OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "sandbox/src/target_process.h" | |
6 | |
7 #include "base/basictypes.h" | |
8 #include "base/memory/scoped_ptr.h" | |
9 #include "base/win/pe_image.h" | |
10 #include "base/win/windows_version.h" | |
11 #include "sandbox/src/crosscall_server.h" | |
12 #include "sandbox/src/crosscall_client.h" | |
13 #include "sandbox/src/policy_low_level.h" | |
14 #include "sandbox/src/sandbox_types.h" | |
15 #include "sandbox/src/sharedmem_ipc_server.h" | |
16 | |
17 namespace { | |
18 | |
19 void CopyPolicyToTarget(const void* source, size_t size, void* dest) { | |
20 if (!source || !size) | |
21 return; | |
22 memcpy(dest, source, size); | |
23 sandbox::PolicyGlobal* policy = | |
24 reinterpret_cast<sandbox::PolicyGlobal*>(dest); | |
25 | |
26 size_t offset = reinterpret_cast<size_t>(source); | |
27 | |
28 for (size_t i = 0; i < sandbox::kMaxServiceCount; i++) { | |
29 size_t buffer = reinterpret_cast<size_t>(policy->entry[i]); | |
30 if (buffer) { | |
31 buffer -= offset; | |
32 policy->entry[i] = reinterpret_cast<sandbox::PolicyBuffer*>(buffer); | |
33 } | |
34 } | |
35 } | |
36 | |
37 // Reserve a random range at the bottom of the address space in the target | |
38 // process to prevent predictable alocations at low addresses. | |
39 void PoisonLowerAddressRange(HANDLE process) { | |
40 unsigned int limit; | |
41 rand_s(&limit); | |
42 char* ptr = 0; | |
43 const size_t kMask64k = 0xFFFF; | |
44 // Random range (512k-16.5mb) in 64k steps. | |
45 const char* end = ptr + ((((limit % 16384) + 512) * 1024) & ~kMask64k); | |
46 while (ptr < end) { | |
47 MEMORY_BASIC_INFORMATION memory_info; | |
48 if (!::VirtualQueryEx(process, ptr, &memory_info, sizeof(memory_info))) | |
49 break; | |
50 size_t size = std::min((memory_info.RegionSize + kMask64k) & ~kMask64k, | |
51 static_cast<SIZE_T>(end - ptr)); | |
52 if (ptr && memory_info.State == MEM_FREE) | |
53 ::VirtualAllocEx(process, ptr, size, MEM_RESERVE, PAGE_NOACCESS); | |
54 ptr += size; | |
55 } | |
56 } | |
57 | |
58 } | |
59 | |
60 namespace sandbox { | |
61 | |
62 SANDBOX_INTERCEPT HANDLE g_shared_section; | |
63 SANDBOX_INTERCEPT size_t g_shared_IPC_size; | |
64 SANDBOX_INTERCEPT size_t g_shared_policy_size; | |
65 | |
66 // Returns the address of the main exe module in memory taking in account | |
67 // address space layout randomization. | |
68 void* GetBaseAddress(const wchar_t* exe_name, void* entry_point) { | |
69 HMODULE exe = ::LoadLibrary(exe_name); | |
70 if (NULL == exe) | |
71 return exe; | |
72 | |
73 base::win::PEImage pe(exe); | |
74 if (!pe.VerifyMagic()) { | |
75 ::FreeLibrary(exe); | |
76 return exe; | |
77 } | |
78 PIMAGE_NT_HEADERS nt_header = pe.GetNTHeaders(); | |
79 char* base = reinterpret_cast<char*>(entry_point) - | |
80 nt_header->OptionalHeader.AddressOfEntryPoint; | |
81 | |
82 ::FreeLibrary(exe); | |
83 return base; | |
84 } | |
85 | |
86 | |
87 TargetProcess::TargetProcess(HANDLE initial_token, HANDLE lockdown_token, | |
88 HANDLE job, ThreadProvider* thread_pool) | |
89 // This object owns everything initialized here except thread_pool and | |
90 // the job_ handle. The Job handle is closed by BrokerServices and results | |
91 // eventually in a call to our dtor. | |
92 : lockdown_token_(lockdown_token), | |
93 initial_token_(initial_token), | |
94 job_(job), | |
95 thread_pool_(thread_pool), | |
96 base_address_(NULL) { | |
97 } | |
98 | |
