|  | // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 
|  | // Use of this source code is governed by a BSD-style license that can be | 
|  | // found in the LICENSE file. | 
|  |  | 
|  | #include "base/memory/shared_memory.h" | 
|  |  | 
|  | #include <aclapi.h> | 
|  | #include <stddef.h> | 
|  | #include <stdint.h> | 
|  |  | 
|  | #include "base/allocator/partition_allocator/page_allocator.h" | 
|  | #include "base/logging.h" | 
|  | #include "base/memory/shared_memory_tracker.h" | 
|  | #include "base/metrics/histogram_functions.h" | 
|  | #include "base/metrics/histogram_macros.h" | 
|  | #include "base/rand_util.h" | 
|  | #include "base/strings/stringprintf.h" | 
|  | #include "base/strings/utf_string_conversions.h" | 
|  | #include "base/unguessable_token.h" | 
|  |  | 
|  | namespace base { | 
|  | namespace { | 
|  |  | 
|  | // Errors that can occur during Shared Memory construction. | 
|  | // These match tools/metrics/histograms/histograms.xml. | 
|  | // This enum is append-only. | 
|  | enum CreateError { | 
|  | SUCCESS = 0, | 
|  | SIZE_ZERO = 1, | 
|  | SIZE_TOO_LARGE = 2, | 
|  | INITIALIZE_ACL_FAILURE = 3, | 
|  | INITIALIZE_SECURITY_DESC_FAILURE = 4, | 
|  | SET_SECURITY_DESC_FAILURE = 5, | 
|  | CREATE_FILE_MAPPING_FAILURE = 6, | 
|  | REDUCE_PERMISSIONS_FAILURE = 7, | 
|  | ALREADY_EXISTS = 8, | 
|  | CREATE_ERROR_LAST = ALREADY_EXISTS | 
|  | }; | 
|  |  | 
|  | // Emits UMA metrics about encountered errors. Pass zero (0) for |winerror| | 
|  | // if there is no associated Windows error. | 
|  | void LogError(CreateError error, DWORD winerror) { | 
|  | UMA_HISTOGRAM_ENUMERATION("SharedMemory.CreateError", error, | 
|  | CREATE_ERROR_LAST + 1); | 
|  | static_assert(ERROR_SUCCESS == 0, "Windows error code changed!"); | 
|  | if (winerror != ERROR_SUCCESS) | 
|  | UmaHistogramSparse("SharedMemory.CreateWinError", winerror); | 
|  | } | 
|  |  | 
|  | typedef enum _SECTION_INFORMATION_CLASS { | 
|  | SectionBasicInformation, | 
|  | } SECTION_INFORMATION_CLASS; | 
|  |  | 
|  | typedef struct _SECTION_BASIC_INFORMATION { | 
|  | PVOID BaseAddress; | 
|  | ULONG Attributes; | 
|  | LARGE_INTEGER Size; | 
|  | } SECTION_BASIC_INFORMATION, *PSECTION_BASIC_INFORMATION; | 
|  |  | 
|  | typedef ULONG(__stdcall* NtQuerySectionType)( | 
|  | HANDLE SectionHandle, | 
|  | SECTION_INFORMATION_CLASS SectionInformationClass, | 
|  | PVOID SectionInformation, | 
|  | ULONG SectionInformationLength, | 
|  | PULONG ResultLength); | 
|  |  | 
|  | // Returns the length of the memory section starting at the supplied address. | 
|  | size_t GetMemorySectionSize(void* address) { | 
|  | MEMORY_BASIC_INFORMATION memory_info; | 
|  | if (!::VirtualQuery(address, &memory_info, sizeof(memory_info))) | 
|  | return 0; | 
|  | return memory_info.RegionSize - (static_cast<char*>(address) - | 
|  | static_cast<char*>(memory_info.AllocationBase)); | 
|  | } | 
|  |  | 
|  | // Checks if the section object is safe to map. At the moment this just means | 
|  | // it's not an image section. | 
|  | bool IsSectionSafeToMap(HANDLE handle) { | 
|  | static NtQuerySectionType nt_query_section_func; | 
|  | if (!nt_query_section_func) { | 
|  | nt_query_section_func = reinterpret_cast<NtQuerySectionType>( | 
|  | ::GetProcAddress(::GetModuleHandle(L"ntdll.dll"), "NtQuerySection")); | 
|  | DCHECK(nt_query_section_func); | 
|  | } | 
|  |  | 
|  | // The handle must have SECTION_QUERY access for this to succeed. | 
|  | SECTION_BASIC_INFORMATION basic_information = {}; | 
|  | ULONG status = | 
|  | nt_query_section_func(handle, SectionBasicInformation, &basic_information, | 
|  | sizeof(basic_information), nullptr); | 
