// Copyright 2008, Google Inc. // All rights reserved. // // Redistribution and use in source and binary forms, with or without // modification, are permitted provided that the following conditions are // met: // // * Redistributions of source code must retain the above copyright // notice, this list of conditions and the following disclaimer. // * Redistributions in binary form must reproduce the above // copyright notice, this list of conditions and the following disclaimer // in the documentation and/or other materials provided with the // distribution. // * Neither the name of Google Inc. nor the names of its // contributors may be used to endorse or promote products derived from // this software without specific prior written permission. // // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR // A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT // OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. #ifndef SANDBOX_SRC_PROCESS_THREAD_POLICY_H__ #define SANDBOX_SRC_PROCESS_THREAD_POLICY_H__ #include #include "sandbox/src/policy_low_level.h" #include "base/basictypes.h" #include "sandbox/src/crosscall_server.h" #include "sandbox/src/sandbox_policy.h" namespace sandbox { enum EvalResult; // This class centralizes most of the knowledge related to process execution. class ProcessPolicy { public: // Creates the required low-level policy rules to evaluate a high-level. // policy rule for process creation // 'name' is the executable to be spawn. // 'semantics' is the desired semantics. // 'policy' is the policy generator to which the rules are going to be added. static bool GenerateRules(const wchar_t* name, TargetPolicy::Semantics semantics, LowLevelPolicy* policy); // Opens a thread from the child process and returns the handle. // client_info contains the information about the child process, // desired_access is the access requested by the child and thread_id // is the thread_id to be opened. // The function returns the return value of NtOpenThread. static NTSTATUS OpenThreadAction(const ClientInfo& client_info, uint32 desired_access, uint32 thread_id, HANDLE *handle); // Opens the process id passed in and returns the duplicated handle to // the child. We only allow the child processes to open themselves. Any other // pid open is denied. static NTSTATUS OpenProcessAction(const ClientInfo& client_info, uint32 desired_access, uint32 process_id, HANDLE *handle); // Opens the token associated with the process and returns the duplicated // handle to the child. We only allow the child processes to open his own // token (using ::GetCurrentProcess()). static NTSTATUS OpenProcessTokenAction(const ClientInfo& client_info, uint32 process, uint32 desired_access, HANDLE *handle); // Opens the token associated with the process and returns the duplicated // handle to the child. We only allow the child processes to open his own // token (using ::GetCurrentProcess()). static NTSTATUS OpenProcessTokenExAction(const ClientInfo& client_info, uint32 process, uint32 desired_access, uint32 attributes, HANDLE *handle); // Processes a 'CreateProcessW()' request from the target. // 'client_info' : the target process that is making the request. // 'eval_result' : The desired policy action to accomplish. // 'app_name' : The full path of the process to be created. // 'command_line' : The command line passed to the created process. static DWORD CreateProcessWAction(EvalResult eval_result, const ClientInfo& client_info, const std::wstring &app_name, const std::wstring &command_line, PROCESS_INFORMATION* process_info); }; } // namespace sandbox #endif // SANDBOX_SRC_PROCESS_THREAD_POLICY_H__