ldrPE.cpp revision 4fce9cd80191fed20a8a14500bf2fe13f56b278e
/* $Id$ */
/** @file
* IPRT - Binary Image Loader, Portable Executable (PE).
*/
/*
* Copyright (C) 2006-2012 Oracle Corporation
*
* This file is part of VirtualBox Open Source Edition (OSE), as
* available from http://www.virtualbox.org. This file is free software;
* you can redistribute it and/or modify it under the terms of the GNU
* General Public License (GPL) as published by the Free Software
* Foundation, in version 2 as it comes in the "COPYING" file of the
* VirtualBox OSE distribution. VirtualBox OSE is distributed in the
* hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
*
* The contents of this file may alternatively be used under the terms
* of the Common Development and Distribution License Version 1.0
* (CDDL) only, as it comes in the "COPYING.CDDL" file of the
* VirtualBox OSE distribution, in which case the provisions of the
* CDDL are applicable instead of those of the GPL.
*
* You may elect to license modified versions of this file under the
* terms and conditions of either the GPL or the CDDL or both.
*/
/*******************************************************************************
* Header Files *
*******************************************************************************/
#define LOG_GROUP RTLOGGROUP_LDR
#include <iprt/ldr.h>
#include "internal/iprt.h"
#include <iprt/assert.h>
#include <iprt/asm.h>
#include <iprt/err.h>
#include <iprt/log.h>
#include <iprt/md5.h>
#include <iprt/mem.h>
#include <iprt/path.h>
#include <iprt/sha.h>
#include <iprt/string.h>
#ifndef IPRT_WITHOUT_LDR_VERIFY
#include <iprt/zero.h>
# include <iprt/crypto/pkcs7.h>
# include <iprt/crypto/spc.h>
# include <iprt/crypto/x509.h>
#endif
#include <iprt/formats/codeview.h>
#include "internal/ldrPE.h"
#include "internal/ldr.h"
/*******************************************************************************
* Defined Constants And Macros *
*******************************************************************************/
/** Converts rva to a type.
* @param pvBits Pointer to base of image bits.
* @param rva Relative virtual address.
* @param type Type.
*/
#define PE_RVA2TYPE(pvBits, rva, type) ((type) ((uintptr_t)pvBits + (uintptr_t)(rva)) )
/** The max size of the security directory. */
#ifdef IN_RING3
# define RTLDRMODPE_MAX_SECURITY_DIR_SIZE _4M
#else
# define RTLDRMODPE_MAX_SECURITY_DIR_SIZE _1M
#endif
/*******************************************************************************
* Structures and Typedefs *
*******************************************************************************/
/**
* The PE loader structure.
*/
typedef struct RTLDRMODPE
{
/** Core module structure. */
RTLDRMODINTERNAL Core;
/** Pointer to internal copy of image bits.
* @todo the reader should take care of this. */
void *pvBits;
/** The offset of the NT headers. */
RTFOFF offNtHdrs;
/** The offset of the first byte after the section table. */
RTFOFF offEndOfHdrs;
/** The machine type (IMAGE_FILE_HEADER::Machine). */
uint16_t u16Machine;
/** The file flags (IMAGE_FILE_HEADER::Characteristics). */
uint16_t fFile;
/** Number of sections (IMAGE_FILE_HEADER::NumberOfSections). */
unsigned cSections;
/** Pointer to an array of the section headers related to the file. */
PIMAGE_SECTION_HEADER paSections;
/** The RVA of the entry point (IMAGE_OPTIONAL_HEADER32::AddressOfEntryPoint). */
RTUINTPTR uEntryPointRVA;
/** The base address of the image at link time (IMAGE_OPTIONAL_HEADER32::ImageBase). */
RTUINTPTR uImageBase;
/** The size of the loaded image (IMAGE_OPTIONAL_HEADER32::SizeOfImage). */
uint32_t cbImage;
/** Size of the header (IMAGE_OPTIONAL_HEADER32::SizeOfHeaders). */
uint32_t cbHeaders;
/** The image timestamp. */
uint32_t uTimestamp;
/** Set if the image is 64-bit, clear if 32-bit. */
bool f64Bit;
/** The import data directory entry. */
IMAGE_DATA_DIRECTORY ImportDir;
/** The base relocation data directory entry. */
IMAGE_DATA_DIRECTORY RelocDir;
/** The export data directory entry. */
IMAGE_DATA_DIRECTORY ExportDir;
/** The debug directory entry. */
IMAGE_DATA_DIRECTORY DebugDir;
/** The security directory entry. */
IMAGE_DATA_DIRECTORY SecurityDir;
/** Offset of the first PKCS \#7 SignedData signature if present. */
uint32_t offPkcs7SignedData;
/** Size of the first PKCS \#7 SignedData. */
uint32_t cbPkcs7SignedData;
/** Copy of the optional header field DllCharacteristics. */
uint16_t fDllCharacteristics;
} RTLDRMODPE;
/** Pointer to the instance data for a PE loader module. */
typedef RTLDRMODPE *PRTLDRMODPE;
/**
* PE Loader module operations.
*
* The PE loader has one operation which is a bit different between 32-bit and 64-bit PE images,
* and for historical and performance reasons have been split into separate functions. Thus the
* PE loader extends the RTLDROPS structure with this one entry.
*/
typedef struct RTLDROPSPE
{
/** The usual ops. */
RTLDROPS Core;
/**
* Resolves all imports.
*
* @returns iprt status code.
* @param pModPe Pointer to the PE loader module structure.
* @param pvBitsR Where to read raw image bits. (optional)
* @param pvBitsW Where to store the imports. The size of this buffer is equal or
* larger to the value returned by pfnGetImageSize().
* @param pfnGetImport The callback function to use to resolve imports (aka unresolved externals).
* @param pvUser User argument to pass to the callback.
*/
DECLCALLBACKMEMBER(int, pfnResolveImports)(PRTLDRMODPE pModPe, const void *pvBitsR, void *pvBitsW, PFNRTLDRIMPORT pfnGetImport, void *pvUser);
/** Dummy entry to make sure we've initialized it all. */
RTUINT uDummy;
} RTLDROPSPE, *PRTLDROPSPE;
/**
* PE hash context union.
*/
typedef union RTLDRPEHASHCTXUNION
{
RTSHA512CONTEXT Sha512;
RTSHA256CONTEXT Sha256;
RTSHA1CONTEXT Sha1;
RTMD5CONTEXT Md5;
} RTLDRPEHASHCTXUNION;
/** Pointer to a PE hash context union. */
typedef RTLDRPEHASHCTXUNION *PRTLDRPEHASHCTXUNION;
/**
* PE hash digests
*/
typedef union RTLDRPEHASHRESUNION
{
uint8_t abSha512[RTSHA512_HASH_SIZE];
uint8_t abSha256[RTSHA256_HASH_SIZE];
uint8_t abSha1[RTSHA1_HASH_SIZE];
uint8_t abMd5[RTMD5_HASH_SIZE];
} RTLDRPEHASHRESUNION;
/** Pointer to a PE hash work set. */
typedef RTLDRPEHASHRESUNION *PRTLDRPEHASHRESUNION;
/**
* Special places to watch out for when hashing a PE image.
*/
typedef struct RTLDRPEHASHSPECIALS
{
uint32_t cbToHash;
uint32_t offCksum;
uint32_t cbCksum;
uint32_t offSecDir;
uint32_t cbSecDir;
uint32_t offEndSpecial;
} RTLDRPEHASHSPECIALS;
/** Pointer to the structure with the special hash places. */
typedef RTLDRPEHASHSPECIALS *PRTLDRPEHASHSPECIALS;
#ifndef IPRT_WITHOUT_LDR_VERIFY
/**
* Parsed signature data.
*/
typedef struct RTLDRPESIGNATURE
{
/** The outer content info wrapper. */
RTCRPKCS7CONTENTINFO ContentInfo;
/** Pointer to the decoded SignedData inside the ContentInfo member. */
PRTCRPKCS7SIGNEDDATA pSignedData;
/** Pointer to the indirect data content. */
PRTCRSPCINDIRECTDATACONTENT pIndData;
/** The digest type employed by the signature. */
RTDIGESTTYPE enmDigest;
/** Pointer to the raw signatures. This is allocated in the continuation of
* this structure to keep things simple. The size is given by the security
* export directory. */
WIN_CERTIFICATE const *pRawData;
/** Hash scratch data. */
RTLDRPEHASHCTXUNION HashCtx;
/** Hash result. */
RTLDRPEHASHRESUNION HashRes;
} RTLDRPESIGNATURE;
/** Pointed to SigneData parsing stat and output. */
typedef RTLDRPESIGNATURE *PRTLDRPESIGNATURE;
#endif
/*******************************************************************************
* Internal Functions *
*******************************************************************************/
static void rtldrPEConvert32BitOptionalHeaderTo64Bit(PIMAGE_OPTIONAL_HEADER64 pOptHdr);
static void rtldrPEConvert32BitLoadConfigTo64Bit(PIMAGE_LOAD_CONFIG_DIRECTORY64 pLoadCfg);
static int rtldrPEApplyFixups(PRTLDRMODPE pModPe, const void *pvBitsR, void *pvBitsW, RTUINTPTR BaseAddress, RTUINTPTR OldBaseAddress);
/**
* Reads a section of a PE image given by RVA + size, using mapped bits if
* available or allocating heap memory and reading from the file.
*
* @returns IPRT status code.
* @param pThis Pointer to the PE loader module structure.
* @param pvBits Read only bits if available. NULL if not.
* @param uRva The RVA to read at.
* @param cbMem The number of bytes to read.
* @param ppvMem Where to return the memory on success (heap or
* inside pvBits).
*/
static int rtldrPEReadPartByRva(PRTLDRMODPE pThis, const void *pvBits, uint32_t uRva, uint32_t cbMem, void const **ppvMem)
{
*ppvMem = NULL;
if (!cbMem)
return VINF_SUCCESS;
/*
* Use bits if we've got some.
*/
if (pvBits)
{
*ppvMem = (uint8_t const *)pvBits + uRva;
return VINF_SUCCESS;
}
if (pThis->pvBits)
{
*ppvMem = (uint8_t const *)pThis->pvBits + uRva;
return VINF_SUCCESS;
}
/*
* Allocate a buffer and read the bits from the file (or whatever).
*/
if (!pThis->Core.pReader)
return VERR_ACCESS_DENIED;
uint8_t *pbMem = (uint8_t *)RTMemAllocZ(cbMem);
if (!pbMem)
return VERR_NO_MEMORY;
*ppvMem = pbMem;
/* Do the reading on a per section base. */
RTFOFF const cbFile = pThis->Core.pReader->pfnSize(pThis->Core.pReader);
for (;;)
{
/* Translate the RVA into a file offset. */
uint32_t offFile = uRva;
uint32_t cbToRead = cbMem;
uint32_t cbToAdv = cbMem;
if (uRva < pThis->paSections[0].VirtualAddress)
{
/* Special header section. */
cbToRead = pThis->paSections[0].VirtualAddress - uRva;
if (cbToRead > cbMem)
cbToRead = cbMem;
cbToAdv = cbToRead;
/* The following capping is an approximation. */
uint32_t offFirstRawData = RT_ALIGN(pThis->cbHeaders, _4K);
if ( pThis->paSections[0].PointerToRawData > 0
&& pThis->paSections[0].SizeOfRawData > 0)
offFirstRawData = pThis->paSections[0].PointerToRawData;
if (offFile > offFirstRawData)
cbToRead = 0;
else if (offFile + cbToRead > offFirstRawData)
cbToRead = offFile + cbToRead - offFirstRawData;
}
else
{
/* Find the matching section and its mapping size. */
uint32_t j = 0;
uint32_t cbMapping = 0;
while (j < pThis->cSections)
{
cbMapping = (j + 1 < pThis->cSections ? pThis->paSections[j + 1].VirtualAddress : pThis->cbImage)
- pThis->paSections[j].VirtualAddress;
if (uRva - pThis->paSections[j].VirtualAddress < cbMapping)
break;
j++;
}
if (j >= cbMapping)
break; /* This shouldn't happen, just return zeros if it does. */
/* Adjust the sizes and calc the file offset. */
if (cbToAdv > cbMapping)
cbToAdv = cbToRead = cbMapping;
if ( pThis->paSections[j].PointerToRawData > 0
&& pThis->paSections[j].SizeOfRawData > 0)
{
offFile = uRva - pThis->paSections[j].VirtualAddress;
if (offFile + cbToRead > pThis->paSections[j].SizeOfRawData)
cbToRead = pThis->paSections[j].SizeOfRawData - offFile;
offFile += pThis->paSections[j].PointerToRawData;
}
else
{
offFile = UINT32_MAX;
cbToRead = 0;
}
}
/* Perform the read after adjusting a little (paranoia). */
if (offFile > cbFile)
cbToRead = 0;
if (cbToRead)
{
if ((RTFOFF)offFile + cbToRead > cbFile)
cbToRead = (uint32_t)(cbFile - (RTFOFF)offFile);
int rc = pThis->Core.pReader->pfnRead(pThis->Core.pReader, pbMem, cbToRead, offFile);
if (RT_FAILURE(rc))
{
RTMemFree((void *)*ppvMem);
*ppvMem = NULL;
return rc;
}
}
/* Advance */
if (cbMem == cbToRead)
break;
cbMem -= cbToRead;
pbMem += cbToRead;
uRva += cbToRead;
}
return VINF_SUCCESS;
}
/**
* Reads a part of a PE file from the file and into a heap block.
*
* @returns IRPT status code.
* @param pThis Pointer to the PE loader module structure..
* @param offFile The file offset.
* @param cbMem The number of bytes to read.
* @param ppvMem Where to return the heap block with the bytes on
* success.
*/
static int rtldrPEReadPartFromFile(PRTLDRMODPE pThis, uint32_t offFile, uint32_t cbMem, void const **ppvMem)
{
*ppvMem = NULL;
if (!cbMem)
return VINF_SUCCESS;
/*
* Allocate a buffer and read the bits from the file (or whatever).
*/
if (!pThis->Core.pReader)
return VERR_ACCESS_DENIED;
uint8_t *pbMem = (uint8_t *)RTMemAlloc(cbMem);
if (!pbMem)
return VERR_NO_MEMORY;
int rc = pThis->Core.pReader->pfnRead(pThis->Core.pReader, pbMem, cbMem, offFile);
if (RT_FAILURE(rc))
{
RTMemFree((void *)*ppvMem);
return rc;
}
*ppvMem = pbMem;
return VINF_SUCCESS;
}
/**
* Reads a part of a PE image into memory one way or another.
*
* Either the RVA or the offFile must be valid. We'll prefer the RVA if
* possible.
*
* @returns IPRT status code.
* @param pThis Pointer to the PE loader module structure.
* @param pvBits Read only bits if available. NULL if not.
* @param uRva The RVA to read at.
* @param offFile The file offset.
* @param cbMem The number of bytes to read.
* @param ppvMem Where to return the memory on success (heap or
* inside pvBits).
*/
static int rtldrPEReadPart(PRTLDRMODPE pThis, const void *pvBits, RTFOFF offFile, RTLDRADDR uRva,
uint32_t cbMem, void const **ppvMem)
{
if (uRva == NIL_RTLDRADDR || uRva > pThis->cbImage)
{
if (offFile < 0 || offFile >= UINT32_MAX)
return VERR_INVALID_PARAMETER;
return rtldrPEReadPartFromFile(pThis, (uint32_t)offFile, cbMem, ppvMem);
}
return rtldrPEReadPartByRva(pThis, pvBits, (uint32_t)uRva, cbMem, ppvMem);
}
/**
* Frees up memory returned by rtldrPEReadPart*.
*
* @param pThis Pointer to the PE loader module structure..
* @param pvBits Read only bits if available. NULL if not..
* @param pvMem The memory we were given by the reader method.
*/
static void rtldrPEFreePart(PRTLDRMODPE pThis, const void *pvBits, void const *pvMem)
{
if (!pvMem)
return;
if (pvBits && (uintptr_t)pvBits - (uintptr_t)pvMem < pThis->cbImage)
return;
if (pThis->pvBits && (uintptr_t)pThis->pvBits - (uintptr_t)pvMem < pThis->cbImage)
return;
RTMemFree((void *)pvMem);
}
/** @copydoc RTLDROPS::pfnGetImageSize */
static DECLCALLBACK(size_t) rtldrPEGetImageSize(PRTLDRMODINTERNAL pMod)
{
PRTLDRMODPE pModPe = (PRTLDRMODPE)pMod;
return pModPe->cbImage;
}
/**
* Reads the image into memory.
*
* @returns iprt status code.
* @param pModPe The PE module.
* @param pvBits Where to store the bits, this buffer is at least pItem->Core.cbImage in size.
*/
static int rtldrPEGetBitsNoImportsNorFixups(PRTLDRMODPE pModPe, void *pvBits)
{
/*
* Both these checks are related to pfnDone().
*/
PRTLDRREADER pReader = pModPe->Core.pReader;
if (!pReader)
{
AssertMsgFailed(("You've called done!\n"));
return VERR_WRONG_ORDER;
}
if (!pvBits)
return VERR_NO_MEMORY;
/*
* Zero everything (could be done per section).
*/
memset(pvBits, 0, pModPe->cbImage);
#ifdef PE_FILE_OFFSET_EQUALS_RVA
/*
* Read the entire image / file.
*/
const RTFOFF cbRawImage = pReader->pfnSize(pReader)
rc = pReader->pfnRead(pReader, pvBits, RT_MIN(pModPe->cbImage, cbRawImage), 0);
if (RT_FAILURE(rc))
Log(("rtldrPE: %s: Reading %#x bytes at offset %#x failed, %Rrc!!! (the entire image)\n",
pReader->pfnLogName(pReader), RT_MIN(pModPe->cbImage, cbRawImage), 0, rc));
#else
/*
* Read the headers.
*/
int rc = pReader->pfnRead(pReader, pvBits, pModPe->cbHeaders, 0);
if (RT_SUCCESS(rc))
{
/*
* Read the sections.
*/
PIMAGE_SECTION_HEADER pSH = pModPe->paSections;
for (unsigned cLeft = pModPe->cSections; cLeft > 0; cLeft--, pSH++)
if (pSH->SizeOfRawData && pSH->Misc.VirtualSize)
{
rc = pReader->pfnRead(pReader, (uint8_t *)pvBits + pSH->VirtualAddress, pSH->SizeOfRawData, pSH->PointerToRawData);
if (RT_FAILURE(rc))
{
Log(("rtldrPE: %s: Reading %#x bytes at offset %#x failed, %Rrc - section #%d '%.*s'!!!\n",
pReader->pfnLogName(pReader), pSH->SizeOfRawData, pSH->PointerToRawData, rc,
pSH - pModPe->paSections, sizeof(pSH->Name), pSH->Name));
break;
}
}
}
else
Log(("rtldrPE: %s: Reading %#x bytes at offset %#x failed, %Rrc!!!\n",
pReader->pfnLogName(pReader), pModPe->cbHeaders, 0, rc));
#endif
return rc;
}
/**
* Reads the bits into the internal buffer pointed to by PRTLDRMODPE::pvBits.
