1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "base/strings/stringprintf.h"
6 #include "base/win/scoped_handle.h"
8 #include "base/win/windows_version.h"
9 #include "sandbox/win/src/nt_internals.h"
10 #include "sandbox/win/src/process_mitigations.h"
11 #include "sandbox/win/src/sandbox.h"
12 #include "sandbox/win/src/sandbox_factory.h"
13 #include "sandbox/win/src/target_services.h"
14 #include "sandbox/win/src/win_utils.h"
15 #include "sandbox/win/tests/common/controller.h"
16 #include "testing/gtest/include/gtest/gtest.h"
20 typedef BOOL (WINAPI
*GetProcessDEPPolicyFunction
)(
25 typedef BOOL (WINAPI
*GetProcessMitigationPolicyFunction
)(
27 PROCESS_MITIGATION_POLICY mitigation_policy
,
31 GetProcessMitigationPolicyFunction get_process_mitigation_policy
;
33 bool CheckWin8DepPolicy() {
34 PROCESS_MITIGATION_DEP_POLICY policy
= {};
35 if (!get_process_mitigation_policy(::GetCurrentProcess(), ProcessDEPPolicy
,
36 &policy
, sizeof(policy
))) {
39 return policy
.Enable
&& policy
.Permanent
;
42 bool CheckWin8AslrPolicy() {
43 PROCESS_MITIGATION_ASLR_POLICY policy
= {};
44 if (!get_process_mitigation_policy(::GetCurrentProcess(), ProcessASLRPolicy
,
45 &policy
, sizeof(policy
))) {
48 return policy
.EnableForceRelocateImages
&& policy
.DisallowStrippedImages
;
51 bool CheckWin8StrictHandlePolicy() {
52 PROCESS_MITIGATION_STRICT_HANDLE_CHECK_POLICY policy
= {};
53 if (!get_process_mitigation_policy(::GetCurrentProcess(),
54 ProcessStrictHandleCheckPolicy
,
55 &policy
, sizeof(policy
))) {
58 return policy
.RaiseExceptionOnInvalidHandleReference
&&
59 policy
.HandleExceptionsPermanentlyEnabled
;
62 bool CheckWin8Win32CallPolicy() {
63 PROCESS_MITIGATION_SYSTEM_CALL_DISABLE_POLICY policy
= {};
64 if (!get_process_mitigation_policy(::GetCurrentProcess(),
65 ProcessSystemCallDisablePolicy
,
66 &policy
, sizeof(policy
))) {
69 return policy
.DisallowWin32kSystemCalls
;
72 bool CheckWin8DllExtensionPolicy() {
73 PROCESS_MITIGATION_EXTENSION_POINT_DISABLE_POLICY policy
= {};
74 if (!get_process_mitigation_policy(::GetCurrentProcess(),
75 ProcessExtensionPointDisablePolicy
,
76 &policy
, sizeof(policy
))) {
79 return policy
.DisableExtensionPoints
;
86 SBOX_TESTS_COMMAND
int CheckWin8(int argc
, wchar_t **argv
) {
87 get_process_mitigation_policy
=
88 reinterpret_cast<GetProcessMitigationPolicyFunction
>(
89 ::GetProcAddress(::GetModuleHandleW(L
"kernel32.dll"),
90 "GetProcessMitigationPolicy"));
91 if (!get_process_mitigation_policy
)
92 return SBOX_TEST_NOT_FOUND
;
94 #if !defined(_WIN64) // DEP is always enabled on 64-bit.
95 if (!CheckWin8DepPolicy())
96 return SBOX_TEST_FIRST_ERROR
;
99 #if defined(NDEBUG) // ASLR cannot be forced in debug builds.
100 if (!CheckWin8AslrPolicy())
101 return SBOX_TEST_SECOND_ERROR
;
104 if (!CheckWin8StrictHandlePolicy())
105 return SBOX_TEST_THIRD_ERROR
;
107 if (!CheckWin8DllExtensionPolicy())
108 return SBOX_TEST_FIFTH_ERROR
;
110 return SBOX_TEST_SUCCEEDED
;
113 TEST(ProcessMitigationsTest
, CheckWin8
) {
114 if (base::win::GetVersion() < base::win::VERSION_WIN8
)
118 sandbox::TargetPolicy
* policy
= runner
.GetPolicy();
120 sandbox::MitigationFlags mitigations
= MITIGATION_DEP
|
121 MITIGATION_DEP_NO_ATL_THUNK
|
122 MITIGATION_EXTENSION_DLL_DISABLE
;
123 #if defined(NDEBUG) // ASLR cannot be forced in debug builds.
