dfsan.cpp 41 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259
  1. //===-- dfsan.cpp ---------------------------------------------------------===//
  2. //
  3. // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
  4. // See https://llvm.org/LICENSE.txt for license information.
  5. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
  6. //
  7. //===----------------------------------------------------------------------===//
  8. //
  9. // This file is a part of DataFlowSanitizer.
  10. //
  11. // DataFlowSanitizer runtime. This file defines the public interface to
  12. // DataFlowSanitizer as well as the definition of certain runtime functions
  13. // called automatically by the compiler (specifically the instrumentation pass
  14. // in llvm/lib/Transforms/Instrumentation/DataFlowSanitizer.cpp).
  15. //
  16. // The public interface is defined in include/sanitizer/dfsan_interface.h whose
  17. // functions are prefixed dfsan_ while the compiler interface functions are
  18. // prefixed __dfsan_.
  19. //===----------------------------------------------------------------------===//
  20. #include "dfsan/dfsan.h"
  21. #include "dfsan/dfsan_chained_origin_depot.h"
  22. #include "dfsan/dfsan_flags.h"
  23. #include "dfsan/dfsan_origin.h"
  24. #include "dfsan/dfsan_thread.h"
  25. #include "sanitizer_common/sanitizer_atomic.h"
  26. #include "sanitizer_common/sanitizer_common.h"
  27. #include "sanitizer_common/sanitizer_file.h"
  28. #include "sanitizer_common/sanitizer_flag_parser.h"
  29. #include "sanitizer_common/sanitizer_flags.h"
  30. #include "sanitizer_common/sanitizer_internal_defs.h"
  31. #include "sanitizer_common/sanitizer_libc.h"
  32. #include "sanitizer_common/sanitizer_report_decorator.h"
  33. #include "sanitizer_common/sanitizer_stacktrace.h"
  34. using namespace __dfsan;
  35. Flags __dfsan::flags_data;
  36. // The size of TLS variables. These constants must be kept in sync with the ones
  37. // in DataFlowSanitizer.cpp.
  38. static const int kDFsanArgTlsSize = 800;
  39. static const int kDFsanRetvalTlsSize = 800;
  40. static const int kDFsanArgOriginTlsSize = 800;
  41. SANITIZER_INTERFACE_ATTRIBUTE THREADLOCAL u64
  42. __dfsan_retval_tls[kDFsanRetvalTlsSize / sizeof(u64)];
  43. SANITIZER_INTERFACE_ATTRIBUTE THREADLOCAL u32 __dfsan_retval_origin_tls;
  44. SANITIZER_INTERFACE_ATTRIBUTE THREADLOCAL u64
  45. __dfsan_arg_tls[kDFsanArgTlsSize / sizeof(u64)];
  46. SANITIZER_INTERFACE_ATTRIBUTE THREADLOCAL u32
  47. __dfsan_arg_origin_tls[kDFsanArgOriginTlsSize / sizeof(u32)];
  48. // Instrumented code may set this value in terms of -dfsan-track-origins.
  49. // * undefined or 0: do not track origins.
  50. // * 1: track origins at memory store operations.
  51. // * 2: track origins at memory load and store operations.
  52. // TODO: track callsites.
  53. extern "C" SANITIZER_WEAK_ATTRIBUTE const int __dfsan_track_origins;
  54. extern "C" SANITIZER_INTERFACE_ATTRIBUTE int dfsan_get_track_origins() {
  55. return &__dfsan_track_origins ? __dfsan_track_origins : 0;
  56. }
  57. // On Linux/x86_64, memory is laid out as follows:
  58. //
  59. // +--------------------+ 0x800000000000 (top of memory)
  60. // | application 3 |
  61. // +--------------------+ 0x700000000000
  62. // | invalid |
  63. // +--------------------+ 0x610000000000
  64. // | origin 1 |
  65. // +--------------------+ 0x600000000000
  66. // | application 2 |
  67. // +--------------------+ 0x510000000000
  68. // | shadow 1 |
  69. // +--------------------+ 0x500000000000
  70. // | invalid |
  71. // +--------------------+ 0x400000000000
  72. // | origin 3 |
  73. // +--------------------+ 0x300000000000
  74. // | shadow 3 |
  75. // +--------------------+ 0x200000000000
  76. // | origin 2 |
  77. // +--------------------+ 0x110000000000
  78. // | invalid |
  79. // +--------------------+ 0x100000000000
  80. // | shadow 2 |
  81. // +--------------------+ 0x010000000000
  82. // | application 1 |
  83. // +--------------------+ 0x000000000000
  84. //
  85. // MEM_TO_SHADOW(mem) = mem ^ 0x500000000000
  86. // SHADOW_TO_ORIGIN(shadow) = shadow + 0x100000000000
  87. extern "C" SANITIZER_INTERFACE_ATTRIBUTE
  88. dfsan_label __dfsan_union_load(const dfsan_label *ls, uptr n) {
  89. dfsan_label label = ls[0];
  90. for (uptr i = 1; i != n; ++i)
  91. label |= ls[i];
  92. return label;
  93. }
  94. // Return the union of all the n labels from addr at the high 32 bit, and the
  95. // origin of the first taint byte at the low 32 bit.
  96. extern "C" SANITIZER_INTERFACE_ATTRIBUTE u64
  97. __dfsan_load_label_and_origin(const void *addr, uptr n) {
  98. dfsan_label label = 0;
  99. u64 ret = 0;
  100. uptr p = (uptr)addr;
  101. dfsan_label *s = shadow_for((void *)p);
  102. for (uptr i = 0; i < n; ++i) {
  103. dfsan_label l = s[i];
  104. if (!l)
  105. continue;
  106. label |= l;
  107. if (!ret)
  108. ret = *(dfsan_origin *)origin_for((void *)(p + i));
  109. }
  110. return ret | (u64)label << 32;
  111. }
  112. extern "C" SANITIZER_INTERFACE_ATTRIBUTE
  113. void __dfsan_unimplemented(char *fname) {
  114. if (flags().warn_unimplemented)
  115. Report("WARNING: DataFlowSanitizer: call to uninstrumented function %s\n",
  116. fname);
  117. }
  118. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void __dfsan_wrapper_extern_weak_null(
  119. const void *addr, char *fname) {
  120. if (!addr)
  121. Report(
  122. "ERROR: DataFlowSanitizer: dfsan generated wrapper calling null "
  123. "extern_weak function %s\nIf this only happens with dfsan, the "
  124. "dfsan instrumentation pass may be accidentally optimizing out a "
  125. "null check\n",
  126. fname);
  127. }
  128. // Use '-mllvm -dfsan-debug-nonzero-labels' and break on this function
  129. // to try to figure out where labels are being introduced in a nominally
  130. // label-free program.
