OLD | NEW |
| (Empty) |
1 // Copyright (c) 2006-2011 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "sandbox/src/process_thread_interception.h" | |
6 | |
7 #include "sandbox/src/crosscall_client.h" | |
8 #include "sandbox/src/ipc_tags.h" | |
9 #include "sandbox/src/policy_params.h" | |
10 #include "sandbox/src/policy_target.h" | |
11 #include "sandbox/src/sandbox_factory.h" | |
12 #include "sandbox/src/sandbox_nt_util.h" | |
13 #include "sandbox/src/sharedmem_ipc_client.h" | |
14 #include "sandbox/src/target_services.h" | |
15 | |
16 namespace sandbox { | |
17 | |
18 SANDBOX_INTERCEPT NtExports g_nt; | |
19 | |
20 // Hooks NtOpenThread and proxy the call to the broker if it's trying to | |
21 // open a thread in the same process. | |
22 NTSTATUS WINAPI TargetNtOpenThread(NtOpenThreadFunction orig_OpenThread, | |
23 PHANDLE thread, ACCESS_MASK desired_access, | |
24 POBJECT_ATTRIBUTES object_attributes, | |
25 PCLIENT_ID client_id) { | |
26 NTSTATUS status = orig_OpenThread(thread, desired_access, object_attributes, | |
27 client_id); | |
28 if (NT_SUCCESS(status)) | |
29 return status; | |
30 | |
31 do { | |
32 if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled()) | |
33 break; | |
34 if (!client_id) | |
35 break; | |
36 | |
37 uint32 thread_id = 0; | |
38 bool should_break = false; | |
39 __try { | |
40 // We support only the calls for the current process | |
41 if (NULL != client_id->UniqueProcess) | |
42 should_break = true; | |
43 | |
44 // Object attributes should be NULL or empty. | |
45 if (!should_break && NULL != object_attributes) { | |
46 if (0 != object_attributes->Attributes || | |
47 NULL != object_attributes->ObjectName || | |
48 NULL != object_attributes->RootDirectory || | |
49 NULL != object_attributes->SecurityDescriptor || | |
50 NULL != object_attributes->SecurityQualityOfService) { | |
51 should_break = true; | |
52 } | |
53 } | |
54 | |
55 thread_id = static_cast<uint32>( | |
56 reinterpret_cast<ULONG_PTR>(client_id->UniqueThread)); | |
57 } __except(EXCEPTION_EXECUTE_HANDLER) { | |
58 break; | |
59 } | |
60 | |
61 if (should_break) | |
62 break; | |
63 | |
64 if (!ValidParameter(thread, sizeof(HANDLE), WRITE)) | |
65 break; | |
66 | |
67 void* memory = GetGlobalIPCMemory(); | |
68 if (NULL == memory) | |
69 break; | |
70 | |
71 SharedMemIPCClient ipc(memory); | |
72 CrossCallReturn answer = {0}; | |
73 ResultCode code = CrossCall(ipc, IPC_NTOPENTHREAD_TAG, desired_access, | |
74 thread_id, &answer); | |
75 if (SBOX_ALL_OK != code) | |
76 break; | |
77 | |
78 if (!NT_SUCCESS(answer.nt_status)) | |
79 // The nt_status here is most likely STATUS_INVALID_CID because | |
80 // in the broker we set the process id in the CID (client ID) param | |
81 // to be the current process. If you try to open a thread from another | |
82 // process you will get this INVALID_CID error. On the other hand, if you | |
83 // try to open a thread in your own process, it should return success. | |
84 // We don't want to return STATUS_INVALID_CID here, so we return the | |
85 // return of the original open thread status, which is most likely | |
86 // STATUS_ACCESS_DENIED. | |
87 break; | |
88 | |
89 __try { | |
90 // Write the output parameters. | |
91 *thread = answer.handle; | |
92 } __except(EXCEPTION_EXECUTE_HANDLER) { | |
93 break; | |
94 } | |
95 | |
96 return answer.nt_status; | |
97 } while (false); | |
98 | |
99 return status; | |
100 } | |
101 | |
102 // Hooks NtOpenProcess and proxy the call to the broker if it's trying to | |
103 // open the current process. | |
104 NTSTATUS WINAPI TargetNtOpenProcess(NtOpenProcessFunction orig_OpenProcess, | |
105 PHANDLE process, ACCESS_MASK desired_access, | |
106 POBJECT_ATTRIBUTES object_attributes, | |
