Validation.cpp 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317
  1. /*
  2. * Copyright (c) 2020, Andrew Kaster <andrewdkaster@gmail.com>
  3. * Copyright (c) 2021, Andreas Kling <kling@serenityos.org>
  4. * All rights reserved.
  5. *
  6. * Redistribution and use in source and binary forms, with or without
  7. * modification, are permitted provided that the following conditions are met:
  8. *
  9. * 1. Redistributions of source code must retain the above copyright notice, this
  10. * list of conditions and the following disclaimer.
  11. *
  12. * 2. Redistributions in binary form must reproduce the above copyright notice,
  13. * this list of conditions and the following disclaimer in the documentation
  14. * and/or other materials provided with the distribution.
  15. *
  16. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
  17. * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  18. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
  19. * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
  20. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  21. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
  22. * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
  23. * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
  24. * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
  25. * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  26. */
  27. #include <AK/Assertions.h>
  28. #include <AK/Checked.h>
  29. #include <AK/String.h>
  30. #include <LibC/elf.h>
  31. #include <LibELF/Validation.h>
  32. namespace ELF {
  33. bool validate_elf_header(const Elf32_Ehdr& elf_header, size_t file_size, bool verbose)
  34. {
  35. if (!IS_ELF(elf_header)) {
  36. if (verbose)
  37. dbgln("File is not an ELF file.");
  38. return false;
  39. }
  40. if (ELFCLASS32 != elf_header.e_ident[EI_CLASS]) {
  41. if (verbose)
  42. dbgln("File is not a 32 bit ELF file.");
  43. return false;
  44. }
  45. if (ELFDATA2LSB != elf_header.e_ident[EI_DATA]) {
  46. if (verbose)
  47. dbgln("File is not a little endian ELF file.");
  48. return false;
  49. }
  50. if (EV_CURRENT != elf_header.e_ident[EI_VERSION]) {
  51. if (verbose)
  52. dbgln("File has unrecognized ELF version ({}), expected ({})!", elf_header.e_ident[EI_VERSION], EV_CURRENT);
  53. return false;
  54. }
  55. if (ELFOSABI_SYSV != elf_header.e_ident[EI_OSABI]) {
  56. if (verbose)
  57. dbgln("File has unknown OS ABI ({}), expected SYSV(0)!", elf_header.e_ident[EI_OSABI]);
  58. return false;
  59. }
  60. if (0 != elf_header.e_ident[EI_ABIVERSION]) {
  61. if (verbose)
  62. dbgln("File has unknown SYSV ABI version ({})!", elf_header.e_ident[EI_ABIVERSION]);
  63. return false;
  64. }
  65. if (EM_386 != elf_header.e_machine) {
  66. if (verbose)
  67. dbgln("File has unknown machine ({}), expected i386 (3)!", elf_header.e_machine);
  68. return false;
  69. }
  70. if (ET_EXEC != elf_header.e_type && ET_DYN != elf_header.e_type && ET_REL != elf_header.e_type && ET_CORE != elf_header.e_type) {
  71. if (verbose)
  72. dbgln("File has unloadable ELF type ({}), expected REL (1), EXEC (2), DYN (3) or CORE(4)!", elf_header.e_type);
  73. return false;
  74. }
  75. if (EV_CURRENT != elf_header.e_version) {
  76. if (verbose)
  77. dbgln("File has unrecognized ELF version ({}), expected ({})!", elf_header.e_version, EV_CURRENT);
  78. return false;
  79. }
  80. if (sizeof(Elf32_Ehdr) != elf_header.e_ehsize) {
  81. if (verbose)
  82. dbgln("File has incorrect ELF header size..? ({}), expected ({})!", elf_header.e_ehsize, sizeof(Elf32_Ehdr));
  83. return false;
  84. }
  85. if ((elf_header.e_phnum != 0 && elf_header.e_phoff < elf_header.e_ehsize) || (elf_header.e_shnum != SHN_UNDEF && elf_header.e_shoff < elf_header.e_ehsize)) {
  86. if (verbose) {
  87. dbgln("SHENANIGANS! program header offset ({}) or section header offset ({}) overlap with ELF header!",
  88. elf_header.e_phoff, elf_header.e_shoff);
  89. }
  90. return false;
  91. }
  92. if (elf_header.e_phoff > file_size || elf_header.e_shoff > file_size) {
  93. if (verbose) {
  94. dbgln("SHENANIGANS! program header offset ({}) or section header offset ({}) are past the end of the file!",
