123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187 |
- //===-- dfsan_interface.h -------------------------------------------------===//
- //
- // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
- // See https://llvm.org/LICENSE.txt for license information.
- // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
- //
- //===----------------------------------------------------------------------===//
- //
- // This file is a part of DataFlowSanitizer.
- //
- // Public interface header.
- //===----------------------------------------------------------------------===//
- #ifndef DFSAN_INTERFACE_H
- #define DFSAN_INTERFACE_H
- #include <stddef.h>
- #include <stdint.h>
- #include <sanitizer/common_interface_defs.h>
- #ifdef __cplusplus
- extern "C" {
- #endif
- typedef uint8_t dfsan_label;
- typedef uint32_t dfsan_origin;
- /// Signature of the callback argument to dfsan_set_write_callback().
- typedef void (*dfsan_write_callback_t)(int fd, const void *buf, size_t count);
- /// Signature of the callback argument to dfsan_set_conditional_callback().
- typedef void (*dfsan_conditional_callback_t)(dfsan_label label,
- dfsan_origin origin);
- /// Computes the union of \c l1 and \c l2, resulting in a union label.
- dfsan_label dfsan_union(dfsan_label l1, dfsan_label l2);
- /// Sets the label for each address in [addr,addr+size) to \c label.
- void dfsan_set_label(dfsan_label label, void *addr, size_t size);
- /// Sets the label for each address in [addr,addr+size) to the union of the
- /// current label for that address and \c label.
- void dfsan_add_label(dfsan_label label, void *addr, size_t size);
- /// Retrieves the label associated with the given data.
- ///
- /// The type of 'data' is arbitrary. The function accepts a value of any type,
- /// which can be truncated or extended (implicitly or explicitly) as necessary.
- /// The truncation/extension operations will preserve the label of the original
- /// value.
- dfsan_label dfsan_get_label(long data);
- /// Retrieves the immediate origin associated with the given data. The returned
- /// origin may point to another origin.
- ///
- /// The type of 'data' is arbitrary.
- dfsan_origin dfsan_get_origin(long data);
- /// Retrieves the label associated with the data at the given address.
- dfsan_label dfsan_read_label(const void *addr, size_t size);
- /// Return the origin associated with the first taint byte in the size bytes
- /// from the address addr.
- dfsan_origin dfsan_read_origin_of_first_taint(const void *addr, size_t size);
- /// Returns whether the given label label contains the label elem.
- int dfsan_has_label(dfsan_label label, dfsan_label elem);
- /// Flushes the DFSan shadow, i.e. forgets about all labels currently associated
- /// with the application memory. Use this call to start over the taint tracking
- /// within the same process.
- ///
- /// Note: If another thread is working with tainted data during the flush, that
- /// taint could still be written to shadow after the flush.
- void dfsan_flush(void);
- /// Sets a callback to be invoked on calls to write(). The callback is invoked
- /// before the write is done. The write is not guaranteed to succeed when the
- /// callback executes. Pass in NULL to remove any callback.
- void dfsan_set_write_callback(dfsan_write_callback_t labeled_write_callback);
- /// Sets a callback to be invoked on any conditional expressions which have a
- /// taint label set. This can be used to find where tainted data influences
- /// the behavior of the program.
- /// These callbacks will only be added when -dfsan-conditional-callbacks=true.
- void dfsan_set_conditional_callback(dfsan_conditional_callback_t callback);
- /// Conditional expressions occur during signal handlers.
- /// Making callbacks that handle signals well is tricky, so when
- /// -dfsan-conditional-callbacks=true, conditional expressions used in signal
- /// handlers will add the labels they see into a global (bitwise-or together).
- /// This function returns all label bits seen in signal handler conditions.
- dfsan_label dfsan_get_labels_in_signal_conditional();
- /// Interceptor hooks.
- /// Whenever a dfsan's custom function is called the corresponding
- /// hook is called it non-zero. The hooks should be defined by the user.
