|  | // Copyright 2015 The Chromium Authors. All rights reserved. | 
|  | // Use of this source code is governed by a BSD-style license that can be | 
|  | // found in the LICENSE file. | 
|  |  | 
|  | #include "base/debug/close_handle_hook_win.h" | 
|  |  | 
|  | #include <Windows.h> | 
|  | #include <psapi.h> | 
|  |  | 
|  | #include <algorithm> | 
|  | #include <memory> | 
|  | #include <vector> | 
|  |  | 
|  | #include "base/macros.h" | 
|  | #include "base/win/iat_patch_function.h" | 
|  | #include "base/win/pe_image.h" | 
|  | #include "base/win/scoped_handle.h" | 
|  | #include "build/build_config.h" | 
|  | #include "starboard/types.h" | 
|  |  | 
|  | namespace { | 
|  |  | 
|  | typedef BOOL (WINAPI* CloseHandleType) (HANDLE handle); | 
|  |  | 
|  | typedef BOOL (WINAPI* DuplicateHandleType)(HANDLE source_process, | 
|  | HANDLE source_handle, | 
|  | HANDLE target_process, | 
|  | HANDLE* target_handle, | 
|  | DWORD desired_access, | 
|  | BOOL inherit_handle, | 
|  | DWORD options); | 
|  |  | 
|  | CloseHandleType g_close_function = NULL; | 
|  | DuplicateHandleType g_duplicate_function = NULL; | 
|  |  | 
|  | // The entry point for CloseHandle interception. This function notifies the | 
|  | // verifier about the handle that is being closed, and calls the original | 
|  | // function. | 
|  | BOOL WINAPI CloseHandleHook(HANDLE handle) { | 
|  | base::win::OnHandleBeingClosed(handle); | 
|  | return g_close_function(handle); | 
|  | } | 
|  |  | 
|  | BOOL WINAPI DuplicateHandleHook(HANDLE source_process, | 
|  | HANDLE source_handle, | 
|  | HANDLE target_process, | 
|  | HANDLE* target_handle, | 
|  | DWORD desired_access, | 
|  | BOOL inherit_handle, | 
|  | DWORD options) { | 
|  | if ((options & DUPLICATE_CLOSE_SOURCE) && | 
|  | (GetProcessId(source_process) == ::GetCurrentProcessId())) { | 
|  | base::win::OnHandleBeingClosed(source_handle); | 
|  | } | 
|  |  | 
|  | return g_duplicate_function(source_process, source_handle, target_process, | 
|  | target_handle, desired_access, inherit_handle, | 
|  | options); | 
|  | } | 
|  |  | 
|  | }  // namespace | 
|  |  | 
|  | namespace base { | 
|  | namespace debug { | 
|  |  | 
|  | namespace { | 
|  |  | 
|  | // Provides a simple way to temporarily change the protection of a memory page. | 
|  | class AutoProtectMemory { | 
|  | public: | 
|  | AutoProtectMemory() | 
|  | : changed_(false), address_(NULL), bytes_(0), old_protect_(0) {} | 
|  |  | 
|  | ~AutoProtectMemory() { | 
|  | RevertProtection(); | 
|  | } | 
|  |  | 
|  | // Grants write access to a given memory range. | 
|  | bool ChangeProtection(void* address, size_t bytes); | 
|  |  | 
|  | // Restores the original page protection. | 
|  | void RevertProtection(); | 
|  |  | 
|  | private: | 
|  | bool changed_; | 
|  | void* address_; | 
|  | size_t bytes_; | 
|  | DWORD old_protect_; | 
|  |  | 
|  | DISALLOW_COPY_AND_ASSIGN(AutoProtectMemory); | 
|  | }; | 
|  |  | 
|  | bool AutoProtectMemory::ChangeProtection(void* address, size_t bytes) { | 
|  | DCHECK(!changed_); | 
|  | DCHECK(address); | 
|  |  | 
|  | // Change the page protection so that we can write. | 
|  | MEMORY_BASIC_INFORMATION memory_info; | 
|  | if (!VirtualQuery(address, &memory_info, sizeof(memory_info))) | 
|  | return false; | 
|  |  | 
|  | DWORD is_executable = (PAGE_EXECUTE | PAGE_EXECUTE_READ | | 
|  | PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_WRITECOPY) & | 
|  | memory_info.Protect; | 
|  |  | 
|  | DWORD protect = is_executable ? PAGE_EXECUTE_READWRITE : PAGE_READWRITE; | 
|  | if (!VirtualProtect(address, bytes, protect, &old_protect_)) | 
|  | return false; | 
|  |  | 
|  | changed_ = true; | 
|  | address_ = address; | 
|  | bytes_ = bytes; | 
|  | return true; | 
|  | } | 
|  |  | 
|  | void AutoProtectMemory::RevertProtection() { | 
|  | if (!changed_) | 
|  | return; | 
|  |  | 
|  | DCHECK(address_); | 
|  | DCHECK(bytes_); | 
|  |  | 
|  | VirtualProtect(address_, bytes_, old_protect_, &old_protect_); | 
|  | changed_ = false; | 
|  | address_ = NULL; | 
|  | bytes_ = 0; | 
|  | old_protect_ = 0; | 
|  | } | 
|  |  | 
|  | // Performs an EAT interception. | 
|  | void EATPatch(HMODULE module, const char* function_name, | 
|  | void* new_function, void** old_function) { | 
|  | if (!module) | 
|  | return; | 
|  |  | 
|  | base::win::PEImage pe(module); | 
