blob: 94a1f834a0918722625083b4e704ea6aa8a1458e [file] [log] [blame]
Kostya Serebryany019b76f2011-11-30 01:07:02 +00001//===-- asan_mapping.h ------------------------------------------*- C++ -*-===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of AddressSanitizer, an address sanity checker.
11//
12// Defines ASan memory mapping.
13//===----------------------------------------------------------------------===//
14#ifndef ASAN_MAPPING_H
15#define ASAN_MAPPING_H
16
17#include "asan_internal.h"
18
19// The full explanation of the memory mapping could be found here:
20// http://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +000021//
22// Typical shadow mapping on Linux/x86_64 with SHADOW_OFFSET == 0x00007fff8000:
23// || `[0x10007fff8000, 0x7fffffffffff]` || HighMem ||
24// || `[0x02008fff7000, 0x10007fff7fff]` || HighShadow ||
25// || `[0x00008fff7000, 0x02008fff6fff]` || ShadowGap ||
26// || `[0x00007fff8000, 0x00008fff6fff]` || LowShadow ||
27// || `[0x000000000000, 0x00007fff7fff]` || LowMem ||
28//
29// When SHADOW_OFFSET is zero (-pie):
30// || `[0x100000000000, 0x7fffffffffff]` || HighMem ||
31// || `[0x020000000000, 0x0fffffffffff]` || HighShadow ||
32// || `[0x000000040000, 0x01ffffffffff]` || ShadowGap ||
33//
34// Special case when something is already mapped between
Kostya Serebryanyabebb572013-02-28 12:28:37 +000035// 0x003000000000 and 0x005000000000 (e.g. when prelink is installed):
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +000036// || `[0x10007fff8000, 0x7fffffffffff]` || HighMem ||
37// || `[0x02008fff7000, 0x10007fff7fff]` || HighShadow ||
Kostya Serebryanyabebb572013-02-28 12:28:37 +000038// || `[0x005000000000, 0x02008fff6fff]` || ShadowGap3 ||
39// || `[0x003000000000, 0x004fffffffff]` || MidMem ||
40// || `[0x000a7fff8000, 0x002fffffffff]` || ShadowGap2 ||
41// || `[0x00067fff8000, 0x000a7fff7fff]` || MidShadow ||
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +000042// || `[0x00008fff7000, 0x00067fff7fff]` || ShadowGap ||
43// || `[0x00007fff8000, 0x00008fff6fff]` || LowShadow ||
44// || `[0x000000000000, 0x00007fff7fff]` || LowMem ||
45//
Kostya Serebryany88d0eac2014-03-27 07:36:26 +000046// Default Linux/i386 mapping on x86_64 machine:
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +000047// || `[0x40000000, 0xffffffff]` || HighMem ||
48// || `[0x28000000, 0x3fffffff]` || HighShadow ||
49// || `[0x24000000, 0x27ffffff]` || ShadowGap ||
50// || `[0x20000000, 0x23ffffff]` || LowShadow ||
