| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (c) 2012 The Native Client Authors. All rights reserved. | 2 * Copyright (c) 2012 The Native Client Authors. All rights reserved. |
| 3 * Use of this source code is governed by a BSD-style license that can be | 3 * Use of this source code is governed by a BSD-style license that can be |
| 4 * found in the LICENSE file. | 4 * found in the LICENSE file. |
| 5 */ | 5 */ |
| 6 | 6 |
| 7 #include <assert.h> | 7 #include <assert.h> |
| 8 #include <elf.h> | |
| 9 #include <inttypes.h> | |
| 10 #include <stdio.h> | 8 #include <stdio.h> |
| 11 #include <stdlib.h> | 9 #include <stdlib.h> |
| 12 #include <string.h> | 10 #include <string.h> |
| 13 #include "validator.h" | |
| 14 | 11 |
| 15 #undef TRUE | 12 #include "native_client/src/include/elf32.h" |
| 16 #define TRUE 1 | 13 #include "native_client/src/include/elf64.h" |
| 17 | 14 #include "native_client/src/shared/utils/types.h" |
| 18 #undef FALSE | 15 #include "native_client/src/trusted/validator_ragel/unreviewed/validator.h" |
| 19 #define FALSE 0 | |
| 20 | |
| 21 /* This may help with portability but makes code less readable. */ | |
| 22 #pragma GCC diagnostic ignored "-Wdeclaration-after-statement" | |
| 23 | 16 |
| 24 static void CheckBounds(unsigned char *data, size_t data_size, | 17 static void CheckBounds(unsigned char *data, size_t data_size, |
| 25 void *ptr, size_t inside_size) { | 18 void *ptr, size_t inside_size) { |
| 26 assert(data <= (unsigned char *) ptr); | 19 assert(data <= (unsigned char *) ptr); |
| 27 assert((unsigned char *) ptr + inside_size <= data + data_size); | 20 assert((unsigned char *) ptr + inside_size <= data + data_size); |
| 21 |
| 22 UNREFERENCED_PARAMETER(data); |
| 23 UNREFERENCED_PARAMETER(data_size); |
| 24 UNREFERENCED_PARAMETER(ptr); |
| 25 UNREFERENCED_PARAMETER(inside_size); |
| 28 } | 26 } |
| 29 | 27 |
| 30 void ReadFile(const char *filename, uint8_t **result, size_t *result_size) { | 28 void ReadImage(const char *filename, uint8_t **result, size_t *result_size) { |
| 31 FILE *fp; | 29 FILE *fp; |
| 32 uint8_t *data; | 30 uint8_t *data; |
| 33 size_t file_size; | 31 size_t file_size; |
| 34 size_t got; | 32 size_t got; |
| 35 | 33 |
| 36 fp = fopen(filename, "rb"); | 34 fp = fopen(filename, "rb"); |
| 37 if (fp == NULL) { | 35 if (fp == NULL) { |
| 38 fprintf(stderr, "Failed to open input file: %s\n", filename); | 36 fprintf(stderr, "Failed to open input file: %s\n", filename); |
| 39 exit(1); | 37 exit(1); |
| 40 } | 38 } |
| (...skipping 18 matching lines...) Expand all Loading... |
| 59 *result = data; | 57 *result = data; |
| 60 *result_size = file_size; | 58 *result_size = file_size; |
| 61 } | 59 } |
| 62 | 60 |
| 63 struct ValidateState { | 61 struct ValidateState { |
| 64 uint8_t width; | 62 uint8_t width; |
| 65 const uint8_t *offset; | 63 const uint8_t *offset; |
| 66 }; | 64 }; |
| 67 | 65 |
| 68 void ProcessError (const uint8_t *ptr, void *userdata) { | 66 void ProcessError (const uint8_t *ptr, void *userdata) { |
| 69 printf("offset 0x%zx: DFA error in validator\n", | 67 printf("offset 0x%"NACL_PRIxS": DFA error in validator\n", |
