OLD | NEW |
| (Empty) |
1 // Copyright (c) 2006-2010 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "sandbox/src/filesystem_dispatcher.h" | |
6 | |
7 #include "sandbox/src/crosscall_client.h" | |
8 #include "sandbox/src/filesystem_interception.h" | |
9 #include "sandbox/src/filesystem_policy.h" | |
10 #include "sandbox/src/interception.h" | |
11 #include "sandbox/src/interceptors.h" | |
12 #include "sandbox/src/ipc_tags.h" | |
13 #include "sandbox/src/policy_broker.h" | |
14 #include "sandbox/src/policy_params.h" | |
15 #include "sandbox/src/sandbox.h" | |
16 #include "sandbox/src/sandbox_nt_util.h" | |
17 | |
18 namespace sandbox { | |
19 | |
20 FilesystemDispatcher::FilesystemDispatcher(PolicyBase* policy_base) | |
21 : policy_base_(policy_base) { | |
22 static const IPCCall create_params = { | |
23 {IPC_NTCREATEFILE_TAG, WCHAR_TYPE, ULONG_TYPE, ULONG_TYPE, ULONG_TYPE, | |
24 ULONG_TYPE, ULONG_TYPE, ULONG_TYPE}, | |
25 reinterpret_cast<CallbackGeneric>(&FilesystemDispatcher::NtCreateFile) | |
26 }; | |
27 | |
28 static const IPCCall open_file = { | |
29 {IPC_NTOPENFILE_TAG, WCHAR_TYPE, ULONG_TYPE, ULONG_TYPE, ULONG_TYPE, | |
30 ULONG_TYPE}, | |
31 reinterpret_cast<CallbackGeneric>(&FilesystemDispatcher::NtOpenFile) | |
32 }; | |
33 | |
34 static const IPCCall attribs = { | |
35 {IPC_NTQUERYATTRIBUTESFILE_TAG, WCHAR_TYPE, ULONG_TYPE, INOUTPTR_TYPE}, | |
36 reinterpret_cast<CallbackGeneric>( | |
37 &FilesystemDispatcher::NtQueryAttributesFile) | |
38 }; | |
39 | |
40 static const IPCCall full_attribs = { | |
41 {IPC_NTQUERYFULLATTRIBUTESFILE_TAG, WCHAR_TYPE, ULONG_TYPE, INOUTPTR_TYPE}, | |
42 reinterpret_cast<CallbackGeneric>( | |
43 &FilesystemDispatcher::NtQueryFullAttributesFile) | |
44 }; | |
45 | |
46 static const IPCCall set_info = { | |
47 {IPC_NTSETINFO_RENAME_TAG, VOIDPTR_TYPE, INOUTPTR_TYPE, INOUTPTR_TYPE, | |
48 ULONG_TYPE, ULONG_TYPE}, | |
49 reinterpret_cast<CallbackGeneric>( | |
50 &FilesystemDispatcher::NtSetInformationFile) | |
51 }; | |
52 | |
53 ipc_calls_.push_back(create_params); | |
54 ipc_calls_.push_back(open_file); | |
55 ipc_calls_.push_back(attribs); | |
56 ipc_calls_.push_back(full_attribs); | |
57 ipc_calls_.push_back(set_info); | |
58 } | |
59 | |
60 bool FilesystemDispatcher::SetupService(InterceptionManager* manager, | |
61 int service) { | |
62 switch (service) { | |
63 case IPC_NTCREATEFILE_TAG: | |
64 return INTERCEPT_NT(manager, NtCreateFile, CREATE_FILE_ID, 48); | |
65 | |
66 case IPC_NTOPENFILE_TAG: | |
67 return INTERCEPT_NT(manager, NtOpenFile, OPEN_FILE_ID, 28); | |
68 | |
69 case IPC_NTQUERYATTRIBUTESFILE_TAG: | |
70 return INTERCEPT_NT(manager, NtQueryAttributesFile, QUERY_ATTRIB_FILE_ID, | |
71 12); | |
72 | |
73 case IPC_NTQUERYFULLATTRIBUTESFILE_TAG: | |
74 return INTERCEPT_NT(manager, NtQueryFullAttributesFile, | |
75 QUERY_FULL_ATTRIB_FILE_ID, 12); | |
76 | |
77 case IPC_NTSETINFO_RENAME_TAG: | |
78 return INTERCEPT_NT(manager, NtSetInformationFile, SET_INFO_FILE_ID, 24); | |
79 | |
80 default: | |
81 return false; | |
82 } | |
83 } | |
84 | |
85 bool FilesystemDispatcher::NtCreateFile( | |
86 IPCInfo* ipc, std::wstring* name, DWORD attributes, DWORD desired_access, | |
87 DWORD file_attributes, DWORD share_access, DWORD create_disposition, | |
88 DWORD create_options) { | |
89 if (!PreProcessName(*name, name)) { | |
90 // The path requested might contain a reparse point. | |
91 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
92 return true; | |
93 } | |
94 | |
95 const wchar_t* filename = name->c_str(); | |
96 | |
97 ULONG broker = TRUE; | |
98 CountedParameterSet<OpenFile> params; | |
99 params[OpenFile::NAME] = ParamPickerMake(filename); | |
100 params[OpenFile::ACCESS] = ParamPickerMake(desired_access); | |
101 params[OpenFile::OPTIONS] = ParamPickerMake(create_options); | |
102 params[OpenFile::BROKER] = ParamPickerMake(broker); | |
103 | |
