| 1 | //===-- asan_poisoning.h ----------------------------------------*- C++ -*-===// |
| 2 | // |
| 3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
| 4 | // See https://llvm.org/LICENSE.txt for license information. |
| 5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
| 6 | // |
| 7 | //===----------------------------------------------------------------------===// |
| 8 | // |
| 9 | // This file is a part of AddressSanitizer, an address sanity checker. |
| 10 | // |
| 11 | // Shadow memory poisoning by ASan RTL and by user application. |
| 12 | //===----------------------------------------------------------------------===// |
| 13 | |
| 14 | #ifndef ASAN_POISONING_H |
| 15 | #define ASAN_POISONING_H |
| 16 | |
| 17 | #include "asan_interceptors.h" |
| 18 | #include "asan_internal.h" |
| 19 | #include "asan_mapping.h" |
| 20 | #include "sanitizer_common/sanitizer_flags.h" |
| 21 | #include "sanitizer_common/sanitizer_platform.h" |
| 22 | |
| 23 | namespace __asan { |
| 24 | |
| 25 | struct PoisonRecord { |
| 26 | u32 stack_id; |
| 27 | u32 thread_id; |
| 28 | uptr begin; |
| 29 | uptr end; |
| 30 | }; |
| 31 | |
| 32 | void AddPoisonRecord(const PoisonRecord& new_record); |
| 33 | bool FindPoisonRecord(uptr addr, PoisonRecord& match); |
| 34 | |
| 35 | void AcquirePoisonRecords(); |
| 36 | void ReleasePoisonRecords(); |
| 37 | |
| 38 | // Enable/disable memory poisoning. |
| 39 | void SetCanPoisonMemory(bool value); |
| 40 | bool CanPoisonMemory(); |
| 41 | |
| 42 | // Poisons the shadow memory for "size" bytes starting from "addr". |
| 43 | void PoisonShadow(uptr addr, uptr size, u8 value); |
| 44 | |
| 45 | // Poisons the shadow memory for "redzone_size" bytes starting from |
| 46 | // "addr + size". |
| 47 | void PoisonShadowPartialRightRedzone(uptr addr, |
| 48 | uptr size, |
| 49 | uptr redzone_size, |
| 50 | u8 value); |
| 51 | |
| 52 | // Fast versions of PoisonShadow and PoisonShadowPartialRightRedzone that |
| 53 | // assume that memory addresses are properly aligned. Use in |
| 54 | // performance-critical code with care. |
| 55 | ALWAYS_INLINE void FastPoisonShadow(uptr aligned_beg, uptr aligned_size, |
| 56 | u8 value) { |
| 57 | DCHECK(!value || CanPoisonMemory()); |
| 58 | #if SANITIZER_FUCHSIA |
| 59 | __sanitizer_fill_shadow(aligned_beg, aligned_size, value, |
| 60 | common_flags()->clear_shadow_mmap_threshold); |
| 61 | #else |
| 62 | uptr shadow_beg = MEM_TO_SHADOW(aligned_beg); |
| 63 | uptr shadow_end = |
| 64 | MEM_TO_SHADOW(aligned_beg + aligned_size - ASAN_SHADOW_GRANULARITY) + 1; |
| 65 | // FIXME: Page states are different on Windows, so using the same interface |
| 66 | // for mapping shadow and zeroing out pages doesn't "just work", so we should |
| 67 | // probably provide higher-level interface for these operations. |
| 68 | // For now, just memset on Windows. |
| 69 | if (value || SANITIZER_WINDOWS == 1 || |
| 70 | shadow_end - shadow_beg < common_flags()->clear_shadow_mmap_threshold) { |
| 71 | REAL(memset)((void*)shadow_beg, value, shadow_end - shadow_beg); |
| 72 | } else { |
| 73 | uptr page_size = GetPageSizeCached(); |
| 74 | uptr page_beg = RoundUpTo(size: shadow_beg, boundary: page_size); |
| 75 | uptr page_end = RoundDownTo(x: shadow_end, boundary: page_size); |
| 76 | |
| 77 | if (page_beg >= page_end) { |
| 78 | REAL(memset)((void *)shadow_beg, 0, shadow_end - shadow_beg); |
| 79 | } else { |
| 80 | if (page_beg != shadow_beg) { |
| 81 | REAL(memset)((void *)shadow_beg, 0, page_beg - shadow_beg); |
| 82 | } |
| 83 | if (page_end != shadow_end) { |
| 84 | REAL(memset)((void *)page_end, 0, shadow_end - page_end); |
| 85 | } |
| 86 | ReserveShadowMemoryRange(beg: page_beg, end: page_end - 1, name: nullptr); |
| 87 | } |
| 88 | } |
| 89 | #endif // SANITIZER_FUCHSIA |
| 90 | } |
| 91 | |
| 92 | ALWAYS_INLINE void FastPoisonShadowPartialRightRedzone( |
| 93 | uptr aligned_addr, uptr size, uptr redzone_size, u8 value) { |
| 94 | DCHECK(CanPoisonMemory()); |
| 95 | bool poison_partial = flags()->poison_partial; |
| 96 | u8 *shadow = (u8*)MEM_TO_SHADOW(aligned_addr); |
| 97 | for (uptr i = 0; i < redzone_size; i += ASAN_SHADOW_GRANULARITY, shadow++) { |
| 98 | if (i + ASAN_SHADOW_GRANULARITY <= size) { |
| 99 | *shadow = 0; // fully addressable |
| 100 | } else if (i >= size) { |
| 101 | *shadow = |
| 102 | (ASAN_SHADOW_GRANULARITY == 128) ? 0xff : value; // unaddressable |
| 103 | } else { |
| 104 | // first size-i bytes are addressable |
| 105 | *shadow = poison_partial ? static_cast<u8>(size - i) : 0; |
| 106 | } |
| 107 | } |
| 108 | } |
| 109 | |
| 110 | // Calls __sanitizer::ReleaseMemoryPagesToOS() on |
| 111 | // [MemToShadow(p), MemToShadow(p+size)]. |
| 112 | void FlushUnneededASanShadowMemory(uptr p, uptr size); |
| 113 | |
| 114 | } // namespace __asan |
| 115 | |
| 116 | #endif // ASAN_POISONING_H |
| 117 | |