| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2006-2010 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "sandbox/src/filesystem_dispatcher.h" | |
| 6 | |
| 7 #include "sandbox/src/crosscall_client.h" | |
| 8 #include "sandbox/src/filesystem_interception.h" | |
| 9 #include "sandbox/src/filesystem_policy.h" | |
| 10 #include "sandbox/src/interception.h" | |
| 11 #include "sandbox/src/interceptors.h" | |
| 12 #include "sandbox/src/ipc_tags.h" | |
| 13 #include "sandbox/src/policy_broker.h" | |
| 14 #include "sandbox/src/policy_params.h" | |
| 15 #include "sandbox/src/sandbox.h" | |
| 16 #include "sandbox/src/sandbox_nt_util.h" | |
| 17 | |
| 18 namespace sandbox { | |
| 19 | |
| 20 FilesystemDispatcher::FilesystemDispatcher(PolicyBase* policy_base) | |
| 21 : policy_base_(policy_base) { | |
| 22 static const IPCCall create_params = { | |
| 23 {IPC_NTCREATEFILE_TAG, WCHAR_TYPE, ULONG_TYPE, ULONG_TYPE, ULONG_TYPE, | |
| 24 ULONG_TYPE, ULONG_TYPE, ULONG_TYPE}, | |
| 25 reinterpret_cast<CallbackGeneric>(&FilesystemDispatcher::NtCreateFile) | |
| 26 }; | |
| 27 | |
| 28 static const IPCCall open_file = { | |
| 29 {IPC_NTOPENFILE_TAG, WCHAR_TYPE, ULONG_TYPE, ULONG_TYPE, ULONG_TYPE, | |
| 30 ULONG_TYPE}, | |
| 31 reinterpret_cast<CallbackGeneric>(&FilesystemDispatcher::NtOpenFile) | |
| 32 }; | |
| 33 | |
| 34 static const IPCCall attribs = { | |
| 35 {IPC_NTQUERYATTRIBUTESFILE_TAG, WCHAR_TYPE, ULONG_TYPE, INOUTPTR_TYPE}, | |
| 36 reinterpret_cast<CallbackGeneric>( | |
| 37 &FilesystemDispatcher::NtQueryAttributesFile) | |
| 38 }; | |
| 39 | |
| 40 static const IPCCall full_attribs = { | |
| 41 {IPC_NTQUERYFULLATTRIBUTESFILE_TAG, WCHAR_TYPE, ULONG_TYPE, INOUTPTR_TYPE}, | |
| 42 reinterpret_cast<CallbackGeneric>( | |
| 43 &FilesystemDispatcher::NtQueryFullAttributesFile) | |
| 44 }; | |
| 45 | |
| 46 static const IPCCall set_info = { | |
| 47 {IPC_NTSETINFO_RENAME_TAG, VOIDPTR_TYPE, INOUTPTR_TYPE, INOUTPTR_TYPE, | |
| 48 ULONG_TYPE, ULONG_TYPE}, | |
| 49 reinterpret_cast<CallbackGeneric>( | |
| 50 &FilesystemDispatcher::NtSetInformationFile) | |
| 51 }; | |
| 52 | |
| 53 ipc_calls_.push_back(create_params); | |
| 54 ipc_calls_.push_back(open_file); | |
| 55 ipc_calls_.push_back(attribs); | |
| 56 ipc_calls_.push_back(full_attribs); | |
| 57 ipc_calls_.push_back(set_info); | |
| 58 } | |
| 59 | |
| 60 bool FilesystemDispatcher::SetupService(InterceptionManager* manager, | |
| 61 int service) { | |
| 62 switch (service) { | |
| 63 case IPC_NTCREATEFILE_TAG: | |
| 64 return INTERCEPT_NT(manager, NtCreateFile, CREATE_FILE_ID, 48); | |
| 65 | |
| 66 case IPC_NTOPENFILE_TAG: | |
| 67 return INTERCEPT_NT(manager, NtOpenFile, OPEN_FILE_ID, 28); | |
| 68 | |
| 69 case IPC_NTQUERYATTRIBUTESFILE_TAG: | |
| 70 return INTERCEPT_NT(manager, NtQueryAttributesFile, QUERY_ATTRIB_FILE_ID, | |
| 71 12); | |
| 72 | |
| 73 case IPC_NTQUERYFULLATTRIBUTESFILE_TAG: | |
| 74 return INTERCEPT_NT(manager, NtQueryFullAttributesFile, | |
| 75 QUERY_FULL_ATTRIB_FILE_ID, 12); | |
| 76 | |
| 77 case IPC_NTSETINFO_RENAME_TAG: | |