99 TargetProcess::~TargetProcess() { | |
100 DWORD exit_code = 0; | |
101 // Give a chance to the process to die. In most cases the JOB_KILL_ON_CLOSE | |
102 // will take effect only when the context changes. As far as the testing went, | |
103 // this wait was enough to switch context and kill the processes in the job. | |
104 // If this process is already dead, the function will return without waiting. | |
105 // TODO(nsylvain): If the process is still alive at the end, we should kill | |
106 // it. http://b/893891 | |
107 // For now, this wait is there only to do a best effort to prevent some leaks | |
108 // from showing up in purify. | |
109 ::WaitForSingleObject(sandbox_process_info_.process_handle(), 50); | |
110 if (!::GetExitCodeProcess(sandbox_process_info_.process_handle(), | |
111 &exit_code) || (STILL_ACTIVE == exit_code)) { | |
112 // It is an error to destroy this object while the target process is still | |
113 // alive because we need to destroy the IPC subsystem and cannot risk to | |
114 // have an IPC reach us after this point. | |
115 shared_section_.Take(); | |
116 SharedMemIPCServer* server = ipc_server_.release(); | |
117 sandbox_process_info_.TakeProcessHandle(); | |
118 return; | |
119 } | |
120 | |
121 // ipc_server_ references our process handle, so make sure the former is shut | |
122 // down before the latter is closed (by ScopedProcessInformation). | |
123 ipc_server_.reset(); | |
124 } | |
125 | |
126 // Creates the target (child) process suspended and assigns it to the job | |
127 // object. | |
128 DWORD TargetProcess::Create(const wchar_t* exe_path, | |
129 const wchar_t* command_line, | |
130 const wchar_t* desktop, | |
131 base::win::ScopedProcessInformation* target_info) { | |
132 exe_name_.reset(_wcsdup(exe_path)); | |
133 | |
134 // the command line needs to be writable by CreateProcess(). | |
135 scoped_ptr_malloc<wchar_t> cmd_line(_wcsdup(command_line)); | |
136 scoped_ptr_malloc<wchar_t> desktop_name(desktop ? _wcsdup(desktop) : NULL); | |
137 | |
138 // Start the target process suspended. | |
139 DWORD flags = | |
140 CREATE_SUSPENDED | CREATE_UNICODE_ENVIRONMENT | DETACHED_PROCESS; | |
141 | |
142 if (base::win::GetVersion() < base::win::VERSION_WIN8) { | |
143 // Windows 8 implements nested jobs, but for older systems we need to | |
144 // break out of any job we're in to enforce our restrictions. | |
145 flags |= CREATE_BREAKAWAY_FROM_JOB; | |
146 } | |
147 | |
148 STARTUPINFO startup_info = {sizeof(STARTUPINFO)}; | |
149 if (desktop) { | |
150 startup_info.lpDesktop = desktop_name.get(); | |
151 } | |
152 | |
153 base::win::ScopedProcessInformation process_info; | |
154 | |
155 if (!::CreateProcessAsUserW(lockdown_token_, | |
156 exe_path, | |
157 cmd_line.get(), | |
158 NULL, // No security attribute. | |
159 NULL, // No thread attribute. | |
160 FALSE, // Do not inherit handles. | |
161 flags, | |
162 NULL, // Use the environment of the caller. | |
163 NULL, // Use current directory of the caller. | |
164 &startup_info, | |
165 process_info.Receive())) { | |
166 return ::GetLastError(); | |
167 } | |
168 lockdown_token_.Close(); | |
169 | |
170 PoisonLowerAddressRange(process_info.process_handle()); | |
171 | |
172 DWORD win_result = ERROR_SUCCESS; | |
173 | |
174 // Assign the suspended target to the windows job object | |
175 if (!::AssignProcessToJobObject(job_, process_info.process_handle())) { | |
176 win_result = ::GetLastError(); | |
