Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(86)

Side by Side Diff: remoting/host/win/launch_process_with_token.cc

Issue 2037163002: Removing WinXP and Vista specific code from Chromoting. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@sas_be_gone
Patch Set: Addressing feedback Created 4 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « remoting/host/win/com_security.cc ('k') | remoting/host/win/session_input_injector.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "remoting/host/win/launch_process_with_token.h" 5 #include "remoting/host/win/launch_process_with_token.h"
6 6
7 #include <windows.h> 7 #include <windows.h>
8 #include <stddef.h>
9 #include <winternl.h>
10 8
11 #include <limits>
12 #include <memory>
13 #include <utility> 9 #include <utility>
14 10
15 #include "base/logging.h" 11 #include "base/logging.h"
16 #include "base/rand_util.h"
17 #include "base/scoped_native_library.h"
18 #include "base/strings/string16.h"
19 #include "base/strings/stringprintf.h"
20 #include "base/strings/utf_string_conversions.h"
21 #include "base/win/scoped_handle.h" 12 #include "base/win/scoped_handle.h"
22 #include "base/win/scoped_process_information.h" 13 #include "base/win/scoped_process_information.h"
23 #include "base/win/windows_version.h"
24 14
25 using base::win::ScopedHandle; 15 using base::win::ScopedHandle;
26 16
27 namespace { 17 namespace {
28 18
29 const char kCreateProcessDefaultPipeNameFormat[] =
30 "\\\\.\\Pipe\\TerminalServer\\SystemExecSrvr\\%d";
31
32 // Undocumented WINSTATIONINFOCLASS value causing
33 // winsta!WinStationQueryInformationW() to return the name of the pipe for
34 // requesting cross-session process creation.
35 const WINSTATIONINFOCLASS kCreateProcessPipeNameClass =
36 static_cast<WINSTATIONINFOCLASS>(0x21);
37
38 const int kPipeBusyWaitTimeoutMs = 2000;
39 const int kPipeConnectMaxAttempts = 3;
40
41 // Terminates the process and closes process and thread handles in
42 // |process_information| structure.
43 void CloseHandlesAndTerminateProcess(PROCESS_INFORMATION* process_information) {
44 if (process_information->hThread) {
45 CloseHandle(process_information->hThread);
46 process_information->hThread = nullptr;
47 }
48
49 if (process_information->hProcess) {
50 TerminateProcess(process_information->hProcess, CONTROL_C_EXIT);
51 CloseHandle(process_information->hProcess);
52 process_information->hProcess = nullptr;
53 }
54 }
55
56 // Connects to the executor server corresponding to |session_id|.
57 bool ConnectToExecutionServer(uint32_t session_id,
58 base::win::ScopedHandle* pipe_out) {
59 base::string16 pipe_name;
60
61 // Use winsta!WinStationQueryInformationW() to determine the process creation
62 // pipe name for the session.
63 base::FilePath winsta_path(
64 base::GetNativeLibraryName(base::UTF8ToUTF16("winsta")));
65 base::ScopedNativeLibrary winsta(winsta_path);
66 if (winsta.is_valid()) {
67 PWINSTATIONQUERYINFORMATIONW win_station_query_information =
68 reinterpret_cast<PWINSTATIONQUERYINFORMATIONW>(
69 winsta.GetFunctionPointer("WinStationQueryInformationW"));
70 if (win_station_query_information) {
71 wchar_t name[MAX_PATH];
72 ULONG name_length;
73 if (win_station_query_information(0,
74 session_id,
75 kCreateProcessPipeNameClass,
76 name,
77 sizeof(name),
78 &name_length)) {
79 pipe_name.assign(name);
80 }
81 }
82 }
83
84 // Use the default pipe name if we couldn't query its name.
85 if (pipe_name.empty()) {
86 pipe_name = base::UTF8ToUTF16(
87 base::StringPrintf(kCreateProcessDefaultPipeNameFormat, session_id));
88 }
89
90 // Try to connect to the named pipe.
91 base::win::ScopedHandle pipe;
92 for (int i = 0; i < kPipeConnectMaxAttempts; ++i) {
93 pipe.Set(CreateFile(pipe_name.c_str(),
94 GENERIC_READ | GENERIC_WRITE,
95 0,
96 nullptr,
97 OPEN_EXISTING,
98 0,
99 nullptr));
100 if (pipe.IsValid()) {
101 break;
102 }
103
104 // Cannot continue retrying if error is something other than
105 // ERROR_PIPE_BUSY.
106 if (GetLastError() != ERROR_PIPE_BUSY) {
107 break;
108 }
109
110 // Cannot continue retrying if wait on pipe fails.
