Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "sandbox/win/src/target_services.h" | 5 #include "sandbox/win/src/target_services.h" |
| 6 | 6 |
| 7 #include <new> | 7 #include <new> |
| 8 | 8 |
| 9 #include <process.h> | 9 #include <process.h> |
| 10 #include <stdint.h> | 10 #include <stdint.h> |
| 11 | 11 |
| 12 #include "base/win/windows_version.h" | 12 #include "base/win/windows_version.h" |
| 13 #include "sandbox/win/src/crosscall_client.h" | 13 #include "sandbox/win/src/crosscall_client.h" |
| 14 #include "sandbox/win/src/handle_closer_agent.h" | 14 #include "sandbox/win/src/handle_closer_agent.h" |
| 15 #include "sandbox/win/src/heap_helper.h" | |
| 15 #include "sandbox/win/src/ipc_tags.h" | 16 #include "sandbox/win/src/ipc_tags.h" |
| 16 #include "sandbox/win/src/process_mitigations.h" | 17 #include "sandbox/win/src/process_mitigations.h" |
| 17 #include "sandbox/win/src/restricted_token_utils.h" | 18 #include "sandbox/win/src/restricted_token_utils.h" |
| 18 #include "sandbox/win/src/sandbox.h" | 19 #include "sandbox/win/src/sandbox.h" |
| 19 #include "sandbox/win/src/sandbox_nt_util.h" | 20 #include "sandbox/win/src/sandbox_nt_util.h" |
| 20 #include "sandbox/win/src/sandbox_types.h" | 21 #include "sandbox/win/src/sandbox_types.h" |
| 21 #include "sandbox/win/src/sharedmem_ipc_client.h" | 22 #include "sandbox/win/src/sharedmem_ipc_client.h" |
| 22 | 23 |
| 23 namespace { | 24 namespace { |
| 24 | 25 |
| (...skipping 13 matching lines...) Expand all Loading... | |
| 38 // that were made during calls to RegOpenkey and RegOpenKeyEx if it is called | 39 // that were made during calls to RegOpenkey and RegOpenKeyEx if it is called |
| 39 // with a more restrictive token. Returns true if the flushing is succesful | 40 // with a more restrictive token. Returns true if the flushing is succesful |
| 40 // although this behavior is undocumented and there is no guarantee that in | 41 // although this behavior is undocumented and there is no guarantee that in |
| 41 // fact this will happen in future versions of windows. | 42 // fact this will happen in future versions of windows. |
| 42 bool FlushCachedRegHandles() { | 43 bool FlushCachedRegHandles() { |
| 43 return (FlushRegKey(HKEY_LOCAL_MACHINE) && | 44 return (FlushRegKey(HKEY_LOCAL_MACHINE) && |
| 44 FlushRegKey(HKEY_CLASSES_ROOT) && | 45 FlushRegKey(HKEY_CLASSES_ROOT) && |
| 45 FlushRegKey(HKEY_USERS)); | 46 FlushRegKey(HKEY_USERS)); |
| 46 } | 47 } |
| 47 | 48 |
| 49 // Cleans up this process if CSRSS will be disconnected, as this disconnection | |
| 50 // is not supported Windows behavior. | |
| 51 // Currently, this step requires closing a heap that this shared with csrss.exe. | |
| 52 // Closing the ALPC Port handle to csrss.exe leaves this heap in an invalid | |
| 53 // state. This causes problems if anyone enumerates the heap. | |
| 54 bool CsrssDisconnectCleanup() { | |
| 55 PVOID csr_port_heap = sandbox::FindCsrPortHeap(); | |
|
Will Harris
2017/03/22 19:21:49
are we not already in sandbox namespace. hmm? stra
Will Harris
2017/03/22 19:21:49
implicit cast from HANDLE to PVOID - is this what
liamjm (20p)
2017/04/14 17:27:20
No.
changed to HANDLE.
Thanks.
liamjm (20p)
2017/04/14 17:27:20
Yeah...
Just in an unnamed namespace at this poin
Will Harris
2017/05/01 18:33:15
yes it seems to make sense to move all these funct
| |
| 56 if (nullptr == csr_port_heap) { | |
|
Will Harris
2017/03/22 19:21:49
!csr_port_heap
liamjm (20p)
2017/04/14 17:27:20
Done.
| |
| 57 LOG(ERROR) << "Failed to find CSR Port heap handle" return false; | |
|
Will Harris
2017/03/22 19:21:49
win\src\target_services.cc(57): error C2143: synta
liamjm (20p)
2017/04/14 17:27:20
Done.
| |
| 58 } | |
| 59 HeapDestroy(csr_port_heap); | |
| 60 return true; | |
| 61 } | |
| 62 | |
| 48 // Checks if we have handle entries pending and runs the closer. | 63 // Checks if we have handle entries pending and runs the closer. |
| 49 // Updates is_csrss_connected based on which handle types are closed. | 64 // Updates is_csrss_connected based on which handle types are closed. |
| 50 bool CloseOpenHandles(bool* is_csrss_connected) { | 65 bool CloseOpenHandles(bool* is_csrss_connected) { |
| 51 if (sandbox::HandleCloserAgent::NeedsHandlesClosed()) { | 66 if (sandbox::HandleCloserAgent::NeedsHandlesClosed()) { |
| 52 sandbox::HandleCloserAgent handle_closer; | 67 sandbox::HandleCloserAgent handle_closer; |
| 53 handle_closer.InitializeHandlesToClose(is_csrss_connected); | 68 handle_closer.InitializeHandlesToClose(is_csrss_connected); |
| 69 if (!*is_csrss_connected) { | |
| 70 if (!CsrssDisconnectCleanup()) { | |
| 71 return false; | |
| 72 } | |
| 73 } | |
| 54 if (!handle_closer.CloseHandles()) | 74 if (!handle_closer.CloseHandles()) |
| 55 return false; | 75 return false; |
| 56 } | 76 } |
| 57 | |
| 58 return true; | 77 return true; |
| 59 } | 78 } |
| 60 | 79 |
| 61 // GetUserDefaultLocaleName is not available on WIN XP. So we'll | 80 // GetUserDefaultLocaleName is not available on WIN XP. So we'll |
| 62 // load it on-the-fly. | 81 // load it on-the-fly. |
| 63 const wchar_t kKernel32DllName[] = L"kernel32.dll"; | 82 const wchar_t kKernel32DllName[] = L"kernel32.dll"; |
| 64 typedef decltype(GetUserDefaultLocaleName)* GetUserDefaultLocaleNameFunction; | 83 typedef decltype(GetUserDefaultLocaleName)* GetUserDefaultLocaleNameFunction; |
| 65 | 84 |
| 66 // Warm up language subsystems before the sandbox is turned on. | 85 // Warm up language subsystems before the sandbox is turned on. |
| 67 // Tested on Win8.1 x64: | 86 // Tested on Win8.1 x64: |
| (...skipping 170 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 238 void ProcessState::SetRevertedToSelf() { | 257 void ProcessState::SetRevertedToSelf() { |
| 239 if (process_state_ < 3) | 258 if (process_state_ < 3) |
| 240 process_state_ = 3; | 259 process_state_ = 3; |
| 241 } | 260 } |
| 242 | 261 |
| 243 void ProcessState::SetCsrssConnected(bool csrss_connected) { | 262 void ProcessState::SetCsrssConnected(bool csrss_connected) { |
| 244 csrss_connected_ = csrss_connected; | 263 csrss_connected_ = csrss_connected; |
| 245 } | 264 } |
| 246 | 265 |
| 247 } // namespace sandbox | 266 } // namespace sandbox |
| OLD | NEW |