xref: /openbsd-src/gnu/llvm/compiler-rt/lib/hwasan/hwasan_dynamic_shadow.cpp (revision d89ec533011f513df1010f142a111086a0785f09)
13cab2bb3Spatrick //===-- hwasan_dynamic_shadow.cpp -------------------------------*- C++ -*-===//
23cab2bb3Spatrick //
33cab2bb3Spatrick // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
43cab2bb3Spatrick // See https://llvm.org/LICENSE.txt for license information.
53cab2bb3Spatrick // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
63cab2bb3Spatrick //
73cab2bb3Spatrick //===----------------------------------------------------------------------===//
83cab2bb3Spatrick ///
93cab2bb3Spatrick /// \file
103cab2bb3Spatrick /// This file is a part of HWAddressSanitizer. It reserves dynamic shadow memory
113cab2bb3Spatrick /// region and handles ifunc resolver case, when necessary.
123cab2bb3Spatrick ///
133cab2bb3Spatrick //===----------------------------------------------------------------------===//
143cab2bb3Spatrick 
153cab2bb3Spatrick #include "hwasan_dynamic_shadow.h"
163cab2bb3Spatrick 
173cab2bb3Spatrick #include <elf.h>
183cab2bb3Spatrick #include <link.h>
193cab2bb3Spatrick 
20*d89ec533Spatrick #include "hwasan.h"
21*d89ec533Spatrick #include "hwasan_mapping.h"
22*d89ec533Spatrick #include "hwasan_thread_list.h"
23*d89ec533Spatrick #include "sanitizer_common/sanitizer_common.h"
24*d89ec533Spatrick #include "sanitizer_common/sanitizer_posix.h"
25*d89ec533Spatrick 
263cab2bb3Spatrick // The code in this file needs to run in an unrelocated binary. It should not
273cab2bb3Spatrick // access any external symbol, including its own non-hidden globals.
283cab2bb3Spatrick 
293cab2bb3Spatrick #if SANITIZER_ANDROID
303cab2bb3Spatrick extern "C" {
313cab2bb3Spatrick 
323cab2bb3Spatrick INTERFACE_ATTRIBUTE void __hwasan_shadow();
333cab2bb3Spatrick decltype(__hwasan_shadow)* __hwasan_premap_shadow();
343cab2bb3Spatrick 
353cab2bb3Spatrick }  // extern "C"
363cab2bb3Spatrick 
373cab2bb3Spatrick namespace __hwasan {
383cab2bb3Spatrick 
393cab2bb3Spatrick // Conservative upper limit.
PremapShadowSize()403cab2bb3Spatrick static uptr PremapShadowSize() {
413cab2bb3Spatrick   return RoundUpTo(GetMaxVirtualAddress() >> kShadowScale,
423cab2bb3Spatrick                    GetMmapGranularity());
433cab2bb3Spatrick }
443cab2bb3Spatrick 
PremapShadow()453cab2bb3Spatrick static uptr PremapShadow() {
46*d89ec533Spatrick   return MapDynamicShadow(PremapShadowSize(), kShadowScale,
47*d89ec533Spatrick                           kShadowBaseAlignment, kHighMemEnd);
483cab2bb3Spatrick }
493cab2bb3Spatrick 
IsPremapShadowAvailable()503cab2bb3Spatrick static bool IsPremapShadowAvailable() {
513cab2bb3Spatrick   const uptr shadow = reinterpret_cast<uptr>(&__hwasan_shadow);
523cab2bb3Spatrick   const uptr resolver = reinterpret_cast<uptr>(&__hwasan_premap_shadow);
533cab2bb3Spatrick   // shadow == resolver is how Android KitKat and older handles ifunc.
543cab2bb3Spatrick   // shadow == 0 just in case.
553cab2bb3Spatrick   return shadow != 0 && shadow != resolver;
563cab2bb3Spatrick }
573cab2bb3Spatrick 
FindPremappedShadowStart(uptr shadow_size_bytes)583cab2bb3Spatrick static uptr FindPremappedShadowStart(uptr shadow_size_bytes) {
593cab2bb3Spatrick   const uptr granularity = GetMmapGranularity();
603cab2bb3Spatrick   const uptr shadow_start = reinterpret_cast<uptr>(&__hwasan_shadow);
613cab2bb3Spatrick   const uptr premap_shadow_size = PremapShadowSize();
623cab2bb3Spatrick   const uptr shadow_size = RoundUpTo(shadow_size_bytes, granularity);
633cab2bb3Spatrick 
643cab2bb3Spatrick   // We may have mapped too much. Release extra memory.
653cab2bb3Spatrick   UnmapFromTo(shadow_start + shadow_size, shadow_start + premap_shadow_size);
663cab2bb3Spatrick   return shadow_start;
673cab2bb3Spatrick }
683cab2bb3Spatrick 
693cab2bb3Spatrick }  // namespace __hwasan
703cab2bb3Spatrick 
713cab2bb3Spatrick extern "C" {
723cab2bb3Spatrick 
__hwasan_premap_shadow()733cab2bb3Spatrick decltype(__hwasan_shadow)* __hwasan_premap_shadow() {
743cab2bb3Spatrick   // The resolver might be called multiple times. Map the shadow just once.
