| Index: chrome_elf/blacklist/blacklist.cc
|
| diff --git a/chrome_elf/blacklist/blacklist.cc b/chrome_elf/blacklist/blacklist.cc
|
| index d370793e7dd9c8723e9362b51651b00f75eba10e..0fdf91d274276396cf9578a67deb37005c7754ae 100644
|
| --- a/chrome_elf/blacklist/blacklist.cc
|
| +++ b/chrome_elf/blacklist/blacklist.cc
|
| @@ -12,7 +12,8 @@
|
| #include "chrome/install_static/install_util.h"
|
| #include "chrome_elf/blacklist/blacklist_interceptions.h"
|
| #include "chrome_elf/chrome_elf_constants.h"
|
| -#include "chrome_elf/thunk_getter.h"
|
| +#include "chrome_elf/hook_util/thunk_getter.h"
|
| +#include "chrome_elf/nt_registry/nt_registry.h"
|
| #include "sandbox/win/src/interception_internal.h"
|
| #include "sandbox/win/src/internal_types.h"
|
| #include "sandbox/win/src/service_resolver.h"
|
| @@ -20,7 +21,7 @@
|
| // http://blogs.msdn.com/oldnewthing/archive/2004/10/25/247180.aspx
|
| extern "C" IMAGE_DOS_HEADER __ImageBase;
|
|
|
| -namespace blacklist{
|
| +namespace blacklist {
|
|
|
| // The DLLs listed here are known (or under strong suspicion) of causing crashes
|
| // when they are loaded in the browser. DLLs should only be added to this list
|
| @@ -31,45 +32,45 @@ namespace blacklist{
|
| // NOTE: Please remember to update the DllHash enum in histograms.xml when
|
| // adding a new value to the blacklist.
|
| const wchar_t* g_troublesome_dlls[kTroublesomeDllsMaxCount] = {
|
| - L"949ba8b6a9.dll", // Coupon Time.
|
| - L"activedetect32.dll", // Lenovo One Key Theater.
|
| - // See crbug.com/379218.
|
| - L"activedetect64.dll", // Lenovo One Key Theater.
|
| - L"bitguard.dll", // Unknown (suspected malware).
|
| - L"bsvc.dll", // Unknown (suspected adware).
|
| - L"chrmxtn.dll", // Unknown (keystroke logger).
|
| - L"cplushook.dll", // Unknown (suspected malware).
|
| - L"crdli.dll", // Linkury Inc.
|
| - L"crdli64.dll", // Linkury Inc.
|
| - L"datamngr.dll", // Unknown (suspected adware).
|
| - L"dpinterface32.dll", // Unknown (suspected adware).
|
| - L"explorerex.dll", // Unknown (suspected adware).
|
| - L"hk.dll", // Unknown (keystroke logger).
|
| - L"libapi2hook.dll", // V-Bates.
|
| - L"libinject.dll", // V-Bates.
|
| - L"libinject2.dll", // V-Bates.
|
| - L"libredir2.dll", // V-Bates.
|
| - L"libsvn_tsvn32.dll", // TortoiseSVN.
|
| - L"libwinhook.dll", // V-Bates.
|
| - L"lmrn.dll", // Unknown.
|
| - L"minisp.dll", // Unknown (suspected malware).
|
| - L"minisp32.dll", // Unknown (suspected malware).
|
| - L"offerswizarddll.dll", // Unknown (suspected adware).
|
| - L"safetynut.dll", // Unknown (suspected adware).
|
| - L"smdmf.dll", // Unknown (suspected adware).
|
| - L"spappsv32.dll", // Unknown (suspected adware).
|
| - L"systemk.dll", // Unknown (suspected adware).
|
| - L"vntsrv.dll", // Virtual New Tab by APN LLC.
|
| - L"wajam_goblin_64.dll", // Wajam Internet Technologies.
|
| - L"wajam_goblin.dll", // Wajam Internet Technologies.
