1//===-- hwasan_checks.h -----------------------------------------*- C++ -*-===//
2//
3// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4// See https://llvm.org/LICENSE.txt for license information.
5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6//
7//===----------------------------------------------------------------------===//
8//
9// This file is a part of HWAddressSanitizer.
10//
11//===----------------------------------------------------------------------===//
12
13#ifndef HWASAN_CHECKS_H
14#define HWASAN_CHECKS_H
15
16#include "hwasan_allocator.h"
17#include "hwasan_mapping.h"
18#include "hwasan_registers.h"
19#include "sanitizer_common/sanitizer_common.h"
20
21namespace __hwasan {
22
23enum class ErrorAction { Abort, Recover };
24enum class AccessType { Load, Store };
25
26// Used when the access size is known.
27constexpr unsigned SigTrapEncoding(ErrorAction EA, AccessType AT,
28 unsigned LogSize) {
29 return 0x20 * (EA == ErrorAction::Recover) +
30 0x10 * (AT == AccessType::Store) + LogSize;
31}
32
33// Used when the access size varies at runtime.
34constexpr unsigned SigTrapEncoding(ErrorAction EA, AccessType AT) {
35 return SigTrapEncoding(EA, AT, LogSize: 0xf);
36}
37
38template <ErrorAction EA, AccessType AT, size_t LogSize>
39__attribute__((always_inline)) static void SigTrap(uptr p) {
40 // Other platforms like linux can use signals for intercepting an exception
41 // and dispatching to HandleTagMismatch. The fuchsias implementation doesn't
42 // use signals so we can call it here directly instead.
43#if CAN_GET_REGISTERS && SANITIZER_FUCHSIA
44 auto regs = GetRegisters();
45 size_t size = 2 << LogSize;
46 AccessInfo access_info = {
47 .addr = p,
48 .size = size,
49 .is_store = AT == AccessType::Store,
50 .is_load = AT == AccessType::Load,
51 .recover = EA == ErrorAction::Recover,
52 };
53 HandleTagMismatch(access_info, (uptr)__builtin_return_address(0),
54 (uptr)__builtin_frame_address(0), /*uc=*/nullptr, regs.x);
55#elif defined(__aarch64__)
56 (void)p;
57 // 0x900 is added to do not interfere with the kernel use of lower values of
58 // brk immediate.
59 register uptr x0 asm("x0") = p;
60 asm("brk %1\n\t" ::"r"(x0), "n"(0x900 + SigTrapEncoding(EA, AT, LogSize)));
61#elif defined(__x86_64__)
62 // INT3 + NOP DWORD ptr [EAX + X] to pass X to our signal handler, 5 bytes
63 // total. The pointer is passed via rdi.
64 // 0x40 is added as a safeguard, to help distinguish our trap from others and
65 // to avoid 0 offsets in the command (otherwise it'll be reduced to a
66 // different nop command, the three bytes one).
67 asm volatile(
68 "int3\n"
69 "nopl %c0(%%rax)\n" ::"n"(0x40 + SigTrapEncoding(EA, AT, LogSize)),
70 "D"(p));
71#elif SANITIZER_RISCV64
72 // Put pointer into x10
73 // addiw contains immediate of 0x40 + X, where 0x40 is magic number and X
74 // encodes access size
75 register uptr x10 asm("x10") = p;
76 asm volatile(
77 "ebreak\n"
78 "addiw x0, x0, %1\n" ::"r"(x10),
79 "I"(0x40 + SigTrapEncoding(EA, AT, LogSize)));
80#else
81 // FIXME: not always sigill.
82 __builtin_trap();
83#endif
84 // __builtin_unreachable();
85}
86
87// Version with access size which is not power of 2
88template <ErrorAction EA, AccessType AT>
89__attribute__((always_inline)) static void SigTrap(uptr p, uptr size) {
90 // Other platforms like linux can use signals for intercepting an exception
91 // and dispatching to HandleTagMismatch. The fuchsias implementation doesn't
92 // use signals so we can call it here directly instead.
