• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4 
5 #include "ipc/ipc_channel_posix.h"
6 
7 #include <errno.h>
8 #include <fcntl.h>
9 #include <stddef.h>
10 #include <sys/socket.h>
11 #include <sys/stat.h>
12 #include <sys/types.h>
13 #include <sys/un.h>
14 #include <unistd.h>
15 
16 #if defined(OS_OPENBSD)
17 #include <sys/uio.h>
18 #endif
19 
20 #include <map>
21 #include <string>
22 
23 #include "base/command_line.h"
24 #include "base/file_util.h"
25 #include "base/files/file_path.h"
26 #include "base/location.h"
27 #include "base/logging.h"
28 #include "base/memory/scoped_ptr.h"
29 #include "base/memory/singleton.h"
30 #include "base/posix/eintr_wrapper.h"
31 #include "base/posix/global_descriptors.h"
32 #include "base/process/process_handle.h"
33 #include "base/rand_util.h"
34 #include "base/stl_util.h"
35 #include "base/strings/string_util.h"
36 #include "base/synchronization/lock.h"
37 #include "ipc/file_descriptor_set_posix.h"
38 #include "ipc/ipc_descriptors.h"
39 #include "ipc/ipc_listener.h"
40 #include "ipc/ipc_logging.h"
41 #include "ipc/ipc_message_utils.h"
42 #include "ipc/ipc_switches.h"
43 #include "ipc/unix_domain_socket_util.h"
44 
45 namespace IPC {
46 
47 // IPC channels on Windows use named pipes (CreateNamedPipe()) with
48 // channel ids as the pipe names.  Channels on POSIX use sockets as
49 // pipes  These don't quite line up.
50 //
51 // When creating a child subprocess we use a socket pair and the parent side of
52 // the fork arranges it such that the initial control channel ends up on the
53 // magic file descriptor kPrimaryIPCChannel in the child.  Future
54 // connections (file descriptors) can then be passed via that
55 // connection via sendmsg().
56 //
57 // A POSIX IPC channel can also be set up as a server for a bound UNIX domain
58 // socket, and will handle multiple connect and disconnect sequences.  Currently
59 // it is limited to one connection at a time.
60 
61 //------------------------------------------------------------------------------
62 namespace {
63 
64 // The PipeMap class works around this quirk related to unit tests:
65 //
66 // When running as a server, we install the client socket in a
67 // specific file descriptor number (@kPrimaryIPCChannel). However, we
68 // also have to support the case where we are running unittests in the
69 // same process.  (We do not support forking without execing.)
70 //
71 // Case 1: normal running
72 //   The IPC server object will install a mapping in PipeMap from the
73 //   name which it was given to the client pipe. When forking the client, the
74 //   GetClientFileDescriptorMapping will ensure that the socket is installed in
75 //   the magic slot (@kPrimaryIPCChannel). The client will search for the
76 //   mapping, but it won't find any since we are in a new process. Thus the
77 //   magic fd number is returned. Once the client connects, the server will
78 //   close its copy of the client socket and remove the mapping.
79 //
80 // Case 2: unittests - client and server in the same process
81 //   The IPC server will install a mapping as before. The client will search
82 //   for a mapping and find out. It duplicates the file descriptor and
83 //   connects. Once the client connects, the server will close the original
84 //   copy of the client socket and remove the mapping. Thus, when the client
85 //   object closes, it will close the only remaining copy of the client socket
86 //   in the fd table and the server will see EOF on its side.
87 //
88 // TODO(port): a client process cannot connect to multiple IPC channels with
89 // this scheme.
90 
91 class PipeMap {
92  public:
GetInstance()93   static PipeMap* GetInstance() {
94     return Singleton<PipeMap>::get();
95   }
96 
~PipeMap()97   ~PipeMap() {
98     // Shouldn't have left over pipes.
99     DCHECK(map_.empty());
100   }
101 
102   // Lookup a given channel id. Return -1 if not found.
Lookup(const std::string & channel_id)103   int Lookup(const std::string& channel_id) {
104     base::AutoLock locked(lock_);
105 
106     ChannelToFDMap::const_iterator i = map_.find(channel_id);
107     if (i == map_.end())
108       return -1;
109     return i->second;
110   }
111 
112   // Remove the mapping for the given channel id. No error is signaled if the
113   // channel_id doesn't exist
Remove(const std::string & channel_id)114   void Remove(const std::string& channel_id) {
115     base::AutoLock locked(lock_);
116     map_.erase(channel_id);
117   }
118 
119   // Insert a mapping from @channel_id to @fd. It's a fatal error to insert a
120   // mapping if one already exists for the given channel_id
Insert(const std::string & channel_id,int fd)121   void Insert(const std::string& channel_id, int fd) {
122     base::AutoLock locked(lock_);
123     DCHECK_NE(-1, fd);
124 
125     ChannelToFDMap::const_iterator i = map_.find(channel_id);
126     CHECK(i == map_.end()) << "Creating second IPC server (fd " << fd << ") "
127                            << "for '" << channel_id << "' while first "
128                            << "(fd " << i->second << ") still exists";
129     map_[channel_id] = fd;
130   }
131 
132  private:
133   base::Lock lock_;
134   typedef std::map<std::string, int> ChannelToFDMap;
135   ChannelToFDMap map_;
136 
137   friend struct DefaultSingletonTraits<PipeMap>;
138 };
139 
140 //------------------------------------------------------------------------------
141 
SocketWriteErrorIsRecoverable()142 bool SocketWriteErrorIsRecoverable() {
143 #if defined(OS_MACOSX)
144   // On OS X if sendmsg() is trying to send fds between processes and there
145   // isn't enough room in the output buffer to send the fd structure over
146   // atomically then EMSGSIZE is returned.
