blob: 5e3067031f4a37f05815a2285f9ef3b1634c730f [file] [log] [blame]
Kostya Serebryany019b76f2011-11-30 01:07:02 +00001//===-- asan_mapping.h ------------------------------------------*- C++ -*-===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of AddressSanitizer, an address sanity checker.
11//
12// Defines ASan memory mapping.
13//===----------------------------------------------------------------------===//
14#ifndef ASAN_MAPPING_H
15#define ASAN_MAPPING_H
16
17#include "asan_internal.h"
18
19// The full explanation of the memory mapping could be found here:
20// http://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm
21
22#if ASAN_FLEXIBLE_MAPPING_AND_OFFSET == 1
Alexey Samsonov1aa47ef2012-12-28 11:22:23 +000023extern SANITIZER_INTERFACE_ATTRIBUTE uptr __asan_mapping_scale;
24extern SANITIZER_INTERFACE_ATTRIBUTE uptr __asan_mapping_offset;
Evgeniy Stepanov8f247012012-05-23 11:52:37 +000025# define SHADOW_SCALE (__asan_mapping_scale)
26# define SHADOW_OFFSET (__asan_mapping_offset)
Kostya Serebryany019b76f2011-11-30 01:07:02 +000027#else
Evgeniy Stepanovbe013982012-08-27 11:15:55 +000028# if ASAN_ANDROID
Evgeniy Stepanov8f247012012-05-23 11:52:37 +000029# define SHADOW_SCALE (3)
30# define SHADOW_OFFSET (0)
31# else
32# define SHADOW_SCALE (3)
Kostya Serebryany734f1eb2012-11-21 12:38:58 +000033# if SANITIZER_WORDSIZE == 32
Evgeniy Stepanov8f247012012-05-23 11:52:37 +000034# define SHADOW_OFFSET (1 << 29)
35# else
Kostya Serebryany46de5802012-11-20 07:00:42 +000036# if defined(__powerpc64__)
37# define SHADOW_OFFSET (1ULL << 41)
38# else
39# define SHADOW_OFFSET (1ULL << 44)
40# endif
Evgeniy Stepanov8f247012012-05-23 11:52:37 +000041# endif
42# endif
Kostya Serebryany019b76f2011-11-30 01:07:02 +000043#endif // ASAN_FLEXIBLE_MAPPING_AND_OFFSET
44
45#define SHADOW_GRANULARITY (1ULL << SHADOW_SCALE)
46#define MEM_TO_SHADOW(mem) (((mem) >> SHADOW_SCALE) | (SHADOW_OFFSET))
Evgeniy Stepanovd989be12012-05-12 12:33:10 +000047#define SHADOW_TO_MEM(shadow) (((shadow) - SHADOW_OFFSET) << SHADOW_SCALE)
Kostya Serebryany019b76f2011-11-30 01:07:02 +000048
Kostya Serebryany734f1eb2012-11-21 12:38:58 +000049#if SANITIZER_WORDSIZE == 64
Kostya Serebryany46de5802012-11-20 07:00:42 +000050# if defined(__powerpc64__)
51 static const uptr kHighMemEnd = 0x00000fffffffffffUL;
52# else
Kostya Serebryany8d032042012-05-31 14:35:53 +000053 static const uptr kHighMemEnd = 0x00007fffffffffffUL;
Kostya Serebryany46de5802012-11-20 07:00:42 +000054# endif
Kostya Serebryany734f1eb2012-11-21 12:38:58 +000055#else // SANITIZER_WORDSIZE == 32
Kostya Serebryany8d032042012-05-31 14:35:53 +000056 static const uptr kHighMemEnd = 0xffffffff;
Kostya Serebryany734f1eb2012-11-21 12:38:58 +000057#endif // SANITIZER_WORDSIZE
Kostya Serebryany019b76f2011-11-30 01:07:02 +000058
59
60#define kLowMemBeg 0
61#define kLowMemEnd (SHADOW_OFFSET ? SHADOW_OFFSET - 1 : 0)
62
63#define kLowShadowBeg SHADOW_OFFSET
64#define kLowShadowEnd MEM_TO_SHADOW(kLowMemEnd)
65
66#define kHighMemBeg (MEM_TO_SHADOW(kHighMemEnd) + 1)
67
68#define kHighShadowBeg MEM_TO_SHADOW(kHighMemBeg)
69#define kHighShadowEnd MEM_TO_SHADOW(kHighMemEnd)
70
Kostya Serebryanydf198db2012-11-24 05:03:11 +000071// With the zero shadow base we can not actually map pages starting from 0.
