| Index: sandbox/win/src/process_mitigations_test.cc
|
| diff --git a/sandbox/win/src/process_mitigations_test.cc b/sandbox/win/src/process_mitigations_test.cc
|
| index 97636bcd84dcb7b1227efc4d6f875282c294fc3c..bf89a9ad987472ec1f5a1d95c18354be79d290db 100644
|
| --- a/sandbox/win/src/process_mitigations_test.cc
|
| +++ b/sandbox/win/src/process_mitigations_test.cc
|
| @@ -1,36 +1,48 @@
|
| -// Copyright (c) 2011 The Chromium Authors. All rights reserved.
|
| +// Copyright 2011 The Chromium Authors. All rights reserved.
|
| // Use of this source code is governed by a BSD-style license that can be
|
| // found in the LICENSE file.
|
|
|
| -#include <initguid.h>
|
| +#include "sandbox/win/src/process_mitigations.h"
|
| +
|
| #include <d3d9.h>
|
| -#include <Opmapi.h>
|
| +#include <initguid.h>
|
| +#include <opmapi.h>
|
| +#include <psapi.h>
|
| #include <windows.h>
|
|
|
| #include <map>
|
| #include <string>
|
|
|
| +#include "base/command_line.h"
|
| #include "base/files/file_util.h"
|
| #include "base/files/scoped_temp_dir.h"
|
| #include "base/memory/ref_counted.h"
|
| #include "base/path_service.h"
|
| #include "base/process/launch.h"
|
| +#include "base/scoped_native_library.h"
|
| #include "base/strings/stringprintf.h"
|
| #include "base/strings/utf_string_conversions.h"
|
| +#include "base/test/test_timeouts.h"
|
| +#include "base/win/registry.h"
|
| #include "base/win/scoped_handle.h"
|
| +#include "base/win/startup_information.h"
|
| +#include "base/win/win_util.h"
|
| #include "base/win/windows_version.h"
|
| #include "sandbox/win/src/nt_internals.h"
|
| -#include "sandbox/win/src/process_mitigations.h"
|
| #include "sandbox/win/src/process_mitigations_win32k_policy.h"
|
| #include "sandbox/win/src/sandbox.h"
|
| #include "sandbox/win/src/sandbox_factory.h"
|
| #include "sandbox/win/src/target_services.h"
|
| -#include "sandbox/win/src/win_utils.h"
|
| #include "sandbox/win/tests/common/controller.h"
|
| +#include "sandbox/win/tests/integration_tests/integration_tests_common.h"
|
| #include "testing/gtest/include/gtest/gtest.h"
|
|
|
| namespace {
|
|
|
| +// Timeouts for synchronization.
|
| +#define event_timeout \
|
| + static_cast<DWORD>((TestTimeouts::action_timeout()).InMillisecondsRoundedUp())
|
| +
|
| // API defined in winbase.h.
|
| typedef decltype(GetProcessDEPPolicy)* GetProcessDEPPolicyFunction;
|
|
|
| @@ -43,6 +55,10 @@ GetProcessMitigationPolicyFunction get_process_mitigation_policy;
|
| typedef decltype(AddFontMemResourceEx)* AddFontMemResourceExFunction;
|
| typedef decltype(RemoveFontMemResourceEx)* RemoveFontMemResourceExFunction;
|
|
|
| +// APIs defined in integration_tests_common.h
|
| +typedef decltype(WasHookCalled)* WasHookCalledFunction;
|
| +typedef decltype(SetHook)* SetHookFunction;
|
| +
|
| #if !defined(_WIN64)
|
| bool CheckWin8DepPolicy() {
|
| PROCESS_MITIGATION_DEP_POLICY policy = {};
|
| @@ -59,7 +75,7 @@ bool CheckWin8AslrPolicy() {
|
| PROCESS_MITIGATION_ASLR_POLICY policy = {};
|
| if (!get_process_mitigation_policy(::GetCurrentProcess(), ProcessASLRPolicy,
|
| &policy, sizeof(policy))) {
|
| - return false;
|
| + return false;
|
| }
|
| return policy.EnableForceRelocateImages && policy.DisallowStrippedImages;
|
| }
|
| @@ -68,9 +84,9 @@ bool CheckWin8AslrPolicy() {
|
| bool CheckWin8StrictHandlePolicy() {
|
| PROCESS_MITIGATION_STRICT_HANDLE_CHECK_POLICY policy = {};
|
| if (!get_process_mitigation_policy(::GetCurrentProcess(),
|
| - ProcessStrictHandleCheckPolicy,
|
| - &policy, sizeof(policy))) {
|
| - return false;
|
| + ProcessStrictHandleCheckPolicy, &policy,
|
| + sizeof(policy))) {
|
| + return false;
|
| }
|
| return policy.RaiseExceptionOnInvalidHandleReference &&
|
| policy.HandleExceptionsPermanentlyEnabled;
|
| @@ -79,19 +95,19 @@ bool CheckWin8StrictHandlePolicy() {
|
| bool CheckWin8Win32CallPolicy() {
|
| PROCESS_MITIGATION_SYSTEM_CALL_DISABLE_POLICY policy = {};
|
| if (!get_process_mitigation_policy(::GetCurrentProcess(),
|
| - ProcessSystemCallDisablePolicy,
|
| - &policy, sizeof(policy))) {
|
| - return false;
|
| + ProcessSystemCallDisablePolicy, &policy,
|
| + sizeof(policy))) {
|
| + return false;
|
| }
|
| return policy.DisallowWin32kSystemCalls;
|
| }
|
|
|
| -bool CheckWin8DllExtensionPolicy() {
|
| +bool CheckWin8ExtensionPointPolicy() {
|
| PROCESS_MITIGATION_EXTENSION_POINT_DISABLE_POLICY policy = {};
|
| if (!get_process_mitigation_policy(::GetCurrentProcess(),
|
| ProcessExtensionPointDisablePolicy,
|
| &policy, sizeof(policy))) {
|
| - return false;
|
| + return false;
|
| }
|
| return policy.DisableExtensionPoints;
|
| }
|
| @@ -116,8 +132,309 @@ bool CheckWin10ImageLoadNoRemotePolicy() {
|
| return policy.NoRemoteImages;
|
| }
|
|
|
| +// Spawn Windows process (with or without mitigation enabled).