  131. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void __dfsan_nonzero_label() {
  132. if (flags().warn_nonzero_labels)
  133. Report("WARNING: DataFlowSanitizer: saw nonzero label\n");
  134. }
  135. // Indirect call to an uninstrumented vararg function. We don't have a way of
  136. // handling these at the moment.
  137. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void
  138. __dfsan_vararg_wrapper(const char *fname) {
  139. Report("FATAL: DataFlowSanitizer: unsupported indirect call to vararg "
  140. "function %s\n", fname);
  141. Die();
  142. }
  143. // Resolves the union of two labels.
  144. SANITIZER_INTERFACE_ATTRIBUTE dfsan_label
  145. dfsan_union(dfsan_label l1, dfsan_label l2) {
  146. return l1 | l2;
  147. }
  148. static const uptr kOriginAlign = sizeof(dfsan_origin);
  149. static const uptr kOriginAlignMask = ~(kOriginAlign - 1UL);
  150. static uptr OriginAlignUp(uptr u) {
  151. return (u + kOriginAlign - 1) & kOriginAlignMask;
  152. }
  153. static uptr OriginAlignDown(uptr u) { return u & kOriginAlignMask; }
  154. // Return the origin of the first taint byte in the size bytes from the address
  155. // addr.
  156. static dfsan_origin GetOriginIfTainted(uptr addr, uptr size) {
  157. for (uptr i = 0; i < size; ++i, ++addr) {
  158. dfsan_label *s = shadow_for((void *)addr);
  159. if (*s) {
  160. // Validate address region.
  161. CHECK(MEM_IS_SHADOW(s));
  162. return *(dfsan_origin *)origin_for((void *)addr);
  163. }
  164. }
  165. return 0;
  166. }
  167. // For platforms which support slow unwinder only, we need to restrict the store
  168. // context size to 1, basically only storing the current pc, because the slow
  169. // unwinder which is based on libunwind is not async signal safe and causes
  170. // random freezes in forking applications as well as in signal handlers.
  171. // DFSan supports only Linux. So we do not restrict the store context size.
  172. #define GET_STORE_STACK_TRACE_PC_BP(pc, bp) \
  173. BufferedStackTrace stack; \
  174. stack.Unwind(pc, bp, nullptr, true, flags().store_context_size);
  175. #define PRINT_CALLER_STACK_TRACE \
  176. { \
  177. GET_CALLER_PC_BP; \
  178. GET_STORE_STACK_TRACE_PC_BP(pc, bp) \
  179. stack.Print(); \
  180. }
  181. // Return a chain with the previous ID id and the current stack.
  182. // from_init = true if this is the first chain of an origin tracking path.
  183. static u32 ChainOrigin(u32 id, StackTrace *stack, bool from_init = false) {
  184. // StackDepot is not async signal safe. Do not create new chains in a signal
  185. // handler.
  186. DFsanThread *t = GetCurrentThread();
  187. if (t && t->InSignalHandler())
  188. return id;
  189. // As an optimization the origin of an application byte is updated only when
  190. // its shadow is non-zero. Because we are only interested in the origins of
  191. // taint labels, it does not matter what origin a zero label has. This reduces
  192. // memory write cost. MSan does similar optimization. The following invariant
  193. // may not hold because of some bugs. We check the invariant to help debug.
  194. if (!from_init && id == 0 && flags().check_origin_invariant) {
  195. Printf(" DFSan found invalid origin invariant\n");
  196. PRINT_CALLER_STACK_TRACE
  197. }
  198. Origin o = Origin::FromRawId(id);
  199. stack->tag = StackTrace::TAG_UNKNOWN;
  200. Origin chained = Origin::CreateChainedOrigin(o, stack);
  201. return chained.raw_id();
  202. }
  203. static void ChainAndWriteOriginIfTainted(uptr src, uptr size, uptr dst,
  204. StackTrace *stack) {
  205. dfsan_origin o = GetOriginIfTainted(src, size);
  206. if (o) {
  207. o = ChainOrigin(o, stack);
  208. *(dfsan_origin *)origin_for((void *)dst) = o;
  209. }
  210. }
  211. // Copy the origins of the size bytes from src to dst. The source and target
  212. // memory ranges cannot be overlapped. This is used by memcpy. stack records the
  213. // stack trace of the memcpy. When dst and src are not 4-byte aligned properly,
  214. // origins at the unaligned address boundaries may be overwritten because four
  215. // contiguous bytes share the same origin.
  216. static void CopyOrigin(const void *dst, const void *src, uptr size,
  217. StackTrace *stack) {
  218. uptr d = (uptr)dst;
  219. uptr beg = OriginAlignDown(d);
  220. // Copy left unaligned origin if that memory is tainted.
  221. if (beg < d) {
  222. ChainAndWriteOriginIfTainted((uptr)src, beg + kOriginAlign - d, beg, stack);
  223. beg += kOriginAlign;
  224. }
  225. uptr end = OriginAlignDown(d + size);
  226. // If both ends fall into the same 4-byte slot, we are done.
  227. if (end < beg)
  228. return;
  229. // Copy right unaligned origin if that memory is tainted.
  230. if (end < d + size)
  231. ChainAndWriteOriginIfTainted((uptr)src + (end - d), (d + size) - end, end,
  232. stack);
  233. if (beg >= end)
  234. return;
  235. // Align src up.
  236. uptr src_a = OriginAlignUp((uptr)src);
  237. dfsan_origin *src_o = origin_for((void *)src_a);
  238. u32 *src_s = (u32 *)shadow_for((void *)src_a);
  239. dfsan_origin *src_end = origin_for((void *)(src_a + (end - beg)));
  240. dfsan_origin *dst_o = origin_for((void *)beg);
  241. dfsan_origin last_src_o = 0;
  242. dfsan_origin last_dst_o = 0;
  243. for (; src_o < src_end; ++src_o, ++src_s, ++dst_o) {
  244. if (!*src_s)
  245. continue;
  246. if (*src_o != last_src_o) {
  247. last_src_o = *src_o;
  248. last_dst_o = ChainOrigin(last_src_o, stack);
  249. }
  250. *dst_o = last_dst_o;
  251. }
  252. }
  253. // Copy the origins of the size bytes from src to dst. The source and target
  254. // memory ranges may be overlapped. So the copy is done in a reverse order.
  255. // This is used by memmove. stack records the stack trace of the memmove.
  256. static void ReverseCopyOrigin(const void *dst, const void *src, uptr size,
  257. StackTrace *stack) {
  258. uptr d = (uptr)dst;
  259. uptr end = OriginAlignDown(d + size);
  260. // Copy right unaligned origin if that memory is tainted.
