abb163f5f0
This reverts commit ea3df0c52b
, and
increases the address limit on non-aarch64 64-bit platforms as well.
RLIMIT_AS problem fixed in a different commit.
Bug: 63141434, 64293803
Test: device boots
Change-Id: I1284c4196cc1f0c9d97c3ced97a19de328050d21
91 lines
3.8 KiB
C++
91 lines
3.8 KiB
C++
/*
|
|
* Copyright (C) 2016 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#ifndef CFI_SHADOW_H
|
|
#define CFI_SHADOW_H
|
|
|
|
#include <stdint.h>
|
|
|
|
#include "private/bionic_page.h"
|
|
#include "private/bionic_macros.h"
|
|
|
|
constexpr unsigned kLibraryAlignmentBits = 18;
|
|
constexpr size_t kLibraryAlignment = 1UL << kLibraryAlignmentBits;
|
|
|
|
// This class defines format of the shadow region for Control Flow Integrity support.
|
|
// See documentation in http://clang.llvm.org/docs/ControlFlowIntegrityDesign.html#shared-library-support.
|
|
//
|
|
// CFI shadow is effectively a very fast and specialized implementation of dladdr: given an address that
|
|
// belongs to a shared library or an executable, it can find the address of a specific export in that
|
|
// library (a function called "__cfi_check"). This is only guaranteed to work for
|
|
// addresses of possible CFI targets inside a library: indirectly called functions and virtual
|
|
// tables. A random address inside a library may not work in the future (but it does in the current
|
|
// implementation).
|
|
//
|
|
// Implementation is a sparse array of uint16_t where each element describes the location of
|
|
// __cfi_check for a 2**kShadowGranularity range of memory. Array elements (called "shadow values"
|
|
// below) are interpreted as follows.
|
|
//
|
|
// For an address P and corresponding shadow value V, the address of __cfi_check is calculated as
|
|
// align_up(P, 2**kShadowGranularity) - (V - 2) * (2 ** kCfiCheckGranularity)
|
|
//
|
|
// Special shadow values:
|
|
// 0 = kInvalidShadow, this memory range has no valid CFI targets.
|
|
// 1 = kUncheckedShadow, any address is this memory range is a valid CFI target
|
|
//
|
|
// Loader requirement: each aligned 2**kShadowGranularity region of address space may contain at
|
|
// most one DSO.
|
|
// Compiler requirement: __cfi_check is aligned at kCfiCheckGranularity.
|
|
// Compiler requirement: __cfi_check for a given DSO is located below any CFI target for that DSO.
|
|
class CFIShadow {
|
|
public:
|
|
static constexpr uintptr_t kShadowGranularity = kLibraryAlignmentBits;
|
|
static constexpr uintptr_t kCfiCheckGranularity = 12;
|
|
|
|
// Each uint16_t element of the shadow corresponds to this much application memory.
|
|
static constexpr uintptr_t kShadowAlign = 1UL << kShadowGranularity;
|
|
|
|
// Alignment of __cfi_check.
|
|
static constexpr uintptr_t kCfiCheckAlign = 1UL << kCfiCheckGranularity; // 4K
|
|
|
|
#if defined (__LP64__)
|
|
static constexpr uintptr_t kMaxTargetAddr = 0xffffffffffff;
|
|
#else
|
|
static constexpr uintptr_t kMaxTargetAddr = 0xffffffff;
|
|
#endif
|
|
|
|
// Shadow is 2 -> 2**kShadowGranularity.
|
|
static constexpr uintptr_t kShadowSize =
|
|
align_up((kMaxTargetAddr >> (kShadowGranularity - 1)), PAGE_SIZE);
|
|
|
|
// Returns offset inside the shadow region for an address.
|
|
static constexpr uintptr_t MemToShadowOffset(uintptr_t x) {
|
|
return (x >> kShadowGranularity) << 1;
|
|
}
|
|
|
|
typedef int (*CFICheckFn)(uint64_t, void *, void *);
|
|
|
|
public:
|
|
enum ShadowValues : uint16_t {
|
|
kInvalidShadow = 0, // Not a valid CFI target.
|
|
kUncheckedShadow = 1, // Unchecked, valid CFI target.
|
|
kRegularShadowMin = 2 // This and all higher values encode a negative offset to __cfi_check in
|
|
// the units of kCfiCheckGranularity, starting with 0 at
|
|
// kRegularShadowMin.
|
|
};
|
|
};
|
|
|
|
#endif // CFI_SHADOW_H
|