dfsan.cpp 41 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262
  1. //===-- dfsan.cpp ---------------------------------------------------------===//
  2. //
  3. // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
  4. // See https://llvm.org/LICENSE.txt for license information.
  5. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
  6. //
  7. //===----------------------------------------------------------------------===//
  8. //
  9. // This file is a part of DataFlowSanitizer.
  10. //
  11. // DataFlowSanitizer runtime. This file defines the public interface to
  12. // DataFlowSanitizer as well as the definition of certain runtime functions
  13. // called automatically by the compiler (specifically the instrumentation pass
  14. // in llvm/lib/Transforms/Instrumentation/DataFlowSanitizer.cpp).
  15. //
  16. // The public interface is defined in include/sanitizer/dfsan_interface.h whose
  17. // functions are prefixed dfsan_ while the compiler interface functions are
  18. // prefixed __dfsan_.
  19. //===----------------------------------------------------------------------===//
  20. #include "dfsan/dfsan.h"
  21. #include "dfsan/dfsan_chained_origin_depot.h"
  22. #include "dfsan/dfsan_flags.h"
  23. #include "dfsan/dfsan_origin.h"
  24. #include "dfsan/dfsan_thread.h"
  25. #include "sanitizer_common/sanitizer_atomic.h"
  26. #include "sanitizer_common/sanitizer_common.h"
  27. #include "sanitizer_common/sanitizer_file.h"
  28. #include "sanitizer_common/sanitizer_flag_parser.h"
  29. #include "sanitizer_common/sanitizer_flags.h"
  30. #include "sanitizer_common/sanitizer_internal_defs.h"
  31. #include "sanitizer_common/sanitizer_libc.h"
  32. #include "sanitizer_common/sanitizer_report_decorator.h"
  33. #include "sanitizer_common/sanitizer_stacktrace.h"
  34. using namespace __dfsan;
  35. Flags __dfsan::flags_data;
  36. // The size of TLS variables. These constants must be kept in sync with the ones
  37. // in DataFlowSanitizer.cpp.
  38. static const int kDFsanArgTlsSize = 800;
  39. static const int kDFsanRetvalTlsSize = 800;
  40. static const int kDFsanArgOriginTlsSize = 800;
  41. SANITIZER_INTERFACE_ATTRIBUTE THREADLOCAL u64
  42. __dfsan_retval_tls[kDFsanRetvalTlsSize / sizeof(u64)];
  43. SANITIZER_INTERFACE_ATTRIBUTE THREADLOCAL u32 __dfsan_retval_origin_tls;
  44. SANITIZER_INTERFACE_ATTRIBUTE THREADLOCAL u64
  45. __dfsan_arg_tls[kDFsanArgTlsSize / sizeof(u64)];
  46. SANITIZER_INTERFACE_ATTRIBUTE THREADLOCAL u32
  47. __dfsan_arg_origin_tls[kDFsanArgOriginTlsSize / sizeof(u32)];
  48. // Instrumented code may set this value in terms of -dfsan-track-origins.
  49. // * undefined or 0: do not track origins.
  50. // * 1: track origins at memory store operations.
  51. // * 2: track origins at memory load and store operations.
  52. // TODO: track callsites.
  53. extern "C" SANITIZER_WEAK_ATTRIBUTE const int __dfsan_track_origins;
  54. extern "C" SANITIZER_INTERFACE_ATTRIBUTE int dfsan_get_track_origins() {
  55. return &__dfsan_track_origins ? __dfsan_track_origins : 0;
  56. }
  57. // On Linux/x86_64, memory is laid out as follows:
  58. //
  59. // +--------------------+ 0x800000000000 (top of memory)
  60. // | application 3 |
  61. // +--------------------+ 0x700000000000
  62. // | invalid |
  63. // +--------------------+ 0x610000000000
  64. // | origin 1 |
  65. // +--------------------+ 0x600000000000
  66. // | application 2 |
  67. // +--------------------+ 0x510000000000
  68. // | shadow 1 |
  69. // +--------------------+ 0x500000000000
  70. // | invalid |
  71. // +--------------------+ 0x400000000000
  72. // | origin 3 |
  73. // +--------------------+ 0x300000000000
  74. // | shadow 3 |
  75. // +--------------------+ 0x200000000000
  76. // | origin 2 |
  77. // +--------------------+ 0x110000000000
  78. // | invalid |
  79. // +--------------------+ 0x100000000000
  80. // | shadow 2 |
  81. // +--------------------+ 0x010000000000
  82. // | application 1 |
  83. // +--------------------+ 0x000000000000
  84. //
  85. // MEM_TO_SHADOW(mem) = mem ^ 0x500000000000
  86. // SHADOW_TO_ORIGIN(shadow) = shadow + 0x100000000000
  87. extern "C" SANITIZER_INTERFACE_ATTRIBUTE
  88. dfsan_label __dfsan_union_load(const dfsan_label *ls, uptr n) {
  89. dfsan_label label = ls[0];
  90. for (uptr i = 1; i != n; ++i)
  91. label |= ls[i];
  92. return label;
  93. }
  94. // Return the union of all the n labels from addr at the high 32 bit, and the
  95. // origin of the first taint byte at the low 32 bit.
  96. extern "C" SANITIZER_INTERFACE_ATTRIBUTE u64
  97. __dfsan_load_label_and_origin(const void *addr, uptr n) {
  98. dfsan_label label = 0;
  99. u64 ret = 0;
  100. uptr p = (uptr)addr;
  101. dfsan_label *s = shadow_for((void *)p);
  102. for (uptr i = 0; i < n; ++i) {
  103. dfsan_label l = s[i];
  104. if (!l)
  105. continue;
  106. label |= l;
  107. if (!ret)
  108. ret = *(dfsan_origin *)origin_for((void *)(p + i));
  109. }
  110. return ret | (u64)label << 32;
  111. }
  112. extern "C" SANITIZER_INTERFACE_ATTRIBUTE
  113. void __dfsan_unimplemented(char *fname) {
  114. if (flags().warn_unimplemented)
  115. Report("WARNING: DataFlowSanitizer: call to uninstrumented function %s\n",
  116. fname);
  117. }
  118. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void __dfsan_wrapper_extern_weak_null(
  119. const void *addr, char *fname) {
  120. if (!addr)
  121. Report(
  122. "ERROR: DataFlowSanitizer: dfsan generated wrapper calling null "
  123. "extern_weak function %s\nIf this only happens with dfsan, the "
  124. "dfsan instrumentation pass may be accidentally optimizing out a "
  125. "null check\n",
  126. fname);
  127. }
  128. // Use '-mllvm -dfsan-debug-nonzero-labels' and break on this function
  129. // to try to figure out where labels are being introduced in a nominally
  130. // label-free program.
