| Index: sandbox/win/src/target_services.cc
|
| diff --git a/sandbox/win/src/target_services.cc b/sandbox/win/src/target_services.cc
|
| deleted file mode 100644
|
| index 2c037b9f3ce069849a2067514c9e37f36d8ecb32..0000000000000000000000000000000000000000
|
| --- a/sandbox/win/src/target_services.cc
|
| +++ /dev/null
|
| @@ -1,258 +0,0 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "sandbox/win/src/target_services.h"
|
| -
|
| -#include <new>
|
| -
|
| -#include <process.h>
|
| -#include <stdint.h>
|
| -
|
| -#include "base/win/windows_version.h"
|
| -#include "sandbox/win/src/crosscall_client.h"
|
| -#include "sandbox/win/src/handle_closer_agent.h"
|
| -#include "sandbox/win/src/handle_interception.h"
|
| -#include "sandbox/win/src/ipc_tags.h"
|
| -#include "sandbox/win/src/process_mitigations.h"
|
| -#include "sandbox/win/src/restricted_token_utils.h"
|
| -#include "sandbox/win/src/sandbox.h"
|
| -#include "sandbox/win/src/sandbox_nt_util.h"
|
| -#include "sandbox/win/src/sandbox_types.h"
|
| -#include "sandbox/win/src/sharedmem_ipc_client.h"
|
| -
|
| -namespace {
|
| -
|
| -// Flushing a cached key is triggered by just opening the key and closing the
|
| -// resulting handle. RegDisablePredefinedCache() is the documented way to flush
|
| -// HKCU so do not use it with this function.
|
| -bool FlushRegKey(HKEY root) {
|
| - HKEY key;
|
| - if (ERROR_SUCCESS == ::RegOpenKeyExW(root, NULL, 0, MAXIMUM_ALLOWED, &key)) {
|
| - if (ERROR_SUCCESS != ::RegCloseKey(key))
|
| - return false;
|
| - }
|
| - return true;
|
| -}
|
| -
|
| -// This function forces advapi32.dll to release some internally cached handles
|
| -// that were made during calls to RegOpenkey and RegOpenKeyEx if it is called
|
| -// with a more restrictive token. Returns true if the flushing is succesful
|
| -// although this behavior is undocumented and there is no guarantee that in
|
| -// fact this will happen in future versions of windows.
|
| -bool FlushCachedRegHandles() {
|
| - return (FlushRegKey(HKEY_LOCAL_MACHINE) &&
|
| - FlushRegKey(HKEY_CLASSES_ROOT) &&
|
| - FlushRegKey(HKEY_USERS));
|
| -}
|
| -
|
| -// Checks if we have handle entries pending and runs the closer.
|
| -// Updates is_csrss_connected based on which handle types are closed.
|
| -bool CloseOpenHandles(bool* is_csrss_connected) {
|
| - if (sandbox::HandleCloserAgent::NeedsHandlesClosed()) {
|
| - sandbox::HandleCloserAgent handle_closer;
|
| - handle_closer.InitializeHandlesToClose(is_csrss_connected);
|
| - if (!handle_closer.CloseHandles())
|
| - return false;
|
| - }
|
| -
|
| - return true;
|
| -}
|
| -
|
| -// GetUserDefaultLocaleName is not available on WIN XP. So we'll
|
| -// load it on-the-fly.
|
| -const wchar_t kKernel32DllName[] = L"kernel32.dll";
|
| -typedef decltype(GetUserDefaultLocaleName)* GetUserDefaultLocaleNameFunction;
|
| -
|
| -// Warm up language subsystems before the sandbox is turned on.
|
| -// Tested on Win8.1 x64:
|
| -// This needs to happen after RevertToSelf() is called, because (at least) in
|
| -// the case of GetUserDefaultLCID() it checks the TEB to see if the process is
|
| -// impersonating (TEB!IsImpersonating). If it is, the cached locale information
|
| -// is not used, nor is it set. Therefore, calls after RevertToSelf() will not
|
| -// have warmed-up values to use.
|
| -bool WarmupWindowsLocales() {
|
| - // NOTE(liamjm): When last checked (Win 8.1 x64) it wasn't necessary to
|
| - // warmup all of these functions, but let's not assume that.