|
| - L"windowsapihookdll32.dll", // Lenovo One Key Theater.
|
| - // See crbug.com/379218.
|
| - L"windowsapihookdll64.dll", // Lenovo One Key Theater.
|
| - L"virtualcamera.ax", // %PROGRAMFILES%\ASUS\VirtualCamera.
|
| - // See crbug.com/422522.
|
| - L"ycwebcamerasource.ax", // CyberLink Youcam, crbug.com/424159
|
| - // Keep this null pointer here to mark the end of the list.
|
| - NULL,
|
| + L"949ba8b6a9.dll", // Coupon Time.
|
| + L"activedetect32.dll", // Lenovo One Key Theater.
|
| + // See crbug.com/379218.
|
| + L"activedetect64.dll", // Lenovo One Key Theater.
|
| + L"bitguard.dll", // Unknown (suspected malware).
|
| + L"bsvc.dll", // Unknown (suspected adware).
|
| + L"chrmxtn.dll", // Unknown (keystroke logger).
|
| + L"cplushook.dll", // Unknown (suspected malware).
|
| + L"crdli.dll", // Linkury Inc.
|
| + L"crdli64.dll", // Linkury Inc.
|
| + L"datamngr.dll", // Unknown (suspected adware).
|
| + L"dpinterface32.dll", // Unknown (suspected adware).
|
| + L"explorerex.dll", // Unknown (suspected adware).
|
| + L"hk.dll", // Unknown (keystroke logger).
|
| + L"libapi2hook.dll", // V-Bates.
|
| + L"libinject.dll", // V-Bates.
|
| + L"libinject2.dll", // V-Bates.
|
| + L"libredir2.dll", // V-Bates.
|
| + L"libsvn_tsvn32.dll", // TortoiseSVN.
|
| + L"libwinhook.dll", // V-Bates.
|
| + L"lmrn.dll", // Unknown.
|
| + L"minisp.dll", // Unknown (suspected malware).
|
| + L"minisp32.dll", // Unknown (suspected malware).
|
| + L"offerswizarddll.dll", // Unknown (suspected adware).
|
| + L"safetynut.dll", // Unknown (suspected adware).
|
| + L"smdmf.dll", // Unknown (suspected adware).
|
| + L"spappsv32.dll", // Unknown (suspected adware).
|
| + L"systemk.dll", // Unknown (suspected adware).
|
| + L"vntsrv.dll", // Virtual New Tab by APN LLC.
|
| + L"wajam_goblin_64.dll", // Wajam Internet Technologies.
|
| + L"wajam_goblin.dll", // Wajam Internet Technologies.
|
| + L"windowsapihookdll32.dll", // Lenovo One Key Theater.
|
| + // See crbug.com/379218.
|
| + L"windowsapihookdll64.dll", // Lenovo One Key Theater.
|
| + L"virtualcamera.ax", // %PROGRAMFILES%\ASUS\VirtualCamera.
|
| + // See crbug.com/422522.
|
| + L"ycwebcamerasource.ax", // CyberLink Youcam, crbug.com/424159
|
| + // Keep this null pointer here to mark the end of the list.
|
| + NULL,
|
| };
|
|
|
| bool g_blocked_dlls[kTroublesomeDllsMaxCount] = {};
|
| @@ -79,7 +80,7 @@ int g_num_blocked_dlls = 0;
|
|
|
| // Allocate storage for thunks in a page of this module to save on doing
|
| // an extra allocation at run time.
|
| -#pragma section(".crthunk",read,execute)
|
| +#pragma section(".crthunk", read, execute)
|
| __declspec(allocate(".crthunk")) sandbox::ThunkData g_thunk_storage;
|
|
|
| namespace {
|
| @@ -88,151 +89,97 @@ namespace {
|
| // determine if the blacklist is enabled for them.
|
| bool g_blacklist_initialized = false;
|
|
|
| -// Helper to set DWORD registry values.
