encoding.h 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102
  1. /* SPDX-License-Identifier: GPL-2.0 */
  2. /*
  3. * KCSAN watchpoint encoding.
  4. *
  5. * Copyright (C) 2019, Google LLC.
  6. */
  7. #ifndef _KERNEL_KCSAN_ENCODING_H
  8. #define _KERNEL_KCSAN_ENCODING_H
  9. #include <linux/bits.h>
  10. #include <linux/log2.h>
  11. #include <linux/mm.h>
  12. #include "kcsan.h"
  13. #define SLOT_RANGE PAGE_SIZE
  14. #define INVALID_WATCHPOINT 0
  15. #define CONSUMED_WATCHPOINT 1
  16. /*
  17. * The maximum useful size of accesses for which we set up watchpoints is the
  18. * max range of slots we check on an access.
  19. */
  20. #define MAX_ENCODABLE_SIZE (SLOT_RANGE * (1 + KCSAN_CHECK_ADJACENT))
  21. /*
  22. * Number of bits we use to store size info.
  23. */
  24. #define WATCHPOINT_SIZE_BITS bits_per(MAX_ENCODABLE_SIZE)
  25. /*
  26. * This encoding for addresses discards the upper (1 for is-write + SIZE_BITS);
  27. * however, most 64-bit architectures do not use the full 64-bit address space.
  28. * Also, in order for a false positive to be observable 2 things need to happen:
  29. *
  30. * 1. different addresses but with the same encoded address race;
  31. * 2. and both map onto the same watchpoint slots;
  32. *
  33. * Both these are assumed to be very unlikely. However, in case it still
  34. * happens, the report logic will filter out the false positive (see report.c).
  35. */
  36. #define WATCHPOINT_ADDR_BITS (BITS_PER_LONG-1 - WATCHPOINT_SIZE_BITS)
  37. /* Bitmasks for the encoded watchpoint access information. */
  38. #define WATCHPOINT_WRITE_MASK BIT(BITS_PER_LONG-1)
  39. #define WATCHPOINT_SIZE_MASK GENMASK(BITS_PER_LONG-2, WATCHPOINT_ADDR_BITS)
  40. #define WATCHPOINT_ADDR_MASK GENMASK(WATCHPOINT_ADDR_BITS-1, 0)
  41. static_assert(WATCHPOINT_ADDR_MASK == (1UL << WATCHPOINT_ADDR_BITS) - 1);
  42. static_assert((WATCHPOINT_WRITE_MASK ^ WATCHPOINT_SIZE_MASK ^ WATCHPOINT_ADDR_MASK) == ~0UL);
  43. static inline bool check_encodable(unsigned long addr, size_t size)
  44. {
  45. /*
  46. * While we can encode addrs<PAGE_SIZE, avoid crashing with a NULL
  47. * pointer deref inside KCSAN.
  48. */
  49. return addr >= PAGE_SIZE && size <= MAX_ENCODABLE_SIZE;
  50. }
  51. static inline long
  52. encode_watchpoint(unsigned long addr, size_t size, bool is_write)
  53. {
  54. return (long)((is_write ? WATCHPOINT_WRITE_MASK : 0) |
  55. (size << WATCHPOINT_ADDR_BITS) |
  56. (addr & WATCHPOINT_ADDR_MASK));
  57. }
  58. static __always_inline bool decode_watchpoint(long watchpoint,
  59. unsigned long *addr_masked,
  60. size_t *size,
  61. bool *is_write)
  62. {
  63. if (watchpoint == INVALID_WATCHPOINT ||
  64. watchpoint == CONSUMED_WATCHPOINT)
  65. return false;
  66. *addr_masked = (unsigned long)watchpoint & WATCHPOINT_ADDR_MASK;
  67. *size = ((unsigned long)watchpoint & WATCHPOINT_SIZE_MASK) >> WATCHPOINT_ADDR_BITS;
  68. *is_write = !!((unsigned long)watchpoint & WATCHPOINT_WRITE_MASK);
  69. return true;
  70. }
  71. /*
  72. * Return watchpoint slot for an address.
  73. */
  74. static __always_inline int watchpoint_slot(unsigned long addr)
  75. {
  76. return (addr / PAGE_SIZE) % CONFIG_KCSAN_NUM_WATCHPOINTS;
  77. }
  78. static __always_inline bool matching_access(unsigned long addr1, size_t size1,
  79. unsigned long addr2, size_t size2)
  80. {
  81. unsigned long end_range1 = addr1 + size1 - 1;
  82. unsigned long end_range2 = addr2 + size2 - 1;
  83. return addr1 <= end_range2 && addr2 <= end_range1;
  84. }
  85. #endif /* _KERNEL_KCSAN_ENCODING_H */