Deploying the Visual C++ libraries with an NSIS installer

Beginning with Visual C++ 2005 and continuing into Visual C++ 2008 and the foreseeable future, Microsoft’s various runtime libraries (CRT, ATL, MFC, etc.) are no longer installed into the system32 directory on Windows XP and later, but are rather “side-by-side assemblies” that need to be installed into the side-by-side store, “WinSxS”, in order to be available to all applications.

I’ve discussed the SxS store and the API Microsoft has documented for managing it in a previous post. Nevertheless, at the request of the NSIS maintainer, kichik, I’ll provide some guidance on the issue of runtime deployment and concrete examples to authors of NSIS-based installations. Do keep in mind that I am not adept at authoring NSIS installers and questions beyond the realm of the matter at hand are best targeted at the NSIS forum.

Unlike in the Linux world, where the C runtime library is considered an operating system component and versions of it are never installed by applications (at worst, some proprietary application is linked against an antique version of libc and requires the system administrator to install a compatibility package provided by the distribution), the CRT situation on Windows is more complicated. In the days of yore, Windows NT provided the now long defunct CRTDLL.DLL. Later, the newer variant MSVCRT.DLL shipped with Visual C++, going into the 6.0 release. However, in addition to serving as the runtime of a specific Visual C++ version, MSVCRT.DLL doubles as the “OS CRT”, the version of the C++ runtime deployed with the OS as far back as NT 4.0 and going into Windows Vista. Components included with the operating system itself, such as Notepad and Calculator, are linked against this CRT dynamically. Do not let the identical moniker fool you, the CRTs included with the various NT releases diverge significantly, sporting, for example, a brand new exception handling runtime in Windows Vista, aligned with newer Visual C++ compilers.

The existence of several MSVCRT.DLL variants and the associated versioning issues are probably what led Microsoft to adopt a policy of strongly versioned CRTs beginning with the Visual C++ .NET (2002) release. MSVCR70.DLL was the runtime required by the output of that product, and later versions would require deploying MSVCR71.DLL, MSVCR80.DLL and most recently MSVCR90.DLL. In addition to the CRT itself, there are also the various peripheral libraries that some applications may depend on, such as ATL and MFC.

I’ve discussed in the past an approach utilizing the Windows Driver Kit build environment that allows combining a modern C++ compiler with targeting the Visual C++ 6.0 / OS CRT, MSVCRT.DLL. It is for the brave who don’t mind getting their hands dirty and whose desire to target the broadly deployed runtime exceeds the fear of the plethora of potential version compatibility issues such an application configuration can cause.

For the more conservative lot, the question remains, how do I get the new C++ runtimes to my end-user’s machine? The first approach is that of utilizing static linking. It should be avoided at nearly all cost as it results in both obese executables that are unable to share the runtime’s memory pages with other running processes and is completely unservicable by Microsoft when a security update or another bug fix to all users of the runtime libraries needs to be broadly deployed.

We therefore turn our attention to approaches based on dynamic linking. First of all, the reader should review the official guidance provided by the Visual C++ team on the matter, although he or she may not like what they read. To summarize, Microsoft officially supports the following deployment methods:

  • Use an MSI-based (Windows Installer) installation procedure and utilize their MSM merge modules to include whatever runtime components you require with your application. The MSMs are black box magic that will get those runtime libraries into the “winsxs” store without asking too many questions. If you don’t like those massively complicated MSI installers and the WiX XML schemas make your head spin, that’s too bad.
  • Use the obese VCRedist.exe for the target architecture, without the benefit of picking and choosing only those runtime components that are of interest for your specific application.
  • Deploy the runtime libraries as files in your application’s directory, or “private assemblies” in SxS nomenclature, wasting the end-user’s hard disk space with multiple copies. This is not as bad as it seems, since at least SxS redirection policies can make an updated, security patched version from the “winsxs” store be loaded in place of out of date version deployed privately with the application, unlike with classic non-SxS local DLLs or with static linking.

As the popularity of NSIS as an installation apparatus shows, not everyone are willing to be strong-armed into an MSI-based installation just yet. So how do CRT deploying installers address this acute issue? I was disappointed, but not surprised, to see that VLC, DivX and various other applications with NSIS-based installers, opt for the “private assembly” approach, simplifying life for the installation author but needlessly wasting end-user disk real estate.

The now documented SxS API provides an alternative approach, presumably supported by Microsoft for deploying SxS assemblies in general (such as your own) but not specifically by the Visual C++ folks for theirs. The motivation for this lack of support is unclear, since the end result is as servicable by them as is using Windows Installer merge modules. Nevertheless, it is something that those who follow this path should be aware of.

OK, so let’s get on with it. Unlike with system32, we can’t just waltz into winsxs and drop our assembly’s files there. The directory structure is complicated, differs between XP and Vista, and in fact the ACL on the directory in Vista won’t allow anyone but TrustedInstaller (i.e., MSI) to touch it. Therefore we are required to perform the installation through the SxS API, which provides a COM-based interface for manipulating the store.

For illustration purposes, I shall use the Visual C++ 2005 (8.0) Debug CRT. Note that this is not the CRT you want to deploy to your end users, and in any case is explicitly NOT redistributable by Microsoft’s license terms. I use it for illustrative convenience since my XP virtual machine doesn’t have this assembly. We’ll use an NSIS installer script to drive the wonderful though peculiar System plug-in and get it to invoke the SxS API. Note that elaborate error handling is omitted for brevity. So here we go:


Name "NSIS SxS Test"
OutFile "nsissxs.exe"
SetPluginUnload alwaysoff
ShowInstDetails show
XPStyle on
SetCompressor /SOLID lzma
InstallDir $PROGRAMFILES\NSISSxS


!define FUSION_REFCOUNT_UNINSTALL_SUBKEY_GUID {8cedc215-ac4b-488b-93c0-a50a49cb2fb8}

Section "Uninstall"
DeleteRegKey "HKLM" "Software\Microsoft\Windows\CurrentVersion\Uninstall\nsissxs"
Delete $INSTDIR\uninst.exe
Delete $INSTDIR\dummy.txt
RMDir $INSTDIR
DetailPrint "Removing DebugCRT assembly..."
System::Call "sxs::CreateAssemblyCache(*i .r0, i 0) i.r1"
StrCmp $1 0 0 fail
System::Call "*(i 32, i 0, i 2364391957, i 1217113163, i 178634899, i 3090139977, w 'nsissxs', w '') i.s"
Pop $2
System::Call "$0->3(i 0, w 'Microsoft.VC80.DebugCRT,version=$\"8.0.50727.762$\",type=$\"win32$\",processorArchitecture=$\"x86$\",publicKeyToken=$\"1fc8b3b9a1e18e3b$\"', i r2, *i . r3) i.r1"
StrCmp $1 0 0 fail2
DetailPrint "Disposition returned is $3"
System::Call "$0->2()"
Goto end
fail:
DetailPrint "CreateAssemblyCache failed."
DetailPrint $1
Goto end
fail2:
DetailPrint "UninstallAssembly failed."
DetailPrint $1
Goto end
end:
SectionEnd

