xref: /AOO41X/main/sal/systools/win32/uwinapi/GetProcessId.cpp (revision fc0bc00825ec02ef04af0b032f1c57b312b79937)
1 /**************************************************************
2  *
3  * Licensed to the Apache Software Foundation (ASF) under one
4  * or more contributor license agreements.  See the NOTICE file
5  * distributed with this work for additional information
6  * regarding copyright ownership.  The ASF licenses this file
7  * to you under the Apache License, Version 2.0 (the
8  * "License"); you may not use this file except in compliance
9  * with the License.  You may obtain a copy of the License at
10  *
11  *   http://www.apache.org/licenses/LICENSE-2.0
12  *
13  * Unless required by applicable law or agreed to in writing,
14  * software distributed under the License is distributed on an
15  * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
16  * KIND, either express or implied.  See the License for the
17  * specific language governing permissions and limitations
18  * under the License.
19  *
20  *************************************************************/
21 
22 
23 
24 #include "macros.h"
25 #include "win95sys.h"
26 #include <tlhelp32.h>
GetRealProcAddress(HMODULE hModule,LPCSTR lpProcName)27 static FARPROC WINAPI GetRealProcAddress( HMODULE hModule, LPCSTR lpProcName )
28 {
29     FARPROC lpfn = GetProcAddress( hModule, lpProcName );
30 
31     if ( lpfn )
32     {
33         if ( 0x68 == *(LPBYTE)lpfn )
34         {
35             /*
36             82C9F460 68 36 49 F8 BF       push        0BFF84936h
37             82C9F465 E9 41 62 2F 3D       jmp         BFF956AB
38             */
39 
40             lpfn = (FARPROC)*(LPDWORD)((LPBYTE)lpfn + 1);
41 
42             /*
43             BFF956AB 9C                   pushfd
44             BFF956AC FC                   cld
45             BFF956AD 50                   push        eax
46             BFF956AE 53                   push        ebx
47             BFF956AF 52                   push        edx
48             BFF956B0 64 8B 15 20 00 00 00 mov         edx,dword ptr fs:[20h]
49             BFF956B7 0B D2                or          edx,edx
50             BFF956B9 74 09                je          BFF956C4
51             BFF956BB 8B 42 04             mov         eax,dword ptr [edx+4]
52             BFF956BE 0B C0                or          eax,eax
53             BFF956C0 74 07                je          BFF956C9
54             BFF956C2 EB 42                jmp         BFF95706
55             BFF956C4 5A                   pop         edx
56             BFF956C5 5B                   pop         ebx
57             BFF956C6 58                   pop         eax
58             BFF956C7 9D                   popfd
59             BFF956C8 C3                   ret
60             */
61         }
62     }
63 
64     return lpfn;
65 }
66 
67 
68 typedef DWORD (WINAPI OBFUSCATE)( DWORD dwPTID );
69 typedef OBFUSCATE *LPOBFUSCATE;
70 
Obfuscate(DWORD dwPTID)71 static DWORD WINAPI Obfuscate( DWORD dwPTID )
72 {
73     static LPOBFUSCATE lpfnObfuscate = NULL;
74 
75     if ( !lpfnObfuscate )
76     {
77         LPBYTE lpCode = (LPBYTE)GetRealProcAddress( GetModuleHandleA("KERNEL32"), "GetCurrentThreadId" );
78 
79         if ( lpCode )
80         {
81             /*
82             GetCurrentThreadId:
83             lpCode + 00 BFF84936 A1 DC 9C FC BF       mov         eax,[BFFC9CDC]    ; This is the real thread id
84             lpcode + 05 BFF8493B FF 30                push        dword ptr [eax]
85             lpCode + 07 BFF8493D E8 17 C5 FF FF       call        BFF80E59          ; call Obfuscate function
86             lpcode + 0C BFF84942 C3                   ret
87             */
88 
89             DWORD   dwOffset = *(LPDWORD)(lpCode + 0x08);
90 
91             lpfnObfuscate = (LPOBFUSCATE)(lpCode + 0x0C + dwOffset);
92             /*
93             Obfuscate:
94             BFF80E59 A1 CC 98 FC BF       mov         eax,[BFFC98CC]
95             BFF80E5E 85 C0                test        eax,eax
96             BFF80E60 75 04                jne         BFF80E66
97             BFF80E62 33 C0                xor         eax,eax
98             BFF80E64 EB 04                jmp         BFF80E6A
99             BFF80E66 33 44 24 04          xor         eax,dword ptr [esp+4]
100             BFF80E6A C2 04 00             ret         4
101             */
102         }
103 
104     }
105 
106     return lpfnObfuscate ? lpfnObfuscate( dwPTID ) : 0;
107 }
108 
109 
GetProcessId_WINDOWS(HANDLE hProcess)110 EXTERN_C DWORD WINAPI GetProcessId_WINDOWS( HANDLE hProcess )
111 {
112     if ( GetCurrentProcess() == hProcess )
113         return GetCurrentProcessId();
114 
115     DWORD   dwProcessId = 0;
116     PPROCESS_DATABASE   pPDB = (PPROCESS_DATABASE)Obfuscate( GetCurrentProcessId() );
117 
118     if ( pPDB && K32OBJ_PROCESS == pPDB->Type )
119     {
120         DWORD   dwHandleNumber = (DWORD)hProcess >> 2;
121 
122         if ( 0 == ((DWORD)hProcess & 0x03) && dwHandleNumber < pPDB->pHandleTable->cEntries )
123         {
124             if (
125                 pPDB->pHandleTable->array[dwHandleNumber].pObject &&
126                 K32OBJ_PROCESS == pPDB->pHandleTable->array[dwHandleNumber].pObject->Type
127                 )
128             dwProcessId = Obfuscate( (DWORD)pPDB->pHandleTable->array[dwHandleNumber].pObject );
129         }
130 
131         SetLastError( ERROR_INVALID_HANDLE );
132     }
133 
134     return dwProcessId;
135 }
136 
137 
GetProcessId_NT(HANDLE hProcess)138 EXTERN_C DWORD WINAPI GetProcessId_NT( HANDLE hProcess )
139 {
140     SetLastError( ERROR_CALL_NOT_IMPLEMENTED );
141     return 0;
142 }
143 
144 
ResolveThunk_GetProcessId(FARPROC * lppfn,LPCSTR lpLibFileName,LPCSTR lpFuncName)145 EXTERN_C void WINAPI ResolveThunk_GetProcessId( FARPROC *lppfn, LPCSTR lpLibFileName, LPCSTR lpFuncName )
146 {
147     if ( (LONG)GetVersion() < 0 )
148         *lppfn = (FARPROC)GetProcessId_WINDOWS;
149     else
150     {
151         FARPROC lpfnResult = GetProcAddress( LoadLibraryA( lpLibFileName ), lpFuncName );
152         if ( !lpfnResult )
153             lpfnResult = (FARPROC)GetProcessId_NT;
154 
155         *lppfn = lpfnResult;
156     }
157 }
158 
159 
160 DEFINE_CUSTOM_THUNK( kernel32, GetProcessId, DWORD, WINAPI, GetProcessId, ( HANDLE hProcess ) );
161