|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"go/types"
|
|
|
|
"maps"
|
|
|
|
"slices"
|
|
|
|
|
|
|
|
"golang.org/x/tools/go/ssa"
|
|
|
|
)
|
|
|
|
|
|
|
|
type reflectInspector struct {
|
|
|
|
lpkg *listedPackage
|
|
|
|
pkg *types.Package
|
|
|
|
|
|
|
|
checkedAPIs map[string]bool
|
|
|
|
|
|
|
|
propagatedInstr map[ssa.Instruction]bool
|
propagate "uses reflection" through SSA stores
Up until now, the new SSA reflection detection relied on call sites
to propagate which objects (named types, struct fields) used reflection.
For example, given the code:
json.Marshal(new(T))
we would first record that json.Marshal calls reflect.TypeOf,
and then that the user's code called json.Marshal with the type *T.
However, this would not catch a slight variation on the above:
var t T
reflect.TypeOf(t)
t.foo = struct{bar int}{}
Here, type T's fields such as "foo" and "bar" are not obfuscated,
since our logic sees the call site and marks the type T recursively.
However, the unnamed `struct{bar int}` type was still obfuscated,
causing errors such as:
cannot use struct{uKGvcJvD24 int}{} (value of type struct{uKGvcJvD24 int}) as struct{bar int} value in assignment
The solution is to teach the analysis about *ssa.Store instructions
in a similar way to how it already knows about *ssa.Call instructions.
If we see a store where the destination type is marked for reflection,
then we mark the source type as well, fixing the bug above.
This fixes obfuscating github.com/gogo/protobuf/proto.
A number of other Go modules fail with similar errors,
and they look like very similar bugs,
but this particular fix doesn't apply to them.
Future incremental fixes will try to deal with those extra cases.
Fixes #685.
2 years ago
|
|
|
|
|
|
|
result pkgCache
|
|
|
|
}
|
|
|
|
|
|
|
|
// Record all instances of reflection use, and don't obfuscate types which are used in reflection.
|
|
|
|
func (ri *reflectInspector) recordReflection(ssaPkg *ssa.Package) {
|
|
|
|
if reflectSkipPkg[ssaPkg.Pkg.Path()] {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
obfuscate all names used in reflection
Go code can retrieve and use field and method names via the `reflect` package.
For that reason, historically we did not obfuscate names of fields and methods
underneath types that we detected as used for reflection, via e.g. `reflect.TypeOf`.
However, that caused a number of issues. Since we obfuscate and build one package
at a time, we could only detect when types were used for reflection in their own package
or in upstream packages. Use of reflection in downstream packages would be detected
too late, causing one package to obfuscate the names and the other not to, leading to a build failure.
A different approach is implemented here. All names are obfuscated now, but we collect
those types used for reflection, and at the end of a build in `package main`,
we inject a function into the runtime's `internal/abi` package to reverse the obfuscation
for those names which can be used for reflection.
This does mean that the obfuscation for these names is very weak, as the binary
contains a one-to-one mapping to their original names, but they cannot be obfuscated
without breaking too many Go packages out in the wild. There is also some amount
of overhead in `internal/abi` due to this, but we aim to make the overhead insignificant.
Fixes #884, #799, #817, #881, #858, #843, #842
Closes #406
4 months ago
|
|
|
prevDone := len(ri.result.ReflectAPIs) + len(ri.result.ReflectObjectNames)
|
|
|
|
|
|
|
|
// find all unchecked APIs to add them to checkedAPIs after the pass
|
|
|
|
notCheckedAPIs := make(map[string]bool)
|
|
|
|
for knownAPI := range maps.Keys(ri.result.ReflectAPIs) {
|
|
|
|
if !ri.checkedAPIs[knownAPI] {
|
|
|
|
notCheckedAPIs[knownAPI] = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ri.ignoreReflectedTypes(ssaPkg)
|
|
|
|
|
|
|
|
// all previously unchecked APIs have now been checked add them to checkedAPIs,
|
|
|
|
// to avoid checking them twice
|
|
|
|
maps.Copy(ri.checkedAPIs, notCheckedAPIs)
|
|
|
|
|
|
|
|
// if a new reflectAPI is found we need to Re-evaluate all functions which might be using that API
|
obfuscate all names used in reflection
Go code can retrieve and use field and method names via the `reflect` package.
For that reason, historically we did not obfuscate names of fields and methods
underneath types that we detected as used for reflection, via e.g. `reflect.TypeOf`.
However, that caused a number of issues. Since we obfuscate and build one package
at a time, we could only detect when types were used for reflection in their own package
or in upstream packages. Use of reflection in downstream packages would be detected
too late, causing one package to obfuscate the names and the other not to, leading to a build failure.
A different approach is implemented here. All names are obfuscated now, but we collect
those types used for reflection, and at the end of a build in `package main`,
we inject a function into the runtime's `internal/abi` package to reverse the obfuscation
for those names which can be used for reflection.
This does mean that the obfuscation for these names is very weak, as the binary
contains a one-to-one mapping to their original names, but they cannot be obfuscated
without breaking too many Go packages out in the wild. There is also some amount
of overhead in `internal/abi` due to this, but we aim to make the overhead insignificant.
Fixes #884, #799, #817, #881, #858, #843, #842
Closes #406
4 months ago
|
|
|
newDone := len(ri.result.ReflectAPIs) + len(ri.result.ReflectObjectNames)
|
propagate "uses reflection" through SSA stores
Up until now, the new SSA reflection detection relied on call sites
to propagate which objects (named types, struct fields) used reflection.
For example, given the code:
json.Marshal(new(T))
we would first record that json.Marshal calls reflect.TypeOf,
and then that the user's code called json.Marshal with the type *T.
However, this would not catch a slight variation on the above:
var t T
reflect.TypeOf(t)
t.foo = struct{bar int}{}
Here, type T's fields such as "foo" and "bar" are not obfuscated,
since our logic sees the call site and marks the type T recursively.
However, the unnamed `struct{bar int}` type was still obfuscated,
causing errors such as:
cannot use struct{uKGvcJvD24 int}{} (value of type struct{uKGvcJvD24 int}) as struct{bar int} value in assignment
The solution is to teach the analysis about *ssa.Store instructions
in a similar way to how it already knows about *ssa.Call instructions.
If we see a store where the destination type is marked for reflection,
then we mark the source type as well, fixing the bug above.
This fixes obfuscating github.com/gogo/protobuf/proto.
A number of other Go modules fail with similar errors,
and they look like very similar bugs,
but this particular fix doesn't apply to them.
Future incremental fixes will try to deal with those extra cases.
Fixes #685.