Section
SetOutPath $INSTDIR
File "dummy.txt"
WriteUninstaller $INSTDIR\uninst.exe
WriteRegStr "HKLM" "Software\Microsoft\Windows\CurrentVersion\Uninstall\nsissxs" "DisplayName" "NSIS SxS Test"
WriteRegStr "HKLM" "Software\Microsoft\Windows\CurrentVersion\Uninstall\nsissxs" "UninstallString" "$INSTDIR\uninst.exe"
InitPluginsDir
SetOutPath $PLUGINSDIR
File "msvcm80d.dll"
File "msvcp80d.dll"
File "msvcr80d.dll"
File "x86_Microsoft.VC80.DebugCRT_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_5490cd9f.cat"
File "x86_Microsoft.VC80.DebugCRT_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_5490cd9f.manifest"

DetailPrint "Installing DebugCRT assembly..."
System::Call "sxs::CreateAssemblyCache(*i .r0, i 0) i.r1"
StrCmp $1 0 0 fail
# Fill a FUSION_INSTALL_REFERENCE.
# fir.cbSize = sizeof(FUSION_INSTALL_REFERENCE) == 32
# fir.dwFlags = 0
# fir.guidScheme = FUSION_REFCOUNT_UNINSTALL_SUBKEY_GUID
# fir.szIdentifier = "nsissxs"
# fir.szNonCanonicalData = 0
System::Call "*(i 32, i 0, i 2364391957, i 1217113163, i 178634899, i 3090139977, w 'nsissxs', w '') i.s"
Pop $2
# IAssemblyCache::InstallAssembly(0, manifestPath, fir)
System::Call "$0->7(i 0, w '$PLUGINSDIR\x86_Microsoft.VC80.DebugCRT_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_5490cd9f.manifest', i r2) i.r1"
System::Free $2
StrCmp $1 0 0 fail2
System::Call "$0->2()"
Goto end
fail:
DetailPrint "CreateAssemblyCache failed."
DetailPrint $1
Goto end
fail2:
DetailPrint "InstallAssembly failed."
DetailPrint $1
Goto end
end:
SectionEnd

If you are not familiar with NSIS script syntax, now would be a good time to get acquainted. Let us review the contents of the 2nd section, which is the install section. The dummy file is a placeholder for the actual files your installer wants to deploy. Next, we set up an Uninstall entry in the registry as one usually would. Now on to the interesting part.

In order to deploy a SxS assembly, we must place its DLLs together in a temporary directory created by the installer. Note that if an assembly contains several DLLs, we cannot pick and choose only those that our application links with. The assembly is deployed, versioned and bound as a whole. We can figure out which files are part of the assembly in question by reviewing the assembly manifest, which we’ll find installed into the Manifests subdirectory of the WinSxS store on a Windows XP system. If we review the Debug CRT’s manifest, we can see <file> nodes under the <assembly> node, each referencing one of the files that must be deployed with the assembly. You can find the actual assembly files under the subdirectory with the assembly’s strong name in the WinSxS store.

In addition to the DLL files themselves, the assembly manifest and the assembly signing catalog are an integral part of the assembly. The catalog ensures the integrity of the assembly and is a welcome feature over traditional DLL deployment.

With the DLLs, assembly manifest and catalog in place, we are ready to invoke the SxS API for assembly installation. First, we call CreateAssemblyCache to retrieve the IAssemblyCache interface for managing the SxS store. Note that in the context of an NSIS installer, COM has already been initialized (for STA use) at this point, but if you are making a custom installer in another environment you may have to take care of that before reaching this point.

Assuming all goes well the next phase is setting up the FUSION_INSTALL_REFERENCE structure that will describe our assembly installation. Typically, you’ll want the reference to be associated with the registry Uninstall key for your application. Besides, other reference types do not seem to work too well and the documentation doesn’t err on the side of verbosity.

The not-so-seasoned NSIS scripter that I am, I couldn’t figure out a more legible way to specify the GUID argument to the InstallAssembly invocation so I broke down its components by hand. Counting vtable indices including the IUnknown and IAssemblyCache interfaces, InstallAssembly is at vtable slot 7. After the install reference structure is set up and the method invoked, we hope for the best.

Assuming a successful install transaction, we proceed to call the IUnknown method Release (vtable slot 2) to free the SxS cache manager and deem our install sequence completed.

We now turn our attention to the reverse sequence in the Uninstall section of the illustration installer. Being good citizens of the Windows ecosystem, we remove our reference to the shared assembly when the end-user removes our application from their system. WinSxS manages assembly reference counting and will figure out whether the assembly files should actually be removed from the disk.

We create an IAssemblyCache interface instance as before but this time call UninstallAssembly to remove our reference. This is the first method of the interface but is preceded by the IUnknown members and is thus at vtable slot 3. Following a successful invocation we can examine the returned Disposition value if it is of interest and proceed to free the instance.

Note that we remove an assembly by its full, strong name and not by path. You can figure out the assembly’s strong name from its manifest.

OK, installing the VC8 Debug CRT was easy enough. Note that other libraries (ATL, etc.) you’ll want to install may have dependencies on other assemblies, so make sure you get your install sequence in order.

Installing the Visual C++ 2005 runtime is nice and all, but somehow it just feels wrong installing obsolete software. I turned my attention to the Visual C++ 2008 libraries, encountering disappointing results.

I gave it a few shots but installing the Visual C++ 2008 Debug CRT always fails, InstallAssembly promptly returning an HRESULT containing ERROR_SXS_PROTECTION_CATALOG_NOT_VALID. A malformed catalog? In one of Microsoft’s very own assemblies? Say it ain’t so!

If you have the hots for deploying the newer runtime, you’ll have to figure out that one on your own, folks. I made sure the catalog for the Visual C++ 9.0 Debug CRT I picked up from the WinSxS store matches the same catalog file found in the MSI merge module (MSM) at C:\Program Files\Common Files\Merge Modules\Microsoft_VC90_DebugCRT_x86.msm by extracting the MSM’s files with the useful MSIX extractor. The catalog files matched and regardless, the SHA-1 hashes for the assembly files matched the catalog rejected by InstallAssembly. Mysterious.

Reviewing the Windows event log following this error didn’t help too much. The System log was now decorated with SideBySide Event ID 20, stating: “The manifest C:\WINDOWS\WinSxS\InstallTemp\160585\Manifests\x86_Microsoft.VC90.DebugCRT_1fc8b3b9a1e18e3b_9.0.21022.8_x-ww_597c3456.Manifest does not match its source catalog or the catalog is missing.” … No newsflash there.

I figured I’ll stick to VC8 support and leave the VC9 troubleshooting for later. If push comes to shove, one can always figure out how to write WiX installers. :)

Instead I opted to review whether this NSIS-based installation approach is compatible with Windows Vista. I was worried that with the restrictive ACLs on the WinSxS store in that OS, without being an MSI and running from the context of the mighty TrustedInstaller.exe process, the installation will surely fail.

I was therefore positively surprised when the test installer worked on Vista. This surprised me since I knew the elevated installer executable ran as Administrator, but there was no denying I was not supposed to be able to copy files to WinSxS:

C:\Users\User\Desktop>cacls C:\Windows\WinSxS
C:\Windows\winsxs NT SERVICE\TrustedInstaller:(OI)(CI)F
BUILTIN\Administrators:(OI)(CI)R
NT AUTHORITY\SYSTEM:(OI)(CI)R
BUILTIN\Users:(OI)(CI)R

There was no denying it. Users and Administrators alike have read-only access to the store, and only the TrustedInstaller service can actually modify it. I opted to run the installer once again, this time in Windbg, tracing the operation of the SxS API to figure out what was happening behind the scenes.


0:000> sxe ld:sxs
0:000> g
ModLoad: 75500000 7555f000 C:\Windows\system32\sxs.dll
eax=1000162a ebx=00000000 ecx=15bf8bb6 edx=00000007 esi=7ffdd000 edi=20000000
eip=76f99a94 esp=0278f620 ebp=0278f664 iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
ntdll!KiFastSystemCallRet:
76f99a94 c3 ret
0:002> bp sxs!CreateAssemblyCache
0:002> g
Breakpoint 0 hit
eax=00000000 ebx=002ceda8 ecx=002cedc8 edx=002ce990 esi=002ceda8 edi=00000000
eip=7554a3aa esp=0278fd54 ebp=0278fd6c iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
sxs!CreateAssemblyCache:
7554a3aa 8bff mov edi,edi
0:002> kb 2
*** WARNING: Unable to verify checksum for C:\Users\User\AppData\Local\Temp\nspBB71.tmp\System.dll
ChildEBP RetAddr Args to Child
0278fd50 100024b5 00291a98 00000000 1000162a sxs!CreateAssemblyCache
0278fd6c 1000168d 002ceda8 00000000 75bbc780 System+0x24b5

We know from MSDN that CreateAssemblyCache returns the IAssemblyCache pointer through the first, out parameter. We expect a well-behaved caller to pass in storage initialized to zero, and the storage to contain the newly instantiated interface after the function returns:

0:002> dps 00291a98 L1
00291a98 00000000
0:002> gu
eax=00000000 ebx=002ceda8 ecx=00000000 edx=00000008 esi=002ceda8 edi=00000000
eip=100024b5 esp=0278fd60 ebp=0278fd6c iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
System+0x24b5:
100024b5 a340400010 mov dword ptr [System+0x4040 (10004040)],eax ds:0023:10004040={sxs!CreateAssemblyCache (7554a3aa)}
0:002> dps 00291a98 L1
00291a98 00291c88

The first pointer value in the storage reached when following a dereferenced interface pointer is a member function vtable. We verify this and follow the vtable to examine where the implementations of the various members reside:

0:002> dps 00291c88 L1
00291c88 755036f0 sxs!CAssemblyCache::`vftable'
0:002> dps 755036f0 L10
755036f0 75549ac4 sxs!CAssemblyCache::QueryInterface
755036f4 7550de6b sxs!CAssemblyCache::AddRef
755036f8 7554a355 sxs!CAssemblyCache::Release
755036fc 75549d35 sxs!CAssemblyCache::UninstallAssembly
75503700 75549b15 sxs!CAssemblyCache::QueryAssemblyInfo
75503704 7554a219 sxs!CAssemblyCache::CreateAssemblyCacheItem
75503708 755542f1 sxs!XMLParser::SetFlags
7550370c 75549e91 sxs!CAssemblyCache::InstallAssembly
75503710 7554a4d4 sxs!CAssemblyName::QueryInterface
75503714 7550de6b sxs!CAssemblyCache::AddRef
75503718 7554ad69 sxs!CAssemblyName::Release
7550371c 7554a525 sxs!CAssemblyName::SetProperty
75503720 7554a64d sxs!CAssemblyName::GetProperty
75503724 7554a4ba sxs!CAssemblyName::Finalize
75503728 7554aaac sxs!CAssemblyName::GetDisplayName
7550372c 7554a4ad sxs!CAssemblyName::Reserved

It is clear the implementation of the InstallAssembly method is sxs!CAssemblyCache::InstallAssembly. We set up a breakpoint, proceed there and perform a high-level trace:

0:002> bp sxs!CAssemblyCache::InstallAssembly
0:002> g
Breakpoint 1 hit
eax=00000000 ebx=002d2668 ecx=002d2688 edx=002cdc10 esi=002d2668 edi=00000000
eip=75549e91 esp=0278fd4c ebp=0278fd6c iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
sxs!CAssemblyCache::InstallAssembly:
75549e91 8bff mov edi,edi
0:002> wt -l 2 -m sxs
Tracing sxs!CAssemblyCache::InstallAssembly to return address 100024b5
16 0 [ 0] sxs!CAssemblyCache::InstallAssembly
13 0 [ 1] sxs!CFrame::CFrame
20 13 [ 0] sxs!CAssemblyCache::InstallAssembly
3 0 [ 1] sxs!CFrame::BaseEnter
11 0 [ 2] sxs!FusionpRtlPushFrame
6 11 [ 1] sxs!CFrame::BaseEnter
54 30 [ 0] sxs!CAssemblyCache::InstallAssembly
6 0 [ 1] sxs!CFrame::ClearLastError
58 36 [ 0] sxs!CAssemblyCache::InstallAssembly
10 0 [ 1] sxs!SxspTranslateReferenceFrom
13 0 [ 2] sxs!CFrame::CFrame
14 13 [ 1] sxs!SxspTranslateReferenceFrom
6 0 [ 2] sxs!CFrame::BaseEnter
70 19 [ 1] sxs!SxspTranslateReferenceFrom
9 0 [ 2] sxs!CFnTracerWin32::~CFnTracerWin32
74 28 [ 1] sxs!SxspTranslateReferenceFrom
63 138 [ 0] sxs!CAssemblyCache::InstallAssembly
4 0 [ 1] sxs!CFrame::ClearLastError
66 142 [ 0] sxs!CAssemblyCache::InstallAssembly
16 0 [ 1] sxs!SxsInstallW
13 0 [ 2] sxs!CFrame::CFrame
20 13 [ 1] sxs!SxsInstallW
6 0 [ 2] sxs!CFrame::BaseEnter
25 19 [ 1] sxs!SxsInstallW
13 0 [ 2] sxs!CGenericStringBuffer<64,CUnicodeCharTraits>::CGenericStringBuffer<64,CUnicodeCharTraits>
28 32 [ 1] sxs!SxsInstallW
13 0 [ 2] sxs!CGenericStringBuffer<64,CUnicodeCharTraits>::CGenericStringBuffer<64,CUnicodeCharTraits>
30 45 [ 1] sxs!SxsInstallW
13 0 [ 2] sxs!CGenericStringBuffer<64,CUnicodeCharTraits>::CGenericStringBuffer<64,CUnicodeCharTraits>
68 58 [ 1] sxs!SxsInstallW
4 0 [ 2] sxs!CFrame::ClearLastError
713 62 [ 1] sxs!SxsInstallW
72 0 [ 2] sxs!SxspExpandRelativePathToFull
797 134 [ 1] sxs!SxsInstallW
4 0 [ 2] sxs!CFrame::ClearLastError
800 138 [ 1] sxs!SxsInstallW
ModLoad: 741e0000 741ea000 C:\Windows\system32\sxsstore.dll
eax=ffffffff ebx=00000000 ecx=002e6a60 edx=00000001 esi=7ffdd000 edi=20000000
eip=76f99a94 esp=0278ed48 ebp=0278ed8c iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
ntdll!KiFastSystemCallRet:
76f99a94 c3 ret

OK, so it looks like this implementation lets sxs!SxsInstallW do the actual work. We rerun the installer and this time perform a trace from that point:

0:000> sxe ld:sxs
0:000> g
ModLoad: 75500000 7555f000 C:\Windows\system32\sxs.dll
eax=1000162a ebx=00000000 ecx=0f78c21d edx=00000007 esi=7ffdc000 edi=20000000
eip=76f99a94 esp=026ef620 ebp=026ef664 iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
ntdll!KiFastSystemCallRet:
76f99a94 c3 ret
0:002> bp sxs!SxsInstallW
0:002> g
Breakpoint 0 hit
eax=026efce8 ebx=0032db90 ecx=026efd08 edx=0032dbac esi=00332a08 edi=026efd44
eip=755475ad esp=026efcd4 ebp=026efd48 iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
sxs!SxsInstallW:
755475ad 8bff mov edi,edi
0:002> wt -l 2 -m sxs
Tracing sxs!SxsInstallW to return address 75549f41
16 0 [ 0] sxs!SxsInstallW
13 0 [ 1] sxs!CFrame::CFrame
20 13 [ 0] sxs!SxsInstallW
3 0 [ 1] sxs!CFrame::BaseEnter
11 0 [ 2] sxs!FusionpRtlPushFrame
6 11 [ 1] sxs!CFrame::BaseEnter
25 30 [ 0] sxs!SxsInstallW
10 0 [ 1] sxs!CGenericStringBuffer<64,CUnicodeCharTraits>::CGenericStringBuffer<64,CUnicodeCharTraits>
12 0 [ 2] sxs!CGenericBaseStringBuffer::InitializeInlineBuffer
13 12 [ 1] sxs!CGenericStringBuffer<64,CUnicodeCharTraits>::CGenericStringBuffer<64,CUnicodeCharTraits>
28 55 [ 0] sxs!SxsInstallW
10 0 [ 1] sxs!CGenericStringBuffer<64,CUnicodeCharTraits>::CGenericStringBuffer<64,CUnicodeCharTraits>
12 0 [ 2] sxs!CGenericBaseStringBuffer::InitializeInlineBuffer
13 12 [ 1] sxs!CGenericStringBuffer<64,CUnicodeCharTraits>::CGenericStringBuffer<64,CUnicodeCharTraits>
30 80 [ 0] sxs!SxsInstallW
10 0 [ 1] sxs!CGenericStringBuffer<64,CUnicodeCharTraits>::CGenericStringBuffer<64,CUnicodeCharTraits>
12 0 [ 2] sxs!CGenericBaseStringBuffer::InitializeInlineBuffer
13 12 [ 1] sxs!CGenericStringBuffer<64,CUnicodeCharTraits>::CGenericStringBuffer<64,CUnicodeCharTraits>
68 105 [ 0] sxs!SxsInstallW
4 0 [ 1] sxs!CFrame::ClearLastError
713 109 [ 0] sxs!SxsInstallW
15 0 [ 1] sxs!SxspExpandRelativePathToFull
13 0 [ 2] sxs!CFrame::CFrame
19 13 [ 1] sxs!SxspExpandRelativePathToFull
6 0 [ 2] sxs!CFrame::BaseEnter
22 19 [ 1] sxs!SxspExpandRelativePathToFull
29 0 [ 2] sxs!CGenericStringBufferAccessor::Attach
23 48 [ 1] sxs!SxspExpandRelativePathToFull
4 0 [ 2] sxs!CFrame::ClearLastError
29 52 [ 1] sxs!SxspExpandRelativePathToFull
13 0 [ 2] kernel32!GetFullPathNameW
36 65 [ 1] sxs!SxspExpandRelativePathToFull
31 0 [ 2] sxs!CGenericStringBufferAccessor::Detach
37 96 [ 1] sxs!SxspExpandRelativePathToFull
4 0 [ 2] sxs!CFrame::ClearLastError
41 100 [ 1] sxs!SxspExpandRelativePathToFull
68 0 [ 2] sxs!CGenericBaseStringBuffer::Win32ResizeBuffer
46 168 [ 1] sxs!SxspExpandRelativePathToFull
29 0 [ 2] sxs!CGenericStringBufferAccessor::Attach
47 197 [ 1] sxs!SxspExpandRelativePathToFull
4 0 [ 2] sxs!CFrame::ClearLastError
52 201 [ 1] sxs!SxspExpandRelativePathToFull
13 0 [ 2] kernel32!GetFullPathNameW
64 214 [ 1] sxs!SxspExpandRelativePathToFull
9 0 [ 2] sxs!CFnTracerWin32::~CFnTracerWin32
66 223 [ 1] sxs!SxspExpandRelativePathToFull
20 0 [ 2] sxs!CGenericStringBufferAccessor::~CGenericStringBufferAccessor
72 243 [ 1] sxs!SxspExpandRelativePathToFull
797 424 [ 0] sxs!SxsInstallW
4 0 [ 1] sxs!CFrame::ClearLastError
800 428 [ 0] sxs!SxsInstallW
28 0 [ 1] sxs!SxspGetRemoteStore
5 0 [ 2] sxs!SxspEnsureUserIsAdmin
34 5 [ 1] sxs!SxspGetRemoteStore
9 0 [ 2] kernel32!LoadLibraryW
40 14 [ 1] sxs!SxspGetRemoteStore
18 0 [ 2] ShimEng!StubGetProcAddress
50 32 [ 1] sxs!SxspGetRemoteStore
24 0 [ 2] ole32!CoCreateInstance
>> No match on ret
24 0 [ 2] ole32!CoCreateInstance
5 0 [ 2] RPCRT4!NdrpGetRpcHelper
>> No match on ret
5 0 [ 2] RPCRT4!NdrpGetRpcHelper
17 0 [ 2] RPCRT4!NdrpGetIIDFromBuffer
>> No match on ret
17 0 [ 2] RPCRT4!NdrpGetIIDFromBuffer
71 0 [ 2] RPCRT4!NdrpInterfacePointerUnmarshall
>> No match on ret
71 0 [ 2] RPCRT4!NdrpInterfacePointerUnmarshall
11 0 [ 2] RPCRT4!NdrpPointerUnmarshall
>> No match on ret
11 0 [ 2] RPCRT4!NdrpPointerUnmarshall
4 0 [ 2] RPCRT4!NdrPointerUnmarshall
>> No match on ret
4 0 [ 2] RPCRT4!NdrPointerUnmarshall
19 0 [ 2] RPCRT4!NdrpPointerUnmarshall
>> No match on ret
19 0 [ 2] RPCRT4!NdrpPointerUnmarshall
4 0 [ 2] RPCRT4!NdrPointerUnmarshall
>> No match on ret
4 0 [ 2] RPCRT4!NdrPointerUnmarshall
65 0 [ 2] RPCRT4!NdrpClientUnMarshal
>> No match on ret
65 0 [ 2] RPCRT4!NdrpClientUnMarshal
16 0 [ 2] RPCRT4!NdrClientCall2
>> No match on ret
16 0 [ 2] RPCRT4!NdrClientCall2
8 0 [ 2] RPCRT4!ObjectStublessClient
>> No match on ret
8 0 [ 2] RPCRT4!ObjectStublessClient
4 0 [ 2] RPCRT4!ObjectStubless
65 0 [ 2] ole32!CRpcResolver::CreateInstance
>> No match on ret
65 0 [ 2] ole32!CRpcResolver::CreateInstance
10 0 [ 2] ole32!CClientContextActivator::CreateInstance
>> No match on ret
10 0 [ 2] ole32!CClientContextActivator::CreateInstance
8 0 [ 2] ole32!ActivationPropertiesIn::DelegateCreateInstance
>> No match on ret
8 0 [ 2] ole32!ActivationPropertiesIn::DelegateCreateInstance
53 0 [ 2] ole32!ICoCreateInstanceEx
>> No match on ret
53 0 [ 2] ole32!ICoCreateInstanceEx
21 0 [ 2] ole32!CComActivator::DoCreateInstance
>> No match on ret
21 0 [ 2] ole32!CComActivator::DoCreateInstance
2 0 [ 2] ole32!CoCreateInstanceEx
>> No match on ret
2 0 [ 2] ole32!CoCreateInstanceEx
5 0 [ 2] ole32!CoCreateInstance
62 444 [ 1] sxs!SxspGetRemoteStore
34 0 [ 2] ole32!CStdIdentity::CInternalUnk::QueryInterface
>> No match on ret
34 0 [ 2] ole32!CStdIdentity::CInternalUnk::QueryInterface
14 0 [ 2] ole32!CreateIdentityHandler
>> No match on ret
14 0 [ 2] ole32!CreateIdentityHandler
21 0 [ 2] ole32!UnmarshalInternalObjRef
>> No match on ret
21 0 [ 2] ole32!UnmarshalInternalObjRef
27 0 [ 2] ole32!OXIDEntry::UnmarshalRemUnk
>> No match on ret
27 0 [ 2] ole32!OXIDEntry::UnmarshalRemUnk
18 0 [ 2] ole32!OXIDEntry::MakeRemUnk
>> No match on ret
18 0 [ 2] ole32!OXIDEntry::MakeRemUnk
7 0 [ 2] ole32!OXIDEntry::GetRemUnk
>> No match on ret
7 0 [ 2] ole32!OXIDEntry::GetRemUnk
2 0 [ 2] ole32!CStdMarshal::GetSecureRemUnk
>> No match on ret
2 0 [ 2] ole32!CStdMarshal::GetSecureRemUnk
23 0 [ 2] ole32!CStdMarshal::Begin_RemQIAndUnmarshal1
>> No match on ret
23 0 [ 2] ole32!CStdMarshal::Begin_RemQIAndUnmarshal1
5 0 [ 2] ole32!CStdMarshal::Begin_QueryRemoteInterfaces
>> No match on ret
5 0 [ 2] ole32!CStdMarshal::Begin_QueryRemoteInterfaces
ModLoad: 741e0000 741ea000 C:\Windows\system32\sxsstore.dll

Woah. That’s verbose. There’s a lot of noise in this trace, but the SxspGetRemoteStore function draws attention and it is obvious from all the OLE32 invocations later on that COM is at work here. Examining the sxs!SxspGetRemoteStore function reveals it instantiates the COM object identified by CLSID_SxsStore (left as an exercise for the reader).

Let’s have a look at the object’s registration information. First, extract the CLSID:

0:002> x sxs!CLSID_SxsStore
7554c454 sxs!CLSID_SxsStore =
0:002> dt nt!_GUID 7554c454
ntdll!_GUID
{3c6859ce-230b-48a4-be6c-932c0c202048}
+0x000 Data1 : 0x3c6859ce
+0x004 Data2 : 0x230b
+0x006 Data3 : 0x48a4
+0x008 Data4 : [8] "???"

