Index: sandbox/src/process_thread_interception.cc |
diff --git a/sandbox/src/process_thread_interception.cc b/sandbox/src/process_thread_interception.cc |
deleted file mode 100644 |
index e847908b053691e7cfe35698ca05c64fc9d681cf..0000000000000000000000000000000000000000 |
--- a/sandbox/src/process_thread_interception.cc |
+++ /dev/null |
@@ -1,447 +0,0 @@ |
-// Copyright (c) 2006-2011 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "sandbox/src/process_thread_interception.h" |
- |
-#include "sandbox/src/crosscall_client.h" |
-#include "sandbox/src/ipc_tags.h" |
-#include "sandbox/src/policy_params.h" |
-#include "sandbox/src/policy_target.h" |
-#include "sandbox/src/sandbox_factory.h" |
-#include "sandbox/src/sandbox_nt_util.h" |
-#include "sandbox/src/sharedmem_ipc_client.h" |
-#include "sandbox/src/target_services.h" |
- |
-namespace sandbox { |
- |
-SANDBOX_INTERCEPT NtExports g_nt; |
- |
-// Hooks NtOpenThread and proxy the call to the broker if it's trying to |
-// open a thread in the same process. |
-NTSTATUS WINAPI TargetNtOpenThread(NtOpenThreadFunction orig_OpenThread, |
- PHANDLE thread, ACCESS_MASK desired_access, |
- POBJECT_ATTRIBUTES object_attributes, |
- PCLIENT_ID client_id) { |
- NTSTATUS status = orig_OpenThread(thread, desired_access, object_attributes, |
- client_id); |
- if (NT_SUCCESS(status)) |
- return status; |
- |
- do { |
- if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled()) |
- break; |
- if (!client_id) |
- break; |
- |
- uint32 thread_id = 0; |
- bool should_break = false; |
- __try { |
- // We support only the calls for the current process |
- if (NULL != client_id->UniqueProcess) |
- should_break = true; |
- |
- // Object attributes should be NULL or empty. |
- if (!should_break && NULL != object_attributes) { |
- if (0 != object_attributes->Attributes || |
- NULL != object_attributes->ObjectName || |
- NULL != object_attributes->RootDirectory || |
- NULL != object_attributes->SecurityDescriptor || |
- NULL != object_attributes->SecurityQualityOfService) { |
- should_break = true; |
- } |
- } |
- |
- thread_id = static_cast<uint32>( |
- reinterpret_cast<ULONG_PTR>(client_id->UniqueThread)); |
- } __except(EXCEPTION_EXECUTE_HANDLER) { |
- break; |
- } |
- |
- if (should_break) |
- break; |
- |
- if (!ValidParameter(thread, sizeof(HANDLE), WRITE)) |
- break; |
- |
- void* memory = GetGlobalIPCMemory(); |
- if (NULL == memory) |
- break; |
- |
- SharedMemIPCClient ipc(memory); |
- CrossCallReturn answer = {0}; |
- ResultCode code = CrossCall(ipc, IPC_NTOPENTHREAD_TAG, desired_access, |
- thread_id, &answer); |
- if (SBOX_ALL_OK != code) |
- break; |
- |
- if (!NT_SUCCESS(answer.nt_status)) |
- // The nt_status here is most likely STATUS_INVALID_CID because |
- // in the broker we set the process id in the CID (client ID) param |
- // to be the current process. If you try to open a thread from another |
- // process you will get this INVALID_CID error. On the other hand, if you |
- // try to open a thread in your own process, it should return success. |
- // We don't want to return STATUS_INVALID_CID here, so we return the |
- // return of the original open thread status, which is most likely |
- // STATUS_ACCESS_DENIED. |
- break; |
- |
- __try { |
- // Write the output parameters. |
- *thread = answer.handle; |
- } __except(EXCEPTION_EXECUTE_HANDLER) { |
- break; |
- } |
- |