2 years ago
|
|
|
if newDone > prevDone {
|
|
|
|
ri.recordReflection(ssaPkg) // TODO: avoid recursing
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// find all functions, methods and interface declarations of a package and record their
|
|
|
|
// reflection use
|
|
|
|
func (ri *reflectInspector) ignoreReflectedTypes(ssaPkg *ssa.Package) {
|
|
|
|
// Some packages reach into reflect internals, like go-spew.
|
|
|
|
// It's not particularly right of them to do that,
|
|
|
|
// and it's entirely unsupported, but try to accomodate for now.
|
|
|
|
// At least it's enough to leave the rtype and Value types intact.
|
|
|
|
if ri.pkg.Path() == "reflect" {
|
|
|
|
scope := ri.pkg.Scope()
|
|
|
|
ri.recursivelyRecordUsedForReflect(scope.Lookup("rtype").Type())
|
|
|
|
ri.recursivelyRecordUsedForReflect(scope.Lookup("Value").Type())
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, memb := range ssaPkg.Members {
|
|
|
|
switch x := memb.(type) {
|
|
|
|
case *ssa.Type:
|
|
|
|
// methods aren't package members only their reciever types are
|
|
|
|
// so some logic is required to find the methods a type has
|
|
|
|
|
|
|
|
method := func(mset *types.MethodSet) {
|
|
|
|
for i := range mset.Len() {
|
|
|
|
at := mset.At(i)
|
|
|
|
|
|
|
|
if m := ssaPkg.Prog.MethodValue(at); m != nil {
|
|
|
|
ri.checkFunction(m)
|
|
|
|
} else {
|
|
|
|
m := at.Obj().(*types.Func)
|
|
|
|
// handle interface declarations
|
|
|
|
ri.checkInterfaceMethod(m)
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// yes, finding all methods really only works with both calls
|
|
|
|
mset := ssaPkg.Prog.MethodSets.MethodSet(x.Type())
|
|
|
|
method(mset)
|
|
|
|
|
|
|
|
mset = ssaPkg.Prog.MethodSets.MethodSet(types.NewPointer(x.Type()))
|
|
|
|
method(mset)
|
|
|
|
|
|
|
|
case *ssa.Function:
|
|
|
|
// these not only include top level functions, but also synthetic
|
|
|
|
// functions like the initialization of global variables
|
|
|
|
|
|
|
|
ri.checkFunction(x)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Exported methods with unnamed structs as paramters may be "used" in interface declarations
|
|
|
|
// elsewhere, these interfaces will break if any method uses reflection on the same parameter.
|
|
|
|
//
|
|
|
|
// Therefore never obfuscate unnamed structs which are used as a method parameter
|
|
|
|
// and treat them like a parameter which is actually used in reflection.
|
|
|
|
//
|
|
|
|
// See "UnnamedStructMethod" in the reflect.txtar test for an example.
|
|
|
|
func (ri *reflectInspector) checkMethodSignature(reflectParams map[int]bool, sig *types.Signature) {
|
|
|
|
if sig.Recv() == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
params := sig.Params()
|
|
|
|
for i := range params.Len() {
|
|
|
|
if reflectParams[i] {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
ignore := false
|
|
|
|
param := params.At(i)
|
|
|
|
|
|
|
|
switch x := param.Type().(type) {
|
|
|
|
case *types.Struct:
|
|
|
|
ignore = true
|
|
|
|
case *types.Array:
|
|
|
|
if _, ok := x.Elem().(*types.Struct); ok {
|
|
|
|
ignore = true
|
|
|
|
}
|
|
|
|
case *types.Slice:
|
|
|
|
if _, ok := x.Elem().(*types.Struct); ok {
|
|
|
|
ignore = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if ignore {
|
|
|
|
reflectParams[i] = true
|
|
|
|
ri.recursivelyRecordUsedForReflect(param.Type())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Checks the signature of an interface method for potential reflection use.
|
|
|
|
func (ri *reflectInspector) checkInterfaceMethod(m *types.Func) {
|
|
|
|
reflectParams := make(map[int]bool)
|
|
|
|
|
|
|
|
maps.Copy(reflectParams, ri.result.ReflectAPIs[m.FullName()])
|
|
|
|
|
|
|
|
sig := m.Signature()
|
|
|
|
if m.Exported() {
|
|
|
|
ri.checkMethodSignature(reflectParams, sig)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(reflectParams) > 0 {
|
|
|
|
ri.result.ReflectAPIs[m.FullName()] = reflectParams
|
|
|
|
|
|
|
|
/* fmt.Printf("curPkgCache.ReflectAPIs: %v\n", curPkgCache.ReflectAPIs) */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Checks all callsites in a function declaration for use of reflection.
|
|
|
|
func (ri *reflectInspector) checkFunction(fun *ssa.Function) {
|
propagate "uses reflection" through SSA stores
Up until now, the new SSA reflection detection relied on call sites
to propagate which objects (named types, struct fields) used reflection.
For example, given the code:
json.Marshal(new(T))
we would first record that json.Marshal calls reflect.TypeOf,
and then that the user's code called json.Marshal with the type *T.
However, this would not catch a slight variation on the above:
var t T
reflect.TypeOf(t)
t.foo = struct{bar int}{}
Here, type T's fields such as "foo" and "bar" are not obfuscated,
since our logic sees the call site and marks the type T recursively.
However, the unnamed `struct{bar int}` type was still obfuscated,
causing errors such as:
cannot use struct{uKGvcJvD24 int}{} (value of type struct{uKGvcJvD24 int}) as struct{bar int} value in assignment
The solution is to teach the analysis about *ssa.Store instructions
in a similar way to how it already knows about *ssa.Call instructions.
If we see a store where the destination type is marked for reflection,
then we mark the source type as well, fixing the bug above.
This fixes obfuscating github.com/gogo/protobuf/proto.
A number of other Go modules fail with similar errors,
and they look like very similar bugs,
but this particular fix doesn't apply to them.
Future incremental fixes will try to deal with those extra cases.
Fixes #685.
2 years ago
|
|
|
// if fun != nil && fun.Synthetic != "loaded from gc object file" {
|
|
|
|
// // fun.WriteTo crashes otherwise
|
|
|
|
// fun.WriteTo(os.Stdout)
|
|
|
|
// }
|
|
|
|
|
|
|
|
f, _ := fun.Object().(*types.Func)
|
|
|
|
|
|
|
|
reflectParams := make(map[int]bool)
|
|
|
|
if f != nil {
|
|
|
|
maps.Copy(reflectParams, ri.result.ReflectAPIs[f.FullName()])
|
|
|
|
|
|
|
|
if f.Exported() {
|
|
|
|
ri.checkMethodSignature(reflectParams, fun.Signature)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
propagate "uses reflection" through SSA stores
Up until now, the new SSA reflection detection relied on call sites
to propagate which objects (named types, struct fields) used reflection.