177 // It might be a security breach if we let the target run outside the job | |
178 // so kill it before it causes damage | |
179 ::TerminateProcess(process_info.process_handle(), 0); | |
180 return win_result; | |
181 } | |
182 | |
183 // Change the token of the main thread of the new process for the | |
184 // impersonation token with more rights. This allows the target to start; | |
185 // otherwise it will crash too early for us to help. | |
186 { | |
187 HANDLE temp_thread = process_info.thread_handle(); | |
188 if (!::SetThreadToken(&temp_thread, initial_token_)) { | |
189 win_result = ::GetLastError(); | |
190 ::TerminateProcess(process_info.process_handle(), 0); | |
191 return win_result; | |
192 } | |
193 initial_token_.Close(); | |
194 } | |
195 | |
196 CONTEXT context; | |
197 context.ContextFlags = CONTEXT_ALL; | |
198 if (!::GetThreadContext(process_info.thread_handle(), &context)) { | |
199 win_result = ::GetLastError(); | |
200 ::TerminateProcess(process_info.process_handle(), 0); | |
201 return win_result; | |
202 } | |
203 | |
204 #if defined(_WIN64) | |
205 void* entry_point = reinterpret_cast<void*>(context.Rcx); | |
206 #else | |
207 #pragma warning(push) | |
208 #pragma warning(disable: 4312) | |
209 // This cast generates a warning because it is 32 bit specific. | |
210 void* entry_point = reinterpret_cast<void*>(context.Eax); | |
211 #pragma warning(pop) | |
212 #endif // _WIN64 | |
213 | |
214 if (!target_info->DuplicateFrom(process_info)) { | |
215 win_result = ::GetLastError(); // This may or may not be correct. | |
216 ::TerminateProcess(process_info.process_handle(), 0); | |
217 return win_result; | |
218 } | |
219 | |
220 base_address_ = GetBaseAddress(exe_path, entry_point); | |
221 sandbox_process_info_.Swap(&process_info); | |
222 return win_result; | |
223 } | |
224 | |
225 ResultCode TargetProcess::TransferVariable(const char* name, void* address, | |
226 size_t size) { | |
227 if (!sandbox_process_info_.IsValid()) | |
228 return SBOX_ERROR_UNEXPECTED_CALL; | |
229 | |
230 void* child_var = address; | |
231 | |
232 #if SANDBOX_EXPORTS | |
233 HMODULE module = ::LoadLibrary(exe_name_.get()); | |
234 if (NULL == module) | |
235 return SBOX_ERROR_GENERIC; | |
236 | |
237 child_var = ::GetProcAddress(module, name); | |
238 ::FreeLibrary(module); | |
239 | |
240 if (NULL == child_var) | |
241 return SBOX_ERROR_GENERIC; | |
242 | |
243 size_t offset = reinterpret_cast<char*>(child_var) - | |
244 reinterpret_cast<char*>(module); | |
245 child_var = reinterpret_cast<char*>(MainModule()) + offset; | |
246 #else | |
247 UNREFERENCED_PARAMETER(name); | |
248 #endif | |
249 | |
250 SIZE_T written; | |
251 if (!::WriteProcessMemory(sandbox_process_info_.process_handle(), | |
252 child_var, address, size, &written)) | |
253 return SBOX_ERROR_GENERIC; | |
254 | |
255 if (written != size) | |
256 return SBOX_ERROR_GENERIC; | |
257 | |
258 return SBOX_ALL_OK; | |
259 } | |
260 | |
261 // Construct the IPC server and the IPC dispatcher. When the target does | |
262 // an IPC it will eventually call the dispatcher. | |
263 DWORD TargetProcess::Init(Dispatcher* ipc_dispatcher, void* policy, | |
264 uint32 shared_IPC_size, uint32 shared_policy_size) { | |
265 // We need to map the shared memory on the target. This is necessary for | |
266 // any IPC that needs to take place, even if the target has not yet hit | |
267 // the main( ) function or even has initialized the CRT. So here we set | |