  131. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void __dfsan_nonzero_label() {
  132. if (flags().warn_nonzero_labels)
  133. Report("WARNING: DataFlowSanitizer: saw nonzero label\n");
  134. }
  135. // Indirect call to an uninstrumented vararg function. We don't have a way of
  136. // handling these at the moment.
  137. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void
  138. __dfsan_vararg_wrapper(const char *fname) {
  139. Report("FATAL: DataFlowSanitizer: unsupported indirect call to vararg "
  140. "function %s\n", fname);
  141. Die();
  142. }
  143. // Resolves the union of two labels.
  144. SANITIZER_INTERFACE_ATTRIBUTE dfsan_label
  145. dfsan_union(dfsan_label l1, dfsan_label l2) {
  146. return l1 | l2;
  147. }
  148. static const uptr kOriginAlign = sizeof(dfsan_origin);
  149. static const uptr kOriginAlignMask = ~(kOriginAlign - 1UL);
  150. static uptr OriginAlignUp(uptr u) {
  151. return (u + kOriginAlign - 1) & kOriginAlignMask;
  152. }
  153. static uptr OriginAlignDown(uptr u) { return u & kOriginAlignMask; }
  154. // Return the origin of the first taint byte in the size bytes from the address
  155. // addr.
  156. static dfsan_origin GetOriginIfTainted(uptr addr, uptr size) {
  157. for (uptr i = 0; i < size; ++i, ++addr) {
  158. dfsan_label *s = shadow_for((void *)addr);
  159. if (*s) {
  160. // Validate address region.
  161. CHECK(MEM_IS_SHADOW(s));
  162. return *(dfsan_origin *)origin_for((void *)addr);
  163. }
  164. }
  165. return 0;
  166. }
  167. // For platforms which support slow unwinder only, we need to restrict the store
  168. // context size to 1, basically only storing the current pc, because the slow
  169. // unwinder which is based on libunwind is not async signal safe and causes
  170. // random freezes in forking applications as well as in signal handlers.
  171. // DFSan supports only Linux. So we do not restrict the store context size.
  172. #define GET_STORE_STACK_TRACE_PC_BP(pc, bp) \
  173. BufferedStackTrace stack; \
  174. stack.Unwind(pc, bp, nullptr, true, flags().store_context_size);
  175. #define PRINT_CALLER_STACK_TRACE \
  176. { \
  177. GET_CALLER_PC_BP_SP; \
  178. (void)sp; \
  179. GET_STORE_STACK_TRACE_PC_BP(pc, bp) \
  180. stack.Print(); \
  181. }
  182. // Return a chain with the previous ID id and the current stack.
  183. // from_init = true if this is the first chain of an origin tracking path.
  184. static u32 ChainOrigin(u32 id, StackTrace *stack, bool from_init = false) {
  185. // StackDepot is not async signal safe. Do not create new chains in a signal
  186. // handler.
  187. DFsanThread *t = GetCurrentThread();
  188. if (t && t->InSignalHandler())
  189. return id;
  190. // As an optimization the origin of an application byte is updated only when
  191. // its shadow is non-zero. Because we are only interested in the origins of
  192. // taint labels, it does not matter what origin a zero label has. This reduces
  193. // memory write cost. MSan does similar optimization. The following invariant
  194. // may not hold because of some bugs. We check the invariant to help debug.
  195. if (!from_init && id == 0 && flags().check_origin_invariant) {
  196. Printf(" DFSan found invalid origin invariant\n");
  197. PRINT_CALLER_STACK_TRACE
  198. }
  199. Origin o = Origin::FromRawId(id);
  200. stack->tag = StackTrace::TAG_UNKNOWN;
  201. Origin chained = Origin::CreateChainedOrigin(o, stack);
  202. return chained.raw_id();
  203. }
  204. static void ChainAndWriteOriginIfTainted(uptr src, uptr size, uptr dst,
  205. StackTrace *stack) {
  206. dfsan_origin o = GetOriginIfTainted(src, size);
  207. if (o) {
  208. o = ChainOrigin(o, stack);
  209. *(dfsan_origin *)origin_for((void *)dst) = o;
  210. }
  211. }
  212. // Copy the origins of the size bytes from src to dst. The source and target
  213. // memory ranges cannot be overlapped. This is used by memcpy. stack records the
  214. // stack trace of the memcpy. When dst and src are not 4-byte aligned properly,
  215. // origins at the unaligned address boundaries may be overwritten because four
  216. // contiguous bytes share the same origin.
  217. static void CopyOrigin(const void *dst, const void *src, uptr size,
  218. StackTrace *stack) {
  219. uptr d = (uptr)dst;
  220. uptr beg = OriginAlignDown(d);
  221. // Copy left unaligned origin if that memory is tainted.
  222. if (beg < d) {
  223. ChainAndWriteOriginIfTainted((uptr)src, beg + kOriginAlign - d, beg, stack);
  224. beg += kOriginAlign;
  225. }
  226. uptr end = OriginAlignDown(d + size);
  227. // If both ends fall into the same 4-byte slot, we are done.
  228. if (end < beg)
  229. return;
  230. // Copy right unaligned origin if that memory is tainted.
  231. if (end < d + size)
  232. ChainAndWriteOriginIfTainted((uptr)src + (end - d), (d + size) - end, end,
  233. stack);
  234. if (beg >= end)
  235. return;
  236. // Align src up.
  237. uptr src_a = OriginAlignUp((uptr)src);
  238. dfsan_origin *src_o = origin_for((void *)src_a);
  239. u32 *src_s = (u32 *)shadow_for((void *)src_a);
  240. dfsan_origin *src_end = origin_for((void *)(src_a + (end - beg)));
  241. dfsan_origin *dst_o = origin_for((void *)beg);
  242. dfsan_origin last_src_o = 0;
  243. dfsan_origin last_dst_o = 0;
  244. for (; src_o < src_end; ++src_o, ++src_s, ++dst_o) {
  245. if (!*src_s)
  246. continue;
  247. if (*src_o != last_src_o) {
  248. last_src_o = *src_o;
  249. last_dst_o = ChainOrigin(last_src_o, stack);
  250. }
  251. *dst_o = last_dst_o;
  252. }
  253. }
  254. // Copy the origins of the size bytes from src to dst. The source and target
  255. // memory ranges may be overlapped. So the copy is done in a reverse order.
  256. // This is used by memmove. stack records the stack trace of the memmove.
  257. static void ReverseCopyOrigin(const void *dst, const void *src, uptr size,
  258. StackTrace *stack) {
  259. uptr d = (uptr)dst;
  260. uptr end = OriginAlignDown(d + size);
  261. // Copy right unaligned origin if that memory is tainted.