|
| - ::GetUserDefaultLangID();
|
| - ::GetUserDefaultLCID();
|
| - static GetUserDefaultLocaleNameFunction GetUserDefaultLocaleName_func =
|
| - NULL;
|
| - if (!GetUserDefaultLocaleName_func) {
|
| - HMODULE kernel32_dll = ::GetModuleHandle(kKernel32DllName);
|
| - if (!kernel32_dll) {
|
| - return false;
|
| - }
|
| - GetUserDefaultLocaleName_func =
|
| - reinterpret_cast<GetUserDefaultLocaleNameFunction>(
|
| - GetProcAddress(kernel32_dll, "GetUserDefaultLocaleName"));
|
| - if (!GetUserDefaultLocaleName_func) {
|
| - return false;
|
| - }
|
| - }
|
| - wchar_t localeName[LOCALE_NAME_MAX_LENGTH] = {0};
|
| - return (0 != GetUserDefaultLocaleName_func(
|
| - localeName, LOCALE_NAME_MAX_LENGTH * sizeof(wchar_t)));
|
| -}
|
| -
|
| -// Used as storage for g_target_services, because other allocation facilities
|
| -// are not available early. We can't use a regular function static because on
|
| -// VS2015, because the CRT tries to acquire a lock to guard initialization, but
|
| -// this code runs before the CRT is initialized.
|
| -char g_target_services_memory[sizeof(sandbox::TargetServicesBase)];
|
| -sandbox::TargetServicesBase* g_target_services = nullptr;
|
| -
|
| -} // namespace
|
| -
|
| -namespace sandbox {
|
| -
|
| -SANDBOX_INTERCEPT IntegrityLevel g_shared_delayed_integrity_level =
|
| - INTEGRITY_LEVEL_LAST;
|
| -SANDBOX_INTERCEPT MitigationFlags g_shared_delayed_mitigations = 0;
|
| -
|
| -TargetServicesBase::TargetServicesBase() {
|
| -}
|
| -
|
| -ResultCode TargetServicesBase::Init() {
|
| - process_state_.SetInitCalled();
|
| - return SBOX_ALL_OK;
|
| -}
|
| -
|
| -// Failure here is a breach of security so the process is terminated.
|
| -void TargetServicesBase::LowerToken() {
|
| - if (ERROR_SUCCESS !=
|
| - SetProcessIntegrityLevel(g_shared_delayed_integrity_level))
|
| - ::TerminateProcess(::GetCurrentProcess(), SBOX_FATAL_INTEGRITY);
|
| - process_state_.SetRevertedToSelf();
|
| - // If the client code as called RegOpenKey, advapi32.dll has cached some
|
| - // handles. The following code gets rid of them.
|
| - if (!::RevertToSelf())
|
| - ::TerminateProcess(::GetCurrentProcess(), SBOX_FATAL_DROPTOKEN);
|
| - if (!FlushCachedRegHandles())
|
| - ::TerminateProcess(::GetCurrentProcess(), SBOX_FATAL_FLUSHANDLES);
|
| - if (ERROR_SUCCESS != ::RegDisablePredefinedCache())
|
| - ::TerminateProcess(::GetCurrentProcess(), SBOX_FATAL_CACHEDISABLE);
|
| - if (!WarmupWindowsLocales())
|
| - ::TerminateProcess(::GetCurrentProcess(), SBOX_FATAL_WARMUP);
|
| - bool is_csrss_connected = true;
|
| - if (!CloseOpenHandles(&is_csrss_connected))
|
| - ::TerminateProcess(::GetCurrentProcess(), SBOX_FATAL_CLOSEHANDLES);
|
| - process_state_.SetCsrssConnected(is_csrss_connected);
|
| - // Enabling mitigations must happen last otherwise handle closing breaks
|
| - if (g_shared_delayed_mitigations &&
|
| - !ApplyProcessMitigationsToCurrentProcess(g_shared_delayed_mitigations))
|
| - ::TerminateProcess(::GetCurrentProcess(), SBOX_FATAL_MITIGATION);
|
| -}
|
| -
|
| -ProcessState* TargetServicesBase::GetState() {
|
| - return &process_state_;
|
| -}
|
| -
|
| -TargetServicesBase* TargetServicesBase::GetInstance() {
|
| - // Leak on purpose TargetServicesBase.