For example, given the code:
json.Marshal(new(T))
we would first record that json.Marshal calls reflect.TypeOf,
and then that the user's code called json.Marshal with the type *T.
However, this would not catch a slight variation on the above:
var t T
reflect.TypeOf(t)
t.foo = struct{bar int}{}
Here, type T's fields such as "foo" and "bar" are not obfuscated,
since our logic sees the call site and marks the type T recursively.
However, the unnamed `struct{bar int}` type was still obfuscated,
causing errors such as:
cannot use struct{uKGvcJvD24 int}{} (value of type struct{uKGvcJvD24 int}) as struct{bar int} value in assignment
The solution is to teach the analysis about *ssa.Store instructions
in a similar way to how it already knows about *ssa.Call instructions.
If we see a store where the destination type is marked for reflection,
then we mark the source type as well, fixing the bug above.
This fixes obfuscating github.com/gogo/protobuf/proto.
A number of other Go modules fail with similar errors,
and they look like very similar bugs,
but this particular fix doesn't apply to them.
Future incremental fixes will try to deal with those extra cases.
Fixes #685.
2 years ago
|
|
|
// fmt.Printf("f: %v\n", f)
|
|
|
|
// fmt.Printf("fun: %v\n", fun)
|
|
|
|
|
|
|
|
for _, block := range fun.Blocks {
|
|
|
|
for _, inst := range block.Instrs {
|
|
|
|
if ri.propagatedInstr[inst] {
|
|
|
|
break // already done
|
|
|
|
}
|
|
|
|
|
propagate "uses reflection" through SSA stores
Up until now, the new SSA reflection detection relied on call sites
to propagate which objects (named types, struct fields) used reflection.
For example, given the code:
json.Marshal(new(T))
we would first record that json.Marshal calls reflect.TypeOf,
and then that the user's code called json.Marshal with the type *T.
However, this would not catch a slight variation on the above:
var t T
reflect.TypeOf(t)
t.foo = struct{bar int}{}
Here, type T's fields such as "foo" and "bar" are not obfuscated,
since our logic sees the call site and marks the type T recursively.
However, the unnamed `struct{bar int}` type was still obfuscated,
causing errors such as:
cannot use struct{uKGvcJvD24 int}{} (value of type struct{uKGvcJvD24 int}) as struct{bar int} value in assignment
The solution is to teach the analysis about *ssa.Store instructions
in a similar way to how it already knows about *ssa.Call instructions.
If we see a store where the destination type is marked for reflection,
then we mark the source type as well, fixing the bug above.
This fixes obfuscating github.com/gogo/protobuf/proto.
A number of other Go modules fail with similar errors,
and they look like very similar bugs,
but this particular fix doesn't apply to them.
Future incremental fixes will try to deal with those extra cases.
Fixes #685.
2 years ago
|
|
|
// fmt.Printf("inst: %v, t: %T\n", inst, inst)
|
|
|
|
switch inst := inst.(type) {
|
|
|
|
case *ssa.Store:
|
|
|
|
obj := typeToObj(inst.Addr.Type())
|
|
|
|
if obj != nil && ri.usedForReflect(obj) {
|
propagate "uses reflection" through SSA stores
Up until now, the new SSA reflection detection relied on call sites
to propagate which objects (named types, struct fields) used reflection.
For example, given the code:
json.Marshal(new(T))
we would first record that json.Marshal calls reflect.TypeOf,
and then that the user's code called json.Marshal with the type *T.
However, this would not catch a slight variation on the above:
var t T
reflect.TypeOf(t)
t.foo = struct{bar int}{}
Here, type T's fields such as "foo" and "bar" are not obfuscated,
since our logic sees the call site and marks the type T recursively.
However, the unnamed `struct{bar int}` type was still obfuscated,
causing errors such as:
cannot use struct{uKGvcJvD24 int}{} (value of type struct{uKGvcJvD24 int}) as struct{bar int} value in assignment
The solution is to teach the analysis about *ssa.Store instructions
in a similar way to how it already knows about *ssa.Call instructions.
If we see a store where the destination type is marked for reflection,
then we mark the source type as well, fixing the bug above.
This fixes obfuscating github.com/gogo/protobuf/proto.
A number of other Go modules fail with similar errors,
and they look like very similar bugs,
but this particular fix doesn't apply to them.
Future incremental fixes will try to deal with those extra cases.
Fixes #685.
2 years ago
|
|
|
ri.recordArgReflected(inst.Val, make(map[ssa.Value]bool))
|
|
|
|
ri.propagatedInstr[inst] = true
|
|
|
|
}
|
|
|
|
case *ssa.ChangeType:
|
|
|
|
obj := typeToObj(inst.X.Type())
|
|
|
|
if obj != nil && ri.usedForReflect(obj) {
|
|
|
|
ri.recursivelyRecordUsedForReflect(inst.Type())
|
|
|
|
ri.propagatedInstr[inst] = true
|
propagate "uses reflection" through SSA stores
Up until now, the new SSA reflection detection relied on call sites
to propagate which objects (named types, struct fields) used reflection.
For example, given the code:
json.Marshal(new(T))
we would first record that json.Marshal calls reflect.TypeOf,
and then that the user's code called json.Marshal with the type *T.
However, this would not catch a slight variation on the above:
var t T
reflect.TypeOf(t)
t.foo = struct{bar int}{}
Here, type T's fields such as "foo" and "bar" are not obfuscated,
since our logic sees the call site and marks the type T recursively.
However, the unnamed `struct{bar int}` type was still obfuscated,
causing errors such as:
cannot use struct{uKGvcJvD24 int}{} (value of type struct{uKGvcJvD24 int}) as struct{bar int} value in assignment
The solution is to teach the analysis about *ssa.Store instructions
in a similar way to how it already knows about *ssa.Call instructions.
If we see a store where the destination type is marked for reflection,
then we mark the source type as well, fixing the bug above.
This fixes obfuscating github.com/gogo/protobuf/proto.
A number of other Go modules fail with similar errors,
and they look like very similar bugs,
but this particular fix doesn't apply to them.
Future incremental fixes will try to deal with those extra cases.
Fixes #685.
2 years ago
|
|
|
}
|
|
|
|
case *ssa.Call:
|
|
|
|
callName := inst.Call.Value.String()
|
|
|
|
if m := inst.Call.Method; m != nil {
|
|
|
|
callName = inst.Call.Method.FullName()
|
|
|
|
}
|
|
|
|
|
propagate "uses reflection" through SSA stores
Up until now, the new SSA reflection detection relied on call sites
to propagate which objects (named types, struct fields) used reflection.