  262. if (end < d + size)
  263. ChainAndWriteOriginIfTainted((uptr)src + (end - d), (d + size) - end, end,
  264. stack);
  265. uptr beg = OriginAlignDown(d);
  266. if (beg + kOriginAlign < end) {
  267. // Align src up.
  268. uptr src_a = OriginAlignUp((uptr)src);
  269. void *src_end = (void *)(src_a + end - beg - kOriginAlign);
  270. dfsan_origin *src_end_o = origin_for(src_end);
  271. u32 *src_end_s = (u32 *)shadow_for(src_end);
  272. dfsan_origin *src_begin_o = origin_for((void *)src_a);
  273. dfsan_origin *dst = origin_for((void *)(end - kOriginAlign));
  274. dfsan_origin last_src_o = 0;
  275. dfsan_origin last_dst_o = 0;
  276. for (; src_end_o >= src_begin_o; --src_end_o, --src_end_s, --dst) {
  277. if (!*src_end_s)
  278. continue;
  279. if (*src_end_o != last_src_o) {
  280. last_src_o = *src_end_o;
  281. last_dst_o = ChainOrigin(last_src_o, stack);
  282. }
  283. *dst = last_dst_o;
  284. }
  285. }
  286. // Copy left unaligned origin if that memory is tainted.
  287. if (beg < d)
  288. ChainAndWriteOriginIfTainted((uptr)src, beg + kOriginAlign - d, beg, stack);
  289. }
  290. // Copy or move the origins of the len bytes from src to dst. The source and
  291. // target memory ranges may or may not be overlapped. This is used by memory
  292. // transfer operations. stack records the stack trace of the memory transfer
  293. // operation.
  294. static void MoveOrigin(const void *dst, const void *src, uptr size,
  295. StackTrace *stack) {
  296. // Validate address regions.
  297. if (!MEM_IS_SHADOW(shadow_for(dst)) ||
  298. !MEM_IS_SHADOW(shadow_for((void *)((uptr)dst + size))) ||
  299. !MEM_IS_SHADOW(shadow_for(src)) ||
  300. !MEM_IS_SHADOW(shadow_for((void *)((uptr)src + size)))) {
  301. CHECK(false);
  302. return;
  303. }
  304. // If destination origin range overlaps with source origin range, move
  305. // origins by copying origins in a reverse order; otherwise, copy origins in
  306. // a normal order. The orders of origin transfer are consistent with the
  307. // orders of how memcpy and memmove transfer user data.
  308. uptr src_aligned_beg = OriginAlignDown((uptr)src);
  309. uptr src_aligned_end = OriginAlignDown((uptr)src + size);
  310. uptr dst_aligned_beg = OriginAlignDown((uptr)dst);
  311. if (dst_aligned_beg < src_aligned_end && dst_aligned_beg >= src_aligned_beg)
  312. return ReverseCopyOrigin(dst, src, size, stack);
  313. return CopyOrigin(dst, src, size, stack);
  314. }
  315. // Set the size bytes from the addres dst to be the origin value.
  316. static void SetOrigin(const void *dst, uptr size, u32 origin) {
  317. if (size == 0)
  318. return;
  319. // Origin mapping is 4 bytes per 4 bytes of application memory.
  320. // Here we extend the range such that its left and right bounds are both
  321. // 4 byte aligned.
  322. uptr x = unaligned_origin_for((uptr)dst);
  323. uptr beg = OriginAlignDown(x);
  324. uptr end = OriginAlignUp(x + size); // align up.
  325. u64 origin64 = ((u64)origin << 32) | origin;
  326. // This is like memset, but the value is 32-bit. We unroll by 2 to write
  327. // 64 bits at once. May want to unroll further to get 128-bit stores.
  328. if (beg & 7ULL) {
  329. if (*(u32 *)beg != origin)
  330. *(u32 *)beg = origin;
  331. beg += 4;
  332. }
  333. for (uptr addr = beg; addr < (end & ~7UL); addr += 8) {
  334. if (*(u64 *)addr == origin64)
  335. continue;
  336. *(u64 *)addr = origin64;
  337. }
  338. if (end & 7ULL)
  339. if (*(u32 *)(end - kOriginAlign) != origin)
  340. *(u32 *)(end - kOriginAlign) = origin;
  341. }
  342. #define RET_CHAIN_ORIGIN(id) \
  343. GET_CALLER_PC_BP_SP; \
  344. (void)sp; \
  345. GET_STORE_STACK_TRACE_PC_BP(pc, bp); \
  346. return ChainOrigin(id, &stack);
  347. // Return a new origin chain with the previous ID id and the current stack
  348. // trace.
  349. extern "C" SANITIZER_INTERFACE_ATTRIBUTE dfsan_origin
  350. __dfsan_chain_origin(dfsan_origin id) {
  351. RET_CHAIN_ORIGIN(id)
  352. }
  353. // Return a new origin chain with the previous ID id and the current stack
  354. // trace if the label is tainted.
  355. extern "C" SANITIZER_INTERFACE_ATTRIBUTE dfsan_origin
  356. __dfsan_chain_origin_if_tainted(dfsan_label label, dfsan_origin id) {
  357. if (!label)
  358. return id;
  359. RET_CHAIN_ORIGIN(id)
  360. }
  361. // Copy or move the origins of the len bytes from src to dst.
  362. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void __dfsan_mem_origin_transfer(
  363. const void *dst, const void *src, uptr len) {
  364. if (src == dst)
  365. return;
  366. GET_CALLER_PC_BP;
  367. GET_STORE_STACK_TRACE_PC_BP(pc, bp);
  368. MoveOrigin(dst, src, len, &stack);
  369. }
  370. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void dfsan_mem_origin_transfer(
  371. const void *dst, const void *src, uptr len) {
  372. __dfsan_mem_origin_transfer(dst, src, len);
  373. }
  374. static void CopyShadow(void *dst, const void *src, uptr len) {
  375. internal_memcpy((void *)__dfsan::shadow_for(dst),
  376. (const void *)__dfsan::shadow_for(src),
  377. len * sizeof(dfsan_label));
  378. }
  379. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void dfsan_mem_shadow_transfer(
  380. void *dst, const void *src, uptr len) {
  381. CopyShadow(dst, src, len);
  382. }
  383. // Copy shadow and origins of the len bytes from src to dst.
  384. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void
  385. __dfsan_mem_shadow_origin_transfer(void *dst, const void *src, uptr size) {
  386. if (src == dst)
  387. return;
  388. CopyShadow(dst, src, size);
  389. if (dfsan_get_track_origins()) {
  390. // Duplicating code instead of calling __dfsan_mem_origin_transfer
  391. // so that the getting the caller stack frame works correctly.
