1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 // Implementation of NtMapViewOfSection intercept for 32 bit builds.
7 // TODO(robertshield): Implement the 64 bit intercept.
9 #include "chrome_elf/blacklist/blacklist_interceptions.h"
14 // Note that only #includes from base that are either header-only or built into
15 // base_static (see base/base.gyp) are allowed here.
16 #include "base/basictypes.h"
17 #include "base/strings/string16.h"
18 #include "base/win/pe_image.h"
19 #include "chrome_elf/blacklist/blacklist.h"
20 #include "chrome_elf/breakpad.h"
21 #include "sandbox/win/src/internal_types.h"
22 #include "sandbox/win/src/nt_internals.h"
23 #include "sandbox/win/src/sandbox_nt_util.h"
24 #include "sandbox/win/src/sandbox_types.h"
28 NtQuerySectionFunction g_nt_query_section_func
= NULL
;
29 NtQueryVirtualMemoryFunction g_nt_query_virtual_memory_func
= NULL
;
30 NtUnmapViewOfSectionFunction g_nt_unmap_view_of_section_func
= NULL
;
32 // TODO(robertshield): Merge with ntdll exports cache.
33 FARPROC
GetNtDllExportByName(const char* export_name
) {
34 HMODULE ntdll
= ::GetModuleHandle(sandbox::kNtdllName
);
35 return ::GetProcAddress(ntdll
, export_name
);
38 int DllMatch(const base::string16
& module_name
) {
39 if (module_name
.empty())
42 for (int i
= 0; blacklist::g_troublesome_dlls
[i
] != NULL
; ++i
) {
43 if (_wcsicmp(module_name
.c_str(), blacklist::g_troublesome_dlls
[i
]) == 0)
49 // TODO(robertshield): Some of the helper functions below overlap somewhat with
50 // code in sandbox_nt_util.cc. See if they can be unified.
52 // Native reimplementation of PSAPIs GetMappedFileName.
53 base::string16
GetBackingModuleFilePath(PVOID address
) {
54 DCHECK_NT(g_nt_query_virtual_memory_func
);
56 // We'll start with something close to max_path characters for the name.
57 SIZE_T buffer_bytes
= MAX_PATH
* 2;
58 std::vector
<BYTE
> buffer_data(buffer_bytes
);
61 MEMORY_SECTION_NAME
* section_name
=
62 reinterpret_cast<MEMORY_SECTION_NAME
*>(&buffer_data
[0]);
67 SIZE_T returned_bytes
;
68 NTSTATUS ret
= g_nt_query_virtual_memory_func(
69 NtCurrentProcess
, address
, MemorySectionName
, section_name
,
70 buffer_bytes
, &returned_bytes
);
72 if (STATUS_BUFFER_OVERFLOW
== ret
) {
73 // Retry the call with the given buffer size.
74 buffer_bytes
= returned_bytes
+ 1;
75 buffer_data
.resize(buffer_bytes
);
82 UNICODE_STRING
* section_string
=
83 reinterpret_cast<UNICODE_STRING
*>(section_name
);
84 return base::string16(section_string
->Buffer
,
85 section_string
->Length
/ sizeof(wchar_t));
88 return base::string16();
91 bool IsModuleValidImageSection(HANDLE section
,
93 PLARGE_INTEGER offset
,
95 DCHECK_NT(g_nt_query_section_func
);
97 if (!section
|| !base
|| !view_size
|| offset
)
100 SECTION_BASIC_INFORMATION basic_info
;
101 SIZE_T bytes_returned
;
102 NTSTATUS ret
= g_nt_query_section_func(section
, SectionBasicInformation
,
103 &basic_info
, sizeof(basic_info
),
106 if (!NT_SUCCESS(ret
) || sizeof(basic_info
) != bytes_returned
)
109 if (!(basic_info
.Attributes
& SEC_IMAGE
))
115 base::string16
ExtractLoadedModuleName(const base::string16
& module_path
) {
116 if (module_path
.empty() || module_path
[module_path
.size() - 1] == L
'\\')
117 return base::string16();
119 size_t sep
= module_path
.find_last_of(L
'\\');
120 if (sep
== base::string16::npos
)
123 return module_path
.substr(sep
+1);
126 // Fills |out_name| with the image name from the given |pe| image and |flags|
127 // with additional info about the image.
128 void SafeGetImageInfo(const base::win::PEImage
& pe
,
129 std::string
* out_name
,
132 out_name
->reserve(MAX_PATH
);
135 if (pe
.VerifyMagic()) {
136 *flags
|= sandbox::MODULE_IS_PE_IMAGE
;
138 PIMAGE_EXPORT_DIRECTORY exports
= pe
.GetExportDirectory();
140 const char* image_name
= reinterpret_cast<const char*>(
141 pe
.RVAToAddr(exports
->Name
));
143 for (; i
< MAX_PATH
&& *image_name
; ++i
, ++image_name
)
144 out_name
->push_back(*image_name
);
147 PIMAGE_NT_HEADERS headers
= pe
.GetNTHeaders();
149 if (headers
->OptionalHeader
.AddressOfEntryPoint
)
150 *flags
|= sandbox::MODULE_HAS_ENTRY_POINT
;
151 if (headers
->OptionalHeader
.SizeOfCode
)
152 *flags
|= sandbox::MODULE_HAS_CODE
;
155 } __except((GetExceptionCode() == EXCEPTION_ACCESS_VIOLATION
||
156 GetExceptionCode() == EXCEPTION_GUARD_PAGE
||
157 GetExceptionCode() == EXCEPTION_IN_PAGE_ERROR
) ?
158 EXCEPTION_EXECUTE_HANDLER
: EXCEPTION_CONTINUE_SEARCH
) {
163 base::string16
GetImageInfoFromLoadedModule(HMODULE module
, uint32
* flags
) {
164 std::string out_name
;
165 base::win::PEImage
pe(module
);
166 SafeGetImageInfo(pe
, &out_name
, flags
);
167 return base::string16(out_name
.begin(), out_name
.end());
170 bool IsSameAsCurrentProcess(HANDLE process
) {
171 return (NtCurrentProcess
== process
) ||
172 (::GetProcessId(process
) == ::GetCurrentProcessId());
175 NTSTATUS
BlNtMapViewOfSectionImpl(
176 NtMapViewOfSectionFunction orig_MapViewOfSection
,
182 PLARGE_INTEGER offset
,
184 SECTION_INHERIT inherit
,
185 ULONG allocation_type
,
187 NTSTATUS ret
= orig_MapViewOfSection(section
, process
, base
, zero_bits
,
188 commit_size
, offset
, view_size
, inherit
,
189 allocation_type
, protect
);
191 if (!NT_SUCCESS(ret
) || !IsSameAsCurrentProcess(process
) ||
192 !IsModuleValidImageSection(section
, base
, offset
, view_size
)) {
196 HMODULE module
= reinterpret_cast<HMODULE
>(*base
);
200 base::string16
module_name_from_image(GetImageInfoFromLoadedModule(
201 reinterpret_cast<HMODULE
>(*base
), &image_flags
));
203 int blocked_index
= DllMatch(module_name_from_image
);
205 // If the module name isn't blacklisted, see if the file name is different
207 if (blocked_index
== -1) {
208 base::string16
file_name(GetBackingModuleFilePath(*base
));
209 base::string16 module_name_from_file
= ExtractLoadedModuleName(file_name
);
211 if (module_name_from_image
!= module_name_from_file
)
212 blocked_index
= DllMatch(module_name_from_file
);
215 if (blocked_index
!= -1) {
216 DCHECK_NT(g_nt_unmap_view_of_section_func
);
217 g_nt_unmap_view_of_section_func(process
, *base
);
218 ret
= STATUS_UNSUCCESSFUL
;
220 blacklist::BlockedDll(blocked_index
);
229 namespace blacklist
{
231 bool InitializeInterceptImports() {
232 g_nt_query_section_func
=
233 reinterpret_cast<NtQuerySectionFunction
>(
234 GetNtDllExportByName("NtQuerySection"));
235 g_nt_query_virtual_memory_func
=
236 reinterpret_cast<NtQueryVirtualMemoryFunction
>(
237 GetNtDllExportByName("NtQueryVirtualMemory"));
238 g_nt_unmap_view_of_section_func
=
239 reinterpret_cast<NtUnmapViewOfSectionFunction
>(
240 GetNtDllExportByName("NtUnmapViewOfSection"));
242 return (g_nt_query_section_func
&& g_nt_query_virtual_memory_func
&&
243 g_nt_unmap_view_of_section_func
);
246 SANDBOX_INTERCEPT NTSTATUS WINAPI
BlNtMapViewOfSection(
247 NtMapViewOfSectionFunction orig_MapViewOfSection
,
253 PLARGE_INTEGER offset
,
255 SECTION_INHERIT inherit
,
256 ULONG allocation_type
,
258 NTSTATUS ret
= STATUS_UNSUCCESSFUL
;
261 ret
= BlNtMapViewOfSectionImpl(orig_MapViewOfSection
, section
, process
,
262 base
, zero_bits
, commit_size
, offset
,
263 view_size
, inherit
, allocation_type
,
265 } __except(GenerateCrashDump(GetExceptionInformation())) {
272 NTSTATUS WINAPI
BlNtMapViewOfSection64(
273 HANDLE section
, HANDLE process
, PVOID
*base
, ULONG_PTR zero_bits
,
274 SIZE_T commit_size
, PLARGE_INTEGER offset
, PSIZE_T view_size
,
275 SECTION_INHERIT inherit
, ULONG allocation_type
, ULONG protect
) {
276 return BlNtMapViewOfSection(g_nt_map_view_of_section_func
, section
, process
,
277 base
, zero_bits
, commit_size
, offset
, view_size
,
278 inherit
, allocation_type
, protect
);
281 } // namespace blacklist