| Index: sandbox/win/src/sync_policy.cc
|
| diff --git a/sandbox/win/src/sync_policy.cc b/sandbox/win/src/sync_policy.cc
|
| deleted file mode 100644
|
| index 7ef094ff73e5c7c0faed13985f92466eda381965..0000000000000000000000000000000000000000
|
| --- a/sandbox/win/src/sync_policy.cc
|
| +++ /dev/null
|
| @@ -1,246 +0,0 @@
|
| -// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include <stdint.h>
|
| -
|
| -#include <string>
|
| -
|
| -#include "sandbox/win/src/sync_policy.h"
|
| -
|
| -#include "base/logging.h"
|
| -#include "base/strings/stringprintf.h"
|
| -#include "sandbox/win/src/ipc_tags.h"
|
| -#include "sandbox/win/src/nt_internals.h"
|
| -#include "sandbox/win/src/policy_engine_opcodes.h"
|
| -#include "sandbox/win/src/policy_params.h"
|
| -#include "sandbox/win/src/sandbox_types.h"
|
| -#include "sandbox/win/src/sandbox_utils.h"
|
| -#include "sandbox/win/src/sync_interception.h"
|
| -#include "sandbox/win/src/win_utils.h"
|
| -
|
| -namespace sandbox {
|
| -
|
| -// Provides functionality to resolve a symbolic link within the object
|
| -// directory passed in.
|
| -NTSTATUS ResolveSymbolicLink(const base::string16& directory_name,
|
| - const base::string16& name,
|
| - base::string16* target) {
|
| - NtOpenDirectoryObjectFunction NtOpenDirectoryObject = NULL;
|
| - ResolveNTFunctionPtr("NtOpenDirectoryObject", &NtOpenDirectoryObject);
|
| -
|
| - NtQuerySymbolicLinkObjectFunction NtQuerySymbolicLinkObject = NULL;
|
| - ResolveNTFunctionPtr("NtQuerySymbolicLinkObject",
|
| - &NtQuerySymbolicLinkObject);
|
| -
|
| - NtOpenSymbolicLinkObjectFunction NtOpenSymbolicLinkObject = NULL;
|
| - ResolveNTFunctionPtr("NtOpenSymbolicLinkObject", &NtOpenSymbolicLinkObject);
|
| -
|
| - NtCloseFunction NtClose = NULL;
|
| - ResolveNTFunctionPtr("NtClose", &NtClose);
|
| -
|
| - OBJECT_ATTRIBUTES symbolic_link_directory_attributes = {};
|
| - UNICODE_STRING symbolic_link_directory_string = {};
|
| - InitObjectAttribs(directory_name, OBJ_CASE_INSENSITIVE, NULL,
|
| - &symbolic_link_directory_attributes,
|
| - &symbolic_link_directory_string, NULL);
|
| -
|
| - HANDLE symbolic_link_directory = NULL;
|
| - NTSTATUS status = NtOpenDirectoryObject(&symbolic_link_directory,
|
| - DIRECTORY_QUERY,
|
| - &symbolic_link_directory_attributes);
|
| - if (!NT_SUCCESS(status))
|
| - return status;
|
| -
|
| - OBJECT_ATTRIBUTES symbolic_link_attributes = {};
|
| - UNICODE_STRING name_string = {};
|
| - InitObjectAttribs(name, OBJ_CASE_INSENSITIVE, symbolic_link_directory,
|
| - &symbolic_link_attributes, &name_string, NULL);
|
| -
|
| - HANDLE symbolic_link = NULL;
|
| - status = NtOpenSymbolicLinkObject(&symbolic_link, GENERIC_READ,
|
| - &symbolic_link_attributes);
|
| - CHECK(NT_SUCCESS(NtClose(symbolic_link_directory)));
|
| - if (!NT_SUCCESS(status))
|
| - return status;
|
| -
|
| - UNICODE_STRING target_path = {};
|
| - unsigned long target_length = 0;
|
| - status = NtQuerySymbolicLinkObject(symbolic_link, &target_path,
|
| - &target_length);
|
| - if (status != STATUS_BUFFER_TOO_SMALL) {
|