|
| - if (!g_target_services)
|
| - g_target_services = new (g_target_services_memory) TargetServicesBase;
|
| - return g_target_services;
|
| -}
|
| -
|
| -// The broker services a 'test' IPC service with the IPC_PING_TAG tag.
|
| -bool TargetServicesBase::TestIPCPing(int version) {
|
| - void* memory = GetGlobalIPCMemory();
|
| - if (NULL == memory) {
|
| - return false;
|
| - }
|
| - SharedMemIPCClient ipc(memory);
|
| - CrossCallReturn answer = {0};
|
| -
|
| - if (1 == version) {
|
| - uint32_t tick1 = ::GetTickCount();
|
| - uint32_t cookie = 717115;
|
| - ResultCode code = CrossCall(ipc, IPC_PING1_TAG, cookie, &answer);
|
| -
|
| - if (SBOX_ALL_OK != code) {
|
| - return false;
|
| - }
|
| - // We should get two extended returns values from the IPC, one is the
|
| - // tick count on the broker and the other is the cookie times two.
|
| - if ((answer.extended_count != 2)) {
|
| - return false;
|
| - }
|
| - // We test the first extended answer to be within the bounds of the tick
|
| - // count only if there was no tick count wraparound.
|
| - uint32_t tick2 = ::GetTickCount();
|
| - if (tick2 >= tick1) {
|
| - if ((answer.extended[0].unsigned_int < tick1) ||
|
| - (answer.extended[0].unsigned_int > tick2)) {
|
| - return false;
|
| - }
|
| - }
|
| -
|
| - if (answer.extended[1].unsigned_int != cookie * 2) {
|
| - return false;
|
| - }
|
| - } else if (2 == version) {
|
| - uint32_t cookie = 717111;
|
| - InOutCountedBuffer counted_buffer(&cookie, sizeof(cookie));
|
| - ResultCode code = CrossCall(ipc, IPC_PING2_TAG, counted_buffer, &answer);
|
| -
|
| - if (SBOX_ALL_OK != code) {
|
| - return false;
|
| - }
|
| - if (cookie != 717111 * 3) {
|
| - return false;
|
| - }
|
| - } else {
|
| - return false;
|
| - }
|
| - return true;
|
| -}
|
| -
|
| -ProcessState::ProcessState() : process_state_(0), csrss_connected_(true) {
|
| -}
|
| -
|
| -bool ProcessState::IsKernel32Loaded() const {
|
| - return process_state_ != 0;
|
| -}
|
| -
|
| -bool ProcessState::InitCalled() const {
|
| - return process_state_ > 1;
|
| -}
|
| -
|
| -bool ProcessState::RevertedToSelf() const {
|
| - return process_state_ > 2;
|
| -}
|
| -
|
| -bool ProcessState::IsCsrssConnected() const {
|
| - return csrss_connected_;
|
| -}
|
| -
|
| -void ProcessState::SetKernel32Loaded() {
|
| - if (!process_state_)
|
| - process_state_ = 1;
|
| -}
|
| -
|
| -void ProcessState::SetInitCalled() {
|
| - if (process_state_ < 2)
|
| - process_state_ = 2;
|
| -}
|
| -
|
| -void ProcessState::SetRevertedToSelf() {
|
| - if (process_state_ < 3)
|
| - process_state_ = 3;
|
| -}
|
| -
|
| -void ProcessState::SetCsrssConnected(bool csrss_connected) {
|
| - csrss_connected_ = csrss_connected;
|
| -}
|
| -
|
| -
|
| -ResultCode TargetServicesBase::DuplicateHandle(HANDLE source_handle,
|
| - DWORD target_process_id,
|
| - HANDLE* target_handle,
|
| - DWORD desired_access,
|
| - DWORD options) {
|
| - return sandbox::DuplicateHandleProxy(source_handle, target_process_id,
|
| - target_handle, desired_access, options);
|
| -}
|
| -
|
| -} // namespace sandbox
|
|
|