147   //
148   // EMSGSIZE presents a problem since the system APIs can only call us when
149   // there's room in the socket buffer and not when there is "enough" room.
150   //
151   // The current behavior is to return to the event loop when EMSGSIZE is
152   // received and hopefull service another FD.  This is however still
153   // technically a busy wait since the event loop will call us right back until
154   // the receiver has read enough data to allow passing the FD over atomically.
155   return errno == EAGAIN || errno == EMSGSIZE;
156 #else
157   return errno == EAGAIN;
158 #endif  // OS_MACOSX
159 }
160 
161 }  // namespace
162 //------------------------------------------------------------------------------
163 
164 #if defined(OS_LINUX)
165 int Channel::ChannelImpl::global_pid_ = 0;
166 #endif  // OS_LINUX
167 
ChannelImpl(const IPC::ChannelHandle & channel_handle,Mode mode,Listener * listener)168 Channel::ChannelImpl::ChannelImpl(const IPC::ChannelHandle& channel_handle,
169                                   Mode mode, Listener* listener)
170     : ChannelReader(listener),
171       mode_(mode),
172       peer_pid_(base::kNullProcessId),
173       is_blocked_on_write_(false),
174       waiting_connect_(true),
175       message_send_bytes_written_(0),
176       server_listen_pipe_(-1),
177       pipe_(-1),
178       client_pipe_(-1),
179 #if defined(IPC_USES_READWRITE)
180       fd_pipe_(-1),
181       remote_fd_pipe_(-1),
182 #endif  // IPC_USES_READWRITE
183       pipe_name_(channel_handle.name),
184       must_unlink_(false) {
185   memset(input_cmsg_buf_, 0, sizeof(input_cmsg_buf_));
186   if (!CreatePipe(channel_handle)) {
187     // The pipe may have been closed already.
188     const char *modestr = (mode_ & MODE_SERVER_FLAG) ? "server" : "client";
189     LOG(WARNING) << "Unable to create pipe named \"" << channel_handle.name
190                  << "\" in " << modestr << " mode";
191   }
192 }
193 
~ChannelImpl()194 Channel::ChannelImpl::~ChannelImpl() {
195   Close();
196 }
197 
SocketPair(int * fd1,int * fd2)198 bool SocketPair(int* fd1, int* fd2) {
199   int pipe_fds[2];
200   if (socketpair(AF_UNIX, SOCK_STREAM, 0, pipe_fds) != 0) {
201     PLOG(ERROR) << "socketpair()";
202     return false;
203   }
204 
205   // Set both ends to be non-blocking.
206   if (fcntl(pipe_fds[0], F_SETFL, O_NONBLOCK) == -1 ||
207       fcntl(pipe_fds[1], F_SETFL, O_NONBLOCK) == -1) {
208     PLOG(ERROR) << "fcntl(O_NONBLOCK)";
209     if (IGNORE_EINTR(close(pipe_fds[0])) < 0)
210       PLOG(ERROR) << "close";
211     if (IGNORE_EINTR(close(pipe_fds[1])) < 0)
212       PLOG(ERROR) << "close";
213     return false;
214   }
215 
216   *fd1 = pipe_fds[0];
217   *fd2 = pipe_fds[1];
218 
219   return true;
220 }
221 
CreatePipe(const IPC::ChannelHandle & channel_handle)222 bool Channel::ChannelImpl::CreatePipe(
223     const IPC::ChannelHandle& channel_handle) {
224   DCHECK(server_listen_pipe_ == -1 && pipe_ == -1);
225 
226   // Four possible cases:
227   // 1) It's a channel wrapping a pipe that is given to us.
228   // 2) It's for a named channel, so we create it.
229   // 3) It's for a client that we implement ourself. This is used
230   //    in unittesting.
231   // 4) It's the initial IPC channel:
232   //   4a) Client side: Pull the pipe out of the GlobalDescriptors set.
233   //   4b) Server side: create the pipe.
234 
235   int local_pipe = -1;
236   if (channel_handle.socket.fd != -1) {
237     // Case 1 from comment above.
238     local_pipe = channel_handle.socket.fd;
239 #if defined(IPC_USES_READWRITE)
240     // Test the socket passed into us to make sure it is nonblocking.
241     // We don't want to call read/write on a blocking socket.
242     int value = fcntl(local_pipe, F_GETFL);
243     if (value == -1) {
244       PLOG(ERROR) << "fcntl(F_GETFL) " << pipe_name_;
245       return false;
246     }
247     if (!(value & O_NONBLOCK)) {
248       LOG(ERROR) << "Socket " << pipe_name_ << " must be O_NONBLOCK";
249       return false;
250     }
251 #endif   // IPC_USES_READWRITE
252   } else if (mode_ & MODE_NAMED_FLAG) {
253     // Case 2 from comment above.
254     if (mode_ & MODE_SERVER_FLAG) {
255       if (!CreateServerUnixDomainSocket(base::FilePath(pipe_name_),
256                                         &local_pipe)) {
257         return false;
258       }
259       must_unlink_ = true;
260     } else if (mode_ & MODE_CLIENT_FLAG) {
261       if (!CreateClientUnixDomainSocket(base::FilePath(pipe_name_),
262                                         &local_pipe)) {
263         return false;
264       }
265     } else {
266       LOG(ERROR) << "Bad mode: " << mode_;
267       return false;
268     }
269   } else {
270     local_pipe = PipeMap::GetInstance()->Lookup(pipe_name_);
271     if (mode_ & MODE_CLIENT_FLAG) {
272       if (local_pipe != -1) {
273         // Case 3 from comment above.
274         // We only allow one connection.
