Validation.cpp 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354
  1. /*
  2. * Copyright (c) 2020, Andrew Kaster <akaster@serenityos.org>
  3. * Copyright (c) 2021, Andreas Kling <kling@serenityos.org>
  4. *
  5. * SPDX-License-Identifier: BSD-2-Clause
  6. */
  7. #include <AK/Assertions.h>
  8. #include <AK/Checked.h>
  9. #include <Kernel/API/serenity_limits.h>
  10. #include <LibELF/ELFABI.h>
  11. #include <LibELF/Validation.h>
  12. #ifndef KERNEL
  13. # include <limits.h>
  14. # include <pthread.h>
  15. #endif
  16. namespace ELF {
  17. bool validate_elf_header(Elf_Ehdr const& elf_header, size_t file_size, bool verbose)
  18. {
  19. if (!IS_ELF(elf_header)) {
  20. if (verbose)
  21. dbgln("File is not an ELF file.");
  22. return false;
  23. }
  24. auto expected_class = ELFCLASS64;
  25. auto expected_bitness = 64;
  26. if (expected_class != elf_header.e_ident[EI_CLASS]) {
  27. if (verbose)
  28. dbgln("File is not a {}-bit ELF file.", expected_bitness);
  29. return false;
  30. }
  31. if (ELFDATA2LSB != elf_header.e_ident[EI_DATA]) {
  32. if (verbose)
  33. dbgln("File is not a little endian ELF file.");
  34. return false;
  35. }
  36. if (EV_CURRENT != elf_header.e_ident[EI_VERSION]) {
  37. if (verbose)
  38. dbgln("File has unrecognized ELF version ({}), expected ({})!", elf_header.e_ident[EI_VERSION], EV_CURRENT);
  39. return false;
  40. }
  41. // NOTE: With Clang, -fprofile-instr-generate -fcoverage-mapping sets our ELF ABI Version to 3 b/c of SHF_GNU_RETAIN
  42. if (ELFOSABI_SYSV != elf_header.e_ident[EI_OSABI] && ELFOSABI_LINUX != elf_header.e_ident[EI_OSABI]) {
  43. if (verbose)
  44. dbgln("File has unknown OS ABI ({}), expected SYSV(0) or GNU/Linux(3)!", elf_header.e_ident[EI_OSABI]);
  45. return false;
  46. }
  47. if (0 != elf_header.e_ident[EI_ABIVERSION]) {
  48. if (verbose)
  49. dbgln("File has unknown SYSV ABI version ({})!", elf_header.e_ident[EI_ABIVERSION]);
  50. return false;
  51. }
  52. auto expected_machines = Array { EM_X86_64, EM_AARCH64, EM_RISCV };
  53. auto expected_machine_names = Array { "x86-64"sv, "aarch64"sv, "riscv64"sv };
  54. if (!expected_machines.span().contains_slow(elf_header.e_machine)) {
  55. if (verbose)
  56. dbgln("File has unknown machine ({}), expected {} ({})!", elf_header.e_machine, expected_machine_names.span(), expected_machines.span());
  57. return false;
  58. }
  59. if (ET_EXEC != elf_header.e_type && ET_DYN != elf_header.e_type && ET_REL != elf_header.e_type && ET_CORE != elf_header.e_type) {
  60. if (verbose)
  61. dbgln("File has unloadable ELF type ({}), expected REL (1), EXEC (2), DYN (3) or CORE(4)!", elf_header.e_type);
  62. return false;
  63. }
  64. if (EV_CURRENT != elf_header.e_version) {
  65. if (verbose)
  66. dbgln("File has unrecognized ELF version ({}), expected ({})!", elf_header.e_version, EV_CURRENT);
  67. return false;
  68. }
  69. if (sizeof(Elf_Ehdr) != elf_header.e_ehsize) {
  70. if (verbose)
  71. dbgln("File has incorrect ELF header size..? ({}), expected ({})!", elf_header.e_ehsize, sizeof(Elf_Ehdr));
  72. return false;
  73. }
  74. if ((elf_header.e_phnum != 0 && elf_header.e_phoff < elf_header.e_ehsize) || (elf_header.e_shnum != SHN_UNDEF && elf_header.e_shoff < elf_header.e_ehsize)) {
  75. if (verbose) {
  76. dbgln("SHENANIGANS! program header offset ({}) or section header offset ({}) overlap with ELF header!",
  77. elf_header.e_phoff, elf_header.e_shoff);
  78. }
  79. return false;
  80. }
  81. if (elf_header.e_phoff > file_size || elf_header.e_shoff > file_size) {
  82. if (verbose) {
