blob: 1fecaeb35e1e3c6ebb5c1e6a5529a91e3aa5bc36 [file] [log] [blame]
Kostya Serebryany1e172b42011-11-30 01:07:02 +00001//===-- asan_mapping.h ------------------------------------------*- C++ -*-===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of AddressSanitizer, an address sanity checker.
11//
12// Defines ASan memory mapping.
13//===----------------------------------------------------------------------===//
14#ifndef ASAN_MAPPING_H
15#define ASAN_MAPPING_H
16
17#include "asan_internal.h"
18
19// The full explanation of the memory mapping could be found here:
20// http://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm
Kostya Serebryanye31eca92013-02-15 12:00:24 +000021//
22// Typical shadow mapping on Linux/x86_64 with SHADOW_OFFSET == 0x00007fff8000:
23// || `[0x10007fff8000, 0x7fffffffffff]` || HighMem ||
24// || `[0x02008fff7000, 0x10007fff7fff]` || HighShadow ||
25// || `[0x00008fff7000, 0x02008fff6fff]` || ShadowGap ||
26// || `[0x00007fff8000, 0x00008fff6fff]` || LowShadow ||
27// || `[0x000000000000, 0x00007fff7fff]` || LowMem ||
28//
29// When SHADOW_OFFSET is zero (-pie):
30// || `[0x100000000000, 0x7fffffffffff]` || HighMem ||
31// || `[0x020000000000, 0x0fffffffffff]` || HighShadow ||
32// || `[0x000000040000, 0x01ffffffffff]` || ShadowGap ||
33//
34// Special case when something is already mapped between
Kostya Serebryany13577fe2013-02-28 12:28:37 +000035// 0x003000000000 and 0x005000000000 (e.g. when prelink is installed):
Kostya Serebryanye31eca92013-02-15 12:00:24 +000036// || `[0x10007fff8000, 0x7fffffffffff]` || HighMem ||
37// || `[0x02008fff7000, 0x10007fff7fff]` || HighShadow ||
Kostya Serebryany13577fe2013-02-28 12:28:37 +000038// || `[0x005000000000, 0x02008fff6fff]` || ShadowGap3 ||
39// || `[0x003000000000, 0x004fffffffff]` || MidMem ||
40// || `[0x000a7fff8000, 0x002fffffffff]` || ShadowGap2 ||
41// || `[0x00067fff8000, 0x000a7fff7fff]` || MidShadow ||
Kostya Serebryanye31eca92013-02-15 12:00:24 +000042// || `[0x00008fff7000, 0x00067fff7fff]` || ShadowGap ||
43// || `[0x00007fff8000, 0x00008fff6fff]` || LowShadow ||
44// || `[0x000000000000, 0x00007fff7fff]` || LowMem ||
45//
46// Default Linux/i386 mapping:
47// || `[0x40000000, 0xffffffff]` || HighMem ||
48// || `[0x28000000, 0x3fffffff]` || HighShadow ||
49// || `[0x24000000, 0x27ffffff]` || ShadowGap ||
50// || `[0x20000000, 0x23ffffff]` || LowShadow ||
51// || `[0x00000000, 0x1fffffff]` || LowMem ||
Kostya Serebryany40527a52013-06-03 14:49:25 +000052//
53// Default Linux/MIPS mapping:
54// || `[0x2aaa8000, 0xffffffff]` || HighMem ||
55// || `[0x0fffd000, 0x2aaa7fff]` || HighShadow ||
56// || `[0x0bffd000, 0x0fffcfff]` || ShadowGap ||
57// || `[0x0aaa8000, 0x0bffcfff]` || LowShadow ||
58// || `[0x00000000, 0x0aaa7fff]` || LowMem ||
Kostya Serebryany1e172b42011-11-30 01:07:02 +000059
Alexey Samsonov22e21b02013-09-16 15:45:06 +000060static const u64 kDefaultShadowScale = 3;
61static const u64 kDefaultShadowOffset32 = 1ULL << 29;
62static const u64 kDefaultShadowOffset64 = 1ULL << 44;
63static const u64 kDefaultShort64bitShadowOffset = 0x7FFF8000; // < 2G.
