OLD | NEW |
(Empty) | |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. |
| 4 |
| 5 #include "sandbox/src/handle_dispatcher.h" |
| 6 |
| 7 #include "base/win/scoped_handle.h" |
| 8 #include "sandbox/src/handle_interception.h" |
| 9 #include "sandbox/src/handle_policy.h" |
| 10 #include "sandbox/src/ipc_tags.h" |
| 11 #include "sandbox/src/policy_broker.h" |
| 12 #include "sandbox/src/policy_params.h" |
| 13 #include "sandbox/src/sandbox.h" |
| 14 #include "sandbox/src/sandbox_nt_util.h" |
| 15 #include "sandbox/src/sandbox_types.h" |
| 16 #include "sandbox/src/sandbox_utils.h" |
| 17 |
| 18 namespace sandbox { |
| 19 |
| 20 HandleDispatcher::HandleDispatcher(PolicyBase* policy_base) |
| 21 : policy_base_(policy_base) { |
| 22 static const IPCCall duplicate_handle_proxy = { |
| 23 {IPC_DUPLICATEHANDLEPROXY_TAG, VOIDPTR_TYPE, ULONG_TYPE, ULONG_TYPE, |
| 24 ULONG_TYPE, ULONG_TYPE}, |
| 25 reinterpret_cast<CallbackGeneric>(&HandleDispatcher::DuplicateHandleProxy) |
| 26 }; |
| 27 |
| 28 ipc_calls_.push_back(duplicate_handle_proxy); |
| 29 } |
| 30 |
| 31 bool HandleDispatcher::SetupService(InterceptionManager* manager, |
| 32 int service) { |
| 33 // We perform no interceptions for handles right now. |
| 34 switch (service) { |
| 35 case IPC_DUPLICATEHANDLEPROXY_TAG: |
| 36 return true; |
| 37 } |
| 38 |
| 39 return false; |
| 40 } |
| 41 |
| 42 bool HandleDispatcher::DuplicateHandleProxy(IPCInfo* ipc, |
| 43 HANDLE source_handle, |
| 44 DWORD target_process_id, |
| 45 DWORD desired_access, |
| 46 BOOL inherit_handle, |
| 47 DWORD options) { |
| 48 NTSTATUS error; |
| 49 static NtQueryObject QueryObject = NULL; |
| 50 if (!QueryObject) |
| 51 ResolveNTFunctionPtr("NtQueryObject", &QueryObject); |
| 52 |
| 53 // Get a copy of the handle for use in the broker process. |
| 54 base::win::ScopedHandle handle; |
| 55 if (!::DuplicateHandle(ipc->client_info->process, source_handle, |
| 56 ::GetCurrentProcess(), handle.Receive(), |
| 57 0, FALSE, DUPLICATE_SAME_ACCESS)) { |
| 58 ipc->return_info.win32_result = ::GetLastError(); |
| 59 return false; |
| 60 } |
| 61 |
| 62 // Get the object type (32 characters is safe; current max is 14). |
| 63 BYTE buffer[sizeof(OBJECT_TYPE_INFORMATION) + 32 * sizeof(wchar_t)]; |
| 64 OBJECT_TYPE_INFORMATION* type_info = |
| 65 reinterpret_cast<OBJECT_TYPE_INFORMATION*>(buffer); |
| 66 ULONG size = sizeof(buffer) - sizeof(wchar_t); |
| 67 error = QueryObject(handle, ObjectTypeInformation, type_info, size, &size); |
| 68 if (!NT_SUCCESS(error)) { |
| 69 ipc->return_info.win32_result = error; |
| 70 return false; |
| 71 } |
| 72 type_info->Name.Buffer[type_info->Name.Length / sizeof(wchar_t)] = L'\0'; |
| 73 |
| 74 CountedParameterSet<NameBased> params; |
| 75 params[NameBased::NAME] = ParamPickerMake(type_info->Name.Buffer); |
| 76 |
| 77 EvalResult eval = policy_base_->EvalPolicy(IPC_DUPLICATEHANDLEPROXY_TAG, |
| 78 params.GetBase()); |
| 79 ipc->return_info.win32_result = |
| 80 HandlePolicy::DuplicateHandleProxyAction(eval, *ipc->client_info, |
| 81 source_handle, |
| 82 target_process_id, |
| 83 &ipc->return_info.handle, |
| 84 desired_access, |
| 85 inherit_handle, options); |
| 86 return true; |
| 87 } |
| 88 |
| 89 } // namespace sandbox |
| 90 |
OLD | NEW |