OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "sandbox/src/handle_dispatcher.h" | |
6 | |
7 #include "base/win/scoped_handle.h" | |
8 #include "sandbox/src/handle_interception.h" | |
9 #include "sandbox/src/handle_policy.h" | |
10 #include "sandbox/src/ipc_tags.h" | |
11 #include "sandbox/src/policy_broker.h" | |
12 #include "sandbox/src/policy_params.h" | |
13 #include "sandbox/src/sandbox.h" | |
14 #include "sandbox/src/sandbox_nt_util.h" | |
15 #include "sandbox/src/sandbox_types.h" | |
16 #include "sandbox/src/sandbox_utils.h" | |
17 | |
18 namespace sandbox { | |
19 | |
20 HandleDispatcher::HandleDispatcher(PolicyBase* policy_base) | |
21 : policy_base_(policy_base) { | |
22 static const IPCCall duplicate_handle_proxy = { | |
23 {IPC_DUPLICATEHANDLEPROXY_TAG, VOIDPTR_TYPE, ULONG_TYPE, ULONG_TYPE, | |
24 ULONG_TYPE}, | |
25 reinterpret_cast<CallbackGeneric>(&HandleDispatcher::DuplicateHandleProxy) | |
26 }; | |
27 | |
28 ipc_calls_.push_back(duplicate_handle_proxy); | |
29 } | |
30 | |
31 bool HandleDispatcher::SetupService(InterceptionManager* manager, | |
32 int service) { | |
33 // We perform no interceptions for handles right now. | |
34 switch (service) { | |
35 case IPC_DUPLICATEHANDLEPROXY_TAG: | |
36 return true; | |
37 } | |
38 | |
39 return false; | |
40 } | |
41 | |
42 bool HandleDispatcher::DuplicateHandleProxy(IPCInfo* ipc, | |
43 HANDLE source_handle, | |
44 DWORD target_process_id, | |
45 DWORD desired_access, | |
46 DWORD options) { | |
47 NTSTATUS error; | |
48 static NtQueryObject QueryObject = NULL; | |
49 if (!QueryObject) | |
50 ResolveNTFunctionPtr("NtQueryObject", &QueryObject); | |
51 | |
52 // Get a copy of the handle for use in the broker process. | |
53 base::win::ScopedHandle handle; | |
54 if (!::DuplicateHandle(ipc->client_info->process, source_handle, | |
55 ::GetCurrentProcess(), handle.Receive(), | |
56 0, FALSE, 0)) { | |
57 ipc->return_info.win32_result = ::GetLastError(); | |
58 return false; | |
59 } | |
60 | |
61 // Get the object type (32 characters is safe; current max is 14). | |
62 BYTE buffer[sizeof(OBJECT_TYPE_INFORMATION) + 32 * sizeof(wchar_t)]; | |
63 OBJECT_TYPE_INFORMATION* type_info = | |
64 reinterpret_cast<OBJECT_TYPE_INFORMATION*>(buffer); | |
65 ULONG size = sizeof(buffer) - sizeof(wchar_t); | |
66 error = QueryObject(handle, ObjectTypeInformation, type_info, size, &size); | |
67 if (!NT_SUCCESS(error)) { | |
68 ipc->return_info.win32_result = error; | |
69 return false; | |
70 } | |
71 type_info->Name.Buffer[type_info->Name.Length / sizeof(wchar_t)] = L'\0'; | |
72 | |
73 CountedParameterSet<NameBased> params; | |
74 params[NameBased::NAME] = ParamPickerMake(type_info->Name.Buffer); | |
75 | |
76 EvalResult eval = policy_base_->EvalPolicy(IPC_DUPLICATEHANDLEPROXY_TAG, | |
77 params.GetBase()); | |
78 ipc->return_info.win32_result = | |
79 HandlePolicy::DuplicateHandleProxyAction(eval, *ipc->client_info, | |
80 source_handle, | |
81 target_process_id, | |
82 &ipc->return_info.handle, | |
83 desired_access, options); | |
84 return true; | |
85 } | |
86 | |
87 } // namespace sandbox | |
88 | |
OLD | NEW |