268 // the handle to the shared section. The target on the first IPC must do | |
269 // the rest, which boils down to calling MapViewofFile() | |
270 | |
271 // We use this single memory pool for IPC and for policy. | |
272 DWORD shared_mem_size = static_cast<DWORD>(shared_IPC_size + | |
273 shared_policy_size); | |
274 shared_section_.Set(::CreateFileMappingW(INVALID_HANDLE_VALUE, NULL, | |
275 PAGE_READWRITE | SEC_COMMIT, | |
276 0, shared_mem_size, NULL)); | |
277 if (!shared_section_.IsValid()) { | |
278 return ::GetLastError(); | |
279 } | |
280 | |
281 DWORD access = FILE_MAP_READ | FILE_MAP_WRITE; | |
282 HANDLE target_shared_section; | |
283 if (!::DuplicateHandle(::GetCurrentProcess(), shared_section_, | |
284 sandbox_process_info_.process_handle(), | |
285 &target_shared_section, access, FALSE, 0)) { | |
286 return ::GetLastError(); | |
287 } | |
288 | |
289 void* shared_memory = ::MapViewOfFile(shared_section_, | |
290 FILE_MAP_WRITE|FILE_MAP_READ, | |
291 0, 0, 0); | |
292 if (NULL == shared_memory) { | |
293 return ::GetLastError(); | |
294 } | |
295 | |
296 CopyPolicyToTarget(policy, shared_policy_size, | |
297 reinterpret_cast<char*>(shared_memory) + shared_IPC_size); | |
298 | |
299 ResultCode ret; | |
300 // Set the global variables in the target. These are not used on the broker. | |
301 g_shared_section = target_shared_section; | |
302 ret = TransferVariable("g_shared_section", &g_shared_section, | |
303 sizeof(g_shared_section)); | |
304 g_shared_section = NULL; | |
305 if (SBOX_ALL_OK != ret) { | |
306 return (SBOX_ERROR_GENERIC == ret)? | |
307 ::GetLastError() : ERROR_INVALID_FUNCTION; | |
308 } | |
309 g_shared_IPC_size = shared_IPC_size; | |
310 ret = TransferVariable("g_shared_IPC_size", &g_shared_IPC_size, | |
311 sizeof(g_shared_IPC_size)); | |
312 g_shared_IPC_size = 0; | |
313 if (SBOX_ALL_OK != ret) { | |
314 return (SBOX_ERROR_GENERIC == ret) ? | |
315 ::GetLastError() : ERROR_INVALID_FUNCTION; | |
316 } | |
317 g_shared_policy_size = shared_policy_size; | |
318 ret = TransferVariable("g_shared_policy_size", &g_shared_policy_size, | |
319 sizeof(g_shared_policy_size)); | |
320 g_shared_policy_size = 0; | |
321 if (SBOX_ALL_OK != ret) { | |
322 return (SBOX_ERROR_GENERIC == ret) ? | |
323 ::GetLastError() : ERROR_INVALID_FUNCTION; | |
324 } | |
325 | |
326 ipc_server_.reset( | |
327 new SharedMemIPCServer(sandbox_process_info_.process_handle(), | |
328 sandbox_process_info_.process_id(), | |
329 job_, thread_pool_, ipc_dispatcher)); | |
330 | |
331 if (!ipc_server_->Init(shared_memory, shared_IPC_size, kIPCChannelSize)) | |
332 return ERROR_NOT_ENOUGH_MEMORY; | |
333 | |
334 // After this point we cannot use this handle anymore. | |
335 ::CloseHandle(sandbox_process_info_.TakeThreadHandle()); | |
336 | |
337 return ERROR_SUCCESS; | |
338 } | |
339 | |
340 void TargetProcess::Terminate() { | |
341 if (!sandbox_process_info_.IsValid()) | |
342 return; | |
343 | |
344 ::TerminateProcess(sandbox_process_info_.process_handle(), 0); | |
345 } | |
346 | |
347 | |
348 TargetProcess* MakeTestTargetProcess(HANDLE process, HMODULE base_address) { | |
349 TargetProcess* target = new TargetProcess(NULL, NULL, NULL, NULL); | |
350 target->sandbox_process_info_.Receive()->hProcess = process; | |
351 target->base_address_ = base_address; | |
352 return target; | |
353 } | |
354 | |
355 } // namespace sandbox | |
OLD | NEW |