64static const u64 kPPC64_ShadowOffset64 = 1ULL << 41;
65static const u64 kMIPS32_ShadowOffset32 = 0x0aaa8000;
66
Kostya Serebryany1e172b42011-11-30 01:07:02 +000067#if ASAN_FLEXIBLE_MAPPING_AND_OFFSET == 1
Alexey Samsonova6d4cf72012-12-28 11:22:23 +000068extern SANITIZER_INTERFACE_ATTRIBUTE uptr __asan_mapping_scale;
69extern SANITIZER_INTERFACE_ATTRIBUTE uptr __asan_mapping_offset;
Evgeniy Stepanovf1ee2cd2012-05-23 11:52:37 +000070# define SHADOW_SCALE (__asan_mapping_scale)
71# define SHADOW_OFFSET (__asan_mapping_offset)
Kostya Serebryany1e172b42011-11-30 01:07:02 +000072#else
Alexey Samsonov22e21b02013-09-16 15:45:06 +000073# define SHADOW_SCALE kDefaultShadowScale
Evgeniy Stepanov83cb7872013-03-19 13:54:41 +000074# if SANITIZER_ANDROID
Evgeniy Stepanovf1ee2cd2012-05-23 11:52:37 +000075# define SHADOW_OFFSET (0)
76# else
Kostya Serebryany5af39e52012-11-21 12:38:58 +000077# if SANITIZER_WORDSIZE == 32
Kostya Serebryany40527a52013-06-03 14:49:25 +000078# if defined(__mips__)
Alexey Samsonov22e21b02013-09-16 15:45:06 +000079# define SHADOW_OFFSET kMIPS32_ShadowOffset32
Kostya Serebryany40527a52013-06-03 14:49:25 +000080# else
Alexey Samsonov22e21b02013-09-16 15:45:06 +000081# define SHADOW_OFFSET kDefaultShadowOffset32
Kostya Serebryany40527a52013-06-03 14:49:25 +000082# endif
Evgeniy Stepanovf1ee2cd2012-05-23 11:52:37 +000083# else
Kostya Serebryanyd7d46502012-11-20 07:00:42 +000084# if defined(__powerpc64__)
Alexey Samsonov22e21b02013-09-16 15:45:06 +000085# define SHADOW_OFFSET kPPC64_ShadowOffset64
86# elif SANITIZER_MAC
87# define SHADOW_OFFSET kDefaultShadowOffset64
Kostya Serebryanyd7d46502012-11-20 07:00:42 +000088# else
Alexey Samsonov22e21b02013-09-16 15:45:06 +000089# define SHADOW_OFFSET kDefaultShort64bitShadowOffset
Kostya Serebryanyd7d46502012-11-20 07:00:42 +000090# endif
Evgeniy Stepanovf1ee2cd2012-05-23 11:52:37 +000091# endif
92# endif
Kostya Serebryany1e172b42011-11-30 01:07:02 +000093#endif // ASAN_FLEXIBLE_MAPPING_AND_OFFSET
94
95#define SHADOW_GRANULARITY (1ULL << SHADOW_SCALE)
Kostya Serebryanye5ab9682013-01-23 13:27:43 +000096#define MEM_TO_SHADOW(mem) (((mem) >> SHADOW_SCALE) + (SHADOW_OFFSET))
Evgeniy Stepanov3972ea02012-05-12 12:33:10 +000097#define SHADOW_TO_MEM(shadow) (((shadow) - SHADOW_OFFSET) << SHADOW_SCALE)
Kostya Serebryany1e172b42011-11-30 01:07:02 +000098
Kostya Serebryany1e172b42011-11-30 01:07:02 +000099#define kLowMemBeg 0
100#define kLowMemEnd (SHADOW_OFFSET ? SHADOW_OFFSET - 1 : 0)
101
102#define kLowShadowBeg SHADOW_OFFSET
103#define kLowShadowEnd MEM_TO_SHADOW(kLowMemEnd)
104
105#define kHighMemBeg (MEM_TO_SHADOW(kHighMemEnd) + 1)
106
107#define kHighShadowBeg MEM_TO_SHADOW(kHighMemBeg)
108#define kHighShadowEnd MEM_TO_SHADOW(kHighMemEnd)
109
Kostya Serebryanye31eca92013-02-15 12:00:24 +0000110# define kMidShadowBeg MEM_TO_SHADOW(kMidMemBeg)
111# define kMidShadowEnd MEM_TO_SHADOW(kMidMemEnd)
112
Kostya Serebryanye89f1842012-11-24 05:03:11 +0000113// With the zero shadow base we can not actually map pages starting from 0.
114// This constant is somewhat arbitrary.