  392. GET_CALLER_PC_BP;
  393. GET_STORE_STACK_TRACE_PC_BP(pc, bp);
  394. MoveOrigin(dst, src, size, &stack);
  395. }
  396. }
  397. // Copy shadow and origins as per __atomic_compare_exchange.
  398. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void
  399. __dfsan_mem_shadow_origin_conditional_exchange(u8 condition, void *target,
  400. void *expected,
  401. const void *desired, uptr size) {
  402. void *dst;
  403. const void *src;
  404. // condition is result of native call to __atomic_compare_exchange
  405. if (condition) {
  406. // Copy desired into target
  407. dst = target;
  408. src = desired;
  409. } else {
  410. // Copy target into expected
  411. dst = expected;
  412. src = target;
  413. }
  414. if (src == dst)
  415. return;
  416. CopyShadow(dst, src, size);
  417. if (dfsan_get_track_origins()) {
  418. // Duplicating code instead of calling __dfsan_mem_origin_transfer
  419. // so that the getting the caller stack frame works correctly.
  420. GET_CALLER_PC_BP;
  421. GET_STORE_STACK_TRACE_PC_BP(pc, bp);
  422. MoveOrigin(dst, src, size, &stack);
  423. }
  424. }
  425. namespace __dfsan {
  426. bool dfsan_inited = false;
  427. bool dfsan_init_is_running = false;
  428. void dfsan_copy_memory(void *dst, const void *src, uptr size) {
  429. internal_memcpy(dst, src, size);
  430. dfsan_mem_shadow_transfer(dst, src, size);
  431. if (dfsan_get_track_origins())
  432. dfsan_mem_origin_transfer(dst, src, size);
  433. }
  434. // Releases the pages within the origin address range.
  435. static void ReleaseOrigins(void *addr, uptr size) {
  436. const uptr beg_origin_addr = (uptr)__dfsan::origin_for(addr);
  437. const void *end_addr = (void *)((uptr)addr + size);
  438. const uptr end_origin_addr = (uptr)__dfsan::origin_for(end_addr);
  439. if (end_origin_addr - beg_origin_addr <
  440. common_flags()->clear_shadow_mmap_threshold)
  441. return;
  442. const uptr page_size = GetPageSizeCached();
  443. const uptr beg_aligned = RoundUpTo(beg_origin_addr, page_size);
  444. const uptr end_aligned = RoundDownTo(end_origin_addr, page_size);
  445. if (!MmapFixedSuperNoReserve(beg_aligned, end_aligned - beg_aligned))
  446. Die();
  447. }
  448. static void WriteZeroShadowInRange(uptr beg, uptr end) {
  449. // Don't write the label if it is already the value we need it to be.
  450. // In a program where most addresses are not labeled, it is common that
  451. // a page of shadow memory is entirely zeroed. The Linux copy-on-write
  452. // implementation will share all of the zeroed pages, making a copy of a
  453. // page when any value is written. The un-sharing will happen even if
  454. // the value written does not change the value in memory. Avoiding the
  455. // write when both |label| and |*labelp| are zero dramatically reduces
  456. // the amount of real memory used by large programs.
  457. if (!mem_is_zero((const char *)beg, end - beg))
  458. internal_memset((void *)beg, 0, end - beg);
  459. }
  460. // Releases the pages within the shadow address range, and sets
  461. // the shadow addresses not on the pages to be 0.
  462. static void ReleaseOrClearShadows(void *addr, uptr size) {
  463. const uptr beg_shadow_addr = (uptr)__dfsan::shadow_for(addr);
  464. const void *end_addr = (void *)((uptr)addr + size);
  465. const uptr end_shadow_addr = (uptr)__dfsan::shadow_for(end_addr);
  466. if (end_shadow_addr - beg_shadow_addr <
  467. common_flags()->clear_shadow_mmap_threshold) {
  468. WriteZeroShadowInRange(beg_shadow_addr, end_shadow_addr);
  469. return;
  470. }
  471. const uptr page_size = GetPageSizeCached();
  472. const uptr beg_aligned = RoundUpTo(beg_shadow_addr, page_size);
  473. const uptr end_aligned = RoundDownTo(end_shadow_addr, page_size);
  474. if (beg_aligned >= end_aligned) {
  475. WriteZeroShadowInRange(beg_shadow_addr, end_shadow_addr);
  476. } else {
  477. if (beg_aligned != beg_shadow_addr)
  478. WriteZeroShadowInRange(beg_shadow_addr, beg_aligned);
  479. if (end_aligned != end_shadow_addr)
  480. WriteZeroShadowInRange(end_aligned, end_shadow_addr);
  481. if (!MmapFixedSuperNoReserve(beg_aligned, end_aligned - beg_aligned))
  482. Die();
  483. }
  484. }
  485. void SetShadow(dfsan_label label, void *addr, uptr size, dfsan_origin origin) {
  486. if (0 != label) {
  487. const uptr beg_shadow_addr = (uptr)__dfsan::shadow_for(addr);
  488. internal_memset((void *)beg_shadow_addr, label, size);
  489. if (dfsan_get_track_origins())
  490. SetOrigin(addr, size, origin);
  491. return;
  492. }
  493. if (dfsan_get_track_origins())
  494. ReleaseOrigins(addr, size);
  495. ReleaseOrClearShadows(addr, size);
  496. }
  497. } // namespace __dfsan
  498. // If the label s is tainted, set the size bytes from the address p to be a new
  499. // origin chain with the previous ID o and the current stack trace. This is
  500. // used by instrumentation to reduce code size when too much code is inserted.
  501. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void __dfsan_maybe_store_origin(
  502. dfsan_label s, void *p, uptr size, dfsan_origin o) {
  503. if (UNLIKELY(s)) {
  504. GET_CALLER_PC_BP_SP;
  505. (void)sp;
  506. GET_STORE_STACK_TRACE_PC_BP(pc, bp);
  507. SetOrigin(p, size, ChainOrigin(o, &stack));
  508. }
  509. }
  510. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void __dfsan_set_label(
  511. dfsan_label label, dfsan_origin origin, void *addr, uptr size) {
  512. __dfsan::SetShadow(label, addr, size, origin);
  513. }
  514. SANITIZER_INTERFACE_ATTRIBUTE
  515. void dfsan_set_label(dfsan_label label, void *addr, uptr size) {
  516. dfsan_origin init_origin = 0;
  517. if (label && dfsan_get_track_origins()) {
  518. GET_CALLER_PC_BP;
  519. GET_STORE_STACK_TRACE_PC_BP(pc, bp);
  520. init_origin = ChainOrigin(0, &stack, true);
  521. }
  522. __dfsan::SetShadow(label, addr, size, init_origin);
  523. }
  524. SANITIZER_INTERFACE_ATTRIBUTE
  525. void dfsan_add_label(dfsan_label label, void *addr, uptr size) {
  526. if (0 == label)
  527. return;
  528. if (dfsan_get_track_origins()) {
  529. GET_CALLER_PC_BP;
  530. GET_STORE_STACK_TRACE_PC_BP(pc, bp);
  531. dfsan_origin init_origin = ChainOrigin(0, &stack, true);
  532. SetOrigin(addr, size, init_origin);
  533. }
  534. for (dfsan_label *labelp = shadow_for(addr); size != 0; --size, ++labelp)
  535. *labelp |= label;
  536. }
  537. // Unlike the other dfsan interface functions the behavior of this function
  538. // depends on the label of one of its arguments. Hence it is implemented as a
  539. // custom function.
