1// Copyright (c) 2013 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "sandbox/win/src/process_thread_interception.h"
6
7#include "sandbox/win/src/crosscall_client.h"
8#include "sandbox/win/src/ipc_tags.h"
9#include "sandbox/win/src/policy_params.h"
10#include "sandbox/win/src/policy_target.h"
11#include "sandbox/win/src/sandbox_factory.h"
12#include "sandbox/win/src/sandbox_nt_util.h"
13#include "sandbox/win/src/sharedmem_ipc_client.h"
14#include "sandbox/win/src/target_services.h"
15
16namespace sandbox {
17
18SANDBOX_INTERCEPT NtExports g_nt;
19
20// Hooks NtOpenThread and proxy the call to the broker if it's trying to
21// open a thread in the same process.
22NTSTATUS WINAPI TargetNtOpenThread(NtOpenThreadFunction orig_OpenThread,
23                                   PHANDLE thread, ACCESS_MASK desired_access,
24                                   POBJECT_ATTRIBUTES object_attributes,
25                                   PCLIENT_ID client_id) {
26  NTSTATUS status = orig_OpenThread(thread, desired_access, object_attributes,
27                                    client_id);
28  if (NT_SUCCESS(status))
29    return status;
30
31  do {
32    if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled())
33      break;
34    if (!client_id)
35      break;
36
37    uint32 thread_id = 0;
38    bool should_break = false;
39    __try {
40      // We support only the calls for the current process
41      if (NULL != client_id->UniqueProcess)
42        should_break = true;
43
44      // Object attributes should be NULL or empty.
45      if (!should_break && NULL != object_attributes) {
46        if (0 != object_attributes->Attributes ||
47            NULL != object_attributes->ObjectName ||
48            NULL != object_attributes->RootDirectory ||
49            NULL != object_attributes->SecurityDescriptor ||
50            NULL != object_attributes->SecurityQualityOfService) {
51          should_break = true;
52        }
53      }
54
55      thread_id = static_cast<uint32>(
56                      reinterpret_cast<ULONG_PTR>(client_id->UniqueThread));
57    } __except(EXCEPTION_EXECUTE_HANDLER) {
58      break;
59    }
60
61    if (should_break)
62      break;
63
64    if (!ValidParameter(thread, sizeof(HANDLE), WRITE))
65      break;
66
67    void* memory = GetGlobalIPCMemory();
68    if (NULL == memory)
69      break;
70
71    SharedMemIPCClient ipc(memory);
72    CrossCallReturn answer = {0};
73    ResultCode code = CrossCall(ipc, IPC_NTOPENTHREAD_TAG, desired_access,
74                                thread_id, &answer);
75    if (SBOX_ALL_OK != code)
76      break;
77
78    if (!NT_SUCCESS(answer.nt_status))
79      // The nt_status here is most likely STATUS_INVALID_CID because
80      // in the broker we set the process id in the CID (client ID) param
81      // to be the current process. If you try to open a thread from another
82      // process you will get this INVALID_CID error. On the other hand, if you
83      // try to open a thread in your own process, it should return success.
84      // We don't want to return STATUS_INVALID_CID here, so we return the
85      // return of the original open thread status, which is most likely
86      // STATUS_ACCESS_DENIED.
87      break;
88
89    __try {
90      // Write the output parameters.
91      *thread = answer.handle;
92    } __except(EXCEPTION_EXECUTE_HANDLER) {
93      break;
94    }
95
96    return answer.nt_status;
97  } while (false);
98
99  return status;
100}
101
102// Hooks NtOpenProcess and proxy the call to the broker if it's trying to
103// open the current process.
104NTSTATUS WINAPI TargetNtOpenProcess(NtOpenProcessFunction orig_OpenProcess,
105                                   PHANDLE process, ACCESS_MASK desired_access,
106                                   POBJECT_ATTRIBUTES object_attributes,
107                                   PCLIENT_ID client_id) {
108  NTSTATUS status = orig_OpenProcess(process, desired_access, object_attributes,
109                                     client_id);
110  if (NT_SUCCESS(status))
111    return status;
112
113  do {
114    if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled())
115      break;
116    if (!client_id)
117      break;
118
119    uint32 process_id = 0;
120    bool should_break = false;
121    __try {
122      // Object attributes should be NULL or empty.