| 70 ptr - (((struct ValidateState *)userdata)->offset)); | 68 ptr - (((struct ValidateState *)userdata)->offset)); |
| 71 } | 69 } |
| 72 | 70 |
| 73 int ValidateFile(const char *filename, int repeat_count) { | 71 int ValidateFile(const char *filename, int repeat_count) { |
| 74 size_t data_size; | 72 size_t data_size; |
| 75 uint8_t *data; | 73 uint8_t *data; |
| 76 ReadFile(filename, &data, &data_size); | 74 int count; |
| 77 | 75 |
| 78 int count; | 76 ReadImage(filename, &data, &data_size); |
| 77 |
| 79 if (data[4] == 1) { | 78 if (data[4] == 1) { |
| 80 for (count = 0; count < repeat_count; ++count) { | 79 for (count = 0; count < repeat_count; ++count) { |
| 81 Elf32_Ehdr *header; | 80 Elf32_Ehdr *header; |
| 82 int index; | 81 int index; |
| 83 | 82 |
| 84 header = (Elf32_Ehdr *) data; | 83 header = (Elf32_Ehdr *) data; |
| 85 CheckBounds(data, data_size, header, sizeof(*header)); | 84 CheckBounds(data, data_size, header, sizeof(*header)); |
| 86 assert(memcmp(header->e_ident, ELFMAG, strlen(ELFMAG)) == 0); | 85 assert(memcmp(header->e_ident, ELFMAG, strlen(ELFMAG)) == 0); |
| 87 | 86 |
| 88 for (index = 0; index < header->e_shnum; ++index) { | 87 for (index = 0; index < header->e_shnum; ++index) { |
| 89 Elf32_Shdr *section = (Elf32_Shdr *) (data + header->e_shoff + | 88 Elf32_Shdr *section = (Elf32_Shdr *) (data + header->e_shoff + |
| 90 header->e_shentsize * index); | 89 header->e_shentsize * index); |
| 91 CheckBounds(data, data_size, section, sizeof(*section)); | 90 CheckBounds(data, data_size, section, sizeof(*section)); |
| 92 | 91 |
| 93 if ((section->sh_flags & SHF_EXECINSTR) != 0) { | 92 if ((section->sh_flags & SHF_EXECINSTR) != 0) { |
| 94 struct ValidateState state; | 93 struct ValidateState state; |
| 94 int res; |
| 95 |
| 95 state.offset = data + section->sh_offset - section->sh_addr; | 96 state.offset = data + section->sh_offset - section->sh_addr; |
| 96 if (section->sh_size <= 0xfff) { | 97 if (section->sh_size <= 0xfff) { |
| 97 state.width = 4; | 98 state.width = 4; |
| 98 } else if (section->sh_size <= 0xfffffff) { | 99 } else if (section->sh_size <= 0xfffffff) { |
| 99 state.width = 8; | 100 state.width = 8; |
| 100 } else { | 101 } else { |
| 101 state.width = 12; | 102 state.width = 12; |
| 102 } | 103 } |
| 103 CheckBounds(data, data_size, | 104 CheckBounds(data, data_size, |
| 104 data + section->sh_offset, section->sh_size); | 105 data + section->sh_offset, section->sh_size); |
| 105 int res = ValidateChunkIA32(data + section->sh_offset, | 106 res = ValidateChunkIA32(data + section->sh_offset, |
| 106 section->sh_size, ProcessError, &state); | 107 section->sh_size, ProcessError, &state); |
| 107 if (res != 0) { | 108 if (res != 0) { |
| 108 return res; | 109 return res; |
| 109 } | 110 } |
| 110 } | 111 } |
| 111 } | 112 } |
| 112 } | 113 } |
| 113 } else if (data[4] == 2) { | 114 } else if (data[4] == 2) { |
| 114 for (count = 0; count < repeat_count; ++count) { | 115 for (count = 0; count < repeat_count; ++count) { |
| 115 Elf64_Ehdr *header; | 116 Elf64_Ehdr *header; |
| 116 int index; | 117 int index; |
