summaryrefslogtreecommitdiffstats
path: root/chromium/chrome_elf/blacklist/blacklist_interceptions.cc
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/chrome_elf/blacklist/blacklist_interceptions.cc')
-rw-r--r--chromium/chrome_elf/blacklist/blacklist_interceptions.cc276
1 files changed, 276 insertions, 0 deletions
diff --git a/chromium/chrome_elf/blacklist/blacklist_interceptions.cc b/chromium/chrome_elf/blacklist/blacklist_interceptions.cc
new file mode 100644
index 00000000000..28eb692accc
--- /dev/null
+++ b/chromium/chrome_elf/blacklist/blacklist_interceptions.cc
@@ -0,0 +1,276 @@
+// Copyright 2013 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+//
+// Implementation of NtMapViewOfSection intercept for 32 bit builds.
+//
+// TODO(robertshield): Implement the 64 bit intercept.
+
+#include "chrome_elf/blacklist/blacklist_interceptions.h"
+
+#include <string>
+#include <vector>
+
+// Note that only #includes from base that are either header-only or built into
+// base_static (see base/base.gyp) are allowed here.
+#include "base/basictypes.h"
+#include "base/strings/string16.h"
+#include "base/win/pe_image.h"
+#include "chrome_elf/blacklist/blacklist.h"
+#include "chrome_elf/breakpad.h"
+#include "sandbox/win/src/internal_types.h"
+#include "sandbox/win/src/nt_internals.h"
+#include "sandbox/win/src/sandbox_nt_util.h"
+#include "sandbox/win/src/sandbox_types.h"
+
+namespace {
+
+NtQuerySectionFunction g_nt_query_section_func = NULL;
+NtQueryVirtualMemoryFunction g_nt_query_virtual_memory_func = NULL;
+NtUnmapViewOfSectionFunction g_nt_unmap_view_of_section_func = NULL;
+
+// TODO(robertshield): Merge with ntdll exports cache.
+FARPROC GetNtDllExportByName(const char* export_name) {
+ HMODULE ntdll = ::GetModuleHandle(sandbox::kNtdllName);
+ return ::GetProcAddress(ntdll, export_name);
+}
+
+int DllMatch(const base::string16& module_name) {
+ for (int i = 0; blacklist::g_troublesome_dlls[i] != NULL; ++i) {
+ if (_wcsicmp(module_name.c_str(), blacklist::g_troublesome_dlls[i]) == 0)
+ return i;
+ }
+ return -1;
+}
+
+// TODO(robertshield): Some of the helper functions below overlap somewhat with
+// code in sandbox_nt_util.cc. See if they can be unified.
+
+// Native reimplementation of PSAPIs GetMappedFileName.
+base::string16 GetBackingModuleFilePath(PVOID address) {
+ DCHECK_NT(g_nt_query_virtual_memory_func);
+
+ // We'll start with something close to max_path characters for the name.
+ ULONG buffer_bytes = MAX_PATH * 2;
+ std::vector<BYTE> buffer_data(buffer_bytes);
+
+ for (;;) {
+ MEMORY_SECTION_NAME* section_name =
+ reinterpret_cast<MEMORY_SECTION_NAME*>(&buffer_data[0]);
+
+ if (!section_name)
+ break;
+
+ ULONG returned_bytes;
+ NTSTATUS ret = g_nt_query_virtual_memory_func(
+ NtCurrentProcess, address, MemorySectionName, section_name,
+ buffer_bytes, &returned_bytes);
+
+ if (STATUS_BUFFER_OVERFLOW == ret) {
+ // Retry the call with the given buffer size.