275         local_pipe = HANDLE_EINTR(dup(local_pipe));
276         PipeMap::GetInstance()->Remove(pipe_name_);
277       } else {
278         // Case 4a from comment above.
279         // Guard against inappropriate reuse of the initial IPC channel.  If
280         // an IPC channel closes and someone attempts to reuse it by name, the
281         // initial channel must not be recycled here.  http://crbug.com/26754.
282         static bool used_initial_channel = false;
283         if (used_initial_channel) {
284           LOG(FATAL) << "Denying attempt to reuse initial IPC channel for "
285                      << pipe_name_;
286           return false;
287         }
288         used_initial_channel = true;
289 
290         local_pipe =
291             base::GlobalDescriptors::GetInstance()->Get(kPrimaryIPCChannel);
292       }
293     } else if (mode_ & MODE_SERVER_FLAG) {
294       // Case 4b from comment above.
295       if (local_pipe != -1) {
296         LOG(ERROR) << "Server already exists for " << pipe_name_;
297         return false;
298       }
299       base::AutoLock lock(client_pipe_lock_);
300       if (!SocketPair(&local_pipe, &client_pipe_))
301         return false;
302       PipeMap::GetInstance()->Insert(pipe_name_, client_pipe_);
303     } else {
304       LOG(ERROR) << "Bad mode: " << mode_;
305       return false;
306     }
307   }
308 
309 #if defined(IPC_USES_READWRITE)
310   // Create a dedicated socketpair() for exchanging file descriptors.
311   // See comments for IPC_USES_READWRITE for details.
312   if (mode_ & MODE_CLIENT_FLAG) {
313     if (!SocketPair(&fd_pipe_, &remote_fd_pipe_)) {
314       return false;
315     }
316   }
317 #endif  // IPC_USES_READWRITE
318 
319   if ((mode_ & MODE_SERVER_FLAG) && (mode_ & MODE_NAMED_FLAG)) {
320     server_listen_pipe_ = local_pipe;
321     local_pipe = -1;
322   }
323 
324   pipe_ = local_pipe;
325   return true;
326 }
327 
Connect()328 bool Channel::ChannelImpl::Connect() {
329   if (server_listen_pipe_ == -1 && pipe_ == -1) {
330     DLOG(INFO) << "Channel creation failed: " << pipe_name_;
331     return false;
332   }
333 
334   bool did_connect = true;
335   if (server_listen_pipe_ != -1) {
336     // Watch the pipe for connections, and turn any connections into
337     // active sockets.
338     base::MessageLoopForIO::current()->WatchFileDescriptor(
339         server_listen_pipe_,
340         true,
341         base::MessageLoopForIO::WATCH_READ,
342         &server_listen_connection_watcher_,
343         this);
344   } else {
345     did_connect = AcceptConnection();
346   }
347   return did_connect;
348 }
349 
CloseFileDescriptors(Message * msg)350 void Channel::ChannelImpl::CloseFileDescriptors(Message* msg) {
351 #if defined(OS_MACOSX)
352   // There is a bug on OSX which makes it dangerous to close
353   // a file descriptor while it is in transit. So instead we
354   // store the file descriptor in a set and send a message to
355   // the recipient, which is queued AFTER the message that
356   // sent the FD. The recipient will reply to the message,
357   // letting us know that it is now safe to close the file
358   // descriptor. For more information, see:
359   // http://crbug.com/298276
360   std::vector<int> to_close;
361   msg->file_descriptor_set()->ReleaseFDsToClose(&to_close);
362   for (size_t i = 0; i < to_close.size(); i++) {
363     fds_to_close_.insert(to_close[i]);
364     QueueCloseFDMessage(to_close[i], 2);
365   }
366 #else
367   msg->file_descriptor_set()->CommitAll();
368 #endif
369 }
370 
ProcessOutgoingMessages()371 bool Channel::ChannelImpl::ProcessOutgoingMessages() {
372   DCHECK(!waiting_connect_);  // Why are we trying to send messages if there's
373                               // no connection?
374   if (output_queue_.empty())
375     return true;
376 
377   if (pipe_ == -1)
378     return false;
379 
380   // Write out all the messages we can till the write blocks or there are no
381   // more outgoing messages.
382   while (!output_queue_.empty()) {
383     Message* msg = output_queue_.front();
384 
385     size_t amt_to_write = msg->size() - message_send_bytes_written_;
386     DCHECK_NE(0U, amt_to_write);
387     const char* out_bytes = reinterpret_cast<const char*>(msg->data()) +
388         message_send_bytes_written_;
389 
390     struct msghdr msgh = {0};
391     struct iovec iov = {const_cast<char*>(out_bytes), amt_to_write};
392     msgh.msg_iov = &iov;
393     msgh.msg_iovlen = 1;
394     char buf[CMSG_SPACE(
395         sizeof(int) * FileDescriptorSet::kMaxDescriptorsPerMessage)];
396 
397     ssize_t bytes_written = 1;
398     int fd_written = -1;
399 
400     if (message_send_bytes_written_ == 0 &&
401         !msg->file_descriptor_set()->empty()) {
402       // This is the first chunk of a message which has descriptors to send
403       struct cmsghdr *cmsg;
404       const unsigned num_fds = msg->file_descriptor_set()->size();
405 
406       DCHECK(num_fds <= FileDescriptorSet::kMaxDescriptorsPerMessage);
407       if (msg->file_descriptor_set()->ContainsDirectoryDescriptor()) {
408         LOG(FATAL) << "Panic: attempting to transport directory descriptor over"
409                       " IPC. Aborting to maintain sandbox isolation.";
410         // If you have hit this then something tried to send a file descriptor
411         // to a directory over an IPC channel. Since IPC channels span
412         // sandboxes this is very bad: the receiving process can use openat
413         // with ".." elements in the path in order to reach the real
414         // filesystem.
