OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "sandbox/src/wow64.h" | |
6 | |
7 #include <sstream> | |
8 | |
9 #include "base/logging.h" | |
10 #include "base/memory/scoped_ptr.h" | |
11 #include "base/win/scoped_process_information.h" | |
12 #include "base/win/windows_version.h" | |
13 #include "sandbox/src/target_process.h" | |
14 | |
15 namespace { | |
16 | |
17 // Holds the information needed for the interception of NtMapViewOfSection on | |
18 // 64 bits. | |
19 // Warning: do not modify this definition without changing also the code on the | |
20 // 64 bit helper process. | |
21 struct PatchInfo32 { | |
22 HANDLE dll_load; // Event to signal the broker. | |
23 ULONG pad1; | |
24 HANDLE continue_load; // Event to wait for the broker. | |
25 ULONG pad2; | |
26 HANDLE section; // First argument of the call. | |
27 ULONG pad3; | |
28 void* orig_MapViewOfSection; | |
29 ULONG original_high; | |
30 void* signal_and_wait; | |
31 ULONG pad4; | |
32 void* patch_location; | |
33 ULONG patch_high; | |
34 }; | |
35 | |
36 // Size of the 64 bit service entry. | |
37 const SIZE_T kServiceEntry64Size = 0x10; | |
38 | |
39 // Removes the interception of ntdll64. | |
40 bool Restore64Code(HANDLE child, PatchInfo32* patch_info) { | |
41 PatchInfo32 local_patch_info; | |
42 SIZE_T actual; | |
43 if (!::ReadProcessMemory(child, patch_info, &local_patch_info, | |
44 sizeof(local_patch_info), &actual)) | |
45 return false; | |
46 if (sizeof(local_patch_info) != actual) | |
47 return false; | |
48 | |
49 if (local_patch_info.original_high) | |
50 return false; | |
51 if (local_patch_info.patch_high) | |
52 return false; | |
53 | |
54 char buffer[kServiceEntry64Size]; | |
55 | |
56 if (!::ReadProcessMemory(child, local_patch_info.orig_MapViewOfSection, | |
57 &buffer, kServiceEntry64Size, &actual)) | |
58 return false; | |
59 if (kServiceEntry64Size != actual) | |
60 return false; | |
61 | |
62 if (!::WriteProcessMemory(child, local_patch_info.patch_location, &buffer, | |
63 kServiceEntry64Size, &actual)) | |
64 return false; | |
65 if (kServiceEntry64Size != actual) | |
66 return false; | |
67 return true; | |
68 } | |
69 | |
70 typedef BOOL (WINAPI* IsWow64ProcessFunction)(HANDLE process, BOOL* wow64); | |
71 | |
72 } // namespace | |
73 | |
74 namespace sandbox { | |
75 | |
76 Wow64::~Wow64() { | |
77 if (dll_load_) | |
78 ::CloseHandle(dll_load_); | |
79 | |
80 if (continue_load_) | |
81 ::CloseHandle(continue_load_); | |
82 } | |
83 | |
84 // The basic idea is to allocate one page of memory on the child, and initialize | |
85 // the first part of it with our version of PatchInfo32. Then launch the helper | |
86 // process passing it that address on the child. The helper process will patch | |
87 // the 64 bit version of NtMapViewOfFile, and the interception will signal the | |
88 // first event on the buffer. We'll be waiting on that event and after the 32 | |
89 // bit version of ntdll is loaded, we'll remove the interception and return to | |
90 // our caller. | |
91 bool Wow64::WaitForNtdll() { | |
92 if (base::win::OSInfo::GetInstance()->wow64_status() != | |
93 base::win::OSInfo::WOW64_ENABLED) | |
94 return true; | |
95 | |
96 const size_t page_size = 4096; | |
97 | |
98 // Create some default manual reset un-named events, not signaled. | |
99 dll_load_ = ::CreateEvent(NULL, TRUE, FALSE, NULL); | |
100 continue_load_ = ::CreateEvent(NULL, TRUE, FALSE, NULL); | |
101 HANDLE current_process = ::GetCurrentProcess(); | |
102 HANDLE remote_load, remote_continue; | |
103 DWORD access = EVENT_MODIFY_STATE | SYNCHRONIZE; | |
104 if (!::DuplicateHandle(current_process, dll_load_, child_->Process(), | |
105 &remote_load, access, FALSE, 0)) | |
106 return false; | |
107 if (!::DuplicateHandle(current_process, continue_load_, child_->Process(), | |