|
| +bool SpawnWinProc(PROCESS_INFORMATION* pi, bool success_test, HANDLE* event) {
|
| + base::win::StartupInformation startup_info;
|
| + DWORD creation_flags = 0;
|
| +
|
| + if (!success_test) {
|
| + DWORD64 flags =
|
| + PROCESS_CREATION_MITIGATION_POLICY_EXTENSION_POINT_DISABLE_ALWAYS_ON;
|
| + // This test only runs on >= Win8, so don't have to handle
|
| + // illegal 64-bit flags on 32-bit <= Win7.
|
| + size_t flags_size = sizeof(flags);
|
| +
|
| + if (!startup_info.InitializeProcThreadAttributeList(1) ||
|
| + !startup_info.UpdateProcThreadAttribute(
|
| + PROC_THREAD_ATTRIBUTE_MITIGATION_POLICY, &flags, flags_size)) {
|
| + ADD_FAILURE();
|
| + return false;
|
| + }
|
| + creation_flags = EXTENDED_STARTUPINFO_PRESENT;
|
| + }
|
| +
|
| + // Command line must be writable.
|
| + base::string16 cmd_writeable(g_winproc_file);
|
| +
|
| + if (!::CreateProcessW(NULL, &cmd_writeable[0], NULL, NULL, FALSE,
|
| + creation_flags, NULL, NULL, startup_info.startup_info(),
|
| + pi)) {
|
| + ADD_FAILURE();
|
| + return false;
|
| + }
|
| + EXPECT_EQ(WAIT_OBJECT_0, ::WaitForSingleObject(*event, event_timeout));
|
| +
|
| + return true;
|
| +}
|
| +
|
| +//------------------------------------------------------------------------------
|
| +// 1. Spawn a Windows process (with or without mitigation enabled).
|
| +// 2. Load the hook Dll locally.
|
| +// 3. Create a global named event for the hook to trigger.
|
| +// 4. Start the hook (for the specific WinProc or globally).
|
| +// 5. Send a keystroke event.
|
| +// 6. Ask the hook Dll if it received a hook callback.
|
| +// 7. Cleanup the hooking.
|
| +// 8. Signal the Windows process to shutdown.
|
| +//
|
| +// Do NOT use any ASSERTs in this function. Cleanup required.
|
| +//------------------------------------------------------------------------------
|
| +void TestWin8ExtensionPointHookWrapper(bool is_success_test, bool global_hook) {
|
| + // Set up a couple global events that this test will use.
|
| + HANDLE winproc_event = ::CreateEventW(NULL, FALSE, FALSE, g_winproc_event);
|
| + if (winproc_event == NULL || winproc_event == INVALID_HANDLE_VALUE) {
|
| + ADD_FAILURE();
|
| + return;
|
| + }
|
| + base::win::ScopedHandle scoped_winproc_event(winproc_event);
|
| +
|
| + HANDLE hook_event = ::CreateEventW(NULL, FALSE, FALSE, g_hook_event);
|
| + if (hook_event == NULL || hook_event == INVALID_HANDLE_VALUE) {
|
| + ADD_FAILURE();
|
| + return;
|
| + }
|
| + base::win::ScopedHandle scoped_hook_event(hook_event);
|
| +
|
| + // 1. Spawn WinProc.
|
| + PROCESS_INFORMATION proc_info = {};
|
| + if (!SpawnWinProc(&proc_info, is_success_test, &winproc_event))
|
| + return;
|
| +
|
| + // From this point on, no return on failure. Cleanup required.
|
| + bool all_good = true;
|
| +
|
| + // 2. Load the hook DLL.
