738 lines
36 KiB
C#
738 lines
36 KiB
C#
/*
|
|
Copyright 2017 Perfare - https://github.com/Perfare/Il2CppDumper
|
|
Copyright 2017-2020 Katy Coe - http://www.djkaty.com - https://github.com/djkaty
|
|
|
|
All rights reserved.
|
|
*/
|
|
|
|
using System;
|
|
using System.Collections.Generic;
|
|
using System.IO;
|
|
using System.Linq;
|
|
using System.Reflection;
|
|
using System.Text;
|
|
using NoisyCowStudios.Bin2Object;
|
|
|
|
namespace Il2CppInspector
|
|
{
|
|
internal class ElfReader32 : ElfReader<uint, elf_32_phdr, elf_32_sym, ElfReader32, Convert32>
|
|
{
|
|
public ElfReader32() : base() {
|
|
ElfReloc.GetRelocType = info => (Elf) (info & 0xff);
|
|
ElfReloc.GetSymbolIndex = info => info >> 8;
|
|
}
|
|
|
|
public override int Bits => 32;
|
|
protected override Elf ArchClass => Elf.ELFCLASS32;
|
|
|
|
protected override void WriteWord(uint value) => Write(value);
|
|
}
|
|
|
|
internal class ElfReader64 : ElfReader<ulong, elf_64_phdr, elf_64_sym, ElfReader64, Convert64>
|
|
{
|
|
public ElfReader64() : base() {
|
|
ElfReloc.GetRelocType = info => (Elf) (info & 0xffff_ffff);
|
|
ElfReloc.GetSymbolIndex = info => info >> 32;
|
|
}
|
|
|
|
public override int Bits => 64;
|
|
protected override Elf ArchClass => Elf.ELFCLASS64;
|
|
|
|
protected override void WriteWord(ulong value) => Write(value);
|
|
}
|
|
|
|
interface IElfReader
|
|
{
|
|
uint GetPLTAddress();
|
|
}
|
|
|
|
internal abstract class ElfReader<TWord, TPHdr, TSym, TReader, TConvert> : FileFormatStream<TReader>, IElfReader
|
|
where TWord : struct
|
|
where TPHdr : Ielf_phdr<TWord>, new()
|
|
where TSym : Ielf_sym<TWord>, new()
|
|
where TConvert : IWordConverter<TWord>, new()
|
|
where TReader : FileFormatStream<TReader>
|
|
{
|
|
private readonly TConvert conv = new TConvert();
|
|
|
|
// Internal relocation entry helper
|
|
protected class ElfReloc
|
|
{
|
|
public Elf Type;
|
|
public TWord Offset;
|
|
public TWord? Addend;
|
|
public TWord SymbolTable;
|
|
public TWord SymbolIndex;
|
|
|
|
// Equality based on target address
|
|
public override bool Equals(object obj) => obj is ElfReloc reloc && Equals(reloc);
|
|
|
|
public bool Equals(ElfReloc other) {
|
|
return Offset.Equals(other.Offset);
|
|
}
|
|
|
|
public override int GetHashCode() => Offset.GetHashCode();
|
|
|
|
// Cast operators (makes the below code MUCH easier to read)
|
|
public ElfReloc(elf_rel<TWord> rel, TWord symbolTable) {
|
|
Offset = rel.r_offset;
|
|
Addend = null;
|
|
Type = GetRelocType(rel.r_info);
|
|
SymbolIndex = GetSymbolIndex(rel.r_info);
|
|
SymbolTable = symbolTable;
|
|
}
|
|
|
|
public ElfReloc(elf_rela<TWord> rela, TWord symbolTable)
|
|
: this(new elf_rel<TWord> { r_info = rela.r_info, r_offset = rela.r_offset }, symbolTable) =>
|
|
Addend = rela.r_addend;
|
|
|
|
public static Func<TWord, Elf> GetRelocType;
|
|
public static Func<TWord, TWord> GetSymbolIndex;
|
|
}
|
|
|
|
// See also: https://docs.microsoft.com/en-us/dotnet/csharp/language-reference/operators/sizeof
|
|
private int Sizeof(Type type) {
|
|
int size = 0;
|
|
foreach (var i in type.GetTypeInfo().GetFields()) {
|
|
if (i.FieldType == typeof(byte) || i.FieldType == typeof(sbyte))
|
|
size += sizeof(byte);
|
|
if (i.FieldType == typeof(long) || i.FieldType == typeof(ulong))
|
|
size += sizeof(ulong);
|
|
if (i.FieldType == typeof(int) || i.FieldType == typeof(uint))
|
|
size += sizeof(uint);
|
|
if (i.FieldType == typeof(short) || i.FieldType == typeof(ushort))
|
|
size += sizeof(ushort);
|
|
}
|
|
return size;
|
|
}
|
|
|
|
private TPHdr[] program_header_table;
|
|
private elf_shdr<TWord>[] section_header_table;
|
|
private elf_dynamic<TWord>[] dynamic_table;
|
|
private elf_header<TWord> elf_header;
|
|
private Dictionary<string, elf_shdr<TWord>> sectionByName = new Dictionary<string, elf_shdr<TWord>>();
|
|
private List<(uint Start, uint End)> reverseMapExclusions = new List<(uint Start, uint End)>();
|
|
private bool preferPHT = false;
|
|
private bool isMemoryImage = false;
|
|
|
|
public override string DefaultFilename => "libil2cpp.so";
|
|
|
|
public override string Format => Bits == 32 ? "ELF" : "ELF64";
|
|
|
|
public override string Arch => (Elf) elf_header.e_machine switch {
|
|
Elf.EM_386 => "x86",
|
|
Elf.EM_ARM => "ARM",
|
|
Elf.EM_X86_64 => "x64",
|
|
Elf.EM_AARCH64 => "ARM64",
|
|
_ => "Unsupported"
|
|
};
|
|
|
|
public override int Bits => (elf_header.m_arch == (uint) Elf.ELFCLASS64) ? 64 : 32;
|
|
|
|
private elf_shdr<TWord> getSection(Elf sectionIndex) => section_header_table.FirstOrDefault(x => x.sh_type == (uint) sectionIndex);
|
|