+ buffer_bytes = returned_bytes + 1;
+ buffer_data.resize(buffer_bytes);
+ section_name = NULL;
+ continue;
+ }
+ if (!NT_SUCCESS(ret))
+ break;
+
+ UNICODE_STRING* section_string =
+ reinterpret_cast<UNICODE_STRING*>(section_name);
+ return base::string16(section_string->Buffer,
+ section_string->Length / sizeof(wchar_t));
+ }
+
+ return base::string16();
+}
+
+bool IsModuleValidImageSection(HANDLE section,
+ PVOID *base,
+ PLARGE_INTEGER offset,
+ PSIZE_T view_size) {
+ DCHECK_NT(g_nt_query_section_func);
+
+ if (!section || !base || !view_size || offset)
+ return false;
+
+ SECTION_BASIC_INFORMATION basic_info;
+ SIZE_T bytes_returned;
+ NTSTATUS ret = g_nt_query_section_func(section, SectionBasicInformation,
+ &basic_info, sizeof(basic_info),
+ &bytes_returned);
+
+ if (!NT_SUCCESS(ret) || sizeof(basic_info) != bytes_returned)
+ return false;
+
+ if (!(basic_info.Attributes & SEC_IMAGE))
+ return false;
+
+ return true;
+}
+
+base::string16 ExtractLoadedModuleName(const base::string16& module_path) {
+ if (module_path.empty() || module_path[module_path.size() - 1] == L'\\')
+ return base::string16();
+
+ size_t sep = module_path.find_last_of(L'\\');
+ if (sep == base::string16::npos)
+ return module_path;
+ else
+ return module_path.substr(sep+1);
+}
+
+// Fills |out_name| with the image name from the given |pe| image and |flags|
+// with additional info about the image.
+void SafeGetImageInfo(const base::win::PEImage& pe,
+ std::string* out_name,
+ uint32* flags) {
+ out_name->clear();
+ out_name->reserve(MAX_PATH);
+ *flags = 0;
+ __try {
+ if (pe.VerifyMagic()) {
+ *flags |= sandbox::MODULE_IS_PE_IMAGE;
+
+ PIMAGE_EXPORT_DIRECTORY exports = pe.GetExportDirectory();
+ if (exports) {
+ const char* image_name = reinterpret_cast<const char*>(
+ pe.RVAToAddr(exports->Name));
+ size_t i = 0;
+ for (; i < MAX_PATH && *image_name; ++i, ++image_name)
+ out_name->push_back(*image_name);
+ }
+
+ PIMAGE_NT_HEADERS headers = pe.GetNTHeaders();
+ if (headers) {
+ if (headers->OptionalHeader.AddressOfEntryPoint)
+ *flags |= sandbox::MODULE_HAS_ENTRY_POINT;
+ if (headers->OptionalHeader.SizeOfCode)
+ *flags |= sandbox::MODULE_HAS_CODE;
+ }
+ }
+ } __except((GetExceptionCode() == EXCEPTION_ACCESS_VIOLATION ||
+ GetExceptionCode() == EXCEPTION_GUARD_PAGE ||
+ GetExceptionCode() == EXCEPTION_IN_PAGE_ERROR) ?
+ EXCEPTION_EXECUTE_HANDLER : EXCEPTION_CONTINUE_SEARCH) {
+ out_name->clear();
+ }
+}
+
+base::string16 GetImageInfoFromLoadedModule(HMODULE module, uint32* flags) {
+ std::string out_name;
+ base::win::PEImage pe(module);
+ SafeGetImageInfo(pe, &out_name, flags);
+ return base::string16(out_name.begin(), out_name.end());
+}
+
+bool IsSameAsCurrentProcess(HANDLE process) {
+ return (NtCurrentProcess == process) ||
+ (::GetProcessId(process) == ::GetCurrentProcessId());
+}
+
+NTSTATUS BlNtMapViewOfSectionImpl(
+ NtMapViewOfSectionFunction orig_MapViewOfSection,
+ HANDLE section,
+ HANDLE process,
+ PVOID *base,
+ ULONG_PTR zero_bits,
+ SIZE_T commit_size,
+ PLARGE_INTEGER offset,
+ PSIZE_T view_size,
+ SECTION_INHERIT inherit,
+ ULONG allocation_type,
+ ULONG protect) {
+ NTSTATUS ret = orig_MapViewOfSection(section, process, base, zero_bits,
+ commit_size, offset, view_size, inherit,
+ allocation_type, protect);
+
+ if (!NT_SUCCESS(ret) || !IsSameAsCurrentProcess(process) ||
+ !IsModuleValidImageSection(section, base, offset, view_size)) {
+ return ret;
+ }
+
+ HMODULE module = reinterpret_cast<HMODULE>(*base);
+ if (module) {
+ UINT image_flags;
+
+ base::string16 module_name(GetImageInfoFromLoadedModule(
+ reinterpret_cast<HMODULE>(*base), &image_flags));
+ base::string16 file_name(GetBackingModuleFilePath(*base));
+
+ if (module_name.empty() && (image_flags & sandbox::MODULE_HAS_CODE)) {
+ // If the module has no exports we retrieve the module name from the
+ // full path of the mapped section.
+ module_name = ExtractLoadedModuleName(file_name);
+ }
+
+ if (!module_name.empty()) {
+ int blocked_index = DllMatch(module_name);
+ if (blocked_index != -1) {
+ DCHECK_NT(g_nt_unmap_view_of_section_func);
+ g_nt_unmap_view_of_section_func(process, *base);
+ ret = STATUS_UNSUCCESSFUL;
+
+ blacklist::BlockedDll(blocked_index);
+ }
+ }
+ }
+
+ return ret;
+}
+
+} // namespace
+
+namespace blacklist {
+
+bool InitializeInterceptImports() {
+ g_nt_query_section_func =
+ reinterpret_cast<NtQuerySectionFunction>(
+ GetNtDllExportByName("NtQuerySection"));
+ g_nt_query_virtual_memory_func =
+ reinterpret_cast<NtQueryVirtualMemoryFunction>(
+ GetNtDllExportByName("NtQueryVirtualMemory"));
+ g_nt_unmap_view_of_section_func =
+ reinterpret_cast<NtUnmapViewOfSectionFunction>(
+ GetNtDllExportByName("NtUnmapViewOfSection"));
+
+ return (g_nt_query_section_func && g_nt_query_virtual_memory_func &&
+ g_nt_unmap_view_of_section_func);
+}
+
+SANDBOX_INTERCEPT NTSTATUS WINAPI BlNtMapViewOfSection(
+ NtMapViewOfSectionFunction orig_MapViewOfSection,
+ HANDLE section,
+ HANDLE process,
+ PVOID *base,
+ ULONG_PTR zero_bits,
+ SIZE_T commit_size,
+ PLARGE_INTEGER offset,
+ PSIZE_T view_size,
+ SECTION_INHERIT inherit,
+ ULONG allocation_type,
+ ULONG protect) {
+ NTSTATUS ret = STATUS_UNSUCCESSFUL;
+
+ __try {
+ ret = BlNtMapViewOfSectionImpl(orig_MapViewOfSection, section, process,
+ base, zero_bits, commit_size, offset,
+ view_size, inherit, allocation_type,
+ protect);
+ } __except(GenerateCrashDump(GetExceptionInformation())) {
+ }
+
+ return ret;
+}
+
+#if defined(_WIN64)
+NTSTATUS WINAPI BlNtMapViewOfSection64(
+ HANDLE section, HANDLE process, PVOID *base, ULONG_PTR zero_bits,
+ SIZE_T commit_size, PLARGE_INTEGER offset, PSIZE_T view_size,
+ SECTION_INHERIT inherit, ULONG allocation_type, ULONG protect) {
+ return BlNtMapViewOfSection(g_nt_map_view_of_section_func, section, process,
+ base, zero_bits, commit_size, offset, view_size,
+ inherit, allocation_type, protect);
+}
+#endif
+} // namespace blacklist