kasan.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536
  1. /*
  2. * This file contains shadow memory manipulation code.
  3. *
  4. * Copyright (c) 2014 Samsung Electronics Co., Ltd.
  5. * Author: Andrey Ryabinin <ryabinin.a.a@gmail.com>
  6. *
  7. * Some of code borrowed from https://github.com/xairy/linux by
  8. * Andrey Konovalov <adech.fo@gmail.com>
  9. *
  10. * This program is free software; you can redistribute it and/or modify
  11. * it under the terms of the GNU General Public License version 2 as
  12. * published by the Free Software Foundation.
  13. *
  14. */
  15. #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
  16. #define DISABLE_BRANCH_PROFILING
  17. #include <linux/export.h>
  18. #include <linux/init.h>
  19. #include <linux/kernel.h>
  20. #include <linux/memblock.h>
  21. #include <linux/memory.h>
  22. #include <linux/mm.h>
  23. #include <linux/module.h>
  24. #include <linux/printk.h>
  25. #include <linux/sched.h>
  26. #include <linux/slab.h>
  27. #include <linux/stacktrace.h>
  28. #include <linux/string.h>
  29. #include <linux/types.h>
  30. #include <linux/vmalloc.h>
  31. #include <linux/kasan.h>
  32. #include "kasan.h"
  33. #include "../slab.h"
  34. /*
  35. * Poisons the shadow memory for 'size' bytes starting from 'addr'.
  36. * Memory addresses should be aligned to KASAN_SHADOW_SCALE_SIZE.
  37. */
  38. static void kasan_poison_shadow(const void *address, size_t size, u8 value)
  39. {
  40. void *shadow_start, *shadow_end;
  41. shadow_start = kasan_mem_to_shadow(address);
  42. shadow_end = kasan_mem_to_shadow(address + size);
  43. memset(shadow_start, value, shadow_end - shadow_start);
  44. }
  45. void kasan_unpoison_shadow(const void *address, size_t size)
  46. {
  47. kasan_poison_shadow(address, size, 0);
  48. if (size & KASAN_SHADOW_MASK) {
  49. u8 *shadow = (u8 *)kasan_mem_to_shadow(address + size);
  50. *shadow = size & KASAN_SHADOW_MASK;
  51. }
  52. }
  53. /*
  54. * All functions below always inlined so compiler could
  55. * perform better optimizations in each of __asan_loadX/__assn_storeX
  56. * depending on memory access size X.
  57. */
  58. static __always_inline bool memory_is_poisoned_1(unsigned long addr)
  59. {
  60. s8 shadow_value = *(s8 *)kasan_mem_to_shadow((void *)addr);
  61. if (unlikely(shadow_value)) {
  62. s8 last_accessible_byte = addr & KASAN_SHADOW_MASK;
  63. return unlikely(last_accessible_byte >= shadow_value);
  64. }
  65. return false;
  66. }
  67. static __always_inline bool memory_is_poisoned_2(unsigned long addr)
  68. {
  69. u16 *shadow_addr = (u16 *)kasan_mem_to_shadow((void *)addr);
  70. if (unlikely(*shadow_addr)) {
  71. if (memory_is_poisoned_1(addr + 1))
  72. return true;
  73. if (likely(((addr + 1) & KASAN_SHADOW_MASK) != 0))
  74. return false;
  75. return unlikely(*(u8 *)shadow_addr);
  76. }
  77. return false;
  78. }
  79. static __always_inline bool memory_is_poisoned_4(unsigned long addr)
  80. {
  81. u16 *shadow_addr = (u16 *)kasan_mem_to_shadow((void *)addr);
  82. if (unlikely(*shadow_addr)) {
  83. if (memory_is_poisoned_1(addr + 3))
  84. return true;
  85. if (likely(((addr + 3) & KASAN_SHADOW_MASK) >= 3))
  86. return false;
  87. return unlikely(*(u8 *)shadow_addr);
  88. }
  89. return false;
  90. }
  91. static __always_inline bool memory_is_poisoned_8(unsigned long addr)
  92. {
  93. u16 *shadow_addr = (u16 *)kasan_mem_to_shadow((void *)addr);
  94. if (unlikely(*shadow_addr)) {
  95. if (memory_is_poisoned_1(addr + 7))
  96. return true;
  97. if (likely(((addr + 7) & KASAN_SHADOW_MASK) >= 7))
  98. return false;
  99. return unlikely(*(u8 *)shadow_addr);
  100. }
  101. return false;
  102. }
