⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 i386-linux.elf.shell-main.c

📁 UPX 源代码
💻 C
字号:
/* i386-linux.elf.shell-main.c -- stub loader for Linux x86 shell script executable   This file is part of the UPX executable compressor.   Copyright (C) 1996-2007 Markus Franz Xaver Johannes Oberhumer   Copyright (C) 1996-2007 Laszlo Molnar   Copyright (C) 2000-2007 John F. Reiser   All Rights Reserved.   UPX and the UCL library are free software; you can redistribute them   and/or modify them under the terms of the GNU General Public License as   published by the Free Software Foundation; either version 2 of   the License, or (at your option) any later version.   This program is distributed in the hope that it will be useful,   but WITHOUT ANY WARRANTY; without even the implied warranty of   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the   GNU General Public License for more details.   You should have received a copy of the GNU General Public License   along with this program; see the file COPYING.   If not, write to the Free Software Foundation, Inc.,   59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.   Markus F.X.J. Oberhumer              Laszlo Molnar   <mfx@users.sourceforge.net>          <ml1050@users.sourceforge.net>   John F. Reiser   <jreiser@users.sourceforge.net> */#include "include/linux.h"/*************************************************************************// configuration section**************************************************************************/// In order to make it much easier to move this code at runtime and execute// it at an address different from it load address:  there must be no// static data, and no string constants.#define MAX_ELF_HDR 512  // Elf32_Ehdr + n*Elf32_Phdr must fit in this/*************************************************************************// "file" util**************************************************************************/struct Extent {    size_t size;  // must be first to match size[0] uncompressed size    char *buf;};static voidxread(struct Extent *x, char *buf, size_t count){    char *p=x->buf, *q=buf;    size_t j;    if (x->size < count) {        exit(127);    }    for (j = count; 0!=j--; ++p, ++q) {        *q = *p;    }    x->buf  += count;    x->size -= count;}/*************************************************************************// util**************************************************************************/#if 1  //{  save space#define ERR_LAB error: exit(127);#define err_exit(a) goto error#else  //}{  save debugging time#define ERR_LABstatic voiderr_exit(int a){    (void)a;  // debugging convenience    exit(127);}#endif  //}static void *do_brk(void *addr){    return brk(addr);}extern char *mmap(void *addr, size_t len,    int prot, int flags, int fd, off_t offset);/*************************************************************************// UPX & NRV stuff**************************************************************************/typedef int f_expand(    const nrv_byte *, nrv_uint,          nrv_byte *, nrv_uint *, int method );static voidunpackExtent(    struct Extent *const xi,  // input    struct Extent *const xo,  // output    f_expand *const f_decompress){    while (xo->size) {        struct b_info h;        //   Note: if h.sz_unc == h.sz_cpr then the block was not        //   compressible and is stored in its uncompressed form.        // Read and check block sizes.        