  540. extern "C" SANITIZER_INTERFACE_ATTRIBUTE dfsan_label
  541. __dfsw_dfsan_get_label(long data, dfsan_label data_label,
  542. dfsan_label *ret_label) {
  543. *ret_label = 0;
  544. return data_label;
  545. }
  546. extern "C" SANITIZER_INTERFACE_ATTRIBUTE dfsan_label __dfso_dfsan_get_label(
  547. long data, dfsan_label data_label, dfsan_label *ret_label,
  548. dfsan_origin data_origin, dfsan_origin *ret_origin) {
  549. *ret_label = 0;
  550. *ret_origin = 0;
  551. return data_label;
  552. }
  553. // This function is used if dfsan_get_origin is called when origin tracking is
  554. // off.
  555. extern "C" SANITIZER_INTERFACE_ATTRIBUTE dfsan_origin __dfsw_dfsan_get_origin(
  556. long data, dfsan_label data_label, dfsan_label *ret_label) {
  557. *ret_label = 0;
  558. return 0;
  559. }
  560. extern "C" SANITIZER_INTERFACE_ATTRIBUTE dfsan_origin __dfso_dfsan_get_origin(
  561. long data, dfsan_label data_label, dfsan_label *ret_label,
  562. dfsan_origin data_origin, dfsan_origin *ret_origin) {
  563. *ret_label = 0;
  564. *ret_origin = 0;
  565. return data_origin;
  566. }
  567. SANITIZER_INTERFACE_ATTRIBUTE dfsan_label
  568. dfsan_read_label(const void *addr, uptr size) {
  569. if (size == 0)
  570. return 0;
  571. return __dfsan_union_load(shadow_for(addr), size);
  572. }
  573. SANITIZER_INTERFACE_ATTRIBUTE dfsan_origin
  574. dfsan_read_origin_of_first_taint(const void *addr, uptr size) {
  575. return GetOriginIfTainted((uptr)addr, size);
  576. }
  577. SANITIZER_INTERFACE_ATTRIBUTE void dfsan_set_label_origin(dfsan_label label,
  578. dfsan_origin origin,
  579. void *addr,
  580. uptr size) {
  581. __dfsan_set_label(label, origin, addr, size);
  582. }
  583. extern "C" SANITIZER_INTERFACE_ATTRIBUTE int
  584. dfsan_has_label(dfsan_label label, dfsan_label elem) {
  585. return (label & elem) == elem;
  586. }
  587. namespace __dfsan {
  588. typedef void (*dfsan_conditional_callback_t)(dfsan_label label,
  589. dfsan_origin origin);
  590. static dfsan_conditional_callback_t conditional_callback = nullptr;
  591. static dfsan_label labels_in_signal_conditional = 0;
  592. static void ConditionalCallback(dfsan_label label, dfsan_origin origin) {
  593. // Programs have many branches. For efficiency the conditional sink callback
  594. // handler needs to ignore as many as possible as early as possible.
  595. if (label == 0) {
  596. return;
  597. }
  598. if (conditional_callback == nullptr) {
  599. return;
  600. }
  601. // This initial ConditionalCallback handler needs to be in here in dfsan
  602. // runtime (rather than being an entirely user implemented hook) so that it
  603. // has access to dfsan thread information.
  604. DFsanThread *t = GetCurrentThread();
  605. // A callback operation which does useful work (like record the flow) will
  606. // likely be too long executed in a signal handler.
  607. if (t && t->InSignalHandler()) {
  608. // Record set of labels used in signal handler for completeness.
  609. labels_in_signal_conditional |= label;
  610. return;
  611. }
  612. conditional_callback(label, origin);
  613. }
  614. } // namespace __dfsan
  615. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void
  616. __dfsan_conditional_callback_origin(dfsan_label label, dfsan_origin origin) {
  617. __dfsan::ConditionalCallback(label, origin);
  618. }
  619. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void __dfsan_conditional_callback(
  620. dfsan_label label) {
  621. __dfsan::ConditionalCallback(label, 0);
  622. }
  623. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void dfsan_set_conditional_callback(
  624. __dfsan::dfsan_conditional_callback_t callback) {
  625. __dfsan::conditional_callback = callback;
  626. }
  627. extern "C" SANITIZER_INTERFACE_ATTRIBUTE dfsan_label
  628. dfsan_get_labels_in_signal_conditional() {
  629. return __dfsan::labels_in_signal_conditional;
  630. }
  631. namespace __dfsan {
  632. typedef void (*dfsan_reaches_function_callback_t)(dfsan_label label,
  633. dfsan_origin origin,
  634. const char *file,
  635. unsigned int line,
  636. const char *function);
  637. static dfsan_reaches_function_callback_t reaches_function_callback = nullptr;
  638. static dfsan_label labels_in_signal_reaches_function = 0;
  639. static void ReachesFunctionCallback(dfsan_label label, dfsan_origin origin,
  640. const char *file, unsigned int line,
  641. const char *function) {
  642. if (label == 0) {
  643. return;
  644. }
  645. if (reaches_function_callback == nullptr) {
  646. return;
  647. }
  648. // This initial ReachesFunctionCallback handler needs to be in here in dfsan
  649. // runtime (rather than being an entirely user implemented hook) so that it
  650. // has access to dfsan thread information.
  651. DFsanThread *t = GetCurrentThread();
  652. // A callback operation which does useful work (like record the flow) will
  653. // likely be too long executed in a signal handler.
  654. if (t && t->InSignalHandler()) {
  655. // Record set of labels used in signal handler for completeness.
  656. labels_in_signal_reaches_function |= label;
  657. return;
  658. }
  659. reaches_function_callback(label, origin, file, line, function);
  660. }
  661. } // namespace __dfsan
  662. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void
  663. __dfsan_reaches_function_callback_origin(dfsan_label label, dfsan_origin origin,
  664. const char *file, unsigned int line,
  665. const char *function) {
  666. __dfsan::ReachesFunctionCallback(label, origin, file, line, function);
  667. }
  668. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void
  669. __dfsan_reaches_function_callback(dfsan_label label, const char *file,
  670. unsigned int line, const char *function) {
  671. __dfsan::ReachesFunctionCallback(label, 0, file, line, function);
  672. }
  673. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void
  674. dfsan_set_reaches_function_callback(
  675. __dfsan::dfsan_reaches_function_callback_t callback) {
  676. __dfsan::reaches_function_callback = callback;
  677. }
  678. extern "C" SANITIZER_INTERFACE_ATTRIBUTE dfsan_label
  679. dfsan_get_labels_in_signal_reaches_function() {
  680. return __dfsan::labels_in_signal_reaches_function;
  681. }
  682. class Decorator : public __sanitizer::SanitizerCommonDecorator {
  683. public:
  684. Decorator() : SanitizerCommonDecorator() {}
  685. const char *Origin() const { return Magenta(); }
  686. };
  687. namespace {
  688. void PrintNoOriginTrackingWarning() {
  689. Decorator d;
  690. Printf(
  691. " %sDFSan: origin tracking is not enabled. Did you specify the "
  692. "-dfsan-track-origins=1 option?%s\n",
  693. d.Warning(), d.Default());
  694. }
  695. void PrintNoTaintWarning(const void *address) {
  696. Decorator d;
  697. Printf(" %sDFSan: no tainted value at %x%s\n", d.Warning(), address,
  698. d.Default());
  699. }
  700. void PrintInvalidOriginWarning(dfsan_label label, const void *address) {
  701. Decorator d;
  702. Printf(
  703. " %sTaint value 0x%x (at %p) has invalid origin tracking. This can "
  704. "be a DFSan bug.%s\n",
  705. d.Warning(), label, address, d.Default());
  706. }
  707. void PrintInvalidOriginIdWarning(dfsan_origin origin) {
  708. Decorator d;
  709. Printf(
  710. " %sOrigin Id %d has invalid origin tracking. This can "
  711. "be a DFSan bug.%s\n",
  712. d.Warning(), origin, d.Default());
  713. }
  714. bool PrintOriginTraceFramesToStr(Origin o, InternalScopedString *out) {
  715. Decorator d;
  716. bool found = false;
  717. while (o.isChainedOrigin()) {
  718. StackTrace stack;
  719. dfsan_origin origin_id = o.raw_id();
  720. o = o.getNextChainedOrigin(&stack);
  721. if (o.isChainedOrigin())
  722. out->append(
  723. " %sOrigin value: 0x%x, Taint value was stored to memory at%s\n",
  724. d.Origin(), origin_id, d.Default());
  725. else
  726. out->append(" %sOrigin value: 0x%x, Taint value was created at%s\n",
  727. d.Origin(), origin_id, d.Default());
  728. // Includes a trailing newline, so no need to add it again.
  729. stack.PrintTo(out);
  730. found = true;
  731. }
  732. return found;
  733. }
  734. bool PrintOriginTraceToStr(const void *addr, const char *description,
  735. InternalScopedString *out) {
  736. CHECK(out);
  737. CHECK(dfsan_get_track_origins());
  738. Decorator d;
  739. const dfsan_label label = *__dfsan::shadow_for(addr);
  740. CHECK(label);
  741. const dfsan_origin origin = *__dfsan::origin_for(addr);
  742. out->append(" %sTaint value 0x%x (at %p) origin tracking (%s)%s\n",
  743. d.Origin(), label, addr, description ? description : "",
  744. d.Default());
  745. Origin o = Origin::FromRawId(origin);
  746. return PrintOriginTraceFramesToStr(o, out);
  747. }
  748. } // namespace
  749. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void dfsan_print_origin_trace(
  750. const void *addr, const char *description) {
  751. if (!dfsan_get_track_origins()) {
  752. PrintNoOriginTrackingWarning();
  753. return;
  754. }
  755. const dfsan_label label = *__dfsan::shadow_for(addr);
  756. if (!label) {
  757. PrintNoTaintWarning(addr);
  758. return;
  759. }
  760. InternalScopedString trace;
  761. bool success = PrintOriginTraceToStr(addr, description, &trace);
  762. if (trace.length())
  763. Printf("%s", trace.data());
  764. if (!success)
  765. PrintInvalidOriginWarning(label, addr);
  766. }
  767. extern "C" SANITIZER_INTERFACE_ATTRIBUTE uptr
  768. dfsan_sprint_origin_trace(const void *addr, const char *description,
  769. char *out_buf, uptr out_buf_size) {
  770. CHECK(out_buf);
  771. if (!dfsan_get_track_origins()) {
  772. PrintNoOriginTrackingWarning();
  773. return 0;
  774. }
  775. const dfsan_label label = *__dfsan::shadow_for(addr);
  776. if (!label) {
  777. PrintNoTaintWarning(addr);
  778. return 0;
  779. }
  780. InternalScopedString trace;
  781. bool success = PrintOriginTraceToStr(addr, description, &trace);
  782. if (!success) {
  783. PrintInvalidOriginWarning(label, addr);
  784. return 0;
  785. }
  786. if (out_buf_size) {
  787. internal_strncpy(out_buf, trace.data(), out_buf_size - 1);
  788. out_buf[out_buf_size - 1] = '\0';
  789. }
  790. return trace.length();
  791. }
  792. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void dfsan_print_origin_id_trace(
  793. dfsan_origin origin) {
  794. if (!dfsan_get_track_origins()) {
  795. PrintNoOriginTrackingWarning();
  796. return;
  797. }
  798. Origin o = Origin::FromRawId(origin);
  799. InternalScopedString trace;
  800. bool success = PrintOriginTraceFramesToStr(o, &trace);