|
| + base::FilePath hook_dll_path(g_hook_dll_file);
|
| + base::ScopedNativeLibrary dll(hook_dll_path);
|
| + EXPECT_TRUE(dll.is_valid());
|
| +
|
| + HOOKPROC hook_proc =
|
| + reinterpret_cast<HOOKPROC>(dll.GetFunctionPointer(g_hook_handler_func));
|
| + WasHookCalledFunction was_hook_called =
|
| + reinterpret_cast<WasHookCalledFunction>(
|
| + dll.GetFunctionPointer(g_was_hook_called_func));
|
| + SetHookFunction set_hook = reinterpret_cast<SetHookFunction>(
|
| + dll.GetFunctionPointer(g_set_hook_func));
|
| + if (!hook_proc || !was_hook_called || !set_hook) {
|
| + ADD_FAILURE();
|
| + all_good = false;
|
| + }
|
| +
|
| + // 3. Try installing the hook (either on a remote target thread,
|
| + // or globally).
|
| + HHOOK hook = nullptr;
|
| + if (all_good) {
|
| + DWORD target = 0;
|
| + if (!global_hook)
|
| + target = proc_info.dwThreadId;
|
| + hook = ::SetWindowsHookExW(WH_KEYBOARD, hook_proc, dll.get(), target);
|
| + if (!hook) {
|
| + ADD_FAILURE();
|
| + all_good = false;
|
| + } else
|
| + // Pass the hook DLL the hook handle.
|
| + set_hook(hook);
|
| + }
|
| +
|
| + // 4. Inject a keyboard event.
|
| + if (all_good) {
|
| + // Note: that PostThreadMessage and SendMessage APIs will not deliver
|
| + // a keystroke in such a way that triggers a "legitimate" hook.
|
| + // Have to use targetless SendInput or keybd_event. The latter is
|
| + // less code and easier to work with.
|
| + keybd_event(VkKeyScan(L'A'), 0, 0, 0);
|
| + keybd_event(VkKeyScan(L'A'), 0, KEYEVENTF_KEYUP, 0);
|
| + // Give it a chance to hit the hook handler...
|
| + ::WaitForSingleObject(hook_event, event_timeout);
|
| +
|
| + // 5. Did the hook get hit? Was it expected to?
|
| + if (global_hook)
|
| + EXPECT_EQ((is_success_test ? true : false), was_hook_called());
|
| + else
|
| + // ***IMPORTANT: when targeting a specific thread id, the
|
| + // PROCESS_CREATION_MITIGATION_POLICY_EXTENSION_POINT_DISABLE
|
| + // mitigation does NOT disable the hook API. It ONLY
|
| + // stops global hooks from running in a process. Hence,
|
| + // the hook will hit (TRUE) even in the "failure"
|
| + // case for a non-global/targeted hook.
|
| + EXPECT_EQ((is_success_test ? true : true), was_hook_called());
|
| + }
|
| +
|
| + // 6. Disable hook.
|
| + if (hook)
|
| + EXPECT_TRUE(::UnhookWindowsHookEx(hook));
|
| +
|
| + // 7. Trigger shutdown of WinProc.
|
| + if (proc_info.hProcess) {
|
| + if (::PostThreadMessageW(proc_info.dwThreadId, WM_QUIT, 0, 0)) {
|
| + // Note: The combination/perfect-storm of a Global Hook, in a
|
| + // WinProc that has the EXTENSION_POINT_DISABLE mitigation ON, and the
|
| + // use of the SendInput or keybd_event API to inject a keystroke,
|
| + // results in the target becoming unresponsive. If any one of these
|
| + // states are changed, the problem does not occur. This means the WM_QUIT
|
| + // message is not handled and the call to WaitForSingleObject times out.
|
| + // Therefore not checking the return val.
|
| + ::WaitForSingleObject(winproc_event, event_timeout);
|
| + } else {
|
| + // Ensure no strays.
|
| + ::TerminateProcess(proc_info.hProcess, 0);
|
| + ADD_FAILURE();
|
| + }
|
| + EXPECT_TRUE(::CloseHandle(proc_info.hThread));
|
| + EXPECT_TRUE(::CloseHandle(proc_info.hProcess));
|
| + }
|
| +}
|
| +
|
| +//------------------------------------------------------------------------------
|
| +// 1. Set up the AppInit Dll in registry settings. (Enable)
|
| +// 2. Spawn a Windows process (with or without mitigation enabled).
|
| +// 3. Check if the AppInit Dll got loaded in the Windows process or not.
|
| +// 4. Signal the Windows process to shutdown.
|
| +// 5. Restore original reg settings.
|
| +//
|
| +// Do NOT use any ASSERTs in this function. Cleanup required.
|
| +//------------------------------------------------------------------------------
|
| +void TestWin8ExtensionPointAppInitWrapper(bool is_success_test) {
|
| + // 0.5 Get path of current module. The appropriate build of the
|
| + // AppInit DLL will be in the same directory (and the
|
| + // full path is needed for reg).
