OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/common/sandbox_policy.h" | 5 #include "content/common/sandbox_policy.h" |
6 | 6 |
7 #include <string> | 7 #include <string> |
8 | 8 |
9 #include "base/command_line.h" | 9 #include "base/command_line.h" |
10 #include "base/debug/debugger.h" | 10 #include "base/debug/debugger.h" |
(...skipping 180 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
191 // Eviction of injected DLLs is done by the sandbox so that the injected module | 191 // Eviction of injected DLLs is done by the sandbox so that the injected module |
192 // does not get a chance to execute any code. | 192 // does not get a chance to execute any code. |
193 void AddDllEvictionPolicy(sandbox::TargetPolicy* policy) { | 193 void AddDllEvictionPolicy(sandbox::TargetPolicy* policy) { |
194 for (int ix = 0; ix != arraysize(kTroublesomeDlls); ++ix) | 194 for (int ix = 0; ix != arraysize(kTroublesomeDlls); ++ix) |
195 BlacklistAddOneDll(kTroublesomeDlls[ix], policy); | 195 BlacklistAddOneDll(kTroublesomeDlls[ix], policy); |
196 } | 196 } |
197 | 197 |
198 // Returns the object path prepended with the current logon session. | 198 // Returns the object path prepended with the current logon session. |
199 string16 PrependWindowsSessionPath(const char16* object) { | 199 string16 PrependWindowsSessionPath(const char16* object) { |
200 // Cache this because it can't change after process creation. | 200 // Cache this because it can't change after process creation. |
201 static string16* session_prefix = NULL; | 201 uintptr_t s_session_id = 0; |
202 if (!session_prefix) { | 202 if (s_session_id == 0) { |
203 HANDLE token; | 203 HANDLE token; |
204 DWORD session_id; | |
205 DWORD session_id_length; | 204 DWORD session_id_length; |
| 205 DWORD session_id = 0; |
206 | 206 |
207 CHECK(::OpenProcessToken(::GetCurrentProcess(), TOKEN_QUERY, &token)); | 207 CHECK(::OpenProcessToken(::GetCurrentProcess(), TOKEN_QUERY, &token)); |
208 CHECK(::GetTokenInformation(token, TokenSessionId, &session_id, | 208 CHECK(::GetTokenInformation(token, TokenSessionId, &session_id, |
209 sizeof(session_id), &session_id_length)); | 209 sizeof(session_id), &session_id_length)); |
210 CloseHandle(token); | 210 CloseHandle(token); |
211 | 211 s_session_id = session_id; |
212 session_prefix = new string16(base::StringPrintf(L"\\Sessions\\%d", | |
213 session_id)); | |
214 } | 212 } |
215 | 213 |
216 return *session_prefix + object; | 214 return base::StringPrintf(L"\\Sessions\\%d%ls", s_session_id, object); |
217 } | 215 } |
218 | 216 |
219 // Closes handles that are opened at process creation and initialization. | 217 // Closes handles that are opened at process creation and initialization. |
220 void AddBaseHandleClosePolicy(sandbox::TargetPolicy* policy) { | 218 void AddBaseHandleClosePolicy(sandbox::TargetPolicy* policy) { |
221 // Being able to manipulate anything BaseNamedObjects is bad. | 219 // Being able to manipulate anything BaseNamedObjects is bad. |
222 policy->AddKernelObjectToClose(L"Directory", PrependWindowsSessionPath( | 220 policy->AddKernelObjectToClose(L"Directory", PrependWindowsSessionPath( |
223 L"\\BaseNamedObjects").data()); | 221 L"\\BaseNamedObjects").data()); |
224 policy->AddKernelObjectToClose(L"Section", PrependWindowsSessionPath( | 222 policy->AddKernelObjectToClose(L"Section", PrependWindowsSessionPath( |
225 L"\\BaseNamedObjects\\windows_shell_global_counters").data()); | 223 L"\\BaseNamedObjects\\windows_shell_global_counters").data()); |
226 } | 224 } |
(...skipping 276 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
503 | 501 |
504 // Help the process a little. It can't start the debugger by itself if | 502 // Help the process a little. It can't start the debugger by itself if |
505 // the process is in a sandbox. | 503 // the process is in a sandbox. |
506 if (child_needs_help) | 504 if (child_needs_help) |
507 base::debug::SpawnDebuggerOnProcess(target.dwProcessId); | 505 base::debug::SpawnDebuggerOnProcess(target.dwProcessId); |
508 | 506 |
509 return process; | 507 return process; |
510 } | 508 } |
511 | 509 |
512 } // namespace sandbox | 510 } // namespace sandbox |
OLD | NEW |