OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #ifndef SANDBOX_WIN_SRC_TARGET_PROCESS_H_ | |
6 #define SANDBOX_WIN_SRC_TARGET_PROCESS_H_ | |
7 | |
8 #include <windows.h> | |
9 #include <stddef.h> | |
10 #include <stdint.h> | |
11 | |
12 #include "base/macros.h" | |
13 #include "base/memory/free_deleter.h" | |
14 #include "base/memory/scoped_ptr.h" | |
15 #include "base/win/scoped_handle.h" | |
16 #include "base/win/scoped_process_information.h" | |
17 #include "sandbox/win/src/crosscall_server.h" | |
18 #include "sandbox/win/src/sandbox_types.h" | |
19 | |
20 namespace base { | |
21 namespace win { | |
22 | |
23 class StartupInformation; | |
24 | |
25 }; // namespace win | |
26 }; // namespace base | |
27 | |
28 namespace sandbox { | |
29 | |
30 class AttributeList; | |
31 class SharedMemIPCServer; | |
32 class ThreadProvider; | |
33 | |
34 // TargetProcess models a target instance (child process). Objects of this | |
35 // class are owned by the Policy used to create them. | |
36 class TargetProcess { | |
37 public: | |
38 // The constructor takes ownership of |initial_token|, |lockdown_token| | |
39 // and |lowbox_token|. | |
40 TargetProcess(base::win::ScopedHandle initial_token, | |
41 base::win::ScopedHandle lockdown_token, | |
42 base::win::ScopedHandle lowbox_token, | |
43 HANDLE job, | |
44 ThreadProvider* thread_pool); | |
45 ~TargetProcess(); | |
46 | |
47 // TODO(cpu): Currently there does not seem to be a reason to implement | |
48 // reference counting for this class since is internal, but kept the | |
49 // the same interface so the interception framework does not need to be | |
50 // touched at this point. | |
51 void AddRef() {} | |
52 void Release() {} | |
53 | |
54 // Creates the new target process. The process is created suspended. | |
55 DWORD Create(const wchar_t* exe_path, | |
56 const wchar_t* command_line, | |
57 bool inherit_handles, | |
58 const base::win::StartupInformation& startup_info, | |
59 base::win::ScopedProcessInformation* target_info); | |
60 | |
61 // Destroys the target process. | |
62 void Terminate(); | |
63 | |
64 // Creates the IPC objects such as the BrokerDispatcher and the | |
65 // IPC server. The IPC server uses the services of the thread_pool. | |
66 DWORD Init(Dispatcher* ipc_dispatcher, | |
67 void* policy, | |
68 uint32_t shared_IPC_size, | |
69 uint32_t shared_policy_size); | |
70 | |
71 // Returns the handle to the target process. | |
72 HANDLE Process() const { | |
73 return sandbox_process_info_.process_handle(); | |
74 } | |
75 | |
76 // Returns the handle to the job object that the target process belongs to. | |
77 HANDLE Job() const { | |
78 return job_; | |
79 } | |
80 | |
81 // Returns the address of the target main exe. This is used by the | |
82 // interceptions framework. | |
83 HMODULE MainModule() const { | |
84 return reinterpret_cast<HMODULE>(base_address_); | |
85 } | |
86 | |
87 // Returns the name of the executable. | |
88 const wchar_t* Name() const { | |
89 return exe_name_.get(); | |
90 } | |
91 | |
92 // Returns the process id. | |
93 DWORD ProcessId() const { | |
94 return sandbox_process_info_.process_id(); | |
95 } | |
96 | |
97 // Returns the handle to the main thread. | |
98 HANDLE MainThread() const { | |
99 return sandbox_process_info_.thread_handle(); | |
100 } | |
101 | |
102 // Transfers a 32-bit variable between the broker and the target. | |
103 ResultCode TransferVariable(const char* name, void* address, size_t size); | |
104 | |
105 private: | |
106 // Details of the target process. | |
107 base::win::ScopedProcessInformation sandbox_process_info_; | |
108 // The token associated with the process. It provides the core of the | |
109 // sbox security. | |
110 base::win::ScopedHandle lockdown_token_; | |
111 // The token given to the initial thread so that the target process can | |
112 // start. It has more powers than the lockdown_token. | |
113 base::win::ScopedHandle initial_token_; | |
114 // The lowbox token associated with the process. This token is set after the | |
115 // process creation. | |
116 base::win::ScopedHandle lowbox_token_; | |
117 // Kernel handle to the shared memory used by the IPC server. | |
118 base::win::ScopedHandle shared_section_; | |
119 // Job object containing the target process. | |
120 HANDLE job_; | |
121 // Reference to the IPC subsystem. | |
122 scoped_ptr<SharedMemIPCServer> ipc_server_; | |
123 // Provides the threads used by the IPC. This class does not own this pointer. | |
124 ThreadProvider* thread_pool_; | |
125 // Base address of the main executable | |
126 void* base_address_; | |
127 // Full name of the target executable. | |
128 scoped_ptr<wchar_t, base::FreeDeleter> exe_name_; | |
129 | |
130 // Function used for testing. | |
131 friend TargetProcess* MakeTestTargetProcess(HANDLE process, | |
132 HMODULE base_address); | |
133 | |
134 DISALLOW_IMPLICIT_CONSTRUCTORS(TargetProcess); | |
135 }; | |
136 | |
137 // Creates a mock TargetProcess used for testing interceptions. | |
138 // TODO(cpu): It seems that this method is not going to be used anymore. | |
139 TargetProcess* MakeTestTargetProcess(HANDLE process, HMODULE base_address); | |
140 | |
141 | |
142 } // namespace sandbox | |
143 | |
144 #endif // SANDBOX_WIN_SRC_TARGET_PROCESS_H_ | |
OLD | NEW |