• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // Copyright (c) 2006-2010 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4 
5 #include "sandbox/win/src/filesystem_dispatcher.h"
6 
7 #include "sandbox/win/src/crosscall_client.h"
8 #include "sandbox/win/src/filesystem_interception.h"
9 #include "sandbox/win/src/filesystem_policy.h"
10 #include "sandbox/win/src/interception.h"
11 #include "sandbox/win/src/interceptors.h"
12 #include "sandbox/win/src/ipc_tags.h"
13 #include "sandbox/win/src/policy_broker.h"
14 #include "sandbox/win/src/policy_params.h"
15 #include "sandbox/win/src/sandbox.h"
16 #include "sandbox/win/src/sandbox_nt_util.h"
17 
18 namespace sandbox {
19 
FilesystemDispatcher(PolicyBase * policy_base)20 FilesystemDispatcher::FilesystemDispatcher(PolicyBase* policy_base)
21     : policy_base_(policy_base) {
22   static const IPCCall create_params = {
23     {IPC_NTCREATEFILE_TAG, WCHAR_TYPE, ULONG_TYPE, ULONG_TYPE, ULONG_TYPE,
24      ULONG_TYPE, ULONG_TYPE, ULONG_TYPE},
25     reinterpret_cast<CallbackGeneric>(&FilesystemDispatcher::NtCreateFile)
26   };
27 
28   static const IPCCall open_file = {
29     {IPC_NTOPENFILE_TAG, WCHAR_TYPE, ULONG_TYPE, ULONG_TYPE, ULONG_TYPE,
30      ULONG_TYPE},
31     reinterpret_cast<CallbackGeneric>(&FilesystemDispatcher::NtOpenFile)
32   };
33 
34   static const IPCCall attribs = {
35     {IPC_NTQUERYATTRIBUTESFILE_TAG, WCHAR_TYPE, ULONG_TYPE, INOUTPTR_TYPE},
36     reinterpret_cast<CallbackGeneric>(
37         &FilesystemDispatcher::NtQueryAttributesFile)
38   };
39 
40   static const IPCCall full_attribs = {
41     {IPC_NTQUERYFULLATTRIBUTESFILE_TAG, WCHAR_TYPE, ULONG_TYPE, INOUTPTR_TYPE},
42     reinterpret_cast<CallbackGeneric>(
43           &FilesystemDispatcher::NtQueryFullAttributesFile)
44   };
45 
46   static const IPCCall set_info = {
47     {IPC_NTSETINFO_RENAME_TAG, VOIDPTR_TYPE, INOUTPTR_TYPE, INOUTPTR_TYPE,
48      ULONG_TYPE, ULONG_TYPE},
49     reinterpret_cast<CallbackGeneric>(
50         &FilesystemDispatcher::NtSetInformationFile)
51   };
52 
53   ipc_calls_.push_back(create_params);
54   ipc_calls_.push_back(open_file);
55   ipc_calls_.push_back(attribs);
56   ipc_calls_.push_back(full_attribs);
57   ipc_calls_.push_back(set_info);
58 }
59 
SetupService(InterceptionManager * manager,int service)60 bool FilesystemDispatcher::SetupService(InterceptionManager* manager,
61                                         int service) {
62   switch (service) {
63     case IPC_NTCREATEFILE_TAG:
64       return INTERCEPT_NT(manager, NtCreateFile, CREATE_FILE_ID, 48);
65 
66     case IPC_NTOPENFILE_TAG:
67       return INTERCEPT_NT(manager, NtOpenFile, OPEN_FILE_ID, 28);
68 
69     case IPC_NTQUERYATTRIBUTESFILE_TAG:
70       return INTERCEPT_NT(manager, NtQueryAttributesFile, QUERY_ATTRIB_FILE_ID,
71                           12);
72 
73     case IPC_NTQUERYFULLATTRIBUTESFILE_TAG:
74         return INTERCEPT_NT(manager, NtQueryFullAttributesFile,
75                             QUERY_FULL_ATTRIB_FILE_ID, 12);
76 
77     case IPC_NTSETINFO_RENAME_TAG:
78       return INTERCEPT_NT(manager, NtSetInformationFile, SET_INFO_FILE_ID, 24);
79 
80     default:
81       return false;
82   }
83 }
84 
NtCreateFile(IPCInfo * ipc,base::string16 * name,DWORD attributes,DWORD desired_access,DWORD file_attributes,DWORD share_access,DWORD create_disposition,DWORD create_options)85 bool FilesystemDispatcher::NtCreateFile(
86     IPCInfo* ipc, base::string16* name, DWORD attributes, DWORD desired_access,
87     DWORD file_attributes, DWORD share_access, DWORD create_disposition,
88     DWORD create_options) {
89   if (!PreProcessName(*name, name)) {
90     // The path requested might contain a reparse point.