  261. if (end < d + size)
  262. ChainAndWriteOriginIfTainted((uptr)src + (end - d), (d + size) - end, end,
  263. stack);
  264. uptr beg = OriginAlignDown(d);
  265. if (beg + kOriginAlign < end) {
  266. // Align src up.
  267. uptr src_a = OriginAlignUp((uptr)src);
  268. void *src_end = (void *)(src_a + end - beg - kOriginAlign);
  269. dfsan_origin *src_end_o = origin_for(src_end);
  270. u32 *src_end_s = (u32 *)shadow_for(src_end);
  271. dfsan_origin *src_begin_o = origin_for((void *)src_a);
  272. dfsan_origin *dst = origin_for((void *)(end - kOriginAlign));
  273. dfsan_origin last_src_o = 0;
  274. dfsan_origin last_dst_o = 0;
  275. for (; src_end_o >= src_begin_o; --src_end_o, --src_end_s, --dst) {
  276. if (!*src_end_s)
  277. continue;
  278. if (*src_end_o != last_src_o) {
  279. last_src_o = *src_end_o;
  280. last_dst_o = ChainOrigin(last_src_o, stack);
  281. }
  282. *dst = last_dst_o;
  283. }
  284. }
  285. // Copy left unaligned origin if that memory is tainted.
  286. if (beg < d)
  287. ChainAndWriteOriginIfTainted((uptr)src, beg + kOriginAlign - d, beg, stack);
  288. }
  289. // Copy or move the origins of the len bytes from src to dst. The source and
  290. // target memory ranges may or may not be overlapped. This is used by memory
  291. // transfer operations. stack records the stack trace of the memory transfer
  292. // operation.
  293. static void MoveOrigin(const void *dst, const void *src, uptr size,
  294. StackTrace *stack) {
  295. // Validate address regions.
  296. if (!MEM_IS_SHADOW(shadow_for(dst)) ||
  297. !MEM_IS_SHADOW(shadow_for((void *)((uptr)dst + size))) ||
  298. !MEM_IS_SHADOW(shadow_for(src)) ||
  299. !MEM_IS_SHADOW(shadow_for((void *)((uptr)src + size)))) {
  300. CHECK(false);
  301. return;
  302. }
  303. // If destination origin range overlaps with source origin range, move
  304. // origins by copying origins in a reverse order; otherwise, copy origins in
  305. // a normal order. The orders of origin transfer are consistent with the
  306. // orders of how memcpy and memmove transfer user data.
  307. uptr src_aligned_beg = OriginAlignDown((uptr)src);
  308. uptr src_aligned_end = OriginAlignDown((uptr)src + size);
  309. uptr dst_aligned_beg = OriginAlignDown((uptr)dst);
  310. if (dst_aligned_beg < src_aligned_end && dst_aligned_beg >= src_aligned_beg)
  311. return ReverseCopyOrigin(dst, src, size, stack);
  312. return CopyOrigin(dst, src, size, stack);
  313. }
  314. // Set the size bytes from the addres dst to be the origin value.
  315. static void SetOrigin(const void *dst, uptr size, u32 origin) {
  316. if (size == 0)
  317. return;
  318. // Origin mapping is 4 bytes per 4 bytes of application memory.
  319. // Here we extend the range such that its left and right bounds are both
  320. // 4 byte aligned.
  321. uptr x = unaligned_origin_for((uptr)dst);
  322. uptr beg = OriginAlignDown(x);
  323. uptr end = OriginAlignUp(x + size); // align up.
  324. u64 origin64 = ((u64)origin << 32) | origin;
  325. // This is like memset, but the value is 32-bit. We unroll by 2 to write
  326. // 64 bits at once. May want to unroll further to get 128-bit stores.
  327. if (beg & 7ULL) {
  328. if (*(u32 *)beg != origin)
  329. *(u32 *)beg = origin;
  330. beg += 4;
  331. }
  332. for (uptr addr = beg; addr < (end & ~7UL); addr += 8) {
  333. if (*(u64 *)addr == origin64)
  334. continue;
  335. *(u64 *)addr = origin64;
  336. }
  337. if (end & 7ULL)
  338. if (*(u32 *)(end - kOriginAlign) != origin)
  339. *(u32 *)(end - kOriginAlign) = origin;
  340. }
  341. #define RET_CHAIN_ORIGIN(id) \
  342. GET_CALLER_PC_BP; \
  343. GET_STORE_STACK_TRACE_PC_BP(pc, bp); \
  344. return ChainOrigin(id, &stack);
  345. // Return a new origin chain with the previous ID id and the current stack
  346. // trace.
  347. extern "C" SANITIZER_INTERFACE_ATTRIBUTE dfsan_origin
  348. __dfsan_chain_origin(dfsan_origin id) {
  349. RET_CHAIN_ORIGIN(id)
  350. }
  351. // Return a new origin chain with the previous ID id and the current stack
  352. // trace if the label is tainted.
  353. extern "C" SANITIZER_INTERFACE_ATTRIBUTE dfsan_origin
  354. __dfsan_chain_origin_if_tainted(dfsan_label label, dfsan_origin id) {
  355. if (!label)
  356. return id;
  357. RET_CHAIN_ORIGIN(id)
  358. }
  359. // Copy or move the origins of the len bytes from src to dst.
  360. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void __dfsan_mem_origin_transfer(
  361. const void *dst, const void *src, uptr len) {
  362. if (src == dst)
  363. return;
  364. GET_CALLER_PC_BP;
  365. GET_STORE_STACK_TRACE_PC_BP(pc, bp);
  366. MoveOrigin(dst, src, len, &stack);
  367. }
  368. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void dfsan_mem_origin_transfer(
  369. const void *dst, const void *src, uptr len) {
  370. __dfsan_mem_origin_transfer(dst, src, len);
  371. }
  372. static void CopyShadow(void *dst, const void *src, uptr len) {
  373. internal_memcpy((void *)__dfsan::shadow_for(dst),
  374. (const void *)__dfsan::shadow_for(src),
  375. len * sizeof(dfsan_label));
  376. }
  377. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void dfsan_mem_shadow_transfer(
  378. void *dst, const void *src, uptr len) {
  379. CopyShadow(dst, src, len);
  380. }
  381. // Copy shadow and origins of the len bytes from src to dst.
  382. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void
  383. __dfsan_mem_shadow_origin_transfer(void *dst, const void *src, uptr size) {
  384. if (src == dst)
  385. return;
  386. CopyShadow(dst, src, size);
  387. if (dfsan_get_track_origins()) {
  388. // Duplicating code instead of calling __dfsan_mem_origin_transfer
  389. // so that the getting the caller stack frame works correctly.
