fort/src/driver/fortdev.c

445 lines
12 KiB
C
Raw Normal View History

/* Fort Firewall Driver Device */
#include "fortdev.h"
2022-01-08 12:30:59 +00:00
#include "common/fortioctl.h"
#include "common/fortprov.h"
#include "fortcout.h"
#include "fortps.h"
2021-12-13 17:55:46 +00:00
#include "fortscb.h"
#include "forttrace.h"
static PFORT_DEVICE g_device = NULL;
2023-03-30 12:31:48 +00:00
FORT_API PFORT_DEVICE fort_device(void)
{
return g_device;
}
FORT_API void fort_device_set(PFORT_DEVICE device)
{
g_device = device;
}
static void NTAPI fort_worker_reauth(void)
{
2023-04-02 15:02:26 +00:00
const FORT_CONF_FLAGS conf_flags = fort_device()->conf.conf_flags;
const NTSTATUS status = fort_callout_force_reauth(conf_flags);
if (!NT_SUCCESS(status)) {
2022-01-29 08:42:30 +00:00
LOG("Worker Reauth: Error: %x\n", status);
TRACE(FORT_DEVICE_WORKER_REAUTH_ERROR, status, 0, 0);
}
}
2023-04-01 15:51:06 +00:00
static void NTAPI fort_app_period_timer(void)
{
2023-04-02 15:02:26 +00:00
if (fort_conf_ref_period_update(&fort_device()->conf, /*force=*/FALSE, /*periods_n=*/NULL)) {
fort_worker_queue(&fort_device()->worker, FORT_WORKER_REAUTH);
}
}
2023-04-01 15:51:06 +00:00
FORT_API void fort_device_on_system_time(void)
{
if (fort_timer_is_running(&fort_device()->app_timer)) {
fort_app_period_timer();
}
}
FORT_API NTSTATUS fort_device_create(PDEVICE_OBJECT device, PIRP irp)
{
UNUSED(device);
2023-01-06 14:30:34 +00:00
NTSTATUS status = STATUS_SUCCESS;
/* Device opened */
const UCHAR flags = fort_device_flag_set(&fort_device()->conf, FORT_DEVICE_IS_OPENED, TRUE);
if ((flags & FORT_DEVICE_IS_OPENED) != 0) {
status = STATUS_SHARING_VIOLATION; /* Only one client may connect */
}
if (NT_SUCCESS(status)) {
/* Clear buffer */
2023-04-02 15:02:26 +00:00
fort_buffer_clear(&fort_device()->buffer);
}
fort_request_complete(irp, status);
return status;
}
FORT_API NTSTATUS fort_device_close(PDEVICE_OBJECT device, PIRP irp)
{
UNUSED(device);
fort_request_complete(irp, STATUS_SUCCESS);
return STATUS_SUCCESS;
}
FORT_API NTSTATUS fort_device_cleanup(PDEVICE_OBJECT device, PIRP irp)
{
UNUSED(device);
/* Device closed */
fort_device_flag_set(
2023-04-02 15:02:26 +00:00
&fort_device()->conf, (FORT_DEVICE_IS_OPENED | FORT_DEVICE_IS_VALIDATED), FALSE);
/* Clear conf */
{
2023-04-02 15:02:26 +00:00
const FORT_CONF_FLAGS old_conf_flags = fort_conf_ref_set(&fort_device()->conf, NULL);
FORT_CONF_FLAGS conf_flags = fort_device()->conf.conf_flags;
2023-04-02 15:02:26 +00:00
fort_conf_zones_set(&fort_device()->conf, NULL);
2023-04-02 15:02:26 +00:00
fort_stat_conf_flags_update(&fort_device()->stat, &conf_flags);
fort_callout_force_reauth(old_conf_flags);
}
/* Clear buffer */
2023-04-02 15:02:26 +00:00
fort_buffer_clear(&fort_device()->buffer);
fort_request_complete(irp, STATUS_SUCCESS);
return STATUS_SUCCESS;
}
static void fort_device_cancel_pending(PDEVICE_OBJECT device, PIRP irp)
{
UNUSED(device);
2023-01-06 14:30:34 +00:00
ULONG_PTR info;
2023-04-02 15:02:26 +00:00
const NTSTATUS status = fort_buffer_cancel_pending(&fort_device()->buffer, irp, &info);