|  | if (status) | 
|  | return false; | 
|  | return (basic_information.Attributes & SEC_IMAGE) != SEC_IMAGE; | 
|  | } | 
|  |  | 
|  | // Returns a HANDLE on success and |nullptr| on failure. | 
|  | // This function is similar to CreateFileMapping, but removes the permissions | 
|  | // WRITE_DAC, WRITE_OWNER, READ_CONTROL, and DELETE. | 
|  | // | 
|  | // A newly created file mapping has two sets of permissions. It has access | 
|  | // control permissions (WRITE_DAC, WRITE_OWNER, READ_CONTROL, and DELETE) and | 
|  | // file permissions (FILE_MAP_READ, FILE_MAP_WRITE, etc.). ::DuplicateHandle() | 
|  | // with the parameter DUPLICATE_SAME_ACCESS copies both sets of permissions. | 
|  | // | 
|  | // The Chrome sandbox prevents HANDLEs with the WRITE_DAC permission from being | 
|  | // duplicated into unprivileged processes. But the only way to copy file | 
|  | // permissions is with the parameter DUPLICATE_SAME_ACCESS. This means that | 
|  | // there is no way for a privileged process to duplicate a file mapping into an | 
|  | // unprivileged process while maintaining the previous file permissions. | 
|  | // | 
|  | // By removing all access control permissions of a file mapping immediately | 
|  | // after creation, ::DuplicateHandle() effectively only copies the file | 
|  | // permissions. | 
|  | HANDLE CreateFileMappingWithReducedPermissions(SECURITY_ATTRIBUTES* sa, | 
|  | size_t rounded_size, | 
|  | LPCWSTR name) { | 
|  | HANDLE h = CreateFileMapping(INVALID_HANDLE_VALUE, sa, PAGE_READWRITE, 0, | 
|  | static_cast<DWORD>(rounded_size), name); | 
|  | if (!h) { | 
|  | LogError(CREATE_FILE_MAPPING_FAILURE, GetLastError()); | 
|  | return nullptr; | 
|  | } | 
|  |  | 
|  | HANDLE h2; | 
|  | BOOL success = ::DuplicateHandle( | 
|  | GetCurrentProcess(), h, GetCurrentProcess(), &h2, | 
|  | FILE_MAP_READ | FILE_MAP_WRITE | SECTION_QUERY, FALSE, 0); | 
|  | BOOL rv = ::CloseHandle(h); | 
|  | DCHECK(rv); | 
|  |  | 
|  | if (!success) { | 
|  | LogError(REDUCE_PERMISSIONS_FAILURE, GetLastError()); | 
|  | return nullptr; | 
|  | } | 
|  |  | 
|  | return h2; | 
|  | } | 
|  |  | 
|  | }  // namespace. | 
|  |  | 
|  | SharedMemory::SharedMemory() {} | 
|  |  | 
|  | SharedMemory::SharedMemory(const string16& name) : name_(name) {} | 
|  |  | 
|  | SharedMemory::SharedMemory(const SharedMemoryHandle& handle, bool read_only) | 
|  | : external_section_(true), shm_(handle), read_only_(read_only) {} | 
|  |  | 
|  | SharedMemory::~SharedMemory() { | 
|  | Unmap(); | 
|  | Close(); | 
|  | } | 
|  |  | 
|  | // static | 
|  | bool SharedMemory::IsHandleValid(const SharedMemoryHandle& handle) { | 
|  | return handle.IsValid(); | 
|  | } | 
|  |  | 
|  | // static | 
|  | void SharedMemory::CloseHandle(const SharedMemoryHandle& handle) { | 
|  | handle.Close(); | 
|  | } | 
|  |  | 
|  | // static | 
|  | size_t SharedMemory::GetHandleLimit() { | 
|  | // Rounded down from value reported here: | 
|  | // http://blogs.technet.com/b/markrussinovich/archive/2009/09/29/3283844.aspx | 
|  | return static_cast<size_t>(1 << 23); | 
|  | } | 
|  |  | 
|  | // static | 
|  | SharedMemoryHandle SharedMemory::DuplicateHandle( | 
|  | const SharedMemoryHandle& handle) { | 
|  | return handle.Duplicate(); | 
|  | } | 
|  |  | 
|  | bool SharedMemory::CreateAndMapAnonymous(size_t size) { | 
|  | return CreateAnonymous(size) && Map(size); | 
|  | } | 
|  |  | 
|  | bool SharedMemory::Create(const SharedMemoryCreateOptions& options) { | 
|  | // TODO(crbug.com/210609): NaCl forces us to round up 64k here, wasting 32k | 
|  | // per mapping on average. | 
|  | static const size_t kSectionMask = 65536 - 1; | 
