Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(222)

Side by Side Diff: content/common/sandbox_policy.cc

Issue 10690058: Add sandbox support for Windows process mitigations (Closed) Base URL: https://src.chromium.org/svn/trunk/src/
Patch Set: Created 8 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "content/common/sandbox_policy.h" 5 #include "content/common/sandbox_policy.h"
6 6
7 #include <string> 7 #include <string>
8 8
9 #include "base/command_line.h" 9 #include "base/command_line.h"
10 #include "base/debug/debugger.h" 10 #include "base/debug/debugger.h"
11 #include "base/debug/trace_event.h" 11 #include "base/debug/trace_event.h"
12 #include "base/file_util.h" 12 #include "base/file_util.h"
13 #include "base/lazy_instance.h" 13 #include "base/lazy_instance.h"
14 #include "base/logging.h" 14 #include "base/logging.h"
15 #include "base/path_service.h" 15 #include "base/path_service.h"
16 #include "base/process_util.h" 16 #include "base/process_util.h"
17 #include "base/string_util.h" 17 #include "base/string_util.h"
18 #include "base/stringprintf.h" 18 #include "base/stringprintf.h"
19 #include "base/win/iat_patch_function.h" 19 #include "base/win/iat_patch_function.h"
20 #include "base/win/scoped_handle.h" 20 #include "base/win/scoped_handle.h"
21 #include "base/win/scoped_process_information.h" 21 #include "base/win/scoped_process_information.h"
22 #include "base/win/windows_version.h" 22 #include "base/win/windows_version.h"
23 #include "content/common/debug_flags.h" 23 #include "content/common/debug_flags.h"
24 #include "content/public/common/content_client.h" 24 #include "content/public/common/content_client.h"
25 #include "content/public/common/content_switches.h" 25 #include "content/public/common/content_switches.h"
26 #include "content/public/common/process_type.h" 26 #include "content/public/common/process_type.h"
27 #include "content/public/common/sandbox_init.h" 27 #include "content/public/common/sandbox_init.h"
28 #include "sandbox/win/src/process_mitigations.h"
28 #include "sandbox/win/src/sandbox.h" 29 #include "sandbox/win/src/sandbox.h"
29 #include "sandbox/win/src/sandbox_nt_util.h" 30 #include "sandbox/win/src/sandbox_nt_util.h"
30 #include "sandbox/win/src/win_utils.h" 31 #include "sandbox/win/src/win_utils.h"
31 #include "ui/gl/gl_switches.h" 32 #include "ui/gl/gl_switches.h"
32 33
33 static sandbox::BrokerServices* g_broker_services = NULL; 34 static sandbox::BrokerServices* g_broker_services = NULL;
34 static sandbox::TargetServices* g_target_services = NULL; 35 static sandbox::TargetServices* g_target_services = NULL;
35 36
36 namespace { 37 namespace {
37 38
38 // The DLLs listed here are known (or under strong suspicion) of causing crashes 39 // The DLLs listed here are known (or under strong suspicion) of causing crashes
39 // when they are loaded in the renderer. Note: at runtime we generate short 40 // when they are loaded in the renderer. Note: at runtime we generate short
40 // versions of the dll name only if the dll has an extension. 41 // versions of the dll name only if the dll has an extension.
41 const wchar_t* const kTroublesomeDlls[] = { 42 const wchar_t* const kTroublesomeDlls[] = {
42 L"adialhk.dll", // Kaspersky Internet Security. 43 L"adialhk.dll", // Kaspersky Internet Security.
43 L"acpiz.dll", // Unknown. 44 L"acpiz.dll", // Unknown.
44 L"avgrsstx.dll", // AVG 8. 45 L"avgrsstx.dll", // AVG 8.
45 L"babylonchromepi.dll", // Babylon translator. 46 L"babylonchromepi.dll", // Babylon translator.
46 L"browsemngr.dll", // Uninstall blocker used by Babylon.
47 L"btkeyind.dll", // Widcomm Bluetooth. 47 L"btkeyind.dll", // Widcomm Bluetooth.
48 L"cmcsyshk.dll", // CMC Internet Security. 48 L"cmcsyshk.dll", // CMC Internet Security.
49 L"cmsetac.dll", // Unknown (suspected malware). 49 L"cmsetac.dll", // Unknown (suspected malware).
50 L"cooliris.dll", // CoolIris. 50 L"cooliris.dll", // CoolIris.
51 L"dockshellhook.dll", // Stardock Objectdock. 51 L"dockshellhook.dll", // Stardock Objectdock.
52 L"easyhook32.dll", // GDIPP and others. 52 L"easyhook32.dll", // GDIPP and others.
53 L"googledesktopnetwork3.dll", // Google Desktop Search v5. 53 L"googledesktopnetwork3.dll", // Google Desktop Search v5.