IoSetCancelRoutine(irp, NULL);
IoReleaseCancelSpinLock(irp->CancelIrql); /* before IoCompleteRequest()! */
fort_request_complete_info(irp, status, info);
}
static void fort_device_mark_pending(PIRP irp)
{
IoMarkIrpPending(irp);
KIRQL cirq;
IoAcquireCancelSpinLock(&cirq);
{
IoSetCancelRoutine(irp, &fort_device_cancel_pending);
}
IoReleaseCancelSpinLock(cirq);
}
static NTSTATUS fort_device_control_validate(const PFORT_CONF_VERSION conf_ver, ULONG len)
{
if (len == sizeof(FORT_CONF_VERSION)) {
if (conf_ver->driver_version == DRIVER_VERSION) {
2023-04-02 15:02:26 +00:00
fort_device_flag_set(&fort_device()->conf, FORT_DEVICE_IS_VALIDATED, TRUE);
return STATUS_SUCCESS;
}
}
return STATUS_UNSUCCESSFUL;
}
static NTSTATUS fort_device_control_setservices(const PFORT_SERVICE_INFO_LIST services, ULONG len)
{
if (len > sizeof(FORT_SERVICE_INFO_LIST)) {
2023-04-27 05:16:42 +00:00
fort_pstree_update_services(&fort_device()->ps_tree, services,
/*data_len=*/len - FORT_SERVICE_INFO_LIST_DATA_OFF);
return STATUS_SUCCESS;
}
return STATUS_UNSUCCESSFUL;
}
static NTSTATUS fort_device_control_setconf(const PFORT_CONF_IO conf_io, ULONG len)
{
if (len > sizeof(FORT_CONF_IO)) {
const PFORT_CONF conf = &conf_io->conf;
PFORT_CONF_REF conf_ref = fort_conf_ref_new(conf, len - FORT_CONF_IO_CONF_OFF);
if (conf_ref == NULL) {
return STATUS_INSUFFICIENT_RESOURCES;
} else {
2023-04-02 15:02:26 +00:00
const FORT_CONF_FLAGS old_conf_flags =
fort_conf_ref_set(&fort_device()->conf, conf_ref);
2023-04-02 15:02:26 +00:00
fort_stat_conf_update(&fort_device()->stat, conf_io);
fort_shaper_conf_update(&fort_device()->shaper, conf_io);
return fort_callout_force_reauth(old_conf_flags);
}
}
return STATUS_UNSUCCESSFUL;
}
static NTSTATUS fort_device_control_setflags(const PFORT_CONF_FLAGS conf_flags, ULONG len)
{
if (len == sizeof(FORT_CONF_FLAGS)) {
2023-04-02 15:02:26 +00:00
const FORT_CONF_FLAGS old_conf_flags =
fort_conf_ref_flags_set(&fort_device()->conf, conf_flags);
2023-04-02 15:02:26 +00:00
fort_stat_conf_flags_update(&fort_device()->stat, conf_flags);
fort_shaper_conf_flags_update(&fort_device()->shaper, conf_flags);
2022-09-18 07:36:08 +00:00
return fort_callout_force_reauth(old_conf_flags);
}
return STATUS_UNSUCCESSFUL;
}
static NTSTATUS fort_device_control_getlog(PVOID out, ULONG out_len, PIRP irp, ULONG_PTR *info)
{
if (out_len < FORT_BUFFER_SIZE)
return STATUS_BUFFER_TOO_SMALL;
return fort_buffer_xmove(&fort_device()->buffer, irp, out, out_len, info);
}
static NTSTATUS fort_device_control_app(const PFORT_APP_ENTRY app_entry, ULONG len, BOOL is_adding)
{
if (len > sizeof(FORT_APP_ENTRY) && len >= (sizeof(FORT_APP_ENTRY) + app_entry->path_len)) {
2023-04-02 15:02:26 +00:00
PFORT_CONF_REF conf_ref = fort_conf_ref_take(&fort_device()->conf);
if (conf_ref == NULL) {
return STATUS_INSUFFICIENT_RESOURCES;
} else {
NTSTATUS status;
if (is_adding) {
status = fort_conf_ref_exe_add_entry(conf_ref, app_entry, FALSE);
} else {
fort_conf_ref_exe_del_entry(conf_ref, app_entry);
status = STATUS_SUCCESS;
}
2023-04-02 15:02:26 +00:00
