diff options
author | ananta@chromium.org <ananta@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-06-11 15:27:56 +0000 |
---|---|---|
committer | ananta@chromium.org <ananta@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-06-11 15:27:56 +0000 |
commit | eded774a2a93708b901101423fbd3ce537ced049 (patch) | |
tree | 640f4e6fa2d84b16ebba746109fa0c6b64447942 /sandbox/win/sandbox_win.gypi | |
parent | b8df56efb6abde9b8e445fffed5cc13342ef94d9 (diff) | |
download | chromium_src-eded774a2a93708b901101423fbd3ce537ced049.zip chromium_src-eded774a2a93708b901101423fbd3ce537ced049.tar.gz chromium_src-eded774a2a93708b901101423fbd3ce537ced049.tar.bz2 |
Sandbox policy and intercepts for the MITIGATION_WIN32K_DISABLE policy for renderer processes.
This policy when set will prevent the renderer process from making Win32K.sys calls via user32/gdi32 on
Windows 8 and beyond.
The following intercepts are needed for getting basic renderer functionality.
1. gdi32!GdiDllInitialize:
2. gdi32!GetStockObject.
3. user32!RegisterClassW.
The above functions are called during renderer process initialization. We intercept these APIS by
EAT patching the corresponding dlls and return fake success values from those.
The intercepts live in the process_mitigations_win32k_interception.cc/.h files. The rest of the changes
are plumbing with the sandbox policy framework.
While basic renderers work well now on Windows 8, pepper flash does not as it sends an IPC to the renderer
to creating the transport DIB. Justin is aware of this problem and thinks we can workaround this.
BUG=365160
Added gdi and user32 interceptors for the win32k lockdown project.
Review URL: https://codereview.chromium.org/318603003
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@276407 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox/win/sandbox_win.gypi')
-rw-r--r-- | sandbox/win/sandbox_win.gypi | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/sandbox/win/sandbox_win.gypi b/sandbox/win/sandbox_win.gypi index 01d3f12..7d9cf94 100644 --- a/sandbox/win/sandbox_win.gypi +++ b/sandbox/win/sandbox_win.gypi @@ -74,6 +74,12 @@ 'src/policy_target.h', 'src/process_mitigations.cc', 'src/process_mitigations.h', + 'src/process_mitigations_win32k_dispatcher.cc', + 'src/process_mitigations_win32k_dispatcher.h', + 'src/process_mitigations_win32k_interception.cc', + 'src/process_mitigations_win32k_interception.h', + 'src/process_mitigations_win32k_policy.cc', + 'src/process_mitigations_win32k_policy.h', 'src/process_thread_dispatcher.cc', 'src/process_thread_dispatcher.h', 'src/process_thread_interception.cc', |