|
| + wchar_t path[MAX_PATH];
|
| + if (!::GetModuleFileNameW(NULL, path, MAX_PATH)) {
|
| + ADD_FAILURE();
|
| + return;
|
| + }
|
| + // Only want the directory. Switch file name for the AppInit DLL.
|
| + base::FilePath full_dll_path(path);
|
| + full_dll_path = full_dll_path.DirName();
|
| + full_dll_path = full_dll_path.Append(g_hook_dll_file);
|
| + wchar_t* non_const = const_cast<wchar_t*>(full_dll_path.value().c_str());
|
| + // Now make sure the path is in "short-name" form for registry.
|
| + DWORD length = ::GetShortPathNameW(non_const, NULL, 0);
|
| + std::vector<wchar_t> short_name(length);
|
| + if (!::GetShortPathNameW(non_const, &short_name[0], length)) {
|
| + ADD_FAILURE();
|
| + return;
|
| + }
|
| +
|
| + // 1. Reg setup.
|
| + const wchar_t* app_init_reg_path =
|
| + L"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Windows";
|
| + const wchar_t* dlls_value_name = L"AppInit_DLLs";
|
| + const wchar_t* enabled_value_name = L"LoadAppInit_DLLs";
|
| + const wchar_t* signing_value_name = L"RequireSignedAppInit_DLLs";
|
| + std::wstring orig_dlls;
|
| + std::wstring new_dlls;
|
| + DWORD orig_enabled_value = 0;
|
| + DWORD orig_signing_value = 0;
|
| + base::win::RegKey app_init_key(HKEY_LOCAL_MACHINE, app_init_reg_path,
|
| + KEY_QUERY_VALUE | KEY_SET_VALUE);
|
| + // Backup the existing settings.
|
| + if (!app_init_key.Valid() || !app_init_key.HasValue(dlls_value_name) ||
|
| + !app_init_key.HasValue(enabled_value_name) ||
|
| + ERROR_SUCCESS != app_init_key.ReadValue(dlls_value_name, &orig_dlls) ||
|
| + ERROR_SUCCESS !=
|
| + app_init_key.ReadValueDW(enabled_value_name, &orig_enabled_value)) {
|
| + ADD_FAILURE();
|
| + return;
|
| + }
|
| + if (app_init_key.HasValue(signing_value_name)) {
|
| + if (ERROR_SUCCESS !=
|
| + app_init_key.ReadValueDW(signing_value_name, &orig_signing_value)) {
|
| + ADD_FAILURE();
|
| + return;
|
| + }
|
| + }
|
| +
|
| + // Set the new settings (obviously requires local admin privileges).
|
| + new_dlls = orig_dlls;
|
| + if (!orig_dlls.empty())
|
| + new_dlls.append(L",");
|
| + new_dlls.append(short_name.data());
|
| +
|
| + // From this point on, no return on failure. Cleanup required.
|
| + bool all_good = true;
|
| +
|
| + if (app_init_key.HasValue(signing_value_name)) {
|
| + if (ERROR_SUCCESS !=
|
| + app_init_key.WriteValue(signing_value_name, static_cast<DWORD>(0))) {
|
| + ADD_FAILURE();
|
| + all_good = false;
|
| + }
|
| + }
|
| + if (ERROR_SUCCESS !=
|
| + app_init_key.WriteValue(dlls_value_name, new_dlls.c_str()) ||
|
| + ERROR_SUCCESS !=
|
| + app_init_key.WriteValue(enabled_value_name, static_cast<DWORD>(1))) {
|
| + ADD_FAILURE();
|
| + all_good = false;
|
| + }
|
| +
|
| + // 2. Spawn WinProc.
|
| + HANDLE winproc_event = INVALID_HANDLE_VALUE;
|
| + base::win::ScopedHandle scoped_event;
|
| + PROCESS_INFORMATION proc_info = {};
|
| + if (all_good) {
|
| + winproc_event = ::CreateEventW(NULL, FALSE, FALSE, g_winproc_event);
|
| + if (winproc_event == NULL || winproc_event == INVALID_HANDLE_VALUE) {
|
| + ADD_FAILURE();
|
| + all_good = false;
|
| + } else {
|
| + scoped_event.Set(winproc_event);
|
| + if (!SpawnWinProc(&proc_info, is_success_test, &winproc_event))
|
| + all_good = false;
|
| + }
|
| + }
|
| +
|
| + // 3. Check loaded modules in WinProc to see if the AppInit dll is loaded.
|
| + bool dll_loaded = false;
|
| + if (all_good) {
|
| + std::vector<HMODULE>(modules);
|
| + if (!base::win::GetLoadedModulesSnapshot(proc_info.hProcess, &modules)) {
|
| + ADD_FAILURE();
|
| + all_good = false;
|
| + } else {
|
| + for (auto module : modules) {
|
| + wchar_t name[MAX_PATH] = {};
|
| + if (::GetModuleFileNameExW(proc_info.hProcess, module, name,
|
| + MAX_PATH) &&
|
| + ::wcsstr(name, g_hook_dll_file)) {
|
| + // Found it.