|
| -DWORD SetDWValue(HKEY* key, const wchar_t* property, DWORD value) {
|
| - return ::RegSetValueEx(*key,
|
| - property,
|
| - 0,
|
| - REG_DWORD,
|
| - reinterpret_cast<LPBYTE>(&value),
|
| - sizeof(value));
|
| -}
|
| -
|
| -bool GenerateStateFromBeaconAndAttemptCount(HKEY* key, DWORD blacklist_state) {
|
| - LONG result = 0;
|
| - if (blacklist_state == blacklist::BLACKLIST_ENABLED) {
|
| - // If the blacklist succeeded on the previous run reset the failure
|
| - // counter.
|
| - return (SetDWValue(key,
|
| - blacklist::kBeaconAttemptCount,
|
| - static_cast<DWORD>(0)) == ERROR_SUCCESS);
|
| - } else {
|
| - // Some part of the blacklist setup failed last time. If this has occured
|
| - // blacklist::kBeaconMaxAttempts times in a row we switch the state to
|
| - // failed and skip setting up the blacklist.
|
| - DWORD attempt_count = 0;
|
| - DWORD attempt_count_size = sizeof(attempt_count);
|
| - result = ::RegQueryValueEx(*key,
|
| - blacklist::kBeaconAttemptCount,
|
| - 0,
|
| - NULL,
|
| - reinterpret_cast<LPBYTE>(&attempt_count),
|
| - &attempt_count_size);
|
| -
|
| - if (result == ERROR_FILE_NOT_FOUND)
|
| - attempt_count = 0;
|
| - else if (result != ERROR_SUCCESS)
|
| - return false;
|
| -
|
| - ++attempt_count;
|
| - SetDWValue(key, blacklist::kBeaconAttemptCount, attempt_count);
|
| -
|
| - if (attempt_count >= blacklist::kBeaconMaxAttempts) {
|
| - blacklist_state = blacklist::BLACKLIST_SETUP_FAILED;
|
| - SetDWValue(key, blacklist::kBeaconState, blacklist_state);
|
| - }
|
| -
|
| - return false;
|
| - }
|
| -}
|
| -
|
| } // namespace
|
|
|
| namespace blacklist {
|
|
|
| #if defined(_WIN64)
|
| - // Allocate storage for the pointer to the old NtMapViewOfSectionFunction.
|
| -#pragma section(".oldntmap",write,read)
|
| - __declspec(allocate(".oldntmap"))
|
| +// Allocate storage for the pointer to the old NtMapViewOfSectionFunction.
|
| +#pragma section(".oldntmap", write, read)
|
| +__declspec(allocate(".oldntmap"))
|
| NtMapViewOfSectionFunction g_nt_map_view_of_section_func = NULL;
|
| #endif
|
|
|
| bool LeaveSetupBeacon() {
|
| - HKEY key = NULL;
|
| - DWORD disposition = 0;
|
| - LONG result = ::RegCreateKeyEx(HKEY_CURRENT_USER,
|
| - kRegistryBeaconPath,
|
| - 0,
|
| - NULL,
|
| - REG_OPTION_NON_VOLATILE,
|
| - KEY_QUERY_VALUE | KEY_SET_VALUE,
|
| - NULL,
|
| - &key,
|
| - &disposition);
|
| - if (result != ERROR_SUCCESS)
|
| + HANDLE key_handle = INVALID_HANDLE_VALUE;
|
| +
|
| + if (!nt::CreateRegKey(nt::HKCU, kRegistryBeaconPath,
|
| + KEY_QUERY_VALUE | KEY_SET_VALUE, &key_handle))
|
| return false;
|
|
|
| - // Retrieve the current blacklist state.