123      if (!should_break && NULL != object_attributes) {
124        if (0 != object_attributes->Attributes ||
125            NULL != object_attributes->ObjectName ||
126            NULL != object_attributes->RootDirectory ||
127            NULL != object_attributes->SecurityDescriptor ||
128            NULL != object_attributes->SecurityQualityOfService) {
129          should_break = true;
130        }
131      }
132
133      process_id = static_cast<uint32>(
134                      reinterpret_cast<ULONG_PTR>(client_id->UniqueProcess));
135    } __except(EXCEPTION_EXECUTE_HANDLER) {
136      break;
137    }
138
139    if (should_break)
140      break;
141
142    if (!ValidParameter(process, sizeof(HANDLE), WRITE))
143      break;
144
145    void* memory = GetGlobalIPCMemory();
146    if (NULL == memory)
147      break;
148
149    SharedMemIPCClient ipc(memory);
150    CrossCallReturn answer = {0};
151    ResultCode code = CrossCall(ipc, IPC_NTOPENPROCESS_TAG, desired_access,
152                                process_id, &answer);
153    if (SBOX_ALL_OK != code)
154      break;
155
156    if (!NT_SUCCESS(answer.nt_status))
157      return answer.nt_status;
158
159    __try {
160      // Write the output parameters.
161      *process = answer.handle;
162    } __except(EXCEPTION_EXECUTE_HANDLER) {
163      break;
164    }
165
166    return answer.nt_status;
167  } while (false);
168
169  return status;
170}
171
172
173NTSTATUS WINAPI TargetNtOpenProcessToken(
174    NtOpenProcessTokenFunction orig_OpenProcessToken, HANDLE process,
175    ACCESS_MASK desired_access, PHANDLE token) {
176  NTSTATUS status = orig_OpenProcessToken(process, desired_access, token);
177  if (NT_SUCCESS(status))
178    return status;
179
180  do {
181    if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled())
182      break;
183
184    if (CURRENT_PROCESS != process)
185      break;
186
187    if (!ValidParameter(token, sizeof(HANDLE), WRITE))
188      break;
189
190    void* memory = GetGlobalIPCMemory();
191    if (NULL == memory)
192      break;
193
194    SharedMemIPCClient ipc(memory);
195    CrossCallReturn answer = {0};
196    ResultCode code = CrossCall(ipc, IPC_NTOPENPROCESSTOKEN_TAG, process,
197                                desired_access, &answer);
198    if (SBOX_ALL_OK != code)
199      break;
200
201    if (!NT_SUCCESS(answer.nt_status))
202      return answer.nt_status;
203
204    __try {
205      // Write the output parameters.
206      *token = answer.handle;
207    } __except(EXCEPTION_EXECUTE_HANDLER) {
208      break;
209    }
210
211    return answer.nt_status;
212  } while (false);
213
214  return status;
215}
216
217NTSTATUS WINAPI TargetNtOpenProcessTokenEx(
218    NtOpenProcessTokenExFunction orig_OpenProcessTokenEx, HANDLE process,
219    ACCESS_MASK desired_access, ULONG handle_attributes, PHANDLE token) {
220  NTSTATUS status = orig_OpenProcessTokenEx(process, desired_access,
221                                            handle_attributes, token);
222  if (NT_SUCCESS(status))
223    return status;
224
225  do {
226    if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled())
227      break;
228
229    if (CURRENT_PROCESS != process)
230      break;
231
232    if (!ValidParameter(token, sizeof(HANDLE), WRITE))
233      break;
234
235    void* memory = GetGlobalIPCMemory();
236    if (NULL == memory)
237      break;
238
239    SharedMemIPCClient ipc(memory);
240    CrossCallReturn answer = {0};
241    ResultCode code = CrossCall(ipc, IPC_NTOPENPROCESSTOKENEX_TAG, process,
242                                desired_access, handle_attributes, &answer);
243    if (SBOX_ALL_OK != code)
244      break;
245
246    if (!NT_SUCCESS(answer.nt_status))
247      return answer.nt_status;
248
249    __try {
250      // Write the output parameters.
251      *token = answer.handle;
252    } __except(EXCEPTION_EXECUTE_HANDLER) {
253      break;
254    }
255
256    return answer.nt_status;
257  } while (false);
258
259  return status;
260}
261
262BOOL WINAPI TargetCreateProcessW(CreateProcessWFunction orig_CreateProcessW,
263                                 LPCWSTR application_name, LPWSTR command_line,
264                                 LPSECURITY_ATTRIBUTES process_attributes,
265                                 LPSECURITY_ATTRIBUTES thread_attributes,
266                                 BOOL inherit_handles, DWORD flags,
267                                 LPVOID environment, LPCWSTR current_directory,
268                                 LPSTARTUPINFOW startup_info,
269                                 LPPROCESS_INFORMATION process_information) {
270  if (orig_CreateProcessW(application_name, command_line, process_attributes,
271                          thread_attributes, inherit_handles, flags,
272                          environment, current_directory, startup_info,
273                          process_information)) {
274    return TRUE;
275  }
276
277  // We don't trust that the IPC can work this early.