xread(xi, (char *)&h, sizeof(h));        if (h.sz_unc == 0) {                     // uncompressed size 0 -> EOF            if (h.sz_cpr != UPX_MAGIC_LE32)      // h.sz_cpr must be h->magic                err_exit(2);            if (xi->size != 0)                 // all bytes must be written                err_exit(3);            break;        }        if (h.sz_cpr <= 0) {            err_exit(4);ERR_LAB        }        if (h.sz_cpr > h.sz_unc        ||  h.sz_unc > xo->size ) {            err_exit(5);        }        // Now we have:        //   assert(h.sz_cpr <= h.sz_unc);        //   assert(h.sz_unc > 0 && h.sz_unc <= blocksize);        //   assert(h.sz_cpr > 0 && h.sz_cpr <= blocksize);        if (h.sz_cpr < h.sz_unc) { // Decompress block            nrv_uint out_len = h.sz_unc;  // EOF for lzma            int const j = (*f_decompress)((unsigned char *)xi->buf, h.sz_cpr,                (unsigned char *)xo->buf, &out_len, *(int *)(void *)&h.b_method );            if (j != 0 || out_len != (nrv_uint)h.sz_unc)                err_exit(7);            xi->buf  += h.sz_cpr;            xi->size -= h.sz_cpr;        }        else { // copy literal block            xread(xi, xo->buf, h.sz_cpr);        }        xo->buf  += h.sz_unc;        xo->size -= h.sz_unc;    }}static voidbzero(char *p, size_t len){    if (len) do {        *p++= 0;    } while (--len);}#define REP8(x) \    ((x)|((x)<<4)|((x)<<8)|((x)<<12)|((x)<<16)|((x)<<20)|((x)<<24)|((x)<<28))#define EXP8(y) \    ((1&(y)) ? 0xf0f0f0f0 : (2&(y)) ? 0xff00ff00 : (4&(y)) ? 0xffff0000 : 0)#define PF_TO_PROT(pf) \          (7 & (( (REP8(PROT_EXEC ) & EXP8(PF_X)) \                 |(REP8(PROT_READ ) & EXP8(PF_R)) \                 |(REP8(PROT_WRITE) & EXP8(PF_W)) ) \               >> ((pf & (PF_R|PF_W|PF_X))<<2) ))// Find convex hull of PT_LOAD (the minimal interval which covers all PT_LOAD),// and mmap that much, to be sure that a kernel using exec-shield-randomize// won't place the first piece in a way that leaves no room for the rest.static unsigned long  // returns relocation constant__attribute__((regparm(3), stdcall))xfind_pages(unsigned mflags, Elf32_Phdr const *phdr, int phnum){    size_t lo= ~0, hi= 0, szlo= 0;    char *addr;    mflags += MAP_PRIVATE | MAP_ANONYMOUS;  // '+' can optimize better than '|'    for (; --phnum>=0; ++phdr) if (PT_LOAD==phdr->p_type) {        if (phdr->p_vaddr < lo) {            lo = phdr->p_vaddr;            szlo = phdr->p_filesz;        }        if (hi < (phdr->p_memsz + phdr->p_vaddr)) {            hi =  phdr->p_memsz + phdr->p_vaddr;        }    }    if (MAP_FIXED & mflags) { // the "shell", and not the PT_INTERP        // This is a dirty hack to set the proper value for brk(0) as seen by        // the "shell" which we will mmap() soon, upon return to do_xmap().        // It depends on our own brk() starting out at 0x08048000, which is the        // default base address used by /bin/ld for an ET_EXEC.  We must brk()        // now.  If we wait until after mmap() of shell pages, then the kernel        // "vma" containing our original brk() of 0x08048000 will not be contiguous        // with  hi  [the mmap'ed pages from the shell will be in between],        // and various linux kernels will not move the brk() in this case;        // the typical symptom is SIGSEGV early in ld-linux.so.2 (the PT_INTERP).        do_brk((void *)hi);    }    szlo += ~PAGE_MASK & lo;  // page fragment on lo edge    lo   -= ~PAGE_MASK & lo;  // round down to page boundary    hi    =  PAGE_MASK & (hi - lo - PAGE_MASK -1);  // page length    szlo  =  PAGE_MASK & (szlo    - PAGE_MASK -1);  // page length    addr = mmap((void *)lo, hi, PROT_READ|PROT_WRITE|PROT_EXEC, mflags, -1, 0);    // Doing this may destroy the brk() that we set so carefully above.    // The munmap() is "needed" only for discontiguous PT_LOAD,    // and neither shells nor ld-linux.so.2 have that.    // munmap(szlo + addr, hi - szlo);    return (unsigned long)addr - lo;}// This do_xmap() has no Extent *xi input because it doesn't decompress anything;// it only maps the shell and its PT_INTERP.  So, it was specialized by hand// to reduce compiled instruction size.  gcc 2.91.66 does not notice that// there is only one call to this static function (from getexec(), which// would specify 0 for xi), so gcc does not propagate the constant parameter.// Notice there is no make_hatch(), either.static Elf32_Addr  // entry addressdo_xmap(int const fdi, Elf32_Ehdr const *const ehdr, Elf32_auxv_t *const av){    Elf32_Phdr const *phdr = (Elf32_Phdr const *) (ehdr->e_phoff +        (char const *)ehdr);    unsigned long const reloc = xfind_pages(        ((ET_DYN!