OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "remoting/host/desktop_session_win.h" | 5 #include "remoting/host/desktop_session_win.h" |
6 | 6 |
7 #include "base/base_switches.h" | 7 #include "base/base_switches.h" |
8 #include "base/command_line.h" | 8 #include "base/command_line.h" |
9 #include "base/path_service.h" | 9 #include "base/path_service.h" |
10 #include "ipc/ipc_message_macros.h" | 10 #include "ipc/ipc_message_macros.h" |
(...skipping 46 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
57 } | 57 } |
58 | 58 |
59 void DesktopSessionWin::OnChannelConnected(int32 peer_pid) { | 59 void DesktopSessionWin::OnChannelConnected(int32 peer_pid) { |
60 DCHECK(main_task_runner_->BelongsToCurrentThread()); | 60 DCHECK(main_task_runner_->BelongsToCurrentThread()); |
61 | 61 |
62 // Obtain the handle of the desktop process. It will be passed to the network | 62 // Obtain the handle of the desktop process. It will be passed to the network |
63 // process so it would be able to duplicate handles of shared memory objects | 63 // process so it would be able to duplicate handles of shared memory objects |
64 // from the desktop process. | 64 // from the desktop process. |
65 desktop_process_.Set(OpenProcess(PROCESS_DUP_HANDLE, false, peer_pid)); | 65 desktop_process_.Set(OpenProcess(PROCESS_DUP_HANDLE, false, peer_pid)); |
66 if (!desktop_process_.IsValid()) { | 66 if (!desktop_process_.IsValid()) { |
67 RestartDesktopProcess(FROM_HERE); | 67 CrashDesktopProcess(FROM_HERE); |
68 return; | 68 return; |
69 } | 69 } |
70 | 70 |
71 VLOG(1) << "IPC: daemon <- desktop (" << peer_pid << ")"; | 71 VLOG(1) << "IPC: daemon <- desktop (" << peer_pid << ")"; |
72 } | 72 } |
73 | 73 |
74 bool DesktopSessionWin::OnMessageReceived(const IPC::Message& message) { | 74 bool DesktopSessionWin::OnMessageReceived(const IPC::Message& message) { |
75 DCHECK(main_task_runner_->BelongsToCurrentThread()); | 75 DCHECK(main_task_runner_->BelongsToCurrentThread()); |
76 | 76 |
77 bool handled = true; | 77 bool handled = true; |
78 IPC_BEGIN_MESSAGE_MAP(DesktopSessionWin, message) | 78 IPC_BEGIN_MESSAGE_MAP(DesktopSessionWin, message) |
79 IPC_MESSAGE_HANDLER(ChromotingDesktopDaemonMsg_DesktopAttached, | 79 IPC_MESSAGE_HANDLER(ChromotingDesktopDaemonMsg_DesktopAttached, |
80 OnDesktopSessionAgentAttached) | 80 OnDesktopSessionAgentAttached) |
81 IPC_MESSAGE_HANDLER(ChromotingDesktopDaemonMsg_InjectSas, | 81 IPC_MESSAGE_HANDLER(ChromotingDesktopDaemonMsg_InjectSas, |
82 OnInjectSas) | 82 OnInjectSas) |
83 IPC_MESSAGE_UNHANDLED(handled = false) | 83 IPC_MESSAGE_UNHANDLED(handled = false) |
84 IPC_END_MESSAGE_MAP() | 84 IPC_END_MESSAGE_MAP() |
85 | 85 |
86 if (!handled) { | 86 if (!handled) { |
87 LOG(ERROR) << "Received unexpected IPC type: " << message.type(); | 87 LOG(ERROR) << "Received unexpected IPC type: " << message.type(); |
88 RestartDesktopProcess(FROM_HERE); | 88 CrashDesktopProcess(FROM_HERE); |
89 } | 89 } |
90 | 90 |
91 return handled; | 91 return handled; |
92 } | 92 } |
93 | 93 |
94 void DesktopSessionWin::OnPermanentError() { | 94 void DesktopSessionWin::OnPermanentError() { |
95 DCHECK(main_task_runner_->BelongsToCurrentThread()); | 95 DCHECK(main_task_runner_->BelongsToCurrentThread()); |
96 | 96 |
97 launcher_.reset(); | 97 launcher_.reset(); |
98 | 98 |
(...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
133 DCHECK(launcher_.get() != NULL); | 133 DCHECK(launcher_.get() != NULL); |
134 | 134 |
135 launcher_.reset(); | 135 launcher_.reset(); |
136 } | 136 } |
137 | 137 |
138 void DesktopSessionWin::OnDesktopSessionAgentAttached( | 138 void DesktopSessionWin::OnDesktopSessionAgentAttached( |
139 IPC::PlatformFileForTransit desktop_pipe) { | 139 IPC::PlatformFileForTransit desktop_pipe) { |
140 if (!daemon_process()->OnDesktopSessionAgentAttached(id(), | 140 if (!daemon_process()->OnDesktopSessionAgentAttached(id(), |
141 desktop_process_, | 141 desktop_process_, |
142 desktop_pipe)) { | 142 desktop_pipe)) { |
143 RestartDesktopProcess(FROM_HERE); | 143 CrashDesktopProcess(FROM_HERE); |
144 } | 144 } |
145 } | 145 } |
146 | 146 |
147 void DesktopSessionWin::OnInjectSas() { | 147 void DesktopSessionWin::OnInjectSas() { |
148 DCHECK(main_task_runner_->BelongsToCurrentThread()); | 148 DCHECK(main_task_runner_->BelongsToCurrentThread()); |
149 | 149 |
150 // Do not try to inject SAS if the desktop process is not running. This can | 150 // Do not try to inject SAS if the desktop process is not running. This can |
151 // happen when the session has detached from the console for instance. | 151 // happen when the session has detached from the console for instance. |
152 if (!launcher_) | 152 if (!launcher_) |
153 return; | 153 return; |
154 | 154 |
155 if (!sas_injector_) | 155 if (!sas_injector_) |
156 sas_injector_ = SasInjector::Create(); | 156 sas_injector_ = SasInjector::Create(); |
157 if (!sas_injector_->InjectSas()) | 157 if (!sas_injector_->InjectSas()) |
158 LOG(ERROR) << "Failed to inject Secure Attention Sequence."; | 158 LOG(ERROR) << "Failed to inject Secure Attention Sequence."; |
159 } | 159 } |
160 | 160 |
161 void DesktopSessionWin::RestartDesktopProcess( | 161 void DesktopSessionWin::CrashDesktopProcess( |
162 const tracked_objects::Location& location) { | 162 const tracked_objects::Location& location) { |
163 DCHECK(main_task_runner_->BelongsToCurrentThread()); | 163 DCHECK(main_task_runner_->BelongsToCurrentThread()); |
164 | 164 |
165 launcher_->Send(new ChromotingDaemonDesktopMsg_Crash( | 165 launcher_->Crash(location); |
166 location.function_name(), location.file_name(), location.line_number())); | |
167 } | 166 } |
168 | 167 |
169 } // namespace remoting | 168 } // namespace remoting |
OLD | NEW |