  83. dbgln("SHENANIGANS! program header offset ({}) or section header offset ({}) are past the end of the file!",
  84. elf_header.e_phoff, elf_header.e_shoff);
  85. }
  86. return false;
  87. }
  88. if (elf_header.e_phnum == 0 && elf_header.e_phoff != 0) {
  89. if (verbose)
  90. dbgln("SHENANIGANS! File has no program headers, but it does have a program header offset ({})!", elf_header.e_phoff);
  91. return false;
  92. }
  93. if (elf_header.e_phnum != 0 && elf_header.e_phoff != elf_header.e_ehsize) {
  94. if (verbose) {
  95. dbgln("File does not have program headers directly after the ELF header? program header offset ({}), expected ({}).",
  96. elf_header.e_phoff, elf_header.e_ehsize);
  97. }
  98. return false;
  99. }
  100. if (0 != elf_header.e_flags) {
  101. // TODO: Refuse to run C ABI binaries on system without the C extension.
  102. // TODO: Refuse to run TSO ABI binaries on system without the Ztso extension.
  103. if (elf_header.e_machine == EM_RISCV) {
  104. auto float_abi = elf_header.e_flags & EF_RISCV_FLOAT_ABI;
  105. // TODO: Support 32-bit hardware float ABI somehow?
  106. if (float_abi != EF_RISCV_FLOAT_ABI_DOUBLE) {
  107. if (verbose)
  108. dbgln("File has unsupported float ABI ({}), only double ({}) is supported.", float_abi, EF_RISCV_FLOAT_ABI_DOUBLE);
  109. return false;
  110. }
  111. } else {
  112. if (verbose)
  113. dbgln("File has incorrect ELF header flags...? ({}), expected ({}).", elf_header.e_flags, 0);
  114. return false;
  115. }
  116. }
  117. if (0 != elf_header.e_phnum && sizeof(Elf_Phdr) != elf_header.e_phentsize) {
  118. if (verbose)
  119. dbgln("File has incorrect program header size..? ({}), expected ({}).", elf_header.e_phentsize, sizeof(Elf_Phdr));
  120. return false;
  121. }
  122. if (sizeof(Elf_Shdr) != elf_header.e_shentsize) {
  123. if (verbose)
  124. dbgln("File has incorrect section header size..? ({}), expected ({}).", elf_header.e_shentsize, sizeof(Elf_Shdr));
  125. return false;
  126. }
  127. Checked<size_t> total_size_of_program_headers = elf_header.e_phnum;
  128. total_size_of_program_headers *= elf_header.e_phentsize;
  129. Checked<size_t> end_of_last_program_header = elf_header.e_phoff;
  130. end_of_last_program_header += total_size_of_program_headers;
  131. if (end_of_last_program_header.has_overflow()) {
  132. if (verbose)
  133. dbgln("SHENANIGANS! Integer overflow in program header validation");
  134. return false;
  135. }
  136. if (end_of_last_program_header > file_size) {
  137. if (verbose)
  138. dbgln("SHENANIGANS! End of last program header ({}) is past the end of the file!", end_of_last_program_header.value());
  139. return false;
  140. }
  141. if (elf_header.e_shoff != SHN_UNDEF && elf_header.e_shoff < end_of_last_program_header.value()) {
  142. if (verbose) {
  143. dbgln("SHENANIGANS! Section header table begins at file offset {}, which is within program headers [ {} - {} ]!",
  144. elf_header.e_shoff, elf_header.e_phoff, end_of_last_program_header.value());
  145. }
  146. return false;
  147. }
  148. Checked<size_t> total_size_of_section_headers = elf_header.e_shnum;
  149. total_size_of_section_headers *= elf_header.e_shentsize;
  150. Checked<size_t> end_of_last_section_header = elf_header.e_shoff;
  151. end_of_last_section_header += total_size_of_section_headers;
  152. if (end_of_last_section_header.has_overflow()) {
  153. if (verbose)
  154. dbgln("SHENANIGANS! Integer overflow in section header validation");
  155. return false;
  156. }
  157. if (end_of_last_section_header > file_size) {
  158. if (verbose)