108 &remote_continue, access, FALSE, 0)) | |
109 return false; | |
110 | |
111 void* buffer = ::VirtualAllocEx(child_->Process(), NULL, page_size, | |
112 MEM_COMMIT, PAGE_EXECUTE_READWRITE); | |
113 DCHECK(buffer); | |
114 if (!buffer) | |
115 return false; | |
116 | |
117 PatchInfo32* patch_info = reinterpret_cast<PatchInfo32*>(buffer); | |
118 PatchInfo32 local_patch_info = {0}; | |
119 local_patch_info.dll_load = remote_load; | |
120 local_patch_info.continue_load = remote_continue; | |
121 SIZE_T written; | |
122 if (!::WriteProcessMemory(child_->Process(), patch_info, &local_patch_info, | |
123 offsetof(PatchInfo32, section), &written)) | |
124 return false; | |
125 if (offsetof(PatchInfo32, section) != written) | |
126 return false; | |
127 | |
128 if (!RunWowHelper(buffer)) | |
129 return false; | |
130 | |
131 // The child is intercepted on 64 bit, go on and wait for our event. | |
132 if (!DllMapped()) | |
133 return false; | |
134 | |
135 // The 32 bit version is available, cleanup the child. | |
136 return Restore64Code(child_->Process(), patch_info); | |
137 } | |
138 | |
139 bool Wow64::RunWowHelper(void* buffer) { | |
140 COMPILE_ASSERT(sizeof(buffer) <= sizeof(DWORD), unsupported_64_bits); | |
141 | |
142 // Get the path to the helper (beside the exe). | |
143 wchar_t prog_name[MAX_PATH]; | |
144 GetModuleFileNameW(NULL, prog_name, MAX_PATH); | |
145 std::wstring path(prog_name); | |
146 size_t name_pos = path.find_last_of(L"\\"); | |
147 if (std::wstring::npos == name_pos) | |
148 return false; | |
149 path.resize(name_pos + 1); | |
150 | |
151 std::wstringstream command; | |
152 command << std::hex << std::showbase << L"\"" << path << | |
153 L"wow_helper.exe\" " << child_->ProcessId() << " " << | |
154 bit_cast<ULONG>(buffer); | |
155 | |
156 scoped_ptr_malloc<wchar_t> writable_command(_wcsdup(command.str().c_str())); | |
157 | |
158 STARTUPINFO startup_info = {0}; | |
159 startup_info.cb = sizeof(startup_info); | |
160 base::win::ScopedProcessInformation process_info; | |
161 if (!::CreateProcess(NULL, writable_command.get(), NULL, NULL, FALSE, 0, NULL, | |
162 NULL, &startup_info, process_info.Receive())) | |
163 return false; | |
164 | |
165 DWORD reason = ::WaitForSingleObject(process_info.process_handle(), INFINITE); | |
166 | |
167 DWORD code; | |
168 bool ok = | |
169 ::GetExitCodeProcess(process_info.process_handle(), &code) ? true : false; | |
170 | |
171 if (WAIT_TIMEOUT == reason) | |
172 return false; | |
173 | |
174 return ok && (0 == code); | |
175 } | |
176 | |
177 // First we must wake up the child, then wait for dll loads on the child until | |
178 // the one we care is loaded; at that point we must suspend the child again. | |
179 bool Wow64::DllMapped() { | |
180 if (1 != ::ResumeThread(child_->MainThread())) { | |
181 NOTREACHED(); | |
182 return false; | |
183 } | |
184 | |
185 for (;;) { | |
186 DWORD reason = ::WaitForSingleObject(dll_load_, INFINITE); | |
187 if (WAIT_TIMEOUT == reason || WAIT_ABANDONED == reason) | |
188 return false; | |
189 | |
190 if (!::ResetEvent(dll_load_)) | |
191 return false; | |
192 | |
193 bool found = NtdllPresent(); | |
194 if (found) { | |
195 if (::SuspendThread(child_->MainThread())) | |
196 return false; | |
197 } | |
198 | |
199 if (!::SetEvent(continue_load_)) | |
200 return false; | |
201 | |
202 if (found) | |
203 return true; | |
204 } | |
205 } | |
206 | |
207 bool Wow64::NtdllPresent() { | |
208 const size_t kBufferSize = 512; | |
209 char buffer[kBufferSize]; | |
210 SIZE_T read; | |
211 if (!::ReadProcessMemory(child_->Process(), ntdll_, &buffer, kBufferSize, | |
212 &read)) | |
213 return false; | |
214 if (kBufferSize != read) | |
215 return false; | |
216 return true; | |
217 } | |
218 | |
219 } // namespace sandbox | |
OLD | NEW |