For example, given the code:
json.Marshal(new(T))
we would first record that json.Marshal calls reflect.TypeOf,
and then that the user's code called json.Marshal with the type *T.
However, this would not catch a slight variation on the above:
var t T
reflect.TypeOf(t)
t.foo = struct{bar int}{}
Here, type T's fields such as "foo" and "bar" are not obfuscated,
since our logic sees the call site and marks the type T recursively.
However, the unnamed `struct{bar int}` type was still obfuscated,
causing errors such as:
cannot use struct{uKGvcJvD24 int}{} (value of type struct{uKGvcJvD24 int}) as struct{bar int} value in assignment
The solution is to teach the analysis about *ssa.Store instructions
in a similar way to how it already knows about *ssa.Call instructions.
If we see a store where the destination type is marked for reflection,
then we mark the source type as well, fixing the bug above.
This fixes obfuscating github.com/gogo/protobuf/proto.
A number of other Go modules fail with similar errors,
and they look like very similar bugs,
but this particular fix doesn't apply to them.
Future incremental fixes will try to deal with those extra cases.
Fixes #685.
2 years ago
|
|
|
if ri.checkedAPIs[callName] {
|
|
|
|
// only check apis which were not already checked
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
propagate "uses reflection" through SSA stores
Up until now, the new SSA reflection detection relied on call sites
to propagate which objects (named types, struct fields) used reflection.
For example, given the code:
json.Marshal(new(T))
we would first record that json.Marshal calls reflect.TypeOf,
and then that the user's code called json.Marshal with the type *T.
However, this would not catch a slight variation on the above:
var t T
reflect.TypeOf(t)
t.foo = struct{bar int}{}
Here, type T's fields such as "foo" and "bar" are not obfuscated,
since our logic sees the call site and marks the type T recursively.
However, the unnamed `struct{bar int}` type was still obfuscated,
causing errors such as:
cannot use struct{uKGvcJvD24 int}{} (value of type struct{uKGvcJvD24 int}) as struct{bar int} value in assignment
The solution is to teach the analysis about *ssa.Store instructions
in a similar way to how it already knows about *ssa.Call instructions.
If we see a store where the destination type is marked for reflection,
then we mark the source type as well, fixing the bug above.
This fixes obfuscating github.com/gogo/protobuf/proto.
A number of other Go modules fail with similar errors,
and they look like very similar bugs,
but this particular fix doesn't apply to them.
Future incremental fixes will try to deal with those extra cases.
Fixes #685.
2 years ago
|
|
|
/* fmt.Printf("callName: %v\n", callName) */
|
|
|
|
|
propagate "uses reflection" through SSA stores
Up until now, the new SSA reflection detection relied on call sites
to propagate which objects (named types, struct fields) used reflection.
For example, given the code:
json.Marshal(new(T))
we would first record that json.Marshal calls reflect.TypeOf,
and then that the user's code called json.Marshal with the type *T.
However, this would not catch a slight variation on the above:
var t T
reflect.TypeOf(t)
t.foo = struct{bar int}{}
Here, type T's fields such as "foo" and "bar" are not obfuscated,
since our logic sees the call site and marks the type T recursively.
However, the unnamed `struct{bar int}` type was still obfuscated,
causing errors such as:
cannot use struct{uKGvcJvD24 int}{} (value of type struct{uKGvcJvD24 int}) as struct{bar int} value in assignment
The solution is to teach the analysis about *ssa.Store instructions
in a similar way to how it already knows about *ssa.Call instructions.
If we see a store where the destination type is marked for reflection,
then we mark the source type as well, fixing the bug above.
This fixes obfuscating github.com/gogo/protobuf/proto.
A number of other Go modules fail with similar errors,
and they look like very similar bugs,
but this particular fix doesn't apply to them.
Future incremental fixes will try to deal with those extra cases.
Fixes #685.
2 years ago
|
|
|
// record each call argument passed to a function parameter which is used in reflection
|
|
|
|
knownParams := ri.result.ReflectAPIs[callName]
|
|
|
|
for knownParam := range knownParams {
|
|
|
|
if len(inst.Call.Args) <= knownParam {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
propagate "uses reflection" through SSA stores
Up until now, the new SSA reflection detection relied on call sites
to propagate which objects (named types, struct fields) used reflection.
For example, given the code:
json.Marshal(new(T))
we would first record that json.Marshal calls reflect.TypeOf,
and then that the user's code called json.Marshal with the type *T.
However, this would not catch a slight variation on the above:
var t T
reflect.TypeOf(t)
t.foo = struct{bar int}{}
Here, type T's fields such as "foo" and "bar" are not obfuscated,
since our logic sees the call site and marks the type T recursively.
However, the unnamed `struct{bar int}` type was still obfuscated,
causing errors such as:
cannot use struct{uKGvcJvD24 int}{} (value of type struct{uKGvcJvD24 int}) as struct{bar int} value in assignment
The solution is to teach the analysis about *ssa.Store instructions
in a similar way to how it already knows about *ssa.Call instructions.
If we see a store where the destination type is marked for reflection,
then we mark the source type as well, fixing the bug above.
This fixes obfuscating github.com/gogo/protobuf/proto.
A number of other Go modules fail with similar errors,
and they look like very similar bugs,
but this particular fix doesn't apply to them.
Future incremental fixes will try to deal with those extra cases.
Fixes #685.
2 years ago
|
|
|
arg := inst.Call.Args[knownParam]
|
|
|
|
|
propagate "uses reflection" through SSA stores
Up until now, the new SSA reflection detection relied on call sites
to propagate which objects (named types, struct fields) used reflection.
For example, given the code:
json.Marshal(new(T))
we would first record that json.Marshal calls reflect.TypeOf,
and then that the user's code called json.Marshal with the type *T.
However, this would not catch a slight variation on the above:
var t T
reflect.TypeOf(t)
t.foo = struct{bar int}{}
Here, type T's fields such as "foo" and "bar" are not obfuscated,
since our logic sees the call site and marks the type T recursively.
However, the unnamed `struct{bar int}` type was still obfuscated,
causing errors such as:
cannot use struct{uKGvcJvD24 int}{} (value of type struct{uKGvcJvD24 int}) as struct{bar int} value in assignment
The solution is to teach the analysis about *ssa.Store instructions
in a similar way to how it already knows about *ssa.Call instructions.
If we see a store where the destination type is marked for reflection,
then we mark the source type as well, fixing the bug above.
