kasan.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537
  1. /*
  2. * This file contains shadow memory manipulation code.
  3. *
  4. * Copyright (c) 2014 Samsung Electronics Co., Ltd.
  5. * Author: Andrey Ryabinin <a.ryabinin@samsung.com>
  6. *
  7. * Some of code borrowed from https://github.com/xairy/linux by
  8. * Andrey Konovalov <adech.fo@gmail.com>
  9. *
  10. * This program is free software; you can redistribute it and/or modify
  11. * it under the terms of the GNU General Public License version 2 as
  12. * published by the Free Software Foundation.
  13. *
  14. */
  15. #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
  16. #define DISABLE_BRANCH_PROFILING
  17. #include <linux/export.h>
  18. #include <linux/init.h>
  19. #include <linux/kernel.h>
  20. #include <linux/memblock.h>
  21. #include <linux/memory.h>
  22. #include <linux/mm.h>
  23. #include <linux/module.h>
  24. #include <linux/printk.h>
  25. #include <linux/sched.h>
  26. #include <linux/slab.h>
  27. #include <linux/stacktrace.h>
  28. #include <linux/string.h>
  29. #include <linux/types.h>
  30. #include <linux/vmalloc.h>
  31. #include <linux/kasan.h>
  32. #include "kasan.h"
  33. #include "../slab.h"
  34. /*
  35. * Poisons the shadow memory for 'size' bytes starting from 'addr'.
  36. * Memory addresses should be aligned to KASAN_SHADOW_SCALE_SIZE.
  37. */
  38. static void kasan_poison_shadow(const void *address, size_t size, u8 value)
  39. {
  40. void *shadow_start, *shadow_end;
  41. shadow_start = kasan_mem_to_shadow(address);
  42. shadow_end = kasan_mem_to_shadow(address + size);
  43. memset(shadow_start, value, shadow_end - shadow_start);
  44. }
  45. void kasan_unpoison_shadow(const void *address, size_t size)
  46. {
  47. kasan_poison_shadow(address, size, 0);
  48. if (size & KASAN_SHADOW_MASK) {
  49. u8 *shadow = (u8 *)kasan_mem_to_shadow(address + size);
  50. *shadow = size & KASAN_SHADOW_MASK;
  51. }
  52. }
  53. /*
  54. * All functions below always inlined so compiler could
  55. * perform better optimizations in each of __asan_loadX/__assn_storeX
  56. * depending on memory access size X.
  57. */
  58. static __always_inline bool memory_is_poisoned_1(unsigned long addr)
  59. {
  60. s8 shadow_value = *(s8 *)kasan_mem_to_shadow((void *)addr);
  61. if (unlikely(shadow_value)) {
  62. s8 last_accessible_byte = addr & KASAN_SHADOW_MASK;
  63. return unlikely(last_accessible_byte >= shadow_value);
  64. }
  65. return false;
  66. }
  67. static __always_inline bool memory_is_poisoned_2(unsigned long addr)
  68. {
  69. u16 *shadow_addr = (u16 *)kasan_mem_to_shadow((void *)addr);
  70. if (unlikely(*shadow_addr)) {
  71. if (memory_is_poisoned_1(addr + 1))
  72. return true;
  73. if (likely(((addr + 1) & KASAN_SHADOW_MASK) != 0))
  74. return false;
  75. return unlikely(*(u8 *)shadow_addr);
  76. }
  77. return false;
  78. }
  79. static __always_inline bool memory_is_poisoned_4(unsigned long addr)
  80. {
  81. u16 *shadow_addr = (u16 *)kasan_mem_to_shadow((void *)addr);
  82. if (unlikely(*shadow_addr)) {
  83. if (memory_is_poisoned_1(addr + 3))
  84. return true;
  85. if (likely(((addr + 3) & KASAN_SHADOW_MASK) >= 3))
  86. return false;
  87. return unlikely(*(u8 *)shadow_addr);
  88. }
  89. return false;
  90. }
  91. static __always_inline bool memory_is_poisoned_8(unsigned long addr)
  92. {
  93. u16 *shadow_addr = (u16 *)kasan_mem_to_shadow((void *)addr);
  94. if (unlikely(*shadow_addr)) {
  95. if (memory_is_poisoned_1(addr + 7))
  96. return true;
  97. if (likely(((addr + 7) & KASAN_SHADOW_MASK) >= 7))
  98. return false;
  99. return unlikely(*(u8 *)shadow_addr);
  100. }
  101. return false;
  102. }