Now, we’ll use the command-line to see what’s special about this object’s registration:

C:\Users\User\Desktop>reg query HKCR\CLSID\{3c6859ce-230b-48a4-be6c-932c0c202048
} /s


HKEY_CLASSES_ROOT\CLSID\{3c6859ce-230b-48a4-be6c-932c0c202048}
(Default) REG_SZ Sxs Store Class
AppID REG_SZ {752073A2-23F2-4396-85F0-8FDB879ED0ED}

HKEY_CLASSES_ROOT\CLSID\{3c6859ce-230b-48a4-be6c-932c0c202048}\LocalServer32
(Default) REG_EXPAND_SZ %systemroot%\servicing\TrustedInstaller.exe
ThreadingModel REG_SZ Both

OK, that explains it. The SxS API asks an out-of-process COM server running in the context of the TrustedInstaller service to do its bidding, explaining how things work despite the restrictive ACL on the store.

Hope you enjoyed that digression, but now back to the original business at hand. The installation process works just fine on Vista, but the plot thickens when we examine the uninstallation process.

Strangely and contrary to documentation, UninstallAssembly always returns success but with a disposition value of 0 on Vista, and the assembly files remain in place in the WinSxS store no matter what. The bottom line – if you use this approach to deploy the libraries to a Vista system, you may leave behind unused assembly files after your application is uninstalled, cluttering the user’s system. Take this to heart when considering whether this approach and the avoidance of an MSI installer is appropriate for your scenario.

Both the issue of Visual C++ 9.0 assembly deployment using the SxS API and the weird referencing behavior encounter during assembly uninstallation on Vista remain, as of yet, unresolved issues. If anyone is game for figuring those out, I’d be glad to hear about it.

Advertisements

Associating LPC clients and servers

Local Procedure Call (LPC) is a fast, lightweight interprocess communication mechanism used extensively by Windows system components. Microsoft’s documented approach for using LPC is through the higher-level RPC (Remote Procedure Call) API and its “ncalrpc” transport, which wraps the lower-level LPC interfaces. However, many Windows components use the LPC functions from the Native API directly and not through ncalrpc.

Like other remoting architectures, LPC presents a diagnostic challenge. We locate the remoting client thread and expect its flow to contain whatever information we are looking for, only to find it sending a message to the other end, magically receiving a response and continuing its merry way. In order to get a complete view of the complex interactions in the system, the task at hand is locating the server thread and examining its flow until we have the answer we are looking for.

As a case study, we shall consider an unlucky developer that must debug a custom security support provider or authentication package (SSP or AP) that runs in the context of the Windows Local Security Authority (LSA) subsystem. The developer wishes to single-step through the creation of a logon session. This sequence starts at the Winlogon process when it calls the LsaLogonUser API to authenticate a user’s credentials. The following treatise discusses Windows XP and traditional LPC. Vista features asynchronous LPC (ALPC) and is beyond the scope of this post.

We attach the trusty Windbg to the Winlogon process and set up a breakpoint on the API. We resume execution and use the Welcome screen GUI to initiate the actual logon attempt. For convenience, this would best be done with a remote debugging setup to a virtual machine. Once execution is suspended at the API of interest, we perform a trace to get an initial idea of the flow:

0:019> bp secur32!LsaLogonUser
0:019> g
ModLoad: 74980000 74a93000 C:\WINDOWS\system32\msxml3.dll
Breakpoint 0 hit
eax=0006ec78 ebx=00eedfb8 ecx=00000000 edx=00eedfdc esi=759799c4 edi=00eedfe4
eip=77fe33e8 esp=0006ec08 ebp=0006ecb8 iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
Secur32!LsaLogonUser:
77fe33e8 8bff mov edi,edi
0:000> wt
Tracing Secur32!LsaLogonUser to return address 77dec60d
43 0 [ 0] Secur32!LsaLogonUser
1 0 [ 1] ntdll!NtRequestWaitReplyPort
2 0 [ 1] ntdll!ZwRequestWaitReplyPort
2 0 [ 2] ntdll!KiFastSystemCall
1 0 [ 1] ntdll!ZwRequestWaitReplyPort
64 6 [ 0] Secur32!LsaLogonUser


70 instructions were executed in 69 events (0 from other threads)

Function Name Invocations MinInst MaxInst AvgInst
Secur32!LsaLogonUser 1 64 64 64
ntdll!KiFastSystemCall 1 2 2 2
ntdll!NtRequestWaitReplyPort 1 1 1 1
ntdll!ZwRequestWaitReplyPort 2 1 2 1

1 system call was executed

Calls System Call
1 ntdll!KiFastSystemCall

eax=c000006d ebx=00eedfb8 ecx=0006eda8 edx=00100004 esi=759799c4 edi=00eedfe4
eip=77dec60d esp=0006ec44 ebp=0006ecb8 iopl=0 nv up ei ng nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000282
ADVAPI32!L32pLogonUser+0x2cf:
77dec60d 8bf0 mov esi,eax

The debugging developer is disappointed the API simply invokes the NtRequestWaitReplyPort native API, which is used by the client of an LPC port to send a request message and wait synchronously for the server response. The other end is probably the LSA subsystem process, lsass.exe, intuition predicts. First, let’s verify this intuitive guess.

We’ll break again at an invocation of LsaLogonUser in the Winlogon process and this time proceed to the invocation of the LPC port and examine its arguments:


:000> g
ModLoad: 74980000 74a93000 C:\WINDOWS\system32\msxml3.dll
ModLoad: 74980000 74a93000 C:\WINDOWS\system32\msxml3.dll
Breakpoint 0 hit
eax=0006ec78 ebx=00eedfb8 ecx=00000000 edx=00eedfdc esi=759799c4 edi=00eedfe4
eip=77fe33e8 esp=0006ec08 ebp=0006ecb8 iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
Secur32!LsaLogonUser:
77fe33e8 8bff mov edi,edi
0:000> bp ntdll!NtRequestWaitReplyPort
0:000> g
Breakpoint 1 hit
eax=0006eb5c ebx=00eedfb8 ecx=000e000d edx=00eedfdc esi=00000000 edi=0006ebac
eip=7c90e3e1 esp=0006eb44 ebp=0006ec04 iopl=0 nv up ei pl zr na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
ntdll!NtRequestWaitReplyPort:
7c90e3e1 b8c8000000 mov eax,0C8h
0:000> kb 2
ChildEBP RetAddr Args to Child
0006eb40 77fe347e 000006b4 0006eb5c 0006eb5c ntdll!NtRequestWaitReplyPort
0006ec04 77dec60d 000006b4 0006ec78 00000002 Secur32!LsaLogonUser+0xa0

We see that the prototype of NtRequestWaitReplyPort places the LPC port handle as the first argument of the API. We verify this assertion:
0:000> !handle 6b4
Handle 6b4
Type Port

Great. Now what? An LPC port is, in fact, one of the many kinds of NT kernel objects. If we wish to gain access to more information about it, we must access the kernel’s knowledge of the object. This is accomplished through the use of the kernel debugger, kd. Windbg can also act as a GUI wrapper for kernel debugging sessions. As we shall soon find out, the kernel debugger is quite useful even when you have nothing to do with drivers or other kernel-mode code.