This fixes obfuscating github.com/gogo/protobuf/proto.
A number of other Go modules fail with similar errors,
and they look like very similar bugs,
but this particular fix doesn't apply to them.
Future incremental fixes will try to deal with those extra cases.
Fixes #685.
2 years ago
|
|
|
/* fmt.Printf("flagging arg: %v\n", arg) */
|
|
|
|
|
propagate "uses reflection" through SSA stores
Up until now, the new SSA reflection detection relied on call sites
to propagate which objects (named types, struct fields) used reflection.
For example, given the code:
json.Marshal(new(T))
we would first record that json.Marshal calls reflect.TypeOf,
and then that the user's code called json.Marshal with the type *T.
However, this would not catch a slight variation on the above:
var t T
reflect.TypeOf(t)
t.foo = struct{bar int}{}
Here, type T's fields such as "foo" and "bar" are not obfuscated,
since our logic sees the call site and marks the type T recursively.
However, the unnamed `struct{bar int}` type was still obfuscated,
causing errors such as:
cannot use struct{uKGvcJvD24 int}{} (value of type struct{uKGvcJvD24 int}) as struct{bar int} value in assignment
The solution is to teach the analysis about *ssa.Store instructions
in a similar way to how it already knows about *ssa.Call instructions.
If we see a store where the destination type is marked for reflection,
then we mark the source type as well, fixing the bug above.
This fixes obfuscating github.com/gogo/protobuf/proto.
A number of other Go modules fail with similar errors,
and they look like very similar bugs,
but this particular fix doesn't apply to them.
Future incremental fixes will try to deal with those extra cases.
Fixes #685.
2 years ago
|
|
|
reflectedParam := ri.recordArgReflected(arg, make(map[ssa.Value]bool))
|
|
|
|
if reflectedParam == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
propagate "uses reflection" through SSA stores
Up until now, the new SSA reflection detection relied on call sites
to propagate which objects (named types, struct fields) used reflection.
For example, given the code:
json.Marshal(new(T))
we would first record that json.Marshal calls reflect.TypeOf,
and then that the user's code called json.Marshal with the type *T.
However, this would not catch a slight variation on the above:
var t T
reflect.TypeOf(t)
t.foo = struct{bar int}{}
Here, type T's fields such as "foo" and "bar" are not obfuscated,
since our logic sees the call site and marks the type T recursively.
However, the unnamed `struct{bar int}` type was still obfuscated,
causing errors such as:
cannot use struct{uKGvcJvD24 int}{} (value of type struct{uKGvcJvD24 int}) as struct{bar int} value in assignment
The solution is to teach the analysis about *ssa.Store instructions
in a similar way to how it already knows about *ssa.Call instructions.
If we see a store where the destination type is marked for reflection,
then we mark the source type as well, fixing the bug above.
This fixes obfuscating github.com/gogo/protobuf/proto.
A number of other Go modules fail with similar errors,
and they look like very similar bugs,
but this particular fix doesn't apply to them.
Future incremental fixes will try to deal with those extra cases.
Fixes #685.
2 years ago
|
|
|
pos := slices.Index(fun.Params, reflectedParam)
|
|
|
|
if pos < 0 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
/* fmt.Printf("recorded param: %v func: %v\n", pos, fun) */
|
|
|
|
|
|
|
|
reflectParams[pos] = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(reflectParams) > 0 {
|
|
|
|
ri.result.ReflectAPIs[f.FullName()] = reflectParams
|
|
|
|
|
|
|
|
/* fmt.Printf("curPkgCache.ReflectAPIs: %v\n", curPkgCache.ReflectAPIs) */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// recordArgReflected finds the type(s) of a function argument, which is being used in reflection
|
|
|
|
// and excludes these types from obfuscation
|
|
|
|
// It also checks if this argument has any relation to a function paramter and returns it if found.
|
|
|
|
func (ri *reflectInspector) recordArgReflected(val ssa.Value, visited map[ssa.Value]bool) *ssa.Parameter {
|
|
|
|
// make sure we visit every val only once, otherwise there will be infinite recursion
|
|
|
|
if visited[val] {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
/* fmt.Printf("val: %v %T %v\n", val, val, val.Type()) */
|
|
|
|
visited[val] = true
|
|
|
|
|
|
|
|
switch val := val.(type) {
|
|
|
|
case *ssa.IndexAddr:
|
|
|
|
for _, ref := range *val.Referrers() {
|
|
|
|
if store, ok := ref.(*ssa.Store); ok {
|
|
|
|
ri.recordArgReflected(store.Val, visited)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ri.recordArgReflected(val.X, visited)
|
|
|
|
case *ssa.Slice:
|
|
|
|
return ri.recordArgReflected(val.X, visited)
|
|
|
|
case *ssa.MakeInterface:
|
|
|
|
return ri.recordArgReflected(val.X, visited)
|
|
|
|
case *ssa.UnOp:
|
|
|
|
for _, ref := range *val.Referrers() {
|
|
|
|
if idx, ok := ref.(ssa.Value); ok {
|
|
|
|
ri.recordArgReflected(idx, visited)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ri.recordArgReflected(val.X, visited)
|
|
|
|
case *ssa.FieldAddr:
|
|
|
|
return ri.recordArgReflected(val.X, visited)
|
|
|
|
|
|
|
|
case *ssa.Alloc:
|
|
|
|
/* fmt.Printf("recording val %v \n", *val.Referrers()) */
|
|
|
|
ri.recursivelyRecordUsedForReflect(val.Type())
|
|
|
|
|
|
|
|
for _, ref := range *val.Referrers() {
|
|
|
|
if idx, ok := ref.(ssa.Value); ok {
|
|
|
|
ri.recordArgReflected(idx, visited)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// relatedParam needs to revisit nodes so create an empty map
|
|
|
|
visited := make(map[ssa.Value]bool)
|
|
|
|
|
|
|
|
// check if the found alloc gets tainted by function parameters
|
|
|
|
return relatedParam(val, visited)
|
|
|
|
|
|
|
|
case *ssa.ChangeType:
|
|
|
|
ri.recursivelyRecordUsedForReflect(val.X.Type())
|
|
|
|
case *ssa.MakeSlice, *ssa.MakeMap, *ssa.MakeChan, *ssa.Const:
|
|
|
|
ri.recursivelyRecordUsedForReflect(val.Type())
|
|
|
|
case *ssa.Global:
|
|
|
|
ri.recursivelyRecordUsedForReflect(val.Type())
|
|
|
|
|
|
|
|
// TODO: this might need similar logic to *ssa.Alloc, however
|
|
|
|
// reassigning a function param to a global variable and then reflecting
|
|
|
|
// it is probably unlikely to occur
|
|
|
|
case *ssa.Parameter:
|
|
|
|
// this only finds the parameters who want to be found,
|
|
|
|
// otherwise relatedParam is used for more in depth analysis
|
|
|
|
|
|
|
|
ri.recursivelyRecordUsedForReflect(val.Type())
|
|
|
|
return val
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// relatedParam checks if a route to a function paramter can be constructed
|
|
|
|
// from a ssa.Value, and returns the paramter if it found one.
|
|
|
|
func relatedParam(val ssa.Value, visited map[ssa.Value]bool) *ssa.Parameter {
|
|
|
|
// every val should only be visited once to prevent infinite recursion
|
|
|
|
if visited[val] {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
/* fmt.Printf("related val: %v %T %v\n", val, val, val.Type()) */
|
|
|
|
|
|
|
|
visited[val] = true
|
|
|
|
|
|
|
|
switch x := val.(type) {
|
|
|
|
case *ssa.Parameter:
|
|
|
|
// a paramter has been found
|
|
|
|
return x
|
|
|
|
case *ssa.UnOp:
|
|
|
|
if param := relatedParam(x.X, visited); param != nil {
|
|
|
|
return param
|
|
|
|
}
|
|
|
|
case *ssa.FieldAddr:
|
|
|
|
/* fmt.Printf("addr: %v\n", x)
|
|
|
|
fmt.Printf("addr.X: %v %T\n", x.X, x.X) */
|
|
|
|
|
|
|
|
if param := relatedParam(x.X, visited); param != nil {
|
|
|
|
return param
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
refs := val.Referrers()
|
|
|
|
if refs == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, ref := range *refs {
|
|
|
|
/* fmt.Printf("ref: %v %T\n", ref, ref) */
|
|
|
|
|
|
|
|
var param *ssa.Parameter
|
|
|
|
switch ref := ref.(type) {
|
|
|
|
case *ssa.FieldAddr:
|
|
|
|
param = relatedParam(ref, visited)
|
|
|
|
|
|
|
|
case *ssa.UnOp:
|
|
|
|
param = relatedParam(ref, visited)
|
|
|
|
|
|
|
|
case *ssa.Store:
|
|
|
|
if param := relatedParam(ref.Val, visited); param != nil {
|
|
|
|
return param
|
|
|
|
}
|
|
|
|
|
|
|
|
param = relatedParam(ref.Addr, visited)
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
if param != nil {
|
|
|
|
return param
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// recursivelyRecordUsedForReflect calls recordUsedForReflect on any named
|
|
|
|
// types and fields under typ.
|
|
|
|
//
|
|
|
|
// Only the names declared in the current package are recorded. This is to ensure
|
|
|
|
// that reflection detection only happens within the package declaring a type.
|
|
|
|
// Detecting it in downstream packages could result in inconsistencies.
|
|
|
|
func (ri *reflectInspector) recursivelyRecordUsedForReflect(t types.Type) {
|
|
|
|
switch t := t.(type) {
|
|
|
|
case *types.Named:
|
|
|
|
obj := t.Obj()
|
|
|
|
if obj.Pkg() == nil || obj.Pkg() != ri.pkg {
|
|
|
|
return // not from the specified package
|
|
|
|
}
|
|
|
|
if ri.usedForReflect(obj) {
|
|
|
|
return // prevent endless recursion
|
|
|
|
}
|
|
|
|
ri.recordUsedForReflect(obj, nil)
|
|
|
|
|
|
|
|
// Record the underlying type, too.
|
|
|
|
ri.recursivelyRecordUsedForReflect(t.Underlying())
|
|
|
|
|
|
|
|
case *types.Struct:
|
|
|
|
for i := range t.NumFields() {
|
|
|
|
field := t.Field(i)
|
|
|
|
|
|
|
|
// This check is similar to the one in *types.Named.
|
|
|
|
// It's necessary for unnamed struct types,
|
|
|
|
// as they aren't named but still have named fields.
|
|
|
|
if field.Pkg() == nil || field.Pkg() != ri.pkg {
|
|
|
|
return // not from the specified package
|
|
|
|
}
|
|
|
|
|
|
|
|
// Record the field itself, too.
|
obfuscate all names used in reflection
Go code can retrieve and use field and method names via the `reflect` package.
For that reason, historically we did not obfuscate names of fields and methods
underneath types that we detected as used for reflection, via e.g. `reflect.TypeOf`.
However, that caused a number of issues. Since we obfuscate and build one package
at a time, we could only detect when types were used for reflection in their own package
or in upstream packages. Use of reflection in downstream packages would be detected
too late, causing one package to obfuscate the names and the other not to, leading to a build failure.
A different approach is implemented here. All names are obfuscated now, but we collect
those types used for reflection, and at the end of a build in `package main`,
we inject a function into the runtime's `internal/abi` package to reverse the obfuscation
for those names which can be used for reflection.
This does mean that the obfuscation for these names is very weak, as the binary
contains a one-to-one mapping to their original names, but they cannot be obfuscated
without breaking too many Go packages out in the wild. There is also some amount
of overhead in `internal/abi` due to this, but we aim to make the overhead insignificant.
Fixes #884, #799, #817, #881, #858, #843, #842
Closes #406
4 months ago
|
|
|
ri.recordUsedForReflect(field, t)
|
|
|
|
|
|
|
|
ri.recursivelyRecordUsedForReflect(field.Type())
|
|
|
|
}
|
|
|
|
|
|
|
|
case interface{ Elem() types.Type }:
|
|
|
|
// Get past pointers, slices, etc.
|
|
|
|
ri.recursivelyRecordUsedForReflect(t.Elem())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// obfuscatedObjectName returns the obfucated name of a types.Object,
|
obfuscate all names used in reflection
Go code can retrieve and use field and method names via the `reflect` package.
For that reason, historically we did not obfuscate names of fields and methods
underneath types that we detected as used for reflection, via e.g. `reflect.TypeOf`.
However, that caused a number of issues. Since we obfuscate and build one package
at a time, we could only detect when types were used for reflection in their own package
or in upstream packages. Use of reflection in downstream packages would be detected
too late, causing one package to obfuscate the names and the other not to, leading to a build failure.
A different approach is implemented here. All names are obfuscated now, but we collect
those types used for reflection, and at the end of a build in `package main`,
we inject a function into the runtime's `internal/abi` package to reverse the obfuscation
for those names which can be used for reflection.
This does mean that the obfuscation for these names is very weak, as the binary
contains a one-to-one mapping to their original names, but they cannot be obfuscated
without breaking too many Go packages out in the wild. There is also some amount
of overhead in `internal/abi` due to this, but we aim to make the overhead insignificant.