  103. static __always_inline bool memory_is_poisoned_16(unsigned long addr)
  104. {
  105. u32 *shadow_addr = (u32 *)kasan_mem_to_shadow((void *)addr);
  106. if (unlikely(*shadow_addr)) {
  107. u16 shadow_first_bytes = *(u16 *)shadow_addr;
  108. s8 last_byte = (addr + 15) & KASAN_SHADOW_MASK;
  109. if (unlikely(shadow_first_bytes))
  110. return true;
  111. if (likely(!last_byte))
  112. return false;
  113. return memory_is_poisoned_1(addr + 15);
  114. }
  115. return false;
  116. }
  117. static __always_inline unsigned long bytes_is_zero(const u8 *start,
  118. size_t size)
  119. {
  120. while (size) {
  121. if (unlikely(*start))
  122. return (unsigned long)start;
  123. start++;
  124. size--;
  125. }
  126. return 0;
  127. }
  128. static __always_inline unsigned long memory_is_zero(const void *start,
  129. const void *end)
  130. {
  131. unsigned int words;
  132. unsigned long ret;
  133. unsigned int prefix = (unsigned long)start % 8;
  134. if (end - start <= 16)
  135. return bytes_is_zero(start, end - start);
  136. if (prefix) {
  137. prefix = 8 - prefix;
  138. ret = bytes_is_zero(start, prefix);
  139. if (unlikely(ret))
  140. return ret;
  141. start += prefix;
  142. }
  143. words = (end - start) / 8;
  144. while (words) {
  145. if (unlikely(*(u64 *)start))
  146. return bytes_is_zero(start, 8);
  147. start += 8;
  148. words--;
  149. }
  150. return bytes_is_zero(start, (end - start) % 8);
  151. }
  152. static __always_inline bool memory_is_poisoned_n(unsigned long addr,
  153. size_t size)
  154. {
  155. unsigned long ret;
  156. ret = memory_is_zero(kasan_mem_to_shadow((void *)addr),
  157. kasan_mem_to_shadow((void *)addr + size - 1) + 1);
  158. if (unlikely(ret)) {
  159. unsigned long last_byte = addr + size - 1;
  160. s8 *last_shadow = (s8 *)kasan_mem_to_shadow((void *)last_byte);
  161. if (unlikely(ret != (unsigned long)last_shadow ||
  162. ((last_byte & KASAN_SHADOW_MASK) >= *last_shadow)))
  163. return true;
  164. }
  165. return false;
  166. }
  167. static __always_inline bool memory_is_poisoned(unsigned long addr, size_t size)
  168. {
  169. if (__builtin_constant_p(size)) {
  170. switch (size) {
  171. case 1:
  172. return memory_is_poisoned_1(addr);
  173. case 2:
  174. return memory_is_poisoned_2(addr);
  175. case 4:
  176. return memory_is_poisoned_4(addr);
  177. case 8:
  178. return memory_is_poisoned_8(addr);
  179. case 16:
  180. return memory_is_poisoned_16(addr);
  181. default:
  182. BUILD_BUG();
  183. }
  184. }
  185. return memory_is_poisoned_n(addr, size);
  186. }
  187. static __always_inline void check_memory_region(unsigned long addr,
  188. size_t size, bool write)
  189. {
  190. struct kasan_access_info info;
  191. if (unlikely(size == 0))
  192. return;
  193. if (unlikely((void *)addr <
  194. kasan_shadow_to_mem((void *)KASAN_SHADOW_START))) {
  195. info.access_addr = (void *)addr;
  196. info.access_size = size;
  197. info.is_write = write;
  198. info.ip = _RET_IP_;
  199. kasan_report_user_access(&info);
  200. return;
  201. }
  202. if (likely(!memory_is_poisoned(addr, size)))
  203. return;
  204. kasan_report(addr, size, write, _RET_IP_);
  205. }
  206. void __asan_loadN(unsigned long addr, size_t size);
  207. void __asan_storeN(unsigned long addr, size_t size);
  208. #undef memset
  209. void *memset(void *addr, int c, size_t len)
  210. {
  211. __asan_storeN((unsigned long)addr, len);
  212. return __memset(addr, c, len);
  213. }
  214. #undef memmove
  215. void *memmove(void *dest, const void *src, size_t len)
  216. {
  217. __asan_loadN((unsigned long)src, len);
  218. __asan_storeN((unsigned long)dest, len);
  219. return __memmove(dest, src, len);
  220. }
  221. #undef memcpy
  222. void *memcpy(void *dest, const void *src, size_t len)