|
| + dll_loaded = true;
|
| + break;
|
| + }
|
| + }
|
| + }
|
| + }
|
| +
|
| + // Was the test result as expected?
|
| + if (all_good)
|
| + EXPECT_EQ((is_success_test ? true : false), dll_loaded);
|
| +
|
| + // 4. Trigger shutdown of WinProc.
|
| + if (proc_info.hProcess) {
|
| + if (::PostThreadMessageW(proc_info.dwThreadId, WM_QUIT, 0, 0)) {
|
| + ::WaitForSingleObject(winproc_event, event_timeout);
|
| + } else {
|
| + // Ensure no strays.
|
| + ::TerminateProcess(proc_info.hProcess, 0);
|
| + ADD_FAILURE();
|
| + }
|
| + EXPECT_TRUE(::CloseHandle(proc_info.hThread));
|
| + EXPECT_TRUE(::CloseHandle(proc_info.hProcess));
|
| + }
|
| +
|
| + // 5. Reg Restore
|
| + EXPECT_EQ(ERROR_SUCCESS,
|
| + app_init_key.WriteValue(enabled_value_name, orig_enabled_value));
|
| + if (app_init_key.HasValue(signing_value_name))
|
| + EXPECT_EQ(ERROR_SUCCESS,
|
| + app_init_key.WriteValue(signing_value_name, orig_signing_value));
|
| + EXPECT_EQ(ERROR_SUCCESS,
|
| + app_init_key.WriteValue(dlls_value_name, orig_dlls.c_str()));
|
| +}
|
| +
|
| void TestWin10ImageLoadRemote(bool is_success_test) {
|
| - // ***Insert your manual testing share UNC path here!
|
| + // ***Insert a manual testing share UNC path here!
|
| // E.g.: \\\\hostname\\sharename\\calc.exe
|
| std::wstring unc = L"\"\\\\hostname\\sharename\\calc.exe\"";
|
|
|
| @@ -526,17 +843,15 @@ SBOX_TESTS_COMMAND int TestChildProcess(int argc, wchar_t** argv) {
|
| //------------------------------------------------------------------------------
|
| // Win8 Checks:
|
| // MITIGATION_DEP(_NO_ATL_THUNK)
|
| -// MITIGATION_EXTENSION_DLL_DISABLE
|
| // MITIGATION_RELOCATE_IMAGE(_REQUIRED) - ASLR, release only
|
| // MITIGATION_STRICT_HANDLE_CHECKS
|
| // >= Win8
|
| //------------------------------------------------------------------------------
|
|
|
| -SBOX_TESTS_COMMAND int CheckWin8(int argc, wchar_t **argv) {
|
| +SBOX_TESTS_COMMAND int CheckWin8(int argc, wchar_t** argv) {
|
| get_process_mitigation_policy =
|
| - reinterpret_cast<GetProcessMitigationPolicyFunction>(
|
| - ::GetProcAddress(::GetModuleHandleW(L"kernel32.dll"),
|
| - "GetProcessMitigationPolicy"));
|
| + reinterpret_cast<GetProcessMitigationPolicyFunction>(::GetProcAddress(
|
| + ::GetModuleHandleW(L"kernel32.dll"), "GetProcessMitigationPolicy"));
|
| if (!get_process_mitigation_policy)
|
| return SBOX_TEST_NOT_FOUND;
|
|
|
| @@ -553,9 +868,6 @@ SBOX_TESTS_COMMAND int CheckWin8(int argc, wchar_t **argv) {
|
| if (!CheckWin8StrictHandlePolicy())
|
| return SBOX_TEST_THIRD_ERROR;
|
|
|
| - if (!CheckWin8DllExtensionPolicy())
|
| - return SBOX_TEST_FIFTH_ERROR;
|
| -
|
| return SBOX_TEST_SUCCEEDED;
|
| }
|
|
|
| @@ -566,12 +878,10 @@ TEST(ProcessMitigationsTest, CheckWin8) {
|
| TestRunner runner;
|
| sandbox::TargetPolicy* policy = runner.GetPolicy();
|
|
|
| - sandbox::MitigationFlags mitigations = MITIGATION_DEP |
|
| - MITIGATION_DEP_NO_ATL_THUNK |
|
| - MITIGATION_EXTENSION_DLL_DISABLE;
|
| + sandbox::MitigationFlags mitigations =
|
| + MITIGATION_DEP | MITIGATION_DEP_NO_ATL_THUNK;
|
| #if defined(NDEBUG) // ASLR cannot be forced in debug builds.
