| // Copyright 2015 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "base/debug/close_handle_hook_win.h" |
| |
| #include <Windows.h> |
| #include <psapi.h> |
| |
| #include <algorithm> |
| #include <memory> |
| #include <vector> |
| |
| #include "base/macros.h" |
| #include "base/win/iat_patch_function.h" |
| #include "base/win/pe_image.h" |
| #include "base/win/scoped_handle.h" |
| #include "build/build_config.h" |
| #include "starboard/types.h" |
| |
| namespace { |
| |
| typedef BOOL (WINAPI* CloseHandleType) (HANDLE handle); |
| |
| typedef BOOL (WINAPI* DuplicateHandleType)(HANDLE source_process, |
| HANDLE source_handle, |
| HANDLE target_process, |
| HANDLE* target_handle, |
| DWORD desired_access, |
| BOOL inherit_handle, |
| DWORD options); |
| |
| CloseHandleType g_close_function = NULL; |
| DuplicateHandleType g_duplicate_function = NULL; |
| |
| // The entry point for CloseHandle interception. This function notifies the |
| // verifier about the handle that is being closed, and calls the original |
| // function. |
| BOOL WINAPI CloseHandleHook(HANDLE handle) { |
| base::win::OnHandleBeingClosed(handle); |
| return g_close_function(handle); |
| } |
| |
| BOOL WINAPI DuplicateHandleHook(HANDLE source_process, |
| HANDLE source_handle, |
| HANDLE target_process, |
| HANDLE* target_handle, |
| DWORD desired_access, |
| BOOL inherit_handle, |
| DWORD options) { |
| if ((options & DUPLICATE_CLOSE_SOURCE) && |
| (GetProcessId(source_process) == ::GetCurrentProcessId())) { |
| base::win::OnHandleBeingClosed(source_handle); |
| } |
| |
| return g_duplicate_function(source_process, source_handle, target_process, |
| target_handle, desired_access, inherit_handle, |
| options); |
| } |
| |
| } // namespace |
| |
| namespace base { |
| namespace debug { |
| |
| namespace { |
| |
| // Provides a simple way to temporarily change the protection of a memory page. |
| class AutoProtectMemory { |
| public: |
| AutoProtectMemory() |
| : changed_(false), address_(NULL), bytes_(0), old_protect_(0) {} |
| |
| ~AutoProtectMemory() { |
| RevertProtection(); |
| } |
| |
| // Grants write access to a given memory range. |
| bool ChangeProtection(void* address, size_t bytes); |
| |
| // Restores the original page protection. |
| void RevertProtection(); |
| |
| private: |
| bool changed_; |
| void* address_; |
| size_t bytes_; |
| DWORD old_protect_; |
| |
| DISALLOW_COPY_AND_ASSIGN(AutoProtectMemory); |
| }; |
| |
| bool AutoProtectMemory::ChangeProtection(void* address, size_t bytes) { |
| DCHECK(!changed_); |
| DCHECK(address); |
| |
| // Change the page protection so that we can write. |
| MEMORY_BASIC_INFORMATION memory_info; |
| if (!VirtualQuery(address, &memory_info, sizeof(memory_info))) |
| return false; |
| |
| DWORD is_executable = (PAGE_EXECUTE | PAGE_EXECUTE_READ | |
| PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_WRITECOPY) & |
| memory_info.Protect; |
| |
| DWORD protect = is_executable ? PAGE_EXECUTE_READWRITE : PAGE_READWRITE; |
| if (!VirtualProtect(address, bytes, protect, &old_protect_)) |
| return false; |
| |
| changed_ = true; |
| address_ = address; |
| bytes_ = bytes; |
| return true; |
| } |
| |
| void AutoProtectMemory::RevertProtection() { |
| if (!changed_) |
| return; |
| |
| DCHECK(address_); |
| DCHECK(bytes_); |
| |
| VirtualProtect(address_, bytes_, old_protect_, &old_protect_); |
| changed_ = false; |
| address_ = NULL; |
| bytes_ = 0; |
| old_protect_ = 0; |
| } |
| |
| // Performs an EAT interception. |
| void EATPatch(HMODULE module, const char* function_name, |
| void* new_function, void** old_function) { |
| if (!module) |
| return; |
| |
| base::win::PEImage pe(module); |
| if (!pe.VerifyMagic()) |
| return; |
| |
| DWORD* eat_entry = pe.GetExportEntry(function_name); |