107 PCLIENT_ID client_id) { | |
108 NTSTATUS status = orig_OpenProcess(process, desired_access, object_attributes, | |
109 client_id); | |
110 if (NT_SUCCESS(status)) | |
111 return status; | |
112 | |
113 do { | |
114 if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled()) | |
115 break; | |
116 if (!client_id) | |
117 break; | |
118 | |
119 uint32 process_id = 0; | |
120 bool should_break = false; | |
121 __try { | |
122 // Object attributes should be NULL or empty. | |
123 if (!should_break && NULL != object_attributes) { | |
124 if (0 != object_attributes->Attributes || | |
125 NULL != object_attributes->ObjectName || | |
126 NULL != object_attributes->RootDirectory || | |
127 NULL != object_attributes->SecurityDescriptor || | |
128 NULL != object_attributes->SecurityQualityOfService) { | |
129 should_break = true; | |
130 } | |
131 } | |
132 | |
133 process_id = static_cast<uint32>( | |
134 reinterpret_cast<ULONG_PTR>(client_id->UniqueProcess)); | |
135 } __except(EXCEPTION_EXECUTE_HANDLER) { | |
136 break; | |
137 } | |
138 | |
139 if (should_break) | |
140 break; | |
141 | |
142 if (!ValidParameter(process, sizeof(HANDLE), WRITE)) | |
143 break; | |
144 | |
145 void* memory = GetGlobalIPCMemory(); | |
146 if (NULL == memory) | |
147 break; | |
148 | |
149 SharedMemIPCClient ipc(memory); | |
150 CrossCallReturn answer = {0}; | |
151 ResultCode code = CrossCall(ipc, IPC_NTOPENPROCESS_TAG, desired_access, | |
152 process_id, &answer); | |
153 if (SBOX_ALL_OK != code) | |
154 break; | |
155 | |
156 if (!NT_SUCCESS(answer.nt_status)) | |
157 return answer.nt_status; | |
158 | |
159 __try { | |
160 // Write the output parameters. | |
161 *process = answer.handle; | |
162 } __except(EXCEPTION_EXECUTE_HANDLER) { | |
163 break; | |
164 } | |
165 | |
166 return answer.nt_status; | |
167 } while (false); | |
168 | |
169 return status; | |
170 } | |
171 | |
172 | |
173 NTSTATUS WINAPI TargetNtOpenProcessToken( | |
174 NtOpenProcessTokenFunction orig_OpenProcessToken, HANDLE process, | |
175 ACCESS_MASK desired_access, PHANDLE token) { | |
176 NTSTATUS status = orig_OpenProcessToken(process, desired_access, token); | |
177 if (NT_SUCCESS(status)) | |
178 return status; | |
179 | |
180 do { | |
181 if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled()) | |
182 break; | |
183 | |
184 if (CURRENT_PROCESS != process) | |
185 break; | |
186 | |
187 if (!ValidParameter(token, sizeof(HANDLE), WRITE)) | |
188 break; | |
189 | |
190 void* memory = GetGlobalIPCMemory(); | |
191 if (NULL == memory) | |
192 break; | |
193 | |
194 SharedMemIPCClient ipc(memory); | |
195 CrossCallReturn answer = {0}; | |
196 ResultCode code = CrossCall(ipc, IPC_NTOPENPROCESSTOKEN_TAG, process, | |
197 desired_access, &answer); | |
198 if (SBOX_ALL_OK != code) | |
199 break; | |
200 | |
201 if (!NT_SUCCESS(answer.nt_status)) | |
202 return answer.nt_status; | |
203 | |
204 __try { | |
205 // Write the output parameters. | |
206 *token = answer.handle; | |
207 } __except(EXCEPTION_EXECUTE_HANDLER) { | |
208 break; | |
209 } | |
210 | |
211 return answer.nt_status; | |
212 } while (false); | |
213 | |
214 return status; | |
215 } | |
216 | |
217 NTSTATUS WINAPI TargetNtOpenProcessTokenEx( | |
218 NtOpenProcessTokenExFunction orig_OpenProcessTokenEx, HANDLE process, | |
219 ACCESS_MASK desired_access, ULONG handle_attributes, PHANDLE token) { | |
220 NTSTATUS status = orig_OpenProcessTokenEx(process, desired_access, | |
221 handle_attributes, token); | |
222 if (NT_SUCCESS(status)) | |
223 return status; | |
224 | |
225 do { | |
226 if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled()) | |
227 break; | |
228 | |
229 if (CURRENT_PROCESS != process) | |
230 break; | |
231 | |
