blob: e5e9e1112c5618cd6a68ed99ae3afc0fc5363a25 [file] [log] [blame]
// Copyright 2013 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
//
// Implementation of NtMapViewOfSection intercept for 32 bit builds.
//
// TODO(robertshield): Implement the 64 bit intercept.
#include "chrome_elf/blacklist/blacklist_interceptions.h"
#include <stddef.h>
#include <stdint.h>
#include <string>
#include <vector>
// Note that only #includes from base that are either header-only or built into
// base_static (see base/base.gyp) are allowed here.
#include "base/strings/string16.h"
#include "base/win/pe_image.h"
#include "chrome_elf/blacklist/blacklist.h"
#include "chrome_elf/breakpad.h"
#include "sandbox/win/src/internal_types.h"
#include "sandbox/win/src/nt_internals.h"
#include "sandbox/win/src/sandbox_nt_util.h"
#include "sandbox/win/src/sandbox_types.h"
namespace {
NtQuerySectionFunction g_nt_query_section_func = NULL;
NtQueryVirtualMemoryFunction g_nt_query_virtual_memory_func = NULL;
NtUnmapViewOfSectionFunction g_nt_unmap_view_of_section_func = NULL;
// TODO(robertshield): Merge with ntdll exports cache.
FARPROC GetNtDllExportByName(const char* export_name) {
HMODULE ntdll = ::GetModuleHandle(sandbox::kNtdllName);
return ::GetProcAddress(ntdll, export_name);
}
int DllMatch(const base::string16& module_name) {
if (module_name.empty())
return -1;
for (int i = 0; blacklist::g_troublesome_dlls[i] != NULL; ++i) {
if (_wcsicmp(module_name.c_str(), blacklist::g_troublesome_dlls[i]) == 0)
return i;
}
return -1;
}
// TODO(robertshield): Some of the helper functions below overlap somewhat with
// code in sandbox_nt_util.cc. See if they can be unified.
// Native reimplementation of PSAPIs GetMappedFileName.
base::string16 GetBackingModuleFilePath(PVOID address) {
DCHECK_NT(g_nt_query_virtual_memory_func);
// We'll start with something close to max_path characters for the name.
SIZE_T buffer_bytes = MAX_PATH * 2;
std::vector<BYTE> buffer_data(buffer_bytes);
for (;;) {
MEMORY_SECTION_NAME* section_name =
reinterpret_cast<MEMORY_SECTION_NAME*>(&buffer_data[0]);
if (!section_name)
break;
SIZE_T returned_bytes;
NTSTATUS ret = g_nt_query_virtual_memory_func(
NtCurrentProcess, address, MemorySectionName, section_name,
buffer_bytes, &returned_bytes);
if (STATUS_BUFFER_OVERFLOW == ret) {
// Retry the call with the given buffer size.
buffer_bytes = returned_bytes + 1;
buffer_data.resize(buffer_bytes);
section_name = NULL;
continue;
}
if (!NT_SUCCESS(ret))
break;
UNICODE_STRING* section_string =
reinterpret_cast<UNICODE_STRING*>(section_name);
return base::string16(section_string->Buffer,
section_string->Length / sizeof(wchar_t));
}
return base::string16();
}
bool IsModuleValidImageSection(HANDLE section,
PVOID *base,
PLARGE_INTEGER offset,
PSIZE_T view_size) {
DCHECK_NT(g_nt_query_section_func);
if (!section || !base || !view_size || offset)
return false;
SECTION_BASIC_INFORMATION basic_info;
SIZE_T bytes_returned;
NTSTATUS ret = g_nt_query_section_func(section, SectionBasicInformation,
&basic_info, sizeof(basic_info),
&bytes_returned);
if (!NT_SUCCESS(ret) || sizeof(basic_info) != bytes_returned)
return false;
if (!(basic_info.Attributes & SEC_IMAGE))
return false;
return true;
}
base::string16 ExtractLoadedModuleName(const base::string16& module_path) {
if (module_path.empty() || module_path[module_path.size() - 1] == L'\\')
return base::string16();
size_t sep = module_path.find_last_of(L'\\');
if (sep == base::string16::npos)
return module_path;
else
return module_path.substr(sep+1);
}
// Fills |out_name| with the image name from the given |pe| image and |flags|
// with additional info about the image.
void SafeGetImageInfo(const base::win::PEImage& pe,
std::string* out_name,
uint32_t* flags) {
out_name->clear();
out_name->reserve(MAX_PATH);
*flags = 0;
__try {
if (pe.VerifyMagic()) {
*flags |= sandbox::MODULE_IS_PE_IMAGE;
PIMAGE_EXPORT_DIRECTORY exports = pe.GetExportDirectory();
if (exports) {
const char* image_name = reinterpret_cast<const char*>(
pe.RVAToAddr(exports->Name));
size_t i = 0;
for (; i < MAX_PATH && *image_name; ++i, ++image_name)
out_name->push_back(*image_name);
}
PIMAGE_NT_HEADERS headers = pe.GetNTHeaders();
if (headers) {
if (headers->OptionalHeader.AddressOfEntryPoint)
*flags |= sandbox::MODULE_HAS_ENTRY_POINT;
if (headers->OptionalHeader.SizeOfCode)
*flags |= sandbox::MODULE_HAS_CODE;
}
}
} __except((GetExceptionCode() == EXCEPTION_ACCESS_VIOLATION ||
GetExceptionCode() == EXCEPTION_GUARD_PAGE ||
GetExceptionCode() == EXCEPTION_IN_PAGE_ERROR) ?
