blob: 40e32206d6df0dfca7303cf40eb7a0b2f53c208e [file] [log] [blame]
Kostya Serebryany019b76f2011-11-30 01:07:02 +00001//===-- asan_mapping.h ------------------------------------------*- C++ -*-===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of AddressSanitizer, an address sanity checker.
11//
12// Defines ASan memory mapping.
13//===----------------------------------------------------------------------===//
14#ifndef ASAN_MAPPING_H
15#define ASAN_MAPPING_H
16
17#include "asan_internal.h"
18
19// The full explanation of the memory mapping could be found here:
20// http://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm
21
22#if ASAN_FLEXIBLE_MAPPING_AND_OFFSET == 1
Kostya Serebryany8d032042012-05-31 14:35:53 +000023extern __attribute__((visibility("default"))) uptr __asan_mapping_scale;
24extern __attribute__((visibility("default"))) uptr __asan_mapping_offset;
Evgeniy Stepanov8f247012012-05-23 11:52:37 +000025# define SHADOW_SCALE (__asan_mapping_scale)
26# define SHADOW_OFFSET (__asan_mapping_offset)
Kostya Serebryany019b76f2011-11-30 01:07:02 +000027#else
Evgeniy Stepanovbe013982012-08-27 11:15:55 +000028# if ASAN_ANDROID
Evgeniy Stepanov8f247012012-05-23 11:52:37 +000029# define SHADOW_SCALE (3)
30# define SHADOW_OFFSET (0)
31# else
32# define SHADOW_SCALE (3)
33# if __WORDSIZE == 32
34# define SHADOW_OFFSET (1 << 29)
35# else
36# define SHADOW_OFFSET (1ULL << 44)
37# endif
38# endif
Kostya Serebryany019b76f2011-11-30 01:07:02 +000039#endif // ASAN_FLEXIBLE_MAPPING_AND_OFFSET
40
41#define SHADOW_GRANULARITY (1ULL << SHADOW_SCALE)
42#define MEM_TO_SHADOW(mem) (((mem) >> SHADOW_SCALE) | (SHADOW_OFFSET))
Evgeniy Stepanovd989be12012-05-12 12:33:10 +000043#define SHADOW_TO_MEM(shadow) (((shadow) - SHADOW_OFFSET) << SHADOW_SCALE)
Kostya Serebryany019b76f2011-11-30 01:07:02 +000044
45#if __WORDSIZE == 64
Kostya Serebryany8d032042012-05-31 14:35:53 +000046 static const uptr kHighMemEnd = 0x00007fffffffffffUL;
Kostya Serebryany019b76f2011-11-30 01:07:02 +000047#else // __WORDSIZE == 32
Kostya Serebryany8d032042012-05-31 14:35:53 +000048 static const uptr kHighMemEnd = 0xffffffff;
Kostya Serebryany019b76f2011-11-30 01:07:02 +000049#endif // __WORDSIZE
50
51
52#define kLowMemBeg 0
53#define kLowMemEnd (SHADOW_OFFSET ? SHADOW_OFFSET - 1 : 0)
54
55#define kLowShadowBeg SHADOW_OFFSET
56#define kLowShadowEnd MEM_TO_SHADOW(kLowMemEnd)
57
58#define kHighMemBeg (MEM_TO_SHADOW(kHighMemEnd) + 1)
59
60#define kHighShadowBeg MEM_TO_SHADOW(kHighMemBeg)
61#define kHighShadowEnd MEM_TO_SHADOW(kHighMemEnd)
62
63#define kShadowGapBeg (kLowShadowEnd ? kLowShadowEnd + 1 : 16 * kPageSize)
64#define kShadowGapEnd (kHighShadowBeg - 1)
65
66#define kGlobalAndStackRedzone \
67 (SHADOW_GRANULARITY < 32 ? 32 : SHADOW_GRANULARITY)
68
69namespace __asan {
70
Kostya Serebryany8d032042012-05-31 14:35:53 +000071static inline bool AddrIsInLowMem(uptr a) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +000072 return a < kLowMemEnd;
73}
74
Kostya Serebryany8d032042012-05-31 14:35:53 +000075static inline bool AddrIsInLowShadow(uptr a) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +000076 return a >= kLowShadowBeg && a <= kLowShadowEnd;
77}
78
Kostya Serebryany8d032042012-05-31 14:35:53 +000079static inline bool AddrIsInHighMem(uptr a) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +000080 return a >= kHighMemBeg && a <= kHighMemEnd;
81}
82
Kostya Serebryany8d032042012-05-31 14:35:53 +000083static inline bool AddrIsInMem(uptr a) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +000084 return AddrIsInLowMem(a) || AddrIsInHighMem(a);
85}
86
Kostya Serebryany8d032042012-05-31 14:35:53 +000087static inline uptr MemToShadow(uptr p) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +000088 CHECK(AddrIsInMem(p));
89 return MEM_TO_SHADOW(p);
90}
91
Kostya Serebryany8d032042012-05-31 14:35:53 +000092static inline bool AddrIsInHighShadow(uptr a) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +000093 return a >= kHighShadowBeg && a <= kHighMemEnd;
94}
95
Kostya Serebryany8d032042012-05-31 14:35:53 +000096static inline bool AddrIsInShadow(uptr a) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +000097 return AddrIsInLowShadow(a) || AddrIsInHighShadow(a);
98}
99
Alexander Potapenko7f3e84c2012-07-23 08:22:27 +0000100static inline bool AddrIsInShadowGap(uptr a) {
101 return a >= kShadowGapBeg && a <= kShadowGapEnd;
102}
103
Kostya Serebryany8d032042012-05-31 14:35:53 +0000104static inline bool AddrIsAlignedByGranularity(uptr a) {
Kostya Serebryany15dd3f22011-11-30 18:50:23 +0000105 return (a & (SHADOW_GRANULARITY - 1)) == 0;
106}
107
Kostya Serebryany8d032042012-05-31 14:35:53 +0000108static inline bool AddressIsPoisoned(uptr a) {
109 const uptr kAccessSize = 1;
Kostya Serebryany1d35d152012-05-31 15:02:07 +0000110 u8 *shadow_address = (u8*)MemToShadow(a);
111 s8 shadow_value = *shadow_address;
Kostya Serebryanyfd203712012-03-15 01:18:06 +0000112 if (shadow_value) {
Kostya Serebryany1d35d152012-05-31 15:02:07 +0000113 u8 last_accessed_byte = (a & (SHADOW_GRANULARITY - 1))
Kostya Serebryanyfd203712012-03-15 01:18:06 +0000114 + kAccessSize - 1;
115 return (last_accessed_byte >= shadow_value);
116 }
117 return false;
118}
119
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000120} // namespace __asan
121
122#endif // ASAN_MAPPING_H