104 // To evaluate the policy we need to call back to the policy object. We | |
105 // are just middlemen in the operation since is the FileSystemPolicy which | |
106 // knows what to do. | |
107 EvalResult result = policy_base_->EvalPolicy(IPC_NTCREATEFILE_TAG, | |
108 params.GetBase()); | |
109 HANDLE handle; | |
110 ULONG_PTR io_information = 0; | |
111 NTSTATUS nt_status; | |
112 if (!FileSystemPolicy::CreateFileAction(result, *ipc->client_info, *name, | |
113 attributes, desired_access, | |
114 file_attributes, share_access, | |
115 create_disposition, create_options, | |
116 &handle, &nt_status, | |
117 &io_information)) { | |
118 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
119 return true; | |
120 } | |
121 // Return operation status on the IPC. | |
122 ipc->return_info.extended[0].ulong_ptr = io_information; | |
123 ipc->return_info.nt_status = nt_status; | |
124 ipc->return_info.handle = handle; | |
125 return true; | |
126 } | |
127 | |
128 bool FilesystemDispatcher::NtOpenFile( | |
129 IPCInfo* ipc, std::wstring* name, DWORD attributes, DWORD desired_access, | |
130 DWORD share_access, DWORD open_options) { | |
131 if (!PreProcessName(*name, name)) { | |
132 // The path requested might contain a reparse point. | |
133 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
134 return true; | |
135 } | |
136 | |
137 const wchar_t* filename = name->c_str(); | |
138 | |
139 ULONG broker = TRUE; | |
140 CountedParameterSet<OpenFile> params; | |
141 params[OpenFile::NAME] = ParamPickerMake(filename); | |
142 params[OpenFile::ACCESS] = ParamPickerMake(desired_access); | |
143 params[OpenFile::OPTIONS] = ParamPickerMake(open_options); | |
144 params[OpenFile::BROKER] = ParamPickerMake(broker); | |
145 | |
146 // To evaluate the policy we need to call back to the policy object. We | |
147 // are just middlemen in the operation since is the FileSystemPolicy which | |
148 // knows what to do. | |
149 EvalResult result = policy_base_->EvalPolicy(IPC_NTOPENFILE_TAG, | |
150 params.GetBase()); | |
151 HANDLE handle; | |
152 ULONG_PTR io_information = 0; | |
153 NTSTATUS nt_status; | |
154 if (!FileSystemPolicy::OpenFileAction(result, *ipc->client_info, *name, | |
155 attributes, desired_access, | |
156 share_access, open_options, &handle, | |
157 &nt_status, &io_information)) { | |
158 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
159 return true; | |
160 } | |
161 // Return operation status on the IPC. | |
162 ipc->return_info.extended[0].ulong_ptr = io_information; | |
163 ipc->return_info.nt_status = nt_status; | |
164 ipc->return_info.handle = handle; | |
165 return true; | |
166 } | |
167 | |
168 bool FilesystemDispatcher::NtQueryAttributesFile( | |
169 IPCInfo* ipc, std::wstring* name, DWORD attributes, CountedBuffer* info) { | |
170 if (sizeof(FILE_BASIC_INFORMATION) != info->Size()) | |
171 return false; | |
172 | |
173 if (!PreProcessName(*name, name)) { | |
174 // The path requested might contain a reparse point. | |
175 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
176 return true; | |
177 } | |
178 | |
179 ULONG broker = TRUE; | |
180 const wchar_t* filename = name->c_str(); | |
181 CountedParameterSet<FileName> params; | |
182 params[FileName::NAME] = ParamPickerMake(filename); | |
183 params[FileName::BROKER] = ParamPickerMake(broker); | |
184 | |
185 // To evaluate the policy we need to call back to the policy object. We | |
186 // are just middlemen in the operation since is the FileSystemPolicy which | |
187 // knows what to do. | |
188 EvalResult result = policy_base_->EvalPolicy(IPC_NTQUERYATTRIBUTESFILE_TAG, | |
189 params.GetBase()); | |
190 | |
191 FILE_BASIC_INFORMATION* information = | |
192 reinterpret_cast<FILE_BASIC_INFORMATION*>(info->Buffer()); | |
193 NTSTATUS nt_status; | |
194 if (!FileSystemPolicy::QueryAttributesFileAction(result, *ipc->client_info, | |
195 *name, attributes, | |
196 information, &nt_status)) { | |
197 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
198 return true; | |
199 } | |
200 | |
201 // Return operation status on the IPC. | |
202 ipc->return_info.nt_status = nt_status; | |
203 return true; | |
204 } | |
205 | |
206 bool FilesystemDispatcher::NtQueryFullAttributesFile( | |
207 IPCInfo* ipc, std::wstring* name, DWORD attributes, CountedBuffer* info) { | |
208 if (sizeof(FILE_NETWORK_OPEN_INFORMATION) != info->Size()) | |
209 return false; | |
210 | |
211 if (!PreProcessName(*name, name)) { | |
212 // The path requested might contain a reparse point. | |
213 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
214 return true; | |
215 } | |
216 | |
217 ULONG broker = TRUE; | |
218 const wchar_t* filename = name->c_str(); | |
219 CountedParameterSet<FileName> params; | |
220 params[FileName::NAME] = ParamPickerMake(filename); | |
221 params[FileName::BROKER] = ParamPickerMake(broker); | |
222 | |
223 // To evaluate the policy we need to call back to the policy object. We | |
224 // are just middlemen in the operation since is the FileSystemPolicy which | |
225 // knows what to do. | |
226 EvalResult result = policy_base_->EvalPolicy( | |
227 IPC_NTQUERYFULLATTRIBUTESFILE_TAG, params.GetBase()); | |
228 | |
229 FILE_NETWORK_OPEN_INFORMATION* information = | |
230 reinterpret_cast<FILE_NETWORK_OPEN_INFORMATION*>(info->Buffer()); | |
231 NTSTATUS nt_status; | |
232 if (!FileSystemPolicy::QueryFullAttributesFileAction(result, | |
233 *ipc->client_info, | |
234 *name, attributes, | |
235 information, | |
236 &nt_status)) { | |
237 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
238 return true; | |
239 } | |
240 | |
241 // Return operation status on the IPC. | |
242 ipc->return_info.nt_status = nt_status; | |
243 return true; | |
244 } | |
245 | |
246 bool FilesystemDispatcher::NtSetInformationFile( | |
247 IPCInfo* ipc, HANDLE handle, CountedBuffer* status, CountedBuffer* info, | |
248 DWORD length, DWORD info_class) { | |
249 if (sizeof(IO_STATUS_BLOCK) != status->Size()) | |
250 return false; | |
251 if (length != info->Size()) | |
252 return false; | |
253 | |
254 FILE_RENAME_INFORMATION* rename_info = | |
255 reinterpret_cast<FILE_RENAME_INFORMATION*>(info->Buffer()); | |
256 | |
257 if (!IsSupportedRenameCall(rename_info, length, info_class)) | |
258 return false; | |
259 | |
260 std::wstring name; | |
261 name.assign(rename_info->FileName, rename_info->FileNameLength / | |
262 sizeof(rename_info->FileName[0])); | |
263 if (!PreProcessName(name, &name)) { | |
264 // The path requested might contain a reparse point. | |
265 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
266 return true; | |
267 } | |
268 | |
269 ULONG broker = TRUE; | |
270 const wchar_t* filename = name.c_str(); | |
271 CountedParameterSet<FileName> params; | |
272 params[FileName::NAME] = ParamPickerMake(filename); | |
273 params[FileName::BROKER] = ParamPickerMake(broker); | |
274 | |
275 // To evaluate the policy we need to call back to the policy object. We | |
276 // are just middlemen in the operation since is the FileSystemPolicy which | |
277 // knows what to do. | |
278 EvalResult result = policy_base_->EvalPolicy(IPC_NTSETINFO_RENAME_TAG, | |
279 params.GetBase()); | |
280 | |
281 IO_STATUS_BLOCK* io_status = | |
282 reinterpret_cast<IO_STATUS_BLOCK*>(status->Buffer()); | |
283 NTSTATUS nt_status; | |
284 if (!FileSystemPolicy::SetInformationFileAction(result, *ipc->client_info, | |
285 handle, rename_info, length, | |
286 info_class, io_status, | |
287 &nt_status)) { | |
288 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
289 return true; | |
290 } | |
291 | |
292 // Return operation status on the IPC. | |
293 ipc->return_info.nt_status = nt_status; | |
294 return true; | |
295 } | |
296 | |
297 } // namespace sandbox | |
OLD | NEW |