111 if (!WaitNamedPipe(pipe_name.c_str(), kPipeBusyWaitTimeoutMs)) {
112 break;
113 }
114 }
115
116 if (!pipe.IsValid()) {
117 PLOG(ERROR) << "Failed to connect to '" << pipe_name << "'";
118 return false;
119 }
120
121 *pipe_out = std::move(pipe);
122 return true;
123 }
124
125 // Copies the process token making it a primary impersonation token. 19 // Copies the process token making it a primary impersonation token.
126 // The returned handle will have |desired_access| rights. 20 // The returned handle will have |desired_access| rights.
127 bool CopyProcessToken(DWORD desired_access, ScopedHandle* token_out) { 21 bool CopyProcessToken(DWORD desired_access, ScopedHandle* token_out) {
128 HANDLE temp_handle; 22 HANDLE temp_handle;
129 if (!OpenProcessToken(GetCurrentProcess(), 23 if (!OpenProcessToken(GetCurrentProcess(),
130 TOKEN_DUPLICATE | desired_access, 24 TOKEN_DUPLICATE | desired_access,
131 &temp_handle)) { 25 &temp_handle)) {
132 PLOG(ERROR) << "Failed to open process token"; 26 PLOG(ERROR) << "Failed to open process token";
133 return false; 27 return false;
134 } 28 }
(...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after
170 if (!AdjustTokenPrivileges(privileged_token.Get(), FALSE, &state, 0, nullptr, 64 if (!AdjustTokenPrivileges(privileged_token.Get(), FALSE, &state, 0, nullptr,
171 0)) { 65 0)) {
172 PLOG(ERROR) << "Failed to enable SE_TCB_NAME privilege in a token"; 66 PLOG(ERROR) << "Failed to enable SE_TCB_NAME privilege in a token";
173 return false; 67 return false;
174 } 68 }
175 69
176 *token_out = std::move(privileged_token); 70 *token_out = std::move(privileged_token);
177 return true; 71 return true;
178 } 72 }
179 73
180 // Fills the process and thread handles in the passed |process_information|
181 // structure and resume the process if the caller didn't want to suspend it.
182 bool ProcessCreateProcessResponse(DWORD creation_flags,
183 PROCESS_INFORMATION* process_information) {
184 // The execution server does not return handles to the created process and
185 // thread.
186 if (!process_information->hProcess) {
187 // N.B. PROCESS_ALL_ACCESS is different in XP and Vista+ versions of
188 // the SDK. |desired_access| below is effectively PROCESS_ALL_ACCESS from
189 // the XP version of the SDK.
190 DWORD desired_access =
191 STANDARD_RIGHTS_REQUIRED |
192 SYNCHRONIZE |
193 PROCESS_TERMINATE |
194 PROCESS_CREATE_THREAD |
195 PROCESS_SET_SESSIONID |
196 PROCESS_VM_OPERATION |
197 PROCESS_VM_READ |
198 PROCESS_VM_WRITE |
199 PROCESS_DUP_HANDLE |
200 PROCESS_CREATE_PROCESS |
201 PROCESS_SET_QUOTA |
202 PROCESS_SET_INFORMATION |
203 PROCESS_QUERY_INFORMATION |
204 PROCESS_SUSPEND_RESUME;
205 process_information->hProcess =
206 OpenProcess(desired_access,
207 FALSE,
208 process_information->dwProcessId);
209 if (!process_information->hProcess) {
210 PLOG(ERROR) << "Failed to open the process "
211 << process_information->dwProcessId;
212 return false;
213 }
214 }
215
216 if (!process_information->hThread) {
217 // N.B. THREAD_ALL_ACCESS is different in XP and Vista+ versions of
218 // the SDK. |desired_access| below is effectively THREAD_ALL_ACCESS from
219 // the XP version of the SDK.
220 DWORD desired_access =
221 STANDARD_RIGHTS_REQUIRED |
222 SYNCHRONIZE |
223 THREAD_TERMINATE |
224 THREAD_SUSPEND_RESUME |
225 THREAD_GET_CONTEXT |
226 THREAD_SET_CONTEXT |
227 THREAD_QUERY_INFORMATION |
228 THREAD_SET_INFORMATION |
229 THREAD_SET_THREAD_TOKEN |
230 THREAD_IMPERSONATE |
231 THREAD_DIRECT_IMPERSONATION;
232 process_information->hThread =
233 OpenThread(desired_access,
234 FALSE,
235 process_information->dwThreadId);
236 if (!process_information->hThread) {
237 PLOG(ERROR) << "Failed to open the thread "
238 << process_information->dwThreadId;
239 return false;
240 }
241 }
242
243 // Resume the thread if the caller didn't want to suspend the process.
244 if ((creation_flags & CREATE_SUSPENDED) == 0) {
245 if (!ResumeThread(process_information->hThread)) {
246 PLOG(ERROR) << "Failed to resume the thread "
247 << process_information->dwThreadId;
248 return false;
249 }
250 }
251
252 return true;
253 }
254
255 // Receives the response to a remote process create request.