72// This constant is somewhat arbitrary.
73#define kZeroBaseShadowStart (1 << 18)
74
75#define kShadowGapBeg (kLowShadowEnd ? kLowShadowEnd + 1 \
76 : kZeroBaseShadowStart)
Kostya Serebryany019b76f2011-11-30 01:07:02 +000077#define kShadowGapEnd (kHighShadowBeg - 1)
78
79#define kGlobalAndStackRedzone \
80 (SHADOW_GRANULARITY < 32 ? 32 : SHADOW_GRANULARITY)
81
82namespace __asan {
83
Kostya Serebryany8d032042012-05-31 14:35:53 +000084static inline bool AddrIsInLowMem(uptr a) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +000085 return a < kLowMemEnd;
86}
87
Kostya Serebryany8d032042012-05-31 14:35:53 +000088static inline bool AddrIsInLowShadow(uptr a) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +000089 return a >= kLowShadowBeg && a <= kLowShadowEnd;
90}
91
Kostya Serebryany8d032042012-05-31 14:35:53 +000092static inline bool AddrIsInHighMem(uptr a) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +000093 return a >= kHighMemBeg && a <= kHighMemEnd;
94}
95
Kostya Serebryany8d032042012-05-31 14:35:53 +000096static inline bool AddrIsInMem(uptr a) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +000097 return AddrIsInLowMem(a) || AddrIsInHighMem(a);
98}
99
Kostya Serebryany8d032042012-05-31 14:35:53 +0000100static inline uptr MemToShadow(uptr p) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000101 CHECK(AddrIsInMem(p));
102 return MEM_TO_SHADOW(p);
103}
104
Kostya Serebryany8d032042012-05-31 14:35:53 +0000105static inline bool AddrIsInHighShadow(uptr a) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000106 return a >= kHighShadowBeg && a <= kHighMemEnd;
107}
108
Kostya Serebryany8d032042012-05-31 14:35:53 +0000109static inline bool AddrIsInShadow(uptr a) {
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000110 return AddrIsInLowShadow(a) || AddrIsInHighShadow(a);
111}
112
Alexander Potapenko7f3e84c2012-07-23 08:22:27 +0000113static inline bool AddrIsInShadowGap(uptr a) {
114 return a >= kShadowGapBeg && a <= kShadowGapEnd;
115}
116
Kostya Serebryany8d032042012-05-31 14:35:53 +0000117static inline bool AddrIsAlignedByGranularity(uptr a) {
Kostya Serebryany15dd3f22011-11-30 18:50:23 +0000118 return (a & (SHADOW_GRANULARITY - 1)) == 0;
119}
120
Kostya Serebryany8d032042012-05-31 14:35:53 +0000121static inline bool AddressIsPoisoned(uptr a) {
122 const uptr kAccessSize = 1;
Kostya Serebryany1d35d152012-05-31 15:02:07 +0000123 u8 *shadow_address = (u8*)MemToShadow(a);
124 s8 shadow_value = *shadow_address;
Kostya Serebryanyfd203712012-03-15 01:18:06 +0000125 if (shadow_value) {
Kostya Serebryany1d35d152012-05-31 15:02:07 +0000126 u8 last_accessed_byte = (a & (SHADOW_GRANULARITY - 1))
Kostya Serebryanyfd203712012-03-15 01:18:06 +0000127 + kAccessSize - 1;
128 return (last_accessed_byte >= shadow_value);
129 }
130 return false;
131}
132
Kostya Serebryany019b76f2011-11-30 01:07:02 +0000133} // namespace __asan
134
135#endif // ASAN_MAPPING_H