// Copyright 2013 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. // // Implementation of NtMapViewOfSection intercept for 32 bit builds. // // TODO(robertshield): Implement the 64 bit intercept. #include "chrome_elf/blacklist/blacklist_interceptions.h" #include #include // Note that only #includes from base that are either header-only or built into // base_static (see base/base.gyp) are allowed here. #include "base/basictypes.h" #include "base/strings/string16.h" #include "base/win/pe_image.h" #include "chrome_elf/blacklist/blacklist.h" #include "chrome_elf/breakpad.h" #include "sandbox/win/src/internal_types.h" #include "sandbox/win/src/nt_internals.h" #include "sandbox/win/src/sandbox_nt_util.h" #include "sandbox/win/src/sandbox_types.h" namespace { NtQuerySectionFunction g_nt_query_section_func = NULL; NtQueryVirtualMemoryFunction g_nt_query_virtual_memory_func = NULL; NtUnmapViewOfSectionFunction g_nt_unmap_view_of_section_func = NULL; // TODO(robertshield): Merge with ntdll exports cache. FARPROC GetNtDllExportByName(const char* export_name) { HMODULE ntdll = ::GetModuleHandle(sandbox::kNtdllName); return ::GetProcAddress(ntdll, export_name); } int DllMatch(const base::string16& module_name) { for (int i = 0; blacklist::g_troublesome_dlls[i] != NULL; ++i) { if (_wcsicmp(module_name.c_str(), blacklist::g_troublesome_dlls[i]) == 0) return i; } return -1; } // TODO(robertshield): Some of the helper functions below overlap somewhat with // code in sandbox_nt_util.cc. See if they can be unified. // Native reimplementation of PSAPIs GetMappedFileName. base::string16 GetBackingModuleFilePath(PVOID address) { DCHECK_NT(g_nt_query_virtual_memory_func); // We'll start with something close to max_path characters for the name. ULONG buffer_bytes = MAX_PATH * 2; std::vector buffer_data(buffer_bytes); for (;;) { MEMORY_SECTION_NAME* section_name = reinterpret_cast(&buffer_data[0]); if (!section_name) break; ULONG returned_bytes; NTSTATUS ret = g_nt_query_virtual_memory_func( NtCurrentProcess, address, MemorySectionName, section_name, buffer_bytes, &returned_bytes); if (STATUS_BUFFER_OVERFLOW == ret) { // Retry the call with the given buffer size. buffer_bytes = returned_bytes + 1; buffer_data.resize(buffer_bytes); section_name = NULL; continue; } if (!NT_SUCCESS(ret)) break; UNICODE_STRING* section_string = reinterpret_cast(section_name); return base::string16(section_string->Buffer, section_string->Length / sizeof(wchar_t)); } return base::string16(); } bool IsModuleValidImageSection(HANDLE section, PVOID *base, PLARGE_INTEGER offset, PSIZE_T view_size) { DCHECK_NT(g_nt_query_section_func); if (!section || !base || !view_size || offset) return false; SECTION_BASIC_INFORMATION basic_info; SIZE_T bytes_returned; NTSTATUS ret = g_nt_query_section_func(section, SectionBasicInformation, &basic_info, sizeof(basic_info), &bytes_returned); if (!NT_SUCCESS(ret) || sizeof(basic_info) != bytes_returned) return false; if (!(basic_info.Attributes & SEC_IMAGE)) return false; return true; } base::string16 ExtractLoadedModuleName(const base::string16& module_path) { if (module_path.empty() || module_path[module_path.size() - 1] == L'\\') return base::string16(); size_t sep = module_path.find_last_of(L'\\'); if (sep == base::string16::npos) return module_path; else return module_path.substr(sep+1); } // Fills |out_name| with the image name from the given |pe| image and |flags| // with additional info about the image. void SafeGetImageInfo(const base::win::PEImage& pe, std::string* out_name, uint32* flags) { out_name->clear(); out_name->reserve(MAX_PATH); *flags = 0; __try { if (pe.VerifyMagic()) { *flags |= sandbox::MODULE_IS_PE_IMAGE; PIMAGE_EXPORT_DIRECTORY exports = pe.GetExportDirectory(); if (exports) { const char* image_name = reinterpret_cast( pe.RVAToAddr(exports->Name)); size_t i = 0; for (; i < MAX_PATH && *image_name; ++i, ++image_name) out_name->push_back(*image_name); } PIMAGE_NT_HEADERS headers = pe.GetNTHeaders(); if (headers) { if (headers->OptionalHeader.AddressOfEntryPoint) *flags |= sandbox::MODULE_HAS_ENTRY_POINT; if (headers->OptionalHeader.SizeOfCode) *flags |= sandbox::MODULE_HAS_CODE; } } } __except((GetExceptionCode() == EXCEPTION_ACCESS_VIOLATION || GetExceptionCode() == EXCEPTION_GUARD_PAGE || GetExceptionCode() == EXCEPTION_IN_PAGE_ERROR) ? EXCEPTION_EXECUTE_HANDLER : EXCEPTION_CONTINUE_SEARCH) { out_name->clear(); } } base::string16 GetImageInfoFromLoadedModule(HMODULE module, uint32* flags) { std::string out_name; base::win::PEImage pe(module); SafeGetImageInfo(pe, &out_name, flags); return base::string16(out_name.begin(), out_name.end()); } bool IsSameAsCurrentProcess(HANDLE process) { return (NtCurrentProcess == process) || (::GetProcessId(process) == ::GetCurrentProcessId()); } NTSTATUS BlNtMapViewOfSectionImpl( NtMapViewOfSectionFunction orig_MapViewOfSection, HANDLE section, HANDLE process, PVOID *base, ULONG_PTR zero_bits, SIZE_T commit_size, PLARGE_INTEGER offset, PSIZE_T view_size, SECTION_INHERIT inherit, ULONG allocation_type, ULONG protect) { NTSTATUS ret = orig_MapViewOfSection(section, process, base, zero_bits, commit_size, offset, view_size, inherit, allocation_type, protect); if (!NT_SUCCESS(ret) || !IsSameAsCurrentProcess(process) || !IsModuleValidImageSection(section, base, offset, view_size)) { return ret; } HMODULE module = reinterpret_cast(*base); if (module) { UINT image_flags; base::string16 module_name(GetImageInfoFromLoadedModule( reinterpret_cast(*base), &image_flags)); base::string16 file_name(GetBackingModuleFilePath(*base)); if (module_name.empty() && (image_flags & sandbox::MODULE_HAS_CODE)) { // If the module has no exports we retrieve the module name from the // full path of the mapped section. module_name = ExtractLoadedModuleName(file_name); } if (!module_name.empty()) { int blocked_index = DllMatch(module_name); if (blocked_index != -1) { DCHECK_NT(g_nt_unmap_view_of_section_func); g_nt_unmap_view_of_section_func(process, *base); ret = STATUS_UNSUCCESSFUL; blacklist::BlockedDll(blocked_index); } } } return ret; } } // namespace namespace blacklist { bool InitializeInterceptImports() { g_nt_query_section_func = reinterpret_cast( GetNtDllExportByName("NtQuerySection")); g_nt_query_virtual_memory_func = reinterpret_cast( GetNtDllExportByName("NtQueryVirtualMemory")); g_nt_unmap_view_of_section_func = reinterpret_cast( GetNtDllExportByName("NtUnmapViewOfSection")); return (g_nt_query_section_func && g_nt_query_virtual_memory_func && g_nt_unmap_view_of_section_func); } SANDBOX_INTERCEPT NTSTATUS WINAPI BlNtMapViewOfSection( NtMapViewOfSectionFunction orig_MapViewOfSection, HANDLE section, HANDLE process, PVOID *base, ULONG_PTR zero_bits, SIZE_T commit_size, PLARGE_INTEGER offset, PSIZE_T view_size, SECTION_INHERIT inherit, ULONG allocation_type, ULONG protect) { NTSTATUS ret = STATUS_UNSUCCESSFUL; __try { ret = BlNtMapViewOfSectionImpl(orig_MapViewOfSection, section, process, base, zero_bits, commit_size, offset, view_size, inherit, allocation_type, protect); } __except(GenerateCrashDump(GetExceptionInformation())) { } return ret; } #if defined(_WIN64) NTSTATUS WINAPI BlNtMapViewOfSection64( HANDLE section, HANDLE process, PVOID *base, ULONG_PTR zero_bits, SIZE_T commit_size, PLARGE_INTEGER offset, PSIZE_T view_size, SECTION_INHERIT inherit, ULONG allocation_type, ULONG protect) { return BlNtMapViewOfSection(g_nt_map_view_of_section_func, section, process, base, zero_bits, commit_size, offset, view_size, inherit, allocation_type, protect); } #endif } // namespace blacklist