|  | DCHECK(!options.executable); | 
|  | DCHECK(!shm_.IsValid()); | 
|  | if (options.size == 0) { | 
|  | LogError(SIZE_ZERO, 0); | 
|  | return false; | 
|  | } | 
|  |  | 
|  | // Check maximum accounting for overflow. | 
|  | if (options.size > | 
|  | static_cast<size_t>(std::numeric_limits<int>::max()) - kSectionMask) { | 
|  | LogError(SIZE_TOO_LARGE, 0); | 
|  | return false; | 
|  | } | 
|  |  | 
|  | size_t rounded_size = (options.size + kSectionMask) & ~kSectionMask; | 
|  | name_ = options.name_deprecated ? | 
|  | ASCIIToUTF16(*options.name_deprecated) : L""; | 
|  | SECURITY_ATTRIBUTES sa = {sizeof(sa), nullptr, FALSE}; | 
|  | SECURITY_DESCRIPTOR sd; | 
|  | ACL dacl; | 
|  |  | 
|  | if (name_.empty()) { | 
|  | // Add an empty DACL to enforce anonymous read-only sections. | 
|  | sa.lpSecurityDescriptor = &sd; | 
|  | if (!InitializeAcl(&dacl, sizeof(dacl), ACL_REVISION)) { | 
|  | LogError(INITIALIZE_ACL_FAILURE, GetLastError()); | 
|  | return false; | 
|  | } | 
|  | if (!InitializeSecurityDescriptor(&sd, SECURITY_DESCRIPTOR_REVISION)) { | 
|  | LogError(INITIALIZE_SECURITY_DESC_FAILURE, GetLastError()); | 
|  | return false; | 
|  | } | 
|  | if (!SetSecurityDescriptorDacl(&sd, TRUE, &dacl, FALSE)) { | 
|  | LogError(SET_SECURITY_DESC_FAILURE, GetLastError()); | 
|  | return false; | 
|  | } | 
|  |  | 
|  | // Windows ignores DACLs on certain unnamed objects (like shared sections). | 
|  | // So, we generate a random name when we need to enforce read-only. | 
|  | uint64_t rand_values[4]; | 
|  | RandBytes(&rand_values, sizeof(rand_values)); | 
|  | name_ = StringPrintf(L"CrSharedMem_%016llx%016llx%016llx%016llx", | 
|  | rand_values[0], rand_values[1], | 
|  | rand_values[2], rand_values[3]); | 
|  | } | 
|  | DCHECK(!name_.empty()); | 
|  | shm_ = SharedMemoryHandle( | 
|  | CreateFileMappingWithReducedPermissions(&sa, rounded_size, name_.c_str()), | 
|  | rounded_size, UnguessableToken::Create()); | 
|  | if (!shm_.IsValid()) { | 
|  | // The error is logged within CreateFileMappingWithReducedPermissions(). | 
|  | return false; | 
|  | } | 
|  |  | 
|  | requested_size_ = options.size; | 
|  |  | 
|  | // Check if the shared memory pre-exists. | 
|  | if (GetLastError() == ERROR_ALREADY_EXISTS) { | 
|  | // If the file already existed, set requested_size_ to 0 to show that | 
|  | // we don't know the size. | 
|  | requested_size_ = 0; | 
|  | external_section_ = true; | 
|  | if (!options.open_existing_deprecated) { | 
|  | Close(); | 
|  | // From "if" above: GetLastError() == ERROR_ALREADY_EXISTS. | 
|  | LogError(ALREADY_EXISTS, ERROR_ALREADY_EXISTS); | 
|  | return false; | 
|  | } | 
|  | } | 
|  |  | 
|  | LogError(SUCCESS, ERROR_SUCCESS); | 
|  | return true; | 
|  | } | 
|  |  | 
|  | bool SharedMemory::Delete(const std::string& name) { | 
|  | // intentionally empty -- there is nothing for us to do on Windows. | 
|  | return true; | 
|  | } | 
|  |  | 
|  | bool SharedMemory::Open(const std::string& name, bool read_only) { | 
|  | DCHECK(!shm_.IsValid()); | 
|  | DWORD access = FILE_MAP_READ | SECTION_QUERY; | 
|  | if (!read_only) | 
|  | access |= FILE_MAP_WRITE; | 
|  | name_ = ASCIIToUTF16(name); | 
|  | read_only_ = read_only; | 
|  |  | 
|  | // This form of sharing shared memory is deprecated. https://crbug.com/345734. | 
|  | // However, we can't get rid of it without a significant refactor because its | 
|  | // used to communicate between two versions of the same service process, very | 
|  | // early in the life cycle. | 
|  | // Technically, we should also pass the GUID from the original shared memory | 