51// || `[0x00000000, 0x1fffffff]` || LowMem ||
Kostya Serebryanyc1aa0e82013-06-03 14:49:25 +000052//
Kostya Serebryany88d0eac2014-03-27 07:36:26 +000053// Default Linux/i386 mapping on i386 machine
54// (addresses starting with 0xc0000000 are reserved
55// for kernel and thus not sanitized):
56// || `[0x38000000, 0xbfffffff]` || HighMem ||
57// || `[0x27000000, 0x37ffffff]` || HighShadow ||
58// || `[0x24000000, 0x26ffffff]` || ShadowGap ||
59// || `[0x20000000, 0x23ffffff]` || LowShadow ||
60// || `[0x00000000, 0x1fffffff]` || LowMem ||
61//
Kostya Serebryanyc1aa0e82013-06-03 14:49:25 +000062// Default Linux/MIPS mapping:
Kostya Serebryanyc5bd9812014-11-04 19:46:15 +000063// || `[0x2aaa0000, 0xffffffff]` || HighMem ||
64// || `[0x0fff4000, 0x2aa9ffff]` || HighShadow ||
65// || `[0x0bff4000, 0x0fff3fff]` || ShadowGap ||
66// || `[0x0aaa0000, 0x0bff3fff]` || LowShadow ||
67// || `[0x00000000, 0x0aa9ffff]` || LowMem ||
Viktor Kutuzov626edb62014-05-12 11:03:46 +000068//
69// Shadow mapping on FreeBSD/x86-64 with SHADOW_OFFSET == 0x400000000000:
70// || `[0x500000000000, 0x7fffffffffff]` || HighMem ||
71// || `[0x4a0000000000, 0x4fffffffffff]` || HighShadow ||
72// || `[0x480000000000, 0x49ffffffffff]` || ShadowGap ||
73// || `[0x400000000000, 0x47ffffffffff]` || LowShadow ||
74// || `[0x000000000000, 0x3fffffffffff]` || LowMem ||
75//
76// Shadow mapping on FreeBSD/i386 with SHADOW_OFFSET == 0x40000000:
77// || `[0x60000000, 0xffffffff]` || HighMem ||
78// || `[0x4c000000, 0x5fffffff]` || HighShadow ||
79// || `[0x48000000, 0x4bffffff]` || ShadowGap ||
80// || `[0x40000000, 0x47ffffff]` || LowShadow ||
81// || `[0x00000000, 0x3fffffff]` || LowMem ||
Timur Iskhodzhanov00ede842015-01-12 17:38:58 +000082//
83// Default Windows/i386 mapping:
84// || `[0x60000000, 0xffffffff]` || HighMem ||
85// || `[0x4c000000, 0x5fffffff]` || HighShadow ||
86// || `[0x48000000, 0x4bffffff]` || ShadowGap ||
87// || `[0x40000000, 0x47ffffff]` || LowShadow ||
88// || `[0x00000000, 0x3fffffff]` || LowMem ||
Kostya Serebryany019b76f2011-11-30 01:07:02 +000089
Alexey Samsonov48e25642013-09-16 15:45:06 +000090static const u64 kDefaultShadowScale = 3;
Alexander Potapenkoa51e4832014-04-23 17:14:45 +000091static const u64 kDefaultShadowOffset32 = 1ULL << 29; // 0x20000000
92static const u64 kIosShadowOffset32 = 1ULL << 30; // 0x40000000
Alexey Samsonov48e25642013-09-16 15:45:06 +000093static const u64 kDefaultShadowOffset64 = 1ULL << 44;
94static const u64 kDefaultShort64bitShadowOffset = 0x7FFF8000; // < 2G.
