security/sandbox/win/src/service_resolver_64.cc

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
     2 // Use of this source code is governed by a BSD-style license that can be
     3 // found in the LICENSE file.
     5 #include "sandbox/win/src/service_resolver.h"
     7 #include "base/logging.h"
     8 #include "base/memory/scoped_ptr.h"
     9 #include "sandbox/win/src/win_utils.h"
    11 namespace {
    12 #pragma pack(push, 1)
    14 const ULONG kMmovR10EcxMovEax = 0xB8D18B4C;
    15 const USHORT kSyscall = 0x050F;
    16 const BYTE kRetNp = 0xC3;
    17 const ULONG64 kMov1 = 0x54894808244C8948;
    18 const ULONG64 kMov2 = 0x4C182444894C1024;
    19 const ULONG kMov3 = 0x20244C89;
    21 // Service code for 64 bit systems.
    22 struct ServiceEntry {
    23   // This struct contains roughly the following code:
    24   // 00 mov     r10,rcx
    25   // 03 mov     eax,52h
    26   // 08 syscall
    27   // 0a ret
    28   // 0b xchg    ax,ax
    29   // 0e xchg    ax,ax
    31   ULONG mov_r10_rcx_mov_eax;  // = 4C 8B D1 B8
    32   ULONG service_id;
    33   USHORT syscall;             // = 0F 05
    34   BYTE ret;                   // = C3
    35   BYTE pad;                   // = 66
    36   USHORT xchg_ax_ax1;         // = 66 90
    37   USHORT xchg_ax_ax2;         // = 66 90
    38 };
    40 // Service code for 64 bit Windows 8.
    41 struct ServiceEntryW8 {
    42   // This struct contains the following code:
    43   // 00 48894c2408      mov     [rsp+8], rcx
    44   // 05 4889542410      mov     [rsp+10], rdx
    45   // 0a 4c89442418      mov     [rsp+18], r8
    46   // 0f 4c894c2420      mov     [rsp+20], r9
    47   // 14 4c8bd1          mov     r10,rcx
    48   // 17 b825000000      mov     eax,25h
    49   // 1c 0f05            syscall
    50   // 1e c3              ret
    51   // 1f 90              nop
    53   ULONG64 mov_1;              // = 48 89 4C 24 08 48 89 54
    54   ULONG64 mov_2;              // = 24 10 4C 89 44 24 18 4C
    55   ULONG mov_3;                // = 89 4C 24 20
    56   ULONG mov_r10_rcx_mov_eax;  // = 4C 8B D1 B8
    57   ULONG service_id;
    58   USHORT syscall;             // = 0F 05
    59   BYTE ret;                   // = C2
    60   BYTE nop;                   // = 90
    61 };
    63 // We don't have an internal thunk for x64.
    64 struct ServiceFullThunk {
    65   union {
    66     ServiceEntry original;
    67     ServiceEntryW8 original_w8;
    68   };
    69 };
    71 #pragma pack(pop)
    73 bool IsService(const void* source) {
    74   const ServiceEntry* service =
    75       reinterpret_cast<const ServiceEntry*>(source);
    77   return (kMmovR10EcxMovEax == service->mov_r10_rcx_mov_eax &&
    78           kSyscall == service->syscall && kRetNp == service->ret);
    79 }
    81 };  // namespace
    83 namespace sandbox {
    85 NTSTATUS ServiceResolverThunk::Setup(const void* target_module,
    86                                      const void* interceptor_module,
    87                                      const char* target_name,
    88                                      const char* interceptor_name,
    89                                      const void* interceptor_entry_point,
    90                                      void* thunk_storage,
    91                                      size_t storage_bytes,
    92                                      size_t* storage_used) {
    93   NTSTATUS ret = Init(target_module, interceptor_module, target_name,
    94                       interceptor_name, interceptor_entry_point,
    95                       thunk_storage, storage_bytes);
    96   if (!NT_SUCCESS(ret))
    97     return ret;
    99   size_t thunk_bytes = GetThunkSize();
   100   scoped_ptr<char[]> thunk_buffer(new char[thunk_bytes]);
   101   ServiceFullThunk* thunk = reinterpret_cast<ServiceFullThunk*>(
   102                                 thunk_buffer.get());
   104   if (!IsFunctionAService(&thunk->original))
   105     return STATUS_UNSUCCESSFUL;
   107   ret = PerformPatch(thunk, thunk_storage);
   109   if (NULL != storage_used)
   110     *storage_used = thunk_bytes;
   112   return ret;
   113 }
   115 size_t ServiceResolverThunk::GetThunkSize() const {
   116   return sizeof(ServiceFullThunk);
   117 }
   119 bool ServiceResolverThunk::IsFunctionAService(void* local_thunk) const {
   120   ServiceFullThunk function_code;
   121   SIZE_T read;
   122   if (!::ReadProcessMemory(process_, target_, &function_code,
   123                            sizeof(function_code), &read))
   124     return false;
   126   if (sizeof(function_code) != read)
   127     return false;
   129   if (!IsService(&function_code)) {
   130     // See if it's the Win8 signature.
   131     ServiceEntryW8* w8_service = &function_code.original_w8;
   132     if (!IsService(&w8_service->mov_r10_rcx_mov_eax) ||
   133         w8_service->mov_1 != kMov1 || w8_service->mov_1 != kMov1 ||
   134         w8_service->mov_1 != kMov1) {
   135       return false;
   136     }
   137   }
   139   // Save the verified code.
   140   memcpy(local_thunk, &function_code, sizeof(function_code));
   142   return true;
   143 }
   145 NTSTATUS ServiceResolverThunk::PerformPatch(void* local_thunk,
   146                                             void* remote_thunk) {
   147   ServiceFullThunk* full_local_thunk = reinterpret_cast<ServiceFullThunk*>(
   148                                            local_thunk);
   149   ServiceFullThunk* full_remote_thunk = reinterpret_cast<ServiceFullThunk*>(
   150                                             remote_thunk);
   152   // Patch the original code.
   153   ServiceEntry local_service;
   154   DCHECK_GE(GetInternalThunkSize(), sizeof(local_service));
   155   if (!SetInternalThunk(&local_service, sizeof(local_service), NULL,
   156                         interceptor_))
   157     return STATUS_UNSUCCESSFUL;
   159   // Copy the local thunk buffer to the child.
   160   SIZE_T actual;
   161   if (!::WriteProcessMemory(process_, remote_thunk, local_thunk,
   162                             sizeof(ServiceFullThunk), &actual))
   163     return STATUS_UNSUCCESSFUL;
   165   if (sizeof(ServiceFullThunk) != actual)
   166     return STATUS_UNSUCCESSFUL;
   168   // And now change the function to intercept, on the child.
   169   if (NULL != ntdll_base_) {
   170     // Running a unit test.
   171     if (!::WriteProcessMemory(process_, target_, &local_service,
   172                               sizeof(local_service), &actual))
   173       return STATUS_UNSUCCESSFUL;
   174   } else {
   175     if (!WriteProtectedChildMemory(process_, target_, &local_service,
   176                                    sizeof(local_service)))
   177       return STATUS_UNSUCCESSFUL;
   178   }
   180   return STATUS_SUCCESS;
   181 }
   183 bool Wow64ResolverThunk::IsFunctionAService(void* local_thunk) const {
   184   NOTREACHED();
   185   return false;
   186 }
   188 bool Win2kResolverThunk::IsFunctionAService(void* local_thunk) const {
   189   NOTREACHED();
   190   return false;
   191 }
   193 }  // namespace sandbox

mercurial