OLD | NEW |
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include <aclapi.h> | 5 #include <aclapi.h> |
6 #include <sddl.h> | 6 #include <sddl.h> |
7 #include <vector> | 7 #include <vector> |
8 | 8 |
9 #include "sandbox/src/restricted_token_utils.h" | 9 #include "sandbox/src/restricted_token_utils.h" |
10 | 10 |
11 #include "base/logging.h" | 11 #include "base/logging.h" |
12 #include "base/scoped_handle_win.h" | 12 #include "base/win/scoped_handle.h" |
13 #include "base/win/windows_version.h" | 13 #include "base/win/windows_version.h" |
14 #include "sandbox/src/job.h" | 14 #include "sandbox/src/job.h" |
15 #include "sandbox/src/restricted_token.h" | 15 #include "sandbox/src/restricted_token.h" |
16 #include "sandbox/src/security_level.h" | 16 #include "sandbox/src/security_level.h" |
17 #include "sandbox/src/sid.h" | 17 #include "sandbox/src/sid.h" |
18 | 18 |
19 namespace sandbox { | 19 namespace sandbox { |
20 | 20 |
21 DWORD CreateRestrictedToken(HANDLE *token_handle, | 21 DWORD CreateRestrictedToken(HANDLE *token_handle, |
22 TokenLevel security_level, | 22 TokenLevel security_level, |
(...skipping 136 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
159 | 159 |
160 // Create the primary (restricted) token for the process | 160 // Create the primary (restricted) token for the process |
161 HANDLE primary_token_handle = NULL; | 161 HANDLE primary_token_handle = NULL; |
162 err_code = CreateRestrictedToken(&primary_token_handle, | 162 err_code = CreateRestrictedToken(&primary_token_handle, |
163 primary_level, | 163 primary_level, |
164 INTEGRITY_LEVEL_LAST, | 164 INTEGRITY_LEVEL_LAST, |
165 PRIMARY); | 165 PRIMARY); |
166 if (ERROR_SUCCESS != err_code) { | 166 if (ERROR_SUCCESS != err_code) { |
167 return err_code; | 167 return err_code; |
168 } | 168 } |
169 ScopedHandle primary_token(primary_token_handle); | 169 base::win::ScopedHandle primary_token(primary_token_handle); |
170 | 170 |
171 // Create the impersonation token (restricted) to be able to start the | 171 // Create the impersonation token (restricted) to be able to start the |
172 // process. | 172 // process. |
173 HANDLE impersonation_token_handle; | 173 HANDLE impersonation_token_handle; |
174 err_code = CreateRestrictedToken(&impersonation_token_handle, | 174 err_code = CreateRestrictedToken(&impersonation_token_handle, |
175 impersonation_level, | 175 impersonation_level, |
176 INTEGRITY_LEVEL_LAST, | 176 INTEGRITY_LEVEL_LAST, |
177 IMPERSONATION); | 177 IMPERSONATION); |
178 if (ERROR_SUCCESS != err_code) { | 178 if (ERROR_SUCCESS != err_code) { |
179 return err_code; | 179 return err_code; |
180 } | 180 } |
181 ScopedHandle impersonation_token(impersonation_token_handle); | 181 base::win::ScopedHandle impersonation_token(impersonation_token_handle); |
182 | 182 |
183 // Start the process | 183 // Start the process |
184 STARTUPINFO startup_info = {0}; | 184 STARTUPINFO startup_info = {0}; |
185 PROCESS_INFORMATION process_info = {0}; | 185 PROCESS_INFORMATION process_info = {0}; |
186 | 186 |
187 if (!::CreateProcessAsUser(primary_token.Get(), | 187 if (!::CreateProcessAsUser(primary_token.Get(), |
188 NULL, // No application name. | 188 NULL, // No application name. |
189 command_line, | 189 command_line, |
190 NULL, // No security attribute. | 190 NULL, // No security attribute. |
191 NULL, // No thread attribute. | 191 NULL, // No thread attribute. |
192 FALSE, // Do not inherit handles. | 192 FALSE, // Do not inherit handles. |
193 CREATE_SUSPENDED | CREATE_BREAKAWAY_FROM_JOB, | 193 CREATE_SUSPENDED | CREATE_BREAKAWAY_FROM_JOB, |
194 NULL, // Use the environment of the caller. | 194 NULL, // Use the environment of the caller. |
195 NULL, // Use current directory of the caller. | 195 NULL, // Use current directory of the caller. |
196 &startup_info, | 196 &startup_info, |
197 &process_info)) { | 197 &process_info)) { |
198 return ::GetLastError(); | 198 return ::GetLastError(); |
199 } | 199 } |
200 | 200 |
201 ScopedHandle thread_handle(process_info.hThread); | 201 base::win::ScopedHandle thread_handle(process_info.hThread); |
202 ScopedHandle process_handle(process_info.hProcess); | 202 base::win::ScopedHandle process_handle(process_info.hProcess); |
203 | 203 |
204 // Change the token of the main thread of the new process for the | 204 // Change the token of the main thread of the new process for the |
205 // impersonation token with more rights. | 205 // impersonation token with more rights. |
206 if (!::SetThreadToken(&process_info.hThread, impersonation_token.Get())) { | 206 if (!::SetThreadToken(&process_info.hThread, impersonation_token.Get())) { |
207 ::TerminateProcess(process_handle.Get(), | 207 ::TerminateProcess(process_handle.Get(), |
208 0); // exit code | 208 0); // exit code |
209 return ::GetLastError(); | 209 return ::GetLastError(); |
210 } | 210 } |
211 | 211 |
212 err_code = job.AssignProcessToJob(process_handle.Get()); | 212 err_code = job.AssignProcessToJob(process_handle.Get()); |
(...skipping 115 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
328 ace_access.c_str(), | 328 ace_access.c_str(), |
329 integrity_level_str); | 329 integrity_level_str); |
330 if (ERROR_SUCCESS != error) | 330 if (ERROR_SUCCESS != error) |
331 return error; | 331 return error; |
332 | 332 |
333 HANDLE token_handle; | 333 HANDLE token_handle; |
334 if (!::OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_DEFAULT, | 334 if (!::OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_DEFAULT, |
335 &token_handle)) | 335 &token_handle)) |
336 return ::GetLastError(); | 336 return ::GetLastError(); |
337 | 337 |
338 ScopedHandle token(token_handle); | 338 base::win::ScopedHandle token(token_handle); |
339 | 339 |
340 return SetTokenIntegrityLevel(token.Get(), integrity_level); | 340 return SetTokenIntegrityLevel(token.Get(), integrity_level); |
341 } | 341 } |
342 | 342 |
343 | |
344 } // namespace sandbox | 343 } // namespace sandbox |
OLD | NEW |