91     ipc->return_info.nt_status = STATUS_ACCESS_DENIED;
92     return true;
93   }
94 
95   const wchar_t* filename = name->c_str();
96 
97   ULONG broker = TRUE;
98   CountedParameterSet<OpenFile> params;
99   params[OpenFile::NAME] = ParamPickerMake(filename);
100   params[OpenFile::ACCESS] = ParamPickerMake(desired_access);
101   params[OpenFile::OPTIONS] = ParamPickerMake(create_options);
102   params[OpenFile::BROKER] = ParamPickerMake(broker);
103 
104   // To evaluate the policy we need to call back to the policy object. We
105   // are just middlemen in the operation since is the FileSystemPolicy which
106   // knows what to do.
107   EvalResult result = policy_base_->EvalPolicy(IPC_NTCREATEFILE_TAG,
108                                                params.GetBase());
109   HANDLE handle;
110   ULONG_PTR io_information = 0;
111   NTSTATUS nt_status;
112   if (!FileSystemPolicy::CreateFileAction(result, *ipc->client_info, *name,
113                                           attributes, desired_access,
114                                           file_attributes, share_access,
115                                           create_disposition, create_options,
116                                           &handle, &nt_status,
117                                           &io_information)) {
118     ipc->return_info.nt_status = STATUS_ACCESS_DENIED;
119     return true;
120   }
121   // Return operation status on the IPC.
122   ipc->return_info.extended[0].ulong_ptr = io_information;
123   ipc->return_info.nt_status = nt_status;
124   ipc->return_info.handle = handle;
125   return true;
126 }
127 
NtOpenFile(IPCInfo * ipc,base::string16 * name,DWORD attributes,DWORD desired_access,DWORD share_access,DWORD open_options)128 bool FilesystemDispatcher::NtOpenFile(
129     IPCInfo* ipc, base::string16* name, DWORD attributes, DWORD desired_access,
130     DWORD share_access, DWORD open_options) {
131   if (!PreProcessName(*name, name)) {
132     // The path requested might contain a reparse point.
133     ipc->return_info.nt_status = STATUS_ACCESS_DENIED;
134     return true;
135   }
136 
137   const wchar_t* filename = name->c_str();
138 
139   ULONG broker = TRUE;
140   CountedParameterSet<OpenFile> params;
141   params[OpenFile::NAME] = ParamPickerMake(filename);
142   params[OpenFile::ACCESS] = ParamPickerMake(desired_access);
143   params[OpenFile::OPTIONS] = ParamPickerMake(open_options);
144   params[OpenFile::BROKER] = ParamPickerMake(broker);
145 
146   // To evaluate the policy we need to call back to the policy object. We
147   // are just middlemen in the operation since is the FileSystemPolicy which
148   // knows what to do.
149   EvalResult result = policy_base_->EvalPolicy(IPC_NTOPENFILE_TAG,
150                                                params.GetBase());
151   HANDLE handle;
152   ULONG_PTR io_information = 0;
153   NTSTATUS nt_status;
154   if (!FileSystemPolicy::OpenFileAction(result, *ipc->client_info, *name,
155                                         attributes, desired_access,
156                                         share_access, open_options, &handle,
157                                         &nt_status, &io_information)) {
158     ipc->return_info.nt_status = STATUS_ACCESS_DENIED;
159     return true;
160   }
161   // Return operation status on the IPC.
162   ipc->return_info.extended[0].ulong_ptr = io_information;
163   ipc->return_info.nt_status = nt_status;
164   ipc->return_info.handle = handle;
165   return true;
166 }
167 
NtQueryAttributesFile(IPCInfo * ipc,base::string16 * name,DWORD attributes,CountedBuffer * info)168 bool FilesystemDispatcher::NtQueryAttributesFile(
169     IPCInfo* ipc, base::string16* name, DWORD attributes, CountedBuffer* info) {
170   if (sizeof(FILE_BASIC_INFORMATION) != info->Size())
171     return false;
172 
173   if (!PreProcessName(*name, name)) {
174     // The path requested might contain a reparse point.
175     ipc->return_info.nt_status = STATUS_ACCESS_DENIED;
176     return true;
177   }
178 
179   ULONG broker = TRUE;
180   const wchar_t* filename = name->c_str();
181   CountedParameterSet<FileName> params;
182   params[FileName::NAME] = ParamPickerMake(filename);
183   params[FileName::BROKER] = ParamPickerMake(broker);
184 
185   // To evaluate the policy we need to call back to the policy object. We
186   // are just middlemen in the operation since is the FileSystemPolicy which
187   // knows what to do.
188   EvalResult result = policy_base_->EvalPolicy(IPC_NTQUERYATTRIBUTESFILE_TAG,
189                                                params.GetBase());
190 
191   FILE_BASIC_INFORMATION* information =
192         reinterpret_cast<FILE_BASIC_INFORMATION*>(info->Buffer());
193   NTSTATUS nt_status;
194   if (!FileSystemPolicy::QueryAttributesFileAction(result, *ipc->client_info,
195                                                    *name, attributes,
196                                                    information, &nt_status)) {
197     ipc->return_info.nt_status = STATUS_ACCESS_DENIED;
198     return true;
199   }
200 
201   // Return operation status on the IPC.
202   ipc->return_info.nt_status = nt_status;
203   return true;
204 }
205 
NtQueryFullAttributesFile(IPCInfo * ipc,base::string16 * name,DWORD attributes,CountedBuffer * info)206 bool FilesystemDispatcher::NtQueryFullAttributesFile(
207     IPCInfo* ipc, base::string16* name, DWORD attributes, CountedBuffer* info) {
208   if (sizeof(FILE_NETWORK_OPEN_INFORMATION) != info->Size())
209     return false;
210 
211   if (!PreProcessName(*name, name)) {
212     // The path requested might contain a reparse point.
213     ipc->return_info.nt_status = STATUS_ACCESS_DENIED;
214     return true;
215   }
216 
217   ULONG broker = TRUE;
218   const wchar_t* filename = name->c_str();
219   CountedParameterSet<FileName> params;
220   params[FileName::NAME] = ParamPickerMake(filename);
221   params[FileName::BROKER] = ParamPickerMake(broker);
222 
223   // To evaluate the policy we need to call back to the policy object. We
224   // are just middlemen in the operation since is the FileSystemPolicy which
225   // knows what to do.
226   EvalResult result = policy_base_->EvalPolicy(
227                           IPC_NTQUERYFULLATTRIBUTESFILE_TAG, params.GetBase());
228 
229   FILE_NETWORK_OPEN_INFORMATION* information =
230         reinterpret_cast<FILE_NETWORK_OPEN_INFORMATION*>(info->Buffer());
231   NTSTATUS nt_status;
232   if (!FileSystemPolicy::QueryFullAttributesFileAction(result,
233                                                        *ipc->client_info,
234                                                        *name, attributes,
235                                                        information,
236                                                        &nt_status)) {
237     ipc->return_info.nt_status = STATUS_ACCESS_DENIED;
238     return true;
239   }
240 
241   // Return operation status on the IPC.
242   ipc->return_info.nt_status = nt_status;
243   return true;
244 }
245 
NtSetInformationFile(IPCInfo * ipc,HANDLE handle,CountedBuffer * status,CountedBuffer * info,DWORD length,DWORD info_class)246 bool FilesystemDispatcher::NtSetInformationFile(
247     IPCInfo* ipc, HANDLE handle, CountedBuffer* status, CountedBuffer* info,
248     DWORD length, DWORD info_class) {
249   if (sizeof(IO_STATUS_BLOCK) != status->Size())
250     return false;
251   if (length != info->Size())
252     return false;
253 
254   FILE_RENAME_INFORMATION* rename_info =
255       reinterpret_cast<FILE_RENAME_INFORMATION*>(info->Buffer());
256 
257   if (!IsSupportedRenameCall(rename_info, length, info_class))
258     return false;
259 
260   base::string16 name;
261   name.assign(rename_info->FileName, rename_info->FileNameLength /
262                                      sizeof(rename_info->FileName[0]));
263   if (!PreProcessName(name, &name)) {
264     // The path requested might contain a reparse point.
265     ipc->return_info.nt_status = STATUS_ACCESS_DENIED;
266     return true;
267   }
268 
269   ULONG broker = TRUE;
270   const wchar_t* filename = name.c_str();
271   CountedParameterSet<FileName> params;
272   params[FileName::NAME] = ParamPickerMake(filename);
273   params[FileName::BROKER] = ParamPickerMake(broker);
274 
275   // To evaluate the policy we need to call back to the policy object. We
276   // are just middlemen in the operation since is the FileSystemPolicy which
277   // knows what to do.
278   EvalResult result = policy_base_->EvalPolicy(IPC_NTSETINFO_RENAME_TAG,
279                                                params.GetBase());
280 
281   IO_STATUS_BLOCK* io_status =
282         reinterpret_cast<IO_STATUS_BLOCK*>(status->Buffer());
283   NTSTATUS nt_status;
284   if (!FileSystemPolicy::SetInformationFileAction(result, *ipc->client_info,
285                                                   handle, rename_info, length,
286                                                   info_class, io_status,
287                                                   &nt_status)) {
288     ipc->return_info.nt_status = STATUS_ACCESS_DENIED;
289     return true;
290   }
291 
292   // Return operation status on the IPC.
293   ipc->return_info.nt_status = nt_status;
294   return true;
295 }
296 
297 }  // namespace sandbox
298