*
* @returns iprt status code.
* @param pModPe The PE module.
*/
static int rtldrPEReadBits(PRTLDRMODPE pModPe)
{
Assert(!pModPe->pvBits);
void *pvBitsW = RTMemAllocZ(pModPe->cbImage);
if (!pvBitsW)
return VERR_NO_MEMORY;
int rc = rtldrPEGetBitsNoImportsNorFixups(pModPe, pvBitsW);
if (RT_SUCCESS(rc))
pModPe->pvBits = pvBitsW;
else
RTMemFree(pvBitsW);
return rc;
}
/** @copydoc RTLDROPS::pfnGetBits */
static DECLCALLBACK(int) rtldrPEGetBits(PRTLDRMODINTERNAL pMod, void *pvBits, RTUINTPTR BaseAddress, PFNRTLDRIMPORT pfnGetImport, void *pvUser)
{
PRTLDRMODPE pModPe = (PRTLDRMODPE)pMod;
/*
* Read the image.
*/
int rc = rtldrPEGetBitsNoImportsNorFixups(pModPe, pvBits);
if (RT_SUCCESS(rc))
{
/*
* Resolve imports.
*/
rc = ((PRTLDROPSPE)pMod->pOps)->pfnResolveImports(pModPe, pvBits, pvBits, pfnGetImport, pvUser);
if (RT_SUCCESS(rc))
{
/*
* Apply relocations.
*/
rc = rtldrPEApplyFixups(pModPe, pvBits, pvBits, BaseAddress, pModPe->uImageBase);
if (RT_SUCCESS(rc))
return rc;
AssertMsgFailed(("Failed to apply fixups. rc=%Rrc\n", rc));
}
else
AssertMsgFailed(("Failed to resolve imports. rc=%Rrc\n", rc));
}
return rc;
}
/** @copydoc RTLDROPSPE::pfnResolveImports */
static DECLCALLBACK(int) rtldrPEResolveImports32(PRTLDRMODPE pModPe, const void *pvBitsR, void *pvBitsW, PFNRTLDRIMPORT pfnGetImport, void *pvUser)
{
/*
* Check if there is actually anything to work on.
*/
if ( !pModPe->ImportDir.VirtualAddress
|| !pModPe->ImportDir.Size)
return 0;
/*
* Walk the IMAGE_IMPORT_DESCRIPTOR table.
*/
int rc = VINF_SUCCESS;
PIMAGE_IMPORT_DESCRIPTOR pImps;
for (pImps = PE_RVA2TYPE(pvBitsR, pModPe->ImportDir.VirtualAddress, PIMAGE_IMPORT_DESCRIPTOR);
!rc && pImps->Name != 0 && pImps->FirstThunk != 0;
pImps++)
{
const char *pszModName = PE_RVA2TYPE(pvBitsR, pImps->Name, const char *);
PIMAGE_THUNK_DATA32 pFirstThunk; /* update this. */
PIMAGE_THUNK_DATA32 pThunk; /* read from this. */
Log3(("RTLdrPE: Import descriptor: %s\n", pszModName));
Log4(("RTLdrPE: OriginalFirstThunk = %#RX32\n"
"RTLdrPE: TimeDateStamp = %#RX32\n"
"RTLdrPE: ForwarderChain = %#RX32\n"
"RTLdrPE: Name = %#RX32\n"
"RTLdrPE: FirstThunk = %#RX32\n",
pImps->u.OriginalFirstThunk, pImps->TimeDateStamp,
pImps->ForwarderChain, pImps->Name, pImps->FirstThunk));
/*
* Walk the thunks table(s).
*/
pFirstThunk = PE_RVA2TYPE(pvBitsW, pImps->FirstThunk, PIMAGE_THUNK_DATA32);
pThunk = pImps->u.OriginalFirstThunk == 0
? PE_RVA2TYPE(pvBitsR, pImps->FirstThunk, PIMAGE_THUNK_DATA32)
: PE_RVA2TYPE(pvBitsR, pImps->u.OriginalFirstThunk, PIMAGE_THUNK_DATA32);
while (!rc && pThunk->u1.Ordinal != 0)
{
RTUINTPTR Value = 0;
if (pThunk->u1.Ordinal & IMAGE_ORDINAL_FLAG32)
{
rc = pfnGetImport(&pModPe->Core, pszModName, NULL, IMAGE_ORDINAL32(pThunk->u1.Ordinal), &Value, pvUser);
Log4((RT_SUCCESS(rc) ? "RTLdrPE: %RTptr #%u\n" : "RTLdrPE: %08RX32 #%u rc=%Rrc\n",
(uint32_t)Value, IMAGE_ORDINAL32(pThunk->u1.Ordinal), rc));
}
else if ( pThunk->u1.Ordinal > 0
&& pThunk->u1.Ordinal < pModPe->cbImage)
{
rc = pfnGetImport(&pModPe->Core, pszModName, PE_RVA2TYPE(pvBitsR, (char*)(uintptr_t)pThunk->u1.AddressOfData + 2, const char *),
~0, &Value, pvUser);
Log4((RT_SUCCESS(rc) ? "RTLdrPE: %RTptr %s\n" : "RTLdrPE: %08RX32 %s rc=%Rrc\n",
(uint32_t)Value, PE_RVA2TYPE(pvBitsR, (char*)(uintptr_t)pThunk->u1.AddressOfData + 2, const char *), rc));
}
else
{
AssertMsgFailed(("bad import data thunk!\n"));
rc = VERR_BAD_EXE_FORMAT;
}
pFirstThunk->u1.Function = (uint32_t)Value;
if (pFirstThunk->u1.Function != Value)
{
AssertMsgFailed(("external symbol address to big!\n"));
rc = VERR_ADDRESS_CONFLICT; /** @todo get me a better error status code. */
}
pThunk++;
pFirstThunk++;
}
}
return rc;
}
/** @copydoc RTLDROPSPE::pfnResolveImports */
static DECLCALLBACK(int) rtldrPEResolveImports64(PRTLDRMODPE pModPe, const void *pvBitsR, void *pvBitsW, PFNRTLDRIMPORT pfnGetImport, void *pvUser)
{
/*
* Check if there is actually anything to work on.
*/
if ( !pModPe->ImportDir.VirtualAddress
|| !pModPe->ImportDir.Size)
return 0;
/*
* Walk the IMAGE_IMPORT_DESCRIPTOR table.
*/
int rc = VINF_SUCCESS;
PIMAGE_IMPORT_DESCRIPTOR pImps;
for (pImps = PE_RVA2TYPE(pvBitsR, pModPe->ImportDir.VirtualAddress, PIMAGE_IMPORT_DESCRIPTOR);
!rc && pImps->Name != 0 && pImps->FirstThunk != 0;
pImps++)
{
const char * pszModName = PE_RVA2TYPE(pvBitsR, pImps->Name, const char *);
PIMAGE_THUNK_DATA64 pFirstThunk; /* update this. */
PIMAGE_THUNK_DATA64 pThunk; /* read from this. */
Log3(("RTLdrPE: Import descriptor: %s\n", pszModName));
Log4(("RTLdrPE: OriginalFirstThunk = %#RX32\n"
"RTLdrPE: TimeDateStamp = %#RX32\n"
"RTLdrPE: ForwarderChain = %#RX32\n"
"RTLdrPE: Name = %#RX32\n"
"RTLdrPE: FirstThunk = %#RX32\n",
pImps->u.OriginalFirstThunk, pImps->TimeDateStamp,
pImps->ForwarderChain, pImps->Name, pImps->FirstThunk));
/*
* Walk the thunks table(s).
*/
pFirstThunk = PE_RVA2TYPE(pvBitsW, pImps->FirstThunk, PIMAGE_THUNK_DATA64);
pThunk = pImps->u.OriginalFirstThunk == 0
? PE_RVA2TYPE(pvBitsR, pImps->FirstThunk, PIMAGE_THUNK_DATA64)
: PE_RVA2TYPE(pvBitsR, pImps->u.OriginalFirstThunk, PIMAGE_THUNK_DATA64);
while (!rc && pThunk->u1.Ordinal != 0)
{
RTUINTPTR Value = 0;
if (pThunk->u1.Ordinal & IMAGE_ORDINAL_FLAG64)
{
rc = pfnGetImport(&pModPe->Core, pszModName, NULL, (unsigned)IMAGE_ORDINAL64(pThunk->u1.Ordinal), &Value, pvUser);
Log4((RT_SUCCESS(rc) ? "RTLdrPE: %016RX64 #%u\n" : "RTLdrPE: %016RX64 #%u rc=%Rrc\n",
(uint64_t)Value, (unsigned)IMAGE_ORDINAL64(pThunk->u1.Ordinal), rc));
}
else if ( pThunk->u1.Ordinal > 0
&& pThunk->u1.Ordinal < pModPe->cbImage)
{
/** @todo add validation of the string pointer! */
rc = pfnGetImport(&pModPe->Core, pszModName, PE_RVA2TYPE(pvBitsR, (uintptr_t)pThunk->u1.AddressOfData + 2, const char *),
~0, &Value, pvUser);
Log4((RT_SUCCESS(rc) ? "RTLdrPE: %016RX64 %s\n" : "RTLdrPE: %016RX64 %s rc=%Rrc\n",
(uint64_t)Value, PE_RVA2TYPE(pvBitsR, (uintptr_t)pThunk->u1.AddressOfData + 2, const char *), rc));
}
else
{
AssertMsgFailed(("bad import data thunk!\n"));
rc = VERR_BAD_EXE_FORMAT;
}
pFirstThunk->u1.Function = Value;
pThunk++;
pFirstThunk++;
}
}
return rc;
}
/**
* Applies fixups.
*/
static int rtldrPEApplyFixups(PRTLDRMODPE pModPe, const void *pvBitsR, void *pvBitsW, RTUINTPTR BaseAddress, RTUINTPTR OldBaseAddress)
{
if ( !pModPe->RelocDir.VirtualAddress
|| !pModPe->RelocDir.Size)
return 0;
/*
* Apply delta fixups iterating fixup chunks.
*/
PIMAGE_BASE_RELOCATION pbr = PE_RVA2TYPE(pvBitsR, pModPe->RelocDir.VirtualAddress, PIMAGE_BASE_RELOCATION);
PIMAGE_BASE_RELOCATION pBaseRelocs = pbr;
unsigned cbBaseRelocs = pModPe->RelocDir.Size;
RTUINTPTR uDelta = BaseAddress - OldBaseAddress;
Log2(("RTLdrPE: Fixups: uDelta=%#RTptr BaseAddress=%#RTptr OldBaseAddress=%#RTptr\n", uDelta, BaseAddress, OldBaseAddress));
Log4(("RTLdrPE: BASERELOC: VirtualAddres=%RX32 Size=%RX32\n", pModPe->RelocDir.VirtualAddress, pModPe->RelocDir.Size));
Assert(sizeof(*pbr) == sizeof(uint32_t) * 2);
while ( (uintptr_t)pbr - (uintptr_t)pBaseRelocs + 8 < cbBaseRelocs /* 8= VirtualAddress and SizeOfBlock members */
&& pbr->SizeOfBlock >= 8)
{
uint16_t *pwoffFixup = (uint16_t *)(pbr + 1);
uint32_t cRelocations = (pbr->SizeOfBlock - sizeof(IMAGE_BASE_RELOCATION)) / sizeof(uint16_t);
Log3(("RTLdrPE: base relocs for %#010x, size %#06x (%d relocs)\n", pbr->VirtualAddress, pbr->SizeOfBlock, cRelocations));
/* Some bound checking just to be sure it works... */
if ((uintptr_t)pbr - (uintptr_t)pBaseRelocs + pbr->SizeOfBlock > cbBaseRelocs)
cRelocations = (uint32_t)( (((uintptr_t)pBaseRelocs + cbBaseRelocs) - (uintptr_t)pbr - sizeof(IMAGE_BASE_RELOCATION))
/ sizeof(uint16_t) );
/*
* Loop thru the fixups in this chunk.
*/
while (cRelocations != 0)
{
/*
* Common fixup
*/
static const char * const s_apszReloc[16] =
{
"ABS", "HIGH", "LOW", "HIGHLOW", "HIGHADJ", "MIPS_JMPADDR", "RES6", "RES7",
"RES8", "IA64_IMM64", "DIR64", "HIGH3ADJ", "RES12", "RES13", "RES14", "RES15"
}; NOREF(s_apszReloc);
union
{
uint16_t *pu16;
uint32_t *pu32;
uint64_t *pu64;
} u;
const int offFixup = *pwoffFixup & 0xfff;
u.pu32 = PE_RVA2TYPE(pvBitsW, offFixup + pbr->VirtualAddress, uint32_t *);
const int fType = *pwoffFixup >> 12;
Log4(("RTLdrPE: %08x %s\n", offFixup + pbr->VirtualAddress, s_apszReloc[fType]));
switch (fType)
{
case IMAGE_REL_BASED_HIGHLOW: /* 32-bit, add delta. */
*u.pu32 += (uint32_t)uDelta;
break;
case IMAGE_REL_BASED_DIR64: /* 64-bit, add delta. */
*u.pu64 += (RTINTPTR)uDelta;
break;
case IMAGE_REL_BASED_ABSOLUTE: /* Alignment placeholder. */
break;
/* odd ones */
case IMAGE_REL_BASED_LOW: /* 16-bit, add 1st 16-bit part of the delta. */
*u.pu16 += (uint16_t)uDelta;
break;
case IMAGE_REL_BASED_HIGH: /* 16-bit, add 2nd 16-bit part of the delta. */
*u.pu16 += (uint16_t)(uDelta >> 16);
break;
/* never ever seen these next two, and I'm not 100% sure they are correctly implemented here. */
case IMAGE_REL_BASED_HIGHADJ:
{
if (cRelocations <= 1)
{
AssertMsgFailed(("HIGHADJ missing 2nd record!\n"));
return VERR_BAD_EXE_FORMAT;
}
cRelocations--;
pwoffFixup++;
int32_t i32 = (uint32_t)(*u.pu16 << 16) | *pwoffFixup;
i32 += (uint32_t)uDelta;
i32 += 0x8000; //??
*u.pu16 = (uint16_t)(i32 >> 16);
break;
}
case IMAGE_REL_BASED_HIGH3ADJ:
{
if (cRelocations <= 2)
{
AssertMsgFailed(("HIGHADJ3 missing 2nd record!\n"));
return VERR_BAD_EXE_FORMAT;
}
cRelocations -= 2;
pwoffFixup++;
int64_t i64 = ((uint64_t)*u.pu16 << 32) | *(uint32_t *)pwoffFixup++;
i64 += (int64_t)uDelta << 16; //??
i64 += 0x80000000;//??
*u.pu16 = (uint16_t)(i64 >> 32);
break;
}
default:
AssertMsgFailed(("Unknown fixup type %d offset=%#x\n", fType, offFixup));
break;
}
/*
* Next offset/type
*/
pwoffFixup++;
cRelocations--;
} /* while loop */
/*
* Next Fixup chunk. (i.e. next page)
*/
pbr = (PIMAGE_BASE_RELOCATION)((uintptr_t)pbr + pbr->SizeOfBlock);
} /* while loop */
return 0;
}
/** @copydoc RTLDROPS::pfnRelocate. */
static DECLCALLBACK(int) rtldrPERelocate(PRTLDRMODINTERNAL pMod, void *pvBits, RTUINTPTR NewBaseAddress, RTUINTPTR OldBaseAddress,
PFNRTLDRIMPORT pfnGetImport, void *pvUser)
{
PRTLDRMODPE pModPe = (PRTLDRMODPE)pMod;
/*
* Do we have to read the image bits?
*/
if (!pModPe->pvBits)
{
int rc = rtldrPEReadBits(pModPe);
if (RT_FAILURE(rc))
return rc;
}
/*
* Process imports.
*/
int rc = ((PRTLDROPSPE)pMod->pOps)->pfnResolveImports(pModPe, pModPe->pvBits, pvBits, pfnGetImport, pvUser);
if (RT_SUCCESS(rc))
{
/*
* Apply relocations.
*/
rc = rtldrPEApplyFixups(pModPe, pModPe->pvBits, pvBits, NewBaseAddress, OldBaseAddress);
AssertRC(rc);
}
return rc;
}
/** @copydoc RTLDROPS::pfnGetSymbolEx. */
static DECLCALLBACK(int) rtldrPEGetSymbolEx(PRTLDRMODINTERNAL pMod, const void *pvBits, RTUINTPTR BaseAddress, const char *pszSymbol, RTUINTPTR *pValue)
{
PRTLDRMODPE pModPe = (PRTLDRMODPE)pMod;
/*
* Check if there is actually anything to work on.
*/
if ( !pModPe->ExportDir.VirtualAddress
|| !pModPe->ExportDir.Size)
return VERR_SYMBOL_NOT_FOUND;
/*
* No bits supplied? Do we need to read the bits?
*/
if (!pvBits)
{
if (!pModPe->pvBits)
{
int rc = rtldrPEReadBits(pModPe);
if (RT_FAILURE(rc))
return rc;
}
pvBits = pModPe->pvBits;
}
PIMAGE_EXPORT_DIRECTORY pExpDir = PE_RVA2TYPE(pvBits, pModPe->ExportDir.VirtualAddress, PIMAGE_EXPORT_DIRECTORY);
int iExpOrdinal = 0; /* index into address table. */
if ((uintptr_t)pszSymbol <= 0xffff)
{
/*
* Find ordinal export: Simple table lookup.
*/
unsigned uOrdinal = (uintptr_t)pszSymbol & 0xffff;
if ( uOrdinal >= pExpDir->Base + RT_MAX(pExpDir->NumberOfNames, pExpDir->NumberOfFunctions)
|| uOrdinal < pExpDir->Base)
return VERR_SYMBOL_NOT_FOUND;
iExpOrdinal = uOrdinal - pExpDir->Base;
}
else
{
/*
* Find Named Export: Do binary search on the name table.
*/
uint32_t *paRVANames = PE_RVA2TYPE(pvBits, pExpDir->AddressOfNames, uint32_t *);
uint16_t *paOrdinals = PE_RVA2TYPE(pvBits, pExpDir->AddressOfNameOrdinals, uint16_t *);
int iStart = 1;
int iEnd = pExpDir->NumberOfNames;
for (;;)
{
/* end of search? */
if (iStart > iEnd)
{
#ifdef RT_STRICT
/* do a linear search just to verify the correctness of the above algorithm */
for (unsigned i = 0; i < pExpDir->NumberOfNames; i++)
{
AssertMsg(i == 0 || strcmp(PE_RVA2TYPE(pvBits, paRVANames[i], const char *), PE_RVA2TYPE(pvBits, paRVANames[i - 1], const char *)) > 0,
("bug in binary export search!!!\n"));
AssertMsg(strcmp(PE_RVA2TYPE(pvBits, paRVANames[i], const char *), pszSymbol) != 0,
("bug in binary export search!!!\n"));
}
#endif
return VERR_SYMBOL_NOT_FOUND;
}
int i = (iEnd - iStart) / 2 + iStart;
const char *pszExpName = PE_RVA2TYPE(pvBits, paRVANames[i - 1], const char *);
int diff = strcmp(pszExpName, pszSymbol);
if (diff > 0) /* pszExpName > pszSymbol: search chunck before i */
iEnd = i - 1;
else if (diff) /* pszExpName < pszSymbol: search chunk after i */
iStart = i + 1;
else /* pszExpName == pszSymbol */
{
iExpOrdinal = paOrdinals[i - 1];
break;
}
} /* binary search thru name table */
}
/*
* Found export (iExpOrdinal).