| 117 | 118 |
| 118 header = (Elf64_Ehdr *) data; | 119 header = (Elf64_Ehdr *) data; |
| 119 CheckBounds(data, data_size, header, sizeof(*header)); | 120 CheckBounds(data, data_size, header, sizeof(*header)); |
| 120 assert(memcmp(header->e_ident, ELFMAG, strlen(ELFMAG)) == 0); | 121 assert(memcmp(header->e_ident, ELFMAG, strlen(ELFMAG)) == 0); |
| 121 | 122 |
| 122 for (index = 0; index < header->e_shnum; ++index) { | 123 for (index = 0; index < header->e_shnum; ++index) { |
| 123 Elf64_Shdr *section = (Elf64_Shdr *) (data + header->e_shoff + | 124 Elf64_Shdr *section = (Elf64_Shdr *) (data + header->e_shoff + |
| 124 header->e_shentsize * index); | 125 header->e_shentsize * index); |
| 125 CheckBounds(data, data_size, section, sizeof(*section)); | 126 CheckBounds(data, data_size, section, sizeof(*section)); |
| 126 | 127 |
| 127 if ((section->sh_flags & SHF_EXECINSTR) != 0) { | 128 if ((section->sh_flags & SHF_EXECINSTR) != 0) { |
| 128 struct ValidateState state; | 129 struct ValidateState state; |
| 130 int res; |
| 131 |
| 129 state.offset = data + section->sh_offset - section->sh_addr; | 132 state.offset = data + section->sh_offset - section->sh_addr; |
| 130 if (section->sh_size <= 0xfff) { | 133 if (section->sh_size <= 0xfff) { |
| 131 state.width = 4; | 134 state.width = 4; |
| 132 } else if (section->sh_size <= 0xfffffff) { | 135 } else if (section->sh_size <= 0xfffffff) { |
| 133 state.width = 8; | 136 state.width = 8; |
| 134 } else if (section->sh_size <= 0xfffffffffffLL) { | 137 } else if (section->sh_size <= 0xfffffffffffLL) { |
| 135 state.width = 12; | 138 state.width = 12; |
| 136 } else { | 139 } else { |
| 137 state.width = 16; | 140 state.width = 16; |
| 138 } | 141 } |
| 139 CheckBounds(data, data_size, | 142 CheckBounds(data, data_size, |
| 140 data + section->sh_offset, section->sh_size); | 143 data + section->sh_offset, section->sh_size); |
| 141 int res = ValidateChunkAMD64(data + section->sh_offset, | 144 res = ValidateChunkAMD64(data + section->sh_offset, |
| 142 section->sh_size, ProcessError, &state); | 145 section->sh_size, ProcessError, &state); |
| 143 if (res != 0) { | 146 if (res != 0) { |
| 144 return res; | 147 return res; |
| 145 } | 148 } |
| 146 } | 149 } |
| 147 } | 150 } |
| 148 } | 151 } |
| 149 } else { | 152 } else { |
| 150 printf("Unknown ELF class: %s\n", filename); | 153 printf("Unknown ELF class: %s\n", filename); |
| 151 exit(1); | 154 exit(1); |
| (...skipping 12 matching lines...) Expand all Loading... |
| 164 for (index = initial_index; index < argc; ++index) { | 167 for (index = initial_index; index < argc; ++index) { |
| 165 const char *filename = argv[index]; | 168 const char *filename = argv[index]; |
| 166 int rc = ValidateFile(filename, repeat_count); | 169 int rc = ValidateFile(filename, repeat_count); |
| 167 if (rc != 0) { | 170 if (rc != 0) { |
| 168 printf("file '%s' can not be fully validated\n", filename); | 171 printf("file '%s' can not be fully validated\n", filename); |
| 169 return 1; | 172 return 1; |
| 170 } | 173 } |
| 171 } | 174 } |
| 172 return 0; | 175 return 0; |
| 173 } | 176 } |
| OLD | NEW |