| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 // | 4 // |
| 5 // This file implements the Windows service controlling Me2Me host processes | 5 // This file implements the Windows service controlling Me2Me host processes |
| 6 // running within user sessions. | 6 // running within user sessions. |
| 7 | 7 |
| 8 #include "remoting/host/win/wts_session_process_delegate.h" | 8 #include "remoting/host/win/wts_session_process_delegate.h" |
| 9 | 9 |
| 10 #include "base/bind.h" | 10 #include "base/bind.h" |
| (...skipping 170 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 181 } | 181 } |
| 182 | 182 |
| 183 // Limit the number of active processes in the job to two (the helper | 183 // Limit the number of active processes in the job to two (the helper |
| 184 // process performing elevation and the worker process itself) and make sure | 184 // process performing elevation and the worker process itself) and make sure |
| 185 // that all processes will be killed once the job object is destroyed. | 185 // that all processes will be killed once the job object is destroyed. |
| 186 JOBOBJECT_EXTENDED_LIMIT_INFORMATION info; | 186 JOBOBJECT_EXTENDED_LIMIT_INFORMATION info; |
| 187 memset(&info, 0, sizeof(info)); | 187 memset(&info, 0, sizeof(info)); |
| 188 info.BasicLimitInformation.LimitFlags = JOB_OBJECT_LIMIT_ACTIVE_PROCESS | | 188 info.BasicLimitInformation.LimitFlags = JOB_OBJECT_LIMIT_ACTIVE_PROCESS | |
| 189 JOB_OBJECT_LIMIT_KILL_ON_JOB_CLOSE; | 189 JOB_OBJECT_LIMIT_KILL_ON_JOB_CLOSE; |
| 190 info.BasicLimitInformation.ActiveProcessLimit = 2; | 190 info.BasicLimitInformation.ActiveProcessLimit = 2; |
| 191 if (!SetInformationJobObject(job, | 191 if (!SetInformationJobObject(job.Get(), |
| 192 JobObjectExtendedLimitInformation, | 192 JobObjectExtendedLimitInformation, |
| 193 &info, | 193 &info, |
| 194 sizeof(info))) { | 194 sizeof(info))) { |
| 195 PLOG(ERROR) << "Failed to set limits on the job object"; | 195 PLOG(ERROR) << "Failed to set limits on the job object"; |
| 196 return false; | 196 return false; |
| 197 } | 197 } |
| 198 | 198 |
| 199 // ScopedHandle is not compatible with base::Passed, so we wrap it to | 199 // ScopedHandle is not compatible with base::Passed, so we wrap it to |
| 200 // a scoped pointer. | 200 // a scoped pointer. |
| 201 scoped_ptr<ScopedHandle> job_wrapper(new ScopedHandle()); | 201 scoped_ptr<ScopedHandle> job_wrapper(new ScopedHandle()); |
| (...skipping 52 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 254 void WtsSessionProcessDelegate::Core::KillProcess() { | 254 void WtsSessionProcessDelegate::Core::KillProcess() { |
| 255 DCHECK(caller_task_runner_->BelongsToCurrentThread()); | 255 DCHECK(caller_task_runner_->BelongsToCurrentThread()); |
| 256 | 256 |
| 257 channel_.reset(); | 257 channel_.reset(); |
| 258 event_handler_ = NULL; | 258 event_handler_ = NULL; |
| 259 launch_pending_ = false; | 259 launch_pending_ = false; |
| 260 pipe_.Close(); | 260 pipe_.Close(); |
| 261 | 261 |
| 262 if (launch_elevated_) { | 262 if (launch_elevated_) { |
| 263 if (job_.IsValid()) | 263 if (job_.IsValid()) |
| 264 TerminateJobObject(job_, CONTROL_C_EXIT); | 264 TerminateJobObject(job_.Get(), CONTROL_C_EXIT); |
| 265 } else { | 265 } else { |
| 266 if (worker_process_.IsValid()) | 266 if (worker_process_.IsValid()) |
| 267 TerminateProcess(worker_process_, CONTROL_C_EXIT); | 267 TerminateProcess(worker_process_.Get(), CONTROL_C_EXIT); |
| 268 } | 268 } |
| 269 | 269 |
| 270 worker_process_.Close(); | 270 worker_process_.Close(); |
| 271 } | 271 } |
| 272 | 272 |
| 273 WtsSessionProcessDelegate::Core::~Core() { | 273 WtsSessionProcessDelegate::Core::~Core() { |
| 274 DCHECK(!channel_); | 274 DCHECK(!channel_); |
| 275 DCHECK(!event_handler_); | 275 DCHECK(!event_handler_); |