fort_conf_ref_put(&fort_device()->conf, conf_ref);
if (NT_SUCCESS(status)) {
fort_worker_reauth();
}
return status;
}
}
return STATUS_UNSUCCESSFUL;
}
static NTSTATUS fort_device_control_setzones(const PFORT_CONF_ZONES zones, ULONG len)
{
if (len >= FORT_CONF_ZONES_DATA_OFF) {
PFORT_CONF_ZONES conf_zones = fort_conf_zones_new(zones, len);
if (conf_zones == NULL) {
return STATUS_INSUFFICIENT_RESOURCES;
} else {
2023-04-02 15:02:26 +00:00
fort_conf_zones_set(&fort_device()->conf, conf_zones);
fort_worker_reauth();
return STATUS_SUCCESS;
}
}
return STATUS_UNSUCCESSFUL;
}
static NTSTATUS fort_device_control_setzoneflag(const PFORT_CONF_ZONE_FLAG zone_flag, ULONG len)
{
if (len == sizeof(FORT_CONF_ZONE_FLAG)) {
2023-04-02 15:02:26 +00:00
fort_conf_zone_flag_set(&fort_device()->conf, zone_flag);
fort_worker_reauth();
return STATUS_SUCCESS;
}
return STATUS_UNSUCCESSFUL;
}
static NTSTATUS fort_device_control_process(
const PIO_STACK_LOCATION irp_stack, PIRP irp, ULONG_PTR *info)
{
const int control_code = irp_stack->Parameters.DeviceIoControl.IoControlCode;
if (control_code != FORT_IOCTL_VALIDATE
2023-04-02 15:02:26 +00:00
&& fort_device_flag(&fort_device()->conf, FORT_DEVICE_IS_VALIDATED) == 0)
return STATUS_INVALID_PARAMETER;
PVOID buffer = irp->AssociatedIrp.SystemBuffer;
const ULONG in_len = irp_stack->Parameters.DeviceIoControl.InputBufferLength;
const ULONG out_len = irp_stack->Parameters.DeviceIoControl.OutputBufferLength;
switch (control_code) {
case FORT_IOCTL_VALIDATE:
return fort_device_control_validate(buffer, in_len);
case FORT_IOCTL_SETSERVICES:
return fort_device_control_setservices(buffer, in_len);
case FORT_IOCTL_SETCONF:
return fort_device_control_setconf(buffer, in_len);
case FORT_IOCTL_SETFLAGS:
return fort_device_control_setflags(buffer, in_len);
case FORT_IOCTL_GETLOG:
return fort_device_control_getlog(buffer, out_len, irp, info);
case FORT_IOCTL_ADDAPP:
case FORT_IOCTL_DELAPP:
return fort_device_control_app(buffer, in_len, (control_code == FORT_IOCTL_ADDAPP));
case FORT_IOCTL_SETZONES:
return fort_device_control_setzones(buffer, in_len);
case FORT_IOCTL_SETZONEFLAG:
return fort_device_control_setzoneflag(buffer, in_len);
default:
2022-09-18 07:36:08 +00:00
return STATUS_INVALID_DEVICE_REQUEST;
}
}
FORT_API NTSTATUS fort_device_control(PDEVICE_OBJECT device, PIRP irp)
{
UNUSED(device);
2023-01-06 14:30:34 +00:00
ULONG_PTR info = 0;
const PIO_STACK_LOCATION irp_stack = IoGetCurrentIrpStackLocation(irp);
const NTSTATUS status = fort_device_control_process(irp_stack, irp, &info);
if (!NT_SUCCESS(status) && status != FORT_STATUS_USER_ERROR) {
2022-01-29 08:42:30 +00:00
LOG("Device Control: Error: %x\n", status);
TRACE(FORT_DEVICE_DEVICE_CONTROL_ERROR, status, 0, 0);
}
if (status == STATUS_PENDING) {
fort_device_mark_pending(irp);
} else {
fort_request_complete_info(irp, status, info);
}
return status;
}
FORT_API NTSTATUS fort_device_shutdown(PDEVICE_OBJECT device, PIRP irp)
{
UNUSED(device);
if (fort_device() != NULL) {
fort_stat_close_flows(&fort_device()->stat);
}
fort_request_complete(irp, STATUS_SUCCESS);