124 mitigations
|= MITIGATION_RELOCATE_IMAGE
|
125 MITIGATION_RELOCATE_IMAGE_REQUIRED
;
128 EXPECT_EQ(policy
->SetProcessMitigations(mitigations
), SBOX_ALL_OK
);
130 mitigations
|= MITIGATION_STRICT_HANDLE_CHECKS
;
132 EXPECT_EQ(policy
->SetDelayedProcessMitigations(mitigations
), SBOX_ALL_OK
);
134 EXPECT_EQ(SBOX_TEST_SUCCEEDED
, runner
.RunTest(L
"CheckWin8"));
138 SBOX_TESTS_COMMAND
int CheckDep(int argc
, wchar_t **argv
) {
139 GetProcessDEPPolicyFunction get_process_dep_policy
=
140 reinterpret_cast<GetProcessDEPPolicyFunction
>(
141 ::GetProcAddress(::GetModuleHandleW(L
"kernel32.dll"),
142 "GetProcessDEPPolicy"));
143 if (get_process_dep_policy
) {
144 BOOL is_permanent
= FALSE
;
147 if (!get_process_dep_policy(::GetCurrentProcess(), &dep_flags
,
149 return SBOX_TEST_FIRST_ERROR
;
152 if (!(dep_flags
& PROCESS_DEP_ENABLE
) || !is_permanent
)
153 return SBOX_TEST_SECOND_ERROR
;
156 NtQueryInformationProcessFunction query_information_process
= NULL
;
157 ResolveNTFunctionPtr("NtQueryInformationProcess",
158 &query_information_process
);
159 if (!query_information_process
)
160 return SBOX_TEST_NOT_FOUND
;
164 if (!SUCCEEDED(query_information_process(::GetCurrentProcess(),
165 ProcessExecuteFlags
, &dep_flags
,
166 sizeof(dep_flags
), &size
))) {
167 return SBOX_TEST_THIRD_ERROR
;
170 static const int MEM_EXECUTE_OPTION_DISABLE
= 2;
171 static const int MEM_EXECUTE_OPTION_PERMANENT
= 8;
174 if (dep_flags
!= (MEM_EXECUTE_OPTION_DISABLE
|
175 MEM_EXECUTE_OPTION_PERMANENT
)) {
176 return SBOX_TEST_FOURTH_ERROR
;
180 return SBOX_TEST_SUCCEEDED
;
183 #if !defined(_WIN64) // DEP is always enabled on 64-bit.
184 TEST(ProcessMitigationsTest
, CheckDep
) {
185 if (base::win::GetVersion() > base::win::VERSION_WIN7
)
189 sandbox::TargetPolicy
* policy
= runner
.GetPolicy();
191 EXPECT_EQ(policy
->SetProcessMitigations(
193 MITIGATION_DEP_NO_ATL_THUNK
|
196 EXPECT_EQ(SBOX_TEST_SUCCEEDED
, runner
.RunTest(L
"CheckDep"));
200 SBOX_TESTS_COMMAND
int CheckWin8Lockdown(int argc
, wchar_t **argv
) {
201 get_process_mitigation_policy
=
202 reinterpret_cast<GetProcessMitigationPolicyFunction
>(
203 ::GetProcAddress(::GetModuleHandleW(L
"kernel32.dll"),
204 "GetProcessMitigationPolicy"));
205 if (!get_process_mitigation_policy
)
206 return SBOX_TEST_NOT_FOUND
;
208 if (!CheckWin8Win32CallPolicy())
209 return SBOX_TEST_FIRST_ERROR
;
210 return SBOX_TEST_SUCCEEDED
;
213 // This test validates that setting the MITIGATION_WIN32K_DISABLE mitigation on
214 // the target process causes the launch to fail in process initialization.
215 // The test process itself links against user32/gdi32.
216 TEST(ProcessMitigationsTest
, CheckWin8Win32KLockDownFailure
) {
217 if (base::win::GetVersion() < base::win::VERSION_WIN8
)
221 sandbox::TargetPolicy
* policy
= runner
.GetPolicy();
223 EXPECT_EQ(policy
->SetProcessMitigations(MITIGATION_WIN32K_DISABLE
),
225 EXPECT_NE(SBOX_TEST_SUCCEEDED
, runner
.RunTest(L
"CheckWin8Lockdown"));
228 // This test validates that setting the MITIGATION_WIN32K_DISABLE mitigation
229 // along with the policy to fake user32 and gdi32 initialization successfully
230 // launches the target process.
231 // The test process itself links against user32/gdi32.
232 TEST(ProcessMitigationsTest
, CheckWin8Win32KLockDownSuccess
) {
233 if (base::win::GetVersion() < base::win::VERSION_WIN8
)
237 sandbox::TargetPolicy
* policy
= runner
.GetPolicy();
239 EXPECT_EQ(policy
->SetProcessMitigations(MITIGATION_WIN32K_DISABLE
),
241 EXPECT_EQ(policy
->AddRule(sandbox::TargetPolicy::SUBSYS_WIN32K_LOCKDOWN
,
242 sandbox::TargetPolicy::FAKE_USER_GDI_INIT
, NULL
),
243 sandbox::SBOX_ALL_OK
);
244 EXPECT_EQ(SBOX_TEST_SUCCEEDED
, runner
.RunTest(L
"CheckWin8Lockdown"));
247 } // namespace sandbox