232 if (!ValidParameter(token, sizeof(HANDLE), WRITE)) | |
233 break; | |
234 | |
235 void* memory = GetGlobalIPCMemory(); | |
236 if (NULL == memory) | |
237 break; | |
238 | |
239 SharedMemIPCClient ipc(memory); | |
240 CrossCallReturn answer = {0}; | |
241 ResultCode code = CrossCall(ipc, IPC_NTOPENPROCESSTOKENEX_TAG, process, | |
242 desired_access, handle_attributes, &answer); | |
243 if (SBOX_ALL_OK != code) | |
244 break; | |
245 | |
246 if (!NT_SUCCESS(answer.nt_status)) | |
247 return answer.nt_status; | |
248 | |
249 __try { | |
250 // Write the output parameters. | |
251 *token = answer.handle; | |
252 } __except(EXCEPTION_EXECUTE_HANDLER) { | |
253 break; | |
254 } | |
255 | |
256 return answer.nt_status; | |
257 } while (false); | |
258 | |
259 return status; | |
260 } | |
261 | |
262 BOOL WINAPI TargetCreateProcessW(CreateProcessWFunction orig_CreateProcessW, | |
263 LPCWSTR application_name, LPWSTR command_line, | |
264 LPSECURITY_ATTRIBUTES process_attributes, | |
265 LPSECURITY_ATTRIBUTES thread_attributes, | |
266 BOOL inherit_handles, DWORD flags, | |
267 LPVOID environment, LPCWSTR current_directory, | |
268 LPSTARTUPINFOW startup_info, | |
269 LPPROCESS_INFORMATION process_information) { | |
270 if (orig_CreateProcessW(application_name, command_line, process_attributes, | |
271 thread_attributes, inherit_handles, flags, | |
272 environment, current_directory, startup_info, | |
273 process_information)) { | |
274 return TRUE; | |
275 } | |
276 DWORD original_error = ::GetLastError(); | |
277 | |
278 // We don't trust that the IPC can work this early. | |
279 if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled()) | |
280 return FALSE; | |
281 | |
282 do { | |
283 if (!ValidParameter(process_information, sizeof(PROCESS_INFORMATION), | |
284 WRITE)) | |
285 break; | |
286 | |
287 void* memory = GetGlobalIPCMemory(); | |
288 if (NULL == memory) | |
289 break; | |
290 | |
291 const wchar_t* cur_dir = NULL; | |
292 | |
293 wchar_t current_directory[MAX_PATH]; | |
294 DWORD result = ::GetCurrentDirectory(MAX_PATH, current_directory); | |
295 if (0 != result && result < MAX_PATH) | |
296 cur_dir = current_directory; | |
297 | |
298 SharedMemIPCClient ipc(memory); | |
299 CrossCallReturn answer = {0}; | |
300 | |
301 InOutCountedBuffer proc_info(process_information, | |
302 sizeof(PROCESS_INFORMATION)); | |
303 | |
304 ResultCode code = CrossCall(ipc, IPC_CREATEPROCESSW_TAG, application_name, | |
305 command_line, cur_dir, proc_info, &answer); | |
306 if (SBOX_ALL_OK != code) | |
307 break; | |
308 | |
309 ::SetLastError(answer.win32_result); | |
310 if (ERROR_SUCCESS != answer.win32_result) | |
311 return FALSE; | |
312 | |
313 return TRUE; | |
314 } while (false); | |
315 | |
316 ::SetLastError(original_error); | |
317 return FALSE; | |
318 } | |
319 | |
320 BOOL WINAPI TargetCreateProcessA(CreateProcessAFunction orig_CreateProcessA, | |
321 LPCSTR application_name, LPSTR command_line, | |
322 LPSECURITY_ATTRIBUTES process_attributes, | |
323 LPSECURITY_ATTRIBUTES thread_attributes, | |
324 BOOL inherit_handles, DWORD flags, | |
325 LPVOID environment, LPCSTR current_directory, | |
326 LPSTARTUPINFOA startup_info, | |
327 LPPROCESS_INFORMATION process_information) { | |
328 if (orig_CreateProcessA(application_name, command_line, process_attributes, | |
329 thread_attributes, inherit_handles, flags, | |
330 environment, current_directory, startup_info, | |
331 process_information)) { | |
332 return TRUE; | |
333 } | |
334 DWORD original_error = ::GetLastError(); | |
335 | |
336 // We don't trust that the IPC can work this early. | |
337 if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled()) | |
338 return FALSE; | |
339 | |
340 do { | |
