This source file includes following definitions.
- EnumExportsCallback
- InitCache
#include "chrome_elf/ntdll_cache.h"
#include <stdint.h>
#include <windows.h>
#include "base/basictypes.h"
#include "base/memory/scoped_ptr.h"
#include "base/win/pe_image.h"
#include "chrome_elf/thunk_getter.h"
#include "sandbox/win/src/interception_internal.h"
#include "sandbox/win/src/internal_types.h"
#include "sandbox/win/src/service_resolver.h"
FunctionLookupTable g_ntdll_lookup;
#pragma section(".crthunk",read,execute)
__declspec(allocate(".crthunk")) sandbox::ThunkData g_nt_thunk_storage;
namespace {
bool EnumExportsCallback(const base::win::PEImage& image,
DWORD ordinal,
DWORD hint,
LPCSTR name,
PVOID function_addr,
LPCSTR forward,
PVOID cookie) {
if (name && function_addr)
g_ntdll_lookup[std::string(name)] = function_addr;
return true;
}
}
void InitCache() {
HMODULE ntdll_handle = ::GetModuleHandle(L"ntdll.dll");
base::win::PEImage ntdll_image(ntdll_handle);
ntdll_image.EnumExports(EnumExportsCallback, NULL);
const bool kRelaxed = false;
scoped_ptr<sandbox::ServiceResolverThunk> thunk(GetThunk(kRelaxed));
if (thunk.get()) {
BYTE* thunk_storage = reinterpret_cast<BYTE*>(&g_nt_thunk_storage);
DWORD old_protect = 0;
if (!::VirtualProtect(&g_nt_thunk_storage,
sizeof(g_nt_thunk_storage),
PAGE_EXECUTE_READWRITE,
&old_protect)) {
return;
}
size_t storage_used = 0;
NTSTATUS ret = thunk->CopyThunk(::GetModuleHandle(sandbox::kNtdllName),
"NtCreateFile",
thunk_storage,
sizeof(sandbox::ThunkData),
&storage_used);
if (!NT_SUCCESS(ret)) {
memset(&g_nt_thunk_storage, 0, sizeof(g_nt_thunk_storage));
}
::VirtualProtect(&g_nt_thunk_storage,
sizeof(g_nt_thunk_storage),
PAGE_EXECUTE_READ,
&old_protect);
}
}