| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2006-2011 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "sandbox/src/process_thread_interception.h" | |
| 6 | |
| 7 #include "sandbox/src/crosscall_client.h" | |
| 8 #include "sandbox/src/ipc_tags.h" | |
| 9 #include "sandbox/src/policy_params.h" | |
| 10 #include "sandbox/src/policy_target.h" | |
| 11 #include "sandbox/src/sandbox_factory.h" | |
| 12 #include "sandbox/src/sandbox_nt_util.h" | |
| 13 #include "sandbox/src/sharedmem_ipc_client.h" | |
| 14 #include "sandbox/src/target_services.h" | |
| 15 | |
| 16 namespace sandbox { | |
| 17 | |
| 18 SANDBOX_INTERCEPT NtExports g_nt; | |
| 19 | |
| 20 // Hooks NtOpenThread and proxy the call to the broker if it's trying to | |
| 21 // open a thread in the same process. | |
| 22 NTSTATUS WINAPI TargetNtOpenThread(NtOpenThreadFunction orig_OpenThread, | |
| 23 PHANDLE thread, ACCESS_MASK desired_access, | |
| 24 POBJECT_ATTRIBUTES object_attributes, | |
| 25 PCLIENT_ID client_id) { | |
| 26 NTSTATUS status = orig_OpenThread(thread, desired_access, object_attributes, | |
| 27 client_id); | |
| 28 if (NT_SUCCESS(status)) | |
| 29 return status; | |
| 30 | |
| 31 do { | |
| 32 if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled()) | |
| 33 break; | |
| 34 if (!client_id) | |
| 35 break; | |
| 36 | |
| 37 uint32 thread_id = 0; | |
| 38 bool should_break = false; | |
| 39 __try { | |
| 40 // We support only the calls for the current process | |
| 41 if (NULL != client_id->UniqueProcess) | |
| 42 should_break = true; | |
| 43 | |
| 44 // Object attributes should be NULL or empty. | |
| 45 if (!should_break && NULL != object_attributes) { | |
| 46 if (0 != object_attributes->Attributes || | |
| 47 NULL != object_attributes->ObjectName || | |
| 48 NULL != object_attributes->RootDirectory || | |
| 49 NULL != object_attributes->SecurityDescriptor || | |
| 50 NULL != object_attributes->SecurityQualityOfService) { | |
| 51 should_break = true; | |
| 52 } | |
| 53 } | |
| 54 | |
| 55 thread_id = static_cast<uint32>( | |
| 56 reinterpret_cast<ULONG_PTR>(client_id->UniqueThread)); | |
| 57 } __except(EXCEPTION_EXECUTE_HANDLER) { | |
| 58 break; | |
| 59 } | |
| 60 | |
| 61 if (should_break) | |
| 62 break; | |
| 63 | |
| 64 if (!ValidParameter(thread, sizeof(HANDLE), WRITE)) | |
| 65 break; | |
| 66 | |
| 67 void* memory = GetGlobalIPCMemory(); | |
| 68 if (NULL == memory) | |
| 69 break; | |
| 70 | |
| 71 SharedMemIPCClient ipc(memory); | |
| 72 CrossCallReturn answer = {0}; | |
| 73 ResultCode code = CrossCall(ipc, IPC_NTOPENTHREAD_TAG, desired_access, | |
| 74 thread_id, &answer); | |
| 75 if (SBOX_ALL_OK != code) | |
| 76 break; | |
| 77 | |
| 78 if (!NT_SUCCESS(answer.nt_status)) | |
| 79 // The nt_status here is most likely STATUS_INVALID_CID because | |
| 80 // in the broker we set the process id in the CID (client ID) param | |
| 81 // to be the current process. If you try to open a thread from another | |
| 82 // process you will get this INVALID_CID error. On the other hand, if you | |
| 83 // try to open a thread in your own process, it should return success. | |
| 84 // We don't want to return STATUS_INVALID_CID here, so we return the | |