115#define kZeroBaseShadowStart (1 << 18)
116
117#define kShadowGapBeg (kLowShadowEnd ? kLowShadowEnd + 1 \
118 : kZeroBaseShadowStart)
Kostya Serebryanye31eca92013-02-15 12:00:24 +0000119#define kShadowGapEnd ((kMidMemBeg ? kMidShadowBeg : kHighShadowBeg) - 1)
120
121#define kShadowGap2Beg (kMidMemBeg ? kMidShadowEnd + 1 : 0)
122#define kShadowGap2End (kMidMemBeg ? kMidMemBeg - 1 : 0)
123
124#define kShadowGap3Beg (kMidMemBeg ? kMidMemEnd + 1 : 0)
125#define kShadowGap3End (kMidMemBeg ? kHighShadowBeg - 1 : 0)
126
127#define DO_ASAN_MAPPING_PROFILE 0 // Set to 1 to profile the functions below.
128
129#if DO_ASAN_MAPPING_PROFILE
130# define PROFILE_ASAN_MAPPING() AsanMappingProfile[__LINE__]++;
131#else
132# define PROFILE_ASAN_MAPPING()
133#endif
134
135// If 1, all shadow boundaries are constants.
136// Don't set to 1 other than for testing.
137#define ASAN_FIXED_MAPPING 0
Kostya Serebryany1e172b42011-11-30 01:07:02 +0000138
Kostya Serebryany1e172b42011-11-30 01:07:02 +0000139namespace __asan {
140
Kostya Serebryanye31eca92013-02-15 12:00:24 +0000141extern uptr AsanMappingProfile[];
142
143#if ASAN_FIXED_MAPPING
144// Fixed mapping for 64-bit Linux. Mostly used for performance comparison
145// with non-fixed mapping. As of r175253 (Feb 2013) the performance
146// difference between fixed and non-fixed mapping is below the noise level.
147static uptr kHighMemEnd = 0x7fffffffffffULL;
148static uptr kMidMemBeg = 0x3000000000ULL;
Kostya Serebryany13577fe2013-02-28 12:28:37 +0000149static uptr kMidMemEnd = 0x4fffffffffULL;
Kostya Serebryanye31eca92013-02-15 12:00:24 +0000150#else
Kostya Serebryanye31eca92013-02-15 12:00:24 +0000151extern uptr kHighMemEnd, kMidMemBeg, kMidMemEnd; // Initialized in __asan_init.
152#endif
Kostya Serebryanye5ab9682013-01-23 13:27:43 +0000153
Kostya Serebryany3f4c3872012-05-31 14:35:53 +0000154static inline bool AddrIsInLowMem(uptr a) {
Kostya Serebryanye31eca92013-02-15 12:00:24 +0000155 PROFILE_ASAN_MAPPING();
Kostya Serebryany1e172b42011-11-30 01:07:02 +0000156 return a < kLowMemEnd;
157}
158
Kostya Serebryany3f4c3872012-05-31 14:35:53 +0000159static inline bool AddrIsInLowShadow(uptr a) {
Kostya Serebryanye31eca92013-02-15 12:00:24 +0000160 PROFILE_ASAN_MAPPING();
Kostya Serebryany1e172b42011-11-30 01:07:02 +0000161 return a >= kLowShadowBeg && a <= kLowShadowEnd;
162}
163
Kostya Serebryany3f4c3872012-05-31 14:35:53 +0000164static inline bool AddrIsInHighMem(uptr a) {
Kostya Serebryanye31eca92013-02-15 12:00:24 +0000165 PROFILE_ASAN_MAPPING();
Kostya Serebryany1e172b42011-11-30 01:07:02 +0000166 return a >= kHighMemBeg && a <= kHighMemEnd;
167}
168
Kostya Serebryanye31eca92013-02-15 12:00:24 +0000169static inline bool AddrIsInMidMem(uptr a) {
170 PROFILE_ASAN_MAPPING();
171 return kMidMemBeg && a >= kMidMemBeg && a <= kMidMemEnd;
172}
173
Kostya Serebryany3f4c3872012-05-31 14:35:53 +0000174static inline bool AddrIsInMem(uptr a) {
Kostya Serebryanye31eca92013-02-15 12:00:24 +0000175 PROFILE_ASAN_MAPPING();
176 return AddrIsInLowMem(a) || AddrIsInMidMem(a) || AddrIsInHighMem(a);
Kostya Serebryany1e172b42011-11-30 01:07:02 +0000177}
178
