OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "base/strings/stringprintf.h" | 5 #include "base/strings/stringprintf.h" |
6 #include "base/win/scoped_handle.h" | 6 #include "base/win/scoped_handle.h" |
7 | 7 |
8 #include "base/win/windows_version.h" | 8 #include "base/win/windows_version.h" |
9 #include "sandbox/win/src/nt_internals.h" | 9 #include "sandbox/win/src/nt_internals.h" |
10 #include "sandbox/win/src/process_mitigations.h" | 10 #include "sandbox/win/src/process_mitigations.h" |
(...skipping 147 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
158 return SBOX_TEST_NOT_FOUND; | 158 return SBOX_TEST_NOT_FOUND; |
159 | 159 |
160 ULONG size = 0; | 160 ULONG size = 0; |
161 ULONG dep_flags = 0; | 161 ULONG dep_flags = 0; |
162 if (!SUCCEEDED(query_information_process(::GetCurrentProcess(), | 162 if (!SUCCEEDED(query_information_process(::GetCurrentProcess(), |
163 ProcessExecuteFlags, &dep_flags, | 163 ProcessExecuteFlags, &dep_flags, |
164 sizeof(dep_flags), &size))) { | 164 sizeof(dep_flags), &size))) { |
165 return SBOX_TEST_THIRD_ERROR; | 165 return SBOX_TEST_THIRD_ERROR; |
166 } | 166 } |
167 | 167 |
168 static const int MEM_EXECUTE_OPTION_ENABLE = 1; | |
169 static const int MEM_EXECUTE_OPTION_DISABLE = 2; | 168 static const int MEM_EXECUTE_OPTION_DISABLE = 2; |
170 static const int MEM_EXECUTE_OPTION_ATL7_THUNK_EMULATION = 4; | |
171 static const int MEM_EXECUTE_OPTION_PERMANENT = 8; | 169 static const int MEM_EXECUTE_OPTION_PERMANENT = 8; |
172 dep_flags &= 0xff; | 170 dep_flags &= 0xff; |
173 | 171 |
174 if (dep_flags != (MEM_EXECUTE_OPTION_DISABLE | | 172 if (dep_flags != (MEM_EXECUTE_OPTION_DISABLE | |
175 MEM_EXECUTE_OPTION_PERMANENT)) { | 173 MEM_EXECUTE_OPTION_PERMANENT)) { |
176 return SBOX_TEST_FOURTH_ERROR; | 174 return SBOX_TEST_FOURTH_ERROR; |
177 } | 175 } |
178 } | 176 } |
179 | 177 |
180 return SBOX_TEST_SUCCEEDED; | 178 return SBOX_TEST_SUCCEEDED; |
(...skipping 58 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
239 EXPECT_EQ(policy->SetProcessMitigations(MITIGATION_WIN32K_DISABLE), | 237 EXPECT_EQ(policy->SetProcessMitigations(MITIGATION_WIN32K_DISABLE), |
240 SBOX_ALL_OK); | 238 SBOX_ALL_OK); |
241 EXPECT_EQ(policy->AddRule(sandbox::TargetPolicy::SUBSYS_WIN32K_LOCKDOWN, | 239 EXPECT_EQ(policy->AddRule(sandbox::TargetPolicy::SUBSYS_WIN32K_LOCKDOWN, |
242 sandbox::TargetPolicy::FAKE_USER_GDI_INIT, NULL), | 240 sandbox::TargetPolicy::FAKE_USER_GDI_INIT, NULL), |
243 sandbox::SBOX_ALL_OK); | 241 sandbox::SBOX_ALL_OK); |
244 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"CheckWin8Lockdown")); | 242 EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"CheckWin8Lockdown")); |
245 } | 243 } |
246 | 244 |
247 } // namespace sandbox | 245 } // namespace sandbox |
248 | 246 |
OLD | NEW |