1
0
mirror of https://github.com/upx/upx synced 2025-09-28 19:06:07 +08:00

pe32: tls refactoring

This commit is contained in:
László Molnár 2014-02-18 00:23:42 +01:00
parent 9cb639b505
commit 07cba6c774
4 changed files with 114 additions and 175 deletions

View File

@ -162,143 +162,6 @@ int PackW32Pe::readFileHeader()
return super::readFileHeader(); return super::readFileHeader();
} }
//new: processTLS moved to p_w32pe.cpp for TLS callback support
/*************************************************************************
// TLS handling
**************************************************************************/
// thanks for theowl for providing me some docs, so that now I understand
// what I'm doing here :)
// 1999-10-17: this was tricky to find:
// when the fixup records and the tls area are on the same page, then
// the tls area is not relocated, because the relocation is done by
// the virtual memory manager only for pages which are not yet loaded.
// of course it was impossible to debug this ;-)
#define TLS_CB_ALIGNMENT 4u // alignment of tls callbacks
__packed_struct(tls)
LE32 datastart; // VA tls init data start
LE32 dataend; // VA tls init data end
LE32 tlsindex; // VA tls index
LE32 callbacks; // VA tls callbacks
char _[8]; // zero init, characteristics
__packed_struct_end()
void PackW32Pe::processTls(Interval *iv) // pass 1
{
COMPILE_TIME_ASSERT(sizeof(tls) == 24)
COMPILE_TIME_ASSERT_ALIGNED1(tls)
if ((sotls = ALIGN_UP(IDSIZE(PEDIR_TLS),4)) == 0)
return;
const tls * const tlsp = (const tls*) (ibuf + IDADDR(PEDIR_TLS));
// note: TLS callbacks are not implemented in Windows 95/98/ME
if (tlsp->callbacks)
{
if (tlsp->callbacks < ih.imagebase)
throwCantPack("invalid TLS callback");
else if (tlsp->callbacks - ih.imagebase + 4 >= ih.imagesize)
throwCantPack("invalid TLS callback");
unsigned v = get_le32(ibuf + tlsp->callbacks - ih.imagebase);
//NEW: TLS callback support - Stefan Widmann
if(v != 0)
{
//count number of callbacks, just for information string - Stefan Widmann
unsigned num_callbacks = 0;
unsigned callback_offset = 0;
while(get_le32(ibuf + tlsp->callbacks - ih.imagebase + callback_offset))
{
//increment number of callbacks
num_callbacks++;
//increment pointer by 4
callback_offset += 4;
}
info("TLS: %u callback(s) found, adding TLS callback handler", num_callbacks);
//set flag to include necessary sections in loader
use_tls_callbacks = true;
//define linker symbols
tlscb_ptr = tlsp->callbacks;
}
}
const unsigned tlsdatastart = tlsp->datastart - ih.imagebase;
const unsigned tlsdataend = tlsp->dataend - ih.imagebase;
// now some ugly stuff: find the relocation entries in the tls data area
unsigned pos,type;
Reloc rel(ibuf + IDADDR(PEDIR_RELOC),IDSIZE(PEDIR_RELOC));
while (rel.next(pos,type))
if (pos >= tlsdatastart && pos < tlsdataend)
iv->add(pos,type);
sotls = sizeof(tls) + tlsdataend - tlsdatastart;
// if TLS callbacks are used, we need two more DWORDS at the end of the TLS
// ... and those dwords should be correctly aligned
if (use_tls_callbacks)
sotls = ALIGN_UP(sotls, TLS_CB_ALIGNMENT) + 8;
// the PE loader wants this stuff uncompressed
otls = new upx_byte[sotls];
memset(otls,0,sotls);
memcpy(otls,ibuf + IDADDR(PEDIR_TLS),sizeof(tls));
// WARNING: this can acces data in BSS
memcpy(otls + sizeof(tls),ibuf + tlsdatastart,sotls - sizeof(tls));
tlsindex = tlsp->tlsindex - ih.imagebase;
//NEW: subtract two dwords if TLS callbacks are used - Stefan Widmann
info("TLS: %u bytes tls data and %u relocations added",sotls - (unsigned) sizeof(tls) - (use_tls_callbacks ? 8 : 0),iv->ivnum);
// makes sure tls index is zero after decompression
if (tlsindex && tlsindex < ih.imagesize)
set_le32(ibuf + tlsindex, 0);
}
void PackW32Pe::processTls(Reloc *rel,const Interval *iv,unsigned newaddr) // pass 2
{
if (sotls == 0)
return;
// add new relocation entries
unsigned ic;
//NEW: if TLS callbacks are used, relocate the VA of the callback chain, too - Stefan Widmann
for (ic = 0; ic < (use_tls_callbacks ? 16u : 12u); ic += 4)
rel->add(newaddr + ic,3);
tls * const tlsp = (tls*) otls;
// now the relocation entries in the tls data area
for (ic = 0; ic < iv->ivnum; ic += 4)
{
void *p = otls + iv->ivarr[ic].start - (tlsp->datastart - ih.imagebase) + sizeof(tls);
unsigned kc = get_le32(p);
if (kc < tlsp->dataend && kc >= tlsp->datastart)
{
kc += newaddr + sizeof(tls) - tlsp->datastart;
set_le32(p,kc + ih.imagebase);
rel->add(kc,iv->ivarr[ic].len);
}
else
rel->add(kc - ih.imagebase,iv->ivarr[ic].len);
}
const unsigned tls_data_size = tlsp->dataend - tlsp->datastart;
tlsp->datastart = newaddr + sizeof(tls) + ih.imagebase;
tlsp->dataend = tlsp->datastart + tls_data_size;
//NEW: if we have TLS callbacks to handle, we create a pointer to the new callback chain - Stefan Widmann
tlsp->callbacks = (use_tls_callbacks ? newaddr + sotls + ih.imagebase - 8 : 0);
if(use_tls_callbacks)
{
//set handler offset
set_le32(otls + sotls - 8, tls_handler_offset + ih.imagebase);
//add relocation for TLS handler offset
rel->add(newaddr + sotls - 8, 3);
}
}
/************************************************************************* /*************************************************************************
// Load Configuration handling // Load Configuration handling
**************************************************************************/ **************************************************************************/