  801. if (trace.length())
  802. Printf("%s", trace.data());
  803. if (!success)
  804. PrintInvalidOriginIdWarning(origin);
  805. }
  806. extern "C" SANITIZER_INTERFACE_ATTRIBUTE uptr dfsan_sprint_origin_id_trace(
  807. dfsan_origin origin, char *out_buf, uptr out_buf_size) {
  808. CHECK(out_buf);
  809. if (!dfsan_get_track_origins()) {
  810. PrintNoOriginTrackingWarning();
  811. return 0;
  812. }
  813. Origin o = Origin::FromRawId(origin);
  814. InternalScopedString trace;
  815. bool success = PrintOriginTraceFramesToStr(o, &trace);
  816. if (!success) {
  817. PrintInvalidOriginIdWarning(origin);
  818. return 0;
  819. }
  820. if (out_buf_size) {
  821. internal_strncpy(out_buf, trace.data(), out_buf_size - 1);
  822. out_buf[out_buf_size - 1] = '\0';
  823. }
  824. return trace.length();
  825. }
  826. extern "C" SANITIZER_INTERFACE_ATTRIBUTE dfsan_origin
  827. dfsan_get_init_origin(const void *addr) {
  828. if (!dfsan_get_track_origins())
  829. return 0;
  830. const dfsan_label label = *__dfsan::shadow_for(addr);
  831. if (!label)
  832. return 0;
  833. const dfsan_origin origin = *__dfsan::origin_for(addr);
  834. Origin o = Origin::FromRawId(origin);
  835. dfsan_origin origin_id = o.raw_id();
  836. while (o.isChainedOrigin()) {
  837. StackTrace stack;
  838. origin_id = o.raw_id();
  839. o = o.getNextChainedOrigin(&stack);
  840. }
  841. return origin_id;
  842. }
  843. void __sanitizer::BufferedStackTrace::UnwindImpl(uptr pc, uptr bp,
  844. void *context,
  845. bool request_fast,
  846. u32 max_depth) {
  847. using namespace __dfsan;
  848. DFsanThread *t = GetCurrentThread();
  849. if (!t || !StackTrace::WillUseFastUnwind(request_fast)) {
  850. return Unwind(max_depth, pc, bp, context, 0, 0, false);
  851. }
  852. Unwind(max_depth, pc, bp, nullptr, t->stack_top(), t->stack_bottom(), true);
  853. }
  854. extern "C" SANITIZER_INTERFACE_ATTRIBUTE void __sanitizer_print_stack_trace() {
  855. GET_CALLER_PC_BP;
  856. GET_STORE_STACK_TRACE_PC_BP(pc, bp);
  857. stack.Print();
  858. }
  859. extern "C" SANITIZER_INTERFACE_ATTRIBUTE uptr
  860. dfsan_sprint_stack_trace(char *out_buf, uptr out_buf_size) {
  861. CHECK(out_buf);
  862. GET_CALLER_PC_BP;
  863. GET_STORE_STACK_TRACE_PC_BP(pc, bp);
  864. return stack.PrintTo(out_buf, out_buf_size);
  865. }
  866. void Flags::SetDefaults() {
  867. #define DFSAN_FLAG(Type, Name, DefaultValue, Description) Name = DefaultValue;
  868. #include "dfsan_flags.inc"
  869. #undef DFSAN_FLAG
  870. }
  871. static void RegisterDfsanFlags(FlagParser *parser, Flags *f) {
  872. #define DFSAN_FLAG(Type, Name, DefaultValue, Description) \
  873. RegisterFlag(parser, #Name, Description, &f->Name);
  874. #include "dfsan_flags.inc"
  875. #undef DFSAN_FLAG
  876. }
  877. static void InitializeFlags() {
  878. SetCommonFlagsDefaults();
  879. {
  880. CommonFlags cf;
  881. cf.CopyFrom(*common_flags());
  882. cf.intercept_tls_get_addr = true;
  883. OverrideCommonFlags(cf);
  884. }
  885. flags().SetDefaults();
  886. FlagParser parser;
  887. RegisterCommonFlags(&parser);
  888. RegisterDfsanFlags(&parser, &flags());
  889. parser.ParseStringFromEnv("DFSAN_OPTIONS");
  890. InitializeCommonFlags();
  891. if (Verbosity()) ReportUnrecognizedFlags();
  892. if (common_flags()->help) parser.PrintFlagDescriptions();
  893. }
  894. SANITIZER_INTERFACE_ATTRIBUTE
  895. void dfsan_clear_arg_tls(uptr offset, uptr size) {
  896. internal_memset((void *)((uptr)__dfsan_arg_tls + offset), 0, size);
  897. }
  898. SANITIZER_INTERFACE_ATTRIBUTE
  899. void dfsan_clear_thread_local_state() {
  900. internal_memset(__dfsan_arg_tls, 0, sizeof(__dfsan_arg_tls));
  901. internal_memset(__dfsan_retval_tls, 0, sizeof(__dfsan_retval_tls));
  902. if (dfsan_get_track_origins()) {
  903. internal_memset(__dfsan_arg_origin_tls, 0, sizeof(__dfsan_arg_origin_tls));
  904. internal_memset(&__dfsan_retval_origin_tls, 0,
  905. sizeof(__dfsan_retval_origin_tls));
  906. }
  907. }
  908. SANITIZER_INTERFACE_ATTRIBUTE
  909. void dfsan_set_arg_tls(uptr offset, dfsan_label label) {
  910. // 2x to match ShadowTLSAlignment.
  911. // ShadowTLSAlignment should probably be changed.
  912. // TODO: Consider reducing ShadowTLSAlignment to 1.
  913. // Aligning to 2 bytes is probably a remnant of fast16 mode.
  914. ((dfsan_label *)__dfsan_arg_tls)[offset * 2] = label;
  915. }
  916. SANITIZER_INTERFACE_ATTRIBUTE
  917. void dfsan_set_arg_origin_tls(uptr offset, dfsan_origin o) {
  918. __dfsan_arg_origin_tls[offset] = o;
  919. }
  920. extern "C" void dfsan_flush() {
  921. const uptr maxVirtualAddress = GetMaxUserVirtualAddress();
  922. for (unsigned i = 0; i < kMemoryLayoutSize; ++i) {
  923. uptr start = kMemoryLayout[i].start;
  924. uptr end = kMemoryLayout[i].end;
  925. uptr size = end - start;
  926. MappingDesc::Type type = kMemoryLayout[i].type;
  927. if (type != MappingDesc::SHADOW && type != MappingDesc::ORIGIN)
  928. continue;
  929. // Check if the segment should be mapped based on platform constraints.
  930. if (start >= maxVirtualAddress)
  931. continue;
  932. if (!MmapFixedSuperNoReserve(start, size, kMemoryLayout[i].name)) {
  933. Printf("FATAL: DataFlowSanitizer: failed to clear memory region\n");
  934. Die();
  935. }
  936. }
  937. __dfsan::labels_in_signal_conditional = 0;
  938. __dfsan::labels_in_signal_reaches_function = 0;
  939. }
  940. // TODO: CheckMemoryLayoutSanity is based on msan.
  941. // Consider refactoring these into a shared implementation.