|  | // region. We don't do that - this means that we will overcount this memory, | 
|  | // which thankfully isn't relevant since Chrome only communicates with a | 
|  | // single version of the service process. | 
|  | // We pass the size |0|, which is a dummy size and wrong, but otherwise | 
|  | // harmless. | 
|  | shm_ = SharedMemoryHandle( | 
|  | OpenFileMapping(access, false, name_.empty() ? nullptr : name_.c_str()), | 
|  | 0u, UnguessableToken::Create()); | 
|  | if (!shm_.IsValid()) | 
|  | return false; | 
|  | // If a name specified assume it's an external section. | 
|  | if (!name_.empty()) | 
|  | external_section_ = true; | 
|  | // Note: size_ is not set in this case. | 
|  | return true; | 
|  | } | 
|  |  | 
|  | bool SharedMemory::MapAt(off_t offset, size_t bytes) { | 
|  | if (!shm_.IsValid()) { | 
|  | DLOG(ERROR) << "Invalid SharedMemoryHandle."; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | if (bytes > static_cast<size_t>(std::numeric_limits<int>::max())) { | 
|  | DLOG(ERROR) << "Bytes required exceeds the 2G limitation."; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | if (memory_) { | 
|  | DLOG(ERROR) << "The SharedMemory has been mapped already."; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | if (external_section_ && !IsSectionSafeToMap(shm_.GetHandle())) { | 
|  | DLOG(ERROR) << "SharedMemoryHandle is not safe to be mapped."; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | // Try to map the shared memory. On the first failure, release any reserved | 
|  | // address space for a single retry. | 
|  | for (int i = 0; i < 2; ++i) { | 
|  | memory_ = MapViewOfFile( | 
|  | shm_.GetHandle(), | 
|  | read_only_ ? FILE_MAP_READ : FILE_MAP_READ | FILE_MAP_WRITE, | 
|  | static_cast<uint64_t>(offset) >> 32, static_cast<DWORD>(offset), bytes); | 
|  | if (memory_) | 
|  | break; | 
|  | ReleaseReservation(); | 
|  | } | 
|  | if (!memory_) { | 
|  | DPLOG(ERROR) << "Failed executing MapViewOfFile"; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | DCHECK_EQ(0U, reinterpret_cast<uintptr_t>(memory_) & | 
|  | (SharedMemory::MAP_MINIMUM_ALIGNMENT - 1)); | 
|  | mapped_size_ = GetMemorySectionSize(memory_); | 
|  | mapped_id_ = shm_.GetGUID(); | 
|  | SharedMemoryTracker::GetInstance()->IncrementMemoryUsage(*this); | 
|  | return true; | 
|  | } | 
|  |  | 
|  | bool SharedMemory::Unmap() { | 
|  | if (!memory_) | 
|  | return false; | 
|  |  | 
|  | SharedMemoryTracker::GetInstance()->DecrementMemoryUsage(*this); | 
|  | UnmapViewOfFile(memory_); | 
|  | memory_ = nullptr; | 
|  | mapped_id_ = UnguessableToken(); | 
|  | return true; | 
|  | } | 
|  |  | 
|  | SharedMemoryHandle SharedMemory::GetReadOnlyHandle() const { | 
|  | HANDLE result; | 
|  | ProcessHandle process = GetCurrentProcess(); | 
|  | if (!::DuplicateHandle(process, shm_.GetHandle(), process, &result, | 
|  | FILE_MAP_READ | SECTION_QUERY, FALSE, 0)) { | 
|  | return SharedMemoryHandle(); | 
|  | } | 
|  | SharedMemoryHandle handle = | 
|  | SharedMemoryHandle(result, shm_.GetSize(), shm_.GetGUID()); | 
|  | handle.SetOwnershipPassesToIPC(true); | 
|  | return handle; | 
|  | } | 
|  |  | 
|  | void SharedMemory::Close() { | 
|  | if (shm_.IsValid()) { | 
|  | shm_.Close(); | 
|  | shm_ = SharedMemoryHandle(); | 
|  | } | 
|  | } | 
|  |  | 
|  | SharedMemoryHandle SharedMemory::handle() const { | 
|  | return shm_; | 
|  | } | 
|  |  | 
|  | SharedMemoryHandle SharedMemory::TakeHandle() { | 
|  | SharedMemoryHandle handle(shm_); | 
|  | handle.SetOwnershipPassesToIPC(true); | 
|  | Unmap(); | 
|  | shm_ = SharedMemoryHandle(); | 
|  | return handle; | 
|  | } | 
|  |  | 
|  | }  // namespace base |