|
| DWORD blacklist_state = BLACKLIST_STATE_MAX;
|
| - DWORD blacklist_state_size = sizeof(blacklist_state);
|
| - DWORD type = 0;
|
| - result = ::RegQueryValueEx(key,
|
| - kBeaconState,
|
| - 0,
|
| - &type,
|
| - reinterpret_cast<LPBYTE>(&blacklist_state),
|
| - &blacklist_state_size);
|
| -
|
| - if (result != ERROR_SUCCESS || blacklist_state == BLACKLIST_DISABLED ||
|
| - type != REG_DWORD) {
|
| - ::RegCloseKey(key);
|
| + if (!nt::QueryRegValueDWORD(key_handle, kBeaconState, &blacklist_state) ||
|
| + blacklist_state == BLACKLIST_DISABLED) {
|
| + nt::CloseRegKey(key_handle);
|
| return false;
|
| }
|
|
|
| - if (!GenerateStateFromBeaconAndAttemptCount(&key, blacklist_state)) {
|
| - ::RegCloseKey(key);
|
| - return false;
|
| - }
|
| + // Handle attempt count.
|
| + // Only return true if BL is enabled and succeeded on previous run.
|
| + bool success = false;
|
| + if (blacklist_state == BLACKLIST_ENABLED) {
|
| + // If the blacklist succeeded on the previous run reset the failure
|
| + // counter. Then update the beacon state.
|
| + if (nt::SetRegValueDWORD(key_handle, kBeaconAttemptCount,
|
| + static_cast<DWORD>(0))) {
|
| + if (nt::SetRegValueDWORD(key_handle, kBeaconState,
|
| + BLACKLIST_SETUP_RUNNING))
|
| + success = true;
|
| + }
|
| + } else {
|
| + // Some part of the blacklist setup failed last time. If this has occured
|
| + // blacklist::kBeaconMaxAttempts times in a row we switch the state to
|
| + // failed and skip setting up the blacklist.
|
| + DWORD attempt_count = 0;
|
| +
|
| + nt::QueryRegValueDWORD(key_handle, blacklist::kBeaconAttemptCount,
|
| + &attempt_count);
|
| + ++attempt_count;
|
| + nt::SetRegValueDWORD(key_handle, blacklist::kBeaconAttemptCount,
|
| + attempt_count);
|
|
|
| - result = SetDWValue(&key, kBeaconState, BLACKLIST_SETUP_RUNNING);
|
| - ::RegCloseKey(key);
|
| + if (attempt_count >= blacklist::kBeaconMaxAttempts) {
|
| + blacklist_state = blacklist::BLACKLIST_SETUP_FAILED;
|
| + nt::SetRegValueDWORD(key_handle, blacklist::kBeaconState,
|
| + blacklist_state);
|
| + }
|
| + }
|
|
|
| - return (result == ERROR_SUCCESS);
|
| + nt::CloseRegKey(key_handle);
|
| + return success;
|
| }
|
|
|
| bool ResetBeacon() {
|
| - HKEY key = NULL;
|
| - DWORD disposition = 0;
|
| - LONG result = ::RegCreateKeyEx(HKEY_CURRENT_USER,
|
| - kRegistryBeaconPath,
|
| - 0,
|
| - NULL,
|
| - REG_OPTION_NON_VOLATILE,
|
| - KEY_QUERY_VALUE | KEY_SET_VALUE,
|
| - NULL,
|
| - &key,
|
| - &disposition);
|
| - if (result != ERROR_SUCCESS)
|
| + HANDLE key_handle = INVALID_HANDLE_VALUE;
|
| +
|
| + if (!nt::CreateRegKey(nt::HKCU, kRegistryBeaconPath,
|
| + KEY_QUERY_VALUE | KEY_SET_VALUE, &key_handle))
|
| return false;
|
|
|
| DWORD blacklist_state = BLACKLIST_STATE_MAX;
|
| - DWORD blacklist_state_size = sizeof(blacklist_state);
|
| - DWORD type = 0;
|
| - result = ::RegQueryValueEx(key,
|
| - kBeaconState,
|
| - 0,
|
| - &type,
|
| - reinterpret_cast<LPBYTE>(&blacklist_state),
|
| - &blacklist_state_size);
|
| -
|
| - if (result != ERROR_SUCCESS || type != REG_DWORD) {
|
| - ::RegCloseKey(key);
|
| + if (!nt::QueryRegValueDWORD(key_handle, kBeaconState, &blacklist_state)) {
|
| + nt::CloseRegKey(key_handle);
|
| return false;
|
| }
|
|
|
| // Reaching this point with the setup running state means the setup did not
|
| // crash, so we reset to enabled. Any other state indicates that setup was
|
| // skipped; in that case we leave the state alone for later recording.