54 L"fwhook.dll", // PC Tools Firewall Plus. 54 L"fwhook.dll", // PC Tools Firewall Plus.
55 L"hookprocesscreation.dll", // Blumentals Program protector. 55 L"hookprocesscreation.dll", // Blumentals Program protector.
56 L"hookterminateapis.dll", // Blumentals and Cyberprinter. 56 L"hookterminateapis.dll", // Blumentals and Cyberprinter.
(...skipping 663 matching lines...) Expand 10 before | Expand all | Expand 10 after
720 #endif 720 #endif
721 721
722 if (!in_sandbox) { 722 if (!in_sandbox) {
723 policy->Release(); 723 policy->Release();
724 base::ProcessHandle process = 0; 724 base::ProcessHandle process = 0;
725 base::LaunchProcess(*cmd_line, base::LaunchOptions(), &process); 725 base::LaunchProcess(*cmd_line, base::LaunchOptions(), &process);
726 g_broker_services->AddTargetPeer(process); 726 g_broker_services->AddTargetPeer(process);
727 return process; 727 return process;
728 } 728 }
729 729
730 // TODO(jschuh): Add all Win8 mitigations. crbug.com/147752
731 if (type != content::PROCESS_TYPE_NACL_LOADER) {
732 if (policy->SetProcessMitigations(MITIGATION_DEP |
733 MITIGATION_DEP_NO_ATL_THUNK |
734 MITIGATION_SEHOP |
735 MITIGATION_BOTTOM_UP_ASLR)
736 != sandbox::SBOX_ALL_OK) {
737 return 0;
738 }
739 } else {
740 // TODO(jschuh): Make NaCl work with DEP and SEHOP. crbug.com/147752
741 if (policy->SetDelayedProcessMitigations(MITIGATION_DEP |
742 MITIGATION_DEP_NO_ATL_THUNK)
743 != sandbox::SBOX_ALL_OK) {
744 return 0;
745 }
746 if (policy->SetProcessMitigations(MITIGATION_BOTTOM_UP_ASLR)
747 != sandbox::SBOX_ALL_OK) {
748 return 0;
749 }
750 }
751
730 if (type == content::PROCESS_TYPE_PLUGIN) { 752 if (type == content::PROCESS_TYPE_PLUGIN) {
731 AddGenericDllEvictionPolicy(policy); 753 AddGenericDllEvictionPolicy(policy);
732 AddPluginDllEvictionPolicy(policy); 754 AddPluginDllEvictionPolicy(policy);
733 } else if (type == content::PROCESS_TYPE_GPU) { 755 } else if (type == content::PROCESS_TYPE_GPU) {
734 if (!AddPolicyForGPU(cmd_line, policy)) 756 if (!AddPolicyForGPU(cmd_line, policy))
735 return 0; 757 return 0;
736 } else { 758 } else {
737 if (!AddPolicyForRenderer(policy)) 759 if (!AddPolicyForRenderer(policy))
738 return 0; 760 return 0;
739 // TODO(jschuh): Need get these restrictions applied to NaCl and Pepper. 761 // TODO(jschuh): Need get these restrictions applied to NaCl and Pepper.
(...skipping 126 matching lines...) Expand 10 before | Expand all | Expand 10 after
866 return g_broker_services->AddTargetPeer(peer_process) == sandbox::SBOX_ALL_OK; 888 return g_broker_services->AddTargetPeer(peer_process) == sandbox::SBOX_ALL_OK;
867 } 889 }
868 890
869 base::ProcessHandle StartProcessWithAccess( 891 base::ProcessHandle StartProcessWithAccess(
870 CommandLine* cmd_line, 892 CommandLine* cmd_line,
871 const FilePath& exposed_dir) { 893 const FilePath& exposed_dir) {
872 return sandbox::StartProcessWithAccess(cmd_line, exposed_dir); 894 return sandbox::StartProcessWithAccess(cmd_line, exposed_dir);
873 } 895 }
874 896
875 } // namespace content 897 } // namespace content
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698