  390. GET_CALLER_PC_BP;
  391. GET_STORE_STACK_TRACE_PC_BP(pc, bp);
  392. MoveOrigin(dst, src, size, &stack);
  393. }
  394. }
  395. // Copy shadow and origins as per __atomic_compare_exchange.
  396. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void
  397. __dfsan_mem_shadow_origin_conditional_exchange(u8 condition, void *target,
  398. void *expected,
  399. const void *desired, uptr size) {
  400. void *dst;
  401. const void *src;
  402. // condition is result of native call to __atomic_compare_exchange
  403. if (condition) {
  404. // Copy desired into target
  405. dst = target;
  406. src = desired;
  407. } else {
  408. // Copy target into expected
  409. dst = expected;
  410. src = target;
  411. }
  412. if (src == dst)
  413. return;
  414. CopyShadow(dst, src, size);
  415. if (dfsan_get_track_origins()) {
  416. // Duplicating code instead of calling __dfsan_mem_origin_transfer
  417. // so that the getting the caller stack frame works correctly.
  418. GET_CALLER_PC_BP;
  419. GET_STORE_STACK_TRACE_PC_BP(pc, bp);
  420. MoveOrigin(dst, src, size, &stack);
  421. }
  422. }
  423. namespace __dfsan {
  424. bool dfsan_inited = false;
  425. bool dfsan_init_is_running = false;
  426. void dfsan_copy_memory(void *dst, const void *src, uptr size) {
  427. internal_memcpy(dst, src, size);
  428. dfsan_mem_shadow_transfer(dst, src, size);
  429. if (dfsan_get_track_origins())
  430. dfsan_mem_origin_transfer(dst, src, size);
  431. }
  432. // Releases the pages within the origin address range.
  433. static void ReleaseOrigins(void *addr, uptr size) {
  434. const uptr beg_origin_addr = (uptr)__dfsan::origin_for(addr);
  435. const void *end_addr = (void *)((uptr)addr + size);
  436. const uptr end_origin_addr = (uptr)__dfsan::origin_for(end_addr);
  437. if (end_origin_addr - beg_origin_addr <
  438. common_flags()->clear_shadow_mmap_threshold)
  439. return;
  440. const uptr page_size = GetPageSizeCached();
  441. const uptr beg_aligned = RoundUpTo(beg_origin_addr, page_size);
  442. const uptr end_aligned = RoundDownTo(end_origin_addr, page_size);
  443. if (!MmapFixedSuperNoReserve(beg_aligned, end_aligned - beg_aligned))
  444. Die();
  445. }
  446. static void WriteZeroShadowInRange(uptr beg, uptr end) {
  447. // Don't write the label if it is already the value we need it to be.
  448. // In a program where most addresses are not labeled, it is common that
  449. // a page of shadow memory is entirely zeroed. The Linux copy-on-write
  450. // implementation will share all of the zeroed pages, making a copy of a
  451. // page when any value is written. The un-sharing will happen even if
  452. // the value written does not change the value in memory. Avoiding the
  453. // write when both |label| and |*labelp| are zero dramatically reduces
  454. // the amount of real memory used by large programs.
  455. if (!mem_is_zero((const char *)beg, end - beg))
  456. internal_memset((void *)beg, 0, end - beg);
  457. }
  458. // Releases the pages within the shadow address range, and sets
  459. // the shadow addresses not on the pages to be 0.
  460. static void ReleaseOrClearShadows(void *addr, uptr size) {
  461. const uptr beg_shadow_addr = (uptr)__dfsan::shadow_for(addr);
  462. const void *end_addr = (void *)((uptr)addr + size);
  463. const uptr end_shadow_addr = (uptr)__dfsan::shadow_for(end_addr);
  464. if (end_shadow_addr - beg_shadow_addr <
  465. common_flags()->clear_shadow_mmap_threshold) {
  466. WriteZeroShadowInRange(beg_shadow_addr, end_shadow_addr);
  467. return;
  468. }
  469. const uptr page_size = GetPageSizeCached();
  470. const uptr beg_aligned = RoundUpTo(beg_shadow_addr, page_size);
  471. const uptr end_aligned = RoundDownTo(end_shadow_addr, page_size);
  472. if (beg_aligned >= end_aligned) {
  473. WriteZeroShadowInRange(beg_shadow_addr, end_shadow_addr);
  474. } else {
  475. if (beg_aligned != beg_shadow_addr)
  476. WriteZeroShadowInRange(beg_shadow_addr, beg_aligned);
  477. if (end_aligned != end_shadow_addr)
  478. WriteZeroShadowInRange(end_aligned, end_shadow_addr);
  479. if (!MmapFixedSuperNoReserve(beg_aligned, end_aligned - beg_aligned))
  480. Die();
  481. }
  482. }
  483. void SetShadow(dfsan_label label, void *addr, uptr size, dfsan_origin origin) {
  484. if (0 != label) {
  485. const uptr beg_shadow_addr = (uptr)__dfsan::shadow_for(addr);
  486. internal_memset((void *)beg_shadow_addr, label, size);
  487. if (dfsan_get_track_origins())
  488. SetOrigin(addr, size, origin);
  489. return;
  490. }
  491. if (dfsan_get_track_origins())
  492. ReleaseOrigins(addr, size);
  493. ReleaseOrClearShadows(addr, size);
  494. }
  495. } // namespace __dfsan
  496. // If the label s is tainted, set the size bytes from the address p to be a new
  497. // origin chain with the previous ID o and the current stack trace. This is
  498. // used by instrumentation to reduce code size when too much code is inserted.
  499. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void __dfsan_maybe_store_origin(
  500. dfsan_label s, void *p, uptr size, dfsan_origin o) {
  501. if (UNLIKELY(s)) {
  502. GET_CALLER_PC_BP;
  503. GET_STORE_STACK_TRACE_PC_BP(pc, bp);
  504. SetOrigin(p, size, ChainOrigin(o, &stack));
  505. }
  506. }
  507. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void __dfsan_set_label(
  508. dfsan_label label, dfsan_origin origin, void *addr, uptr size) {
  509. __dfsan::SetShadow(label, addr, size, origin);
  510. }
  511. SANITIZER_INTERFACE_ATTRIBUTE
  512. void dfsan_set_label(dfsan_label label, void *addr, uptr size) {
  513. dfsan_origin init_origin = 0;
  514. if (label && dfsan_get_track_origins()) {
  515. GET_CALLER_PC_BP;
  516. GET_STORE_STACK_TRACE_PC_BP(pc, bp);
  517. init_origin = ChainOrigin(0, &stack, true);
  518. }
  519. __dfsan::SetShadow(label, addr, size, init_origin);
  520. }
  521. SANITIZER_INTERFACE_ATTRIBUTE
  522. void dfsan_add_label(dfsan_label label, void *addr, uptr size) {
  523. if (0 == label)
  524. return;
  525. if (dfsan_get_track_origins()) {
  526. GET_CALLER_PC_BP;
  527. GET_STORE_STACK_TRACE_PC_BP(pc, bp);
  528. dfsan_origin init_origin = ChainOrigin(0, &stack, true);
  529. SetOrigin(addr, size, init_origin);
  530. }
  531. for (dfsan_label *labelp = shadow_for(addr); size != 0; --size, ++labelp)
  532. *labelp |= label;
  533. }
  534. // Unlike the other dfsan interface functions the behavior of this function
  535. // depends on the label of one of its arguments. Hence it is implemented as a
  536. // custom function.
