Path: blob/main/contrib/llvm-project/compiler-rt/lib/hwasan/hwasan_checks.h
35236 views
//===-- hwasan_checks.h -----------------------------------------*- C++ -*-===//1//2// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.3// See https://llvm.org/LICENSE.txt for license information.4// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception5//6//===----------------------------------------------------------------------===//7//8// This file is a part of HWAddressSanitizer.9//10//===----------------------------------------------------------------------===//1112#ifndef HWASAN_CHECKS_H13#define HWASAN_CHECKS_H1415#include "hwasan_allocator.h"16#include "hwasan_mapping.h"17#include "hwasan_registers.h"18#include "sanitizer_common/sanitizer_common.h"1920namespace __hwasan {2122enum class ErrorAction { Abort, Recover };23enum class AccessType { Load, Store };2425// Used when the access size is known.26constexpr unsigned SigTrapEncoding(ErrorAction EA, AccessType AT,27unsigned LogSize) {28return 0x20 * (EA == ErrorAction::Recover) +290x10 * (AT == AccessType::Store) + LogSize;30}3132// Used when the access size varies at runtime.33constexpr unsigned SigTrapEncoding(ErrorAction EA, AccessType AT) {34return SigTrapEncoding(EA, AT, 0xf);35}3637template <ErrorAction EA, AccessType AT, size_t LogSize>38__attribute__((always_inline)) static void SigTrap(uptr p) {39// Other platforms like linux can use signals for intercepting an exception40// and dispatching to HandleTagMismatch. The fuchsias implementation doesn't41// use signals so we can call it here directly instead.42#if CAN_GET_REGISTERS && SANITIZER_FUCHSIA43auto regs = GetRegisters();44size_t size = 2 << LogSize;45AccessInfo access_info = {46.addr = p,47.size = size,48.is_store = AT == AccessType::Store,49.is_load = AT == AccessType::Load,50.recover = EA == ErrorAction::Recover,51};52HandleTagMismatch(access_info, (uptr)__builtin_return_address(0),53(uptr)__builtin_frame_address(0), /*uc=*/nullptr, regs.x);54#elif defined(__aarch64__)55(void)p;56// 0x900 is added to do not interfere with the kernel use of lower values of57// brk immediate.58register uptr x0 asm("x0") = p;59asm("brk %1\n\t" ::"r"(x0), "n"(0x900 + SigTrapEncoding(EA, AT, LogSize)));60#elif defined(__x86_64__)61// INT3 + NOP DWORD ptr [EAX + X] to pass X to our signal handler, 5 bytes62// total. The pointer is passed via rdi.63// 0x40 is added as a safeguard, to help distinguish our trap from others and64// to avoid 0 offsets in the command (otherwise it'll be reduced to a65// different nop command, the three bytes one).66asm volatile(67"int3\n"68"nopl %c0(%%rax)\n" ::"n"(0x40 + SigTrapEncoding(EA, AT, LogSize)),69"D"(p));70#elif SANITIZER_RISCV6471// Put pointer into x1072// addiw contains immediate of 0x40 + X, where 0x40 is magic number and X73// encodes access size74register uptr x10 asm("x10") = p;75asm volatile(76"ebreak\n"77"addiw x0, x0, %1\n" ::"r"(x10),78"I"(0x40 + SigTrapEncoding(EA, AT, LogSize)));79#else80// FIXME: not always sigill.81__builtin_trap();82#endif83// __builtin_unreachable();84}8586// Version with access size which is not power of 287template <ErrorAction EA, AccessType AT>88__attribute__((always_inline)) static void SigTrap(uptr p, uptr size) {89// Other platforms like linux can use signals for intercepting an