2 * Copyright (c) 2000-2014 Apple Inc. All rights reserved.
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
29 #ifndef _KASAN_INTERNAL_H_
30 #define _KASAN_INTERNAL_H_
33 #include <mach/mach_vm.h>
34 #include <kern/zalloc.h>
36 typedef uintptr_t uptr
;
38 #define MiB(x) ((x) * 1024UL * 1024)
41 * KASAN features and config
44 /* KASAN_KALLOC defined in kasan.h */
45 /* KASAN_ZALLOC defined in kasan.h */
46 #define FAKESTACK_QUARANTINE (1 && FAKESTACK)
48 #define QUARANTINE_ENTRIES 5000
49 #define QUARANTINE_MAXSIZE MiB(10)
52 * The amount of physical memory stolen by KASan at boot to back the shadow memory
53 * and page tables. Larger memory systems need to steal proportionally less.
56 /* Works out at about 25% of 512 MiB and 15% of 3GiB system */
57 # define STOLEN_MEM_PERCENT 13UL
58 # define STOLEN_MEM_BYTES MiB(40)
59 # define HW_PAGE_SIZE (ARM_PGBYTES)
60 # define HW_PAGE_MASK (ARM_PGMASK)
62 # define STOLEN_MEM_PERCENT 25UL
63 # define STOLEN_MEM_BYTES 0
64 # define HW_PAGE_SIZE (PAGE_SIZE)
65 # define HW_PAGE_MASK (PAGE_MASK)
69 #define KASAN_ARGS_FAKESTACK 0x0010U
70 #define KASAN_ARGS_REPORTIGNORED 0x0020U
71 #define KASAN_ARGS_NODYCHECKS 0x0100U
72 #define KASAN_ARGS_NOPOISON_HEAP 0x0200U
73 #define KASAN_ARGS_NOPOISON_GLOBAL 0x0400U
74 #define KASAN_ARGS_CHECK_LEAKS 0x0800U
76 /* uninitialized memory detection */
77 #define KASAN_UNINITIALIZED_HEAP 0xbe
80 # error KASAN undefined
84 # error KASAN_OFFSET undefined
88 # error KASAN_SCALE undefined
91 #define KASAN_GRANULE (1UL << KASAN_SCALE)
92 #define KASAN_GRANULE_MASK (KASAN_GRANULE - 1UL)
94 static inline uintptr_t
95 kasan_granule_trunc(uintptr_t x
)
97 return x
& ~KASAN_GRANULE_MASK
;
100 static inline uintptr_t
101 kasan_granule_round(uintptr_t x
)
103 return (x
+ KASAN_GRANULE_MASK
) & ~KASAN_GRANULE_MASK
;
107 kasan_granule_partial(uintptr_t x
)
109 return x
& KASAN_GRANULE_MASK
;
112 #define ADDRESS_FOR_SHADOW(x) (((x) - KASAN_OFFSET) << KASAN_SCALE)
113 #define SHADOW_FOR_ADDRESS(x) (uint8_t *)(((x) >> KASAN_SCALE) + KASAN_OFFSET)
116 # define NOINLINE OS_NOINLINE
120 #define ALWAYS_INLINE inline __attribute__((always_inline))
122 #define CLANG_MIN_VERSION(x) (defined(__apple_build_version__) && (__apple_build_version__ >= (x)))
124 #define BIT(x) (1U << (x))
126 enum __attribute__((flag_enum
)) kasan_access_types
{
127 TYPE_LOAD
= BIT(0), /* regular memory load */
128 TYPE_STORE
= BIT(1), /* regular store */
129 TYPE_MEMR
= BIT(2), /* memory intrinsic (read) */
130 TYPE_MEMW
= BIT(3), /* memory intrinsic (write) */
131 TYPE_STRR
= BIT(4), /* string intrinsic (read) */
132 TYPE_STRW
= BIT(5), /* string intrinsic (write) */
133 TYPE_KFREE
= BIT(6), /* kfree() */
134 TYPE_ZFREE
= BIT(7), /* zfree() */
135 TYPE_FSFREE
= BIT(8), /* fakestack free */
138 TYPE_POISON_GLOBAL
= BIT(13),
139 TYPE_POISON_HEAP
= BIT(14),
140 /* no TYPE_POISON_STACK, because the runtime does not control stack poisoning */