  159. dbgln("SHENANIGANS! End of last section header ({}) is past the end of the file!", end_of_last_section_header.value());
  160. return false;
  161. }
  162. if (elf_header.e_shstrndx != SHN_UNDEF && elf_header.e_shstrndx >= elf_header.e_shnum) {
  163. if (verbose)
  164. dbgln("SHENANIGANS! Section header string table index ({}) is not a valid index given we have {} section headers!", elf_header.e_shstrndx, elf_header.e_shnum);
  165. return false;
  166. }
  167. return true;
  168. }
  169. ErrorOr<bool> validate_program_headers(Elf_Ehdr const& elf_header, size_t file_size, ReadonlyBytes buffer, StringBuilder* interpreter_path_builder, Optional<size_t>* requested_stack_size, bool verbose)
  170. {
  171. Checked<size_t> total_size_of_program_headers = elf_header.e_phnum;
  172. total_size_of_program_headers *= elf_header.e_phentsize;
  173. Checked<size_t> end_of_last_program_header = elf_header.e_phoff;
  174. end_of_last_program_header += total_size_of_program_headers;
  175. if (end_of_last_program_header.has_overflow()) {
  176. if (verbose)
  177. dbgln("SHENANIGANS! Integer overflow in program header validation");
  178. return false;
  179. }
  180. // Can we actually parse all the program headers in the given buffer?
  181. if (end_of_last_program_header > buffer.size()) {
  182. if (verbose)
  183. dbgln("Unable to parse program headers from buffer, buffer too small! Buffer size: {}, End of program headers {}", buffer.size(), end_of_last_program_header.value());
  184. return false;
  185. }
  186. if (file_size < buffer.size()) {
  187. dbgln("We somehow read more from a file than was in the file in the first place!");
  188. VERIFY_NOT_REACHED();
  189. }
  190. size_t num_program_headers = elf_header.e_phnum;
  191. auto program_header_begin = (Elf_Phdr const*)buffer.offset(elf_header.e_phoff);
  192. for (size_t header_index = 0; header_index < num_program_headers; ++header_index) {
  193. auto& program_header = program_header_begin[header_index];
  194. if (elf_header.e_machine == EM_RISCV && program_header.p_type == PT_RISCV_ATTRIBUTES) {
  195. // TODO: Handle RISC-V attribute section.
  196. // We have to continue here, as `p_memsz` is 0 when using the GNU toolchain
  197. continue;
  198. }
  199. if (program_header.p_filesz > program_header.p_memsz) {
  200. if (verbose)
  201. dbgln("Program header ({}) has p_filesz ({}) larger than p_memsz ({})", header_index, program_header.p_filesz, program_header.p_memsz);
  202. return false;
  203. }
  204. if (elf_header.e_type != ET_CORE) {
  205. if (program_header.p_type == PT_LOAD && program_header.p_align == 0) {
  206. if (verbose)
  207. dbgln("Program header ({}) with p_type PT_LOAD missing p_align (p_align == 0)", header_index);
  208. return false;
  209. }
  210. if (program_header.p_type == PT_LOAD && program_header.p_align % (size_t)PAGE_SIZE != 0) {
  211. if (verbose)
  212. dbgln("Program header ({}) with p_type PT_LOAD has p_align ({}) not divisible by page size ({})", header_index, program_header.p_align, PAGE_SIZE);
  213. return false;
  214. }
  215. if (program_header.p_type == PT_LOAD && program_header.p_vaddr % program_header.p_align != program_header.p_offset % program_header.p_align) {
  216. if (verbose)
  217. dbgln("Program header ({}) with p_type PT_LOAD has mis-aligned p_vaddr ({:x})", header_index, program_header.p_vaddr);
  218. return false;
  219. }
  220. }
  221. switch (program_header.p_type) {
  222. case PT_INTERP:
  223. // We checked above that file_size was >= buffer size. We only care about buffer size anyway, we're trying to read this!
