|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
|
2 // Use of this source code is governed by a BSD-style license that can be |
|
3 // found in the LICENSE file. |
|
4 |
|
5 #include "sandbox/win/src/target_services.h" |
|
6 |
|
7 #include <process.h> |
|
8 |
|
9 #include "base/basictypes.h" |
|
10 #include "sandbox/win/src/crosscall_client.h" |
|
11 #include "sandbox/win/src/handle_closer_agent.h" |
|
12 #include "sandbox/win/src/handle_interception.h" |
|
13 #include "sandbox/win/src/ipc_tags.h" |
|
14 #include "sandbox/win/src/process_mitigations.h" |
|
15 #include "sandbox/win/src/restricted_token_utils.h" |
|
16 #include "sandbox/win/src/sandbox.h" |
|
17 #include "sandbox/win/src/sandbox_types.h" |
|
18 #include "sandbox/win/src/sharedmem_ipc_client.h" |
|
19 #include "sandbox/win/src/sandbox_nt_util.h" |
|
20 |
|
21 namespace { |
|
22 |
|
23 // Flushing a cached key is triggered by just opening the key and closing the |
|
24 // resulting handle. RegDisablePredefinedCache() is the documented way to flush |
|
25 // HKCU so do not use it with this function. |
|
26 bool FlushRegKey(HKEY root) { |
|
27 HKEY key; |
|
28 if (ERROR_SUCCESS == ::RegOpenKeyExW(root, NULL, 0, MAXIMUM_ALLOWED, &key)) { |
|
29 if (ERROR_SUCCESS != ::RegCloseKey(key)) |
|
30 return false; |
|
31 } |
|
32 return true; |
|
33 } |
|
34 |
|
35 // This function forces advapi32.dll to release some internally cached handles |
|
36 // that were made during calls to RegOpenkey and RegOpenKeyEx if it is called |
|
37 // with a more restrictive token. Returns true if the flushing is succesful |
|
38 // although this behavior is undocumented and there is no guarantee that in |
|
39 // fact this will happen in future versions of windows. |
|
40 bool FlushCachedRegHandles() { |
|
41 return (FlushRegKey(HKEY_LOCAL_MACHINE) && |
|
42 FlushRegKey(HKEY_CLASSES_ROOT) && |
|
43 FlushRegKey(HKEY_USERS)); |
|
44 } |
|
45 |
|
46 // Checks if we have handle entries pending and runs the closer. |
|
47 bool CloseOpenHandles() { |
|
48 if (sandbox::HandleCloserAgent::NeedsHandlesClosed()) { |
|
49 sandbox::HandleCloserAgent handle_closer; |
|
50 |
|
51 handle_closer.InitializeHandlesToClose(); |
|
52 if (!handle_closer.CloseHandles()) |
|
53 return false; |
|
54 } |
|
55 |
|
56 return true; |
|
57 } |
|
58 |
|
59 } // namespace |
|
60 |
|
61 namespace sandbox { |
|
62 |
|
63 SANDBOX_INTERCEPT IntegrityLevel g_shared_delayed_integrity_level = |
|
64 INTEGRITY_LEVEL_LAST; |
|
65 SANDBOX_INTERCEPT MitigationFlags g_shared_delayed_mitigations = 0; |
|
66 |
|
67 TargetServicesBase::TargetServicesBase() { |
|
68 } |
|
69 |
|
70 ResultCode TargetServicesBase::Init() { |
|
71 process_state_.SetInitCalled(); |
|
72 return SBOX_ALL_OK; |
|
73 } |
|
74 |
|
75 // Failure here is a breach of security so the process is terminated. |
|
76 void TargetServicesBase::LowerToken() { |
|
77 if (ERROR_SUCCESS != |
|
78 SetProcessIntegrityLevel(g_shared_delayed_integrity_level)) |
|
79 ::TerminateProcess(::GetCurrentProcess(), SBOX_FATAL_INTEGRITY); |
|
80 process_state_.SetRevertedToSelf(); |
|
81 // If the client code as called RegOpenKey, advapi32.dll has cached some |
|
82 // handles. The following code gets rid of them. |
|
83 if (!::RevertToSelf()) |
|
84 ::TerminateProcess(::GetCurrentProcess(), SBOX_FATAL_DROPTOKEN); |
|
85 if (!FlushCachedRegHandles()) |
|
86 ::TerminateProcess(::GetCurrentProcess(), SBOX_FATAL_FLUSHANDLES); |
|
87 if (ERROR_SUCCESS != ::RegDisablePredefinedCache()) |
