| Index: sandbox/win/src/registry_dispatcher.cc
|
| diff --git a/sandbox/win/src/registry_dispatcher.cc b/sandbox/win/src/registry_dispatcher.cc
|
| deleted file mode 100644
|
| index b8d94c8cc366e6d496cb7e188266fff1eaa69fe4..0000000000000000000000000000000000000000
|
| --- a/sandbox/win/src/registry_dispatcher.cc
|
| +++ /dev/null
|
| @@ -1,171 +0,0 @@
|
| -// Copyright (c) 2011 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "sandbox/win/src/registry_dispatcher.h"
|
| -
|
| -#include <stdint.h>
|
| -
|
| -#include "base/win/scoped_handle.h"
|
| -#include "base/win/windows_version.h"
|
| -#include "sandbox/win/src/crosscall_client.h"
|
| -#include "sandbox/win/src/interception.h"
|
| -#include "sandbox/win/src/interceptors.h"
|
| -#include "sandbox/win/src/ipc_tags.h"
|
| -#include "sandbox/win/src/policy_broker.h"
|
| -#include "sandbox/win/src/policy_params.h"
|
| -#include "sandbox/win/src/registry_interception.h"
|
| -#include "sandbox/win/src/registry_policy.h"
|
| -#include "sandbox/win/src/sandbox.h"
|
| -#include "sandbox/win/src/sandbox_nt_util.h"
|
| -
|
| -namespace {
|
| -
|
| -// Builds a path using the root directory and the name.
|
| -bool GetCompletePath(HANDLE root, const base::string16& name,
|
| - base::string16* complete_name) {
|
| - if (root) {
|
| - if (!sandbox::GetPathFromHandle(root, complete_name))
|
| - return false;
|
| -
|
| - *complete_name += L"\\";
|
| - *complete_name += name;
|
| - } else {
|
| - *complete_name = name;
|
| - }
|
| -
|
| - return true;
|
| -}
|
| -
|
| -}
|
| -
|
| -namespace sandbox {
|
| -
|
| -RegistryDispatcher::RegistryDispatcher(PolicyBase* policy_base)
|
| - : policy_base_(policy_base) {
|
| - static const IPCCall create_params = {
|
| - {IPC_NTCREATEKEY_TAG,
|
| - {WCHAR_TYPE,
|
| - UINT32_TYPE,
|
| - VOIDPTR_TYPE,
|
| - UINT32_TYPE,
|
| - UINT32_TYPE,
|
| - UINT32_TYPE}},
|
| - reinterpret_cast<CallbackGeneric>(&RegistryDispatcher::NtCreateKey)};
|
| -
|
| - static const IPCCall open_params = {
|
| - {IPC_NTOPENKEY_TAG, {WCHAR_TYPE, UINT32_TYPE, VOIDPTR_TYPE, UINT32_TYPE}},
|
| - reinterpret_cast<CallbackGeneric>(&RegistryDispatcher::NtOpenKey)};
|
| -
|
| - ipc_calls_.push_back(create_params);
|
| - ipc_calls_.push_back(open_params);
|
| -}
|
| -
|
| -bool RegistryDispatcher::SetupService(InterceptionManager* manager,
|
| - int service) {
|
| - if (IPC_NTCREATEKEY_TAG == service)
|
| - return INTERCEPT_NT(manager, NtCreateKey, CREATE_KEY_ID, 32);
|
| -
|
| - if (IPC_NTOPENKEY_TAG == service) {
|
| - bool result = INTERCEPT_NT(manager, NtOpenKey, OPEN_KEY_ID, 16);
|
| - result &= INTERCEPT_NT(manager, NtOpenKeyEx, OPEN_KEY_EX_ID, 20);
|
| - return result;
|
| - }
|
| -
|
| - return false;
|
| -}
|
| -
|
| -bool RegistryDispatcher::NtCreateKey(IPCInfo* ipc,
|
| - base::string16* name,
|
| - uint32_t attributes,
|
| - HANDLE root,
|
| - uint32_t desired_access,
|
| - uint32_t title_index,
|
| - uint32_t create_options) {
|
| - base::win::ScopedHandle root_handle;
|
| - base::string16 real_path = *name;
|
| -
|
| - // If there is a root directory, we need to duplicate the handle to make
|
| - // it valid in this process.
