1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155
|
// Copyright 2019 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/browser/ui/webui/sandbox/sandbox_handler.h"
#include <utility>
#include "base/functional/bind.h"
#include "base/numerics/safe_conversions.h"
#include "base/values.h"
#include "content/public/browser/browser_child_process_host_iterator.h"
#include "content/public/browser/browser_task_traits.h"
#include "content/public/browser/browser_thread.h"
#include "content/public/browser/child_process_data.h"
#include "content/public/browser/render_process_host.h"
#include "content/public/browser/web_ui.h"
#include "content/public/common/process_type.h"
#include "sandbox/policy/features.h"
#include "sandbox/policy/win/sandbox_win.h"
using content::BrowserChildProcessHostIterator;
using content::ChildProcessData;
using content::RenderProcessHost;
namespace sandbox_handler {
namespace {
base::Value::List FetchBrowserChildProcesses() {
DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
base::Value::List browser_processes;
for (BrowserChildProcessHostIterator itr; !itr.Done(); ++itr) {
const ChildProcessData& process_data = itr.GetData();
// Only add processes that have already started, i.e. with valid handles.
if (!process_data.GetProcess().IsValid()) {
continue;
}
base::Value::Dict proc;
proc.Set("processId",
base::strict_cast<double>(process_data.GetProcess().Pid()));
proc.Set("processType",
content::GetProcessTypeNameInEnglish(process_data.process_type));
proc.Set("name", process_data.name);
proc.Set("metricsName", process_data.metrics_name);
proc.Set("sandboxType",
sandbox::policy::SandboxWin::GetSandboxTypeInEnglish(
process_data.sandbox_type));
browser_processes.Append(std::move(proc));
}
return browser_processes;
}
base::Value::List FetchRenderHostProcesses() {
DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
base::Value::List renderer_processes;
for (RenderProcessHost::iterator it(RenderProcessHost::AllHostsIterator());
!it.IsAtEnd(); it.Advance()) {
RenderProcessHost* host = it.GetCurrentValue();
// Skip processes that might not have started yet.
if (!host->GetProcess().IsValid()) {
continue;
}
base::Value::Dict proc;
proc.Set("processId", base::strict_cast<double>(host->GetProcess().Pid()));
renderer_processes.Append(std::move(proc));
}
return renderer_processes;
}
base::Value::Dict FeatureToValue(const base::Feature& feature) {
base::Value::Dict feature_info;
feature_info.Set("name", feature.name);
feature_info.Set("enabled", base::FeatureList::IsEnabled(feature));
return feature_info;
}
base::Value::List FetchSandboxFeatures() {
base::Value::List features;
features.Append(
FeatureToValue(sandbox::policy::features::kNetworkServiceSandbox));
features.Append(
FeatureToValue(sandbox::policy::features::kRendererAppContainer));
features.Append(FeatureToValue(
sandbox::policy::features::kWinSboxDisableExtensionPoints));
features.Append(
FeatureToValue(sandbox::policy::features::kWinSboxZeroAppShim));
features.Append(
FeatureToValue(sandbox::policy::features::kWinSboxNoFakeGdiInit));
features.Append(FeatureToValue(
sandbox::policy::features::kWinSboxRestrictCoreSharingOnRenderer));
features.Append(
FeatureToValue(sandbox::policy::features::kEnableCsrssLockdown));
features.Append(FeatureToValue(
sandbox::policy::features::kWinSboxFilterServiceEnvironment));
return features;
}
} // namespace
SandboxHandler::SandboxHandler() = default;
SandboxHandler::~SandboxHandler() = default;
void SandboxHandler::RegisterMessages() {
DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
web_ui()->RegisterMessageCallback(
"requestSandboxDiagnostics",
base::BindRepeating(&SandboxHandler::HandleRequestSandboxDiagnostics,
base::Unretained(this)));
}
void SandboxHandler::HandleRequestSandboxDiagnostics(
const base::Value::List& args) {
DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
CHECK_EQ(1U, args.size());
sandbox_diagnostics_callback_id_ = args[0].Clone();
AllowJavascript();
browser_processes_ = FetchBrowserChildProcesses();
sandbox::policy::SandboxWin::GetPolicyDiagnostics(
base::BindOnce(&SandboxHandler::FetchSandboxDiagnosticsCompleted,
weak_ptr_factory_.GetWeakPtr()));
}
// This runs nested inside SandboxWin so we get out quickly.
void SandboxHandler::FetchSandboxDiagnosticsCompleted(
base::Value sandbox_policies) {
sandbox_policies_ = std::move(sandbox_policies);
content::GetUIThreadTaskRunner({})->PostTask(
FROM_HERE, base::BindOnce(&SandboxHandler::GetRendererProcessesAndFinish,
weak_ptr_factory_.GetWeakPtr()));
}
void SandboxHandler::GetRendererProcessesAndFinish() {
DCHECK_CURRENTLY_ON(content::BrowserThread::UI);
auto renderer_processes = FetchRenderHostProcesses();
base::Value::Dict results;
results.Set("browser", std::move(browser_processes_));
results.Set("policies", std::move(sandbox_policies_));
results.Set("renderer", std::move(renderer_processes));
results.Set("features", FetchSandboxFeatures());
ResolveJavascriptCallback(sandbox_diagnostics_callback_id_,
std::move(results));
}
} // namespace sandbox_handler
|