blob: 1c9e6e55bd85674e7f83c45be7a13857fda5d9c2 [file] [log] [blame]
// Copyright (c) 2011 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/browser/mach_broker_mac.h"
#include <bsm/libbsm.h>
#include <servers/bootstrap.h>
#include "base/bind.h"
#include "base/bind_helpers.h"
#include "base/command_line.h"
#include "base/logging.h"
#include "base/mac/foundation_util.h"
#include "base/mac/mach_logging.h"
#include "base/mac/scoped_mach_port.h"
#include "base/strings/string_util.h"
#include "base/strings/stringprintf.h"
#include "base/strings/sys_string_conversions.h"
#include "base/threading/platform_thread.h"
#include "content/browser/renderer_host/render_process_host_impl.h"
#include "content/public/browser/browser_thread.h"
#include "content/public/browser/child_process_data.h"
#include "content/public/browser/notification_service.h"
#include "content/public/browser/notification_types.h"
#include "content/public/common/content_switches.h"
namespace content {
namespace {
// Mach message structure used in the child as a sending message.
struct MachBroker_ChildSendMsg {
mach_msg_header_t header;
mach_msg_body_t body;
mach_msg_port_descriptor_t child_task_port;
};
// Complement to the ChildSendMsg, this is used in the parent for receiving
// a message. Contains a message trailer with audit information.
struct MachBroker_ParentRecvMsg : public MachBroker_ChildSendMsg {
mach_msg_audit_trailer_t trailer;
};
} // namespace
class MachListenerThreadDelegate : public base::PlatformThread::Delegate {
public:
explicit MachListenerThreadDelegate(MachBroker* broker)
: broker_(broker),
server_port_(MACH_PORT_NULL) {
DCHECK(broker_);
}
bool Init() {
DCHECK(server_port_.get() == MACH_PORT_NULL);
mach_port_t port;
kern_return_t kr = mach_port_allocate(mach_task_self(),
MACH_PORT_RIGHT_RECEIVE,
&port);
if (kr != KERN_SUCCESS) {
MACH_LOG(ERROR, kr) << "mach_port_allocate";
return false;
}
server_port_.reset(port);
// Allocate a send right for the server port.
kr = mach_port_insert_right(
mach_task_self(), port, port, MACH_MSG_TYPE_MAKE_SEND);
if (kr != KERN_SUCCESS) {
MACH_LOG(ERROR, kr) << "mach_port_insert_right";
return false;
}
// Deallocate the right after registering with the bootstrap server.
base::mac::ScopedMachSendRight send_right(port);
// Register the port with the bootstrap server. Because bootstrap_register
// is deprecated, this has to be wraped in an ObjC interface.
NSPort* ns_port = [NSMachPort portWithMachPort:port
options:NSMachPortDeallocateNone];
NSString* name = base::SysUTF8ToNSString(broker_->GetMachPortName());
return [[NSMachBootstrapServer sharedInstance] registerPort:ns_port
name:name];
}
// Implement |PlatformThread::Delegate|.
virtual void ThreadMain() OVERRIDE {
MachBroker_ParentRecvMsg msg;
bzero(&msg, sizeof(msg));
msg.header.msgh_size = sizeof(msg);
msg.header.msgh_local_port = server_port_.get();
const mach_msg_option_t options = MACH_RCV_MSG |
MACH_RCV_TRAILER_TYPE(MACH_RCV_TRAILER_AUDIT) |
MACH_RCV_TRAILER_ELEMENTS(MACH_RCV_TRAILER_AUDIT);
kern_return_t kr;
while ((kr = mach_msg(&msg.header,
options,
0,
sizeof(msg),
server_port_,
MACH_MSG_TIMEOUT_NONE,
MACH_PORT_NULL)) == KERN_SUCCESS) {
// Use the kernel audit information to make sure this message is from
// a task that this process spawned. The kernel audit token contains the
// unspoofable pid of the task that sent the message.
//
// TODO(rsesek): In the 10.7 SDK, there's audit_token_to_pid().
pid_t child_pid;
audit_token_to_au32(msg.trailer.msgh_audit,
NULL, NULL, NULL, NULL, NULL, &child_pid, NULL, NULL);
mach_port_t child_task_port = msg.child_task_port.name;
// Take the lock and update the broker information.
base::AutoLock lock(broker_->GetLock());
broker_->FinalizePid(child_pid, child_task_port);
}
MACH_LOG(ERROR, kr) << "mach_msg";
}
private:
// The MachBroker to use when new child task rights are received. Can be
// NULL.
MachBroker* broker_; // weak
base::mac::ScopedMachReceiveRight server_port_;
DISALLOW_COPY_AND_ASSIGN(MachListenerThreadDelegate);
};
// static
bool MachBroker::ChildSendTaskPortToParent() {
// Look up the named MachBroker port that's been registered with the
// bootstrap server.
mach_port_t parent_port;
kern_return_t kr = bootstrap_look_up(bootstrap_port,
const_cast<char*>(GetMachPortName().c_str()), &parent_port);
if (kr != KERN_SUCCESS) {
BOOTSTRAP_LOG(ERROR, kr) << "bootstrap_look_up";
return false;
}
base::mac::ScopedMachSendRight scoped_right(parent_port);
// Create the check in message. This will copy a send right on this process'
// (the child's) task port and send it to the parent.