  537. extern "C" SANITIZER_INTERFACE_ATTRIBUTE dfsan_label
  538. __dfsw_dfsan_get_label(long data, dfsan_label data_label,
  539. dfsan_label *ret_label) {
  540. *ret_label = 0;
  541. return data_label;
  542. }
  543. extern "C" SANITIZER_INTERFACE_ATTRIBUTE dfsan_label __dfso_dfsan_get_label(
  544. long data, dfsan_label data_label, dfsan_label *ret_label,
  545. dfsan_origin data_origin, dfsan_origin *ret_origin) {
  546. *ret_label = 0;
  547. *ret_origin = 0;
  548. return data_label;
  549. }
  550. // This function is used if dfsan_get_origin is called when origin tracking is
  551. // off.
  552. extern "C" SANITIZER_INTERFACE_ATTRIBUTE dfsan_origin __dfsw_dfsan_get_origin(
  553. long data, dfsan_label data_label, dfsan_label *ret_label) {
  554. *ret_label = 0;
  555. return 0;
  556. }
  557. extern "C" SANITIZER_INTERFACE_ATTRIBUTE dfsan_origin __dfso_dfsan_get_origin(
  558. long data, dfsan_label data_label, dfsan_label *ret_label,
  559. dfsan_origin data_origin, dfsan_origin *ret_origin) {
  560. *ret_label = 0;
  561. *ret_origin = 0;
  562. return data_origin;
  563. }
  564. SANITIZER_INTERFACE_ATTRIBUTE dfsan_label
  565. dfsan_read_label(const void *addr, uptr size) {
  566. if (size == 0)
  567. return 0;
  568. return __dfsan_union_load(shadow_for(addr), size);
  569. }
  570. SANITIZER_INTERFACE_ATTRIBUTE dfsan_origin
  571. dfsan_read_origin_of_first_taint(const void *addr, uptr size) {
  572. return GetOriginIfTainted((uptr)addr, size);
  573. }
  574. SANITIZER_INTERFACE_ATTRIBUTE void dfsan_set_label_origin(dfsan_label label,
  575. dfsan_origin origin,
  576. void *addr,
  577. uptr size) {
  578. __dfsan_set_label(label, origin, addr, size);
  579. }
  580. extern "C" SANITIZER_INTERFACE_ATTRIBUTE int
  581. dfsan_has_label(dfsan_label label, dfsan_label elem) {
  582. return (label & elem) == elem;
  583. }
  584. namespace __dfsan {
  585. typedef void (*dfsan_conditional_callback_t)(dfsan_label label,
  586. dfsan_origin origin);
  587. static dfsan_conditional_callback_t conditional_callback = nullptr;
  588. static dfsan_label labels_in_signal_conditional = 0;
  589. static void ConditionalCallback(dfsan_label label, dfsan_origin origin) {
  590. // Programs have many branches. For efficiency the conditional sink callback
  591. // handler needs to ignore as many as possible as early as possible.
  592. if (label == 0) {
  593. return;
  594. }
  595. if (conditional_callback == nullptr) {
  596. return;
  597. }
  598. // This initial ConditionalCallback handler needs to be in here in dfsan
  599. // runtime (rather than being an entirely user implemented hook) so that it
  600. // has access to dfsan thread information.
  601. DFsanThread *t = GetCurrentThread();
  602. // A callback operation which does useful work (like record the flow) will
  603. // likely be too long executed in a signal handler.
  604. if (t && t->InSignalHandler()) {
  605. // Record set of labels used in signal handler for completeness.
  606. labels_in_signal_conditional |= label;
  607. return;
  608. }
  609. conditional_callback(label, origin);
  610. }
  611. } // namespace __dfsan
  612. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void
  613. __dfsan_conditional_callback_origin(dfsan_label label, dfsan_origin origin) {
  614. __dfsan::ConditionalCallback(label, origin);
  615. }
  616. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void __dfsan_conditional_callback(
  617. dfsan_label label) {
  618. __dfsan::ConditionalCallback(label, 0);
  619. }
  620. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void dfsan_set_conditional_callback(
  621. __dfsan::dfsan_conditional_callback_t callback) {
  622. __dfsan::conditional_callback = callback;
  623. }
  624. extern "C" SANITIZER_INTERFACE_ATTRIBUTE dfsan_label
  625. dfsan_get_labels_in_signal_conditional() {
  626. return __dfsan::labels_in_signal_conditional;
  627. }
  628. namespace __dfsan {
  629. typedef void (*dfsan_reaches_function_callback_t)(dfsan_label label,
  630. dfsan_origin origin,
  631. const char *file,
  632. unsigned int line,
  633. const char *function);
  634. static dfsan_reaches_function_callback_t reaches_function_callback = nullptr;
  635. static dfsan_label labels_in_signal_reaches_function = 0;
  636. static void ReachesFunctionCallback(dfsan_label label, dfsan_origin origin,
  637. const char *file, unsigned int line,
  638. const char *function) {
  639. if (label == 0) {
  640. return;
  641. }
  642. if (reaches_function_callback == nullptr) {
  643. return;
  644. }
  645. // This initial ReachesFunctionCallback handler needs to be in here in dfsan
  646. // runtime (rather than being an entirely user implemented hook) so that it
  647. // has access to dfsan thread information.
  648. DFsanThread *t = GetCurrentThread();
  649. // A callback operation which does useful work (like record the flow) will
  650. // likely be too long executed in a signal handler.
  651. if (t && t->InSignalHandler()) {
  652. // Record set of labels used in signal handler for completeness.
