asan.h revision 1.2 1 1.2 maxv /* $NetBSD: asan.h,v 1.2 2019/02/04 15:07:34 maxv Exp $ */
2 1.1 maxv
3 1.1 maxv /*
4 1.1 maxv * Copyright (c) 2018 The NetBSD Foundation, Inc.
5 1.1 maxv * All rights reserved.
6 1.1 maxv *
7 1.1 maxv * This code is derived from software contributed to The NetBSD Foundation
8 1.1 maxv * by Maxime Villard.
9 1.1 maxv *
10 1.1 maxv * Redistribution and use in source and binary forms, with or without
11 1.1 maxv * modification, are permitted provided that the following conditions
12 1.1 maxv * are met:
13 1.1 maxv * 1. Redistributions of source code must retain the above copyright
14 1.1 maxv * notice, this list of conditions and the following disclaimer.
15 1.1 maxv * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 maxv * notice, this list of conditions and the following disclaimer in the
17 1.1 maxv * documentation and/or other materials provided with the distribution.
18 1.1 maxv *
19 1.1 maxv * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 1.1 maxv * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 1.1 maxv * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 1.1 maxv * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 1.1 maxv * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 1.1 maxv * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 1.1 maxv * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 1.1 maxv * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 1.1 maxv * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 1.1 maxv * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 1.1 maxv * POSSIBILITY OF SUCH DAMAGE.
30 1.1 maxv */
31 1.1 maxv
32 1.1 maxv #include <sys/ksyms.h>
33 1.1 maxv
34 1.1 maxv #include <amd64/pmap.h>
35 1.1 maxv #include <amd64/vmparam.h>
36 1.1 maxv
37 1.1 maxv #ifdef __HAVE_PCPU_AREA
38 1.1 maxv #error "PCPU area not allowed with KASAN"
39 1.1 maxv #endif
40 1.1 maxv #ifdef __HAVE_DIRECT_MAP
41 1.1 maxv #error "DMAP not allowed with KASAN"
42 1.1 maxv #endif
43 1.1 maxv
44 1.1 maxv #define __MD_VIRTUAL_SHIFT 47 /* 48bit address space, cut half */
45 1.1 maxv #define __MD_CANONICAL_BASE 0xFFFF800000000000
46 1.1 maxv
47 1.1 maxv #define __MD_SHADOW_SIZE (1ULL << (__MD_VIRTUAL_SHIFT - KASAN_SHADOW_SCALE_SHIFT))
48 1.1 maxv #define KASAN_MD_SHADOW_START (VA_SIGN_NEG((L4_SLOT_KASAN * NBPD_L4)))
49 1.1 maxv #define KASAN_MD_SHADOW_END (KASAN_MD_SHADOW_START + __MD_SHADOW_SIZE)
50 1.1 maxv
51 1.1 maxv static bool __md_early __read_mostly = true;
52 1.1 maxv static uint8_t __md_earlypages[8 * PAGE_SIZE] __aligned(PAGE_SIZE);
53 1.1 maxv static size_t __md_earlytaken = 0;
