Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(129)

Unified Diff: remoting/host/win/launch_process_with_token.cc

Issue 10828160: [Chromoting] Move CreateSessionToken() next to launch process utilities. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: CR feedback Created 8 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « remoting/host/win/launch_process_with_token.h ('k') | remoting/host/win/wts_session_process_launcher.h » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: remoting/host/win/launch_process_with_token.cc
diff --git a/remoting/host/win/launch_process_with_token.cc b/remoting/host/win/launch_process_with_token.cc
index 0dfbb4d2dd63006d9ad1efe9eb7f4f2c17d4dce8..7dc8a21b34c6dc12890f4e84586252352dee1ff0 100644
--- a/remoting/host/win/launch_process_with_token.cc
+++ b/remoting/host/win/launch_process_with_token.cc
@@ -40,6 +40,62 @@ const int kMinLaunchDelaySeconds = 1;
// Name of the default session desktop.
wchar_t kDefaultDesktopName[] = L"winsta0\\default";
+// Copies the process token making it a primary impersonation token.
+// The returned handle will have |desired_access| rights.
+bool CopyProcessToken(DWORD desired_access, HANDLE* token_out) {
Wez 2012/08/06 17:41:04 Why has this become HANDLE, rather than staying Sc
alexeypa (please no reviews) 2012/08/06 17:48:36 See my previous comment. I believe it looks cleane
+ ScopedHandle process_token;
+ if (!OpenProcessToken(GetCurrentProcess(),
+ TOKEN_DUPLICATE | desired_access,
+ process_token.Receive())) {
+ LOG_GETLASTERROR(ERROR) << "Failed to open process token";
+ return false;
+ }
+
+ ScopedHandle copied_token;
+ if (!DuplicateTokenEx(process_token,
+ desired_access,
+ NULL,
+ SecurityImpersonation,
+ TokenPrimary,
+ copied_token.Receive())) {
+ LOG_GETLASTERROR(ERROR) << "Failed to duplicate the process token";
+ return false;
+ }
+
+ *token_out = copied_token.Take();
+ return true;
+}
+
+// Creates a copy of the current process with SE_TCB_NAME privilege enabled.
+bool CreatePrivilegedToken(HANDLE* token_out) {
Wez 2012/08/06 17:41:04 Why not ScopedHandle* here any more?
alexeypa (please no reviews) 2012/08/06 17:48:36 See my previous comment. I believe it looks cleane
+ ScopedHandle privileged_token;
+ DWORD desired_access = TOKEN_ADJUST_PRIVILEGES | TOKEN_IMPERSONATE |
+ TOKEN_DUPLICATE | TOKEN_QUERY;
+ if (!CopyProcessToken(desired_access, privileged_token.Receive())) {
+ return false;
+ }
+
+ // Get the LUID for the SE_TCB_NAME privilege.
+ TOKEN_PRIVILEGES state;
+ state.PrivilegeCount = 1;
+ state.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
+ if (!LookupPrivilegeValue(NULL, SE_TCB_NAME, &state.Privileges[0].Luid)) {
+ LOG_GETLASTERROR(ERROR) <<
+ "Failed to lookup the LUID for the SE_TCB_NAME privilege";
+ return false;
+ }
+
+ // Enable the SE_TCB_NAME privilege.
+ if (!AdjustTokenPrivileges(privileged_token, FALSE, &state, 0, NULL, 0)) {
+ LOG_GETLASTERROR(ERROR) <<
+ "Failed to enable SE_TCB_NAME privilege in a token";
+ return false;
+ }
+
+ *token_out = privileged_token.Take();
+ return true;
+}
+
// Requests the execution server to create a process in the specified session
// using the default (i.e. Winlogon) token. This routine relies on undocumented
// OS functionality and will likely not work on anything but XP or W2K3.
@@ -172,7 +228,7 @@ bool CreateRemoteSessionProcess(
// Pass the request to create a process in the target session.
DWORD bytes;
- if (!WriteFile(pipe.Get(), buffer.get(), size, &bytes, NULL)) {
+ if (!WriteFile(pipe, buffer.get(), size, &bytes, NULL)) {
LOG_GETLASTERROR(ERROR) << "Failed to send CreateProcessAsUser request";
return false;
}
@@ -186,7 +242,7 @@ bool CreateRemoteSessionProcess(
};
CreateProcessResponse response;
- if (!ReadFile(pipe.Get(), &response, sizeof(response), &bytes, NULL)) {
+ if (!ReadFile(pipe, &response, sizeof(response), &bytes, NULL)) {
LOG_GETLASTERROR(ERROR) << "Failed to receive CreateProcessAsUser response";
return false;
}
@@ -243,6 +299,48 @@ bool CreateRemoteSessionProcess(
namespace remoting {
+// Creates a copy of the current process token for the given |session_id| so
+// it can be used to launch a process in that session.
+bool CreateSessionToken(uint32 session_id, HANDLE* token_out) {
+ ScopedHandle session_token;
+ DWORD desired_access = TOKEN_ADJUST_DEFAULT | TOKEN_ADJUST_SESSIONID |
+ TOKEN_ASSIGN_PRIMARY | TOKEN_DUPLICATE | TOKEN_QUERY;
+ if (!CopyProcessToken(desired_access, session_token.Receive())) {
+ return false;
+ }
+
+ // Temporarily enable the SE_TCB_NAME privilege as it is required by
+ // SetTokenInformation(TokenSessionId).
+ ScopedHandle privileged_token;
+ if (!CreatePrivilegedToken(privileged_token.Receive())) {
+ return false;
+ }
+ if (!ImpersonateLoggedOnUser(privileged_token)) {
+ LOG_GETLASTERROR(ERROR) <<
+ "Failed to impersonate the privileged token";
+ return false;
+ }
+
+ // Change the session ID of the token.
+ DWORD new_session_id = session_id;
+ if (!SetTokenInformation(session_token,
+ TokenSessionId,
+ &new_session_id,
+ sizeof(new_session_id))) {
+ LOG_GETLASTERROR(ERROR) << "Failed to change session ID of a token";
+
+ // Revert to the default token.
+ CHECK(RevertToSelf());
+ return false;
+ }
+
+ // Revert to the default token.
+ CHECK(RevertToSelf());
+
+ *token_out = session_token.Take();
+ return true;
+}
+
bool LaunchProcessWithToken(const FilePath& binary,
const std::wstring& command_line,
HANDLE user_token,
« no previous file with comments | « remoting/host/win/launch_process_with_token.h ('k') | remoting/host/win/wts_session_process_launcher.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698