mirror of
https://github.com/klzgrad/naiveproxy.git
synced 2024-11-24 14:26:09 +03:00
261 lines
7.5 KiB
C++
261 lines
7.5 KiB
C++
// Copyright 2015 The Chromium Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "base/debug/close_handle_hook_win.h"
|
|
|
|
#include <Windows.h>
|
|
#include <psapi.h>
|
|
#include <stddef.h>
|
|
|
|
#include <algorithm>
|
|
#include <memory>
|
|
#include <vector>
|
|
|
|
#include "base/macros.h"
|
|
#include "base/win/iat_patch_function.h"
|
|
#include "base/win/pe_image.h"
|
|
#include "base/win/scoped_handle.h"
|
|
#include "build/build_config.h"
|
|
|
|
namespace {
|
|
|
|
typedef BOOL (WINAPI* CloseHandleType) (HANDLE handle);
|
|
|
|
typedef BOOL (WINAPI* DuplicateHandleType)(HANDLE source_process,
|
|
HANDLE source_handle,
|
|
HANDLE target_process,
|
|
HANDLE* target_handle,
|
|
DWORD desired_access,
|
|
BOOL inherit_handle,
|
|
DWORD options);
|
|
|
|
CloseHandleType g_close_function = NULL;
|
|
DuplicateHandleType g_duplicate_function = NULL;
|
|
|
|
// The entry point for CloseHandle interception. This function notifies the
|
|
// verifier about the handle that is being closed, and calls the original
|
|
// function.
|
|
BOOL WINAPI CloseHandleHook(HANDLE handle) {
|
|
base::win::OnHandleBeingClosed(handle);
|
|
return g_close_function(handle);
|
|
}
|
|
|
|
BOOL WINAPI DuplicateHandleHook(HANDLE source_process,
|
|
HANDLE source_handle,
|
|
HANDLE target_process,
|
|
HANDLE* target_handle,
|
|
DWORD desired_access,
|
|
BOOL inherit_handle,
|
|
DWORD options) {
|
|
if ((options & DUPLICATE_CLOSE_SOURCE) &&
|
|
(GetProcessId(source_process) == ::GetCurrentProcessId())) {
|
|
base::win::OnHandleBeingClosed(source_handle);
|
|
}
|
|
|
|
return g_duplicate_function(source_process, source_handle, target_process,
|
|
target_handle, desired_access, inherit_handle,
|
|
options);
|
|
}
|
|
|
|
} // namespace
|
|
|
|
namespace base {
|
|
namespace debug {
|
|
|
|
namespace {
|
|
|
|
// Provides a simple way to temporarily change the protection of a memory page.
|
|
class AutoProtectMemory {
|
|
public:
|
|
AutoProtectMemory()
|
|
: changed_(false), address_(NULL), bytes_(0), old_protect_(0) {}
|
|
|
|
~AutoProtectMemory() {
|
|
RevertProtection();
|
|
}
|
|
|
|
// Grants write access to a given memory range.
|
|
bool ChangeProtection(void* address, size_t bytes);
|
|
|
|
// Restores the original page protection.
|
|
void RevertProtection();
|
|
|
|
private:
|
|
bool changed_;
|
|
void* address_;
|
|
size_t bytes_;
|
|
DWORD old_protect_;
|
|
|
|
DISALLOW_COPY_AND_ASSIGN(AutoProtectMemory);
|
|
};
|
|
|
|
bool AutoProtectMemory::ChangeProtection(void* address, size_t bytes) {
|
|
DCHECK(!changed_);
|
|
DCHECK(address);
|
|
|
|
// Change the page protection so that we can write.
|
|
MEMORY_BASIC_INFORMATION memory_info;
|
|
if (!VirtualQuery(address, &memory_info, sizeof(memory_info)))
|
|
return false;
|
|
|
|
DWORD is_executable = (PAGE_EXECUTE | PAGE_EXECUTE_READ |
|
|
PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_WRITECOPY) &
|
|
memory_info.Protect;
|
|
|
|
DWORD protect = is_executable ? PAGE_EXECUTE_READWRITE : PAGE_READWRITE;
|
|
if (!VirtualProtect(address, bytes, protect, &old_protect_))
|
|
return false;
|
|
|
|
changed_ = true;
|
|
address_ = address;
|
|
bytes_ = bytes;
|
|
return true;
|
|
}
|
|
|
|
void AutoProtectMemory::RevertProtection() {
|
|
if (!changed_)
|
|
return;
|
|
|
|
DCHECK(address_);
|
|
DCHECK(bytes_);
|
|
|
|
VirtualProtect(address_, bytes_, old_protect_, &old_protect_);
|
|
changed_ = false;
|
|
address_ = NULL;
|
|
bytes_ = 0;
|
|
old_protect_ = 0;
|
|
}
|
|
|
|
// Performs an EAT interception.
|
|
void EATPatch(HMODULE module, const char* function_name,
|
|
void* new_function, void** old_function) {
|
|
if (!module)
|
|
return;
|
|
|
|
base::win::PEImage pe(module);
|
|
if (!pe.VerifyMagic())
|
|
return;
|
|
|
|
DWORD* eat_entry = pe.GetExportEntry(function_name);
|
|
if (!eat_entry)
|
|
return;
|
|
|
|
if (!(*old_function))
|
|
*old_function = pe.RVAToAddr(*eat_entry);
|
|
|
|
AutoProtectMemory memory;
|
|
if (!memory.ChangeProtection(eat_entry, sizeof(DWORD)))
|
|
return;
|
|
|
|
// Perform the patch.
|
|
#pragma warning(push)
|
|
#pragma warning(disable : 4311 4302)
|
|
// These casts generate truncation warnings because they are 32 bit specific.
|
|
*eat_entry = reinterpret_cast<DWORD>(new_function) -
|
|
reinterpret_cast<DWORD>(module);
|
|
#pragma warning(pop)
|
|
}
|
|
|
|
// Performs an IAT interception.
|
|
base::win::IATPatchFunction* IATPatch(HMODULE module, const char* function_name,
|
|
void* new_function, void** old_function) {
|
|
if (!module)
|
|
return NULL;
|
|
|
|
base::win::IATPatchFunction* patch = new base::win::IATPatchFunction;
|
|
__try {
|
|
// There is no guarantee that |module| is still loaded at this point.
|
|
if (patch->PatchFromModule(module, "kernel32.dll", function_name,
|
|
new_function)) {
|
|
delete patch;
|
|
return NULL;
|
|
}
|
|
} __except((GetExceptionCode() == EXCEPTION_ACCESS_VIOLATION ||
|
|
GetExceptionCode() == EXCEPTION_GUARD_PAGE ||
|
|
GetExceptionCode() == EXCEPTION_IN_PAGE_ERROR) ?
|
|
EXCEPTION_EXECUTE_HANDLER : EXCEPTION_CONTINUE_SEARCH) {
|
|
// Leak the patch.
|
|
return NULL;
|
|
}
|
|
|
|
if (!(*old_function)) {
|
|
// Things are probably messed up if each intercepted function points to
|
|
// a different place, but we need only one function to call.
|
|
*old_function = patch->original_function();
|
|
}
|
|
return patch;
|
|
}
|
|
|
|
// Keeps track of all the hooks needed to intercept functions which could
|
|
// possibly close handles.
|
|
class HandleHooks {
|
|
public:
|
|
HandleHooks() {}
|
|
~HandleHooks() {}
|
|
|
|
void AddIATPatch(HMODULE module);
|
|
void AddEATPatch();
|
|
|
|
private:
|
|
std::vector<base::win::IATPatchFunction*> hooks_;
|
|
DISALLOW_COPY_AND_ASSIGN(HandleHooks);
|
|
};
|
|
|
|
void HandleHooks::AddIATPatch(HMODULE module) {
|
|
if (!module)
|
|
return;
|
|
|
|
base::win::IATPatchFunction* patch = NULL;
|
|
patch = IATPatch(module, "CloseHandle", &CloseHandleHook,
|
|
reinterpret_cast<void**>(&g_close_function));
|
|
if (!patch)
|
|
return;
|
|
hooks_.push_back(patch);
|
|
|
|
patch = IATPatch(module, "DuplicateHandle", &DuplicateHandleHook,
|
|
reinterpret_cast<void**>(&g_duplicate_function));
|
|
if (!patch)
|
|
return;
|
|
hooks_.push_back(patch);
|
|
}
|
|
|
|
void HandleHooks::AddEATPatch() {
|
|
// An attempt to restore the entry on the table at destruction is not safe.
|
|
EATPatch(GetModuleHandleA("kernel32.dll"), "CloseHandle",
|
|
&CloseHandleHook, reinterpret_cast<void**>(&g_close_function));
|
|
EATPatch(GetModuleHandleA("kernel32.dll"), "DuplicateHandle",
|
|
&DuplicateHandleHook,
|
|
reinterpret_cast<void**>(&g_duplicate_function));
|
|
}
|
|
|
|
void PatchLoadedModules(HandleHooks* hooks) {
|
|
const DWORD kSize = 256;
|
|
DWORD returned;
|
|
std::unique_ptr<HMODULE[]> modules(new HMODULE[kSize]);
|
|
if (!EnumProcessModules(GetCurrentProcess(), modules.get(),
|
|
kSize * sizeof(HMODULE), &returned)) {
|
|
return;
|
|
}
|
|
returned /= sizeof(HMODULE);
|
|
returned = std::min(kSize, returned);
|
|
|
|
for (DWORD current = 0; current < returned; current++) {
|
|
hooks->AddIATPatch(modules[current]);
|
|
}
|
|
}
|
|
|
|
} // namespace
|
|
|
|
void InstallHandleHooks() {
|
|
static HandleHooks* hooks = new HandleHooks();
|
|
|
|
// Performing EAT interception first is safer in the presence of other
|
|
// threads attempting to call CloseHandle.
|
|
hooks->AddEATPatch();
|
|
PatchLoadedModules(hooks);
|
|
}
|
|
|
|
} // namespace debug
|
|
} // namespace base
|