256 bool ReceiveCreateProcessResponse(
257 HANDLE pipe,
258 PROCESS_INFORMATION* process_information_out) {
259 struct CreateProcessResponse {
260 DWORD size;
261 BOOL success;
262 DWORD last_error;
263 PROCESS_INFORMATION process_information;
264 };
265
266 DWORD bytes;
267 CreateProcessResponse response;
268 if (!ReadFile(pipe, &response, sizeof(response), &bytes, nullptr)) {
269 PLOG(ERROR) << "Failed to receive CreateProcessAsUser response";
270 return false;
271 }
272
273 // The server sends the data in one chunk so if we didn't received a complete
274 // answer something bad happend and there is no point in retrying.
275 if (bytes != sizeof(response)) {
276 SetLastError(ERROR_RECEIVE_PARTIAL);
277 return false;
278 }
279
280 if (!response.success) {
281 SetLastError(response.last_error);
282 return false;
283 }
284
285 *process_information_out = response.process_information;
286 return true;
287 }
288
289 // Sends a remote process create request to the execution server.
290 bool SendCreateProcessRequest(
291 HANDLE pipe,
292 const base::FilePath::StringType& application_name,
293 const base::CommandLine::StringType& command_line,
294 DWORD creation_flags,
295 const base::char16* desktop_name) {
296 // |CreateProcessRequest| structure passes the same parameters to
297 // the execution server as CreateProcessAsUser() function does. Strings are
298 // stored as wide strings immediately after the structure. String pointers are
299 // represented as byte offsets to string data from the beginning of
300 // the structure.
301 struct CreateProcessRequest {
302 DWORD size;
303 DWORD process_id;
304 BOOL use_default_token;
305 HANDLE token;
306 LPWSTR application_name;
307 LPWSTR command_line;
308 SECURITY_ATTRIBUTES process_attributes;
309 SECURITY_ATTRIBUTES thread_attributes;
310 BOOL inherit_handles;
311 DWORD creation_flags;
312 LPVOID environment;
313 LPWSTR current_directory;
314 STARTUPINFOW startup_info;
315 PROCESS_INFORMATION process_information;
316 };
317
318 base::string16 desktop;
319 if (desktop_name)
320 desktop = desktop_name;
321
322 // Allocate a large enough buffer to hold the CreateProcessRequest structure
323 // and three nullptr-terminated string parameters.
324 size_t size = sizeof(CreateProcessRequest) + sizeof(wchar_t) *
325 (application_name.size() + command_line.size() + desktop.size() + 3);
326 std::unique_ptr<char[]> buffer(new char[size]);
327 memset(buffer.get(), 0, size);
328
329 // Marshal the input parameters.
330 CreateProcessRequest* request =
331 reinterpret_cast<CreateProcessRequest*>(buffer.get());
332 request->size = size;
333 request->process_id = GetCurrentProcessId();
334 request->use_default_token = TRUE;
335 // Always pass CREATE_SUSPENDED to avoid a race between the created process
336 // exiting too soon and OpenProcess() call below.
337 request->creation_flags = creation_flags | CREATE_SUSPENDED;
338 request->startup_info.cb = sizeof(request->startup_info);
339
340 size_t buffer_offset = sizeof(CreateProcessRequest);
341
342 request->application_name = reinterpret_cast<LPWSTR>(buffer_offset);
343 std::copy(application_name.begin(),
344 application_name.end(),
345 reinterpret_cast<wchar_t*>(buffer.get() + buffer_offset));
346 buffer_offset += (application_name.size() + 1) * sizeof(wchar_t);
347
348 request->command_line = reinterpret_cast<LPWSTR>(buffer_offset);
349 std::copy(command_line.begin(),
350 command_line.end(),
351 reinterpret_cast<wchar_t*>(buffer.get() + buffer_offset));
352 buffer_offset += (command_line.size() + 1) * sizeof(wchar_t);
353
354 request->startup_info.lpDesktop =
355 reinterpret_cast<LPWSTR>(buffer_offset);
356 std::copy(desktop.begin(),
357 desktop.end(),
358 reinterpret_cast<wchar_t*>(buffer.get() + buffer_offset));
359
360 // Pass the request to create a process in the target session.
361 DWORD bytes;
362 if (!WriteFile(pipe, buffer.get(), size, &bytes, nullptr)) {
363 PLOG(ERROR) << "Failed to send CreateProcessAsUser request";
364 return false;
365 }
366
367 return true;
368 }
369
370 // Requests the execution server to create a process in the specified session
371 // using the default (i.e. Winlogon) token. This routine relies on undocumented
372 // OS functionality and will likely not work on anything but XP or W2K3.