Fixes #884, #799, #817, #881, #858, #843, #842
Closes #406
4 months ago
|
|
|
// parent is needed to correctly get the obfucated name of struct fields
|
|
|
|
func (ri *reflectInspector) obfuscatedObjectName(obj types.Object, parent *types.Struct) string {
|
obfuscate all names used in reflection
Go code can retrieve and use field and method names via the `reflect` package.
For that reason, historically we did not obfuscate names of fields and methods
underneath types that we detected as used for reflection, via e.g. `reflect.TypeOf`.
However, that caused a number of issues. Since we obfuscate and build one package
at a time, we could only detect when types were used for reflection in their own package
or in upstream packages. Use of reflection in downstream packages would be detected
too late, causing one package to obfuscate the names and the other not to, leading to a build failure.
A different approach is implemented here. All names are obfuscated now, but we collect
those types used for reflection, and at the end of a build in `package main`,
we inject a function into the runtime's `internal/abi` package to reverse the obfuscation
for those names which can be used for reflection.
This does mean that the obfuscation for these names is very weak, as the binary
contains a one-to-one mapping to their original names, but they cannot be obfuscated
without breaking too many Go packages out in the wild. There is also some amount
of overhead in `internal/abi` due to this, but we aim to make the overhead insignificant.
Fixes #884, #799, #817, #881, #858, #843, #842
Closes #406
4 months ago
|
|
|
pkg := obj.Pkg()
|
|
|
|
if pkg == nil {
|
|
|
|
return "" // builtin types are never obfuscated
|
obfuscate all names used in reflection
Go code can retrieve and use field and method names via the `reflect` package.
For that reason, historically we did not obfuscate names of fields and methods
underneath types that we detected as used for reflection, via e.g. `reflect.TypeOf`.
However, that caused a number of issues. Since we obfuscate and build one package
at a time, we could only detect when types were used for reflection in their own package
or in upstream packages. Use of reflection in downstream packages would be detected
too late, causing one package to obfuscate the names and the other not to, leading to a build failure.
A different approach is implemented here. All names are obfuscated now, but we collect
those types used for reflection, and at the end of a build in `package main`,
we inject a function into the runtime's `internal/abi` package to reverse the obfuscation
for those names which can be used for reflection.
This does mean that the obfuscation for these names is very weak, as the binary
contains a one-to-one mapping to their original names, but they cannot be obfuscated
without breaking too many Go packages out in the wild. There is also some amount
of overhead in `internal/abi` due to this, but we aim to make the overhead insignificant.
Fixes #884, #799, #817, #881, #858, #843, #842
Closes #406
4 months ago
|
|
|
}
|
|
|
|
|
|
|
|
if v, ok := obj.(*types.Var); ok && parent != nil {
|
|
|
|
return hashWithStruct(parent, v)
|
|
|
|
}
|
|
|
|
|
|
|
|
return hashWithPackage(ri.lpkg, obj.Name())
|
obfuscate all names used in reflection
Go code can retrieve and use field and method names via the `reflect` package.
For that reason, historically we did not obfuscate names of fields and methods
underneath types that we detected as used for reflection, via e.g. `reflect.TypeOf`.
However, that caused a number of issues. Since we obfuscate and build one package
at a time, we could only detect when types were used for reflection in their own package
or in upstream packages. Use of reflection in downstream packages would be detected
too late, causing one package to obfuscate the names and the other not to, leading to a build failure.
A different approach is implemented here. All names are obfuscated now, but we collect
those types used for reflection, and at the end of a build in `package main`,
we inject a function into the runtime's `internal/abi` package to reverse the obfuscation
for those names which can be used for reflection.
This does mean that the obfuscation for these names is very weak, as the binary
contains a one-to-one mapping to their original names, but they cannot be obfuscated
without breaking too many Go packages out in the wild. There is also some amount
of overhead in `internal/abi` due to this, but we aim to make the overhead insignificant.
Fixes #884, #799, #817, #881, #858, #843, #842
Closes #406
4 months ago
|
|
|
}
|
|
|
|
|
|
|
|
// recordUsedForReflect records the objects whose names we cannot obfuscate due to reflection.
|
|
|
|
// We currently record named types and fields.
|
obfuscate all names used in reflection
Go code can retrieve and use field and method names via the `reflect` package.
For that reason, historically we did not obfuscate names of fields and methods
underneath types that we detected as used for reflection, via e.g. `reflect.TypeOf`.
However, that caused a number of issues. Since we obfuscate and build one package
at a time, we could only detect when types were used for reflection in their own package
or in upstream packages. Use of reflection in downstream packages would be detected
too late, causing one package to obfuscate the names and the other not to, leading to a build failure.
A different approach is implemented here. All names are obfuscated now, but we collect
those types used for reflection, and at the end of a build in `package main`,
we inject a function into the runtime's `internal/abi` package to reverse the obfuscation
for those names which can be used for reflection.
This does mean that the obfuscation for these names is very weak, as the binary
contains a one-to-one mapping to their original names, but they cannot be obfuscated
without breaking too many Go packages out in the wild. There is also some amount
of overhead in `internal/abi` due to this, but we aim to make the overhead insignificant.
Fixes #884, #799, #817, #881, #858, #843, #842
Closes #406
4 months ago
|
|
|
func (ri *reflectInspector) recordUsedForReflect(obj types.Object, parent *types.Struct) {
|
|
|
|
if obj.Pkg() != ri.pkg {
|
|
|
|
panic("called recordUsedForReflect with a foreign object")
|
|
|
|
}
|
|
|
|
obfName := ri.obfuscatedObjectName(obj, parent)
|
|
|
|
if obfName == "" {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
ri.result.ReflectObjectNames[obfName] = obj.Name()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ri *reflectInspector) usedForReflect(obj types.Object) bool {
|
|
|
|
obfName := ri.obfuscatedObjectName(obj, nil)
|
|
|
|
if obfName == "" {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
// TODO: Note that this does an object lookup by obfuscated name.
|
|
|
|
// We should probably use unique object identifiers or strings,
|
|
|
|
// such as go/types/objectpath.
|
|
|
|
_, ok := ri.result.ReflectObjectNames[obfName]
|
|
|
|
return ok
|
|
|
|
}
|
propagate "uses reflection" through SSA stores
Up until now, the new SSA reflection detection relied on call sites
to propagate which objects (named types, struct fields) used reflection.
For example, given the code:
json.Marshal(new(T))
we would first record that json.Marshal calls reflect.TypeOf,
and then that the user's code called json.Marshal with the type *T.