|
| - if (blacklist_state == BLACKLIST_SETUP_RUNNING)
|
| - result = SetDWValue(&key, kBeaconState, BLACKLIST_ENABLED);
|
| + if (blacklist_state == BLACKLIST_SETUP_RUNNING) {
|
| + if (!nt::SetRegValueDWORD(key_handle, kBeaconState, BLACKLIST_ENABLED)) {
|
| + nt::CloseRegKey(key_handle);
|
| + return false;
|
| + }
|
| + }
|
|
|
| - ::RegCloseKey(key);
|
| - return (result == ERROR_SUCCESS);
|
| + nt::CloseRegKey(key_handle);
|
| + return true;
|
| }
|
|
|
| int BlacklistSize() {
|
| int size = -1;
|
| - while (blacklist::g_troublesome_dlls[++size] != NULL) {}
|
| + while (blacklist::g_troublesome_dlls[++size] != NULL) {
|
| + }
|
|
|
| return size;
|
| }
|
| @@ -355,10 +302,8 @@ bool Initialize(bool force) {
|
| // Mark the thunk storage as readable and writeable, since we
|
| // ready to write to it.
|
| DWORD old_protect = 0;
|
| - if (!VirtualProtect(&g_thunk_storage,
|
| - sizeof(g_thunk_storage),
|
| - PAGE_EXECUTE_READWRITE,
|
| - &old_protect)) {
|
| + if (!VirtualProtect(&g_thunk_storage, sizeof(g_thunk_storage),
|
| + PAGE_EXECUTE_READWRITE, &old_protect)) {
|
| return false;
|
| }
|
|
|
| @@ -368,36 +313,29 @@ bool Initialize(bool force) {
|
| // still work on 32-bit build when referenced at the end of the function.
|
| BOOL page_executable = false;
|
|
|
| - // Replace the default NtMapViewOfSection with our patched version.
|
| +// Replace the default NtMapViewOfSection with our patched version.
|
| #if defined(_WIN64)
|
| - NTSTATUS ret = thunk->Setup(::GetModuleHandle(sandbox::kNtdllName),
|
| - reinterpret_cast<void*>(&__ImageBase),
|
| - "NtMapViewOfSection",
|
| - NULL,
|
| - &blacklist::BlNtMapViewOfSection64,
|
| - thunk_storage,
|
| - sizeof(sandbox::ThunkData),
|
| - NULL);
|
| + NTSTATUS ret =
|
| + thunk->Setup(::GetModuleHandle(sandbox::kNtdllName),
|
| + reinterpret_cast<void*>(&__ImageBase), "NtMapViewOfSection",
|
| + NULL, &blacklist::BlNtMapViewOfSection64, thunk_storage,
|
| + sizeof(sandbox::ThunkData), NULL);
|
|
|
| // Keep a pointer to the original code, we don't have enough space to
|
| // add it directly to the call.
|
| - g_nt_map_view_of_section_func = reinterpret_cast<NtMapViewOfSectionFunction>(
|
| - thunk_storage);
|
| + g_nt_map_view_of_section_func =
|
| + reinterpret_cast<NtMapViewOfSectionFunction>(thunk_storage);
|
|
|
| // Ensure that the pointer to the old function can't be changed.