private IEnumerable<elf_shdr<TWord>> getSections(Elf sectionIndex) => section_header_table.Where(x => x.sh_type == (uint) sectionIndex);
|
|
private TPHdr getProgramHeader(Elf programIndex) => program_header_table.FirstOrDefault(x => x.p_type == (uint) programIndex);
|
|
private elf_dynamic<TWord> getDynamic(Elf dynamicIndex) => dynamic_table?.FirstOrDefault(x => (Elf) conv.ULong(x.d_tag) == dynamicIndex);
|
|
|
|
private Dictionary<string, Symbol> symbolTable = new Dictionary<string, Symbol>();
|
|
private List<Export> exports = new List<Export>();
|
|
|
|
protected abstract Elf ArchClass { get; }
|
|
|
|
protected abstract void WriteWord(TWord value);
|
|
|
|
protected override bool Init() {
|
|
elf_header = ReadObject<elf_header<TWord>>();
|
|
|
|
// Check for magic bytes
|
|
if ((Elf) elf_header.m_dwFormat != Elf.ELFMAG)
|
|
return false;
|
|
|
|
// Ensure supported architecture
|
|
if ((Elf) elf_header.m_arch != ArchClass)
|
|
return false;
|
|
|
|
// Get PHT and SHT
|
|
program_header_table = ReadArray<TPHdr>(conv.Long(elf_header.e_phoff), elf_header.e_phnum);
|
|
section_header_table = ReadArray<elf_shdr<TWord>>(conv.Long(elf_header.e_shoff), elf_header.e_shnum);
|
|
|
|
// Determine if SHT is valid
|
|
|
|
// These can happen as a result of conversions from other formats to ELF,
|
|
// or if the SHT has been deliberately stripped
|
|
if (!section_header_table.Any()) {
|
|
Console.WriteLine("ELF binary has no SHT - reverting to PHT");
|
|
preferPHT = true;
|
|
}
|
|
|
|
else if (section_header_table.All(s => conv.ULong(s.sh_addr) == 0ul)) {
|
|
Console.WriteLine("ELF binary SHT is all-zero - reverting to PHT");
|
|
preferPHT = true;
|
|
}
|
|
|
|
// Check for overlaps in sections that are memory-allocated on load
|
|
else {
|
|
var shtShouldBeOrdered = section_header_table
|
|
.Where(s => ((Elf) conv.Int(s.sh_flags) & Elf.SHF_ALLOC) == Elf.SHF_ALLOC)
|
|
.OrderBy(s => s.sh_addr)
|
|
.Select(s => new[] { conv.ULong(s.sh_addr), conv.ULong(s.sh_addr) + conv.ULong(s.sh_size) })
|
|
.SelectMany(s => s);
|
|
|
|
// No sections that map into memory - this is probably a dumped image
|
|
if (!shtShouldBeOrdered.Any()) {
|
|
|
|
// If the first file offset of the first PHT is zero, assume a dumped image
|
|
if (program_header_table.Any(t => conv.ULong(t.p_vaddr) == 0ul)) {
|
|
Console.WriteLine("ELF binary appears to be a dumped memory image");
|
|
isMemoryImage = true;
|
|
}
|
|
preferPHT = true;
|
|
}
|
|
|
|
// Sections overlap - this can happen if the ELF has been improperly generated or processed by another tool
|
|
else {
|
|
var shtOverlap = shtShouldBeOrdered.Aggregate((x, y) => x <= y? y : ulong.MaxValue) == ulong.MaxValue;
|
|
if (shtOverlap) {
|
|
Console.WriteLine("ELF binary SHT contains invalid ranges - reverting to PHT");
|
|
preferPHT = true;
|
|
}
|
|
}
|
|
}
|
|
|
|
// Dumped images must be rebased
|
|
if (isMemoryImage) {
|
|
if (LoadOptions.ImageBase == 0xffffffff_ffffffff)
|
|
throw new InvalidOperationException("To load a dumped ELF image, you must specify the image base virtual address");
|
|
|
|
rebase(conv.FromULong(LoadOptions.ImageBase));
|
|
}
|
|
|
|
// Get dynamic table if it exists (must be done after rebasing)
|
|
if (getProgramHeader(Elf.PT_DYNAMIC) is TPHdr PT_DYNAMIC)
|
|
dynamic_table = ReadArray<elf_dynamic<TWord>>(conv.Long(PT_DYNAMIC.p_offset), (int) (conv.Long(PT_DYNAMIC.p_filesz) / Sizeof(typeof(elf_dynamic<TWord>))));
|
|
|
|
// Get offset of code section
|
|
var codeSegment = program_header_table.First(x => ((Elf) x.p_flags & Elf.PF_X) == Elf.PF_X);
|
|
GlobalOffset = conv.ULong(conv.Sub(codeSegment.p_vaddr, codeSegment.p_offset));
|
|
|
|
// Nothing more to do if the image is a memory dump (no section names, relocations or decryption)
|
|
if (isMemoryImage)
|
|
return true;
|
|
|
|
// Get section name mappings if there are any
|
|
// This is currently only used to defeat the XOR obfuscation handled below
|
|
// Note: There can be more than one section with the same name, or unnamed; we take the first section with a given name
|
|
if (elf_header.e_shtrndx < section_header_table.Length) {
|
|
var pStrtab = section_header_table[elf_header.e_shtrndx].sh_offset;
|
|
foreach (var section in section_header_table) {
|
|
try {
|
|
var name = ReadNullTerminatedString(conv.Long(pStrtab) + section.sh_name);
|
|
sectionByName.TryAdd(name, section);
|
|
} catch (ArgumentOutOfRangeException) {
|
|
// Names have been stripped, maybe previously dumped image
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
// Find all relocations; target address => (rela header (rels are converted to rela), symbol table base address, is rela?)