| 78 return INTERCEPT_NT(manager, NtSetInformationFile, SET_INFO_FILE_ID, 24); | |
| 79 | |
| 80 default: | |
| 81 return false; | |
| 82 } | |
| 83 } | |
| 84 | |
| 85 bool FilesystemDispatcher::NtCreateFile( | |
| 86 IPCInfo* ipc, std::wstring* name, DWORD attributes, DWORD desired_access, | |
| 87 DWORD file_attributes, DWORD share_access, DWORD create_disposition, | |
| 88 DWORD create_options) { | |
| 89 if (!PreProcessName(*name, name)) { | |
| 90 // The path requested might contain a reparse point. | |
| 91 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
| 92 return true; | |
| 93 } | |
| 94 | |
| 95 const wchar_t* filename = name->c_str(); | |
| 96 | |
| 97 ULONG broker = TRUE; | |
| 98 CountedParameterSet<OpenFile> params; | |
| 99 params[OpenFile::NAME] = ParamPickerMake(filename); | |
| 100 params[OpenFile::ACCESS] = ParamPickerMake(desired_access); | |
| 101 params[OpenFile::OPTIONS] = ParamPickerMake(create_options); | |
| 102 params[OpenFile::BROKER] = ParamPickerMake(broker); | |
| 103 | |
| 104 // To evaluate the policy we need to call back to the policy object. We | |
| 105 // are just middlemen in the operation since is the FileSystemPolicy which | |
| 106 // knows what to do. | |
| 107 EvalResult result = policy_base_->EvalPolicy(IPC_NTCREATEFILE_TAG, | |
| 108 params.GetBase()); | |
| 109 HANDLE handle; | |
| 110 ULONG_PTR io_information = 0; | |
| 111 NTSTATUS nt_status; | |
| 112 if (!FileSystemPolicy::CreateFileAction(result, *ipc->client_info, *name, | |
| 113 attributes, desired_access, | |
| 114 file_attributes, share_access, | |
| 115 create_disposition, create_options, | |
| 116 &handle, &nt_status, | |
| 117 &io_information)) { | |
| 118 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
| 119 return true; | |
| 120 } | |
| 121 // Return operation status on the IPC. | |
| 122 ipc->return_info.extended[0].ulong_ptr = io_information; | |
| 123 ipc->return_info.nt_status = nt_status; | |
| 124 ipc->return_info.handle = handle; | |
| 125 return true; | |
| 126 } | |
| 127 | |
| 128 bool FilesystemDispatcher::NtOpenFile( | |
| 129 IPCInfo* ipc, std::wstring* name, DWORD attributes, DWORD desired_access, | |
| 130 DWORD share_access, DWORD open_options) { | |
| 131 if (!PreProcessName(*name, name)) { | |
| 132 // The path requested might contain a reparse point. | |
| 133 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
| 134 return true; | |
| 135 } | |
| 136 | |
| 137 const wchar_t* filename = name->c_str(); | |
| 138 | |
| 139 ULONG broker = TRUE; | |
| 140 CountedParameterSet<OpenFile> params; | |
| 141 params[OpenFile::NAME] = ParamPickerMake(filename); | |
| 142 params[OpenFile::ACCESS] = ParamPickerMake(desired_access); | |
| 143 params[OpenFile::OPTIONS] = ParamPickerMake(open_options); | |
| 144 params[OpenFile::BROKER] = ParamPickerMake(broker); | |
| 145 | |
| 146 // To evaluate the policy we need to call back to the policy object. We | |
| 147 // are just middlemen in the operation since is the FileSystemPolicy which | |
| 148 // knows what to do. | |
| 149 EvalResult result = policy_base_->EvalPolicy(IPC_NTOPENFILE_TAG, | |
| 150 params.GetBase()); | |
| 151 HANDLE handle; | |
| 152 ULONG_PTR io_information = 0; | |
| 153 NTSTATUS nt_status; | |
| 154 if (!FileSystemPolicy::OpenFileAction(result, *ipc->client_info, *name, | |
| 155 attributes, desired_access, | |
| 156 share_access, open_options, &handle, | |
| 157 &nt_status, &io_information)) { | |
| 158 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
| 159 return true; | |
| 160 } | |
| 161 // Return operation status on the IPC. | |
| 162 ipc->return_info.extended[0].ulong_ptr = io_information; | |
| 163 ipc->return_info.nt_status = nt_status; | |
| 164 ipc->return_info.handle = handle; | |
| 165 return true; | |
| 166 } | |
| 167 | |
| 168 bool FilesystemDispatcher::NtQueryAttributesFile( | |
| 169 IPCInfo* ipc, std::wstring* name, DWORD attributes, CountedBuffer* info) { | |
| 170 if (sizeof(FILE_BASIC_INFORMATION) != info->Size()) | |
| 171 return false; | |
| 172 | |
| 173 if (!PreProcessName(*name, name)) { | |
| 174 // The path requested might contain a reparse point. | |
| 175 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
| 176 return true; | |
| 177 } | |
| 178 | |
| 179 ULONG broker = TRUE; | |
| 180 const wchar_t* filename = name->c_str(); | |
| 181 CountedParameterSet<FileName> params; | |
| 182 params[FileName::NAME] = ParamPickerMake(filename); | |
| 183 params[FileName::BROKER] = ParamPickerMake(broker); | |
| 184 | |
| 185 // To evaluate the policy we need to call back to the policy object. We | |
| 186 // are just middlemen in the operation since is the FileSystemPolicy which | |
| 187 // knows what to do. | |
| 188 EvalResult result = policy_base_->EvalPolicy(IPC_NTQUERYATTRIBUTESFILE_TAG, | |
| 189 params.GetBase()); | |
| 190 | |
| 191 FILE_BASIC_INFORMATION* information = | |
| 192 reinterpret_cast<FILE_BASIC_INFORMATION*>(info->Buffer()); | |
| 193 NTSTATUS nt_status; | |
| 194 if (!FileSystemPolicy::QueryAttributesFileAction(result, *ipc->client_info, | |
| 195 *name, attributes, | |
| 196 information, &nt_status)) { | |
| 197 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
| 198 return true; | |
| 199 } | |
| 200 | |
| 201 // Return operation status on the IPC. | |
| 202 ipc->return_info.nt_status = nt_status; | |
| 203 return true; | |
| 204 } | |
| 205 | |
| 206 bool FilesystemDispatcher::NtQueryFullAttributesFile( | |
| 207 IPCInfo* ipc, std::wstring* name, DWORD attributes, CountedBuffer* info) { | |
| 208 if (sizeof(FILE_NETWORK_OPEN_INFORMATION) != info->Size()) | |
| 209 return false; | |
| 210 | |
| 211 if (!PreProcessName(*name, name)) { | |
| 212 // The path requested might contain a reparse point. | |
| 213 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
| 214 return true; | |
| 215 } | |
| 216 | |
| 217 ULONG broker = TRUE; | |
| 218 const wchar_t* filename = name->c_str(); | |
| 219 CountedParameterSet<FileName> params; | |
| 220 params[FileName::NAME] = ParamPickerMake(filename); | |
| 221 params[FileName::BROKER] = ParamPickerMake(broker); | |
| 222 | |
| 223 // To evaluate the policy we need to call back to the policy object. We | |
| 224 // are just middlemen in the operation since is the FileSystemPolicy which | |
| 225 // knows what to do. | |
| 226 EvalResult result = policy_base_->EvalPolicy( | |
| 227 IPC_NTQUERYFULLATTRIBUTESFILE_TAG, params.GetBase()); | |
| 228 | |
| 229 FILE_NETWORK_OPEN_INFORMATION* information = | |
| 230 reinterpret_cast<FILE_NETWORK_OPEN_INFORMATION*>(info->Buffer()); | |
| 231 NTSTATUS nt_status; | |
| 232 if (!FileSystemPolicy::QueryFullAttributesFileAction(result, | |
| 233 *ipc->client_info, | |
| 234 *name, attributes, | |
| 235 information, | |
| 236 &nt_status)) { | |
| 237 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
| 238 return true; | |
| 239 } | |
| 240 | |
| 241 // Return operation status on the IPC. | |
| 242 ipc->return_info.nt_status = nt_status; | |
| 243 return true; | |
| 244 } | |
| 245 | |
| 246 bool FilesystemDispatcher::NtSetInformationFile( | |
| 247 IPCInfo* ipc, HANDLE handle, CountedBuffer* status, CountedBuffer* info, | |
| 248 DWORD length, DWORD info_class) { | |
| 249 if (sizeof(IO_STATUS_BLOCK) != status->Size()) | |
| 250 return false; | |
| 251 if (length != info->Size()) | |
| 252 return false; | |
| 253 | |
| 254 FILE_RENAME_INFORMATION* rename_info = | |
| 255 reinterpret_cast<FILE_RENAME_INFORMATION*>(info->Buffer()); | |
| 256 | |
| 257 if (!IsSupportedRenameCall(rename_info, length, info_class)) | |
| 258 return false; | |
| 259 | |
| 260 std::wstring name; | |
| 261 name.assign(rename_info->FileName, rename_info->FileNameLength / | |
| 262 sizeof(rename_info->FileName[0])); | |
| 263 if (!PreProcessName(name, &name)) { | |
| 264 // The path requested might contain a reparse point. | |
| 265 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
| 266 return true; | |
| 267 } | |
| 268 | |
| 269 ULONG broker = TRUE; | |
| 270 const wchar_t* filename = name.c_str(); | |
| 271 CountedParameterSet<FileName> params; | |
| 272 params[FileName::NAME] = ParamPickerMake(filename); | |
| 273 params[FileName::BROKER] = ParamPickerMake(broker); | |
| 274 | |
| 275 // To evaluate the policy we need to call back to the policy object. We | |
| 276 // are just middlemen in the operation since is the FileSystemPolicy which | |
| 277 // knows what to do. | |
| 278 EvalResult result = policy_base_->EvalPolicy(IPC_NTSETINFO_RENAME_TAG, | |
| 279 params.GetBase()); | |
| 280 | |
| 281 IO_STATUS_BLOCK* io_status = | |
| 282 reinterpret_cast<IO_STATUS_BLOCK*>(status->Buffer()); | |
| 283 NTSTATUS nt_status; | |
| 284 if (!FileSystemPolicy::SetInformationFileAction(result, *ipc->client_info, | |
| 285 handle, rename_info, length, | |
| 286 info_class, io_status, | |
| 287 &nt_status)) { | |
| 288 ipc->return_info.nt_status = STATUS_ACCESS_DENIED; | |
| 289 return true; | |
| 290 } | |
| 291 | |
| 292 // Return operation status on the IPC. | |
| 293 ipc->return_info.nt_status = nt_status; | |
| 294 return true; | |
| 295 } | |
| 296 | |
| 297 } // namespace sandbox | |
| OLD | NEW |