| 85 // return of the original open thread status, which is most likely | |
| 86 // STATUS_ACCESS_DENIED. | |
| 87 break; | |
| 88 | |
| 89 __try { | |
| 90 // Write the output parameters. | |
| 91 *thread = answer.handle; | |
| 92 } __except(EXCEPTION_EXECUTE_HANDLER) { | |
| 93 break; | |
| 94 } | |
| 95 | |
| 96 return answer.nt_status; | |
| 97 } while (false); | |
| 98 | |
| 99 return status; | |
| 100 } | |
| 101 | |
| 102 // Hooks NtOpenProcess and proxy the call to the broker if it's trying to | |
| 103 // open the current process. | |
| 104 NTSTATUS WINAPI TargetNtOpenProcess(NtOpenProcessFunction orig_OpenProcess, | |
| 105 PHANDLE process, ACCESS_MASK desired_access, | |
| 106 POBJECT_ATTRIBUTES object_attributes, | |
| 107 PCLIENT_ID client_id) { | |
| 108 NTSTATUS status = orig_OpenProcess(process, desired_access, object_attributes, | |
| 109 client_id); | |
| 110 if (NT_SUCCESS(status)) | |
| 111 return status; | |
| 112 | |
| 113 do { | |
| 114 if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled()) | |
| 115 break; | |
| 116 if (!client_id) | |
| 117 break; | |
| 118 | |
| 119 uint32 process_id = 0; | |
| 120 bool should_break = false; | |
| 121 __try { | |
| 122 // Object attributes should be NULL or empty. | |
| 123 if (!should_break && NULL != object_attributes) { | |
| 124 if (0 != object_attributes->Attributes || | |
| 125 NULL != object_attributes->ObjectName || | |
| 126 NULL != object_attributes->RootDirectory || | |
| 127 NULL != object_attributes->SecurityDescriptor || | |
| 128 NULL != object_attributes->SecurityQualityOfService) { | |
| 129 should_break = true; | |
| 130 } | |
| 131 } | |
| 132 | |
| 133 process_id = static_cast<uint32>( | |
| 134 reinterpret_cast<ULONG_PTR>(client_id->UniqueProcess)); | |
| 135 } __except(EXCEPTION_EXECUTE_HANDLER) { | |
| 136 break; | |
| 137 } | |
| 138 | |
| 139 if (should_break) | |
| 140 break; | |
| 141 | |
| 142 if (!ValidParameter(process, sizeof(HANDLE), WRITE)) | |
| 143 break; | |
| 144 | |
| 145 void* memory = GetGlobalIPCMemory(); | |
| 146 if (NULL == memory) | |
| 147 break; | |
| 148 | |
| 149 SharedMemIPCClient ipc(memory); | |
| 150 CrossCallReturn answer = {0}; | |
| 151 ResultCode code = CrossCall(ipc, IPC_NTOPENPROCESS_TAG, desired_access, | |
| 152 process_id, &answer); | |
| 153 if (SBOX_ALL_OK != code) | |
| 154 break; | |
| 155 | |
| 156 if (!NT_SUCCESS(answer.nt_status)) | |
| 157 return answer.nt_status; | |
| 158 | |
| 159 __try { | |
| 160 // Write the output parameters. | |
| 161 *process = answer.handle; | |
| 162 } __except(EXCEPTION_EXECUTE_HANDLER) { | |
| 163 break; | |
| 164 } | |
| 165 | |
| 166 return answer.nt_status; | |
| 167 } while (false); | |
| 168 | |
| 169 return status; | |
| 170 } | |
| 171 | |
| 172 | |
| 173 NTSTATUS WINAPI TargetNtOpenProcessToken( | |
| 174 NtOpenProcessTokenFunction orig_OpenProcessToken, HANDLE process, | |
| 175 ACCESS_MASK desired_access, PHANDLE token) { | |
| 176 NTSTATUS status = orig_OpenProcessToken(process, desired_access, token); | |
| 177 if (NT_SUCCESS(status)) | |
| 178 return status; | |
| 179 | |
| 180 do { | |
