| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "sandbox/win/src/target_process.h" | 5 #include "sandbox/win/src/target_process.h" |
| 6 | 6 |
| 7 #include <stddef.h> | 7 #include <stddef.h> |
| 8 #include <stdint.h> | 8 #include <stdint.h> |
| 9 | 9 |
| 10 #include <memory> | 10 #include <memory> |
| 11 #include <utility> | 11 #include <utility> |
| 12 | 12 |
| 13 #include "base/macros.h" | 13 #include "base/macros.h" |
| 14 #include "base/memory/free_deleter.h" | 14 #include "base/memory/free_deleter.h" |
| 15 #include "base/win/pe_image.h" | |
| 16 #include "base/win/startup_information.h" | 15 #include "base/win/startup_information.h" |
| 17 #include "base/win/windows_version.h" | 16 #include "base/win/windows_version.h" |
| 18 #include "sandbox/win/src/crosscall_client.h" | 17 #include "sandbox/win/src/crosscall_client.h" |
| 19 #include "sandbox/win/src/crosscall_server.h" | 18 #include "sandbox/win/src/crosscall_server.h" |
| 20 #include "sandbox/win/src/policy_low_level.h" | 19 #include "sandbox/win/src/policy_low_level.h" |
| 21 #include "sandbox/win/src/sandbox_types.h" | 20 #include "sandbox/win/src/sandbox_types.h" |
| 22 #include "sandbox/win/src/sharedmem_ipc_server.h" | 21 #include "sandbox/win/src/sharedmem_ipc_server.h" |
| 23 #include "sandbox/win/src/win_utils.h" | 22 #include "sandbox/win/src/win_utils.h" |
| 24 | 23 |
| 25 namespace { | 24 namespace { |
| (...skipping 17 matching lines...) Expand all Loading... |
| 43 } | 42 } |
| 44 | 43 |
| 45 } // namespace | 44 } // namespace |
| 46 | 45 |
| 47 namespace sandbox { | 46 namespace sandbox { |
| 48 | 47 |
| 49 SANDBOX_INTERCEPT HANDLE g_shared_section; | 48 SANDBOX_INTERCEPT HANDLE g_shared_section; |
| 50 SANDBOX_INTERCEPT size_t g_shared_IPC_size; | 49 SANDBOX_INTERCEPT size_t g_shared_IPC_size; |
| 51 SANDBOX_INTERCEPT size_t g_shared_policy_size; | 50 SANDBOX_INTERCEPT size_t g_shared_policy_size; |
| 52 | 51 |
| 53 // Returns the address of the main exe module in memory taking in account | |
| 54 // address space layout randomization. | |
| 55 void* GetBaseAddress(const wchar_t* exe_name, void* entry_point) { | |
| 56 HMODULE exe = ::LoadLibrary(exe_name); | |
| 57 if (NULL == exe) | |
| 58 return exe; | |
| 59 | |
| 60 base::win::PEImage pe(exe); | |
| 61 if (!pe.VerifyMagic()) { | |
| 62 ::FreeLibrary(exe); | |
| 63 return exe; | |
| 64 } | |
| 65 PIMAGE_NT_HEADERS nt_header = pe.GetNTHeaders(); | |
| 66 char* base = reinterpret_cast<char*>(entry_point) - | |
| 67 nt_header->OptionalHeader.AddressOfEntryPoint; | |
| 68 | |
| 69 ::FreeLibrary(exe); | |
| 70 return base; | |
| 71 } | |
| 72 | |
| 73 TargetProcess::TargetProcess(base::win::ScopedHandle initial_token, | 52 TargetProcess::TargetProcess(base::win::ScopedHandle initial_token, |
| 74 base::win::ScopedHandle lockdown_token, | 53 base::win::ScopedHandle lockdown_token, |
| 75 HANDLE job, | 54 HANDLE job, |
| 76 ThreadProvider* thread_pool) | 55 ThreadProvider* thread_pool) |
| 77 // This object owns everything initialized here except thread_pool and | 56 // This object owns everything initialized here except thread_pool and |
| 78 // the job_ handle. The Job handle is closed by BrokerServices and results | 57 // the job_ handle. The Job handle is closed by BrokerServices and results |
| 79 // eventually in a call to our dtor. | 58 // eventually in a call to our dtor. |
| 80 : lockdown_token_(std::move(lockdown_token)), | 59 : lockdown_token_(std::move(lockdown_token)), |
| 81 initial_token_(std::move(initial_token)), | 60 initial_token_(std::move(initial_token)), |
| 82 job_(job), | 61 job_(job), |
| (...skipping 90 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 173 if (!::SetThreadToken(&temp_thread, initial_token_.Get())) { | 152 if (!::SetThreadToken(&temp_thread, initial_token_.Get())) { |