- return answer.nt_status; |
- } while (false); |
- |
- return status; |
-} |
- |
-// Hooks NtOpenProcess and proxy the call to the broker if it's trying to |
-// open the current process. |
-NTSTATUS WINAPI TargetNtOpenProcess(NtOpenProcessFunction orig_OpenProcess, |
- PHANDLE process, ACCESS_MASK desired_access, |
- POBJECT_ATTRIBUTES object_attributes, |
- PCLIENT_ID client_id) { |
- NTSTATUS status = orig_OpenProcess(process, desired_access, object_attributes, |
- client_id); |
- if (NT_SUCCESS(status)) |
- return status; |
- |
- do { |
- if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled()) |
- break; |
- if (!client_id) |
- break; |
- |
- uint32 process_id = 0; |
- bool should_break = false; |
- __try { |
- // Object attributes should be NULL or empty. |
- if (!should_break && NULL != object_attributes) { |
- if (0 != object_attributes->Attributes || |
- NULL != object_attributes->ObjectName || |
- NULL != object_attributes->RootDirectory || |
- NULL != object_attributes->SecurityDescriptor || |
- NULL != object_attributes->SecurityQualityOfService) { |
- should_break = true; |
- } |
- } |
- |
- process_id = static_cast<uint32>( |
- reinterpret_cast<ULONG_PTR>(client_id->UniqueProcess)); |
- } __except(EXCEPTION_EXECUTE_HANDLER) { |
- break; |
- } |
- |
- if (should_break) |
- break; |
- |
- if (!ValidParameter(process, sizeof(HANDLE), WRITE)) |
- break; |
- |
- void* memory = GetGlobalIPCMemory(); |
- if (NULL == memory) |
- break; |
- |
- SharedMemIPCClient ipc(memory); |
- CrossCallReturn answer = {0}; |
- ResultCode code = CrossCall(ipc, IPC_NTOPENPROCESS_TAG, desired_access, |
- process_id, &answer); |
- if (SBOX_ALL_OK != code) |
- break; |
- |
- if (!NT_SUCCESS(answer.nt_status)) |
- return answer.nt_status; |
- |
- __try { |
- // Write the output parameters. |
- *process = answer.handle; |
- } __except(EXCEPTION_EXECUTE_HANDLER) { |
- break; |
- } |
- |
- return answer.nt_status; |
- } while (false); |
- |
- return status; |
-} |
- |
- |
-NTSTATUS WINAPI TargetNtOpenProcessToken( |
- NtOpenProcessTokenFunction orig_OpenProcessToken, HANDLE process, |
- ACCESS_MASK desired_access, PHANDLE token) { |
- NTSTATUS status = orig_OpenProcessToken(process, desired_access, token); |
- if (NT_SUCCESS(status)) |
- return status; |
- |
- do { |
- if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled()) |
- break; |
- |
- if (CURRENT_PROCESS != process) |
- break; |
- |
- if (!ValidParameter(token, sizeof(HANDLE), WRITE)) |
- break; |
- |
- void* memory = GetGlobalIPCMemory(); |
- if (NULL == memory) |
- break; |
- |
- SharedMemIPCClient ipc(memory); |
- CrossCallReturn answer = {0}; |
- ResultCode code = CrossCall(ipc, IPC_NTOPENPROCESSTOKEN_TAG, process, |
- desired_access, &answer); |
- if (SBOX_ALL_OK != code) |
- break; |
- |
- if (!NT_SUCCESS(answer.nt_status)) |
- return answer.nt_status; |
- |
- __try { |
- // Write the output parameters. |
- *token = answer.handle; |
- } __except(EXCEPTION_EXECUTE_HANDLER) { |
- break; |
- } |
- |
- return answer.nt_status; |
- } while (false); |
- |
- return status; |
-} |
- |
-NTSTATUS WINAPI TargetNtOpenProcessTokenEx( |
- NtOpenProcessTokenExFunction orig_OpenProcessTokenEx, HANDLE process, |
- ACCESS_MASK desired_access, ULONG handle_attributes, PHANDLE token) { |
- NTSTATUS status = orig_OpenProcessTokenEx(process, desired_access, |
- handle_attributes, token); |
- if (NT_SUCCESS(status)) |