145 TYPE_MEM
= TYPE_MEMR
| TYPE_MEMW
, /* memory intrinsics */
146 TYPE_STR
= TYPE_STRR
| TYPE_STRW
, /* string intrinsics */
147 TYPE_READ
= TYPE_LOAD
| TYPE_MEMR
| TYPE_STRR
, /* all reads */
148 TYPE_WRITE
= TYPE_STORE
| TYPE_MEMW
| TYPE_STRW
, /* all writes */
149 TYPE_RW
= TYPE_READ
| TYPE_WRITE
, /* reads and writes */
150 TYPE_FREE
= TYPE_KFREE
| TYPE_ZFREE
| TYPE_FSFREE
,
151 TYPE_NORMAL
= TYPE_RW
| TYPE_FREE
,
152 TYPE_DYNAMIC
= TYPE_NORMAL
| TYPE_UAF
,
153 TYPE_POISON
= TYPE_POISON_GLOBAL
| TYPE_POISON_HEAP
,
157 enum kasan_violation_types
{
158 REASON_POISONED
= 0, /* read or write of poisoned data */
159 REASON_BAD_METADATA
= 1, /* incorrect kasan metadata */
160 REASON_INVALID_SIZE
= 2, /* free size did not match alloc size */
161 REASON_MOD_AFTER_FREE
= 3, /* object modified after free */
162 REASON_MOD_OOB
= 4, /* out of bounds modification of object */
163 REASON_UNINITIALIZED
= 5, /* leak of uninitialized kernel memory */
166 typedef enum kasan_access_types access_t
;
167 typedef enum kasan_violation_types violation_t
;
169 bool kasan_range_poisoned(vm_offset_t base
, vm_size_t size
, vm_offset_t
*first_invalid
);
170 void kasan_check_range(const void *x
, size_t sz
, access_t
);
171 void kasan_test(int testno
, int fail
);
172 void kasan_handle_test(void);
173 void kasan_free_internal(void **addrp
, vm_size_t
*sizep
, int type
, zone_t
*, vm_size_t user_size
, int locked
, bool doquarantine
);
174 void kasan_poison(vm_offset_t base
, vm_size_t size
, vm_size_t leftrz
, vm_size_t rightrz
, uint8_t flags
);
175 void kasan_lock(boolean_t
*b
);
176 void kasan_unlock(boolean_t b
);
177 bool kasan_lock_held(thread_t thread
);
178 void kasan_init_fakestack(void);
180 /* dynamic blacklist */
181 void kasan_init_dybl(void);
182 bool kasan_is_blacklisted(access_t
);
183 void kasan_dybl_load_kext(uintptr_t addr
, const char *kextname
);
184 void kasan_dybl_unload_kext(uintptr_t addr
);
186 /* arch-specific interface */
187 void kasan_arch_init(void);
188 bool kasan_is_shadow_mapped(uintptr_t shadowp
);
190 extern vm_address_t kernel_vbase
;
191 extern vm_address_t kernel_vtop
;
193 extern unsigned shadow_pages_used
;
195 /* boot-arg configurable */
196 extern int fakestack_enabled
;
198 /* Describes the source location where a global is defined. */
199 struct asan_global_source_location
{
200 const char *filename
;
205 /* Describes an instrumented global variable. */
209 uptr size_with_redzone
;
212 uptr has_dynamic_init
;
213 struct asan_global_source_location
*location
;
214 #if CLANG_MIN_VERSION(8020000)
219 #if defined(__x86_64__)
220 # define _JBLEN ((9 * 2) + 3 + 16)
221 #elif defined(__arm64__)
222 # define _JBLEN ((14 + 8 + 2) * 2)
224 # error "Unknown arch"
227 typedef int jmp_buf[_JBLEN
];
228 void _longjmp(jmp_buf env
, int val
) OS_NORETURN
;
229 int _setjmp(jmp_buf env
) __attribute__((returns_twice
));
231 #endif /* _KASAN_INTERNAL_H_ */