| // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "sandbox/src/target_process.h" |
| |
| #include "base/basictypes.h" |
| #include "base/memory/scoped_ptr.h" |
| #include "base/win/pe_image.h" |
| #include "sandbox/src/crosscall_server.h" |
| #include "sandbox/src/crosscall_client.h" |
| #include "sandbox/src/policy_low_level.h" |
| #include "sandbox/src/sandbox_types.h" |
| #include "sandbox/src/sharedmem_ipc_server.h" |
| |
| namespace { |
| |
| void TerminateTarget(PROCESS_INFORMATION* pi) { |
| ::CloseHandle(pi->hThread); |
| ::TerminateProcess(pi->hProcess, 0); |
| ::CloseHandle(pi->hProcess); |
| } |
| |
| void CopyPolicyToTarget(const void* source, size_t size, void* dest) { |
| if (!source || !size) |
| return; |
| memcpy(dest, source, size); |
| sandbox::PolicyGlobal* policy = |
| reinterpret_cast<sandbox::PolicyGlobal*>(dest); |
| |
| size_t offset = reinterpret_cast<size_t>(source); |
| |
| for (size_t i = 0; i < sandbox::kMaxServiceCount; i++) { |
| size_t buffer = reinterpret_cast<size_t>(policy->entry[i]); |
| if (buffer) { |
| buffer -= offset; |
| policy->entry[i] = reinterpret_cast<sandbox::PolicyBuffer*>(buffer); |
| } |
| } |
| } |
| |
| } |
| |
| namespace sandbox { |
| |
| SANDBOX_INTERCEPT HANDLE g_shared_section; |
| SANDBOX_INTERCEPT size_t g_shared_IPC_size; |
| SANDBOX_INTERCEPT size_t g_shared_policy_size; |
| |
| // Returns the address of the main exe module in memory taking in account |
| // address space layout randomization. |
| void* GetBaseAddress(const wchar_t* exe_name, void* entry_point) { |
| HMODULE exe = ::LoadLibrary(exe_name); |
| if (NULL == exe) |
| return exe; |
| |
| base::win::PEImage pe(exe); |
| if (!pe.VerifyMagic()) { |
| ::FreeLibrary(exe); |
| return exe; |
| } |
| PIMAGE_NT_HEADERS nt_header = pe.GetNTHeaders(); |
| char* base = reinterpret_cast<char*>(entry_point) - |
| nt_header->OptionalHeader.AddressOfEntryPoint; |
| |
| ::FreeLibrary(exe); |
| return base; |
| } |
| |
| |
| TargetProcess::TargetProcess(HANDLE initial_token, HANDLE lockdown_token, |
| HANDLE job, ThreadProvider* thread_pool) |
| // This object owns everything initialized here except thread_pool and |
| // the job_ handle. The Job handle is closed by BrokerServices and results |
| // eventually in a call to our dtor. |
| : lockdown_token_(lockdown_token), |
| initial_token_(initial_token), |
| job_(job), |
| shared_section_(NULL), |
| ipc_server_(NULL), |
| thread_pool_(thread_pool), |
| base_address_(NULL), |
| exe_name_(NULL), |
| sandbox_process_(NULL), |
| sandbox_thread_(NULL), |
| sandbox_process_id_(0) { |
| } |
| |
| TargetProcess::~TargetProcess() { |
| DWORD exit_code = 0; |
| // Give a chance to the process to die. In most cases the JOB_KILL_ON_CLOSE |
| // will take effect only when the context changes. As far as the testing went, |
| // this wait was enough to switch context and kill the processes in the job. |
| // If this process is already dead, the function will return without waiting. |
| // TODO(nsylvain): If the process is still alive at the end, we should kill |
| // it. http://b/893891 |
| // For now, this wait is there only to do a best effort to prevent some leaks |
| // from showing up in purify. |
| ::WaitForSingleObject(sandbox_process_, 50); |
| if (!::GetExitCodeProcess(sandbox_process_, &exit_code) || |
| (STILL_ACTIVE == exit_code)) { |
| // It is an error to destroy this object while the target process is still |
| // alive because we need to destroy the IPC subsystem and cannot risk to |
| // have an IPC reach us after this point. |
| return; |
| } |
| |
| delete ipc_server_; |
| |
| ::CloseHandle(lockdown_token_); |
| ::CloseHandle(initial_token_); |
| ::CloseHandle(sandbox_process_); |
| if (shared_section_) |
| ::CloseHandle(shared_section_); |
| free(exe_name_); |
| } |
| |
| // Creates the target (child) process suspended and assigns it to the job |
| // object. |
| DWORD TargetProcess::Create(const wchar_t* exe_path, |
| const wchar_t* command_line, |
| const wchar_t* desktop, |
| PROCESS_INFORMATION* target_info) { |
| exe_name_ = _wcsdup(exe_path); |
| |
| // the command line needs to be writable by CreateProcess(). |
| scoped_ptr_malloc<wchar_t> cmd_line(_wcsdup(command_line)); |
| scoped_ptr_malloc<wchar_t> desktop_name(desktop ? _wcsdup(desktop) : NULL); |
| |
| // Start the target process suspended. |
| const DWORD flags = CREATE_SUSPENDED | CREATE_BREAKAWAY_FROM_JOB | |
| CREATE_UNICODE_ENVIRONMENT | DETACHED_PROCESS; |
| |
| STARTUPINFO startup_info = {sizeof(STARTUPINFO)}; |
| if (desktop) { |
| startup_info.lpDesktop = desktop_name.get(); |
| } |
| |
| PROCESS_INFORMATION process_info = {0}; |
| |
| if (!::CreateProcessAsUserW(lockdown_token_, |
| exe_path, |
| cmd_line.get(), |
| NULL, // No security attribute. |
| NULL, // No thread attribute. |
| FALSE, // Do not inherit handles. |
| flags, |
| NULL, // Use the environment of the caller. |
| NULL, // Use current directory of the caller. |
| &startup_info, |
| &process_info)) { |
| return ::GetLastError(); |
| } |
| |
| DWORD win_result = ERROR_SUCCESS; |
| |
| // Assign the suspended target to the windows job object |
| if (!::AssignProcessToJobObject(job_, process_info.hProcess)) { |
| win_result = ::GetLastError(); |
| // It might be a security breach if we let the target run outside the job |
| // so kill it before it causes damage |
| TerminateTarget(&process_info); |
| return win_result; |
| } |
| |
| // Change the token of the main thread of the new process for the |
| // impersonation token with more rights. This allows the target to start; |
| // otherwise it will crash too early for us to help. |
| if (!SetThreadToken(&process_info.hThread, initial_token_)) { |
| win_result = ::GetLastError(); |
| TerminateTarget(&process_info); |
| return win_result; |
| } |
| |
| CONTEXT context; |
| context.ContextFlags = CONTEXT_ALL; |
| if (!::GetThreadContext(process_info.hThread, &context)) { |
| win_result = ::GetLastError(); |
| TerminateTarget(&process_info); |
| return win_result; |
| } |
| |
| sandbox_process_ = process_info.hProcess; |
| sandbox_thread_ = process_info.hThread; |
| sandbox_process_id_ = process_info.dwProcessId; |
| |
| #if defined(_WIN64) |
| void* entry_point = reinterpret_cast<void*>(context.Rcx); |
| #else |
| #pragma warning(push) |
| #pragma warning(disable: 4312) |
| // This cast generates a warning because it is 32 bit specific. |
| void* entry_point = reinterpret_cast<void*>(context.Eax); |
| #pragma warning(pop) |
| #endif // _WIN64 |
| base_address_ = GetBaseAddress(exe_path, entry_point); |
| *target_info = process_info; |
| return win_result; |
| } |
| |
| ResultCode TargetProcess::TransferVariable(char* name, void* address, |
| size_t size) { |
| if (NULL == sandbox_process_) |
| return SBOX_ERROR_UNEXPECTED_CALL; |
| |
| void* child_var = address; |
| |
| #if SANDBOX_EXPORTS |
| HMODULE module = ::LoadLibrary(exe_name_); |
| if (NULL == module) |
| return SBOX_ERROR_GENERIC; |
| |
| child_var = ::GetProcAddress(module, name); |
| ::FreeLibrary(module); |
| |
| if (NULL == child_var) |
| return SBOX_ERROR_GENERIC; |
| |
| size_t offset = reinterpret_cast<char*>(child_var) - |
| reinterpret_cast<char*>(module); |
| child_var = reinterpret_cast<char*>(MainModule()) + offset; |
| #else |
| UNREFERENCED_PARAMETER(name); |
| #endif |
| |
| SIZE_T written; |
| if (!::WriteProcessMemory(sandbox_process_, child_var, address, size, |
| &written)) |
| return SBOX_ERROR_GENERIC; |
| |
| if (written != size) |
| return SBOX_ERROR_GENERIC; |
| |
| return SBOX_ALL_OK; |
| } |
| |
| // Construct the IPC server and the IPC dispatcher. When the target does |
| // an IPC it will eventually call the dispatcher. |
| DWORD TargetProcess::Init(Dispatcher* ipc_dispatcher, void* policy, |
| size_t shared_IPC_size, size_t shared_policy_size) { |
| // We need to map the shared memory on the target. This is necessary for |
| // any IPC that needs to take place, even if the target has not yet hit |
| // the main( ) function or even has initialized the CRT. So here we set |
| // the handle to the shared section. The target on the first IPC must do |
| // the rest, which boils down to calling MapViewofFile() |
| |
| // We use this single memory pool for IPC and for policy. |
| DWORD shared_mem_size = static_cast<DWORD>(shared_IPC_size + |
| shared_policy_size); |
| shared_section_ = ::CreateFileMappingW(INVALID_HANDLE_VALUE, NULL, |
| PAGE_READWRITE | SEC_COMMIT, |
| 0, shared_mem_size, NULL); |
| if (NULL == shared_section_) { |
| return ::GetLastError(); |
| } |
| |
| DWORD access = FILE_MAP_READ | FILE_MAP_WRITE; |
| HANDLE target_shared_section = NULL; |
| if (!::DuplicateHandle(::GetCurrentProcess(), shared_section_, |
| sandbox_process_, &target_shared_section, |
| access, FALSE, 0)) { |
| return ::GetLastError(); |
| } |
| |
| void* shared_memory = ::MapViewOfFile(shared_section_, |
| FILE_MAP_WRITE|FILE_MAP_READ, |
| 0, 0, 0); |
| if (NULL == shared_memory) { |
| return ::GetLastError(); |
| } |
| |
| CopyPolicyToTarget(policy, shared_policy_size, |
| reinterpret_cast<char*>(shared_memory) + shared_IPC_size); |
| |
| ResultCode ret; |
| // Set the global variables in the target. These are not used on the broker. |
| g_shared_section = target_shared_section; |
| ret = TransferVariable("g_shared_section", &g_shared_section, |
| sizeof(g_shared_section)); |
| g_shared_section = NULL; |
| if (SBOX_ALL_OK != ret) { |
| return (SBOX_ERROR_GENERIC == ret)? |
| ::GetLastError() : ERROR_INVALID_FUNCTION; |
| } |
| g_shared_IPC_size = shared_IPC_size; |
| ret = TransferVariable("g_shared_IPC_size", &g_shared_IPC_size, |
| sizeof(g_shared_IPC_size)); |
| g_shared_IPC_size = 0; |
| if (SBOX_ALL_OK != ret) { |
| return (SBOX_ERROR_GENERIC == ret) ? |
| ::GetLastError() : ERROR_INVALID_FUNCTION; |
| } |
| g_shared_policy_size = shared_policy_size; |
| ret = TransferVariable("g_shared_policy_size", &g_shared_policy_size, |
| sizeof(g_shared_policy_size)); |
| g_shared_policy_size = 0; |
| if (SBOX_ALL_OK != ret) { |
| return (SBOX_ERROR_GENERIC == ret) ? |
| ::GetLastError() : ERROR_INVALID_FUNCTION; |
| } |
| |
| ipc_server_ = new SharedMemIPCServer(sandbox_process_, sandbox_process_id_, |
| job_, thread_pool_, ipc_dispatcher); |
| |
| if (!ipc_server_->Init(shared_memory, shared_IPC_size, kIPCChannelSize)) |
| return ERROR_NOT_ENOUGH_MEMORY; |
| |
| // After this point we cannot use this handle anymore. |
| sandbox_thread_ = NULL; |
| |
| return ERROR_SUCCESS; |
| } |
| |
| void TargetProcess::Terminate() { |
| if (NULL == sandbox_process_) |
| return; |
| |
| ::TerminateProcess(sandbox_process_, 0); |
| } |
| |
| |
| TargetProcess* MakeTestTargetProcess(HANDLE process, HMODULE base_address) { |
| TargetProcess* target = new TargetProcess(NULL, NULL, NULL, NULL); |
| target->sandbox_process_ = process; |
| target->base_address_ = base_address; |
| return target; |
| } |
| |
| } // namespace sandbox |