View File

@ -58,9 +58,6 @@ protected:
virtual void buildLoader(const Filter *ft); virtual void buildLoader(const Filter *ft);
virtual Linker* newLinker() const; virtual Linker* newLinker() const;
virtual void processTls(Interval *); //NEW: TLS callback handling - Stefan Widmann
void processTls(Reloc *, const Interval *, unsigned); //NEW: TLS callback handling - Stefan Widmann
void processLoadConf(Reloc *, const Interval *, unsigned); void processLoadConf(Reloc *, const Interval *, unsigned);
void processLoadConf(Interval *); void processLoadConf(Interval *);
upx_byte *oloadconf; upx_byte *oloadconf;

View File

@ -136,6 +136,7 @@ PeFile::PeFile(InputFile *f) : super(f)
sotls = 0; sotls = 0;
isdll = false; isdll = false;
ilinker = NULL; ilinker = NULL;
use_tls_callbacks = false;
} }
@ -1130,41 +1131,71 @@ void PeFile::processExports(Export *xport,unsigned newoffs) // pass2
// the tls area is not relocated, because the relocation is done by // the tls area is not relocated, because the relocation is done by
// the virtual memory manager only for pages which are not yet loaded. // the virtual memory manager only for pages which are not yet loaded.
// of course it was impossible to debug this ;-) // of course it was impossible to debug this ;-)
#if 0
__packed_struct(tls)
LE32 datastart; // VA tls init data start
LE32 dataend; // VA tls init data end
LE32 tlsindex; // VA tls index
LE32 callbacks; // VA tls callbacks
char _[8]; // zero init, characteristics
__packed_struct_end()
void PeFile::processTls(Interval *iv) // pass 1 template <>
struct PeFile::tls_traits<LE32>
{ {
COMPILE_TIME_ASSERT(sizeof(tls) == 24) __packed_struct(tls)
LE32 datastart; // VA tls init data start
LE32 dataend; // VA tls init data end
LE32 tlsindex; // VA tls index
LE32 callbacks; // VA tls callbacks
char _[8]; // zero init, characteristics
__packed_struct_end()
static const unsigned sotls = 24;
static const unsigned cb_size = 4;
typedef unsigned cb_value_t;
static const unsigned reloc_type = 3;
};
template <typename LEXX>
void PeFile::processTls1(Interval *iv,
typename tls_traits<LEXX>::cb_value_t imagebase,
unsigned imagesize) // pass 1
{
typedef typename tls_traits<LEXX>::tls tls;
typedef typename tls_traits<LEXX>::cb_value_t cb_value_t;
const unsigned cb_size = tls_traits<LEXX>::cb_size;
COMPILE_TIME_ASSERT(sizeof(tls) == tls_traits<LEXX>::sotls)
COMPILE_TIME_ASSERT_ALIGNED1(tls) COMPILE_TIME_ASSERT_ALIGNED1(tls)
if ((sotls = ALIGN_UP(IDSIZE(PEDIR_TLS),4)) == 0) if ((sotls = ALIGN_UP(IDSIZE(PEDIR_TLS),4)) == 0)
return; return;
const tls * const tlsp = (const tls*) (ibuf + IDADDR(PEDIR_TLS)); const tls * const tlsp = (const tls*) (ibuf + IDADDR(PEDIR_TLS));
// note: TLS callbacks are not implemented in Windows 95/98/ME // note: TLS callbacks are not implemented in Windows 95/98/ME
if (tlsp->callbacks) if (tlsp->callbacks)
{ {
if (tlsp->callbacks < ih.imagebase) if (tlsp->callbacks < imagebase)
throwCantPack("invalid TLS callback"); throwCantPack("invalid TLS callback");
else if (tlsp->callbacks - ih.imagebase + 4 >= ih.imagesize) else if (tlsp->callbacks - imagebase + 4 >= imagesize)
throwCantPack("invalid TLS callback"); throwCantPack("invalid TLS callback");