|
|
var rels = new HashSet<ElfReloc>();
|
|
|
|
StatusUpdate("Finding relocations");
|
|
|
|
// Two types: add value from offset in image, and add value from specified addend
|
|
foreach (var relSection in getSections(Elf.SHT_REL)) {
|
|
reverseMapExclusions.Add(((uint) conv.Int(relSection.sh_offset), (uint) (conv.Int(relSection.sh_offset) + conv.Int(relSection.sh_size) - 1)));
|
|
rels.UnionWith(
|
|
from rel in ReadArray<elf_rel<TWord>>(conv.Long(relSection.sh_offset), conv.Int(conv.Div(relSection.sh_size, relSection.sh_entsize)))
|
|
select new ElfReloc(rel, section_header_table[relSection.sh_link].sh_offset));
|
|
}
|
|
|
|
foreach (var relaSection in getSections(Elf.SHT_RELA)) {
|
|
reverseMapExclusions.Add(((uint) conv.Int(relaSection.sh_offset), (uint) (conv.Int(relaSection.sh_offset) + conv.Int(relaSection.sh_size) - 1)));
|
|
rels.UnionWith(
|
|
from rela in ReadArray<elf_rela<TWord>>(conv.Long(relaSection.sh_offset), conv.Int(conv.Div(relaSection.sh_size, relaSection.sh_entsize)))
|
|
select new ElfReloc(rela, section_header_table[relaSection.sh_link].sh_offset));
|
|
}
|
|
|
|
// Relocations in dynamic section
|
|
if (getDynamic(Elf.DT_REL) is elf_dynamic<TWord> dt_rel) {
|
|
var dt_rel_count = conv.Int(conv.Div(getDynamic(Elf.DT_RELSZ).d_un, getDynamic(Elf.DT_RELENT).d_un));
|
|
var dt_item_size = Sizeof(typeof(elf_rel<TWord>));
|
|
var dt_start = MapVATR(conv.ULong(dt_rel.d_un));
|
|
var dt_rel_list = ReadArray<elf_rel<TWord>>(dt_start, dt_rel_count);
|
|
var dt_symtab = getDynamic(Elf.DT_SYMTAB).d_un;
|
|
reverseMapExclusions.Add((dt_start, (uint) (dt_start + dt_rel_count * dt_item_size - 1)));
|
|
rels.UnionWith(from rel in dt_rel_list select new ElfReloc(rel, dt_symtab));
|
|
}
|
|
|
|
if (getDynamic(Elf.DT_RELA) is elf_dynamic<TWord> dt_rela) {
|
|
var dt_rela_count = conv.Int(conv.Div(getDynamic(Elf.DT_RELASZ).d_un, getDynamic(Elf.DT_RELAENT).d_un));
|
|
var dt_item_size = Sizeof(typeof(elf_rela<TWord>));
|
|
var dt_start = MapVATR(conv.ULong(dt_rela.d_un));
|
|
var dt_rela_list = ReadArray<elf_rela<TWord>>(dt_start, dt_rela_count);
|
|
var dt_symtab = getDynamic(Elf.DT_SYMTAB).d_un;
|
|
reverseMapExclusions.Add((dt_start, (uint) (dt_start + dt_rela_count * dt_item_size - 1)));
|
|
rels.UnionWith(from rela in dt_rela_list select new ElfReloc(rela, dt_symtab));
|
|
}
|
|
|
|
// Process relocations
|
|
var relsz = Sizeof(typeof(TSym));
|
|
|
|
var currentRel = 0;
|
|
var totalRel = rels.Count();
|
|
|
|
foreach (var rel in rels) {
|
|
currentRel++;
|
|
if (currentRel % 1000 == 0)
|
|
StatusUpdate($"Processing relocations ({currentRel * 100 / totalRel:F0}%)");
|
|
|
|
var symValue = ReadObject<TSym>(conv.Long(rel.SymbolTable) + conv.Long(rel.SymbolIndex) * relsz).st_value; // S
|
|
|
|
// Ignore relocations into memory addresses not mapped from the image
|
|
try {
|
|
Position = MapVATR(conv.ULong(rel.Offset));
|
|
}
|
|
catch (InvalidOperationException) {
|
|
continue;
|
|
}
|
|
|
|
// The addend is specified in the struct for rela, and comes from the target location for rel
|
|
var addend = rel.Addend ?? ReadObject<TWord>(); // A
|
|
|
|
// Only handle relocation types we understand, skip the rest
|
|
// Relocation types from https://docs.oracle.com/cd/E23824_01/html/819-0690/chapter6-54839.html#scrolltoc
|
|
// and https://studfiles.net/preview/429210/page:18/
|
|
// and http://infocenter.arm.com/help/topic/com.arm.doc.ihi0056b/IHI0056B_aaelf64.pdf (AArch64)
