Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(7373)

Unified Diff: chrome_elf/chrome_elf_util.cc

Issue 1656453002: [Chrome ELF] Early browser security support. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 4 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome_elf/chrome_elf_util.cc
diff --git a/chrome_elf/chrome_elf_util.cc b/chrome_elf/chrome_elf_util.cc
index a3fd727e9d2ebdf54d795bf3bd3b76e0d97bca86..b029c25c89057808ff794d65e10e350265374e24 100644
--- a/chrome_elf/chrome_elf_util.cc
+++ b/chrome_elf/chrome_elf_util.cc
@@ -5,7 +5,6 @@
#include "chrome_elf/chrome_elf_util.h"
#include <assert.h>
-#include <windows.h>
#include <stddef.h>
#include "base/macros.h"
@@ -222,3 +221,26 @@ bool IsNonBrowserProcess() {
assert(g_process_type != ProcessType::UNINITIALIZED);
return g_process_type == ProcessType::NON_BROWSER_PROCESS;
}
+
+typedef decltype(SetProcessMitigationPolicy)* SetProcessMitigationPolicyFunc;
+
+void EarlyBrowserSecurity() {
+ // This function is called from within DllMain.
+ // Don't do anything naughty while we have the loader lock.
+
Will Harris 2016/01/30 01:19:05 nit: remove line
penny 2016/02/01 21:31:52 Done.
+ if (::IsWindows8OrGreater()) {
Will Harris 2016/01/30 01:19:05 What does this function pull in? we would normally
jschuh 2016/02/01 20:28:07 ELF doesn't depend on base. So, this is an easy wa
penny 2016/02/01 21:31:52 Yes indeed. I like these APIs. Supported back to
+ SetProcessMitigationPolicyFunc set_process_mitigation_policy =
+ reinterpret_cast<SetProcessMitigationPolicyFunc>(::GetProcAddress(
+ ::GetModuleHandleW(L"kernel32.dll"), "SetProcessMitigationPolicy"));
+ if (set_process_mitigation_policy) {
+ // Disable extension DLLs in this process.
+ // (Legacy hooking.)
+ PROCESS_MITIGATION_EXTENSION_POINT_DISABLE_POLICY policy = {};
+ policy.DisableExtensionPoints = true;
+
+ set_process_mitigation_policy(ProcessExtensionPointDisablePolicy, &policy,
+ sizeof(policy));
+ }
Will Harris 2016/01/30 01:19:05 my vote would be a DCHECK here, this would trip th
jschuh 2016/02/01 20:28:07 I don't think you can introduce that dependency ei
grt (UTC plus 2) 2016/02/01 20:43:06 nit: prefer the __debugbreak() compiler intrinsic
penny 2016/02/01 21:31:52 Done. I'm in the habit of using the intrinsic as
grt (UTC plus 2) 2016/02/02 01:12:29 As a rule of thumb: crash the process in a release
+ }
+ return;
+}

Powered by Google App Engine
This is Rietveld 408576698