unsigned v = get_le32(ibuf + tlsp->callbacks - ih.imagebase); cb_value_t v = *(LEXX*)(ibuf + (tlsp->callbacks - imagebase));
if (v != 0)
if(v != 0)
{ {
//fprintf(stderr, "TLS callbacks: 0x%0x -> 0x%0x\n", (int)tlsp->callbacks, v); //count number of callbacks, just for information string - Stefan Widmann
throwCantPack("TLS callbacks are not supported"); unsigned num_callbacks = 0;
unsigned callback_offset = 0;
while(*(LEXX*)(ibuf + tlsp->callbacks - imagebase + callback_offset))
{
//increment number of callbacks
num_callbacks++;
callback_offset += cb_size;
}
info("TLS: %u callback(s) found, adding TLS callback handler", num_callbacks);
//set flag to include necessary sections in loader
use_tls_callbacks = true;
//define linker symbols
tlscb_ptr = tlsp->callbacks;
} }
} }
const unsigned tlsdatastart = tlsp->datastart - ih.imagebase; const unsigned tlsdatastart = tlsp->datastart - imagebase;
const unsigned tlsdataend = tlsp->dataend - ih.imagebase; const unsigned tlsdataend = tlsp->dataend - imagebase;
// now some ugly stuff: find the relocation entries in the tls data area // now some ugly stuff: find the relocation entries in the tls data area
unsigned pos,type; unsigned pos,type;
@ -1174,51 +1205,76 @@ void PeFile::processTls(Interval *iv) // pass 1
iv->add(pos,type); iv->add(pos,type);
sotls = sizeof(tls) + tlsdataend - tlsdatastart; sotls = sizeof(tls) + tlsdataend - tlsdatastart;
// if TLS callbacks are used, we need two more {D|Q}WORDS at the end of the TLS
// ... and those dwords should be correctly aligned
if (use_tls_callbacks)
sotls = ALIGN_UP(sotls, cb_size) + 2 * cb_size;
// the PE loader wants this stuff uncompressed // the PE loader wants this stuff uncompressed
otls = new upx_byte[sotls]; otls = new upx_byte[sotls];
memset(otls,0,sotls); memset(otls,0,sotls);
memcpy(otls,ibuf + IDADDR(PEDIR_TLS),0x18); memcpy(otls,ibuf + IDADDR(PEDIR_TLS),sizeof(tls));
// WARNING: this can acces data in BSS // WARNING: this can acces data in BSS
memcpy(otls + sizeof(tls),ibuf + tlsdatastart,sotls - sizeof(tls)); memcpy(otls + sizeof(tls),ibuf + tlsdatastart,sotls - sizeof(tls));
tlsindex = tlsp->tlsindex - ih.imagebase; tlsindex = tlsp->tlsindex - imagebase;
info("TLS: %u bytes tls data and %u relocations added",sotls - (unsigned) sizeof(tls),iv->ivnum); //NEW: subtract two dwords if TLS callbacks are used - Stefan Widmann
info("TLS: %u bytes tls data and %u relocations added",
sotls - (unsigned) sizeof(tls) - (use_tls_callbacks ? 2 * cb_size : 0),iv->ivnum);
// makes sure tls index is zero after decompression // makes sure tls index is zero after decompression
if (tlsindex && tlsindex < ih.imagesize) if (tlsindex && tlsindex < imagesize)
set_le32(ibuf + tlsindex, 0); set_le32(ibuf + tlsindex, 0);
} }
void PeFile::processTls(Reloc *rel,const Interval *iv,unsigned newaddr) // pass 2 template <typename LEXX>
void PeFile::processTls2(Reloc *rel,const Interval *iv,unsigned newaddr,
typename tls_traits<LEXX>::cb_value_t imagebase) // pass 2
{ {
typedef typename tls_traits<LEXX>::tls tls;
typedef typename tls_traits<LEXX>::cb_value_t cb_value_t;
const unsigned cb_size = tls_traits<LEXX>::cb_size;
const unsigned reloc_type = tls_traits<LEXX>::reloc_type;
if (sotls == 0) if (sotls == 0)
