blob: 014205ce01ebecda12d2c1b88f61a6e9845071dd [file] [log] [blame]
Derek Bruening909d3292016-05-28 00:25:16 +00001//===-- esan.cpp ----------------------------------------------------------===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of EfficiencySanitizer, a family of performance tuners.
11//
12// Linux-specific code for the Esan run-time.
13//===----------------------------------------------------------------------===//
14
15#include "sanitizer_common/sanitizer_platform.h"
16#if SANITIZER_FREEBSD || SANITIZER_LINUX
17
18#include "esan.h"
19#include "esan_shadow.h"
20#include "interception/interception.h"
21#include "sanitizer_common/sanitizer_common.h"
22#include <sys/mman.h>
23#include <errno.h>
24
25namespace __esan {
26
27void verifyAddressSpace() {
Sagar Thakur51458252016-10-06 09:58:11 +000028#if SANITIZER_LINUX && (defined(__x86_64__) || SANITIZER_MIPS64)
Derek Bruening909d3292016-05-28 00:25:16 +000029 // The kernel determines its mmap base from the stack size limit.
30 // Our Linux 64-bit shadow mapping assumes the stack limit is less than a
31 // terabyte, which keeps the mmap region above 0x7e00'.
32 uptr StackLimit = GetStackSizeLimitInBytes();
33 if (StackSizeIsUnlimited() || StackLimit > MaxStackSize) {
34 VReport(1, "The stack size limit is beyond the maximum supported.\n"
35 "Re-execing with a stack size below 1TB.\n");
36 SetStackSizeLimitInBytes(MaxStackSize);
37 ReExec();
38 }
39#endif
40}
41
42static bool liesWithinSingleAppRegion(uptr Start, SIZE_T Size) {
43 uptr AppStart, AppEnd;
44 for (int i = 0; getAppRegion(i, &AppStart, &AppEnd); ++i) {
45 if (Start >= AppStart && Start + Size - 1 <= AppEnd) {
46 return true;
47 }
48 }
49 return false;
50}
51
52bool fixMmapAddr(void **Addr, SIZE_T Size, int Flags) {
53 if (*Addr) {
54 if (!liesWithinSingleAppRegion((uptr)*Addr, Size)) {
55 VPrintf(1, "mmap conflict: [%p-%p) is not in an app region\n",
56 *Addr, (uptr)*Addr + Size);
57 if (Flags & MAP_FIXED) {
58 errno = EINVAL;
59 return false;
60 } else {
61 *Addr = 0;
62 }
63 }
64 }
65 return true;
66}
67
68uptr checkMmapResult(uptr Addr, SIZE_T Size) {
69 if ((void *)Addr == MAP_FAILED)
70 return Addr;
71 if (!liesWithinSingleAppRegion(Addr, Size)) {
72 // FIXME: attempt to dynamically add this as an app region if it
73 // fits our shadow criteria.
74 // We could also try to remap somewhere else.
75 Printf("ERROR: unsupported mapping at [%p-%p)\n", Addr, Addr+Size);
76 Die();
77 }
78 return Addr;
79}
80
81} // namespace __esan
82
83#endif // SANITIZER_FREEBSD || SANITIZER_LINUX