278  if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled())
279    return FALSE;
280
281  DWORD original_error = ::GetLastError();
282
283  do {
284    if (!ValidParameter(process_information, sizeof(PROCESS_INFORMATION),
285                        WRITE))
286      break;
287
288    void* memory = GetGlobalIPCMemory();
289    if (NULL == memory)
290      break;
291
292    const wchar_t* cur_dir = NULL;
293
294    wchar_t current_directory[MAX_PATH];
295    DWORD result = ::GetCurrentDirectory(MAX_PATH, current_directory);
296    if (0 != result && result < MAX_PATH)
297      cur_dir = current_directory;
298
299    SharedMemIPCClient ipc(memory);
300    CrossCallReturn answer = {0};
301
302    InOutCountedBuffer proc_info(process_information,
303                                 sizeof(PROCESS_INFORMATION));
304
305    ResultCode code = CrossCall(ipc, IPC_CREATEPROCESSW_TAG, application_name,
306                                command_line, cur_dir, proc_info, &answer);
307    if (SBOX_ALL_OK != code)
308      break;
309
310    ::SetLastError(answer.win32_result);
311    if (ERROR_SUCCESS != answer.win32_result)
312      return FALSE;
313
314    return TRUE;
315  } while (false);
316
317  ::SetLastError(original_error);
318  return FALSE;
319}
320
321BOOL WINAPI TargetCreateProcessA(CreateProcessAFunction orig_CreateProcessA,
322                                 LPCSTR application_name, LPSTR command_line,
323                                 LPSECURITY_ATTRIBUTES process_attributes,
324                                 LPSECURITY_ATTRIBUTES thread_attributes,
325                                 BOOL inherit_handles, DWORD flags,
326                                 LPVOID environment, LPCSTR current_directory,
327                                 LPSTARTUPINFOA startup_info,
328                                 LPPROCESS_INFORMATION process_information) {
329  if (orig_CreateProcessA(application_name, command_line, process_attributes,
330                          thread_attributes, inherit_handles, flags,
331                          environment, current_directory, startup_info,
332                          process_information)) {
333    return TRUE;
334  }
335
336  // We don't trust that the IPC can work this early.
337  if (!SandboxFactory::GetTargetServices()->GetState()->InitCalled())
338    return FALSE;
339
340  DWORD original_error = ::GetLastError();
341
342  do {
343    if (!ValidParameter(process_information, sizeof(PROCESS_INFORMATION),
344                        WRITE))
345      break;
346
347    void* memory = GetGlobalIPCMemory();
348    if (NULL == memory)
349      break;
350
351    // Convert the input params to unicode.
352    UNICODE_STRING *cmd_unicode = NULL;
353    UNICODE_STRING *app_unicode = NULL;
354    if (command_line) {
355      cmd_unicode = AnsiToUnicode(command_line);
356      if (!cmd_unicode)
357        break;
358    }
359
360    if (application_name) {
361      app_unicode = AnsiToUnicode(application_name);
362      if (!app_unicode) {
363        operator delete(cmd_unicode, NT_ALLOC);
364        break;
365      }
366    }
367
368    const wchar_t* cmd_line = cmd_unicode ? cmd_unicode->Buffer : NULL;
369    const wchar_t* app_name = app_unicode ? app_unicode->Buffer : NULL;
370    const wchar_t* cur_dir = NULL;
371
372    wchar_t current_directory[MAX_PATH];
373    DWORD result = ::GetCurrentDirectory(MAX_PATH, current_directory);
374    if (0 != result && result < MAX_PATH)
375      cur_dir = current_directory;
376
377    SharedMemIPCClient ipc(memory);
378    CrossCallReturn answer = {0};
379
380    InOutCountedBuffer proc_info(process_information,
381                                 sizeof(PROCESS_INFORMATION));
382
383    ResultCode code = CrossCall(ipc, IPC_CREATEPROCESSW_TAG, app_name,
384                                cmd_line, cur_dir, proc_info, &answer);
385
386    operator delete(cmd_unicode, NT_ALLOC);
387    operator delete(app_unicode, NT_ALLOC);
388
389    if (SBOX_ALL_OK != code)
390      break;
391
392    ::SetLastError(answer.win32_result);
393    if (ERROR_SUCCESS != answer.win32_result)
394      return FALSE;
395
396    return TRUE;
397  } while (false);
398
399  ::SetLastError(original_error);
400  return FALSE;
401}
402
403}  // namespace sandbox
404