However, this would not catch a slight variation on the above:
var t T
reflect.TypeOf(t)
t.foo = struct{bar int}{}
Here, type T's fields such as "foo" and "bar" are not obfuscated,
since our logic sees the call site and marks the type T recursively.
However, the unnamed `struct{bar int}` type was still obfuscated,
causing errors such as:
cannot use struct{uKGvcJvD24 int}{} (value of type struct{uKGvcJvD24 int}) as struct{bar int} value in assignment
The solution is to teach the analysis about *ssa.Store instructions
in a similar way to how it already knows about *ssa.Call instructions.
If we see a store where the destination type is marked for reflection,
then we mark the source type as well, fixing the bug above.
This fixes obfuscating github.com/gogo/protobuf/proto.
A number of other Go modules fail with similar errors,
and they look like very similar bugs,
but this particular fix doesn't apply to them.
Future incremental fixes will try to deal with those extra cases.
Fixes #685.
2 years ago
|
|
|
|
|
|
|
// We only mark named objects, so this function looks for a named object
|
|
|
|
// corresponding to a type.
|
|
|
|
func typeToObj(typ types.Type) types.Object {
|
|
|
|
switch t := typ.(type) {
|
|
|
|
case *types.Named:
|
|
|
|
return t.Obj()
|
propagate "uses reflection" through SSA stores
Up until now, the new SSA reflection detection relied on call sites
to propagate which objects (named types, struct fields) used reflection.
For example, given the code:
json.Marshal(new(T))
we would first record that json.Marshal calls reflect.TypeOf,
and then that the user's code called json.Marshal with the type *T.
However, this would not catch a slight variation on the above:
var t T
reflect.TypeOf(t)
t.foo = struct{bar int}{}
Here, type T's fields such as "foo" and "bar" are not obfuscated,
since our logic sees the call site and marks the type T recursively.
However, the unnamed `struct{bar int}` type was still obfuscated,
causing errors such as:
cannot use struct{uKGvcJvD24 int}{} (value of type struct{uKGvcJvD24 int}) as struct{bar int} value in assignment
The solution is to teach the analysis about *ssa.Store instructions
in a similar way to how it already knows about *ssa.Call instructions.
If we see a store where the destination type is marked for reflection,
then we mark the source type as well, fixing the bug above.
This fixes obfuscating github.com/gogo/protobuf/proto.
A number of other Go modules fail with similar errors,
and they look like very similar bugs,
but this particular fix doesn't apply to them.
Future incremental fixes will try to deal with those extra cases.
Fixes #685.
2 years ago
|
|
|
case *types.Struct:
|
|
|
|
if t.NumFields() > 0 {
|
|
|
|
return t.Field(0)
|
propagate "uses reflection" through SSA stores
Up until now, the new SSA reflection detection relied on call sites
to propagate which objects (named types, struct fields) used reflection.
For example, given the code:
json.Marshal(new(T))
we would first record that json.Marshal calls reflect.TypeOf,
and then that the user's code called json.Marshal with the type *T.
However, this would not catch a slight variation on the above:
var t T
reflect.TypeOf(t)
t.foo = struct{bar int}{}
Here, type T's fields such as "foo" and "bar" are not obfuscated,
since our logic sees the call site and marks the type T recursively.
However, the unnamed `struct{bar int}` type was still obfuscated,
causing errors such as:
cannot use struct{uKGvcJvD24 int}{} (value of type struct{uKGvcJvD24 int}) as struct{bar int} value in assignment
The solution is to teach the analysis about *ssa.Store instructions
in a similar way to how it already knows about *ssa.Call instructions.
If we see a store where the destination type is marked for reflection,
then we mark the source type as well, fixing the bug above.
This fixes obfuscating github.com/gogo/protobuf/proto.
A number of other Go modules fail with similar errors,
and they look like very similar bugs,
but this particular fix doesn't apply to them.
Future incremental fixes will try to deal with those extra cases.
Fixes #685.
2 years ago
|
|
|
}
|
|
|
|
case interface{ Elem() types.Type }:
|
|
|
|
return typeToObj(t.Elem())
|
propagate "uses reflection" through SSA stores
Up until now, the new SSA reflection detection relied on call sites
to propagate which objects (named types, struct fields) used reflection.
For example, given the code:
json.Marshal(new(T))
we would first record that json.Marshal calls reflect.TypeOf,
and then that the user's code called json.Marshal with the type *T.
However, this would not catch a slight variation on the above:
var t T
reflect.TypeOf(t)
t.foo = struct{bar int}{}
Here, type T's fields such as "foo" and "bar" are not obfuscated,
since our logic sees the call site and marks the type T recursively.
However, the unnamed `struct{bar int}` type was still obfuscated,
causing errors such as:
cannot use struct{uKGvcJvD24 int}{} (value of type struct{uKGvcJvD24 int}) as struct{bar int} value in assignment
The solution is to teach the analysis about *ssa.Store instructions
in a similar way to how it already knows about *ssa.Call instructions.
If we see a store where the destination type is marked for reflection,
then we mark the source type as well, fixing the bug above.
This fixes obfuscating github.com/gogo/protobuf/proto.
A number of other Go modules fail with similar errors,
and they look like very similar bugs,
but this particular fix doesn't apply to them.
Future incremental fixes will try to deal with those extra cases.
Fixes #685.
2 years ago
|
|
|
}
|
|
|
|
return nil
|
propagate "uses reflection" through SSA stores
Up until now, the new SSA reflection detection relied on call sites
to propagate which objects (named types, struct fields) used reflection.
For example, given the code:
json.Marshal(new(T))
we would first record that json.Marshal calls reflect.TypeOf,
and then that the user's code called json.Marshal with the type *T.
However, this would not catch a slight variation on the above:
var t T
reflect.TypeOf(t)
t.foo = struct{bar int}{}
Here, type T's fields such as "foo" and "bar" are not obfuscated,
since our logic sees the call site and marks the type T recursively.
However, the unnamed `struct{bar int}` type was still obfuscated,
causing errors such as:
cannot use struct{uKGvcJvD24 int}{} (value of type struct{uKGvcJvD24 int}) as struct{bar int} value in assignment
The solution is to teach the analysis about *ssa.Store instructions
in a similar way to how it already knows about *ssa.Call instructions.
If we see a store where the destination type is marked for reflection,
then we mark the source type as well, fixing the bug above.
This fixes obfuscating github.com/gogo/protobuf/proto.
A number of other Go modules fail with similar errors,
and they look like very similar bugs,
but this particular fix doesn't apply to them.
Future incremental fixes will try to deal with those extra cases.
Fixes #685.
2 years ago
|
|
|
}
|