return STATUS_SUCCESS;
}
static NTSTATUS fort_device_register_provider(void)
{
NTSTATUS status;
2023-04-17 08:17:00 +00:00
fort_prov_init();
HANDLE engine;
2023-04-17 08:17:00 +00:00
status = fort_prov_trans_open(&engine);
if (!NT_SUCCESS(status))
return status;
const FORT_PROV_BOOT_CONF boot_conf = fort_prov_get_boot_conf(engine);
fort_device_flag_set(&fort_device()->conf, FORT_DEVICE_BOOT_FILTER, boot_conf.boot_filter);
fort_device_flag_set(
&fort_device()->conf, FORT_DEVICE_BOOT_FILTER_LOCALS, boot_conf.filter_locals);
fort_prov_unregister(engine);
status = fort_prov_register(engine, boot_conf);
return fort_prov_trans_close(engine, status);
}
FORT_API NTSTATUS fort_device_load(void)
{
NTSTATUS status;
PDEVICE_OBJECT device = fort_device()->device;
fort_worker_func_set(&fort_device()->worker, FORT_WORKER_REAUTH, &fort_worker_reauth);
fort_worker_func_set(&fort_device()->worker, FORT_WORKER_PSTREE, &fort_pstree_enum_processes);
fort_device_conf_open(&fort_device()->conf);
fort_buffer_open(&fort_device()->buffer);
fort_stat_open(&fort_device()->stat);
fort_pending_open(&fort_device()->pending);
fort_shaper_open(&fort_device()->shaper);
2023-01-06 10:55:10 +00:00
fort_timer_open(&fort_device()->log_timer, 500, /*flags=*/0, &fort_callout_timer);
fort_timer_open(
&fort_device()->app_timer, 60000, FORT_TIMER_COALESCABLE, &fort_app_period_timer);
2022-01-07 09:12:12 +00:00
fort_pstree_open(&fort_device()->ps_tree);
/* Register filters provider */
status = fort_device_register_provider();
if (!NT_SUCCESS(status))
return status;
/* Install callouts */
2022-01-07 09:12:12 +00:00
status = fort_callout_install(device);
if (!NT_SUCCESS(status))
return status;
/* Register worker */
status = fort_worker_register(device, &fort_device()->worker);
if (!NT_SUCCESS(status))
return status;
/* Register power state change callback */
status = fort_syscb_power_register();
if (!NT_SUCCESS(status))
return status;
/* Register system time change callback */
status = fort_syscb_time_register();
if (!NT_SUCCESS(status))
return status;
/* Enumerate processes in background */
fort_worker_queue(&fort_device()->worker, FORT_WORKER_PSTREE);
return STATUS_SUCCESS;
}
2023-03-30 12:31:48 +00:00
FORT_API void fort_device_unload(void)
{
/* Stop system notifiers */
fort_syscb_power_unregister();
fort_syscb_time_unregister();
/* Stop timers */
fort_timer_close(&fort_device()->app_timer);
fort_timer_close(&fort_device()->log_timer);
/* Stop worker threads */
fort_worker_unregister(&fort_device()->worker);
/* Stop process monitor */
fort_pstree_close(&fort_device()->ps_tree);
/* Stop packets shaper & pending */
fort_shaper_close(&fort_device()->shaper);
fort_pending_close(&fort_device()->pending);
/* Stop stat & buffer controllers */
fort_stat_close(&fort_device()->stat);
fort_buffer_close(&fort_device()->buffer);
/* Uninstall callouts */
fort_callout_remove();
/* Unregister filters provider */
if (fort_device_flag(&fort_device()->conf, FORT_DEVICE_BOOT_FILTER) == 0) {
2023-04-17 08:17:00 +00:00
fort_prov_trans_unregister();
}
}