1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "sandbox/win/src/service_resolver.h"
7 #include "base/memory/scoped_ptr.h"
8 #include "sandbox/win/src/sandbox_nt_util.h"
9 #include "sandbox/win/src/win_utils.h"
14 const ULONG kMmovR10EcxMovEax
= 0xB8D18B4C;
15 const USHORT kSyscall
= 0x050F;
16 const BYTE kRetNp
= 0xC3;
17 const ULONG64 kMov1
= 0x54894808244C8948;
18 const ULONG64 kMov2
= 0x4C182444894C1024;
19 const ULONG kMov3
= 0x20244C89;
21 // Service code for 64 bit systems.
23 // This struct contains roughly the following code:
31 ULONG mov_r10_rcx_mov_eax
; // = 4C 8B D1 B8
33 USHORT syscall
; // = 0F 05
36 USHORT xchg_ax_ax1
; // = 66 90
37 USHORT xchg_ax_ax2
; // = 66 90
40 // Service code for 64 bit Windows 8.
41 struct ServiceEntryW8
{
42 // This struct contains the following code:
43 // 00 48894c2408 mov [rsp+8], rcx
44 // 05 4889542410 mov [rsp+10], rdx
45 // 0a 4c89442418 mov [rsp+18], r8
46 // 0f 4c894c2420 mov [rsp+20], r9
47 // 14 4c8bd1 mov r10,rcx
48 // 17 b825000000 mov eax,25h
53 ULONG64 mov_1
; // = 48 89 4C 24 08 48 89 54
54 ULONG64 mov_2
; // = 24 10 4C 89 44 24 18 4C
55 ULONG mov_3
; // = 89 4C 24 20
56 ULONG mov_r10_rcx_mov_eax
; // = 4C 8B D1 B8
58 USHORT syscall
; // = 0F 05
63 // We don't have an internal thunk for x64.
64 struct ServiceFullThunk
{
66 ServiceEntry original
;
67 ServiceEntryW8 original_w8
;
73 bool IsService(const void* source
) {
74 const ServiceEntry
* service
=
75 reinterpret_cast<const ServiceEntry
*>(source
);
77 return (kMmovR10EcxMovEax
== service
->mov_r10_rcx_mov_eax
&&
78 kSyscall
== service
->syscall
&& kRetNp
== service
->ret
);
85 NTSTATUS
ServiceResolverThunk::Setup(const void* target_module
,
86 const void* interceptor_module
,
87 const char* target_name
,
88 const char* interceptor_name
,
89 const void* interceptor_entry_point
,
92 size_t* storage_used
) {
93 NTSTATUS ret
= Init(target_module
, interceptor_module
, target_name
,
94 interceptor_name
, interceptor_entry_point
,
95 thunk_storage
, storage_bytes
);
99 size_t thunk_bytes
= GetThunkSize();
100 scoped_ptr
<char[]> thunk_buffer(new char[thunk_bytes
]);
101 ServiceFullThunk
* thunk
= reinterpret_cast<ServiceFullThunk
*>(
104 if (!IsFunctionAService(&thunk
->original
))
105 return STATUS_UNSUCCESSFUL
;
107 ret
= PerformPatch(thunk
, thunk_storage
);
109 if (NULL
!= storage_used
)
110 *storage_used
= thunk_bytes
;
115 size_t ServiceResolverThunk::GetThunkSize() const {
116 return sizeof(ServiceFullThunk
);
119 bool ServiceResolverThunk::IsFunctionAService(void* local_thunk
) const {
120 ServiceFullThunk function_code
;
122 if (!::ReadProcessMemory(process_
, target_
, &function_code
,
123 sizeof(function_code
), &read
))
126 if (sizeof(function_code
) != read
)
129 if (!IsService(&function_code
)) {
130 // See if it's the Win8 signature.
131 ServiceEntryW8
* w8_service
= &function_code
.original_w8
;
132 if (!IsService(&w8_service
->mov_r10_rcx_mov_eax
) ||
133 w8_service
->mov_1
!= kMov1
|| w8_service
->mov_1
!= kMov1
||
134 w8_service
->mov_1
!= kMov1
) {
139 // Save the verified code.
140 memcpy(local_thunk
, &function_code
, sizeof(function_code
));
145 NTSTATUS
ServiceResolverThunk::PerformPatch(void* local_thunk
,
146 void* remote_thunk
) {
147 ServiceFullThunk
* full_local_thunk
=
148 reinterpret_cast<ServiceFullThunk
*>(local_thunk
);
149 ServiceFullThunk
* full_remote_thunk
=
150 reinterpret_cast<ServiceFullThunk
*>(remote_thunk
);
152 // Patch the original code.
153 ServiceEntry local_service
;
154 DCHECK_NT(GetInternalThunkSize() >= sizeof(local_service
));
155 if (!SetInternalThunk(&local_service
, sizeof(local_service
), NULL
,
157 return STATUS_UNSUCCESSFUL
;
159 // Copy the local thunk buffer to the child.
161 if (!::WriteProcessMemory(process_
, remote_thunk
, local_thunk
,
162 sizeof(ServiceFullThunk
), &actual
))
163 return STATUS_UNSUCCESSFUL
;
165 if (sizeof(ServiceFullThunk
) != actual
)
166 return STATUS_UNSUCCESSFUL
;
168 // And now change the function to intercept, on the child.
169 if (NULL
!= ntdll_base_
) {
170 // Running a unit test.
171 if (!::WriteProcessMemory(process_
, target_
, &local_service
,
172 sizeof(local_service
), &actual
))
173 return STATUS_UNSUCCESSFUL
;
175 if (!WriteProtectedChildMemory(process_
, target_
, &local_service
,
176 sizeof(local_service
)))
177 return STATUS_UNSUCCESSFUL
;
180 return STATUS_SUCCESS
;
183 bool Wow64ResolverThunk::IsFunctionAService(void* local_thunk
) const {
188 bool Win2kResolverThunk::IsFunctionAService(void* local_thunk
) const {
193 } // namespace sandbox