  103. static __always_inline bool memory_is_poisoned_16(unsigned long addr)
  104. {
  105. u32 *shadow_addr = (u32 *)kasan_mem_to_shadow((void *)addr);
  106. if (unlikely(*shadow_addr)) {
  107. u16 shadow_first_bytes = *(u16 *)shadow_addr;
  108. if (unlikely(shadow_first_bytes))
  109. return true;
  110. if (likely(IS_ALIGNED(addr, 8)))
  111. return false;
  112. return memory_is_poisoned_1(addr + 15);
  113. }
  114. return false;
  115. }
  116. static __always_inline unsigned long bytes_is_zero(const u8 *start,
  117. size_t size)
  118. {
  119. while (size) {
  120. if (unlikely(*start))
  121. return (unsigned long)start;
  122. start++;
  123. size--;
  124. }
  125. return 0;
  126. }
  127. static __always_inline unsigned long memory_is_zero(const void *start,
  128. const void *end)
  129. {
  130. unsigned int words;
  131. unsigned long ret;
  132. unsigned int prefix = (unsigned long)start % 8;
  133. if (end - start <= 16)
  134. return bytes_is_zero(start, end - start);
  135. if (prefix) {
  136. prefix = 8 - prefix;
  137. ret = bytes_is_zero(start, prefix);
  138. if (unlikely(ret))
  139. return ret;
  140. start += prefix;
  141. }
  142. words = (end - start) / 8;
  143. while (words) {
  144. if (unlikely(*(u64 *)start))
  145. return bytes_is_zero(start, 8);
  146. start += 8;
  147. words--;
  148. }
  149. return bytes_is_zero(start, (end - start) % 8);
  150. }
  151. static __always_inline bool memory_is_poisoned_n(unsigned long addr,
  152. size_t size)
  153. {
  154. unsigned long ret;
  155. ret = memory_is_zero(kasan_mem_to_shadow((void *)addr),
  156. kasan_mem_to_shadow((void *)addr + size - 1) + 1);
  157. if (unlikely(ret)) {
  158. unsigned long last_byte = addr + size - 1;
  159. s8 *last_shadow = (s8 *)kasan_mem_to_shadow((void *)last_byte);
  160. if (unlikely(ret != (unsigned long)last_shadow ||
  161. ((last_byte & KASAN_SHADOW_MASK) >= *last_shadow)))
  162. return true;
  163. }
  164. return false;
  165. }
  166. static __always_inline bool memory_is_poisoned(unsigned long addr, size_t size)
  167. {
  168. if (__builtin_constant_p(size)) {
  169. switch (size) {
  170. case 1:
  171. return memory_is_poisoned_1(addr);
  172. case 2:
  173. return memory_is_poisoned_2(addr);
  174. case 4:
  175. return memory_is_poisoned_4(addr);
  176. case 8:
  177. return memory_is_poisoned_8(addr);
  178. case 16:
  179. return memory_is_poisoned_16(addr);
  180. default:
  181. BUILD_BUG();
  182. }
  183. }
  184. return memory_is_poisoned_n(addr, size);
  185. }
  186. static __always_inline void check_memory_region(unsigned long addr,
  187. size_t size, bool write)
  188. {
  189. struct kasan_access_info info;
  190. if (unlikely(size == 0))
  191. return;
  192. if (unlikely((void *)addr <
  193. kasan_shadow_to_mem((void *)KASAN_SHADOW_START))) {
  194. info.access_addr = (void *)addr;
  195. info.access_size = size;
  196. info.is_write = write;
  197. info.ip = _RET_IP_;
  198. kasan_report_user_access(&info);
  199. return;
  200. }
  201. if (likely(!memory_is_poisoned(addr, size)))
  202. return;
  203. kasan_report(addr, size, write, _RET_IP_);
  204. }
  205. void __asan_loadN(unsigned long addr, size_t size);
  206. void __asan_storeN(unsigned long addr, size_t size);
  207. #undef memset
  208. void *memset(void *addr, int c, size_t len)
  209. {
  210. __asan_storeN((unsigned long)addr, len);
  211. return __memset(addr, c, len);
  212. }
  213. #undef memmove
  214. void *memmove(void *dest, const void *src, size_t len)
  215. {
  216. __asan_loadN((unsigned long)src, len);
  217. __asan_storeN((unsigned long)dest, len);
  218. return __memmove(dest, src, len);
  219. }
  220. #undef memcpy
  221. void *memcpy(void *dest, const void *src, size_t len)
