blob: 0e59524e5ec2be4ec9fa87a1680d4d526b658eb8 [file] [log] [blame]
Kostya Serebryany019b76f2011-11-30 01:07:02 +00001//===-- asan_allocator.h ----------------------------------------*- C++ -*-===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of AddressSanitizer, an address sanity checker.
11//
12// ASan-private header for asan_allocator.cc.
13//===----------------------------------------------------------------------===//
14
15#ifndef ASAN_ALLOCATOR_H
16#define ASAN_ALLOCATOR_H
17
18#include "asan_internal.h"
19#include "asan_interceptors.h"
20
Kostya Serebryany14282a92012-12-10 13:52:55 +000021// We are in the process of transitioning from the old allocator (version 1)
22// to a new one (version 2). The change is quite intrusive so both allocators
23// will co-exist in the source base for a while. The actual allocator is chosen
24// at build time by redefining this macrozz.
25#define ASAN_ALLOCATOR_VERSION 1
26
Kostya Serebryany019b76f2011-11-30 01:07:02 +000027namespace __asan {
28
Kostya Serebryany8d032042012-05-31 14:35:53 +000029static const uptr kNumberOfSizeClasses = 255;
Kostya Serebryany9d1eee92011-11-30 17:33:13 +000030struct AsanChunk;
Kostya Serebryany019b76f2011-11-30 01:07:02 +000031
Alexey Samsonov86614652012-09-18 07:38:10 +000032class AsanChunkView {
33 public:
34 explicit AsanChunkView(AsanChunk *chunk) : chunk_(chunk) {}
35 bool IsValid() { return chunk_ != 0; }
36 uptr Beg(); // first byte of user memory.
37 uptr End(); // last byte of user memory.
38 uptr UsedSize(); // size requested by the user.
39 uptr AllocTid();
40 uptr FreeTid();
41 void GetAllocStack(StackTrace *stack);
42 void GetFreeStack(StackTrace *stack);
Kostya Serebryany5e2a7ac2012-12-11 09:02:36 +000043 bool AddrIsInside(uptr addr, uptr access_size, uptr *offset) {
44 if (addr >= Beg() && (addr + access_size) <= End()) {
45 *offset = addr - Beg();
46 return true;
47 }
48 return false;
49 }
50 bool AddrIsAtLeft(uptr addr, uptr access_size, uptr *offset) {
51 if (addr < Beg()) {
52 *offset = Beg() - addr;
53 return true;
54 }
55 return false;
56 }
57 bool AddrIsAtRight(uptr addr, uptr access_size, uptr *offset) {
58 if (addr + access_size >= End()) {
59 if (addr <= End())
60 *offset = 0;
61 else
62 *offset = addr - End();
63 return true;
64 }
65 return false;
66 }
67
Alexey Samsonov86614652012-09-18 07:38:10 +000068 private:
69 AsanChunk *const chunk_;
70};
71
72AsanChunkView FindHeapChunkByAddress(uptr address);
73
Kostya Serebryany019b76f2011-11-30 01:07:02 +000074class AsanChunkFifoList {
75 public:
76 explicit AsanChunkFifoList(LinkerInitialized) { }
77 AsanChunkFifoList() { clear(); }
78 void Push(AsanChunk *n);
79 void PushList(AsanChunkFifoList *q);
80 AsanChunk *Pop();
Kostya Serebryany8d032042012-05-31 14:35:53 +000081 uptr size() { return size_; }
Kostya Serebryany019b76f2011-11-30 01:07:02 +000082 void clear() {
Kostya Serebryany8d032042012-05-31 14:35:53 +000083 first_ = last_ = 0;
Kostya Serebryany019b76f2011-11-30 01:07:02 +000084 size_ = 0;
85 }
86 private:
87 AsanChunk *first_;
88 AsanChunk *last_;
Kostya Serebryany8d032042012-05-31 14:35:53 +000089 uptr size_;
Kostya Serebryany019b76f2011-11-30 01:07:02 +000090};
91
92struct AsanThreadLocalMallocStorage {
93 explicit AsanThreadLocalMallocStorage(LinkerInitialized x)
94 : quarantine_(x) { }
95 AsanThreadLocalMallocStorage() {
Alexey Samsonove7254782012-02-08 13:45:31 +000096 CHECK(REAL(memset));
97 REAL(memset)(this, 0, sizeof(AsanThreadLocalMallocStorage));
Kostya Serebryany019b76f2011-11-30 01:07:02 +000098 }
99
100 AsanChunkFifoList quarantine_;
101 AsanChunk *free_lists_[kNumberOfSizeClasses];
102 void CommitBack();
103};
104
105// Fake stack frame contains local variables of one function.
106// This struct should fit into a stack redzone (32 bytes).
107struct FakeFrame {
Kostya Serebryany8d032042012-05-31 14:35:53 +0000108 uptr magic; // Modified by the instrumented code.
109 uptr descr; // Modified by the instrumented code.
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000110 FakeFrame *next;
Kostya Serebryany1d35d152012-05-31 15:02:07 +0000111 u64 real_stack : 48;
112 u64 size_minus_one : 16;
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000113};
114
115struct FakeFrameFifo {
116 public:
117 void FifoPush(FakeFrame *node);
118 FakeFrame *FifoPop();
119 private:
120 FakeFrame *first_, *last_;
121};
122
123class FakeFrameLifo {
124 public:
125 void LifoPush(FakeFrame *node) {
126 node->next = top_;
127 top_ = node;
128 }
129 void LifoPop() {
130 CHECK(top_);
131 top_ = top_->next;
132 }
133 FakeFrame *top() { return top_; }
134 private:
135 FakeFrame *top_;
136};
137
138// For each thread we create a fake stack and place stack objects on this fake
139// stack instead of the real stack. The fake stack is not really a stack but
140// a fast malloc-like allocator so that when a function exits the fake stack
141// is not poped but remains there for quite some time until gets used again.
142// So, we poison the objects on the fake stack when function returns.
143// It helps us find use-after-return bugs.
144// We can not rely on __asan_stack_free being called on every function exit,
145// so we maintain a lifo list of all current fake frames and update it on every
146// call to __asan_stack_malloc.
147class FakeStack {
148 public:
149 FakeStack();
150 explicit FakeStack(LinkerInitialized) {}
Kostya Serebryany8d032042012-05-31 14:35:53 +0000151 void Init(uptr stack_size);
Kostya Serebryany72fde372011-12-09 01:49:31 +0000152 void StopUsingFakeStack() { alive_ = false; }
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000153 void Cleanup();
Kostya Serebryany8d032042012-05-31 14:35:53 +0000154 uptr AllocateStack(uptr size, uptr real_stack);
155 static void OnFree(uptr ptr, uptr size, uptr real_stack);
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000156 // Return the bottom of the maped region.
Kostya Serebryany8d032042012-05-31 14:35:53 +0000157 uptr AddrIsInFakeStack(uptr addr);
Alexander Potapenko0be25d52012-02-21 08:45:41 +0000158 bool StackSize() { return stack_size_; }
Alexey Samsonovc3a81192012-08-30 14:22:21 +0000159
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000160 private:
Kostya Serebryany8d032042012-05-31 14:35:53 +0000161 static const uptr kMinStackFrameSizeLog = 9; // Min frame is 512B.
162 static const uptr kMaxStackFrameSizeLog = 16; // Max stack frame is 64K.
163 static const uptr kMaxStackMallocSize = 1 << kMaxStackFrameSizeLog;
164 static const uptr kNumberOfSizeClasses =
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000165 kMaxStackFrameSizeLog - kMinStackFrameSizeLog + 1;
166
Kostya Serebryany8d032042012-05-31 14:35:53 +0000167 bool AddrIsInSizeClass(uptr addr, uptr size_class);
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000168
169 // Each size class should be large enough to hold all frames.
