1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
|
// Copyright (c) 2006-2010 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef SANDBOX_SRC_PROCESS_THREAD_POLICY_H_
#define SANDBOX_SRC_PROCESS_THREAD_POLICY_H_
#include <string>
#include "sandbox/src/policy_low_level.h"
#include "base/basictypes.h"
#include "sandbox/src/crosscall_server.h"
#include "sandbox/src/sandbox_policy.h"
namespace sandbox {
enum EvalResult;
// This class centralizes most of the knowledge related to process execution.
class ProcessPolicy {
public:
// Creates the required low-level policy rules to evaluate a high-level.
// policy rule for process creation
// 'name' is the executable to be spawn.
// 'semantics' is the desired semantics.
// 'policy' is the policy generator to which the rules are going to be added.
static bool GenerateRules(const wchar_t* name,
TargetPolicy::Semantics semantics,
LowLevelPolicy* policy);
// Opens a thread from the child process and returns the handle.
// client_info contains the information about the child process,
// desired_access is the access requested by the child and thread_id
// is the thread_id to be opened.
// The function returns the return value of NtOpenThread.
static NTSTATUS OpenThreadAction(const ClientInfo& client_info,
uint32 desired_access,
uint32 thread_id,
HANDLE* handle);
// Opens the process id passed in and returns the duplicated handle to
// the child. We only allow the child processes to open themselves. Any other
// pid open is denied.
static NTSTATUS OpenProcessAction(const ClientInfo& client_info,
uint32 desired_access,
uint32 process_id,
HANDLE* handle);
// Opens the token associated with the process and returns the duplicated
// handle to the child. We only allow the child processes to open his own
// token (using ::GetCurrentProcess()).
static NTSTATUS OpenProcessTokenAction(const ClientInfo& client_info,
HANDLE process,
uint32 desired_access,
HANDLE* handle);
// Opens the token associated with the process and returns the duplicated
// handle to the child. We only allow the child processes to open his own
// token (using ::GetCurrentProcess()).
static NTSTATUS OpenProcessTokenExAction(const ClientInfo& client_info,
HANDLE process,
uint32 desired_access,
uint32 attributes,
HANDLE* handle);
// Processes a 'CreateProcessW()' request from the target.
// 'client_info' : the target process that is making the request.
// 'eval_result' : The desired policy action to accomplish.
// 'app_name' : The full path of the process to be created.
// 'command_line' : The command line passed to the created process.
static DWORD CreateProcessWAction(EvalResult eval_result,
const ClientInfo& client_info,
const std::wstring &app_name,
const std::wstring &command_line,
PROCESS_INFORMATION* process_info);
};
} // namespace sandbox
#endif // SANDBOX_SRC_PROCESS_THREAD_POLICY_H_
|