|
| - if (root) {
|
| - if (!::DuplicateHandle(ipc->client_info->process, root,
|
| - ::GetCurrentProcess(), &root, 0, FALSE,
|
| - DUPLICATE_SAME_ACCESS))
|
| - return false;
|
| -
|
| - root_handle.Set(root);
|
| - }
|
| -
|
| - if (!GetCompletePath(root, *name, &real_path))
|
| - return false;
|
| -
|
| - const wchar_t* regname = real_path.c_str();
|
| - CountedParameterSet<OpenKey> params;
|
| - params[OpenKey::NAME] = ParamPickerMake(regname);
|
| - params[OpenKey::ACCESS] = ParamPickerMake(desired_access);
|
| -
|
| - EvalResult result = policy_base_->EvalPolicy(IPC_NTCREATEKEY_TAG,
|
| - params.GetBase());
|
| -
|
| - HANDLE handle;
|
| - NTSTATUS nt_status;
|
| - ULONG disposition = 0;
|
| - if (!RegistryPolicy::CreateKeyAction(result, *ipc->client_info, *name,
|
| - attributes, root, desired_access,
|
| - title_index, create_options, &handle,
|
| - &nt_status, &disposition)) {
|
| - ipc->return_info.nt_status = STATUS_ACCESS_DENIED;
|
| - return true;
|
| - }
|
| -
|
| - // Return operation status on the IPC.
|
| - ipc->return_info.extended[0].unsigned_int = disposition;
|
| - ipc->return_info.nt_status = nt_status;
|
| - ipc->return_info.handle = handle;
|
| - return true;
|
| -}
|
| -
|
| -bool RegistryDispatcher::NtOpenKey(IPCInfo* ipc,
|
| - base::string16* name,
|
| - uint32_t attributes,
|
| - HANDLE root,
|
| - uint32_t desired_access) {
|
| - base::win::ScopedHandle root_handle;
|
| - base::string16 real_path = *name;
|
| -
|
| - // If there is a root directory, we need to duplicate the handle to make
|
| - // it valid in this process.
|
| - if (root) {
|
| - if (!::DuplicateHandle(ipc->client_info->process, root,
|
| - ::GetCurrentProcess(), &root, 0, FALSE,
|
| - DUPLICATE_SAME_ACCESS))
|
| - return false;
|
| - root_handle.Set(root);
|
| - }
|
| -
|
| - if (!GetCompletePath(root, *name, &real_path))
|
| - return false;
|
| -
|
| - const wchar_t* regname = real_path.c_str();
|
| - CountedParameterSet<OpenKey> params;
|
| - params[OpenKey::NAME] = ParamPickerMake(regname);
|
| - params[OpenKey::ACCESS] = ParamPickerMake(desired_access);
|
| -
|
| - EvalResult result = policy_base_->EvalPolicy(IPC_NTOPENKEY_TAG,
|
| - params.GetBase());
|
| - HANDLE handle;
|
| - NTSTATUS nt_status;
|
| - if (!RegistryPolicy::OpenKeyAction(result, *ipc->client_info, *name,
|
| - attributes, root, desired_access, &handle,
|
| - &nt_status)) {
|
| - ipc->return_info.nt_status = STATUS_ACCESS_DENIED;
|
| - return true;
|
| - }
|
| -
|
| - // Return operation status on the IPC.
|
| - ipc->return_info.nt_status = nt_status;
|
| - ipc->return_info.handle = handle;
|
| - return true;
|
| -}
|
| -
|
| -} // namespace sandbox
|
|
|