|  | if (!pe.VerifyMagic()) | 
|  | return; | 
|  |  | 
|  | DWORD* eat_entry = pe.GetExportEntry(function_name); | 
|  | if (!eat_entry) | 
|  | return; | 
|  |  | 
|  | if (!(*old_function)) | 
|  | *old_function = pe.RVAToAddr(*eat_entry); | 
|  |  | 
|  | AutoProtectMemory memory; | 
|  | if (!memory.ChangeProtection(eat_entry, sizeof(DWORD))) | 
|  | return; | 
|  |  | 
|  | // Perform the patch. | 
|  | #pragma warning(push) | 
|  | #pragma warning(disable : 4311 4302) | 
|  | // These casts generate truncation warnings because they are 32 bit specific. | 
|  | *eat_entry = reinterpret_cast<DWORD>(new_function) - | 
|  | reinterpret_cast<DWORD>(module); | 
|  | #pragma warning(pop) | 
|  | } | 
|  |  | 
|  | // Performs an IAT interception. | 
|  | base::win::IATPatchFunction* IATPatch(HMODULE module, const char* function_name, | 
|  | void* new_function, void** old_function) { | 
|  | if (!module) | 
|  | return NULL; | 
|  |  | 
|  | base::win::IATPatchFunction* patch = new base::win::IATPatchFunction; | 
|  | __try { | 
|  | // There is no guarantee that |module| is still loaded at this point. | 
|  | if (patch->PatchFromModule(module, "kernel32.dll", function_name, | 
|  | new_function)) { | 
|  | delete patch; | 
|  | return NULL; | 
|  | } | 
|  | } __except((GetExceptionCode() == EXCEPTION_ACCESS_VIOLATION || | 
|  | GetExceptionCode() == EXCEPTION_GUARD_PAGE || | 
|  | GetExceptionCode() == EXCEPTION_IN_PAGE_ERROR) ? | 
|  | EXCEPTION_EXECUTE_HANDLER : EXCEPTION_CONTINUE_SEARCH) { | 
|  | // Leak the patch. | 
|  | return NULL; | 
|  | } | 
|  |  | 
|  | if (!(*old_function)) { | 
|  | // Things are probably messed up if each intercepted function points to | 
|  | // a different place, but we need only one function to call. | 
|  | *old_function = patch->original_function(); | 
|  | } | 
|  | return patch; | 
|  | } | 
|  |  | 
|  | // Keeps track of all the hooks needed to intercept functions which could | 
|  | // possibly close handles. | 
|  | class HandleHooks { | 
|  | public: | 
|  | HandleHooks() {} | 
|  | ~HandleHooks() {} | 
|  |  | 
|  | void AddIATPatch(HMODULE module); | 
|  | void AddEATPatch(); | 
|  |  | 
|  | private: | 
|  | std::vector<base::win::IATPatchFunction*> hooks_; | 
|  | DISALLOW_COPY_AND_ASSIGN(HandleHooks); | 
|  | }; | 
|  |  | 
|  | void HandleHooks::AddIATPatch(HMODULE module) { | 
|  | if (!module) | 
|  | return; | 
|  |  | 
|  | base::win::IATPatchFunction* patch = NULL; | 
|  | patch = | 
|  | IATPatch(module, "CloseHandle", reinterpret_cast<void*>(&CloseHandleHook), | 
|  | reinterpret_cast<void**>(&g_close_function)); | 
|  | if (!patch) | 
|  | return; | 
|  | hooks_.push_back(patch); | 
|  |  | 
|  | patch = IATPatch(module, "DuplicateHandle", | 
|  | reinterpret_cast<void*>(&DuplicateHandleHook), | 
|  | reinterpret_cast<void**>(&g_duplicate_function)); | 
|  | if (!patch) | 
|  | return; | 
|  | hooks_.push_back(patch); | 
|  | } | 
|  |  | 
|  | void HandleHooks::AddEATPatch() { | 
|  | // An attempt to restore the entry on the table at destruction is not safe. | 
|  | EATPatch(GetModuleHandleA("kernel32.dll"), "CloseHandle", | 
|  | reinterpret_cast<void*>(&CloseHandleHook), | 
|  | reinterpret_cast<void**>(&g_close_function)); | 
|  | EATPatch(GetModuleHandleA("kernel32.dll"), "DuplicateHandle", | 
|  | reinterpret_cast<void*>(&DuplicateHandleHook), | 
|  | reinterpret_cast<void**>(&g_duplicate_function)); | 
|  | } | 
|  |  | 
|  | void PatchLoadedModules(HandleHooks* hooks) { | 
|  | const DWORD kSize = 256; | 
|  | DWORD returned; | 
|  | std::unique_ptr<HMODULE[]> modules(new HMODULE[kSize]); | 
|  | if (!EnumProcessModules(GetCurrentProcess(), modules.get(), | 
|  | kSize * sizeof(HMODULE), &returned)) { | 
|  | return; | 
|  | } | 
|  | returned /= sizeof(HMODULE); | 
|  | returned = std::min(kSize, returned); | 
|  |  | 
|  | for (DWORD current = 0; current < returned; current++) { | 
|  | hooks->AddIATPatch(modules[current]); | 
|  | } | 
|  | } | 
|  |  | 
|  | }  // namespace | 
|  |  | 
|  | void InstallHandleHooks() { | 
|  | static HandleHooks* hooks = new HandleHooks(); | 
|  |  | 
|  | // Performing EAT interception first is safer in the presence of other | 
|  | // threads attempting to call CloseHandle. | 
|  | hooks->AddEATPatch(); | 
|  | PatchLoadedModules(hooks); | 
|  | } | 
|  |  | 
|  | }  // namespace debug | 
|  | }  // namespace base |