Kostya Serebryanyc98ce282014-02-13 07:50:20 +000095static const u64 kAArch64_ShadowOffset64 = 1ULL << 36;
Kostya Serebryanyc5bd9812014-11-04 19:46:15 +000096static const u64 kMIPS32_ShadowOffset32 = 0x0aaa0000;
Kostya Serebryany2dd74372014-11-12 18:23:16 +000097static const u64 kMIPS64_ShadowOffset64 = 1ULL << 36;
Evgeniy Stepanovdd7cb282014-05-30 08:52:03 +000098static const u64 kPPC64_ShadowOffset64 = 1ULL << 41;
Viktor Kutuzov626edb62014-05-12 11:03:46 +000099static const u64 kFreeBSD_ShadowOffset32 = 1ULL << 30; // 0x40000000
100static const u64 kFreeBSD_ShadowOffset64 = 1ULL << 46; // 0x400000000000
Timur Iskhodzhanov00ede842015-01-12 17:38:58 +0000101static const u64 kWindowsShadowOffset32 = 1ULL << 30; // 0x40000000
Alexey Samsonov48e25642013-09-16 15:45:06 +0000102
Evgeniy Stepanove259b652014-01-16 10:16:19 +0000103#define SHADOW_SCALE kDefaultShadowScale
104#if SANITIZER_ANDROID
105# define SHADOW_OFFSET (0)
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000106#else
Evgeniy Stepanove259b652014-01-16 10:16:19 +0000107# if SANITIZER_WORDSIZE == 32
108# if defined(__mips__)
109# define SHADOW_OFFSET kMIPS32_ShadowOffset32
Viktor Kutuzov626edb62014-05-12 11:03:46 +0000110# elif SANITIZER_FREEBSD
111# define SHADOW_OFFSET kFreeBSD_ShadowOffset32
Timur Iskhodzhanov00ede842015-01-12 17:38:58 +0000112# elif SANITIZER_IOS
113# define SHADOW_OFFSET kIosShadowOffset32
114# elif SANITIZER_WINDOWS
115# define SHADOW_OFFSET kWindowsShadowOffset32
Evgeniy Stepanov8f247012012-05-23 11:52:37 +0000116# else
Timur Iskhodzhanov00ede842015-01-12 17:38:58 +0000117# define SHADOW_OFFSET kDefaultShadowOffset32
Evgeniy Stepanove259b652014-01-16 10:16:19 +0000118# endif
119# else
Kostya Serebryanyc98ce282014-02-13 07:50:20 +0000120# if defined(__aarch64__)
121# define SHADOW_OFFSET kAArch64_ShadowOffset64
Evgeniy Stepanovdd7cb282014-05-30 08:52:03 +0000122# elif defined(__powerpc64__)
123# define SHADOW_OFFSET kPPC64_ShadowOffset64
Viktor Kutuzov626edb62014-05-12 11:03:46 +0000124# elif SANITIZER_FREEBSD
125# define SHADOW_OFFSET kFreeBSD_ShadowOffset64
Kostya Serebryanyc98ce282014-02-13 07:50:20 +0000126# elif SANITIZER_MAC
Evgeniy Stepanove259b652014-01-16 10:16:19 +0000127# define SHADOW_OFFSET kDefaultShadowOffset64
Kostya Serebryany2dd74372014-11-12 18:23:16 +0000128# elif defined(__mips64)
129# define SHADOW_OFFSET kMIPS64_ShadowOffset64
Evgeniy Stepanove259b652014-01-16 10:16:19 +0000130# else
131# define SHADOW_OFFSET kDefaultShort64bitShadowOffset
Evgeniy Stepanov8f247012012-05-23 11:52:37 +0000132# endif
133# endif
Evgeniy Stepanove259b652014-01-16 10:16:19 +0000134#endif
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000135
136#define SHADOW_GRANULARITY (1ULL << SHADOW_SCALE)
Kostya Serebryany8f267132013-01-23 13:27:43 +0000137#define MEM_TO_SHADOW(mem) (((mem) >> SHADOW_SCALE) + (SHADOW_OFFSET))
Evgeniy Stepanovd989be12012-05-12 12:33:10 +0000138#define SHADOW_TO_MEM(shadow) (((shadow) - SHADOW_OFFSET) << SHADOW_SCALE)
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000139
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000140#define kLowMemBeg 0
141#define kLowMemEnd (SHADOW_OFFSET ? SHADOW_OFFSET - 1 : 0)
142
143#define kLowShadowBeg SHADOW_OFFSET
144#define kLowShadowEnd MEM_TO_SHADOW(kLowMemEnd)
145
146#define kHighMemBeg (MEM_TO_SHADOW(kHighMemEnd) + 1)
147
148#define kHighShadowBeg MEM_TO_SHADOW(kHighMemBeg)
149#define kHighShadowEnd MEM_TO_SHADOW(kHighMemEnd)
150
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +0000151# define kMidShadowBeg MEM_TO_SHADOW(kMidMemBeg)
152# define kMidShadowEnd MEM_TO_SHADOW(kMidMemEnd)
153
Kostya Serebryanydf198db2012-11-24 05:03:11 +0000154// With the zero shadow base we can not actually map pages starting from 0.