MachBroker_ChildSendMsg msg;
bzero(&msg, sizeof(msg));
msg.header.msgh_bits = MACH_MSGH_BITS_REMOTE(MACH_MSG_TYPE_COPY_SEND) |
MACH_MSGH_BITS_COMPLEX;
msg.header.msgh_remote_port = parent_port;
msg.header.msgh_size = sizeof(msg);
msg.body.msgh_descriptor_count = 1;
msg.child_task_port.name = mach_task_self();
msg.child_task_port.disposition = MACH_MSG_TYPE_PORT_SEND;
msg.child_task_port.type = MACH_MSG_PORT_DESCRIPTOR;
kr = mach_msg(&msg.header, MACH_SEND_MSG | MACH_SEND_TIMEOUT, sizeof(msg),
0, MACH_PORT_NULL, 100 /*milliseconds*/, MACH_PORT_NULL);
if (kr != KERN_SUCCESS) {
MACH_LOG(ERROR, kr) << "mach_msg";
return false;
}
return true;
}
// static
std::string MachBroker::GetMachPortName() {
const CommandLine* command_line = CommandLine::ForCurrentProcess();
const bool is_child = command_line->HasSwitch(switches::kProcessType);
// In non-browser (child) processes, use the parent's pid.
const pid_t pid = is_child ? getppid() : getpid();
return base::StringPrintf("%s.rohitfork.%d", base::mac::BaseBundleID(), pid);
}
// static
MachBroker* MachBroker::GetInstance() {
return Singleton<MachBroker, LeakySingletonTraits<MachBroker> >::get();
}
base::Lock& MachBroker::GetLock() {
return lock_;
}
void MachBroker::EnsureRunning() {
lock_.AssertAcquired();
if (!listener_thread_started_) {
listener_thread_started_ = true;
BrowserThread::PostTask(
BrowserThread::UI, FROM_HERE,
base::Bind(&MachBroker::RegisterNotifications, base::Unretained(this)));
// Intentional leak. This thread is never joined or reaped.
MachListenerThreadDelegate* thread = new MachListenerThreadDelegate(this);
if (thread->Init()) {
base::PlatformThread::CreateNonJoinable(0, thread);
} else {
LOG(ERROR) << "Failed to initialize the MachListenerThreadDelegate";
}
}
}
void MachBroker::AddPlaceholderForPid(base::ProcessHandle pid) {
lock_.AssertAcquired();
DCHECK_EQ(0u, mach_map_.count(pid));
mach_map_[pid] = MACH_PORT_NULL;
}
mach_port_t MachBroker::TaskForPid(base::ProcessHandle pid) const {
base::AutoLock lock(lock_);
MachBroker::MachMap::const_iterator it = mach_map_.find(pid);
if (it == mach_map_.end())
return MACH_PORT_NULL;
return it->second;
}
void MachBroker::BrowserChildProcessHostDisconnected(
const ChildProcessData& data) {
InvalidatePid(data.handle);
}
void MachBroker::BrowserChildProcessCrashed(const ChildProcessData& data) {
InvalidatePid(data.handle);
}
void MachBroker::Observe(int type,
const NotificationSource& source,
const NotificationDetails& details) {
// TODO(rohitrao): These notifications do not always carry the proper PIDs,
// especially when the renderer is already gone or has crashed. Find a better
// way to listen for child process deaths. http://crbug.com/55734
base::ProcessHandle handle = 0;
switch (type) {
case NOTIFICATION_RENDERER_PROCESS_CLOSED:
handle = Details<RenderProcessHost::RendererClosedDetails>(
details)->handle;
break;
case NOTIFICATION_RENDERER_PROCESS_TERMINATED:
handle = Source<RenderProcessHost>(source)->GetHandle();
break;
default:
NOTREACHED() << "Unexpected notification";
break;
}
InvalidatePid(handle);
}
MachBroker::MachBroker() : listener_thread_started_(false) {
}
MachBroker::~MachBroker() {}
void MachBroker::FinalizePid(base::ProcessHandle pid,
mach_port_t task_port) {
lock_.AssertAcquired();
MachMap::iterator it = mach_map_.find(pid);
if (it == mach_map_.end()) {
// Do nothing for unknown pids.
LOG(ERROR) << "Unknown process " << pid << " is sending Mach IPC messages!";
return;
}
DCHECK(it->second == MACH_PORT_NULL);
if (it->second == MACH_PORT_NULL)
it->second = task_port;
}
void MachBroker::InvalidatePid(base::ProcessHandle pid) {
base::AutoLock lock(lock_);
MachBroker::MachMap::iterator it = mach_map_.find(pid);
if (it == mach_map_.end())
return;
kern_return_t kr = mach_port_deallocate(mach_task_self(),
it->second);
MACH_LOG_IF(WARNING, kr != KERN_SUCCESS, kr) << "mach_port_deallocate";
mach_map_.erase(it);
}
void MachBroker::RegisterNotifications() {
registrar_.Add(this, NOTIFICATION_RENDERER_PROCESS_CLOSED,
NotificationService::AllBrowserContextsAndSources());
registrar_.Add(this, NOTIFICATION_RENDERER_PROCESS_TERMINATED,
NotificationService::AllBrowserContextsAndSources());
// No corresponding StopObservingBrowserChildProcesses,
// we leak this singleton.
BrowserChildProcessObserver::Add(this);
}
} // namespace content