  223. {
  224. __asan_loadN((unsigned long)src, len);
  225. __asan_storeN((unsigned long)dest, len);
  226. return __memcpy(dest, src, len);
  227. }
  228. void kasan_alloc_pages(struct page *page, unsigned int order)
  229. {
  230. if (likely(!PageHighMem(page)))
  231. kasan_unpoison_shadow(page_address(page), PAGE_SIZE << order);
  232. }
  233. void kasan_free_pages(struct page *page, unsigned int order)
  234. {
  235. if (likely(!PageHighMem(page)))
  236. kasan_poison_shadow(page_address(page),
  237. PAGE_SIZE << order,
  238. KASAN_FREE_PAGE);
  239. }
  240. void kasan_poison_slab(struct page *page)
  241. {
  242. kasan_poison_shadow(page_address(page),
  243. PAGE_SIZE << compound_order(page),
  244. KASAN_KMALLOC_REDZONE);
  245. }
  246. void kasan_unpoison_object_data(struct kmem_cache *cache, void *object)
  247. {
  248. kasan_unpoison_shadow(object, cache->object_size);
  249. }
  250. void kasan_poison_object_data(struct kmem_cache *cache, void *object)
  251. {
  252. kasan_poison_shadow(object,
  253. round_up(cache->object_size, KASAN_SHADOW_SCALE_SIZE),
  254. KASAN_KMALLOC_REDZONE);
  255. }
  256. void kasan_slab_alloc(struct kmem_cache *cache, void *object)
  257. {
  258. kasan_kmalloc(cache, object, cache->object_size);
  259. }
  260. void kasan_slab_free(struct kmem_cache *cache, void *object)
  261. {
  262. unsigned long size = cache->object_size;
  263. unsigned long rounded_up_size = round_up(size, KASAN_SHADOW_SCALE_SIZE);
  264. /* RCU slabs could be legally used after free within the RCU period */
  265. if (unlikely(cache->flags & SLAB_DESTROY_BY_RCU))
  266. return;
  267. kasan_poison_shadow(object, rounded_up_size, KASAN_KMALLOC_FREE);
  268. }
  269. void kasan_kmalloc(struct kmem_cache *cache, const void *object, size_t size)
  270. {
  271. unsigned long redzone_start;
  272. unsigned long redzone_end;
  273. if (unlikely(object == NULL))
  274. return;
  275. redzone_start = round_up((unsigned long)(object + size),
  276. KASAN_SHADOW_SCALE_SIZE);
  277. redzone_end = round_up((unsigned long)object + cache->object_size,
  278. KASAN_SHADOW_SCALE_SIZE);
  279. kasan_unpoison_shadow(object, size);
  280. kasan_poison_shadow((void *)redzone_start, redzone_end - redzone_start,
  281. KASAN_KMALLOC_REDZONE);
  282. }
  283. EXPORT_SYMBOL(kasan_kmalloc);
  284. void kasan_kmalloc_large(const void *ptr, size_t size)
  285. {
  286. struct page *page;
  287. unsigned long redzone_start;
  288. unsigned long redzone_end;
  289. if (unlikely(ptr == NULL))
  290. return;
  291. page = virt_to_page(ptr);
  292. redzone_start = round_up((unsigned long)(ptr + size),
  293. KASAN_SHADOW_SCALE_SIZE);
  294. redzone_end = (unsigned long)ptr + (PAGE_SIZE << compound_order(page));
  295. kasan_unpoison_shadow(ptr, size);
  296. kasan_poison_shadow((void *)redzone_start, redzone_end - redzone_start,
  297. KASAN_PAGE_REDZONE);
  298. }
  299. void kasan_krealloc(const void *object, size_t size)
  300. {
  301. struct page *page;
  302. if (unlikely(object == ZERO_SIZE_PTR))
  303. return;
  304. page = virt_to_head_page(object);
  305. if (unlikely(!PageSlab(page)))
  306. kasan_kmalloc_large(object, size);
  307. else
  308. kasan_kmalloc(page->slab_cache, object, size);
  309. }
  310. void kasan_kfree(void *ptr)
  311. {
  312. struct page *page;
  313. page = virt_to_head_page(ptr);
  314. if (unlikely(!PageSlab(page)))
  315. kasan_poison_shadow(ptr, PAGE_SIZE << compound_order(page),
  316. KASAN_FREE_PAGE);
  317. else
  318. kasan_slab_free(page->slab_cache, ptr);
  319. }
  320. void kasan_kfree_large(const void *ptr)
  321. {
  322. struct page *page = virt_to_page(ptr);
  323. kasan_poison_shadow(ptr, PAGE_SIZE << compound_order(page),
