| Index: sandbox/win/src/named_pipe_dispatcher.cc
|
| diff --git a/sandbox/win/src/named_pipe_dispatcher.cc b/sandbox/win/src/named_pipe_dispatcher.cc
|
| deleted file mode 100644
|
| index ea8d38035fe2232953ff076cc03864a85fc4126a..0000000000000000000000000000000000000000
|
| --- a/sandbox/win/src/named_pipe_dispatcher.cc
|
| +++ /dev/null
|
| @@ -1,103 +0,0 @@
|
| -// Copyright (c) 2013 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "sandbox/win/src/named_pipe_dispatcher.h"
|
| -
|
| -#include <stdint.h>
|
| -
|
| -#include "base/strings/string_split.h"
|
| -
|
| -#include "sandbox/win/src/crosscall_client.h"
|
| -#include "sandbox/win/src/interception.h"
|
| -#include "sandbox/win/src/interceptors.h"
|
| -#include "sandbox/win/src/ipc_tags.h"
|
| -#include "sandbox/win/src/named_pipe_interception.h"
|
| -#include "sandbox/win/src/named_pipe_policy.h"
|
| -#include "sandbox/win/src/policy_broker.h"
|
| -#include "sandbox/win/src/policy_params.h"
|
| -#include "sandbox/win/src/sandbox.h"
|
| -
|
| -
|
| -namespace sandbox {
|
| -
|
| -NamedPipeDispatcher::NamedPipeDispatcher(PolicyBase* policy_base)
|
| - : policy_base_(policy_base) {
|
| - static const IPCCall create_params = {
|
| - {IPC_CREATENAMEDPIPEW_TAG,
|
| - {WCHAR_TYPE,
|
| - UINT32_TYPE,
|
| - UINT32_TYPE,
|
| - UINT32_TYPE,
|
| - UINT32_TYPE,
|
| - UINT32_TYPE,
|
| - UINT32_TYPE}},
|
| - reinterpret_cast<CallbackGeneric>(&NamedPipeDispatcher::CreateNamedPipe)};
|
| -
|
| - ipc_calls_.push_back(create_params);
|
| -}
|
| -
|
| -bool NamedPipeDispatcher::SetupService(InterceptionManager* manager,
|
| - int service) {
|
| - if (IPC_CREATENAMEDPIPEW_TAG == service)
|
| - return INTERCEPT_EAT(manager, kKerneldllName, CreateNamedPipeW,
|
| - CREATE_NAMED_PIPE_ID, 36);
|
| -
|
| - return false;
|
| -}
|
| -
|
| -bool NamedPipeDispatcher::CreateNamedPipe(IPCInfo* ipc,
|
| - base::string16* name,
|
| - uint32_t open_mode,
|
| - uint32_t pipe_mode,
|
| - uint32_t max_instances,
|
| - uint32_t out_buffer_size,
|
| - uint32_t in_buffer_size,
|
| - uint32_t default_timeout) {
|
| - ipc->return_info.win32_result = ERROR_ACCESS_DENIED;
|
| - ipc->return_info.handle = INVALID_HANDLE_VALUE;
|
| -
|
| - base::StringPiece16 dotdot(L"..");
|
| -
|
| - for (const base::StringPiece16& path : base::SplitStringPiece(
|
| - *name, base::string16(1, '/'),
|
| - base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL)) {
|
| - for (const base::StringPiece16& inner : base::SplitStringPiece(
|
| - path, base::string16(1, '\\'),
|
| - base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL)) {
|
| - if (inner == dotdot)
|
| - return true;
|
| - }
|
| - }
|
| -
|
| - const wchar_t* pipe_name = name->c_str();
|
| - CountedParameterSet<NameBased> params;
|
| - params[NameBased::NAME] = ParamPickerMake(pipe_name);
|
| -
|
| - EvalResult eval = policy_base_->EvalPolicy(IPC_CREATENAMEDPIPEW_TAG,
|
| - params.GetBase());
|
| -
|
| - // "For file I/O, the "\\?\" prefix to a path string tells the Windows APIs to
|
| - // disable all string parsing and to send the string that follows it straight
|
| - // to the file system."
|
| - // http://msdn.microsoft.com/en-us/library/aa365247(VS.85).aspx
|
| - // This ensures even if there is a path traversal in the pipe name, and it is
|
| - // able to get past the checks above, it will still not be allowed to escape
|
| - // our whitelisted namespace.
|
| - if (name->compare(0, 4, L"\\\\.\\") == 0)
|
| - name->replace(0, 4, L"\\\\\?\\");
|
| -
|
| - HANDLE pipe;
|
| - DWORD ret = NamedPipePolicy::CreateNamedPipeAction(eval, *ipc->client_info,
|
| - *name, open_mode,
|
| - pipe_mode, max_instances,
|
| - out_buffer_size,
|
| - in_buffer_size,
|
| - default_timeout, &pipe);
|
| -
|
| - ipc->return_info.win32_result = ret;
|
| - ipc->return_info.handle = pipe;
|
| - return true;
|
| -}
|
| -
|
| -} // namespace sandbox
|
|
|