| - CHECK(NT_SUCCESS(NtClose(symbolic_link)));
|
| - return status;
|
| - }
|
| -
|
| - target_path.Length = 0;
|
| - target_path.MaximumLength = static_cast<USHORT>(target_length);
|
| - target_path.Buffer = new wchar_t[target_path.MaximumLength + 1];
|
| - status = NtQuerySymbolicLinkObject(symbolic_link, &target_path,
|
| - &target_length);
|
| - if (NT_SUCCESS(status))
|
| - target->assign(target_path.Buffer, target_length);
|
| -
|
| - CHECK(NT_SUCCESS(NtClose(symbolic_link)));
|
| - delete[] target_path.Buffer;
|
| - return status;
|
| -}
|
| -
|
| -NTSTATUS GetBaseNamedObjectsDirectory(HANDLE* directory) {
|
| - static HANDLE base_named_objects_handle = NULL;
|
| - if (base_named_objects_handle) {
|
| - *directory = base_named_objects_handle;
|
| - return STATUS_SUCCESS;
|
| - }
|
| -
|
| - NtOpenDirectoryObjectFunction NtOpenDirectoryObject = NULL;
|
| - ResolveNTFunctionPtr("NtOpenDirectoryObject", &NtOpenDirectoryObject);
|
| -
|
| - DWORD session_id = 0;
|
| - ProcessIdToSessionId(::GetCurrentProcessId(), &session_id);
|
| -
|
| - base::string16 base_named_objects_path;
|
| -
|
| - NTSTATUS status = ResolveSymbolicLink(L"\\Sessions\\BNOLINKS",
|
| - base::StringPrintf(L"%d", session_id),
|
| - &base_named_objects_path);
|
| - if (!NT_SUCCESS(status)) {
|
| - DLOG(ERROR) << "Failed to resolve BaseNamedObjects path. Error: "
|
| - << status;
|
| - return status;
|
| - }
|
| -
|
| - UNICODE_STRING directory_name = {};
|
| - OBJECT_ATTRIBUTES object_attributes = {};
|
| - InitObjectAttribs(base_named_objects_path, OBJ_CASE_INSENSITIVE, NULL,
|
| - &object_attributes, &directory_name, NULL);
|
| - status = NtOpenDirectoryObject(&base_named_objects_handle,
|
| - DIRECTORY_ALL_ACCESS,
|
| - &object_attributes);
|
| - if (NT_SUCCESS(status))
|
| - *directory = base_named_objects_handle;
|
| - return status;
|
| -}
|
| -
|
| -bool SyncPolicy::GenerateRules(const wchar_t* name,
|
| - TargetPolicy::Semantics semantics,
|
| - LowLevelPolicy* policy) {
|
| - base::string16 mod_name(name);
|
| - if (mod_name.empty()) {
|
| - return false;
|
| - }
|
| -
|
| - if (TargetPolicy::EVENTS_ALLOW_ANY != semantics &&
|
| - TargetPolicy::EVENTS_ALLOW_READONLY != semantics) {
|
| - // Other flags are not valid for sync policy yet.
|
| - NOTREACHED();
|
| - return false;
|
| - }
|
| -
|
| - // Add the open rule.
|
| - EvalResult result = ASK_BROKER;
|
| - PolicyRule open(result);
|
| -
|
| - if (!open.AddStringMatch(IF, OpenEventParams::NAME, name, CASE_INSENSITIVE))
|
| - return false;
|
| -
|
| - if (TargetPolicy::EVENTS_ALLOW_READONLY == semantics) {
|
| - // We consider all flags that are not known to be readonly as potentially
|
| - // used for write.
|
| - uint32_t allowed_flags = SYNCHRONIZE | GENERIC_READ | READ_CONTROL;
|
| - uint32_t restricted_flags = ~allowed_flags;
|
| - open.AddNumberMatch(IF_NOT, OpenEventParams::ACCESS, restricted_flags, AND);
|
| - }
|
| -
|
| - if (!policy->AddRule(IPC_OPENEVENT_TAG, &open))
|
| - return false;
|
| -
|
| - // If it's not a read only, add the create rule.