415       }
416 
417       msgh.msg_control = buf;
418       msgh.msg_controllen = CMSG_SPACE(sizeof(int) * num_fds);
419       cmsg = CMSG_FIRSTHDR(&msgh);
420       cmsg->cmsg_level = SOL_SOCKET;
421       cmsg->cmsg_type = SCM_RIGHTS;
422       cmsg->cmsg_len = CMSG_LEN(sizeof(int) * num_fds);
423       msg->file_descriptor_set()->GetDescriptors(
424           reinterpret_cast<int*>(CMSG_DATA(cmsg)));
425       msgh.msg_controllen = cmsg->cmsg_len;
426 
427       // DCHECK_LE above already checks that
428       // num_fds < kMaxDescriptorsPerMessage so no danger of overflow.
429       msg->header()->num_fds = static_cast<uint16>(num_fds);
430 
431 #if defined(IPC_USES_READWRITE)
432       if (!IsHelloMessage(*msg)) {
433         // Only the Hello message sends the file descriptor with the message.
434         // Subsequently, we can send file descriptors on the dedicated
435         // fd_pipe_ which makes Seccomp sandbox operation more efficient.
436         struct iovec fd_pipe_iov = { const_cast<char *>(""), 1 };
437         msgh.msg_iov = &fd_pipe_iov;
438         fd_written = fd_pipe_;
439         bytes_written = HANDLE_EINTR(sendmsg(fd_pipe_, &msgh, MSG_DONTWAIT));
440         msgh.msg_iov = &iov;
441         msgh.msg_controllen = 0;
442         if (bytes_written > 0) {
443           CloseFileDescriptors(msg);
444         }
445       }
446 #endif  // IPC_USES_READWRITE
447     }
448 
449     if (bytes_written == 1) {
450       fd_written = pipe_;
451 #if defined(IPC_USES_READWRITE)
452       if ((mode_ & MODE_CLIENT_FLAG) && IsHelloMessage(*msg)) {
453         DCHECK_EQ(msg->file_descriptor_set()->size(), 1U);
454       }
455       if (!msgh.msg_controllen) {
456         bytes_written = HANDLE_EINTR(write(pipe_, out_bytes, amt_to_write));
457       } else
458 #endif  // IPC_USES_READWRITE
459       {
460         bytes_written = HANDLE_EINTR(sendmsg(pipe_, &msgh, MSG_DONTWAIT));
461       }
462     }
463     if (bytes_written > 0)
464       CloseFileDescriptors(msg);
465 
466     if (bytes_written < 0 && !SocketWriteErrorIsRecoverable()) {
467 #if defined(OS_MACOSX)
468       // On OSX writing to a pipe with no listener returns EPERM.
469       if (errno == EPERM) {
470         Close();
471         return false;
472       }
473 #endif  // OS_MACOSX
474       if (errno == EPIPE) {
475         Close();
476         return false;
477       }
478       PLOG(ERROR) << "pipe error on "
479                   << fd_written
480                   << " Currently writing message of size: "
481                   << msg->size();
482       return false;
483     }
484 
485     if (static_cast<size_t>(bytes_written) != amt_to_write) {
486       if (bytes_written > 0) {
487         // If write() fails with EAGAIN then bytes_written will be -1.
488         message_send_bytes_written_ += bytes_written;
489       }
490 
491       // Tell libevent to call us back once things are unblocked.
492       is_blocked_on_write_ = true;
493       base::MessageLoopForIO::current()->WatchFileDescriptor(
494           pipe_,
495           false,  // One shot
496           base::MessageLoopForIO::WATCH_WRITE,
497           &write_watcher_,
498           this);
499       return true;
500     } else {
501       message_send_bytes_written_ = 0;
502 
503       // Message sent OK!
504       DVLOG(2) << "sent message @" << msg << " on channel @" << this
505                << " with type " << msg->type() << " on fd " << pipe_;
506       delete output_queue_.front();
507       output_queue_.pop();
508     }
509   }
510   return true;
511 }
512 
Send(Message * message)513 bool Channel::ChannelImpl::Send(Message* message) {
514   DVLOG(2) << "sending message @" << message << " on channel @" << this
515            << " with type " << message->type()
516            << " (" << output_queue_.size() << " in queue)";
517 
518 #ifdef IPC_MESSAGE_LOG_ENABLED
519   Logging::GetInstance()->OnSendMessage(message, "");
520 #endif  // IPC_MESSAGE_LOG_ENABLED
521 
522   message->TraceMessageBegin();
523   output_queue_.push(message);
524   if (!is_blocked_on_write_ && !waiting_connect_) {
525     return ProcessOutgoingMessages();
526   }
527 
528   return true;
529 }
530 
GetClientFileDescriptor()531 int Channel::ChannelImpl::GetClientFileDescriptor() {
532   base::AutoLock lock(client_pipe_lock_);
533   return client_pipe_;
534 }
535 
TakeClientFileDescriptor()536 int Channel::ChannelImpl::TakeClientFileDescriptor() {
537   base::AutoLock lock(client_pipe_lock_);
538   int fd = client_pipe_;
539   if (client_pipe_ != -1) {
540     PipeMap::GetInstance()->Remove(pipe_name_);
541     client_pipe_ = -1;
542   }
543   return fd;
544 }
545 
CloseClientFileDescriptor()546 void Channel::ChannelImpl::CloseClientFileDescriptor() {
547   base::AutoLock lock(client_pipe_lock_);
548   if (client_pipe_ != -1) {
549     PipeMap::GetInstance()->Remove(pipe_name_);
550     if (IGNORE_EINTR(close(client_pipe_)) < 0)
551       PLOG(ERROR) << "close " << pipe_name_;
552     client_pipe_ = -1;
553   }
554 }
555 
AcceptsConnections() const556 bool Channel::ChannelImpl::AcceptsConnections() const {
557   return server_listen_pipe_ != -1;
558 }
559 
HasAcceptedConnection() const560 bool Channel::ChannelImpl::HasAcceptedConnection() const {
561   return AcceptsConnections() && pipe_ != -1;
562 }
563 
GetPeerEuid(uid_t * peer_euid) const564 bool Channel::ChannelImpl::GetPeerEuid(uid_t* peer_euid) const {
565   DCHECK(!(mode_ & MODE_SERVER) || HasAcceptedConnection());
566   return IPC::GetPeerEuid(pipe_, peer_euid);
567 }
568 
ResetToAcceptingConnectionState()569 void Channel::ChannelImpl::ResetToAcceptingConnectionState() {
570   // Unregister libevent for the unix domain socket and close it.