exception90// and dispatching to HandleTagMismatch. The fuchsias implementation doesn't91// use signals so we can call it here directly instead.92#if CAN_GET_REGISTERS && SANITIZER_FUCHSIA93auto regs = GetRegisters();94AccessInfo access_info = {95.addr = p,96.size = size,97.is_store = AT == AccessType::Store,98.is_load = AT == AccessType::Load,99.recover = EA == ErrorAction::Recover,100};101HandleTagMismatch(access_info, (uptr)__builtin_return_address(0),102(uptr)__builtin_frame_address(0), /*uc=*/nullptr, regs.x);103#elif defined(__aarch64__)104register uptr x0 asm("x0") = p;105register uptr x1 asm("x1") = size;106asm("brk %2\n\t" ::"r"(x0), "r"(x1), "n"(0x900 + SigTrapEncoding(EA, AT)));107#elif defined(__x86_64__)108// Size is stored in rsi.109asm volatile(110"int3\n"111"nopl %c0(%%rax)\n" ::"n"(0x40 + SigTrapEncoding(EA, AT)),112"D"(p), "S"(size));113#elif SANITIZER_RISCV64114// Put access size into x11115register uptr x10 asm("x10") = p;116register uptr x11 asm("x11") = size;117asm volatile(118"ebreak\n"119"addiw x0, x0, %2\n" ::"r"(x10),120"r"(x11), "I"(0x40 + SigTrapEncoding(EA, AT)));121#else122__builtin_trap();123#endif124// __builtin_unreachable();125}126127__attribute__((always_inline, nodebug)) static inline uptr ShortTagSize(128tag_t mem_tag, uptr ptr) {129DCHECK(IsAligned(ptr, kShadowAlignment));130tag_t ptr_tag = GetTagFromPointer(ptr);131if (ptr_tag == mem_tag)132return kShadowAlignment;133if (!mem_tag || mem_tag >= kShadowAlignment)134return 0;135if (*(u8 *)(ptr | (kShadowAlignment - 1)) != ptr_tag)136return 0;137return mem_tag;138}139140__attribute__((always_inline, nodebug)) static inline bool141PossiblyShortTagMatches(tag_t mem_tag, uptr ptr, uptr sz) {142tag_t ptr_tag = GetTagFromPointer(ptr);143if (ptr_tag == mem_tag)144return true;145if (mem_tag >= kShadowAlignment)146return false;147if ((ptr & (kShadowAlignment - 1)) + sz > mem_tag)148return false;149return *(u8 *)(ptr | (kShadowAlignment - 1)) == ptr_tag;150}151152template <ErrorAction EA, AccessType AT, unsigned LogSize>153__attribute__((always_inline, nodebug)) static void CheckAddress(uptr p) {154if (!InTaggableRegion(p))155return;156uptr ptr_raw = p & ~kAddressTagMask;157tag_t mem_tag = *(tag_t *)MemToShadow(ptr_raw);158if (UNLIKELY(!PossiblyShortTagMatches(mem_tag, p, 1 << LogSize))) {159SigTrap<EA, AT, LogSize>(p);160if (EA == ErrorAction::Abort)161__builtin_unreachable();162}163}164165template <ErrorAction EA, AccessType AT>166__attribute__((always_inline, nodebug)) static void CheckAddressSized(uptr p,167uptr sz) {168if (sz == 0 || !InTaggableRegion(p))169return;170tag_t ptr_tag = GetTagFromPointer(p);171uptr ptr_raw = p & ~kAddressTagMask;172tag_t *shadow_first = (tag_t *)MemToShadow(ptr_raw);173tag_t *shadow_last = (tag_t *)MemToShadow(ptr_raw + sz);174for (tag_t *t = shadow_first; t < shadow_last; ++t)175if (UNLIKELY(ptr_tag != *t)) {176SigTrap<EA, AT>(p, sz);177if (EA == ErrorAction::Abort)178__builtin_unreachable();179}180uptr end = p + sz;181uptr tail_sz = end & (kShadowAlignment - 1);182if (UNLIKELY(tail_sz != 0 &&183!PossiblyShortTagMatches(184*shadow_last, end & ~(kShadowAlignment - 1), tail_sz))) {185SigTrap<EA, AT>(p, sz);186if (EA == ErrorAction::Abort)187__builtin_unreachable();188}189}190191} // end namespace __hwasan192193#endif // HWASAN_CHECKS_H194195196