|
| - mitigations |= MITIGATION_RELOCATE_IMAGE |
|
| - MITIGATION_RELOCATE_IMAGE_REQUIRED;
|
| + mitigations |= MITIGATION_RELOCATE_IMAGE | MITIGATION_RELOCATE_IMAGE_REQUIRED;
|
| #endif
|
|
|
| EXPECT_EQ(policy->SetProcessMitigations(mitigations), SBOX_ALL_OK);
|
| @@ -588,17 +898,16 @@ TEST(ProcessMitigationsTest, CheckWin8) {
|
| // < Win8 x86
|
| //------------------------------------------------------------------------------
|
|
|
| -SBOX_TESTS_COMMAND int CheckDep(int argc, wchar_t **argv) {
|
| +SBOX_TESTS_COMMAND int CheckDep(int argc, wchar_t** argv) {
|
| GetProcessDEPPolicyFunction get_process_dep_policy =
|
| - reinterpret_cast<GetProcessDEPPolicyFunction>(
|
| - ::GetProcAddress(::GetModuleHandleW(L"kernel32.dll"),
|
| - "GetProcessDEPPolicy"));
|
| + reinterpret_cast<GetProcessDEPPolicyFunction>(::GetProcAddress(
|
| + ::GetModuleHandleW(L"kernel32.dll"), "GetProcessDEPPolicy"));
|
| if (get_process_dep_policy) {
|
| BOOL is_permanent = FALSE;
|
| DWORD dep_flags = 0;
|
|
|
| if (!get_process_dep_policy(::GetCurrentProcess(), &dep_flags,
|
| - &is_permanent)) {
|
| + &is_permanent)) {
|
| return SBOX_TEST_FIRST_ERROR;
|
| }
|
|
|
| @@ -608,7 +917,7 @@ SBOX_TESTS_COMMAND int CheckDep(int argc, wchar_t **argv) {
|
| } else {
|
| NtQueryInformationProcessFunction query_information_process = NULL;
|
| ResolveNTFunctionPtr("NtQueryInformationProcess",
|
| - &query_information_process);
|
| + &query_information_process);
|
| if (!query_information_process)
|
| return SBOX_TEST_NOT_FOUND;
|
|
|
| @@ -624,8 +933,8 @@ SBOX_TESTS_COMMAND int CheckDep(int argc, wchar_t **argv) {
|
| static const int MEM_EXECUTE_OPTION_PERMANENT = 8;
|
| dep_flags &= 0xff;
|
|
|
| - if (dep_flags != (MEM_EXECUTE_OPTION_DISABLE |
|
| - MEM_EXECUTE_OPTION_PERMANENT)) {
|
| + if (dep_flags !=
|
| + (MEM_EXECUTE_OPTION_DISABLE | MEM_EXECUTE_OPTION_PERMANENT)) {
|
| return SBOX_TEST_FOURTH_ERROR;
|
| }
|
| }
|
| @@ -641,10 +950,9 @@ TEST(ProcessMitigationsTest, CheckDep) {
|
| TestRunner runner;
|
| sandbox::TargetPolicy* policy = runner.GetPolicy();
|
|
|
| - EXPECT_EQ(policy->SetProcessMitigations(
|
| - MITIGATION_DEP |
|
| - MITIGATION_DEP_NO_ATL_THUNK |
|
| - MITIGATION_SEHOP),
|
| + EXPECT_EQ(policy->SetProcessMitigations(MITIGATION_DEP |
|
| + MITIGATION_DEP_NO_ATL_THUNK |
|
| + MITIGATION_SEHOP),
|
| SBOX_ALL_OK);
|
| EXPECT_EQ(SBOX_TEST_SUCCEEDED, runner.RunTest(L"CheckDep"));
|
| }
|
| @@ -655,11 +963,10 @@ TEST(ProcessMitigationsTest, CheckDep) {
|
| // >= Win8
|
| //------------------------------------------------------------------------------
|
|
|
| -SBOX_TESTS_COMMAND int CheckWin8Lockdown(int argc, wchar_t **argv) {
|
| +SBOX_TESTS_COMMAND int CheckWin8Lockdown(int argc, wchar_t** argv) {
|
| get_process_mitigation_policy =
|
| - reinterpret_cast<GetProcessMitigationPolicyFunction>(
|
| - ::GetProcAddress(::GetModuleHandleW(L"kernel32.dll"),
|
| - "GetProcessMitigationPolicy"));
|
| + reinterpret_cast<GetProcessMitigationPolicyFunction>(::GetProcAddress(
|
| + ::GetModuleHandleW(L"kernel32.dll"), "GetProcessMitigationPolicy"));
|
| if (!get_process_mitigation_policy)
|
| return SBOX_TEST_NOT_FOUND;
|
|
|
| @@ -1029,6 +1336,158 @@ TEST(ProcessMitigationsTest, CheckWin8Win32KRedirection) {
|
| }
|
|
|
| //------------------------------------------------------------------------------
|
| +// Disable extension points (MITIGATION_EXTENSION_POINT_DISABLE).
