diff options
author | initial.commit <initial.commit@0039d316-1c4b-4281-b951-d872f2087c98> | 2008-07-26 22:41:28 +0000 |
---|---|---|
committer | initial.commit <initial.commit@0039d316-1c4b-4281-b951-d872f2087c98> | 2008-07-26 22:41:28 +0000 |
commit | a814a8d55429605fe6d7045045cd25b6bf624580 (patch) | |
tree | 58fcd994d4ce41ef021f6406a6fac32d9ca2d265 /sandbox/src/target_process.h | |
parent | e6c9e14e0dfec2bb156a1f7a107cda3ebee8d392 (diff) | |
download | chromium_src-a814a8d55429605fe6d7045045cd25b6bf624580.zip chromium_src-a814a8d55429605fe6d7045045cd25b6bf624580.tar.gz chromium_src-a814a8d55429605fe6d7045045cd25b6bf624580.tar.bz2 |
Add sandbox to the repository.
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@13 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox/src/target_process.h')
-rw-r--r-- | sandbox/src/target_process.h | 150 |
1 files changed, 150 insertions, 0 deletions
diff --git a/sandbox/src/target_process.h b/sandbox/src/target_process.h new file mode 100644 index 0000000..b1a6c94 --- /dev/null +++ b/sandbox/src/target_process.h @@ -0,0 +1,150 @@ +// Copyright 2008, Google Inc. +// All rights reserved. +// +// Redistribution and use in source and binary forms, with or without +// modification, are permitted provided that the following conditions are +// met: +// +// * Redistributions of source code must retain the above copyright +// notice, this list of conditions and the following disclaimer. +// * Redistributions in binary form must reproduce the above +// copyright notice, this list of conditions and the following disclaimer +// in the documentation and/or other materials provided with the +// distribution. +// * Neither the name of Google Inc. nor the names of its +// contributors may be used to endorse or promote products derived from +// this software without specific prior written permission. +// +// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +#ifndef SANDBOX_SRC_TARGET_PROCESS_H__ +#define SANDBOX_SRC_TARGET_PROCESS_H__ + +#include <Windows.h> + +#include "base/basictypes.h" +#include "sandbox/src/crosscall_server.h" +#include "sandbox/src/sandbox_types.h" + +namespace sandbox { + +class BrokerServicesBase; +class SharedMemIPCServer; +class BrokerDispatcherBase; +class ThreadProvider; + +// TargetProcess models a target instance (child process). Objects of this +// class are owned by the Policy used to create them. +class TargetProcess { + public: + // The constructor takes ownership of all the three handles given to it. + TargetProcess(HANDLE initial_token, HANDLE lockdown_token, HANDLE job, + ThreadProvider* thread_pool); + ~TargetProcess(); + + // TODO(cpu): Currently there does not seem to be a reason to implement + // reference counting for this class since is internal, but kept the + // the same interface so the interception framework does not need to be + // touched at this point. + void AddRef() {} + void Release() {} + + // Creates the new target process. The process is created suspended. + DWORD Create(const wchar_t* exe_path, const wchar_t* command_line, + const wchar_t* desktop, PROCESS_INFORMATION* target_info); + + // Destroys the target process. + void Terminate(); + + // Creates the IPC objects such as the BrokerDispatcher and the + // IPC server. The IPC server uses the services of the thread_pool. + DWORD Init(Dispatcher* ipc_dispatcher, void* policy, + size_t shared_IPC_size, size_t shared_policy_size); + + // Returns the handle to the target process. + HANDLE Process() const { + return sandbox_process_; + } + + // Returns the handle to the job object that the target process belongs to. + HANDLE Job() const { + return job_; + } + + // Returns the address of the target main exe. This is used by the + // interceptions framework. + HMODULE MainModule() const { + return reinterpret_cast<HMODULE>(base_address_); + } + + // Returns the name of the executable. + const wchar_t* Name() const { + return exe_name_; + } + + // Returns the process id. + DWORD ProcessId() const { + return sandbox_process_id_; + } + + // Returns the handle to the main thread. + HANDLE MainThread() const { + return sandbox_thread_; + } + + // Transfers a 32-bit variable between the broker and the target. + ResultCode TransferVariable(char* name, void* address, size_t size); + + private: + // The handle to the target process. + HANDLE sandbox_process_; + // The handle to the main thread. + HANDLE sandbox_thread_; + // The process id of the target process. + DWORD sandbox_process_id_; + // The token associated with the process. It provides the core of the + // sbox security. + HANDLE lockdown_token_; + // The token given to the initial thread so that the target process can + // start. It has more powers than the lockdown_token. + HANDLE initial_token_; + // Kernel handle to the shared memory used by the IPC server. + HANDLE shared_section_; + // Job object containing the target process. + HANDLE job_; + // Reference to the IPC subsystem. + SharedMemIPCServer* ipc_server_; + // Provides the threads used by the IPC. This class does not own this pointer. + ThreadProvider* thread_pool_; + // Base address of the main executable + void* base_address_; + // Full name of the target executable. + wchar_t* exe_name_; + // Desktop where the target process is running. + HDESK desktop_handle_; + + // Function used for testing. + friend TargetProcess* MakeTestTargetProcess(HANDLE process, + HMODULE base_address); + + DISALLOW_IMPLICIT_CONSTRUCTORS(TargetProcess); +}; + +// Creates a mock TargetProcess used for testing interceptions. +// TODO(cpu): It seems that this method is not going to be used anymore. +TargetProcess* MakeTestTargetProcess(HANDLE process, HMODULE base_address); + + +} // namespace sandbox + +#endif // SANDBOX_SRC_TARGET_PROCESS_H__ |