  942. static void CheckMemoryLayoutSanity() {
  943. uptr prev_end = 0;
  944. for (unsigned i = 0; i < kMemoryLayoutSize; ++i) {
  945. uptr start = kMemoryLayout[i].start;
  946. uptr end = kMemoryLayout[i].end;
  947. MappingDesc::Type type = kMemoryLayout[i].type;
  948. CHECK_LT(start, end);
  949. CHECK_EQ(prev_end, start);
  950. CHECK(addr_is_type(start, type));
  951. CHECK(addr_is_type((start + end) / 2, type));
  952. CHECK(addr_is_type(end - 1, type));
  953. if (type == MappingDesc::APP) {
  954. uptr addr = start;
  955. CHECK(MEM_IS_SHADOW(MEM_TO_SHADOW(addr)));
  956. CHECK(MEM_IS_ORIGIN(MEM_TO_ORIGIN(addr)));
  957. CHECK_EQ(MEM_TO_ORIGIN(addr), SHADOW_TO_ORIGIN(MEM_TO_SHADOW(addr)));
  958. addr = (start + end) / 2;
  959. CHECK(MEM_IS_SHADOW(MEM_TO_SHADOW(addr)));
  960. CHECK(MEM_IS_ORIGIN(MEM_TO_ORIGIN(addr)));
  961. CHECK_EQ(MEM_TO_ORIGIN(addr), SHADOW_TO_ORIGIN(MEM_TO_SHADOW(addr)));
  962. addr = end - 1;
  963. CHECK(MEM_IS_SHADOW(MEM_TO_SHADOW(addr)));
  964. CHECK(MEM_IS_ORIGIN(MEM_TO_ORIGIN(addr)));
  965. CHECK_EQ(MEM_TO_ORIGIN(addr), SHADOW_TO_ORIGIN(MEM_TO_SHADOW(addr)));
  966. }
  967. prev_end = end;
  968. }
  969. }
  970. // TODO: CheckMemoryRangeAvailability is based on msan.
  971. // Consider refactoring these into a shared implementation.
  972. static bool CheckMemoryRangeAvailability(uptr beg, uptr size) {
  973. if (size > 0) {
  974. uptr end = beg + size - 1;
  975. if (!MemoryRangeIsAvailable(beg, end)) {
  976. Printf("FATAL: Memory range %p - %p is not available.\n", beg, end);
  977. return false;
  978. }
  979. }
  980. return true;
  981. }
  982. // TODO: ProtectMemoryRange is based on msan.
  983. // Consider refactoring these into a shared implementation.
  984. static bool ProtectMemoryRange(uptr beg, uptr size, const char *name) {
  985. if (size > 0) {
  986. void *addr = MmapFixedNoAccess(beg, size, name);
  987. if (beg == 0 && addr) {
  988. // Depending on the kernel configuration, we may not be able to protect
  989. // the page at address zero.
  990. uptr gap = 16 * GetPageSizeCached();
  991. beg += gap;
  992. size -= gap;
  993. addr = MmapFixedNoAccess(beg, size, name);
  994. }
  995. if ((uptr)addr != beg) {
  996. uptr end = beg + size - 1;
  997. Printf("FATAL: Cannot protect memory range %p - %p (%s).\n", beg, end,
  998. name);
  999. return false;
  1000. }
  1001. }
  1002. return true;
  1003. }
  1004. // TODO: InitShadow is based on msan.
  1005. // Consider refactoring these into a shared implementation.
  1006. bool InitShadow(bool init_origins) {
  1007. // Let user know mapping parameters first.
  1008. VPrintf(1, "dfsan_init %p\n", (void *)&__dfsan::dfsan_init);
  1009. for (unsigned i = 0; i < kMemoryLayoutSize; ++i)
  1010. VPrintf(1, "%s: %zx - %zx\n", kMemoryLayout[i].name, kMemoryLayout[i].start,
  1011. kMemoryLayout[i].end - 1);
  1012. CheckMemoryLayoutSanity();
  1013. if (!MEM_IS_APP(&__dfsan::dfsan_init)) {
  1014. Printf("FATAL: Code %p is out of application range. Non-PIE build?\n",
  1015. (uptr)&__dfsan::dfsan_init);
  1016. return false;
  1017. }
  1018. const uptr maxVirtualAddress = GetMaxUserVirtualAddress();
  1019. for (unsigned i = 0; i < kMemoryLayoutSize; ++i) {
  1020. uptr start = kMemoryLayout[i].start;
  1021. uptr end = kMemoryLayout[i].end;
  1022. uptr size = end - start;
  1023. MappingDesc::Type type = kMemoryLayout[i].type;
  1024. // Check if the segment should be mapped based on platform constraints.
  1025. if (start >= maxVirtualAddress)
  1026. continue;
  1027. bool map = type == MappingDesc::SHADOW ||
  1028. (init_origins && type == MappingDesc::ORIGIN);
  1029. bool protect = type == MappingDesc::INVALID ||
  1030. (!init_origins && type == MappingDesc::ORIGIN);
  1031. CHECK(!(map && protect));
  1032. if (!map && !protect)
  1033. CHECK(type == MappingDesc::APP);
  1034. if (map) {
  1035. if (!CheckMemoryRangeAvailability(start, size))
  1036. return false;
  1037. if (!MmapFixedSuperNoReserve(start, size, kMemoryLayout[i].name))
  1038. return false;
  1039. if (common_flags()->use_madv_dontdump)
  1040. DontDumpShadowMemory(start, size);
  1041. }
  1042. if (protect) {
  1043. if (!CheckMemoryRangeAvailability(start, size))
  1044. return false;
  1045. if (!ProtectMemoryRange(start, size, kMemoryLayout[i].name))
  1046. return false;
  1047. }
  1048. }
  1049. return true;
  1050. }
  1051. static void DFsanInit(int argc, char **argv, char **envp) {
  1052. CHECK(!dfsan_init_is_running);
  1053. if (dfsan_inited)
  1054. return;
  1055. dfsan_init_is_running = true;
  1056. SanitizerToolName = "DataflowSanitizer";
  1057. AvoidCVE_2016_2143();
  1058. InitializeFlags();
  1059. CheckASLR();
  1060. InitShadow(dfsan_get_track_origins());
  1061. initialize_interceptors();
  1062. // Set up threads
  1063. DFsanTSDInit(DFsanTSDDtor);
  1064. dfsan_allocator_init();
  1065. DFsanThread *main_thread = DFsanThread::Create(nullptr, nullptr);
  1066. SetCurrentThread(main_thread);
  1067. main_thread->Init();
  1068. dfsan_init_is_running = false;
  1069. dfsan_inited = true;
  1070. }
  1071. namespace __dfsan {
  1072. void dfsan_init() { DFsanInit(0, nullptr, nullptr); }
  1073. } // namespace __dfsan
  1074. #if SANITIZER_CAN_USE_PREINIT_ARRAY
  1075. __attribute__((section(".preinit_array"),
  1076. used)) static void (*dfsan_init_ptr)(int, char **,
  1077. char **) = DFsanInit;
  1078. #endif