| 174 *win_error = ::GetLastError(); | 153 *win_error = ::GetLastError(); |
| 175 // It might be a security breach if we let the target run outside the job | 154 // It might be a security breach if we let the target run outside the job |
| 176 // so kill it before it causes damage. | 155 // so kill it before it causes damage. |
| 177 ::TerminateProcess(process_info.process_handle(), 0); | 156 ::TerminateProcess(process_info.process_handle(), 0); |
| 178 return SBOX_ERROR_SET_THREAD_TOKEN; | 157 return SBOX_ERROR_SET_THREAD_TOKEN; |
| 179 } | 158 } |
| 180 initial_token_.Close(); | 159 initial_token_.Close(); |
| 181 } | 160 } |
| 182 | 161 |
| 183 CONTEXT context; | |
| 184 context.ContextFlags = CONTEXT_ALL; | |
| 185 if (!::GetThreadContext(process_info.thread_handle(), &context)) { | |
| 186 *win_error = ::GetLastError(); | |
| 187 ::TerminateProcess(process_info.process_handle(), 0); | |
| 188 return SBOX_ERROR_GET_THREAD_CONTEXT; | |
| 189 } | |
| 190 | |
| 191 #if defined(_WIN64) | |
| 192 void* entry_point = reinterpret_cast<void*>(context.Rcx); | |
| 193 #else | |
| 194 #pragma warning(push) | |
| 195 #pragma warning(disable: 4312) | |
| 196 // This cast generates a warning because it is 32 bit specific. | |
| 197 void* entry_point = reinterpret_cast<void*>(context.Eax); | |
| 198 #pragma warning(pop) | |
| 199 #endif // _WIN64 | |
| 200 | |
| 201 if (!target_info->DuplicateFrom(process_info)) { | 162 if (!target_info->DuplicateFrom(process_info)) { |
| 202 *win_error = ::GetLastError(); // This may or may not be correct. | 163 *win_error = ::GetLastError(); // This may or may not be correct. |
| 203 ::TerminateProcess(process_info.process_handle(), 0); | 164 ::TerminateProcess(process_info.process_handle(), 0); |
| 204 return SBOX_ERROR_DUPLICATE_TARGET_INFO; | 165 return SBOX_ERROR_DUPLICATE_TARGET_INFO; |
| 205 } | 166 } |
| 206 | 167 |
| 207 base_address_ = GetBaseAddress(exe_path, entry_point); | 168 base_address_ = GetProcessBaseAddress(process_info.process_handle()); |
| 169 DCHECK(base_address_); |
| 170 if (!base_address_) { |
| 171 *win_error = ::GetLastError(); |
| 172 ::TerminateProcess(process_info.process_handle(), 0); |
| 173 return SBOX_ERROR_CANNOT_FIND_BASE_ADDRESS; |
| 174 } |
| 175 |
| 208 sandbox_process_info_.Set(process_info.Take()); | 176 sandbox_process_info_.Set(process_info.Take()); |
| 209 return SBOX_ALL_OK; | 177 return SBOX_ALL_OK; |
| 210 } | 178 } |
| 211 | 179 |
| 212 ResultCode TargetProcess::TransferVariable(const char* name, void* address, | 180 ResultCode TargetProcess::TransferVariable(const char* name, void* address, |
| 213 size_t size) { | 181 size_t size) { |
| 214 if (!sandbox_process_info_.IsValid()) | 182 if (!sandbox_process_info_.IsValid()) |
| 215 return SBOX_ERROR_UNEXPECTED_CALL; | 183 return SBOX_ERROR_UNEXPECTED_CALL; |
| 216 | 184 |
| 217 void* child_var = address; | 185 void* child_var = address; |
| (...skipping 142 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 360 TargetProcess* target = new TargetProcess( | 328 TargetProcess* target = new TargetProcess( |
| 361 base::win::ScopedHandle(), base::win::ScopedHandle(), NULL, NULL); | 329 base::win::ScopedHandle(), base::win::ScopedHandle(), NULL, NULL); |
| 362 PROCESS_INFORMATION process_info = {}; | 330 PROCESS_INFORMATION process_info = {}; |
| 363 process_info.hProcess = process; | 331 process_info.hProcess = process; |
| 364 target->sandbox_process_info_.Set(process_info); | 332 target->sandbox_process_info_.Set(process_info); |
| 365 target->base_address_ = base_address; | 333 target->base_address_ = base_address; |
| 366 return target; | 334 return target; |
| 367 } | 335 } |
| 368 | 336 |
| 369 } // namespace sandbox | 337 } // namespace sandbox |
| OLD | NEW |