*/
uint32_t * paAddress = PE_RVA2TYPE(pvBits, pExpDir->AddressOfFunctions, uint32_t *);
unsigned uRVAExport = paAddress[iExpOrdinal];
if ( uRVAExport > pModPe->ExportDir.VirtualAddress
&& uRVAExport < pModPe->ExportDir.VirtualAddress + pModPe->ExportDir.Size)
{
/* Resolve forwarder. */
AssertMsgFailed(("Forwarders are not supported!\n"));
return VERR_SYMBOL_NOT_FOUND;
}
/* Get plain export address */
*pValue = PE_RVA2TYPE(BaseAddress, uRVAExport, RTUINTPTR);
return VINF_SUCCESS;
}
/**
* Slow version of rtldrPEEnumSymbols that'll work without all of the image
* being accessible.
*
* This is mainly for use in debuggers and similar.
*/
static int rtldrPEEnumSymbolsSlow(PRTLDRMODPE pThis, unsigned fFlags, RTUINTPTR BaseAddress,
PFNRTLDRENUMSYMS pfnCallback, void *pvUser)
{
/*
* We enumerates by ordinal, which means using a slow linear search for
* getting any name
*/
PCIMAGE_EXPORT_DIRECTORY pExpDir = NULL;
int rc = rtldrPEReadPartByRva(pThis, NULL, pThis->ExportDir.VirtualAddress, pThis->ExportDir.Size,
(void const **)&pExpDir);
if (RT_FAILURE(rc))
return rc;
uint32_t const cOrdinals = RT_MAX(pExpDir->NumberOfNames, pExpDir->NumberOfFunctions);
uint32_t const *paAddress = NULL;
rc = rtldrPEReadPartByRva(pThis, NULL, pExpDir->AddressOfFunctions, cOrdinals * sizeof(uint32_t),
(void const **)&paAddress);
uint32_t const *paRVANames = NULL;
if (RT_SUCCESS(rc) && pExpDir->NumberOfNames)
rc = rtldrPEReadPartByRva(pThis, NULL, pExpDir->AddressOfNames, pExpDir->NumberOfNames * sizeof(uint32_t),
(void const **)&paRVANames);
uint16_t const *paOrdinals = NULL;
if (RT_SUCCESS(rc) && pExpDir->NumberOfNames)
rc = rtldrPEReadPartByRva(pThis, NULL, pExpDir->AddressOfNameOrdinals, pExpDir->NumberOfNames * sizeof(uint16_t),
(void const **)&paOrdinals);
if (RT_SUCCESS(rc))
{
uint32_t uNamePrev = 0;
for (uint32_t uOrdinal = 0; uOrdinal < cOrdinals; uOrdinal++)
{
if (paAddress[uOrdinal] /* needed? */)
{
/*
* Look for name.
*/
uint32_t uRvaName = UINT32_MAX;
/* Search from previous + 1 to the end. */
unsigned uName = uNamePrev + 1;
while (uName < pExpDir->NumberOfNames)
{
if (paOrdinals[uName] == uOrdinal)
{
uRvaName = paRVANames[uName];
uNamePrev = uName;
break;
}
uName++;
}
if (uRvaName == UINT32_MAX)
{
/* Search from start to the previous. */
uName = 0;
for (uName = 0 ; uName <= uNamePrev; uName++)
{
if (paOrdinals[uName] == uOrdinal)
{
uRvaName = paRVANames[uName];
uNamePrev = uName;
break;
}
}
}
/*
* Get address.
*/
uintptr_t uRVAExport = paAddress[uOrdinal];
RTUINTPTR Value;
if ( uRVAExport - (uintptr_t)pThis->ExportDir.VirtualAddress
< pThis->ExportDir.Size)
{
if (!(fFlags & RTLDR_ENUM_SYMBOL_FLAGS_NO_FWD))
{
/* Resolve forwarder. */
AssertMsgFailed(("Forwarders are not supported!\n"));
}
continue;
}
/* Get plain export address */
Value = PE_RVA2TYPE(BaseAddress, uRVAExport, RTUINTPTR);
/* Read in the name if found one. */
char szAltName[32];
const char *pszName = NULL;
if (uRvaName != UINT32_MAX)
{
uint32_t cbName = 0x1000 - (uRvaName & 0xfff);
if (cbName < 10 || cbName > 512)
cbName = 128;
rc = rtldrPEReadPartByRva(pThis, NULL, uRvaName, cbName, (void const **)&pszName);
while (RT_SUCCESS(rc) && RTStrNLen(pszName, cbName) == cbName)
{
rtldrPEFreePart(pThis, NULL, pszName);
pszName = NULL;
if (cbName >= _4K)
break;
cbName += 128;
rc = rtldrPEReadPartByRva(pThis, NULL, uRvaName, cbName, (void const **)&pszName);
}
}
if (!pszName)
{
RTStrPrintf(szAltName, sizeof(szAltName), "Ordinal%#x", uOrdinal);
pszName = szAltName;
}
/*
* Call back.
*/
rc = pfnCallback(&pThis->Core, pszName, uOrdinal + pExpDir->Base, Value, pvUser);
if (pszName != szAltName && pszName)
rtldrPEFreePart(pThis, NULL, pszName);
if (rc)
break;
}
}
}
rtldrPEFreePart(pThis, NULL, paOrdinals);
rtldrPEFreePart(pThis, NULL, paRVANames);
rtldrPEFreePart(pThis, NULL, paAddress);
rtldrPEFreePart(pThis, NULL, pExpDir);
return rc;
}
/** @copydoc RTLDROPS::pfnEnumSymbols */
static DECLCALLBACK(int) rtldrPEEnumSymbols(PRTLDRMODINTERNAL pMod, unsigned fFlags, const void *pvBits, RTUINTPTR BaseAddress,
PFNRTLDRENUMSYMS pfnCallback, void *pvUser)
{
PRTLDRMODPE pModPe = (PRTLDRMODPE)pMod;
NOREF(fFlags); /* ignored ... */
/*
* Check if there is actually anything to work on.
*/
if ( !pModPe->ExportDir.VirtualAddress
|| !pModPe->ExportDir.Size)
return VERR_SYMBOL_NOT_FOUND;
/*
* No bits supplied? Do we need to read the bits?
*/
if (!pvBits)
{
if (!pModPe->pvBits)
{
int rc = rtldrPEReadBits(pModPe);
if (RT_FAILURE(rc))
return rtldrPEEnumSymbolsSlow(pModPe, fFlags, BaseAddress, pfnCallback, pvUser);
}
pvBits = pModPe->pvBits;
}
/*
* We enumerates by ordinal, which means using a slow linear search for
* getting any name
*/
PIMAGE_EXPORT_DIRECTORY pExpDir = PE_RVA2TYPE(pvBits, pModPe->ExportDir.VirtualAddress, PIMAGE_EXPORT_DIRECTORY);
uint32_t *paAddress = PE_RVA2TYPE(pvBits, pExpDir->AddressOfFunctions, uint32_t *);
uint32_t *paRVANames = PE_RVA2TYPE(pvBits, pExpDir->AddressOfNames, uint32_t *);
uint16_t *paOrdinals = PE_RVA2TYPE(pvBits, pExpDir->AddressOfNameOrdinals, uint16_t *);
uint32_t uNamePrev = 0;
unsigned cOrdinals = RT_MAX(pExpDir->NumberOfNames, pExpDir->NumberOfFunctions);
for (unsigned uOrdinal = 0; uOrdinal < cOrdinals; uOrdinal++)
{
if (paAddress[uOrdinal] /* needed? */)
{
/*
* Look for name.
*/
const char *pszName = NULL;
/* Search from previous + 1 to the end. */
uint32_t uName = uNamePrev + 1;
while (uName < pExpDir->NumberOfNames)
{
if (paOrdinals[uName] == uOrdinal)
{
pszName = PE_RVA2TYPE(pvBits, paRVANames[uName], const char *);
uNamePrev = uName;
break;
}
uName++;
}
if (!pszName)
{
/* Search from start to the previous. */
uName = 0;
for (uName = 0 ; uName <= uNamePrev; uName++)
{
if (paOrdinals[uName] == uOrdinal)
{
pszName = PE_RVA2TYPE(pvBits, paRVANames[uName], const char *);
uNamePrev = uName;
break;
}
}
}
/*
* Get address.
*/
uintptr_t uRVAExport = paAddress[uOrdinal];
RTUINTPTR Value;
if ( uRVAExport - (uintptr_t)pModPe->ExportDir.VirtualAddress
< pModPe->ExportDir.Size)
{
if (!(fFlags & RTLDR_ENUM_SYMBOL_FLAGS_NO_FWD))
{
/* Resolve forwarder. */
AssertMsgFailed(("Forwarders are not supported!\n"));
}
continue;
}
/* Get plain export address */
Value = PE_RVA2TYPE(BaseAddress, uRVAExport, RTUINTPTR);
/*
* Call back.
*/
int rc = pfnCallback(pMod, pszName, uOrdinal + pExpDir->Base, Value, pvUser);
if (rc)
return rc;
}
}
return VINF_SUCCESS;
}
/** @copydoc RTLDROPS::pfnEnumDbgInfo. */
static DECLCALLBACK(int) rtldrPE_EnumDbgInfo(PRTLDRMODINTERNAL pMod, const void *pvBits,
PFNRTLDRENUMDBG pfnCallback, void *pvUser)
{
PRTLDRMODPE pModPe = (PRTLDRMODPE)pMod;
int rc;
/*
* Debug info directory empty?
*/
if ( !pModPe->DebugDir.VirtualAddress
|| !pModPe->DebugDir.Size)
return VINF_SUCCESS;
/*
* Allocate temporary memory for a path buffer (this code is also compiled
* and maybe even used in stack starved environments).
*/
char *pszPath = (char *)RTMemTmpAlloc(RTPATH_MAX);
if (!pszPath)
return VERR_NO_TMP_MEMORY;
/*
* Get the debug directory.
*/
if (!pvBits)
pvBits = pModPe->pvBits;
PCIMAGE_DEBUG_DIRECTORY paDbgDir;
int rcRet = rtldrPEReadPartByRva(pModPe, pvBits, pModPe->DebugDir.VirtualAddress, pModPe->DebugDir.Size,
(void const **)&paDbgDir);
if (RT_FAILURE(rcRet))
{
RTMemTmpFree(pszPath);
return rcRet;
}
/*
* Enumerate the debug directory.
*/
uint32_t const cEntries = pModPe->DebugDir.Size / sizeof(paDbgDir[0]);
for (uint32_t i = 0; i < cEntries; i++)
{
if (paDbgDir[i].PointerToRawData < pModPe->offEndOfHdrs)
continue;
if (paDbgDir[i].SizeOfData < 4)
continue;
void const *pvPart = NULL;
RTLDRDBGINFO DbgInfo;
RT_ZERO(DbgInfo.u);
DbgInfo.iDbgInfo = i;
DbgInfo.offFile = paDbgDir[i].PointerToRawData;
DbgInfo.LinkAddress = paDbgDir[i].AddressOfRawData < pModPe->cbImage
&& paDbgDir[i].AddressOfRawData >= pModPe->offEndOfHdrs
? paDbgDir[i].AddressOfRawData : NIL_RTLDRADDR;
DbgInfo.cb = paDbgDir[i].SizeOfData;
DbgInfo.pszExtFile = NULL;
rc = VINF_SUCCESS;
switch (paDbgDir[i].Type)
{
case IMAGE_DEBUG_TYPE_CODEVIEW:
DbgInfo.enmType = RTLDRDBGINFOTYPE_CODEVIEW;
DbgInfo.u.Cv.cbImage = pModPe->cbImage;
DbgInfo.u.Cv.uMajorVer = paDbgDir[i].MajorVersion;
DbgInfo.u.Cv.uMinorVer = paDbgDir[i].MinorVersion;
DbgInfo.u.Cv.uTimestamp = paDbgDir[i].TimeDateStamp;
if ( paDbgDir[i].SizeOfData < RTPATH_MAX
&& paDbgDir[i].SizeOfData > 16
&& ( DbgInfo.LinkAddress != NIL_RTLDRADDR
|| DbgInfo.offFile > 0)
)
{
rc = rtldrPEReadPart(pModPe, pvBits, DbgInfo.offFile, DbgInfo.LinkAddress, paDbgDir[i].SizeOfData, &pvPart);
if (RT_SUCCESS(rc))
{
PCCVPDB20INFO pCv20 = (PCCVPDB20INFO)pvPart;
if ( pCv20->u32Magic == CVPDB20INFO_MAGIC
&& pCv20->offDbgInfo == 0
&& paDbgDir[i].SizeOfData > RT_UOFFSETOF(CVPDB20INFO, szPdbFilename) )
{
DbgInfo.enmType = RTLDRDBGINFOTYPE_CODEVIEW_PDB20;
DbgInfo.u.Pdb20.cbImage = pModPe->cbImage;
DbgInfo.u.Pdb20.uTimestamp = pCv20->uTimestamp;
DbgInfo.u.Pdb20.uAge = pCv20->uAge;
DbgInfo.pszExtFile = (const char *)&pCv20->szPdbFilename[0];
}
else if ( pCv20->u32Magic == CVPDB70INFO_MAGIC
&& paDbgDir[i].SizeOfData > RT_UOFFSETOF(CVPDB70INFO, szPdbFilename) )
{
PCCVPDB70INFO pCv70 = (PCCVPDB70INFO)pCv20;
DbgInfo.enmType = RTLDRDBGINFOTYPE_CODEVIEW_PDB70;
DbgInfo.u.Pdb70.cbImage = pModPe->cbImage;
DbgInfo.u.Pdb70.Uuid = pCv70->PdbUuid;
DbgInfo.u.Pdb70.uAge = pCv70->uAge;
DbgInfo.pszExtFile = (const char *)&pCv70->szPdbFilename[0];
}
}
else
rcRet = rc;
}
break;
case IMAGE_DEBUG_TYPE_MISC:
DbgInfo.enmType = RTLDRDBGINFOTYPE_UNKNOWN;
if ( paDbgDir[i].SizeOfData < RTPATH_MAX
&& paDbgDir[i].SizeOfData > RT_UOFFSETOF(IMAGE_DEBUG_MISC, Data))
{
DbgInfo.enmType = RTLDRDBGINFOTYPE_CODEVIEW_DBG;
DbgInfo.u.Dbg.cbImage = pModPe->cbImage;
if (DbgInfo.LinkAddress != NIL_RTLDRADDR)
DbgInfo.u.Dbg.uTimestamp = paDbgDir[i].TimeDateStamp;
else
DbgInfo.u.Dbg.uTimestamp = pModPe->uTimestamp; /* NT4 SP1 ntfs.sys hack. Generic? */
rc = rtldrPEReadPart(pModPe, pvBits, DbgInfo.offFile, DbgInfo.LinkAddress, paDbgDir[i].SizeOfData, &pvPart);
if (RT_SUCCESS(rc))
{
PCIMAGE_DEBUG_MISC pMisc = (PCIMAGE_DEBUG_MISC)pvPart;
if ( pMisc->DataType == IMAGE_DEBUG_MISC_EXENAME
&& pMisc->Length == paDbgDir[i].SizeOfData)
{
if (!pMisc->Unicode)
DbgInfo.pszExtFile = (const char *)&pMisc->Data[0];
else
{
rc = RTUtf16ToUtf8Ex((PCRTUTF16)&pMisc->Data[0],
(pMisc->Length - RT_OFFSETOF(IMAGE_DEBUG_MISC, Data)) / sizeof(RTUTF16),
&pszPath, RTPATH_MAX, NULL);
if (RT_SUCCESS(rc))
DbgInfo.pszExtFile = pszPath;
else
rcRet = rc; /* continue without a filename. */
}
}
}
else
rcRet = rc; /* continue without a filename. */
}
break;
case IMAGE_DEBUG_TYPE_COFF:
DbgInfo.enmType = RTLDRDBGINFOTYPE_COFF;
DbgInfo.u.Coff.cbImage = pModPe->cbImage;
DbgInfo.u.Coff.uMajorVer = paDbgDir[i].MajorVersion;
DbgInfo.u.Coff.uMinorVer = paDbgDir[i].MinorVersion;
DbgInfo.u.Coff.uTimestamp = paDbgDir[i].TimeDateStamp;
break;
default:
DbgInfo.enmType = RTLDRDBGINFOTYPE_UNKNOWN;
break;
}
/* Fix (hack) the file name encoding. We don't have Windows-1252 handy,
so we'll be using Latin-1 as a reasonable approximation.
(I don't think we know exactly which encoding this is anyway, as
it's probably the current ANSI/Windows code page for the process
generating the image anyways.) */
if (DbgInfo.pszExtFile && DbgInfo.pszExtFile != pszPath)
{
rc = RTLatin1ToUtf8Ex(DbgInfo.pszExtFile,
paDbgDir[i].SizeOfData - ((uintptr_t)DbgInfo.pszExtFile - (uintptr_t)pvBits),
&pszPath, RTPATH_MAX, NULL);
if (RT_FAILURE(rc))
{
rcRet = rc;
DbgInfo.pszExtFile = NULL;
}
}
if (DbgInfo.pszExtFile)
RTPathChangeToUnixSlashes(pszPath, true /*fForce*/);
rc = pfnCallback(pMod, &DbgInfo, pvUser);
rtldrPEFreePart(pModPe, pvBits, pvPart);
if (rc != VINF_SUCCESS)
{
rcRet = rc;
break;
}
}
rtldrPEFreePart(pModPe, pvBits, paDbgDir);
RTMemTmpFree(pszPath);
return rcRet;
}
/** @copydoc RTLDROPS::pfnEnumSegments. */
static DECLCALLBACK(int) rtldrPE_EnumSegments(PRTLDRMODINTERNAL pMod, PFNRTLDRENUMSEGS pfnCallback, void *pvUser)
{
PRTLDRMODPE pModPe = (PRTLDRMODPE)pMod;
RTLDRSEG SegInfo;
/*
* The first section is a fake one covering the headers.
