OLD | NEW |
| (Empty) |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "sandbox/src/registry_dispatcher.h" | |
6 | |
7 #include "base/win/scoped_handle.h" | |
8 #include "base/win/windows_version.h" | |
9 #include "sandbox/src/crosscall_client.h" | |
10 #include "sandbox/src/interception.h" | |
11 #include "sandbox/src/interceptors.h" | |
12 #include "sandbox/src/ipc_tags.h" | |
13 #include "sandbox/src/sandbox_nt_util.h" | |
14 #include "sandbox/src/policy_broker.h" | |
15 #include "sandbox/src/policy_params.h" | |
16 #include "sandbox/src/sandbox.h" | |
17 #include "sandbox/src/registry_interception.h" | |
18 #include "sandbox/src/registry_policy.h" | |
19 | |
20 namespace { | |
21 | |
22 // Builds a path using the root directory and the name. | |
23 bool GetCompletePath(HANDLE root, const std::wstring& name, | |
24 std::wstring* complete_name) { | |
25 if (root) { | |
26 if (!sandbox::GetPathFromHandle(root, complete_name)) | |
27 return false; | |
28 | |
29 *complete_name += L"\\"; | |
30 *complete_name += name; | |
31 } else { | |
32 *complete_name = name; | |
33 } | |
34 | |
35 return true; | |
36 } | |
37 | |
38 } | |
39 | |
40 namespace sandbox { | |
41 | |
42 RegistryDispatcher::RegistryDispatcher(PolicyBase* policy_base) | |
43 : policy_base_(policy_base) { | |
44 static const IPCCall create_params = { | |
45 {IPC_NTCREATEKEY_TAG, WCHAR_TYPE, ULONG_TYPE, VOIDPTR_TYPE, ULONG_TYPE, | |
46 ULONG_TYPE, ULONG_TYPE}, | |
47 reinterpret_cast<CallbackGeneric>(&RegistryDispatcher::NtCreateKey) | |
48 }; | |
49 | |
50 static const IPCCall open_params = { | |
51 {IPC_NTOPENKEY_TAG, WCHAR_TYPE, ULONG_TYPE, VOIDPTR_TYPE, ULONG_TYPE}, | |
52 reinterpret_cast<CallbackGeneric>(&RegistryDispatcher::NtOpenKey) | |
53 }; | |
54 | |
55 ipc_calls_.push_back(create_params); | |
56 ipc_calls_.push_back(open_params); | |
57 } | |
58 | |
59 bool RegistryDispatcher::SetupService(InterceptionManager* manager, | |
60 int service) { | |
61 if (IPC_NTCREATEKEY_TAG == service) | |
62 return INTERCEPT_NT(manager, NtCreateKey, CREATE_KEY_ID, 32); | |
63 | |
64 if (IPC_NTOPENKEY_TAG == service) { | |
65 bool result = INTERCEPT_NT(manager, NtOpenKey, OPEN_KEY_ID, 16); | |
66 if (base::win::GetVersion() >= base::win::VERSION_WIN7) | |
67 result &= INTERCEPT_NT(manager, NtOpenKeyEx, OPEN_KEY_EX_ID, 20); | |
68 return result; | |
69 } | |
70 | |
71 return false; | |
72 } | |
73 | |
74 bool RegistryDispatcher::NtCreateKey( | |
75 IPCInfo* ipc, std::wstring* name, DWORD attributes, HANDLE root, | |
76 DWORD desired_access, DWORD title_index, DWORD create_options) { | |
77 base::win::ScopedHandle root_handle; | |
78 std::wstring real_path = *name; | |
79 | |
80 // If there is a root directory, we need to duplicate the handle to make | |
81 // it valid in this process. | |
82 if (root) { | |
83 if (!::DuplicateHandle(ipc->client_info->process, root, | |
84 ::GetCurrentProcess(), &root, 0, FALSE, | |
85 DUPLICATE_SAME_ACCESS)) | |
86 return false; | |
87 | |
88 root_handle.Set(root); | |
89 } | |
90 | |
91 if (!GetCompletePath(root, *name, &real_path)) | |
92 return false; | |
93 | |
94 const wchar_t* regname = real_path.c_str(); | |
95 CountedParameterSet<OpenKey> params; | |
96 params[OpenKey::NAME] = ParamPickerMake(regname); | |
97 params[OpenKey::ACCESS] = ParamPickerMake(desired_access); | |
98 | |
99 EvalResult result = policy_base_->EvalPolicy(IPC_NTCREATEKEY_TAG, | |
100 params.GetBase()); | |
101 | |
102 HANDLE handle; | |
103 NTSTATUS nt_status; | |
104 ULONG disposition = 0; | |
105 if (!RegistryPolicy::CreateKeyAction(result, *ipc->client_info, *name, | |
106 attributes, root, desired_access, | |
107 title_index, create_options, &handle, | |
108 &nt_status, &disposition)) { | |
109 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
110 return true; | |
111 } | |
112 | |
113 // Return operation status on the IPC. | |
114 ipc->return_info.extended[0].unsigned_int = disposition; | |
115 ipc->return_info.nt_status = nt_status; | |
116 ipc->return_info.handle = handle; | |
117 return true; | |
118 } | |
119 | |
120 bool RegistryDispatcher::NtOpenKey(IPCInfo* ipc, std::wstring* name, | |
121 DWORD attributes, HANDLE root, | |
122 DWORD desired_access) { | |
123 base::win::ScopedHandle root_handle; | |
124 std::wstring real_path = *name; | |
125 | |
126 // If there is a root directory, we need to duplicate the handle to make | |
127 // it valid in this process. | |
128 if (root) { | |
129 if (!::DuplicateHandle(ipc->client_info->process, root, | |
130 ::GetCurrentProcess(), &root, 0, FALSE, | |
131 DUPLICATE_SAME_ACCESS)) | |
132 return false; | |
133 root_handle.Set(root); | |
134 } | |
135 | |
136 if (!GetCompletePath(root, *name, &real_path)) | |
137 return false; | |
138 | |
139 const wchar_t* regname = real_path.c_str(); | |
140 CountedParameterSet<OpenKey> params; | |
141 params[OpenKey::NAME] = ParamPickerMake(regname); | |
142 params[OpenKey::ACCESS] = ParamPickerMake(desired_access); | |
143 | |
144 EvalResult result = policy_base_->EvalPolicy(IPC_NTOPENKEY_TAG, | |
145 params.GetBase()); | |
146 HANDLE handle; | |
147 NTSTATUS nt_status; | |
148 if (!RegistryPolicy::OpenKeyAction(result, *ipc->client_info, *name, | |
149 attributes, root, desired_access, &handle, | |
150 &nt_status)) { | |
151 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
152 return true; | |
153 } | |
154 | |
155 // Return operation status on the IPC. | |
156 ipc->return_info.nt_status = nt_status; | |
157 ipc->return_info.handle = handle; | |
158 return true; | |
159 } | |
160 | |
161 } // namespace sandbox | |
OLD | NEW |