  324. KASAN_FREE_PAGE);
  325. }
  326. int kasan_module_alloc(void *addr, size_t size)
  327. {
  328. void *ret;
  329. size_t shadow_size;
  330. unsigned long shadow_start;
  331. shadow_start = (unsigned long)kasan_mem_to_shadow(addr);
  332. shadow_size = round_up(size >> KASAN_SHADOW_SCALE_SHIFT,
  333. PAGE_SIZE);
  334. if (WARN_ON(!PAGE_ALIGNED(shadow_start)))
  335. return -EINVAL;
  336. ret = __vmalloc_node_range(shadow_size, 1, shadow_start,
  337. shadow_start + shadow_size,
  338. GFP_KERNEL | __GFP_HIGHMEM | __GFP_ZERO,
  339. PAGE_KERNEL, VM_NO_GUARD, NUMA_NO_NODE,
  340. __builtin_return_address(0));
  341. if (ret) {
  342. find_vm_area(addr)->flags |= VM_KASAN;
  343. return 0;
  344. }
  345. return -ENOMEM;
  346. }
  347. void kasan_free_shadow(const struct vm_struct *vm)
  348. {
  349. if (vm->flags & VM_KASAN)
  350. vfree(kasan_mem_to_shadow(vm->addr));
  351. }
  352. static void register_global(struct kasan_global *global)
  353. {
  354. size_t aligned_size = round_up(global->size, KASAN_SHADOW_SCALE_SIZE);
  355. kasan_unpoison_shadow(global->beg, global->size);
  356. kasan_poison_shadow(global->beg + aligned_size,
  357. global->size_with_redzone - aligned_size,
  358. KASAN_GLOBAL_REDZONE);
  359. }
  360. void __asan_register_globals(struct kasan_global *globals, size_t size)
  361. {
  362. int i;
  363. for (i = 0; i < size; i++)
  364. register_global(&globals[i]);
  365. }
  366. EXPORT_SYMBOL(__asan_register_globals);
  367. void __asan_unregister_globals(struct kasan_global *globals, size_t size)
  368. {
  369. }
  370. EXPORT_SYMBOL(__asan_unregister_globals);
  371. #define DEFINE_ASAN_LOAD_STORE(size) \
  372. void __asan_load##size(unsigned long addr) \
  373. { \
  374. check_memory_region(addr, size, false); \
  375. } \
  376. EXPORT_SYMBOL(__asan_load##size); \
  377. __alias(__asan_load##size) \
  378. void __asan_load##size##_noabort(unsigned long); \
  379. EXPORT_SYMBOL(__asan_load##size##_noabort); \
  380. void __asan_store##size(unsigned long addr) \
  381. { \
  382. check_memory_region(addr, size, true); \
  383. } \
  384. EXPORT_SYMBOL(__asan_store##size); \
  385. __alias(__asan_store##size) \
  386. void __asan_store##size##_noabort(unsigned long); \
  387. EXPORT_SYMBOL(__asan_store##size##_noabort)
  388. DEFINE_ASAN_LOAD_STORE(1);
  389. DEFINE_ASAN_LOAD_STORE(2);
  390. DEFINE_ASAN_LOAD_STORE(4);
  391. DEFINE_ASAN_LOAD_STORE(8);
  392. DEFINE_ASAN_LOAD_STORE(16);
  393. void __asan_loadN(unsigned long addr, size_t size)
  394. {
  395. check_memory_region(addr, size, false);
  396. }
  397. EXPORT_SYMBOL(__asan_loadN);
  398. __alias(__asan_loadN)
  399. void __asan_loadN_noabort(unsigned long, size_t);
  400. EXPORT_SYMBOL(__asan_loadN_noabort);
  401. void __asan_storeN(unsigned long addr, size_t size)
  402. {
  403. check_memory_region(addr, size, true);
  404. }
  405. EXPORT_SYMBOL(__asan_storeN);
  406. __alias(__asan_storeN)
  407. void __asan_storeN_noabort(unsigned long, size_t);
  408. EXPORT_SYMBOL(__asan_storeN_noabort);
  409. /* to shut up compiler complaints */
  410. void __asan_handle_no_return(void) {}
  411. EXPORT_SYMBOL(__asan_handle_no_return);
  412. #ifdef CONFIG_MEMORY_HOTPLUG
  413. static int kasan_mem_notifier(struct notifier_block *nb,
  414. unsigned long action, void *data)
  415. {
  416. return (action == MEM_GOING_ONLINE) ? NOTIFY_BAD : NOTIFY_OK;
  417. }
  418. static int __init kasan_memhotplug_init(void)
  419. {
  420. pr_err("WARNING: KASan doesn't support memory hot-add\n");
  421. pr_err("Memory hot-add will be disabled\n");
  422. hotplug_memory_notifier(kasan_mem_notifier, 0);
  423. return 0;
  424. }
  425. module_init(kasan_memhotplug_init);
  426. #endif