|
| +// >= Win8
|
| +//------------------------------------------------------------------------------
|
| +SBOX_TESTS_COMMAND int CheckWin8ExtensionPointSetting(int argc,
|
| + wchar_t** argv) {
|
| + get_process_mitigation_policy =
|
| + reinterpret_cast<GetProcessMitigationPolicyFunction>(::GetProcAddress(
|
| + ::GetModuleHandleW(L"kernel32.dll"), "GetProcessMitigationPolicy"));
|
| + if (!get_process_mitigation_policy)
|
| + return SBOX_TEST_NOT_FOUND;
|
| +
|
| + if (!CheckWin8ExtensionPointPolicy())
|
| + return SBOX_TEST_FIRST_ERROR;
|
| + return SBOX_TEST_SUCCEEDED;
|
| +}
|
| +
|
| +// This test validates that setting the MITIGATION_EXTENSION_POINT_DISABLE
|
| +// mitigation enables the setting on a process.
|
| +TEST(ProcessMitigationsTest, CheckWin8ExtensionPointPolicySuccess) {
|
| + if (base::win::GetVersion() < base::win::VERSION_WIN8)
|
| + return;
|
| +
|
| + TestRunner runner;
|
| + sandbox::TargetPolicy* policy = runner.GetPolicy();
|
| +
|
| + EXPECT_EQ(policy->SetProcessMitigations(MITIGATION_EXTENSION_POINT_DISABLE),
|
| + SBOX_ALL_OK);
|
| + EXPECT_EQ(SBOX_TEST_SUCCEEDED,
|
| + runner.RunTest(L"CheckWin8ExtensionPointSetting"));
|
| +}
|
| +
|
| +// This test validates that a "legitimate" global hook CAN be set on the
|
| +// sandboxed proc/thread if the MITIGATION_EXTENSION_POINT_DISABLE
|
| +// mitigation is not set.
|
| +//
|
| +// MANUAL testing only.
|
| +TEST(ProcessMitigationsTest,
|
| + DISABLED_CheckWin8ExtensionPoint_GlobalHook_Success) {
|
| + if (base::win::GetVersion() < base::win::VERSION_WIN8)
|
| + return;
|
| +
|
| + HANDLE mutex = ::CreateMutexW(NULL, FALSE, g_extension_point_test_mutex);
|
| + EXPECT_TRUE(mutex != NULL && mutex != INVALID_HANDLE_VALUE);
|
| + EXPECT_EQ(WAIT_OBJECT_0, ::WaitForSingleObject(mutex, event_timeout));
|
| +
|
| + // (is_success_test, global_hook)
|
| + TestWin8ExtensionPointHookWrapper(true, true);
|
| +
|
| + EXPECT_TRUE(::ReleaseMutex(mutex));
|
| + EXPECT_TRUE(::CloseHandle(mutex));
|
| +}
|
| +
|
| +// This test validates that setting the MITIGATION_EXTENSION_POINT_DISABLE
|
| +// mitigation prevents a global hook on WinProc.
|
| +//
|
| +// MANUAL testing only.
|
| +TEST(ProcessMitigationsTest,
|
| + DISABLED_CheckWin8ExtensionPoint_GlobalHook_Failure) {
|
| + if (base::win::GetVersion() < base::win::VERSION_WIN8)
|
| + return;
|
| +
|
| + HANDLE mutex = ::CreateMutexW(NULL, FALSE, g_extension_point_test_mutex);
|
| + EXPECT_TRUE(mutex != NULL && mutex != INVALID_HANDLE_VALUE);
|
| + EXPECT_EQ(WAIT_OBJECT_0, ::WaitForSingleObject(mutex, event_timeout));
|
| +
|
| + // (is_success_test, global_hook)
|
| + TestWin8ExtensionPointHookWrapper(false, true);
|
| +
|
| + EXPECT_TRUE(::ReleaseMutex(mutex));
|
| + EXPECT_TRUE(::CloseHandle(mutex));
|
| +}
|
| +
|
| +// This test validates that a "legitimate" hook CAN be set on the sandboxed
|
| +// proc/thread if the MITIGATION_EXTENSION_POINT_DISABLE mitigation is not set.
|
| +//
|
| +// MANUAL testing only.
|
| +TEST(ProcessMitigationsTest, DISABLED_CheckWin8ExtensionPoint_Hook_Success) {
|
| + if (base::win::GetVersion() < base::win::VERSION_WIN8)
|
| + return;
|
| +
|
| + HANDLE mutex = ::CreateMutexW(NULL, FALSE, g_extension_point_test_mutex);
|
| + EXPECT_TRUE(mutex != NULL && mutex != INVALID_HANDLE_VALUE);
|
| + EXPECT_EQ(WAIT_OBJECT_0, ::WaitForSingleObject(mutex, event_timeout));
|
| +
|
| + // (is_success_test, global_hook)
|
| + TestWin8ExtensionPointHookWrapper(true, false);
|
| +
|
| + EXPECT_TRUE(::ReleaseMutex(mutex));
|
| + EXPECT_TRUE(::CloseHandle(mutex));
|
| +}
|
| +
|
| +// *** Important: MITIGATION_EXTENSION_POINT_DISABLE does NOT prevent
|
| +// hooks targetted at a specific thread id. It only prevents
|
| +// global hooks. So this test does NOT actually expect the hook
|
| +// to fail (see TestWin8ExtensionPointHookWrapper function) even
|
| +// with the mitigation on.