|
|
(TWord newValue, bool recognized) result = (rel.Type, (Elf) elf_header.e_machine) switch {
|
|
(Elf.R_ARM_ABS32, Elf.EM_ARM) => (conv.Add(symValue, addend), true), // S + A
|
|
(Elf.R_ARM_REL32, Elf.EM_ARM) => (conv.Add(conv.Sub(symValue, rel.Offset), addend), true), // S - P + A
|
|
(Elf.R_ARM_COPY, Elf.EM_ARM) => (symValue, true), // S
|
|
|
|
(Elf.R_AARCH64_ABS64, Elf.EM_AARCH64) => (conv.Add(symValue, addend), true), // S + A
|
|
(Elf.R_AARCH64_PREL64, Elf.EM_AARCH64) => (conv.Sub(conv.Add(symValue, addend), rel.Offset), true), // S + A - P
|
|
(Elf.R_AARCH64_GLOB_DAT, Elf.EM_AARCH64) => (conv.Add(symValue, addend), true), // S + A
|
|
(Elf.R_AARCH64_JUMP_SLOT, Elf.EM_AARCH64) => (conv.Add(symValue, addend), true), // S + A
|
|
(Elf.R_AARCH64_RELATIVE, Elf.EM_AARCH64) => (conv.Add(symValue, addend), true), // Delta(S) + A
|
|
|
|
(Elf.R_386_32, Elf.EM_386) => (conv.Add(symValue, addend), true), // S + A
|
|
(Elf.R_386_PC32, Elf.EM_386) => (conv.Sub(conv.Add(symValue, addend), rel.Offset), true), // S + A - P
|
|
(Elf.R_386_GLOB_DAT, Elf.EM_386) => (symValue, true), // S
|
|
(Elf.R_386_JMP_SLOT, Elf.EM_386) => (symValue, true), // S
|
|
|
|
(Elf.R_AMD64_64, Elf.EM_AARCH64) => (conv.Add(symValue, addend), true), // S + A
|
|
|
|
_ => (default(TWord), false)
|
|
};
|
|
|
|
if (result.recognized) {
|
|
Position = MapVATR(conv.ULong(rel.Offset));
|
|
WriteWord(result.newValue);
|
|
}
|
|
}
|
|
Console.WriteLine($"Processed {rels.Count} relocations");
|
|
|
|
// Detect and defeat various kinds of XOR encryption
|
|
StatusUpdate("Detecting encryption");
|
|
|
|
if (getDynamic(Elf.DT_INIT) != null && sectionByName.ContainsKey(".rodata")) {
|
|
// Use the data section to determine some possible keys
|
|
// If the data section uses striped encryption, bucketing the whole section will not give the correct key
|
|
var roDataBytes = ReadBytes(conv.Long(sectionByName[".rodata"].sh_offset), conv.Int(sectionByName[".rodata"].sh_size));
|
|
var xorKeyCandidateStriped = roDataBytes.Take(1024).GroupBy(b => b).OrderByDescending(f => f.Count()).First().Key;
|
|
var xorKeyCandidateFull = roDataBytes.GroupBy(b => b).OrderByDescending(f => f.Count()).First().Key;
|
|
|
|
// Select test nibbles and values for ARM instructions depending on architecture (ARMv7 / AArch64)
|
|
var testValues = new Dictionary<int, (int, int, int, int)> {
|
|
[32] = (8, 28, 0x0, 0xE),
|
|
[64] = (4, 28, 0xE, 0xF)
|
|
};
|
|
|
|
var (armNibbleB, armNibbleT, armValueB, armValueT) = testValues[Bits];
|
|
|
|
var instructionsToTest = 256;
|
|
|
|
// This gives us an idea of whether the code might be encrypted
|
|
var textFirstDWords = ReadArray<uint>(conv.Long(sectionByName[".text"].sh_offset), instructionsToTest);
|
|
var bottom = textFirstDWords.Select(w => (w >> armNibbleB) & 0xF).GroupBy(n => n).OrderByDescending(f => f.Count()).First().Key;
|
|
var top = textFirstDWords.Select(w => w >> armNibbleT).GroupBy(n => n).OrderByDescending(f => f.Count()).First().Key;
|
|
var xorKeyCandidateFromCode = (byte) (((top ^ armValueT) << 4) | (bottom ^ armValueB));
|
|
|
|
// If the first part of the data section is encrypted, proceed
|
|
if (xorKeyCandidateStriped != 0x00) {
|
|
|
|
// Some files may use a striped encryption whereby alternate blocks are encrypted and un-encrypted
|
|
// The first part of each section is always encrypted.