54 1.1 maxv
55 1.1 maxv static inline int8_t *
56 1.1 maxv kasan_md_addr_to_shad(const void *addr)
57 1.1 maxv {
58 1.1 maxv vaddr_t va = (vaddr_t)addr;
59 1.1 maxv return (int8_t *)(KASAN_MD_SHADOW_START +
60 1.1 maxv ((va - __MD_CANONICAL_BASE) >> KASAN_SHADOW_SCALE_SHIFT));
61 1.1 maxv }
62 1.1 maxv
63 1.1 maxv static inline bool
64 1.1 maxv kasan_md_unsupported(vaddr_t addr)
65 1.1 maxv {
66 1.1 maxv return (addr >= (vaddr_t)PTE_BASE &&
67 1.1 maxv addr < ((vaddr_t)PTE_BASE + NBPD_L4));
68 1.1 maxv }
69 1.1 maxv
70 1.1 maxv static paddr_t
71 1.1 maxv __md_early_palloc(void)
72 1.1 maxv {
73 1.1 maxv paddr_t ret;
74 1.1 maxv
75 1.1 maxv KASSERT(__md_earlytaken < 8);
76 1.1 maxv
77 1.1 maxv ret = (paddr_t)(&__md_earlypages[0] + __md_earlytaken * PAGE_SIZE);
78 1.1 maxv __md_earlytaken++;
79 1.1 maxv
80 1.1 maxv ret -= KERNBASE;
81 1.1 maxv
82 1.1 maxv return ret;
83 1.1 maxv }
84 1.1 maxv
85 1.1 maxv static paddr_t
86 1.1 maxv __md_palloc(void)
87 1.1 maxv {
88 1.1 maxv paddr_t pa;
89 1.1 maxv
90 1.1 maxv if (__predict_false(__md_early))
91 1.1 maxv pa = __md_early_palloc();
92 1.1 maxv else
93 1.1 maxv pa = pmap_get_physpage();
94 1.1 maxv
95 1.1 maxv return pa;
96 1.1 maxv }
97 1.1 maxv
98 1.1 maxv static void
99 1.1 maxv kasan_md_shadow_map_page(vaddr_t va)
100 1.1 maxv {
101 1.1 maxv paddr_t pa;
102 1.1 maxv
103 1.1 maxv if (!pmap_valid_entry(L4_BASE[pl4_i(va)])) {
104 1.1 maxv pa = __md_palloc();
105 1.1 maxv L4_BASE[pl4_i(va)] = pa | PG_KW | pmap_pg_nx | PG_V;
106 1.1 maxv }
107 1.1 maxv if (!pmap_valid_entry(L3_BASE[pl3_i(va)])) {
108 1.1 maxv pa = __md_palloc();
109 1.1 maxv L3_BASE[pl3_i(va)] = pa | PG_KW | pmap_pg_nx | PG_V;
110 1.1 maxv }
111 1.1 maxv if (!pmap_valid_entry(L2_BASE[pl2_i(va)])) {
112 1.1 maxv pa = __md_palloc();
113 1.1 maxv L2_BASE[pl2_i(va)] = pa | PG_KW | pmap_pg_nx | PG_V;
114 1.1 maxv }
115 1.1 maxv if (!pmap_valid_entry(L1_BASE[pl1_i(va)])) {
116 1.1 maxv pa = __md_palloc();
117 1.1 maxv L1_BASE[pl1_i(va)] = pa | PG_KW | pmap_pg_g | pmap_pg_nx | PG_V;
118 1.1 maxv }
119 1.1 maxv }
120 1.1 maxv
121 1.1 maxv /*
122 1.1 maxv * Map only the current stack. We will map the rest in kasan_init.
123 1.1 maxv */
124 1.1 maxv static void
125 1.1 maxv kasan_md_early_init(void *stack)
126 1.1 maxv {
127 1.1 maxv kasan_shadow_map(stack, USPACE);
128 1.1 maxv __md_early = false;
129 1.1 maxv }
130 1.1 maxv
131 1.1 maxv /*
132 1.1 maxv * Create the shadow mapping. We don't create the 'User' area, because we
133 1.1 maxv * exclude it from the monitoring. The 'Main' area is created dynamically
134 1.1 maxv * in pmap_growkernel.
