security/sandbox/win/src/interception_agent.h

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved.
     2 // Use of this source code is governed by a BSD-style license that can be
     3 // found in the LICENSE file.
     5 // Defines InterceptionAgent, the class in charge of setting up interceptions
     6 // from the inside of the sandboxed process. For more details see
     7 // http://dev.chromium.org/developers/design-documents/sandbox .
     9 #ifndef SANDBOX_SRC_INTERCEPTION_AGENT_H__
    10 #define SANDBOX_SRC_INTERCEPTION_AGENT_H__
    12 #include "base/basictypes.h"
    13 #include "sandbox/win/src/nt_internals.h"
    14 #include "sandbox/win/src/sandbox_types.h"
    16 namespace sandbox {
    18 // Internal structures used for communication between the broker and the target.
    19 struct DllInterceptionData;
    20 struct SharedMemory;
    21 struct DllPatchInfo;
    23 class ResolverThunk;
    25 // The InterceptionAgent executes on the target application, and it is in charge
    26 // of setting up the desired interceptions or indicating what module needs to
    27 // be unloaded.
    28 //
    29 // The exposed API consists of three methods: GetInterceptionAgent to retrieve
    30 // the single class instance, OnDllLoad and OnDllUnload to process a dll being
    31 // loaded and unloaded respectively.
    32 //
    33 // This class assumes that it will get called for every dll being loaded,
    34 // starting with kernel32, so the singleton will be instantiated from within the
    35 // loader lock.
    36 class InterceptionAgent {
    37  public:
    38   // Returns the single InterceptionAgent object for this process.
    39   static InterceptionAgent* GetInterceptionAgent();
    41   // This method should be invoked whenever a new dll is loaded to perform the
    42   // required patches. If the return value is false, this dll should not be
    43   // allowed to load.
    44   //
    45   // full_path is the (optional) full name of the module being loaded and name
    46   // is the internal module name. If full_path is provided, it will be used
    47   // before the internal name to determine if we care about this dll.
    48   bool OnDllLoad(const UNICODE_STRING* full_path, const UNICODE_STRING* name,
    49                  void* base_address);
    51   // Performs cleanup when a dll is unloaded.
    52   void OnDllUnload(void* base_address);
    54  private:
    55   ~InterceptionAgent() {}
    57   // Performs initialization of the singleton.
    58   bool Init(SharedMemory* shared_memory);
    60   // Returns true if we are interested on this dll. dll_info is an entry of the
    61   // list of intercepted dlls.
    62   bool DllMatch(const UNICODE_STRING* full_path, const UNICODE_STRING* name,
    63                 const DllPatchInfo* dll_info);
    65   // Performs the patching of the dll loaded at base_address.
    66   // The patches to perform are described on dll_info, and thunks is the thunk
    67   // storage for the whole dll.
    68   // Returns true on success.
    69   bool PatchDll(const DllPatchInfo* dll_info, DllInterceptionData* thunks);
    71   // Returns a resolver for a given interception type.
    72   ResolverThunk* GetResolver(InterceptionType type);
    74   // Shared memory containing the list of functions to intercept.
    75   SharedMemory* interceptions_;
    77   // Array of thunk data buffers for the intercepted dlls. This object singleton
    78   // is allocated with a placement new with enough space to hold the complete
    79   // array of pointers, not just the first element.
    80   DllInterceptionData* dlls_[1];
    82   DISALLOW_IMPLICIT_CONSTRUCTORS(InterceptionAgent);
    83 };
    85 }  // namespace sandbox
    87 #endif  // SANDBOX_SRC_INTERCEPTION_AGENT_H__

mercurial