- /// The primary use case is taint-guided fuzzing, where the fuzzer
- /// needs to see the parameters of the function and the labels.
- /// FIXME: implement more hooks.
- void dfsan_weak_hook_memcmp(void *caller_pc, const void *s1, const void *s2,
- size_t n, dfsan_label s1_label,
- dfsan_label s2_label, dfsan_label n_label);
- void dfsan_weak_hook_strncmp(void *caller_pc, const char *s1, const char *s2,
- size_t n, dfsan_label s1_label,
- dfsan_label s2_label, dfsan_label n_label);
- /// Prints the origin trace of the label at the address addr to stderr. It also
- /// prints description at the beginning of the trace. If origin tracking is not
- /// on, or the address is not labeled, it prints nothing.
- void dfsan_print_origin_trace(const void *addr, const char *description);
- /// As above, but use an origin id from dfsan_get_origin() instead of address.
- /// Does not include header line with taint label and address information.
- void dfsan_print_origin_id_trace(dfsan_origin origin);
- /// Prints the origin trace of the label at the address \p addr to a
- /// pre-allocated output buffer. If origin tracking is not on, or the address is
- /// not labeled, it prints nothing.
- ///
- /// Typical usage:
- /// \code
- /// char kDescription[] = "...";
- /// char buf[1024];
- /// dfsan_sprint_origin_trace(&tainted_var, kDescription, buf, sizeof(buf));
- /// \endcode
- ///
- /// Typical usage that handles truncation:
- /// \code
- /// char buf[1024];
- /// int len = dfsan_sprint_origin_trace(&var, nullptr, buf, sizeof(buf));
- ///
- /// if (len < sizeof(buf)) {
- /// ProcessOriginTrace(buf);
- /// } else {
- /// char *tmpbuf = new char[len + 1];
- /// dfsan_sprint_origin_trace(&var, nullptr, tmpbuf, len + 1);
- /// ProcessOriginTrace(tmpbuf);
- /// delete[] tmpbuf;
- /// }
- /// \endcode
- ///
- /// \param addr The tainted memory address whose origin we are printing.
- /// \param description A description printed at the beginning of the trace.
- /// \param [out] out_buf The output buffer to write the results to.
- /// \param out_buf_size The size of \p out_buf.
- ///
- /// \returns The number of symbols that should have been written to \p out_buf
- /// (not including trailing null byte '\0'). Thus, the string is truncated iff
- /// return value is not less than \p out_buf_size.
- size_t dfsan_sprint_origin_trace(const void *addr, const char *description,
- char *out_buf, size_t out_buf_size);
- /// As above, but use an origin id from dfsan_get_origin() instead of address.
- /// Does not include header line with taint label and address information.
- size_t dfsan_sprint_origin_id_trace(dfsan_origin origin, char *out_buf,
- size_t out_buf_size);
- /// Prints the stack trace leading to this call to a pre-allocated output
- /// buffer.
- ///
- /// For usage examples, see dfsan_sprint_origin_trace.
- ///
- /// \param [out] out_buf The output buffer to write the results to.
- /// \param out_buf_size The size of \p out_buf.
- ///
- /// \returns The number of symbols that should have been written to \p out_buf
- /// (not including trailing null byte '\0'). Thus, the string is truncated iff
- /// return value is not less than \p out_buf_size.
- size_t dfsan_sprint_stack_trace(char *out_buf, size_t out_buf_size);
- /// Retrieves the very first origin associated with the data at the given
- /// address.
- dfsan_origin dfsan_get_init_origin(const void *addr);
- /// Returns the value of -dfsan-track-origins.
- /// * 0: do not track origins.
- /// * 1: track origins at memory store operations.
- /// * 2: track origins at memory load and store operations.
- int dfsan_get_track_origins(void);
- #ifdef __cplusplus
- } // extern "C"
- template <typename T> void dfsan_set_label(dfsan_label label, T &data) {
- dfsan_set_label(label, (void *)&data, sizeof(T));
- }
- #endif
- #endif // DFSAN_INTERFACE_H
|