=ehdr->e_type) ? MAP_FIXED : 0), phdr, ehdr->e_phnum);    int j;    for (j=0; j < ehdr->e_phnum; ++phdr, ++j)    if (PT_PHDR==phdr->p_type) {        av[AT_PHDR -1].a_un.a_val = phdr->p_vaddr;    }    else if (PT_LOAD==phdr->p_type) {        unsigned const prot = PF_TO_PROT(phdr->p_flags);        struct Extent xo;        size_t mlen = xo.size = phdr->p_filesz;        char  *addr = xo.buf  =                 (char *)phdr->p_vaddr;        char *haddr =           phdr->p_memsz +                  addr;        size_t frag  = (int)addr &~ PAGE_MASK;        mlen += frag;        addr -= frag;        addr  += reloc;        haddr += reloc;        // Decompressor can overrun the destination by 3 bytes.        if (addr != mmap(addr, mlen, PROT_READ | PROT_WRITE,                MAP_FIXED | MAP_PRIVATE,                fdi, phdr->p_offset - frag) ) {            err_exit(8);        }        bzero(addr, frag);  // fragment at lo end        frag = (-mlen) &~ PAGE_MASK;  // distance to next page boundary        bzero(mlen+addr, frag);  // fragment at hi end        if (0!=mprotect(addr, mlen, prot)) {            err_exit(10);ERR_LAB        }        addr += mlen + frag;  /* page boundary on hi end */        if (addr < haddr) { // need pages for .bss            if (addr != mmap(addr, haddr - addr, prot,                    MAP_FIXED | MAP_PRIVATE | MAP_ANONYMOUS, -1, 0 ) ) {                err_exit(9);            }        }    }    if (0!=close(fdi)) {        err_exit(11);    }    return ehdr->e_entry + reloc;}static Elf32_Addr  // entry addressgetexec(char const *const fname, Elf32_Ehdr *const ehdr, Elf32_auxv_t *const av){    int const fdi = open(fname, O_RDONLY, 0);    if (0 > fdi) {        err_exit(18);ERR_LAB    }    if (MAX_ELF_HDR!=read(fdi, (void *)ehdr, MAX_ELF_HDR)) {        err_exit(19);    }    return do_xmap(fdi, ehdr, av);}/*************************************************************************// upx_main - called by our entry code//// This function is optimized for size.**************************************************************************/void *upx_main(    Elf32_auxv_t *const av,    unsigned const junk,    f_expand *const f_decompress,    Elf32_Ehdr *const ehdr,  // temp char[MAX_ELF_HDR]    struct Extent xi,    struct Extent xo) __asm__("upx_main");void *upx_main(    Elf32_auxv_t *const av,    unsigned const junk,    f_expand *const f_decompress,    Elf32_Ehdr *const ehdr,  // temp char[MAX_ELF_HDR]    struct Extent xi,    struct Extent xo){        // 'fn' and 'efn' must not suffer constant-propagation by gcc        // UPX2 = offset to name_of_shell        // UPX3 = strlen(name_of_shell)    char * /*const*/ volatile  fn = UPX2 + xo.buf;  // past "-c" and "#!"    char * /*const*/ volatile efn = UPX3 + fn;  // &terminator    Elf32_Addr entry;    (void)junk;    unpackExtent(&xi, &xo, f_decompress);  {     // Map shell program    char const c = *efn;  *efn = 0;  // terminator    entry = getexec(fn, ehdr, av);    *efn = c;  // replace terminator character    // av[AT_PHDR -1].a_un.a_val  is set again by do_xmap if PT_PHDR is present.    av[AT_PHDR   -1].a_type = AT_PHDR  ; // av[AT_PHDR-1].a_un.a_val  is set by do_xmap    av[AT_PHENT  -1].a_type = AT_PHENT ; av[AT_PHENT  -1].a_un.a_val = ehdr->e_phentsize;    av[AT_PHNUM  -1].a_type = AT_PHNUM ; av[AT_PHNUM  -1].a_un.a_val = ehdr->e_phnum;    av[AT_PAGESZ -1].a_type = AT_PAGESZ; av[AT_PAGESZ -1].a_un.a_val = PAGE_SIZE;    av[AT_ENTRY  -1].a_type = AT_ENTRY ; av[AT_ENTRY  -1].a_un.a_val = entry;  }  { // Map PT_INTERP program interpreter    Elf32_Phdr const *phdr = (Elf32_Phdr *)(1+ehdr);    int j;    for (j=0; j < ehdr->e_phnum; ++phdr, ++j) if (PT_INTERP==phdr->p_type) {        entry = getexec((char const *)phdr->p_vaddr, ehdr, 0);        break;    }  }    return (void *)entry;}/*vi:ts=4:et:nowrap*/

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -