blob: 06efabee624c97ec2690689d3e5120a42fe67f15 [file] [log] [blame]
Kostya Serebryany019b76f2011-11-30 01:07:02 +00001//===-- asan_mapping.h ------------------------------------------*- C++ -*-===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of AddressSanitizer, an address sanity checker.
11//
12// Defines ASan memory mapping.
13//===----------------------------------------------------------------------===//
14#ifndef ASAN_MAPPING_H
15#define ASAN_MAPPING_H
16
17#include "asan_internal.h"
18
19// The full explanation of the memory mapping could be found here:
20// http://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm
21
22#if ASAN_FLEXIBLE_MAPPING_AND_OFFSET == 1
Alexey Samsonov1aa47ef2012-12-28 11:22:23 +000023extern SANITIZER_INTERFACE_ATTRIBUTE uptr __asan_mapping_scale;
24extern SANITIZER_INTERFACE_ATTRIBUTE uptr __asan_mapping_offset;
Evgeniy Stepanov8f247012012-05-23 11:52:37 +000025# define SHADOW_SCALE (__asan_mapping_scale)
26# define SHADOW_OFFSET (__asan_mapping_offset)
Kostya Serebryany019b76f2011-11-30 01:07:02 +000027#else
Evgeniy Stepanovbe013982012-08-27 11:15:55 +000028# if ASAN_ANDROID
Evgeniy Stepanov8f247012012-05-23 11:52:37 +000029# define SHADOW_SCALE (3)
30# define SHADOW_OFFSET (0)
31# else
32# define SHADOW_SCALE (3)
Kostya Serebryany734f1eb2012-11-21 12:38:58 +000033# if SANITIZER_WORDSIZE == 32
Evgeniy Stepanov8f247012012-05-23 11:52:37 +000034# define SHADOW_OFFSET (1 << 29)
35# else
Kostya Serebryany46de5802012-11-20 07:00:42 +000036# if defined(__powerpc64__)
37# define SHADOW_OFFSET (1ULL << 41)
38# else
39# define SHADOW_OFFSET (1ULL << 44)
40# endif
Evgeniy Stepanov8f247012012-05-23 11:52:37 +000041# endif
42# endif
Kostya Serebryany019b76f2011-11-30 01:07:02 +000043#endif // ASAN_FLEXIBLE_MAPPING_AND_OFFSET
44
45#define SHADOW_GRANULARITY (1ULL << SHADOW_SCALE)
Kostya Serebryany8f267132013-01-23 13:27:43 +000046#define MEM_TO_SHADOW(mem) (((mem) >> SHADOW_SCALE) + (SHADOW_OFFSET))
Evgeniy Stepanovd989be12012-05-12 12:33:10 +000047#define SHADOW_TO_MEM(shadow) (((shadow) - SHADOW_OFFSET) << SHADOW_SCALE)
Kostya Serebryany019b76f2011-11-30 01:07:02 +000048
Kostya Serebryany019b76f2011-11-30 01:07:02 +000049#define kLowMemBeg 0
50#define kLowMemEnd (SHADOW_OFFSET ? SHADOW_OFFSET - 1 : 0)
51
52#define kLowShadowBeg SHADOW_OFFSET
53#define kLowShadowEnd MEM_TO_SHADOW(kLowMemEnd)
54
55#define kHighMemBeg (MEM_TO_SHADOW(kHighMemEnd) + 1)
56
57#define kHighShadowBeg MEM_TO_SHADOW(kHighMemBeg)
58#define kHighShadowEnd MEM_TO_SHADOW(kHighMemEnd)
59
Kostya Serebryanydf198db2012-11-24 05:03:11 +000060// With the zero shadow base we can not actually map pages starting from 0.
61// This constant is somewhat arbitrary.
62#define kZeroBaseShadowStart (1 << 18)
63
64#define kShadowGapBeg (kLowShadowEnd ? kLowShadowEnd + 1 \
65 : kZeroBaseShadowStart)
Kostya Serebryany019b76f2011-11-30 01:07:02 +000066#define kShadowGapEnd (kHighShadowBeg - 1)
67
Kostya Serebryany019b76f2011-11-30 01:07:02 +000068namespace __asan {
69
Kostya Serebryany8f267132013-01-23 13:27:43 +000070extern uptr kHighMemEnd; // Initialized in __asan_init.
71
Kostya Serebryany8d032042012-05-31 14:35:53 +000072static inline bool AddrIsInLowMem(uptr a) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +000073 return a < kLowMemEnd;
74}
75
Kostya Serebryany8d032042012-05-31 14:35:53 +000076static inline bool AddrIsInLowShadow(uptr a) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +000077 return a >= kLowShadowBeg && a <= kLowShadowEnd;
78}
79
Kostya Serebryany8d032042012-05-31 14:35:53 +000080static inline bool AddrIsInHighMem(uptr a) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +000081 return a >= kHighMemBeg && a <= kHighMemEnd;
82}
83
Kostya Serebryany8d032042012-05-31 14:35:53 +000084static inline bool AddrIsInMem(uptr a) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +000085 return AddrIsInLowMem(a) || AddrIsInHighMem(a);
86}
87
Kostya Serebryany8d032042012-05-31 14:35:53 +000088static inline uptr MemToShadow(uptr p) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +000089 CHECK(AddrIsInMem(p));
90 return MEM_TO_SHADOW(p);
91}
92
Kostya Serebryany8d032042012-05-31 14:35:53 +000093static inline bool AddrIsInHighShadow(uptr a) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +000094 return a >= kHighShadowBeg && a <= kHighMemEnd;
95}
96
Kostya Serebryany8d032042012-05-31 14:35:53 +000097static inline bool AddrIsInShadow(uptr a) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +000098 return AddrIsInLowShadow(a) || AddrIsInHighShadow(a);
99}
100
Alexander Potapenko7f3e84c2012-07-23 08:22:27 +0000101static inline bool AddrIsInShadowGap(uptr a) {
Alexey Samsonov6ad1d782013-01-21 10:51:18 +0000102 // In zero-based shadow mode we treat addresses near zero as addresses
103 // in shadow gap as well.
Alexey Samsonov362286f2013-01-21 11:36:38 +0000104 if (SHADOW_OFFSET == 0)
Alexey Samsonov6ad1d782013-01-21 10:51:18 +0000105 return a <= kShadowGapEnd;
Alexander Potapenko7f3e84c2012-07-23 08:22:27 +0000106 return a >= kShadowGapBeg && a <= kShadowGapEnd;
107}
108
Kostya Serebryany8d032042012-05-31 14:35:53 +0000109static inline bool AddrIsAlignedByGranularity(uptr a) {
Kostya Serebryany15dd3f22011-11-30 18:50:23 +0000110 return (a & (SHADOW_GRANULARITY - 1)) == 0;
111}
112
Kostya Serebryany8d032042012-05-31 14:35:53 +0000113static inline bool AddressIsPoisoned(uptr a) {
114 const uptr kAccessSize = 1;
Kostya Serebryany1d35d152012-05-31 15:02:07 +0000115 u8 *shadow_address = (u8*)MemToShadow(a);
116 s8 shadow_value = *shadow_address;
Kostya Serebryanyfd203712012-03-15 01:18:06 +0000117 if (shadow_value) {
Kostya Serebryany1d35d152012-05-31 15:02:07 +0000118 u8 last_accessed_byte = (a & (SHADOW_GRANULARITY - 1))
Kostya Serebryanyfd203712012-03-15 01:18:06 +0000119 + kAccessSize - 1;
120 return (last_accessed_byte >= shadow_value);
121 }
122 return false;
123}
124
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000125} // namespace __asan
126
127#endif // ASAN_MAPPING_H