155// This constant is somewhat arbitrary.
156#define kZeroBaseShadowStart (1 << 18)
157
158#define kShadowGapBeg (kLowShadowEnd ? kLowShadowEnd + 1 \
159 : kZeroBaseShadowStart)
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +0000160#define kShadowGapEnd ((kMidMemBeg ? kMidShadowBeg : kHighShadowBeg) - 1)
161
162#define kShadowGap2Beg (kMidMemBeg ? kMidShadowEnd + 1 : 0)
163#define kShadowGap2End (kMidMemBeg ? kMidMemBeg - 1 : 0)
164
165#define kShadowGap3Beg (kMidMemBeg ? kMidMemEnd + 1 : 0)
166#define kShadowGap3End (kMidMemBeg ? kHighShadowBeg - 1 : 0)
167
168#define DO_ASAN_MAPPING_PROFILE 0 // Set to 1 to profile the functions below.
169
170#if DO_ASAN_MAPPING_PROFILE
171# define PROFILE_ASAN_MAPPING() AsanMappingProfile[__LINE__]++;
172#else
173# define PROFILE_ASAN_MAPPING()
174#endif
175
176// If 1, all shadow boundaries are constants.
177// Don't set to 1 other than for testing.
178#define ASAN_FIXED_MAPPING 0
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000179
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000180namespace __asan {
181
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +0000182extern uptr AsanMappingProfile[];
183
184#if ASAN_FIXED_MAPPING
185// Fixed mapping for 64-bit Linux. Mostly used for performance comparison
186// with non-fixed mapping. As of r175253 (Feb 2013) the performance
187// difference between fixed and non-fixed mapping is below the noise level.
188static uptr kHighMemEnd = 0x7fffffffffffULL;
189static uptr kMidMemBeg = 0x3000000000ULL;
Kostya Serebryanyabebb572013-02-28 12:28:37 +0000190static uptr kMidMemEnd = 0x4fffffffffULL;
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +0000191#else
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +0000192extern uptr kHighMemEnd, kMidMemBeg, kMidMemEnd; // Initialized in __asan_init.
193#endif
Kostya Serebryany8f267132013-01-23 13:27:43 +0000194
Kostya Serebryany8d032042012-05-31 14:35:53 +0000195static inline bool AddrIsInLowMem(uptr a) {
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +0000196 PROFILE_ASAN_MAPPING();
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000197 return a < kLowMemEnd;
198}
199
Kostya Serebryany8d032042012-05-31 14:35:53 +0000200static inline bool AddrIsInLowShadow(uptr a) {
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +0000201 PROFILE_ASAN_MAPPING();
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000202 return a >= kLowShadowBeg && a <= kLowShadowEnd;
203}
204
Kostya Serebryany8d032042012-05-31 14:35:53 +0000205static inline bool AddrIsInHighMem(uptr a) {
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +0000206 PROFILE_ASAN_MAPPING();
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000207 return a >= kHighMemBeg && a <= kHighMemEnd;
208}
209
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +0000210static inline bool AddrIsInMidMem(uptr a) {
211 PROFILE_ASAN_MAPPING();
212 return kMidMemBeg && a >= kMidMemBeg && a <= kMidMemEnd;
213}
214
Kostya Serebryany8d032042012-05-31 14:35:53 +0000215static inline bool AddrIsInMem(uptr a) {
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +0000216 PROFILE_ASAN_MAPPING();
217 return AddrIsInLowMem(a) || AddrIsInMidMem(a) || AddrIsInHighMem(a);
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000218}