  653. labels_in_signal_reaches_function |= label;
  654. return;
  655. }
  656. reaches_function_callback(label, origin, file, line, function);
  657. }
  658. } // namespace __dfsan
  659. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void
  660. __dfsan_reaches_function_callback_origin(dfsan_label label, dfsan_origin origin,
  661. const char *file, unsigned int line,
  662. const char *function) {
  663. __dfsan::ReachesFunctionCallback(label, origin, file, line, function);
  664. }
  665. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void
  666. __dfsan_reaches_function_callback(dfsan_label label, const char *file,
  667. unsigned int line, const char *function) {
  668. __dfsan::ReachesFunctionCallback(label, 0, file, line, function);
  669. }
  670. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void
  671. dfsan_set_reaches_function_callback(
  672. __dfsan::dfsan_reaches_function_callback_t callback) {
  673. __dfsan::reaches_function_callback = callback;
  674. }
  675. extern "C" SANITIZER_INTERFACE_ATTRIBUTE dfsan_label
  676. dfsan_get_labels_in_signal_reaches_function() {
  677. return __dfsan::labels_in_signal_reaches_function;
  678. }
  679. class Decorator : public __sanitizer::SanitizerCommonDecorator {
  680. public:
  681. Decorator() : SanitizerCommonDecorator() {}
  682. const char *Origin() const { return Magenta(); }
  683. };
  684. namespace {
  685. void PrintNoOriginTrackingWarning() {
  686. Decorator d;
  687. Printf(
  688. " %sDFSan: origin tracking is not enabled. Did you specify the "
  689. "-dfsan-track-origins=1 option?%s\n",
  690. d.Warning(), d.Default());
  691. }
  692. void PrintNoTaintWarning(const void *address) {
  693. Decorator d;
  694. Printf(" %sDFSan: no tainted value at %x%s\n", d.Warning(), address,
  695. d.Default());
  696. }
  697. void PrintInvalidOriginWarning(dfsan_label label, const void *address) {
  698. Decorator d;
  699. Printf(
  700. " %sTaint value 0x%x (at %p) has invalid origin tracking. This can "
  701. "be a DFSan bug.%s\n",
  702. d.Warning(), label, address, d.Default());
  703. }
  704. void PrintInvalidOriginIdWarning(dfsan_origin origin) {
  705. Decorator d;
  706. Printf(
  707. " %sOrigin Id %d has invalid origin tracking. This can "
  708. "be a DFSan bug.%s\n",
  709. d.Warning(), origin, d.Default());
  710. }
  711. bool PrintOriginTraceFramesToStr(Origin o, InternalScopedString *out) {
  712. Decorator d;
  713. bool found = false;
  714. while (o.isChainedOrigin()) {
  715. StackTrace stack;
  716. dfsan_origin origin_id = o.raw_id();
  717. o = o.getNextChainedOrigin(&stack);
  718. if (o.isChainedOrigin())
  719. out->AppendF(
  720. " %sOrigin value: 0x%x, Taint value was stored to memory at%s\n",
  721. d.Origin(), origin_id, d.Default());
  722. else
  723. out->AppendF(" %sOrigin value: 0x%x, Taint value was created at%s\n",
  724. d.Origin(), origin_id, d.Default());
  725. // Includes a trailing newline, so no need to add it again.
  726. stack.PrintTo(out);
  727. found = true;
  728. }
  729. return found;
  730. }
  731. bool PrintOriginTraceToStr(const void *addr, const char *description,
  732. InternalScopedString *out) {
  733. CHECK(out);
  734. CHECK(dfsan_get_track_origins());
  735. Decorator d;
  736. const dfsan_label label = *__dfsan::shadow_for(addr);
  737. CHECK(label);
  738. const dfsan_origin origin = *__dfsan::origin_for(addr);
  739. out->AppendF(" %sTaint value 0x%x (at %p) origin tracking (%s)%s\n",
  740. d.Origin(), label, addr, description ? description : "",
  741. d.Default());
  742. Origin o = Origin::FromRawId(origin);
  743. return PrintOriginTraceFramesToStr(o, out);
  744. }
  745. } // namespace
  746. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void dfsan_print_origin_trace(
  747. const void *addr, const char *description) {
  748. if (!dfsan_get_track_origins()) {
  749. PrintNoOriginTrackingWarning();
  750. return;
  751. }
  752. const dfsan_label label = *__dfsan::shadow_for(addr);
  753. if (!label) {
  754. PrintNoTaintWarning(addr);
  755. return;
  756. }
  757. InternalScopedString trace;
  758. bool success = PrintOriginTraceToStr(addr, description, &trace);
  759. if (trace.length())
  760. Printf("%s", trace.data());
  761. if (!success)
  762. PrintInvalidOriginWarning(label, addr);
  763. }
  764. extern "C" SANITIZER_INTERFACE_ATTRIBUTE uptr
  765. dfsan_sprint_origin_trace(const void *addr, const char *description,
  766. char *out_buf, uptr out_buf_size) {
  767. CHECK(out_buf);
  768. if (!dfsan_get_track_origins()) {
  769. PrintNoOriginTrackingWarning();
  770. return 0;
  771. }
  772. const dfsan_label label = *__dfsan::shadow_for(addr);
  773. if (!label) {
  774. PrintNoTaintWarning(addr);
  775. return 0;
  776. }
  777. InternalScopedString trace;
  778. bool success = PrintOriginTraceToStr(addr, description, &trace);
  779. if (!success) {
  780. PrintInvalidOriginWarning(label, addr);
  781. return 0;
  782. }
  783. if (out_buf_size) {
  784. internal_strncpy(out_buf, trace.data(), out_buf_size - 1);
  785. out_buf[out_buf_size - 1] = '\0';
  786. }
  787. return trace.length();
  788. }
  789. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void dfsan_print_origin_id_trace(
  790. dfsan_origin origin) {
  791. if (!dfsan_get_track_origins()) {
  792. PrintNoOriginTrackingWarning();
  793. return;
  794. }
  795. Origin o = Origin::FromRawId(origin);
  796. InternalScopedString trace;
  797. bool success = PrintOriginTraceFramesToStr(o, &trace);