  95. elf_header.e_phoff, elf_header.e_shoff);
  96. }
  97. return false;
  98. }
  99. if (elf_header.e_phnum == 0 && elf_header.e_phoff != 0) {
  100. if (verbose)
  101. dbgln("SHENANIGANS! File has no program headers, but it does have a program header offset ({})!", elf_header.e_phoff);
  102. return false;
  103. }
  104. if (elf_header.e_phnum != 0 && elf_header.e_phoff != elf_header.e_ehsize) {
  105. if (verbose) {
  106. dbgln("File does not have program headers directly after the ELF header? program header offset ({}), expected ({}).",
  107. elf_header.e_phoff, elf_header.e_ehsize);
  108. }
  109. return false;
  110. }
  111. if (0 != elf_header.e_flags) {
  112. if (verbose)
  113. dbgln("File has incorrect ELF header flags...? ({}), expected ({}).", elf_header.e_flags, 0);
  114. return false;
  115. }
  116. if (0 != elf_header.e_phnum && sizeof(Elf32_Phdr) != elf_header.e_phentsize) {
  117. if (verbose)
  118. dbgln("File has incorrect program header size..? ({}), expected ({}).", elf_header.e_phentsize, sizeof(Elf32_Phdr));
  119. return false;
  120. }
  121. if (sizeof(Elf32_Shdr) != elf_header.e_shentsize) {
  122. if (verbose)
  123. dbgln("File has incorrect section header size..? ({}), expected ({}).", elf_header.e_shentsize, sizeof(Elf32_Shdr));
  124. return false;
  125. }
  126. Checked<size_t> total_size_of_program_headers = elf_header.e_phnum;
  127. total_size_of_program_headers *= elf_header.e_phentsize;
  128. Checked<size_t> end_of_last_program_header = elf_header.e_phoff;
  129. end_of_last_program_header += total_size_of_program_headers;
  130. if (end_of_last_program_header.has_overflow()) {
  131. if (verbose)
  132. dbgln("SHENANIGANS! Integer overflow in program header validation");
  133. return false;
  134. }
  135. if (end_of_last_program_header > file_size) {
  136. if (verbose)
  137. dbgln("SHENANIGANS! End of last program header ({}) is past the end of the file!", end_of_last_program_header.value());
  138. return false;
  139. }
  140. if (elf_header.e_shoff != SHN_UNDEF && elf_header.e_shoff < end_of_last_program_header.value()) {
  141. if (verbose) {
  142. dbgln("SHENANIGANS! Section header table begins at file offset {}, which is within program headers [ {} - {} ]!",
  143. elf_header.e_shoff, elf_header.e_phoff, end_of_last_program_header.value());
  144. }
  145. return false;
  146. }
  147. Checked<size_t> total_size_of_section_headers = elf_header.e_shnum;
  148. total_size_of_section_headers *= elf_header.e_shentsize;
  149. Checked<size_t> end_of_last_section_header = elf_header.e_shoff;
  150. end_of_last_section_header += total_size_of_section_headers;
  151. if (end_of_last_section_header.has_overflow()) {
  152. if (verbose)
  153. dbgln("SHENANIGANS! Integer overflow in section header validation");
  154. return false;
  155. }
  156. if (end_of_last_section_header > file_size) {
  157. if (verbose)
  158. dbgln("SHENANIGANS! End of last section header ({}) is past the end of the file!", end_of_last_section_header.value());
  159. return false;
  160. }
  161. if (elf_header.e_shstrndx != SHN_UNDEF && elf_header.e_shstrndx >= elf_header.e_shnum) {
  162. if (verbose)
  163. dbgln("SHENANIGANS! Section header string table index ({}) is not a valid index given we have {} section headers!", elf_header.e_shstrndx, elf_header.e_shnum);
  164. return false;
  165. }
  166. return true;
  167. }
  168. bool validate_program_headers(const Elf32_Ehdr& elf_header, size_t file_size, const u8* buffer, size_t buffer_size, String* interpreter_path, bool verbose)
  169. {
  170. Checked<size_t> total_size_of_program_headers = elf_header.e_phnum;
  171. total_size_of_program_headers *= elf_header.e_phentsize;
  172. Checked<size_t> end_of_last_program_header = elf_header.e_phoff;
  173. end_of_last_program_header += total_size_of_program_headers;
  174. if (end_of_last_program_header.has_overflow()) {
  175. if (verbose)
  176. dbgln("SHENANIGANS! Integer overflow in program header validation");
  177. return false;
  178. }
  179. // Can we actually parse all the program headers in the given buffer?