135 1.1 maxv */
136 1.1 maxv static void
137 1.1 maxv kasan_md_init(void)
138 1.1 maxv {
139 1.1 maxv extern struct bootspace bootspace;
140 1.1 maxv size_t i;
141 1.1 maxv
142 1.1 maxv CTASSERT((__MD_SHADOW_SIZE / NBPD_L4) == NL4_SLOT_KASAN);
143 1.1 maxv
144 1.1 maxv /* Kernel. */
145 1.1 maxv for (i = 0; i < BTSPACE_NSEGS; i++) {
146 1.1 maxv if (bootspace.segs[i].type == BTSEG_NONE) {
147 1.1 maxv continue;
148 1.1 maxv }
149 1.1 maxv kasan_shadow_map((void *)bootspace.segs[i].va,
150 1.1 maxv bootspace.segs[i].sz);
151 1.1 maxv }
152 1.1 maxv
153 1.1 maxv /* Boot region. */
154 1.1 maxv kasan_shadow_map((void *)bootspace.boot.va, bootspace.boot.sz);
155 1.1 maxv
156 1.1 maxv /* Module map. */
157 1.1 maxv kasan_shadow_map((void *)bootspace.smodule,
158 1.1 maxv (size_t)(bootspace.emodule - bootspace.smodule));
159 1.1 maxv
160 1.1 maxv /* The bootstrap spare va. */
161 1.1 maxv kasan_shadow_map((void *)bootspace.spareva, PAGE_SIZE);
162 1.1 maxv }
163 1.1 maxv
164 1.1 maxv static inline bool
165 1.1 maxv __md_unwind_end(const char *name)
166 1.1 maxv {
167 1.1 maxv if (!strcmp(name, "syscall") ||
168 1.2 maxv !strcmp(name, "alltraps") ||
169 1.1 maxv !strcmp(name, "handle_syscall") ||
170 1.2 maxv !strncmp(name, "Xtrap", 5) ||
171 1.1 maxv !strncmp(name, "Xintr", 5) ||
172 1.1 maxv !strncmp(name, "Xhandle", 7) ||
173 1.1 maxv !strncmp(name, "Xresume", 7) ||
174 1.1 maxv !strncmp(name, "Xstray", 6) ||
175 1.1 maxv !strncmp(name, "Xhold", 5) ||
176 1.1 maxv !strncmp(name, "Xrecurse", 8) ||
177 1.1 maxv !strcmp(name, "Xdoreti") ||
178 1.1 maxv !strncmp(name, "Xsoft", 5)) {
179 1.1 maxv return true;
180 1.1 maxv }
181 1.1 maxv
182 1.1 maxv return false;
183 1.1 maxv }
184 1.1 maxv
185 1.1 maxv static void
186 1.1 maxv kasan_md_unwind(void)
187 1.1 maxv {
188 1.1 maxv uint64_t *rbp, rip;
189 1.1 maxv const char *mod;
190 1.1 maxv const char *sym;
191 1.1 maxv size_t nsym;
192 1.1 maxv int error;
193 1.1 maxv
194 1.1 maxv rbp = (uint64_t *)__builtin_frame_address(0);
195 1.1 maxv nsym = 0;
196 1.1 maxv
197 1.1 maxv while (1) {
198 1.1 maxv /* 8(%rbp) contains the saved %rip. */
199 1.1 maxv rip = *(rbp + 1);
200 1.1 maxv
201 1.1 maxv if (rip < KERNBASE) {
202 1.1 maxv break;
203 1.1 maxv }
204 1.1 maxv error = ksyms_getname(&mod, &sym, (vaddr_t)rip, KSYMS_PROC);
205 1.1 maxv if (error) {
206 1.1 maxv break;
207 1.1 maxv }
208 1.1 maxv printf("#%zu %p in %s <%s>\n", nsym, (void *)rip, sym, mod);
209 1.1 maxv if (__md_unwind_end(sym)) {
210 1.1 maxv break;
211 1.1 maxv }
212 1.1 maxv
213 1.1 maxv rbp = (uint64_t *)*(rbp);
214 1.1 maxv if (rbp == 0) {
215 1.1 maxv break;
216 1.1 maxv }
217 1.1 maxv nsym++;
218 1.1 maxv
219 1.1 maxv if (nsym >= 15) {
220 1.1 maxv break;
221 1.1 maxv }
222 1.1 maxv }
223 1.1 maxv }
224