| 注册
请输入搜索内容

热门搜索

Java Linux MySQL PHP JavaScript Hibernate jQuery Nginx
jdfeiman
7年前发布

趣探 Mach-O:FishHook 解析

   <ul>     <li>Mach-O文件格式: <a href="/misc/goto?guid=4959737039520818210" rel="nofollow,noindex">趣探 Mach-O:文件格式分析</a></li>     <li>动态链接相关知识: <a href="/misc/goto?guid=4959737039601511273" rel="nofollow,noindex">Mach-O 的动态链接过程</a> 、 <a href="/misc/goto?guid=4959737039683922338" rel="nofollow,noindex">趣探 Mach-O:加载过程</a></li>     <li>对操作系统、编译原理的理解:深入解析Mac OS X & iOS操作系统 、 程序员的自我修养</li>    </ul>    <p>本文的阐述顺序按照函数调用过程来进行</p>    <h2>Fishhook 可以做什么</h2>    <p>在此借用阿里百川的一张分析图,可以比较清晰的了解 FishHook 发挥了哪些作用</p>    <p style="text-align:center"><img src="https://simg.open-open.com/show/b257565da77bd1f3e30adb37f2a733ef.png"></p>    <p>阿里百川</p>    <p>FishHook 在这里是对动态链接库起作用,修改对应的函数实现</p>    <p>对于动态链接库里面的 C 函数,第一次调用的时候,我们会得到函数和实现地址的对应关系,函数的实现地址存放在一个叫 la_symbol_ptr 的地方,第二次调用的时候,直接通过 la_symbol_ptr 找到函数地址就可以,不再需要繁琐的获取函数地址的过程。</p>    <p>那么,上图的含义就很明了了</p>    <p>在程序运行时,动态链接的 C 函数 dynamic(...) 地址记录在 DATA segment 下的 la_symbol_ptr 中;初始时,程序只知道 dynamic 函数的符号名而不知道函数的实现地址;首次调用时,程序通过 TEXT segment 中的 stub_helper 取得绑定信息,通过 dyld_stub_binder 来更新 la_symbol_ptr 中的符号实现地址;这样,再次调用时,就可以通过 la_symbol_ptr 直接找到 dynamic 函数的实现;如果我们需要替换 dynamic 函数的实现,只需要修改 __la_symbol_ptr 即可,也就是我们要谈的 Fishhook</p>    <h2>Fishhook 的实现</h2>    <p>通过 <a href="/misc/goto?guid=4958968193202252711" rel="nofollow,noindex">fishhook的官方文档</a> 可以知道, Fishhook 的使用方法大致如下:</p>    <pre>  <code class="language-objectivec">static int (*original_open)(const char *, int, ...);     int new_open(const char *path, int oflag, ...) {      va_listap = {0};      mode_tmode = 0;         if ((oflag & O_CREAT) != 0) {          // mode only applies to O_CREAT          va_start(ap, oflag);          mode = va_arg(ap, int);          va_end(ap);          printf("Calling real open('%s', %d, %d)\n", path, oflag, mode);          return original_open(path, oflag, mode);      } else {          printf("Calling real open('%s', %d)\n", path, oflag);          return original_open(path, oflag, mode);      }  }     int main(int argc, const char * argv[]) {      @autoreleasepool {          struct rebindingopen_rebinding = { "open", new_open, (void *)&original_open };          rebind_symbols((struct rebinding[1]){open_rebinding}, 1);          __unusedint fd = open(argv[0], O_RDONLY);      }      return 0;  }  </code></pre>    <p>先从函数的入口, rebind_symbols 开始谈起吧, rebind_symbols 主要是使用 _dyld_register_func_for_add_image 来注册回调函数,在加载动态库的时候执行一些操作</p>    <pre>  <code class="language-objectivec">int rebind_symbols(struct rebindingrebindings[], size_trebindings_nel) {    // 调用 prepend_rebindings 的函数,将整个 rebindings 数组添加到 _rebindings_head 这个私有链表的头部    int retval = prepend_rebindings(&_rebindings_head, rebindings, rebindings_nel);    if (retvalnext 的值来判断是否为第一次调用    // If this was the first call, register callback for image additions (which is also invoked for    // existing images, otherwise, just run on existing images    if (!_rebindings_head->next) {      _dyld_register_func_for_add_image(_rebind_symbols_for_image);    } else {      uint32_t c = _dyld_image_count();      for (uint32_t i = 0; i   </code></pre>    <p>对于 prepend_rebindings 的代码如下</p>    <pre>  <code class="language-objectivec">// 链表的数组结构  struct rebindings_entry {    struct rebinding *rebindings;    size_trebindings_nel;    struct rebindings_entry *next;  };     static struct rebindings_entry *_rebindings_head;     static int prepend_rebindings(struct rebindings_entry **rebindings_head,                                struct rebindingrebindings[],                                size_tnel) {    struct rebindings_entry *new_entry = malloc(sizeof(struct rebindings_entry));    if (!new_entry) {      return -1;    }    new_entry->rebindings = malloc(sizeof(struct rebinding) * nel);    if (!new_entry->rebindings) {      free(new_entry);      return -1;    }    // 将 rebindings 插入到链表头部    memcpy(new_entry->rebindings, rebindings, sizeof(struct rebinding) * nel);    new_entry->rebindings_nel = nel;    new_entry->next = *rebindings_head;    *rebindings_head = new_entry;    return 0;  }  </code></pre>    <h2>基础结构解释</h2>    <h3>Dl_info</h3>    <pre>  <code class="language-objectivec">/*  * Structure filled in by dladdr().  */  typedef struct dl_info {          const char      *dli_fname;    /* Pathname of shared object */          void            *dli_fbase;    /* Base address of shared object */          const char      *dli_sname;    /* Name of nearest symbol */          void            *dli_saddr;    /* Address of nearest symbol */  } Dl_info;  </code></pre>    <p>我们一会经过 dladdr() 处理后的有效信息都会放进这个结构体中</p>    <ul>     <li>fname: 路径名,例如</li>    </ul>    <pre>  <code class="language-objectivec">/Applications/Xcode.app/Contents/Developer/Platforms/iPhoneSimulator.platform/Developer/SDKs/iPhoneSimulator.sdk/System/Library/Frameworks/CoreFoundation.framework/CoreFoundation  </code></pre>    <ul>     <li>dli_fbase: 共享对象的的起始地址(Base address of shared object,比如上面的 CoreFoundation)</li>     <li>dli_saddr : 符号的地址</li>     <li>dli_sname: 符号的名字,即下面的第四列的函数信息</li>    </ul>    <pre>  <code class="language-objectivec">Thread 0:  0    libsystem_kernel.dylib          0x11135810a __semwait_signal + 94474  1    libsystem_c.dylib              0x1110dab0b sleep + 518923  2    QYPerformanceMonitor            0x10dda4f1b -[ViewControllertableView:cellForRowAtIndexPath:] + 7963  3    UIKit                          0x10ed4d4f4 -[UITableView_createPreparedCellForGlobalRow:withIndexPath:willDisplay:] + 1586420  </code></pre>    <h3>LC_SYMTAB</h3>    <pre>  <code class="language-objectivec">struct symtab_command {      uint32_t    cmd;        /* LC_SYMTAB */      uint32_t    cmdsize;    /* sizeof(struct symtab_command) */      uint32_t    symoff;        /* symbol table offset */      uint32_t    nsyms;        /* number of symbol table entries */      uint32_t    stroff;        /* string table offset */      uint32_t    strsize;    /* string table size in bytes */  };  </code></pre>    <p>主要是提供符号表的偏移量,以及元素个数,还有字符串表的偏移和其长度。符号表在 Mach-O 目标文件中的地址可以通过 LC_SYMTAB 加载命令指定的 symoff 找到,对应的符号名称在 stroff ,总共有 nsyms 条符号信息</p>    <h3>LC_DYSYMTAB</h3>    <p>这个数组结构有些复杂,有兴趣的可以阅读 loader.h 文件,内部标示了动态符号表的偏移量和符号个数</p>    <pre>  <code class="language-objectivec">struct dysymtab_command {      uint32_tcmd;    /* LC_DYSYMTAB */      uint32_tcmdsize;    /* sizeof(struct dysymtab_command) */      uint32_tindirectsymoff; /* file offset to the indirect symbol table */      uint32_tnindirectsyms;  /* number of indirect symbol table entries */      .......  </code></pre>    <h2>_rebind_symbols_for_image</h2>    <p>对于关键的代码 _rebind_symbols_for_image 如下</p>    <pre>  <code class="language-objectivec">static void rebind_symbols_for_image(struct rebindings_entry *rebindings,                                      const struct mach_header *header,                                      intptr_tslide) {    Dl_infoinfo;    if (dladdr(header, &info) == 0) {      return;    }       // segment_command_64    segment_command_t *cur_seg_cmd;    segment_command_t *linkedit_segment = NULL;    // LC_SYMTAB    struct symtab_command* symtab_cmd = NULL;   // LC_DYSYMTAB    struct dysymtab_command* dysymtab_cmd = NULL;         // 下面是要寻找load_command,所以越过mach_header_t    uintptr_tcur = (uintptr_t)header + sizeof(mach_header_t);    for (uint i = 0; i ncmds; i++, cur += cur_seg_cmd->cmdsize) {      cur_seg_cmd = (segment_command_t *)cur;      if (cur_seg_cmd->cmd == LC_SEGMENT_ARCH_DEPENDENT) {        if (strcmp(cur_seg_cmd->segname, SEG_LINKEDIT) == 0) {          //遍历寻找__LINKEDIT          linkedit_segment = cur_seg_cmd;        }      } else if (cur_seg_cmd->cmd == LC_SYMTAB) {        //遍历寻找lc_symtab        symtab_cmd = (struct symtab_command*)cur_seg_cmd;      } else if (cur_seg_cmd->cmd == LC_DYSYMTAB) {        //遍历寻找lc_dysymtab        dysymtab_cmd = (struct dysymtab_command*)cur_seg_cmd;      }    }  </code></pre>    <p>为什么要寻找这个几个 LoadCommand 的信息呢?就如上面介绍的 __LINKEDIT 、 LC_DYSYMTAB 、 LC_SYMTAB 都提供了重要的信息。</p>    <p>__LINKEDIT段 含有为动态链接库使用的原始数据,比如符号,字符串,重定位表条目等等</p>    <p>阅读下面的代码之前,先来看一个计算公式</p>    <p>链接时程序的基址 = __LINKEDIT.VM_Address – __LINKEDIT.File_Offset + silde 的改变值</p>    <p>这里出现了一个 slide ,那么 slide 是啥呢?先看一下 ASLR</p>    <p>ASLR:Address space layout randomization ,将可执行程序随机装载到内存中,这里的随机只是偏移,而不是打乱,具体做法就是通过内核将 Mach-O 的段“平移”某个随机系数。 slide 正是 ASLR 引入的偏移</p>    <p>也就是说程序的基址等于 __LINKEDIT 的地址减去偏移量,然后再加上 ASLR 造成的偏移</p>    <pre>  <code class="language-objectivec">  // 链接时程序的基址    uintptr_tlinkedit_base = (uintptr_t)slide + linkedit_segment->vmaddr - linkedit_segment->fileoff;       // 符号表的地址 = 基址 + 符号表偏移量    nlist_t *symtab = (nlist_t *)(linkedit_base + symtab_cmd->symoff);    // 字符串表的地址 = 基址 + 字符串表偏移量    char *strtab = (char *)(linkedit_base + symtab_cmd->stroff);       // 动态符号表地址 = 基址 + 动态符号表偏移量    uint32_t *indirect_symtab = (uint32_t *)(linkedit_base + dysymtab_cmd->indirectsymoff);  </code></pre>    <p>符号表中的元素都是 nlist_t 结构体, nlist_t 中有很多学问,这里先看一下他的基础结构</p>    <pre>  <code class="language-objectivec">/*  * This is the symbol table entry structure for 32-bit architectures.  */  struct nlist {      union {          uint32_tn_strx;    /* index into the string table */      } n_un;      uint8_tn_type;        /* type flag, see below */      uint8_tn_sect;        /* section number or NO_SECT */      int16_tn_desc;        /* see  */      uint32_tn_value;    /* value of this symbol (or stab offset) */  };  </code></pre>    <p>然后再次遍历 loadcommands ,寻找 __DATA 和 __DATA_CONST 的 section ,并对对 __nl_symbol_ptr 以及 __la_symbol_ptr 进行 rebind</p>    <pre>  <code class="language-objectivec">  cur = (uintptr_t)header + sizeof(mach_header_t);    for (uint i = 0; i ncmds; i++, cur += cur_seg_cmd->cmdsize) {      cur_seg_cmd = (segment_command_t *)cur;      if (cur_seg_cmd->cmd == LC_SEGMENT_ARCH_DEPENDENT) {        if (strcmp(cur_seg_cmd->segname, SEG_DATA) != 0 &&            strcmp(cur_seg_cmd->segname, SEG_DATA_CONST) != 0) {          continue;        }           //找到__DATA和__DATA_CONST的section,对__nl_symbol_ptr以及__la_symbol_ptr进行rebind        for (uint j = 0; j nsects; j++) {          section_t *sect =            (section_t *)(cur + sizeof(segment_command_t)) + j;          if ((sect->flags & SECTION_TYPE) == S_LAZY_SYMBOL_POINTERS) {            // sect为Section,symtab为符号表,strtab字符串表,indirect_symtab动态符号表(indirect symbol table)            perform_rebinding_with_section(rebindings, sect, slide, symtab, strtab, indirect_symtab);          }          if ((sect->flags & SECTION_TYPE) == S_NON_LAZY_SYMBOL_POINTERS) {            perform_rebinding_with_section(rebindings, sect, slide, symtab, strtab, indirect_symtab);          }        }      }  </code></pre>    <h2>perform_rebinding_with_section</h2>    <p>nl_symbol_ptr 和 la_symbol_ptr section中的 reserved1 字段指明对应的 indirect symbol table 起始的 index ,</p>    <p>For the two relevant sections, the section headers (struct sections from ) provide an offset (in the reserved1 field) into what is known as the indirect symbol table. The indirect symbol table, which is located in the LINKEDIT segment of the binary, is just an array of indexes into the symbol table (also in LINKEDIT) whose order is identical to that of the pointers in the non-lazy and lazy symbol sections</p>    <p>So, given struct section nl_symbol_ptr, the corresponding index in the symbol table of the first address in that section is indirect_symbol_table[nl_symbol_ptr->reserved1]. The symbol table itself is an array of struct nlists (see ), and each nlist contains an index into the string table in LINKEDIT which where the actual symbol names are stored. So, for each pointer nl_symbol_ptr and __la_symbol_ptr, we are able to find the corresponding symbol and then the corresponding string to compare against the requested symbol names, and if there is a match, we replace the pointer in the section with the replacement.</p>    <p>结合英文,看下面的代码就很容易理解</p>    <pre>  <code class="language-objectivec">// sect为Section,symtab为符号表,strtab字符串表,indirect_symtab动态符号表(indirect symbol table)  static void perform_rebinding_with_section(struct rebindings_entry *rebindings,                                            section_t *section,                                            intptr_tslide,                                            nlist_t *symtab,                                            char *strtab,                                            uint32_t *indirect_symtab) {    // `nl_symbol_ptr`和`la_symbol_ptr`section中的`reserved1`字段指明对应的`indirect symbol table`起始的index      //动态符号表中第一个解析的符号的起始地址    uint32_t *indirect_symbol_indices = indirect_symtab + section->reserved1;       void **indirect_symbol_bindings = (void **)((uintptr_t)slide + section->addr);       for (uint i = 0; i size / sizeof(void *); i++) {        // 符号表的index      uint32_tsymtab_index = indirect_symbol_indices[i];      if (symtab_index == INDIRECT_SYMBOL_ABS || symtab_index == INDIRECT_SYMBOL_LOCAL ||          symtab_index == (INDIRECT_SYMBOL_LOCAL  | INDIRECT_SYMBOL_ABS)) {        continue;      }      //获取每一个需要动态解析的符号在符号表中的偏移量      uint32_tstrtab_offset = symtab[symtab_index].n_un.n_strx;         //通过字符串表偏移量获取符号对应的字符串(符号的名字)      char *symbol_name = strtab + strtab_offset;  </code></pre>    <p>上面的代码其实就可以用官方的一个图片很直观的表示</p>    <p style="text-align:center"><img src="https://simg.open-open.com/show/0d1aa40d4bd6d80b366eb0149ca5580e.jpg"></p>    <p>走到这里是找到了字符串表对应的符号(字符串)</p>    <h2>如何替换实现</h2>    <p>遍历 rebindings 数组,符号进行比较,相同的符号就进行实现替换,这里的代码比较清晰,直接贴出</p>    <pre>  <code class="language-objectivec">    struct rebindings_entry *cur = rebindings;      while (cur) {          for (uint j = 0; j rebindings_nel; j++) {              if (strcmp(&symbol_name[1], cur->rebindings[j].name) == 0) {                  if (cur->rebindings[j].replaced != NULL &&                      indirect_symbol_bindings[i] != cur->rebindings[j].replacement) {                      *(cur->rebindings[j].replaced) = indirect_symbol_bindings[i];                  }                  indirect_symbol_bindings[i] = cur->rebindings[j].replacement;                  goto symbol_loop;              }          }          cur = cur->next;      }  symbol_loop:;  }  </code></pre>    <h3>参考链接</h3>    <ul>     <li><a href="/misc/goto?guid=4959737039793532523" rel="nofollow,noindex">动态修改 C 语言函数的实现</a></li>     <li><a href="/misc/goto?guid=4959737039876287636" rel="nofollow,noindex">mrh的Fihshook源码分析</a></li>     <li><a href="/misc/goto?guid=4958968193202252711" rel="nofollow,noindex">fishhook</a></li>     <li>深入解析Mac OS X & iOS操作系统</li>     <li>程序员的自我修养</li>     <li><a href="/misc/goto?guid=4959737039964290144" rel="nofollow,noindex">编译体系漫游</a></li>    </ul>    <p> </p>    <p>来自:http://ios.jobbole.com/92918/</p>    <p> </p>    
 本文由用户 jdfeiman 自行上传分享,仅供网友学习交流。所有权归原作者,若您的权利被侵害,请联系管理员。
 转载本站原创文章,请注明出处,并保留原始链接、图片水印。
 本站是一个以用户分享为主的开源技术平台,欢迎各类分享!
 本文地址:https://www.open-open.com/lib/view/open1487057519754.html
链表 程序员 iOS开发 移动开发 Core Foundation