Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(815)

Unified Diff: sandbox/win/src/process_mitigations.cc

Issue 10944015: Enable DEP earlier on Vista and below (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Created 8 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « sandbox/win/src/process_mitigations.h ('k') | sandbox/win/src/sandbox_policy_base.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: sandbox/win/src/process_mitigations.cc
===================================================================
--- sandbox/win/src/process_mitigations.cc (revision 157852)
+++ sandbox/win/src/process_mitigations.cc (working copy)
@@ -6,7 +6,9 @@
#include "base/win/windows_version.h"
#include "sandbox/win/src/nt_internals.h"
+#include "sandbox/win/src/sandbox_types.h"
#include "sandbox/win/src/sandbox_utils.h"
+#include "sandbox/win/src/target_process.h"
#include "sandbox/win/src/win_utils.h"
namespace {
@@ -22,6 +24,11 @@
typedef BOOL (WINAPI *SetDefaultDllDirectoriesFunction)(
DWORD DirectoryFlags);
+void CALLBACK ApplyMitigationsCallback(ULONG_PTR flags) {
+ if (!sandbox::ApplyProcessMitigationsToCurrentProcess(flags))
+ ::TerminateProcess(::GetCurrentProcess(), sandbox::SBOX_FATAL_MITIGATION);
+}
+
} // namespace
namespace sandbox {
@@ -237,42 +244,24 @@
}
MitigationFlags FilterPostStartupProcessMitigations(MitigationFlags flags) {
- // Anything prior to XP SP2.
- if (!IsXPSP2OrLater())
- return 0;
-
base::win::Version version = base::win::GetVersion();
- // Windows XP SP2+.
if (version < base::win::VERSION_VISTA) {
- return flags & (MITIGATION_DEP |
- MITIGATION_DEP_NO_ATL_THUNK);
+ return 0;
- // Windows Vista
- if (version < base::win::VERSION_WIN7) {
- return flags & (MITIGATION_DEP |
- MITIGATION_DEP_NO_ATL_THUNK |
- MITIGATION_BOTTOM_UP_ASLR |
rvargas (doing something else) 2012/10/03 02:42:37 Are you losing these?
jschuh 2012/10/03 03:00:06 No. The DEP flags don't need to be passed due to t
- MITIGATION_DLL_SEARCH_ORDER |
- MITIGATION_HEAP_TERMINATE);
- }
-
- // Windows 7 and Vista.
} else if (version < base::win::VERSION_WIN8) {
- return flags & (MITIGATION_BOTTOM_UP_ASLR |
- MITIGATION_DLL_SEARCH_ORDER |
+ return flags & (MITIGATION_DLL_SEARCH_ORDER |
MITIGATION_HEAP_TERMINATE);
}
// Windows 8 and above.
- return flags & (MITIGATION_BOTTOM_UP_ASLR |
- MITIGATION_DLL_SEARCH_ORDER);
+ return flags & (MITIGATION_DLL_SEARCH_ORDER);
}
-bool ApplyProcessMitigationsToSuspendedProcess(HANDLE process,
- MitigationFlags flags) {
-// This is a hack to fake a weak bottom-up ASLR on 32-bit Windows.
+bool ApplyProcessMitigationsToSuspendedTarget(TargetProcess* target,
+ MitigationFlags flags) {
#if !defined(_WIN64)
+ // This is a hack to fake a weak bottom-up ASLR on 32-bit Windows.
if (flags & MITIGATION_BOTTOM_UP_ASLR) {
unsigned int limit;
rand_s(&limit);
@@ -280,6 +269,7 @@
const size_t kMask64k = 0xFFFF;
// Random range (512k-16.5mb) in 64k steps.
const char* end = ptr + ((((limit % 16384) + 512) * 1024) & ~kMask64k);
+ HANDLE process = target->Process();
while (ptr < end) {
MEMORY_BASIC_INFORMATION memory_info;
if (!::VirtualQueryEx(process, ptr, &memory_info, sizeof(memory_info)))
@@ -291,6 +281,16 @@
ptr += size;
}
}
+
+ // Since the process is suspended, we can schedule an APC to set the DEP
+ // policy immediately after then loader finishes.
rvargas (doing something else) 2012/10/03 02:42:37 nit: the loader
jschuh 2012/10/03 03:00:06 Done.
+ ULONG_PTR dep_flags = flags & (MITIGATION_DEP | MITIGATION_DEP_NO_ATL_THUNK);
+ if (dep_flags && base::win::GetVersion() < base::win::VERSION_WIN7) {
+ if (!::QueueUserAPC(ApplyMitigationsCallback, target->MainThread(),
rvargas (doing something else) 2012/10/03 02:42:37 I'm not fully convinced that this is a good idea,
jschuh 2012/10/03 03:00:06 That's pretty much it. I want to do it before we e
rvargas (doing something else) 2012/10/03 22:23:57 But the bulk of the benefit is by protecting pages
rvargas (doing something else) 2012/10/11 23:04:44 btw, this breaks with the SANDBOX_EXPORTS mode, bu
+ static_cast<ULONG_PTR>(dep_flags))) {
+ return false;
+ }
+ }
#endif
return true;
« no previous file with comments | « sandbox/win/src/process_mitigations.h ('k') | sandbox/win/src/sandbox_policy_base.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698