EXCEPTION_EXECUTE_HANDLER : EXCEPTION_CONTINUE_SEARCH) {
out_name->clear();
}
}
base::string16 GetImageInfoFromLoadedModule(HMODULE module, uint32_t* flags) {
std::string out_name;
base::win::PEImage pe(module);
SafeGetImageInfo(pe, &out_name, flags);
return base::string16(out_name.begin(), out_name.end());
}
bool IsSameAsCurrentProcess(HANDLE process) {
return (NtCurrentProcess == process) ||
(::GetProcessId(process) == ::GetCurrentProcessId());
}
NTSTATUS BlNtMapViewOfSectionImpl(
NtMapViewOfSectionFunction orig_MapViewOfSection,
HANDLE section,
HANDLE process,
PVOID *base,
ULONG_PTR zero_bits,
SIZE_T commit_size,
PLARGE_INTEGER offset,
PSIZE_T view_size,
SECTION_INHERIT inherit,
ULONG allocation_type,
ULONG protect) {
NTSTATUS ret = orig_MapViewOfSection(section, process, base, zero_bits,
commit_size, offset, view_size, inherit,
allocation_type, protect);
if (!NT_SUCCESS(ret) || !IsSameAsCurrentProcess(process) ||
!IsModuleValidImageSection(section, base, offset, view_size)) {
return ret;
}
HMODULE module = reinterpret_cast<HMODULE>(*base);
if (module) {
UINT image_flags;
base::string16 module_name_from_image(GetImageInfoFromLoadedModule(
reinterpret_cast<HMODULE>(*base), &image_flags));
int blocked_index = DllMatch(module_name_from_image);
// If the module name isn't blacklisted, see if the file name is different
// and blacklisted.
if (blocked_index == -1) {
base::string16 file_name(GetBackingModuleFilePath(*base));
base::string16 module_name_from_file = ExtractLoadedModuleName(file_name);
if (module_name_from_image != module_name_from_file)
blocked_index = DllMatch(module_name_from_file);
}
if (blocked_index != -1) {
DCHECK_NT(g_nt_unmap_view_of_section_func);
g_nt_unmap_view_of_section_func(process, *base);
ret = STATUS_UNSUCCESSFUL;
blacklist::BlockedDll(blocked_index);
}
}
return ret;
}
} // namespace
namespace blacklist {
bool InitializeInterceptImports() {
g_nt_query_section_func =
reinterpret_cast<NtQuerySectionFunction>(
GetNtDllExportByName("NtQuerySection"));
g_nt_query_virtual_memory_func =
reinterpret_cast<NtQueryVirtualMemoryFunction>(
GetNtDllExportByName("NtQueryVirtualMemory"));
g_nt_unmap_view_of_section_func =
reinterpret_cast<NtUnmapViewOfSectionFunction>(
GetNtDllExportByName("NtUnmapViewOfSection"));
return (g_nt_query_section_func && g_nt_query_virtual_memory_func &&
g_nt_unmap_view_of_section_func);
}
SANDBOX_INTERCEPT NTSTATUS WINAPI BlNtMapViewOfSection(
NtMapViewOfSectionFunction orig_MapViewOfSection,
HANDLE section,
HANDLE process,
PVOID *base,
ULONG_PTR zero_bits,
SIZE_T commit_size,
PLARGE_INTEGER offset,
PSIZE_T view_size,
SECTION_INHERIT inherit,
ULONG allocation_type,
ULONG protect) {
NTSTATUS ret = STATUS_UNSUCCESSFUL;
__try {
ret = BlNtMapViewOfSectionImpl(orig_MapViewOfSection, section, process,
base, zero_bits, commit_size, offset,
view_size, inherit, allocation_type,
protect);
} __except(GenerateCrashDump(GetExceptionInformation())) {
}
return ret;
}
#if defined(_WIN64)
NTSTATUS WINAPI BlNtMapViewOfSection64(
HANDLE section, HANDLE process, PVOID *base, ULONG_PTR zero_bits,
SIZE_T commit_size, PLARGE_INTEGER offset, PSIZE_T view_size,
SECTION_INHERIT inherit, ULONG allocation_type, ULONG protect) {
return BlNtMapViewOfSection(g_nt_map_view_of_section_func, section, process,
base, zero_bits, commit_size, offset, view_size,
inherit, allocation_type, protect);
}
#endif
} // namespace blacklist