219
Kostya Serebryany8d032042012-05-31 14:35:53 +0000220static inline uptr MemToShadow(uptr p) {
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +0000221 PROFILE_ASAN_MAPPING();
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000222 CHECK(AddrIsInMem(p));
223 return MEM_TO_SHADOW(p);
224}
225
Kostya Serebryany8d032042012-05-31 14:35:53 +0000226static inline bool AddrIsInHighShadow(uptr a) {
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +0000227 PROFILE_ASAN_MAPPING();
228 return a >= kHighShadowBeg && a <= kHighMemEnd;
229}
230
231static inline bool AddrIsInMidShadow(uptr a) {
232 PROFILE_ASAN_MAPPING();
233 return kMidMemBeg && a >= kMidShadowBeg && a <= kMidMemEnd;
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000234}
235
Kostya Serebryany8d032042012-05-31 14:35:53 +0000236static inline bool AddrIsInShadow(uptr a) {
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +0000237 PROFILE_ASAN_MAPPING();
238 return AddrIsInLowShadow(a) || AddrIsInMidShadow(a) || AddrIsInHighShadow(a);
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000239}
240
Alexander Potapenko7f3e84c2012-07-23 08:22:27 +0000241static inline bool AddrIsInShadowGap(uptr a) {
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +0000242 PROFILE_ASAN_MAPPING();
243 if (kMidMemBeg) {
244 if (a <= kShadowGapEnd)
245 return SHADOW_OFFSET == 0 || a >= kShadowGapBeg;
246 return (a >= kShadowGap2Beg && a <= kShadowGap2End) ||
247 (a >= kShadowGap3Beg && a <= kShadowGap3End);
248 }
Alexey Samsonov6ad1d782013-01-21 10:51:18 +0000249 // In zero-based shadow mode we treat addresses near zero as addresses
250 // in shadow gap as well.
Alexey Samsonov362286f2013-01-21 11:36:38 +0000251 if (SHADOW_OFFSET == 0)
Alexey Samsonov6ad1d782013-01-21 10:51:18 +0000252 return a <= kShadowGapEnd;
Alexander Potapenko7f3e84c2012-07-23 08:22:27 +0000253 return a >= kShadowGapBeg && a <= kShadowGapEnd;
254}
255
Kostya Serebryany8d032042012-05-31 14:35:53 +0000256static inline bool AddrIsAlignedByGranularity(uptr a) {
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +0000257 PROFILE_ASAN_MAPPING();
Kostya Serebryany15dd3f22011-11-30 18:50:23 +0000258 return (a & (SHADOW_GRANULARITY - 1)) == 0;
259}
260
Kostya Serebryany8d032042012-05-31 14:35:53 +0000261static inline bool AddressIsPoisoned(uptr a) {
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +0000262 PROFILE_ASAN_MAPPING();
Kostya Serebryany8d032042012-05-31 14:35:53 +0000263 const uptr kAccessSize = 1;
Kostya Serebryanyab5be262013-02-21 07:07:39 +0000264 u8 *shadow_address = (u8*)MEM_TO_SHADOW(a);
Kostya Serebryany1d35d152012-05-31 15:02:07 +0000265 s8 shadow_value = *shadow_address;
Kostya Serebryanyfd203712012-03-15 01:18:06 +0000266 if (shadow_value) {
Kostya Serebryany1d35d152012-05-31 15:02:07 +0000267 u8 last_accessed_byte = (a & (SHADOW_GRANULARITY - 1))
Kostya Serebryanyfd203712012-03-15 01:18:06 +0000268 + kAccessSize - 1;
269 return (last_accessed_byte >= shadow_value);
270 }
271 return false;
272}
273
Kostya Serebryanyfd61b6f2013-02-15 12:00:24 +0000274// Must be after all calls to PROFILE_ASAN_MAPPING().
275static const uptr kAsanMappingProfileSize = __LINE__;
276
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000277} // namespace __asan
278
279#endif // ASAN_MAPPING_H