- return status; |
- |
- do { |
- if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled()) |
- break; |
- |
- if (CURRENT_PROCESS != process) |
- break; |
- |
- if (!ValidParameter(token, sizeof(HANDLE), WRITE)) |
- break; |
- |
- void* memory = GetGlobalIPCMemory(); |
- if (NULL == memory) |
- break; |
- |
- SharedMemIPCClient ipc(memory); |
- CrossCallReturn answer = {0}; |
- ResultCode code = CrossCall(ipc, IPC_NTOPENPROCESSTOKENEX_TAG, process, |
- desired_access, handle_attributes, &answer); |
- if (SBOX_ALL_OK != code) |
- break; |
- |
- if (!NT_SUCCESS(answer.nt_status)) |
- return answer.nt_status; |
- |
- __try { |
- // Write the output parameters. |
- *token = answer.handle; |
- } __except(EXCEPTION_EXECUTE_HANDLER) { |
- break; |
- } |
- |
- return answer.nt_status; |
- } while (false); |
- |
- return status; |
-} |
- |
-BOOL WINAPI TargetCreateProcessW(CreateProcessWFunction orig_CreateProcessW, |
- LPCWSTR application_name, LPWSTR command_line, |
- LPSECURITY_ATTRIBUTES process_attributes, |
- LPSECURITY_ATTRIBUTES thread_attributes, |
- BOOL inherit_handles, DWORD flags, |
- LPVOID environment, LPCWSTR current_directory, |
- LPSTARTUPINFOW startup_info, |
- LPPROCESS_INFORMATION process_information) { |
- if (orig_CreateProcessW(application_name, command_line, process_attributes, |
- thread_attributes, inherit_handles, flags, |
- environment, current_directory, startup_info, |
- process_information)) { |
- return TRUE; |
- } |
- DWORD original_error = ::GetLastError(); |
- |
- // We don't trust that the IPC can work this early. |
- if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled()) |
- return FALSE; |
- |
- do { |
- if (!ValidParameter(process_information, sizeof(PROCESS_INFORMATION), |
- WRITE)) |
- break; |
- |
- void* memory = GetGlobalIPCMemory(); |
- if (NULL == memory) |
- break; |
- |
- const wchar_t* cur_dir = NULL; |
- |
- wchar_t current_directory[MAX_PATH]; |
- DWORD result = ::GetCurrentDirectory(MAX_PATH, current_directory); |
- if (0 != result && result < MAX_PATH) |
- cur_dir = current_directory; |
- |
- SharedMemIPCClient ipc(memory); |
- CrossCallReturn answer = {0}; |
- |
- InOutCountedBuffer proc_info(process_information, |
- sizeof(PROCESS_INFORMATION)); |
- |
- ResultCode code = CrossCall(ipc, IPC_CREATEPROCESSW_TAG, application_name, |
- command_line, cur_dir, proc_info, &answer); |
- if (SBOX_ALL_OK != code) |
- break; |
- |
- ::SetLastError(answer.win32_result); |
- if (ERROR_SUCCESS != answer.win32_result) |
- return FALSE; |
- |
- return TRUE; |
- } while (false); |
- |
- ::SetLastError(original_error); |
- return FALSE; |
-} |
- |
-BOOL WINAPI TargetCreateProcessA(CreateProcessAFunction orig_CreateProcessA, |
- LPCSTR application_name, LPSTR command_line, |
- LPSECURITY_ATTRIBUTES process_attributes, |
- LPSECURITY_ATTRIBUTES thread_attributes, |
- BOOL inherit_handles, DWORD flags, |
- LPVOID environment, LPCSTR current_directory, |
- LPSTARTUPINFOA startup_info, |
- LPPROCESS_INFORMATION process_information) { |
- if (orig_CreateProcessA(application_name, command_line, process_attributes, |
- thread_attributes, inherit_handles, flags, |
- environment, current_directory, startup_info, |
- process_information)) { |
- return TRUE; |
- } |
- DWORD original_error = ::GetLastError(); |
- |
- // We don't trust that the IPC can work this early. |