| 276 DCHECK(!pipe_.IsValid()); | 276 DCHECK(!pipe_.IsValid()); |
| 277 DCHECK(!worker_process_.IsValid()); | 277 DCHECK(!worker_process_.IsValid()); |
| (...skipping 21 matching lines...) Expand all Loading... |
| 299 } | 299 } |
| 300 | 300 |
| 301 void WtsSessionProcessDelegate::Core::OnChannelConnected(int32 peer_pid) { | 301 void WtsSessionProcessDelegate::Core::OnChannelConnected(int32 peer_pid) { |
| 302 DCHECK(caller_task_runner_->BelongsToCurrentThread()); | 302 DCHECK(caller_task_runner_->BelongsToCurrentThread()); |
| 303 | 303 |
| 304 // Report the worker PID now if the worker process is launched indirectly. | 304 // Report the worker PID now if the worker process is launched indirectly. |
| 305 // Note that in this case the pipe's security descriptor is the only | 305 // Note that in this case the pipe's security descriptor is the only |
| 306 // protection against a malicious processed connecting to the pipe. | 306 // protection against a malicious processed connecting to the pipe. |
| 307 if (launch_elevated_) { | 307 if (launch_elevated_) { |
| 308 DWORD pid; | 308 DWORD pid; |
| 309 if (!get_named_pipe_client_pid_(pipe_, &pid)) { | 309 if (!get_named_pipe_client_pid_(pipe_.Get(), &pid)) { |
| 310 PLOG(ERROR) << "Failed to retrive PID of the client"; | 310 PLOG(ERROR) << "Failed to retrive PID of the client"; |
| 311 ReportFatalError(); | 311 ReportFatalError(); |
| 312 return; | 312 return; |
| 313 } | 313 } |
| 314 | 314 |
| 315 if (pid != static_cast<DWORD>(peer_pid)) { | 315 if (pid != static_cast<DWORD>(peer_pid)) { |
| 316 LOG(ERROR) << "The actual client PID " << pid | 316 LOG(ERROR) << "The actual client PID " << pid |
| 317 << " does not match the one reported by the client: " | 317 << " does not match the one reported by the client: " |
| 318 << peer_pid; | 318 << peer_pid; |
| 319 ReportFatalError(); | 319 ReportFatalError(); |
| (...skipping 53 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 373 // Create the server end of the IPC channel. | 373 // Create the server end of the IPC channel. |
| 374 std::string channel_name = IPC::Channel::GenerateUniqueRandomChannelID(); | 374 std::string channel_name = IPC::Channel::GenerateUniqueRandomChannelID(); |
| 375 ScopedHandle pipe; | 375 ScopedHandle pipe; |
| 376 if (!CreateIpcChannel(channel_name, channel_security_, &pipe)) { | 376 if (!CreateIpcChannel(channel_name, channel_security_, &pipe)) { |
| 377 ReportFatalError(); | 377 ReportFatalError(); |
| 378 return; | 378 return; |
| 379 } | 379 } |
| 380 | 380 |
| 381 // Wrap the pipe into an IPC channel. | 381 // Wrap the pipe into an IPC channel. |
| 382 scoped_ptr<IPC::ChannelProxy> channel( | 382 scoped_ptr<IPC::ChannelProxy> channel( |
| 383 IPC::ChannelProxy::Create(IPC::ChannelHandle(pipe), | 383 IPC::ChannelProxy::Create(IPC::ChannelHandle(pipe.Get()), |
| 384 IPC::Channel::MODE_SERVER, | 384 IPC::Channel::MODE_SERVER, |
| 385 this, | 385 this, |
| 386 io_task_runner_)); | 386 io_task_runner_)); |
| 387 | 387 |
| 388 // Pass the name of the IPC channel to use. | 388 // Pass the name of the IPC channel to use. |
| 389 command_line.AppendSwitchNative(kDaemonPipeSwitchName, | 389 command_line.AppendSwitchNative(kDaemonPipeSwitchName, |
| 390 base::UTF8ToWide(channel_name)); | 390 base::UTF8ToWide(channel_name)); |
| 391 | 391 |
| 392 // Try to launch the process. | 392 // Try to launch the process. |
| 393 ScopedHandle worker_process; | 393 ScopedHandle worker_process; |
| 394 ScopedHandle worker_thread; | 394 ScopedHandle worker_thread; |
| 395 if (!LaunchProcessWithToken(command_line.GetProgram(), | 395 if (!LaunchProcessWithToken(command_line.GetProgram(), |
| 396 command_line.GetCommandLineString(), | 396 command_line.GetCommandLineString(), |
| 397 session_token_, | 397 session_token_.Get(), |
| 398 NULL, | 398 NULL, |