|
| - page_executable = VirtualProtect(&g_nt_map_view_of_section_func,
|
| - sizeof(g_nt_map_view_of_section_func),
|
| - PAGE_EXECUTE_READ,
|
| - &old_protect);
|
| + page_executable = VirtualProtect(&g_nt_map_view_of_section_func,
|
| + sizeof(g_nt_map_view_of_section_func),
|
| + PAGE_EXECUTE_READ, &old_protect);
|
| #else
|
| - NTSTATUS ret = thunk->Setup(::GetModuleHandle(sandbox::kNtdllName),
|
| - reinterpret_cast<void*>(&__ImageBase),
|
| - "NtMapViewOfSection",
|
| - NULL,
|
| - &blacklist::BlNtMapViewOfSection,
|
| - thunk_storage,
|
| - sizeof(sandbox::ThunkData),
|
| - NULL);
|
| + NTSTATUS ret =
|
| + thunk->Setup(::GetModuleHandle(sandbox::kNtdllName),
|
| + reinterpret_cast<void*>(&__ImageBase), "NtMapViewOfSection",
|
| + NULL, &blacklist::BlNtMapViewOfSection, thunk_storage,
|
| + sizeof(sandbox::ThunkData), NULL);
|
| #endif
|
| delete thunk;
|
|
|
| @@ -405,10 +343,9 @@ bool Initialize(bool force) {
|
| g_blacklist_initialized = NT_SUCCESS(ret);
|
|
|
| // Mark the thunk storage as executable and prevent any future writes to it.
|
| - page_executable = page_executable && VirtualProtect(&g_thunk_storage,
|
| - sizeof(g_thunk_storage),
|
| - PAGE_EXECUTE_READ,
|
| - &old_protect);
|
| + page_executable = page_executable &&
|
| + VirtualProtect(&g_thunk_storage, sizeof(g_thunk_storage),
|
| + PAGE_EXECUTE_READ, &old_protect);
|
|
|
| AddDllsFromRegistryToBlacklist();
|
|
|
| @@ -416,41 +353,18 @@ bool Initialize(bool force) {
|
| }
|
|
|
| void AddDllsFromRegistryToBlacklist() {
|
| - HKEY key = NULL;
|
| - LONG result = ::RegOpenKeyEx(HKEY_CURRENT_USER,
|
| - kRegistryFinchListPath,
|
| - 0,
|
| - KEY_QUERY_VALUE | KEY_SET_VALUE,
|
| - &key);
|
| -
|
| - if (result != ERROR_SUCCESS)
|
| + std::vector<std::wstring> dlls;
|
| +
|
| + if (!nt::QueryRegValueMULTISZ(nt::HKCU, kRegistryFinchListPath,
|
| + kRegistryFinchListValueName, &dlls) ||
|
| + dlls.empty())
|
| return;
|
|
|
| - // We add dlls from the registry to the blacklist.
|
| - DWORD value_len;
|
| - DWORD name_len = MAX_PATH;
|
| - std::vector<wchar_t> name_buffer(name_len);
|
| - for (int i = 0; result == ERROR_SUCCESS; ++i) {
|
| - name_len = MAX_PATH;
|
| - value_len = 0;
|
| - result = ::RegEnumValue(
|
| - key, i, &name_buffer[0], &name_len, NULL, NULL, NULL, &value_len);
|
| - if (result != ERROR_SUCCESS)
|
| - break;
|
| -
|
| - name_len = name_len + 1;
|
| - value_len = value_len + 1;
|
| - std::vector<wchar_t> value_buffer(value_len);
|
| - result = ::RegEnumValue(key, i, &name_buffer[0], &name_len, NULL, NULL,
|
| - reinterpret_cast<BYTE*>(&value_buffer[0]),
|
| - &value_len);
|
| - if (result != ERROR_SUCCESS)
|
| - break;
|
| - value_buffer[value_len - 1] = L'\0';
|
| - AddDllToBlacklist(&value_buffer[0]);
|
| + // Add each DLL to the BL in memory
|
| + for (auto name : dlls) {
|
| + AddDllToBlacklist(name.c_str());
|
| }
|
|
|
| - ::RegCloseKey(key);
|
| return;
|
| }
|
|
|
|
|