandLine::StringType& command_line, | 290 const base::CommandLine::StringType& command_line, |
| 291 DWORD creation_flags, | 291 DWORD creation_flags, |
| 292 const base::char16* desktop_name) { | 292 const base::char16* desktop_name) { |
| 293 // |CreateProcessRequest| structure passes the same parameters to | 293 // |CreateProcessRequest| structure passes the same parameters to |
| 294 // the execution server as CreateProcessAsUser() function does. Strings are | 294 // the execution server as CreateProcessAsUser() function does. Strings are |
| 295 // stored as wide strings immediately after the structure. String pointers are | 295 // stored as wide strings immediately after the structure. String pointers are |
| 296 // represented as byte offsets to string data from the beginning of | 296 // represented as byte offsets to string data from the beginning of |
| 297 // the structure. | 297 // the structure. |
| 298 struct CreateProcessRequest { | 298 struct CreateProcessRequest { |
| 299 DWORD size; | 299 DWORD size; |
| 300 DWORD process_id; | 300 DWORD process_id; |
| (...skipping 62 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 363 | 363 |
| 364 return true; | 364 return true; |
| 365 } | 365 } |
| 366 | 366 |
| 367 // Requests the execution server to create a process in the specified session | 367 // Requests the execution server to create a process in the specified session |
| 368 // using the default (i.e. Winlogon) token. This routine relies on undocumented | 368 // using the default (i.e. Winlogon) token. This routine relies on undocumented |
| 369 // OS functionality and will likely not work on anything but XP or W2K3. | 369 // OS functionality and will likely not work on anything but XP or W2K3. |
| 370 bool CreateRemoteSessionProcess( | 370 bool CreateRemoteSessionProcess( |
| 371 uint32 session_id, | 371 uint32 session_id, |
| 372 const base::FilePath::StringType& application_name, | 372 const base::FilePath::StringType& application_name, |
| 373 const CommandLine::StringType& command_line, | 373 const base::CommandLine::StringType& command_line, |
| 374 DWORD creation_flags, | 374 DWORD creation_flags, |
| 375 const base::char16* desktop_name, | 375 const base::char16* desktop_name, |
| 376 PROCESS_INFORMATION* process_information_out) | 376 PROCESS_INFORMATION* process_information_out) { |
| 377 { | |
| 378 DCHECK_LT(base::win::GetVersion(), base::win::VERSION_VISTA); | 377 DCHECK_LT(base::win::GetVersion(), base::win::VERSION_VISTA); |
| 379 | 378 |
| 380 base::win::ScopedHandle pipe; | 379 base::win::ScopedHandle pipe; |
| 381 if (!ConnectToExecutionServer(session_id, &pipe)) | 380 if (!ConnectToExecutionServer(session_id, &pipe)) |
| 382 return false; | 381 return false; |
| 383 | 382 |
| 384 if (!SendCreateProcessRequest(pipe, application_name, command_line, | 383 if (!SendCreateProcessRequest(pipe, application_name, command_line, |
| 385 creation_flags, desktop_name)) { | 384 creation_flags, desktop_name)) { |
| 386 return false; | 385 return false; |
| 387 } | 386 } |
| 388 | 387 |
| 389 PROCESS_INFORMATION process_information; | 388 PROCESS_INFORMATION process_information; |
| 390 if (!ReceiveCreateProcessResponse(pipe, &process_information)) | 389 if (!ReceiveCreateProcessResponse(pipe, &process_information)) |
| 391 return false; | 390 return false; |
| 392 | 391 |
| 393 if (!ProcessCreateProcessResponse(creation_flags, &process_information)) { | 392 if (!ProcessCreateProcessResponse(creation_flags, &process_information)) { |
| 394 CloseHandlesAndTerminateProcess(&process_information); | 393 CloseHandlesAndTerminateProcess(&process_information); |
| 395 return false; | 394 return false; |
| 396 } | 395 } |
| 397 | 396 |
| 398 *process_information_out = process_information; | 397 *process_information_out = process_information; |
| 399 return true; | 398 return true; |
| 400 } | 399 } |
| 401 | 400 |
| 402 } // namespace | 401 } // namespace |
| 403 | 402 |
| 404 namespace remoting { | 403 namespace remoting { |
| 405 | 404 |
| 406 base::LazyInstance<base::Lock>::Leaky g_inherit_handles_lock = | 405 base::LazyInstance<base::Lock>::Leaky g_inherit_handles_lock = |
| 407 LAZY_INSTANCE_INITIALIZER; | 406 LAZY_INSTANCE_INITIALIZER; |
| 408 | 407 |
| 409 // Creates a copy of the current process token for the given |session_id| so | 408 // Creates a copy of the current process token for the given |session_id| so |
| 410 // it can be used to launch a process in that session. | 409 // it can be used to launch a process in that session. |
| 411 bool CreateSessionToken(uint32 session_id, ScopedHandle* token_out) { | 410 bool CreateSessionToken(uint32 session_id, ScopedHandle* token_out) { |
| 412 ScopedHandle session_token; | 411 ScopedHandle session_token; |
| (...skipping 28 matching lines...) Expand all Loading... |
| 441 } | 440 } |
| 442 | 441 |
| 443 // Revert to the default token. | 442 // Revert to the default token. |
| 444 CHECK(RevertToSelf()); | 443 CHECK(RevertToSelf()); |
| 445 | 444 |
| 446 *token_out = session_token.Pass(); | 445 *token_out = session_token.Pass(); |
| 447 return true; | 446 return true; |
| 448 } | 447 } |
| 449 | 448 |
| 450 bool LaunchProcessWithToken(const base::FilePath& binary, | 449 bool LaunchProcessWithToken(const base::FilePath& binary, |
| 451 const CommandLine::StringType& command_line, | 450 const base::CommandLine::StringType& command_line, |
| 452 HANDLE user_token, | 451 HANDLE user_token, |
| 453 SECURITY_ATTRIBUTES* process_attributes, | 452 SECURITY_ATTRIBUTES* process_attributes, |
| 454 SECURITY_ATTRIBUTES* thread_attributes, | 453 SECURITY_ATTRIBUTES* thread_attributes, |
| 455 bool inherit_handles, | 454 bool inherit_handles, |
| 456 DWORD creation_flags, | 455 DWORD creation_flags, |
| 457 const base::char16* desktop_name, | 456 const base::char16* desktop_name, |
| 458 ScopedHandle* process_out, | 457 ScopedHandle* process_out, |
| 459 ScopedHandle* thread_out) { | 458 ScopedHandle* thread_out) { |
| 460 base::FilePath::StringType application_name = binary.value(); | 459 base::FilePath::StringType application_name = binary.value(); |
| 461 | 460 |
| (...skipping 52 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 514 } | 513 } |
| 515 | 514 |
| 516 base::win::ScopedProcessInformation process_info(temp_process_info); | 515 base::win::ScopedProcessInformation process_info(temp_process_info); |
| 517 | 516 |
| 518 CHECK(process_info.IsValid()); | 517 CHECK(process_info.IsValid()); |
| 519 process_out->Set(process_info.TakeProcessHandle()); | 518 process_out->Set(process_info.TakeProcessHandle()); |
| 520 thread_out->Set(process_info.TakeThreadHandle()); | 519 thread_out->Set(process_info.TakeThreadHandle()); |
| 521 return true; | 520 return true; |
| 522 } | 521 } |
| 523 | 522 |
| 524 } // namespace remoting | 523 } // namespace remoting |
| OLD | NEW |