| 399 NULL, | 399 NULL, |
| 400 false, | 400 false, |
| 401 CREATE_SUSPENDED | CREATE_BREAKAWAY_FROM_JOB, | 401 CREATE_SUSPENDED | CREATE_BREAKAWAY_FROM_JOB, |
| 402 base::UTF8ToUTF16(kDefaultDesktopName).c_str(), | 402 base::UTF8ToUTF16(kDefaultDesktopName).c_str(), |
| 403 &worker_process, | 403 &worker_process, |
| 404 &worker_thread)) { | 404 &worker_thread)) { |
| 405 ReportFatalError(); | 405 ReportFatalError(); |
| 406 return; | 406 return; |
| 407 } | 407 } |
| 408 | 408 |
| 409 if (launch_elevated_) { | 409 if (launch_elevated_) { |
| 410 if (!AssignProcessToJobObject(job_, worker_process)) { | 410 if (!AssignProcessToJobObject(job_.Get(), worker_process.Get())) { |
| 411 PLOG(ERROR) << "Failed to assign the worker to the job object"; | 411 PLOG(ERROR) << "Failed to assign the worker to the job object"; |
| 412 ReportFatalError(); | 412 ReportFatalError(); |
| 413 return; | 413 return; |
| 414 } | 414 } |
| 415 } | 415 } |
| 416 | 416 |
| 417 if (!ResumeThread(worker_thread)) { | 417 if (!ResumeThread(worker_thread.Get())) { |
| 418 PLOG(ERROR) << "Failed to resume the worker thread"; | 418 PLOG(ERROR) << "Failed to resume the worker thread"; |
| 419 ReportFatalError(); | 419 ReportFatalError(); |
| 420 return; | 420 return; |
| 421 } | 421 } |
| 422 | 422 |
| 423 channel_ = channel.Pass(); | 423 channel_ = channel.Pass(); |
| 424 pipe_ = pipe.Pass(); | 424 pipe_ = pipe.Pass(); |
| 425 | 425 |
| 426 // Report success if the worker process is lauched directly. Otherwise, PID of | 426 // Report success if the worker process is lauched directly. Otherwise, PID of |
| 427 // the client connected to the pipe will be used later. See | 427 // the client connected to the pipe will be used later. See |
| (...skipping 78 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 506 DCHECK(!worker_process_.IsValid()); | 506 DCHECK(!worker_process_.IsValid()); |
| 507 | 507 |
| 508 worker_process_ = worker_process.Pass(); | 508 worker_process_ = worker_process.Pass(); |
| 509 | 509 |
| 510 // Report a handle that can be used to wait for the worker process completion, | 510 // Report a handle that can be used to wait for the worker process completion, |
| 511 // query information about the process and duplicate handles. | 511 // query information about the process and duplicate handles. |
| 512 DWORD desired_access = | 512 DWORD desired_access = |
| 513 SYNCHRONIZE | PROCESS_DUP_HANDLE | PROCESS_QUERY_INFORMATION; | 513 SYNCHRONIZE | PROCESS_DUP_HANDLE | PROCESS_QUERY_INFORMATION; |
| 514 HANDLE temp_handle; | 514 HANDLE temp_handle; |
| 515 if (!DuplicateHandle(GetCurrentProcess(), | 515 if (!DuplicateHandle(GetCurrentProcess(), |
| 516 worker_process_, | 516 worker_process_.Get(), |
| 517 GetCurrentProcess(), | 517 GetCurrentProcess(), |
| 518 &temp_handle, | 518 &temp_handle, |
| 519 desired_access, | 519 desired_access, |
| 520 FALSE, | 520 FALSE, |
| 521 0)) { | 521 0)) { |
| 522 PLOG(ERROR) << "Failed to duplicate a handle"; | 522 PLOG(ERROR) << "Failed to duplicate a handle"; |
| 523 ReportFatalError(); | 523 ReportFatalError(); |
| 524 return; | 524 return; |
| 525 } | 525 } |
| 526 ScopedHandle limited_handle(temp_handle); | 526 ScopedHandle limited_handle(temp_handle); |
| (...skipping 31 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 558 | 558 |
| 559 void WtsSessionProcessDelegate::CloseChannel() { | 559 void WtsSessionProcessDelegate::CloseChannel() { |
| 560 core_->CloseChannel(); | 560 core_->CloseChannel(); |
| 561 } | 561 } |
| 562 | 562 |
| 563 void WtsSessionProcessDelegate::KillProcess() { | 563 void WtsSessionProcessDelegate::KillProcess() { |
| 564 core_->KillProcess(); | 564 core_->KillProcess(); |
| 565 } | 565 } |
| 566 | 566 |
| 567 } // namespace remoting | 567 } // namespace remoting |
| OLD | NEW |