- if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled()) |
- return FALSE; |
- |
- do { |
- if (!ValidParameter(process_information, sizeof(PROCESS_INFORMATION), |
- WRITE)) |
- break; |
- |
- void* memory = GetGlobalIPCMemory(); |
- if (NULL == memory) |
- break; |
- |
- // Convert the input params to unicode. |
- UNICODE_STRING *cmd_unicode = NULL; |
- UNICODE_STRING *app_unicode = NULL; |
- if (command_line) { |
- cmd_unicode = AnsiToUnicode(command_line); |
- if (!cmd_unicode) |
- break; |
- } |
- |
- if (application_name) { |
- app_unicode = AnsiToUnicode(application_name); |
- if (!app_unicode) { |
- operator delete(cmd_unicode, NT_ALLOC); |
- break; |
- } |
- } |
- |
- const wchar_t* cmd_line = cmd_unicode ? cmd_unicode->Buffer : NULL; |
- const wchar_t* app_name = app_unicode ? app_unicode->Buffer : NULL; |
- const wchar_t* cur_dir = NULL; |
- |
- wchar_t current_directory[MAX_PATH]; |
- DWORD result = ::GetCurrentDirectory(MAX_PATH, current_directory); |
- if (0 != result && result < MAX_PATH) |
- cur_dir = current_directory; |
- |
- SharedMemIPCClient ipc(memory); |
- CrossCallReturn answer = {0}; |
- |
- InOutCountedBuffer proc_info(process_information, |
- sizeof(PROCESS_INFORMATION)); |
- |
- ResultCode code = CrossCall(ipc, IPC_CREATEPROCESSW_TAG, app_name, |
- cmd_line, cur_dir, proc_info, &answer); |
- |
- operator delete(cmd_unicode, NT_ALLOC); |
- operator delete(app_unicode, NT_ALLOC); |
- |
- if (SBOX_ALL_OK != code) |
- break; |
- |
- ::SetLastError(answer.win32_result); |
- if (ERROR_SUCCESS != answer.win32_result) |
- return FALSE; |
- |
- return TRUE; |
- } while (false); |
- |
- ::SetLastError(original_error); |
- return FALSE; |
-} |
- |
-// Creates a thread without registering with CSRSS. This is required if we |
-// closed the CSRSS ALPC port after lockdown. |
-HANDLE WINAPI TargetCreateThread(CreateThreadFunction orig_CreateThread, |
- LPSECURITY_ATTRIBUTES thread_attributes, |
- SIZE_T stack_size, |
- LPTHREAD_START_ROUTINE start_address, |
- PVOID parameter, |
- DWORD creation_flags, |
- LPDWORD thread_id) { |
-// Try the normal CreateThread; switch to RtlCreateUserThread if needed. |
- static bool use_create_thread = true; |
- HANDLE thread; |
- if (use_create_thread) { |
- thread = orig_CreateThread(thread_attributes, stack_size, start_address, |
- parameter, creation_flags, thread_id); |
- if (thread) |
- return thread; |
- } |
- |
- PSECURITY_DESCRIPTOR sd = |
- thread_attributes ? thread_attributes->lpSecurityDescriptor : NULL; |
- CLIENT_ID client_id; |
- |
- NTSTATUS result = g_nt.RtlCreateUserThread(NtCurrentProcess, sd, |
- creation_flags & CREATE_SUSPENDED, |
- 0, stack_size, 0, start_address, |
- parameter, &thread, &client_id); |
- if (!NT_SUCCESS(result)) |
- return 0; |
- |
- // CSRSS is closed if we got here, so use RtlCreateUserThread from here on. |
- use_create_thread = false; |
- if (thread_id) |
- *thread_id = HandleToUlong(client_id.UniqueThread); |
- return thread; |
-} |
- |
-// Cache the default LCID to avoid pinging CSRSS after lockdown. |
-// TODO(jschuh): This approach will miss a default locale changes after |
-// lockdown. In the future we may want to have the broker check instead. |
-LCID WINAPI TargetGetUserDefaultLCID( |
- GetUserDefaultLCIDFunction orig_GetUserDefaultLCID) { |
- static LCID default_lcid = orig_GetUserDefaultLCID(); |
- return default_lcid; |
-} |
- |
-} // namespace sandbox |