Kostya Serebryany8d032042012-05-31 14:35:53 +0000170 uptr ClassMmapSize(uptr size_class);
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000171
Kostya Serebryany8d032042012-05-31 14:35:53 +0000172 uptr ClassSize(uptr size_class) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000173 return 1UL << (size_class + kMinStackFrameSizeLog);
174 }
175
176 void DeallocateFrame(FakeFrame *fake_frame);
177
Kostya Serebryany8d032042012-05-31 14:35:53 +0000178 uptr ComputeSizeClass(uptr alloc_size);
179 void AllocateOneSizeClass(uptr size_class);
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000180
Kostya Serebryany8d032042012-05-31 14:35:53 +0000181 uptr stack_size_;
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000182 bool alive_;
183
Kostya Serebryany8d032042012-05-31 14:35:53 +0000184 uptr allocated_size_classes_[kNumberOfSizeClasses];
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000185 FakeFrameFifo size_classes_[kNumberOfSizeClasses];
186 FakeFrameLifo call_stack_;
187};
188
Kostya Serebryany6b0d7752012-08-28 11:54:30 +0000189void *asan_memalign(uptr alignment, uptr size, StackTrace *stack);
190void asan_free(void *ptr, StackTrace *stack);
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000191
Kostya Serebryany6b0d7752012-08-28 11:54:30 +0000192void *asan_malloc(uptr size, StackTrace *stack);
193void *asan_calloc(uptr nmemb, uptr size, StackTrace *stack);
194void *asan_realloc(void *p, uptr size, StackTrace *stack);
195void *asan_valloc(uptr size, StackTrace *stack);
196void *asan_pvalloc(uptr size, StackTrace *stack);
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000197
Kostya Serebryany8d032042012-05-31 14:35:53 +0000198int asan_posix_memalign(void **memptr, uptr alignment, uptr size,
Kostya Serebryany6b0d7752012-08-28 11:54:30 +0000199 StackTrace *stack);
200uptr asan_malloc_usable_size(void *ptr, StackTrace *stack);
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000201
Kostya Serebryany8d032042012-05-31 14:35:53 +0000202uptr asan_mz_size(const void *ptr);
Alexey Samsonov209c5142012-01-17 06:39:10 +0000203void asan_mz_force_lock();
204void asan_mz_force_unlock();
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000205
Kostya Serebryany13bdbe62012-12-10 14:19:15 +0000206// Log2 and RoundUpToPowerOfTwo should be inlined for performance.
Kostya Serebryany54af6602012-12-11 07:27:59 +0000207#if defined(_WIN32) && !defined(__clang__)
Timur Iskhodzhanovaacd3d72012-12-11 12:03:06 +0000208unsigned char _BitScanForward(unsigned long *index, unsigned long mask);
209unsigned char _BitScanReverse(unsigned long *index, unsigned long mask);
210#if defined(_WIN64)
211unsigned char _BitScanForward64(unsigned long *index, unsigned __int64 mask);
212unsigned char _BitScanReverse64(unsigned long *index, unsigned __int64 mask);
213#endif
Kostya Serebryany54af6602012-12-11 07:27:59 +0000214#endif
Kostya Serebryany13bdbe62012-12-10 14:19:15 +0000215
216static inline uptr Log2(uptr x) {
217 CHECK(IsPowerOfTwo(x));
218#if !defined(_WIN32) || defined(__clang__)
219 return __builtin_ctzl(x);
220#elif defined(_WIN64)
221 unsigned long ret; // NOLINT
222 _BitScanForward64(&ret, x);
223 return ret;
224#else
225 unsigned long ret; // NOLINT
226 _BitScanForward(&ret, x);
227 return ret;
228#endif
229}
230
231static inline uptr RoundUpToPowerOfTwo(uptr size) {
232 CHECK(size);
233 if (IsPowerOfTwo(size)) return size;
234
235 unsigned long up; // NOLINT
236#if !defined(_WIN32) || defined(__clang__)
237 up = SANITIZER_WORDSIZE - 1 - __builtin_clzl(size);
238#elif defined(_WIN64)
239 _BitScanReverse64(&up, size);
240#else
241 _BitScanReverse(&up, size);
242#endif
243 CHECK(size < (1ULL << (up + 1)));
244 CHECK(size > (1ULL << up));
245 return 1UL << (up + 1);
246}
247
248
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000249} // namespace __asan
250#endif // ASAN_ALLOCATOR_H