  224. if (Checked<size_t>::addition_would_overflow(program_header.p_offset, program_header.p_filesz)) {
  225. if (verbose)
  226. dbgln("Integer overflow while validating PT_INTERP header");
  227. return false;
  228. }
  229. if (program_header.p_offset + program_header.p_filesz > buffer.size()) {
  230. if (verbose)
  231. dbgln("Found PT_INTERP header ({}), but the .interp section was not within the buffer :(", header_index);
  232. return false;
  233. }
  234. if (program_header.p_filesz <= 1) {
  235. if (verbose)
  236. dbgln("Found PT_INTERP header ({}), but p_filesz is invalid ({})", header_index, program_header.p_filesz);
  237. return false;
  238. }
  239. if (interpreter_path_builder)
  240. TRY(interpreter_path_builder->try_append({ buffer.offset(program_header.p_offset), static_cast<size_t>(program_header.p_filesz) - 1 }));
  241. break;
  242. case PT_LOAD:
  243. case PT_DYNAMIC:
  244. case PT_GNU_EH_FRAME:
  245. case PT_NOTE:
  246. case PT_PHDR:
  247. case PT_TLS:
  248. if (Checked<size_t>::addition_would_overflow(program_header.p_offset, program_header.p_filesz)) {
  249. if (verbose)
  250. dbgln("Integer overflow while validating a program header");
  251. return false;
  252. }
  253. if (program_header.p_offset + program_header.p_filesz > file_size) {
  254. if (verbose)
  255. dbgln("SHENANIGANS! Program header {} segment leaks beyond end of file!", header_index);
  256. return false;
  257. }
  258. if ((program_header.p_flags & PF_X) && (program_header.p_flags & PF_W)) {
  259. if (verbose)
  260. dbgln("SHENANIGANS! Program header {} segment is marked write and execute", header_index);
  261. return false;
  262. }
  263. break;
  264. case PT_GNU_STACK:
  265. if (program_header.p_flags & PF_X) {
  266. if (verbose)
  267. dbgln("Possible shenanigans! Validating an ELF with executable stack.");
  268. }
  269. if (program_header.p_memsz != 0) {
  270. if (
  271. #ifdef PTHREAD_STACK_MIN
  272. program_header.p_memsz < static_cast<unsigned>(PTHREAD_STACK_MIN) ||
  273. #endif
  274. program_header.p_memsz > static_cast<unsigned>(PTHREAD_STACK_MAX)) {
  275. if (verbose)
  276. dbgln("PT_GNU_STACK defines an unacceptable stack size.");
  277. return false;
  278. }
  279. if (program_header.p_memsz % PAGE_SIZE != 0) {
  280. if (verbose)
  281. dbgln("PT_GNU_STACK size is not page-aligned.");
  282. return false;
  283. }
  284. if (requested_stack_size)
  285. *requested_stack_size = program_header.p_memsz;
  286. }
  287. break;
  288. case PT_GNU_RELRO:
  289. if ((program_header.p_flags & PF_X) && (program_header.p_flags & PF_W)) {
  290. if (verbose)
  291. dbgln("SHENANIGANS! Program header {} segment is marked write and execute", header_index);
  292. return false;
  293. }
  294. break;
  295. default:
  296. // Not handling other program header types in other code so... let's not surprise them
  297. if (verbose)
  298. dbgln("Found program header ({}) of unrecognized type {}!", header_index, program_header.p_type);
  299. return false;
  300. }
  301. }
  302. return true;
  303. }
  304. } // end namespace ELF