Attaching a kernel debugger is covered extensively in the literature and is left as an exercise for the reader. Suffice to say you are much better off using a virtual machine and a named pipe over using a serial or FireWire connection to a physical system, unless some exotic circumstances force you to use an actual machine (i.e., you are debugging authentication of a fingerprint reader product you are developing, etc. and need the physical device to be present in the debugged system)

Handles, except system handles, are process-local. What we want to do is associate the Winlogon port handle with the kernel LPC port object. First, we’ll find the Winlogon process and set the kernel debugger’s context to that process:

0: kd> !process 0 0 winlogon.exe
PROCESS 82bcdda0 SessionId: 0 Cid: 026c Peb: 7ffdd000 ParentCid: 0220
DirBase: 0a3e0000 ObjectTable: e14f1a48 HandleCount: 534.
Image: winlogon.exe

0: kd> .process 82bcdda0
Implicit process is now 82bcdda0
WARNING: .cache forcedecodeuser is not enabled

Good, now lets have a look at the handle, this time from the kernel debugger’s point of view. Although the command has the same name, the kernel debugger command is distinct.

0: kd> !handle 6b4
processor number 0, process 82bcdda0
PROCESS 82bcdda0 SessionId: 0 Cid: 026c Peb: 7ffdd000 ParentCid: 0220
DirBase: 0a3e0000 ObjectTable: e14f1a48 HandleCount: 534.
Image: winlogon.exe

Handle table at e1ba8000 with 534 Entries in use
06b4: Object: e1582f68 GrantedAccess: 001f0001 Entry: e169cd68
Object: e1582f68 Type: (82bed5d0) Port
ObjectHeader: e1582f50 (old version)
HandleCount: 1 PointerCount: 1

We see the LPC port kernel object is at kernel-mode address 0xe1582f68. Each variety of kernel object might have a distinct debugger extension for further examination. In the LPC port case, we shall use the !lpc port command to examine the port:

0: kd> !lpc port e1582f68

Client communication port 0xe1582f68
Handles: 1 References: 1
The LpcDataInfoChainHead queue is empty
Connected port: 0xe15765a0 Server connection port: 0xe17426c8

Server communication port 0xe15765a0
Handles: 1 References: 1
The LpcDataInfoChainHead queue is empty

Server connection port e17426c8 Name: LsaAuthenticationPort
Handles: 1 References: 52
Server process : 8290e4b8 (lsass.exe)
Queue semaphore : 82a0a3e8
Semaphore state 0 (0x0)
The message queue is empty
The LpcDataInfoChainHead queue is empty

Our suspicion that lsass.exe is the server for this LPC port is confirmed. Furthermore, we now know that the LPC port is called LsaAuthenticationPort by this client/server pair. If LSASS has just one port server thread, we’re done. Let us examine it to see if we are that lucky. A word of caution to the uninitiated: debugging LSASS is a messy deal and you can easily deadlock your system by initiating operations that interact with LSA and expect it to be active. For example, do not use a symbol server based on an SMB share, since the network session setup will block while LSA is suspended. For our purposes, a non-invasive, non-suspending session, using the NTSD debugger’s “-pvr” command line switch, would be best for the initial investigation. Once started, we use the debugger to locate stack frames with LPC servers, by looking for the NtReplyWaitReceivePort native API on the stack:

0:000> !findstack ntdll!NtReplyWaitReceivePort
Thread 004, 1 frame(s) match
* 01 008dfe88 7575ba56 ntdll!NtReplyWaitReceivePort+0xc

Thread 006, 1 frame(s) match
* 01 00acfe18 77e765d3 ntdll!NtReplyWaitReceivePortEx+0xc

Thread 007, 1 frame(s) match
* 01 00b8fe40 75738f5c ntdll!NtReplyWaitReceivePort+0xc

Thread 010, 1 frame(s) match
* 01 00e5fe18 77e765d3 ntdll!NtReplyWaitReceivePortEx+0xc

Thread 016, 1 frame(s) match
* 01 0007fe18 77e765d3 ntdll!NtReplyWaitReceivePortEx+0xc

Thread 017, 1 frame(s) match
* 01 00b0fe18 77e765d3 ntdll!NtReplyWaitReceivePortEx+0xc

Thread 019, 1 frame(s) match
* 01 00c8fe18 77e765d3 ntdll!NtReplyWaitReceivePortEx+0xc

GetContextState failed, 0x8007001F
GetContextState failed, 0x8007001F
GetContextState failed, 0x8007001F
Unable to get program counter
GetContextState failed, 0x8007001F
Unable to get current machine context, Win32 error 0n31
GetContextState failed, 0x8007001F
GetContextState failed, 0x8007001F
GetContextState failed, 0x8007001F
GetContextState failed, 0x8007001F
Unable to get current machine context, Win32 error 0n31
ERROR: !findstack: extension exception 0x8007001f.
"Unable to get thread stack"
0:000>

We can ignore the spurious errors from !findstack on the bottom of the output, which are the result of our non-invasive attach. Unfortunately for us, the plot thickens as lsass.exe has a bunch of server threads and it is as of yet unclear which one will have the server-side flow of interest. How can figure out which of the seven potential servers is the right one?

We’ll get started by extracting the server port handle from each thread’s stack. As in the case of the client function, NtReplyWaitReceivePort takes the port handle as its first argument.

0:000> ~4 kb 2
ChildEBP RetAddr Args to Child
008dfe84 7c90e384 7575ba56 000000d0 00000000 ntdll!KiFastSystemCallRet
008dfe88 7575ba56 000000d0 00000000 00000000 ntdll!NtReplyWaitReceivePort+0xc
0:000> ~6 kb 2
ChildEBP RetAddr Args to Child
00acfe14 7c90e399 77e765d3 000002e8 00acff74 ntdll!KiFastSystemCallRet
00acfe18 77e765d3 000002e8 00acff74 00000000 ntdll!NtReplyWaitReceivePortEx+0xc
0:000> ~7 kb 2
ChildEBP RetAddr Args to Child
00b8fe3c 7c90e384 75738f5c 000002cc 00b8fe6c ntdll!KiFastSystemCallRet
00b8fe40 75738f5c 000002cc 00b8fe6c 00000000 ntdll!NtReplyWaitReceivePort+0xc
0:000> ~10 kb 2
ChildEBP RetAddr Args to Child
00e5fe14 7c90e399 77e765d3 000002b4 00e5ff74 ntdll!KiFastSystemCallRet
00e5fe18 77e765d3 000002b4 00e5ff74 00000000 ntdll!NtReplyWaitReceivePortEx+0xc
0:000> ~16 kb 2
GetContextState failed, 0x8007001F
Unable to get current machine context, Win32 error 0n31
^ Illegal thread error in '~16 kb 2'
0:000> ~17 kb 2
GetContextState failed, 0x8007001F
Unable to get current machine context, Win32 error 0n31
^ Illegal thread error in '~17 kb 2'
0:000> ~19 kb 2
ChildEBP RetAddr Args to Child
00c8fe14 7c90e399 77e765d3 000002a8 00c8ff74 ntdll!KiFastSystemCallRet
00c8fe18 77e765d3 000002a8 00c8ff74 00000000 ntdll!NtReplyWaitReceivePortEx+0xc

The non-invasive session has trouble accessing the context of threads 16 and 17. If we don’t find the server handle we are looking for elsewhere, we could retry with an invasive attach. For now, let’s note the server port handles appearing in the stack traces we do have.

Knowing which thread is associated with which port handle, we turn to the kernel debugger for associating the server port object with its handle in the lsass.exe process. Recall that we have the server port object’s address from the output of the !lpc port command on the client port object. We list lsass.exe’s port handles and look for the one associated with it:

0: kd> !process 0 0 lsass.exe
PROCESS 8290e4b8 SessionId: 0 Cid: 02b0 Peb: 7ffdf000 ParentCid: 026c
DirBase: 0a337000 ObjectTable: e1730338 HandleCount: 357.
Image: lsass.exe
0: kd> !handle 0 0 8290e4b8 Port
processor number 0, process 8290e4b8
Searching for handles of type Port
PROCESS 8290e4b8 SessionId: 0 Cid: 02b0 Peb: 7ffdf000 ParentCid: 026c
DirBase: 0a337000 ObjectTable: e1730338 HandleCount: 357.
Image: lsass.exe
Handle table at e173b000 with 357 Entries in use
0018: Object: e1736c58 GrantedAccess: 001f0001 (Protected)
00c4: Object: e172a578 GrantedAccess: 001f0001
00cc: Object: e173d030 GrantedAccess: 001f0001
00d0: Object: e173ff68 GrantedAccess: 001f0001
01c8: Object: e17ba3b8 GrantedAccess: 001f0001
02a8: Object: e1754bc8 GrantedAccess: 001f0001
02b4: Object: e17427a0 GrantedAccess: 001f0001
02b8: Object: e1b6c318 GrantedAccess: 001f0001
02c8: Object: e173d240 GrantedAccess: 001f0001
02cc: Object: e17426c8 GrantedAccess: 001f0001
02e8: Object: e173f410 GrantedAccess: 001f0001
030c: Object: e1742470 GrantedAccess: 001f0001
0314: Object: e1742548 GrantedAccess: 001f0001
033c: Object: e1744e58 GrantedAccess: 001f0001
03a4: Object: e17a4e00 GrantedAccess: 001f0001
03b0: Object: e17a4cc0 GrantedAccess: 001f0001
03c0: Object: e17a9640 GrantedAccess: 001f0001
03c8: Object: e17f29f8 GrantedAccess: 001f0001
03cc: Object: e17deb48 GrantedAccess: 001f0001
03d4: Object: e17f53d0 GrantedAccess: 001f0001
03dc: Object: e17f7dd8 GrantedAccess: 001f0001
03e4: Object: e17f7c10 GrantedAccess: 001f0001
03f4: Object: e190abf0 GrantedAccess: 001f0001
03f8: Object: e17fb690 GrantedAccess: 001f0001
0404: Object: e1b43310 GrantedAccess: 001f0001
0418: Object: e19149b8 GrantedAccess: 001f0001
0440: Object: e1942030 GrantedAccess: 001f0001
0454: Object: e19184a0 GrantedAccess: 001f0001
0458: Object: e1b3a770 GrantedAccess: 001f0001
0464: Object: e1758170 GrantedAccess: 001f0001
0480: Object: e1601ab8 GrantedAccess: 001f0001
049c: Object: e1cf59d8 GrantedAccess: 001f0001
04a4: Object: e13082a8 GrantedAccess: 001f0001
04f4: Object: e1366490 GrantedAccess: 001f0001
0508: Object: e1b466c0 GrantedAccess: 001f0001
0514: Object: e1c9f450 GrantedAccess: 001f0001
0564: Object: e1b5a640 GrantedAccess: 001f0001
0580: Object: e15765a0 GrantedAccess: 001f0001
05cc: Object: e1d814e0 GrantedAccess: 001f0001

Woah, that’s quite a list. We note the handle pointing to the server port object is 0x2cc. Cross-referencing with the handle stacks we extracted from the user-mode debugger, we hit the gold and figure out thread 7 is the thread we are looking for:


0:000> ~7 k
ChildEBP RetAddr
00b8fe3c 7c90e384 ntdll!KiFastSystemCallRet
00b8fe40 75738f5c ntdll!NtReplyWaitReceivePort+0xc
00b8ff74 75738d66 LSASRV!LpcServerThread+0xaf
00b8ffb4 7c80b6a3 LSASRV!LsapThreadBase+0x91
00b8ffec 00000000 kernel32!BaseThreadStart+0x37

Yup, that looks about right. We now know we should set our breakpoint at this thread, as it is expected to return from the blocking NtReplyWaitReceivePort system call upon an incoming LPC message on LsaAuthenticationPort. At that point, we can follow execution as the LSA server DLL assigns handling the call to a worker thread or whatever else it may be up to.

Once again, kd saves the day.