341 if (!ValidParameter(process_information, sizeof(PROCESS_INFORMATION), | |
342 WRITE)) | |
343 break; | |
344 | |
345 void* memory = GetGlobalIPCMemory(); | |
346 if (NULL == memory) | |
347 break; | |
348 | |
349 // Convert the input params to unicode. | |
350 UNICODE_STRING *cmd_unicode = NULL; | |
351 UNICODE_STRING *app_unicode = NULL; | |
352 if (command_line) { | |
353 cmd_unicode = AnsiToUnicode(command_line); | |
354 if (!cmd_unicode) | |
355 break; | |
356 } | |
357 | |
358 if (application_name) { | |
359 app_unicode = AnsiToUnicode(application_name); | |
360 if (!app_unicode) { | |
361 operator delete(cmd_unicode, NT_ALLOC); | |
362 break; | |
363 } | |
364 } | |
365 | |
366 const wchar_t* cmd_line = cmd_unicode ? cmd_unicode->Buffer : NULL; | |
367 const wchar_t* app_name = app_unicode ? app_unicode->Buffer : NULL; | |
368 const wchar_t* cur_dir = NULL; | |
369 | |
370 wchar_t current_directory[MAX_PATH]; | |
371 DWORD result = ::GetCurrentDirectory(MAX_PATH, current_directory); | |
372 if (0 != result && result < MAX_PATH) | |
373 cur_dir = current_directory; | |
374 | |
375 SharedMemIPCClient ipc(memory); | |
376 CrossCallReturn answer = {0}; | |
377 | |
378 InOutCountedBuffer proc_info(process_information, | |
379 sizeof(PROCESS_INFORMATION)); | |
380 | |
381 ResultCode code = CrossCall(ipc, IPC_CREATEPROCESSW_TAG, app_name, | |
382 cmd_line, cur_dir, proc_info, &answer); | |
383 | |
384 operator delete(cmd_unicode, NT_ALLOC); | |
385 operator delete(app_unicode, NT_ALLOC); | |
386 | |
387 if (SBOX_ALL_OK != code) | |
388 break; | |
389 | |
390 ::SetLastError(answer.win32_result); | |
391 if (ERROR_SUCCESS != answer.win32_result) | |
392 return FALSE; | |
393 | |
394 return TRUE; | |
395 } while (false); | |
396 | |
397 ::SetLastError(original_error); | |
398 return FALSE; | |
399 } | |
400 | |
401 // Creates a thread without registering with CSRSS. This is required if we | |
402 // closed the CSRSS ALPC port after lockdown. | |
403 HANDLE WINAPI TargetCreateThread(CreateThreadFunction orig_CreateThread, | |
404 LPSECURITY_ATTRIBUTES thread_attributes, | |
405 SIZE_T stack_size, | |
406 LPTHREAD_START_ROUTINE start_address, | |
407 PVOID parameter, | |
408 DWORD creation_flags, | |
409 LPDWORD thread_id) { | |
410 // Try the normal CreateThread; switch to RtlCreateUserThread if needed. | |
411 static bool use_create_thread = true; | |
412 HANDLE thread; | |
413 if (use_create_thread) { | |
414 thread = orig_CreateThread(thread_attributes, stack_size, start_address, | |
415 parameter, creation_flags, thread_id); | |
416 if (thread) | |
417 return thread; | |
418 } | |
419 | |
420 PSECURITY_DESCRIPTOR sd = | |
421 thread_attributes ? thread_attributes->lpSecurityDescriptor : NULL; | |
422 CLIENT_ID client_id; | |
423 | |
424 NTSTATUS result = g_nt.RtlCreateUserThread(NtCurrentProcess, sd, | |
425 creation_flags & CREATE_SUSPENDED, | |
426 0, stack_size, 0, start_address, | |
427 parameter, &thread, &client_id); | |
428 if (!NT_SUCCESS(result)) | |
429 return 0; | |
430 | |
431 // CSRSS is closed if we got here, so use RtlCreateUserThread from here on. | |
432 use_create_thread = false; | |
433 if (thread_id) | |
434 *thread_id = HandleToUlong(client_id.UniqueThread); | |
435 return thread; | |
436 } | |
437 | |
438 // Cache the default LCID to avoid pinging CSRSS after lockdown. | |
439 // TODO(jschuh): This approach will miss a default locale changes after | |
440 // lockdown. In the future we may want to have the broker check instead. | |
441 LCID WINAPI TargetGetUserDefaultLCID( | |
442 GetUserDefaultLCIDFunction orig_GetUserDefaultLCID) { | |
443 static LCID default_lcid = orig_GetUserDefaultLCID(); | |
444 return default_lcid; | |
445 } | |
446 | |
447 } // namespace sandbox | |
OLD | NEW |