|
| +//
|
| +// MANUAL testing only.
|
| +TEST(ProcessMitigationsTest, DISABLED_CheckWin8ExtensionPoint_Hook_Failure) {
|
| + if (base::win::GetVersion() < base::win::VERSION_WIN8)
|
| + return;
|
| +
|
| + HANDLE mutex = ::CreateMutexW(NULL, FALSE, g_extension_point_test_mutex);
|
| + EXPECT_TRUE(mutex != NULL && mutex != INVALID_HANDLE_VALUE);
|
| + EXPECT_EQ(WAIT_OBJECT_0, ::WaitForSingleObject(mutex, event_timeout));
|
| +
|
| + // (is_success_test, global_hook)
|
| + TestWin8ExtensionPointHookWrapper(false, false);
|
| +
|
| + EXPECT_TRUE(::ReleaseMutex(mutex));
|
| + EXPECT_TRUE(::CloseHandle(mutex));
|
| +}
|
| +
|
| +// This test validates that an AppInit Dll CAN be added to a target
|
| +// WinProc if the MITIGATION_EXTENSION_POINT_DISABLE mitigation is not set.
|
| +//
|
| +// MANUAL testing only.
|
| +// Must run this test as admin/elevated.
|
| +TEST(ProcessMitigationsTest, DISABLED_CheckWin8ExtensionPoint_AppInit_Success) {
|
| + if (base::win::GetVersion() < base::win::VERSION_WIN8)
|
| + return;
|
| +
|
| + HANDLE mutex = ::CreateMutexW(NULL, FALSE, g_extension_point_test_mutex);
|
| + EXPECT_TRUE(mutex != NULL && mutex != INVALID_HANDLE_VALUE);
|
| + EXPECT_EQ(WAIT_OBJECT_0, ::WaitForSingleObject(mutex, event_timeout));
|
| +
|
| + TestWin8ExtensionPointAppInitWrapper(true);
|
| +
|
| + EXPECT_TRUE(::ReleaseMutex(mutex));
|
| + EXPECT_TRUE(::CloseHandle(mutex));
|
| +}
|
| +
|
| +// This test validates that setting the MITIGATION_EXTENSION_POINT_DISABLE
|
| +// mitigation prevents the loading of any AppInit Dll into WinProc.
|
| +//
|
| +// MANUAL testing only.
|
| +// Must run this test as admin/elevated.
|
| +TEST(ProcessMitigationsTest, DISABLED_CheckWin8ExtensionPoint_AppInit_Failure) {
|
| + if (base::win::GetVersion() < base::win::VERSION_WIN8)
|
| + return;
|
| +
|
| + HANDLE mutex = ::CreateMutexW(NULL, FALSE, g_extension_point_test_mutex);
|
| + EXPECT_TRUE(mutex != NULL && mutex != INVALID_HANDLE_VALUE);
|
| + EXPECT_EQ(WAIT_OBJECT_0, ::WaitForSingleObject(mutex, event_timeout));
|
| +
|
| + TestWin8ExtensionPointAppInitWrapper(false);
|
| +
|
| + EXPECT_TRUE(::ReleaseMutex(mutex));
|
| + EXPECT_TRUE(::CloseHandle(mutex));
|
| +}
|
| +
|
| +//------------------------------------------------------------------------------
|
| // Disable non-system font loads (MITIGATION_NONSYSTEM_FONT_DISABLE)
|
| // >= Win10
|
| //------------------------------------------------------------------------------
|
| @@ -1193,7 +1652,7 @@ TEST(ProcessMitigationsTest, CheckWin10ImageLoadNoRemotePolicySuccess) {
|
| // a remote UNC device, if the MITIGATION_IMAGE_LOAD_NO_REMOTE
|
| // mitigation is NOT set.
|
| //
|
| -// DISABLED for automated testing bots. Enable for manual testing.
|
| +// MANUAL testing only.
|
| TEST(ProcessMitigationsTest, DISABLED_CheckWin10ImageLoadNoRemoteSuccess) {
|
| if (base::win::GetVersion() < base::win::VERSION_WIN10_TH2)
|
| return;
|
| @@ -1205,7 +1664,7 @@ TEST(ProcessMitigationsTest, DISABLED_CheckWin10ImageLoadNoRemoteSuccess) {
|
| // mitigation prevents creating a new process from a remote
|
| // UNC device.
|
| //
|
| -// DISABLED for automated testing bots. Enable for manual testing.
|
| +// MANUAL testing only.
|
| TEST(ProcessMitigationsTest, DISABLED_CheckWin10ImageLoadNoRemoteFailure) {
|
| if (base::win::GetVersion() < base::win::VERSION_WIN10_TH2)
|
| return;
|
|
|