|
|
|
|
// We refer to issue #96 where the code uses striped encryption in 4KB blocks
|
|
// We perform heuristics for block of size blockSize below
|
|
const int blockSize = 0x100;
|
|
const int maxBrokenRun = 4;
|
|
const int minMultiplierInValid = 6;
|
|
const int minTotalValidInBucket = 0x10;
|
|
|
|
// Take all of the instructions from the code section starting on a VA block boundary and determine which are valid
|
|
var startSkip = 0;
|
|
if (conv.Int(sectionByName[".text"].sh_addr) % blockSize != 0)
|
|
startSkip = blockSize - conv.Int(sectionByName[".text"].sh_addr) % blockSize;
|
|
|
|
var insts = ReadArray<uint>(conv.Long(sectionByName[".text"].sh_offset) + startSkip, (conv.Int(sectionByName[".text"].sh_size) - startSkip) / 4);
|
|
var instsValid = insts.Select(i => Bits == 32? isCommonARMv7(i) : isCommonARMv8A(i)).ToList();
|
|
|
|
// Use RLE to produce frequency distribution of number of consecutive valid and invalid instructions,
|
|
// allowing for maxBrokenRun breaks in valid instructions in a row before considering a run to have ended
|
|
var freqValid = new SortedDictionary<int, int>();
|
|
var runLength = 0;
|
|
var brokenRun = 0;
|
|
foreach (var i in instsValid) {
|
|
if (i) {
|
|
runLength = runLength + brokenRun + 1;
|
|
brokenRun = 0;
|
|
} else if (runLength > 0) {
|
|
brokenRun++;
|
|
|
|
if (brokenRun > maxBrokenRun) {
|
|
if (freqValid.ContainsKey(runLength))
|
|
freqValid[runLength]++;
|
|
else
|
|
freqValid[runLength] = 1;
|
|
runLength = 0;
|
|
}
|
|
}
|
|
}
|
|
|
|
// Create a histogram of how often each range of valid instruction counts occurred
|
|
// The uses of 4 refer to the size of an ARM instruction
|
|
var histValid = freqValid.GroupBy(f => f.Key - (f.Key % (blockSize / 4)))
|
|
.Select(f => new {
|
|
Key = f.Key * 4,
|
|
Value = f.Sum(x => x.Value)
|
|
}).ToDictionary(x => x.Key, x => x.Value);
|
|
|
|
// Find first point in the histogram where the number of valid instructions suddenly spikes
|
|
var stripeSize = (uint) histValid.Zip(histValid.Skip(1), (p,c) => (p,c))
|
|
.FirstOrDefault(x => x.c.Value >= x.p.Value * minMultiplierInValid && x.c.Value >= minTotalValidInBucket).c.Key;
|
|
|
|
// Select the key
|
|
|
|
// If more than one key candidates are the same, select the most common candidate
|
|
var keys = new [] { xorKeyCandidateFromCode, xorKeyCandidateStriped, xorKeyCandidateFull };
|
|
var bestKey = keys.GroupBy(k => k).OrderByDescending(k => k.Count()).First();
|
|
var xorKey = bestKey.Key;
|
|
|
|
// Otherwise choose according to striped/full encryption
|
|
if (bestKey.Count() == 1) {
|
|
xorKey = keys.OrderByDescending(k => textFirstDWords.Select(w => w ^ (k << 24) ^ (k << 16) ^ (k << 8) ^ k)
|
|
.Count(w => Bits == 32? isCommonARMv7((uint) w) : isCommonARMv8A((uint) w))).First();
|
|
}
|
|
|
|
StatusUpdate("Decrypting");
|
|
Console.WriteLine($"Performing XOR decryption (key: 0x{xorKey:X2}, stripe size: 0x{stripeSize:X4})");
|
|
|
|
xorSection(".text", xorKey, stripeSize);
|
|
xorSection(".rodata", xorKey, stripeSize);
|
|
|
|
IsModified = true;
|
|
}
|
|
}
|
|
|
|
// Detect more sophisticated packing
|
|
// We have seen several examples (eg. #14 and #26) where most of the file is zeroed
|
|
// and packed data is found in the latter third. So far these files always have zeroed .rodata sections
|
|
if (sectionByName.ContainsKey(".rodata")) {
|
|
var rodataBytes = ReadBytes(conv.Long(sectionByName[".rodata"].sh_offset), conv.Int(sectionByName[".rodata"].sh_size));
|
|
if (rodataBytes.All(b => b == 0x00))
|
|
throw new InvalidOperationException("This IL2CPP binary is packed in a way not currently supported by Il2CppInspector and cannot be loaded.");
|
|
}
|
|
|
|
// Build symbol and export tables
|
|
processSymbols();
|
|
|
|
return true;
|
|
}
|
|
|
|
// https://developer.arm.com/documentation/ddi0406/cb/Application-Level-Architecture/ARM-Instruction-Set-Encoding/ARM-instruction-set-encoding