|
88 ::TerminateProcess(::GetCurrentProcess(), SBOX_FATAL_CACHEDISABLE); |
|
89 if (!CloseOpenHandles()) |
|
90 ::TerminateProcess(::GetCurrentProcess(), SBOX_FATAL_CLOSEHANDLES); |
|
91 // Enabling mitigations must happen last otherwise handle closing breaks |
|
92 if (g_shared_delayed_mitigations && |
|
93 !ApplyProcessMitigationsToCurrentProcess(g_shared_delayed_mitigations)) |
|
94 ::TerminateProcess(::GetCurrentProcess(), SBOX_FATAL_MITIGATION); |
|
95 } |
|
96 |
|
97 ProcessState* TargetServicesBase::GetState() { |
|
98 return &process_state_; |
|
99 } |
|
100 |
|
101 TargetServicesBase* TargetServicesBase::GetInstance() { |
|
102 static TargetServicesBase instance; |
|
103 return &instance; |
|
104 } |
|
105 |
|
106 // The broker services a 'test' IPC service with the IPC_PING_TAG tag. |
|
107 bool TargetServicesBase::TestIPCPing(int version) { |
|
108 void* memory = GetGlobalIPCMemory(); |
|
109 if (NULL == memory) { |
|
110 return false; |
|
111 } |
|
112 SharedMemIPCClient ipc(memory); |
|
113 CrossCallReturn answer = {0}; |
|
114 |
|
115 if (1 == version) { |
|
116 uint32 tick1 = ::GetTickCount(); |
|
117 uint32 cookie = 717115; |
|
118 ResultCode code = CrossCall(ipc, IPC_PING1_TAG, cookie, &answer); |
|
119 |
|
120 if (SBOX_ALL_OK != code) { |
|
121 return false; |
|
122 } |
|
123 // We should get two extended returns values from the IPC, one is the |
|
124 // tick count on the broker and the other is the cookie times two. |
|
125 if ((answer.extended_count != 2)) { |
|
126 return false; |
|
127 } |
|
128 // We test the first extended answer to be within the bounds of the tick |
|
129 // count only if there was no tick count wraparound. |
|
130 uint32 tick2 = ::GetTickCount(); |
|
131 if (tick2 >= tick1) { |
|
132 if ((answer.extended[0].unsigned_int < tick1) || |
|
133 (answer.extended[0].unsigned_int > tick2)) { |
|
134 return false; |
|
135 } |
|
136 } |
|
137 |
|
138 if (answer.extended[1].unsigned_int != cookie * 2) { |
|
139 return false; |
|
140 } |
|
141 } else if (2 == version) { |
|
142 uint32 cookie = 717111; |
|
143 InOutCountedBuffer counted_buffer(&cookie, sizeof(cookie)); |
|
144 ResultCode code = CrossCall(ipc, IPC_PING2_TAG, counted_buffer, &answer); |
|
145 |
|
146 if (SBOX_ALL_OK != code) { |
|
147 return false; |
|
148 } |
|
149 if (cookie != 717111 * 3) { |
|
150 return false; |
|
151 } |
|
152 } else { |
|
153 return false; |
|
154 } |
|
155 return true; |
|
156 } |
|
157 |
|
158 bool ProcessState::IsKernel32Loaded() { |
|
159 return process_state_ != 0; |
|
160 } |
|
161 |
|
162 bool ProcessState::InitCalled() { |
|
163 return process_state_ > 1; |
|
164 } |
|
165 |
|
166 bool ProcessState::RevertedToSelf() { |
|
167 return process_state_ > 2; |
|
168 } |
|
169 |
|
170 void ProcessState::SetKernel32Loaded() { |
|
171 if (!process_state_) |
|
172 process_state_ = 1; |
|
173 } |
|
174 |
|
175 void ProcessState::SetInitCalled() { |
|
176 if (process_state_ < 2) |
|
177 process_state_ = 2; |
|
178 } |
|
179 |
|
180 void ProcessState::SetRevertedToSelf() { |
|
181 if (process_state_ < 3) |
|
182 process_state_ = 3; |
|
183 } |
|
184 |
|
185 ResultCode TargetServicesBase::DuplicateHandle(HANDLE source_handle, |
|
186 DWORD target_process_id, |
|
187 HANDLE* target_handle, |
|
188 DWORD desired_access, |
|
189 DWORD options) { |
|
190 return sandbox::DuplicateHandleProxy(source_handle, target_process_id, |
|
191 target_handle, desired_access, options); |
|
192 } |
|
193 |
|
194 } // namespace sandbox |