|
| - if (TargetPolicy::EVENTS_ALLOW_READONLY != semantics) {
|
| - PolicyRule create(result);
|
| - if (!create.AddStringMatch(IF, NameBased::NAME, name, CASE_INSENSITIVE))
|
| - return false;
|
| -
|
| - if (!policy->AddRule(IPC_CREATEEVENT_TAG, &create))
|
| - return false;
|
| - }
|
| -
|
| - return true;
|
| -}
|
| -
|
| -NTSTATUS SyncPolicy::CreateEventAction(EvalResult eval_result,
|
| - const ClientInfo& client_info,
|
| - const base::string16& event_name,
|
| - uint32_t event_type,
|
| - uint32_t initial_state,
|
| - HANDLE* handle) {
|
| - NtCreateEventFunction NtCreateEvent = NULL;
|
| - ResolveNTFunctionPtr("NtCreateEvent", &NtCreateEvent);
|
| -
|
| - // The only action supported is ASK_BROKER which means create the requested
|
| - // file as specified.
|
| - if (ASK_BROKER != eval_result)
|
| - return false;
|
| -
|
| - HANDLE object_directory = NULL;
|
| - NTSTATUS status = GetBaseNamedObjectsDirectory(&object_directory);
|
| - if (status != STATUS_SUCCESS)
|
| - return status;
|
| -
|
| - UNICODE_STRING unicode_event_name = {};
|
| - OBJECT_ATTRIBUTES object_attributes = {};
|
| - InitObjectAttribs(event_name, OBJ_CASE_INSENSITIVE, object_directory,
|
| - &object_attributes, &unicode_event_name, NULL);
|
| -
|
| - HANDLE local_handle = NULL;
|
| - status = NtCreateEvent(&local_handle, EVENT_ALL_ACCESS, &object_attributes,
|
| - static_cast<EVENT_TYPE>(event_type),
|
| - static_cast<BOOLEAN>(initial_state));
|
| - if (NULL == local_handle)
|
| - return status;
|
| -
|
| - if (!::DuplicateHandle(::GetCurrentProcess(), local_handle,
|
| - client_info.process, handle, 0, FALSE,
|
| - DUPLICATE_CLOSE_SOURCE | DUPLICATE_SAME_ACCESS)) {
|
| - return STATUS_ACCESS_DENIED;
|
| - }
|
| - return status;
|
| -}
|
| -
|
| -NTSTATUS SyncPolicy::OpenEventAction(EvalResult eval_result,
|
| - const ClientInfo& client_info,
|
| - const base::string16& event_name,
|
| - uint32_t desired_access,
|
| - HANDLE* handle) {
|
| - NtOpenEventFunction NtOpenEvent = NULL;
|
| - ResolveNTFunctionPtr("NtOpenEvent", &NtOpenEvent);
|
| -
|
| - // The only action supported is ASK_BROKER which means create the requested
|
| - // event as specified.
|
| - if (ASK_BROKER != eval_result)
|
| - return false;
|
| -
|
| - HANDLE object_directory = NULL;
|
| - NTSTATUS status = GetBaseNamedObjectsDirectory(&object_directory);
|
| - if (status != STATUS_SUCCESS)
|
| - return status;
|
| -
|
| - UNICODE_STRING unicode_event_name = {};
|
| - OBJECT_ATTRIBUTES object_attributes = {};
|
| - InitObjectAttribs(event_name, OBJ_CASE_INSENSITIVE, object_directory,
|
| - &object_attributes, &unicode_event_name, NULL);
|
| -
|
| - HANDLE local_handle = NULL;
|
| - status = NtOpenEvent(&local_handle, desired_access, &object_attributes);
|
| - if (NULL == local_handle)
|
| - return status;
|
| -
|
| - if (!::DuplicateHandle(::GetCurrentProcess(), local_handle,
|
| - client_info.process, handle, 0, FALSE,
|
| - DUPLICATE_CLOSE_SOURCE | DUPLICATE_SAME_ACCESS)) {
|
| - return STATUS_ACCESS_DENIED;
|
| - }
|
| - return status;
|
| -}
|
| -
|
| -} // namespace sandbox
|
|
|