373 bool CreateRemoteSessionProcess(
374 uint32_t session_id,
375 const base::FilePath::StringType& application_name,
376 const base::CommandLine::StringType& command_line,
377 DWORD creation_flags,
378 const base::char16* desktop_name,
379 PROCESS_INFORMATION* process_information_out) {
380 DCHECK_LT(base::win::GetVersion(), base::win::VERSION_VISTA);
381
382 base::win::ScopedHandle pipe;
383 if (!ConnectToExecutionServer(session_id, &pipe))
384 return false;
385
386 if (!SendCreateProcessRequest(pipe.Get(), application_name, command_line,
387 creation_flags, desktop_name)) {
388 return false;
389 }
390
391 PROCESS_INFORMATION process_information;
392 if (!ReceiveCreateProcessResponse(pipe.Get(), &process_information))
393 return false;
394
395 if (!ProcessCreateProcessResponse(creation_flags, &process_information)) {
396 CloseHandlesAndTerminateProcess(&process_information);
397 return false;
398 }
399
400 *process_information_out = process_information;
401 return true;
402 }
403
404 } // namespace 74 } // namespace
405 75
406 namespace remoting { 76 namespace remoting {
407 77
408 base::LazyInstance<base::Lock>::Leaky g_inherit_handles_lock = 78 base::LazyInstance<base::Lock>::Leaky g_inherit_handles_lock =
409 LAZY_INSTANCE_INITIALIZER; 79 LAZY_INSTANCE_INITIALIZER;
410 80
411 // Creates a copy of the current process token for the given |session_id| so 81 // Creates a copy of the current process token for the given |session_id| so
412 // it can be used to launch a process in that session. 82 // it can be used to launch a process in that session.
413 bool CreateSessionToken(uint32_t session_id, ScopedHandle* token_out) { 83 bool CreateSessionToken(uint32_t session_id, ScopedHandle* token_out) {
(...skipping 59 matching lines...) Expand 10 before | Expand all | Expand 10 after
473 const_cast<LPWSTR>(command_line.c_str()), 143 const_cast<LPWSTR>(command_line.c_str()),
474 process_attributes, 144 process_attributes,
475 thread_attributes, 145 thread_attributes,
476 inherit_handles, 146 inherit_handles,
477 creation_flags, 147 creation_flags,
478 nullptr, 148 nullptr,
479 nullptr, 149 nullptr,
480 &startup_info, 150 &startup_info,
481 &temp_process_info); 151 &temp_process_info);
482 152
483 // CreateProcessAsUser will fail on XP and W2K3 with ERROR_PIPE_NOT_CONNECTED
484 // if the user hasn't logged to the target session yet. In such a case
485 // we try to talk to the execution server directly emulating what
486 // the undocumented and not-exported advapi32!CreateRemoteSessionProcessW()
487 // function does. The created process will run under Winlogon'a token instead
488 // of |user_token|. Since Winlogon runs as SYSTEM, this suits our needs.
489 if (!result &&
490 GetLastError() == ERROR_PIPE_NOT_CONNECTED &&
491 base::win::GetVersion() < base::win::VERSION_VISTA) {
492 DWORD session_id;
493 DWORD return_length;
494 result = GetTokenInformation(user_token,
495 TokenSessionId,
496 &session_id,
497 sizeof(session_id),
498 &return_length);
499 if (result && session_id != 0) {
500 result = CreateRemoteSessionProcess(session_id,
501 application_name,
502 command_line,
503 creation_flags,
504 desktop_name,
505 &temp_process_info);
506 } else {
507 // Restore the error status returned by CreateProcessAsUser().
508 result = FALSE;
509 SetLastError(ERROR_PIPE_NOT_CONNECTED);
510 }
511 }
512
513 if (!result) { 153 if (!result) {
514 PLOG(ERROR) << "Failed to launch a process with a user token"; 154 PLOG(ERROR) << "Failed to launch a process with a user token";
515 return false; 155 return false;
516 } 156 }
517 157
518 base::win::ScopedProcessInformation process_info(temp_process_info); 158 base::win::ScopedProcessInformation process_info(temp_process_info);
519 159
520 CHECK(process_info.IsValid()); 160 CHECK(process_info.IsValid());
521 process_out->Set(process_info.TakeProcessHandle()); 161 process_out->Set(process_info.TakeProcessHandle());
522 thread_out->Set(process_info.TakeThreadHandle()); 162 thread_out->Set(process_info.TakeThreadHandle());
523 return true; 163 return true;
524 } 164 }
525 165
526 } // namespace remoting 166 } // namespace remoting
OLDNEW
« no previous file with comments | « remoting/host/win/com_security.cc ('k') | remoting/host/win/session_input_injector.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698