  180. if (end_of_last_program_header > buffer_size) {
  181. if (verbose)
  182. dbgln("Unable to parse program headers from buffer, buffer too small! Buffer size: {}, End of program headers {}", buffer_size, end_of_last_program_header.value());
  183. return false;
  184. }
  185. if (file_size < buffer_size) {
  186. dbgln("We somehow read more from a file than was in the file in the first place!");
  187. VERIFY_NOT_REACHED();
  188. }
  189. size_t num_program_headers = elf_header.e_phnum;
  190. auto program_header_begin = (const Elf32_Phdr*)&(buffer[elf_header.e_phoff]);
  191. for (size_t header_index = 0; header_index < num_program_headers; ++header_index) {
  192. auto& program_header = program_header_begin[header_index];
  193. if (program_header.p_filesz > program_header.p_memsz) {
  194. if (verbose)
  195. dbgln("Program header ({}) has p_filesz ({}) larger than p_memsz ({})", header_index, program_header.p_filesz, program_header.p_memsz);
  196. return false;
  197. }
  198. if (program_header.p_memsz <= 0 && (program_header.p_type == PT_TLS || program_header.p_type == PT_LOAD)) {
  199. if (verbose)
  200. dbgln("Program header ({}) has invalid size in memory ({})", header_index, program_header.p_memsz);
  201. return false;
  202. }
  203. if (program_header.p_type == PT_LOAD && program_header.p_align != PAGE_SIZE) {
  204. if (elf_header.e_type != ET_CORE) {
  205. if (verbose)
  206. dbgln("Program header ({}) with p_type PT_LOAD has p_align ({}) not equal to page size ({})", header_index, program_header.p_align, PAGE_SIZE);
  207. return false;
  208. }
  209. }
  210. switch (program_header.p_type) {
  211. case PT_INTERP:
  212. // We checked above that file_size was >= buffer size. We only care about buffer size anyway, we're trying to read this!
  213. if (Checked<size_t>::addition_would_overflow(program_header.p_offset, program_header.p_filesz)) {
  214. if (verbose)
  215. dbgln("Integer overflow while validating PT_INTERP header");
  216. return false;
  217. }
  218. if (program_header.p_offset + program_header.p_filesz > buffer_size) {
  219. if (verbose)
  220. dbgln("Found PT_INTERP header ({}), but the .interp section was not within the buffer :(", header_index);
  221. return false;
  222. }
  223. if (program_header.p_filesz <= 1) {
  224. if (verbose)
  225. dbgln("Found PT_INTERP header ({}), but p_filesz is invalid ({})", header_index, program_header.p_filesz);
  226. return false;
  227. }
  228. if (interpreter_path)
  229. *interpreter_path = String((const char*)&buffer[program_header.p_offset], program_header.p_filesz - 1);
  230. break;
  231. case PT_LOAD:
  232. case PT_DYNAMIC:
  233. case PT_GNU_EH_FRAME:
  234. case PT_NOTE:
  235. case PT_PHDR:
  236. case PT_TLS:
  237. if (Checked<size_t>::addition_would_overflow(program_header.p_offset, program_header.p_filesz)) {
  238. if (verbose)
  239. dbgln("Integer overflow while validating a program header");
  240. return false;
  241. }
  242. if (program_header.p_offset + program_header.p_filesz > file_size) {
  243. if (verbose)
  244. dbgln("SHENANIGANS! Program header {} segment leaks beyond end of file!", header_index);
  245. return false;
  246. }
  247. if ((program_header.p_flags & PF_X) && (program_header.p_flags & PF_W)) {
  248. if (verbose)
  249. dbgln("SHENANIGANS! Program header {} segment is marked write and execute", header_index);
  250. return false;
  251. }
  252. break;
  253. case PT_GNU_STACK:
  254. if (program_header.p_flags & PF_X) {
  255. if (verbose)
  256. dbgln("Possible shenanigans! Validating an ELF with executable stack.");
  257. }
  258. break;
  259. case PT_GNU_RELRO:
  260. if ((program_header.p_flags & PF_X) && (program_header.p_flags & PF_W)) {
  261. if (verbose)
  262. dbgln("SHENANIGANS! Program header {} segment is marked write and execute", header_index);
  263. return false;
  264. }
  265. break;
  266. default:
  267. // Not handling other program header types in other code so... let's not surprise them
  268. if (verbose)
  269. dbgln("Found program header ({}) of unrecognized type {}!", header_index, program_header.p_type);
  270. return false;
  271. }
  272. }
  273. return true;
  274. }
  275. } // end namespace ELF