  798. if (trace.length())
  799. Printf("%s", trace.data());
  800. if (!success)
  801. PrintInvalidOriginIdWarning(origin);
  802. }
  803. extern "C" SANITIZER_INTERFACE_ATTRIBUTE uptr dfsan_sprint_origin_id_trace(
  804. dfsan_origin origin, char *out_buf, uptr out_buf_size) {
  805. CHECK(out_buf);
  806. if (!dfsan_get_track_origins()) {
  807. PrintNoOriginTrackingWarning();
  808. return 0;
  809. }
  810. Origin o = Origin::FromRawId(origin);
  811. InternalScopedString trace;
  812. bool success = PrintOriginTraceFramesToStr(o, &trace);
  813. if (!success) {
  814. PrintInvalidOriginIdWarning(origin);
  815. return 0;
  816. }
  817. if (out_buf_size) {
  818. internal_strncpy(out_buf, trace.data(), out_buf_size - 1);
  819. out_buf[out_buf_size - 1] = '\0';
  820. }
  821. return trace.length();
  822. }
  823. extern "C" SANITIZER_INTERFACE_ATTRIBUTE dfsan_origin
  824. dfsan_get_init_origin(const void *addr) {
  825. if (!dfsan_get_track_origins())
  826. return 0;
  827. const dfsan_label label = *__dfsan::shadow_for(addr);
  828. if (!label)
  829. return 0;
  830. const dfsan_origin origin = *__dfsan::origin_for(addr);
  831. Origin o = Origin::FromRawId(origin);
  832. dfsan_origin origin_id = o.raw_id();
  833. while (o.isChainedOrigin()) {
  834. StackTrace stack;
  835. origin_id = o.raw_id();
  836. o = o.getNextChainedOrigin(&stack);
  837. }
  838. return origin_id;
  839. }
  840. void __sanitizer::BufferedStackTrace::UnwindImpl(uptr pc, uptr bp,
  841. void *context,
  842. bool request_fast,
  843. u32 max_depth) {
  844. using namespace __dfsan;
  845. DFsanThread *t = GetCurrentThread();
  846. if (!t || !StackTrace::WillUseFastUnwind(request_fast)) {
  847. return Unwind(max_depth, pc, bp, context, 0, 0, false);
  848. }
  849. Unwind(max_depth, pc, bp, nullptr, t->stack_top(), t->stack_bottom(), true);
  850. }
  851. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void __sanitizer_print_stack_trace() {
  852. GET_CALLER_PC_BP;
  853. GET_STORE_STACK_TRACE_PC_BP(pc, bp);
  854. stack.Print();
  855. }
  856. extern "C" SANITIZER_INTERFACE_ATTRIBUTE uptr
  857. dfsan_sprint_stack_trace(char *out_buf, uptr out_buf_size) {
  858. CHECK(out_buf);
  859. GET_CALLER_PC_BP;
  860. GET_STORE_STACK_TRACE_PC_BP(pc, bp);
  861. return stack.PrintTo(out_buf, out_buf_size);
  862. }
  863. void Flags::SetDefaults() {
  864. #define DFSAN_FLAG(Type, Name, DefaultValue, Description) Name = DefaultValue;
  865. #include "dfsan_flags.inc"
  866. #undef DFSAN_FLAG
  867. }
  868. static void RegisterDfsanFlags(FlagParser *parser, Flags *f) {
  869. #define DFSAN_FLAG(Type, Name, DefaultValue, Description) \
  870. RegisterFlag(parser, #Name, Description, &f->Name);
  871. #include "dfsan_flags.inc"
  872. #undef DFSAN_FLAG
  873. }
  874. static void InitializeFlags() {
  875. SetCommonFlagsDefaults();
  876. {
  877. CommonFlags cf;
  878. cf.CopyFrom(*common_flags());
  879. cf.intercept_tls_get_addr = true;
  880. OverrideCommonFlags(cf);
  881. }
  882. flags().SetDefaults();
  883. FlagParser parser;
  884. RegisterCommonFlags(&parser);
  885. RegisterDfsanFlags(&parser, &flags());
  886. parser.ParseStringFromEnv("DFSAN_OPTIONS");
  887. InitializeCommonFlags();
  888. if (Verbosity()) ReportUnrecognizedFlags();
  889. if (common_flags()->help) parser.PrintFlagDescriptions();
  890. }
  891. SANITIZER_INTERFACE_ATTRIBUTE
  892. void dfsan_clear_arg_tls(uptr offset, uptr size) {
  893. internal_memset((void *)((uptr)__dfsan_arg_tls + offset), 0, size);
  894. }
  895. SANITIZER_INTERFACE_ATTRIBUTE
  896. void dfsan_clear_thread_local_state() {
  897. internal_memset(__dfsan_arg_tls, 0, sizeof(__dfsan_arg_tls));
  898. internal_memset(__dfsan_retval_tls, 0, sizeof(__dfsan_retval_tls));
  899. if (dfsan_get_track_origins()) {
  900. internal_memset(__dfsan_arg_origin_tls, 0, sizeof(__dfsan_arg_origin_tls));
  901. internal_memset(&__dfsan_retval_origin_tls, 0,
  902. sizeof(__dfsan_retval_origin_tls));
  903. }
  904. }
  905. SANITIZER_INTERFACE_ATTRIBUTE
  906. void dfsan_set_arg_tls(uptr offset, dfsan_label label) {
  907. // 2x to match ShadowTLSAlignment.
  908. // ShadowTLSAlignment should probably be changed.
  909. // TODO: Consider reducing ShadowTLSAlignment to 1.
  910. // Aligning to 2 bytes is probably a remnant of fast16 mode.
  911. ((dfsan_label *)__dfsan_arg_tls)[offset * 2] = label;
  912. }
  913. SANITIZER_INTERFACE_ATTRIBUTE
  914. void dfsan_set_arg_origin_tls(uptr offset, dfsan_origin o) {
  915. __dfsan_arg_origin_tls[offset] = o;
  916. }
  917. extern "C" void dfsan_flush() {
  918. const uptr maxVirtualAddress = GetMaxUserVirtualAddress();
  919. for (unsigned i = 0; i < kMemoryLayoutSize; ++i) {
  920. uptr start = kMemoryLayout[i].start;
  921. uptr end = kMemoryLayout[i].end;
  922. uptr size = end - start;
  923. MappingDesc::Type type = kMemoryLayout[i].type;
  924. if (type != MappingDesc::SHADOW && type != MappingDesc::ORIGIN)
  925. continue;
  926. // Check if the segment should be mapped based on platform constraints.
  927. if (start >= maxVirtualAddress)
  928. continue;
  929. if (!MmapFixedSuperNoReserve(start, size, kMemoryLayout[i].name)) {
  930. Printf("FATAL: DataFlowSanitizer: failed to clear memory region\n");
  931. Die();
  932. }
  933. }
  934. __dfsan::labels_in_signal_conditional = 0;
  935. __dfsan::labels_in_signal_reaches_function = 0;
  936. }
  937. // TODO: CheckMemoryLayoutSanity is based on msan.
  938. // Consider refactoring these into a shared implementation.