571   read_watcher_.StopWatchingFileDescriptor();
572   write_watcher_.StopWatchingFileDescriptor();
573   if (pipe_ != -1) {
574     if (IGNORE_EINTR(close(pipe_)) < 0)
575       PLOG(ERROR) << "close pipe_ " << pipe_name_;
576     pipe_ = -1;
577   }
578 #if defined(IPC_USES_READWRITE)
579   if (fd_pipe_ != -1) {
580     if (IGNORE_EINTR(close(fd_pipe_)) < 0)
581       PLOG(ERROR) << "close fd_pipe_ " << pipe_name_;
582     fd_pipe_ = -1;
583   }
584   if (remote_fd_pipe_ != -1) {
585     if (IGNORE_EINTR(close(remote_fd_pipe_)) < 0)
586       PLOG(ERROR) << "close remote_fd_pipe_ " << pipe_name_;
587     remote_fd_pipe_ = -1;
588   }
589 #endif  // IPC_USES_READWRITE
590 
591   while (!output_queue_.empty()) {
592     Message* m = output_queue_.front();
593     output_queue_.pop();
594     delete m;
595   }
596 
597   // Close any outstanding, received file descriptors.
598   ClearInputFDs();
599 
600 #if defined(OS_MACOSX)
601   // Clear any outstanding, sent file descriptors.
602   for (std::set<int>::iterator i = fds_to_close_.begin();
603        i != fds_to_close_.end();
604        ++i) {
605     if (IGNORE_EINTR(close(*i)) < 0)
606       PLOG(ERROR) << "close";
607   }
608   fds_to_close_.clear();
609 #endif
610 }
611 
612 // static
IsNamedServerInitialized(const std::string & channel_id)613 bool Channel::ChannelImpl::IsNamedServerInitialized(
614     const std::string& channel_id) {
615   return base::PathExists(base::FilePath(channel_id));
616 }
617 
618 #if defined(OS_LINUX)
619 // static
SetGlobalPid(int pid)620 void Channel::ChannelImpl::SetGlobalPid(int pid) {
621   global_pid_ = pid;
622 }
623 #endif  // OS_LINUX
624 
625 // Called by libevent when we can read from the pipe without blocking.
OnFileCanReadWithoutBlocking(int fd)626 void Channel::ChannelImpl::OnFileCanReadWithoutBlocking(int fd) {
627   if (fd == server_listen_pipe_) {
628     int new_pipe = 0;
629     if (!ServerAcceptConnection(server_listen_pipe_, &new_pipe) ||
630         new_pipe < 0) {
631       Close();
632       listener()->OnChannelListenError();
633     }
634 
635     if (pipe_ != -1) {
636       // We already have a connection. We only handle one at a time.
637       // close our new descriptor.
638       if (HANDLE_EINTR(shutdown(new_pipe, SHUT_RDWR)) < 0)
639         DPLOG(ERROR) << "shutdown " << pipe_name_;
640       if (IGNORE_EINTR(close(new_pipe)) < 0)
641         DPLOG(ERROR) << "close " << pipe_name_;
642       listener()->OnChannelDenied();
643       return;
644     }
645     pipe_ = new_pipe;
646 
647     if ((mode_ & MODE_OPEN_ACCESS_FLAG) == 0) {
648       // Verify that the IPC channel peer is running as the same user.
649       uid_t client_euid;
650       if (!GetPeerEuid(&client_euid)) {
651         DLOG(ERROR) << "Unable to query client euid";
652         ResetToAcceptingConnectionState();
653         return;
654       }
655       if (client_euid != geteuid()) {
656         DLOG(WARNING) << "Client euid is not authorised";
657         ResetToAcceptingConnectionState();
658         return;
659       }
660     }
661 
662     if (!AcceptConnection()) {
663       NOTREACHED() << "AcceptConnection should not fail on server";
664     }
665     waiting_connect_ = false;
666   } else if (fd == pipe_) {
667     if (waiting_connect_ && (mode_ & MODE_SERVER_FLAG)) {
668       waiting_connect_ = false;
669     }
670     if (!ProcessIncomingMessages()) {
671       // ClosePipeOnError may delete this object, so we mustn't call
672       // ProcessOutgoingMessages.
673       ClosePipeOnError();
674       return;
675     }
676   } else {
677     NOTREACHED() << "Unknown pipe " << fd;
678   }
679 
680   // If we're a server and handshaking, then we want to make sure that we
681   // only send our handshake message after we've processed the client's.
682   // This gives us a chance to kill the client if the incoming handshake
683   // is invalid. This also flushes any closefd messagse.