  222. {
  223. __asan_loadN((unsigned long)src, len);
  224. __asan_storeN((unsigned long)dest, len);
  225. return __memcpy(dest, src, len);
  226. }
  227. void kasan_alloc_pages(struct page *page, unsigned int order)
  228. {
  229. if (likely(!PageHighMem(page)))
  230. kasan_unpoison_shadow(page_address(page), PAGE_SIZE << order);
  231. }
  232. void kasan_free_pages(struct page *page, unsigned int order)
  233. {
  234. if (likely(!PageHighMem(page)))
  235. kasan_poison_shadow(page_address(page),
  236. PAGE_SIZE << order,
  237. KASAN_FREE_PAGE);
  238. }
  239. void kasan_poison_slab(struct page *page)
  240. {
  241. kasan_poison_shadow(page_address(page),
  242. PAGE_SIZE << compound_order(page),
  243. KASAN_KMALLOC_REDZONE);
  244. }
  245. void kasan_unpoison_object_data(struct kmem_cache *cache, void *object)
  246. {
  247. kasan_unpoison_shadow(object, cache->object_size);
  248. }
  249. void kasan_poison_object_data(struct kmem_cache *cache, void *object)
  250. {
  251. kasan_poison_shadow(object,
  252. round_up(cache->object_size, KASAN_SHADOW_SCALE_SIZE),
  253. KASAN_KMALLOC_REDZONE);
  254. }
  255. void kasan_slab_alloc(struct kmem_cache *cache, void *object)
  256. {
  257. kasan_kmalloc(cache, object, cache->object_size);
  258. }
  259. void kasan_slab_free(struct kmem_cache *cache, void *object)
  260. {
  261. unsigned long size = cache->object_size;
  262. unsigned long rounded_up_size = round_up(size, KASAN_SHADOW_SCALE_SIZE);
  263. /* RCU slabs could be legally used after free within the RCU period */
  264. if (unlikely(cache->flags & SLAB_DESTROY_BY_RCU))
  265. return;
  266. kasan_poison_shadow(object, rounded_up_size, KASAN_KMALLOC_FREE);
  267. }
  268. void kasan_kmalloc(struct kmem_cache *cache, const void *object, size_t size)
  269. {
  270. unsigned long redzone_start;
  271. unsigned long redzone_end;
  272. if (unlikely(object == NULL))
  273. return;
  274. redzone_start = round_up((unsigned long)(object + size),
  275. KASAN_SHADOW_SCALE_SIZE);
  276. redzone_end = round_up((unsigned long)object + cache->object_size,
  277. KASAN_SHADOW_SCALE_SIZE);
  278. kasan_unpoison_shadow(object, size);
  279. kasan_poison_shadow((void *)redzone_start, redzone_end - redzone_start,
  280. KASAN_KMALLOC_REDZONE);
  281. }
  282. EXPORT_SYMBOL(kasan_kmalloc);
  283. void kasan_kmalloc_large(const void *ptr, size_t size)
  284. {
  285. struct page *page;
  286. unsigned long redzone_start;
  287. unsigned long redzone_end;
  288. if (unlikely(ptr == NULL))
  289. return;
  290. page = virt_to_page(ptr);
  291. redzone_start = round_up((unsigned long)(ptr + size),
  292. KASAN_SHADOW_SCALE_SIZE);
  293. redzone_end = (unsigned long)ptr + (PAGE_SIZE << compound_order(page));
  294. kasan_unpoison_shadow(ptr, size);
  295. kasan_poison_shadow((void *)redzone_start, redzone_end - redzone_start,
  296. KASAN_PAGE_REDZONE);
  297. }
  298. void kasan_krealloc(const void *object, size_t size)
  299. {
  300. struct page *page;
  301. if (unlikely(object == ZERO_SIZE_PTR))
  302. return;
  303. page = virt_to_head_page(object);
  304. if (unlikely(!PageSlab(page)))
  305. kasan_kmalloc_large(object, size);
  306. else
  307. kasan_kmalloc(page->slab_cache, object, size);
  308. }
  309. void kasan_kfree(void *ptr)
  310. {
  311. struct page *page;
  312. page = virt_to_head_page(ptr);
  313. if (unlikely(!PageSlab(page)))
  314. kasan_poison_shadow(ptr, PAGE_SIZE << compound_order(page),
  315. KASAN_FREE_PAGE);
  316. else
  317. kasan_slab_free(page->slab_cache, ptr);
  318. }
  319. void kasan_kfree_large(const void *ptr)
  320. {
  321. struct page *page = virt_to_page(ptr);
  322. kasan_poison_shadow(ptr, PAGE_SIZE << compound_order(page),