| if (!eat_entry) |
| return; |
| |
| if (!(*old_function)) |
| *old_function = pe.RVAToAddr(*eat_entry); |
| |
| AutoProtectMemory memory; |
| if (!memory.ChangeProtection(eat_entry, sizeof(DWORD))) |
| return; |
| |
| // Perform the patch. |
| #pragma warning(push) |
| #pragma warning(disable : 4311 4302) |
| // These casts generate truncation warnings because they are 32 bit specific. |
| *eat_entry = reinterpret_cast<DWORD>(new_function) - |
| reinterpret_cast<DWORD>(module); |
| #pragma warning(pop) |
| } |
| |
| // Performs an IAT interception. |
| base::win::IATPatchFunction* IATPatch(HMODULE module, const char* function_name, |
| void* new_function, void** old_function) { |
| if (!module) |
| return NULL; |
| |
| base::win::IATPatchFunction* patch = new base::win::IATPatchFunction; |
| __try { |
| // There is no guarantee that |module| is still loaded at this point. |
| if (patch->PatchFromModule(module, "kernel32.dll", function_name, |
| new_function)) { |
| delete patch; |
| return NULL; |
| } |
| } __except((GetExceptionCode() == EXCEPTION_ACCESS_VIOLATION || |
| GetExceptionCode() == EXCEPTION_GUARD_PAGE || |
| GetExceptionCode() == EXCEPTION_IN_PAGE_ERROR) ? |
| EXCEPTION_EXECUTE_HANDLER : EXCEPTION_CONTINUE_SEARCH) { |
| // Leak the patch. |
| return NULL; |
| } |
| |
| if (!(*old_function)) { |
| // Things are probably messed up if each intercepted function points to |
| // a different place, but we need only one function to call. |
| *old_function = patch->original_function(); |
| } |
| return patch; |
| } |
| |
| // Keeps track of all the hooks needed to intercept functions which could |
| // possibly close handles. |
| class HandleHooks { |
| public: |
| HandleHooks() {} |
| ~HandleHooks() {} |
| |
| void AddIATPatch(HMODULE module); |
| void AddEATPatch(); |
| |
| private: |
| std::vector<base::win::IATPatchFunction*> hooks_; |
| DISALLOW_COPY_AND_ASSIGN(HandleHooks); |
| }; |
| |
| void HandleHooks::AddIATPatch(HMODULE module) { |
| if (!module) |
| return; |
| |
| base::win::IATPatchFunction* patch = NULL; |
| patch = |
| IATPatch(module, "CloseHandle", reinterpret_cast<void*>(&CloseHandleHook), |
| reinterpret_cast<void**>(&g_close_function)); |
| if (!patch) |
| return; |
| hooks_.push_back(patch); |
| |
| patch = IATPatch(module, "DuplicateHandle", |
| reinterpret_cast<void*>(&DuplicateHandleHook), |
| reinterpret_cast<void**>(&g_duplicate_function)); |
| if (!patch) |
| return; |
| hooks_.push_back(patch); |
| } |
| |
| void HandleHooks::AddEATPatch() { |
| // An attempt to restore the entry on the table at destruction is not safe. |
| EATPatch(GetModuleHandleA("kernel32.dll"), "CloseHandle", |
| reinterpret_cast<void*>(&CloseHandleHook), |
| reinterpret_cast<void**>(&g_close_function)); |
| EATPatch(GetModuleHandleA("kernel32.dll"), "DuplicateHandle", |
| reinterpret_cast<void*>(&DuplicateHandleHook), |
| reinterpret_cast<void**>(&g_duplicate_function)); |
| } |
| |
| void PatchLoadedModules(HandleHooks* hooks) { |
| const DWORD kSize = 256; |
| DWORD returned; |
| std::unique_ptr<HMODULE[]> modules(new HMODULE[kSize]); |
| if (!EnumProcessModules(GetCurrentProcess(), modules.get(), |
| kSize * sizeof(HMODULE), &returned)) { |
| return; |
| } |
| returned /= sizeof(HMODULE); |
| returned = std::min(kSize, returned); |
| |
| for (DWORD current = 0; current < returned; current++) { |
| hooks->AddIATPatch(modules[current]); |
| } |
| } |
| |
| } // namespace |
| |
| void InstallHandleHooks() { |
| static HandleHooks* hooks = new HandleHooks(); |
| |
| // Performing EAT interception first is safer in the presence of other |
| // threads attempting to call CloseHandle. |
| hooks->AddEATPatch(); |
| PatchLoadedModules(hooks); |
| } |
| |
| } // namespace debug |
| } // namespace base |