Kostya Serebryany3f4c3872012-05-31 14:35:53 +0000179static inline uptr MemToShadow(uptr p) {
Kostya Serebryanye31eca92013-02-15 12:00:24 +0000180 PROFILE_ASAN_MAPPING();
Kostya Serebryany1e172b42011-11-30 01:07:02 +0000181 CHECK(AddrIsInMem(p));
182 return MEM_TO_SHADOW(p);
183}
184
Kostya Serebryany3f4c3872012-05-31 14:35:53 +0000185static inline bool AddrIsInHighShadow(uptr a) {
Kostya Serebryanye31eca92013-02-15 12:00:24 +0000186 PROFILE_ASAN_MAPPING();
187 return a >= kHighShadowBeg && a <= kHighMemEnd;
188}
189
190static inline bool AddrIsInMidShadow(uptr a) {
191 PROFILE_ASAN_MAPPING();
192 return kMidMemBeg && a >= kMidShadowBeg && a <= kMidMemEnd;
Kostya Serebryany1e172b42011-11-30 01:07:02 +0000193}
194
Kostya Serebryany3f4c3872012-05-31 14:35:53 +0000195static inline bool AddrIsInShadow(uptr a) {
Kostya Serebryanye31eca92013-02-15 12:00:24 +0000196 PROFILE_ASAN_MAPPING();
197 return AddrIsInLowShadow(a) || AddrIsInMidShadow(a) || AddrIsInHighShadow(a);
Kostya Serebryany1e172b42011-11-30 01:07:02 +0000198}
199
Alexander Potapenko79d12e82012-07-23 08:22:27 +0000200static inline bool AddrIsInShadowGap(uptr a) {
Kostya Serebryanye31eca92013-02-15 12:00:24 +0000201 PROFILE_ASAN_MAPPING();
202 if (kMidMemBeg) {
203 if (a <= kShadowGapEnd)
204 return SHADOW_OFFSET == 0 || a >= kShadowGapBeg;
205 return (a >= kShadowGap2Beg && a <= kShadowGap2End) ||
206 (a >= kShadowGap3Beg && a <= kShadowGap3End);
207 }
Alexey Samsonovee485d42013-01-21 10:51:18 +0000208 // In zero-based shadow mode we treat addresses near zero as addresses
209 // in shadow gap as well.
Alexey Samsonov87b52b92013-01-21 11:36:38 +0000210 if (SHADOW_OFFSET == 0)
Alexey Samsonovee485d42013-01-21 10:51:18 +0000211 return a <= kShadowGapEnd;
Alexander Potapenko79d12e82012-07-23 08:22:27 +0000212 return a >= kShadowGapBeg && a <= kShadowGapEnd;
213}
214
Kostya Serebryany3f4c3872012-05-31 14:35:53 +0000215static inline bool AddrIsAlignedByGranularity(uptr a) {
Kostya Serebryanye31eca92013-02-15 12:00:24 +0000216 PROFILE_ASAN_MAPPING();
Kostya Serebryany218a9b72011-11-30 18:50:23 +0000217 return (a & (SHADOW_GRANULARITY - 1)) == 0;
218}
219
Kostya Serebryany3f4c3872012-05-31 14:35:53 +0000220static inline bool AddressIsPoisoned(uptr a) {
Kostya Serebryanye31eca92013-02-15 12:00:24 +0000221 PROFILE_ASAN_MAPPING();
Kostya Serebryany3f4c3872012-05-31 14:35:53 +0000222 const uptr kAccessSize = 1;
Kostya Serebryanya84805f2013-02-21 07:07:39 +0000223 u8 *shadow_address = (u8*)MEM_TO_SHADOW(a);
Kostya Serebryanyee392552012-05-31 15:02:07 +0000224 s8 shadow_value = *shadow_address;
Kostya Serebryany85997622012-03-15 01:18:06 +0000225 if (shadow_value) {
Kostya Serebryanyee392552012-05-31 15:02:07 +0000226 u8 last_accessed_byte = (a & (SHADOW_GRANULARITY - 1))
Kostya Serebryany85997622012-03-15 01:18:06 +0000227 + kAccessSize - 1;
228 return (last_accessed_byte >= shadow_value);
229 }
230 return false;
231}
232
Kostya Serebryanye31eca92013-02-15 12:00:24 +0000233// Must be after all calls to PROFILE_ASAN_MAPPING().
234static const uptr kAsanMappingProfileSize = __LINE__;
235
Kostya Serebryany1e172b42011-11-30 01:07:02 +0000236} // namespace __asan
237
238#endif // ASAN_MAPPING_H