  323. KASAN_FREE_PAGE);
  324. }
  325. int kasan_module_alloc(void *addr, size_t size)
  326. {
  327. void *ret;
  328. size_t shadow_size;
  329. unsigned long shadow_start;
  330. shadow_start = (unsigned long)kasan_mem_to_shadow(addr);
  331. shadow_size = round_up(size >> KASAN_SHADOW_SCALE_SHIFT,
  332. PAGE_SIZE);
  333. if (WARN_ON(!PAGE_ALIGNED(shadow_start)))
  334. return -EINVAL;
  335. ret = __vmalloc_node_range(shadow_size, 1, shadow_start,
  336. shadow_start + shadow_size,
  337. GFP_KERNEL | __GFP_HIGHMEM | __GFP_ZERO,
  338. PAGE_KERNEL, VM_NO_GUARD, NUMA_NO_NODE,
  339. __builtin_return_address(0));
  340. if (ret) {
  341. find_vm_area(addr)->flags |= VM_KASAN;
  342. return 0;
  343. }
  344. return -ENOMEM;
  345. }
  346. void kasan_free_shadow(const struct vm_struct *vm)
  347. {
  348. if (vm->flags & VM_KASAN)
  349. vfree(kasan_mem_to_shadow(vm->addr));
  350. }
  351. static void register_global(struct kasan_global *global)
  352. {
  353. size_t aligned_size = round_up(global->size, KASAN_SHADOW_SCALE_SIZE);
  354. kasan_unpoison_shadow(global->beg, global->size);
  355. kasan_poison_shadow(global->beg + aligned_size,
  356. global->size_with_redzone - aligned_size,
  357. KASAN_GLOBAL_REDZONE);
  358. }
  359. void __asan_register_globals(struct kasan_global *globals, size_t size)
  360. {
  361. int i;
  362. for (i = 0; i < size; i++)
  363. register_global(&globals[i]);
  364. }
  365. EXPORT_SYMBOL(__asan_register_globals);
  366. void __asan_unregister_globals(struct kasan_global *globals, size_t size)
  367. {
  368. }
  369. EXPORT_SYMBOL(__asan_unregister_globals);
  370. #define DEFINE_ASAN_LOAD_STORE(size) \
  371. void __asan_load##size(unsigned long addr) \
  372. { \
  373. check_memory_region(addr, size, false); \
  374. } \
  375. EXPORT_SYMBOL(__asan_load##size); \
  376. __alias(__asan_load##size) \
  377. void __asan_load##size##_noabort(unsigned long); \
  378. EXPORT_SYMBOL(__asan_load##size##_noabort); \
  379. void __asan_store##size(unsigned long addr) \
  380. { \
  381. check_memory_region(addr, size, true); \
  382. } \
  383. EXPORT_SYMBOL(__asan_store##size); \
  384. __alias(__asan_store##size) \
  385. void __asan_store##size##_noabort(unsigned long); \
  386. EXPORT_SYMBOL(__asan_store##size##_noabort)
  387. DEFINE_ASAN_LOAD_STORE(1);
  388. DEFINE_ASAN_LOAD_STORE(2);
  389. DEFINE_ASAN_LOAD_STORE(4);
  390. DEFINE_ASAN_LOAD_STORE(8);
  391. DEFINE_ASAN_LOAD_STORE(16);
  392. void __asan_loadN(unsigned long addr, size_t size)
  393. {
  394. check_memory_region(addr, size, false);
  395. }
  396. EXPORT_SYMBOL(__asan_loadN);
  397. __alias(__asan_loadN)
  398. void __asan_loadN_noabort(unsigned long, size_t);
  399. EXPORT_SYMBOL(__asan_loadN_noabort);
  400. void __asan_storeN(unsigned long addr, size_t size)
  401. {
  402. check_memory_region(addr, size, true);
  403. }
  404. EXPORT_SYMBOL(__asan_storeN);
  405. __alias(__asan_storeN)
  406. void __asan_storeN_noabort(unsigned long, size_t);
  407. EXPORT_SYMBOL(__asan_storeN_noabort);
  408. /* to shut up compiler complaints */
  409. void __asan_handle_no_return(void) {}
  410. EXPORT_SYMBOL(__asan_handle_no_return);
  411. #ifdef CONFIG_MEMORY_HOTPLUG
  412. static int kasan_mem_notifier(struct notifier_block *nb,
  413. unsigned long action, void *data)
  414. {
  415. return (action == MEM_GOING_ONLINE) ? NOTIFY_BAD : NOTIFY_OK;
  416. }
  417. static int __init kasan_memhotplug_init(void)
  418. {
  419. pr_err("WARNING: KASan doesn't support memory hot-add\n");
  420. pr_err("Memory hot-add will be disabled\n");
  421. hotplug_memory_notifier(kasan_mem_notifier, 0);
  422. return 0;
  423. }
  424. module_init(kasan_memhotplug_init);
  425. #endif