753cab2bb3Spatrick   static __sanitizer::uptr shadow = 0;
763cab2bb3Spatrick   if (!shadow)
773cab2bb3Spatrick     shadow = __hwasan::PremapShadow();
783cab2bb3Spatrick   return reinterpret_cast<decltype(__hwasan_shadow)*>(shadow);
793cab2bb3Spatrick }
803cab2bb3Spatrick 
813cab2bb3Spatrick // __hwasan_shadow is a "function" that has the same address as the first byte
823cab2bb3Spatrick // of the shadow mapping.
833cab2bb3Spatrick INTERFACE_ATTRIBUTE __attribute__((ifunc("__hwasan_premap_shadow")))
843cab2bb3Spatrick void __hwasan_shadow();
853cab2bb3Spatrick 
863cab2bb3Spatrick extern __attribute((weak, visibility("hidden"))) ElfW(Rela) __rela_iplt_start[],
873cab2bb3Spatrick     __rela_iplt_end[];
883cab2bb3Spatrick 
893cab2bb3Spatrick }  // extern "C"
903cab2bb3Spatrick 
913cab2bb3Spatrick namespace __hwasan {
923cab2bb3Spatrick 
InitShadowGOT()933cab2bb3Spatrick void InitShadowGOT() {
943cab2bb3Spatrick   // Call the ifunc resolver for __hwasan_shadow and fill in its GOT entry. This
953cab2bb3Spatrick   // needs to be done before other ifunc resolvers (which are handled by libc)
963cab2bb3Spatrick   // because a resolver might read __hwasan_shadow.
973cab2bb3Spatrick   typedef ElfW(Addr) (*ifunc_resolver_t)(void);
983cab2bb3Spatrick   for (ElfW(Rela) *r = __rela_iplt_start; r != __rela_iplt_end; ++r) {
993cab2bb3Spatrick     ElfW(Addr)* offset = reinterpret_cast<ElfW(Addr)*>(r->r_offset);
1003cab2bb3Spatrick     ElfW(Addr) resolver = r->r_addend;
1013cab2bb3Spatrick     if (resolver == reinterpret_cast<ElfW(Addr)>(&__hwasan_premap_shadow)) {
1023cab2bb3Spatrick       *offset = reinterpret_cast<ifunc_resolver_t>(resolver)();
1033cab2bb3Spatrick       break;
1043cab2bb3Spatrick     }
1053cab2bb3Spatrick   }
1063cab2bb3Spatrick }
1073cab2bb3Spatrick 
FindDynamicShadowStart(uptr shadow_size_bytes)1083cab2bb3Spatrick uptr FindDynamicShadowStart(uptr shadow_size_bytes) {
1093cab2bb3Spatrick   if (IsPremapShadowAvailable())
1103cab2bb3Spatrick     return FindPremappedShadowStart(shadow_size_bytes);
111*d89ec533Spatrick   return MapDynamicShadow(shadow_size_bytes, kShadowScale, kShadowBaseAlignment,
112*d89ec533Spatrick                           kHighMemEnd);
1133cab2bb3Spatrick }
1143cab2bb3Spatrick 
1153cab2bb3Spatrick }  // namespace __hwasan
116*d89ec533Spatrick 
117*d89ec533Spatrick #elif SANITIZER_FUCHSIA
118*d89ec533Spatrick 
119*d89ec533Spatrick namespace __hwasan {
120*d89ec533Spatrick 
InitShadowGOT()121*d89ec533Spatrick void InitShadowGOT() {}
122*d89ec533Spatrick 
123*d89ec533Spatrick }  // namespace __hwasan
124*d89ec533Spatrick 
1253cab2bb3Spatrick #else
1263cab2bb3Spatrick namespace __hwasan {
1273cab2bb3Spatrick 
InitShadowGOT()1283cab2bb3Spatrick void InitShadowGOT() {}
1293cab2bb3Spatrick 
FindDynamicShadowStart(uptr shadow_size_bytes)1303cab2bb3Spatrick uptr FindDynamicShadowStart(uptr shadow_size_bytes) {
131*d89ec533Spatrick #  if defined(HWASAN_ALIASING_MODE)
132*d89ec533Spatrick   constexpr uptr kAliasSize = 1ULL << kAddressTagShift;
133*d89ec533Spatrick   constexpr uptr kNumAliases = 1ULL << kTagBits;
134*d89ec533Spatrick   return MapDynamicShadowAndAliases(shadow_size_bytes, kAliasSize, kNumAliases,
135*d89ec533Spatrick                                     RingBufferSize());
136*d89ec533Spatrick #  endif
137*d89ec533Spatrick   return MapDynamicShadow(shadow_size_bytes, kShadowScale, kShadowBaseAlignment,
138*d89ec533Spatrick                           kHighMemEnd);
1393cab2bb3Spatrick }
1403cab2bb3Spatrick 
1413cab2bb3Spatrick }  // namespace __hwasan
1423cab2bb3Spatrick 
1433cab2bb3Spatrick #endif  // SANITIZER_ANDROID
144