Josh Gao | 93c0f5e | 2015-10-06 11:08:13 -0700 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2015 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
Elliott Hughes | 5e62b34 | 2018-10-25 11:00:00 -0700 | [diff] [blame] | 17 | #pragma once |
Josh Gao | 93c0f5e | 2015-10-06 11:08:13 -0700 | [diff] [blame] | 18 | |
| 19 | #include <errno.h> |
| 20 | #include <string.h> |
| 21 | #include <sys/cdefs.h> |
| 22 | #include <sys/mman.h> |
| 23 | #include <sys/user.h> |
| 24 | |
Christopher Ferris | 7a3681e | 2017-04-24 17:48:32 -0700 | [diff] [blame] | 25 | #include <async_safe/log.h> |
| 26 | |
Josh Gao | 4956c37 | 2019-12-19 16:35:51 -0800 | [diff] [blame] | 27 | #include "platform/bionic/macros.h" |
Kalesh Singh | 2bdf22e | 2023-08-11 15:15:55 -0700 | [diff] [blame] | 28 | #include "platform/bionic/page.h" |
Josh Gao | 93c0f5e | 2015-10-06 11:08:13 -0700 | [diff] [blame] | 29 | |
| 30 | template <typename T> |
| 31 | union WriteProtectedContents { |
| 32 | T value; |
Steven Moreland | 8401230 | 2024-04-27 01:17:21 +0000 | [diff] [blame] | 33 | char padding[max_android_page_size()]; |
Josh Gao | 93c0f5e | 2015-10-06 11:08:13 -0700 | [diff] [blame] | 34 | |
| 35 | WriteProtectedContents() = default; |
Elliott Hughes | 5e62b34 | 2018-10-25 11:00:00 -0700 | [diff] [blame] | 36 | BIONIC_DISALLOW_COPY_AND_ASSIGN(WriteProtectedContents); |
Steven Moreland | 8401230 | 2024-04-27 01:17:21 +0000 | [diff] [blame] | 37 | } __attribute__((aligned(max_android_page_size()))); |
Josh Gao | 93c0f5e | 2015-10-06 11:08:13 -0700 | [diff] [blame] | 38 | |
| 39 | // Write protected wrapper class that aligns its contents to a page boundary, |
| 40 | // and sets the memory protection to be non-writable, except when being modified |
| 41 | // explicitly. |
| 42 | template <typename T> |
| 43 | class WriteProtected { |
Elliott Hughes | 1e381a2 | 2020-06-08 08:41:27 -0700 | [diff] [blame] | 44 | public: |
Steven Moreland | 8401230 | 2024-04-27 01:17:21 +0000 | [diff] [blame] | 45 | static_assert(sizeof(T) < max_android_page_size(), |
| 46 | "WriteProtected only supports contents up to max_android_page_size()"); |
Josh Gao | 93c0f5e | 2015-10-06 11:08:13 -0700 | [diff] [blame] | 47 | |
Josh Gao | 93c0f5e | 2015-10-06 11:08:13 -0700 | [diff] [blame] | 48 | WriteProtected() = default; |
Elliott Hughes | 5e62b34 | 2018-10-25 11:00:00 -0700 | [diff] [blame] | 49 | BIONIC_DISALLOW_COPY_AND_ASSIGN(WriteProtected); |
Josh Gao | 93c0f5e | 2015-10-06 11:08:13 -0700 | [diff] [blame] | 50 | |
| 51 | void initialize() { |
| 52 | // Not strictly necessary, but this will hopefully segfault if we initialize |
| 53 | // multiple times by accident. |
Peter Collingbourne | 8bd83d8 | 2024-04-03 19:28:06 -0700 | [diff] [blame] | 54 | memset(contents_addr(), 0, sizeof(contents)); |
Elliott Hughes | 1e381a2 | 2020-06-08 08:41:27 -0700 | [diff] [blame] | 55 | set_protection(PROT_READ); |
Josh Gao | 93c0f5e | 2015-10-06 11:08:13 -0700 | [diff] [blame] | 56 | } |
| 57 | |
| 58 | const T* operator->() { |
Peter Collingbourne | 8bd83d8 | 2024-04-03 19:28:06 -0700 | [diff] [blame] | 59 | return &contents_addr()->value; |
Josh Gao | 93c0f5e | 2015-10-06 11:08:13 -0700 | [diff] [blame] | 60 | } |
| 61 | |
| 62 | const T& operator*() { |
Peter Collingbourne | 8bd83d8 | 2024-04-03 19:28:06 -0700 | [diff] [blame] | 63 | return contents_addr()->value; |
Josh Gao | 93c0f5e | 2015-10-06 11:08:13 -0700 | [diff] [blame] | 64 | } |
| 65 | |
| 66 | template <typename Mutator> |
| 67 | void mutate(Mutator mutator) { |
Elliott Hughes | 1e381a2 | 2020-06-08 08:41:27 -0700 | [diff] [blame] | 68 | set_protection(PROT_READ | PROT_WRITE); |
Peter Collingbourne | 8bd83d8 | 2024-04-03 19:28:06 -0700 | [diff] [blame] | 69 | mutator(&contents_addr()->value); |
Elliott Hughes | 1e381a2 | 2020-06-08 08:41:27 -0700 | [diff] [blame] | 70 | set_protection(PROT_READ); |
| 71 | } |
| 72 | |
| 73 | private: |
| 74 | WriteProtectedContents<T> contents; |
| 75 | |
Peter Collingbourne | 8bd83d8 | 2024-04-03 19:28:06 -0700 | [diff] [blame] | 76 | WriteProtectedContents<T>* contents_addr() { |
Elliott Hughes | 1e381a2 | 2020-06-08 08:41:27 -0700 | [diff] [blame] | 77 | auto addr = &contents; |
Peter Collingbourne | 8bd83d8 | 2024-04-03 19:28:06 -0700 | [diff] [blame] | 78 | // Hide the fact that we're returning the address of contents from the compiler. |
| 79 | // Otherwise it may generate code assuming alignment of 64KB even though the |
| 80 | // variable is only guaranteed to have 4KB alignment. |
| 81 | __asm__ __volatile__("" : "+r"(addr)); |
| 82 | return addr; |
| 83 | } |
| 84 | |
| 85 | void set_protection(int prot) { |
| 86 | auto addr = contents_addr(); |
Elliott Hughes | 1e381a2 | 2020-06-08 08:41:27 -0700 | [diff] [blame] | 87 | #if __has_feature(hwaddress_sanitizer) |
| 88 | // The mprotect system call does not currently untag pointers, so do it |
| 89 | // ourselves. |
| 90 | addr = untag_address(addr); |
| 91 | #endif |
Steven Moreland | 8401230 | 2024-04-27 01:17:21 +0000 | [diff] [blame] | 92 | if (mprotect(reinterpret_cast<void*>(addr), max_android_page_size(), prot) == -1) { |
Elliott Hughes | 1e381a2 | 2020-06-08 08:41:27 -0700 | [diff] [blame] | 93 | async_safe_fatal("WriteProtected mprotect %x failed: %s", prot, strerror(errno)); |
Josh Gao | 93c0f5e | 2015-10-06 11:08:13 -0700 | [diff] [blame] | 94 | } |
| 95 | } |
| 96 | }; |