*/
SegInfo.pszName = "NtHdrs";
SegInfo.cchName = 6;
SegInfo.SelFlat = 0;
SegInfo.Sel16bit = 0;
SegInfo.fFlags = 0;
SegInfo.fProt = RTMEM_PROT_READ;
SegInfo.Alignment = 1;
SegInfo.LinkAddress = pModPe->uImageBase;
SegInfo.RVA = 0;
SegInfo.offFile = 0;
SegInfo.cb = pModPe->cbHeaders;
SegInfo.cbFile = pModPe->cbHeaders;
SegInfo.cbMapped = pModPe->cbHeaders;
if ((pModPe->paSections[0].Characteristics & IMAGE_SCN_TYPE_NOLOAD))
SegInfo.cbMapped = pModPe->paSections[0].VirtualAddress;
int rc = pfnCallback(pMod, &SegInfo, pvUser);
/*
* Then all the normal sections.
*/
PCIMAGE_SECTION_HEADER pSh = pModPe->paSections;
for (uint32_t i = 0; i < pModPe->cSections && rc == VINF_SUCCESS; i++, pSh++)
{
char szName[32];
SegInfo.pszName = (const char *)&pSh->Name[0];
SegInfo.cchName = (uint32_t)RTStrNLen(SegInfo.pszName, sizeof(pSh->Name));
if (SegInfo.cchName >= sizeof(pSh->Name))
{
memcpy(szName, &pSh->Name[0], sizeof(pSh->Name));
szName[sizeof(sizeof(pSh->Name))] = '\0';
SegInfo.pszName = szName;
}
else if (SegInfo.cchName == 0)
{
SegInfo.pszName = szName;
SegInfo.cchName = (uint32_t)RTStrPrintf(szName, sizeof(szName), "UnamedSect%02u", i);
}
SegInfo.SelFlat = 0;
SegInfo.Sel16bit = 0;
SegInfo.fFlags = 0;
SegInfo.fProt = RTMEM_PROT_NONE;
if (pSh->Characteristics & IMAGE_SCN_MEM_READ)
SegInfo.fProt |= RTMEM_PROT_READ;
if (pSh->Characteristics & IMAGE_SCN_MEM_WRITE)
SegInfo.fProt |= RTMEM_PROT_WRITE;
if (pSh->Characteristics & IMAGE_SCN_MEM_EXECUTE)
SegInfo.fProt |= RTMEM_PROT_EXEC;
SegInfo.Alignment = (pSh->Characteristics & IMAGE_SCN_ALIGN_MASK) >> IMAGE_SCN_ALIGN_SHIFT;
if (SegInfo.Alignment > 0)
SegInfo.Alignment = RT_BIT_64(SegInfo.Alignment - 1);
if (pSh->Characteristics & IMAGE_SCN_TYPE_NOLOAD)
{
SegInfo.LinkAddress = NIL_RTLDRADDR;
SegInfo.RVA = NIL_RTLDRADDR;
SegInfo.cbMapped = pSh->Misc.VirtualSize;
}
else
{
SegInfo.LinkAddress = pSh->VirtualAddress + pModPe->uImageBase ;
SegInfo.RVA = pSh->VirtualAddress;
SegInfo.cbMapped = RT_ALIGN(SegInfo.cb, SegInfo.Alignment);
if (i + 1 < pModPe->cSections && !(pSh[1].Characteristics & IMAGE_SCN_TYPE_NOLOAD))
SegInfo.cbMapped = pSh[1].VirtualAddress - pSh->VirtualAddress;
}
SegInfo.cb = pSh->Misc.VirtualSize;
if (pSh->PointerToRawData == 0 || pSh->SizeOfRawData == 0)
{
SegInfo.offFile = -1;
SegInfo.cbFile = 0;
}
else
{
SegInfo.offFile = pSh->PointerToRawData;
SegInfo.cbFile = pSh->SizeOfRawData;
}
rc = pfnCallback(pMod, &SegInfo, pvUser);
}
return rc;
}
/** @copydoc RTLDROPS::pfnLinkAddressToSegOffset. */
static DECLCALLBACK(int) rtldrPE_LinkAddressToSegOffset(PRTLDRMODINTERNAL pMod, RTLDRADDR LinkAddress,
uint32_t *piSeg, PRTLDRADDR poffSeg)
{
PRTLDRMODPE pModPe = (PRTLDRMODPE)pMod;
LinkAddress -= pModPe->uImageBase;
/* Special header segment. */
if (LinkAddress < pModPe->paSections[0].VirtualAddress)
{
*piSeg = 0;
*poffSeg = LinkAddress;
return VINF_SUCCESS;
}
/*
* Search the normal sections. (Could do this in binary fashion, they're
* sorted, but too much bother right now.)
*/
if (LinkAddress > pModPe->cbImage)
return VERR_LDR_INVALID_LINK_ADDRESS;
uint32_t i = pModPe->cSections;
PCIMAGE_SECTION_HEADER paShs = pModPe->paSections;
while (i-- > 0)
if (!(paShs[i].Characteristics & IMAGE_SCN_TYPE_NOLOAD))
{
uint32_t uAddr = paShs[i].VirtualAddress;
if (LinkAddress >= uAddr)
{
*poffSeg = LinkAddress - uAddr;
*piSeg = i + 1;
return VINF_SUCCESS;
}
}
return VERR_LDR_INVALID_LINK_ADDRESS;
}
/** @copydoc RTLDROPS::pfnLinkAddressToRva. */
static DECLCALLBACK(int) rtldrPE_LinkAddressToRva(PRTLDRMODINTERNAL pMod, RTLDRADDR LinkAddress, PRTLDRADDR pRva)
{
PRTLDRMODPE pModPe = (PRTLDRMODPE)pMod;
LinkAddress -= pModPe->uImageBase;
if (LinkAddress > pModPe->cbImage)
return VERR_LDR_INVALID_LINK_ADDRESS;
*pRva = LinkAddress;
return VINF_SUCCESS;
}
/** @copydoc RTLDROPS::pfnSegOffsetToRva. */
static DECLCALLBACK(int) rtldrPE_SegOffsetToRva(PRTLDRMODINTERNAL pMod, uint32_t iSeg, RTLDRADDR offSeg,
PRTLDRADDR pRva)
{
PRTLDRMODPE pModPe = (PRTLDRMODPE)pMod;
if (iSeg > pModPe->cSections)
return VERR_LDR_INVALID_SEG_OFFSET;
/** @todo should validate offSeg here... too lazy right now. */
if (iSeg == 0)
*pRva = offSeg;
else if (pModPe->paSections[iSeg].Characteristics & IMAGE_SCN_TYPE_NOLOAD)
return VERR_LDR_INVALID_SEG_OFFSET;
else
*pRva = offSeg + pModPe->paSections[iSeg].VirtualAddress;
return VINF_SUCCESS;
}
/** @copydoc RTLDROPS::pfnRvaToSegOffset. */
static DECLCALLBACK(int) rtldrPE_RvaToSegOffset(PRTLDRMODINTERNAL pMod, RTLDRADDR Rva,
uint32_t *piSeg, PRTLDRADDR poffSeg)
{
PRTLDRMODPE pModPe = (PRTLDRMODPE)pMod;
int rc = rtldrPE_LinkAddressToSegOffset(pMod, Rva + pModPe->uImageBase, piSeg, poffSeg);
if (RT_FAILURE(rc))
rc = VERR_LDR_INVALID_RVA;
return rc;
}
/** @interface_method_impl{RTLDROPS,pfnQueryProp} */
static DECLCALLBACK(int) rtldrPE_QueryProp(PRTLDRMODINTERNAL pMod, RTLDRPROP enmProp, void *pvBuf, size_t cbBuf, size_t *pcbRet)
{
PRTLDRMODPE pModPe = (PRTLDRMODPE)pMod;
switch (enmProp)
{
case RTLDRPROP_TIMESTAMP_SECONDS:
Assert(*pcbRet == cbBuf);
if (cbBuf == sizeof(int32_t))
*(int32_t *)pvBuf = pModPe->uTimestamp;
else if (cbBuf == sizeof(int64_t))
*(int64_t *)pvBuf = pModPe->uTimestamp;
else
AssertFailedReturn(VERR_INTERNAL_ERROR_3);
break;
case RTLDRPROP_IS_SIGNED:
Assert(cbBuf == sizeof(bool));
Assert(*pcbRet == cbBuf);
*(bool *)pvBuf = pModPe->offPkcs7SignedData != 0;
break;
case RTLDRPROP_PKCS7_SIGNED_DATA:
{
if (pModPe->cbPkcs7SignedData == 0)
return VERR_NOT_FOUND;
Assert(pModPe->offPkcs7SignedData > pModPe->SecurityDir.VirtualAddress);
*pcbRet = pModPe->cbPkcs7SignedData;
if (cbBuf < pModPe->cbPkcs7SignedData)
return VERR_BUFFER_OVERFLOW;
return pModPe->Core.pReader->pfnRead(pModPe->Core.pReader, pvBuf, pModPe->cbPkcs7SignedData,
pModPe->offPkcs7SignedData);
}
case RTLDRPROP_SIGNATURE_CHECKS_ENFORCED:
Assert(cbBuf == sizeof(bool));
Assert(*pcbRet == cbBuf);
*(bool *)pvBuf = pModPe->offPkcs7SignedData > 0
&& (pModPe->fDllCharacteristics & IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY);
break;
default:
return VERR_NOT_FOUND;
}
return VINF_SUCCESS;
}
/*
* Lots of Authenticode fun ahead.
*/
/**
* Initializes the hash context.
*
* @returns VINF_SUCCESS or VERR_NOT_SUPPORTED.
* @param pHashCtx The hash context union.
* @param enmDigest The hash type we're calculating..
*/
static int rtLdrPE_HashInit(PRTLDRPEHASHCTXUNION pHashCtx, RTDIGESTTYPE enmDigest)
{
switch (enmDigest)
{
case RTDIGESTTYPE_SHA512: RTSha512Init(&pHashCtx->Sha512); break;
case RTDIGESTTYPE_SHA256: RTSha256Init(&pHashCtx->Sha256); break;
case RTDIGESTTYPE_SHA1: RTSha1Init(&pHashCtx->Sha1); break;
case RTDIGESTTYPE_MD5: RTMd5Init(&pHashCtx->Md5); break;
default: AssertFailedReturn(VERR_NOT_SUPPORTED);
}
return VINF_SUCCESS;
}
/**
* Updates the hash with more data.
*
* @param pHashCtx The hash context union.
* @param enmDigest The hash type we're calculating..
* @param pvBuf Pointer to a buffer with bytes to add to thash.
* @param cbBuf How many bytes to add from @a pvBuf.
*/
static void rtLdrPE_HashUpdate(PRTLDRPEHASHCTXUNION pHashCtx, RTDIGESTTYPE enmDigest, void const *pvBuf, size_t cbBuf)
{
switch (enmDigest)
{
case RTDIGESTTYPE_SHA512: RTSha512Update(&pHashCtx->Sha512, pvBuf, cbBuf); break;
case RTDIGESTTYPE_SHA256: RTSha256Update(&pHashCtx->Sha256, pvBuf, cbBuf); break;
case RTDIGESTTYPE_SHA1: RTSha1Update(&pHashCtx->Sha1, pvBuf, cbBuf); break;
case RTDIGESTTYPE_MD5: RTMd5Update(&pHashCtx->Md5, pvBuf, cbBuf); break;
default: AssertReleaseFailed();
}
}
/**
* Finalizes the hash calculations.
*
* @param pHashCtx The hash context union.
* @param enmDigest The hash type we're calculating..
* @param pHashRes The hash result union.
*/
static void rtLdrPE_HashFinalize(PRTLDRPEHASHCTXUNION pHashCtx, RTDIGESTTYPE enmDigest, PRTLDRPEHASHRESUNION pHashRes)
{
switch (enmDigest)
{
case RTDIGESTTYPE_SHA512: RTSha512Final(&pHashCtx->Sha512, pHashRes->abSha512); break;
case RTDIGESTTYPE_SHA256: RTSha256Final(&pHashCtx->Sha256, pHashRes->abSha256); break;
case RTDIGESTTYPE_SHA1: RTSha1Final(&pHashCtx->Sha1, pHashRes->abSha1); break;
case RTDIGESTTYPE_MD5: RTMd5Final(pHashRes->abMd5, &pHashCtx->Md5); break;
default: AssertReleaseFailed();
}
}
/**
* Returns the digest size for the given digest type.
*
* @returns Size in bytes.
* @param enmDigest The hash type in question.
*/
static uint32_t rtLdrPE_HashGetHashSize(RTDIGESTTYPE enmDigest)
{
switch (enmDigest)
{
case RTDIGESTTYPE_SHA512: return RTSHA512_HASH_SIZE;
case RTDIGESTTYPE_SHA256: return RTSHA256_HASH_SIZE;
case RTDIGESTTYPE_SHA1: return RTSHA1_HASH_SIZE;
case RTDIGESTTYPE_MD5: return RTMD5_HASH_SIZE;
default: AssertReleaseFailedReturn(0);
}
}
/**
* Calculate the special too watch out for when hashing the image.
*
* @returns IPRT status code.
* @param pModPe The PE module.
* @param pPlaces The structure where to store the special places.
* @param pErrInfo Optional error info.
*/
static int rtldrPe_CalcSpecialHashPlaces(PRTLDRMODPE pModPe, PRTLDRPEHASHSPECIALS pPlaces, PRTERRINFO pErrInfo)
{
/*
* If we're here despite a missing signature, we need to get the file size.
*/
pPlaces->cbToHash = pModPe->SecurityDir.VirtualAddress;
if (pPlaces->cbToHash == 0)
{
RTFOFF cbFile = pModPe->Core.pReader->pfnSize(pModPe->Core.pReader);
pPlaces->cbToHash = (uint32_t)cbFile;
if (pPlaces->cbToHash != (RTFOFF)cbFile)
return RTErrInfoSetF(pErrInfo, VERR_LDRVI_FILE_LENGTH_ERROR, "File is too large: %RTfoff", cbFile);
}
/*
* Calculate the special places.
*/
pPlaces->offCksum = (uint32_t)pModPe->offNtHdrs
+ (pModPe->f64Bit
? RT_OFFSETOF(IMAGE_NT_HEADERS64, OptionalHeader.CheckSum)
: RT_OFFSETOF(IMAGE_NT_HEADERS32, OptionalHeader.CheckSum));
pPlaces->cbCksum = RT_SIZEOFMEMB(IMAGE_NT_HEADERS32, OptionalHeader.CheckSum);
pPlaces->offSecDir = (uint32_t)pModPe->offNtHdrs
+ (pModPe->f64Bit
? RT_OFFSETOF(IMAGE_NT_HEADERS64, OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_SECURITY])
: RT_OFFSETOF(IMAGE_NT_HEADERS32, OptionalHeader.DataDirectory[IMAGE_DIRECTORY_ENTRY_SECURITY]));
pPlaces->cbSecDir = sizeof(IMAGE_DATA_DIRECTORY);
pPlaces->offEndSpecial = pPlaces->offSecDir + pPlaces->cbSecDir;
return VINF_SUCCESS;
}
/**
* Calculates the whole image hash.
*
* The Authenticode_PE.docx version 1.0 explains how the hash is calculated,
* points 8 thru 14 are bogus. If you study them a little carefully, it is
* clear that the algorithm will only work if the raw data for the section have
* no gaps between them or in front of them. So, this elaborate section sorting
* by PointerToRawData and working them section by section could simply be
* replaced by one point:
*
* 8. Add all the file content between SizeOfHeaders and the
* attribute certificate table to the hash. Then finalize
* the hash.
*
* Not sure if Microsoft is screwing with us on purpose here or whether they
* assigned some of this work to less talented engineers and tech writers. I
* love fact that they say it's "simplified" and should yield the correct hash
* for "almost all" files. Stupid, Stupid, Microsofties!!
*
* My simplified implementation that just hashes the entire file up to the
* signature or end of the file produces the same SHA1 values as "signtool
* verify /v" does both for edited executables with gaps between/before/after
* sections raw data and normal executables without any gaps.
*
* @returns IPRT status code.
* @param pModPe The PE module.
* @param pvScratch Scratch buffer.
* @param cbScratch Size of the scratch buffer.
* @param enmDigest The hash digest type we're calculating.
* @param pHashCtx Hash context scratch area.
* @param pHashRes Hash result buffer.
* @param pErrInfo Optional error info buffer.
*/
static int rtldrPE_HashImageCommon(PRTLDRMODPE pModPe, void *pvScratch, uint32_t cbScratch, RTDIGESTTYPE enmDigest,
PRTLDRPEHASHCTXUNION pHashCtx, PRTLDRPEHASHRESUNION pHashRes, PRTERRINFO pErrInfo)
{
int rc = rtLdrPE_HashInit(pHashCtx, enmDigest);
if (RT_FAILURE(rc))
return rc;
/*
* Calculate the special places.
*/
RTLDRPEHASHSPECIALS SpecialPlaces = { 0, 0, 0, 0, 0, 0 }; /* shut up gcc */
rc = rtldrPe_CalcSpecialHashPlaces(pModPe, &SpecialPlaces, pErrInfo);
if (RT_FAILURE(rc))
return rc;
/*
* Work our way thru the image data.
*/
uint32_t off = 0;
while (off < SpecialPlaces.cbToHash)
{
uint32_t cbRead = RT_MIN(SpecialPlaces.cbToHash - off, cbScratch);
uint8_t *pbCur = (uint8_t *)pvScratch;
rc = pModPe->Core.pReader->pfnRead(pModPe->Core.pReader, pbCur, cbRead, off);
if (RT_FAILURE(rc))
return RTErrInfoSetF(pErrInfo, VERR_LDRVI_READ_ERROR_HASH, "Hash read error at %#x: %Rrc (cbRead=%#zx)",
off, rc, cbRead);
if (off < SpecialPlaces.offEndSpecial)
{
if (off < SpecialPlaces.offCksum)
{
/* Hash everything up to the checksum. */
uint32_t cbChunk = RT_MIN(SpecialPlaces.offCksum - off, cbRead);
rtLdrPE_HashUpdate(pHashCtx, enmDigest, pbCur, cbChunk);
pbCur += cbChunk;
cbRead -= cbChunk;
off += cbChunk;
}
if (off < SpecialPlaces.offCksum + SpecialPlaces.cbCksum && off >= SpecialPlaces.offCksum)
{
/* Skip the checksum */
uint32_t cbChunk = RT_MIN(SpecialPlaces.offCksum + SpecialPlaces.cbCksum - off, cbRead);
pbCur += cbChunk;
cbRead -= cbChunk;
off += cbChunk;
}
if (off < SpecialPlaces.offSecDir && off >= SpecialPlaces.offCksum + SpecialPlaces.cbCksum)
{
/* Hash everything between the checksum and the data dir entry. */
uint32_t cbChunk = RT_MIN(SpecialPlaces.offSecDir - off, cbRead);
rtLdrPE_HashUpdate(pHashCtx, enmDigest, pbCur, cbChunk);
pbCur += cbChunk;
cbRead -= cbChunk;
off += cbChunk;
}
if (off < SpecialPlaces.offSecDir + SpecialPlaces.cbSecDir && off >= SpecialPlaces.offSecDir)
{
/* Skip the security data directory entry. */
uint32_t cbChunk = RT_MIN(SpecialPlaces.offSecDir + SpecialPlaces.cbSecDir - off, cbRead);
pbCur += cbChunk;
cbRead -= cbChunk;
off += cbChunk;
}
}
rtLdrPE_HashUpdate(pHashCtx, enmDigest, pbCur, cbRead);
/* Advance */
off += cbRead;
}
/*
* If there isn't a signature, experiments with signtool indicates that we
* have to zero padd the file size until it's a multiple of 8. (This is
* most likely to give 64-bit values in the certificate a natural alignment
* when memory mapped.)
*/
if ( pModPe->SecurityDir.Size != SpecialPlaces.cbToHash
&& SpecialPlaces.cbToHash != RT_ALIGN_32(SpecialPlaces.cbToHash, WIN_CERTIFICATE_ALIGNMENT))
{
static const uint8_t s_abZeros[WIN_CERTIFICATE_ALIGNMENT] = { 0,0,0,0, 0,0,0,0 };
rtLdrPE_HashUpdate(pHashCtx, enmDigest, s_abZeros,
RT_ALIGN_32(SpecialPlaces.cbToHash, WIN_CERTIFICATE_ALIGNMENT) - SpecialPlaces.cbToHash);
}
/*
* Done. Finalize the hashes.
*/
rtLdrPE_HashFinalize(pHashCtx, enmDigest, pHashRes);
return VINF_SUCCESS;
}
#ifndef IPRT_WITHOUT_LDR_VERIFY
/**
* Verifies image preconditions not checked by the open validation code.
*
* @returns IPRT status code.
* @param pModPe The PE module.
* @param pErrInfo Optional error info buffer.
*/
static int rtldrPE_VerifySignatureImagePrecoditions(PRTLDRMODPE pModPe, PRTERRINFO pErrInfo)
{
/*
* Validate the sections. While doing so, track the amount of section raw
* section data in the file so we can use this to validate the signature
* table location later.
*/
uint32_t offNext = pModPe->cbHeaders; /* same */
for (uint32_t i = 0; i < pModPe->cSections; i++)
if (pModPe->paSections[i].SizeOfRawData > 0)
{
uint64_t offEnd = (uint64_t)pModPe->paSections[i].PointerToRawData + pModPe->paSections[i].SizeOfRawData;
if (offEnd > offNext)
{
if (offEnd >= _2G)
return RTErrInfoSetF(pErrInfo, VERR_LDRVI_SECTION_RAW_DATA_VALUES,
"Section %#u specifies file data after 2GB: PointerToRawData=%#x SizeOfRawData=%#x",
i, pModPe->paSections[i].PointerToRawData, pModPe->paSections[i].SizeOfRawData);
offNext = (uint32_t)offEnd;
}
}
uint32_t offEndOfSectionData = offNext;
/*
* Validate the signature.
*/
if (!pModPe->SecurityDir.Size)
return RTErrInfoSet(pErrInfo, VERR_LDRVI_NOT_SIGNED, "Not signed.");
uint32_t const offSignature = pModPe->SecurityDir.VirtualAddress;
uint32_t const cbSignature = pModPe->SecurityDir.Size;
if ( cbSignature <= sizeof(WIN_CERTIFICATE)
|| cbSignature >= RTLDRMODPE_MAX_SECURITY_DIR_SIZE
|| offSignature >= _2G)
return RTErrInfoSetF(pErrInfo, VERR_LDRVI_INVALID_SECURITY_DIR_ENTRY,
"Invalid security data dir entry: cb=%#x off=%#x", cbSignature, offSignature);
if (offSignature < offEndOfSectionData)
return RTErrInfoSetF(pErrInfo, VERR_LDRVI_INVALID_SECURITY_DIR_ENTRY,
"Invalid security data dir entry offset: %#x offEndOfSectionData=%#x",
offSignature, offEndOfSectionData);
if (RT_ALIGN_32(offSignature, WIN_CERTIFICATE_ALIGNMENT) != offSignature)
return RTErrInfoSetF(pErrInfo, VERR_LDRVI_INVALID_SECURITY_DIR_ENTRY,
"Misaligned security dir entry offset: %#x (alignment=%#x)",
offSignature, WIN_CERTIFICATE_ALIGNMENT);
return VINF_SUCCESS;
}
/**
* Reads and checks the raw signature data.
*
* @returns IPRT status code.
* @param pModPe The PE module.
* @param ppSignature Where to return the pointer to the parsed
* signature data. Pass to
* rtldrPE_VerifySignatureDestroy when done.
* @param pErrInfo Optional error info buffer.
*/
static int rtldrPE_VerifySignatureRead(PRTLDRMODPE pModPe, PRTLDRPESIGNATURE *ppSignature, PRTERRINFO pErrInfo)
{
*ppSignature = NULL;
AssertReturn(pModPe->SecurityDir.Size > 0, VERR_INTERNAL_ERROR_2);
/*
* Allocate memory for reading and parsing it.
*/
if (pModPe->SecurityDir.Size >= RTLDRMODPE_MAX_SECURITY_DIR_SIZE)
return RTErrInfoSetF(pErrInfo, VERR_LDRVI_INVALID_SECURITY_DIR_ENTRY,
"Signature directory is to large: %#x", pModPe->SecurityDir.Size);
PRTLDRPESIGNATURE pSignature = (PRTLDRPESIGNATURE)RTMemTmpAllocZ(sizeof(*pSignature) + 64 + pModPe->SecurityDir.Size);
if (!pSignature)
return RTErrInfoSetF(pErrInfo, VERR_LDRVI_NO_MEMORY_SIGNATURE, "Failed to allocate %zu bytes",
sizeof(*pSignature) + 64 + pModPe->SecurityDir.Size);
pSignature->pRawData = RT_ALIGN_PT(pSignature + 1, 64, WIN_CERTIFICATE const *);
/*
* Read it.
*/
int rc = pModPe->Core.pReader->pfnRead(pModPe->Core.pReader, (void *)pSignature->pRawData,
pModPe->SecurityDir.Size, pModPe->SecurityDir.VirtualAddress);
if (RT_SUCCESS(rc))
{
/*
* Check the table we've read in.
*/
uint32_t cbLeft = pModPe->SecurityDir.Size;
WIN_CERTIFICATE const *pEntry = pSignature->pRawData;
for (;;)
{
if ( cbLeft < sizeof(*pEntry)
|| pEntry->dwLength > cbLeft
|| pEntry->dwLength < sizeof(*pEntry))
rc = RTErrInfoSetF(pErrInfo, VERR_LDRVI_BAD_CERT_HDR_LENGTH,
"Bad WIN_CERTIFICATE length: %#x (max %#x, signature=%u)",
pEntry->dwLength, cbLeft, 0);
else if (pEntry->wRevision != WIN_CERT_REVISION_2_0)
rc = RTErrInfoSetF(pErrInfo, VERR_LDRVI_BAD_CERT_HDR_REVISION,
"Unsupported WIN_CERTIFICATE revision value: %#x (signature=%u)",
pEntry->wRevision, 0);
else if (pEntry->wCertificateType != WIN_CERT_TYPE_PKCS_SIGNED_DATA)
rc = RTErrInfoSetF(pErrInfo, VERR_LDRVI_BAD_CERT_HDR_TYPE,
"Unsupported WIN_CERTIFICATE certificate type: %#x (signature=%u)",
pEntry->wCertificateType, 0);
else
{
/* advance */
uint32_t cbEntry = RT_ALIGN(pEntry->dwLength, WIN_CERTIFICATE_ALIGNMENT);
if (cbEntry >= cbLeft)
break;
cbLeft -= cbEntry;
pEntry = (WIN_CERTIFICATE *)((uintptr_t)pEntry + cbEntry);
/* For now, only one entry is supported. */
rc = RTErrInfoSet(pErrInfo, VERR_LDRVI_BAD_CERT_MULTIPLE, "Multiple WIN_CERTIFICATE entries are not supported.");
}
break;
}
if (RT_SUCCESS(rc))
{
*ppSignature = pSignature;
return VINF_SUCCESS;
}
}
else
rc = RTErrInfoSetF(pErrInfo, VERR_LDRVI_READ_ERROR_SIGNATURE, "Signature read error: %Rrc", rc);
RTMemTmpFree(pSignature);
return rc;
}
/**
* Destroys the parsed signature.
*
* @param pModPe The PE module.
* @param pSignature The signature data to destroy.
*/
static void rtldrPE_VerifySignatureDestroy(PRTLDRMODPE pModPe, PRTLDRPESIGNATURE pSignature)
{
RTCrPkcs7ContentInfo_Delete(&pSignature->ContentInfo);
RTMemTmpFree(pSignature);
}
/**
* Decodes the raw signature.
*
* @returns IPRT status code.
* @param pModPe The PE module.
* @param pSignature The signature data.
* @param pErrInfo Optional error info buffer.
*/
static int rtldrPE_VerifySignatureDecode(PRTLDRMODPE pModPe, PRTLDRPESIGNATURE pSignature, PRTERRINFO pErrInfo)
{
WIN_CERTIFICATE const *pEntry = pSignature->pRawData;
AssertReturn(pEntry->wCertificateType == WIN_CERT_TYPE_PKCS_SIGNED_DATA, VERR_INTERNAL_ERROR_2);
AssertReturn(pEntry->wRevision == WIN_CERT_REVISION_2_0, VERR_INTERNAL_ERROR_2);
RTASN1CURSORPRIMARY PrimaryCursor;
RTAsn1CursorInitPrimary(&PrimaryCursor,
&pEntry->bCertificate[0],
pEntry->dwLength - RT_OFFSETOF(WIN_CERTIFICATE, bCertificate),
pErrInfo,
&g_RTAsn1DefaultAllocator,
0,
"WinCert");
int rc = RTCrPkcs7ContentInfo_DecodeAsn1(&PrimaryCursor.Cursor, 0, &pSignature->ContentInfo, "CI");
if (RT_SUCCESS(rc))
{
if (RTCrPkcs7ContentInfo_IsSignedData(&pSignature->ContentInfo))
{
pSignature->pSignedData = pSignature->ContentInfo.u.pSignedData;
/*
* Decode the authenticode bits.
*/
if (!strcmp(pSignature->pSignedData->ContentInfo.ContentType.szObjId, RTCRSPCINDIRECTDATACONTENT_OID))
{
pSignature->pIndData = pSignature->pSignedData->ContentInfo.u.pIndirectDataContent;
Assert(pSignature->pIndData);
/*
* Check that things add up.
*/
if (RT_SUCCESS(rc))
rc = RTCrPkcs7SignedData_CheckSanity(pSignature->pSignedData,
RTCRPKCS7SIGNEDDATA_SANITY_F_AUTHENTICODE
| RTCRPKCS7SIGNEDDATA_SANITY_F_ONLY_KNOWN_HASH
| RTCRPKCS7SIGNEDDATA_SANITY_F_SIGNING_CERT_PRESENT,
pErrInfo, "SD");
if (RT_SUCCESS(rc))
rc = RTCrSpcIndirectDataContent_CheckSanityEx(pSignature->pIndData,
pSignature->pSignedData,
RTCRSPCINDIRECTDATACONTENT_SANITY_F_ONLY_KNOWN_HASH,
pErrInfo);
if (RT_SUCCESS(rc))
{
PCRTCRX509ALGORITHMIDENTIFIER pDigestAlgorithm = &pSignature->pIndData->DigestInfo.DigestAlgorithm;
pSignature->enmDigest = RTCrX509AlgorithmIdentifier_QueryDigestType(pDigestAlgorithm);
AssertReturn(pSignature->enmDigest != RTDIGESTTYPE_INVALID, VERR_INTERNAL_ERROR_4); /* Checked above! */
}
}
else
rc = RTErrInfoSetF(pErrInfo, VERR_LDRVI_EXPECTED_INDIRECT_DATA_CONTENT_OID,
"Unknown pSignedData.ContentInfo.ContentType.szObjId value: %s (expected %s)",
pSignature->pSignedData->ContentInfo.ContentType.szObjId, RTCRSPCINDIRECTDATACONTENT_OID);
}
}
return rc;
}
static int rtldrPE_VerifyAllPageHashes(PRTLDRMODPE pModPe, PCRTCRSPCSERIALIZEDOBJECTATTRIBUTE pAttrib, RTDIGESTTYPE enmDigest,
void *pvScratch, size_t cbScratch, PRTERRINFO pErrInfo)
{
AssertReturn(cbScratch >= _4K, VERR_INTERNAL_ERROR_3);
/*
* Calculate the special places.
*/
RTLDRPEHASHSPECIALS SpecialPlaces = { 0, 0, 0, 0, 0, 0 }; /* shut up gcc */
int rc = rtldrPe_CalcSpecialHashPlaces(pModPe, &SpecialPlaces, pErrInfo);
if (RT_FAILURE(rc))
return rc;
uint32_t const cbHash = rtLdrPE_HashGetHashSize(enmDigest);
uint32_t const cPages = pAttrib->u.pPageHashes->RawData.Asn1Core.cb / (cbHash + 4);
if (cPages * (cbHash + 4) != pAttrib->u.pPageHashes->RawData.Asn1Core.cb)
return RTErrInfoSetF(pErrInfo, VERR_LDRVI_PAGE_HASH_TAB_SIZE_OVERFLOW,
"Page hashes size issue: cb=%#x cbHash=%#x",
pAttrib->u.pPageHashes->RawData.Asn1Core.cb, cbHash);
/*
* Walk the table.
*/
uint32_t const cbScratchReadMax = cbScratch & ~(uint32_t)(_4K - 1);
uint32_t cbScratchRead = 0;
uint32_t offScratchRead = 0;
uint32_t offPrev = 0;
#ifdef COMPLICATED_AND_WRONG
uint32_t offSectEnd = pModPe->cbHeaders;
uint32_t iSh = UINT32_MAX;
#endif
uint8_t const *pbHashTab = pAttrib->u.pPageHashes->RawData.Asn1Core.uData.pu8;
for (uint32_t iPage = 0; iPage < cPages; iPage++)
{
/* Decode the page offset. */
uint32_t const offPageInFile = RT_MAKE_U32_FROM_U8(pbHashTab[0], pbHashTab[1], pbHashTab[2], pbHashTab[3]);
if (offPageInFile >= SpecialPlaces.cbToHash)
{
/* The last entry is zero. */
if ( offPageInFile == SpecialPlaces.cbToHash
&& iPage + 1 == cPages
&& ASMMemIsAll8(pbHashTab + 4, cbHash, 0) == NULL)
return VINF_SUCCESS;
return RTErrInfoSetF(pErrInfo, VERR_LDRVI_PAGE_HASH_TAB_TOO_LONG,
"Page hash entry #%u is beyond the signature table start: %#x, %#x",
iPage, offPageInFile, SpecialPlaces.cbToHash);
}
if (offPageInFile < offPrev)
return RTErrInfoSetF(pErrInfo, VERR_LDRVI_PAGE_HASH_TAB_NOT_STRICTLY_SORTED,
"Page hash table is not strictly sorted: entry #%u @%#x, previous @%#x\n",
iPage, offPageInFile, offPrev);
#ifdef COMPLICATED_AND_WRONG
/* Figure out how much to read and how much to zero. Need keep track
of the on-disk section boundraries. */
if (offPageInFile >= offSectEnd)
{
iSh++;
if ( iSh < pModPe->cSections
&& offPageInFile - pModPe->paSections[iSh].PointerToRawData < pModPe->paSections[iSh].SizeOfRawData)
offSectEnd = pModPe->paSections[iSh].PointerToRawData + pModPe->paSections[iSh].SizeOfRawData;
else
{
iSh = 0;
while ( iSh < pModPe->cSections
&& offPageInFile - pModPe->paSections[iSh].PointerToRawData >= pModPe->paSections[iSh].SizeOfRawData)
iSh++;
if (iSh < pModPe->cSections)
offSectEnd = pModPe->paSections[iSh].PointerToRawData + pModPe->paSections[iSh].SizeOfRawData;
else
return RTErrInfoSetF(pErrInfo, VERR_PAGE_HASH_TAB_HASHES_NON_SECTION_DATA,
"Page hash entry #%u isn't in any section: %#x", iPage, offPageInFile);
}
}
#else
/* Figure out how much to read and how much take as zero. Use the next
page offset and the signature as upper boundraries. */
#endif
uint32_t cbPageInFile = _4K;
#ifdef COMPLICATED_AND_WRONG
if (offPageInFile + cbPageInFile > offSectEnd)
cbPageInFile = offSectEnd - offPageInFile;
#else
if (iPage + 1 < cPages)
{
uint32_t offNextPage = RT_MAKE_U32_FROM_U8(pbHashTab[0 + 4 + cbHash], pbHashTab[1 + 4 + cbHash],
pbHashTab[2 + 4 + cbHash], pbHashTab[3 + 4 + cbHash]);
if (offNextPage - offPageInFile < cbPageInFile)
cbPageInFile = offNextPage - offPageInFile;
}
#endif
if (offPageInFile + cbPageInFile > SpecialPlaces.cbToHash)
cbPageInFile = SpecialPlaces.cbToHash - offPageInFile;
/* Did we get a cache hit? */
uint8_t *pbCur = (uint8_t *)pvScratch;
if ( offPageInFile + cbPageInFile <= offScratchRead + cbScratchRead
&& offPageInFile >= offScratchRead)
pbCur += offPageInFile - offScratchRead;
/* Missed, read more. */
else
{
offScratchRead = offPageInFile;
#ifdef COMPLICATED_AND_WRONG
cbScratchRead = offSectEnd - offPageInFile;
#else
cbScratchRead = SpecialPlaces.cbToHash - offPageInFile;
#endif
if (cbScratchRead > cbScratchReadMax)
cbScratchRead = cbScratchReadMax;
rc = pModPe->Core.pReader->pfnRead(pModPe->Core.pReader, pbCur, cbScratchRead, offScratchRead);
if (RT_FAILURE(rc))
return RTErrInfoSetF(pErrInfo, VERR_LDRVI_READ_ERROR_HASH,
"Page hash read error at %#x: %Rrc (cbScratchRead=%#zx)",
offScratchRead, rc, cbScratchRead);
}
/*
* Hash it.
*/
RTLDRPEHASHCTXUNION HashCtx;
rc = rtLdrPE_HashInit(&HashCtx, enmDigest);
AssertRCReturn(rc, rc);
/* Deal with special places. */
uint32_t cbLeft = cbPageInFile;
if (offPageInFile < SpecialPlaces.offEndSpecial)
{
uint32_t off = offPageInFile;
if (off < SpecialPlaces.offCksum)
{
/* Hash everything up to the checksum. */
uint32_t cbChunk = RT_MIN(SpecialPlaces.offCksum - off, cbLeft);
rtLdrPE_HashUpdate(&HashCtx, enmDigest, pbCur, cbChunk);
pbCur += cbChunk;
cbLeft -= cbChunk;
off += cbChunk;
}
if (off < SpecialPlaces.offCksum + SpecialPlaces.cbCksum && off >= SpecialPlaces.offCksum)
{
/* Skip the checksum */
uint32_t cbChunk = RT_MIN(SpecialPlaces.offCksum + SpecialPlaces.cbCksum - off, cbLeft);
pbCur += cbChunk;
cbLeft -= cbChunk;
off += cbChunk;
}
if (off < SpecialPlaces.offSecDir && off >= SpecialPlaces.offCksum + SpecialPlaces.cbCksum)
{
/* Hash everything between the checksum and the data dir entry. */
uint32_t cbChunk = RT_MIN(SpecialPlaces.offSecDir - off, cbLeft);
rtLdrPE_HashUpdate(&HashCtx, enmDigest, pbCur, cbChunk);
pbCur += cbChunk;
cbLeft -= cbChunk;
off += cbChunk;
}
if (off < SpecialPlaces.offSecDir + SpecialPlaces.cbSecDir && off >= SpecialPlaces.offSecDir)
{
/* Skip the security data directory entry. */
uint32_t cbChunk = RT_MIN(SpecialPlaces.offSecDir + SpecialPlaces.cbSecDir - off, cbLeft);
pbCur += cbChunk;
cbLeft -= cbChunk;
off += cbChunk;
}
}
rtLdrPE_HashUpdate(&HashCtx, enmDigest, pbCur, cbLeft);
if (cbPageInFile < _4K)
rtLdrPE_HashUpdate(&HashCtx, enmDigest, &g_abRTZero4K[cbPageInFile], _4K - cbPageInFile);
/*
* Finish the hash calculation and compare the result.
*/
RTLDRPEHASHRESUNION HashRes;
rtLdrPE_HashFinalize(&HashCtx, enmDigest, &HashRes);
pbHashTab += 4;
if (memcmp(pbHashTab, &HashRes, cbHash) != 0)
return RTErrInfoSetF(pErrInfo, VERR_LDRVI_PAGE_HASH_MISMATCH,
"Page hash failed for page #%u, @%#x, %#x bytes: %.*Rhxs != %.*Rhxs",
iPage, offPageInFile, cbPageInFile, (size_t)cbHash, pbHashTab, (size_t)cbHash, &HashRes);
pbHashTab += cbHash;
offPrev = offPageInFile;
}
return VINF_SUCCESS;
}
/**
* Validates the image hash, including page hashes if present.
*
* @returns IPRT status code.
* @param pModPe The PE module.
* @param pSignature The decoded signature data.
* @param pErrInfo Optional error info buffer.
*/
static int rtldrPE_VerifySignatureValidateHash(PRTLDRMODPE pModPe, PRTLDRPESIGNATURE pSignature, PRTERRINFO pErrInfo)
{
AssertReturn(pSignature->enmDigest > RTDIGESTTYPE_INVALID && pSignature->enmDigest < RTDIGESTTYPE_END, VERR_INTERNAL_ERROR_4);
AssertPtrReturn(pSignature->pIndData, VERR_INTERNAL_ERROR_5);
AssertReturn(RTASN1CORE_IS_PRESENT(&pSignature->pIndData->DigestInfo.Digest.Asn1Core), VERR_INTERNAL_ERROR_5);
AssertPtrReturn(pSignature->pIndData->DigestInfo.Digest.Asn1Core.uData.pv, VERR_INTERNAL_ERROR_5);
uint32_t const cbHash = rtLdrPE_HashGetHashSize(pSignature->enmDigest);
AssertReturn(pSignature->pIndData->DigestInfo.Digest.Asn1Core.cb == cbHash, VERR_INTERNAL_ERROR_5);
/*
* Allocate a temporary memory buffer.
*/
#ifdef IN_RING0
uint32_t cbScratch = _256K;
#else
uint32_t cbScratch = _1M;
#endif
void *pvScratch = RTMemTmpAlloc(cbScratch);
if (!pvScratch)
{
cbScratch = _4K;
pvScratch = RTMemTmpAlloc(cbScratch);
if (!pvScratch)
return RTErrInfoSet(pErrInfo, VERR_NO_TMP_MEMORY, "Failed to allocate 4KB of scratch space for hashing image.");
}
/*
* Calculate and compare the full image hash.
*/
int rc = rtldrPE_HashImageCommon(pModPe, pvScratch, cbScratch, pSignature->enmDigest,
&pSignature->HashCtx, &pSignature->HashRes, pErrInfo);
if (RT_SUCCESS(rc))
{
if (!memcmp(&pSignature->HashRes, pSignature->pIndData->DigestInfo.Digest.Asn1Core.uData.pv, cbHash))
{
/*
* Compare the page hashes if present.
*
* Seems the difference between V1 and V2 page hash attributes is
* that v1 uses SHA-1 while v2 uses SHA-256. The data structures to
* be identical otherwise. Initially we assumed the digest
* algorithm was supposed to be RTCRSPCINDIRECTDATACONTENT::DigestInfo,
* i.e. the same as for the whole image hash. The initial approach
* worked just fine, but this makes more sense.
*
* (See also comments in osslsigncode.c (google it).)
*/
PCRTCRSPCSERIALIZEDOBJECTATTRIBUTE pAttrib;
pAttrib = RTCrSpcIndirectDataContent_GetPeImageObjAttrib(pSignature->pIndData,
RTCRSPCSERIALIZEDOBJECTATTRIBUTETYPE_PAGE_HASHES_V2);
if (pAttrib)
rc = rtldrPE_VerifyAllPageHashes(pModPe, pAttrib, RTDIGESTTYPE_SHA256, pvScratch, cbScratch, pErrInfo);
else
{
pAttrib = RTCrSpcIndirectDataContent_GetPeImageObjAttrib(pSignature->pIndData,
RTCRSPCSERIALIZEDOBJECTATTRIBUTETYPE_PAGE_HASHES_V1);
if (pAttrib)
rc = rtldrPE_VerifyAllPageHashes(pModPe, pAttrib, RTDIGESTTYPE_SHA1, pvScratch, cbScratch, pErrInfo);
}
return rc;
}
rc = RTErrInfoSetF(pErrInfo, VERR_LDRVI_IMAGE_HASH_MISMATCH,
"Full image signature mismatch: %.*Rhxs, expected %.*Rhxs",
cbHash, &pSignature->HashRes,
cbHash, pSignature->pIndData->DigestInfo.Digest.Asn1Core.uData.pv);
}
RTMemTmpFree(pvScratch);
return rc;
}
#endif /* !IPRT_WITHOUT_LDR_VERIFY */
/** @interface_method_impl{RTLDROPS,pfnVerifySignature} */
static DECLCALLBACK(int) rtldrPE_VerifySignature(PRTLDRMODINTERNAL pMod, PFNRTLDRVALIDATESIGNEDDATA pfnCallback, void *pvUser,
PRTERRINFO pErrInfo)
{
#ifndef IPRT_WITHOUT_LDR_VERIFY
PRTLDRMODPE pModPe = (PRTLDRMODPE)pMod;
int rc = rtldrPE_VerifySignatureImagePrecoditions(pModPe, pErrInfo);
if (RT_SUCCESS(rc))
{
PRTLDRPESIGNATURE pSignature = NULL;
rc = rtldrPE_VerifySignatureRead(pModPe, &pSignature, pErrInfo);
if (RT_SUCCESS(rc))
{
rc = rtldrPE_VerifySignatureDecode(pModPe, pSignature, pErrInfo);
if (RT_SUCCESS(rc))
rc = rtldrPE_VerifySignatureValidateHash(pModPe, pSignature, pErrInfo);
if (RT_SUCCESS(rc))
{
rc = pfnCallback(&pModPe->Core, RTLDRSIGNATURETYPE_PKCS7_SIGNED_DATA,
&pSignature->ContentInfo, sizeof(pSignature->ContentInfo),
pErrInfo, pvUser);
}
rtldrPE_VerifySignatureDestroy(pModPe, pSignature);
}
}
return rc;
#else
return VERR_NOT_SUPPORTED;
#endif
}
/** @interface_method_impl{RTLDROPS,pfnHashImage} */
static DECLCALLBACK(int) rtldrPE_HashImage(PRTLDRMODINTERNAL pMod, RTDIGESTTYPE enmDigest, char *pszDigest, size_t cbDigest)
{
PRTLDRMODPE pModPe = (PRTLDRMODPE)pMod;
/*
* Allocate a temporary memory buffer.
*/
uint32_t cbScratch = _16K;
void *pvScratch = RTMemTmpAlloc(cbScratch);
if (!pvScratch)
{
cbScratch = _4K;
pvScratch = RTMemTmpAlloc(cbScratch);
if (!pvScratch)
return VERR_NO_TMP_MEMORY;
}
/*
* Do the hashing.
*/
RTLDRPEHASHCTXUNION HashCtx;
RTLDRPEHASHRESUNION HashRes;
int rc = rtldrPE_HashImageCommon(pModPe, pvScratch, cbScratch, enmDigest, &HashCtx, &HashRes, NULL);
if (RT_SUCCESS(rc))
{
/*
* Format the digest into as human readable hash string.
*/
switch (enmDigest)
{
case RTDIGESTTYPE_SHA512: rc = RTSha512ToString(HashRes.abSha512, pszDigest, cbDigest); break;
case RTDIGESTTYPE_SHA256: rc = RTSha256ToString(HashRes.abSha256, pszDigest, cbDigest); break;
case RTDIGESTTYPE_SHA1: rc = RTSha1ToString(HashRes.abSha1, pszDigest, cbDigest); break;
case RTDIGESTTYPE_MD5: rc = RTMd5ToString(HashRes.abMd5, pszDigest, cbDigest); break;
default: AssertFailedReturn(VERR_INTERNAL_ERROR_3);
}
}
return rc;
}
/** @copydoc RTLDROPS::pfnDone */
static DECLCALLBACK(int) rtldrPEDone(PRTLDRMODINTERNAL pMod)
{
PRTLDRMODPE pModPe = (PRTLDRMODPE)pMod;
if (pModPe->pvBits)
{
RTMemFree(pModPe->pvBits);
pModPe->pvBits = NULL;
}
return VINF_SUCCESS;
}
/** @copydoc RTLDROPS::pfnClose */
static DECLCALLBACK(int) rtldrPEClose(PRTLDRMODINTERNAL pMod)
{
PRTLDRMODPE pModPe = (PRTLDRMODPE)pMod;
if (pModPe->paSections)
{
RTMemFree(pModPe->paSections);
pModPe->paSections = NULL;
}
if (pModPe->pvBits)
{
RTMemFree(pModPe->pvBits);
pModPe->pvBits = NULL;
}
return VINF_SUCCESS;
}
/**
* Operations for a 32-bit PE module.
*/
static const RTLDROPSPE s_rtldrPE32Ops =
{
{
"pe32",
rtldrPEClose,
NULL,
rtldrPEDone,
rtldrPEEnumSymbols,
/* ext */
rtldrPEGetImageSize,
rtldrPEGetBits,
rtldrPERelocate,
rtldrPEGetSymbolEx,
rtldrPE_EnumDbgInfo,
rtldrPE_EnumSegments,
rtldrPE_LinkAddressToSegOffset,
rtldrPE_LinkAddressToRva,
rtldrPE_SegOffsetToRva,
rtldrPE_RvaToSegOffset,
NULL,
rtldrPE_QueryProp,
rtldrPE_VerifySignature,
rtldrPE_HashImage,
42
},
rtldrPEResolveImports32,
42
};
/**
* Operations for a 64-bit PE module.
*/
static const RTLDROPSPE s_rtldrPE64Ops =
{
{
"pe64",
rtldrPEClose,
NULL,
rtldrPEDone,
rtldrPEEnumSymbols,
/* ext */
rtldrPEGetImageSize,
rtldrPEGetBits,
rtldrPERelocate,
rtldrPEGetSymbolEx,
rtldrPE_EnumDbgInfo,
rtldrPE_EnumSegments,
rtldrPE_LinkAddressToSegOffset,
rtldrPE_LinkAddressToRva,
rtldrPE_SegOffsetToRva,
rtldrPE_RvaToSegOffset,
NULL,
rtldrPE_QueryProp,
rtldrPE_VerifySignature,
rtldrPE_HashImage,
42
},
rtldrPEResolveImports64,
42
};
/**
* Converts the optional header from 32 bit to 64 bit.
* This is a rather simple task, if you start from the right end.
*
* @param pOptHdr On input this is a PIMAGE_OPTIONAL_HEADER32.
* On output this will be a PIMAGE_OPTIONAL_HEADER64.
*/
static void rtldrPEConvert32BitOptionalHeaderTo64Bit(PIMAGE_OPTIONAL_HEADER64 pOptHdr)
{
/*
* volatile everywhere! Trying to prevent the compiler being a smarta$$ and reorder stuff.
*/
IMAGE_OPTIONAL_HEADER32 volatile *pOptHdr32 = (IMAGE_OPTIONAL_HEADER32 volatile *)pOptHdr;
IMAGE_OPTIONAL_HEADER64 volatile *pOptHdr64 = pOptHdr;
/* from LoaderFlags and out the difference is 4 * 32-bits. */
Assert(RT_OFFSETOF(IMAGE_OPTIONAL_HEADER32, LoaderFlags) + 16 == RT_OFFSETOF(IMAGE_OPTIONAL_HEADER64, LoaderFlags));
Assert( RT_OFFSETOF(IMAGE_OPTIONAL_HEADER32, DataDirectory[IMAGE_NUMBEROF_DIRECTORY_ENTRIES]) + 16
== RT_OFFSETOF(IMAGE_OPTIONAL_HEADER64, DataDirectory[IMAGE_NUMBEROF_DIRECTORY_ENTRIES]));
uint32_t volatile *pu32Dst = (uint32_t *)&pOptHdr64->DataDirectory[IMAGE_NUMBEROF_DIRECTORY_ENTRIES] - 1;
const uint32_t volatile *pu32Src = (uint32_t *)&pOptHdr32->DataDirectory[IMAGE_NUMBEROF_DIRECTORY_ENTRIES] - 1;
const uint32_t volatile *pu32SrcLast = (uint32_t *)&pOptHdr32->LoaderFlags;
while (pu32Src >= pu32SrcLast)
*pu32Dst-- = *pu32Src--;
/* the previous 4 fields are 32/64 and needs special attention. */
pOptHdr64->SizeOfHeapCommit = pOptHdr32->SizeOfHeapCommit;
pOptHdr64->SizeOfHeapReserve = pOptHdr32->SizeOfHeapReserve;
pOptHdr64->SizeOfStackCommit = pOptHdr32->SizeOfStackCommit;
uint32_t u32SizeOfStackReserve = pOptHdr32->SizeOfStackReserve;
pOptHdr64->SizeOfStackReserve = u32SizeOfStackReserve;
/* The rest matches except for BaseOfData which has been merged into ImageBase in the 64-bit version..
* Thus, ImageBase needs some special treatment. It will probably work fine assigning one to the
* other since this is all declared volatile, but taking now chances, we'll use a temp variable.
*/
Assert(RT_OFFSETOF(IMAGE_OPTIONAL_HEADER32, SizeOfStackReserve) == RT_OFFSETOF(IMAGE_OPTIONAL_HEADER64, SizeOfStackReserve));
Assert(RT_OFFSETOF(IMAGE_OPTIONAL_HEADER32, BaseOfData) == RT_OFFSETOF(IMAGE_OPTIONAL_HEADER64, ImageBase));
Assert(RT_OFFSETOF(IMAGE_OPTIONAL_HEADER32, SectionAlignment) == RT_OFFSETOF(IMAGE_OPTIONAL_HEADER64, SectionAlignment));
uint32_t u32ImageBase = pOptHdr32->ImageBase;
pOptHdr64->ImageBase = u32ImageBase;
}
/**
* Converts the load config directory from 32 bit to 64 bit.
* This is a rather simple task, if you start from the right end.
*
* @param pLoadCfg On input this is a PIMAGE_LOAD_CONFIG_DIRECTORY32.
* On output this will be a PIMAGE_LOAD_CONFIG_DIRECTORY64.
*/
static void rtldrPEConvert32BitLoadConfigTo64Bit(PIMAGE_LOAD_CONFIG_DIRECTORY64 pLoadCfg)
{
/*
* volatile everywhere! Trying to prevent the compiler being a smarta$$ and reorder stuff.
*/
IMAGE_LOAD_CONFIG_DIRECTORY32_V3 volatile *pLoadCfg32 = (IMAGE_LOAD_CONFIG_DIRECTORY32_V3 volatile *)pLoadCfg;
IMAGE_LOAD_CONFIG_DIRECTORY64_V3 volatile *pLoadCfg64 = pLoadCfg;
pLoadCfg64->GuardFlags = pLoadCfg32->GuardFlags;
pLoadCfg64->GuardCFFunctionCount = pLoadCfg32->GuardCFFunctionCount;
pLoadCfg64->GuardCFFunctionTable = pLoadCfg32->GuardCFFunctionTable;
pLoadCfg64->Reserved2 = pLoadCfg32->Reserved2;
pLoadCfg64->GuardCFCCheckFunctionPointer= pLoadCfg32->GuardCFCCheckFunctionPointer;
pLoadCfg64->SEHandlerCount = pLoadCfg32->SEHandlerCount;
pLoadCfg64->SEHandlerTable = pLoadCfg32->SEHandlerTable;
pLoadCfg64->SecurityCookie = pLoadCfg32->SecurityCookie;
pLoadCfg64->EditList = pLoadCfg32->EditList;
pLoadCfg64->Reserved1 = pLoadCfg32->Reserved1;
pLoadCfg64->CSDVersion = pLoadCfg32->CSDVersion;
pLoadCfg64->ProcessHeapFlags = pLoadCfg32->ProcessHeapFlags; /* switched place with ProcessAffinityMask, but we're more than 16 byte off by now so it doesn't matter. */
pLoadCfg64->ProcessAffinityMask = pLoadCfg32->ProcessAffinityMask;
pLoadCfg64->VirtualMemoryThreshold = pLoadCfg32->VirtualMemoryThreshold;
pLoadCfg64->MaximumAllocationSize = pLoadCfg32->MaximumAllocationSize;
pLoadCfg64->LockPrefixTable = pLoadCfg32->LockPrefixTable;
pLoadCfg64->DeCommitTotalFreeThreshold = pLoadCfg32->DeCommitTotalFreeThreshold;
uint32_t u32DeCommitFreeBlockThreshold = pLoadCfg32->DeCommitFreeBlockThreshold;
pLoadCfg64->DeCommitFreeBlockThreshold = u32DeCommitFreeBlockThreshold;
/* the rest is equal. */
Assert( RT_OFFSETOF(IMAGE_LOAD_CONFIG_DIRECTORY32, DeCommitFreeBlockThreshold)
== RT_OFFSETOF(IMAGE_LOAD_CONFIG_DIRECTORY64, DeCommitFreeBlockThreshold));
}
/**
* Validates the file header.
*
* @returns iprt status code.
* @param pFileHdr Pointer to the file header that needs validating.
* @param fFlags Valid RTLDR_O_XXX combination.
* @param pszLogName The log name to prefix the errors with.
* @param penmArch Where to store the CPU architecture.
*/
static int rtldrPEValidateFileHeader(PIMAGE_FILE_HEADER pFileHdr, uint32_t fFlags, const char *pszLogName, PRTLDRARCH penmArch)
{
size_t cbOptionalHeader;
switch (pFileHdr->Machine)
{
case IMAGE_FILE_MACHINE_I386:
cbOptionalHeader = sizeof(IMAGE_OPTIONAL_HEADER32);
*penmArch = RTLDRARCH_X86_32;
break;
case IMAGE_FILE_MACHINE_AMD64:
cbOptionalHeader = sizeof(IMAGE_OPTIONAL_HEADER64);
*penmArch = RTLDRARCH_AMD64;
break;
default:
Log(("rtldrPEOpen: %s: Unsupported Machine=%#x\n",
pszLogName, pFileHdr->Machine));
*penmArch = RTLDRARCH_INVALID;
return VERR_BAD_EXE_FORMAT;
}
if (pFileHdr->SizeOfOptionalHeader != cbOptionalHeader)
{
Log(("rtldrPEOpen: %s: SizeOfOptionalHeader=%#x expected %#x\n",
pszLogName, pFileHdr->SizeOfOptionalHeader, cbOptionalHeader));
return VERR_BAD_EXE_FORMAT;
}
/* This restriction needs to be implemented elsewhere. */
if ( (pFileHdr->Characteristics & IMAGE_FILE_RELOCS_STRIPPED)
&& !(fFlags & (RTLDR_O_FOR_DEBUG | RTLDR_O_FOR_VALIDATION)))
{
Log(("rtldrPEOpen: %s: IMAGE_FILE_RELOCS_STRIPPED\n", pszLogName));
return VERR_BAD_EXE_FORMAT;
}
if (pFileHdr->NumberOfSections > 42)
{
Log(("rtldrPEOpen: %s: NumberOfSections=%d - our limit is 42, please raise it if the binary makes sense.(!!!)\n",
pszLogName, pFileHdr->NumberOfSections));
return VERR_BAD_EXE_FORMAT;
}
if (pFileHdr->NumberOfSections < 1)
{
Log(("rtldrPEOpen: %s: NumberOfSections=%d - we can't have an image without sections (!!!)\n",
pszLogName, pFileHdr->NumberOfSections));
return VERR_BAD_EXE_FORMAT;
}
return VINF_SUCCESS;
}
/**
* Validates the optional header (64/32-bit)
*
* @returns iprt status code.
* @param pOptHdr Pointer to the optional header which needs validation.
* @param pszLogName The log name to prefix the errors with.
* @param offNtHdrs The offset of the NT headers from the start of the file.
* @param pFileHdr Pointer to the file header (valid).
* @param cbRawImage The raw image size.
* @param fFlags Loader flags, RTLDR_O_XXX.
*/
static int rtldrPEValidateOptionalHeader(const IMAGE_OPTIONAL_HEADER64 *pOptHdr, const char *pszLogName, RTFOFF offNtHdrs,
const IMAGE_FILE_HEADER *pFileHdr, RTFOFF cbRawImage, uint32_t fFlags)
{
const uint16_t CorrectMagic = pFileHdr->SizeOfOptionalHeader == sizeof(IMAGE_OPTIONAL_HEADER32)
? IMAGE_NT_OPTIONAL_HDR32_MAGIC : IMAGE_NT_OPTIONAL_HDR64_MAGIC;
if (pOptHdr->Magic != CorrectMagic)
{
Log(("rtldrPEOpen: %s: Magic=%#x - expected %#x!!!\n", pszLogName, pOptHdr->Magic, CorrectMagic));
return VERR_BAD_EXE_FORMAT;
}
const uint32_t cbImage = pOptHdr->SizeOfImage;
if (cbImage > _1G)
{
Log(("rtldrPEOpen: %s: SizeOfImage=%#x - Our limit is 1GB (%#x)!!!\n", pszLogName, cbImage, _1G));
return VERR_BAD_EXE_FORMAT;
}
const uint32_t cbMinImageSize = pFileHdr->SizeOfOptionalHeader + sizeof(*pFileHdr) + 4 + (uint32_t)offNtHdrs;
if (cbImage < cbMinImageSize)
{
Log(("rtldrPEOpen: %s: SizeOfImage=%#x to small, minimum %#x!!!\n", pszLogName, cbImage, cbMinImageSize));
return VERR_BAD_EXE_FORMAT;
}
if (pOptHdr->AddressOfEntryPoint >= cbImage)
{
Log(("rtldrPEOpen: %s: AddressOfEntryPoint=%#x - beyond image size (%#x)!!!\n",
pszLogName, pOptHdr->AddressOfEntryPoint, cbImage));
return VERR_BAD_EXE_FORMAT;
}
if (pOptHdr->BaseOfCode >= cbImage)
{
Log(("rtldrPEOpen: %s: BaseOfCode=%#x - beyond image size (%#x)!!!\n",
pszLogName, pOptHdr->BaseOfCode, cbImage));
return VERR_BAD_EXE_FORMAT;
}
#if 0/* only in 32-bit header */
if (pOptHdr->BaseOfData >= cbImage)
{
Log(("rtldrPEOpen: %s: BaseOfData=%#x - beyond image size (%#x)!!!\n",
pszLogName, pOptHdr->BaseOfData, cbImage));
return VERR_BAD_EXE_FORMAT;
}
#endif
if (pOptHdr->SizeOfHeaders >= cbImage)
{
Log(("rtldrPEOpen: %s: SizeOfHeaders=%#x - beyond image size (%#x)!!!\n",
pszLogName, pOptHdr->SizeOfHeaders, cbImage));
return VERR_BAD_EXE_FORMAT;
}
/* don't know how to do the checksum, so ignore it. */
if (pOptHdr->Subsystem == IMAGE_SUBSYSTEM_UNKNOWN)
{
Log(("rtldrPEOpen: %s: Subsystem=%#x (unknown)!!!\n", pszLogName, pOptHdr->Subsystem));
return VERR_BAD_EXE_FORMAT;
}
if (pOptHdr->SizeOfHeaders < cbMinImageSize + pFileHdr->NumberOfSections * sizeof(IMAGE_SECTION_HEADER))
{
Log(("rtldrPEOpen: %s: SizeOfHeaders=%#x - cbMinImageSize %#x + sections %#x = %#llx!!!\n",
pszLogName, pOptHdr->SizeOfHeaders,
cbImage, cbMinImageSize, pFileHdr->NumberOfSections * sizeof(IMAGE_SECTION_HEADER),
cbMinImageSize + pFileHdr->NumberOfSections * sizeof(IMAGE_SECTION_HEADER)));
return VERR_BAD_EXE_FORMAT;
}
if (pOptHdr->SizeOfStackReserve < pOptHdr->SizeOfStackCommit)
{
Log(("rtldrPEOpen: %s: SizeOfStackReserve %#x < SizeOfStackCommit %#x!!!\n",
pszLogName, pOptHdr->SizeOfStackReserve, pOptHdr->SizeOfStackCommit));
return VERR_BAD_EXE_FORMAT;
}
if (pOptHdr->SizeOfHeapReserve < pOptHdr->SizeOfHeapCommit)
{
Log(("rtldrPEOpen: %s: SizeOfStackReserve %#x < SizeOfStackCommit %#x!!!\n",
pszLogName, pOptHdr->SizeOfStackReserve, pOptHdr->SizeOfStackCommit));
return VERR_BAD_EXE_FORMAT;
}
/* DataDirectory */
if (pOptHdr->NumberOfRvaAndSizes != RT_ELEMENTS(pOptHdr->DataDirectory))
{
Log(("rtldrPEOpen: %s: NumberOfRvaAndSizes=%d!!!\n", pszLogName, pOptHdr->NumberOfRvaAndSizes));
return VERR_BAD_EXE_FORMAT;
}
for (unsigned i = 0; i < RT_ELEMENTS(pOptHdr->DataDirectory); i++)
{
IMAGE_DATA_DIRECTORY const *pDir = &pOptHdr->DataDirectory[i];
if (!pDir->Size)
continue;
size_t cb = cbImage;
switch (i)
{
case IMAGE_DIRECTORY_ENTRY_EXPORT: // 0
case IMAGE_DIRECTORY_ENTRY_IMPORT: // 1
case IMAGE_DIRECTORY_ENTRY_RESOURCE: // 2
case IMAGE_DIRECTORY_ENTRY_EXCEPTION: // 3
case IMAGE_DIRECTORY_ENTRY_BASERELOC: // 5
case IMAGE_DIRECTORY_ENTRY_DEBUG: // 6
case IMAGE_DIRECTORY_ENTRY_COPYRIGHT: // 7
case IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT: // 11
case IMAGE_DIRECTORY_ENTRY_IAT: // 12 /* Import Address Table */
break;
case IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG: // 10 - need to check for lock prefixes.
/* Delay inspection after section table is validated. */
break;
case IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT: // 13
if (fFlags & (RTLDR_O_FOR_DEBUG | RTLDR_O_FOR_VALIDATION))
break;
Log(("rtldrPEOpen: %s: dir no. %d (DELAY_IMPORT) VirtualAddress=%#x Size=%#x is not supported!!!\n",
pszLogName, i, pDir->VirtualAddress, pDir->Size));
return VERR_LDRPE_DELAY_IMPORT;
case IMAGE_DIRECTORY_ENTRY_SECURITY: // 4
/* The VirtualAddress is a PointerToRawData. */
cb = (size_t)cbRawImage; Assert((RTFOFF)cb == cbRawImage);
Log(("rtldrPEOpen: %s: dir no. %d (SECURITY) VirtualAddress=%#x Size=%#x is not supported!!!\n",
pszLogName, i, pDir->VirtualAddress, pDir->Size));
if (pDir->Size < sizeof(WIN_CERTIFICATE))
{
Log(("rtldrPEOpen: %s: Security directory is too small: %#x bytes\n", pszLogName, i, pDir->Size));
return VERR_LDRPE_CERT_MALFORMED;
}
if (pDir->Size >= RTLDRMODPE_MAX_SECURITY_DIR_SIZE)
{
Log(("rtldrPEOpen: %s: Security directory is too large: %#x bytes\n", pszLogName, i, pDir->Size));
return VERR_LDRPE_CERT_MALFORMED;
}
if (pDir->VirtualAddress & 7)
{
Log(("rtldrPEOpen: %s: Security directory is misaligned: %#x\n", pszLogName, i, pDir->VirtualAddress));
return VERR_LDRPE_CERT_MALFORMED;
}
/* When using the in-memory reader with a debugger, we may get
into trouble here since we might not have access to the whole
physical file. So skip the tests below. Makes VBoxGuest.sys
load and check out just fine, for instance. */
if (fFlags & RTLDR_O_FOR_DEBUG)
continue;
break;
case IMAGE_DIRECTORY_ENTRY_GLOBALPTR: // 8 /* (MIPS GP) */
Log(("rtldrPEOpen: %s: dir no. %d (GLOBALPTR) VirtualAddress=%#x Size=%#x is not supported!!!\n",
pszLogName, i, pDir->VirtualAddress, pDir->Size));
return VERR_LDRPE_GLOBALPTR;
case IMAGE_DIRECTORY_ENTRY_TLS: // 9
if (fFlags & (RTLDR_O_FOR_DEBUG | RTLDR_O_FOR_VALIDATION))
break;
Log(("rtldrPEOpen: %s: dir no. %d (TLS) VirtualAddress=%#x Size=%#x is not supported!!!\n",
pszLogName, i, pDir->VirtualAddress, pDir->Size));
return VERR_LDRPE_TLS;
case IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR:// 14
if (fFlags & (RTLDR_O_FOR_DEBUG | RTLDR_O_FOR_VALIDATION))
break;
Log(("rtldrPEOpen: %s: dir no. %d (COM_DESCRIPTOR) VirtualAddress=%#x Size=%#x is not supported!!!\n",
pszLogName, i, pDir->VirtualAddress, pDir->Size));
return VERR_LDRPE_COM_DESCRIPTOR;
default:
Log(("rtldrPEOpen: %s: dir no. %d VirtualAddress=%#x Size=%#x is not supported!!!\n",
pszLogName, i, pDir->VirtualAddress, pDir->Size));
return VERR_BAD_EXE_FORMAT;
}
if (pDir->VirtualAddress >= cb)
{
Log(("rtldrPEOpen: %s: dir no. %d VirtualAddress=%#x is invalid (limit %#x)!!!\n",
pszLogName, i, pDir->VirtualAddress, cb));
return VERR_BAD_EXE_FORMAT;
}
if (pDir->Size > cb - pDir->VirtualAddress)
{
Log(("rtldrPEOpen: %s: dir no. %d Size=%#x is invalid (rva=%#x, limit=%#x)!!!\n",
pszLogName, i, pDir->Size, pDir->VirtualAddress, cb));
return VERR_BAD_EXE_FORMAT;
}
}
return VINF_SUCCESS;
}
/**
* Validates the section headers.
*
* @returns iprt status code.
* @param paSections Pointer to the array of sections that is to be validated.
* @param cSections Number of sections in that array.
* @param pszLogName The log name to prefix the errors with.
* @param pOptHdr Pointer to the optional header (valid).
* @param cbRawImage The raw image size.
* @param fFlags Loader flags, RTLDR_O_XXX.
*/
static int rtldrPEValidateSectionHeaders(const IMAGE_SECTION_HEADER *paSections, unsigned cSections, const char *pszLogName,
const IMAGE_OPTIONAL_HEADER64 *pOptHdr, RTFOFF cbRawImage, uint32_t fFlags)
{
const uint32_t cbImage = pOptHdr->SizeOfImage;
const IMAGE_SECTION_HEADER *pSH = &paSections[0];
uint32_t uRvaPrev = pOptHdr->SizeOfHeaders;
Log3(("RTLdrPE: Section Headers:\n"));
for (unsigned cSHdrsLeft = cSections; cSHdrsLeft > 0; cSHdrsLeft--, pSH++)
{
const unsigned iSH = (unsigned)(pSH - &paSections[0]); NOREF(iSH);
Log3(("RTLdrPE: #%d '%-8.8s' Characteristics: %08RX32\n"
"RTLdrPE: VirtAddr: %08RX32 VirtSize: %08RX32\n"
"RTLdrPE: FileOff: %08RX32 FileSize: %08RX32\n"
"RTLdrPE: RelocOff: %08RX32 #Relocs: %08RX32\n"
"RTLdrPE: LineOff: %08RX32 #Lines: %08RX32\n",
iSH, pSH->Name, pSH->Characteristics,
pSH->VirtualAddress, pSH->Misc.VirtualSize,
pSH->PointerToRawData, pSH->SizeOfRawData,
pSH->PointerToRelocations, pSH->NumberOfRelocations,
pSH->PointerToLinenumbers, pSH->NumberOfLinenumbers));
AssertCompile(IMAGE_SCN_MEM_16BIT == IMAGE_SCN_MEM_PURGEABLE);
if ( ( pSH->Characteristics & (IMAGE_SCN_MEM_PURGEABLE | IMAGE_SCN_MEM_PRELOAD | IMAGE_SCN_MEM_FARDATA) )
&& !(fFlags & RTLDR_O_FOR_DEBUG)) /* purgable/16-bit seen on w2ksp0 hal.dll, ignore the bunch. */
{
Log(("rtldrPEOpen: %s: Unsupported section flag(s) %#x section #%d '%.*s'!!!\n",
pszLogName, pSH->Characteristics, iSH, sizeof(pSH->Name), pSH->Name));
return VERR_BAD_EXE_FORMAT;
}
if ( pSH->Misc.VirtualSize
&& !(pSH->Characteristics & IMAGE_SCN_TYPE_NOLOAD)) /* binutils uses this for '.stab' even if it's reserved/obsoleted by MS. */
{
if (pSH->VirtualAddress < uRvaPrev)
{
Log(("rtldrPEOpen: %s: Overlaps previous section or sections aren't in ascending order, VirtualAddress=%#x uRvaPrev=%#x - section #%d '%.*s'!!!\n",
pszLogName, pSH->VirtualAddress, uRvaPrev, iSH, sizeof(pSH->Name), pSH->Name));
return VERR_BAD_EXE_FORMAT;
}
if (pSH->VirtualAddress > cbImage)
{
Log(("rtldrPEOpen: %s: VirtualAddress=%#x - beyond image size (%#x) - section #%d '%.*s'!!!\n",
pszLogName, pSH->VirtualAddress, cbImage, iSH, sizeof(pSH->Name), pSH->Name));
return VERR_BAD_EXE_FORMAT;
}
if (pSH->VirtualAddress & (pOptHdr->SectionAlignment - 1)) //ASSUMES power of 2 alignment.
{
Log(("rtldrPEOpen: %s: VirtualAddress=%#x misaligned (%#x) - section #%d '%.*s'!!!\n",
pszLogName, pSH->VirtualAddress, pOptHdr->SectionAlignment, iSH, sizeof(pSH->Name), pSH->Name));
return VERR_BAD_EXE_FORMAT;
}
#ifdef PE_FILE_OFFSET_EQUALS_RVA
/* Our loader code assume rva matches the file offset. */
if ( pSH->SizeOfRawData
&& pSH->PointerToRawData != pSH->VirtualAddress)
{
Log(("rtldrPEOpen: %s: ASSUMPTION FAILED: file offset %#x != RVA %#x - section #%d '%.*s'!!!\n",
pszLogName, pSH->PointerToRawData, pSH->VirtualAddress, iSH, sizeof(pSH->Name), pSH->Name));
return VERR_BAD_EXE_FORMAT;
}
#endif
}
///@todo only if SizeOfRawData > 0 ?
if ( pSH->PointerToRawData > cbRawImage /// @todo pSH->PointerToRawData >= cbRawImage ?
|| pSH->SizeOfRawData > cbRawImage
|| pSH->PointerToRawData + pSH->SizeOfRawData > cbRawImage)
{
Log(("rtldrPEOpen: %s: PointerToRawData=%#x SizeOfRawData=%#x - beyond end of file (%#x) - section #%d '%.*s'!!!\n",
pszLogName, pSH->PointerToRawData, pSH->SizeOfRawData, cbRawImage,
iSH, sizeof(pSH->Name), pSH->Name));
return VERR_BAD_EXE_FORMAT;
}
if (pSH->PointerToRawData & (pOptHdr->FileAlignment - 1)) //ASSUMES power of 2 alignment.
{
Log(("rtldrPEOpen: %s: PointerToRawData=%#x misaligned (%#x) - section #%d '%.*s'!!!\n",
pszLogName, pSH->PointerToRawData, pOptHdr->FileAlignment, iSH, sizeof(pSH->Name), pSH->Name));
return VERR_BAD_EXE_FORMAT;
}
/* ignore the relocations and linenumbers. */
uRvaPrev = pSH->VirtualAddress + pSH->Misc.VirtualSize;
}
/** @todo r=bird: more sanity checks! */
return VINF_SUCCESS;
}
/**
* Reads image data by RVA using the section headers.