|
|
private bool isCommonARMv7(uint inst) {
|
|
var cond = inst >> 28; // We'll allow 0x1111 (for BL/BLX), AL, EQ, NE, GE, LT, GT, LE only
|
|
|
|
if (cond != 0b1111 && cond != 0b1110 && cond != 0b0000 && cond != 0b0001 && cond != 0b1010 && cond != 0b1011 && cond != 0b1100 && cond != 0b1101)
|
|
return false;
|
|
|
|
var op1 = (inst >> 25) & 7;
|
|
|
|
// Disallow media instructions
|
|
var op = (inst >> 4) & 1;
|
|
if (op1 == 0b011 && op == 1)
|
|
return false;
|
|
|
|
// Disallow co-processor instructions
|
|
if (op1 == 0b110 || op1 == 0b111)
|
|
return false;
|
|
|
|
// Disallow 0b1111 cond except for BL and BLX
|
|
if (cond == 0b1111) {
|
|
var op1_1 = (inst >> 20) & 0b11111111;
|
|
|
|
if ((op1_1 >> 5) != 0b101)
|
|
return false;
|
|
}
|
|
|
|
// Disallow MSR and other miscellaneous
|
|
if (op == 1) {
|
|
var op1_1 = (inst >> 20) & 0b11111;
|
|
var op2 = (inst >> 4) & 0b1111;
|
|
|
|
if (op1_1 == 0b10010 || op1_1 == 0b10110 || op1_1 == 0b10000 || op1_1 == 0b10100)
|
|
return false;
|
|
|
|
// Disallow synchronization primitives
|
|
if ((op1_1 >> 4) == 1)
|
|
return false;
|
|
}
|
|
|
|
// Probably a common instruction
|
|
return true;
|
|
}
|
|
|
|
// https://montcs.bloomu.edu/Information/ARMv8/ARMv8-A_Architecture_Reference_Manual_(Issue_A.a).pdf
|
|
private bool isCommonARMv8A(uint inst) {
|
|
var op = (inst >> 24) & 0b11111;
|
|
|
|
// Disallow unexpected, SIMD and FP
|
|
if ((op >> 3) == 0 || (op >> 1) == 0b0111 || (op >> 1) == 0b1111)
|
|
return false;
|
|
|
|
// Disallow exception generation and system instructions
|
|
if ((inst >> 24) == 0b11010100 || (inst >> 22) == 0b1101010100)
|
|
return false;
|
|
|
|
// Disallow bitfield and extract
|
|
if (op == 0b10011)
|
|
return false;
|
|
|
|
// Disallow conditional compare and data processing
|
|
if ((op >> 1) == 0b1101)
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
private void xorRange(int offset, int length, byte xorValue) {
|
|
var bytes = ReadBytes(offset, length);
|
|
bytes = bytes.Select(b => (byte) (b ^ xorValue)).ToArray();
|
|
Write(offset, bytes);
|
|
}
|
|
|
|
private void xorSection(string sectionName, byte xorValue, uint stripeSize) {
|
|
var section = sectionByName[sectionName];
|
|
|
|
// First part up to stripe size boundary is always encrypted, first full block is always encrypted
|
|
var start = conv.Int(section.sh_offset);
|
|
var length = conv.Int(section.sh_size);
|
|
|
|
// Non-striped
|
|
if (stripeSize == 0) {
|
|
xorRange(start, length, xorValue);
|
|
return;
|
|
}
|
|
|
|
// Striped
|
|
// The first block's length is the distance to the boundary to the first stripe size + one stripe
|
|
var firstBlockLength = stripeSize;
|
|
if (start % stripeSize != 0)
|
|
firstBlockLength += stripeSize - (uint) (start % stripeSize);
|
|
|
|
xorRange(start, (int) firstBlockLength, xorValue);
|
|
|
|
// Step forward two stripe sizes at a time, decrypting the first and ignoring the second
|
|
for (var pos = start + firstBlockLength + stripeSize; pos < start + length; pos += stripeSize * 2) {
|
|
var size = Math.Min(stripeSize, start + length - pos);
|
|
xorRange((int) pos, (int) size, xorValue);
|
|
}
|
|
}
|
|
|
|
// Rebase the image to a new virtual address
|
|
private void rebase(TWord imageBase) {
|
|
// Rebase PHT
|
|
foreach (var segment in program_header_table) {
|
|
segment.p_offset = segment.p_vaddr;
|
|
segment.p_vaddr = conv.Add(segment.p_vaddr, imageBase);
|
|
segment.p_filesz = segment.p_memsz;
|
|
}
|
|
|
|
// Rewrite to stream
|
|
WriteArray(conv.Long(elf_header.e_phoff), program_header_table);
|
|
IsModified = true;
|
|
|
|
// Rebase dynamic table if it exists
|
|
// Note we have to rebase the PHT first to get the correct location to read this
|
|
if (!(getProgramHeader(Elf.PT_DYNAMIC) is TPHdr PT_DYNAMIC))
|
|
return;
|
|
|
|
var dt = ReadArray<elf_dynamic<TWord>>(conv.Long(PT_DYNAMIC.p_offset), (int) (conv.Long(PT_DYNAMIC.p_filesz) / Sizeof(typeof(elf_dynamic<TWord>))));
|
|
|
|
// Every table containing virtual address pointers
|
|
// https://docs.oracle.com/cd/E19683-01/817-3677/chapter6-42444/index.html
|
|
var tablesToRebase = new [] {
|
|
Elf.DT_PLTGOT, Elf.DT_HASH, Elf.DT_STRTAB, Elf.DT_SYMTAB, Elf.DT_RELA,
|
|
Elf.DT_INIT, Elf.DT_FINI, Elf.DT_REL, Elf.DT_JMPREL, Elf.DT_INIT_ARRAY, Elf.DT_FINI_ARRAY,
|
|
Elf.DT_PREINIT_ARRAY, Elf.DT_MOVETAB, Elf.DT_VERDEF, Elf.DT_VERNEED, Elf.DT_SYMINFO
|
|
};
|
|
|
|
// Rebase dynamic tables
|
|
foreach (var section in dt.Where(x => tablesToRebase.Contains((Elf) conv.ULong(x.d_tag))))
|
|
section.d_un = conv.Add(section.d_un, imageBase);
|
|
|
|
// Rewrite to stream
|
|
WriteArray(conv.Long(PT_DYNAMIC.p_offset), dt);
|
|
}
|
|
|
|
private void processSymbols() {
|
|
StatusUpdate("Processing symbols");
|
|
|
|
// Three possible symbol tables in ELF files
|
|
var pTables = new List<(TWord offset, TWord count, TWord strings)>();
|
|
|
|
// String table (a sequence of null-terminated strings, total length in sh_size
|
|
var SHT_STRTAB = getSection(Elf.SHT_STRTAB);
|
|
|
|
if (SHT_STRTAB != null) {
|
|
// Section header shared object symbol table (.symtab)
|
|
if (getSection(Elf.SHT_SYMTAB) is elf_shdr<TWord> SHT_SYMTAB)
|
|
pTables.Add((SHT_SYMTAB.sh_offset, conv.Div(SHT_SYMTAB.sh_size, SHT_SYMTAB.sh_entsize), SHT_STRTAB.sh_offset));
|
|
|
|
// Section header executable symbol table (.dynsym)
|
|
if (getSection(Elf.SHT_DYNSYM) is elf_shdr<TWord> SHT_DYNSYM)
|
|
pTables.Add((SHT_DYNSYM.sh_offset, conv.Div(SHT_DYNSYM.sh_size, SHT_DYNSYM.sh_entsize), SHT_STRTAB.sh_offset));
|
|
}
|
|
|
|
// Symbol table in dynamic section (DT_SYMTAB)
|
|
// Normally the same as .dynsym except that .dynsym may be removed in stripped binaries
|
|
|
|
// Dynamic string table
|
|
if (getDynamic(Elf.DT_STRTAB) is elf_dynamic<TWord> DT_STRTAB) {
|
|
if (getDynamic(Elf.DT_SYMTAB) is elf_dynamic<TWord> DT_SYMTAB) {
|
|
// Find the next pointer in the dynamic table to calculate the length of the symbol table
|
|
var end = (from x in dynamic_table where conv.Gt(x.d_un, DT_SYMTAB.d_un) orderby x.d_un select x).First().d_un;
|
|
|
|
// Dynamic symbol table
|
|
pTables.Add((
|
|
conv.FromUInt(MapVATR(conv.ULong(DT_SYMTAB.d_un))),
|
|
conv.Div(conv.Sub(end, DT_SYMTAB.d_un), Sizeof(typeof(TSym))),
|
|
DT_STRTAB.d_un
|
|
));
|
|
}
|
|
}
|
|
|
|
// Now iterate through all of the symbol and string tables we found to build a full list
|
|
symbolTable.Clear();
|
|
var exportTable = new Dictionary<string, Export>();
|
|
|
|
foreach (var pTab in pTables) {
|
|
var symbol_table = ReadArray<TSym>(conv.Long(pTab.offset), conv.Int(pTab.count));
|
|
|
|
foreach (var symbol in symbol_table) {
|
|
string name = string.Empty;
|
|
try {
|
|
name = ReadNullTerminatedString(conv.Long(pTab.strings) + symbol.st_name);
|
|
} catch (ArgumentOutOfRangeException) {
|
|
// Name has been stripped, maybe previously dumped image
|
|
continue;
|
|
}
|
|
|
|
var type = symbol.type == Elf.STT_FUNC? SymbolType.Function
|
|
: symbol.type == Elf.STT_OBJECT || symbol.type == Elf.STT_COMMON? SymbolType.Name
|
|
: SymbolType.Unknown;
|
|
|
|
if (symbol.st_shndx == (ushort) Elf.SHN_UNDEF)
|
|
type = SymbolType.Import;
|
|
|
|
// Avoid duplicates
|
|
var symbolItem = new Symbol {Name = name, Type = type, VirtualAddress = conv.ULong(symbol.st_value) };
|
|
symbolTable.TryAdd(name, symbolItem);
|
|
if (symbol.st_shndx != (ushort) Elf.SHN_UNDEF)
|
|
exportTable.TryAdd(name, new Export {Name = symbolItem.DemangledName, VirtualAddress = conv.ULong(symbol.st_value)});
|
|
}
|
|
}
|
|
|
|
exports = exportTable.Values.ToList();
|
|
}
|
|
|
|
public override Dictionary<string, Symbol> GetSymbolTable() => symbolTable;
|
|
public override IEnumerable<Export> GetExports() => exports;
|
|
|
|
public override uint[] GetFunctionTable() {
|
|
// INIT_ARRAY contains a list of pointers to initialization functions (not all functions in the binary)
|
|
// INIT_ARRAYSZ contains the size of INIT_ARRAY
|
|
// INIT_ARRAY is probably broken in dumped images and resaved dumped images
|
|
if (getDynamic(Elf.DT_INIT_ARRAY) == null || getDynamic(Elf.DT_INIT_ARRAYSZ) == null || isMemoryImage)
|
|
return Array.Empty<uint>();
|
|
|
|
var init = MapVATR(conv.ULong(getDynamic(Elf.DT_INIT_ARRAY).d_un));
|
|
var size = getDynamic(Elf.DT_INIT_ARRAYSZ).d_un;
|
|
|
|
var init_array = conv.UIntArray(ReadArray<TWord>(init, conv.Int(size) / (Bits / 8)));
|
|
|
|
// Additionally, check if there is an old-style DT_INIT function and include it in the list if so
|
|
if (getDynamic(Elf.DT_INIT) != null)
|
|
init_array = init_array.Concat(conv.UIntArray(new[] { getDynamic(Elf.DT_INIT).d_un })).ToArray();
|
|
|
|
return init_array.Select(x => MapVATR(x)).ToArray();
|
|
}
|
|
|
|
public override IEnumerable<Section> GetSections() {
|
|
// If the sections have been stripped, use the segment list from the PHT instead
|
|
if (preferPHT)
|
|
return program_header_table.Select(p => new Section {
|
|
VirtualStart = conv.ULong(p.p_vaddr),
|
|
VirtualEnd = conv.ULong(p.p_vaddr) + conv.ULong(p.p_memsz) - 1,
|
|
ImageStart = (uint) conv.Int(p.p_offset),
|
|
ImageEnd = (uint) conv.Int(p.p_offset) + (uint) conv.Int(p.p_filesz) - 1,
|
|
|
|
// Not correct but probably the best we can do
|
|
IsData = ((Elf) p.p_flags & Elf.PF_R) != 0,
|
|
IsExec = ((Elf) p.p_flags & Elf.PF_X) != 0,
|
|
IsBSS = conv.Int(p.p_filesz) == 0,
|
|
|
|
Name = string.Empty
|
|
});
|
|
|
|
// Return sections list
|
|
return section_header_table.Select(s => new Section {
|
|
VirtualStart = conv.ULong(s.sh_addr),
|
|
VirtualEnd = conv.ULong(s.sh_addr) + conv.ULong(s.sh_size) - 1,
|
|
ImageStart = (uint) conv.Int(s.sh_offset),
|
|
ImageEnd = (uint) conv.Int(s.sh_offset) + (uint) conv.Int(s.sh_size) - 1,
|
|
|
|
IsData = ((Elf) conv.Int(s.sh_flags) & Elf.SHF_ALLOC) == Elf.SHF_ALLOC && ((Elf) conv.Int(s.sh_flags) & Elf.SHF_EXECINSTR) == 0 && (Elf) s.sh_type == Elf.SHT_PROGBITS,
|
|
IsExec = ((Elf) conv.Int(s.sh_flags) & Elf.SHF_EXECINSTR) == Elf.SHF_EXECINSTR && (Elf) s.sh_type == Elf.SHT_PROGBITS,
|
|
IsBSS = (Elf) s.sh_type == Elf.SHT_NOBITS,
|
|
|
|
Name = sectionByName.First(sbn => conv.Int(sbn.Value.sh_offset) == conv.Int(s.sh_offset)).Key
|
|
});
|
|
}
|
|
|
|
// Map a virtual address to an offset into the image file. Throws an exception if the virtual address is not mapped into the file.
|
|
// Note if uiAddr is a valid segment but filesz < memsz and the adjusted uiAddr falls between the range of filesz and memsz,
|
|
// an exception will be thrown. This area of memory is assumed to contain all zeroes.
|
|
public override uint MapVATR(ulong uiAddr) {
|
|
// Additions in the argument to MapVATR may cause an overflow which should be discarded for 32-bit files
|
|
if (Bits == 32)
|
|
uiAddr &= 0xffff_ffff;
|
|
var program_header_table = this.program_header_table.First(x => uiAddr >= conv.ULong(x.p_vaddr) && uiAddr <= conv.ULong(conv.Add(x.p_vaddr, x.p_filesz)));
|
|
return (uint) (uiAddr - conv.ULong(conv.Sub(program_header_table.p_vaddr, program_header_table.p_offset)));
|
|
}
|
|
|
|
public override ulong MapFileOffsetToVA(uint offset) {
|
|
// Exclude relocation areas
|
|
if (reverseMapExclusions.Any(r => offset >= r.Start && offset <= r.End))
|
|
throw new InvalidOperationException("Attempt to map to a relocation address");
|
|
|
|
var section = program_header_table.First(x => offset >= conv.Int(x.p_offset) && offset < conv.Int(x.p_offset) + conv.Int(x.p_filesz));
|
|
return conv.ULong(section.p_vaddr) + offset - conv.ULong(section.p_offset);
|
|
}
|
|
|
|
// Get the address of the procedure linkage table (.got.plt) which is needed for some disassemblies
|
|
public uint GetPLTAddress() => (uint) conv.ULong(getDynamic(Elf.DT_PLTGOT).d_un);
|
|
}
|
|
} |