| 181 if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled()) | |
| 182 break; | |
| 183 | |
| 184 if (CURRENT_PROCESS != process) | |
| 185 break; | |
| 186 | |
| 187 if (!ValidParameter(token, sizeof(HANDLE), WRITE)) | |
| 188 break; | |
| 189 | |
| 190 void* memory = GetGlobalIPCMemory(); | |
| 191 if (NULL == memory) | |
| 192 break; | |
| 193 | |
| 194 SharedMemIPCClient ipc(memory); | |
| 195 CrossCallReturn answer = {0}; | |
| 196 ResultCode code = CrossCall(ipc, IPC_NTOPENPROCESSTOKEN_TAG, process, | |
| 197 desired_access, &answer); | |
| 198 if (SBOX_ALL_OK != code) | |
| 199 break; | |
| 200 | |
| 201 if (!NT_SUCCESS(answer.nt_status)) | |
| 202 return answer.nt_status; | |
| 203 | |
| 204 __try { | |
| 205 // Write the output parameters. | |
| 206 *token = answer.handle; | |
| 207 } __except(EXCEPTION_EXECUTE_HANDLER) { | |
| 208 break; | |
| 209 } | |
| 210 | |
| 211 return answer.nt_status; | |
| 212 } while (false); | |
| 213 | |
| 214 return status; | |
| 215 } | |
| 216 | |
| 217 NTSTATUS WINAPI TargetNtOpenProcessTokenEx( | |
| 218 NtOpenProcessTokenExFunction orig_OpenProcessTokenEx, HANDLE process, | |
| 219 ACCESS_MASK desired_access, ULONG handle_attributes, PHANDLE token) { | |
| 220 NTSTATUS status = orig_OpenProcessTokenEx(process, desired_access, | |
| 221 handle_attributes, token); | |
| 222 if (NT_SUCCESS(status)) | |
| 223 return status; | |
| 224 | |
| 225 do { | |
| 226 if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled()) | |
| 227 break; | |
| 228 | |
| 229 if (CURRENT_PROCESS != process) | |
| 230 break; | |
| 231 | |
| 232 if (!ValidParameter(token, sizeof(HANDLE), WRITE)) | |
| 233 break; | |
| 234 | |
| 235 void* memory = GetGlobalIPCMemory(); | |
| 236 if (NULL == memory) | |
| 237 break; | |
| 238 | |
| 239 SharedMemIPCClient ipc(memory); | |
| 240 CrossCallReturn answer = {0}; | |
| 241 ResultCode code = CrossCall(ipc, IPC_NTOPENPROCESSTOKENEX_TAG, process, | |
| 242 desired_access, handle_attributes, &answer); | |
| 243 if (SBOX_ALL_OK != code) | |
| 244 break; | |
| 245 | |
| 246 if (!NT_SUCCESS(answer.nt_status)) | |
| 247 return answer.nt_status; | |
| 248 | |
| 249 __try { | |
| 250 // Write the output parameters. | |
| 251 *token = answer.handle; | |
| 252 } __except(EXCEPTION_EXECUTE_HANDLER) { | |
| 253 break; | |
| 254 } | |
| 255 | |
| 256 return answer.nt_status; | |
| 257 } while (false); | |
| 258 | |
| 259 return status; | |
| 260 } | |
| 261 | |
| 262 BOOL WINAPI TargetCreateProcessW(CreateProcessWFunction orig_CreateProcessW, | |
| 263 LPCWSTR application_name, LPWSTR command_line, | |
| 264 LPSECURITY_ATTRIBUTES process_attributes, | |
| 265 LPSECURITY_ATTRIBUTES thread_attributes, | |
| 266 BOOL inherit_handles, DWORD flags, | |
| 267 LPVOID environment, LPCWSTR current_directory, | |
| 268 LPSTARTUPINFOW startup_info, | |
| 269 LPPROCESS_INFORMATION process_information) { | |
| 270 if (orig_CreateProcessW(application_name, command_line, process_attributes, | |
| 271 thread_attributes, inherit_handles, flags, | |
| 272 environment, current_directory, startup_info, | |
| 273 process_information)) { | |
| 274 return TRUE; | |
| 275 } | |
| 276 DWORD original_error = ::GetLastError(); | |
| 277 | |
| 278 // We don't trust that the IPC can work this early. | |
| 279 if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled()) | |
| 280 return FALSE; | |
| 281 | |
| 282 do { | |
| 283 if (!ValidParameter(process_information, sizeof(PROCESS_INFORMATION), | |
| 284 WRITE)) | |
| 285 break; | |
| 286 | |
| 287 void* memory = GetGlobalIPCMemory(); | |
| 288 if (NULL == memory) | |
| 289 break; | |
| 290 | |
| 291 const wchar_t* cur_dir = NULL; | |
| 292 | |
| 293 wchar_t current_directory[MAX_PATH]; | |
| 294 DWORD result = ::GetCurrentDirectory(MAX_PATH, current_directory); | |
| 295 if (0 != result && result < MAX_PATH) | |
| 296 cur_dir = current_directory; | |
| 297 | |
| 298 SharedMemIPCClient ipc(memory); | |
| 299 CrossCallReturn answer = {0}; | |
| 300 | |
| 301 InOutCountedBuffer proc_info(process_information, | |
| 302 sizeof(PROCESS_INFORMATION)); | |
| 303 | |
| 304 ResultCode code = CrossCall(ipc, IPC_CREATEPROCESSW_TAG, application_name, | |
| 305 command_line, cur_dir, proc_info, &answer); | |
| 306 if (SBOX_ALL_OK != code) | |
| 307 break; | |
| 308 | |
| 309 ::SetLastError(answer.win32_result); | |
| 310 if (ERROR_SUCCESS != answer.win32_result) | |
| 311 return FALSE; | |
| 312 | |
| 313 return TRUE; | |
| 314 } while (false); | |
| 315 | |
| 316 ::SetLastError(original_error); | |
| 317 return FALSE; | |
| 318 } | |
| 319 | |
| 320 BOOL WINAPI TargetCreateProcessA(CreateProcessAFunction orig_CreateProcessA, | |
| 321 LPCSTR application_name, LPSTR command_line, | |
| 322 LPSECURITY_ATTRIBUTES process_attributes, | |
| 323 LPSECURITY_ATTRIBUTES thread_attributes, | |
| 324 BOOL inherit_handles, DWORD flags, | |
| 325 LPVOID environment, LPCSTR current_directory, | |
| 326 LPSTARTUPINFOA startup_info, | |
| 327 LPPROCESS_INFORMATION process_information) { | |
| 328 if (orig_CreateProcessA(application_name, command_line, process_attributes, | |
| 329 thread_attributes, inherit_handles, flags, | |
| 330 environment, current_directory, startup_info, | |
| 331 process_information)) { | |
| 332 return TRUE; | |
| 333 } | |
| 334 DWORD original_error = ::GetLastError(); | |
| 335 | |
| 336 // We don't trust that the IPC can work this early. | |
| 337 if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled()) | |
| 338 return FALSE; | |
| 339 | |
| 340 do { | |
| 341 if (!ValidParameter(process_information, sizeof(PROCESS_INFORMATION), | |
| 342 WRITE)) | |
| 343 break; | |
| 344 | |
| 345 void* memory = GetGlobalIPCMemory(); | |
| 346 if (NULL == memory) | |
| 347 break; | |
| 348 | |
| 349 // Convert the input params to unicode. | |
| 350 UNICODE_STRING *cmd_unicode = NULL; | |
| 351 UNICODE_STRING *app_unicode = NULL; | |
| 352 if (command_line) { | |
| 353 cmd_unicode = AnsiToUnicode(command_line); | |
| 354 if (!cmd_unicode) | |
| 355 break; | |
| 356 } | |
| 357 | |
| 358 if (application_name) { | |
| 359 app_unicode = AnsiToUnicode(application_name); | |
| 360 if (!app_unicode) { | |
| 361 operator delete(cmd_unicode, NT_ALLOC); | |
| 362 break; | |
| 363 } | |
| 364 } | |
| 365 | |
| 366 const wchar_t* cmd_line = cmd_unicode ? cmd_unicode->Buffer : NULL; | |
| 367 const wchar_t* app_name = app_unicode ? app_unicode->Buffer : NULL; | |
| 368 const wchar_t* cur_dir = NULL; | |
| 369 | |
| 370 wchar_t current_directory[MAX_PATH]; | |
| 371 DWORD result = ::GetCurrentDirectory(MAX_PATH, current_directory); | |
| 372 if (0 != result && result < MAX_PATH) | |
| 373 cur_dir = current_directory; | |
| 374 | |
| 375 SharedMemIPCClient ipc(memory); | |
| 376 CrossCallReturn answer = {0}; | |
| 377 | |
| 378 InOutCountedBuffer proc_info(process_information, | |
| 379 sizeof(PROCESS_INFORMATION)); | |
| 380 | |
| 381 ResultCode code = CrossCall(ipc, IPC_CREATEPROCESSW_TAG, app_name, | |
| 382 cmd_line, cur_dir, proc_info, &answer); | |
| 383 | |
| 384 operator delete(cmd_unicode, NT_ALLOC); | |
| 385 operator delete(app_unicode, NT_ALLOC); | |
| 386 | |
| 387 if (SBOX_ALL_OK != code) | |
| 388 break; | |
| 389 | |
| 390 ::SetLastError(answer.win32_result); | |
| 391 if (ERROR_SUCCESS != answer.win32_result) | |
| 392 return FALSE; | |
| 393 | |
| 394 return TRUE; | |
| 395 } while (false); | |
| 396 | |
| 397 ::SetLastError(original_error); | |
| 398 return FALSE; | |
| 399 } | |
| 400 | |
| 401 // Creates a thread without registering with CSRSS. This is required if we | |
| 402 // closed the CSRSS ALPC port after lockdown. | |
| 403 HANDLE WINAPI TargetCreateThread(CreateThreadFunction orig_CreateThread, | |
| 404 LPSECURITY_ATTRIBUTES thread_attributes, | |
| 405 SIZE_T stack_size, | |
| 406 LPTHREAD_START_ROUTINE start_address, | |
| 407 PVOID parameter, | |
| 408 DWORD creation_flags, | |
| 409 LPDWORD thread_id) { | |
| 410 // Try the normal CreateThread; switch to RtlCreateUserThread if needed. | |
| 411 static bool use_create_thread = true; | |
| 412 HANDLE thread; | |
| 413 if (use_create_thread) { | |
| 414 thread = orig_CreateThread(thread_attributes, stack_size, start_address, | |
| 415 parameter, creation_flags, thread_id); | |
| 416 if (thread) | |
| 417 return thread; | |
| 418 } | |
| 419 | |
| 420 PSECURITY_DESCRIPTOR sd = | |
| 421 thread_attributes ? thread_attributes->lpSecurityDescriptor : NULL; | |
| 422 CLIENT_ID client_id; | |
| 423 | |
| 424 NTSTATUS result = g_nt.RtlCreateUserThread(NtCurrentProcess, sd, | |
| 425 creation_flags & CREATE_SUSPENDED, | |
| 426 0, stack_size, 0, start_address, | |
| 427 parameter, &thread, &client_id); | |
| 428 if (!NT_SUCCESS(result)) | |
| 429 return 0; | |
| 430 | |
| 431 // CSRSS is closed if we got here, so use RtlCreateUserThread from here on. | |
| 432 use_create_thread = false; | |
| 433 if (thread_id) | |
| 434 *thread_id = HandleToUlong(client_id.UniqueThread); | |
| 435 return thread; | |
| 436 } | |
| 437 | |
| 438 // Cache the default LCID to avoid pinging CSRSS after lockdown. | |
| 439 // TODO(jschuh): This approach will miss a default locale changes after | |
| 440 // lockdown. In the future we may want to have the broker check instead. | |
| 441 LCID WINAPI TargetGetUserDefaultLCID( | |
| 442 GetUserDefaultLCIDFunction orig_GetUserDefaultLCID) { | |
| 443 static LCID default_lcid = orig_GetUserDefaultLCID(); | |
| 444 return default_lcid; | |
| 445 } | |
| 446 | |
| 447 } // namespace sandbox | |
| OLD | NEW |