*
* @returns iprt status code.
* @param pModPe The PE module instance.
* @param pvBuf Where to store the bits.
* @param cb Number of bytes to tread.
* @param RVA Where to read from.
*/
static int rtldrPEReadRVA(PRTLDRMODPE pModPe, void *pvBuf, uint32_t cb, uint32_t RVA)
{
const IMAGE_SECTION_HEADER *pSH = pModPe->paSections;
PRTLDRREADER pReader = pModPe->Core.pReader;
uint32_t cbRead;
int rc;
/*
* Is it the headers, i.e. prior to the first section.
*/
if (RVA < pModPe->cbHeaders)
{
cbRead = RT_MIN(pModPe->cbHeaders - RVA, cb);
rc = pReader->pfnRead(pReader, pvBuf, cbRead, RVA);
if ( cbRead == cb
|| RT_FAILURE(rc))
return rc;
cb -= cbRead;
RVA += cbRead;
pvBuf = (uint8_t *)pvBuf + cbRead;
}
/* In the zero space between headers and the first section? */
if (RVA < pSH->VirtualAddress)
{
cbRead = RT_MIN(pSH->VirtualAddress - RVA, cb);
memset(pvBuf, 0, cbRead);
if (cbRead == cb)
return VINF_SUCCESS;
cb -= cbRead;
RVA += cbRead;
pvBuf = (uint8_t *)pvBuf + cbRead;
}
/*
* Iterate the sections.
*/
for (unsigned cLeft = pModPe->cSections;
cLeft > 0;
cLeft--, pSH++)
{
uint32_t off = RVA - pSH->VirtualAddress;
if (off < pSH->Misc.VirtualSize)
{
cbRead = RT_MIN(pSH->Misc.VirtualSize - off, cb);
rc = pReader->pfnRead(pReader, pvBuf, cbRead, pSH->PointerToRawData + off);
if ( cbRead == cb
|| RT_FAILURE(rc))
return rc;
cb -= cbRead;
RVA += cbRead;
pvBuf = (uint8_t *)pvBuf + cbRead;
}
uint32_t RVANext = cLeft ? pSH[1].VirtualAddress : pModPe->cbImage;
if (RVA < RVANext)
{
cbRead = RT_MIN(RVANext - RVA, cb);
memset(pvBuf, 0, cbRead);
if (cbRead == cb)
return VINF_SUCCESS;
cb -= cbRead;
RVA += cbRead;
pvBuf = (uint8_t *)pvBuf + cbRead;
}
}
AssertFailed();
return VERR_INTERNAL_ERROR;
}
/**
* Validates the data of some selected data directories entries and remember
* important bits for later.
*
* This requires a valid section table and thus has to wait till after we've
* read and validated it.
*
* @returns iprt status code.
* @param pModPe The PE module instance.
* @param pOptHdr Pointer to the optional header (valid).
* @param fFlags Loader flags, RTLDR_O_XXX.
*/
static int rtldrPEValidateDirectoriesAndRememberStuff(PRTLDRMODPE pModPe, const IMAGE_OPTIONAL_HEADER64 *pOptHdr, uint32_t fFlags)
{
const char *pszLogName = pModPe->Core.pReader->pfnLogName(pModPe->Core.pReader); NOREF(pszLogName);
union /* combine stuff we're reading to help reduce stack usage. */
{
IMAGE_LOAD_CONFIG_DIRECTORY64 Cfg64;
} u;
/*
* The load config entry may include lock prefix tables and whatnot which we don't implement.
* It does also include a lot of stuff which we can ignore, so we'll have to inspect the
* actual data before we can make up our mind about it all.
*/
IMAGE_DATA_DIRECTORY Dir = pOptHdr->DataDirectory[IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG];
if (Dir.Size)
{
const size_t cbExpectV3 = !pModPe->f64Bit
? sizeof(IMAGE_LOAD_CONFIG_DIRECTORY32_V3)
: sizeof(IMAGE_LOAD_CONFIG_DIRECTORY64_V3);
const size_t cbExpectV2 = !pModPe->f64Bit
? sizeof(IMAGE_LOAD_CONFIG_DIRECTORY32_V2)
: sizeof(IMAGE_LOAD_CONFIG_DIRECTORY64_V2);
const size_t cbExpectV1 = !pModPe->f64Bit
? sizeof(IMAGE_LOAD_CONFIG_DIRECTORY32_V1)
: sizeof(IMAGE_LOAD_CONFIG_DIRECTORY64_V2) /*No V1*/;
if ( Dir.Size != cbExpectV3
&& Dir.Size != cbExpectV2
&& Dir.Size != cbExpectV1)
{
Log(("rtldrPEOpen: %s: load cfg dir: unexpected dir size of %d bytes, expected %d, %d, or %d.\n",
pszLogName, Dir.Size, cbExpectV3, cbExpectV2, cbExpectV1));
return VERR_LDRPE_LOAD_CONFIG_SIZE;
}
/*
* Read and convert to 64-bit.
*/
memset(&u.Cfg64, 0, sizeof(u.Cfg64));
int rc = rtldrPEReadRVA(pModPe, &u.Cfg64, Dir.Size, Dir.VirtualAddress);
if (RT_FAILURE(rc))
return rc;
rtldrPEConvert32BitLoadConfigTo64Bit(&u.Cfg64);
if (u.Cfg64.Size != Dir.Size)
{
/* Kludge, seen ati shipping 32-bit DLLs and EXEs with Dir.Size=0x40
and Cfg64.Size=0x5c or 0x48. Windows seems to deal with it, so
lets do so as well. */
if ( Dir.Size < u.Cfg64.Size
&& ( u.Cfg64.Size == cbExpectV3
|| u.Cfg64.Size == cbExpectV2) )
{
Log(("rtldrPEOpen: %s: load cfg dir: Header (%d) and directory (%d) size mismatch, applying the ATI kludge\n",
pszLogName, u.Cfg64.Size, Dir.Size));
Dir.Size = u.Cfg64.Size;
memset(&u.Cfg64, 0, sizeof(u.Cfg64));
rc = rtldrPEReadRVA(pModPe, &u.Cfg64, Dir.Size, Dir.VirtualAddress);
if (RT_FAILURE(rc))
return rc;
rtldrPEConvert32BitLoadConfigTo64Bit(&u.Cfg64);
}
if (u.Cfg64.Size != Dir.Size)
{
Log(("rtldrPEOpen: %s: load cfg dir: unexpected header size of %d bytes, expected %d.\n",
pszLogName, u.Cfg64.Size, Dir.Size));
return VERR_LDRPE_LOAD_CONFIG_SIZE;
}
}
if (u.Cfg64.LockPrefixTable && !(fFlags & (RTLDR_O_FOR_DEBUG | RTLDR_O_FOR_VALIDATION)))
{
Log(("rtldrPEOpen: %s: load cfg dir: lock prefix table at %RX64. We don't support lock prefix tables!\n",
pszLogName, u.Cfg64.LockPrefixTable));
return VERR_LDRPE_LOCK_PREFIX_TABLE;
}
#if 0/* this seems to be safe to ignore. */
if ( u.Cfg64.SEHandlerTable
|| u.Cfg64.SEHandlerCount)
{
Log(("rtldrPEOpen: %s: load cfg dir: SEHandlerTable=%RX64 and SEHandlerCount=%RX64 are unsupported!\n",
pszLogName, u.Cfg64.SEHandlerTable, u.Cfg64.SEHandlerCount));
return VERR_BAD_EXE_FORMAT;
}
#endif
if (u.Cfg64.EditList && !(fFlags & (RTLDR_O_FOR_DEBUG | RTLDR_O_FOR_VALIDATION)))
{
Log(("rtldrPEOpen: %s: load cfg dir: EditList=%RX64 is unsupported!\n",
pszLogName, u.Cfg64.EditList));
return VERR_BAD_EXE_FORMAT;
}
/** @todo GuardCFC? Possibly related to:
* http://research.microsoft.com/pubs/69217/ccs05-cfi.pdf
* Not trusting something designed by bakas who don't know how to modify a
* structure without messing up its natural alignment. */
if ( ( u.Cfg64.GuardCFCCheckFunctionPointer
|| u.Cfg64.Reserved2
|| u.Cfg64.GuardCFFunctionTable
|| u.Cfg64.GuardCFFunctionCount
|| u.Cfg64.GuardFlags)
&& !(fFlags & (RTLDR_O_FOR_DEBUG | RTLDR_O_FOR_VALIDATION)))
{
Log(("rtldrPEOpen: %s: load cfg dir: Guard stuff: %RX64,%RX64,%RX64,%RX64,%RX32!\n",
pszLogName, u.Cfg64.GuardCFCCheckFunctionPointer, u.Cfg64.Reserved2,
u.Cfg64.GuardCFFunctionTable, u.Cfg64.GuardCFFunctionCount, u.Cfg64.GuardFlags));
return VERR_BAD_EXE_FORMAT;
}
}
/*
* If the image is signed and we're not doing this for debug purposes,
* take a look at the signature.
*/
Dir = pOptHdr->DataDirectory[IMAGE_DIRECTORY_ENTRY_SECURITY];
if (Dir.Size)
{
PWIN_CERTIFICATE pFirst = (PWIN_CERTIFICATE)RTMemTmpAlloc(Dir.Size);
if (!pFirst)
return VERR_NO_TMP_MEMORY;
int rc = pModPe->Core.pReader->pfnRead(pModPe->Core.pReader, pFirst, Dir.Size, Dir.VirtualAddress);
if (RT_SUCCESS(rc))
{
uint32_t off = 0;
do
{
PWIN_CERTIFICATE pCur = (PWIN_CERTIFICATE)((uint8_t *)pFirst + off);
/* validate the members. */
if ( pCur->dwLength < sizeof(WIN_CERTIFICATE)
|| pCur->dwLength + off > Dir.Size)
{
Log(("rtldrPEOpen: %s: cert at %#x/%#x: dwLength=%#x\n", pszLogName, off, Dir.Size, pCur->dwLength));
rc = VERR_LDRPE_CERT_MALFORMED;
break;
}
if ( pCur->wRevision != WIN_CERT_REVISION_2_0
&& pCur->wRevision != WIN_CERT_REVISION_1_0)
{
Log(("rtldrPEOpen: %s: cert at %#x/%#x: wRevision=%#x\n", pszLogName, off, Dir.Size, pCur->wRevision));
rc = pCur->wRevision >= WIN_CERT_REVISION_1_0 ? VERR_LDRPE_CERT_UNSUPPORTED : VERR_LDRPE_CERT_MALFORMED;
break;
}
if ( pCur->wCertificateType != WIN_CERT_TYPE_PKCS_SIGNED_DATA
&& pCur->wCertificateType != WIN_CERT_TYPE_X509
/*&& pCur->wCertificateType != WIN_CERT_TYPE_RESERVED_1*/
/*&& pCur->wCertificateType != WIN_CERT_TYPE_TS_STACK_SIGNED*/
&& pCur->wCertificateType != WIN_CERT_TYPE_EFI_PKCS115
&& pCur->wCertificateType != WIN_CERT_TYPE_EFI_GUID
)
{
Log(("rtldrPEOpen: %s: cert at %#x/%#x: wRevision=%#x\n", pszLogName, off, Dir.Size, pCur->wRevision));
rc = pCur->wCertificateType ? VERR_LDRPE_CERT_UNSUPPORTED : VERR_LDRPE_CERT_MALFORMED;
break;
}
/* Remember the first signed data certificate. */
if ( pCur->wCertificateType == WIN_CERT_TYPE_PKCS_SIGNED_DATA
&& pModPe->offPkcs7SignedData == 0)
{
pModPe->offPkcs7SignedData = Dir.VirtualAddress
+ (uint32_t)((uintptr_t)&pCur->bCertificate[0] - (uintptr_t)pFirst);
pModPe->cbPkcs7SignedData = pCur->dwLength - RT_OFFSETOF(WIN_CERTIFICATE, bCertificate);
}
/* next */
off += RT_ALIGN(pCur->dwLength, WIN_CERTIFICATE_ALIGNMENT);
} while (off < Dir.Size);
}
RTMemTmpFree(pFirst);
if (RT_FAILURE(rc))
return rc;
}
return VINF_SUCCESS;
}
/**
* Open a PE image.
*
* @returns iprt status code.
* @param pReader The loader reader instance which will provide the raw image bits.
* @param fFlags Loader flags, RTLDR_O_XXX.
* @param enmArch Architecture specifier.
* @param offNtHdrs The offset of the NT headers (where you find "PE\0\0").
* @param phLdrMod Where to store the handle.
* @param pErrInfo Where to return extended error information. Optional.
*/
int rtldrPEOpen(PRTLDRREADER pReader, uint32_t fFlags, RTLDRARCH enmArch, RTFOFF offNtHdrs,
PRTLDRMOD phLdrMod, PRTERRINFO pErrInfo)
{
/*
* Read and validate the file header.
*/
IMAGE_FILE_HEADER FileHdr;
int rc = pReader->pfnRead(pReader, &FileHdr, sizeof(FileHdr), offNtHdrs + 4);
if (RT_FAILURE(rc))
return rc;
RTLDRARCH enmArchImage;
const char *pszLogName = pReader->pfnLogName(pReader);
rc = rtldrPEValidateFileHeader(&FileHdr, fFlags, pszLogName, &enmArchImage);
if (RT_FAILURE(rc))
return rc;
/*
* Match the CPU architecture.
*/
if ( enmArch != RTLDRARCH_WHATEVER
&& enmArch != enmArchImage)
return VERR_LDR_ARCH_MISMATCH;
/*
* Read and validate the "optional" header. Convert 32->64 if necessary.
*/
IMAGE_OPTIONAL_HEADER64 OptHdr;
rc = pReader->pfnRead(pReader, &OptHdr, FileHdr.SizeOfOptionalHeader, offNtHdrs + 4 + sizeof(IMAGE_FILE_HEADER));
if (RT_FAILURE(rc))
return rc;
if (FileHdr.SizeOfOptionalHeader != sizeof(OptHdr))
rtldrPEConvert32BitOptionalHeaderTo64Bit(&OptHdr);
rc = rtldrPEValidateOptionalHeader(&OptHdr, pszLogName, offNtHdrs, &FileHdr, pReader->pfnSize(pReader), fFlags);
if (RT_FAILURE(rc))
return rc;
/*
* Read and validate section headers.
*/
const size_t cbSections = sizeof(IMAGE_SECTION_HEADER) * FileHdr.NumberOfSections;
PIMAGE_SECTION_HEADER paSections = (PIMAGE_SECTION_HEADER)RTMemAlloc(cbSections);
if (!paSections)
return VERR_NO_MEMORY;
rc = pReader->pfnRead(pReader, paSections, cbSections,
offNtHdrs + 4 + sizeof(IMAGE_FILE_HEADER) + FileHdr.SizeOfOptionalHeader);
if (RT_SUCCESS(rc))
{
rc = rtldrPEValidateSectionHeaders(paSections, FileHdr.NumberOfSections, pszLogName,
&OptHdr, pReader->pfnSize(pReader), fFlags);
if (RT_SUCCESS(rc))
{
/*
* Allocate and initialize the PE module structure.
*/
PRTLDRMODPE pModPe = (PRTLDRMODPE)RTMemAllocZ(sizeof(*pModPe));
if (pModPe)
{
pModPe->Core.u32Magic = RTLDRMOD_MAGIC;
pModPe->Core.eState = LDR_STATE_OPENED;
if (FileHdr.SizeOfOptionalHeader == sizeof(OptHdr))
pModPe->Core.pOps = &s_rtldrPE64Ops.Core;
else
pModPe->Core.pOps = &s_rtldrPE32Ops.Core;
pModPe->Core.pReader = pReader;
pModPe->Core.enmFormat= RTLDRFMT_PE;
pModPe->Core.enmType = FileHdr.Characteristics & IMAGE_FILE_DLL
? FileHdr.Characteristics & IMAGE_FILE_RELOCS_STRIPPED
? RTLDRTYPE_EXECUTABLE_FIXED
: RTLDRTYPE_EXECUTABLE_RELOCATABLE
: FileHdr.Characteristics & IMAGE_FILE_RELOCS_STRIPPED
? RTLDRTYPE_SHARED_LIBRARY_FIXED
: RTLDRTYPE_SHARED_LIBRARY_RELOCATABLE;
pModPe->Core.enmEndian= RTLDRENDIAN_LITTLE;
pModPe->Core.enmArch = FileHdr.Machine == IMAGE_FILE_MACHINE_I386
? RTLDRARCH_X86_32
: FileHdr.Machine == IMAGE_FILE_MACHINE_AMD64
? RTLDRARCH_AMD64
: RTLDRARCH_WHATEVER;
pModPe->pvBits = NULL;
pModPe->offNtHdrs = offNtHdrs;
pModPe->offEndOfHdrs = offNtHdrs + 4 + sizeof(IMAGE_FILE_HEADER) + FileHdr.SizeOfOptionalHeader + cbSections;
pModPe->u16Machine = FileHdr.Machine;
pModPe->fFile = FileHdr.Characteristics;
pModPe->cSections = FileHdr.NumberOfSections;
pModPe->paSections = paSections;
pModPe->uEntryPointRVA= OptHdr.AddressOfEntryPoint;
pModPe->uImageBase = (RTUINTPTR)OptHdr.ImageBase;
pModPe->cbImage = OptHdr.SizeOfImage;
pModPe->cbHeaders = OptHdr.SizeOfHeaders;
pModPe->uTimestamp = FileHdr.TimeDateStamp;
pModPe->f64Bit = FileHdr.SizeOfOptionalHeader == sizeof(OptHdr);
pModPe->ImportDir = OptHdr.DataDirectory[IMAGE_DIRECTORY_ENTRY_IMPORT];
pModPe->RelocDir = OptHdr.DataDirectory[IMAGE_DIRECTORY_ENTRY_BASERELOC];
pModPe->ExportDir = OptHdr.DataDirectory[IMAGE_DIRECTORY_ENTRY_EXPORT];
pModPe->DebugDir = OptHdr.DataDirectory[IMAGE_DIRECTORY_ENTRY_DEBUG];
pModPe->SecurityDir = OptHdr.DataDirectory[IMAGE_DIRECTORY_ENTRY_SECURITY];
pModPe->fDllCharacteristics = OptHdr.DllCharacteristics;
/*
* Perform validation of some selected data directories which requires
* inspection of the actual data. This also saves some certificate
* information.
*/
rc = rtldrPEValidateDirectoriesAndRememberStuff(pModPe, &OptHdr, fFlags);
if (RT_SUCCESS(rc))
{
*phLdrMod = &pModPe->Core;
return VINF_SUCCESS;
}
RTMemFree(pModPe);
}
else
rc = VERR_NO_MEMORY;
}
}
RTMemFree(paSections);
return rc;
}