684   if (!is_blocked_on_write_) {
685     if (!ProcessOutgoingMessages()) {
686       ClosePipeOnError();
687     }
688   }
689 }
690 
691 // Called by libevent when we can write to the pipe without blocking.
OnFileCanWriteWithoutBlocking(int fd)692 void Channel::ChannelImpl::OnFileCanWriteWithoutBlocking(int fd) {
693   DCHECK_EQ(pipe_, fd);
694   is_blocked_on_write_ = false;
695   if (!ProcessOutgoingMessages()) {
696     ClosePipeOnError();
697   }
698 }
699 
AcceptConnection()700 bool Channel::ChannelImpl::AcceptConnection() {
701   base::MessageLoopForIO::current()->WatchFileDescriptor(
702       pipe_, true, base::MessageLoopForIO::WATCH_READ, &read_watcher_, this);
703   QueueHelloMessage();
704 
705   if (mode_ & MODE_CLIENT_FLAG) {
706     // If we are a client we want to send a hello message out immediately.
707     // In server mode we will send a hello message when we receive one from a
708     // client.
709     waiting_connect_ = false;
710     return ProcessOutgoingMessages();
711   } else if (mode_ & MODE_SERVER_FLAG) {
712     waiting_connect_ = true;
713     return true;
714   } else {
715     NOTREACHED();
716     return false;
717   }
718 }
719 
ClosePipeOnError()720 void Channel::ChannelImpl::ClosePipeOnError() {
721   if (HasAcceptedConnection()) {
722     ResetToAcceptingConnectionState();
723     listener()->OnChannelError();
724   } else {
725     Close();
726     if (AcceptsConnections()) {
727       listener()->OnChannelListenError();
728     } else {
729       listener()->OnChannelError();
730     }
731   }
732 }
733 
GetHelloMessageProcId()734 int Channel::ChannelImpl::GetHelloMessageProcId() {
735   int pid = base::GetCurrentProcId();
736 #if defined(OS_LINUX)
737   // Our process may be in a sandbox with a separate PID namespace.
738   if (global_pid_) {
739     pid = global_pid_;
740   }
741 #endif
742   return pid;
743 }
744 
QueueHelloMessage()745 void Channel::ChannelImpl::QueueHelloMessage() {
746   // Create the Hello message
747   scoped_ptr<Message> msg(new Message(MSG_ROUTING_NONE,
748                                       HELLO_MESSAGE_TYPE,
749                                       IPC::Message::PRIORITY_NORMAL));
750   if (!msg->WriteInt(GetHelloMessageProcId())) {
751     NOTREACHED() << "Unable to pickle hello message proc id";
752   }
753 #if defined(IPC_USES_READWRITE)
754   scoped_ptr<Message> hello;
755   if (remote_fd_pipe_ != -1) {
756     if (!msg->WriteFileDescriptor(base::FileDescriptor(remote_fd_pipe_,
757                                                        false))) {
758       NOTREACHED() << "Unable to pickle hello message file descriptors";
759     }
760     DCHECK_EQ(msg->file_descriptor_set()->size(), 1U);
761   }
762 #endif  // IPC_USES_READWRITE
763   output_queue_.push(msg.release());
764 }
765 
ReadData(char * buffer,int buffer_len,int * bytes_read)766 Channel::ChannelImpl::ReadState Channel::ChannelImpl::ReadData(
767     char* buffer,
768     int buffer_len,
769     int* bytes_read) {
770   if (pipe_ == -1)
771     return READ_FAILED;
772 
773   struct msghdr msg = {0};
774 
775   struct iovec iov = {buffer, static_cast<size_t>(buffer_len)};
776   msg.msg_iov = &iov;
777   msg.msg_iovlen = 1;
778 
779   msg.msg_control = input_cmsg_buf_;
780 
781   // recvmsg() returns 0 if the connection has closed or EAGAIN if no data
782   // is waiting on the pipe.
783 #if defined(IPC_USES_READWRITE)
784   if (fd_pipe_ >= 0) {
785     *bytes_read = HANDLE_EINTR(read(pipe_, buffer, buffer_len));
786     msg.msg_controllen = 0;
787   } else
788 #endif  // IPC_USES_READWRITE
789   {
790     msg.msg_controllen = sizeof(input_cmsg_buf_);
791     *bytes_read = HANDLE_EINTR(recvmsg(pipe_, &msg, MSG_DONTWAIT));
792   }
793   if (*bytes_read < 0) {
794     if (errno == EAGAIN) {
795       return READ_PENDING;
796 #if defined(OS_MACOSX)
797     } else if (errno == EPERM) {
798       // On OSX, reading from a pipe with no listener returns EPERM
799       // treat this as a special case to prevent spurious error messages
800       // to the console.
801       return READ_FAILED;
802 #endif  // OS_MACOSX
803     } else if (errno == ECONNRESET || errno == EPIPE) {
804       return READ_FAILED;
805     } else {
806       PLOG(ERROR) << "pipe error (" << pipe_ << ")";
807       return READ_FAILED;
808     }
809   } else if (*bytes_read == 0) {
810     // The pipe has closed...
811     return READ_FAILED;
812   }
813   DCHECK(*bytes_read);
814 
815   CloseClientFileDescriptor();
816 
817   // Read any file descriptors from the message.
818   if (!ExtractFileDescriptorsFromMsghdr(&msg))
819     return READ_FAILED;
820   return READ_SUCCEEDED;
821 }
822 
823 #if defined(IPC_USES_READWRITE)
ReadFileDescriptorsFromFDPipe()824 bool Channel::ChannelImpl::ReadFileDescriptorsFromFDPipe() {
825   char dummy;
826   struct iovec fd_pipe_iov = { &dummy, 1 };
827 
828   struct msghdr msg = { 0 };
829   msg.msg_iov = &fd_pipe_iov;
830   msg.msg_iovlen = 1;
831   msg.msg_control = input_cmsg_buf_;
832   msg.msg_controllen = sizeof(input_cmsg_buf_);
833   ssize_t bytes_received = HANDLE_EINTR(recvmsg(fd_pipe_, &msg, MSG_DONTWAIT));
834 
835   if (bytes_received != 1)
836     return true;  // No message waiting.
837 
838   if (!ExtractFileDescriptorsFromMsghdr(&msg))
839     return false;
840   return true;
841 }
842 #endif
843 
844 // On Posix, we need to fix up the file descriptors before the input message
845 // is dispatched.
846 //
847 // This will read from the input_fds_ (READWRITE mode only) and read more
848 // handles from the FD pipe if necessary.
WillDispatchInputMessage(Message * msg)849 bool Channel::ChannelImpl::WillDispatchInputMessage(Message* msg) {
850   uint16 header_fds = msg->header()->num_fds;
851   if (!header_fds)
852     return true;  // Nothing to do.
853 
854   // The message has file descriptors.
855   const char* error = NULL;
856   if (header_fds > input_fds_.size()) {
857     // The message has been completely received, but we didn't get
858     // enough file descriptors.
859 #if defined(IPC_USES_READWRITE)
860     if (!ReadFileDescriptorsFromFDPipe())
861       return false;
862     if (header_fds > input_fds_.size())
863 #endif  // IPC_USES_READWRITE
864       error = "Message needs unreceived descriptors";
865   }
866 
867   if (header_fds > FileDescriptorSet::kMaxDescriptorsPerMessage)
868     error = "Message requires an excessive number of descriptors";
869 
870   if (error) {
871     LOG(WARNING) << error
872                  << " channel:" << this
873                  << " message-type:" << msg->type()
874                  << " header()->num_fds:" << header_fds;
875     // Abort the connection.
876     ClearInputFDs();
877     return false;
878   }
879 
880   // The shenaniganery below with &foo.front() requires input_fds_ to have
881   // contiguous underlying storage (such as a simple array or a std::vector).
882   // This is why the header warns not to make input_fds_ a deque<>.
883   msg->file_descriptor_set()->SetDescriptors(&input_fds_.front(),
884                                              header_fds);
885   input_fds_.erase(input_fds_.begin(), input_fds_.begin() + header_fds);
886   return true;
887 }
888 
DidEmptyInputBuffers()889 bool Channel::ChannelImpl::DidEmptyInputBuffers() {
890   // When the input data buffer is empty, the fds should be too. If this is
891   // not the case, we probably have a rogue renderer which is trying to fill
892   // our descriptor table.
893   return input_fds_.empty();
894 }
895 
ExtractFileDescriptorsFromMsghdr(msghdr * msg)896 bool Channel::ChannelImpl::ExtractFileDescriptorsFromMsghdr(msghdr* msg) {
897   // Check that there are any control messages. On OSX, CMSG_FIRSTHDR will
898   // return an invalid non-NULL pointer in the case that controllen == 0.
899   if (msg->msg_controllen == 0)
900     return true;
901 
902   for (cmsghdr* cmsg = CMSG_FIRSTHDR(msg);
903        cmsg;
904        cmsg = CMSG_NXTHDR(msg, cmsg)) {
905     if (cmsg->cmsg_level == SOL_SOCKET && cmsg->cmsg_type == SCM_RIGHTS) {
906       unsigned payload_len = cmsg->cmsg_len - CMSG_LEN(0);
907       DCHECK_EQ(0U, payload_len % sizeof(int));
908       const int* file_descriptors = reinterpret_cast<int*>(CMSG_DATA(cmsg));
909       unsigned num_file_descriptors = payload_len / 4;
910       input_fds_.insert(input_fds_.end(),
911                         file_descriptors,
912                         file_descriptors + num_file_descriptors);
913 
914       // Check this after adding the FDs so we don't leak them.
915       if (msg->msg_flags & MSG_CTRUNC) {
916         ClearInputFDs();
917         return false;
918       }
919 
920       return true;
921     }
922   }
923 
924   // No file descriptors found, but that's OK.
925   return true;
926 }
927 
ClearInputFDs()928 void Channel::ChannelImpl::ClearInputFDs() {
929   for (size_t i = 0; i < input_fds_.size(); ++i) {
930     if (IGNORE_EINTR(close(input_fds_[i])) < 0)
931       PLOG(ERROR) << "close ";
932   }
933   input_fds_.clear();
934 }
935 
QueueCloseFDMessage(int fd,int hops)936 void Channel::ChannelImpl::QueueCloseFDMessage(int fd, int hops) {
937   switch (hops) {
938     case 1:
939     case 2: {
940       // Create the message
941       scoped_ptr<Message> msg(new Message(MSG_ROUTING_NONE,
942                                           CLOSE_FD_MESSAGE_TYPE,
943                                           IPC::Message::PRIORITY_NORMAL));
944       if (!msg->WriteInt(hops - 1) || !msg->WriteInt(fd)) {
945         NOTREACHED() << "Unable to pickle close fd.";
946       }
947       // Send(msg.release());
948       output_queue_.push(msg.release());
949       break;
950     }
951 
952     default:
953       NOTREACHED();
954       break;
955   }
956 }
957 
HandleInternalMessage(const Message & msg)958 void Channel::ChannelImpl::HandleInternalMessage(const Message& msg) {
959   // The Hello message contains only the process id.
960   PickleIterator iter(msg);
961 
962   switch (msg.type()) {
963     default:
964       NOTREACHED();
965       break;
966 
967     case Channel::HELLO_MESSAGE_TYPE:
968       int pid;
969       if (!msg.ReadInt(&iter, &pid))
970         NOTREACHED();
971 
972 #if defined(IPC_USES_READWRITE)
973       if (mode_ & MODE_SERVER_FLAG) {
974         // With IPC_USES_READWRITE, the Hello message from the client to the
975         // server also contains the fd_pipe_, which  will be used for all
976         // subsequent file descriptor passing.
977         DCHECK_EQ(msg.file_descriptor_set()->size(), 1U);
978         base::FileDescriptor descriptor;
979         if (!msg.ReadFileDescriptor(&iter, &descriptor)) {
980           NOTREACHED();
981         }
982         fd_pipe_ = descriptor.fd;
983         CHECK(descriptor.auto_close);
984       }
985 #endif  // IPC_USES_READWRITE
986       peer_pid_ = pid;
987       listener()->OnChannelConnected(pid);
988       break;
989 
990 #if defined(OS_MACOSX)
991     case Channel::CLOSE_FD_MESSAGE_TYPE:
992       int fd, hops;
993       if (!msg.ReadInt(&iter, &hops))
994         NOTREACHED();
995       if (!msg.ReadInt(&iter, &fd))
996         NOTREACHED();
997       if (hops == 0) {
998         if (fds_to_close_.erase(fd) > 0) {
999           if (IGNORE_EINTR(close(fd)) < 0)
1000             PLOG(ERROR) << "close";
1001         } else {
1002           NOTREACHED();
1003         }
1004       } else {
1005         QueueCloseFDMessage(fd, hops);
1006       }
1007       break;
1008 #endif
1009   }
1010 }
1011 
Close()1012 void Channel::ChannelImpl::Close() {
1013   // Close can be called multiple time, so we need to make sure we're
1014   // idempotent.
1015 
1016   ResetToAcceptingConnectionState();
1017 
1018   if (must_unlink_) {
1019     unlink(pipe_name_.c_str());
1020     must_unlink_ = false;
1021   }
1022   if (server_listen_pipe_ != -1) {
1023     if (IGNORE_EINTR(close(server_listen_pipe_)) < 0)
1024       DPLOG(ERROR) << "close " << server_listen_pipe_;
1025     server_listen_pipe_ = -1;
1026     // Unregister libevent for the listening socket and close it.
1027     server_listen_connection_watcher_.StopWatchingFileDescriptor();
1028   }
1029 
1030   CloseClientFileDescriptor();
1031 }
1032 
1033 //------------------------------------------------------------------------------
1034 // Channel's methods simply call through to ChannelImpl.
Channel(const IPC::ChannelHandle & channel_handle,Mode mode,Listener * listener)1035 Channel::Channel(const IPC::ChannelHandle& channel_handle, Mode mode,
1036                  Listener* listener)
1037     : channel_impl_(new ChannelImpl(channel_handle, mode, listener)) {
1038 }
1039 
~Channel()1040 Channel::~Channel() {
1041   delete channel_impl_;
1042 }
1043 
Connect()1044 bool Channel::Connect() {
1045   return channel_impl_->Connect();
1046 }
1047 
Close()1048 void Channel::Close() {
1049   if (channel_impl_)
1050     channel_impl_->Close();
1051 }
1052 
peer_pid() const1053 base::ProcessId Channel::peer_pid() const {
1054   return channel_impl_->peer_pid();
1055 }
1056 
Send(Message * message)1057 bool Channel::Send(Message* message) {
1058   return channel_impl_->Send(message);
1059 }
1060 
GetClientFileDescriptor() const1061 int Channel::GetClientFileDescriptor() const {
1062   return channel_impl_->GetClientFileDescriptor();
1063 }
1064 
TakeClientFileDescriptor()1065 int Channel::TakeClientFileDescriptor() {
1066   return channel_impl_->TakeClientFileDescriptor();
1067 }
1068 
AcceptsConnections() const1069 bool Channel::AcceptsConnections() const {
1070   return channel_impl_->AcceptsConnections();
1071 }
1072 
HasAcceptedConnection() const1073 bool Channel::HasAcceptedConnection() const {
1074   return channel_impl_->HasAcceptedConnection();
1075 }
1076 
GetPeerEuid(uid_t * peer_euid) const1077 bool Channel::GetPeerEuid(uid_t* peer_euid) const {
1078   return channel_impl_->GetPeerEuid(peer_euid);
1079 }
1080 
ResetToAcceptingConnectionState()1081 void Channel::ResetToAcceptingConnectionState() {
1082   channel_impl_->ResetToAcceptingConnectionState();
1083 }
1084 
1085 // static
IsNamedServerInitialized(const std::string & channel_id)1086 bool Channel::IsNamedServerInitialized(const std::string& channel_id) {
1087   return ChannelImpl::IsNamedServerInitialized(channel_id);
1088 }
1089 
1090 // static
GenerateVerifiedChannelID(const std::string & prefix)1091 std::string Channel::GenerateVerifiedChannelID(const std::string& prefix) {
1092   // A random name is sufficient validation on posix systems, so we don't need
1093   // an additional shared secret.
1094 
1095   std::string id = prefix;
1096   if (!id.empty())
1097     id.append(".");
1098 
1099   return id.append(GenerateUniqueRandomChannelID());
1100 }
1101 
1102 
1103 #if defined(OS_LINUX)
1104 // static
SetGlobalPid(int pid)1105 void Channel::SetGlobalPid(int pid) {
1106   ChannelImpl::SetGlobalPid(pid);
1107 }
1108 #endif  // OS_LINUX
1109 
1110 }  // namespace IPC
1111