93#if CAN_GET_REGISTERS && SANITIZER_FUCHSIA
94 auto regs = GetRegisters();
95 AccessInfo access_info = {
96 .addr = p,
97 .size = size,
98 .is_store = AT == AccessType::Store,
99 .is_load = AT == AccessType::Load,
100 .recover = EA == ErrorAction::Recover,
101 };
102 HandleTagMismatch(access_info, (uptr)__builtin_return_address(0),
103 (uptr)__builtin_frame_address(0), /*uc=*/nullptr, regs.x);
104#elif defined(__aarch64__)
105 register uptr x0 asm("x0") = p;
106 register uptr x1 asm("x1") = size;
107 asm("brk %2\n\t" ::"r"(x0), "r"(x1), "n"(0x900 + SigTrapEncoding(EA, AT)));
108#elif defined(__x86_64__)
109 // Size is stored in rsi.
110 asm volatile(
111 "int3\n"
112 "nopl %c0(%%rax)\n" ::"n"(0x40 + SigTrapEncoding(EA, AT)),
113 "D"(p), "S"(size));
114#elif SANITIZER_RISCV64
115 // Put access size into x11
116 register uptr x10 asm("x10") = p;
117 register uptr x11 asm("x11") = size;
118 asm volatile(
119 "ebreak\n"
120 "addiw x0, x0, %2\n" ::"r"(x10),
121 "r"(x11), "I"(0x40 + SigTrapEncoding(EA, AT)));
122#else
123 __builtin_trap();
124#endif
125 // __builtin_unreachable();
126}
127
128__attribute__((always_inline, nodebug)) static inline uptr ShortTagSize(
129 tag_t mem_tag, uptr ptr) {
130 DCHECK(IsAligned(ptr, kShadowAlignment));
131 tag_t ptr_tag = GetTagFromPointer(p: ptr);
132 if (ptr_tag == mem_tag)
133 return kShadowAlignment;
134 if (!mem_tag || mem_tag >= kShadowAlignment)
135 return 0;
136 if (*(u8 *)(ptr | (kShadowAlignment - 1)) != ptr_tag)
137 return 0;
138 return mem_tag;
139}
140
141__attribute__((always_inline, nodebug)) static inline bool
142PossiblyShortTagMatches(tag_t mem_tag, uptr ptr, uptr sz) {
143 tag_t ptr_tag = GetTagFromPointer(p: ptr);
144 if (ptr_tag == mem_tag)
145 return true;
146 if (mem_tag >= kShadowAlignment)
147 return false;
148 if ((ptr & (kShadowAlignment - 1)) + sz > mem_tag)
149 return false;
150 return *(u8 *)(ptr | (kShadowAlignment - 1)) == ptr_tag;
151}
152
153template <ErrorAction EA, AccessType AT, unsigned LogSize>
154__attribute__((always_inline, nodebug)) static void CheckAddress(uptr p) {
155 if (!InTaggableRegion(addr: p))
156 return;
157 uptr ptr_raw = p & ~kAddressTagMask;
158 tag_t mem_tag = *(tag_t *)MemToShadow(untagged_addr: ptr_raw);
159 if (UNLIKELY(!PossiblyShortTagMatches(mem_tag, p, 1 << LogSize))) {
160 SigTrap<EA, AT, LogSize>(p);
161 if (EA == ErrorAction::Abort)
162 __builtin_unreachable();
163 }
164}
165
166template <ErrorAction EA, AccessType AT>
167__attribute__((always_inline, nodebug)) static void CheckAddressSized(uptr p,
168 uptr sz) {
169 if (sz == 0 || !InTaggableRegion(addr: p))
170 return;
171 tag_t ptr_tag = GetTagFromPointer(p);
172 uptr ptr_raw = p & ~kAddressTagMask;
173 tag_t *shadow_first = (tag_t *)MemToShadow(untagged_addr: ptr_raw);
174 tag_t *shadow_last = (tag_t *)MemToShadow(untagged_addr: ptr_raw + sz);
175 for (tag_t *t = shadow_first; t < shadow_last; ++t)
176 if (UNLIKELY(ptr_tag != *t)) {
177 SigTrap<EA, AT>(p, sz);
178 if (EA == ErrorAction::Abort)
179 __builtin_unreachable();
180 }
181 uptr end = p + sz;
182 uptr tail_sz = end & (kShadowAlignment - 1);
183 if (UNLIKELY(tail_sz != 0 &&
184 !PossiblyShortTagMatches(
185 *shadow_last, end & ~(kShadowAlignment - 1), tail_sz))) {
186 SigTrap<EA, AT>(p, sz);
187 if (EA == ErrorAction::Abort)
188 __builtin_unreachable();
189 }
190}
191
192} // end namespace __hwasan
193
194#endif // HWASAN_CHECKS_H
195

source code of compiler-rt/lib/hwasan/hwasan_checks.h