  939. static void CheckMemoryLayoutSanity() {
  940. uptr prev_end = 0;
  941. for (unsigned i = 0; i < kMemoryLayoutSize; ++i) {
  942. uptr start = kMemoryLayout[i].start;
  943. uptr end = kMemoryLayout[i].end;
  944. MappingDesc::Type type = kMemoryLayout[i].type;
  945. CHECK_LT(start, end);
  946. CHECK_EQ(prev_end, start);
  947. CHECK(addr_is_type(start, type));
  948. CHECK(addr_is_type((start + end) / 2, type));
  949. CHECK(addr_is_type(end - 1, type));
  950. if (type == MappingDesc::APP) {
  951. uptr addr = start;
  952. CHECK(MEM_IS_SHADOW(MEM_TO_SHADOW(addr)));
  953. CHECK(MEM_IS_ORIGIN(MEM_TO_ORIGIN(addr)));
  954. CHECK_EQ(MEM_TO_ORIGIN(addr), SHADOW_TO_ORIGIN(MEM_TO_SHADOW(addr)));
  955. addr = (start + end) / 2;
  956. CHECK(MEM_IS_SHADOW(MEM_TO_SHADOW(addr)));
  957. CHECK(MEM_IS_ORIGIN(MEM_TO_ORIGIN(addr)));
  958. CHECK_EQ(MEM_TO_ORIGIN(addr), SHADOW_TO_ORIGIN(MEM_TO_SHADOW(addr)));
  959. addr = end - 1;
  960. CHECK(MEM_IS_SHADOW(MEM_TO_SHADOW(addr)));
  961. CHECK(MEM_IS_ORIGIN(MEM_TO_ORIGIN(addr)));
  962. CHECK_EQ(MEM_TO_ORIGIN(addr), SHADOW_TO_ORIGIN(MEM_TO_SHADOW(addr)));
  963. }
  964. prev_end = end;
  965. }
  966. }
  967. // TODO: CheckMemoryRangeAvailability is based on msan.
  968. // Consider refactoring these into a shared implementation.
  969. static bool CheckMemoryRangeAvailability(uptr beg, uptr size) {
  970. if (size > 0) {
  971. uptr end = beg + size - 1;
  972. if (!MemoryRangeIsAvailable(beg, end)) {
  973. Printf("FATAL: Memory range %p - %p is not available.\n", beg, end);
  974. return false;
  975. }
  976. }
  977. return true;
  978. }
  979. // TODO: ProtectMemoryRange is based on msan.
  980. // Consider refactoring these into a shared implementation.
  981. static bool ProtectMemoryRange(uptr beg, uptr size, const char *name) {
  982. if (size > 0) {
  983. void *addr = MmapFixedNoAccess(beg, size, name);
  984. if (beg == 0 && addr) {
  985. // Depending on the kernel configuration, we may not be able to protect
  986. // the page at address zero.
  987. uptr gap = 16 * GetPageSizeCached();
  988. beg += gap;
  989. size -= gap;
  990. addr = MmapFixedNoAccess(beg, size, name);
  991. }
  992. if ((uptr)addr != beg) {
  993. uptr end = beg + size - 1;
  994. Printf("FATAL: Cannot protect memory range %p - %p (%s).\n", beg, end,
  995. name);
  996. return false;
  997. }
  998. }
  999. return true;
  1000. }
  1001. // TODO: InitShadow is based on msan.
  1002. // Consider refactoring these into a shared implementation.
  1003. bool InitShadow(bool init_origins) {
  1004. // Let user know mapping parameters first.
  1005. VPrintf(1, "dfsan_init %p\n", (void *)&__dfsan::dfsan_init);
  1006. for (unsigned i = 0; i < kMemoryLayoutSize; ++i)
  1007. VPrintf(1, "%s: %zx - %zx\n", kMemoryLayout[i].name, kMemoryLayout[i].start,
  1008. kMemoryLayout[i].end - 1);
  1009. CheckMemoryLayoutSanity();
  1010. if (!MEM_IS_APP(&__dfsan::dfsan_init)) {
  1011. Printf("FATAL: Code %p is out of application range. Non-PIE build?\n",
  1012. (uptr)&__dfsan::dfsan_init);
  1013. return false;
  1014. }
  1015. const uptr maxVirtualAddress = GetMaxUserVirtualAddress();
  1016. for (unsigned i = 0; i < kMemoryLayoutSize; ++i) {
  1017. uptr start = kMemoryLayout[i].start;
  1018. uptr end = kMemoryLayout[i].end;
  1019. uptr size = end - start;
  1020. MappingDesc::Type type = kMemoryLayout[i].type;
  1021. // Check if the segment should be mapped based on platform constraints.
  1022. if (start >= maxVirtualAddress)
  1023. continue;
  1024. bool map = type == MappingDesc::SHADOW ||
  1025. (init_origins && type == MappingDesc::ORIGIN);
  1026. bool protect = type == MappingDesc::INVALID ||
  1027. (!init_origins && type == MappingDesc::ORIGIN);
  1028. CHECK(!(map && protect));
  1029. if (!map && !protect)
  1030. CHECK(type == MappingDesc::APP);
  1031. if (map) {
  1032. if (!CheckMemoryRangeAvailability(start, size))
  1033. return false;
  1034. if (!MmapFixedSuperNoReserve(start, size, kMemoryLayout[i].name))
  1035. return false;
  1036. if (common_flags()->use_madv_dontdump)
  1037. DontDumpShadowMemory(start, size);
  1038. }
  1039. if (protect) {
  1040. if (!CheckMemoryRangeAvailability(start, size))
  1041. return false;
  1042. if (!ProtectMemoryRange(start, size, kMemoryLayout[i].name))
  1043. return false;
  1044. }
  1045. }
  1046. return true;
  1047. }
  1048. static void DFsanInit(int argc, char **argv, char **envp) {
  1049. CHECK(!dfsan_init_is_running);
  1050. if (dfsan_inited)
  1051. return;
  1052. dfsan_init_is_running = true;
  1053. SanitizerToolName = "DataflowSanitizer";
  1054. AvoidCVE_2016_2143();
  1055. InitializeFlags();
  1056. CheckASLR();
  1057. InitShadow(dfsan_get_track_origins());
  1058. initialize_interceptors();
  1059. // Set up threads
  1060. DFsanTSDInit(DFsanTSDDtor);
  1061. dfsan_allocator_init();
  1062. DFsanThread *main_thread = DFsanThread::Create(nullptr, nullptr);
  1063. SetCurrentThread(main_thread);
  1064. main_thread->Init();
  1065. dfsan_init_is_running = false;
  1066. dfsan_inited = true;
  1067. }
  1068. namespace __dfsan {
  1069. void dfsan_init() { DFsanInit(0, nullptr, nullptr); }
  1070. } // namespace __dfsan
  1071. #if SANITIZER_CAN_USE_PREINIT_ARRAY
  1072. __attribute__((section(".preinit_array"),
  1073. used)) static void (*dfsan_init_ptr)(int, char **,
  1074. char **) = DFsanInit;
  1075. #endif