return; return;
// add new relocation entries // add new relocation entries
unsigned ic; unsigned ic;
for (ic = 0; ic < 12; ic += 4) //NEW: if TLS callbacks are used, relocate the VA of the callback chain, too - Stefan Widmann
rel->add(newaddr + ic,3); for (ic = 0; ic < (use_tls_callbacks ? 4 * cb_size : 3 * cb_size); ic += cb_size)
rel->add(newaddr + ic, reloc_type);
tls * const tlsp = (tls*) otls; tls * const tlsp = (tls*) otls;
// now the relocation entries in the tls data area // now the relocation entries in the tls data area
for (ic = 0; ic < iv->ivnum; ic += 4) for (ic = 0; ic < iv->ivnum; ic += 4)
{ {
void *p = otls + iv->ivarr[ic].start - (tlsp->datastart - ih.imagebase) + sizeof(tls); void *p = otls + iv->ivarr[ic].start - (tlsp->datastart - imagebase) + sizeof(tls);
unsigned kc = get_le32(p); cb_value_t kc = *(LEXX*)(p);
if (kc < tlsp->dataend && kc >= tlsp->datastart) if (kc < tlsp->dataend && kc >= tlsp->datastart)
{ {
kc += newaddr + sizeof(tls) - tlsp->datastart; kc += newaddr + sizeof(tls) - tlsp->datastart;
set_le32(p,kc + ih.imagebase); *(LEXX*)(p) = kc + imagebase;
rel->add(kc,iv->ivarr[ic].len); rel->add(kc,iv->ivarr[ic].len);
} }
else else
rel->add(kc - ih.imagebase,iv->ivarr[ic].len); rel->add(kc - imagebase,iv->ivarr[ic].len);
} }
tlsp->datastart = newaddr + sizeof(tls) + ih.imagebase; const unsigned tls_data_size = tlsp->dataend - tlsp->datastart;
tlsp->dataend = newaddr + sotls + ih.imagebase; tlsp->datastart = newaddr + sizeof(tls) + imagebase;
tlsp->callbacks = 0; // note: TLS callbacks are not implemented in Windows 95/98/ME tlsp->dataend = tlsp->datastart + tls_data_size;
//NEW: if we have TLS callbacks to handle, we create a pointer to the new callback chain - Stefan Widmann
tlsp->callbacks = (use_tls_callbacks ? newaddr + sotls + imagebase - 2 * cb_size : 0);
if (use_tls_callbacks)
{
//set handler offset
*(LEXX*)(otls + sotls - 2 * cb_size) = tls_handler_offset + imagebase;
//add relocation for TLS handler offset
rel->add(newaddr + sotls - 2 * cb_size, reloc_type);
}
} }
#endif
/************************************************************************* /*************************************************************************
// resource handling // resource handling
@ -1791,6 +1847,7 @@ unsigned PeFile::stripDebug(unsigned overlaystart)
void PeFile::rebuildRelocs(upx_byte *& extrainfo, unsigned bits, void PeFile::rebuildRelocs(upx_byte *& extrainfo, unsigned bits,
unsigned flags, upx_uint64_t imagebase) unsigned flags, upx_uint64_t imagebase)
{ {
assert(bits == 32 || bits == 64);
if (!ODADDR(PEDIR_RELOC) || !ODSIZE(PEDIR_RELOC) || (flags & RELOCS_STRIPPED)) if (!ODADDR(PEDIR_RELOC) || !ODSIZE(PEDIR_RELOC) || (flags & RELOCS_STRIPPED))
return; return;
@ -2173,6 +2230,16 @@ unsigned PeFile32::processImports() // pass 1
return super::processImports<LE32>(1u << 31); return super::processImports<LE32>(1u << 31);
} }
void PeFile32::processTls(Interval *iv)
{
super::processTls1<LE32>(iv, ih.imagebase, ih.imagesize);
}
void PeFile32::processTls(Reloc *r, const Interval *iv, unsigned a)
{
super::processTls2<LE32>(r, iv, a, ih.imagebase);
}
/* /*
extra info added to help uncompression: extra info added to help uncompression:

View File

@ -99,12 +99,22 @@ protected:
upx_byte *oresources; upx_byte *oresources;
unsigned soresources; unsigned soresources;
// virtual void processTls(Interval *); template <typename>
// void processTls(Reloc *, const Interval *, unsigned); struct tls_traits;
template <typename LEXX>
void processTls1(Interval *iv,
typename tls_traits<LEXX>::cb_value_t imagebase,
unsigned imagesize); // pass 1
template <typename LEXX>
void processTls2(Reloc *rel,const Interval *iv,unsigned newaddr,
typename tls_traits<LEXX>::cb_value_t imagebase); // pass 2
void rebuildTls(); void rebuildTls();
upx_byte *otls; upx_byte *otls;
unsigned sotls; unsigned sotls;
unsigned tlsindex; unsigned tlsindex;
unsigned tlscb_ptr;
unsigned tls_handler_offset;
bool use_tls_callbacks;
unsigned stripDebug(unsigned); unsigned stripDebug(unsigned);
@ -364,6 +374,8 @@ protected:
virtual unsigned processImports(); virtual unsigned processImports();
virtual void processRelocs(); virtual void processRelocs();
virtual void processTls(Interval *);
void processTls(Reloc *, const Interval *, unsigned);
__packed_struct(pe_header_t) __packed_struct(pe_header_t)
// 0x0 // 0x0